MODELLING OF AUTOMATED WORKING TIME CONTROL SYSTEMS IN EDUCATIONAL INSTITUTIONS

Authors

  • V. V. Kolenko Deputy Director for Training and Production, Category I specialist, Kherson Polytechnic College of Odessa National Polytechnic University, Kherson, Ukraine, [email protected]; ORCID ID: https://orcid.org/0000- 0001-6376-1278
  • M. S. Safonov PhD in Engineering, Head of Sub-Department, Kherson Polytechnic College of Odessa National Polytechnic University, Kherson, Ukraine, [email protected]; ORCID ID: https://orcid.org/0000-0001-9742- 8270
  • O. Ye. Iakovenko PhD in Engineering, Associate Professor, Director, Kherson Polytechnic College of Odessa National Polytechnic University, Kherson, Ukraine, [email protected]; ORCID ID: https://orcid.org/0000-0001- 7647-6425

DOI:

https://doi.org/10.51707/2618-0529-2020-17-02

Keywords:

time accounting, personalized identification, barcode scanner, user identification, biometrics, database.

Abstract

The article includes modeling of the automated system of personnel time recording with further development and implementation of it in the educational institution. Practice shows that when using automated time recording, more effective personnel management occurs, employee discipline is increased, and the wage fund is saved on 5–15%. Personalized personnel identification methods have been identified; the selection of technical equipment and software for data collection is justified; A work time model has been developed; Software for employee identification, recording and recording of working hours has been developed and introduced. To do this, special access control equipment was installed on the passageway. Employees have special cards that allow them to easily overcome these devices. If there are several checkpoints in the territory, it is advisable to use a computer network to transfer data to the server, where all data about employees are stored. Based on such data, accurate reports of misconduct can be generated, as well as a time sheet. User identification is an integral and important element for any information system. The identification system is one of the key elements of the infrastructure for protection against unauthorized access. The task of identification and authorization systems is to determine and verify the set of authority of the subject when accessing the information system. A barcode can also act as a unique person identifier. Each employee is ssued a card with a unique bar code, this code is fixed to the person in the database. A barcode scanner is installed on each pass point. This model with a developed algorithm for identifying a person and fixing the passage of control was ntroduced at the Kherson Polytechnic Vocational College of Odessa Polytechnic State University.

References

Sardak, S. E., Tretiak, O. O. (2009). Personnel management: theoretical aspects and practical achievements: monograph. Dniprо : Innovatsiia [in Ukrainian].

Krasnokutska, N. S., Nashchekina, O. M., Zamula, O. V. (2019). Management. Kharkiv : Drukarnia “Madryd” [in Ukrainian].

Dokuchaiev, O. A. (2006). Methods of research of the mechanism of motivation of the personnel of the enterprise. Ekonomika ta derzhava: Mizhnarodnyi naukovopraktychnyi zhurnal, 8, 79–82 [in Ukrainian].

Kolisnyk-Humeniuk, Yu. I. (2019). Current trends in education and science: problems and prospects : zb. nauk. prats. Kyiv – Lviv – Berezhany – Homel, Vol. 4. T. 2. [in Ukrainian].

Skibitska, L. I. (2010). Organization of the manager’s work. Kyiv : Tsentr uchbovoi literatury [in Ukrainian].

Bobalo, Yu. Ya., Horbatyi, I. V., Yakovenko, Ye. I. (2019). Information security. Lviv : Lvivska politekhnika [in Ukrainian].

Galatenko, V. A. (2008). Fundamentals of information security. Moscow : Internet-Universitet Informatsionnykh tekhnologiy; BINOM. Laboratoriya znaniy [in Russian].

Voronova, V. A., Tikhonov, V. A. (2010). Access control and management systems. Moscow : Goryachaya liniya — Telekom [in Russian].

Shcheglov, A. Yu. (2010). Protection of computer information from unauthorized access. St. Petersburg : Nauka i tekhnika [in Russian].

Shramko, V. N. (2004). Combined identification and authentication systems. PCWeek/RE. Vol. 45. Retrieved from : https://www.itweek.ru/infrastructure/article/detail.php?ID=69114 [in Russian].

Soloviova, T. (2018). Electronic identification will protect the personal data of Ukrainians. Retrieved from : https://uz.ligazakon.ua/ua/magazine_article/ EA011004 [in Ukrainian].

Access control (2020). Retrieved from : https:// uk.wikipedia.org/wiki/ [in Ukrainian].

Access control systems (2017). Retrieved from : https://smartvision.ua/category/kontrol-dostupa/ [in Ukrainian].

Employee time tracking: concept, types and methods (2018). Retrieved from : https://www.kickidler. com/ru/for-it/methods-of-working/time-tracking-employees-methods.html [in Russian].

Published

2021-07-11

How to Cite

Kolenko, V. V. ., Safonov, M. S. ., & Iakovenko, O. Y. . (2021). MODELLING OF AUTOMATED WORKING TIME CONTROL SYSTEMS IN EDUCATIONAL INSTITUTIONS . Scientific Notes of Junior Academy of Sciences of Ukraine, (1(17), 13–21. https://doi.org/10.51707/2618-0529-2020-17-02