Development of An Examination Authentication Embedded System Based on Fingerprint Approach
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2018, Vol 17, Issue 1
Abstract
Security is crucial all around. Access into institutions, examination centers, organizations or even estates ought to be controlled and closely monitored through a verification system. The method of authenticating a student for an examination has an obvious problem such as presentation of fake clearance card, impersonation and so on and the unethical manner associated with the examination is a grim issue that requires the stakeholders in academic area to seek for alternative means of authenticating student for examination, because the manual paper-based clearance process is fundamentally flawed. Sequel to that, a dependable and effective system is designed to tackle the issues of the convectional technique. The system will verify the understudy using fingerprint biometrics technique and generate a report which can serve as an attendance.
Authors and Affiliations
Oyediran Mayowa Oyedepo (Member IAENG), Wahab Wajeed Bolanle, Elegbede Adedayo Wasiat, Enegbe Toye Jolie
Mapping Monthly Average Global Solar Radiation over Iraq Using GIS and Heliosat Model
The mapping of global solar radiation is important in designing of solar energy system and renewable energy applications, also the global solar radiation estimation and mapping will facilitate engineers and architect pur...
A Survey On Cloud Computing and Its Benefits
Cloud computing is an increasingly popular paradigm for accessing computing resources. In practice, cloud service providers tend to offer services that can be grouped into three categories: software as a service, platfor...
ENVIRONMENTAL IMPLICATIONS OF CELL PHONES PENETRATION AND DISPOSAL IN KENYA
Kenya has over six million active mobile subscribers who may at some point want to replace or  get rid of old mobile phones. A big number of the mobile phones were recently switched off for not being genuine without...
CRYPTOGRAPHY
To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting in...
A PREDICTIVE CODING METHOD FOR LOSSLESS COMPRESSION OF IMAGES
Images are an important part of today's digital world. However, due to the large quantity of data needed to represent modern imagery the storage of such data can be expensive. Thus, work on efficient image storage (image...