Software Requirements Specification for Biometric Student Attendance System
Version 1.0 approved
Prepared by
Junaid Iqbal 01
M. Naeem 26
Mubashar Akram 28
Kashif Rasheed 32
Usman Ghani 42
J & U
15-04-2016
Table of Contents
Table of Contents ii
Revision History ii
1. Introduction 1
1.1 Purpose 1
1.2 Document Conventions 1
1.3 Intended Audience and Reading Suggestions 1
1.4 Product Scope 1
1.5 References 1
2. Overall Description 2
2.1 Product Perspective 2
2.2 Product Functions 2
2.3 User Classes and Characteristics 2
2.4 Operating Environment 2
2.5 Design and Implementation Constraints 2
2.6 User Documentation 2
2.7 Assumptions and Dependencies 3
3. External Interface Requirements 3
3.1 User Interfaces 3
3.2 Hardware Interfaces 3
3.3 Software
…show more content…
With the rise of globalization, it is becoming essential to find an easier and more effective system to help an institution to improve its students’ information. In spite of this matter, there are still business establishments that use the old-fashioned method of manual process of recording students’ attendance. Hence, students’ attendance is an important issue in every institution. Carrying different cards is a significant issue for individuals and organizations.
A secure and effective identity management system plays an important role in the successful deployment of an attendance management system. To make the identity management system more secure and reliable for authentication, biometrics data are integrated in the attendance management systems.
Today, biometric is being spotlighted as the authentication method because of the need for reliable security. Fingerprint authentication is one of the most well-known and publicized biometrics technologies. Because of their uniqueness and consistency over time, fingerprints have been in use for identification for over a century, more recently becoming automated due to advancements in computed capabilities.
2.2 Product
…show more content…
It uses the most reliable way of uniquely identifying students through fingerprint reading. Such type of application is very useful in school as well as in college for daily attendance. Through this application we can keep a systematic track of student's attendance. This project enables the easy way of maintaining class attendance with fewer efforts. It can be later implemented for the teaching staff. But at the moment, students are the most important users of this product.
2.4 Operating Environment
OE-1: The Attendance Management System shall function on the PC provided by the college. This entails the system to operate on the Windows CE platform.
OE-2: The Attendance Management System shall interface between Windows CE designated to store the attendance records. The Web Server and Database Software have not been established at this point.
OE-3: The Attendance Management System will record all the essentials details of each particular student.
OE-4: Pentium processor 3.0 GHz or higher, 256MB RAM and Hard Drive of more than 1GB.
2.5 User Documentation
UD-1: The system will provide an online user manual in HTML that describes the functionality and options available to the user.
UD-2: The system will provide a hard copy of the user manual, which is identical to the manual outlined in
OBT Settings/Tables- review the current OBT time tables, settings, understand how to utilize the tables (defining the math used to calculate distance vs. time) in bookings. Switches- review multiple settings in the system that may need to be turned on or off. This was more related for the back end in the system to book trips properly and scheduling efficiency.
It can search for live courses and self-study courses as well as conferences; it showed the exact location, time, and an overview of the course. It also tracks registrations, manages expenses, and records the entire current CE, transcripts, and surveys. CE Zoom is a great tool that helps organize CE courses and licenses when it is time for renewal which can help prepare for any state’s
My proposed system for Westminster’s Student clubs and organizations will make it easier to remember the process to get to it, will save time, effective and satisfactory. I used my results from my research to help me determine the usability specifications and how I should design my system. The process for finding Westminster’s student clubs and organization will be easier for use for a variety of reasons. The current website is connected to so many other webpages that some students get confused.
Fingerprint is standard procedure when getting arrested or getting any sort of government jobs
The job of the police officers is to protect all citizens from any threat and help us to be safe on the streets. Stop and frisk is a practice that the New York City Police Department uses as a way to fight crime, however, stop and frisk is unjust and has resulted in racial discrimination by officers, as well as an abuse of power. Over the years many civilians have been stopped and frisked by the police, this irritates some people as they feel they are stopped purposely or for no reason. So can police frisking in some cases go too far?
Journal of Information Security and Applications, 20, pp.90-98. [2]Gordon, M. and Sankaranarayanan, S., 2010, September. Biometric security mechanism in Mobile paymentts. In 2010 Seventh International Conference on Wireless and Optical Communications Networks-(WOCN) (pp. 1-6). IEEE.
Instead of paying $1,100 every year per employee for bad time keeping, you can spend the money saved on a refreshing vacation or fancy sports car. That might sound somewhat frivolous, but the main idea behind the fingerprint time and attendance system from MinuteHound is that you have control over how you choose to spend your money. What are some of the things that the fingerprint time and attendance system from MinuteHound can eliminate? First, the fingerprint time and attendance system eliminates buddy punching completely. Second, you never have to worry about lost time cards again.
People in the military are fingerprinted, and it is also required for many other occupations and organizations. When it comes time to match a fingerprint with an individual, it is quite easy due to the wide library of fingerprints the FBI maintains. This library contains the fingerprints of “more than 10%” of the U.S. population. For smaller cases, law enforcement are given access to this library directly from a police station ("Forensic Science" [Gale] 18).
Residential Schools was an enormous lengthening event in our history. Residential schools were to assimilate and integrate white people’s viewpoints and values to First Nations children. The schools were ran by white nuns and white priests to get rid of the “inner Indian” in the children. In residential schools, the children suffered immensely from physical, emotional, sexual and spiritual abuse. Although the many tragedies, language was a huge loss by the First Nations children.
The most common fingerprint scanning systems used are Optical and Thermal scanners, each have the same purpose but different ways of operating. Although a stray light from another source may cause the print to be inaccurate. Optical Scanners are more common, which wouldn't be hard to program since it is a familiar system to work with. These scanners operate by using an LED bulb to highlight the finger while sensors detect and create the print image by clarifying the light and dark areas created by the ridges of your finger.
Fingerprinting is method based on the uniqueness of the skin pattern - that is, each person has a completely individual pattern of papillary lines. These patterns do not change throughout life and have the property of recovering from damage to the skin in its previous form. On the one hand, this method almost completely eliminates the mistake, and on the other hand it is very cheap and easy to use (in contrast the method of identification of a person by DNA). Fingerprinting allows: 1) to identify the person who left the prints, according to the general and particular features of the papillary pattern displayed on them; 2) to exclude individual from among those who have touched the object; 3) to narrow the group of individuals suspected of the particular crime (for instance, provided that the imprint shows traces of a scar, a burn, a wart or some other distinctive feature).
1.1 INTRODUCTION In modern day, vehicles anti-theft system is our prime important duty to secure our vehicle by the means of fingerprinting. The main focus while developing the vehicle anti-theft system is to protect our system from theft by providing the anti-theft protection. For the protection, first we should restrict the unlocking of vehicle, only to the authorized persons have this ability to unlock the car without the use of keys, once it has identified by the Fingerprint sensor. The Fingerprint of the owner and other authorized persons are stored into the database beforehand and at the time of starting engine of the vehicle, scanned fingerprints are being crosschecked with the database.
Biometric face recognition technology has received significant attention in the past several years to use human face as a key to security. Both law enforcement and non-law enforcement are its application. Face recognition system comprises of two Categories: verification and identification. Face Verification is Done in 1:1 match ratio. It is utilized to looks at a face pictures against a Template face pictures, whose identity being claimed.
Credit card fraud is a type of identity theft where a hacker steals the credit card information of a user to purchase something or withdrawing money from banks. It’s a critical crime in United States (Sayles, 2012). Everything is online now from paying bills to online purchase, a user can do anything without going anywhere physically. Even user can open a financial account. Because of this criminal can hack the user’s personal information like name, date of birth, social security number.
First of all, do you know that what is offender profiling? Offender profiling has been defined by different authors using different terminologies such as specific profile analysis, psychological profiling, criminal profiling and criminal personality profiling. However, the underlying concept of definitions remains the same (Jackson and Bekerian, 1997). Beauregard, Lussier and Proulx (2005) state that offender profiling provides some descriptive information about behaviors and personality of an offender by analyzing crime scene characteristics, which can narrow suspects and finally solve the cases. Muller (2000) describes the information which the criminal profiler uses is often taken from the scene of crime, and profilers will take into account