You are on page 1of 20

MASTER DEGREE

PROJECT PROPOSAL
BY
Ajeigbe Saheed
Olasunkanmi
(15/68HE008)
DEPARTMENT OF COMPUTER
SCIENCE
UNIVERSITY OF ILORIN
ILORIN, NIGERIA

Project Supervisor: Mr Chokki

March 2016
Final Year Project Proposal
.

ORGANIZATION STAFF ATTENDANCE SYSTEM


USING FINGER PRINT TECHNOLOGY

(A CASE STUDY OF GTBANK)

By

Ajeigbe Saheed
Olasunkanmi
(15/68HE008)

DEPARTMENT OF COMPUTER SCIENCE, FACULTY OF


INFORMATION AND COMMUNICATION, UNIVERSITY OF
ILORIN, NIGERIA

CHAPTER ONE
INTRODUCTION
1.1

BACKGROUND OF THE STUDY

Managing people is a difficult task for most of the organizations and maintaining the attendance
record is an important factor in people management. When considering academic institutes,
taking the attendance of students on daily basis and maintaining the records is a major task.
Every academic institution has certain criteria for students regarding their attendance in class. In
most Institutions of higher learning, eligibility for examinations is based on fulfillment of a
minimum lecture attendance requirement. It is therefore very important to keep accurate records
of student attendance.

However, this academic policy has not been fully functional due to limitations posed by the
classical attendance method currently in use. The usual practice is that students are given sheets
of paper to write down their names, matriculation number and signature. This manual method of
taking attendance is obviously not effective. The use of attendance sheets becomes cumbersome
and untidy as the population of students increases, is time consuming and a waste of human and
material resources. The stress associated with manual calculation of student attendance rate has
made it impossible to fully implement the use of percentage attendance in lecture as a factor in
authenticating student access into examination venues. Also, high level of impersonation has
been known to characterize this method of attendance as students can cheat by asking their
friends to write attendance for them.

Consequently, it is very difficult to manage the attendance and determine whether each student
meets up with the required lecture attendance. As a result of the flaws in the classical method of
taking attendance, there is need for faster, easier, more accurate and effective method for
managing attendance.

Technological improvements have been useful tools in the development of new methods such as
the use of Barcode readers, Radio Frequency Identification (RFID), Bluetooth Systems, etc.
These tools were however expensive and had limited use.

Fingerprint recognition is the most popular and mature biometric system used today. In addition
to meeting the criteria for a good biometric system, fingerprint recognition systems perform well
(that is, they are accurate, fast, and robust), they are publicly acceptable and they are hard to
circumvent [1]. Among biometric traits, fingerprint is widely accepted by people because of its
uniqueness and immutability [2].

Fingerprint verification is a very convenient and reliable way to verify the persons identity. It is
believed that no two people have identical fingerprint in this world, so, the fingerprint
verification and identification is the most popular way to verify the authenticity or identity of a
person. Out of all the variety of the biometric technologies for the information security solutions
the best appropriate seems to be the use of the systems based on fingerprints scanning and
recognition. This method, in comparison with others is cheaper, more convenient in day to day
use, and is known to have very low false acceptance rate [3].

In order to rectify these systematic failings in the traditional methods of taking attendance, this
work seeks to shift paradigm from these referred methods by formulating and implementing a

736

Justina; BJMCS, 5(6): 735-747, 2015; Article no.BJMCS.2015.053

simplified and cost effective model of fingerprint-based method for managing time and attendance of students. It has been
proved over the years that fingerprints of each and every person are unique [4]. So it helps to uniquely identify the students.
Before entering classrooms, student identities are verified through electronic fingerprint scanners that will read student
fingerprint and send the data to a PC. The PC, in turn, sends data in form of student information and attendance record
(course, time etc.) to the server immediately. This means no class time will be wasted.

1.2 STATEMENT OF PROBLEM


The conventional smartcard can be lost, duplicated, stolen, forgotten or
impersonated with accuracy. This conventional security procedure in ATM
cannot guarantee the required security for ATM. An intelligent voiced-based
access control system, which is biometric in nature, will enable automatic
verification of identity by electronic assessment of one or more behaviour
and/or physiological characteristics of a person. Recently biometric methods
used for personal authentication utilize such features as face, voice, hand shape,
finger print and Iris. In other to overcome the problems of smartcard access
control in ATM. This paper proposed an intelligent voice based access control
system which is a biometric technique that offers an ability to provide positive
verification of identity from individual voice characteristics to access automatic
teller machine.

1.3 AIM AND OBJECTIVES


AIMS
Taking staff attendance manually and maintaining it for a long time is a difficult task as well as wastes a lot of time.
In this paper an Organization Staff Attendance Management System (OSAMS ) that will record and manage the
time and attendance of staffs in a Capital express assurance limited was developed.

OBJECTIVE OF THE STUDY


The following formed the Objectives of this work

1. To provide a more accurate and reliable user authentication method for identification
tracking of staff.

and

2. To create a platform for an authentication system that cannot be shared or tricked


fraudulently. (NB: credit card)
3. To improve on the following existing user authentication techniques

Something you know e.g. password or PIN.


Something you have, e.g. key.
Something you know and have e.g. card + PIN.
Something you are, e.g. fingerprint, hand, iris, retina, voice.

1.4 RESEARCH QUESTIONS


The following questions are examined in this study in order to proffer solutions:
(ii.)

What is an intelligent voiced-based access control system?

(iii.) How does ATM Smartcard works?


(iv.) What are the functions of ATM SYSTEM?

1.5 SCOPE OF THE PROJECT


The description of voice recognition system comprises of eight modules:
1) Microphone which is used to receive voice signals from the user,
(2) Channel is used to transmit information from sender to receiver,
(3) A/D convertor is used to convert the speech signal from analogue form to
digital form for security measure,
(4) Filter bank is a device which is used to avoid distortion in voice
(5) Character distilling is performed to a voice signal to avoid distortion and
background noise,
(6) The voice signal should be passed through D/A convertor which converts the
digital signal into analogue form,
(7) The voiceprint after conversion is verified with the voiceprints in the
database and the voice is verified,
(8) The verified voice is sent to the ATM machine through speaker.

1.6 SIGNIFICANCE OF THE STUDY


Security is an essential part of human life. In this era security is a huge issue
that is reliable and efficient if it is unique by any mean. Voice recognition is one
of the security measures that are used to provide protection to humans
computerized and electronic belongings by his voice.

1.7 LIMITATIONS OF THE STUDY


This project was developed to fulfil user requirement; however there are lots of
scope to improve the performance of the Prison Management System in the area
of user interface, database performance, and query processing time. Etc...

1.8 DEFINITION OF TERMS


Voice Recognition: Voice recognition systems work by analyzing the
waveforms and air pressure patterns produced while a person talks.
Voice Processing: The Initial step to develop the proposed researches is
obtaining the voice sample. Voice sample is taken from microphone by the
speaker.
Face Recognition: Face recognition is a Biometric technology that uses an
Image either from a camera or photograph to recognize a person. It does not
require a person's cooperation.
Data: This can be defined as facts about the organization and its business
transaction.
Information: This can be defined as data that has been transformed and
organized by processing and purposeful intelligence.

CHAPTER TWO
LITERATURE REVIEW

2.1 An overview of Speech Recognition


Speech recognition is a technology that able a computer to capture the words
spoken by a human with a help of microphone. These words are later on
recognized by speech recognizer, and in the end, system outputs the recognized
words. The process of speech recognition consists of different steps that will be
discussed in the following sections one by one. An ideal situation in the process
of speech recognition is that, a speech recognition engine recognizes all words
uttered by a human but, practically the performance of a speech recognition
engine depends on number of factors. Vocabularies, multiple users and noisy
environment are the major factors that are counted in as the depending factors
for a speech recognition engine.

2.2 History
The concept of speech recognition started somewhere in 1940s, practically the
first speech recognition program was appeared in 1952 at the bell labs, that was
about recognition of a digit in a noise free environment.
1940s and 1950s consider as the foundational period of the speech
recognition technology, in this period work was done on the foundational
paradigms of the speech recognition that is automation and information
theoretic models.
In the 1960s we were able to recognize small vocabularies (order of 10100words) of isolated words, based on simple acoustic-phonetic
properties of speech sounds. The key technologies that were developed
during this decade were, filter banks and time normalization methods
In 1970s the medium vocabularies (order of 100-1000 words) using
simple template-based, pattern recognition methods were recognized.
In 1980s large vocabularies (1000-unlimited) were used and speech
recognition problems based on statistical, with a large range of networks
for handling 4language structures were addressed. The key invention of
this era were hidden markov model (HMM) and the stochastic language
model, which together enabled powerful new methods for handling
continuous speech recognition problem efficiently and with high
performance.

In 1990s the key technologies developed during this period were the
methods for stochastic language understanding, statistical learning of
acoustic and language models, and the methods for implementation of
large vocabulary speech understanding systems.
After the five decades of research, the speech recognition technology has
finally entered marketplace, benefiting the users in variety of ways. The
challenge of designing a machine that truly functions like an intelligent
human is still a major one going forward.

2.3 Types of speech recognition


Speech recognition systems can be divided into the number of classes based on
their ability to recognize that words and list of words they have. A few classes
of speech recognition are classified as under:

2.3.1 Isolated Speech


Isolated words usually involve a pause between two utterances; it doesnt mean
that it only accepts a single word but instead it requires one utterance at a time.

2.3.2 Connected Speech


Connected words or connected speech is similar to isolated speech but allow
separate utterances with minimal pause between them.

2.3.3 Continuous speech


Continuous speech allow the user to speak almost naturally, it is also called the
computer dictation.

2.3.4 Spontaneous Speech


At a basic level, it can be thought of as speech that is natural sounding and not
rehearsed. An ASR system with spontaneous speech ability should be able to
handle a variety of natural speech features such as words being run together,
"ums" and "ahs", and even slight stutters.

2.4 Speech Recognition Process

Fig: 2.1 Speech Recognition Process

2.4.1 Components of Speech recognition System Voice Input


With the help of microphone audio is input to the system, the pc sound card
produces the equivalent digital representation of received audio Digitization The
process of converting the analogue signal into a digital form is known as
digitization, it involves the both sampling and quantization processes. Sampling
is converting a continuous signal into discrete signal, while the process of
approximating a continuous range of values is known as quantization.
Acoustic Model: An acoustic model is created by taking audio recordings of
speech, and their text transcriptions, and using software to create statistical
representations of the sounds that make up each word. It is used by a speech

recognition engine to recognize speech .The software acoustic model breaks the
words into the phonemes.
Language Model: Language modelling is used in many natural language
processing applications such as speech recognition tries to capture the properties
of a language and to predict the next word in the speech sequence. The software
language model compares the phonemes to words in its built in dictionary.
Speech engine: The job of speech recognition engine is to convert the input
audio into text; to accomplish this it uses all sorts of data, software algorithms
and statistics. Its first operation is digitization as discussed earlier, that is to
convert it into a suitable format for further processing. Once audio signal is in
proper format it then searches the best match for it. It does this by considering
the words it knows, once the signal is recognized it returns its corresponding
text string.

2.5 Uses of Speech Recognition Programs


Basically speech recognition is used for two main purposes. First and foremost
dictation that is in the context of speech recognition is translation of spoken
words into text, and second controlling the computer, that is to develop such
software that probably would be capable enough to authorize a user to operate
different application by voice. Writing by voice let a person to write 150 words
per minute or more if indeed he/she can speak that much quickly. This
perspective of speech recognition programs create an easy way for composing
text and help the people in that industry to compose millions of words digitally
in short time rather than writing them one by one, and this way they can save
their time and effort. Speech recognition is an alternative of keyboard. If you are
unable to write or just dont want to type then programs of speech recognition
helps you to do almost anything that you used to do with keyboard.

2.6 Applications
2.6.1 from bank perspective
People with disabilities can benefit from speech recognition programs. Speech
recognition is especially useful for people who have difficulty using their hands,
in such cases speech recognition programs are much beneficial and they can use
for operating ATM. Speech recognition is used in deaf telephony, such as
voicemail to text.

2.6.2 from military perspective


Speech recognition programs are important from military perspective; in Air
Force speech recognition has definite potential for reducing pilot workload.
Beside the Air force such Programs can also be trained to be used in helicopters,
battle management and other applications.

2.6.3 from educational perspective


Individuals with learning disabilities who have problems with thought-to-paper
communication (essentially they think of an idea but it is processed incorrectly
causing it to end up differently on paper) can benefit from the software. Some
other application areas of speech recognition technology are described as under:
Command and Control: ASR systems that are designed to perform functions
and actions on the system are defined as Command and Control systems.
Utterances like "Open Netscape" and "Start anew browser" will do just that.
Telephony: Some Voice Mail systems allow callers to speak commands instead
of pressing buttons to send specific tones.
Medical/Disabilities: Many people have difficulty typing due to physical
limitations such as repetitive strain injuries (RSI), muscular dystrophy, and
many others. For example, people with difficulty hearing could use a system
connected to their telephone to convert the caller's speech to text.

2.7 Speech Recognition weakness and flaws


Besides all these advantages and benefits, yet a hundred percent perfect speech
recognition system is unable to be developed. There are number of factors that
can reduce the accuracy and performance of a speech recognition program.
Speech recognition process is easy for a human but it is a difficult task for a
machine, comparing with a human mind speech recognition programs seems
less intelligent, this is due to that fact that a human mind is God gifted thing and
the capability of thinking, understanding and reacting is natural, while for a
computer program it is a complicated task, first it need to understand the spoken
words with respect to their meanings, and it has to create a sufficient balance
between the words, noise and spaces. A human has a built in capability of
filtering the noise from a speech while a machine requires training, computer

requires help for separating the speech sound from the other sounds. Few
factors that are considerable in this regard are:
Homonyms:
Are the words that are differently spelled and have the different meaning but
acquires the same meaning, for example there their be and bee. This is
a challenge for computer machine to distinguish between such types of phrases
that sound alike.
Overlapping speeches:
A second challenge in the process, is to understand the speech uttered by
different users, current systems have a difficulty to separate simultaneous
speeches from multiple users.
Noise factor:
The program requires hearing the words uttered by a human distinctly and
clearly. Any extra sound can create interference, first you need to place system
away from noisy environments and then speak clearly else the machine will
confuse and will mix up the words.

2.8 The future of speech recognition


Accuracy will become better and better.
Dictation speech recognition will gradually become accepted.
Greater use will be made of intelligent systems which will attempt to guess
what the speaker intended to say, rather than what was actually said, as people
often misspeak and make unintentional mistakes.
Microphone and sound systems will be designed to adapt more quickly to
changing background noise levels, different environments, with better
recognition of extraneous material to be discarded.

2.9 Few Speech recognition software

2.9.1 XVoice
XVoice is a dictation/continuous speech recognizer that can be used with a
variety of XWindow applications. This software is primarily for users.
2.9.2 ISIP
The Institute for Signal and Information Processing at Mississippi State
University has made its speech recognition engine available. The toolkit
includes a frontend, a decoder, and a training module. It's a functional toolkit.
This software is primarily for developers. The toolkit (and more information
about ISIP) is available at: http://www.isip.msstate.edu/project/speech
2.9.3 Ears
Although Ears isn't fully developed, it is a good starting point for programmers
wishing to start in ASR. This software is primarily for developers.
2.9.4 CMU Sphinix
Sphinx originally started at CMU and has recently been released as open source.
This is a fairly large program that includes a lot of tools and information. It is
still "in development", but includes trainers, recognizers, acoustic models,
language models, and some limited documentation. This software is primarily
for developers.
2.9.5 NICO ANN Toolkit
The NICO Artificial Neural Network toolkit is a flexible back propagation
neural network toolkit optimized for speech recognition applications. This
software is primarily for developers

CHAPTER THREE
METHODOLOGY AND TOOLS

Research is a process of collecting, analysing and interpreting information to


answer questions. But to qualify as research, the process must have certain
characteristics: it must, as far as possible, be controlled, rigorous, systematic,
valid and verifiable, empirical and critical and with objectivity and repeatability.
Research methodology is a collection of procedure techniques, tools and
documentation aids which helps the system developer in the efforts to
implement a new information system.
Research can be classified from three different perspectives:
a.

Application of research study

b.

Objectives in undertaking the research

c.

Inquiry model employed

From the point of view of application, there are two broad categories of
research:
a.

Basic research

b.

Applied research.

Basic research involves developing and testing theories and hypotheses that are
intellectually challenging to the researcher but May or may not have practical
application at the present time or in the future. The knowledge produced
through basic research is sought in order to add to the existing body of new
knowledge.
Applied research is done to solve specific, practical questions; for policy
formulation, administration and understanding of a phenomenon. It can be
exploratory, but is usually descriptive. Applied research can be carried out by
academic or industrial institutions. This study used the applied research method.
Consequently, the emphasis on data analysis is that the study employs the use of
secondary source of gathering information (Data). This however means that
several writers and experts opinions and works will bereffered and their
opinion be critically examined in order to reach some sort of contemporary
consensus.

METHOD OF DATA COLLECTION

The different ways in which data are collected are as follows;


Examination of document
Interview
Observation
1

EXAMINATION OF DOCUMENT: Various documents and files were


examined which accompany the input and output documentation.

INTERVIEW: Interviews were organized randomly among some banks


using the ATM machine and the level of fraudulence they encounter in

order to find a solution through the implementation of voice recognition.


OBSERVATION: The researchers first observed the ATM machines setup in the banks and the bank clients using them. This was done to
ascertain the level of effectiveness of the ATM machines and their
performance. The researchers also observed and took note of the opinions
given by the respondents during the course of the interview on the
existing system.

ANALYSIS OF THE EXISTING SYSTEM

In this stage, the current system is investigated, subscribed and analysed. A


major requirement of this phase is that the current system(s) is / are properly
documented in the data flow diagram format and logical data structure is
described.
The steps to limit the analysis of the existing system involve:
a Detailed planning
b Agree project scope with user
c Enquire into any problem users have
d Carryout a general review of the system.
3

OBJECTIVES OF THE NEW SYSTEM

The objective includes:

1 The implementation of enhanced voice recognition to reduce fraudulence


in ATM will help/assist the financial institutions in detecting crimes and
criminals trying to use fraudulent means to withdraw cash from the ATM
machines.
2 To develop a new data necessary for the ATM security.
3 To generate a security based information for voice recognition, which
must be consistent, timely, accurate, economically feasible and reliable?
SYSTEM SPECIFICATION

As earlier stated in chapter one, this work is aimed at implementing an


enhanced voice recognition in order to reduce fraudulence at ATM. In this stage
the management takes result of the previous stage. Arrive at a required system
specification. This means that all the requirements are consolidated into a
logical design of a new system. A number of tasks are now performed;
1 General requirement for audit security and control are considered. These
i
ii
2
3

includes;
Control to be incorporated within program(example data validation)
Control of access to the new system
Recovery procedures, in case processing are lost
User requirement identified in the problem definition list and the audit
security and control requirement mentioned above and consolidated.

In this work, the researchers wish to implement voice recognition in order to


reduce fraudulence at ATM.
5

PROBLEMS OF THE EXISTING SYSTEM


The problems related to ATM frauds among banks are numerous. Lack of
effective quality system such as voice recognition in the current ATM
system used in some bank results in the following;

Theft of ATM cards and easy access to cash once password is available.
2.
The existing system is time consuming which is not good for security
consciousness.
3.
The quality of assurance of the existing ATM withdrawal system is not
consistent and reliable.
1.

4.
The effect of all these problems results in conflicts between banks and
customer.
6

JUSTIFICATION FOR THE NEW SYSTEM

It was gathered during the interview that the security personnel are meant to
keep a consistent and accurate record of security matters including reports for
ATM usage by clients. However, it was also gathered that these records are
sometimes inaccurate and inconsistent as they are not able to track ATM frauds
and criminals. Inconsistent reports will always lead to variations that affect
bank records negatively, thereby, defeating the aim of setting up such a system.
This leads to the need of a more accurate system that would help in keeping
consistent and accurate record.
3.7

PROGRAMMING LANGUAGE USED

The programming language used is Java and Microsoft access. It is an object


oriented language. In this project, both the elementary and advanced features of
Java programming language are extensively utilized to achieve the system goal.
Java makes it possible to enter data in user readable format. After processing,
the user can get the output either in softcopy or hardcopy.
7

A SYSTEM FLOW CHART

PROPOSED WORK

The description of voice recognition system comprises of eight modules:


(1) Microphone which is used to receive voice signals from the user,
(2) Channel is used to transmit information from sender to receiver,
(3) A/D convertor is used to convert the speech signal from analog form to
digital form for security measure,
(4) Filter bank is a device which is used to avoid distortion in voice
(5) Character distilling is performed to a voice signal to avoid distortion and
background noise,
(6) The voice signal should be passed through D/A convertor which converts
the digital signal into analog form,
(7) The voiceprint after conversion is verified with the voiceprints in the
database and the voice is verified,
(8) The verified voice is sent to the ATM machine through speaker.

You might also like