+234 813 0686 500
+234 809 3423 853


  • Type:Project
  • Chapters:5
  • Pages:78
  • Format:Microsoft Word
(Computer Science Project Topics & Materials)





1.0                                           INTRODUCTION



This part presents biometrics as the engineering used to measure and dissect individual attributes both physiological and behavioural. These attributes incorporate fingerprints, voice examples, hand estimation, irises, are physiological while marks, keystrokes elements and mouse development are behavioural which are all used to distinguish human qualities and confirm character (M. Gasson, M. Meints and K.warwick 2005). These biometrics or qualities are easily associated with an individual and can't be overlooked, imparted, stolen, or effectively hacked (M.tistarelli and M. Nixon 2009). These qualities can exceptionally recognize an individual, supplementing customary security systems by giving two noteworthy enhancements: individual biometrics can't be effortlessly stolen, and an individual does not have to remember passwords or codes. Since biometrics can take care of issues of access control, extortion, burglary, more associations are considering biometrics, as the answer for their security issues.

Finger impression or finger filtering innovation is one of the most used features of the biometrics sciences and uses different peculiarities of the unique mark to distinguish or confirm the character of people. Finger checking engineering is a standout amongst the most ordinarily sent biometric innovation. All fingerprints have distinctive qualities and example. An ordinary finger impression example is made up of lines and spaces. These lines are called edges while the spaces between the edges are called valleys. It is through the example of these edges and valleys that an exceptional finger impression is matched for check and approval. These exceptional unique finger impression characteristics are termed "minutiae" and correlations are made focused around these attributes. As a rule, a common live output delivers 40 "minutiae". The Federal Bureau of Investigation (FBI) has reported that close to 8 basic minutiae can be similar to two people.

There are five stages included in finger examining check and recognizable proof: unique mark picture securing, picture handling, and area of different qualities, layout creation and format matching. A scanner takes a scientific preview of a client's special raw characteristics. This preview is kept in a unique mark database as an issue document. The principal test confronting a finger checking framework is to secure amazing picture of a unique mark. Picture quality is measured in dots per inch (DPI) more specks for every inch imply a higher determination picture. Lower DPI found available are in the 300 350 DPI, however the standard for criminological quality fingerprinting is pictures of 500 DPI. Procurement can be a real test for finger examination, since the nature of print contrasts from individual to individual and from finger to finger. A few populaces are more probable than others to have weak or hard to get fingerprints, whether because of wear or tear or physiological characteristics. Taking a picture in neglect of climate can have an influence likewise. Oils in the finger help deliver a fingerprint. In frosty climate, these oils characteristically become scarce. Pressing harder on the platen (the surface on which the finger is set otherwise called scanner) can help for this situation. Picture transforming is the procedure of changing over the finger picture into a usable arrangement. This results in an arrangement of thick dark edges (the raised piece of the unique mark) differentiated to white valleys. At this stage, picture peculiarities are distinguished and improved for check against the put away minutia document. Picture upgrade is utilized to diminish any twisting of the unique finger impression created by soil, cuts, scars, sweat and dry skin. The following stage in the unique finger impression procedure is to find different qualities. There is a decent arrangement of data on the normal unique mark and this data has a tendency to stay steady for the duration of one's life. Finger impression edges and valleys structures have unique examples, for example, swirls, circles, and curves.

Most fingerprints have a centre, a main point around which swirls, circles, or curves are blended. These edges and valleys are portrayed by irregularities known as minutiae, the different gimmick whereupon finger checking innovations are based. Numerous sorts of minutiae path way, a typical one being edge endings and bifurcation, which is the time when one edge separates into two. An average finger output may deliver somewhere around 15 and 20 details. A layout is then made. This is expert by mapping details and sifting out mutilations and false minutiae. For instance, abnormalities brought on via scars, sweat, or soil can show up as details. False minutiae must be sifted out before a format is made and is upheld diversely with seller particular restrictive calculations. The precarious part is contrasting an enlistment format with a confirmation layout.


Source: (Ganorkar, 2007.)


Source: (Sanjay, 2007.)


Representative timing frameworks are time framework utilized by organizations to precisely record the quantity of hours worked by every worker on week by week premise (John Furnem, 2007). The clock has developed with time and the foundation still needs a framework that they can utilize worker payroll and guarantee that the workers are paid for every hour they met expectations. Today, representative utilization swipe cards with a negative stripe through an opening that peruses their name and records the time, each time they check in or out, much like the old punch clock arrangement of long back. Toward the end of a work week, the executive processes the aggregate hours worked for each representative and prints it out on a spread sheet. This frees the payroll arrangement of human mistake, making it considerably more effective.

As indicated by Jain (2004) each human has an extraordinary finger impression picture that can't be imitated. Therefore, making the unique mark innovation more proficient, reliable, simple and solid than different qualities of biometrics. It likewise obliges a genuinely little size of memory to store biometric layout. Not at all like the voice identification, amid harmattan period the representative's voice can be coarse because of chilly, subsequently adjusting the voice example and access foreswearing, same case with face identification, when the worker begins maturing or encounters skin responses like pimples it prompts a bargain in the framework. On account of mark it can be effortlessly manufactured, while retina checking is expensively arranged.

The Federal University of Technology, Minna does not make utilization of a modernized representative timing framework. The establishment sets aside a few minutes clock framework, however efficient, is not so much impeccable in light of the fact that it is sporadic. In some cases, the attractive strip on the cover of a card may get harmed on account of punch card system. At the point when the representative swipes the card, the machine may not enrol it. Such insufficiencies are amended in the machine time clock system. This venture guarantees that workers will constantly require an approach to stay informed concerning their time and associations will have the capacity to screen and record a representative's chance to guarantee greatest achievement.


The problem is centered on how to design and implement a computerized employee clocking system for Federal University of Technology, Minna. From the study layout the problems discovered are; inadequacies of the manual time clock system, and easy impersonation of staff.


The significance of the study is;

To correct the inadequacies of the manual time clock system, to regulate unauthorized entry into the building. To keep track of the time and ensure logical ways to monitor and record an employee’s time and to provide maximum productivity and cultivate punctuality of employees.



The aim of this study is to put to rest the cumbersome and hectic nature of employee time clocking system. The objectives of this study are:

1)  To study the existing clocking system.

2)  To develop a fingerprint identification based clocking system.

3)  To test the performance of the developed system with arbitrary input parameters.


This study is limited to only Federal University of Technology, Minna institution to the non academic staff. Though, the scope above is in such a way that the study can be carried out in one and only one way that is, computerizing the employee clocking system. This will help to eliminate the inherent problems encountered by the management of this institution.





The factors that militated against this study in the course of gathering facts and figures, went a long way in limiting the intended scope of this study as a result of these, setbacks were encountered.

If the surface of the finger gets damaged and/or has one or more marks on it, identification becomes increasingly hard. Also wet and dirty hands are difficult to enroll thereby producing false acceptance or rejection.


o          Computer System Software: A set of written instruction, which the program is used to execute tasks in the system.

o          Visual Basic Program: This is an object oriented programming language that is used to develop software.

o          Computer: A machine is a gadget that works under the control of put away projects, naturally tolerating and putting away, handling information to deliver data that is the after effect of that transforming.

o          Program: Set of instructions which are logically related in sequence and which describes actions to be taken by the digital computer in providing a solution on to a given problem.

o          Software: Is the general term used to describe all the various programs that may be used on a computer system together with their associated documentation.

o          Hardware: This is the general term used to depict all the electronic and mechanical components of the machine together with those gadgets utilized with the machine.

o          Operation: The action carried out on an activity or process.

o          Modules: This is the act of portioning software’s rationally into elements that performs specific functions and sub functions.

o   Data Entry: This is the yardstick input device through which the system gets more of the instructions and commands.

Share This


Type Project
Department Computer Science
Project ID CPU0756
Price ₦3,000 ($9)
Chapters 5 Chapters
No of Pages 78 Pages
Format Microsoft Word

Leave a comment...


    Type Project
    Department Computer Science
    Project ID CPU0756
    Price ₦3,000 ($9)
    Chapters 5 Chapters
    No of Pages 78 Pages
    Format Microsoft Word

    Related Works

    A CASE STUDY OF MARLUN CONSTRUCTION COMPANY ENUGU) Abstract Clocking systems are time system used in any firm to accurately record the number of hours worked by each staff or the work force of an employee on daily basics. This system is design in such a way that it will also calculate... Continue Reading
    CHAPTER ONE                                                 INTRODUCTION 1.1        Background to the Study             Punctuality as Thomas Chandler Haliburton(1796 - 1865) said, is the soul of... Continue Reading
    ABSTRACT  In recent time, there has been high level of impersonation experienced on a daily basis in both private and public sectors, the ghost worker syndrome which has become a menace across all tiers of government, employers concerns over the levels of... Continue Reading
    (A CASE STUDY OF I.M.T., ENUGU) ABSTRACT Budgeting with special emphasis on Institute of Management and Technology (IMT) Enugu has the trust and reliability and credibility of information and record. To establish and implement a computerized measures and an alternative to the present... Continue Reading
    ABSTRACT In this world of competitive resource application and technological development, the banks have been totally computerized. This project work Design and Implementation of computerized banking system is concerned with the analysis and design of a computerized system aimed at supporting the whole banking operation provides an interface which... Continue Reading
    – A STUDY OF GENERAL HOSPITAL ISHIAGU TABLE OF CONTENTS                                                          Page Title page Approval Certification Dedication Acknowledgement Abstract Table of Contents List of Figures CHAPTER... Continue Reading
    (A Case Study Of Bubbles Plaza Enugu) ABSTRACT In the course of the project research, the design and implementation of a Computerized Invoicing System was Studies. The rapid increase in information technology have substituted the primitive system of invoicing. This advancement have... Continue Reading
    CHAPTER ONE INTRODUCTION 1.0            Introduction This chapter introduces a computerized mailing system. It focuses on the theoretical background of the research, statement of the problem, aim and objectives of the study, significance of the study, scope of the study and the... Continue Reading
    ABSTRACT Having discovered the importance of computers in al ranks and aspects of life, computer system is applicable to almost all human activities and has been employed to automats most activities especially in areas were management data is of outmost importance. Due to unauthorized access to data in database, repose disclosure or modification... Continue Reading
    ABSTRACT This project work would mainly focus on the account receivable system, which is an important aspect of accounting system of an organization. It is the manual accounts receivable system of the organization in question that would be used as a bedrock to computerize the account receivable system and various transaction that are involved n... Continue Reading