Académique Documents
Professionnel Documents
Culture Documents
Attendance System
Zhang Yongqiang LIU Ji
Department of Information and Electrical Department of Information and Electrical
Engineering Engineering
Hebei University of Engineering Hebei University of Engineering
Handan, Hebei,P.R.China Handan, Hebei,P.R.China
liujilOgsina.com yinyjjl gsina.com
Abstract- In this paper, a wireless fingerprint attendance And this paper is organized as follows. Section 2 describes
management system is designed and implemented .This system the organization and operating principle of this system.
based biometrics and wireless technique solves the problem of Section 3 outlines the functions of this system briefly and
spurious attendance and the trouble of laying the describes the hardware and software design of this system.
corresponding network. It can make the users' attendances Section 4 introduces some key problems in the implement of
more easily and effectively. this system and finally Section 5 contains conclusions and
future research plan.
I. INTRODUCTION
Traditional styles of attendance management include II. ORGANIZATION AND OPERATING PRINCIPLE OF
hand-written signatures, card bell, magnetic card, IC card SYSTEM
and RF card attendance machines. These styles cannot avoid A. Organization of System
replacer checking out just because that people can be
separated from cards. With development of biometrics Attending people finish their attendances by pressing their
technologies, the technology of fingerprint verifying is more fingerprints on sensor. After fingerprints' matching, system
popular and mature [1]. The reason is that fingerprints satisfy can transmit users' attending records to managing PC in
uniqueness, stability, permanency and easily taking. three modes: immediately, timing or response. Then the
managing software installed on PC manages to process the
There are mainly two kinds of fingerprint attendance attending data and carries out the query or printing of data.
management system on the market. One is on-line The overall block diagram of system is shown in Figure 1.
fingerprint attendance system and the other is off-line
fingerprint attendance system. On-line system always needs
to connect with a PC and all the fingerprints' templates of
Wireless Communication
people to be verified must stored in the database in the PC or Module
workstation. Thereby, burden of PC and the response time of
the system will be added. By contraries, one off-line
fingerprint attendance system can finish all the process. All Fingerprint Verifying
the operating needn't support of PC and the burden of PC is Machine
lightened. The same systems can connect to form a 485 (y)
network and finally connect to the center PC. So off-line
systems are widely used in many occasions. And the
shortcomings of this system are that there must be a
A
Wireless Communication
managing PC nearly and it is difficult to lay the transmission Module
lines where topography is bad. PC Workstation
This paper introduces a wireless fingerprint attendance
management system. This system is an application of the
fingerprint verifying and R-F wireless techniques and it is Fig. 1 Organization ofsystem
mainly used for employee identification. Through practices,
this system is proved to be easy-to-use and effectively.
B. Operating Principle of System module is composed of fingerprint processing module and
1) Operating Principle Fingerprint Verifying Through the fingerprint sensor. In Figure 4, fingerprint processing module
analysis of the overall and local characteristics of fingerprint is showed in broken line frame.
such as ridges, valleys, ending, bifurcation points and ridge
divergence points, we can extract enough detail data. Such
data is unique to the individual and remain so throughout
one's life [1]. We can use these date to identify or verify a
person operating as follows: (1) a digital image of one
person's fingerprint to be verified is captured;(2) a feature
extracting algorithm is carried out;(3) minutiae are extracted
and stored as a template for verifying later;(4) people to be
verified place his finger on the fingerprint sensor so as to
extracting the minutiae from the captured image; (5) a
matching algorithm is applied to matches the minutiae with
the stored template previously. The overall block diagram of
the fingerprint verifying is shown in Figure 2. Fig.3 Architecture ofhardware design
Fingerprint
Sensor
li LI =
Cormand/
Data