Anda di halaman 1dari 3

International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 9- Sep 2013

ISSN: 2231-5381 http://www.ijettjournal.org Page 3885


An Online Examination System Using Wireless
Security Application
1
Madhu Babu Anumolu,
2
N.Bharadwaj

1
M.Tech, Dept of ECE, CMR College of Engineering and Technology, Hyderabad, AP-India,
2
Assoc Prof, Dept of ECE, CMR College of Engineering and Technology, Hyderabad, AP-India,


Abstract This paper is implemented for online examination
security system. Here we are using finger print module for
identification of each student and a web cam for taking the image
of each student, all the finger prints and images will be stored in
the data base using zigbee wireless protocol. This paper operation
is done in two modes Enrolment mode and Verification mode. If
any finger print (or) image mismatch occur while verification of
each student when entering into the examination hall then the
buzzer will be blown.
Keywords ARM7, ARM9, Finger print module, PC, Web cam,
Zigbee

I.INTRODUCTION
To provide security for online examination this
systemhas been designed and implemented. In this systemwe
are using finger print module, Zigbee protocol, LCD. This
paper is build around ARM7 & ARM9. By this
implementation we can achieve full level security systemfor
online examination. As we see now a days in so many
examination centres, most of the students appearing as fake
persons for writing exams. Even though the examination
branch of related university taking enough precautions to
prevent situations like this, they are not completely
eliminating.
Fingerprint identification is the oldest method that
has been successfully used in various applications. A
Fingerprint, as the name suggests is the print or the impression
made by our finger because of the patterns formed on the skin
of our palms and fingers. It is fully formed at about seven
months of fetus development and finger ridge configurations
do not change throughout the life of an individual. Each of our
ten fingerprints is different from one another and fromthose
of every other person. Even identical twins have unique
finger-prints. That makes them ideal for personal
identification. With age, these marks get prominent but the
pattern and the structures present in those fine lines do not
undergo any change. For their permanence and unique nature,
they have been used for not only in identification but also in
the field of security as criminal and forensic investigation for
a long time. Every fingerprint consist ridges and furrows
where the ridges are thick lines while the furrows are space
between two ridges. An example of this fingerprint based
security system for the national security like examination
security of a nation to prevent an unauthorized person to enter
into the examination hall because an unauthorized person may
enter by easily manipulating the security guard or any other
manual security system. For entering, a person can scan their
finger on the fingerprint sensor module at the important entry
place of the examination hall in perfect manner. If their
fingerprint matched with the fingerprints of the database
which has made for examination authorized person, then the
person can enter otherwise they will be denied.

II. RELATED WORK
A. ARM9 (Mini2440 | S3C2440 ARM9 Board):
The Friendly ARM Mini2440 is a single board computer
based on a Samsung S3C2440 ARM9 microprocessor. The
S3C2440A is developed with ARM920T core, 0.13umCMOS
standard cells and a memory complier. Its low power, simple,
elegant and fully static design is particularly suitable for cost-
and power-sensitive applications. It adopts a new bus
architecture known as Advanced Micro controller Bus
Architecture (AMBA).


Figure1: Friendly ARM

B.ARM7 (LPC2148):
The ARM7TDMI-S is a general purpose 32-bit
microprocessor, which offers high performance and very low
power consumption. The ARM architecture is based on
Reduced Instruction Set Computer (RISC) principles, and the
instruction set and related decode mechanism are much
simpler than those of micro programmed Complex Instruction
Set Computers. This simplicity results in a high instruction
throughput and impressive real-time interrupt response from a
small and cost-effective processor core. Pipeline techniques
are employed so that all parts of the processing and memory
systems can operate continuously.
International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 9- Sep 2013
ISSN: 2231-5381 http://www.ijettjournal.org Page 3886
Typically, while one instruction is being executed, its
successor is being decoded, and a third instruction is being
fetched frommemory.


Figure2: ARM7 (LPC2148) board

C .Finger Print Module:
Fingerprint identification is the oldest method that
has been successfully used in various applications. Each of
our ten fingerprints is different fromone another and from
those of every other person. Even identical twins have unique
finger-prints. That makes them ideal for personal
identification. A fingerprint is made of a series of ridges and
furrows on the surface of the finger. The uniqueness of a
fingerprint is determined by the pattern of ridges and furrows
as well as the minutiae points. Minutiae points are local ridge
characteristics that occur when a ridge splits apart or a ridge
ends.












Figure3: fingerprint conversion into digital

D. Zigbee protocol:
In this project we are using Zigbee Technology for
the purpose of wireless communication between fingerprint
sensor module and the PC. This technology was developed
for a wireless personal area networks (PAN), aimed to
control low data rate and low power consumption. In this
technology we can use application of both WI-FI and
Bluetooth. It relies upon IEEE 802.15.4, which has excellent
performance in low SNR environments. It is a specification
for a suite of high level communication protocols.
Using small, low-power digital radios based on an
IEEE 802 standard for personal. Its devices are often used in
mesh network formto transmit data over longer distances,
passing data through intermediate devices to reach more
distant ones and also device can be tasked with running
network. It is targeted at applications that require a low data
rate, long battery life and secure networking. It has a defined
rate of 250kbit/s, best suited for single signal transmission
froma sensor or input device.

III. SYSTEM IMPLEMENTATION





Figure4: Block diagramof entrance section




Figure5: Block diagramof PC section

A. Hardware Architecture

A fingerprint scanner, LCD display, Zigbee device
and a Personal Computer will be used as hardware in this
project. Where the finger print scanner scan a finger of a
person and sends its image to the Zigbee device through a
USB connection while the Personal Computer(PC) houses the
database and runs some relevant application to compare and
matching the database fingerprints to the scanned fingerprint.
LCD display will be displaying accurate all database details
information about the relevant person with the help of a
connection to the PC. After matching the database is updated
automatically. This paper operation is done in two modes
Enrolment mode and Verification mode. In enrolment mode
each student should place finger on the surface of the finger
print module and each student image also will be captured
using web cam, all the finger prints and images will be sent
into the data base using zigbee protocol, where all the finger
prints and images are stored along with their details like:
Name, Registration id, etc.

International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 9- Sep 2013
ISSN: 2231-5381 http://www.ijettjournal.org Page 3887
Second mode is verification, in this mode when student
entering the examination hall this systemask the student to
place the finger on the finger print module and also web
captures the image and send to data base. If the images and
finger prints matches with the data base then the stepper
motor will rotate anti clock wise direction then door will be
open after some delay, the stepper motor will rotate clock
wise direction then door will be closed through ULN2003, if
any finger print(or)image mismatches then the buzzer will
blown.
B. Software Architecture:
In this system we are using software architecture as
Database and Application Program.
Database: The database consists of tables that stores records
implemented in Microsoft SQL Server database. However,
this can be migrated to any other relational database of
choice. SQL Server is fast and easy, it can store a very large
record and requires little configuration.
C. Application Program:
The application programis developed with Microsoft
C#programming language using Microsoft Visual Studio
framework and it provides a user interface for the security
system. The advantages of Microsoft C# programming
language are its robustness, easy to program, has an excellent
database connectivity, runs on the two most common
operating systemplatforms (Windows and Unix) and it has a
larger user community that provides online support.

IV. RESULTS




Figure6: Mini 2440


This system has been verified to observe the 30
authorized and 05 unauthorized people for entry into the
examination hall. In case of authorized, 30 identification
have been identified successfully and only one identification
didnt recognize due to their wrong manner of giving
fingerprint and in case of unauthorized person all person
have been successfully denied. Accuracy in both situations is
shown below (Table. 1&2).


A. For Authorized Person

B.For Unauthorized Person


V. CONCLUSION AND FUTURE WORK

This paper is implemented successfully with basic
requirements needed for security of online examination. The
proposed approach uses the technique which combines a
unique biometrics and the concept of wireless communication.
Fingerprint provides a solution for protecting the privacy of
the user; since the users true biometric feature is never
changed in the whole life. Fingerprint is used for the better
security and accuracy. This common wireless security system
can be extended in future by using several different types of
required database that will be very hard to break by the
attackers and thus it can provide better security.
REFERENCES
[1] (2009) The Zigbee Alliance website [Online]. Available:
http://www.zigbee.org/
[2] chae, M.J., Yoo, H.S., Kim, J .R., and cho, M.Y., Bridge condition
Monitoring System using Wireless Network.
[3] Cirronet, ZMN2405/HP ZigbeeTM Module Developers Kit user manual,
Rev A 2007.
[4] D.maltoni, D.manio, A.K J oin & S.prabhakar, Hand Book of finger print
recognition, sprinager 2003.
[5] Prabhakar .S., Wang.J ., J oin, A.K., Pankanti.S., and Bolle, R.minutiae
verification & classification for finger print matching.
[6] Abutaleb and Kamal (1999). Abutaleb A.S. and Kamal M, A genetic
algorithm for the estimation of ridges in finger prints IEEE
truncation on image processing, vol.8, no.8, P.1134,1999.
No.
of Successful Unsuccessful
Accuracy

Person Identification Identification




30 29 01 96.7%


No.
of Successful Unsuccessful
Accuracy
Person
Identification
As Defined Identification




05 05 00 100%

Anda mungkin juga menyukai