Professional Documents
Culture Documents
ABSTRACT
CHAPTER 1
INTRODUCTION
To verify the student attendance record, the personnel staff ought to have an
appropriate system for approving and maintaining the attendance record
consistently. By and large, there are two kinds of student attendance framework,
i.e. Manual Attendance System (MAS) and Automated Attendance System (AAS).
Practically in MAS, the staff may experience difficulty in both approving and
keeping up every student's record in a classroom all the time. In a classroom with a
high teacher-to-student ratio, it turns into an extremely dreary and tedious process
to mark the attendance physically and cumulative attendance of each student.
Consequently, we can execute a viable framework which will mark the attendance
of students automatically via face recognition. AAS may decrease the managerial
work of its staff. Especially, for an attendance system which embraces Human
Face Recognition (HFR), it normally includes the students' facial images captured
at the time he/she is entering the classroom, or when everyone is seated in the
classroom to mark the attendance.
The scope of the project is the system on which the software is installed, i.e.
the project is developed as a windows application and it will work for a
particular institute/schools.
The attendance system of the student can be maintained in two different
forms namely,
Manual Attendance System (MAS)
Automated Attendance System (AAS)
3
. CHAPTER 2
SYSTEM ANALYSIS
2.1 INTRODUCTION
System analysis refers to the study of existing system in terms of system goals. The
system analysis of a project includes the basic analysis for the project development, the required
data to develop the project, the cost factor considered for the project development and other
related factors.
Types of Feasibility
Commonly considered feasibility includes:
Technical feasibility
Operational feasibility
Economic feasibility
4
2.2.1Technical feasibility
Technical feasibility assesses the current hardware and software resources and
technology, which are required to accomplish user requirements in the software within the
allocated time and budget. For this, the software development team ascertains whether the
current resources and technology can be upgraded or added in the software to accomplish
specified user requirements. Technical feasibility also performs the following tasks:
Analyses the technical skills and capabilities of the software development team members
Determines whether the relevant technology is stable and established
Ascertains that the technology chosen for software development has a large number of
users so that they can be consulted when problems arise or improvements are required.
Determines whether the problems anticipated in user requirements are of high priority
Determines whether the solution suggested by the software development team is
acceptable
Analyses whether users will adapt to a new software
Determines whether the organization is satisfied by the alternative solutions proposed by
the software development team.
• The problem with this approach is that during the lecture time it may distract the attention
of the students.
• Student Forget to add the fingerprint
The proposed system is to capture the face of each student and to store
it in the database for their attendance. The face of the student needs to be
captured in such a manner that all the feature of the students' face needs to be
detected, even the seating and the posture of the student need to be recognized.
There is no need for the teacher to manually take attendance in the class
because the system records a video and through further processing steps the
face is being recognized and the attendance database is updated.
6
RAM : 2 GB
HDD : 160GB
Tool : Netbeans
Database : MYSQL
JSPs are built on SUN Microsystems' servlet technology. JSPs are HTML page
with specialJSP tags. These JSP tags can contain Java code. The JSP file extension
is.jsp. The JSPengine parses the.jspand creates a Javaservlet source file. when first
time jsp file compile, the JSP is probably slower the first time it is accessed. Any
time after this the specialcompiled servlet is executed and is therefore returns
faster.
SETTING UP JSP ENVIRONMENT
a JSP comment for single line --%> <%--This is a JSP comment for multiple
lines --%>.
JSP Expressions
Expression is used to insert values directly to the output. Syntax of expression is as
follows
<%= expression %> there is no space between <% and = for example: To show the
current date and time Date :<%=new java.util.Date() %>
JSP Scriptlet
Scriplet are just like Expressions without having "=" equal sign. any java code can
be insertinside the scriplet. Syntax of Scriptlet
<% // any java source code here %>
JSP Declaration
If you want to define methods or fields you can use JSP declaration. The JSP
declaration is surrounded by the sign <%! and %>.Syntax to declare a variable
<%!inta =30; %>
here variable a is declare
JSP Directive tag
JSP directive tag gives special information about the page to the JSP engine.Syntax
of Directive tag
Directive tag (<%@ directive ... %>)there are mainly three type of directive tags
1. page:
11
4. Finalization:-
In the finalization phase, the web container calls the method jsp Destroy(). This
method is used to clean up memory and resources.<%! public void jspInit() { //
write custom code here //to cleanup the resources} %>
These objects are available for the JSP developer and they can use
the objects in the JSP files without declaring the objects in the JSP. JSP container
provides a list of instantiated objects for you to access different kind of data in a
web application. These objects are called implicit objects as they are automatically
available for the implement. The following is the list of few implicit objects used
in JSP request object response object session object out object page context object
config object exception object application object.
JSP contains both Java and HTML in the same file. JSP is same
like HTML , but the difference in JSP developer writes Java code with script tags.
JSP can be easily managed because business logic is separated from presentation
logic. But in Servlet technology, both will be mixed up. When JSP page is updated,
there is no need to recompile and redeploy the project.
Following are the advantages of JSP.
Easy to maintain.
Less code than Servlet.
Extension to Servlet.
No need to recompile and redeploy.
MySQL Server
system such as MySQL Server. Since computers are very good at handling large
amounts of data, database management systems play a central role in computing,
as standalone utilities, or as parts of other applications.
A relational database stores data in separate tables rather than putting all the
data in one big storeroom. The database structures are organized into physical files
optimized for speed. The logical model, with objects such as databases, tables,
views, rows, and columns, offers a flexible programming environment. You set up
rules governing the relationships between different data fields, such as one-to-one,
one-to-many, unique, required or optional, and “pointers” between different tables.
The database enforces these rules, so that with a well-designed database, your
application never sees inconsistent, duplicate, orphan, out-of-date, or missing data.
The SQL part of “MySQL” stands for “Structured Query Language”. SQL is the
most common standardized language used to access databases. Depending on your
programming environment, you might enter SQL directly (for example, to
generate reports), embed SQL statements into code written in another language, or
use a language-specific API that hides the SQL syntax.SQL is defined by the
ANSI/ISO SQL Standard. The SQL standard has been evolving since 1986 and
several versions exist. In this manual, “SQL-92” refers to the standard released in
1992, “SQL:1999” refers to the standard released in 1999, and “SQL:2003”refers
to the current version of the standard. We use the phrase “the SQL standard” to
mean the current version of the SQL Standard at any time.
Open Source means that it is possible for anyone to use and modify the
software. Anybody can download the MySQL software from the Internet and use
it without paying anything. If you wish, you may study the source code and
change it to suit your needs. The MySQL software uses the GPL (GNU General
Public License), http://www.fsf.org/licenses/, to define what you may and may not
do with the software in different situations. If you feel uncomfortable with the
GPL or need to embed MySQL code into a commercial application, you can buy a
commercially licensed version from us. See the MySQL Licensing Overview for
more information (http://www.mysql.com/company/legal/licensing/).
The MySQL Database Server is very fast, reliable, scalable, and easy to use
If that is what you are looking for, you should give it a try. MySQL Server can run
comfortably on a desktop or laptop, alongside your other applications, web
servers, and so on, requiring little or no attention. If you dedicate an entire
machine to MySQL, you can adjust the settings to take advantage of all the
memory, CPU power, and I/O capacity available. MySQL can also scale up to
clusters of machines, networked together.
MySQL Server was originally developed to handle large databases much faster
than existing solutions and has been successfully used in highly demanding
production environments for several years. Although under constant development,
MySQL Server today offers a rich and useful set of functions. Its connectivity,
speed, and security make MySQL Server highly suited for accessing databases on
the Internet.
CHAPTER 3
SYSTEM DESIGN
INTRODUCTION
The Data Flow Diagram is one of the most improvement tools used by the system analyst
DeMacro (1978) Nad Gand Sarson (1979) popularized the use of the data flow diagram as
modeling tools through their structured system analysis methodologies.
A Data Flow Diagram should be the first tool used by the system analyst to model system
components. These components represent the system processes, the data used by this processes
and external entities that interact with the system and the information flows in the system.
A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data through
an information system, modeling its process aspects. Often they are a preliminary step used to
create an overview of the system which can later be elaborated. DFD can also be used for the
visualization of data processing.
A DFD shows what kind of information will be input to and output from the system,
where the data will come from and go to, and where the data will be stored. It does not show
information about the timing of processes, or information about whether processes will operate
in sequence or in parallel.
18
UML stands for Unified Modeling Language. UML is a standardized general purpose
modeling language in the field of object-oriented software engineering. The standard is managed
and was created by, the Objected Management Group.
The goal is for UML to become a common language for creating models of object
oriented computer software. In its current form UML is comprised of two major components: a
19
Meta-model and a notation. In the future, some form of method or process may also be added to
or associated with UML.
The UML uses mostly graphical notations to express the design of software projects.
GOALS OF UML
Provides users ready-to-use, expressive visual modeling languages so that they can
develop and exchange meaningful models.
Provides extendibility and specification mechanisms to extend the core concepts.
Be independent of particular programming language and development process.
There are various kinds of methods in software design. They are as follows:
Usecase Diagram
Sequence Diagram
Class Diagram
State Chart Diagram
Activity Diagram
Collaboration Diagram
Component Diagram
Deployment Diagram
Usecase diagram is a graph of actors, a set of use case enclosed by a system boundary
communication association between the actors and the use cases, and generalization among
the /use cases.
20
The usecase diagram of the project revolves around the actors system, admin, user, and
employee respectively and among the actor, the admin have the privilege to access all the
modules where as the others and they are subjected to access a quite little less than the admin in
accessing the modules.
21
The project contains three modules mainly and other sub models sequence flow
performed step by step and the system data changes apparently according to the changes
occurred.
22
Activity Diagram
23
Class Diagram
25
Sequence Diagram
26
CHAPTER 4
SYSTEM DEVELOPMENT
4.1.2 Hod
4.1.3 Staff
4.1.4. Students
4.1.1 ADMIN
The Admin is a person who run and manage the system, in this project the owner or
director of the institutue has rights of admin. The Admin creates the structure of a system to
creating standard and classroom.
Login Add
Branch Add
Staff View
Attendance Leave
Reports Logout
4.1.2 HOD
28
The main aim of the attendance system fulfill by HOD. HOD can add staff detail
and also view the student details. Finally, HOD can also view the student
attendance details.
Login
4.1.3 STAFF
The main aim of the attendance system fulfill by staff. Staff can add
student detail and fill the attendance daily for his division. The staff can only fill
attendance for his division students and he can manage leaves and complains
made by only his division student.
Login
Add student
View Attendance
Manage Leave
Change password
4.1.4 STUDENTS
All student have unique username and password to access the system. After login
into system student can view his attendance reports and manage his account. If any student has
any problem regarding education he can directly make complain to his staff using this system.
29
Student can apply for leave through the system and he can get reply from his staff about his leave
status.
Login
View Attendance
Apply leave
Change Password
30
CHAPTER 5
SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub-assemblies, assemblies and/or a finished product it is the
process of exercising software with the intent of ensuring that the Software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.
The final step involves validation testing, which determines whether the software
function as the user expected. The end-user rather than the system developer conduct this test
most software developers as a process called “Alpha and Beta testing” to uncover that only the
end user seems able to find. The compilation of the entire project is based on the full satisfaction
of the end users. In the project, validation testing is made in various forms. In registration form
Email id, phone number and also mandatory fields for the user is verified.
Inadequate testing or non-testing, leads to errors, that may appear few months later. This
will create two problems.
Unit Testing
Integration Testing
System Testing
Regression Testing
Acceptance Testing
The procedure level testing is made first. By giving improper inputs, the errors occurred
are noted and eliminated. Then the web form level testing is made. For example, store data to the
table in the correct manner. The dates are entered in wrong manner and checked. Wrong email-id
and website URL (Universal Resource Locator) is given and checked.
password
Enter null admin invalid invalid login nil
either or username username failed
username
password
Testing is done for each module. After testing all the modules, the modules are integrated
and testing of the final system is done with the test data, specially designed to show that the
system will operate successfully in all its aspects conditions. Thus the system testing is a
confirmation that all is correct and an opportunity to show the user that the system works.
Test case id: U1 Test case module name: Login and Registration
System testing is the testing to ensure that by putting the software in different
environments (e.g., Operating System) it still works. System testing is done with full system
implementation and environment.
Acceptance testing is often done by the customer to ensure that the delivered product
meets the requirements and works as the customer expected.
34
CHAPTER 6
SYSTEM MAINTENANCE
7.1 INTRODUCTION
In software maintenance, an enormous mass of potential problems and cost lies under the
surface. Software maintenance is far more than fixing mistakes. Analyst and programmers
append for more time in maintaining the program than they do writing them few tools and
techniques are available for maintenance. The literature on maintenance contains very few
entries when compared to development activities.
Corrective maintenance
Adaptive maintenance
Perfective maintenance
Preventive maintenance
This type of maintenance implies removing errors in a program, which might have crept in
the system due to faulty design or wrong assumptions. Thus, in corrective maintenance,
processing or performance failures are required.
In adaptive maintenance, program functions are changed to enable the information needs of
the user. This type of maintenance may become necessary because of organizational changes
which may include:
c) New technology
The results obtained from the evaluation process help the organization to determine whether
its information systems are effective and efficient or otherwise.
CHAPTER 8
CONCLUSION
The face detection and recognition algorithms were studied thoroughly taking number of
the test from different varying condition images. For face detection combination of RGB and
HSV model algorithm is used. For face recognition principal component analysis method is used.
Attendance of the student are marked using the recognized face of every individual student and
the data is stored in an attendance sheet. The attendance of every student marked automatically
by recognizing their face with the face present in the data base
37
CHAPTER 9
FUTURE ENHANCEMENT
Further work can be done on this project to alert the student by sending SMS regarding
the attendance. For this purpose module can be used. SMS alert can be given to the parent of the
student.
38
APPENDIX 1
SCREEN SHOTS
HOME PAGE
39
ADMIN LOGIN
40
STUDENT LOGIN
41
REGISTRATION FORM
APPENDIX 2
SAMPLE CODING
Home Page
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<script src="js/jquery.js"></script>
<script src="js/jquery.easing.1.3.js"></script>
<script src="js/jquery-migrate-1.1.1.js"></script>
<script src="js/superfish.js"></script>
<script src="js/jquery.equalheights.js"></script>
<script src="js/tms-0.4.1.js"></script>
<script src="js/jquery.carouFredSel-6.1.0-packed.js"></script>
<script src="js/jquery.ui.totop.js"></script>
<script>
$(window).load(function () {
$('.slider')._TMS({
show: 0,
pauseOnHover: false,
prevBu: '.prev',
nextBu: '.next',
playBu: false,
duration: 800,
preset: 'fade',
43
easing: 'easeOutQuad',
pagNums: false,
slideshow: 8000,
numStatus: false,
banners: 'fade',
waitBannerAnimation: false,
progressBar: false
})
});
$(window).load(
function () {
$('.carousel1').carouFredSel({
auto: false,
prev: '.prev1',
next: '.next1',
width: 960,
items: {
visible: {
min: 4,
max: 4
44
},
},
responsive: false,
scroll: 1,
mousewheel: false,
swipe: {
onMouse: false,
onTouch: false
});
});
</script>
<!--[if lt IE 9]>
<script src="js/html5shiv.js"></script>
<![endif]-->
</head>
<body>
<header>
<div class="container_12">
<div class="grid_12">
45
</div>
</div>
<nav>
<div class="container_12">
<div class="grid_12">
<ul class="sf-menu">
<li><a href="dataowner.jsp">ADMIN</a>
<li><a href="cloudserver.jsp">STUDNET</a></li>
<li><a href="datauser.jsp">STAFF</a></li>
<li><a href="invest.jsp">SIGNUP</a></li>
</ul>
<div class="clear"></div>
</div>
</div>
</nav>
</header>
<div id="content">
<div class="slider-relative">
46
<div class="slider-block">
<div class="slider">
<ul class="items">
</li>
</li>
</li>
</li>
</ul>
</div>
</div>
</div>
<div class="container_12">
<h4>Standards</h4>
</div>
At vero eos et accusamus et iusto odio dignissimos ducimus qui bl abd gdihtii praesentium
voluptatum deenir rf uiti jll atque. Corrupti quos doloregts. </div>
<h4>Principles</h4>
</div>
Gthoie eos et accusamus et iusto odio dignissimos ducimus qui bl abd gdihtii praesentium
voluptatum deenir rf uiti jll atque. Mjhof sdaw doloregts. </div>
<h4>Experience</h4>
</div>
ssimos ducimus qui bl abd gdihtiijolwer praesentium voluptatum deenir rf uiti jlol atque.
Gfasdh quos doloregts. </div>
<h4>Client Reviews</h4>
</div>
48
Owasd et accusamus et iusto odiomulo dignissimos ducimus qui bl abd gdihtiie praesentium
voluptatum deenir rf uiti jllti atque. Ckloerupti quos doloregts. </div>
<div class="clear"></div>
</div>
</div>
</body>
</html>Siguup.jsp
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<script src="js/jquery.js"></script>
<script src="js/jquery.easing.1.3.js"></script>
<script src="js/jquery-migrate-1.1.1.js"></script>
<script src="js/superfish.js"></script>
<script src="js/jquery.equalheights.js"></script>
<script src="js/jquery.ui.totop.js"></script>
49
<!--[if lt IE 9]>
<script src="js/html5shiv.js"></script>
<![endif]-->
</head>
<body>
<header>
<div class="container_12">
<div class="grid_12">
</div>
</div>
<nav>
<div class="container_12">
<div class="grid_12">
<ul class="sf-menu">
<li><a href="home.jsp">HOME</a></li>
<li><a href="cloudserver.jsp">CSP</a></li>
</ul>
<div class="clear"></div>
</div>
</div>
</nav>
</header>
<div id="content">
</div>
<div class="grid_3">
</div>
<input
type="submit" value="Login" style="font-size:19px; color:green;"/>
</form> </center>
</div>
</div>
</div>
</div>
</body>
</html>
52
53
REFERENCES
[1] Bhumika G. Bhatt, Zankhana H. Shah “Face Feature Extraction Techniques: A Survey”,
National Conference on Recent Trends in Engineering & Technology, 13-14 May 2011.
[2] G. Yang and T. S. Huang, “Human face detection in complex background,” Pattern
Recognition Letter, vol. 27, no.1, pp. 53-63, 1994.
[3] C. Kotropoulos and I. Pitas, “Rule-based face detection in frontal views,” Proc. Int’l
Conf. Acoustics, Speech and Signal Processing, vol. 4, pp. 2537-2540, 1997.
[4] E. Saber and A.M. Tekalp, “Frontal-view face detection and facial feature extraction
using color, shape and symmetry based cost functions,” Pattern Recognition Letters, vol. 17,
no. 8, pp. 669-680, 1998.
[6] Discriminant analysis for recognition of human face images Kamran Etemad and Rama
Chellappa [7] Sanjay singh et.al, “A robust skin color based face detection algorithm”,
Tamkang Journal of Science and Engineering vol.6, no.4,pp227-234, 2003 [8] Jose
M.Chaves-Gonzalez, Miguel A Vega-Rodriguez,Juan