European Proceedings Logo

An Intelligent Automated Attendance Data Management System Based On Case Based Authentication

Table 3:

Approach Strengths Weakness
Proposed System Flexible inferencing attendance authenticationMobile platformAuthentication is automatedProvide interactivity through notificationEnable alert system Requires Internet ConnectionCentres around the door as an access control point
NFC More cost-effective compared to RFIDDisplay of successful process transaction ( Ayu & Ahmad, 2014)Short communication range techniquesUse less power than Bluetooth Restricted to the Android platformRequires NFC readers and tags.Higher risk of proxy attendance
RFID Semi-automated to include flexible monitoring ( Murizah et al., 2012)Utilize log data from the RFID terminal as identifierNotification for attendance confirmation ( Arulogun et al., 2013) Requires RFID readers and tags.Higher risk of proxy attendance if only use RFIDLoss of tags
Biometric Unique physical features as the identifierRanges from fingerprint, face and iris authentication.Eliminates buddy clocking which allows someone else to mark the attendance on our behalf ( Opoku, 2013) Requires scanner and sensorsThe accuracy of a biometric device must be determined and monitored constantly ( Shoewnu & Idowu, 2012)
< Back to article