The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ web-based application to enhance attendance management. The hardware encompasses the integration of an ESP8266 NodeMCU and the biometric AS608 fingerprint sensor interfaced with the database for which the front-end and back-end integration was through the React framework. The system uses a web application that displays the attendance results and scheduled course data from its database, provides feedback to lecturers on which student missed classes and calculates a student’s average attendance for the semester. By implementing this system, the accuracy of student attendance is expected to experience an appreciable improvement, eliminate proxy signing, provide a more secure alternative for attendance recording, curtail tardiness to classes, and ultimately improve student productivity on execution.
Background: An injury to both the primary and permanent teeth and the supporting structures is one of the most common dental problems seen in children. Splinting is usually difficult or impossible to perform in the primary dentition (due to diminutive room size and lack of patient cooperation). Healing must, therefore, occur despite mobility at the fracture line, usually resulting in interposition of connective tissue. In some instances, infection will occur in the coronal pulp. The present study reported a case of trauma to the anterior primary teeth and alveolar bone in a four year old child. The trauma has caused fracture to the crowns and roots of the primary anterior teeth. The following case was managed in a procedure that may
... Show MoreQuantum calculations on the most stable structure were carried
out for calculating the electronic properties, energies and the charge
density at the Carbon and Hydrogen atoms by Semi-empirical
method (PM3) of zigzag carbon nano tube CNT (9,0) (SWCNTs), at
the equilibrium geometry depending on the pictures of Zigzag
CNT(9,0) which was found to has D3d symmetry point group by
applying for (Gaussian 2003) program. In this work the results
include calculation the relation for axial bonds length, which are the
vertical C-C bonds (annular bonds) in the rings and bonds length
which are in the outer ring that called the circumferential bonds. Also
include a different kind of vibration modes like breathing, puckering
The electronic structure of zinc blend indium gallium phosphide In0.5Ga0.5P nanocrystals which have dimension (2-2.8 nm) is investigated using the density functional theory coupled with large unit cell (LUC) for the different size core (8 ,16,54,64) atoms respectively. The investigated properties include total energy, energy gap, conduction band, valence band, cohesive energy, ionicity and density of state etc. as a function of core size and lattice constant. Results show the shape effect of increasing the core size and lattice constant on these electronic properties
Ab – initio density function theory (DFT) calculations coupled with Large Unit Cell (LUC) method were carried out to evaluate the electronic structure properties of III-V zinc blend (GaAs). The nano – scale that have dimension (1.56-2.04)nm. The Gaussian 03 computational packages has been employed through out this study to compute the electronic properties include lattice constant, energy gap, valence and conduction band width, total energy, cohesive energy and density of state etc. Results show that the total energy and energy gap are decreasing with increase the size of nano crystal . Results revealed that electronic properties converge to some limit as the size of LUC increase .
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreSmart systems are the trend for modern organizations and should meet the quality of services that expect to produce. Internet of Everything (IoE) helped smart systems to adopt microcontrollers for improving the performance. Analyzing and controlling data in such a system are critical issues. In this study, a survey of IoE systems conducted to show how to apply a suitable model that meets such system requirements. The analysis of some microcontroller boards is explored based on known features. Factors for applying IoE devices have been defined such as connectivity, power consumption, compatibility, and cost. Different methods have been explained as an overview of applying IoE systems. Further, different approaches for applying IoE technology
... Show More