Conference PaperPDF Available

“A Study on Transformation in Technological Based Biometrics Attendance System: Human Resource Management Practice”

Authors:
“A Study on transformation in technological based
Biometrics Attendance System: Human
Resource Management Practice”
Vikas Garg
Assistant Professor
Amity Business School
Amity University, Uttar Pradesh
Greater Noida Campus
vgarg@gn.amity.edu
Abhishek Singhal
Assistant Professor
Amity School of Engineering and Technology
Amity University, Uttar Pradesh
Noida Campus
asinghal1@amity.edu
Pooja Tiwari
Assistant Professor
ABES Engineering College Ghaziabad
Pooja2017@gmail.com
Abstract
In contemporary era, there is strong level of imitation practiced on a
regular basis in private sector as well as public. The prevalence of
ghost worker syndrome is observed across the three pillars of the
government. The employers are concerned about the absenteeism
among employees of the workforce and complexity in monitoring the
student’s attendance in the lectures. Biometric identification system
facilitated by fingerprint is a unique method utilized for a lifetime.
Biometric system comprises of the process of verifying identity of
individuals by analyzing the human body features which is utilized in
immense number of aspects utilizing different purposes, especially
workforce attendance; the nexus of this paper is to throw light on the
attendance monitoring software using fingerprint biometric
techniques in a university milieu. Although, there are the abundant
benefits that the biometric technique offers and the impact is felt
across various spheres, mostly the beneficiary come across the issue
of delineating the appropriate procedure while keeping the cost
benefit element in the focal. The study focuses on describing the
system of attendance management by subsuming the biometric
technique with the conventional workforce attendance monitoring
system which highly influences the efficiency and productive
capacity of firm. This study uses qualitative (exploratory) research
methodology, it is pure exploring study, where detailed knowledge of
Biometrics, Biometrics Attendance System and it’s usage in HR
practices has been shared. However the study shows that biometric
identifier is effective and economic for employee’s attendance
monitoring software for firms as a part of HR practices. Therefore,
the focus should be kept on the various factors prior to
recommending a biometric technique as the mode of improvising the
productive capacity of any organization’s business performance.
Keywords: Biometric, Employee Attendance, Verification,
Productivity, Human Resource Management, fingerprint, enrolment,
authentication.
1. Introduction
The expectation today is from any individual is that he/she
should have a unique identification or password in order to
authenticate his/her service. For instance, the pin of a Debit
card, the number on the driver’s license, insurance policy
number etc. However, the process of creating, carrying and
remembering different unique identities and passwords is a
problem organizations face today. In order to secure the
identification system and make the process of authentication
more reliable, the biometric figures are an integrated part of
the attendance monitoring software. Biometric technique
verifies the identity via features like fingerprints, facial
characteristics, arises, the retina, palm print, the voice
recognition, signatures writing etc. This technique uses the
data of physical characteristics and thus, it is receiving the
attention and the status as a individual authentication
methodology which brought convenience in comparison to the
conventional methodology such as unique password or an
identity card as it utilizes the data collected from the
measurements which makes it individualistic lifelong.
The unique mark innovation consequently turns into the
incomparable and acclaimed biometric procedure in
automatation of the individual recognizable proof framework.
The reason for the overall acknowledgment of the unique
mark biometric check framework is the wonderful uniqueness
of the fingerprints, its dependability and straightforwardness.
This investigation is an endeavour towards the predominance
of the monstrous level of the pantomime saw on standard
premise in different segments and the pervasiveness of the
phantom labourer disorder making rebellion and hazard
among the mainstays of open division, The businesses are
worried about the non-appearance among representatives of
the workforce and unpredictability in observing the
understudies participation in the addresses. Also, the
fingerprint Attendance Monitoring was created with a specific
end goal to encourage a one of a kind, steady, speedier, solid,
secure and effortlessly available strategy for client personality
check over the use of passwords as an ordinary technique.
The word "biometrics" was generating from the Greek words
"bio" means life and "measurements" means specially
designed. Robotized biometric frameworks have just been
accessible for a couple of decades due to huge advances in PC
809
978-1-5386-1719-9/18/$31.00 c
2018 IEEE
preparing. Be that as it may, a significant number of these new
computerized systems depend on thoughts initially imagined
hundreds or even a great many years prior. One of the most
seasoned and most crucial cases of a trademark that is utilized
for human acknowledgment is the face. Since the start of
development, people have utilized appearances to recognize
the commonplace and non natural individuals. The idea of
entomb human acknowledgment is likewise found in the
dominating biometrics of conduct, for example, human
discourse and voice acknowledgment. People utilize these
attributes, in a to some degree oblivious path, to perceive
individuals well-known from everyday.
Table. 1
1858 First systematic capture of hand images for identification purpose was
recorded
1896 Henry develops a fingerprint classification system
1936 Concept of using the iris pattern for identification was proposed
1960 Face recognition becomes semi-automated
1965 Automated signature recognition research begins
1974 First commercial hand geometry systems become avai lable
1992 Biometric consortium is established within US government
2002 ISO/IEC standards committee on biometric is established
2010 U.S. national security apparatus utilizes b iometrics for terrorist
identification
2013 Apple includes fingerprint scanners into consumer target smart
phones
(Source: National Science and Technology Council Report)
1.1 Benefits of Biometrics
As we understand that the current security frameworks are rare
and they are based on unique passwords, unique identification
numbers, various new biometric methods which help us to
achieve a condition of accuracy and clarity in understanding
the concepts.
We are also using natural features like retina scan, thumb
impression in our main endeavors which help us to form a
unique and different proof system in different conditions. This
process cannot be copied from one system to another as
everybody is having a unique set of features.
The biometric system affects an individual and also an
organisation where an individual user can be associated to a
specific event. Biometrics is considered to be transparent and
unmistakable and they are mainly useful for security purposes,
majorly in case of monitoring system in schools, colleges and
offices.
The major use of biometrics is secure and also simple, because
it gives various innovative techniques to recover the database
of the people registered. The software can be easily utilised
and can be prepared by various steps.
Biometrics frameworks are nowadays introduced effectively
in various organisations and it is considered to be best
amongst the current tools as by the help of this companies and
organisations and are easily able to remove physical costly
heads. In this event, it is also beneficial for people who are not
able to maintain physical data efficiently and are not having an
expertise in letters, words, images etc. which makes them
difficult to prepare reports.
However, there would have been no requirement of biometric
characteristics, if there is no duplication of data,
misrepresentation of records, and illegal sharing of data. There
is no need of personal ID cards and their maintenance as in
case the ID card is lost which can be a problem to the
customer security strategies.
Fig. 1.
1.2 Biometrics and Attendance
The benefits of a major duration and excessive framework are
dealing with the current workforce. Without understanding the
use and extra time of a system we also require extra time for
finance costs and works costs and also a deep understanding
of the robotic system. We need to have a strong association
and HR issues about the management of the system and also a
thorough speculation and a constructive outcome for any
business. Majorly in a normal course, biometrics is related
with attendance in schools, colleges and organisation. It is also
used in army, hospitals, mining and also for invigilation
purposes.
Representatives are enabled when they approach their own
particular data through innovation like worker self-benefit.
That strengthening is a level of shared control between the
business and representative and improves for an association
with a beneficial outcome as an organization's way of life. The
advantages of connected with representatives are various.
Connected with representatives are energetic, contribute
thoughts, are idealistic about the organization and its future,
are once in a while missing from work, regularly remain with
the association longer, and are diplomats for the association.
In addition, a profoundly esteemed organization culture is a
noteworthy supporter of drawing in and holding top ability
workers.
The old procedures where this system is done manually
,human resource keeps huge measurement of paper work and
preparation of time sheets records for each representative
.Keeping this kind of data is very tedious and it is also waste
of time and energy for basically unproductive work. Then
moreover people have to deal with manpower and make them
work which is considered to be the toughest work in any
business. Worker self-benefit (ESS) usefulness is presently a
standard element of most time and participation and HR
arrangements, and ESS not just permits representatives access
to their own timekeeping and business information yet in
addition urges them to effectively take an interest in the
upkeep of this data, diminishing bottlenecks in forms and
810 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
engaging representatives to take responsibility for information.
No more is the HR or finance office circling to gather paper
time cards toward the finish of a payroll interval.
Representatives are entering their own opportunity functioned
as they work it.
Fig. 2.
At this point of time, in order to have an ideal opportunity
about the workmanship in business by manual work is very
boring and it results in conflicts to deal with the human
resource and correcting and calculating the payroll system
often and on due to human error is very monotonous and
cumbersome. Regardless of the same the duty of an individual
five hours for every payroll means a considerable measure of
efficiency hours which is associated with cost .If we calculate
step wise then we can understand that maintaining a manual
procedure and regular collection of time cards, revised section
of information and important process to finance and refund
people for the organisation payroll system is very time
consuming and boring .It is important for companies to
consider manual time keeping and financial procedures and
reduce the time period from five hours to five and ten minutes
due to biometrics. This actually requires no investment and no
manual participation which can be done in minutes due to this
machine.
The profitability hours and workforce can be reallocated to
various other locations for productive purposes with minimum
cost. Computerised time enrolment and gathering
requirements for timekeeping can be used in a limited
timeframe .Due to this the payroll system which takes hours to
recover and complete now it can be done in 15-20 minutes.
Changing the time frame it takes financial software while
changing the information from manual to digital and making
the time keeping data prompt and effective.
2. RESEARCH OBJECTIVE
The primary objective of this research is to specifically
consider and understand the various areas of biometric
technology and what, where and how they have been used in
the past and present scenario, majorly on the issues of staff
attendance systems in many multinational organisations. The
major research areas of work productivity factor of employees
that are there as a result when implementing a biometric
system in the organization.
Fig. 3.
Fig. 4.
3.1 Detailed study of Existing Biometric Technology and
its major Benefits
Different forms of biometric technology already existed in the
past and different countries were using them for attendance
purpose. Initially the biometric system were used my most of
the public sector organization, but it is also beneficial to
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 811
identify and verify crimes (Jiexun L.,Wang .A. and Chen H,
2011)[11]. The discovery of biometrics technology framework
has been started by people in general part; however biometrics
is additionally utilized for the ID and confirmation of crooks
as said by Jiexun L.,Wang .A. what's more, Chen H ,
2011[11].Other interesting streams where biometrics has
played a major role on its growth are areas like Banking,
Education and Health . For instance, rising application
markets incorporate biometrically empowered value-based
instalment arrangements and biometrically empowers remote
for business utilize. Some European banks utilize the 3Dfacial
acknowledgment of workers into bank structures, in this
manner wiping out the issue of keys been lost, stolen or
abused, as recommended by Capoor S. in 2006[5]. Moreover,
biometric application has been helpful in different divisions
which incorporate the administration utilizing it to stop fear
based oppressor assaults and battling wrongdoings. After the
9/11 massacre the Yeager Airport in Charleston started the
biometrics framework, which is beneficial to secure access to
its control tower as clarified by Dubin, C. in 2011[8].
Additionally, the biometrics framework has been
exceptionally valuable in the areas of education where it has
helped understudies in the obtaining and returning of various
books inside the library. The positive effect of biometrics to
the wellbeing segment can't be forgotten which has helped in
ceasing extortion in some social insurance charge for
administrations they never performed. A palm scanner which
peruses patient's novel vein design was executed in Sharp
Healthcare in San Diego to stop persistent data fraud, the
framework was known to be exceptionally secure and
performed effectively well for its motivation is been clarified
by Kreimer, .S., 2010 [12]. Besides, biometrics can be
coordinated with different frameworks for it to do its
motivation of recognizable proof. Whereas Zalud, B.,2010[22]
accentuation different country security databases require
utilizing a card get to framework incorporated with a
biometric innovation to obtain entrance.
3.2 Attendance Management System
As per Bevan, S and Hayday, S. in 1998[1] participation
administration is the demonstration of overseeing participation
or nearness in a work setting to limit misfortune because of
representative downtime. Participation control has customarily
been moved toward utilizing time tickers and timesheets,
however participation administration goes past this to give a
workplace which amplifies and inspires representative
participation. Participation administration is a noteworthy
piece of the present human asset frameworks; take association
towards better human asset practice, frameworks and
perfection, subsequently standard participation and
dependability are anticipated from all representatives or
hopefuls inside an organisation. Unacceptable participation
caused due to unorganised and unlucky deficiencies and
lateness in light of the fact that a disturbance in work,
influences profitability, and makes spirit issues when
workloads are moved to different representatives as properly
clarified by McKeehan, D.A. in 2002[13].
4. SCOPE OF THE STUDY
This exploration covers the biometric innovation framework
which is been utilized with the end goal of staff participation
in various association. The biometric innovation framework
incorporated into this investigation are having the unique
mark, hand geometry, iris acknowledgment, voice
acknowledgment, faces acknowledgment and mark check
meters. The workers of the organization who utilize the
conventional method for recording worker participation has
constantly confronted inconvenience in numerous way like –
off base participation, influenced pay and so forth.
Biometrics has been specified successfully in a way, where
over ten years all the time and participation of a workforce
administration is acceptable. Inspire of all these benefits there
are some or the other problems and confusion about its
innovation and activities. These problems are majorly
separated when the main biometric or standard biometrics are
prepared, which are considered. The extent of study in this
paper demonstrates that this biometric has extreme level of
analysis and examination. The other investigation states that
biometric framework has extreme and unimaginative capacity
to increase work saves time that provides information and
gives a review that is without an error. Another issue is
biometric offers detailed relationship and a backend support to
collect the database And lastly, we also understand that in the
current scenario many organisations are having a robotics
approach and they are initiating immediate and backend work
in a limited period of time.
5. LIMITATION OF THE STUDY
A scanner which consists of a rare finger impression has
majorly two employments. To begin with one need to get a
picture of any individual finger and it checks the technicalities
and minute activities and it relates and compares the
technicalities of the individual finger once punched. It consists
of rare and unique mark which is encoded inside by a
biometric key or any numeric body. A unique mark can never
be duplicated as every individual has a unique code which is
considered for confirmation.
812 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
Fig. 5.
It is critical to take note of that Easy Clocking's biometric time
timekeepers don't in reality gather and store fingerprints.
Rather, it spares a numerical portrayal of the representative's
biometric information. At the point when the biometric time
clock filters a hand or finger amid a managed enlistment
process, just an encoded scientific portrayal of the unique
finger impression is put away. Subsequently, it's for all intents
and purposes difficult to copy the first picture from that
numerical portrayal. Furthermore, if representatives question
cleanliness, this worry ought not to be rejected. Rather, you
ought to guarantee representatives that the time clock's finger
zone isn't a hot zone for germs. Actually, it will be touched far
less every now and again than restroom entryway handles and
water cooler nozzles and so forth.
6. RECOMMENDATION AND CONCLUSION
Every biometric innovation can also include the
representatives of the association utilizing the major features
of an individual body in order to find out the distinguishing
proof and check; this however fulfils the way that the
framework will be manageable. Thus, biometric innovation is
without a doubt a worldwide ICT system that can be using to
upgrade staff participation. Along these lines, this
investigation has reached a conclusion that biometric
innovation framework is the best framework that can
economically take care of the waiting issue of staff
participation in the associations. This will take out pal
punching and increment staff profitability. It is along these
lines, prescribed that consideration ought to be paid to
workforce efficiency factors before suggesting biometric
innovation as a methods for enhancing the profitability of an
association business forms.
Bibliography
1. Bevan, S and Hayday, S. (1998): Attendance Management: a
Review of Good Practice" Report 353, Institute for Employment
Studies.
2. Bredin, K., Human Resource Management in Project-Based
Organisations. 2008 - Challenges, Changes, and Capabilities.
Doctoral thesis, Department of Management and Engineering,
Linköping University, Linköping.
3. Carat S. Chikkerur (2005): Online Fingerprint Verification System,
An MTech Thesis, Department of Electrical Engineering, and
Faculty of the Graduate School of the State University of New
York at Buffalo.
4. Chris Velazco.2011.”Android Still Most Popular Smartphone OS,
iOS Holds Steady In Second Place”, (on-line), Techcrunch web.
http://techcrunch.com/2011/11/03/android-still-most-popular-os-
ios-holds-steady-in-second-place/. 13 Januari 2013.
5. Capoor S.(2006). ‘Biometrics as a Convenience
Security’,Business storyDecember 1, 48, 50. Retrieved
16thOctober, 2012
6. Darcey Lauren., & Conder Shane.2011. “Enable a Fingerprint
Scanner for Android on the Motorola ATRIX 4G”, (on-line),
developer.com web.
http://www.developer.com/ws/android/devices/enable-a-
fingerprint-scanner-for-android-on-the-motorola-atrix-4g.html. 13
Januari 2013
7. Dransfield, Robert. Human Resource Management. 2000:
Heinemann Educational Publisher.
8. Dubin, C. (2011). ‘Biometrics:HandsDown’, IDmanagement.
Security, February 1, 52, 54.
9. Dugelay, J.L., et al., Recent Advantages in Biometric Person
Authentication, in ICASSP International Conference on Acoustics,
Speech and Signal Processing. 2002: Orlando, Florida, USA.
10. HARRIS, A.J. and D.C. YEN, Biometric authentication: assuring
access to information. Information Management andComputer
Security, 2002.10 (1): p. 12-19.
11. Jiexun L.,Wang .A. andChenH(2011). ‘Identitymatching using
personal and social identity features’; 13:101– 113 Kreimer, .S.
(2010). ‘Matching the Right Patient to theRight Record’.Hospitals
& Health Networks,November 1, 12. Retrieved 17thDecember
2011.
12. Kreimer, .S. (2010). ‘Matching the Right Patient to theRight
Record’.Hospitals & Health Networks,November 1, 12. Retrieved
17thDecember 2011.
13. McKeehan, D.A. (2002): Attendance Management Program, The
City of Pleasanton, Human Resources.NSTCS, 2006. Biometrics
Technologies. National Science and Technology Council
Subcommittee on Biometrics. Retrieved 2nd July, 2012.
14. Mehtre, B. M. (1993): Fingerprint image analysis for automatic
identification. Machine Vision and Applications 6, 2 (1993), 124-
139.
15. Ononiwu G. C and Okorafor G. N (2012): Radio Frequency
Identification (RFID) Based Attendance System with Automatic
Door Unit, Academic Research International. Vol 2, No 2, March,
2012.
16. Ravi. J. K., Raja b. and Venugopal. K. R. (2009): Fingerprint
Recognition Using Minutia Score Matching, International Journal
of Engineering Science and Technology Vol.1 (2), 2009, 35-42.
17. Sandi Fajar Rodiyansyah.2011. “Arsitektur Sistem Operasi
Android”, (online),
educnologyweb.http://educnology.web.id/opensource/rodiyansyah/
arsitektur-sistem-operasi-android, 14 Januari 2013
18. Shehu V. and Dika A. (2011): Using Real Time Computer Vision
Algorithms in Automatic Attendance Management Systems.
Proceedings of the ITI 2010 32nd Int. Conf. on Information
Technology Interfaces, June 21-24, 2010, Caveat, Croatia.
19. Shoewu O., Olaniyi O.M. and Lawson A. (2011): Embedded
Computer-Based Lecture Attendance Management System.
African Journal of Computing and ICT. Vol 4, No. 3. P 27- 36,
September, 2011.
20. Tyler Lee.2011.”AuthenTec releases SDK for fingerprint sensor
applications on Android phones”, (on-line), Ubergizmo web.
http://www.ubergizmo.com/2011/08/authentec-releases-sdk-for-
fingerprint-sensor-applications-on-android-phones/. 13 Januari
2013.
21. Woodward, J.D., et al., Army Biometric Applications: Identifying
and Addressing Sociocultural Concerns. 2001
22. Zalud, B. (2010).‘Poor Sister No More: Access Enters Spotlight
Again’. Journal of Access management Security, August 1, 42,44-
45. Retrieved 28thApril 2011
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 813
... Moving back to education, multiple efforts have been made to implement them, advances range from its basic form as biometric scanners such as fingerprints or face recognition (Leaton, 2018) to access facilities or as a payment method within the campus, done via companies as identiMetrics and IDconnect (Garg et al. 2018). Other studies use neuroimaging techniques such as functional magnetic resonance imaging (fMRI), that helps in the visualization of the current set of exercises a student is doing (Anderson et al. 2010). ...
Conference Paper
Full-text available
This work presents a real-time biofeedback tool that uses wearables and Internet of Things (IoT) for applications in education. Using wearables (electroencephalography helmet, smart bands) and a Raspberry Pi, signals were integrated in real-time. Moreover, a three-class random forest (RF) classification machine learning (ML) algorithm, based on the aforementioned signals, which predicted a student's mental fatigue (none, moderate and extreme fatigue) with 92.69% average correct classification percentage using 5-fold cross-validation (CV). The system can evaluate a student's performance under different learning modalities, in addition, it can show different content types to students, depending on the professor's necessities. In the current work, vehicle signals were integrated for teaching automotive engineering.
... Garg et. al [5] described that fingerprint is actually a unique method, cost beneficial and effective for employee's attendance monitoring. Geralde et. ...
Conference Paper
Full-text available
In this paper a holistic methodology has been followed to gauge the quality of service for real time attendance system. The experiment was done to compare the performance of an attendance server which will be cost effective but reliable. To reduce the cost we have connected our biometric attendance device with a local server where the data is updated instantly. As a result the chance of data loss is almost none. The available devices in the market is very expensive where as our complete system may cost around USD50. On the other hand, most of the devices produce multiple data for a single user on specific day as the data fetched from internal memory of the respective device. But our proposed system provide a very well-ordered data for easy tracking of attendance. Moreover, our proposed framework requires a marginal power to drive the whole system. The complete system can be implemented using regular hardware and software with a very low cost.
... [15] AI ALGORITHM AI algorithms are codes and instructions which needs to follow step by step and guide AI functions. Sophisticated algorithm helps to set to automate various HR functions such as colleting business intelligence, dissemination of information to stakeholders, supervising key performance indicators and tracking activities on social media of employees and prospects candidates [16]. ...
... Biometric authentication is widely used techniques for small to large applications. The range of applications includes administration, employee attendance, transportation and POS services etc [1][2][3][4][5][6]. Although it gives better results the aadhar like centralize database have utilized for some other extended Application, which are very needful application for current situation. ...
Article
Cloud computing helps organisations expand, be flexible, and concentrate on operating their businesses instead of managing their complex IT infrastructure. However, implementing such systems has several technical and organisational within the company. The primary objective of this study is to identify the important factors that impact the adoption of cloud computing in human resource management systems through a meta-analytic literature review and to suggest a new model with unleashed components determining the success of cloud-based HRM systems. Since the number of studies for meta-analysis is very less, the study incorporates a systematic literature review comprising of 69 studies published since 2012 in various journals and conferences. Among which, 10 quantitative studies are selected for meta-analytic analysis by extracting 65 relationships with a total sample size of 3389. The descriptive statistics show that the number of publications has grown since the year 2020, with a dominant contribution from China. From the analysis, it is found that the efficiency of the HRM systems contributes more to organisational development (β = 0.897), and cloud-based services highly influence the performance of such HRM systems (β = 0.816). Moreover, executive or leadership support has a strong correlation with facilitating conditions (β = 0.72) and social influence (β = 0.68). The intention to use cloud-based HRM is determined by the facilitating conditions (0.487). Furthermore, cloud computing characteristics such as complexity (β = 0.37) and compatibility (β = 0.37) have a positive relationship with effort expectancy. Thus, management and executives must work together on programmes that assist organisations adapt to change. Technology's complexity may be eased by the system's expertise.
Conference Paper
Full-text available
Recently, the crime pattern analysis has gained attention of data analysis for the researchers. The Information Act 2000 defined different offences under different Sections as per government regulations, which motivated to discover patterns of crime occurrence so that necessary actions can be taken to reduce the crime rate in near future. To achieve this goal, Cyber crime data has been extracted from National Crime Records Bureau (NCRB). The crime patterns are investigated based on offences- prone state and their corresponding relationship among them using regression and correlation
Thesis
Full-text available
This doctoral thesis consists of a compilation of six papers and an extended summary, and it centres on human resource management (HRM) in project-based organisations. In the thesis, it is argued that the increasingly common project-based organisational form has characteristics that challenge traditional ways of organising and carrying out HRM. The research reported in the thesis is based on a combination of multiple, comparative, and single case studies of project-based organisations. The core case studies have been conducted at Saab Aerosystems, AstraZeneca, Volvo Car Corporation, and Tetra Pak. The first four papers identify and analyse challenges for HRM in project-based organisations as well as changes in people management systems in order to meet these challenges. Particular attention is given to the increased HR orientation of line managers and alternative configurations of HR departments. The two final papers apply a capabilities perspective on project-based organisations and develop a conceptual framework that embraces people capability: the organisational capability to manage the relation between people and their organisational context. It is suggested that this conceptual framework could be useful for the analysis of HRM in project-based organisations and for explaining the changes in people management systems that are needed in order to align them to a project-based context.
Article
Full-text available
Electronic cards like magnetic cards and smart cards have been used worldwide for different functions such as electronic payment system (credit card and debit/ATM cards), electronic voting system, personnel identification system and security system. In this paper, we present an electronic card-based solution to the lecture attendance problem in higher institutions in the developing countries. Ours is based on single-chip computer based subsystems interfaced serially to the serial port of the digital computer. The developed system could speed up the process of taking students lecture attendance and allows for error free and faster verification process of authenticating student lecture attendance policy required for writing examination in a campus environment.
Article
Full-text available
Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. RFID technology which is a matured technology that has been widely deployed by various organizations as part of their automation systems. In this study, an RFID based system has been built in order to produce a time-attendance management system. This system consists of two main parts which include: the hardware and the software. The hardware consists of the motor unit and the RFID reader. The RFID reader, which is a low-frequency reader (125 kHz), is connected to the host computer via a serial to USB converter cable. The Time-Attendance System GUI was developed using visual basic.Net. The Time-Attendance Management System provides the functionalities of the overall system such as displaying live ID tags transactions, registering ID, deleting ID, recording attendance and other minor functions. This interface was installed in the host computer.
Conference Paper
Full-text available
This paper introduces a new approach in automatic attendance management systems, extended with computer vision algorithms. We propose using real time face detection algorithms integrated on an existing Learning Management System (LMS), which automatically detects and registers students attending on a lecture. The system represents a supplemental tool for instructors, combining algorithms used in machine learning with adaptive methods used to track facial changes during a longer period of time. This new system aims to be less time consuming than traditional methods, at the same time being nonintrusive and not interfere with the regular teaching process. The tool promises to offer accurate results and a more detailed reporting system which shows student activity and attendance in a classroom.
Article
Full-text available
The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, which scans the image at the boundary to preserves the quality of the image and extract the minutiae from the thinned image. The false matching ratio is better compared to the existing algorithm.
Article
Full-text available
In this paper biometric technology will be defined and then discussed as to how it will help the business world protect its information. Background will be given to show how identification and authentication have developed throughout the years and why another form of authorization needs to come to the forefront. There are reasons for higher security and biometric authentication will be shown to be the solution to answer this call. Biometric is a powerful way of deciding who can gain access to our most valuable systems in this volatile world. Factors will be uncovered about what can and will affect an identification system, which will lead us to the feasibility of implementing a biometric system. As one will see, biometric will not be the best choice for everyone. Already, parts of the Department of Defense community rely on this technology in order to maintain the integrity of their own systems. For the business world, it is critical that biometric be grasped now in order to do the same.
Article
Full-text available
Biometrics is an emerging topic in the field of signal processing. While enabling technologies (e.g. audio, video) for biometrics have mostly used separately, ultimately, biometric technologies could find their strongest role as interwined and complementary pieces of a multi-modal authentication system. In this paper, a short overview of voice, fingerprint, and face authentication algorithms is provided.
Article
Most of the papers on fingerprints deal with classification of fingerprint images. Fingerprint databases being large (in the range of millions), the effort in matching of fingerprints within a class or when the class is unknown, is very significant. This requires fingerprint image analysis and extraction of the “minutiae” features, which are used for matching FPs. In this paper a scheme of preprocessing and feature extraction of fingerprint images for automatic identification is presented, which works even if the pattern class is unknown. The identification of fingerprints is based on matching the minutiae features of a given finger-print against those stored in the database. The core and delta information is used for classification and for registration while matching. These algorithms have been tested for more than 10,000 fingerprint images of different qualities. The results are manually verified and found to be very good for practical application. A few sample results are presented.