Number of Pages: 30

File Size: 2541 KB

File Type: MS Word & PDF

Chapters: 1 - 5

5,000.00

ABSTRACT

This project work is based on the simulation of fingerprints based biometrics, h is an application that allows the computer to be able to identify and confirm an employee in an organisation and to change from the old manual system of identification to the new system. Visual Basic 6.0 was used for developing the system because it is flexible and memory conserving. And to itself documentation, it is easy to understand and to overcome difficult tasks when compared with other languages. Microsoft Access 2002 is used for the database development and preferred query language is Structured Query Language (SQL) for record manipulation.

TABLE OF CONTENTS

Title page

Certification

Dedication

Acknowledgement

Abstract

Table of contents

CHAPTER ONE: GENERAL INTRODUCTION

  • Introduction
  • Statement of the problem
  • Aim and objectives of the study
  • Significance of the study
  • Scope and limitation of the study
  • Definition of terms
  • Organisation of the report

CHAPTER TWO: REVIEW OF RELEVANT LITERATURES

  • Background knowledge
  • Computer Aided Learning/Instruction
    • Computer Aided Individual Learning
    • Computer Aided group Learning
  • Types of Computer Aided Learning Program
  • Benefits of computer aided learning
  • Limitation of Computer as a teaching aid
  • Artificial intelligence
  • Problems of artificial intelligence

CHAPTER THREE: PROJECT METHODOLOGY

  • Method of data collection
  • Analysis of data and the existing system
  • Problems of the existing system
  • Description of the proposed system
  • Advantages of the proposed system
  • Design and Implementation Methodology

CHAPTER FOUR: DESIGN, IMPLEMENTATION AND DOCUMENTATION OF THE SYSTEM

  • Design of the system
    • Output Design
    • Input Design
    • File/Database design
    • Procedure Design
  • Implementation of the System
    • Hardware Support
    • Software support
  • Documentation of the system
    • Program Documentation
    • Operating the system
    • Maintaining the system

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATION

  • Summary
  • Conclusion
  • Recommendation

References

Appendix

Flowchart

Source code

Programs outputs

 

CHAPTER ONE

GENERAL INTRODUCTION

1.1     INTRODUCTION

When we interact with others we are used to identifying them by their physical appearance their voice or other sensory data. When we need proof of identity beyond physical appearance we obtain a signature or we look at a photo identification card. In cyberspace, where people need to interact with digital systems or with one another remotely, we do not have these tried and true means of identification available.

In almost all cases we cannot see, hear or obtain a signature from the person with whom we are interacting. Biometrics, the measurement of unique physical characteristics, is an ideal solution to the problem of identification. Biometrics makes it possible to identify ourselves to digital systems and through these systems identify ourselves to others in cyberspace. With biometrics we create a digital personal that make our transactions and interactions in cyberspace convenient and secure. Of all the biometrics available including face, ins and retina scanning voice identification and others, the fingerprint is one of the most convenient and foolproof.

Fingerprints have been used for centuries for identification and we have a substantial body of real world data upon which to base our claim of the uniqueness of fingerprints. It is scanning for instance is an entirely new science for which there is little or no real world data.

1.2     STATEMENT OF THE PROBLEM

The mostly used technology in electronic verification and identification is the use of Personal Identification Number (PIN). This technique is almost illicit in this modern day of hacking and cracking and is associated with the following problems; complexities, redundancy, slow accessing speed, insecurity and resource consuming.

It is even better stating the problem from the point of application of PIN authentication system, many organizations did not even posses the simplex PIN authentication system as part of their security measures. This is the causes of crime and fake identity presentation in many cases; could be among staff in an organization, by intruders, among fake students in an institution, etc.

1.3     AIM AND OBJECTIVES OF THE STUDY

The aim of this project is to implement a fingerprint biometric system that verifies and identifies a user to the security system based on an individual enrollment in the database. The objectives of this project are:

  1. To develop a security system that secures a company’s information and a system that cannot be by passed or accessed by unauthorization use.
  2. To develop a computer application that can improve security in an organization using a fingerprint identification method
  3. To effectively use a biometric application fraud detection, fraud prevention and deny access to system intruders.
  4. To use a biometric fingerprint identification method to preserve privacy of system users in a particular organizational setting.
  5. To develop a system that will be reliable and time saving in terms of user authentication and identity verification.
  6. To develop a computer application with ease of operation with well defined user interface that make ease for data verification.

1.4     SIGNIFICANCE OF THE STUDY

Biometrics method of identification is preferred over traditional methods involving passwords and PIN numbers for its accuracy and case sensitiveness. A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. An important issue in designing a practical system is to determine how an individual is identified. Every medium of authentication has its own advantages and shortcomings. With the increased use of computers as vehicles of information technology, it is necessary to restrict unauthorized access to or fraudulent use of sensitive/personal data. Biometric techniques being potentially able to augment this restriction are enjoying a renewed interest.

1.5     SCOPE AND LIMITATION

The area of interest of this study will focus on fingerprint biometrics. The scope of this project will also be a database driven application where employee’s information will be protected by the front-end biometrics application. The application will be able to add new user, edit user’s information, update employee’s record and also verify each fingerprints.

1.6       DEFINITION OF TERMS

Integrity: To verify that a message or document is genuine and has not been manipulated or changed since its original creation and singing.

Authentication: To verify the identity of an individual or organisation sending the message.

Non-Repudiation: To ensure that the originator of the message or transaction cannot subsequently disown it.

Enrollment: The initial process of collecting biometric data from a user and then storing it in a template for later comparison.

Template: A mathematical representation of biometric data. A template can vary in size from 96bytes for hand geometry to several thousand bytes for facial recognition.

Identification: The process by which the biometric system identifies a person by performing a one-to-many search against the entire enrolled population.

Verification: Authentication process by which the biometric system matches as captured biometric against the person’s stored template.

False-Acceptance Rate (FAR): The percentage of incorrectly matched to a valid user’s biometric.

False-Rejection Rate (FRR): The percentage of inconsistently rejected valid users.

1.7     ORGANISATION OF THE REPORT

This report comprises five chapters. The first chapter serves as introduction to the project and it discusses the statement of the problem, aim and objectives of the project, significance of the study, scope and limitation, definition of terms and organisation of the report are given.

Chapter two presents a review of related literatures on the subject matters with discussions of related topical issues on biometrics, which include  definition of some technical terms and the computerization current state of the art.

Chapter three consists of the description of the current procedure, problem of the existing system.

Chapter four deals with the design, implementation and documentation of system.

Chapter five finally deals with the summary, recommendation and conclusion.

DOWNLOAD THE FULL WORK

DISCLAIMER: All project works, files and documents posted on this website, UniProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. UniProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. All creative work builds on what came before. Nothing is completely original.” - Austin Kleon. The paid subscription on UniProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.

WeCreativez WhatsApp Support
Administrator (Online)
I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.