SlideShare a Scribd company logo
Major Project
On
Biometric Fingerprint
Attendance System
Biometrics
 Biometrics, is the science of establishing the identity of
a person based on physical or behavioral attributes.
 Biometrics involves the different parts of the body,
such as the fingerprint or the eye, as a password or form
of identification .
 The word biometrics means biological measurements.
Therefore in this way we can use computers to
recognize person.
Modes:-
There are two modes in biometric system:-
1. Verification mode
2. Identification mode
Three steps involved in person verification:-
 In first step the reference models for all the users are
generated and stored in the model database.
 In second step some samples are matched with
reference models to generate the genuine and imposter
scores and calculate the threshold.
 The third step is the testing step .This process may use a
smartcard , username or ID number.
 It performs a one to many comparison against a
biometric database in attempt to establish the identity of
an unknown individual. It is used either for positive or
negative recognisation .
What is Fingerprint?
 A fingerprint is the pattern of ridges and valleys on the
surface of a fingertip.
 The endpoints and crossing points of ridges are called
minutiae. It is a widely accepted assumption that the
minutiae pattern of each finger is unique and does not
change during one's life. Ridge endings are the points
where the ridge curve terminates.
What is Fingerprint
recognition?
Fingerprint recognition consists of comparing a print
of the characteristics of a fingertip or a template of
that print with a stored template or print.
 A fingerprint scanner system has two basic jobs -- it
needs to get an image of your finger, and it needs to
determine whether the pattern of ridges and valleys in
this image matches the pattern of ridges and valleys in
pre-scanned images.
 Only specific characteristics, which are unique to every
fingerprint, are filtered and saved as an encrypted
biometric key or mathematical representation. No image
of a fingerprint is ever saved, only a series of numbers (a
binary code), which is used for verification.The algorithm
cannot be reconverted to an image, so no one can
duplicate your fingerprints.
Features
 A fingerprint consists of the features and details of a
fingertip. There are three major fingerprint features:
 Arches: Arches are lines that start on one side of
the print, rise into hills and then exit on the other
side of the print.
 Loop: Loops are lines that enter and Exit on the
same side of the print.
 Whorl: Whorls are circles that do not exit on either
side of the print.
BLOCK DIAGRAM
Components Used
 Power Supply
 LCD
 Microcontroller
 RTC
 Fingerprint Scanner
 EEPROM
 Switches
Power Supply
 Power supplies are designed to convert high voltage AC
mains electricity to a suitable low voltage supply for
electronics circuits and other devices. A power supply can
by broken down into a series of blocks.
D2
C1
1000uf
1N4007 +5V
V
LM7805
1 2
3
VIN VOUT
GND
J1
1
2
3
D3
gnd
D4
D1
Transformer:-Transformers convert AC electricity from one
voltage to another with little loss of power.Transformers
work only with AC and this is one of the reasons why
mains electricity is AC.
Rectifier:-A bridge rectifier can be made using four individual
diodes, but it is also available in special packages containing
the four diodes required. It is called a full-wave rectifier
because it uses all the AC wave (both positive and negative
sections). 1.4V is used up in the bridge rectifier because
each diode uses 0.7V when conducting and there are always
two diodes conducting.
Voltage regulator:- ICs are available with fixed (typically 5, 12
and 15V) or variable output voltages.They are also rated by
the maximum current they can pass. Negative voltage
regulators are available, mainly for use in dual supplies
Microcontroller
 A microcontroller is a programmable logic and
integrated circuit which can be programmed to do a
number of tasks.
 It is possible to control just about anything with the
program written by the user.
 A microcontroller is meant to be more self-contained and
independent , and functions as a tiny, dedicated
computer.
Functions:-
Ability to execute a stored set of instructions to
carry out user defined task.
Ability to access external memory chips to read
and write data from memory.
Ability to interface with the I/O devices.
Features:-
ADCs and DACs
Internal EEPROM
UART for serial communication
Pin description of 8051
microcontroller
 VCC:-Supply voltage.
 GND:-Circuit ground potential.
 Port 0:-Port 0 is an 8-bit open-drain bi-directional I/O
port. As an Output port, each pin can sink eightTTL inputs.
In this mode P0 has internal pull-ups. Port 0 also receives
the code bytes during Flash programming, and outputs the
code bytes during program verification. External pull-ups
are required during program verification.
 Port 1:- is an 8-bit bi-directional I/O port with internal
pull-ups.The Port 1 output buffers can sink/source fourTTL
inputs. As inputs, Port 1 pins that are externally being
pulled low will source current (IIL) because of the internal
pull-ups.
 Port 2:-Port 2 is an 8-bit bi-directional I/O port with
internal pull-ups. Port 2 emits the high-order address byte
during fetches from external program memory and during
accesses to external data memory.
 Port 3:-Port 3 is an 8-bit bi-directional I/O port with
internal pull-ups . It also serves the functions of various
special features of 8051 family.
 RST:- Reset input. A high on this pin for two machine
cycles while the oscillator is running resets the device.
 ALE/PROG:- Address Latch Enable output pulse for
latching the low byte of the address during accesses to
external memory.This pin is also the program pulse
input (PROG) during programming. It may be used for
external timing or clocking purposes.
 PSEN :-Program Store Enable is the read strobe to
external program memory. PSEN is activated twice
each machine cycle.
 EA/VPP:-When EA is held high the CPU executes out
of internal program memory. Holding EA low forces the
CPU to execute out of external memory regardless of
the Program CounterValue.
 XTAL1:-Input to the inverting oscillator amplifier.
 XTAL2:-Output from the inverting oscillator
amplifier.
LCD
A low-power, flat-panel display used in many
digital devices to display numbers or images. It is
made of a liquid containing crystals that are
affected by electric current, sandwiched
between filtering layers of glass or plastic. LCDs
do not produce light of their own; instead, when
electric current is passed through the material,
the molecules of the liquid crystal twist so that
they either reflect or transmit light from an
external source.
Boimetric  using 8051
EEPROM
These memory devices are used to store the data for
online process.The AT24C64 provides 65,536 bits of
serial electrically erasable and programmable read only
memory (EEPROM) organized as 8192 words of 8 bits
each.The device is optimized for use in many industrial
and commercial applications where low power and low
voltage operation are essential.
Boimetric  using 8051
RTC
 A real-time clock (RTC) is a computer clock (most often in
the form of an integrated circuit) that keeps track of the
current time. Although the term often refers to the
devices in personal computers, servers and embedded
systems, RTCs are present in almost any electronic
device which needs to keep accurate time.
Boimetric  using 8051
Fingerprint Scanner
 The comparison between the sensed fingerprint image
or template against records in a database or a chip
usually yields a matching score quantifying the similarity
between the two representations. If the score is higher
than a certain threshold, a match is declared, i.e.
belonging to the same finger(s).The decision of a match
or non-match can be automated but it depends also on
whether matching is done for identification or
verification purposes.
Boimetric  using 8051
Application features
and capabilities
 Managed by an administrator
 Data export
 Reports generation
 Full control on employee attendance
 Fast and simple usage
 Several fingers for each user
 Notification by e-mail
Software Used
 Keil:-The Keil 8051 DevelopmentTools are designed to
solve the complex problems facing embedded software
developers.The Keil µVision Debugger accurately
simulates on-chip peripherals (I²C, CAN, UART, SPI,
Interrupts, I/O Ports, A/D Converter, D/A Converter, and
PWM Modules) of your 8051 device.
 MATLAB:-MATLAB (matrix laboratory) is a numerical
computing environment and fourth-generation
programming language. Developed by MathWorks,
MATLAB allows matrix manipulations, plotting of
functions and data, implementation of algorithms,
creation of user interfaces, and interfacing with
programs written in other languages, including C, C++
and java.
Retina Scan
 The human retina is a thin tissue composed of neural
cells that is located in the posterior portion of the eye.
Because of the complex structure of the capillaries that
supply the retina with blood, each person's retina is
unique.The network of blood vessels in the retina is so
complex that even identical twins do not share a similar
pattern.
How does it works?
 The user looks through a small opening in the device
at a small green light.The user must keep their head
still and eye focused on the light for several seconds
during which time the device will verify his identity.
This process takes about 10 to 15 seconds total.
Advantages
 Low occurrence of false positives
 Extremely low (almost 0%) false negative rates
 Highly reliable because no two people have the same
retinal pattern
 Speedy results: Identity of the subject is verified very
quickly
Disadvantages
 Measurement accuracy can be affected by a disease such
as cataracts
 Measurement accuracy can also be affected by
severe astigmatism
 Scanning procedure is perceived by some as invasive
 Not very user friendly
 Subject being scanned must be close to the camera
optics
Uses
 Retinal scanners are typically used for authentication and
identification purposes.
 Retinal scanning has been utilized by several government
agencies including the FBI, CIA, and NASA.
 Retinal scanning has been used in prisons,
forATM identity verification and the prevention
of welfare fraud.
 Retinal scanning also has medical application such
as AIDS, syphilis, malaria, chicken pox and Lyme
disease as well as hereditary
diseases like leukemia, lymphoma, and sickle cell anemia
first impact the eyes.
Conclusion
 This project mainly comprises of development of
attendance management system and fingerprint
identification system . Attendance management is very
helpful in saving valuable time of students and teachers ,
paper and generating report at required time .This
project presented a framework using which attendance
management can be made automated and online.
THANK YOU

More Related Content

PPTX
Humidity & Temperature monitoring using arduino
DOCX
design of FPGA based traffic light controller system
PDF
IOT Based Environmental Pollution Monitoring System
PPTX
RFID attendance system
PDF
8051 interfacing
DOC
Biometrics Technology Seminar Report.
PPT
Fingerprint attendance system
PPTX
Introduction to Embedded System I: Chapter 2 (5th portion)
Humidity & Temperature monitoring using arduino
design of FPGA based traffic light controller system
IOT Based Environmental Pollution Monitoring System
RFID attendance system
8051 interfacing
Biometrics Technology Seminar Report.
Fingerprint attendance system
Introduction to Embedded System I: Chapter 2 (5th portion)

What's hot (20)

PPTX
Distance Measurement by Ultrasonic Sensor
PPTX
Biometric Voting System
PPTX
Smart Attendance System using RFID
PPT
Fingerprintattendancesystem 131016052949-phpapp01
PPTX
IoT Based Home Automation System Presantation
PPTX
Obstacle avoidance robot
PDF
8051 Microcontroller I/O ports
PDF
Digital Electronics Lab
PDF
Project Report on Hand gesture controlled robot part 2
PPTX
RFID based Attendance System
PPTX
Home automation using blynk
PPTX
Arduino RFID Module (RC522) & Buzzer Access System
PDF
IoT and Fingerprint Based Door Looking System
PPTX
PLC and SCADA in Industrial Automation
DOCX
Electronic voting machine presentation
PPTX
Robotic Hand
PPTX
Serial Communication in 8051
PDF
REAL TIME HEART BEAT MONITORING SYSTEM USING PIC16F876 MICROCONTROLLER
PPTX
CONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCU
PPTX
Biometric Attendence system asha
Distance Measurement by Ultrasonic Sensor
Biometric Voting System
Smart Attendance System using RFID
Fingerprintattendancesystem 131016052949-phpapp01
IoT Based Home Automation System Presantation
Obstacle avoidance robot
8051 Microcontroller I/O ports
Digital Electronics Lab
Project Report on Hand gesture controlled robot part 2
RFID based Attendance System
Home automation using blynk
Arduino RFID Module (RC522) & Buzzer Access System
IoT and Fingerprint Based Door Looking System
PLC and SCADA in Industrial Automation
Electronic voting machine presentation
Robotic Hand
Serial Communication in 8051
REAL TIME HEART BEAT MONITORING SYSTEM USING PIC16F876 MICROCONTROLLER
CONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCU
Biometric Attendence system asha
Ad

Similar to Boimetric using 8051 (20)

PPTX
FINGERPRINT BASED ATM SYSTEM...............
PDF
biometrics
PPTX
Fingerprint Based Security System
PPTX
Fingerprint EVM
PDF
Biometric smart card polling system12
PPTX
Project_updated
PPTX
IEEE ACADEMIC PROJECTS
DOC
Finger print authentication for bikes
PDF
Fingerprint base security system
PPTX
Biometrics fingerprint
PPTX
RFID based Access Control using 8051 Micro Controller
DOC
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
PDF
Slidedayo
PDF
MATRIX Biometrics Technology New
PPTX
RTOS based Confidential Area Security System
PPT
Biometrics Technology1
PPT
Ppt embedded
DOC
Bm 06 FINGER PRINT BASED SECURITY SYSTEM
DOC
12.automatic toll gate billing system using rfid.
PPTX
Badal sharma
FINGERPRINT BASED ATM SYSTEM...............
biometrics
Fingerprint Based Security System
Fingerprint EVM
Biometric smart card polling system12
Project_updated
IEEE ACADEMIC PROJECTS
Finger print authentication for bikes
Fingerprint base security system
Biometrics fingerprint
RFID based Access Control using 8051 Micro Controller
Bm 01 FINGERPRINT BASED AUTHENTICATION SYSTEM
Slidedayo
MATRIX Biometrics Technology New
RTOS based Confidential Area Security System
Biometrics Technology1
Ppt embedded
Bm 06 FINGER PRINT BASED SECURITY SYSTEM
12.automatic toll gate billing system using rfid.
Badal sharma
Ad

Recently uploaded (20)

PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Welding lecture in detail for understanding
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
Construction Project Organization Group 2.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Geodesy 1.pptx...............................................
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Welding lecture in detail for understanding
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Digital Logic Computer Design lecture notes
Construction Project Organization Group 2.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
573137875-Attendance-Management-System-original
additive manufacturing of ss316l using mig welding
Geodesy 1.pptx...............................................
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
UNIT 4 Total Quality Management .pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Model Code of Practice - Construction Work - 21102022 .pdf

Boimetric using 8051

  • 2. Biometrics  Biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes.  Biometrics involves the different parts of the body, such as the fingerprint or the eye, as a password or form of identification .  The word biometrics means biological measurements. Therefore in this way we can use computers to recognize person.
  • 3. Modes:- There are two modes in biometric system:- 1. Verification mode 2. Identification mode
  • 4. Three steps involved in person verification:-  In first step the reference models for all the users are generated and stored in the model database.  In second step some samples are matched with reference models to generate the genuine and imposter scores and calculate the threshold.  The third step is the testing step .This process may use a smartcard , username or ID number.
  • 5.  It performs a one to many comparison against a biometric database in attempt to establish the identity of an unknown individual. It is used either for positive or negative recognisation .
  • 6. What is Fingerprint?  A fingerprint is the pattern of ridges and valleys on the surface of a fingertip.  The endpoints and crossing points of ridges are called minutiae. It is a widely accepted assumption that the minutiae pattern of each finger is unique and does not change during one's life. Ridge endings are the points where the ridge curve terminates.
  • 7. What is Fingerprint recognition? Fingerprint recognition consists of comparing a print of the characteristics of a fingertip or a template of that print with a stored template or print.
  • 8.  A fingerprint scanner system has two basic jobs -- it needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images.  Only specific characteristics, which are unique to every fingerprint, are filtered and saved as an encrypted biometric key or mathematical representation. No image of a fingerprint is ever saved, only a series of numbers (a binary code), which is used for verification.The algorithm cannot be reconverted to an image, so no one can duplicate your fingerprints.
  • 9. Features  A fingerprint consists of the features and details of a fingertip. There are three major fingerprint features:  Arches: Arches are lines that start on one side of the print, rise into hills and then exit on the other side of the print.  Loop: Loops are lines that enter and Exit on the same side of the print.  Whorl: Whorls are circles that do not exit on either side of the print.
  • 11. Components Used  Power Supply  LCD  Microcontroller  RTC  Fingerprint Scanner  EEPROM  Switches
  • 12. Power Supply  Power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits and other devices. A power supply can by broken down into a series of blocks. D2 C1 1000uf 1N4007 +5V V LM7805 1 2 3 VIN VOUT GND J1 1 2 3 D3 gnd D4 D1
  • 13. Transformer:-Transformers convert AC electricity from one voltage to another with little loss of power.Transformers work only with AC and this is one of the reasons why mains electricity is AC.
  • 14. Rectifier:-A bridge rectifier can be made using four individual diodes, but it is also available in special packages containing the four diodes required. It is called a full-wave rectifier because it uses all the AC wave (both positive and negative sections). 1.4V is used up in the bridge rectifier because each diode uses 0.7V when conducting and there are always two diodes conducting.
  • 15. Voltage regulator:- ICs are available with fixed (typically 5, 12 and 15V) or variable output voltages.They are also rated by the maximum current they can pass. Negative voltage regulators are available, mainly for use in dual supplies
  • 16. Microcontroller  A microcontroller is a programmable logic and integrated circuit which can be programmed to do a number of tasks.  It is possible to control just about anything with the program written by the user.  A microcontroller is meant to be more self-contained and independent , and functions as a tiny, dedicated computer.
  • 17. Functions:- Ability to execute a stored set of instructions to carry out user defined task. Ability to access external memory chips to read and write data from memory. Ability to interface with the I/O devices. Features:- ADCs and DACs Internal EEPROM UART for serial communication
  • 18. Pin description of 8051 microcontroller
  • 19.  VCC:-Supply voltage.  GND:-Circuit ground potential.  Port 0:-Port 0 is an 8-bit open-drain bi-directional I/O port. As an Output port, each pin can sink eightTTL inputs. In this mode P0 has internal pull-ups. Port 0 also receives the code bytes during Flash programming, and outputs the code bytes during program verification. External pull-ups are required during program verification.  Port 1:- is an 8-bit bi-directional I/O port with internal pull-ups.The Port 1 output buffers can sink/source fourTTL inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups.
  • 20.  Port 2:-Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory.  Port 3:-Port 3 is an 8-bit bi-directional I/O port with internal pull-ups . It also serves the functions of various special features of 8051 family.  RST:- Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device.
  • 21.  ALE/PROG:- Address Latch Enable output pulse for latching the low byte of the address during accesses to external memory.This pin is also the program pulse input (PROG) during programming. It may be used for external timing or clocking purposes.  PSEN :-Program Store Enable is the read strobe to external program memory. PSEN is activated twice each machine cycle.
  • 22.  EA/VPP:-When EA is held high the CPU executes out of internal program memory. Holding EA low forces the CPU to execute out of external memory regardless of the Program CounterValue.  XTAL1:-Input to the inverting oscillator amplifier.  XTAL2:-Output from the inverting oscillator amplifier.
  • 23. LCD A low-power, flat-panel display used in many digital devices to display numbers or images. It is made of a liquid containing crystals that are affected by electric current, sandwiched between filtering layers of glass or plastic. LCDs do not produce light of their own; instead, when electric current is passed through the material, the molecules of the liquid crystal twist so that they either reflect or transmit light from an external source.
  • 25. EEPROM These memory devices are used to store the data for online process.The AT24C64 provides 65,536 bits of serial electrically erasable and programmable read only memory (EEPROM) organized as 8192 words of 8 bits each.The device is optimized for use in many industrial and commercial applications where low power and low voltage operation are essential.
  • 27. RTC  A real-time clock (RTC) is a computer clock (most often in the form of an integrated circuit) that keeps track of the current time. Although the term often refers to the devices in personal computers, servers and embedded systems, RTCs are present in almost any electronic device which needs to keep accurate time.
  • 29. Fingerprint Scanner  The comparison between the sensed fingerprint image or template against records in a database or a chip usually yields a matching score quantifying the similarity between the two representations. If the score is higher than a certain threshold, a match is declared, i.e. belonging to the same finger(s).The decision of a match or non-match can be automated but it depends also on whether matching is done for identification or verification purposes.
  • 31. Application features and capabilities  Managed by an administrator  Data export  Reports generation  Full control on employee attendance  Fast and simple usage  Several fingers for each user  Notification by e-mail
  • 32. Software Used  Keil:-The Keil 8051 DevelopmentTools are designed to solve the complex problems facing embedded software developers.The Keil µVision Debugger accurately simulates on-chip peripherals (I²C, CAN, UART, SPI, Interrupts, I/O Ports, A/D Converter, D/A Converter, and PWM Modules) of your 8051 device.  MATLAB:-MATLAB (matrix laboratory) is a numerical computing environment and fourth-generation programming language. Developed by MathWorks, MATLAB allows matrix manipulations, plotting of functions and data, implementation of algorithms, creation of user interfaces, and interfacing with programs written in other languages, including C, C++ and java.
  • 33. Retina Scan  The human retina is a thin tissue composed of neural cells that is located in the posterior portion of the eye. Because of the complex structure of the capillaries that supply the retina with blood, each person's retina is unique.The network of blood vessels in the retina is so complex that even identical twins do not share a similar pattern.
  • 34. How does it works?  The user looks through a small opening in the device at a small green light.The user must keep their head still and eye focused on the light for several seconds during which time the device will verify his identity. This process takes about 10 to 15 seconds total.
  • 35. Advantages  Low occurrence of false positives  Extremely low (almost 0%) false negative rates  Highly reliable because no two people have the same retinal pattern  Speedy results: Identity of the subject is verified very quickly
  • 36. Disadvantages  Measurement accuracy can be affected by a disease such as cataracts  Measurement accuracy can also be affected by severe astigmatism  Scanning procedure is perceived by some as invasive  Not very user friendly  Subject being scanned must be close to the camera optics
  • 37. Uses  Retinal scanners are typically used for authentication and identification purposes.  Retinal scanning has been utilized by several government agencies including the FBI, CIA, and NASA.  Retinal scanning has been used in prisons, forATM identity verification and the prevention of welfare fraud.  Retinal scanning also has medical application such as AIDS, syphilis, malaria, chicken pox and Lyme disease as well as hereditary diseases like leukemia, lymphoma, and sickle cell anemia first impact the eyes.
  • 38. Conclusion  This project mainly comprises of development of attendance management system and fingerprint identification system . Attendance management is very helpful in saving valuable time of students and teachers , paper and generating report at required time .This project presented a framework using which attendance management can be made automated and online.