Научная статья на тему 'METHODS FOR BUILDING ACCESS CONTROL SYSTEMS IN UNIVERSITIES BASED ON BIOMETRIC IDENTIFICATION'

METHODS FOR BUILDING ACCESS CONTROL SYSTEMS IN UNIVERSITIES BASED ON BIOMETRIC IDENTIFICATION Текст научной статьи по специальности «Компьютерные и информационные науки»

49
13
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
teaching staff / accounting of working time / control / electronic journal / university teacher.

Аннотация научной статьи по компьютерным и информационным наукам, автор научной работы — Kamil Fikratovich Kerimov, Zebiniso Abdulxamidovna Abduvalieva

This article discusses the access control system in universities. The method of accounting for the working time of teachers of the department. The positive and negative sides of access control are found out. Examples of the introduction of an electronic journal are given

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «METHODS FOR BUILDING ACCESS CONTROL SYSTEMS IN UNIVERSITIES BASED ON BIOMETRIC IDENTIFICATION»

METHODS FOR BUILDING ACCESS CONTROL SYSTEMS IN UNIVERSITIES BASED ON BIOMETRIC IDENTIFICATION

Kamil Fikratovich Kerimov

Tashkent University of Information Technologies named after Muhammad al-

Khwarizmi, Associate Professor

Zebiniso Abdulxamidovna Abduvalieva

Tashkent University of Information Technologies named after Muhammad al-

Khwarizmi, graduate student zebiniso_777@mail .ru

This article discusses the access control system in universities. The method of accounting for the working time of teachers of the department. The positive and negative sides of access control are found out. Examples of the introduction of an electronic journal are given.

Keywords: teaching staff, accounting of working time, control, electronic journal, university teacher.

INTRODUCTION

The article considers the method of using access control as a tool for effective organization of the teacher's time in the context of informatization of the educational process. A developed version of the access control method for teaching staff and employees implemented based on personal identification by biometric parameters is proposed. It should be noted that the traditional methods of monitoring the teaching staff through the exit-arrival log have many disadvantages. This method is no longer effective and has several disadvantages. The disadvantages of a traditional journal include that it does not have an electronic version, there is no way to identify it by a biometric parameter.

This article considers the implementation of access control to track the time of the teaching staff of the department and employees of higher educational institutions. The electronic journal as an identification method allows to correct some shortcomings. Development of the electronic information environment of the university. Formation of correct statistical

ABSTRACT

reports in the field of recording the working time of the teaching

March, 2022

staff to increase efficiency. Improving the workflow between the administration, the department, the dean's office, and the personnel department. This will effectively affect the time of document circulation between departments of higher education institutions, reduce the number of paper versions of documents.

It is not difficult to see that part of the education takes place online. Systems such as moodle have been introduced, which have shown their effectiveness during quarantine.

If we make a comparative analysis, then we can say that the program "Employee Management System, Attendance Manager" has its advantages compared to the programs listed above, as it has more functionality.

The relevance of the development and application of an electronic journal at a university is determined by the following factors:

- introduction of an electronic method of attendance control, which allows you to automate working hours

- requirements for teaching staff, more productive use of teachers' working

time

- calculation of the salaries of the teaching staff, due to the automation of the process, communication of the department with the personnel department and accounting

- requirements for the teaching staff of the department and university

- calculation of wages during sick leave, the program indicates how many hours the teacher's sick leave lasted and, depending on this, you can calculate the salary for children

- the transition to an electronic journal helps to automate the relationship of the department with the personnel department and accounting

MATERIAL AND METHODS

As a method of identifying a person by biometric parameters, methods of face image recognition are proposed.

Image recognition is directly related to pattern recognition. To recognize an image, key features such as facial features, selection weights, and related features should be taken into account.

March, 2022

Figure 1. Image recognition process The set of eigenvectors of the face image obtained from the training sample is used to recognize all other faces.

RESEARCH RESULTS

Let's do a principal component analysis. Covariance component:

1. Initial data: x i j=x ij — (i . where (i = -Yj 1 x ij

those to the construction of a linearly independent system of vectors [xl,x2 ,x3,..,xn} such that the most essential coordinates for recognizing the vector f '' in this basis

/ = a±x± +

d3X3 + ... CLnXn

were his first in a small number, i.e., let's say the numbers a 1, a 2 ,..a 5 a 1, a 2 ,.. .,a 5 . The union of discrepancies is calculated by the following

formula x i j = ^ , where a j = l (xij — (i)2. Covariance matrix £ : — XXT,

where is the face image In this case, when:

Xj-X^l 1 for j ==k

J K (0 for j ^ k;

We choose this basis using the singular value decomposition of the matrix F, composed of the rows flt . . ., fa 0 0 : : Computer vectors here: £ : WT

Projecting X onto k Principal Components

March, 2022

518

Y k * n

WT k * d

*

d * n

When developing access control, an image database was used. Each image has 20 varieties, depending on size and condition

A biometric image recognition system recognizes an image by comparing it with images in the database.

CONCLUSION

In conclusion, we can say that traditional methods of access control are outdated and have been replaced by more effective and new methods, such as access control of employee attendance time. Access control has its advantages over traditional access control, it is more efficient, and it provides accurate attendance data. Access control performs the following functions:

- fixes the time of arrival and time of departure from the workplace,

- connected to the calendar and it is possible to view attendance for a specific day,

- communication between the department and the personnel department,

- communication with accounting,

- attendance statistics.

This method of access control allows the head of the department and teachers to track the personal and group dynamics of attendance almost continuously (weekly).

REFERENCES

1. Potapov A. (2017). Automatic image analysis and pattern recognition (2017). LAP Lambert Academic Publishing.

2. Brilyuk D.V., Starovoitov V.V. (2002). Recognition of a person by face image by neural network methods. Minsk.

3. Emelyanov, S.V. (2015) Information technologies and computing systems. Computing systems. Computer graphics. Pattern recognition. Mathematical modeling. Issue No. 2. - Moscow: Mir.

4. Kapitonova, T. A. (2015). Neural network modeling in pattern recognition. Philosophical and methodological aspects. Moscow.

March, 2022

519

i Надоели баннеры? Вы всегда можете отключить рекламу.