Thursday 7 November 2013

Week 8: Flow Chart


Figure 4.2 :Operation’s Flow Chart

By referring to the flow chart above ,the project starts with password pattern recognition then the thumbprint device to recognize the thumbprint identification. The devices will send the gathered information to the software for identification purpose. After that, the develop software will analyze the data received either it match or unmatched with the data in the storage.Data storage have been store some of the user’s thumbprint pattern. The time entry will be save in the data storage after the user’s entry. In case the information matched with the data, it will give the authorize people to access the system.Otherwise, if the information is incorrect, the alarm will trigger and the security guard will be notice to take some action.

No comments:

Post a Comment