CHAPTER I
The Problem and Its Setting
1.1 INTRODUCTION
Robert Bosch once said, I dont pay good wages because I have a lot of
money, I have a lot of money because I pay good wages. There are lots of reason for the
employer to end up in legal trouble but the most common is the failure to pay the workers
what they owed. In order to avoid that, business owners need to make sure they are
keeping careful track of the employees attendance.
According to Oloyede, Adedoyin and Adewole (2013), many industries are
experiencing technological advancement and changes in the mode in which they carry out
their business processes. With the rise of globalization, it is becoming essential to find an
easier and more effective system to help an organization or company improve their
employees productivity. In spite of this matter, there are some business establishments
who still uses the old- fashioned method of manual process of recording employees
attendance. Staff attendance management system is an easy way to keep track of the
attendance of the staffs within an organization. It covers the requirements of the
personnel department in terms of day to day monitoring of staffs, calculation of overtime
and transfer of relevant information to the payroll system and manpower analysis. Hence,
the staff attendance is an important issue every organization must take into consideration
in order to be productive (Kadry and Smaili, 2010). In addition, according to Mycroft
(2011), a report stated that staff productivity is greatly affected by the attendance of the
staff (as cited in Computer Engineering and Intelligent Systems, Vol. 5, No. 2, 2014).
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
payroll system still need manual input of the employees attendance which makes the
process time consuming.
1.2.3 Attendance Monitoring System
An attendance management system is the organized way of managing daily
time records or presence in a job setting to reduce losses due to employees downtime.
The attendance system has traditionally been approached using time clocks and
timesheets, but today, attendance management goes beyond this to provide a work
environment which motivates and maximizes employee attendance.
Attendance management is a major part of todays human resource systems;
take organization towards better human resource practice, systems and excellence, hence
regular attendance and punctuality are expected of all employees or candidates in a work
setting. Unsatisfactory attendance caused by unscheduled absences and tardiness that
cause a disruption in work, affects productivity, and creates morale problems when
workloads are shifted to other employees. (C.O, A., A.O, A. , O.O, O. , & E.O, I. ,2013)
1.2.4. Types of Attendance Management System
Attendance Management falls into two categories namely; Conventional and
Automated methods. Conventional methods is the traditional approached on getting the
attendance. It includes time sheets, attendance register and time clock. Automated
methods is includes the application of emerging technologies used in identification such
as Barcodes, Magnetic Stripes, Radio Frequency Identification (RFID) and Biometrics.
The barcode attendance system requires that every employee is issued a
badge/card in which there is a barcode. In order to check into or out of the company, the
badge/card is swapped on the time clock, and the data is captured by the clock. In the
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
magnetic stripe attendance system, data is encoded in the magnetic stripe of the employee
card. When the card, is swiped through the employee time clock, the information in the
cards magnetic stripe is recorded by the time clock. This system reads one card at a time
and also requires contact with the reader. Radio-frequency identification (RFID) is a
technology that uses radio waves to transfer data from an electronic tag, called RFID tag
or label, attached to an object, through a reader for the purpose of identifying and
tracking the object. The ID cards of the employees is embedded with RFID tag which is
read by a reader. This RFID system is interfaced to a database through a computer. Each
employee uses an RFID card and the reader records the data when the employee enters or
exits. In biometric Attendance system, there is attendance software that is paired with a
time clock for employees which uses biometric technology for authentication purposes.
When these systems are in use, the employees can use their biometric data such as finger
prints for clocking in and clocking out. This method has the great benefit that the entire
process is easy as well as quick. Other advantages include elimination of the cost
previously incurred in getting the employees cards. (C.O, A., A.O, A., O.O, O., & E.O, I.,
2013)
1.2.5 Comparison between RFID and Fingerprint Scanner
The main difference between a biometric attendance system and an RFID
based attendance system is that the RFID based attendance system uses tags, which can
be exchanged between employees, while a biometric attendance system uses organic
matter that cannot be exchanged. This makes stealing time from a place of work much
more difficult because it removes the chances that buddy punching will work. Normal
systems use employee identification numbers or punch cards to record when an employee
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
enters or leaves an area, RFID based attendance systems use tags which can be
exchanged among employees, but fingerprints or retinas are not able to be shared.
Another difference is that the biometric attendance system requires the
employee to actively scan his or her fingerprint in order for the system to register that he
or she is there. With an RFID based attendance system, the tags will be scanned
immediately when the person enters an area.
Common applications that are well suited for RFID system implementations
includes Inventory Management, Product life cycle management, Electronic toll
collection, Automatic vehicle identification, Car parking and access control, etc.
Common RFID vulnerabilities include RFID data skimming, tag killing, and
susceptibility to a DoS attack.
These vulnerabilities are described below:
RFID Card Skimming
One of the biggest vulnerabilities of RFID systems is the fact that anyone with
access to a suitable reader can capture the information stored on the ID. This act of
surreptitiously grabbing personal information from a victims financial transaction card or
any RFID enabled ID is known as electronic pick-pocketing.
Tag Killing
RFID systems that support read/write memory are susceptible to unauthorized
tag killings from large distances using specially configured readers. This allows the
attacker to alter the tag memory content without the owners knowledge.
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
monitoring.
To integrate the attendance monitoring system with the payroll system.
To design an appropriate interface to integrate with an existing application.
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
The study will focused on the design and development of the attendance
fingerprint scanning.
Deductions on salaries will also be one of the functions of the system.
Examples are loan deductions, late and absences, etc.
The administrator is the only one capable of updating and accessing the
systems database.
Computation of tax will not be part of the systems function.
Releasing of salaries.
CHAPTER II
Conceptual Framework
10
11
uniquely the biometric system will be able to recognize each user among groups of
users. For instance, the DNA of each person is unique and it is impossible to replicate.
Universality is the secondary criteria for the biometric security. This parameter
indicates requirements for unique characteristics of each person in the world, which
cannot be replicated. For example, retinal and iris are characteristics will satisfy this
requirement. Thirdly, a permanence parameter is required for every single
characteristic or trait which is recorded in the database of the system and needs to be
constant for a certain period of time period. This parameter will mostly be affected by
the age of the user. Following the permanence parameter is the collectability. The
collectability parameter requires the collection of each characteristic and trait by the
system in order to verify their identification. Then, performance is the next parameter
for the system which outlines how well the security system works. The accuracy and
robustness are main factors for the biometric security system. These factors will
decide the performance of the biometric security system. The acceptability parameter
will choose fields in which biometric technologies are acceptable. Finally,
circumvention will decide how easily each characteristic and trait provided by the
user can lead to failure during the verification process. DNA is believed to be the
most difficult characteristic leading to the failure of the verification process [Maestre,
2009].
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
12
Figure 2.1.1 - Basic Criteria for Biometrics Security System [Rahultech, 2010]
Application Fields for Biometrics Technology
Physical access control refers to the process that requires the physical
characteristics. On the other hand, logical access control is the schemes, procedures
and techniques which are used in the system. The difference between logical and
physical access control is really small and it can be confused easily because physical
access control is controlled by logical access control.
2.1-Physical access control
Physical access control covers identity authentication processes which require
users
as: hospitals, police stations, and the military. The most common use for the physical
access control application is the access devices which are applied at doors or
computers. This application is confidential and important and is entrusted with a high
level of security. The physical access control reduces the risk of human problems. It
also covers the aspect of data loss in the system. The system helps to eliminate the
process of identifying long and complex passcodes with different processes. Physical
access control is not only effective and efficient but also safe, secure and profitable in
the workplace[O'Neill, 2011].
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
13
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
14
To capture the surface of the fingerprint for verification during the identification
of users, new technologies are designed with tools such as: optical and ultrasound.
There are two main algorithms which are used to recognize fingerprints: minutiae
matching and pattern matching.
Minutiae matching will compare the details of the extract minutiae to identify
the difference between one users fingerprint as compared to others. When
users register with the system, they will record images of minutiae location
and direction on finger surface. When users use fingerprint recognition system
to verify their identification, a minutiae image is brought out and compared
with the one which provided at the time of access.[Biometricsnewportal
2011].
Pattern matching will compare all the surfaces of the finger instead of one
particular point. It will concentrate more in thickness, curvature and density of
finger's surface. The image of the fingers surface for this method will contain
the area around a minutiae point, areas with low curvature radius or areas with
unusual combinations of ridges [Biometricsnewportal 2011].
There are several benefits of using fingerprint recognition systems. This system is
easy to use and install. It requires cheap equipment which generally has low power
consumption. However, there are some disadvantages in this system. If the surface of
the finger gets damaged and/or has one or more marks on it, identification becomes
increasingly hard. Furthermore, the system requires the users' finger surface to have a
point of minutiae or pattern in order to have matching images. This will be a
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
15
limitation factor for the security of the algorithm. Fingerprint security system is used
widely in different applications such as: cell phones, laptops, USB flash drives and
others devices. It is also used in judicial systems in order to record users' information
and verify one person's identity [Biometrics new portal 2011].
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
16
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
17
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
18
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
19
APPENDIX A
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation
20
Payroll System with Fingerprint Based Attendance Monitoring for Controlgear Electric Corporation