Human resource management requires good documentation and good data processing. In workspaces such as offices and factories, employee salaries are determined by calculating attendance at each hour of work. Tracking and collecting attendance data for a large number of employees is a difficult thing to do. We need a secure system to facilitate the process of collecting and tracking presence data. We propose an attendance system that uses random quick response code (QR-codes) as one time password (OTP) to improve security. Employees are required to scan the QR-code within ten seconds before it is changed and randomized each time. The proposed attendance system facilitates data collection using employees’ smartphones and Mac-Address as unique identification numbers. The system is able to track employees’ arrival and departure times. We have implemented the system at the local university to collect lecturer attendance data then analyze its security and statistic in all scanning activities. The average time needed by a user to authenticate their presence in the system is 25.8877 seconds. The steps needed to sign in and out from the system are fewer than other previous researches. Those findings tell us that the approach is straightforward and more uncomplicated than other proposed methods. We conclude that randomized QR-code scanning is a relevant scheme to be applied in a secure attendance system.
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
This document presents a proposed two-factor authentication system for banking using QR codes and mobile phones. The system aims to improve security over traditional username and password authentication. It would generate a unique QR code for each login attempt, encoding a random string along with user details like their IMEI number. Users would scan the QR code with their registered mobile phone, with the phone number and IMEI number validating their identity. If the network is available, the encoded string would automatically login the user. Otherwise, a one-time password would be displayed to manually enter. The system seeks to establish a secure authentication method using mobile phones as trusted devices to both display login QR codes and verify user identities.
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
This document discusses securing e-medical documents using QR codes. It proposes a system where hospitals can upload medical records to the cloud with a patient ID. This ID is then converted to a QR code using the QRDroid function. Patients can then scan the QR code to download their medical document. The system aims to securely transmit medical data between hospitals and patients in a paperless manner using encrypted QR codes. It describes modules for user registration, database creation, QR code generation, scanning and file uploading/downloading. The goal is to provide a more secure, flexible and easy way for patients to access medical records electronically.
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
The document discusses a proposed smart attendance management system that integrates fingerprint biometric authentication with wireless connectivity. The system uses an Android mobile application to register users and record their attendance through fingerprint scans. It ensures employees are physically present at work by only allowing attendance checks when the mobile device is connected to the organization's wireless router. This prevents employees from falsely checking in without remaining on-site. The system aims to reduce costs compared to traditional fingerprint scanners while providing increased portability and convenience through the use of mobile phones and wireless technology.
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
This document discusses techniques for smart shopping using QR codes. It provides an overview of how QR codes can be generated and embedded with product information like name, number, location, and details. By scanning these QR codes using a smartphone camera and app, users can get product information on their phone. The document then reviews different techniques used for QR code generation and recognition, including REST protocols, multiplexing/demultiplexing algorithms, and QR filtering methods. It discusses how these techniques can enable features like adding items to a shopping cart, checking product offers, and digital payment. The techniques aim to make the shopping experience more convenient and efficient compared to traditional physical shopping.
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
Quick Response (QR) code are 2D (two dimension) matrix code. Here it is use for secure authentication. Now days Internet is most commonlyused medium to access the information. People are using many website like online banking,insurance,shopping etc. these websites requires the strong authentication. Using a pair of username and password authentication scheme is not secure enough since attacker can collect information from web phishing and computer infection. Various malware or intended programs attempt to capture the confidential information from personal computer. Therefore,secure authentication scheme is required. Many authentication methods have been developed such as one time password,SMS base OTP system and some using bio-metric feature. Some of these authentications are fail due to network problem and increases the cost. People are increasingly used in all life fields,especially with the wide spread of Android smart phones which are used as QR-code scanners
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
This document summarizes and compares previous research on secure offline micro-payment systems. It describes FRoDO, a new proposed system that features an identity element and coin element to enable secure offline payments. The identity element is embedded in the customer's device and is used to link a coin element to that specific device. This provides two-factor authentication. The coin element uses a physical unclonable function and regenerative keys to securely read and redeem digital coins. The document reviews related work on context-aware and software-based authentication solutions, offline micropayment schemes without trusted hardware, and approaches using hash-chaining in mobile networks. It concludes that FRoDO is the first solution able to provide fully secure offline
This document proposes a fingerprint-based secured voting system to help conduct free and fair elections. It aims to prevent rigging by uniquely identifying each voter through their fingerprints. The system has three main modules - Admin, Election, and Voter. The Admin can add candidates and voters, schedule elections, and calculate results. In the Election module, voters' fingerprints are verified before they can cast their vote. The Voter module allows casting and viewing candidates. The system ensures each voter can vote only once, prevents double voting, and has the potential to reduce illegal voting activities. It provides accurate results through a secure and transparent electronic voting process.
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...IRJET Journal
This document proposes an advanced attendance system using Android smartphones, biometric fingerprint authentication, and wireless networks.
It summarizes the limitations of existing manual and biometric-only systems, then describes a new system where the entire workplace functions as a WiFi hotspot. Employees must connect their Android smartphones to register attendance, and the system tracks how long they remain connected to determine time spent at the workplace. Fingerprint authentication is also used to ensure individual identity.
The system aims to more accurately track employee presence compared to existing solutions, by requiring both biometric login and wireless connection to the workplace network. It could benefit organizations by reducing attendance fraud while streamlining the process.
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
This document presents a proposed two-factor authentication system for banking using QR codes and mobile phones. The system aims to improve security over traditional username and password authentication. It would generate a unique QR code for each login attempt, encoding a random string along with user details like their IMEI number. Users would scan the QR code with their registered mobile phone, with the phone number and IMEI number validating their identity. If the network is available, the encoded string would automatically login the user. Otherwise, a one-time password would be displayed to manually enter. The system seeks to establish a secure authentication method using mobile phones as trusted devices to both display login QR codes and verify user identities.
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
This document discusses securing e-medical documents using QR codes. It proposes a system where hospitals can upload medical records to the cloud with a patient ID. This ID is then converted to a QR code using the QRDroid function. Patients can then scan the QR code to download their medical document. The system aims to securely transmit medical data between hospitals and patients in a paperless manner using encrypted QR codes. It describes modules for user registration, database creation, QR code generation, scanning and file uploading/downloading. The goal is to provide a more secure, flexible and easy way for patients to access medical records electronically.
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
The document discusses a proposed smart attendance management system that integrates fingerprint biometric authentication with wireless connectivity. The system uses an Android mobile application to register users and record their attendance through fingerprint scans. It ensures employees are physically present at work by only allowing attendance checks when the mobile device is connected to the organization's wireless router. This prevents employees from falsely checking in without remaining on-site. The system aims to reduce costs compared to traditional fingerprint scanners while providing increased portability and convenience through the use of mobile phones and wireless technology.
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
This document discusses techniques for smart shopping using QR codes. It provides an overview of how QR codes can be generated and embedded with product information like name, number, location, and details. By scanning these QR codes using a smartphone camera and app, users can get product information on their phone. The document then reviews different techniques used for QR code generation and recognition, including REST protocols, multiplexing/demultiplexing algorithms, and QR filtering methods. It discusses how these techniques can enable features like adding items to a shopping cart, checking product offers, and digital payment. The techniques aim to make the shopping experience more convenient and efficient compared to traditional physical shopping.
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...ijiert bestjournal
Quick Response (QR) code are 2D (two dimension) matrix code. Here it is use for secure authentication. Now days Internet is most commonlyused medium to access the information. People are using many website like online banking,insurance,shopping etc. these websites requires the strong authentication. Using a pair of username and password authentication scheme is not secure enough since attacker can collect information from web phishing and computer infection. Various malware or intended programs attempt to capture the confidential information from personal computer. Therefore,secure authentication scheme is required. Many authentication methods have been developed such as one time password,SMS base OTP system and some using bio-metric feature. Some of these authentications are fail due to network problem and increases the cost. People are increasingly used in all life fields,especially with the wide spread of Android smart phones which are used as QR-code scanners
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
This document summarizes and compares previous research on secure offline micro-payment systems. It describes FRoDO, a new proposed system that features an identity element and coin element to enable secure offline payments. The identity element is embedded in the customer's device and is used to link a coin element to that specific device. This provides two-factor authentication. The coin element uses a physical unclonable function and regenerative keys to securely read and redeem digital coins. The document reviews related work on context-aware and software-based authentication solutions, offline micropayment schemes without trusted hardware, and approaches using hash-chaining in mobile networks. It concludes that FRoDO is the first solution able to provide fully secure offline
This document proposes a fingerprint-based secured voting system to help conduct free and fair elections. It aims to prevent rigging by uniquely identifying each voter through their fingerprints. The system has three main modules - Admin, Election, and Voter. The Admin can add candidates and voters, schedule elections, and calculate results. In the Election module, voters' fingerprints are verified before they can cast their vote. The Voter module allows casting and viewing candidates. The system ensures each voter can vote only once, prevents double voting, and has the potential to reduce illegal voting activities. It provides accurate results through a secure and transparent electronic voting process.
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...IRJET Journal
This document proposes an advanced attendance system using Android smartphones, biometric fingerprint authentication, and wireless networks.
It summarizes the limitations of existing manual and biometric-only systems, then describes a new system where the entire workplace functions as a WiFi hotspot. Employees must connect their Android smartphones to register attendance, and the system tracks how long they remain connected to determine time spent at the workplace. Fingerprint authentication is also used to ensure individual identity.
The system aims to more accurately track employee presence compared to existing solutions, by requiring both biometric login and wireless connection to the workplace network. It could benefit organizations by reducing attendance fraud while streamlining the process.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
This document proposes an OCR detection and biometric authenticated credit card payment system. It aims to simplify online transactions by using fingerprint authentication and OCR to detect credit/debit card details from images, reducing the multi-step verification process to a single step. The system utilizes convolutional neural networks for OCR and fingerprint authentication via web authentication standards. It analyzes the architecture and implementation steps for OCR detection and fingerprint verification. The document concludes the proposed system could increase security for credit card companies and help reduce online transaction fraud.
This document describes a wireless fingerprint attendance system that was designed to automatically record student attendance using fingerprint identification. The system uses a fingerprint sensor module connected to a computer via a Zigbee wireless network. Students register their fingerprints initially. When attending a lecture, they place their finger on the sensor to be identified and have their attendance marked electronically and automatically. The system aims to eliminate the disadvantages of traditional paper-based attendance tracking systems. It provides a low-cost and efficient automatic solution for recording attendance.
Design and implementation a network mobile application for plants shopping ce...IJECEIAES
During the revolution of developing mobile phone applications, they can be used in different fields like business, health, transportation, communications and tourism, and other uses. This paper presents QR based information management system for plants shopping centers. This system includes two main sides: mobile and server. The proposed application is used as a substitute for the human guide that each visitor needs in the plants shopping center. The complete information can be provided on any seedling displayed in the shop depending on the QR code technology. Each branch of the same enterprise includes sub-server that is linked to the main server using a private computer network. The server side contains information of all plants and all branches for such enterprise in the form of text and image in different languages. The proposed application facilitates the movement of the customer inside the place, the ease in preparing bills electronically that helps the visitor to save the time of queue to preparing the bill and paying. The proposed system is tested over different case studies to prove the efficiency in terms of information and selling management.
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
This document summarizes several research papers on providing security for digital payment systems. It discusses using digital tokens along with blockchain technology to protect personal and account details. It also reviews using RFID technology and mobile phones for authentication instead of security tokens. Blind signatures with blockchain are proposed to build a private reputation system. Overall, the literature survey analyzes different approaches for building secure transaction applications.
Smart-Authentication: A secure web service for providing bus pass renewal systemIRJET Journal
The document describes a secure bus pass renewal system called Smart-Authentication that uses camera-based two-factor authentication to counter password attacks. It uses a mobile device's camera to scan a QR code sent to both the user's computer and phone to log into a web-based bus pass renewal system. The system aims to provide a more convenient online renewal process while improving security through public-key cryptography and preventing man-in-the-middle and phishing attacks. A prototype was implemented with an Android app, browser extension, and Java web server to demonstrate the feasibility and usability of the camera-based authentication scheme.
The document describes a proposed service application system that uses an Android application to automate billing and provide reminders. The system would allow service providers to send bills via text, email or WhatsApp and customers could pay quickly using digital payment methods. It would also set reminders for customers about vehicle tire efficiency levels over time through SMS alerts. The system is intended to streamline billing, avoid paper records, and increase efficiency and customer satisfaction.
This document summarizes a research paper on a fingerprint-based voting system. The proposed system uses fingerprint recognition via the SIFT algorithm to authenticate voters on a mobile app. Voters would register by submitting their fingerprint, which would be stored in a database. On voting day, voters can cast their ballot from home by submitting their fingerprint for verification through the app. This avoids public gatherings that could spread disease. The system design involves fingerprint image capture, database storage, verification of stored prints, and electronic ballot casting. Testing showed fingerprint matching rates over 80% using this approach. The system aims to increase accessibility, security and efficiency of voting.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
IRJET - Three Layered Security for BankingIRJET Journal
This document describes a proposed three-layered security system for online banking authentication. The system uses username and password for the first layer of authentication. For the second layer, a QR code encrypted with the user's IMEI number is displayed, which must be scanned by their smartphone. For the third layer, an OTP is sent to the user's smartphone after successful QR code scan. This three-layered approach provides stronger security than username and password alone by distributing the authentication process across multiple devices and utilizing different authentication methods at each layer. The system is designed to be more secure against attacks like keylogging compared to a single-factor authentication system.
The document proposes an Android application to automate the railway concession application process for college students. Currently, the process is manual and time-consuming. The proposed system would allow students to apply for concessions anytime by filling an application on their Android device and scanning the QR code embedded in their student ID card. This QR code uniquely identifies each student and contains their personal information. When application requests are received, the student's details are verified against the student database to confirm eligibility. If verified, the student's concession form would then be printed. The automated system aims to reduce processing time from 3-4 days to just 1 day using QR codes for identification and an Android app for convenient, anytime applications.
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
This document describes the development of an attendance tracking system using fingerprint recognition and an Android application. Key points:
- The system uses a fingerprint scanner to enroll students' fingerprints and store them in a database along with their IDs. When students place their finger on the scanner, it marks them as present by updating the database.
- An Android app was created to allow students and administrators to check attendance records in real-time by accessing the centralized database.
- The system aims to provide a cheaper and more reliable alternative to traditional paper-based attendance tracking while allowing remote attendance monitoring via the app.
- The system was tested on 5 students and 1 teacher, with fingerprint matching being about 100% accurate though some
This document summarizes a QR code-based employee monitoring system that uses QR codes on employee ID cards. The system has two parts: 1) Employees scan their QR code at the first scanner to access services like parking allocation and canteen menus. 2) Employees scan their QR code at the second scanner to mark their attendance in the database and start their computer remotely using Wake-on-LAN. The system aims to automate employee monitoring, improve organization growth, and save employee time.
The document describes a user documentation verification portal that uses computer vision techniques to verify the authenticity of identity documents uploaded by users. It discusses:
1) The need for document verification in industries like banking, insurance, etc. and issues with current manual verification processes.
2) The system architecture of the proposed portal, which allows users to register, upload documents, and gets results of verification through email.
3) The verification process, which involves converting documents to grayscale, comparing them using Structural Similarity Index (SSIM) and notifying the user of the accuracy percentage.
4) Testing results like confusion matrix to evaluate the model's performance in predicting actual and modified documents.
The portal
IRJET - Digital KYC with Auto Form FillingIRJET Journal
This document describes a system for digital KYC verification and automated form filling. The system extracts key information from identity documents using optical character recognition. It stores this in user profiles. When a user needs to fill out a form, the system automatically populates it with the stored information from their profile, eliminating manual form filling. This streamlines the KYC process and makes it paperless and more efficient. The system was created to reduce human errors and make compliance and record keeping easier for organizations.
This document describes a proposed 3M secure transportation system that provides security for people (drivers), vehicles, and cargo. The system uses several technologies including face recognition, fingerprint verification, vehicle tracking via GPS and GSM, and QR scanning of cargo. An Android application would be developed to integrate these security features and monitor them. The system is intended for mid-sized transportation businesses to help prevent theft of vehicles and cargo.
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
This document discusses an approach for continuous and transparent user identification for secure web services using biometrics. It proposes a framework called CASHMA (Context-Aware Security by Hierarchical Multilevel Architecture) that uses multi-modal biometrics for continuous authentication. CASHMA authenticates users using biometric traits instead of usernames and passwords, and periodically re-authenticates users during a session to ensure security. The document describes how CASHMA works, including how it issues authentication certificates to validate user identity on an ongoing basis and adaptively sets session timeouts. It concludes that CASHMA enhances security and usability for user sessions through continuous multi-modal biometric authentication and verification.
QR code based two-factor authentication to verify paper-based documentsTELKOMNIKA JOURNAL
Important paper-based documents exposed to forgery such as: official certificates, birth, marriage, death certificates, selling and buying documents and other legal documents is more and more serious and sophisticated. With the purposes of fraud, appropriation of property, job application and assignment in order to swindle public authorities, this forgery has led to material loss, belief deterioration as well as social instability. There are many techniques has been proposed to overcome this issue such as: ink stamps, live signatures, documented the transaction in third party like the court or notary. In this paper, it’s proposed a feasible solution for forgery prevention for paper-based documents using cloud computing application. With the application of quick response bidirectional barcode and the usage of hash algorithm. The study aims at developing an electronic verification system for official and issued books (documents, endorsements, and other official books) to/from different sections of the Institute using QR technology.
This document summarizes a QR code-based digitized marksheet system that encrypts student academic data and embeds it in a QR code printed on the marksheet. The encrypted data in the QR code includes student name, registration number, semester, year, marks obtained, and grades. Only authorized users can scan the QR code and decrypt the data using a mobile app. This digitization saves storage space for academic records while preventing unauthorized access to student data. The system implementation focuses on generating encrypted QR codes from the academic data and validating scanned codes through the mobile app and server.
This document proposes a system for strengthening security for online banking transactions. It involves multi-level authentication including face recognition, graphical OTP authentication using a 4x4 grid of random numbers, and security questions. Users first register security images, a security pattern by selecting indexes on a 4x4 grid, answers to security questions, and their face is recorded. For login, the security images and username/password are verified. Transactions require face recognition if a webcam is available, otherwise graphical OTP authentication is used where the user selects numbers from the indexes of their security pattern on a randomly generated 4x4 grid. Additionally, two random security questions are asked before completing a transaction. The system aims to provide secure electronic transactions through this multi-factor
QR code based authentication method for IoT applications using three security...TELKOMNIKA JOURNAL
This document proposes a QR code-based authentication method (QRAM) for internet of things (IoT) applications. QRAM uses three layers of security to authenticate QR codes:
1. User image authentication verifies a user's frequently updated profile image encoded in the QR code.
2. User activity number authentication encrypts values related to a user's recent activities to generate a number included in the QR code.
3. User ID authentication looks up and verifies a user's ID against neighboring IDs stored in a database.
The document evaluates QRAM in terms of security and computation time. It finds that QRAM authenticates QR codes faster than other methods while providing multiple layers of encryption to enhance security.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Contenu connexe
Similaire à Randomized QR-code scanning for a low-cost secured attendance system
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
This document proposes an OCR detection and biometric authenticated credit card payment system. It aims to simplify online transactions by using fingerprint authentication and OCR to detect credit/debit card details from images, reducing the multi-step verification process to a single step. The system utilizes convolutional neural networks for OCR and fingerprint authentication via web authentication standards. It analyzes the architecture and implementation steps for OCR detection and fingerprint verification. The document concludes the proposed system could increase security for credit card companies and help reduce online transaction fraud.
This document describes a wireless fingerprint attendance system that was designed to automatically record student attendance using fingerprint identification. The system uses a fingerprint sensor module connected to a computer via a Zigbee wireless network. Students register their fingerprints initially. When attending a lecture, they place their finger on the sensor to be identified and have their attendance marked electronically and automatically. The system aims to eliminate the disadvantages of traditional paper-based attendance tracking systems. It provides a low-cost and efficient automatic solution for recording attendance.
Design and implementation a network mobile application for plants shopping ce...IJECEIAES
During the revolution of developing mobile phone applications, they can be used in different fields like business, health, transportation, communications and tourism, and other uses. This paper presents QR based information management system for plants shopping centers. This system includes two main sides: mobile and server. The proposed application is used as a substitute for the human guide that each visitor needs in the plants shopping center. The complete information can be provided on any seedling displayed in the shop depending on the QR code technology. Each branch of the same enterprise includes sub-server that is linked to the main server using a private computer network. The server side contains information of all plants and all branches for such enterprise in the form of text and image in different languages. The proposed application facilitates the movement of the customer inside the place, the ease in preparing bills electronically that helps the visitor to save the time of queue to preparing the bill and paying. The proposed system is tested over different case studies to prove the efficiency in terms of information and selling management.
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
This document summarizes several research papers on providing security for digital payment systems. It discusses using digital tokens along with blockchain technology to protect personal and account details. It also reviews using RFID technology and mobile phones for authentication instead of security tokens. Blind signatures with blockchain are proposed to build a private reputation system. Overall, the literature survey analyzes different approaches for building secure transaction applications.
Smart-Authentication: A secure web service for providing bus pass renewal systemIRJET Journal
The document describes a secure bus pass renewal system called Smart-Authentication that uses camera-based two-factor authentication to counter password attacks. It uses a mobile device's camera to scan a QR code sent to both the user's computer and phone to log into a web-based bus pass renewal system. The system aims to provide a more convenient online renewal process while improving security through public-key cryptography and preventing man-in-the-middle and phishing attacks. A prototype was implemented with an Android app, browser extension, and Java web server to demonstrate the feasibility and usability of the camera-based authentication scheme.
The document describes a proposed service application system that uses an Android application to automate billing and provide reminders. The system would allow service providers to send bills via text, email or WhatsApp and customers could pay quickly using digital payment methods. It would also set reminders for customers about vehicle tire efficiency levels over time through SMS alerts. The system is intended to streamline billing, avoid paper records, and increase efficiency and customer satisfaction.
This document summarizes a research paper on a fingerprint-based voting system. The proposed system uses fingerprint recognition via the SIFT algorithm to authenticate voters on a mobile app. Voters would register by submitting their fingerprint, which would be stored in a database. On voting day, voters can cast their ballot from home by submitting their fingerprint for verification through the app. This avoids public gatherings that could spread disease. The system design involves fingerprint image capture, database storage, verification of stored prints, and electronic ballot casting. Testing showed fingerprint matching rates over 80% using this approach. The system aims to increase accessibility, security and efficiency of voting.
Wireless Student Attendance System using Fingerprint Sensorijtsrd
Nowadays accurate personal identification is becoming more and more important. Usual means smart cards, passwords… have shown their limits. Currently fingerprint recognition is the most widely used technique for personal identification. The development of an attendance management system using biometrics is proposed. As the manual method of attendance system produced errors and taking lot of time during lecture period, an efficient and organized biometrics system for students attendance is purposed. The electronic system not only used to take attendance for the students, but a database is also mentioned to store all the information which can be manipulated further in future. Optical fingerprint sensor will make adding fingerprint detection and verification super simple.This type of verification is widely used in various aspects of life for different purposes, like in security, police identification, etc. Node MCU is used which provides the wireless communication. It also send the attendance report to PC. In this system, there are two parts, one is transmitter and another is receiver. In transmitter module, there is a Liquid Crystal Display LCD , Arduino UNO, transmitter. In receiver module, Node MCU is mainly used. The resultant message will show on LCD. Yu Maw Win | Saw Aung Nyein Oo ""Wireless Student Attendance System using Fingerprint Sensor"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,
URL: https://www.ijtsrd.com/papers/ijtsrd25157.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25157/wireless-student-attendance-system-using-fingerprint-sensor/yu-maw-win
IRJET - Three Layered Security for BankingIRJET Journal
This document describes a proposed three-layered security system for online banking authentication. The system uses username and password for the first layer of authentication. For the second layer, a QR code encrypted with the user's IMEI number is displayed, which must be scanned by their smartphone. For the third layer, an OTP is sent to the user's smartphone after successful QR code scan. This three-layered approach provides stronger security than username and password alone by distributing the authentication process across multiple devices and utilizing different authentication methods at each layer. The system is designed to be more secure against attacks like keylogging compared to a single-factor authentication system.
The document proposes an Android application to automate the railway concession application process for college students. Currently, the process is manual and time-consuming. The proposed system would allow students to apply for concessions anytime by filling an application on their Android device and scanning the QR code embedded in their student ID card. This QR code uniquely identifies each student and contains their personal information. When application requests are received, the student's details are verified against the student database to confirm eligibility. If verified, the student's concession form would then be printed. The automated system aims to reduce processing time from 3-4 days to just 1 day using QR codes for identification and an Android app for convenient, anytime applications.
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
This document describes the development of an attendance tracking system using fingerprint recognition and an Android application. Key points:
- The system uses a fingerprint scanner to enroll students' fingerprints and store them in a database along with their IDs. When students place their finger on the scanner, it marks them as present by updating the database.
- An Android app was created to allow students and administrators to check attendance records in real-time by accessing the centralized database.
- The system aims to provide a cheaper and more reliable alternative to traditional paper-based attendance tracking while allowing remote attendance monitoring via the app.
- The system was tested on 5 students and 1 teacher, with fingerprint matching being about 100% accurate though some
This document summarizes a QR code-based employee monitoring system that uses QR codes on employee ID cards. The system has two parts: 1) Employees scan their QR code at the first scanner to access services like parking allocation and canteen menus. 2) Employees scan their QR code at the second scanner to mark their attendance in the database and start their computer remotely using Wake-on-LAN. The system aims to automate employee monitoring, improve organization growth, and save employee time.
The document describes a user documentation verification portal that uses computer vision techniques to verify the authenticity of identity documents uploaded by users. It discusses:
1) The need for document verification in industries like banking, insurance, etc. and issues with current manual verification processes.
2) The system architecture of the proposed portal, which allows users to register, upload documents, and gets results of verification through email.
3) The verification process, which involves converting documents to grayscale, comparing them using Structural Similarity Index (SSIM) and notifying the user of the accuracy percentage.
4) Testing results like confusion matrix to evaluate the model's performance in predicting actual and modified documents.
The portal
IRJET - Digital KYC with Auto Form FillingIRJET Journal
This document describes a system for digital KYC verification and automated form filling. The system extracts key information from identity documents using optical character recognition. It stores this in user profiles. When a user needs to fill out a form, the system automatically populates it with the stored information from their profile, eliminating manual form filling. This streamlines the KYC process and makes it paperless and more efficient. The system was created to reduce human errors and make compliance and record keeping easier for organizations.
This document describes a proposed 3M secure transportation system that provides security for people (drivers), vehicles, and cargo. The system uses several technologies including face recognition, fingerprint verification, vehicle tracking via GPS and GSM, and QR scanning of cargo. An Android application would be developed to integrate these security features and monitor them. The system is intended for mid-sized transportation businesses to help prevent theft of vehicles and cargo.
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
This document discusses an approach for continuous and transparent user identification for secure web services using biometrics. It proposes a framework called CASHMA (Context-Aware Security by Hierarchical Multilevel Architecture) that uses multi-modal biometrics for continuous authentication. CASHMA authenticates users using biometric traits instead of usernames and passwords, and periodically re-authenticates users during a session to ensure security. The document describes how CASHMA works, including how it issues authentication certificates to validate user identity on an ongoing basis and adaptively sets session timeouts. It concludes that CASHMA enhances security and usability for user sessions through continuous multi-modal biometric authentication and verification.
QR code based two-factor authentication to verify paper-based documentsTELKOMNIKA JOURNAL
Important paper-based documents exposed to forgery such as: official certificates, birth, marriage, death certificates, selling and buying documents and other legal documents is more and more serious and sophisticated. With the purposes of fraud, appropriation of property, job application and assignment in order to swindle public authorities, this forgery has led to material loss, belief deterioration as well as social instability. There are many techniques has been proposed to overcome this issue such as: ink stamps, live signatures, documented the transaction in third party like the court or notary. In this paper, it’s proposed a feasible solution for forgery prevention for paper-based documents using cloud computing application. With the application of quick response bidirectional barcode and the usage of hash algorithm. The study aims at developing an electronic verification system for official and issued books (documents, endorsements, and other official books) to/from different sections of the Institute using QR technology.
This document summarizes a QR code-based digitized marksheet system that encrypts student academic data and embeds it in a QR code printed on the marksheet. The encrypted data in the QR code includes student name, registration number, semester, year, marks obtained, and grades. Only authorized users can scan the QR code and decrypt the data using a mobile app. This digitization saves storage space for academic records while preventing unauthorized access to student data. The system implementation focuses on generating encrypted QR codes from the academic data and validating scanned codes through the mobile app and server.
This document proposes a system for strengthening security for online banking transactions. It involves multi-level authentication including face recognition, graphical OTP authentication using a 4x4 grid of random numbers, and security questions. Users first register security images, a security pattern by selecting indexes on a 4x4 grid, answers to security questions, and their face is recorded. For login, the security images and username/password are verified. Transactions require face recognition if a webcam is available, otherwise graphical OTP authentication is used where the user selects numbers from the indexes of their security pattern on a randomly generated 4x4 grid. Additionally, two random security questions are asked before completing a transaction. The system aims to provide secure electronic transactions through this multi-factor
QR code based authentication method for IoT applications using three security...TELKOMNIKA JOURNAL
This document proposes a QR code-based authentication method (QRAM) for internet of things (IoT) applications. QRAM uses three layers of security to authenticate QR codes:
1. User image authentication verifies a user's frequently updated profile image encoded in the QR code.
2. User activity number authentication encrypts values related to a user's recent activities to generate a number included in the QR code.
3. User ID authentication looks up and verifies a user's ID against neighboring IDs stored in a database.
The document evaluates QRAM in terms of security and computation time. It finds that QRAM authenticates QR codes faster than other methods while providing multiple layers of encryption to enhance security.
Similaire à Randomized QR-code scanning for a low-cost secured attendance system (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
cnn.pptx Convolutional neural network used for image classication
Randomized QR-code scanning for a low-cost secured attendance system
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 4, August 2022, pp. 3762~3769
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i4.pp3762-3769 3762
Journal homepage: http://ijece.iaescore.com
Randomized QR-code scanning for a low-cost secured
attendance system
Muhammad Imanullah, Yuza Reswan
Department of Engineering, Universitas Muhammadiyah Bengkulu, Bengkulu, Indonesia
Article Info ABSTRACT
Article history:
Received May 6, 2021
Revised Feb 2, 2022
Accepted Feb 27, 2022
Human resource management requires good documentation and good data
processing. In workspaces such as offices and factories, employee salaries
are determined by calculating attendance at each hour of work. Tracking and
collecting attendance data for a large number of employees is a difficult
thing to do. We need a secure system to facilitate the process of collecting
and tracking presence data. We propose an attendance system that uses
random quick response code (QR-codes) as one time password (OTP) to
improve security. Employees are required to scan the QR-code within ten
seconds before it is changed and randomized each time. The proposed
attendance system facilitates data collection using employees’ smartphones
and Mac-Address as unique identification numbers. The system is able to
track employees’ arrival and departure times. We have implemented the
system at the local university to collect lecturer attendance data then analyze
its security and statistic in all scanning activities. The average time needed
by a user to authenticate their presence in the system is 25.8877 seconds.
The steps needed to sign in and out from the system are fewer than other
previous researches. Those findings tell us that the approach is
straightforward and more uncomplicated than other proposed methods. We
conclude that randomized QR-code scanning is a relevant scheme to be
applied in a secure attendance system.
Keywords:
Attendance system
Employees
Human resources
QR-code
Secure office system
This is an open access article under the CC BY-SA license.
Corresponding Author:
Muhammad Imanullah
Department Engineering, Universitas Muhammadiyah Bengkulu
Bali street, Postal Code 38119, Bengkulu, Indonesia
Email: muhammad.iman@umb.ac.id
1. INTRODUCTION
Attendance is one of many important aspects that concern many leaders in the work community
towards the workers they lead. Many organizations determine the employee’s honor by their attendance on
each business day. According to statistical findings in [1], an increase in salaries is significantly related to
labor supply with about -0.04 of elasticity. That finding shows that higher salaries will not always be linearly
connected to the increase in worker attendance. They have valid reasons for wanting the improvement in
quality of working life through attendance and reducing the absenteeism using some strategies as stated in
[2]. With the workers’ attendance data, the organization will be able to cut unnecessary expenses and
determine different honors for each worker. Like in [3], attendance data is obtained using the
attendance/absenteeism sheet to determine the number of allowable non-productive hours (vacation,
holidays, and sick leaves) to finally result in replicating the monthly salary budgets for nursing personnel.
Hence, a system that is able to collect attendance data quickly and precisely is needed.
There have been lots of efforts done by researchers in building attendance systems. The effort of
building an attendance system can be started with many approaches (a wide variety of methods, tools, and
2. Int J Elec & Comp Eng ISSN: 2088-8708
Randomized QR-code scanning for a low-cost secured attendance system (Muhammad Imanullah)
3763
subjects). Those approaches vary in the security aspect, accuracy aspect, and actualization of data. Like
in [4]–[9], radio-frequency identification (RFID) is used to provide a robust, scalable, secure, and automatic
attendance system. Those RFID approaches are requiring workers to bring the ID device to work so the
attendance system can identify them and automatically fill the attendance data. To tackle the need of bringing
ID devices to work every time, other approaches that make use of the biometric ID are proposed by
researchers. With biometrics, the interaction between workers and the attendance system becomes more
effective and efficient. Biometrics that uses body measurements and calculations is intended to explain the
characteristics of the human body in a formal mathematical way. Some attendance systems use biometric to
identify their users. Those biometric attendance systems using fingerprint [10], iris [11], face [12], or voice
[13]. A biometric based attendance system is a very promising method to adopt for future needs but it still
has some security issues as people can alter the image taken by biometric sensors. An altered image taken by
a biometric attendance system can make the computer misidentify a person, and that leads to a chance of
cheating among the workers. To minimize the chance of cheating and to have a reasonably secure system,
quick response code (QR-code) scanning is proposed. Some researchers like [14]–[16], using QR-code to
identify a person or encapsulate some messages to achieve some goals. With QR-code scanning as an
identification statement, we can reach a secure and robust attendance system where users are not required to
bring any identification device other than their own smartphone. Workers nowadays are attached to their
smartphones, so they will always need and want to bring them anywhere, and not feel obligated to do it. That
is the main reason for us to use QR-code scanning as an identification method. What differentiates our
QR-code based attendance system from others is the straightforwardness and fewer usability steps.
As stated in [17], we can divide authentication into three methodologies: something you have (RFID
device), something you know (personal information number (PIN), and password), and something you are
(biometrics). Though the combination of those three authentication methodologies will serve us the highest
security, we can actually use only one that meets our environmental needs. This research focuses on utilizing
the use of QR-code to find a better method in securing the attendance data. QR-code scanning is still a
relevant way of identifying users securely as it can be found in the popular system like Facebook, Telegram,
and WhatsApp. Our system is able to acquire attendance data using the same principle found in the
WhatsApp web application.
2. RESEARCH METHOD
We require a secure and controllable transfer data mechanism to build our attendance system. We
propose a method called randomized QR-code scanning to achieve it. With the combination of QR-code and
network configuration, we try to increase the system security. Figure 1 shows our attendance system scheme
running on a local network where the user can directly communicate with the server. The first step for the
user to use the attendance system is being connected to a local network. Once user is connected, they are
required to open the android application to scan the randomized QR-code provided by the server app. The
android application has a simple look and has only two main buttons to sign in and out. When the scanning
process is done, a packet containing identifier data is sent from the user’s smartphone to the server app. The
server app will receive and process the packet sent by the user through the local network. At last, users are
succeeded to sign their attendance while the server always randomizes the QR-code every 10 seconds for
security manner. The system is evaluated through 100 test scenarios where users are required to authenticate
their presence by connecting to the local network, running the android application, and signing in. The
questionnaire form is also used as an evaluation tool to obtain feedback from participants about the system.
The test results are shown as statistical graphics in the result and discussion section along with some
discussion materials obtained from participants’ feedback.
2.1. Network
We set up our attendance system in a local network as a requirement for users to be present in a
specific location (workplace) and specific time (work-hours). This requirement will prevent users to cheat,
like signing in from outside of the workplace. The communication between users and the server is done
through transmission control protocol (TCP). According to [18], TCP has less packet delay and less packet
loss over user datagram protocol (UDP), hence we use it as our main data transfer protocol. The server will
have a static IP address so users can communicate with it easier without having to change the destination IP
address every time they connected to the network.
2.2. Unique identification
Many systems that involve users and sensitive data require unique and secured identification. Like a
proposed system in [19], the fingerprint is used as an identification key while QR-code is used as a mark to
verify the user’s attendance in a physical train seat. Another system in [20], introduced a secure course
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 3762-3769
3764
attendance system using the face as an identification key and QR-code to encapsulate some courses detail
information. What differentiates our proposed system from earlier researches is the combination of media
access control (MAC) address as a unique identification key and QR-code as a security key to authenticate
user’s attendance. We use MAC address since it is word-wide unique [21]. Which means that each
smartphone user in the world will have a different 12-digit hexadecimal number (6-Byte binary number),
represented in colon-hexadecimal notation, hyphen-hexadecimal notation, or period-separated hexadecimal
notation. Using MAC addresses as unique identification to differentiate one user from another has been our
best choice. Within our research processes, many participants showed the dissent to give their international
mobile equipment identity (IMEI) or phone number as an identification number. MAC address is not too
sensitive compared to IMEI and phone number, so we can use it on a public occasion.
Figure 1. Attendance system scheme
2.3. QR-code Scanning
Our proposed method is centered on the activity of QR-code scanning and the exchange of
encapsulated security key and attendance data between user and server. The server will generate QR-code
containing a five digits randomized numbers as shown in Figure 2. This randomized number is acting as one
time password (OTP) which appears to be a robust and secure solution in many sensitive data transactions
such as electronic payments [22], online transactions [23], secured data accessing systems [24], and corporate
information systems [25]. Each digit is filled with a random number from zero to nine. The QR-code
containing five digits randomized number are generated every ten seconds to prevent alteration from the
cheating user. QR-code scanning is a quick method for entering the OTP since users are not required to type
the number each time.
Figure 2. Randomized number as OTP
A user who scans QR-code will send a packet of the message containing the randomized number
along with other information as shown in Figure 3. Delimiters are used to ease the data parsing. The packet is
sent to the server using TCP over a local network. The server will identify users by their MAC address and
4. Int J Elec & Comp Eng ISSN: 2088-8708
Randomized QR-code scanning for a low-cost secured attendance system (Muhammad Imanullah)
3765
check the randomized number whether it is matched or not. If the randomized number sent by the user is not
similar to what the server has, then the user is failed to authenticate their attendance.
Figure 3. Information packet send through TCP
3. RESULTS AND DISCUSSION
Our proposed scheme is inspired by real office life needs. The scheme is made to enhance an
attendance system’s security. We implemented it in a university attendance system containing real lecturers
data. In some universities, lecturer presence is needed in determining basic teaching honor. Attendance
system collecting data of presence time, departure time, and teaching info. Those data can be analyzed to
statistically tell us about the lecturer’s discipline.
One of many things to do firstly in building an attendance system is designing a database. Figure 4
shows our database design which contains only 4 tables. The database is designed in a simple form to make it
straightforward and easy to use. Pre-collected data are lecturer info, teaching schedule, and college room
info. For daily use, lecturer presences are stored in a daily presences table.
Figure 4. Database design
As an information serving and presence recording system, our attendance system is designed with a
simple interface. The Server App system is released as Desktop App as shown in Figure 5(a) which is able to
present main information in the common monitor, big screen, or projector. Figure 5(b) shows the user
interface layout. The header contains the university logo, date, and time information. The main body contains
the teaching schedule and lecturer presence. The footer contains the current process status, and the sidebar
contains randomized QR-code and announcements.
The android application which acts as mobile scanning app also has a simple layout. Released in
android, this scanning app only has two buttons as shown in Figure 6(a). Users are expected to quickly
understand the workflow and scanning activity. Figure 6(b) shows the QR-code scanning interface while
Figure 6(c) shows the scanning activity. Users are required to register their MAC address into attendance
system before being able to use it. Once users are registered, they can authenticate their presence by
connecting to the workplace network and scanning the QR-code using a mobile scanning app. Their presence
in the workplace network becomes one of many security efforts to prevent a user from cheating. QR-code
acts as an OTP, and it will be randomized every 10 seconds to prevent a user from sending an unauthorized
packet of data to the system.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 3762-3769
3766
(a)
(b)
Figure 5. Desktop app interface (a) installed in all in one PC and (b) app layout
(a) (b) (c)
Figure 6. Android app interface: (a) app layout, (b) scanning interface, and (c) scanning QR-code activity
The steps required by users to authenticate their presence and departure are shown in Figure 7. The
steps are fewer than other previous researches. Like in [26], users are required to log into the app using a
username and password before being able to scan the QR-code and record their attendance. And also in [27],
6. Int J Elec & Comp Eng ISSN: 2088-8708
Randomized QR-code scanning for a low-cost secured attendance system (Muhammad Imanullah)
3767
users are required to scan QR-code printed on their ID card followed by extra authentication using their
fingerprint or voice before being able to record their attendance. With fewer steps, we try to present a simpler
and straightforward attendance system. For further development of a secured attendance system, we actually
believe that extra authentication using biometric is necessary and needed.
We have run 100 test scenarios to measure how much time is needed by users to authenticate their
presence (in seconds) from connected to the local network, running the app, and signing in. Figure 8(a)
shows the test value for each user while Figure 8(b) shows the sorted statistic version with a blue line as an
average value. From all measurements with a minimum value of 13.64 seconds and a maximum value of
43.03 seconds, we got an average time of 25.8877 seconds. Some attempts that require maximum time are
mostly caused by technical errors due to package loss over TCP communication. The average time of
25.8877 seconds is reasonable for a secured system where every required to be present in the local workplace
network while using their own smartphone. It also validates our claim on the straightforwardness of the
system. Besides some positive feedback about the simplicity and straightforwardness of the system, some
critical feedback was also obtained using questionnaire forms filled by participants. That feedback is mostly
targeted around the use of MAC address as an authentication method which is vulnerable. Participants are
concerned, knowing that people can easily get the fake MAC address using some apps to cheat the system.
Some other feedback also suggested us to change the communication scheme into a global network as it will
give the system more accessible to wider usage.
Figure 7. Presence authentication steps
(a)
(b)
Figure 8. Test data statistics: (a) time needed by 100 users to authenticate their presence (in seconds) and
(b) sorted version of all test data
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 3762-3769
3768
4. CONCLUSION
Test scenario shows that the proposed scheme utilizing QR-code as an OTP to improve security in
an attendance system, works very well. Users are required to be present in the workplace area and scan the
QR-code within 10 seconds, so it eliminates the chance of cheating. The average time needed by a user to
authenticate their presence in the system is 25.8877 seconds. The steps needed to sign in and out from the
system is fewer than other previous researches. QR-code scanning is a quick method for entering the OTP
since users are not required to type the number each time. Those findings tell us that the system is
straightforward and simpler than other proposed methods. We conclude that randomized QR-code scanning
is a relevant scheme to be applied in a secure attendance system. Other than that, it also has big potential to
improve many information systems on many occasions. MAC address is used within our system to facilitate
easy and unique identification info but turns out it does not give us a reliable solution since it can be hacked
in some ways (fake MAC address). For future development, we consider enhancing the security by using
other authentication factors like biometric.
REFERENCES
[1] N. Mocan and D. T. Altindag, “Salaries and work effort: an analysis of the European Union Parliamentarians,” The Economic
Journal, vol. 123, no. 573, pp. 1130–1167, Dec. 2013, doi: 10.1111/ecoj.12056.
[2] R. Thérault, P. B. Lesage, and M. Boisvert, “Absenteeism: importance, nature and remedies,” (in French), Relations industrielles,
vol. 36, no. 4, pp. 775–802, Apr. 2005, doi: 10.7202/029204ar.
[3] N. Gheith, A. M. Zakaria, and S. H. El-Sayed, “Cost of nursing care for endoscopy patients in endoscopy unit at specialized
Medical Hospital-Mansoura University,” Australian Journal of Basic and Applied Sciences, vol. 3, no. 3, pp. 2038–2047, 2009.
[4] A. G. Putrada and M. Abdurohman, “Increasing the security of RFID-based classroom attendance system with shamir secret
Share,” International Journal on Information and Communication Technology (IJoICT), vol. 6, no. 1, Jun. 2020, doi:
10.21108/IJOICT.2020.61.480.
[5] Q. Miao, F. Xiao, H. Huang, L. Sun, and R. Wang, “Smart attendance system based on frequency distribution algorithm with
passive RFID tags,” Tsinghua Science and Technology, vol. 25, no. 2, pp. 217–226, Apr. 2020, doi: 10.26599/TST.2018.9010141.
[6] G. D. P. Maramis and P. T. D. Rompas, “Radio frequency identification (RFID) based employee attendance management
system,” IOP Conference Series: Materials Science and Engineering, vol. 306, no. 1, Feb. 2018, doi: 10.1088/1757-
899X/306/1/012045.
[7] H. D. Rjeib, N. S. Ali, A. Al Farawn, B. Al-Sadawi, and H. Alsharqi, “Attendance and information system using RFID and web-
based application for academic sector,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 1,
2018, doi: 10.14569/IJACSA.2018.090137.
[8] H. El Mrabet and A. Ait Moussa, “IoT-school attendance system using RFID technology,” International Journal of Interactive
Mobile Technologies (iJIM), vol. 14, no. 14, Aug. 2020, doi: 10.3991/ijim.v14i14.14625.
[9] M. I. Younis, Z. F. A. Al-Tameemi, W. Ismail, and K. Z. Zamli, “Design and implementation of a scalable RFID-based
attendance system with an intelligent scheduling technique,” Wireless Personal Communications, vol. 71, no. 3, pp. 2161–2179,
Aug. 2013, doi: 10.1007/s11277-012-0929-3.
[10] Akinduyite C.O, Adetunmbi A.O, Olabode O.O, and Ibidunmoye E.O, “Fingerprint-based attendance management system,”
Journal of Computer Sciences and Applications, vol. 1, no. 5, pp. 100–105, Nov. 2013, doi: 10.12691/jcsa-1-5-4.
[11] S. Kadry and M. Smaili, “Wireless attendance management system based on iris recognition,” Scientific Research and Essays,
vol. 5, no. 12, pp. 1428–1435, 2010.
[12] A. S. Alon, “A YOLOv3 inference approach for student attendance face recognition system,” International Journal of Emerging
Trends in Engineering Research, vol. 8, no. 2, pp. 384–390, Feb. 2020, doi: 10.30534/ijeter/2020/24822020.
[13] S. Nidhyananthan, R. S. S. Kumari, and S. Selvi, “Text-independent voice based attendance system under multi-speaker and noisy
environments,” Australian Journal of Basic and Applied Sciences, vol. 8, no. 13, pp. 121–131, 2014.
[14] D. S. Zingade, V. Jangade, A. Varade, M. Sable, and S. Shirsat, “The automated system for general administration using QR
code,” International Journal of Advance Engineering and Research Development, vol. 3, no. 2, pp. 23–26, May 2018, doi:
10.21090/IJAERD.RTDE28.
[15] A. A. Emmanuel, A. E. Adedoyin, O. Mukaila, and O. O. Roseline, “Application of smartphone QRcode scanner as a means of
authenticating student identity card,” International Journal of Engineering Research and Technology, vol. 13, no. 1, Jan. 2020,
doi: 10.37624/IJERT/13.1.2020.48-53.
[16] C. Maciel, V. Carvalho Pereira, C. Leitão, R. Pereira, and J. Viterbo, “Interacting with digital memorials in a cemetery: insights
from an immersive practice,” Oct. 2018, doi: 10.5753/ihc.2018.4229.
[17] M. Galterio, S. Shavit, and T. Hayajneh, “A review of facial biometrics security for smart devices,” Computers, vol. 7, no. 3, Jun.
2018, doi: 10.3390/computers7030037.
[18] Y.-C. Lai, A. Ali, M. S. Hossain, and Y.-D. Lin, “Performance modeling and analysis of TCP and UDP flows over software
defined networks,” Journal of Network and Computer Applications, vol. 130, pp. 76–88, Mar. 2019, doi:
10.1016/j.jnca.2019.01.010.
[19] B. Muthukumar, J. Albert Mayan, G. Nambiar, and D. Nair, “QR code and biometric based authentication system for trains,” IOP
Conference Series: Materials Science and Engineering, vol. 590, Oct. 2019, doi: 10.1088/1757-899X/590/1/012010.
[20] D. Sunaryono, J. Siswantoro, and R. Anggoro, “An android based course attendance system using face recognition,” Journal of
King Saud University - Computer and Information Sciences, vol. 33, no. 3, pp. 304–312, Mar. 2021, doi:
10.1016/j.jksuci.2019.01.006.
[21] GeeksforGeeks, “Introduction of MAC address in computer network,” geeksforgeeks.org. 2020.
https://www.geeksforgeeks.org/introduction-of-mac-address-in-computer-network/ (accessed Mar. 06, 2021).
[22] M. A. Hassan, Z. Shukur, and M. Kamrul, “An improved time-based one time password authentication framework for electronic
payments,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 11, 2020, doi:
10.14569/IJACSA.2020.0111146.
[23] S. S. Reddy, “OTP on GPS: an enhancement to OTP security model for securing On-Line transactions,” International Journal for
8. Int J Elec & Comp Eng ISSN: 2088-8708
Randomized QR-code scanning for a low-cost secured attendance system (Muhammad Imanullah)
3769
Research in Applied Science and Engineering Technology, vol. 6, no. 7, pp. 767–770, Jul. 2018, doi: 10.22214/ijraset.2018.7129.
[24] F. Noorbasha, C. R. Krishna, and S. HafijullaIrshad, “FPGA based OTP generation system for data security,” International
Journal of Recent Technology and Engineering, vol. 8, no. 5, pp. 1836–1839, Jan. 2020, doi: 10.35940/ijrte.E4879.018520.
[25] V. Landyshev, T. Blinovskaya, and D. Krakhmalev, “The practice of using one-time passwords in modern corporate information
systems,” E3S Web of Conferences, vol. 224, Dec. 2020, doi: 10.1051/e3sconf/202022401038.
[26] Z. Ayop, C. Yee, S. Anawar, E. Hamid, and M. Syahrul, “Location-aware event attendance system using QR code and GPS
technology,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 9, 2018, doi:
10.14569/IJACSA.2018.090959.
[27] B. D. Kumar and A. S. Kareemulla, “Smart mobile attendance system for employees using QR scanner,” Asian Journal of Applied
Science and Technology (AJAST), vol. 1, no. 5, pp. 35–39, 2017.
BIOGRAPHIES OF AUTHORS
Muhammad Imanullah graduated from computer science of Brawijaya
University, Indonesia, in 2016. He continued his study in Sepuluh Nopember Institute of
Technology, Surabaya, and graduated in 2019. He currently works as a lecturer in
Muhammadiyah University of Bengkulu. He has interest in the field of game technology. His
research is connected to the field of human computer interaction, computer vision, and video
games. Now he is focusing his career in academic and having dreams of digitizing some
aspects in society related to cultural heritage as a preservation effort. He can be contacted at
email: muhammad.iman@umb.ac.id.
Yuza Reswan has been researching in the field of image processing since
graduated from Dian Nuswantoro University of Semarang, Indonesia, in 2012. He found his
interest in the field since graduated from Dehasen University of Bengkulu, Indonesia in 2009.
He currently works as a lecturer in Muhammadiyah University of Bengkulu. He can be
contacted at email: yuzareswan@umb.ac.id.