COMPUTER BASED EXAMINATION CANDIDATE ATTENDANCE AND VERIFICATION SYSTEM USING THUMB PRINT TECHNOLOGY

Diploma

  ABSTRACT

The project was centered on examination verification system for exam attendance, the current process of taking attendance  is being. operated manually and due this procedure numerous problem are been encountered, a designed was taken to computerized the manual process in order to solve this problem, this new system was designed using a vb.net tools .This tool were chosen because of its simplicity and it is the best tools for developing system applications. The new system uses a back end know  as MYSQL, it allow standard and structural storage of records.


INTRODUCTION

Francis (2009) Formal examination can rightly be defined as the assessment of a persons Performance, when confronted with a series of questions, problems, or tasks set him, in order to ascertain the amount of knowledge that he has acquired, the extent to which he is able to utilize it, or the quality and effectiveness of the skills he has developed (Bowman,2000).

The Jesuits introduced written examination into their schools in the 16th century. The Definitive Ratio Argue Institution Studiorum of 1599, which was not revised until 1932, contains a code of rules for the conduct of school examinations, which were held annually, and determined whether or not children were promoted to a higher class (Bowman 2000). During the 19th century, formal written examinations became regular in universities, schools, and other educational institutions. Examinations were also increasingly employed for the selection of recruits to the civil service, and the professions, and to posts in industry and commence (Balkisha,2011). Over the ages, standardized testing has been the most common methodology, yet the validity and credibility of the expanded range of contemporary assessment techniques have been called into question. There are two types of systems that help automatically establish the identity of a person:  Identification systems (Magazine,2011). In a verification system, a person desired to be identified submits an identity claim to the system, usually via a magnetic stripe card, login name, smart card, etc., and the system either rejects or accepts the submitted claim of identity (Am I who I claim I am?). In an identification system, the system establishes a subjects identity (or fails if the subject is not enrolled in the system data base) without the subjects having to claim an identity (Who am I?) (Bowman,2000). The topic of this paper is channel towards the development of examination impersonation elimination system and this system would strictly do with the unique feature of identification by means of finger print. A verification system based on fingerprints, and the terms verification, authentication, and identification are used in a loose sense and synonymously (Balkisha,2011). Accurate automatic personal identification is becoming more and more important to the operation of our increasingly electronically interconnected information society. Traditional automatic personal identification technologies to verify the identity of a person, which use Something that you know, such as a personal identification number (PIN), or something that you have, such as an identification (ID) card, key, etc., are no longer considered reliable enough to satisfy the security requirements of electronic transactions or school management system (Julian Ashbourn,2002). All of these techniques suffer from a common problem of inability to differentiate between an authorized person and an impostor  who  fraudulently acquires the access privilege of the authorized person. Biometrics  is  a  technology  that  (uniquely)  identifies  a  person  based  on  his physiological or behavioral characteristics (Leonidou,2002). It relies on something that you are to make personal identification and therefore can inherently differentiate between an authorized person and a fraudulent imposter (WaynePenny,2002). Although biometrics cannot be used to establish an absolute yes/no personal identification like some of the traditional technologies, it can be used to achieve a positive identification with a very high level of confidence, such as an error rate of 0.001%. Fingerprint technology using biometrics employ certain advantage of eradicating the problem of examination impersonation by allowing the measure of what you are to perform the security activities of student participation in the exams ( Samir Nanvati,2002).


AIM AND OBJECTIVES OF THE STUDY

The aim of this project is to design and develop a software program for student identification during the Examination with the use of finger print biometrics verification.

The objective of this study is as follows

To  create  a  system  that  is  capable  of  tracking impersonators  in  the examination system using the methodology of finger print biometrics.

1.     To design and construct biometric examination attendance system (Fingerprint).

2.      To ease student attendance in schools and to eliminate multiple attendance during exams periods

3.      To reduce rate of corruption in the educational sector and increase the rate of self-confidence on students.

4.      To demonstrate the possibility of computer technology in the satisfaction of human needs and also enforce strict security measures that ensure unregistered students do not write exams for other registered students.

5.      To add more security measures to the examination processes using finger print biometrics. 

6.      To eliminate the possibility of an imposter appearing in an exam.