Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Attendence

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 38

Computer

project
Topic:-
Attendence
OBJECTIVE & SCOPE OF PROJECT
The main objective of this project is that to minimize the
handwritten work to small as possible and provide user an
automated environment in which he/she can work efficiently and
also in user friendly environment.
The scope of the project generally lies at the places like schools ,
colleges & universities where faculties attendance maintenance
are major requirement because on basis of this the salary of
person can be calculated, this project is on very small basis means
to say not on big scale we can implement it on bigger scale in
form of maintaining student attendance ,apart from this the same
concept can be applied in various business firms (public and
private) which are fully automated with computer and the
company has to maintain the regularity of employers also at
these places it is not possible to maintain large records files which
require a separate room for storage so to avoid this we made this
software in which database are maintained which cover very less
space then the space taken by files etc.
THEORETICAL BACKGROUND
Why VB (Visual Basic)?
Visual basic is one of the most popular programming languages
in the market today. Microsoft has positioned it to fit multiple
purposes in development. The language ranges from light weight
vb script programming, to application specific programming
with vb for applications
What is Visual Basic?
The visual part refers to the method used to create GUI.Rather
then writing numerous lines of code to describe the appearance
and location of interface elements , we simplify add rebuilt objects
into place on screens.
VB is high level programming language evolved from
earlier DOS version called BASIC. VB is event driven
programming VB programs are made up of many sub programs ,
each has its in own program codes and each can be executed
independently and at the sane time each can be linked in one way
or another.
VB is designed to deploy applications across the
enterprise and to scale of any size needed the ability to develop
object mode is databases integration, server components, and
Internet/Intranet applications provides an extensive range of
capabilities and tools of the developer. In particular VB lets us to
add menus, textboxes, command buttons, option buttons, check
boxes, scroll bars, and file & directory boxes to blank windows.
We can communicate with other window applications and
perhaps most importantly we will have an easy method to let
users’ control and access database.
Advantages of Visual Basic-:

 VB applications are event driven. Event driven means that


the user is in control of applications. The generates the
stream of events each time he/she clicks with the mouse or
presses key

 VB supports the principles of OOD. This means that you can


compartmentalize different aspect of application as object &
develop & test those object independently

 Microsoft has designed VB to be a complete windows


application development system.

 VB is infinitely extensible through the use of Active X


controls, dynamically linked libraries add INS

DATABASE
Introduction about Ms-Access:
Access has become the best selling database management
program because of its combination of power and ease of use.
Access is powerful enough that developers can use it to create
entire applications that require little or no programming. It also
contains an entire programming language, VISUAL BASIC for
application which can be used to develop richer and more
advance application. Access is easy enough to use that in short
time beginner can learn to manage their own data.
It is easy for one to get started with access by taking a quick
look at its environment and how it is organized.
Access Utilities:

 Starting Access.
 Operating a database file.
 Using the database window to view different access objects.
 Opening a table in database view and design view.
 Operating a query database view and design view.
 Operating a form in form view, database view and design
view.
 Opening a report in the print preview window.
 Creating new objects.
 Using the online access help system.
 Quitting access.

The Access database and its objects:-


In other database management programs, the term database
is sometimes used to refer only to the tables that hold data; an
access database consists of tables that hold the data and all the
related objects such as queries, forms and reports, which are used
to manage the data in the table. Administration and user log on.
DATABASE DESIGN
Tables used:-
Faculty Table
Facult Name Passwor Photo Departme
y ID d nt
IT0201 Mr 1234 C:\majorproject Information
Prakash \image\prakash.w Technology
Ramani mf
IT0202 Mr 1111 C:\majorproject Information
Deepank \image\deep..wmf Technology
ar Goyal
DEFINITION OF PROBLEM
The advent of ubiquitous and pervasive computing facilitated by
Internet has opened up a plethora of applications. It is now
possible to see and communicate with people around the globe.
Nevertheless, there is still much more to be done to knit the social
fabric. Despite of its popularity and immense potential the
Internet has not yet been fully exploited to satisfy all computer
literate and ignorant people.
The Touch Screen Attendance Management form to
interact. The basic idea of this project comes from the fact that in
colleges and universities the faculty attendances are major
requirement because this help in calculating salary, their
regularity and also time for which they remain in institute all
these attendances are maintained in files and are stored in
storage area , if someone want to know some information about
particular person then difficulty for searching comes but due to
this project the faculty just have to touch the screen and to enter
the personnel code (which is different for every person) as well as
password and attendance will be automatically made, this also
ensures security because password is different for every person.
As the database is maintained for each faculty then information
can be retrieved anytime as required or situation demands.

It caters an interface that does not requires key-board or Mouse


as the primary input devices but all it ask for is a monitor and
user can access it through ones fingers i.e. aTouch Screen.
SYTEM ANALYSIS & DESIGN vis-à-
vis
USER REQUIREMENTS
SYSTEM ANALYSIS
System
“A system is an orderly grouping of interdependent
components linked together according to a plan to achieve a
specific objective”.
The component may be either any physical part of the
system or it may be any subsystem in multilevel structure.
So it can be said, that a system is composed of subsystems
which may themselves be made up of other sub system. These
subsystems are interconnected with each other in some ways. The
interconnections between sub systems are known as ‘interface’.
Additionally, a system and all subsystems must have their own
boundaries.
The system concept requires the system analyst to look at
the system as a whole, but the complete system is so large to be
analyzed in details, so it is factored or partitioned in to
subsystems.
For example-
System
Subsystem B
Subsystem A
A1
A2
A3
B1
B2
B3
B4
Fig- System & Sub System
Analysis
“Analysis is a detailed study of the various operation
performed by a system and their relationship within and outside
of the system.”

So the main objective of this phase is to come with the


precise structure functional specification of the user requirement.
There are also major sub objectives, as given below:

 Define the scope of the new system.


 Understand the old information system.
 Analyze the current system to find the
deficiencies in it.
 Develop the structure functional specification for
the new system.
 Review the feasibility and cost benefit analysis.

An analyst must have some characteristics:

 Ability to understand the basics, concepts,


reorganize in to logical divisions, and synthesis
“solutions” based on each divisions,
 The ability to understand the concepts from
conflicting or confused source,
 The ability to understand the user
requirements,
 The ability to apply hardware and/or software
system elements to the user/customers
environments.
SYSTEM DESIGN
System design is one of the most creative and challenging phase
of the system development life cycle (SWDLC).System design is
used to understand the existing system and to know the
requirement for the new system.
System design is the determination of the processes and data that
are required by a new system.

The design describes a final system and the process by which it is


developed. It includes the technical implementation in the system.
Output Design
Input Design
File and Processing Design
Detailed Design
Documentation
Management
Approval
Design
Accepted
Test Program
Rejection
Cost, Risk
Factors Evaluation
NO
From Analysis
Go To Implementation and Testing
Fig- Step to System Design
USER REQUIREMENT
User requirement refer to the high abstract requirement
these are the statement in a natural language plus diagram, of
what services the system is expected to provide and the
constrained under which it must operate. So user requirement
definition is stated so the software must provide a means of
representing and accessing external files created by other tools.
Characteristics of Requirements:

 Requirements correctness.
 Consistency of requirements.
 Requirements completeness.
 Realistic requirements.
 Appropriateness of requirements.
 Verification of requirements.
 Tractability of requirement.
SYSTEM PLANNING
SYSTEM PLANNING
The system level programming is basically the information
system, which exchange the information with each other.
Planning of an information system in business has become
increasingly important during the past decade. First information
is now recognize as a vital source and must be manage. Secondly,
more and more financial resources are committed to information
system. Third, there is a growing need for formal planning with
information system that are complex, require much time like –
month or year to build, use common database.

The project plan should have following-

1. Product for delivery.


2. Task to accomplish.
3. Starting and ending of all tasks.
4. Task dependencies.
5. Procedure to perform the tasks.

SYSTEM IMPLEMENTATION &


DETAILS OF H/W & S/W USED
SYSTEM IMPLEMENTATION
It is defined by:-
“Implementation is the acquisition and integration of the
physical and conceptual that produces a working
system”
It is concerned with those tasks leading immediately to a
fully operational system. It involves programmers, users
and operational management but its planning of timing
is a prime function of system analysis.
DETAILS OF S/W & H/W USED
The Touch Screen Attendance Management is a combination of
hardware and software with Computer Interfacing. It consists of
three parts naming

1. Sensor Screen
2. Controller Box
3. Application Software
All these components incorporate to bring out a device which used
in a variety of applications, including colleges, universities
various offices.

Sensor Screen
A Touch Screen is an input device that allows users to operate a
PC by simply touching the display screen. Touch input is suitable
for a wide variety of computing applications. A Touch Screen can
be used with most PC systems as easily as other input devices such
as track balls or touch pads. It can emulate basic mouse functions.
The touch screen can emulate left-clicks, double-clicking, and
dragging.
Now the question is how the screen senses our touch? It can be
done in many ways like
1. Using Pressure Sensors
2. Using Capacitive Screen
3. Using Laser Mesh
Here we are using a laser mesh to sense the touch. The sensor
screen has a mesh of Laser Beams and sensors made up
of LDR Light Dependent Resistors. Whenever any mesh is broken
on touching the screen i.e. the Line of Sight between laser and
LDR is obstructed the sensor sends a signal to the control box.
Requirements for Sensor Screen:
1. Laser Torches Wavelength 630-680 nm 6
2. Light Dependent Resistors LDRS 6
3. Acrylic Sheet 80 inches
4. Strip Wire 50 cm
5. Glass Sheet 80 Inches
To make the touch Screen Laser Mesh is used. It is designed for
sixteen buttons only. Ten Laser Torches of Wavelength 630-
680 nm are used as the laser sources. Eight Torches are
aligned at the top of the screen at a fair distance considering
the fact that our finger is larger than a mouse pointer. The
buttons are designed large enough and spaced apart enough
for a finger to touch easily and accordingly the torches are
spaced too.

Two laser is attached at the lower left corner of the screen to


complete the mesh and it also Localize the exact position of the
buttons on the screen i.e. the positions or the areas where the
user has to touch the screen in order to get a response is fixed.
Similarly the laser sensors (LDR) are aligned such that they in
a direct line of sight to their respective laser beam. LDR is
Light Dependent Resistors whose resistance varies according
to the intensity of light. Whenever the line of sight between the
laser source and the LDR is broken the intensity of light falling
on the LDR reduces which increases its resistance and hence
the signal is received by the Laser Receptor Circuit inside the
Controller Box.
The Screen is made such that it can be easily attached with the
monitor. It is designed to be situated with a 17’’ monitor. The
size of the screen is

 Length 18’’
 Height 14’’

It has a body made up of Acrylic sheet. To support the


structure and provide stability as the Acrylic is very flexible, a
Glass sheet of similar dimensions is used. The glass sheet also
shields the original monitor screen to be touched. The outer
boundary has two layers which hold the laser torches and the
LDR. The middle part of it is open and bounds the space to be
used by the user.
The laser touches has to keep on continuously during the
working hours and so the batteries are unfit for this job hence
we have to provide a continuous supply of +5 Volts to the
Torches. For this intention we designed a Laser Driver Circuit
which gets its power from a Power Supply Circuit. The Laser
Driver Circuit is intended to supply uninterrupted supply of
power to the Laser as the torches are very sensitive as far as
fluctuation is concerned.
The Laser Driver Circuit
This circuit receives its power from the power Supply Circuit
which is inside the Controller Box. Besides this there is one
more circuit called Laser Receptor Circuit which act as the
bridge between Computer and Controller Box. Whenever there
is a signal from the LDR, this circuit receives it and sends it to
the LPT port of the computer. This circuit requires two power
supplies of +5 Volts and +12 Volts. The +5 Volt supply is used to
lead up the LED, Light Emitting Diode which emits light on
receiving a certain amount of voltage (+5V).
When Laser light is switched on and the beam is falling
directly over the LDR then these LED are lightened and
whenever the line of sight is broken the LED is unenlightened.
Hence it works as an indicator also. The circuit is so designed
that whenever the LED is switched off the signal is generated.
This signal is send to the LPT Port via the collector of the
Transistor after amplification.

The Laser Receptor Circuit


When Laser light is switched on and the beam is falling
directly over the LDR then these LED are lightened and
whenever the line of sight is broken the LED is unenlightened.
Hence it works as an indicator also. The circuit is so designed
that whenever the LED is switched off the signal is generated.
This signal is send to the LPT Port via the collector of the
Transistor after amplification
Controller Box
The control box on receiving the signal sends it to the LPT port of
the computer where the software can figure the LPT pin code and
take the appropriate action. The box not only does it but also
controls the Laser Torches and consists of three basic circuits.
1. Power Supply circuit
2. Laser Receptor circuit
3. Laser driver circuit

Requirements for Control Box:


1. GPCB (General Purpose Circuit Board) 3
2. Jumper Wire 5M
3. Soldering Iron 1
4. Soldering Wire 5M
5. IC 7805, 7812 1, 1
6. Acrylic Sheet 60Inches
7. 12-0-12 Transformer 1.5 Amp 1
8. Intel Fan with Heat Sink 1
9. Choke 1
10. Preset 15
11. Condensers
0.01µf 6
2200µf 2
470µf 2
12. Resistors
1 KΩ 12
100KΩ 5
150 Ω 2
330Ω 7
13. Diodes
Diode 4007 11
Diode 4142 6
14. Light Emitting Diode 8
15. NPN Transistor 558 12
16. 25 Pin D-type Female LPT port 1
17. 25 Pin D-type Male to Male Cable 1
18. Nut Bolt Accessories 1
The power supply circuit provides power to the rest of the two
circuits. The laser Receptor circuit receives signals from the
sensor screen via LDR and sends it to the LPT port where it is
detected by the software. The laser driver circuit provides power
to the lasers at the sensor screen.The controller box basically
consists of the three circuits and a 25-pin D-type Female
connector. These circuits are building using PCBs.
Printed Circuit Board
The universal printed circuit board is used for the power supply
circuit and to mount the parts included an LCD in the front panel.
The main circuit in it is the Power Supply which has a bridge
wave rectifier that coverts A.C Supply into DC supply. The circuit
looks like as shown below.
The Power Supply Circuit
Full wave rectifier circuit with a diode bridge is used for the
rectifier circuit which changes AC into DC. Even if the
alternating voltage of the input changes into the positive and
the negative, the voltage which is applied to load is always
positive by a diode bridge. The voltage which is applied to load
is not clean DC. It is called Ripple voltage. In this circuit, in
order to make ripple voltage small, the capacitor is connected
to load in parallel. Even if the voltage which comes out from a
diode bridge becomes small, the DC voltage applied to the load
is stabilized by discharge the electricity stored in the
capacitor.AC100V is dropped on AC24V with a transformer. In
case of the alternating current, voltage is shown in RMS (Root
Mean Squared value). If it changes into direct current voltage,
it will become about DC30V.

Following the rectifier circuit is the Pi Filter Circuit.


Filters
The output voltage from a rectifier though unidirectional is
pulsating. The output voltage has a DC component, which is
nothing but its average value in addition AC component. AC
component are responsible for pulsation of the output voltage.
These are minimized by means of filter circuits.
Pi-filter is basically used to filter the traces of ac which still
remained after passing through bridge rectifier. It consists of two
capacitors in parallel circuit and choke coil. This capacitor store
the extra energy when wave going upward and deliver it while
wave going downward. This makes equal distribution of energy
and traces of ac were removed. Choke is used to convert 1 ampere
to 250 milli-amperes which is our requirement.
Filter choke:
They are usually laminated iron core inductors. These are
used for smoothing pulsating current output from a rectifier.
Voltage Regulators(IC-7812, IC-7805)

It is very easy to get stabilized voltage for ICs by using a three


terminal voltage regulator. The three terminal voltage regulator
outputs stabilized voltage at a lower level than the higher input
voltage. A voltage regulator cannot put out higher voltage than
the input voltage. They are similar in appearance to a transistor.
The 7800 series consists of three-terminal positive voltage
regulators.

These ICs are designed as fixed voltage regulators and


with adequate heat sinking can deliver output currents in excess
of 1A. These ICs are used to provide +5 volts and +12 volts supply.
Line regulation in these ICs is change in the output voltage for a
change in the input voltage. Load regulation is defined as the
change in output voltage for a change in load current. If there is
any high voltage than 12 volt to 7812 it will convert to 12 V by this
IC. If there is any voltage less than 12 volt it allows passing it.
FAN is used for cooling the ICs.
There are two ICs 7805 and 7812 attached with the Intel-fan
heat sink. From the base of 7805 IC we get the +5Volt Supply and
from the base of 7812 IC we get the 12 Volt supply. Two LED are
also connected with the respective ICs in order to indicate there
proper working.

Block Diagram OF Controller Box


Variable resistance is resistance through which we can varies
resistance accordingly to the two points i.e. either maximum or
negligible, but this value depends on the connection of the
variable resistance. If +ve supply connects to terminal A and -
ve connects to terminal B then at A, the value of resistance is
negligible, and at B, value of resistance is maximum. Between
these two points we can vary the value of resistance
accordingly .This is made up of carbon particles on mica sheet
where circular metallic thin strip placed which can easily move
on mica sheet thought circular area. At ends of this sheet is two
metal strips are connected these points are inputs of lower
frequencies.
Preset resistors are used in circuits when it is necessary to alter
the resistance. Dark/light and temperature sensors usually have
these components as the preset resistor allows the circuit to be
made more or less sensitive (they can be turned up or down -
reducing or increasing resistance).
A small screwdriver can be used to turn the centre part of the
preset resistor, altering the value of the resistance.
The range of resistance varies, for example:
0 to 100 ohms
0 to 1M ohms
Working
The preset resistor is used to vary the potential. It has been
used in this circuit so that photodiodes do not sense the
daylight (they remain sensitive to only the laser light). A
photodiode works in reverse bias. When no light falls on
photodiode then it works as a normal diode. It conducts
negative charge to the transistor. The transistor then becomes
reverse biased. When light falls on it, it conducts positive
charge to the transistor. The transistor now becomes forward
biased. When the two npn transistors are connected in series
then it forms a Darlington Amplifier. The amplification
provided is 1:10:100.
Laser Torches
Laser means Light Amplification by Simulated Emission of
Radiation. Electrons exist at specific energy levels or states
characteristic of that particular atom or molecule. The energy
levels can be imagined as rings or orbits around a nucleus.
Electrons in outer rings are at higher energy levels than those
in inner rings. Electrons can be bumped up to higher energy
levels by the injection of energy-for example, by a flash of light.
When an electron drops from an outer to an inner level,
"excess" energy is given off as light. The wavelength or color of
the emitted light is precisely related to the amount of energy
released. The emitted light waves are in phase with one
another and are so nearly parallel that they can travel for long
distances without spreading. (In contrast, incoherent light
from a light bulb diffuses in all directions.) Coherence means
that laser light can be focused with great precision.

Interfacing through LPT Port


The Parallel Port is the most commonly used port for
interfacing projects. This port will allow the input of up to 9
bits or the output of 12 bits at any one given time The port is
composed of 4 control lines, 5 status lines and 8 data lines. It's
found commonly on the back of a PC as a D-Type 25 Pin female
connector. There may also be a D-Type 25 pin male connector.
This will be a serial RS-232 port and thus, is a totally
incompatible port.
Parallel Port’s are standardized under the IEEE 1284 standard
first released in 1994. This standard defines 5 modes of
operation which are as follows,
1. Compatibility Mode.
2. Nibble Mode.
3. Byte Mode.
4. EPP Mode (Enhanced Parallel Port).
5. ECP Mode (Extended Capabilities Mode).
Compatibility, Nibble & Byte modes use just the standard
hardware available on the original Parallel Port cards while
EPP & ECP modes require additional hardware which can run
at faster speeds, while still being downwards compatible with
the Standard Parallel Port. Compatibility mode or "Centronics
Mode" as it is commonly known can only send data in the
forward direction at a typical speed of 50 Kbytes per second
but can be as high as 150+ Kbytes a second. In order to receive
data, you must change the mode to either Nibble or Byte mode.
Nibble mode can input a nibble (4 bits) in the reverse direction.
E.g. from device to computer. Byte mode uses the Parallel's bi-
directional feature (found only on some cards) to input a byte
(8 bits) of data in the reverse direction. The Parallel Port has
three commonly used base addresses. These are listed in table
2, below. The 3BCh base address was originally introduced
used for Parallel Ports on early Video Cards. This address then
disappeared for a while, when Parallel Ports were later
removed from Video Cards. They has now reappeared as an
option for Parallel Ports integrated onto motherboards, upon
which their configuration can be changed using BIOS. LPT1 is
normally assigned base address 378h, while LPT2 is assigned
278h. However this may not always be the case as explained
later. 378h & 278h have always been commonly used for
Parallel Ports. The lower case h denotes that it is in
hexadecimal. These addresses may change from machine to
machine.
Address Notes:
3BCh – 3BFh Used for Parallel Ports which were
incorporated on to Video Cards -
Doesn't support ECP addresses
378h - 37Fh Usual Address For LPT 1
278h - 27Fh Usual Address For LPT 2
When the computer is first turned on, BIOS (Basic
Input/Output System) will determine the number of ports you
have and assign device labels LPT1, LPT2 & LPT3 to them.
BIOS first look at address 3BCh. If a Parallel Port is found
here, it is assigned as LPT1, and then it searches at location
378h. If a Parallel card is found there, it is assigned the next
free device label. This would be LPT1 if a card wasn't found at
3BCh or LPT2 if a card was found at 3BCh. The last port of call
is 278h and follows the same procedure than the other two
ports. Therefore it is possible to have a LPT2 which is at 378h
and not at the expected address 278h.
Pin
No
Pin No SPP Direction Hardware
(D- Register
(Centronics) Signal In/out Inverted
Type
25)
1 1 nStrobe In/Out Control Yes
2 2 Data 0 Out Data
3 3 Data 1 Out Data
4 4 Data 2 Out Data
5 5 Data 3 Out Data
6 6 Data 4 Out Data
7 7 Data 5 Out Data
8 8 Data 6 Out Data
9 9 Data 7 Out Data
10 10 nAck In Status
11 11 Busy In Status Yes
Paper-
Out /
12 12 In Status
Paper-
End
13 13 Select In Status
nAuto-
14 14 In/Out Control Yes
Linefeed
nError /
15 32 In Status
nFault
16 31 nInitialize In/Out Control
nSelect-
17 36 In/Out Control Yes
Printer /
nSelect-In
18 –
19-30 Ground Gnd
25
Pin Assignments of the D-Type 25 pin Parallel Port
Connector.
These ports can be accessed through reading the values of the
data pins 2 – 9, but these out pins in SPP mode hence we use
the EPP mode whose pin assignments are
SPP EPP
Pin IN/OUT Function
Signal Signal
A low on this line
indicates a Write,
1 Strobe Write Out
High indicates a
Read
Data Bus. Bi-
2-9 Data 0-7 Data 0-7 In-Out
directional
Interrupt Line.
Interrupt occurs on
10 Ack Interrupt In
Positive (Rising)
Edge.
Used for
handshaking. A
EPP cycle can be
11 Busy Wait In
started when low,
and finished when
high.
Paper Spare - Not Used in
12 Spare In
Out / End EPP Handshake
Spare - Not Used in
13 Select Spare In
EPP Handshake
When Low,
Auto Data
14 Out indicates Data
Linefeed Strobe
transfer
Error / Spare - Not used in
15 Spare In
Fault EPP Handshake
16 Initialize Reset Out Reset - Active Low
When low,
Select Address
17 Out indicates Address
Printer Strobe
transfer
18- Ground Ground GND Ground
25
Pin Assignments For Enhanced Parallel Port Connector
We can see here that pin 2- 9 are bidirectional in this mode and
in this project we will use them as Input Pins by sending the
value 43 at the 0x37a address which sets all the pins to input
mode.
Application Software:
It is the most important and critical part of the whole system. The
software is calledAttendance Management
It is controlled only by the touch screen interface. The software is
designed in Visual Basic 6.0 and it has a collection of HTML
pages which contains all the necessary information considering
the Institute.
When designing the application, it is remembered that our finger
is larger than a mouse pointer. The buttons are designed large
enough and spaced apart enough for a finger to touch easily. We
have included a graphical response to each touch. This will
indicate to the user his/her touch was accepted and will not leave
the user confused. Bright backgrounds will hide fingerprints more
than a black background would.
Requirements for Application Software:

1. Visual Studio 2003, Visual Basic 6.0


2. SDK 5.0
3. Development Time 45 hrs
4. Programming Languages-( HTML, VB)
5. Database – Microsoft Access
6. Operating System- Windows 98 / 2000 / XP
7. Processor 533 MHZ
8. 64 MB Ram
9. Two Button Mouse & Keyboard

SYSTEM MAINTENANCE &


EVALUATION
Maintainability should be specified, and the design of the
software should provide for the highest level of flexibility and ease
of maintenance. These attributes should be major design goals,
because
1)the maintenance of a software product is a costly enterprise,
(2)a software product or parts of it may spend 65% of its
operational life cycle in the maintenance phase, and (3)the
benefits of designing for ease of maintenance far outweigh the
cost of including maintainability as a software design
requirement.
Factors that influence maintainability are:
a) Growth provision
b) Reliability.
c) Availability
d) Documentation.
e) Complexity.

The TOUCH SCREEN ATTENDANCE MANAGEMENT has been


designed and coded such that it provides a great flexibility to the
administrator that it can be enhanced in the future for the use at
higher levels. Our project does not pose limitations on future
enhancements and can be easily adapted to future changes if
made.
COST AND BENEFIT ANALYSIS
A cost-benefit analysis can be viewed as another form of trade-
off, in which financial considerations are balanced against
potential benefits for available alternatives. Cost-benefit results
can also one of many decision criteria within a larger trade-off
context. So, results of a cost benefit analysis along with other
criteria form a decision criterion. A cost-benefit analysis
evaluates the financial merit of making a capital investment in a
system or software product.
The cost-benefit analysis attempts to quantify the cost of
acquiring or upgrading an information system and maintaining
it in operational condition for its estimated lifetime. These costs
are then compared with the quantified benefits derived operating
the new system. There are also instances where acquisition of
software development facilities may be considered as capital
investments and the software engineer may find him or she
directly involved in a cost-benefit analysis.
Benefits are categorized as tangible and intangible. Tangible
benefits are those that are easily identified and quantified.
Tangible benefits can be found in improved productivity,
increased sales, decreased costs of each transaction, reduced
number of required operators etc. Intangible benefits, although
important, are usually difficult to quantify.
The comparison criteria of the costs and benefits can take many
forms. One criterion is the payback period, which is defined as the
number of elapsed months of the new system’s operation required
for the benefits of the new system to pay back initial investment.
It is the point in time where benefits derived from the new system
equal the costs of acquiring and operating the new system.
One additional factor to be considered with a detailed discussion
of the cost-benefit analysis process is cost of money or net present
value.
The net present value factor accounts for the fact that a sum of
money received or spent in the future is not equivalent to that
same sum of money currently on hand. The difference is due to the
fact that a given sum of money invested today at a given interest
rate will be worth more in the future. The main summary of Cost
and Benefit Lies in the following points:-

1. Reduced manpower.

2. Time efficient.

3. Easy to maintain.

DETAILED LIFE CYCLE OF


PROJECT
1. Requirement Analysis
This step is first and primary step of software
development lifecycle which analyzes the requirement of
the software. First the analysis of the whole college is
done and after collecting all valuable information the all
module design comes in the mind of us and the entire
requirement was given by accountants of that particular
department.
2. Design
Preliminary design concerns the brief overview of the
software architecture and structure rather than goes into
the details of the module .This design is refined by
designing each module in detail in the detailed design. As
the result of this step, it produces the Software Design
Specification (SDS) SDS is built to have:

 a software architecture in the layered sequential


layout,
 data structure , algorithm, control structure,
 the interface required for the software, and
 the satisfaction that requirement have been met in
the design

After considering much software and the language we


decide to make our project in ASP in front hand and Ms
Access in back hand
3. Coding
The coding of whole software is done in ASP, HTML & Java
Script
4. Module Level Testing
Individual developed modules are tested here. It is also
called as the Unit Testing. This testing is performed for each
of the module separately.

5. Integration and System Testing


All the modules are collected and integrated appropriately
with each other. Interfaces are provided among them,
and then the whole system is tested fully.
DATA FLOW DIAGRAM

Zero Level DFD


One Level DFD

One Level DFD


Two Level DFD
I/P & O/P SCREEN DESIGN
Starting Form
Fig 1 shows the welcome page of the application software where
user is prompt to enter the code which is assign to him.

SCREEN
SHOT
Fig -1
Fig 2 shows the form if user by mistake enter the number instead
of entering the branch first because faculty code start with branch
name only

Fig -2
Fig 3 shows the form when the user instead of entering his/her id
enter the id which does not exist

Fig -3
Fig 4 shows the home page of the faculty member for registering
the attendance the faculty has to enter the 4 digit password.

Fig -4
Fig 5 shows the form if faculty enter the wrong password

Fig -5
Fig 6 shows that if the password is entered correctly then the
faculty attendance has been registered
Fig -6

Methodology Used For Testing


Software testing is a critical element of software quality
assurance and represents the ultimate review of specification,
design plus coding.
Following is a testing strategy as laid out for testing of DLJ INFO
System.
Test Configuration:
Testing was done in various phases. A “Bottom Up” testing
methodology was followed where all modules tested before
proceeding to integrating them as a whole. Testing was done in
following phases

 Unit Testing
 Feature Testing
 System Testing

 Recovery Testing
 Safety Testing
 System Performance Testing
 Stress Testing

 Black Box Testing


 Glass Box Testing

Scope & Strategy


The test plan & procedure adopted for various test phases are:
Unit Testing:

UT is White box testing. The goal is to verify a unit of design


i.e. module. UT is done to ensure 100% codes converge and all
modules are tested exhaustively. After this phase the code is
frozen so that further testing is executed without changing the
code.
UT cases are written for each module before commencement of
coding and are carried out in parallel with development. These
cases are designed to cover instance such as module interface,
local data structure, boundary condition and basic error-
handling path through the control structure.
Feature Testing:
The basic objective of this testing is to test whether the
module conforms according to the feature requirements and
specifications, Module testing is Black Box in nature and aims to
test the complete functionality of module including the basic error
handling.
System Testing:
System Testing is conducted in an attempt to uncover errors
at hardware /software interface. System Testing is actually a
series of different tests. Although each test has a different
purpose, all work should verify that all system elements have
been properly integrated and perform allocated functions.
Recovery Testing:
Recovery Testing is a system test that forces the software to
fail in variety of ways and verifies that recovery is properly
performed. If recovery is automatic, re-initialization, check
pointing mechanisms, data recovery, and restart are each
evaluated for correctness. If recovery requires human
intervention, the mean time to repair is evaluated to determine
whether it is within acceptable limits.
Safety Testing:
Safety testing attempt to verify that protection mechanisms
built into a system will, in fact, protect it from improper
penetration. During Safety Testing, the tester plays the role(s) of
the individual who desires to penetrate the system the tester may
attempt to acquire passwords through external clerical means.
System Performance Testing:
Performance testing is designed to test the run-time
performance of software within the context of an integrated
system. Performance testing occurs throughout all steps in the
testing process. Performance tests are sometimes coupled with
stress testing and often require both hardware and software
instrumentation.
Stress Testing:
Stress Testing execute a system in a manner that demands
resource in an abnormal quantity, frequency, or volume.
Black Box Testing:
Black Box Testing methods focus on the functional
requirements of the soft wares. In Black Box testing the tester
does not know the internal structure of the software i.e. how the
data are stored, structure of the data etc. Black Box testing
enables the software engineer to derive sets of input, conditions
that will fully exercise all functional requirements for a program.
Glass Box Testing:
Glass Box Testing is a test case design method that uses the
control structure of the procedural design to derive test cases.
Using this testing method, the software engineer can derive test
cases that:

1. Guarantee that all independent paths within a module have


been exercised a least once.
2. Exercise all logical decisions on their true or false sides.
3. Execute all loops at their boundaries and within their
operational bounds.
4. Exercise internal data structure to ensure their validity.

CODING Welcome. Page


Dim i As Integer
Dim con As ADODB.Connection
Dim rs As ADODB.Recordset
Dim fname As String
Dim pass As String
Dim dept As String
Dim pht As String
Dim a As PictureTypeConstants
Private Sub ComCS_Click()
If Text1.Text = " " Then
Text1.Text = ComCS.Caption
End If
End Sub
Private Sub ComEC_Click()
If Text1.Text = " " Then
Text1.Text = ComEC.Caption
End If
End Sub
Private Sub ComEE_Click()
If Text1.Text = " " Then
Text1.Text = ComEE.Caption
End If
End Sub
Private Sub ComEnter_Click()
If Not (LblQuest.Caption = "Password:") Then
con.Open
rs.Open "select * from faculty where FacultyID = '" & Text1.Text & "'", con, 1, 3
If rs.EOF Then
MsgBox ("NO RECORD FOUND")
Text1.Text = " "
con.Close
GoTo x
Else
fname = rs(1)
pass = rs(2)
pht = rs(3)
dept = rs(4)
Call passwordform
con.Close
End If
Else
If Trim(Text1.Text) = pass Then
MsgBox ("Your Attendence is registered")
Call welcomeform
Else
MsgBox ("Incorrect password")
Call passwordform
End If
End If
x:
End Sub
Private Sub ComIC_Click()
If Text1.Text = " " Then
Text1.Text = ComIC.Caption
End If
End Sub
Private Sub ComIT_Click()
If Text1.Text = " " Then
Text1.Text = ComIT.Caption
End If
End Sub
Private Sub Command1_Click(Index As Integer)
If (Text1.Text = " ") And Not (LblQuest.Caption = "Password:") Then
MsgBox ("Enter Branch First")
Else
Text1.Text = Text1.Text + Command1(Index).Caption
End If
End Sub
Private Sub Form_Load()
Set con = New ADODB.Connection
con.ConnectionString = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=C:\major
proj\db.mdb;Persist Security Info=False"
Set rs = New ADODB.Recordset
End Sub
Private Sub passwordform()
DeptName.Caption = "DEPARTMENT OF " + dept
FacultyName.Caption = "WELCOME " + fname
LblQuest.Caption = "Password:"
Text1.Text = " "
'picture1.Picture =
ComIT.Enabled = False
ComCS.Enabled = False
ComIC.Enabled = False
ComEC.Enabled = False
ComEE.Enabled = False
End Sub
Private Sub welcomeform()
DeptName.Caption = "DEPARTMENT OF GIT"
FacultyName.Caption = "WELCOME "
LblQuest.Caption = "Enter Your ID:"
Text1.Text = " "
ComIT.Enabled = True
ComCS.Enabled = True
ComIC.Enabled = True
ComEC.Enabled = True
ComEE.Enabled = True
End Sub
Option Explicit
Dim j As Integer
Dim i As Integer
Private Sub Form_KeyDown(a As Integer, s As Integer)
Dim key As Integer
'key = Chr(a)
key = a
If (key = 40) Then
Line1.Y1 = Line1.Y1 + 10
Line1.Y2 = Line1.Y2 + 20
ElseIf (key = 38) Then
Line1.Y1 = Line1.Y1 - 10
Line1.Y2 = Line1.Y2 - 20
End If
End Sub
'Sub Text1_KeyPress(KeyAscii As Integer)
' Mychar = Chr(KeyAscii)
' Perform an operation using Mychar.
'up=38
'Dim MyAngle, MyCosecant
'MyAngle = 1.3 ' Define angle in radians.
'MyCosecant = 1 / Sin(MyAngle) ' Calculate cosecant.
Private Sub Timer1_Timer()
If (i = 180) Then
i=i*2
End If
If (i = 540) Then
i=1
End If
If (i < 180) Then
Line1.X2 = Line1.X1 + 650 * Sin(i * 3.14 / 180)
Line1.Y2 = Line1.Y1 - 650 * Cos(i * 3.14 / 180)
i=i+1
ElseIf (i > 180) Then
Line1.X2 = Line1.X1 + 650 * Sin(i * 3.14 / 180)
Line1.Y2 = Line1.Y1 + 650 * Cos(i * 3.14 / 180)
i=i+1
End If
End Sub

SCOPE FOR FUTURE WORK


Extensibility was one of the most important design goals and
every component in the system was designed keeping it in
mind. The usage of the web services allows us to retrieve and
capture information from a variety of sources.
As the software new features can be easily added to the
system:
1. The most exciting feature that can be added to the system is
the SAPI (Speech Application Programming Interface) through
which the user can be warned if he/she entered wrong
password or try to use the project in wrong way.
2. The number of buttons can be easily doubled or quadrupled
easily by adding one or two more Laser Torches.
3. this also allows for simple development of new applications,
because no additional code or knowledge is required to develop
software for use with the touch screen.
CONCLUSION
Touch input is suitable for a wide variety of computing
applications. A touch screen can be used with most PC systems
as easily as other input devices such as track balls or touch
pads. Touch screen systems are being used in a variety of
applications, including point-of-sale systems, public
information displays, industrial control systems, and more.
Comparing Touch screen and Display Technologies, Touch
screen solutions available to work with most common
operating systems, including DOS, Windows
3.1/95/98/ME/NT/2000/XP, Macintosh OS, and Linux..
The touch screen emulates a mouse; touching the screen is the
same as clicking your mouse at the same point on the screen.
This
Allows the touch screen to work with a vast amount of pre-
existing mouse driven software.
This also allows for simple development of new applications,
because no additional code or knowledge is required to develop
software for use with the touch screen. New touch screen
applications can be developed in the same way as mouse
driven software. It can work with any type of input- finger,
gloved hand, stylus, pen, or any pointing device.
The project that we have undergone has helped us lot in
understanding the programming language Visual Basic , apart
from this we also learn to write many queries so as to retrieve
data from the database MS ACESS
This project also helps us in learning the new technology
“EMBEDDED TECHNOLOGY” which act as interface between
the hardware and software.
We come to know about various electrical components like
resistors, condensers, transistors, before this project these all
thing are like bookish knowledge for us, but with this project
we come to understand the practical application of these
components.
USER OPERATIONAL MANUAL
Steps Involved In using the Software:-
1. Each faculty has one User ID and Password, the User ID is
given by the administrator and password is selected by the
faculty

2. The respective Id is entered at welcome screen page using


the touch screen.

3. After entering the Id the faculty will press on the enter key
using touch screen.

4. If the Id entered by the user is correct then another form


will be open which ask the faculty to enter the password.

5. If the password entered is wrong then the welcome screen is


again open.

6. If the password entered is correct then the Attendance Made


message box will come on the screen to tell the faculty that
his/her attendance is made.

DATA
DICTIONARY
Name of Attributes Description
CHECKBOX Act as a toggle
DATA Navigate Data In Data box
IMAGE Display Images
LABEL Display Static Text
OLE Act as a OLE Container
PICTURE BOX Display Images also act as a container for other
controls
TEXT BOX Control for user input
CAPTION Allows you to enter menu or command name that
you want to appear on your menu bar or in a menu
MSG BOX Display message in a dialog box, waits for the user
click a button and return a value indicating which
button is linked
CONNECTION Maintains connection information such as cursor
type, connect string query time out ,connection time
out and default data
COMMAND Maintains information about command such as
query string parameter definitions etc.
RECORD SET Contains set of rows returned from a query ,
including a cursor into those rows

BIBLIOGRAPHY
References:-

 Software Engineering Vol-1


By Girdhari Singh & Shalini Puri

 Software Engineering

By Rogger.S. Pressman

 Software Engineering Fundamentals

By Ali Behfrooz & Frederick.J.Hudson

 Electronic Devices & Circuits

By Sanjeev Gupta

 Enlightening The World : Laser

By Dr W.L.Wallace

 Visual Basic 6.0

By PHP publication

 Guide To VB6

By Peter Norton

 Visual Basic 6.0

By PHP publication

 Beginner’s Guide To VB6

By Reeta & GB Sahoo


Websites:-

 www.google.com

 www.altavista.com

 www.touchscreen.com

You might also like