Attendance Management Through Touch Screen
________________________________________________________________________
OBJECTIVE & SCOPE OF PROJECT
The main objective of this project is that to minimize the handwritten work to small as possible and provide user an automated environment in which he/she can work efficiently and also in user friendly environment.
The scope of the project generally lies at the places like schools , colleges & universities where faculties attendance maintenance are major requirement because on basis of this the salary of person can be calculated, this project is on very small basis means to say not on big scale we can implement it on bigger scale in form of maintaining student attendance ,apart from this the same concept can be applied in various business firms (public and private) which are fully automated with computer and the company has to maintain the regularity of employers also at these places it is not possible to maintain large records files which require a separate room for storage so to avoid this we made this software in which database are maintained which cover very less space then the space taken by files etc.
THEORETICAL BACKGROUND
Why VB (Visual Basic)?
Visual basic is one of the most popular programming languages in the market today. Microsoft has positioned it to fit multiple purposes in development. The language ranges from light weight vb script programming, to application specific programming with vb for applications
What is Visual Basic?
The visual part refers to the method used to create GUI.Rather then writing numerous lines of code to describe the appearance and location of interface elements , we simplify add rebuilt objects into place on screens.
VB is high level programming language evolved from earlier DOS version called BASIC. VB is event driven programming VB programs are made up of many sub programs , each has its in own program codes and each can be executed independently and at the sane time each can be linked in one way or another.
VB is designed to deploy applications across the enterprise and to scale of any size needed the ability to develop object mode is databases integration, server components, and Internet/Intranet applications provides an extensive range of capabilities and tools of the developer. In particular VB lets us to add menus, textboxes, command buttons, option buttons, check boxes, scroll bars, and file & directory boxes to blank windows. We can communicate with other window applications and perhaps most importantly we will have an easy method to let users’ control and access database.
Advantages of Visual Basic-:
DATABASE
Introduction about Ms-Access:
Access has become the best selling database management program because of its combination of power and ease of use. Access is powerful enough that developers can use it to create entire applications that require little or no programming. It also contains an entire programming language, VISUAL BASIC for application which can be used to develop richer and more advance application. Access is easy enough to use that in short time beginner can learn to manage their own data.
It is easy for one to get started with access by taking a quick look at its environment and how it is organized.
Access Utilities:
The Access database and its objects:-
In other database management programs, the term database is sometimes used to refer only to the tables that hold data; an access database consists of tables that hold the data and all the related objects such as queries, forms and reports, which are used to manage the data in the table. Administration and user log on.
DATABASE DESIGN
Tables used:-
Faculty Table
Faculty ID | Name | Password | Photo | Department |
IT0201 | Mr Prakash Ramani | 1234 | C:\majorproject \image\prakash.wmf | Information Technology |
IT0202 | Mr Deepankar Goyal | 1111 | C:\majorproject \image\deep..wmf | Information Technology |
DEFINITION OF PROBLEM
The advent of ubiquitous and pervasive computing facilitated by Internet has opened up a plethora of applications. It is now possible to see and communicate with people around the globe. Nevertheless, there is still much more to be done to knit the social fabric. Despite of its popularity and immense potential the Internet has not yet been fully exploited to satisfy all computer literate and ignorant people.
The Touch Screen Attendance Management form to interact. The basic idea of this project comes from the fact that in colleges and universities the faculty attendances are major requirement because this help in calculating salary, their regularity and also time for which they remain in institute all these attendances are maintained in files and are stored in storage area , if someone want to know some information about particular person then difficulty for searching comes but due to this project the faculty just have to touch the screen and to enter the personnel code (which is different for every person) as well as password and attendance will be automatically made, this also ensures security because password is different for every person. As the database is maintained for each faculty then information can be retrieved anytime as required or situation demands.
It caters an interface that does not requires key-board or Mouse as the primary input devices but all it ask for is a monitor and user can access it through ones fingers i.e. a Touch Screen.
SYTEM ANALYSIS & DESIGN vis-à-vis
USER REQUIREMENTS
SYSTEM ANALYSIS
System
“A system is an orderly grouping of interdependent components linked together according to a plan to achieve a specific objective”.
The component may be either any physical part of the system or it may be any subsystem in multilevel structure.
So it can be said, that a system is composed of subsystems which may themselves be made up of other sub system. These subsystems are interconnected with each other in some ways. The interconnections between sub systems are known as ‘interface’. Additionally, a system and all subsystems must have their own boundaries.
The system concept requires the system analyst to look at the system as a whole, but the complete system is so large to be analyzed in details, so it is factored or partitioned in to subsystems.
For example-
System
Subsystem B
Subsystem A
A1
A2
A3
B1
B2
B3
B4
Fig- System & Sub System
Analysis
“Analysis is a detailed study of the various operation performed by a system and their relationship within and outside of the system.”
So the main objective of this phase is to come with the precise structure functional specification of the user requirement. There are also major sub objectives, as given below:
An analyst must have some characteristics:
SYSTEM DESIGN
System design is one of the most creative and challenging phase of the system development life cycle (SWDLC).System design is used to understand the existing system and to know the requirement for the new system.
System design is the determination of the processes and data that are required by a new system.
The design describes a final system and the process by which it is developed. It includes the technical implementation in the system.
Output Design
Input Design
File and Processing Design
Detailed Design
Documentation
Management
Approval
Design
Accepted
Test Program
Rejection
Cost, Risk
Factors Evaluation
NO
From Analysis
Go To Implementation and Testing
Fig- Step to System Design
USER REQUIREMENT
User requirement refer to the high abstract requirement these are the statement in a natural language plus diagram, of what services the system is expected to provide and the constrained under which it must operate. So user requirement definition is stated so the software must provide a means of representing and accessing external files created by other tools.
Characteristics of Requirements:
SYSTEM PLANNING
SYSTEM PLANNING
The system level programming is basically the information system, which exchange the information with each other. Planning of an information system in business has become increasingly important during the past decade. First information is now recognize as a vital source and must be manage. Secondly, more and more financial resources are committed to information system. Third, there is a growing need for formal planning with information system that are complex, require much time like –month or year to build, use common database.
The project plan should have following-
SYSTEM IMPLEMENTATION & DETAILS OF H/W & S/W USED
SYSTEM IMPLEMENTATION
It is defined by:-
“Implementation is the acquisition and integration of the physical and conceptual that produces a working system”
It is concerned with those tasks leading immediately to a fully operational system. It involves programmers, users and operational management but its planning of timing is a prime function of system analysis.
DETAILS OF S/W & H/W USED
The Touch Screen Attendance Management is a combination of hardware and software with Computer Interfacing. It consists of three parts naming
All these components incorporate to bring out a device which used in a variety of applications, including colleges, universities various offices.
Sensor Screen
A Touch Screen is an input device that allows users to operate a PC by simply touching the display screen. Touch input is suitable for a wide variety of computing applications. A Touch Screen can be used with most PC systems as easily as other input devices such as track balls or touch pads. It can emulate basic mouse functions. The touch screen can emulate left-clicks, double-clicking, and dragging.
Now the question is how the screen senses our touch? It can be done in many ways like
1. Using Pressure Sensors
2. Using Capacitive Screen
3. Using Laser Mesh
Here we are using a laser mesh to sense the touch. The sensor screen has a mesh of Laser Beams and sensors made up of LDR Light Dependent Resistors. Whenever any mesh is broken on touching the screen i.e. the Line of Sight between laser and LDR is obstructed the sensor sends a signal to the control box.
Requirements for Sensor Screen:
1. Laser Torches Wavelength 630-680 nm 6
2. Light Dependent Resistors LDRS 6
3. Acrylic Sheet 80 inches
4. Strip Wire 50 cm
5. Glass Sheet 80 Inches
To make the touch Screen Laser Mesh is used. It is designed for sixteen buttons only. Ten Laser Torches of Wavelength 630-680 nm are used as the laser sources. Eight Torches are aligned at the top of the screen at a fair distance considering the fact that our finger is larger than a mouse pointer. The buttons are designed large enough and spaced apart enough for a finger to touch easily and accordingly the torches are spaced too.
Two laser is attached at the lower left corner of the screen to complete the mesh and it also Localize the exact position of the buttons on the screen i.e. the positions or the areas where the user has to touch the screen in order to get a response is fixed.
Similarly the laser sensors (LDR) are aligned such that they in a direct line of sight to their respective laser beam. LDR is Light Dependent Resistors whose resistance varies according to the intensity of light. Whenever the line of sight between the laser source and the LDR is broken the intensity of light falling on the LDR reduces which increases its resistance and hence the signal is received by the Laser Receptor Circuit inside the Controller Box.
The Screen is made such that it can be easily attached with the monitor. It is designed to be situated with a 17’’ monitor. The size of the screen is
It has a body made up of Acrylic sheet. To support the structure and provide stability as the Acrylic is very flexible, a Glass sheet of similar dimensions is used. The glass sheet also shields the original monitor screen to be touched. The outer boundary has two layers which hold the laser torches and the LDR. The middle part of it is open and bounds the space to be used by the user.
The laser touches has to keep on continuously during the working hours and so the batteries are unfit for this job hence we have to provide a continuous supply of +5 Volts to the Torches. For this intention we designed a Laser Driver Circuit which gets its power from a Power Supply Circuit. The Laser Driver Circuit is intended to supply uninterrupted supply of power to the Laser as the torches are very sensitive as far as fluctuation is concerned.
The Laser Driver Circuit
This circuit receives its power from the power Supply Circuit which is inside the Controller Box. Besides this there is one more circuit called Laser Receptor Circuit which act as the bridge between Computer and Controller Box. Whenever there is a signal from the LDR, this circuit receives it and sends it to the LPT port of the computer. This circuit requires two power supplies of +5 Volts and +12 Volts. The +5 Volt supply is used to lead up the LED, Light Emitting Diode which emits light on receiving a certain amount of voltage (+5V).
When Laser light is switched on and the beam is falling directly over the LDR then these LED are lightened and whenever the line of sight is broken the LED is unenlightened. Hence it works as an indicator also. The circuit is so designed that whenever the LED is switched off the signal is generated. This signal is send to the LPT Port via the collector of the Transistor after amplification.
The Laser Receptor Circuit
When Laser light is switched on and the beam is falling directly over the LDR then these LED are lightened and whenever the line of sight is broken the LED is unenlightened. Hence it works as an indicator also. The circuit is so designed that whenever the LED is switched off the signal is generated. This signal is send to the LPT Port via the collector of the Transistor after amplification
Controller Box
The control box on receiving the signal sends it to the LPT port of the computer where the software can figure the LPT pin code and take the appropriate action. The box not only does it but also controls the Laser Torches and consists of three basic circuits.
Requirements for Control Box:
1. GPCB (General Purpose Circuit Board) 3
2. Jumper Wire 5M
3. Soldering Iron 1
4. Soldering Wire 5M
5. IC 7805, 7812 1, 1
6. Acrylic Sheet 60Inches
7. 12-0-12 Transformer 1.5 Amp 1
8. Intel Fan with Heat Sink 1
9. Choke 1
10. Preset 15
11. Condensers
0.01µf 6
2200µf 2
470µf 2
12. Resistors
1 KΩ 12
100KΩ 5
150 Ω 2
330Ω 7
13. Diodes
Diode 4007 11
Diode 4142 6
14. Light Emitting Diode 8
15. NPN Transistor 558 12
16. 25 Pin D-type Female LPT port 1
17. 25 Pin D-type Male to Male Cable 1
18. Nut Bolt Accessories 1
The power supply circuit provides power to the rest of the two circuits. The laser Receptor circuit receives signals from the sensor screen via LDR and sends it to the LPT port where it is detected by the software. The laser driver circuit provides power to the lasers at the sensor screen.The controller box basically consists of the three circuits and a 25-pin D-type Female connector. These circuits are building using PCBs.
Printed Circuit Board
The universal printed circuit board is used for the power supply circuit and to mount the parts included an LCD in the front panel. The main circuit in it is the Power Supply which has a bridge wave rectifier that coverts A.C Supply into DC supply. The circuit looks like as shown below.
The Power Supply Circuit
Full wave rectifier circuit with a diode bridge is used for the rectifier circuit which changes AC into DC. Even if the alternating voltage of the input changes into the positive and the negative, the voltage which is applied to load is always positive by a diode bridge. The voltage which is applied to load is not clean DC. It is called Ripple voltage. In this circuit, in order to make ripple voltage small, the capacitor is connected to load in parallel. Even if the voltage which comes out from a diode bridge becomes small, the DC voltage applied to the load is stabilized by discharge the electricity stored in the capacitor.AC100V is dropped on AC24V with a transformer. In case of the alternating current, voltage is shown in RMS (Root Mean Squared value). If it changes into direct current voltage, it will become about DC30V.
Following the rectifier circuit is the Pi Filter Circuit.
Filters
The output voltage from a rectifier though unidirectional is pulsating. The output voltage has a DC component, which is nothing but its average value in addition AC component. AC component are responsible for pulsation of the output voltage. These are minimized by means of filter circuits.
Pi-filter is basically used to filter the traces of ac which still remained after passing through bridge rectifier. It consists of two capacitors in parallel circuit and choke coil. This capacitor store the extra energy when wave going upward and deliver it while wave going downward. This makes equal distribution of energy and traces of ac were removed. Choke is used to convert 1 ampere to 250 milli-amperes which is our requirement.
Filter choke:
They are usually laminated iron core inductors. These are used for smoothing pulsating current output from a rectifier.
Voltage Regulators(IC-7812, IC-7805)
It is very easy to get stabilized voltage for ICs by using a three terminal voltage regulator. The three terminal voltage regulator outputs stabilized voltage at a lower level than the higher input voltage. A voltage regulator cannot put out higher voltage than the input voltage. They are similar in appearance to a transistor. The 7800 series consists of three-terminal positive voltage regulators.
These ICs are designed as fixed voltage regulators and with adequate heat sinking can deliver output currents in excess of 1A. These ICs are used to provide +5 volts and +12 volts supply. Line regulation in these ICs is change in the output voltage for a change in the input voltage. Load regulation is defined as the change in output voltage for a change in load current. If there is any high voltage than 12 volt to 7812 it will convert to 12 V by this IC. If there is any voltage less than 12 volt it allows passing it. FAN is used for cooling the ICs.
There are two ICs 7805 and 7812 attached with the Intel-fan heat sink. From the base of 7805 IC we get the +5Volt Supply and from the base of 7812 IC we get the 12 Volt supply. Two LED are also connected with the respective ICs in order to indicate there proper working.
Block Diagram OF Controller Box
Variable resistance is resistance through which we can varies resistance accordingly to the two points i.e. either maximum or negligible, but this value depends on the connection of the variable resistance. If +ve supply connects to terminal A and -ve connects to terminal B then at A, the value of resistance is negligible, and at B, value of resistance is maximum. Between these two points we can vary the value of resistance accordingly .This is made up of carbon particles on mica sheet where circular metallic thin strip placed which can easily move on mica sheet thought circular area. At ends of this sheet is two metal strips are connected these points are inputs of lower frequencies.
Preset resistors are used in circuits when it is necessary to alter the resistance. Dark/light and temperature sensors usually have these components as the preset resistor allows the circuit to be made more or less sensitive (they can be turned up or down - reducing or increasing resistance).
A small screwdriver can be used to turn the centre part of the preset resistor, altering the value of the resistance.
The range of resistance varies, for example:
0 to 100 ohms
0 to 1M ohms
Working
The preset resistor is used to vary the potential. It has been used in this circuit so that photodiodes do not sense the daylight (they remain sensitive to only the laser light). A photodiode works in reverse bias. When no light falls on photodiode then it works as a normal diode. It conducts negative charge to the transistor. The transistor then becomes reverse biased. When light falls on it, it conducts positive charge to the transistor. The transistor now becomes forward biased. When the two npn transistors are connected in series then it forms a Darlington Amplifier. The amplification provided is 1:10:100.
Laser Torches
Laser means Light Amplification by Simulated Emission of Radiation. Electrons exist at specific energy levels or states characteristic of that particular atom or molecule. The energy levels can be imagined as rings or orbits around a nucleus. Electrons in outer rings are at higher energy levels than those in inner rings. Electrons can be bumped up to higher energy levels by the injection of energy-for example, by a flash of light. When an electron drops from an outer to an inner level, "excess" energy is given off as light. The wavelength or color of the emitted light is precisely related to the amount of energy released. The emitted light waves are in phase with one another and are so nearly parallel that they can travel for long distances without spreading. (In contrast, incoherent light from a light bulb diffuses in all directions.) Coherence means that laser light can be focused with great precision.
Interfacing through LPT Port
The Parallel Port is the most commonly used port for interfacing projects. This port will allow the input of up to 9 bits or the output of 12 bits at any one given time The port is composed of 4 control lines, 5 status lines and 8 data lines. It's found commonly on the back of a PC as a D-Type 25 Pin female connector. There may also be a D-Type 25 pin male connector. This will be a serial RS-232 port and thus, is a totally incompatible port.
Parallel Port’s are standardized under the IEEE 1284 standard first released in 1994. This standard defines 5 modes of operation which are as follows,
1. Compatibility Mode.
2. Nibble Mode.
3. Byte Mode.
4. EPP Mode (Enhanced Parallel Port).
5. ECP Mode (Extended Capabilities Mode).
Compatibility, Nibble & Byte modes use just the standard hardware available on the original Parallel Port cards while EPP & ECP modes require additional hardware which can run at faster speeds, while still being downwards compatible with the Standard Parallel Port. Compatibility mode or "Centronics Mode" as it is commonly known can only send data in the forward direction at a typical speed of 50 Kbytes per second but can be as high as 150+ Kbytes a second. In order to receive data, you must change the mode to either Nibble or Byte mode. Nibble mode can input a nibble (4 bits) in the reverse direction. E.g. from device to computer. Byte mode uses the Parallel's bi-directional feature (found only on some cards) to input a byte (8 bits) of data in the reverse direction. The Parallel Port has three commonly used base addresses. These are listed in table 2, below. The 3BCh base address was originally introduced used for Parallel Ports on early Video Cards. This address then disappeared for a while, when Parallel Ports were later removed from Video Cards. They has now reappeared as an option for Parallel Ports integrated onto motherboards, upon which their configuration can be changed using BIOS. LPT1 is normally assigned base address 378h, while LPT2 is assigned 278h. However this may not always be the case as explained later. 378h & 278h have always been commonly used for Parallel Ports. The lower case h denotes that it is in hexadecimal. These addresses may change from machine to machine.
Address | Notes: |
3BCh – 3BFh | Used for Parallel Ports which were incorporated on to Video Cards - Doesn't support ECP addresses |
378h - 37Fh | Usual Address For LPT 1 |
278h - 27Fh | Usual Address For LPT 2 |
When the computer is first turned on, BIOS (Basic Input/Output System) will determine the number of ports you have and assign device labels LPT1, LPT2 & LPT3 to them. BIOS first look at address 3BCh. If a Parallel Port is found here, it is assigned as LPT1, and then it searches at location 378h. If a Parallel card is found there, it is assigned the next free device label. This would be LPT1 if a card wasn't found at 3BCh or LPT2 if a card was found at 3BCh. The last port of call is 278h and follows the same procedure than the other two ports. Therefore it is possible to have a LPT2 which is at 378h and not at the expected address 278h.
Pin No (D-Type 25) | Pin No (Centronics) | SPP Signal | Direction In/out | Register | Hardware Inverted |
1 | 1 | nStrobe | In/Out | Control | Yes |
2 | 2 | Data 0 | Out | Data |
|
3 | 3 | Data 1 | Out | Data |
|
4 | 4 | Data 2 | Out | Data |
|
5 | 5 | Data 3 | Out | Data |
|
6 | 6 | Data 4 | Out | Data |
|
7 | 7 | Data 5 | Out | Data |
|
8 | 8 | Data 6 | Out | Data |
|
9 | 9 | Data 7 | Out | Data |
|
10 | 10 | nAck | In | Status |
|
11 | 11 | Busy | In | Status | Yes |
12 | 12 | Paper-Out / Paper-End | In | Status |
|
13 | 13 | Select | In | Status |
|
14 | 14 | nAuto-Linefeed | In/Out | Control | Yes |
15 | 32 | nError / nFault | In | Status |
|
16 | 31 | nInitialize | In/Out | Control |
|
17 | 36 | nSelect-Printer / nSelect-In | In/Out | Control | Yes |
18 – 25 | 19-30 | Ground | Gnd |
|
|
Pin Assignments of the D-Type 25 pin Parallel Port Connector.
These ports can be accessed through reading the values of the data pins 2 – 9, but these out pins in SPP mode hence we use the EPP mode whose pin assignments are
Pin | SPP Signal | EPP Signal | IN/OUT | Function |
1 | Strobe | Write | Out | A low on this line indicates a Write, High indicates a Read |
2-9 | Data 0-7 | Data 0-7 | In-Out | Data Bus. Bi-directional |
10 | Ack | Interrupt | In | Interrupt Line. Interrupt occurs on Positive (Rising) Edge. |
11 | Busy | Wait | In | Used for handshaking. A EPP cycle can be started when low, and finished when high. |
12 | Paper Out / End | Spare | In | Spare - Not Used in EPP Handshake |
13 | Select | Spare | In | Spare - Not Used in EPP Handshake |
14 | Auto Linefeed | Data Strobe | Out | When Low, indicates Data transfer |
15 | Error / Fault | Spare | In | Spare - Not used in EPP Handshake |
16 | Initialize | Reset | Out | Reset - Active Low |
17 | Select Printer | Address Strobe | Out | When low, indicates Address transfer |
18-25 | Ground | Ground | GND | Ground |
Pin Assignments For Enhanced Parallel Port Connector
We can see here that pin 2- 9 are bidirectional in this mode and in this project we will use them as Input Pins by sending the value 43 at the 0x37a address which sets all the pins to input mode.
Application Software:
It is the most important and critical part of the whole system. The software is called Attendance Management
It is controlled only by the touch screen interface. The software is designed in Visual Basic 6.0 and it has a collection of HTML pages which contains all the necessary information considering the Institute.
When designing the application, it is remembered that our finger is larger than a mouse pointer. The buttons are designed large enough and spaced apart enough for a finger to touch easily. We have included a graphical response to each touch. This will indicate to the user his/her touch was accepted and will not leave the user confused. Bright backgrounds will hide fingerprints more than a black background would.
Requirements for Application Software:
SYSTEM MAINTENANCE & EVALUATION
Maintainability should be specified, and the design of the software should provide for the highest level of flexibility and ease of maintenance. These attributes should be major design goals, because
1)the maintenance of a software product is a costly enterprise, (2)a software product or parts of it may spend 65% of its operational life cycle in the maintenance phase, and (3)the benefits of designing for ease of maintenance far outweigh the cost of including maintainability as a software design requirement.
Factors that influence maintainability are:
a) Growth provision
b) Reliability.
c) Availability
d) Documentation.
e) Complexity.
The TOUCH SCREEN ATTENDANCE MANAGEMENT has been designed and coded such that it provides a great flexibility to the administrator that it can be enhanced in the future for the use at higher levels. Our project does not pose limitations on future enhancements and can be easily adapted to future changes if made.
COST AND BENEFIT ANALYSIS
A cost-benefit analysis can be viewed as another form of trade-off, in which financial considerations are balanced against potential benefits for available alternatives. Cost-benefit results can also one of many decision criteria within a larger trade-off context. So, results of a cost benefit analysis along with other criteria form a decision criterion. A cost-benefit analysis evaluates the financial merit of making a capital investment in a system or software product.
The cost-benefit analysis attempts to quantify the cost of acquiring or upgrading an information system and maintaining it in operational condition for its estimated lifetime. These costs are then compared with the quantified benefits derived operating the new system. There are also instances where acquisition of software development facilities may be considered as capital investments and the software engineer may find him or she directly involved in a cost-benefit analysis.
Benefits are categorized as tangible and intangible. Tangible benefits are those that are easily identified and quantified. Tangible benefits can be found in improved productivity, increased sales, decreased costs of each transaction, reduced number of required operators etc. Intangible benefits, although important, are usually difficult to quantify.
The comparison criteria of the costs and benefits can take many forms. One criterion is the payback period, which is defined as the number of elapsed months of the new system’s operation required for the benefits of the new system to pay back initial investment. It is the point in time where benefits derived from the new system equal the costs of acquiring and operating the new system.
One additional factor to be considered with a detailed discussion of the cost-benefit analysis process is cost of money or net present value.
The net present value factor accounts for the fact that a sum of money received or spent in the future is not equivalent to that same sum of money currently on hand. The difference is due to the fact that a given sum of money invested today at a given interest rate will be worth more in the future. The main summary of Cost and Benefit Lies in the following points:-
DETAILED LIFE CYCLE OF PROJECT
1. Requirement Analysis
This step is first and primary step of software development lifecycle which analyzes the requirement of the software. First the analysis of the whole college is done and after collecting all valuable information the all module design comes in the mind of us and the entire requirement was given by accountants of that particular department.
2. Design
Preliminary design concerns the brief overview of the software architecture and structure rather than goes into the details of the module .This design is refined by designing each module in detail in the detailed design. As the result of this step, it produces the Software Design Specification (SDS) SDS is built to have:
After considering much software and the language we decide to make our project in ASP in front hand and Ms Access in back hand
3. Coding
The coding of whole software is done in ASP, HTML & Java Script
4. Module Level Testing
Individual developed modules are tested here. It is also called as the Unit Testing. This testing is performed for each of the module separately.
5. Integration and System Testing
All the modules are collected and integrated appropriately with each other. Interfaces are provided among them, and then the whole system is tested fully.
DATA FLOW DIAGRAM
Zero Level DFD
One Level DFD
One Level DFD
Two Level DFD
I/P & O/P SCREEN DESIGN
Starting Form
Fig 1 shows the welcome page of the application software where user is prompt to enter the code which is assign to him.
Fig -1
Fig 2 shows the form if user by mistake enter the number instead of entering the branch first because faculty code start with branch name only
Fig -2
Fig 3 shows the form when the user instead of entering his/her id enter the id which does not exist
Fig -3
Fig 4 shows the home page of the faculty member for registering the attendance the faculty has to enter the 4 digit password.
Fig -4
Fig 5 shows the form if faculty enter the wrong password
Fig -5
Fig 6 shows that if the password is entered correctly then the faculty attendance has been registered
Fig -6
Methodology Used For Testing
Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design plus coding.
Following is a testing strategy as laid out for testing of DLJ INFO System.
Test Configuration:
Testing was done in various phases. A “Bottom Up” testing methodology was followed where all modules tested before proceeding to integrating them as a whole. Testing was done in following phases
Scope & Strategy
The test plan & procedure adopted for various test phases are:
Unit Testing:
UT is White box testing. The goal is to verify a unit of design i.e. module. UT is done to ensure 100% codes converge and all modules are tested exhaustively. After this phase the code is frozen so that further testing is executed without changing the code.
UT cases are written for each module before commencement of coding and are carried out in parallel with development. These cases are designed to cover instance such as module interface, local data structure, boundary condition and basic error-handling path through the control structure.
Feature Testing:
The basic objective of this testing is to test whether the module conforms according to the feature requirements and specifications, Module testing is Black Box in nature and aims to test the complete functionality of module including the basic error handling.
System Testing:
System Testing is conducted in an attempt to uncover errors at hardware /software interface. System Testing is actually a series of different tests. Although each test has a different purpose, all work should verify that all system elements have been properly integrated and perform allocated functions.
Recovery Testing:
Recovery Testing is a system test that forces the software to fail in variety of ways and verifies that recovery is properly performed. If recovery is automatic, re-initialization, check pointing mechanisms, data recovery, and restart are each evaluated for correctness. If recovery requires human intervention, the mean time to repair is evaluated to determine whether it is within acceptable limits.
Safety Testing:
Safety testing attempt to verify that protection mechanisms built into a system will, in fact, protect it from improper penetration. During Safety Testing, the tester plays the role(s) of the individual who desires to penetrate the system the tester may attempt to acquire passwords through external clerical means.
System Performance Testing:
Performance testing is designed to test the run-time performance of software within the context of an integrated system. Performance testing occurs throughout all steps in the testing process. Performance tests are sometimes coupled with stress testing and often require both hardware and software instrumentation.
Stress Testing:
Stress Testing execute a system in a manner that demands resource in an abnormal quantity, frequency, or volume.
Black Box Testing:
Black Box Testing methods focus on the functional requirements of the soft wares. In Black Box testing the tester does not know the internal structure of the software i.e. how the data are stored, structure of the data etc. Black Box testing enables the software engineer to derive sets of input, conditions that will fully exercise all functional requirements for a program.
Glass Box Testing:
Glass Box Testing is a test case design method that uses the control structure of the procedural design to derive test cases. Using this testing method, the software engineer can derive test cases that:
CODING
Welcome. Page
Dim i As Integer
Dim con As ADODB.Connection
Dim rs As ADODB.Recordset
Dim fname As String
Dim pass As String
Dim dept As String
Dim pht As String
Dim a As PictureTypeConstants
Private Sub ComCS_Click()
If Text1.Text = " " Then
Text1.Text = ComCS.Caption
End If
End Sub
Private Sub ComEC_Click()
If Text1.Text = " " Then
Text1.Text = ComEC.Caption
End If
End Sub
Private Sub ComEE_Click()
If Text1.Text = " " Then
Text1.Text = ComEE.Caption
End If
End Sub
Private Sub ComEnter_Click()
If Not (LblQuest.Caption = "Password:") Then
con.Open
rs.Open "select * from faculty where FacultyID = '" & Text1.Text & "'", con, 1, 3
If rs.EOF Then
MsgBox ("NO RECORD FOUND")
Text1.Text = " "
con.Close
GoTo x
Else
fname = rs(1)
pass = rs(2)
pht = rs(3)
dept = rs(4)
Call passwordform
con.Close
End If
Else
If Trim(Text1.Text) = pass Then
MsgBox ("Your Attendence is registered")
Call welcomeform
Else
MsgBox ("Incorrect password")
Call passwordform
End If
End If
x:
End Sub
Private Sub ComIC_Click()
If Text1.Text = " " Then
Text1.Text = ComIC.Caption
End If
End Sub
Private Sub ComIT_Click()
If Text1.Text = " " Then
Text1.Text = ComIT.Caption
End If
End Sub
Private Sub Command1_Click(Index As Integer)
If (Text1.Text = " ") And Not (LblQuest.Caption = "Password:") Then
MsgBox ("Enter Branch First")
Else
Text1.Text = Text1.Text + Command1(Index).Caption
End If
End Sub
Private Sub Form_Load()
Set con = New ADODB.Connection
con.ConnectionString = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=C:\major proj\db.mdb;Persist Security Info=False"
Set rs = New ADODB.Recordset
End Sub
Private Sub passwordform()
DeptName.Caption = "DEPARTMENT OF " + dept
FacultyName.Caption = "WELCOME " + fname
LblQuest.Caption = "Password:"
Text1.Text = " "
'picture1.Picture =
ComIT.Enabled = False
ComCS.Enabled = False
ComIC.Enabled = False
ComEC.Enabled = False
ComEE.Enabled = False
End Sub
Private Sub welcomeform()
DeptName.Caption = "DEPARTMENT OF GIT"
FacultyName.Caption = "WELCOME "
LblQuest.Caption = "Enter Your ID:"
Text1.Text = " "
ComIT.Enabled = True
ComCS.Enabled = True
ComIC.Enabled = True
ComEC.Enabled = True
ComEE.Enabled = True
End Sub
Option Explicit
Dim j As Integer
Dim i As Integer
Private Sub Form_KeyDown(a As Integer, s As Integer)
Dim key As Integer
'key = Chr(a)
key = a
If (key = 40) Then
Line1.Y1 = Line1.Y1 + 10
Line1.Y2 = Line1.Y2 + 20
ElseIf (key = 38) Then
Line1.Y1 = Line1.Y1 - 10
Line1.Y2 = Line1.Y2 - 20
End If
End Sub
'Sub Text1_KeyPress(KeyAscii As Integer)
' Mychar = Chr(KeyAscii)
' Perform an operation using Mychar.
'up=38
'Dim MyAngle, MyCosecant
'MyAngle = 1.3 ' Define angle in radians.
'MyCosecant = 1 / Sin(MyAngle) ' Calculate cosecant.
Private Sub Timer1_Timer()
If (i = 180) Then
i = i * 2
End If
If (i = 540) Then
i = 1
End If
If (i < 180) Then
Line1.X2 = Line1.X1 + 650 * Sin(i * 3.14 / 180)
Line1.Y2 = Line1.Y1 - 650 * Cos(i * 3.14 / 180)
i = i + 1
ElseIf (i > 180) Then
Line1.X2 = Line1.X1 + 650 * Sin(i * 3.14 / 180)
Line1.Y2 = Line1.Y1 + 650 * Cos(i * 3.14 / 180)
i = i + 1
End If
End Sub
SCOPE FOR FUTURE WORK
Extensibility was one of the most important design goals and every component in the system was designed keeping it in mind. The usage of the web services allows us to retrieve and capture information from a variety of sources.
As the software new features can be easily added to the system:
1. The most exciting feature that can be added to the system is the SAPI (Speech Application Programming Interface) through which the user can be warned if he/she entered wrong password or try to use the project in wrong way.
2. The number of buttons can be easily doubled or quadrupled easily by adding one or two more Laser Torches.
3. this also allows for simple development of new applications, because no additional code or knowledge is required to develop software for use with the touch screen.
CONCLUSION
Touch input is suitable for a wide variety of computing applications. A touch screen can be used with most PC systems as easily as other input devices such as track balls or touch pads. Touch screen systems are being used in a variety of applications, including point-of-sale systems, public information displays, industrial control systems, and more.
Comparing Touch screen and Display Technologies, Touch screen solutions available to work with most common operating systems, including DOS, Windows 3.1/95/98/ME/NT/2000/XP, Macintosh OS, and Linux..
The touch screen emulates a mouse; touching the screen is the same as clicking your mouse at the same point on the screen. This
Allows the touch screen to work with a vast amount of pre-existing mouse driven software.
This also allows for simple development of new applications, because no additional code or knowledge is required to develop software for use with the touch screen. New touch screen applications can be developed in the same way as mouse driven software. It can work with any type of input- finger, gloved hand, stylus, pen, or any pointing device.
The project that we have undergone has helped us lot in understanding the programming language Visual Basic , apart from this we also learn to write many queries so as to retrieve data from the database MS ACESS
This project also helps us in learning the new technology “EMBEDDED TECHNOLOGY” which act as interface between the hardware and software.
We come to know about various electrical components like resistors, condensers, transistors, before this project these all thing are like bookish knowledge for us, but with this project we come to understand the practical application of these components.
USER OPERATIONAL MANUAL
Steps Involved In using the Software:-
DATA DICTIONARY
Name of Attributes | Description |
CHECKBOX | Act as a toggle |
DATA | Navigate Data In Data box |
IMAGE | Display Images |
LABEL | Display Static Text |
OLE | Act as a OLE Container |
PICTURE BOX | Display Images also act as a container for other controls |
TEXT BOX | Control for user input |
CAPTION | Allows you to enter menu or command name that you want to appear on your menu bar or in a menu |
MSG BOX | Display message in a dialog box, waits for the user click a button and return a value indicating which button is linked |
CONNECTION | Maintains connection information such as cursor type, connect string query time out ,connection time out and default data |
COMMAND | Maintains information about command such as query string parameter definitions etc. |
RECORD SET | Contains set of rows returned from a query , including a cursor into those rows |
BIBLIOGRAPHY
References:-
By Girdhari Singh & Shalini Puri
By Rogger.S. Pressman
By Ali Behfrooz & Frederick.J.Hudson
By Sanjeev Gupta
By Dr W.L.Wallace
By PHP publication
By Peter Norton
By PHP publication
By Reeta & GB Sahoo
Websites:-