Juniper Publishers - Fingerprint Employee Clocking System

 

Trends in Technical & Scientific Research


Abstract

A system that is used for time-clocking, creating an all-inclusive electronic record of the process involved in how employees logs in and out of work on working days are referred to as a clocking system. The system has an additional feature of calculating an accurate payroll system, which in turn, can lead to a precise amount the company spent on labour. In essence, an employee clocking system is a process of monitoring the attendance, presence and truancy of employees in a work environment. In this project, the University of Energy and Natural Resources was used as a case study. The existing method of recording the presence of staff to work is by a manual process where employees record their attendance on a paper. The challenge of the existing employee attendance system is the difficulty in tracing old records, safekeeping, lack of confidentiality and the chances of other employees logging in for their truant colleagues. This paper sought to introduce a biometric employee clocking system to help overcome the high level of truancy in workplaces. The results of the experiment we conducted indicate a high accuracy in our system with TAR value of 99.7%. This accuracy rate is much better than the results other researchers obtained. The good accuracy implies that employees will have difficulty to check-in or out for their truant colleagues. The high accuracy results will help improved security of attendance, improved employee performance, ensures fast and easy retrieval of data, easy monitoring of staff, and prevent impersonation in the attendance logs.

Keywords: Control mechanisms; Digitization; Biometric systems; Fingerprint scanner

Introduction

Employee Clocking System (ECS) is an electronic process of monitoring the attendance in the work environment to minimize economic, time, productivity and loss revenue due to employee absenteeism, lateness and truancy. Attendance monitoring and evaluation have traditionally been approached using time clocks and timesheets (the manual way of taking employee attendance). However, attendance monitoring and evaluation goes beyond only attendance, but it ensures efficient time utilization which maximizes and motivates employee attendance. Employee Clocking System is the easiest way to keep track of employees’ attendance and productivity in industrial organization, business organizations and volunteer groups. Employee Clocking System is useful in terms of workforce analysis, day-to-day monitoring of attendance, maintaining statutory registers, leave records, calculation of overtime and transferring information to the payroll system [1].

The existing employees’ attendance system requires the employees to manually log the attendance sheet every time they come to the office, and when they close [2]. Typically, such a system lacks automation because it is not an electronic system and might generate a number of problems. These problems may include the time unnecessarily consumed by the workers to find and sign their name on the attendance sheet and the fact that the attendance sheet may get misplaced or kept away from employees due to suspected wrong activities. The development and implementation of this system will help organizations to manage their employees’ attendance systematically. The system has a database that contains employee’s information, and it will help the admin to manipulate data and update the database [2,3].

In today’s business transactions, it is always expected that the clients authenticate themselves for services rendered to them with control mechanisms such as identity card, ATM card, driving license, health card and so on. Carrying different cards and remembering passwords for different services is a complex issue for individuals and organizations [4]. Secure and effective identity and access control system plays a vital role in the successful deployment of an Employee Clocking System. To make the identification and access control mechanism safe and reliable for authentication, the Employee Clocking Systems must have integrated biometric data as an added feature. The move towards the digital era is being accelerated every hour globally to meet the evolving digitization and smart system development. Biometrics technologies verify identity through characteristics such as fingerprints, faces, iris, retinal patterns, palm prints, voice, and hand-written signatures and so on. This biometric authentication present fingerprint as the most common and popular biometric used in automatic personal identification [5,6].

Literature Review

Theories, as well as models, provide a basis that guides research and interpretation of research results [7]. In research, theories are formulated to assist in explaining, predicting, and understanding phenomena. In biometric systems, according to [8,9], staff attendance is taken electronically with the help of a Biometric fingerprint system, and all the records saved for subsequent operations. [10,11] argued vehemently that, biometric systems are an authentication method. As suggested in [7,12,13], biometric systems identify people by recognizing one or several physical characteristics. It is one of the future main solutions for providing authentication. Fingerprints are considered to be the best and fastest method for biometric identification because they are secure to use, unique for every person and do not change in one’s lifetime [11,12]. Therefore, this study is concerned with the implementation of a biometric fingerprint authentication system which is an automated method of verifying a match between two human fingerprints for validating identity.

Employee clocking system using fingerprint biometric identification technique employs an automated system to calculate staff attendance and do further calculations of daily and monthly attendance summary in order to reduce human errors during calculations. In essence, our system can be employed in curbing the problems of ghost names (people whose names are on the payroll and receiving pay yet are not delivering any services to the institution), the lateness of workers to their various posts, impersonation and missing working periods in any institution. The system will also improve the productivity of any institution if properly implemented.

Biometric Resource-Based Theory

The study was anchored in the Resource-Based Theory (RBT). There is evidence from research that supports the RBT [14] that argues that organizations compete in a dynamic and changing business environment. Firms can attain and achieve a sustainable competitive advantage through their employees, according to [12]. This can be realized when organizations have a pool of human resources that cannot be imitated or substituted by their rivals or competitors.

The RBT as a foundation of competitive advantage is embedded in the utilization of a bundle of valuable resources that are at the disposal of the firm. It is important that firms have to identify the major potential resources. These resources should be valuable, rare inimitable and non-substitutable among the competitors of the firm [11] in the field that they operate in. Firms’ resources must be valuable in order to make firms adopt value-creating strategies. The firm should outperform its competitors or minimize the weaknesses that it may have [12]. The RBT as a foundation for the competitive advantage of firms’ is embedded mainly in the use of tangible or intangible resources that firms may have [3,15]. The RBT looks at the firm’s internal operational environment as an important driver that can create a competitive advantage for the firm. The RBT assumes that an organization is made up of unique capabilities and resources as a foundation for a firm’s strategy to compete and be profitable and also have a competitive advantage over its competitors. According to Hitt, Ireland and [10], firms can use the resources at their disposal and capabilities to enhance their operational performance. In order to be competitive, firms should ensure that they carry out their activities in an integrated approach. Firms should also adopt strategies that distinguish them from other firms in the areas that they operate in. As a result, organizations need to explore their frameworks if they envisage remaining relevant in the context of the competitive global environment. Organizations are striving to achieve a competitive advantage, and they should put into consideration that true competitive advantage requires the resources of an organization to be valuable, rare, inimitable and non-substitutable as pointed out by [5,9].The key aspect of the Resource-Based Theory is that firms have to identify their main resources that can make the firms to achieve and sustain a competitive advantage against their competitors [11]. A resource has to be valuable to organizations like UENR, Sunyani is expected to make optimum use of time and the human resources that they have by ensuring that employees work fully for the scheduled time to enable UENR to enhance its operational performance in the delivery of administrative services.

Computerized Biometric Employee Clocking System and Operational Performance

When computerized biometric employee clocking systems are being designed, it is important to ensure that physiological and behavioural features are taken into consideration [16]. The ultimate performance of the biometric system will depend on how well the physiological and behavioural features were considered in the biometric system design. The features that need to be considered include the uniqueness of individual users, permanence, acceptance, and hardness of the system and levels of fulfilment [13]. Biometrics systems help in effective attendance management which helps in increasing employee or workers’ productivity and generate time and overhead cost savings to enhance the organizations’ performance by utilizing computerized time management system to track employee time and attendance [8,13]. Attendance timing management helps in guiding our methods of managing working hours. The actions that are taken to enhance efficiency was based on the principle of time management [7].

Fingerprint Level 1 and Level 2 Features Enhancement to Improve Quality of Image

Fingerprint recognition is one of the exciting and complex image processing problems, which requires a constant and continuous contribution to new research from the research community. Even though the face recognition is automatic pattern recognition system and controlled by the computer, the performance of the system is directly dependent on the quality of the fingerprint images and the quality of the image capturing device [15]. Level 1 feature comprises of the orientation of the fingerprint, core-centre from which ridge ending and ridge pattern named and delta location-point on the friction ridge and distinction of finger versus palm. As shown in Figure 1, Level 1 Features’ examples include Simple Arch, Tented Arch, Right Loop, Left Loop, Composite Whorl, Concentric Whorl, Imploding Whorl, Press Whorl, Spiral Whorl, Peacock’s- Eye Whorl and Variant Whorl [17]. Loop pattern Ridges enters from either side of the impression or pattern, re-curves or touches an imaginary line drawn from delta to the core and terminates on the same side from where it is originated. In Arch, pattern ridges start from one side of the fingerprint pattern to another side without doing backwards turn. Whorl pattern consists of series of circles which starts from an arbitrary point and ends at the same point [7,11,12], with only Level 1 features, fingerprint recognition systems neither recognize the image nor identify or verify the image [10]. Level 1 feature is mainly used for classification, verification, filtering, and enhancement purpose.The primary purpose of Level 1 features- ridge pattern or flow and orientation in Figure 1 above, are mainly used for image enhancement and orientation purpose, which will improve the quality of fingerprints. If the image contains noisy regions, it is difficult to define the orientation of the image. Image enhancement techniques are essential or necessary because the image captured through a sensor or optical device is not assured quality [5,18]. Fingerprint image enhancement is technically done by improving the quality of ride pattern or increasing the consistency of ridge orientation, which means level 1 feature, is exposed and analyzed. Ridge ending and ridge bifurcation or minutiae points are level 2 features. Still, some other features like line unit, line fragment, eye, and hook also can be extracted and studied, which are referred to as low-level fingerprint features [19].

Methodology The research was localized at the UENR campus, as a case study. A web application was designed and installed on three computers. Each computer had a fingerprint scanner device attached to the computer to receive or reject fingerprints images. In this study, 1000 participants (population) were selected for the fingerprint experiment. The participants included students, teaching and non-teaching staff. The design phase of the employee clocking system integrated the biometric fingerprint scanner to a web application [20,21]. The web application is a common platform for all the fingerprint devices which connect to a single database [22,23]. It involved dividing the whole system into modules and defining the relationship among the constituent modules. The topdown design approach was employed, which involved dividing the system into subsystems or modules, and each subsystem is further divided into even smaller subs. This process of division is repeated until each module is sufficiently small enough to be conveniently coded as an independent entity that performs a clearly defined operation. The population of the study A total population of 1,000 employees and students at UENR were selected randomly to participate in the biometric fingerprint experiment. The distribution of the population has been represented in Table 1.

 

Sampling Procedure and Sample Size The sampling process has been divided into two phases. The first phase randomly selected 500 students. The system is envisaged to be used in the classroom to monitor students’ class attendance. The second phase was a careful selection of teaching and non-teaching staff. In all these phases, the availability of the participants for the experiment was taken into consideration. Table 1 represents the sample size for the research. The sample size has been calculated through Slovin’s formula [17] by using a confidence level of 85%.

 

In the Slovin’s formula, N is the total population, e is the error of tolerance, and n is the sample size. The total population consists of 7,200 participants selected from the University. With the help of Slovin’s formula, 1,000 sample size has been calculated to conform to the population segmentation with a response rate of 98%.

 

Research Design and Analysis The study has been designed to improve employee attendance at the universities and other related organizations. The employee clocking system comprises of a database, web application [20] and the finger. The fingerprint’s Software Development Kit (SDK) we used to design the web application, and the database [22] includes JavaScript, PHP, MySQL and C#. The analysis of the result was done by using SPSS software and M.S. Excel and visual studio. Values from the tables generated by the SPSS were also tested in Excel using formulas. The system [24,25] consists of the attendance software installed on an HP 630 Laptop with 64-bit Operating System (Windows 10), 1 Terabyte Hard disk, 16 Gigabytes RAM and 4 Gigahertz (Intel Pentium Processor) and a fingerprint scanner. The developed application was installed on three computers and the fingerprint scanner as well, to communicate with the application software. The computer has been labelled System 1, System 2 and System 3. The developed system was tested, and every bug detected was corrected for system worked perfectly. Flowchart of the Employee Clocking System The flowchart presented in Figure 3 shows the visual representation of the sequence of steps and decisions needed to perform a process involved in the ECS. Each step in the sequence is noted within a diagram shape. Connecting lines and directional arrows link steps. This allows readers to view the flowchart and logically follow the process from beginning to end. The presented ECS flowchart is a robust algorithm with proper design and construction, which communicates the steps in the ECS processes very effectively and efficiently.

 

Program’s Structure Analyses and GUI Construction The web application and database [21-23] were developed and implemented in a working environment to enable the users to communicate with the database through the fingerprint scanner. Graphical User Interface (GUI) of the web application was built up to facilitate the collection of biometric features of the participants. The GUI consists of username, age, time in, time out, among other numbers of controls (textboxes, combo-boxes, button, etc.). The list of all properties and methods for all controls which allowed the system to communicate with a fingerprint scanner was the Application Programming Interface (API). A set of controls was used to reach the desired purpose, the functionality of the application, including Labels, Text boxes, Combo Boxes, Data Grid, Buttons, Group Boxes, Panels, Tab controls, etc. All of these controls were available in the application and were fitted to the corresponding forms, which were to be filled by the participants. Windows Forms text boxes are used to get input from the user or to display text. The TextBox control was generally used for editable text, although it can also be made read-only. Text boxes can display multiple lines, wrap text to the size of the control, and add basic formatting. The Windows Forms ComboBox control was used to display data in a drop-down combo box. By default, the ComboBox control appears in two parts: the top part is a text box that allows the user to type a list item. It can be noticed that almost all of the controls are grouped and placed on a special field (platform) and can switch from one group to another by clicking on the responding titles. ECS Performation Evaluation Process The employee clocking system requires an employee to establish his or her identity in the system in the first instance. This process is called enrollment; the employee has to present his or her fingers for imaging or scanning. The captured biometrics was processed by the ECS and encryption algorithms. A biometric template was generated as a result of processing, which was stored in a database and associated with identity data of that person. This procedure is part of the enrollment step. The next step is an authentication process where the employee verification of his or her identity, fingerprints are re-scanned, processed, and the new template is compared with the existing one in the database. The matching algorithm returns a match in case of acceptance or nomatch in case of rejection. Performance Evaluation Matrics of ECS One of the essential factors in the success of a biometric system is its accuracy. The performance is a measure of how well the system can correctly match the biometric information from the same person and avoid falsely checking biometric information from different people. The measurement of biometric accuracy is usually expressed as a percentage or proportion, with the data coming from simulations, laboratory experiments, or field trials. This study used both percentage and proportion in its performance evaluation. There are four principal measures of biometric accuracy: 

a) True Acceptance Rate (TAR) / True Match Rate (TMR): This measure represents the degree that the biometric system can match the biometric information from the same person correctly. Developers of biometric systems attempt to maximize this measure. 

b) False Acceptance Rate (FAR) / False Match Rate (FMR): This measure represents the degree or frequency where biometric information from one person is falsely reported to match the biometric data from another person. Developers attempt to minimize this measure. 

c) True Rejection Rate (TRR) / True Non-Match Rate (TNMR): This measure represents the frequency of cases when biometric information from one person is correctly not matched to any records in a database because that person is not in the database. Developers attempt to maximize this measure. 

d) False Rejection Rate (FRR) / False Non-Match Rate (FNMR): This measure represents the frequency of cases when biometric information is not matched against any records in a database when it should have been matched because the person is, in fact, in the database. 

 

Developers attempt to minimize this measure. Other standard biometric accuracy measurements essential for determining the final success of the ECS systems deployed in our work are: a) Failure-to-enrol rate (FTE): the proportion of the user population for whom the biometric system fails to capture or extract usable information from the biometric sample. b) Failure-to-acquire rate (FTA): the proportion of verification or identification attempts for which a biometric system is unable to capture a sample or locate an image or signal of sufficient quality. In addition to these error metrics, other performance metrics are used to ensure the operational use of biometric systems such as a) average enrollment time b) average verification time c) average and maximum template size d) the maximum amount of memory allocated Verification System Performance Metrics False rejection rate (FRR): the proportion of authentic users that are incorrectly denied. False acceptation rate (FAR): the proportion of impostors that are accepted by the biometric system. 

 

Equal Error Rate (EER): this error rate corresponds to the point at which the FAR and FRR cross (a compromise between FAR and FRR). It is usually used to evaluate and to compare biometric authentication systems. The more the EER is near to 0%, the better is the performance of the target system. Identification System Performance Metrics Identification rate (I.R.): The identification rate at rate r is defined as the proportion of identification transactions by users enrolled in the system in which the user’s correct identifier is among those returned. False-negative identification-error rate (FNIR): The proportion of identification transactions by users enrolled in the system in which the user’s correct identifier is not among those returned.

 

False-positive identification-error rate (FPIR): The proportion of identification transactions by users not enrolled in the system, where an identifier is returned. For an identification transaction consisting of one attempt against a database of size N.

 

Results and Discussion 

 

The three systems were connected to the same database, which simultaneously checks the fingerprint images with those in the databases. The testing of the system was done three weeks after the employee enrollment was done. The test ensured the all the participants had their biodata tested with the data stored in the database. After four days of testing, we realized that some of the participants had difficulty with the authentication process. To measure this anomaly, we used the performance evaluation matrix to determine the accuracy of the test. True Acceptance Rate, False Acceptance Rate, True Rejection Rate and False Rejection Rate were used to test the results. Other parameters, such as receiver operating characteristics and Cumulative match characteristic, were represented graphically to determine the performance of the system, which directly ensure that we achieve the objectives of this work. Receiver operating characteristic curve (ROC): the representation of the rate of FMR as well as FAR, thus, accepted impostor attempts on the x-axis against the corresponding rate of FNMR as well as FRR, thus, rejected genuine attempts on the y-axis plotted graphically as a function of the decision threshold. An illustration of a ROC curve has been presented in Figure 4.

 

Cumulative match characteristic curve (CMC): this is the graphical representation of results of the identification test, plotting rank values on the x-axis and the probability of correct identification at or below that rank on the y-axis. The CMC curves have been given in Figure 5. It is interesting to note that the study found a few errors (0.5% to 1.5%) caused by filing fingerprints with the wrong personal information than it found false acceptances by the biometric system. It also found a strong relationship between the quality of the fingerprint images stored at enrollment and the accuracy during verification comparisons. The best images had TAR=98% at FAR=0.01%, while the worse images had TAR=47% at FAR=0.01%. Finally, this study also showed the value of combining two fingerprints at verification time. When this was done, the accuracy increased to TAR=99.7% when FAR=0.01%.

 

Overall, fingerprint matching accuracy suggests that the performance was quite good with high-quality fingerprint images. Caution was appropriate; however, because the results were from a real-world experiment, the actual accuracy much better than the results obtained by [11,13,18]. Conclusion Introduction The truancy of employees has affected the productivity of many organizations. This situation has resulted in the loss of revenue, among many other adverse effects. This paper sought to introduce a biometric employee clocking system to help overcome the high level of truancy in workplaces. The results of the experiment we conducted indicate a high accuracy in our system with TAR value of 99.7%. This accuracy rate is much better than the results other researchers obtained. The implication of the good accuracy is that employees will have difficulty to check-in or out for their truant colleagues. The high accuracy results will help improved security of attendance, improved employee performance, ensures fast and easy retrieval of data, easy monitoring of staff, and prevent impersonation in the attendance logs. The automated process, with the aid of fingerprint biometrics, does not give room for impersonation. Once an employee has been enrolled, it cannot be verified by another person. 

 

To Know More About Trends in Technical and ScientificResearch Please click on:
https://juniperpublishers.com/ttsr/index.php

To Know More About Open Access Journals Please click on:
https://juniperpublishers.com/index.php 


Comments

Popular posts from this blog

Definitions of the Degree of the Potential Erosion Danger of the Mountain Brown Soil of Azerbaijan - Juniper Publishers