Professional Documents
Culture Documents
CONTENTS
CHAPTER:1 Introduction
CHAPTER:2 Objectives
CHAPTER:3 Tools/Environment Used
CHAPTER:4 Analysis Document
CHAPTER:5 SRS
E-R diagrams
Data flow diagrams
CHAPTER:6 Program code
CHAPTER:7 Testing
CHAPTER:8 Input and Output Screens
CHAPTER:9 Implementation of Security for the Software developed
CHAPTER:10 Limitations of the Project
CHAPTER:11 Future Application of the Project
CHAPTER:13 Bibliography
NAME :
E.No :
INTRODUCTION
Attendance needs to be taken at various places including
colleges, school for students and in the industries for the
login
logout
Identification
time
(RFID)
of
employees.
based
Radio
attendance
Frequency
management
NAME :
E.No :
Description in detail:
It contains following blocks
1) RFID Reader: Full form of RFID is Radio Frequency
Identification. Wireless communication is used between RFID tags and
NAME :
E.No :
RFID Reader. Reader does not require line of sight communication with
tags. It means that Reader detects the RFID tag even if there is some
object between Card and Reader. Thus it is a non-contact type of reader.
The Radio frequency used in our reader is 125 kHz which is a Low
Frequency (LF). RFID reader interfacing with Microcontroller is done
using serial port. RFID reader will communicate with Microcontroller
using serial communication. When RFID tag comes in the range of
Reader module, then RFID reader detects RFID card. And at that time
RFID reader sends out a series of alphanumeric unique codes on the serial
port. So while adding the employees/student card number in the program
memory. First we need to store this series of alphanumeric code into
program memory and later on this unique series of codes will be
compared with the incoming card number. RFID card reader module
requires 9 volt power supply and output is given on DB9 connector port.
2) RFID cards: There are two main types of RFID cards, Passive and
Active. In this project we have used Passive RFID tags. As given in
introduction, we can use normal RFID cards which are of the size of
credit card. These are rectangular in shape and white in color and can be
attached with the ID-card. Or even we can use RFID tags which can be
attached with keychain
3) Microcontroller: It is the main component of the project. It is the
heart of the system. Microcontroller communicates with all input and
output devices. Various functions of Microcontroller are as follows:
1. Displaying clock on LCD
2. Reading input from RFID reader
3. Comparing it with the data / RFID card number stored in
Microcontroller memory
NAME :
E.No :
NAME :
E.No :
Once the project is switched on, it will display time clock on LCD. We
have provided 4 by 1 keypad for setting the time. User can press the
setting key and use the increment / decrement and enter button to set the
current time. Once the time is set then he/she can exit from the time
setting mode / time set routine. Then the LCD will display current time
set by user.
Then this project operates in normal mode. Whenever user comes near
RFID reader module and shows RFID tag then microcontroller will store
2 information or 2 types of data will in the microcontroller memory. First
is the card number and second is the time at which user has shown the
card. Same situation happens for logout. For logging out also student will
show the card. In this project single RFID card reader module will be
used for in and out operation. While in actual implementation in
industries or colleges, user can install 2 RFID reader modules. One will
be placed at the outer side and second at the inner side of the door.
When a student or employee has lost his/her card. Then in such situation
he/she has to report this incident to the administration person. Then
admin person can remove the card number from microcontroller memory.
Also when any employee / student leave the office and they forget to
return the card then at time also authority person will remove the card
information from microcontroller memory. So in case of lost card or
person left the company without returning the card and if these cards are
shown to RFID reader then buzzer will be turned on.
Lets take an example that any outside/unauthorized person get a RFID
card. And these cards does not have entry in our system. Or if existing
employee manages to get a RFID card, and if he/she shows card, then
microcontroller will check and find that this card is not stored in the
NAME :
E.No :
Applications:
1) This project can be used in various software companies, production
industries and many other industries to take the attendance of employees.
Presently many of these companies have attendance register or muster
which is a traditional and old way of maintaining attendance. We can
replace it with automated system for taking the attendance of employees.
2) It can be used in colleges, various educational institutes as well as
university campus for taking the attendance of students. Education
institutes have roll-call muster or teachers take attendance and note it
down manually on paper. We can replace it by our automated attendance
system using RFID.
3) It can be used in shops, shopping malls for the attendance of
employees and workers.
4) We can also use it to note down the in and out time of vehicles. With
little bit modification, this project can be used in vehicle/car parking
systems. If parking charges are charged on hourly basis, we can use this
project to note the exact in and out time of car to find out the total and
exact parking charges of that particular vehicle.
Advantages:
1) This system is fully automated and it does not require any human
interaction except setting the initial time setting.
2) LCD and PC interface both are provided with RFID based attendance
system. This gives benefit of viewing attendance on the spot on LCD or
remotely from computer.
NAME :
E.No :
Enhancement:
Automation:
of
the
manual
system
and
increases
its
Accuracy:
10
User-Friendly:
The software Online Attandance System has a very userfriendly interface. Thus the users will feel very easy to
work on it. The software provides accuracy along with a
pleasant interface.Make the present manual system more
interactive, speedy and user friendly.
Availability:
Maintance Cost:
NAME :
E.No :
11
NAME :
E.No :
12
CHAPTER-3
Tools/Environment
Used
NAME :
E.No :
13
PROJECT CATEGORY
Eclipse and ADT provide an environment where most of the details of the
build process are hidden from you. By default, the build process
constantly runs in the background as you make changes to your project.
When Eclipse automatically builds your application, it enables debugging
and signs the .apk with a debug key, by default. When you run the
application, Eclipse invokes ADB and installs your application to a
device or emulator, so you do not have to manually perform these tasks.
Since most of the build process is taken care of by Eclipse, the following
topics show you how to run an application, which will automatically
build your application as well.
To distribute your application, however, you must build your application
in release mode and sign the .apk file with your own private key.
This document shows you how to run your application on an emulator or
a real device from Eclipseall of which is done using the debug version
of your application. For more information about how to sign your
application with a private key for release, see Signing Your Applications
NAME :
E.No :
14
Before you can run your application on the Android Emulator, you must
create an AVD.
To run (or debug) your application, select Run > Run (or Run > Debug)
from the Eclipse menu bar. The ADT plugin will automatically create a
default run configuration for the project. Eclipse will then perform the
following:
1. Compile the project (if there have been changes since the last
build).
2. Create a default run configuration (if one does not already exist for
the project).
3. Install and start the application on an emulator (or device), based
on the Deployment Target defined by the run configuration.
By default, Android run configurations use an "automatic target"
mode for selecting a device target. For information on how
automatic target mode selects a deployment target, see Automatic
and manual target modes below.
If you run the application with the Debug option, the application will start
in the "Waiting For Debugger" mode. Once the debugger is attached,
Eclipse opens the Debug perspective and starts the application's main
activity. Otherwise, if you run the application with the normal Run
option, Eclipse installs the application on the device and launches the
main activity.
NAME :
E.No :
15
To set or change the run configuration used for your project, use the run
configuration manager. See the section below about Creating a Run
Configuration for more information.
Be certain to create multiple AVDs upon which to test your application.
You should have one AVD for each platform and screen type with which
your application is compatible. For instance, if your application compiles
against the Android 4.0 (API Level 14) platform, you should create an
AVD for each platform equal to and greater than 4.0 and an AVD for each
screen type you support, then test your application on each one.
Running on a device
Before you can run your application on a device, you must perform some
basic setup for your device:
NAME :
E.No :
16
The run configuration specifies the project to run, the Activity to start, the
emulator or connected device to use, and so on. When you first run a
project as an Android Application, ADT will automatically create a run
configuration. The default run configuration will launch the default
project Activity and use automatic target mode for device selection (with
no preferred AVD). If the default settings don't suit your project, you can
customize the run configuration or even create a new one.
To create or modify a run configuration, refer to the Eclipse
documentation on how to create Run configurations. The following steps
highlight the important things you need to do for an Android project:
1. Open the run configuration manager from the Run Menu.
2. Expand the Android Application item and create a new
configuration or open an existing one.
NAME :
E.No :
17
18
If there is an AVD that matches the build target of the project, ADT
chooses that AVD. If the AVD versions are newer than the build
target of the project, ADT chooses the oldest possible version of an
AVD that meets the project's build target requirement.
4. If there are no suitable AVDs, the application is not installed a
console error warning tells you that there is no existing AVD that
meets the build target requirements.
However, if a "preferred AVD" is selected in the run configuration, then
the application will always be deployed to that AVD. If it's not already
running, then a new emulator will be launched.
If your run configuration uses manual mode, then the "device chooser" is
presented every time that your application is run, so that you can select
which AVD to use.
NAME :
E.No :
19
: 32 BIT, Pentium IV
RAM
: 1 GB
HARD DISK
: 40 GB
MONITOR
CLOCK SPEED
: 266 MHz
SOFTWARE SPECIFICATION
OPERATING SYSTEM
: Windows 2000/XP.
FRONT END
: J2ME , Android
BACK END
: Sql Light
NAME :
E.No :
20
CHAPTER-4
Analysis Document
NAME :
E.No :
21
SYSTEM ANALYSIS
PRELIMINARY INVESTIGATION
Things are expected to get even more critical since the companys
growing numbers of clients and related requirements have been
projected to demand a massive number of employees in the coming
future from the past and the todays date. Such events and
projections have forced a strong need for modification in the current
way of handling activities. it is better to implement the latest of it
rather than to go through the pain of updating the system over and
over again.
developers.
dependent schedules.
FEASIBILITY STUDY
Depending on the results of the initial investigation, the
survey is expanded to a more detailed feasibility study. Feasibility
study is a test of system proposal according to its workability,
impact on the organization, ability to meet user needs, and effective
NAME :
E.No :
22
study is not
of
problem
definition
is
crystallized
and
determined.
Consequently,
greater accuracy
and
benefits
are
described
with
Statement of
of
costs
worded
statement
TECHNICAL FEASIBILITY
This
involves
financial
considerations
to
accommodate
ECONOMICAL FEASIBILITY
With the help of banking application it will lead to decrease in
cost of opening and maintaining offices which will be more than the
cost of developing and maintaining the Application.
OPERATIONAL FEASIBILITY
NAME :
E.No :
23
IDENTIFICATION OF NEED
To identify
the
need
for
Requirement Engineering.
software
we
use
the
Principles
of
need,
assessing
specifying
the
feasibility, negotiating
reasonable
Requirement elicitation.
Requirement specification.
System Modeling.
Requirement validation.
Requirement Management.
NAME :
E.No :
24
task
requirement
that
bridges
engineering
and
the
gap
between
software
design.
system
level
Requirement
Requirement analysis
most
commonly
used
requirement
elicitation
25
focuses on the customer, the overall goals, and the benefits. For
example, the analyst might ask:
NAME :
E.No :
26
Preliminary Investigation
The first step in the system development life cycle is the preliminary
investigation to determine the feasibility of the System. The purpose
of the preliminary investigation is to evaluate project requests. It is
neither a design study nor does it includes the collection of details
top describe the business system in all respect. Rather, it is collecting
of information that helps committee members to evaluate the merits
of the project request and make an informed judgment about the
feasibility of the proposed project.
Here for the Android Based Smart Attendance Management
System, I have worked on the preliminary investigation that
accomplished the following objectives:
NAME :
E.No :
27
Determine
the
technical
and
operational
feasibility
of
alternative approaches.
Report the findings to management with recommendation
outlining the acceptances or rejection of the proposal.
Considering above criteria I also keep in mind that the requirements
are clearly understandable when the clarification of project request is
enquired. The data of the IT Companies which are collected by me
during preliminary investigation, are: -
Conducting interviews.
Feasibility Study
Not
everything
imaginable
is
feasible,
not
even
in
software,
Feasibility is the
Technical feasibility.
2.
Operational feasibility.
3.
Economic feasibility.
NAME :
E.No :
28
feasible, and then analyst can go ahead and prepare the project
specification,
which
finalizes
project
requirements.
Generally,
The
Thus,
since the
feasibility
This
contains
and
identification
description,
an
NAME :
E.No :
29
My
analysis
is
the
most
frequently
used
technique
for
30
It is User-Friendly.
2.
3.
Efficient tractability.
4.
Project Planning
The planning, design, and installation of a system termed a project
and is directed by a project leader who uses the available resources
to produce a new or better system for the organisations.
Thus, project planning for any company has the following four
main steps:
1. Organising the resources available for the project.
2. Scheduling the events of the project.
3. Evaluating the progress.
4. Establishing standards for the project.
An effective manager is essential for successful project planning.
The techniques of project planning are not a substitute for good
management, but merely a tool to be used by managers to achieve
better results. Only effective management can complete the project
on time, within budget, and with satisfactory results.
Project Scheduling
NAME :
E.No :
31
requirements,
budget
and
duration,
linked
by
32
NAME :
E.No :
33
Gantt charts are useful tools for planning and scheduling projects.
Gantt charts allow you to assess how long a project should
take.
Gantt charts lay out the order in which tasks need to be
carried out.
Gantt charts help manage the dependencies between tasks.
Gantt charts determine the resources needed.
Gantt charts are useful tools when a project is under way.
Gantt charts monitor progress. You can immediately see what
should have been achieved at a point in time.
Gantt charts allow you to see how remedial action may bring
the project back on course.
NAME :
E.No :
34
Apr
1st
&2
TASKS
Problem
Analysis
NAME :
E.No :
nd
Apr3
rd &
4th
Week
May
1st
&
2n
d
Wee
k
Jun
3rd
Jul
y
1st
Wee
k
Wee
k
Day
1-12
12
Days
35
Jul
y
2n
d&
Aug
t
3rd
Wee
k
Aug
4rd
&
Sep
t
1st
Wee
k
Sep
t
1st
&
Sep
t
3rd
Wee
k
Sep
t
3rd
&
4th
Wee
k
Sep
t
4th
Wee
k
Analysis of
Existing
Systems
like the
proposed
on
Selection
& Learning
the S/W
To be used
Understand
ing
Database
Day
13-22
10
Days
Day
s
2332
10
Day
s
Day
s
3347
15
Day
s
Day
s
4862
Coding
15
day
s
Day
s
6372
10
day
s
Page
Designing
NAME :
E.No :
36
Day
s
7382
10
Day
s
Testing
Day
s8392
10
Day
s
Evaluation
Day
s
9398
6
Day
s
Implemeta
tion
NAME :
E.No :
37
NAME :
E.No :
38
stands
for
Software
Requirement
Specification.
It
39
External
Interfaces
of
the
system:
They
identify
the
40
function,
behavior,
performance,
and
interface.
Requirements for both the system and the software are documented
and reviewed with the customer.
DESIGN
Software design is actually a multi step process that focuses on four
distinct attributes of a program data structure, software architecture,
NAME :
E.No :
41
The
manner,
code
generation
can
be
accomplished
mechanistically.
Testing: Once code has been generated, program testing begins. The testing
process focuses on the logical internals of the software, ensuring that
all statements have been tested and on the functional externals, that
is, conducting tests to uncover errors and ensure that defined input
will product actual results that agree with required results.
Waterfall Model
It is the simplest, oldest and most widely used process model. In
this model, each phase of the life cycle is completed before the start
of a new phase. It is actually the first engineering approach of
software development.
NAME :
E.No :
42
The
water
fall
model
can
accommodate
the
new
NAME :
E.No :
43
NAME :
E.No :
44
such
as
hardware,
people
and
database.
System
NAME :
E.No :
45
3.
In
either case, before any further steps can be taken, the project
requests must be clearly states.
This phase (initial study) involves estimating whether or not a
development project is worthwhile.
46
ANALYSIS
DATA FLOW DIAGRAM
The Data flow diagram can be explained as the separate levels indicating the
individual complexity in the each level of the system and gives a detailed explanation
in the further levels that are following them.
LEVEL 0
Initially in the first level of the Data flow the level 0 explains the basic outline
of the system. The end-user sends the packets to the system to determine the source
NAME :
E.No :
47
and destination address. The diagram marked as the 0 represents the complete Packet
watching system which simply represents the basic operation that is being performed
by it in the initial level.
LEVEL 1
The level 1 of the Data flow diagram given explains in detail about the Packet
watching system which was marked as 0 in the previous level. In this level the enduser who passes the request for the system enters into the first process, the capturing
process and then to the processing module. After processing the packets it was send
for storing.
LEVEL 2
The level 2 provides the clear explanation about the whole system. In this
level first we have to select the packet and perform test over that selected packets.
Then identify the end address of the packet and send that packet for processing. After
processing the packet it was send to the identity content. Then send the processed
packet for storing and display the source and destination addresses.
S
Enters or update users data
Android
Based Smart
Attendance
Management
48
System
NAME :
E.No :
Administrate the
Administrator
entire process
Enters orTeacher
update teacher data
Administrator
1.0
Admin
Module
Admin login
Student details
2.0
Student
Module
Student
Generate reports
3.0
Reports
Module
Student List
Teacher List
Attandance
NAME :
E.No :
49
1.0
Student
Module
Student
Student
login
2.0
Attandance details
Attandanc
e Module
Attandance
Generate reports
3.0
Reports
Module
Notification
Attandance
OTP
NAME :
E.No :
50
Teacher
1.0
Teacher
Module
Teacher
login
1.1
Data Entry
of
Attandanc
e
Attandance
1.2
Update
Attandanc
e
1.3
Add
Notifica
tion
1.4
Student
Details
NAME :
E.No :
51
Student
ER- Diagram
dob
pwd
Discription
Add
Type
id
Subject
NAME
Name
Date
Date
ID
Student A/c
Teacher
Notification
Has
Mess_id
message
Vie
w
UPlo
ad
message
Admin
s
e
n
d
Id
L
og
in
Student_login
name
Discription
View
site
Attandance
lo
gi
n
Attandance
admin
NAME :
E.No :
52
CHEPTER-5
CODING
NAME :
E.No :
53
Code here.
NAME :
E.No :
54
CHEPTER-7
TESTING
NAME :
E.No :
55
TESTING
The testing of software means measuring or accessing the software
to determine the quality. Testing is a measuring instrument for
software quality with the unit of measurement being the number of
defects found during testing.
Testing activities also help to achieve software quality.
Testing is essential in the development of any system software.
Testing is essential in the development of any software system.
Testing is in order to access what the system actually does and how
well expected to spend approximately40% of development cost and
time in testing in order to achieve reasonable quality levels.
Levels of Testing
Unit Testing
Component Integration Testing
System Testing
Acceptance Testing
Unit Testing
Unit testing comprises the set of tests performed usually by
the programmers prior to the integration of the unit in to a large
Program. This is the lowest level of testing and is done by the
programmer (Who develops it) who can test it in great detail. The
NAME :
E.No :
56
to
the
training
section.
Acceptance
testing
mark
the
NAME :
E.No :
57
58
NAME :
E.No :
59
TESTING OBJECTIVES
Functional simplicity
Debugging
Debugging occurs as a consequence of successful testing. Debugging
refers to the process of identifying the cause for defective behavior
of a system and addressive that problem. In less complex termsfixing a bug. When a test case uncovers an
Error, debugging is the process that results in the removal of the
error. The
are two
Characteristics of bugs
NAME :
E.No :
60
may
be
conditions(e.g,
difficult
a
to
accurately
real-time
application
reproduce
in
which
input
input
ordering is indeterminate).
7. The symptom may be intermittent. This is particularly
common in embedded systems that couple hardware and
software inextricably.
8. The symptoms may be due to causes that are distributed
across a number of tasks running on different processors.
NAME :
E.No :
61
Validation Checks
There are six types of validations:
1) Intrinsic control: In this control text Box, label, drop down list
are use for simple input and output.
2) Rich control: Rich control have a two control `Add Repeater`
and Calendar Control.
3) Transfer Control: This control used to redirect pages to next
page like, Buttton, Hyperlink, linkButtons.
4) Validation control: There are six control:
values
with
help
of
controlToValidate
CompareToValidate.
The Type are taken in compare Validator are following:a) String
b) Integer
c) Double
d) Date
e) Currency
Operator is used to specify a type are following:a) Equal
NAME :
E.No :
62
and
b) No Equal
c) Greater Than
d) Greater than equal
e) Less than
f) Less than equal
a) Min
b) Max
to
which
the
value
must
specified
in
NAME :
E.No :
63
CODE EFFICIENCY
MEASURES OF CODE EFFICIENCY
The code is designed with the following characteristics in mind.
1. Uniqueness:
as
requirement.
NAME :
E.No :
it
is
incompatible
64
with
the
uniqueness
in
conditions,
characteristics
and
data
must
be
sorted
and
collaged,
the
NAME :
E.No :
65
OPTIMIZATION OF CODE
A good program is not the one that solves the intended
problem alone but the one that does it efficiently. An ideal compiler
should produce target code that is as good as can be written by
hand crafted meticulously to run on the target machine in the most
efficient manner both in terms of time of execution and memory
requirements. The reality however is that this goal is achieved only
in limited, cases and that too with difficulty. Nonetheless, the code
produced by straight forward compiling algorithms can often be
made more space and time efficient. This is accomplished by
applying
transformations
on
the
produced
code.
These
optimization
may
be
machine
dependent
or
machine
NAME :
E.No :
67
CHEPTER-8
Input and Output Screens
NAME :
E.No :
68
NAME :
E.No :
69
CHEPTER-9
Implementation of Security
for the Software developed
user
can
not
access
the
facility
Associates User.
(2) User related checks and validations:
For
this
NAME :
E.No :
70
of
Provision
of
efficient
data
backup
system :
In this
(2)
data Storage.
(3)
User Level:
User are does not change Health, Transport Information. Its only
View Information and its allowed after fill own profile and then
insert username and password. User is sending Matrimonial
information view any other user by allow administrator.
Administrator Level:
Administrator is able to change Health, Transport Information.
Administrator is allowing matrimonial information any Change. And
also allow user view bride picture and groom picture information.
NAME :
E.No :
71
CHAPTER-9
Future Application
of the Project
NAME :
E.No :
72
NAME :
E.No :
73
CHAPTER-11
Bibliography
NAME :
E.No :
74
Complete
Reference
by
Patrick
NAME :
E.No :
75