Wednesday, July 8, 2009

ARM BASED ATTENDANCE MONITORING SYSEM

1.INTRODUCTION:-

1.1 AT GLANCE
With long history, fingerprints are the most widely researched area under field of biometrics and understood biometric. The use of fingerprints as a biometric technique for identification traditionally has been employed by many commercial institutes worldwide for over a century. In the past, fingerprint analysis and matching was conducted by hand and required significant time and effort. Today, Automated Fingerprint Identification Systems (AFIS) are used to automate the analysis and matching processes. They automatically analyze and match single fingerprints against large databases to find a proper match of all possible persons.
In case of Smart card based system only ensure that card was punched or swiped &does not ensure physical presence of person which is a major loophole also there is large administrative costs associated with issuing & managing card, timesheets or attendance registers. To get working solution for the above class of problems, domain specific solutions are more efficient.
Hence ultimate solution is fingerprint recognition system which not only ensures physical presence of the person but also saves time and cost effective as well. Various fingerprint recognition techniques involves latent fingerprint acquisition, fingerprint classification, and fingerprint matching.
As the name implies this system automates “ATTENDANCE MONITORING SYSTEM” in real time. UnlikeManual attendance or smartcard techonology this system implement fingure print recognition for monitoring. This system provides more secure approch for identification of person as each person has unique fingure print. This system will act as unique identification mark. It will definitely add value to conventional approach.
1.2 HISTORY
The uniqueness and permanence of the fingerprints are very well-known. Archaeological artifacts prove that fingerprints were already used by the ancient Assyrians and Chinese as a form of identification of a person. The first scientific studies on fingerprints date from the late sixteen century, but the fundamentals of modern fingerprint identification methods were provided at the end of nineteenth century. The studies of Sir F. Galton and E. Henry led to formally accept fingerprints as valid signs of identity by law enforcement agencies. The first Automated Fingerprint Identification Systems (AFIS) were developed in the 1950s by the F.B.I. (Federal Bureau of Investigation) in cooperation with the National Bureau of Standards, the Cornell Aeronautical Laboratory and Rockwell International Corp. Ten years later other AFISs were developed by NEC Technologies Inc. (Tokyo), Print rack Inc. (Anaheim, California), and Morph System (Paris). Fingerprint recognition is nowadays the basic task of the Integrated Automated Fingerprint Identification Service (IAFIS) of the most famous police agencies.
Ten-print based identification and latent fingerprint recognition are the two main concerns of an IAFIS. In case of Ten-print identification, the system should identify a person by the whole sequence of his/her ten fingerprints, in case of latent fingerprint the system has to identify a person through a fingerprint found on a crime scene. Technology advances in the 1980s in the areas of personal computing and optical scanners triggered non-forensic applications of fingerprint recognition methods. The enormous interest roused by electronic commerce on Internet and, more in general, by the need of reliable techniques for authenticating the identity of a living person in a broad range of applications has greatly intensified the research efforts towards the development of low cost small-size fingerprint-based biometric systems.


1.3 BASIC CONCEPT
The attendance monitoring system is basically an embedded one. Embedded stands for ‘hardware controlled by software’. Here, the software using a ARM processor controls all the hardware components. The ARM processor plays an important role in the system. The main objective of the system is to uniquely identify and to make attendance for a person. This requires a unique product, which has the capability of distinguishing different person. The PC can be used for restoring all the details of attendance made. The computers compare attendce biometric data with stored data for matches. [Absences are automatically sent to a central computer after a brief time interval allowing corrections by an authorized computer operator. The central computer compares the absences with programmed excused absences and automatically reports. This report provides a clear picture of hardware and software used in the system. It also provides an overall view with detailed discussion of the operation of the system.
Fingerprint checking attendance management system is a newly designed generation of personnel checking in formally at a job in various companies ,colleges and some of private institutions based on human unique and exclusive fingerprint. It overcomes the defects as pouch on other’s place and easy missing of traditional time clock, magcard ,IC card ,smart card etc. other check on attendance ways .This latest checking on attendance method stopped most effectively the man-made factors in management, and embodied fully fair spirit during checking management, avoided some unnecessary disputes.





2.LITERATURE SURVEY

2.1 Biometrics
2.1.1 What is biometrics?
Biometrics is an old Greek word for a very new concept.’bio”-meaning life,and“metric”the measure of. So, Biometrics is essence, the measure of life. Biometrics is an Emerging technology for automatically identifying individual using their distinct Physical or behavioral characteristics. Biometrics is method of identification of a Person based on his\her physiological or behavioral characteristics. It is a pattern Recognition system. It makes a personal identification.
2.1.2What Is A Biometric system?
A biometric system is essentially a pattern recognition system which make a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Depending on the application context, a biometric system may be called either a verification system or an identification system.
A verification system authenticates a person’s identity by comparing the captured biometric characteristic with her own biometric template(s) pre-stored in the system. It conducts one-to-one comparison to determine whether the identity claimed by the individual is true. A verification system either rejects or accepts the submitted claim of identity (Am I whom I claim I am?);
An identification system recognizes an individual by searching the entire template database for a match. It conducts one-to-many comparisons to establish the identity of the individual. In an identification system, the system establishes a subject’s identity (or fails if the subject is not enrolled in the system database) without the subject having to claim an identity (Who am I?).
2.1.3 Why Biometrics?
It is computer based system.PIN & password may be forgotten & token based methods of identification, like password & license may be stolen or lost. Biometrics provide better solution for the increased security requirement of our information society than current identification methods such as password, PIN no.,magnetic strip cards.Biometrics methods are impossible to share with others.Biometrics based things can not be lost or stolen.difficult to forge.Every person in the world have unique face,voice,iris,fingerprint, palm etc.
Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies.

2.1.4 Types of biometrics:
Biometric characteristics of a person can be any unique human characteristics ,such as fingerprints, Voice, face, iris, retina, palm, signature, wrist vein or hand geometry.
Its classification is based on
a)Physical attribute
b) Characteristics attribute
A)Physically attributed biometric system
-Ear Recognition
-Face Recognition
-Fingerprint Recognition
-Hand Geometry Recognition
-Iris Recognition
-Retina Recogniton


B) characteristically attributed Biometric sysem:
-Signature Recognition
Key stroke Recognition
-Voice Recognition


Some of the most used biometric characteristics are shown in the picture below. A biometric system based on physiological characteristics is more reliable than one which adopts behavioral features, even if the latter may be easier to integrate within certain specific applications.


2.1.3 Fingerprint as a biometric
A fingerprint is believed to be unique to each person (and each finger).Fingerprints of even identical Twins are different. Fingerprints are one of the most mature biotlymetric technologies and are considered Legitimate proofs of evidence in courts of law all over the world. Fingerprints are, therefore, used in forensic divisions worldwide for criminal investigations. More recently ,an increasing number of civilian and commercial applications are either using or actinely considering to use fingerprint based identification because of a better understanding of fingerprints as well as demonstrated matching performance than any other existing biometric technology.


A fingerprint is a series of ridges and furrows on the surface of the finger. these features are classified as global patterns and minutiae. The global patterns are the general orientation of the ridges on the ridges on the finger. Several types of global patterns have been officially named including the arch,tented arch,whorl,left loop and right loop.the globle pattern cannot used to determine of two fingerprints match.As many people have the same global patterns can be identified by merely looking at the finger and are mainly used to classify the finger prints so that the matching algorithm need only try to look for a matching algorithm need only try to look for a match if the two fingerprints are of the same type.

Background
The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns.[1] It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies.


Patterns
The three basic patterns of fingerprint ridges are the arch, loop, and whorl. An arch is a pattern where the ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. The loop is a pattern where the ridges enter from one side of a finger, form a curve, and tend to exit from the same side they enter. In the whorl pattern, ridges form circularly around a central point on the finger. Scientists have found that family members often share the same general fingerprint patterns, leading to the belief that these patterns are inherited.

Arch pattern

Loop pattern


Whorl pattern




Optical
Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer to an array of solid state pixels (a charge-coupled device) which captures a visual image of the fingerprint. A scratched or dirty touch surface can cause a bad image of the fingerprint. A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger. For instance, a dirty or marked finger is difficult to image properly. Also, it is possible for an individual to erode the outer layer of skin on the fingertips to the point where the fingerprint is no longer visible. It can also be easily fooled by an image of a fingerprint if not coupled with a "live finger" detector. However, unlike capacitive sensors, this sensor technology is not susceptible to electrostatic discharge damage.[4]

Ultrasonic
Ultrasonic sensors make use of the principles of medical ultrasonography in order to create visual images of the fingerprint. Unlike optical imaging, ultrasonic sensors use very high frequency sound waves to penetrate the epidermal layer of skin. The sound waves are generated using piezoelectric transducers and reflected energy is also measured using piezoelectric materials. Since the dermal skin layer exhibits the same characteristic pattern of the fingerprint, the reflected wave measurements can be used to form an image of the fingerprint. This eliminates the need for clean, undamaged epidermal skin and a clean sensing surface.

Capacitance
Capacitance sensors utilize the principles associated with capacitance in order to form fingerprint images. The two equations used in this type of imaging are:
where
C is the capacitance in farads
Q is the charge in coulombs
V is the potential in volts
ε0 is the permittivity of free space, measured in farad per metre
εr is the dielectric constant of the insulator used
A is the area of each plane electrode, measured in square metres
d is the separation between the electrodes, measured in metres
In this method of imaging, the sensor array pixels each act as one plate of a parallel-plate capacitor, the dermal layer (which is electrically conductive) acts as the other plate, and the non-conductive epidermal layer acts as a dielectric

2.3.4 Popularity of fingerprint recognition system:
Because of continuing increase in identity fraud, there is growing need for positive person recognition. Lower fingerprints sensor prices, inexpensive computing power & our (relatively better) understanding of individuality information in fingerprints (compare to other biometric) have attracted a lot of commercial interest in fingerprint based person recognition. Consequently, dozens of fingerprints recognition vendors have mushroomed in the last few years.




3. REQUIREMENT ANBALYSIS
In the Analysis phase, we have performed the requirements gathering task. The requirement thus were formed into proper, explicit, and semantic ‘Software Requirement Specifications '(SRS) as well as ‘Hardware Requirement Specifications’’ (HRS). The scope of the arm based attendance monitoring system was then defined. The next step was to prepare a ‘problem statement’, which we then completed successfully.

3.1REQUIREMENT ENGINEERING:-
Requirement analysis results in the specification of software and hardware operation of system.
Requirements gathering’ comprises of the following:-
a) Inception
b) Elicitation
c) Elaboration
d) Negotiation
e) Specification
f) Validation

Software and hardware requirements are produced at the culmination of the analysis task.




3.2 System requirements:-

3.2.1 Software requirements:-

1) Keil micro vision 3
2) Matlab 7.0
3) Eclipse Id

3.2.2 Hardware requirement:-

1) Fingerprint sensor
2) Arm processor
3) Keyboard 4x1
4) Lcd display 16x2
5) Personal computer







4. Block diagram:






5. HARDWARE DESCRIPTION:

5.1FINGERPRINT SENSOR
A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching.


5.2 PROCESSOR
It process the output of signal conditioning and send it to personal computer. It control’s the interaction between LCD and Keyboard.
5.2.1 Why ARM?
Ø It has inbuilt ADC.
Ø It has real time clock(RTC).
Ø 32kb on chip static RAM and 512kb on chip flash program memory.
Ø Multiple serial interface including 2 UART, 2 fast I2Cbus,SPI and SSP with buffering and variable data length capability.

5.2.2 ARM OVER 8051



Parameter
ARM processor
8051 processor
Memory size:
A)On chip static ROM
B)Flash memory

8kbytes to 40kbytes
32kbytes to 512kbytes

1kbytes to 2kbytes
64kbytes

Power supply requirement
3.3V
5V

Clock frequency
60MHz
11.0592MHz
Capacity
32 bit
8 bit
In build RTC
Present
Absent
In build debugger
Present
Absent
Interrupt level
9 interrupt
6 interrupt
In build ADC&DAC
Present
Absent
In build SPI facility
Present
Absent
Watchdog timer
present
Absent







5.3 KEYBOARD


The keyboard section is as shown in the figure. keypad is used to after entering fingerprint. The keyboard is designed as a matrix of 4x1.and is interfaced to the port s of arm processor.




5.4 LCD display
LCD display is used to display information The LCD is used to display the information or user’s database, entering amount. The LCD panel's Enable and Register Select is connected to the Control Port.
In recent years the LCD is finding widespread use replacing LEDs (Seven Segment LEDs or other multistage LEDs). This is due to the following reasons:The declining prices of LCDs.
1. The ability to display numbers, characters and graphics. This is in contrast to LEDs, which are limited to numbers and a few characters.
2. Incorporation of a refreshing controller into the LCD, thereby relieving the CPU of the task of refreshing the LCD. In contrast, the LED must be refreshed by the CPU (or in some other way) to keep displaying the data.
3. Ease of programming for characters and graphics



















5.4.1 PIN DISCRIPTION:
Pin
Symbol
I/O
Description
1
GND
-
Ground
2
VCC
-
+5V power supply
3
VEE
-
Contrast control
4
RS
I
command/data register selection
5
R/W
I
write/read selection
6
E
I/O
Enable
7
DB0
I/O
The 8-bit data bus
8
DB1
I/O
The 8-bit data bus
9
DB2
I/O
The 8-bit data bus
10
DB3
I/O
The 8-bit data bus
11
DB4
I/O
The 8-bit data bus
12
DB5
I/O
The 8-bit data bus
13
DB6
I/O
The 8-bit data bus
14
DB7
I/O
The 8-bit data bus

:
















5.4.2 VCC, VSS and VEE:-
When VCC and VSS provide +5V and ground respectively, VEE is used for controlling LCD contrast.
5.4.3 RS ( Register Select ) :
There are two very important registers inside the LCD. The RS pin is used for their selection as follows. If RS = 0, the instruction command code register is selected, allowing the user to send a command such as clear display, cursor at home, etc. If RS = 1 the data register is selected, allowing the user to send data to be displayed on the LCD.
5.4.4 R/W ( Read/Write ) :
R/W input allows the user to write information to the LCD or read information from it. R/W = 1 when reading, R/W = 0 when writing.
5.4.5 E ( Enable ) :
The enable pin is used by the LCD to latch information presented to its data pins. When data is supplied to data pins, a high – to – low pulse must be applied to this in order for the LCD to latch in the data present at the data pins. This pulse must be a minimum of 450 ns wide.
5.4.6 D0 – D7 :
The 8-bit data pins, D0 – D7 are used to send information to the LCD or read the contents of the LCD’s internal registers.
To display letters and numbers. We send ASCII codes for the letters A – Z, a – z and numbers 0 – 9 to these pins while making RS = 1.
There are also instruction command codes that can be sent to the LCD to clear the display or force the cursor to the home position or blink the cursor.



6. POWER SUPPLY DESIGN

POWER SUPPLY:
6.1 BLOCK DIAGRAM OF POWER SUPPLY

Block diagram consist of
1) Transformer
2) Rectifier
3) Filter
4) Regulator






6.2. DESIGN OF POWER SUPPLY FOR 5V SUPPLY:-




STEP I:
SELECTION OF TRANSFORMER

For full wave rectifier
Idc=500mA Vdc=2Vm/3.14
Vdc=dc rectifier i/p voltage
Vm=rectifier i/p ac voltage

Desired output of regulator is 5V.
So,
Vm=Vdc*3.14/2
=5*3.14/2
=7.85V
V2 for transformer
V2=Vm/2^1/2
=7.85/2^1/2
=5.55V

V1 =for transformer is 230V, 50Hz supply
Therefore we select transformer having rating 0-9V, 500mA.

STEP III:
SELECTION OF DIODES
PIV ratings of diode
PIV =2Vm
=2*7.85
=15.7

So, we select diode 1N4007 having rating PIV=1000v, If=1A, Ir=10uA


STEP IV:
SELECTION OF CAPACITOR
Vdc=Vm-5000*Idc/C
C=5000*Idc/ (Vm-Vdc)
C=5000*(500*10^-3)/ (7.85-5)
C=877.19uF

Therefore we choose
C=1000uF.
6.3 DESIGN OF POWER SUPPLY FOR 3V SUPPLY:-
Vout = Vref (1+R1/R2)+Iadj.R2
For LM 317 Vref=1.25V,Iadj=100uA
Choose value of R1=100 ohm,
Vout = Vref (1+R1/R2)+ Iadj.R2
3.3v = 1.25V (1+R2/100)+ 100uA.R2
3.3V = 1.25V +12.5 mA .R2+100uA.R2
3.3V-1.25V = 12.5 mA .R2 + 100uA.R2
2.05V=12.6mA.R2
R2=2.05V/12.6mA
R2=162.69 ohm
7. Flow of event:


8. APPLICATIONS:-


Ø Real time ARM based attendance monitoring system can be used in colleges Or schools for student attendance logging.
Ø Real time ARM based attendance monitoring system can be used in various institute for Visitor verification.
Ø It can be used as member verification in various commericial\member organization.
Ø It can be used for instant reporting in data center and server room.
Ø In banking sector.