Secured Employee Attendance Management System Using Fingerprint
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
In this paper an effective employee attendance management system using fingerprint is introduced. It is used to managed the attendance of employees in any organization. All organizations and institutions are established to achieve specific objectives or goals. The identification and authentication of employee is very necessary for achieving any objective or goal. To identify and authenticate the identity of an individual employee by their names, ID numbers and signatures only are not enough, because any one can misuse other's identity and this type of problem occur very often. Fingerprint can be applied for recognizing any person, because human fingerprints are unique to each person and can be regarded as some sort of signature, certifying the person's identity. This method of employee identification and authentication will improve the attendance of employees thereby improving security, productivity and skill which will in turn improve the progress of organizations
Authors and Affiliations
Chiwa, Musa Dalah
Enhancing The Ic Engine Performance By Using The ElectrolysisAnd Preheating Process
Abstract:Our present fuel resources are not going to be around forever and with the ever increasing consumption their extinction is nearly unavoidable. Also our fuel resources which are mostly made up of fossil f...
A Critical Appraisal of e-Governance Service with special reference to Rajasthan Land Records
Abstract: Over the years, with influx of e-Governance movement in India, numerous ingenious initiatives have been conceptualized to strengthen ICT services in the country and to channelize the changes enabling technology...
Performance Evaluation of Wlan by Varying Pcf, Dcf and Enhanced Dcf Slots To Improve Quality of Service
Researchers have proposed a number of co-ordination functions in literature for improving quality of service. Each one is based on different characteristics and properties. In this paper, we evaluate the perfor...
Informational Retrieval Using Crawler & Protecting Social Networking Data from Information leakage
Abstract: Online social networks, such as Facebook, Twitter, Yahoo!, Google+ are utilized by many people. These networks allow users to publish details about themselves and to connect to their friends. Some of the...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Packets
Cached data not only replies local access, but also replies data request issued from other nodes. Wireless Mesh Networks (WMNs) have emerged as an important technology in building next generation fixed wire...