Approach |
Strengths |
Weakness |
Proposed System |
Flexible inferencing attendance authenticationMobile platformAuthentication is automatedProvide interactivity through notificationEnable alert system |
Requires Internet ConnectionCentres around the door as an access control point |
NFC |
More cost-effective compared to RFIDDisplay of successful process transaction ( Ayu & Ahmad, 2014)Short communication range techniquesUse less power than Bluetooth |
Restricted to the Android platformRequires NFC readers and tags.Higher risk of proxy attendance |
RFID |
Semi-automated to include flexible monitoring ( Murizah et al., 2012)Utilize log data from the RFID terminal as identifierNotification for attendance confirmation ( Arulogun et al., 2013) |
Requires RFID readers and tags.Higher risk of proxy attendance if only use RFIDLoss of tags |
Biometric |
Unique physical features as the identifierRanges from fingerprint, face and iris authentication.Eliminates buddy clocking which allows someone else to mark the attendance on our behalf ( Opoku, 2013) |
Requires scanner and sensorsThe accuracy of a biometric device must be determined and monitored constantly ( Shoewnu & Idowu, 2012) |