phonelogo+234 8146561114 or +2347015391124

DESIGN AND IMPLEMENTATION OF A UNIVERSITY CAFETERIA TICKETING SYSTEM USING FINGERPRINTS

USER'S INSTRUCTIONS: The project work you are about to view is on "design and implementation of a university cafeteria ticketing system using fingerprints". Please, sit back and study the below research material carefully. This project topic "design and implementation of a university cafeteria ticketing system using fingerprints" have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this"design and implementation of a university cafeteria ticketing system using fingerprints".project research material is to reduce the stress of moving from one school library to another all in the name of searching for"design and implementation of a university cafeteria ticketing system using fingerprints".research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.


TITLE PAGE

DESIGN AND IMPLEMENTATION OF A UNIVERSITY CAFETERIA TICKETING SYSTEM USING FINGERPRINTS


BY

---
EE/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---

DECEMBER,2018



APPROVAL PAGE

This is to certify that the research work, "design and implementation of a university cafeteria ticketing system using fingerprints" by ---, Reg. No. EE/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.

By
---                                                     . ---
Supervisor                                                  Head of Department.
Signature……………….                           Signature……………….        

……………………………….
---
External Invigilator



DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.



ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.


PROJECT DESCRIPTION: This work "design and implementation of a university cafeteria ticketing system using fingerprints" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "design and implementation of a university cafeteria ticketing system using fingerprints" visible for everyone, then the complete material on"design and implementation of a university cafeteria ticketing system using fingerprints" is to be ordered for. Happy viewing!!!


ABSTRACT

This project is on the design and development of portable and reliable fingerprint based cafeteria ticketing system that can be used monitoring and booking of student meal in the school cafeteria. It will eliminate the problems of manual method. The new system utilizes a portable fingerprint scanner as the input to acquire fingerprint images and notebook personal computer as the mobile terminal for the processing of the images and booking of meal ticket. It also include database to store student’s information and meal records. Visual Basic.net was used as the programming language to develop this system. The system was tested and found working correctly.


TABLE OF CONTENTS
Title                                                                                                                               Pages
Cover page
Title page                                                                                                                        i
Certification                                                                                                                    ii
Dedication                                                                                                                      iii
Acknowledgment                                                                                                           iv
Abstract                                                                                                                          v
Table of Contents                                                                                                           vi
List of Tables                                                                                                                   x
List of Figures                                                                                                                   x

CHAPTER ONE: INTRODUCTION

    1. BACKGROUND OF THE STUDY                                                                          1

1.2 STATEMENT OF THE PROBLEM                                                                          3
1.3 AIM AND OBJECTIVES                                                                                          4
1.4 SCOPE OF THE STUDY                                                                                                       4
1.5 LIMITATION OF THE STUDY                                                                                4
1.6 SIGNIFICANCE OF THE STUDY                                                                           5
1.7 OPERATIONAL DEFINITION OF TERMS                                                           6
CHAPTER TWO: LITERATURE REVIEW
2.1 WHAT IS BIOMETRICS                                                                                                        7
2.2 HISTORY OF BIOMETRICS                                                                                     9
2.3 TYPES OF BIOMETRIC DEVICES AVAILABLE                                                14
2.3.1 RETINA SCANNER                                                                                               15
2.3.2 IRIS SCANNER                                                                                                      17
2.3.3 FINGERPRINT SCANNER                                                                                    19
2.3.4 FACIAL BIOMETRICS                                                                                          22
2.3.5 VOICE RECOGNITION                                                                                         24
2.3.6 HAND PRINT PATTERNS                                                                                     24
2.3.7 DNA FINGERPRINT                                                                                              2
2.3.8 DEEP TISSUE ILLUMINATION                                                                           2
2.3.9 VOICE PRINT KEYSTROKE PATTERN                                                             26
2.4 APPLICATION AREAS OF BIOMETRICS                                                             27
2.5 RELATED STUDIES                                                                                                  31
2.6 SUMMARY OF REVIEW                                                                                          34
CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN
3.1 ANALYSIS OF THE EXISTING SYSTEM                                                             36
3.2 JUSTIFICATIONS OF THE NEW SYSTEM                                                           37
3.3 METHODOLOGY                                                                                                     37
3.4 DATA COLLECTION                                                                                               39
3.5 THE PROPOSED NEW SYSTEM                                                                            39
3.6 DATA STRUCTURE                                                                                                 44
CHAPTER FOUR: SYSTEM IMPLEMENTATION, TESTING AND INTEGRATION
4.1 CHOICE OF PROGRAMMING LANGUAGE                                                                   46
4.2 THE SYSTEM MAIN MENU IMPLEMENTATION                                              47
4.2.1 MAIN MENU                                                                                                          47
4.2.2 ADMIN LOGIN PAGE                                                                                                     48
4.2.3 CAFETERIA ATTENDANT  ACTIVATOR SETUP PAGE                               49
4.3 IMPLEMENTATION OF THE SUB-SYSTEM                                                       50
4.4 QUERY SUB-SYSTEM IMPLEMENTATION                                                       53
4.5 SYSTEM TESTING AND INTEGRATION                                                            54
4.6 TEST PLAN                                                                                                               54
4.7 TEST DATA                                                                                                               54

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 SUMMARY                                                                                                               55
5.2 RECOMMENDATION                                                                                             56
5.3 CONCLUSION                                                                                                         57
REFERENCES

 

 

 

 

 

 

 

LIST OF TABLES
TABLE 3.1 ADMINISTRATOR DATABASE                                                                    44
TABLE 3.2 COURSE DATABASE                                                                                     44
TABLE 3.3 LECTURER DATABASE                                                                                45
TABLE 3.4 STUDENT DATABASE                                                                                   45

LIST OF FIGURES
FIG 2.1 STRUCTURE OF IRIS                                                                                            17
FIG 2.2 IRIS SCANNER                                                                                                      18
FIG 2.3 FINGERPRINT PATTERNS                                                                                  20
FIG 2.4 SCANNERS                                                                                                             21
FIG 3.1 TOP DOWN DESIGN APPROACH FOR THE SYSTEM                                               38
FIG 3.2 FLOW CHART FOR USER START PAGE                                                          39
FIG 3.3 FLOW CHART FOR ADMIN SUB PROGRAM                                                  41
FIG 3.4 FLOW CHART FOR STUDENT SUB PROGRAM                                              43
FIG 4.1 USER START PAGE                                                                                               48
FIG 4.2 ADMIN LOGIN IMPLEMENTATION                                                                 49
FIG 4.3 CAFETERIA ATTENDANT SETUP                                                                     50
FIG 4.4 ADMINISTRATOR SUB-MENU                                                                          51
FIG 4.5 STUDENT ENROLLMENT SUBMENU                                                               52
FIG 4.6 CAFETERIA ATTENDANT ACTIVATOR                                                          52
FIG 4.7 STUDENT FINGERPRINT VERIFIED                                                                53

 

CHAPTER ONE
INTRODUCTION

    1. Background of the Study

Meal booking method of students in institution can be rigorous using the conventional method of meal card and student I.D system method. Every academic institution poses some standards concerning how meal ticket is to be confirmed for student in university in the cafeteria. That is why keeping the accurate record of cafeteria ticketing is very important.  The approach of using paper meal ticket or student I.D card system to book for students’ meal has been in use for years. There are so many bottlenecks with the conventional method, one of such problem is the difficulty for the management to compute the percentage of student in school that need food and frequently modify their information. Also in institution, tracking and monitoring student meal could be tedious task, time consuming and as well prone to errors. As an alternative to traditional manual ticketing process by students in university cafeteria, biometrics characteristics can be used for authenticating students.
Fingerprint systems benefits school lunch line by promoting smooth flow and cashless transactions. Students are usually in a hurry and have limited time to get their lunch. The integration of fingerprint biometrics in school lunch line will help to provide speedy service to hungry students and ensure that every student gets lunch irrespective of whether they remember their card or PIN. Their fingerprint is the password now.
This research will focus on developing Fingerprint based Biometric university cafeteria ticketing System.  The fingerprint Biometrics is adopted in this research work for the fact it is one of the most successful applications of biometric technology. In the manual ticketing processes, where the school management  give a meal paper to student for ticketing as a form of confirming their presence for a particular meal, falsification in student attendance mostly occur a situation where by a student can sign on behalf of his or her colleague as being present in the cafeteria when not true can be so difficult to prevent from happening especially for university that have numerous student where row count can takes longer time according to International Journal of Computer Science and Network Security (2009).
The trending concern in this modern world is regarding national security, identifying theft as well as on-line terrorism. Researcher refers to Biometric as a solution for detecting user’s identity and security challenges emanating in this modern day. Biometric identification is any automatically measurable, robust and distinctive physical characteristic or personal trait that can be used to identify an individual or verify the claimed identify of an individual. Biometric science utilizes the measurements of a person’s behavioral characteristics (keyboard strokes, mouse movement) or biological characteristics (fingerprint, iris, nose, eyes, jaw, voice pattern, etc). It is the features captures that is being transformed digitally into a template. The recognition software can then be used to discover an individual as the person they claim to be. Fingerprint recognition is the most common biometric method adopted in identification of a person (Ismail 2009).
Biometric is a field of technology that uses automated methods for identifying and verifying a person based on physiological and behavioral traits. Because some parts of the human body is use in biometrics, the issue of getting lost is not possible and for password to be easily guess can be easily avoided.   Also, utilizing biometrics in most cases can be said to be more efficient when speed is considered and convenient than employing password and ID cards method.
Using a particular person fingerprint as a form of authentication is just like using natural physical data as a password. The benefit of using biometric authentication is that it is absolutely distinct to each person. There are no two different individuals with the same fingerprint, it is difficult and impossible for one another to have the same fingerprint, and fingerprints from different people can never be the same. Also, a fingerprint can never be guess by a criminal, such as a password which imposter can easily predict using a user birth date or any other common password. Infiltration is very hard to come by due to the fact that criminal will not be able to snoop around to steal user password when using ATM with the 4-digit pass code (Valasquez 2013).

Fingerprint can be categorize as one of the most mature biometric traits and is accepted in courts of law as a legitimate proof of evidence. Fingerprints are adopted in forensic analysis globally in investigations of criminal. More recently, there are growing numbers of individuals and commercial users that are currently using or strongly putting into consideration of using fingerprint-based identification for no any other reason other than the matching performance biometric technology has demonstrated as well as a better understanding of fingerprints.
Although there are so many positive impacts for using biometric authentication, however, unlike username and password, biometric data is a physical feature of a person that is fixed and cannot be change. If a person could have access to adequate scan another person fingerprint, that scan has the capability to trick the Touch ID system. In that case, the fingerprint features of a person can’t be change consequently a criminal can’t be prevented from having access to your personal information or files. As fingerprint scanning becomes more widely accepted anywhere anytime, this may become a substantial challenge. A criminal can have access to different accounts because with one fingerprint, a criminal may have access to multiple accounts that implemented authentication using fingerprint.

1.2 Statement of the Problem
The traditional system is still mostly used in most university cafeteria today where the school management will give students meal ticket sheet of paper containing list of student’s name to sign or in some cases, the student will be the ones to write their names, student id and matriculation number to indicate their presence for a particular meal. Falsification in student ticketing does occur rampantly in the traditional method. For example, another student can easily book meal on behalf of another student that is absent or out of the school premises. In other to prevent this problem, it is necessary to develop an Authentication System for Students using fingerprint Biometric recognition that will be employed to track and keep the cafeteria ticketing of every student in a particular meal section. Fingerprint is unique feature for everyone compare to using barcode in smart cards. Therefore, this system designed in this project work is not based on the existing barcode system. The Fingerprint based university cafeteria ticketing designed in this research work for student is a more secure platform where students mark their cafeteria ticketing with their fingerprint.

1.3 Aim and Objectives
The aim of the study is to design and develop a reliable, scalable and cost effective Fingerprint university cafeteria ticketing system. This is to be achieved by the following objectives:

  1. To carry out the analysis of manual processes involved in university meal ticketing.
  2. To design a new system for the (i) above and
  3. To implement the design using Microsoft Visual Basic.net.

1.4 Scope of the Study
The scope of this work is to develop a Fingerprint Based university cafeteria ticketing System that will improve how meal delivering to student is done by using fingerprint as a form authentication for proof of attending meal section. The system will be a window based application developed using Microsoft Visual Basic.net as the preferred programming language for building the user interface and Microsoft SQL Server for database design. It does not cover other aspects of biometric.

1.5 Limitations of the Study

The efficiency of the scanner can be reduced due to the roughages in the captured images which are often caused by worn-out or cut or dirt’s found on fingerprint. Therefore, there is every possibility that enrolled users can be rejected by the system. Also the scanner or sensor cannot distinguish between a real and an artificial finger; therefore it is possible to fool the scanner. In addition, if an enrolled fingerprint is been duplicated or spoof, it is not possible to change fingerprint as in the case of password because user finger biometric. Finally, since the system will be design using Visual Basic.net, it won’t be able to run on any other platforms other than Microsoft Window operating system.

1.6 Significance of the Study

There are many areas within a school where students are required to identify themselves in order to access services. These areas include the cafeteria, library, class attendance etc. The commonly used identification methods such as visual identification, ID cards, PINs, card punches etc. pose a lot of challenges and have certain limitations. These methods are unable to provide accurate identification and the administrators have to spend time and resources in correcting errors.
For example, a card based solution can result in lunch line delays and proxy attendance. If a student forgets to carry their card they are unable to access lunch. A password is also not a solution since students will be required to remember the password. This is an additional burden and does not go well with students. Moreover, cards can be stolen, lost or damaged. A bully could steal a student’s card and take his or her lunch. If a card gets lost or damaged, then additional expenses need to be incurred for replacing the card.
Visual identification may not be suitable for large group of students and can lead to security concerns and wrong attendance reporting. It cannot solve the issues of proxy attendance and other loopholes such as bullies eating lunch of other students by using their cards or passwords. A biometric system can effectively eliminate these problems and streamline school operations by eliminating the need to track and reconcile attendance data.

1.7 Operational Definition of Terms

Biometrics is physiological or behavioral characteristics unique to individuals, this Include Fingerprint, hand geometry, handwriting, iris, retinal, vein and voice.
PIN personal identification number.
Biometric Verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits.
Scanner a device for examining, reading, or monitoring something in particular..
Fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern.
Rapid Application Development is a concept that products can be developed faster and of higher quality.
Authentication is the process of determining whether someone or something is, in fact, who or what it declared to be.
Use Case Diagram is used to show scenarios used for understanding the requirements of the system and to show the interaction between the user and the system.
Flow chart or Activity Diagram is a Unified Modeling Language that represents the graphical workflows of stepwise activities and actions with support for iteration, choice and concurrency.


CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "design and implementation of a university cafeteria ticketing system using fingerprints" is also available. Order full work to download. Chapter two of "design and implementation of a university cafeteria ticketing system using fingerprints" consists of the literature review. In this chapter all the related work on "design and implementation of a university cafeteria ticketing system using fingerprints" was reviewed.

CHAPTER THREE: The complete chapter three of "design and implementation of a university cafeteria ticketing system using fingerprints" is available. Order full work to download. Chapter three of "design and implementation of a university cafeteria ticketing system using fingerprints" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.

CHAPTER FOUR: The complete chapter four of "design and implementation of a university cafeteria ticketing system using fingerprints" is available. Order full work to download. Chapter four of "design and implementation of a university cafeteria ticketing system using fingerprints" consists of all the test conducted during the work and the result gotten after the whole work

CHAPTER FIVE: The complete chapter five of design and construction of a "design and implementation of a university cafeteria ticketing system using fingerprints" is available. Order full work to download. Chapter five of "design and implementation of a university cafeteria ticketing system using fingerprints" consist of conclusion, recommendation and references.

 

CLICK HERE FOR MORE RELATED TOPICS/MATERIAL


To "DOWNLOAD" the complete material on this particular topic above click "HERE"

Do you want our Bank Accounts? please click HERE

To view other related topics click HERE

To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE

Do you want us to research your new topic? if yes, click "HERE"

Do you have any question concerning our post/services? click HERE for answers to your questions


For more information contact us through any of the following means:

Mobile No phonelogo:+2348146561114 or +2347015391124 [Mr. Innocent]

Email address emailus:engr4project@gmail.com

Watsapp No whatsapp.html :+2348146561114


COUNTRIES THAT FOUND OUR SERVICES USEFUL

Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124

Watsapp Nowhatsapp.html
:+2348146561114


E
mail Address emailus:engr4project@gmail.com


FOLLOW / VISIT US VIA:

tweeter instagram.html pinterestusfacebook logo

Order Full Material(s)
Download Full Material(s)
Bank Accounts

Contact us

Hire a writer

Order/learn construction


View other related topics

Vrequently asked questions(FAQ)
View more related topics and download more material
Format = microsoft word

Chapters = 1-5 chapters


Price: N3,000.
»Accountancy (AC) project
» Agric engineering project topics
» Business admin and management project
» Banking and finance project
» Civil engineering project
» Co-operative economics and management project
» Computer science project
» Community Health Project
» Electrical/electronic/telecom/ power project
» Estate management project
» Education
» Human Kinetics & Health Education Project
» Industrial safety and environmental (ISET) project
» Mass communication project
» Mechanical engineering (ME) project
» Medical And Health Science Project
» Office technology and management (O.T.M) project
» Public administration (PA) project
» Public Health Education Project Topics
» Paramedic Project Topics
» Industrial Physics/Physics Electronics Project
» Science laboratory technology (microbiology option) project
» Agricultural science and engineering seminar
» Building engineering seminar topics/materials
» Civil engineering seminar topics
» Computer science seminar topics
» Environmental seminar topics
» Electrical/electronic/telecom/ power seminar
» Mechanical engineering seminar
» Physics / industrial physics/physics electronics seminar topics/materials