基于指纹识别的员工考勤系统设计与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
本文首先概述了生物识别技术、指纹识别技术。以此为基础,设计与实现了基于指纹识别的员工考勤系统。
     本文主要工作如下:
     首先,结合目标单位的实际情况展开了需求分析。全面了解了目标单位的人事考勤现状、现行的考勤制度、对考勤系统的目标、性能及其特殊要求等,对开发的员工考勤系统做好了定位:该考勤系统采用目前流行的指纹识别技术,整体系统包括硬件、软件两方面,其中硬件系统指纹识别方面将直接购买当前的主流指纹考勤机,开发工作重点放在考勤系统的软件设计与实现方面。
     其次,对考勤软件系统要实现的功能进行了模块分解;进而从普通员工、管理人员、系统后台人员三个角色对考勤软件系统的用例及数据流等方面开展设计工作;重点开发了整个软件系统的核心—数据库:全面分析考勤软件系统涉及到的E-R关系,从而定义好数据库中关系表的结构,设计好关系表的调用、数据库访问以及数据库安全等环节。
     此外,在考勤软件设计的基础上开发实现了普通员工、管理人员、系统后台人员三个子系统的软件,该软件涵盖了目标单位当前主要的人事考勤工作;截取了主要操作流程的软件效果图;在设置指纹考勤机与计算机及考勤软件的联机基础上,完成了一枚指纹从采集、预处理、比对到生成考勤记录最终上传到数据库的各个环节,实现了整个考勤系统的软、硬件协同工作。
     最后,按照软件测试的“白盒测试”和“黑盒测试”两种方法,分别由软件设计开发人员、终端用户完成了对系统的两个阶段的测试工作。经过系统测试,完善了考勤系统。
The paper begins with a brief introduction to biometric technology and fingerprint identification, based on which the paper, then, tries to design and realize the attendance management system.
     The following are the four major parts of this paper:
     In the first part, there is the needs analysis on the actual situation of the target unit. To do the needs analysis, we need to know the present personnel attendance situation of the target unit, including: its existing attendance management system, and its objectives, performance and special requirements on this system. After the analysis, the next step is to position the would-be attendance management system. The new system is to use the most popular fingerprint identification technology at present. The system divides into two parts: hardware and software. The hardware part is easy to realize, we can directly buy the fingerprint attendance machine in the market. Therefore, the major task is to design and realize the software.
     The second part realizes the module decomposition of the functions achieved through the attendance management system. Then, this part designs the cases and data of this system in detail by taking the following three levels as examples: the general staff, managers, and system back office staff. Most importantly, this step accomplishes the development of the database of the software, which is the core of the whole software. Besides, the part analyzes the E-R relation of the system. As a result, the structure of relational tables in the database can be defined; the use of the tables can be designed; the access, security and other areas of the database can also be realized.
     Thirdly, based on the attendance system software, this part accomplishes three subsystems concerning the three levels mentioned above: the general staff, managers, and system back office staff. The subsystems cover the current personnel attendance work of the target unit and choose the software renderings of the main operational processes. By connecting the fingerprint attendance machine, the computer and the attendance system software, this new system can be used to collect the fingerprint, preprocess it, compare it, generate attendance system and finally upload it to the database. In this way, the hardware and software may work together to serve the whole system.
     Finally, in accordance with the software testing of the "white box" and "black box" methods, the software developers, end users of the system are to complete the two-stage testing work. After testing, the attendance system is improved.
引文
[1]翁南洲.生物特征识别技术的特点及应用前景.浙江公安高等专科学校学报, 2006, 4: 103-105
    [2] J. ORTEGA-GARCIA, J. BIGUN, D. REYNOLDS, et al. Authentication Gets Personal with Biometrics. Signal Proeessing Magazine, IEEE, 2004, 21(2): 50-62
    [3] A.K. JAIN, A. ROSS, S. PRABHAKAR. An Introduction to Biometrie Recognition. IEEE Transactions on Circuits and Systems for Video Technology. 2004, 14(1): 4-20
    [4]黄福,苑全兵,纪丽婷,等.基于人脸识别的考勤系统的设计与研究.电脑开发与应用, 2010,23(3): 37-39
    [5]朱建新,杨小虎.基于指纹的网络身份认证.计算机应用研究, 2001, 12: 14-17
    [6] K. C. FAN, C. W. LIU, Y. K. WANG. A Randomized Approach with Geometric Constraints to Fingerprint Verification. Pattern Recognition, 2000, 33: 1793-1803
    [7] G. L. MARCIALIS, F. ROLI. Fingerprint Verification by Fusion of Optical and Capacitive Sensors. Pattern Recognition Letters, 2004, 25: 1315-1322
    [8] A. K. JAIN, S. PRABHAKAR, S. CHEN. Combining Multiple Matchers for a High Security Fingerprint Verification System. Pattern Recognition Letters, 1999, 20: 1371-1379
    [9] Y. C. CHEN, L. K. CHEN, M. D. TSAI, et al. Fingerprint Verification on Medical Image Reporting System. Computer Methods and Programs in Biomedicine, 2008, 89: 282-288
    [10]张树人,周毅,林泳.指纹图象动识别前的预处理.现代计算机, 1996, 04: 13-15
    [11]赵娟,王典洪.指纹图像匹配的算法研究及其实现.计算机工程与应用, 2005, 13: 66-69
    [12]回文博,张海春,林立忠.一种基于极坐标的指纹分类算法.河北科技大学学报, 2006, 27(2): 162-164
    [13] J. J. FENG. Combining Minutiae Descriptors for Fingerprint matching. Pattern Recognition, 2008, 41: 342-352
    [14] M.R. GIRGIS, A.A. SEWISY, R.F. MANSOUR. A Robust Method for Partial Deformed Fingerprints Verification Using Genetic Algorithm. Expert Systems with Applications, 2009, 36: 2008-2016
    [15]廖开阳,张学东,章明珠.一种新的指纹图像快速细化算法.计算机工程与应用, 2008, 44(5): 93-95
    [16]肖晓丽,王珂铃,李振.一种改进的指纹图像细化算法.计算机应用, 2008, 28(2): 466-468
    [17] R. ADHAMI, P. MEENEN. Fingerprinting for Security. IEEE Potentials, 2001, 20: 33-38
    [18] J. H. SHIN, H. Y. HWANG, S. I. CHIEN. Minutiae Extraction from Fingerprint Images Using Run-Length Code. Lecture Notes in Computer Science, 2003, 2871: 577-584
    [19] R. CHOONWOO, K. HAKIL. A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation. Lecture Notes in Computer Science, 2003, 2587: 525-533
    [20] Y. L. HE, J. TIAN, Q. REN, et al. Maximum-Likelihood Deformation Analysis of Different-Sized Fingerprints. Lecture Notes in Computer Science, 2003, 2688
    [21]王莹,苏成利.指纹图像增强算法研究.科学技术与工程, 2010, 10(1): 94-98
    [22]王志宏,陈志军,杜深惠. SLE4442型IC卡在考勤系统中的应用.河北工业科技, 2008, 25(2): 100-102
    [23]贺颖,蒲晓蓉.应用Gabor滤波的指纹识别算法的研究和实现.计算机工程与应用, 2010, 12: 172-175
    [24]蓝章礼,曹建秋,王华清.基于动态梯度的指纹图像二值化算法. 2008年计算机应用技术交流会论文集, 2008, 34(7): 39-41
    [25]焦瑞莉,潘建军.基于VC5509A的指纹识别预处理系统.第十四届全国信号处理学术年会(CCSP-2009)论文集, 2009, 25(8A): 226-228
    [26]张灵洁,雒喜平,程耀东.基于VC++的考勤信息管理系统开发.测绘科学, 2010, S1: 165-167
    [27]彭曙蓉,王耀南.一种基于指纹识别的网络考勤系统.长沙电力学院学报, 2006, 21(2): 56-58
    [28]高静涛,温红艳,程文明.基于B/S构架的铁路站段指纹考勤系统设计.计算机与数字工程, 2010, 38(2): 141-143
    [29]钟海林,王宜怀,舒胜强.融合GPRS与嵌入式以太网技术的指纹考勤系统设计.计算机应用与软件, 2011, 4: 27-29
    [30]梁宝生.自动指纹识别系统的研究.山西科技, 2005, 06: 73-74
    [31] N. M. EGLI, C. CHAMPOD, P. MARGOT. Evidence Evaluation in Fingerprint Comparison and Automated Fingerprint Identification Systems-Modelling within Finger Variability, Forensic Science International. 2007, 167: 189-195
    [32]利国烟,许颖频.指纹识别的应用与实现.网络安全技术与应用, 2005, 08: 62-64
    [33]卜敏.指纹识别系统在实践中的应用研究.中国人民公安大学学报, 2007, 01: 23-24
    [34]杨伟钧,戴青云,曹江中等.基于高速图像采集的指纹识别系统设计.第十四届全国图象图形学学术会议论文集, 2008, 826-829
    [35]蒋莉.指纹模糊识别技术的研究与实现. [武汉理工大学工学硕士论文]. 2006: 18-21
    [36]王崇文.自动指纹识别方法研究. [重庆大学博士学位论文]. 2002: 25-41
    [37]徐晓明.指纹图像的预处理及特征提取. [大连理工大学硕士学位论文]. 2005: 12-35
    [38]李鹏飞,许照烜.基于.NET的网络指纹门禁系统的设计与实现.安防科技, 2006, 12: 24-27
    [39]柳清.指纹识别考勤管理系统设计与实现. [山东大学硕士学位论文]. 2009: 12-31
    [40]薛亚许,陈金玉.学校指纹考勤系统的设计与实现.微型机与应用, 2011, 30(1): 83-85
    [41]段少雄,田捷,李恒华.高效指纹考勤系统的研究与设计.计算机工程, 2003, 29(9): 37-39
    [42]张帆,杨凌云.高校网络指纹考勤系统的设计与实现.信息技术, 2010, 3: 137-138
    [43]奚建荣.基于局域网的指纹考勤系统的设计实现.现代电子技术, 2006, 5: 98-100
    [44]薛明杰,郭忠文,董大年,等.基于指纹模板的考勤系统设计与实现.计算机应用研究, 2005, 10: 234-236
    [45]郑炯勋.指纹识别技术在考勤管理系统中的应用.科技信息, 2008, 28: 53-54
    [46]陈建孝.利用指纹识别器进行考勤管理.内蒙古农业大学学报, 2006, 27(1): 108-110
    [47]胡建.基于指纹识别的企业员工考勤系统的设计.电脑知识与技术, 2008, 1103-1105
    [48]吴烈,唐伟.考勤工资管理系统的设计与实现.辽宁工程技术大学学报, 2006, 25: 281-282
    [49]单锦辉,姜瑛,孙萍.软件测试研究进展.北京大学学报, 2005, 41(1): 134-145
    [50]许静,陈宏刚,王庆人.软件测试方法简述与展望.计算机工程与应用, 2003, 13: 75-78
    [51]潘立武,杨健.谈应用软件测试方法.福建电脑, 2007, 7: 71-72
    [52]于慧媛,杨光,王勇利.黑盒测试充分性分析.华北煤炭医学院学报, 2010, 12(4): 503-505
    [53]钱银中.白盒测试和黑盒测试在动态软件测试中的应用.常州信息职业技术学院学报, 2005, 4(2): 51-53

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700