Figure
4.2 :Operation’s Flow Chart
By referring to the flow chart above ,the project starts with
password pattern recognition then the thumbprint device to recognize the
thumbprint identification. The devices will send the gathered information to
the software for identification purpose. After that, the develop software will
analyze the data received either it match or unmatched with the data in the
storage.Data storage have been store some of the user’s thumbprint pattern. The
time entry will be save in the data storage after the user’s entry. In case the
information matched with the data, it will give the authorize people to access
the system.Otherwise, if the information is incorrect, the alarm will trigger
and the security guard will be notice to take some action.
No comments:
Post a Comment