Professional Documents
Culture Documents
Biometric Attendance Register Report
Biometric Attendance Register Report
PROJECT REPORT
On
In partial fulfillment of
4th Semester of
MCA
By
DINU RAJ.S
Reg. no: 95501016
1
Biometric Attendance Register
COCHIN -22
CERTIFICATE
2
Biometric Attendance Register
DECLARATION
3
Biometric Attendance Register
ACKNOWLEDGEMENT
DINU RAJ.S
4
Biometric Attendance Register
SYNOPSIS
The objective of this project is to createan attendance software for Department of
Computer Applications,Cochin University of Science And Technology. Students &
faculties use their thumb impression to mark their attendance. The Project contains details
of all the students and faculty of the department, including their thumb impressions.
Faculties are provided with individual user accounts through which they can access the
attendance database of the department that are hidden from external world. They can
modify the attendance of students. The only purpose of students is to punch their
attendance, they does not have any individual accounts. In order to view individual
attendance students are requested to meet their faculties.
User Friendly: Interfaces are easy to understand and simple to use even for a
beginner.
Reliability: Exceptions are carefully handled and the software is tested fora range of
inputs.
5
Biometric Attendance Register
Features:-
6
Biometric Attendance Register
CONTENTS
1. PREFACE 9
1.1 Analysis Phase 10
1.2 Design Phase 10
1.3 Development Phase 11
1.4 Testing Phase 11
1.5 Implementation Phase 12
2. INTRODUCTION 13
2.1 Overview 14
2.2 Project Profile 15
2.3 About the Organization 15
2.4 Definitions, Acronyms and Abbreviations 17
3. SYSTEM ANALYSIS 18
3.1 Purpose 19
3.2 Problem Definition 20
3.3 Feasibility Study 20
3.4 Proposed System 21
4. SOFTWARE REQUIREMENT SPECIFICATION 23
4.1 Purpose 24
4.2 Scope 24
4.3 Overall Description 25
4.4 Functional Requirements 27
4.5 Non Functional Requirements 27
4.6 Platform Used 27
4.7 Technology Used 34
5. SOFTWARE QUALITY ASSURANCE PLAN 39
7
Biometric Attendance Register
5.1 Purpose 40
5.2 Scope 40
5.3 Reference Document 40
5.4 Management 41
5.5 Documentation 41
5.6 Standards, Practices and Conventions 42
5.7 Reviews and Audits 42
5.8 Configuration Management 43
5.9 Tools Techniques And Methodologies 43
6. SYSTEM DESIGN 44
8
Biometric Attendance Register
1. PREFACE
9
Biometric Attendance Register
The various tasks done during system analysis include the following:
10
Biometric Attendance Register
extends to include all the specified functions of the application. The system documentation
process also starts in this phase.
12
Biometric Attendance Register
2. INTRODUCTION
13
Biometric Attendance Register
2.1 OVERVIEW
We are living in an area of modern technology .Our life provides us many opportunities to
test our imagination, intelligence, optimism, confidence and sheer obstinacy.
In modern times, few inventions have affected everyday life as much as the
computer .The earliest computers were gigantic machines that filled entire buildings and
were the days when using computers was the privilege of the chosen few who mastered its
peculiarities.
As time went by, computers have evolved and been put to good use in a variety of
areas. Today computers dominate every sphere of life be it entertainment, education,
banking, insurance, research, medicine, design or manufacturing.
While the move towards the digital era is being accelerated every hour, biometrics
technologies have begun to affect people’s daily life more and more. Biometrics
technologies verify identity through characteristics such as fingerprints, faces, irises, retinal
patterns, palm prints, voice, hand-written signatures, and so on. These techniques, which
use physical data, are receiving attention as a personal authentication method that is more
convenient than conventional methods such as a password or ID cards. Biometric personal
authentication uses data taken from measurements. Such data is unique to the individual
and remains so throughout one’s life.
This technology has been applied for controlling access to high-security facilities, but it is
now being widespread developed in information systems such as network, e-commerce,
and retail applications. In these technologies, fingerprint becomes the most mature and
popular biometrics technology used in automatic personal identification. In the beginning,
fingerprint verifying used in the military affairs and in the criminal identification. But now,
this technology is also being used in several other applications such as access control for
high security installations, credit card usage verification, and employee identification.
The reason for the popularity of fingerprint verifying is that fingerprints satisfy uniqueness,
stability, permanency and easily taking. Just for this, a number of fingerprint verification
approaches have been proposed until now
14
Biometric Attendance Register
Duration : 4 months
Associate Professor
CUSAT
2.3ORGANISATION PROFILE
About CUSAT
The establishment of the erstwhile University of Cochin in 1971 was
a commitment from the Government of Kerala towards the new scientific policy resolution
adopted by the Central Government on 4th March 1958. The University of Cochin was
later reorganized as Cochin University of Science and Technology (CUSAT) in February
1986.
The University’s basic philosophy and goals find eloquent expression in its Coat of
Arms emblazoning the motto ‘Tejaswinavadhitamastu’ which in essence means ‘may
learning illumine us both’ (the teacher and the taught). Starting from 1996-97, CUSAT
became international instudent admissions and faculty exchanges. It is strengthening
contacts and collaborative tie-up with international universities and institutions and is in the
path of growth as a global center for generation of new knowledge in frontier areas of
learning. CUSAT has entered into academic collaborations and exchange programmers
with many notable institutions across the USA, Europe, Russia, Japan, France, Korea etc.
Body which meets every month. The academic structure comprises of nine Faculties viz.
Engineering, Environmental Studies, Humanities, Law, Marine Sciences, Medical Sciences
and Technology, Science, Social Sciences and Technology. A Sophisticated Test and
Instrumentation Centre (STIC) wereestablished in 1996 in collaboration with the
Government of Kerala.Centers also exist for Interdisciplinary Studies, Microprocessor
Research, National Manpower Information, Rural Development & Appropriate
Technology, Ocean Electronics Science in Society, Information Resource Management,
Neuroscience, Creative Writing, Comparative Literature, Population Studies, Aquatic
Animal Health, Monsoon Studies, Economic Policy and Analysis & Adult and Extension
education.
The UGC has selected CUSAT as a Center for Excellence in the field of Lasers and
Opto-electronic Sciences for which a new Centre, CELOS has been established. The Union
Ministry of HRD has acknowledged School of Legal Studies as a Depository of Intellectual
Property Rights and an IPR chair has been introduced. Another prestigious chair instituted
by the Ministry of HRD is Rajiv Gandhi Chair on Sustainable Development. By giving
recognition to several well-established premier research institutions in the country and the
Southern Naval Command of Indian Navy, the University has brought within its reach the
resources available in these institutions for the use of the academic community.
Specializations are available in almost all Faculties/Departments for higher studies and
research.
16
Biometric Attendance Register
human resource development in the subject. The M.C.A. programme was started (1994)
with a model curriculum prepared jointly by ISTE and the Department of Electronics with
minor modifications. The Syllabus is updated periodically, based on the current trends and
requirements of the industry. The Department has proud alumni, most of them being
placed in much reputed international firms like IBM, WIPRO, INFOSYS, TCS, CTS etc.
The Research activities of the Department include the subject areas Fuzzy sets and
Logic Applications in Artificial Intelligence, Simulation, Cryptography & Coding Theory,
Algorithm, Pattern recognition, Internet-Marketing, E-commerce and Internet Technology,
Networking and Mobile Communication and Software Engineering. Apart from this, the
Department has taken up a challenging research project funded by AICTE, Computer
Assisted Classical Music. The Department of Computer Applications is also doing
consultancy work for public and private sector undertakings. The Department has an
excellent library with more than 3000 books and various national and international
journals. The Department has a well-equipped laboratory, which is being constantly
updated with the latest computers.
Field Definition
BAR Biometric Attendance Register
SRS Software Requirement Specification
SQL Structured Query Language
CUSAT Cochin University of Science And Technology
DCA Department of Computer Applications
Entry Data stored in the DCAWEBSITE Database
IEEE Institute of Electrical and Electronic Engineers
QA Quality assurance
SCMP Software Configuration Management Plan
SQAP Software Quality Assurance Plan
SRS Software Requirements Specification
DMS Department Management System
OS Operating System
17
Biometric Attendance Register
3. SYSTEM ANALYSIS
18
Biometric Attendance Register
3.1 PURPOSE
System analysis or study is an important phase of any system development process.
The system is studied to the minute detail and analyzed. The system analyst dwelled deep
into the working of the present system. The system was viewed as a whole and the input of
the system are identified. During analysis phase for each problem identified many
alternative solutions were evaluated and selected the most feasible one. A feasibility
analysis was performed to evaluate possible solutions to recommend the most feasible one.
Understanding application.
Planning.
Scheduling.
Developing candidate solution.
Performing trade studies.
Performing cost benefit analysis.
Recommending alternative solutions.
Selling of the system.
Supervising, installing and maintaining the system.
The most critical phase during the system analysis is planning. To launch a system
investigation we need a clear cut plan detailing the steps to be taken. Initial investigation
has the objective of whether the users request has potential merit.
19
Biometric Attendance Register
interview, questionnaire, on-site observation etc. They help in evaluating the existing
system.
20
Biometric Attendance Register
21
Biometric Attendance Register
through which they can access the database.This system efficiently manages the complete
administration of attendances. It reduces the manpower and paper works.
22
Biometric Attendance Register
become easily adaptable with the new system. New system uses the concept of showing the
essential details whenever required.The user interface of the new system is made attractive.
The operations on the software are easier with this graphical user interface.
4. SOFTWARE REQUIREMENT
SPECIFICATION
23
Biometric Attendance Register
4.1 PURPOSE
This Software Requirements Specification provides a complete description of all the
functions and specifications of the Biometric Attendance Register. The expected audience of
this document is the faculty of DCA CUSAT, including the faculty who will use this
system, and the developers of the System. It will also serves as a reference for those who
want to extend the software. It also describes the interfaces for the system. It will explain the
purpose and features of the system, the interfaces of the system, what the system will do, the
constraints under which it must operate and how the system will react to external stimuli.
This system efficiently manages the complete administration of a group of activities, events
and training provided from the Department. It is designed specifically to meet the requirements of a
Computer Applications Department administration and reduce the manpower and paper works
involved.
4.2 SCOPE
This document is the only one that describes the requirements of the system. It is
meant for use by the developers, and will also be the basis for validating the final delivered
system. Any changes made to the requirements in the future will have to go through a
formal change approval process. The developer is responsible for asking for clarification,
where necessary, and will not make any alterations without the permission of the client.
Biometric Attendance Register System offers a diversified range of solutions and
support services to fulfill the back office needs of departments to keep track of the
attendances of students and faculty. All this is done by automation hence the human effort
and error is reduced. The software gives you complete control over the attendance of
department and you can prepare things automatically. This software will do just good work
over and over for you and nothing else.
This system works efficiently on a single system.More specifically, this system is designed
to allow administrator, student and faculty of a department to save the attendance and
24
Biometric Attendance Register
prepare reports necessarily. The system also contains a relational database containing
images o thumb impressions, list of students, list of faculty, student attendance, faculty
attendance, a student login and a faculty login.
4.3.1PRODUCT PERSPECTIVE
25
Biometric Attendance Register
4.3.5OPERATING ENVIRONMENT
4.3.5.1Hardware Interface
Processor Intel Pentium processor
RAM 256 MB
Disk Space 100 MB
Keyboard Normal key board
Mouse Optical mouse
Scanner Fingerprint Scanner
26
Biometric Attendance Register
Security
Reliability
Maintainability
Extensibility
Reusability
Application affinity/compatibility
Resource utilizations
Scalability
Functionality
Performance
27
Biometric Attendance Register
28
Biometric Attendance Register
has been criticized for allowing untrusted software to be launched with elevated privileges
without a prompt by exploiting a trusted application. Microsoft's Windows kernel engineer
Mark Russinovich acknowledged the problem, but noted that malware can also
compromise a system when users agree to a prompt. Windows 7 also supports images in
RAW image format through the addition of Windows Imaging Component-enabled image
decoders, which enables raw image thumbnails, previewing and metadata display in
Windows Explorer, plus full-size viewing and slideshows in Windows Photo Viewer and
Windows Media Center.
The taskbar has seen the biggest visual changes, where the Quick Launch toolbar
has been replaced with the ability to pin applications to the taskbar. Buttons for pinned
applications are integrated with the task buttons. These buttons also enable the Jump Lists
feature to allow easy access to common tasks. The revamped taskbar also allows the
reordering of taskbar buttons. To the far right of the system clock is a small rectangular
button that serves as the Show desktop icon. This button is part of the new feature in
Windows 7 called Aero Peek. Hovering over this button makes all visible windows
transparent for a quick look at the desktop. In touch-enabled displays such as touch screens,
tablet PCs, etc., this button is slightly wider to accommodate being pressed with a finger.
Clicking this button minimizes all windows, and clicking it a second time restores them.
Additionally, there is a feature named Aero Snap, which automatically maximizes a
window when it is dragged to the top of the screen. Dragging windows to the left/right
edges of the screen allows users to snap documents or files on either side of the screen for
comparison between windows, such that the windows vertically take up half the screen.
When a user moves windows that were maximized using Aero Snap, the system restores
their previous state automatically. This functionality is also accomplished with keyboard
shortcuts. Unlike in Windows Vista, window borders and the taskbar do not turn opaque
when a window is maximized with Windows Aero applied. Instead, they remain
translucent.
For developers, Windows 7 includes a new networking API with support for
building SOAP-based web services in native code (as opposed to .NET-based WCF web
services), new features to shorten application install times, reduced UAC prompts,
simplified development of installation packages, and improved globalization support
through a new Extended Linguistic Services API. At WinHEC 2008 Microsoft announced
that color depths of 30-bit and 48-bit would be supported in Windows 7 along with the
29
Biometric Attendance Register
wide color gamut scRGB (which for HDMI 1.3 can be converted and output as xvYCC).
The video modes supported in Windows 7 are 16-bit sRGB, 24-bit sRGB, 30-bit sRGB, 30-
bit with extended color gamutsRGB, and 48-bit scRGB. Microsoft has also implemented
better support for solid-state drives, including the new TRIM command, and Windows 7 is
able to identify a solid-state drive uniquely. Microsoft is planning to support USB 3.0 in a
subsequent patch, support not being included in the initial release due to delays in the
finalization of the standard.
Internet Spades, Internet Backgammon and Internet Checkers, which were removed
from Windows Vista, were restored in Windows 7. Windows 7 includes Internet Explorer 8
and Windows Media Player 12. Users are also able to disable many more Windows
components than was possible in Windows Vista. New additions to this list of components
include Internet Explorer, Windows Media Player, Windows Media Center, Windows
Search, and the Windows Gadget Platform. Windows 7 includes 13 additional sound
schemes, titled Afternoon, Calligraphy, Characters, Cityscape, Delta, Festival, Garden,
Heritage, Landscape, Quirky, Raga, Savanna, and Sonata. A new version of Microsoft
Virtual PC, newly renamed as Windows Virtual PC was made available for Windows 7
Professional, Enterprise, and Ultimate editions. It allows multiple Windows environments,
including Windows XP Mode, to run on the same machine. Windows XP Mode runs
Windows XP in a virtual machine and redirects displayed applications running in Windows
XP to the Windows 7 desktop. Furthermore, Windows 7 supports the mounting of a virtual
hard disk (VHD) as normal data storage, and the bootloader delivered with Windows 7 can
boot the Windows system from a VHD; however, this ability is only available in the
Enterprise and Ultimate editions. The Remote Desktop Protocol (RDP) of Windows 7 is
also enhanced to support real-time multimedia application including video playback and
3D games, thus allowing use of DirectX 10 in remote desktop environments. The three
application limit, previously present in the Windows Vista Starter Edition, has been
removed from Windows 7.A recommendation for Windows 7 is to be on Windows Vista
(Longhorn) before upgrading to any version of Windows 7, and to have 16GB on the hard
drive.
LINUX
Linux is a Unix-like computer operating system assembled under the model of free
and open source software development and distribution. The defining component of Linux
30
Biometric Attendance Register
is the Linux kernel, an operating system kernel first released 5 October 1991 by Linus
Torvalds.
Linux was originally developed as a free operating system for Intel x86-based
personal computers. It has since been ported to more computer hardware platforms than
any other operating system. It is a leading operating system on servers and other big iron
systems such as mainframe computers and supercomputers more than 90% of today's 500
fastest supercomputers run some variant of Linux, including the 10 fastest. Linux also runs
on embedded systems (devices where the operating system is typically built into the
firmware and highly tailored to the system) such as mobile phones, tablet computers,
network routers, televisionsand video game consoles; the Android system in wide use on
mobile devices is built on the Linux kernel.
The development of Linux is one of the most prominent examples of free and open
source software collaboration: the underlying source code may be used, modified, and
distributed—commercially or non-commercially—by anyone under licenses such as the
GNU General Public License. Typically Linux is packaged in a format known as a Linux
distribution for desktop and server use. Some popular mainstream Linux distributions
include Debian (and its derivatives such as UBUNTU), Fedora and openSUSE. Linux
distributions include the Linux kernel, supporting utilities and libraries and usually a large
amount of application software to fulfill the distribution's intended use.
A distribution oriented toward desktop use will typically include the X Window
System and an accompanying desktop environment such as GNOME or KDE Plasma.
Some such distributions may include a less resource intensive desktop such as LXDE or
Xfce.for use on older or less powerful computers. A distribution intended to run as a server
may omit all graphical environments from the standard install and instead include other
software such as the Apache HTTP Server and an SSH server such as OpenSSH. Because
Linux is freely redistributable, anyone may create a distribution for any intended use.
Applications commonly used with desktop Linux systems include the Mozilla Firefox web
browser, the LibreOffice office application suite, and the GIMP image editor.
Since the main supporting user space system tools and libraries originated in the
GNU Project, initiated in 1983 by Richard Stallman, the Free Software Foundation prefers
the name GNU/Linux.
Most Linux distributions support dozens of programming languages. The original
development tools used for building both Linux applications and operating system
31
Biometric Attendance Register
programs are found within the GNU toolchain, which includes the GNU Compiler
Collection (GCC) and the GNU build system. Amongst others, GCC provides compilers for
Ada, C, C++, Java, and Fortran. First released in 2003, the Low Level Virtual Machine
project provides an alternative open-source compiler for many languages. Proprietary
compilers for Linux include the Intel C++ Compiler, Sun Studio, and IBM XL C/C++
Compiler. BASIC in the form of Visual Basic is supported in such forms as Gambas,
FreeBASIC, and XBasic, and in terms of terminal programming or QuickBASIC or Turbo
BASIC programming in the form of QB64.
Most distributions also include support for PHP, Perl, Ruby, Python and other
dynamic languages. While not as common, Linux also supports C# (via Mono), Vala, and
Scheme. A number of Java Virtual Machines and development kits run on Linux, including
the original Sun Microsystems JVM (HotSpot), and IBM's J2SE RE, as well as many open-
source projects like Kaffe and JikesRVM.
GNOME and KDE are popular desktop environments and provide a framework for
developing applications. These projects are based on the GTK+ and Qtwidget toolkits,
respectively, which can also be used independently of the larger framework. Both support a
wide variety of languages. There are a number of Integrated development environments
available including Anjuta, Code::Blocks, CodeLite, Eclipse, Geany, ActiveState Komodo,
KDevelop, Lazarus, MonoDevelop, NetBeans, Qt Creator and Omnis Studio, while the
long-established editors Vim and Emacs remain popular.
As well as those designed for general purpose use on desktops and servers,
distributions may be specialized for different purposes including: computer architecture
support, embedded systems, stability, security, localization to a specific region or language,
targeting of specific user groups, support for real-time applications, or commitment to a
given desktop environment. Furthermore, some distributions deliberately include only free
software. Currently, over three hundred distributions are actively developed, with about a
dozen distributions being most popular for general-purpose use.
Linux is a widely ported operating system kernel. The Linux kernel runs on a
highly diverse range of computer architectures: in the hand-held ARM-based iPAQ and the
mainframeIBMSystem z9, System z10; in devices ranging from mobile phones to
supercomputers. Specialized distributions exist for less mainstream architectures. The
ELKS kernel fork can run on Intel 8086 or Intel 8028616-bit microprocessors, while the
µClinux kernel fork may run on systems without a memory management unit. The kernel
32
Biometric Attendance Register
also runs on architectures that were only ever intended to use a manufacturer-created
operating system, such as Macintosh computers (with both PowerPC and Intel processors),
PDAs, video game consoles, portable music players, and mobile phones.
There are several industry associations and hardware conferences devoted to
maintaining and improving support for diverse hardware under Linux, such as
FreedomHEC.
Linux and most GNU software are licensed under the GNU General Public License
(GPL). The GPL requires that anyone who distributes Linux must make the source code
(and any modifications) available to the recipient under the same terms. Other key
components of a software system may use other licenses; many libraries use the GNU
Lesser General Public License (LGPL), a more permissive variant of the GPL, and the
X.org implementation of the X Window System uses the MIT License.
Torvalds states that the Linux kernel will not move from version 2 of the GPL to
version 3. He specifically dislikes some provisions in the new license which prohibit the
use of the software in digital rights management, and it would also be impractical to obtain
permission from all the copyright holders, who number in the thousands.
A 2001 study of Red Hat Linux 7.1 found that this distribution contained 30 million
source lines of code. Using the Constructive Cost Model, the study estimated that this
distribution required about eight thousand man-years of development time. According to
the study, if all this software had been developed by conventional proprietary means, it
would have cost about $1.46 billion (2012 US dollars) to develop in the United States.
Most of the code (71%) was written in the Cprogramminglanguage, but many other
languages were used, including C++, Lisp, assembly language, Perl, Python, Fortran, and
various shell scripting languages. Slightly over half of all lines of code were licensed under
the GPL. The Linux kernel itself was 2.4 million lines of code, or 8% of the total.
In a later study, the same analysis was performed for Debian GNU/Linux version
4.0 (etch, which was released in 2007). This distribution contained close to 283 million
source lines of code, and the study estimated that it would have required about seventy
three thousand man-years and cost US$8.04 billion (in 2012 dollars) to develop by
conventional means.
In the United States, the name Linux is a trademark registered to Linus
Torvalds.Initially, nobody registered it, but on 15 August 1994, William R. Della Croce, Jr.
filed for the trademark Linux, and then demanded royalties from Linux distributors. In
33
Biometric Attendance Register
1996, Torvalds and some affected organizations sued him to have the trademark assigned
to Torvalds, and in 1997 the case was settled. The licensing of the trademark has since been
handled by the Linux Mark Institute. Torvalds has stated that he trademarked the name only
to prevent someone else from using it. LMI originally charged a nominal sublicensing fee
for use of the Linux name as part of trademarks, but later changed this in favor of offering a
free, perpetual worldwide sublicense.
JAVA
Principles
There were five primary goals in the creation of the Java language
34
Biometric Attendance Register
Versions
Oracle Corporation is the current owner of the official implementation of the Java
SE platform. This implementation is based on the original implementation of Java by Sun.
The Oracle implementation is available for Mac OS X, Windows and Solaris. Because Java
lacks any formal standardization recognized by Ecma International, ISO/IEC, ANSI, or any
other third-party standards organization, the Oracle implementation is the de facto
standard.
The Oracle implementation are packaged into two different distributions. The Java
Runtime Environment (JRE) which contains the parts of the Java SE platform required to
run Java programs. This package is intended for end-users. The Java Development Kit
(JDK), is intended for software developers and includes development tools such as the Java
compiler, Javadoc, Jar, and a debugger.
OpenJDK is another notable Java SE implementation that is licensed under the
GPL. The implementation started when Sun began releasing the Java source code under the
GPL. As of Java SE 7, OpenJDK is the official Java reference implementation.
The goal of Java is to make all implementations of Java compatible. Historically,
Sun's trademark license for usage of the Java brand insists that all implementations be
"compatible". This resulted in a legal dispute with Microsoft after Sun claimed that the
Microsoft implementation did not support RMI or JNI and had added platform-specific
features of their own. Sun sued in 1997, and in 2001 won a settlement of US$20 million, as
35
Biometric Attendance Register
well as a court order enforcing the terms of the license from Sun.[23] As a result,
Microsoft no longer ships Windows with Java.
Java uses an automatic garbage collector to manage memory in the object lifecycle.
The programmer determines when objects are created, and the Java runtime is responsible
for recovering the memory once objects are no longer in use. Once no references to an
object remain, the unreachable memory becomes eligible to be freed automatically by the
garbage collector. Something similar to a memory leak may still occur if a programmer's
code holds a reference to an object that is no longer needed, typically when objects that are
no longer needed are stored in containers that are still in use. If methods for a nonexistent
object are called, a "null pointer exception" is thrown.[28][29]
One of the ideas behind Java's automatic memory management model is that
programmers can be spared the burden of having to perform manual memory management.
In some languages, memory for the creation of objects is implicitly allocated on the stack,
or explicitly allocated and deallocated from the heap. In the latter case the responsibility of
managing memory resides with the programmer. If the program does not deallocate an
object, a memory leak occurs. If the program attempts to access or deallocate memory that
has already been deallocated, the result is undefined and difficult to predict, and the
program is likely to become unstable and/or crash. This can be partially remedied by the
use of smart pointers, but these add overhead and complexity. Note that garbage collection
does not prevent "logical" memory leaks, i.e. those where the memory is still referenced
but never used.
Garbage collection may happen at any time. Ideally, it will occur when a program is
idle. It is guaranteed to be triggered if there is insufficient free memory on the heap to
allocate a new object; this can cause a program to stall momentarily. Explicit memory
management is not possible in Java.
36
Biometric Attendance Register
Java does not support C/C++ style pointer arithmetic, where object addresses and
unsigned integers (usually long integers) can be used interchangeably. This allows the
garbage collector to relocate referenced objects and ensures type safety and security.
As in C++ and some other object-oriented languages, variables of Java's primitive
data types are not objects. Values of primitive types are either stored directly in fields (for
objects) or on the stack (for methods) rather than on the heap, as commonly true for objects
(but see Escape analysis). This was a conscious decision by Java's designers for
performance reasons. Because of this, Java was not considered to be a pure object-oriented
programming language. However, as of Java 5.0, autoboxing enables programmers to
proceed as if primitive types were instances of their wrapper class.
Java contains multiple types of garbage collectors. By default, HotSpot uses the
Concurrent Mark Sweep collector, also known as the CMS Garbage Collector. However,
there are also several other garbage collectors that can be used to manage the Heap. For
90% of applications in Java, the CMS Garbage Collector is good enough.
MS SQL SERVER
MS SQL Server is database management software, which is rich and powerful
application. It is a language that enables us to create and operate on relational databases,
which are sets of related information stored in tables. Because of its elegance and
independence from machine specifies, as well as its support by the industry leaders in
relational database technology, SQL become the standard language and will remain as it for
the foreseeable future. The SQL standard is recognized by ANSI and is currently accepted
by ISO. Even though most commercial database programs extend SQL beyond the ANSI
definition, we will follow the ANSI standard with an eye towards the most common
variations. SQL also makes it easy for the user's even beginners to work with the database.
We can create tables, edit data and use queries to find the data we want with very little
effort and time.
•Internet Integration.
37
Biometric Attendance Register
The SQL Server 2005 database engine includes integrated XML support. It also has the
scalability, availability, and security features required to operate as the data storage
component of the largest Web sites.
•Scalability and Availability.
The same database engine can be used across platforms ranging from laptop computers
running Microsoft Windows 98 through large, multiprocessor servers running Microsoft
Windows 2005 Data Center Edition. SQL Server 2005 Enterprise Edition supports features
such as federated servers, indexed views, and large memory support that allow it to scale to
the performance levels required by the largest Web sites.
•Enterprise-Level Database Features
The SQL Server 2005 relational database engine supports the features required to
support demanding data processing environments. The database engine protects data
integrity while minimizing the overhead of managing thousands of users concurrently
modifying the database.
•Ease of installation, deployment, and use
SQL Server 2005 includes a set of administrative and development tools that improve
upon the process of installing, deploying, managing, and using SQL Server across several
sites. SQL Server 2005 also supports a standards-based programming model integrated
with the Windows DNA, making the use of SQL Server databases and data warehouses a
seamless part of building powerful and scalable systems.
•Data warehousing
SQL Server 2005 includes tools for extracting and analyzing summary data for online
analytical processing. SQL Server also includes tools for visually designing databases and
analyzing data using English-based questions.
38
Biometric Attendance Register
5. SOFTWARE QUALITY
ASSURANCE
PLAN
39
Biometric Attendance Register
5.1PURPOSE
The purpose of this Software Quality Assurance (SQA) Plan is to establish the
goals, processes, and responsibilities required to implement effective quality assurance
functions for the BAR.
The BAR Software Quality Assurance Plan provides the framework necessary to
ensure a consistent approach to software quality assurance throughout the project life cycle.
It defines the approach that will be used by the SAM and Software Quality (SQ) personnel
to monitor and assess software development processes and products to provide objective
insight into the maturity and quality of the software. The systematic monitoring of BAR
products, processes, and services will be evaluated to ensure they meet requirements and
comply with existing systems, and BAR policies, standards, and procedures, as well as
applicable Institute of Electrical and Electronic Engineers (IEEE) standards.
The goal of the SQA paradigm is to verify that all software and documentation to be
delivered meet all technical requirements. The SQA procedure defined herein shall be used
to examine all deliverable software and documentation to determine compliance with
technical and performance requirements.
http://www.iptc.org/std/NewsCodes/0.0/documentation/SRS-doc-Guidelines_3.pdf
http://srs.ebi.ac.uk/srs/doc/srsuser.pdf
http://dict.mizoram.gov.in/download/books/SRS%20Document%20Guidelines.pdf
5.4 MANAGEMENT
This section describes the management organizational structure, its roles and
responsibilities, and the software quality tasks to be performed.
5.4.1 ORGANIZATION
Efforts for this project are supported by numerous entities, organizations and
personnel. This tool is developed as a project as part of partial fulfillment of requirements
for Masters in Computer Applications degree. It will be the sole responsibility of the
developer to review the product’s usability, efficiency, reliability, and accuracy. The
project guide will however conduct inspections and walkthrough on regular basis. His
suggestion will be used in places where quality decisions need to out –weigh development
schedule decisions.
5.4.2 ROLES
5.4.2.1 Project guide:
Dr B. Kannan
Associate Professor.
Department Of Computer Applications
CUSAT
5.4.2.2 Developers:
SUJITH P S
DINU RAJ S
VRINDA V S
5.5 DOCUMENTATION
The essential documentation will include:
41
Biometric Attendance Register
42
Biometric Attendance Register
Presentation III at the end of phase III includes component design, assessmentevaluation,
project evaluation, result from formal technical inspection and completedsoftware
demonstration.
5.8CONFIGURATION MANAGEMENT
The software developer reported the problems encountered throughout the duration
of the project to the Systemdeveloper. The systemdeveloper had reported and discussed the
problems with the major professor. The conflicts or problems were discovered by one of
the committee members during a presentation, the developer then corrected the errors.
SQA software tools include, but are not limited to, operating system utilities,
debugging aids, documentation aids, checklists and JAVA will be the language
used for coding the software.
Netbeans 6.9 is used as the IDE for developing the system.
This software will be tested under Windows/Linux.
5.9.2 TECHNIQUES
5.9.3 METHODOLOGIES
Methodologies are an integrated set of the above tools and techniques. The
methodologies should be well documented for accomplishing the task or
activity and provide a description of the process to be used.
43
Biometric Attendance Register
6. SYSTEM DESIGN
44
Biometric Attendance Register
6. SYSTEM DESIGN
System design is the second phase of the software life cycle. The system goes
through logical and physical state of development. The user oriented performance
specification is extended into a design specification while designing the needed system.
The design phase begins when the Requirement Specification document for the software to
be developed is available. When the Requirement Specification activity is entirely in the
problem domain, design is the first step to move from the problem domain to the solution
domain. Design is essentially the bridge between the requirements specification and the
final solution for satisfying these requirements.
The collection of input data is considered to be the most expensive part of the
system design. Since the inputs have to be planned in such a way so as to get the relevant
information, extreme care is taken to obtain the pertinent information. If the data going into
the system is incorrect then the processing and outputs will magnify these errors. The goal
of designing input data is to make data entry as easy, logical and free from errors as
possible.
To ensure validation.
Effort has been made to ensure that input data remains accurate fromthe stage at
which it is recorded and documented to the stage at which it is accepted by the computer.
Validation procedures are also present to detect errors in data input, which is beyond
45
Biometric Attendance Register
control procedures. Validation procedures are designed to check each record, data item or
field against certain criteria.
A DFD shows what kinds of information will be input to and output from the system,
where the data will come from and go to, and where the data will be stored. It does not
show information about the timing of processes, or information about whether processes
will operate in sequence or in parallel.
46
Biometric Attendance Register
BAMS
USER DATABASE
Level One
47
Biometric Attendance Register
48
Biometric Attendance Register
The output design is an ongoing activity almost from the beginning of the project,
efficient and well-defined output design improves the relation of the system and the user.
The primary considerations in the design of the output are the requirement of the
information and the objective of the end user. There are various types of outputs required
by most of the systems, but outputs of BAR are purely interactive outputs- which involve
the user in communicating with the computer.
A report
A document
49
Biometric Attendance Register
A message
6.3SYSTEM ARCHITECTURE
This system consists of three modules namely, Administrator, Faculty and Student
Of which I have done the following modules.
ADMINISTRATOR:
She/he is also a faculty.
She/he has the overall power on the system.
Manages the attendance list.
Marking the attendance of faculties.
Managing the attendances of faculties.
Defines a day as Working or Holiday.
Can add/remove faculty & students.
Export/Import of the attendance
FACULTY:
50
Biometric Attendance Register
STUDENT:
Id Int(2) Primary
Name Varchar(20)
Duration Int(1)
Id Varchar(15) Primary
51
Biometric Attendance Register
Morning Varchar(1)
Noon Varchar(1)
id Varchar(15) Primary
totAtted Int(2)
presentdays Int(2)
Id Varchar(3)
Month Int(2)
Primary
Day Int(2)
Morning Varchar(1)
Noon Varchar(1)
Id Varchar(15) Primary
Name Varchar(20)
Subject Varchar(20)
52
Biometric Attendance Register
Password Varchar(10)
Imagename Varchar(20)
Role Varchar(1)
Table Name:stmnthattendance
Id Varchar(3) Primary
TotAttend Int(2)
Presentdays Int(2)
Table Name:student
id Varchar(3) Primary
Name Varchar(20
53
Biometric Attendance Register
Course Varchar(10
)
Batch Varchar(10
)
Imagename Varchar(20
)
7. SYSTEM TESTING
54
Biometric Attendance Register
55
Biometric Attendance Register
Testing Strategies
The philosophy behind testing is to find errors. Test cases are devised with this
purpose in mind. Test case is a set of data that the system will process as normal input.
Characteristics of a Good Test:
Tests are likely to catch bugs
No redundancy
Not too simple or too complex
the control structure ensure that all statements in a module have been executed at least
once.
Here our objective is that to edit, compile and execute j2meprograms . Using
integration test plan prepared in the design phase ofthe system developments guide, the
integration test is carried out and all the errors found in the system are corrected for the
next testing steps.
7.2.3SYSTEM TESTING
When a system is developed, it is hoped that it performs properly. In practice
however some errors always occur. The main purpose of testing and information system is
to find the errors and correct them. A successful test is one which finds an error.
The scope of a system test should include both manual operations and
computerized. Operations system testing is a comprehensive evaluation of theprograms,
manual procedures, computer operations and controls. System testing is the process of
checking if the developed system is working according to the original objectives and
57
Biometric Attendance Register
58
Biometric Attendance Register
8. SYSTEM
IMPLEMENTATION
59
Biometric Attendance Register
8.1IMPLEMENTATION
System implementation is the conversion of new system into an operating
one which involves creating compatible files, training clients and installing hardware. User
training is crucial for minimizing resistance to change and giving chance to prove its worth.
Training aids user friendly manuals and healthy screens provide the user
with a good start. Software maintenance follows conversion to the extent that changes are
necessary to maintain satisfactory operations relative to changes in the user’s environment.
Maintenance often includes minor enhancements or corrections to the problem that surface
late in the systems operations.
60
Biometric Attendance Register
implementation phase, the system is built according to the specifications from the previous
phases. This includes writing code, performing code reviews, performing tests, selecting
components for integration, configuration, and integration.
Careful planning
The method of implementation and time scale to be adopted are found out initially.
8.2 MAINTANANCE
This phase occurs as a result of deploying the whole system at the end users
organization. They will perform the beta testing at the end users and inform to the
developers about any needed modification to the application .the customer records all the
problems that are encountered during the beta testing and rep[orts these to the developer at
regular intervals.
As result of problems reported during implementation, the software product to the entire
customer base
61
Biometric Attendance Register
9. CONCLUSION
62
Biometric Attendance Register
9. CONCLUSION
It can be concluded that a reliable, secure, fast and an efficient system has been
developed replacing a manual and unreliable system. This system can be implemented in
academic institutes for better results regarding the management of attendance. This system
will save time, reduce the amount of work the administration has to do and will replace the
stationery material with electronic apparatus. Hence a system with expected results has
been developed but there is still some room for improvement.
63
Biometric Attendance Register
10. FUTURE
ENHANCEMENTS
64
Biometric Attendance Register
FUTURE ENHANCEMENTS
In future System can be updated.
Input data can be read from external device such as Fingerprint scanner, Iris
Scanner,Face Camera.
65
Biometric Attendance Register
11. BIBLIOGRAPHY
66
Biometric Attendance Register
11BIBLIOGRAPHIES
[1] D. Maltoni, D. Maio, A. K. Jain, S. Prabhaker, “Handbook of Fingerprint Recognition”,
Springer, New York, 2003.
[2] A.C. Weaver, “Biometric authentication”, Computer, 39(2), pp 96-97 (2006).
[3] J. Ortega-Garcia, J. Bigun, D. Reynolds and J.Gonzalez-Rodriguez, “Authentication gets
personal with biometrics”, Signal Processing Magazine, IEEE, 21(2), pp 50-62 (2004).
[4] Anil K. Jain, Arun Ross and SalilPrabhakar,” An introduction to biometric recognition”,
Circuits and Systems for Video Technology, IEEE Transactions on Volume 14, Issue 1, Jan.
2004 Page(s):4 – 20.
[5] FakhreddineKarray, JamilAbouSaleh, Mo Nours Arab and MiladAlemzadeh,, “Multi Modal
Biometric Systems: A State of the Art Survey” , Pattern Analysis and Machine Intelligence
Laboratory, University of Waterloo, Waterloo, Canada.
[6] Abdulmotaleb El Saddik, Mauricio Orozco, YednekAsfaw, ShervinShirmohammadi and
Andy Adler “A Novel Biometric System for Identification and Verification of Haptic Users”,
Multimedia Communications Research Laboratory (MCRLab) School of Information
Technology and Engineering University of Ottawa, Ottawa, Canada.
http://www.java.sun.com/
http://www.wikipedia.org/
http://www.w3school.com/
67
Biometric Attendance Register
12.SCREEN SHOTS
68
Biometric Attendance Register
69
Biometric Attendance Register
70
Biometric Attendance Register
71
Biometric Attendance Register
72
Biometric Attendance Register
73
Biometric Attendance Register
74