Attendance Management Through Touch Screen

________________________________________________________________________

OBJECTIVE & SCOPE OF PROJECT

The main objective of this project is that to minimize the handwritten work to small as possible and provide user an automated environment in which he/she can work efficiently and also in user friendly environment.

The scope of the project generally lies at the places like schools , colleges & universities where faculties attendance maintenance are major requirement because on basis of this the salary of person can be calculated, this project is on very small basis means to say not on big scale we can implement it on bigger scale in form of maintaining student attendance ,apart from this the same concept can be applied in various business firms (public and private) which are fully automated with computer and the company has to maintain the regularity of employers also at these places it is not possible to maintain large records files which require a separate room for storage so to avoid this we made this software in which database are maintained which cover very less space then the space taken by files etc.

THEORETICAL BACKGROUND

Why VB (Visual Basic)?

Visual basic is one of the most popular programming languages in the market today. Microsoft has positioned it to fit multiple purposes in development. The language ranges from light weight vb script programming, to application specific programming with vb for applications

What is Visual Basic?

The visual part refers to the method used to create GUI.Rather then writing numerous lines of code to describe the appearance and location of interface elements , we simplify add rebuilt objects into place on screens.

                VB is high level programming language evolved from earlier DOS version called BASIC. VB is event driven programming VB programs are made up of many sub programs , each has its in own program codes and each can be executed independently and at the sane time each can be linked in one way or another.

                VB is designed to deploy applications across the enterprise and to scale of any size needed the ability to develop object mode is databases integration, server components, and Internet/Intranet applications provides an extensive range of capabilities and tools of the developer. In particular VB lets us to add menus, textboxes, command buttons, option buttons, check boxes, scroll bars, and file & directory boxes to blank windows. We can communicate with other window applications and perhaps most importantly we will have an easy method to let users’ control and access database.

Advantages of Visual Basic-:

DATABASE

Introduction about Ms-Access:

        Access has become the best selling database management program because of its combination of power and ease of use. Access is powerful enough that developers can use it to create entire applications that require little or no programming. It also contains an entire programming language, VISUAL BASIC for application which can be used to develop richer and more advance application. Access is easy enough to use that in short time beginner can learn to manage their own data.

        It is easy for one to get started with access by taking a quick look at its environment and how it is organized.

Access Utilities:

 

The Access database and its objects:-

        In other database management programs, the term database is sometimes used to refer only to the tables that hold data; an access database consists of tables that hold the data and all the related objects such as queries, forms and reports, which are used to manage the data in the table. Administration and user log on.

DATABASE DESIGN

Tables used:-

Faculty Table

Faculty ID

Name

Password

Photo

Department

IT0201

Mr Prakash Ramani

1234

C:\majorproject

\image\prakash.wmf

Information

Technology

IT0202

Mr Deepankar Goyal

1111

C:\majorproject

\image\deep..wmf

Information

Technology

DEFINITION OF PROBLEM

The advent of ubiquitous and pervasive computing facilitated by Internet has opened up a plethora of applications. It is now possible to see and communicate with people around the globe. Nevertheless, there is still much more to be done to knit the social fabric. Despite of its popularity and immense potential the Internet has not yet been fully exploited to satisfy all computer literate and ignorant people.

The Touch Screen Attendance Management form to interact. The basic idea of this project comes from the fact that in colleges and universities the faculty attendances are major requirement because this help in calculating salary, their regularity and also time for which they remain in institute all these attendances are maintained in files and are stored in storage area , if someone want to know some information about particular person then difficulty for searching comes but due to this project the faculty just have to touch the screen and to enter the personnel code (which is different for every person) as well as password and attendance will be  automatically made, this also ensures security because password is different for every person. As the database is maintained for each faculty then information can be retrieved anytime as required or situation demands.

 

 It caters an interface that does not requires key-board or Mouse as the primary input devices but all it ask for is a monitor and user can access it through ones fingers i.e. a Touch Screen.


SYTEM ANALYSIS & DESIGN vis-à-vis

USER REQUIREMENTS

SYSTEM ANALYSIS

System

A system is an orderly grouping of interdependent components linked together according to a plan to achieve a specific objective.

The component may be either any physical part of the system or it may be any subsystem in multilevel structure.

So it can be said, that a system is composed of subsystems which may themselves be made up of other sub system. These subsystems are interconnected with each other in some ways. The interconnections between sub systems are known as ‘interface’. Additionally, a system and all subsystems must have their own boundaries.

The system concept requires the system analyst to look at the system as a whole, but the complete system is so large to be analyzed in details, so it is factored or partitioned in to subsystems.

 For example-

System

Subsystem B

Subsystem A

A1

A2

A3

B1

B2

B3

B4

Fig- System & Sub System

Analysis

Analysis is a detailed study of the various operation performed by a system and their relationship within and outside of the system.

 

So the main objective of this phase is to come with the precise structure functional specification of the user requirement. There are also major sub objectives, as given below:

An analyst must have some characteristics:

SYSTEM DESIGN

System design is one of the most creative and challenging phase of the system development life cycle (SWDLC).System design is used to understand the existing system and to know the requirement for the new system.

System design is the determination of the processes and data that are required by a new system.

        

The design describes a final system and the process by which it is developed. It includes the technical implementation in the system.

Output Design

Input Design

File and Processing Design

Detailed Design

Documentation

Management

Approval

Design

Accepted

Test Program

Rejection

Cost, Risk

Factors Evaluation

NO

From Analysis

Go To Implementation and Testing

                                          Fig- Step to System Design

USER REQUIREMENT

User requirement refer to the high abstract requirement these are the statement in a natural language plus diagram, of what services the system is expected to provide and the constrained under which it must operate. So user requirement definition is stated so the software must provide a means of representing and accessing external files created by other tools.

Characteristics of Requirements:


SYSTEM PLANNING

SYSTEM PLANNING

The system level programming is basically the information system, which exchange the information with each other. Planning of an information system in business has become increasingly important during the past decade. First information is now recognize as a vital source and must be manage. Secondly, more and more financial resources are committed to information system. Third, there is a growing need for formal planning with information system that are complex, require much time like –month or year to build, use common database.  

        

The project plan should have following-

  1. Product for delivery.
  2. Task to accomplish.
  3. Starting and ending of all tasks.
  4. Task dependencies.
  5. Procedure to perform the tasks.

SYSTEM IMPLEMENTATION & DETAILS OF H/W & S/W USED

SYSTEM IMPLEMENTATION

It is defined by:-

Implementation is the acquisition and integration of the physical and conceptual that produces a working system

It is concerned with those tasks leading immediately to a fully operational system. It involves programmers, users and operational management but its planning of timing is a prime function of system analysis.

DETAILS OF S/W & H/W USED

The Touch Screen Attendance Management is a combination of hardware and software with Computer Interfacing. It consists of three parts naming

  1. Sensor Screen
  2. Controller Box
  3. Application Software

All these components incorporate to bring out a device which used in a variety of applications, including colleges, universities various offices.

Sensor Screen

A Touch Screen is an input device that allows users to operate a PC by simply touching the display screen. Touch input is suitable for a wide variety of computing applications. A Touch Screen can be used with most PC systems as easily as other input devices such as track balls or touch pads. It can emulate basic mouse functions. The touch screen can emulate left-clicks, double-clicking, and dragging.

Now the question is how the screen senses our touch? It can be done in many ways like

1. Using Pressure Sensors

2. Using Capacitive Screen

3. Using Laser Mesh

Here we are using a laser mesh to sense the touch.  The sensor screen has a mesh of Laser Beams and sensors made up of LDR Light Dependent Resistors. Whenever any mesh is broken on touching the screen i.e. the Line of Sight between laser and LDR is obstructed the sensor sends a signal to the control box.

Requirements for Sensor Screen:

 1. Laser Torches Wavelength 630-680 nm        6

 2. Light Dependent Resistors LDRS                    6

 3. Acrylic Sheet                                                80 inches

 4. Strip Wire                                                50 cm

 5. Glass Sheet                                                80 Inches

To make the touch Screen Laser Mesh is used. It is designed for sixteen buttons only. Ten Laser Torches of Wavelength 630-680 nm are used as the laser sources. Eight Torches are aligned at the top of the screen at a fair distance considering the fact that our finger is larger than a mouse pointer. The buttons are designed large enough and spaced apart enough for a finger to touch easily and accordingly the torches are spaced too.

           

Two laser is attached at the lower left corner of the screen to complete the mesh and it also Localize the exact position of the buttons on the screen i.e. the positions or the areas where the user has to touch the screen in order to get a response is fixed.

Similarly the laser sensors (LDR) are aligned such that they in a direct line of sight to their respective laser beam. LDR is Light Dependent Resistors whose resistance varies according to the intensity of light. Whenever the line of sight between the laser source and the LDR is broken the intensity of light falling on the LDR reduces which increases its resistance and hence the signal is received by the Laser Receptor Circuit inside the Controller Box.

The Screen is made such that it can be easily attached with the monitor. It is designed to be situated with a 17’’ monitor. The size of the screen is

           

It has a body made up of Acrylic sheet. To support the structure and provide stability as the Acrylic is very flexible, a Glass sheet of similar dimensions is used. The glass sheet also shields the original monitor screen to be touched. The outer boundary has two layers which hold the laser torches and the LDR. The middle part of it is open and bounds the space to be used by the user.

The laser touches has to keep on continuously during the working hours and so the batteries are unfit for this job hence we have to provide a continuous supply of +5 Volts to the Torches. For this intention we designed a Laser Driver Circuit which gets its power from a Power Supply Circuit. The Laser Driver Circuit is intended to supply uninterrupted supply of power to the Laser as the torches are very sensitive as far as fluctuation is concerned.

The Laser Driver Circuit

This circuit receives its power from the power Supply Circuit which is inside the Controller Box. Besides this there is one more circuit called Laser Receptor Circuit which act as the bridge between Computer and Controller Box. Whenever there is a signal from the LDR, this circuit receives it and sends it to the LPT port of the computer. This circuit requires two power supplies of +5 Volts and +12 Volts. The +5 Volt supply is used to lead up the LED, Light Emitting Diode which emits light on receiving a certain amount of voltage (+5V).

When Laser light is switched on and the beam is falling directly over the LDR then these LED are lightened and whenever the line of sight is broken the LED is unenlightened. Hence it works as an indicator also. The circuit is so designed that whenever the LED is switched off the signal is generated. This signal is send to the LPT Port via the collector of the Transistor after amplification.

       

The Laser Receptor Circuit

When Laser light is switched on and the beam is falling directly over the LDR then these LED are lightened and whenever the line of sight is broken the LED is unenlightened. Hence it works as an indicator also. The circuit is so designed that whenever the LED is switched off the signal is generated. This signal is send to the LPT Port via the collector of the Transistor after amplification

Controller Box

The control box on receiving the signal sends it to the LPT port of the computer where the software can figure the LPT pin code and take the appropriate action. The box not only does it but also controls the Laser Torches and consists of three basic circuits.

  1. Power Supply circuit
  2. Laser Receptor circuit
  3.  Laser driver circuit

Requirements for Control Box:

1. GPCB (General Purpose Circuit Board)            3

2. Jumper Wire                                                   5M

3. Soldering Iron                                                  1

4. Soldering Wire                                                 5M

5. IC 7805, 7812                                                   1, 1

6. Acrylic Sheet                                                 60Inches

7. 12-0-12 Transformer 1.5 Amp                        1

8. Intel Fan with Heat Sink                                1

9. Choke                                                                  1

10. Preset                                                          15

11. Condensers

      0.01µf                                                        6

         2200µf                                                        2

      470µf                                                         2

12. Resistors

      1 KΩ                                                                12

      100KΩ                                                        5

      150 Ω                                                        2

          330Ω                                                        7

13. Diodes

      Diode 4007                                                  11

         Diode 4142                                                  6

14. Light Emitting Diode                                        8

15. NPN Transistor 558                                        12

     16. 25 Pin D-type Female LPT port                           1

     17. 25 Pin D-type Male to Male Cable                           1        

     18.  Nut Bolt Accessories                                                  1

The power supply circuit provides power to the rest of the two circuits. The laser Receptor circuit receives signals from the sensor screen via LDR and sends it to the LPT port where it is detected by the software. The laser driver circuit provides power to the lasers at the sensor screen.The controller box basically consists of the three circuits and a 25-pin D-type Female connector. These circuits are building using PCBs.

 Printed Circuit Board
The universal printed circuit board is used for the power supply circuit and to mount the parts included an LCD in the front panel. The main circuit in it is the Power Supply which has a bridge wave rectifier that coverts A.C Supply into DC supply. The circuit looks like as   shown below.

The Power Supply Circuit

Full wave rectifier circuit with a diode bridge is used for the rectifier circuit which changes AC into DC. Even if the alternating voltage of the input changes into the positive and the negative, the voltage which is applied to load is always positive by a diode bridge. The voltage which is applied to load is not clean DC. It is called Ripple voltage. In this circuit, in order to make ripple voltage small, the capacitor is connected to load in parallel. Even if the voltage which comes out from a diode bridge becomes small, the DC voltage applied to the load is stabilized by discharge the electricity stored in the capacitor.AC100V is dropped on AC24V with a transformer. In case of the alternating current, voltage is shown in RMS (Root Mean Squared value). If it changes into direct current voltage, it will become about DC30V.

Following the rectifier circuit is the Pi Filter Circuit.

Filters

The output voltage from a rectifier though unidirectional is pulsating. The output voltage has a DC component, which is nothing but its average value in addition AC component. AC component are responsible for pulsation of the output voltage. These are minimized by means of filter circuits.

Pi-filter is basically used to filter the traces of ac which still remained after passing through bridge rectifier. It consists of two capacitors in parallel circuit and choke coil. This capacitor store the extra energy when wave going upward and deliver it while wave going downward. This makes equal distribution of energy and traces of ac were removed. Choke is used to convert 1 ampere to 250 milli-amperes which is our requirement.

Filter choke:

           They are usually laminated iron core inductors. These are used for smoothing pulsating current output from a rectifier.

Voltage Regulators(IC-7812, IC-7805)

It is very easy to get stabilized voltage for ICs by using a three terminal voltage regulator. The three terminal voltage regulator outputs stabilized voltage at a lower level than the higher input voltage. A voltage regulator cannot put out higher voltage than the input voltage. They are similar in appearance to a transistor. The 7800 series consists of three-terminal positive voltage regulators.

        These ICs are designed as fixed voltage regulators and with adequate heat sinking can deliver output currents in excess of 1A. These ICs are used to provide +5 volts and +12 volts supply. Line regulation in these ICs is change in the output voltage for a change in the input voltage. Load regulation is defined as the change in output voltage for a change in load current. If there is any high voltage than 12 volt to 7812 it will convert to 12 V by this IC. If there is any voltage less than 12 volt it allows passing it. FAN is used for cooling the ICs.

There are two ICs 7805 and 7812 attached with the Intel-fan heat sink. From the base of 7805 IC we get the +5Volt Supply and from the base of 7812 IC we get the 12 Volt supply. Two LED are also connected with the respective ICs in order to indicate there proper working.

Block Diagram OF Controller Box

Variable resistance is resistance through which we can varies resistance accordingly to the two points i.e. either maximum or negligible, but this value depends on the connection of the variable resistance. If +ve supply connects to terminal A and -ve connects to terminal B then at A, the value of resistance is negligible, and at B, value of resistance is maximum. Between these two points we can vary the value of resistance accordingly .This is made up of carbon particles on mica sheet where circular metallic thin strip placed which can easily move on mica sheet thought circular area. At ends of this sheet is two metal strips are connected these points are inputs of lower frequencies.

Preset resistors are used in circuits when it is necessary to alter the resistance. Dark/light and temperature sensors usually have these components as the preset resistor allows the circuit to be made more or less sensitive (they can be turned up or down - reducing or increasing resistance).

A small screwdriver can be used to turn the centre part of the preset resistor, altering the value of the resistance.
The range of resistance varies, for example:
0 to 100 ohms
0 to 1M ohms

Working

The preset resistor is used to vary the potential. It has been used in this circuit so that photodiodes do not sense the daylight (they remain sensitive to only the laser light). A photodiode works in reverse bias. When no light falls on photodiode then it works as a normal diode. It conducts negative charge to the transistor. The transistor then becomes reverse biased. When light falls on it, it conducts positive charge to the transistor. The transistor now becomes forward biased. When the two npn transistors are connected in series then it forms a Darlington Amplifier. The amplification provided is 1:10:100.

Laser Torches

Laser means Light Amplification by Simulated Emission of Radiation. Electrons exist at specific energy levels or states characteristic of that particular atom or molecule. The energy levels can be imagined as rings or orbits around a nucleus. Electrons in outer rings are at higher energy levels than those in inner rings. Electrons can be bumped up to higher energy levels by the injection of energy-for example, by a flash of light. When an electron drops from an outer to an inner level, "excess" energy is given off as light. The wavelength or color of the emitted light is precisely related to the amount of energy released. The emitted light waves are in phase with one another and are so nearly parallel that they can travel for long distances without spreading. (In contrast, incoherent light from a light bulb diffuses in all directions.) Coherence means that laser light can be focused with great precision.

Interfacing through LPT Port

The Parallel Port is the most commonly used port for interfacing projects. This port will allow the input of up to 9 bits or the output of 12 bits at any one given time The port is composed of 4 control lines, 5 status lines and 8 data lines. It's found commonly on the back of a PC as a D-Type 25 Pin female connector. There may also be a D-Type 25 pin male connector. This will be a serial RS-232 port and thus, is a totally incompatible port.

Parallel Port’s are standardized under the IEEE 1284 standard first released in 1994. This standard defines 5 modes of operation which are as follows,

1. Compatibility Mode.
2. Nibble Mode.

3. Byte Mode.

4. EPP Mode (Enhanced Parallel Port).
5. ECP Mode (Extended Capabilities Mode).

     Compatibility, Nibble & Byte modes use just the standard hardware available on the original Parallel Port cards while EPP & ECP modes require additional hardware which can run at faster speeds, while still being downwards compatible with the Standard Parallel Port. Compatibility mode or "Centronics Mode" as it is commonly known can only send data in the forward direction at a typical speed of 50 Kbytes per second but can be as high as 150+ Kbytes a second. In order to receive data, you must change the mode to either Nibble or Byte mode. Nibble mode can input a nibble (4 bits) in the reverse direction. E.g. from device to computer. Byte mode uses the Parallel's bi-directional feature (found only on some cards) to input a byte (8 bits) of data in the reverse direction. The Parallel Port has three commonly used base addresses. These are listed in table 2, below. The 3BCh base address was originally introduced used for Parallel Ports on early Video Cards. This address then disappeared for a while, when Parallel Ports were later removed from Video Cards. They has now reappeared as an option for Parallel Ports integrated onto motherboards, upon which their configuration can be changed using BIOS. LPT1 is normally assigned base address 378h, while LPT2 is assigned 278h. However this may not always be the case as explained later. 378h & 278h have always been commonly used for Parallel Ports. The lower case h denotes that it is in hexadecimal. These addresses may change from machine to machine.

Address

Notes:

3BCh – 3BFh

Used for Parallel Ports which were incorporated on to Video Cards - Doesn't support ECP addresses

378h - 37Fh

Usual Address For LPT 1

278h - 27Fh

Usual Address For LPT 2

When the computer is first turned on, BIOS (Basic Input/Output System) will determine the number of ports you have and assign device labels LPT1, LPT2 & LPT3 to them. BIOS first look at address 3BCh. If a Parallel Port is found here, it is assigned as LPT1, and then it searches at location 378h. If a Parallel card is found there, it is assigned the next free device label. This would be LPT1 if a card wasn't found at 3BCh or LPT2 if a card was found at 3BCh. The last port of call is 278h and follows the same procedure than the other two ports. Therefore it is possible to have a LPT2 which is at 378h and not at the expected address 278h.

Pin No (D-Type 25)

Pin No (Centronics)

SPP Signal

Direction In/out

Register

Hardware Inverted

1

1

nStrobe

In/Out

Control

Yes

2

2

Data 0

Out

Data

 

3

3

Data 1

Out

Data

 

4

4

Data 2

Out

Data

 

5

5

Data 3

Out

Data

 

6

6

Data 4

Out

Data

 

7

7

Data 5

Out

Data

 

8

8

Data 6

Out

Data

 

9

9

Data 7

Out

Data

 

10

10

nAck

In

Status

 

11

11

Busy

In

Status

Yes

12

12

Paper-Out / Paper-End

In

Status

 

13

13

Select

In

Status

 

14

14

nAuto-Linefeed

In/Out

Control

Yes

15

32

nError / nFault

In

Status

 

16

31

nInitialize

In/Out

Control

 

17

36

nSelect-Printer / nSelect-In

In/Out

Control

Yes

18 – 25

19-30

Ground

Gnd

 

 

 Pin Assignments of the D-Type 25 pin Parallel Port Connector.

These ports can be accessed through reading the values of the data pins 2 – 9, but these out pins in SPP mode hence we use the EPP mode whose pin assignments are

Pin

SPP Signal

EPP Signal

IN/OUT

Function

1

Strobe

Write

Out

A low on this line indicates a Write, High indicates a Read

2-9

Data 0-7

Data 0-7

In-Out

Data Bus. Bi-directional

10

Ack

Interrupt

In

Interrupt Line. Interrupt occurs on Positive (Rising) Edge.

11

Busy

Wait

In

Used for handshaking. A EPP cycle can be started when low, and finished when high.

12

Paper Out / End

Spare

In

Spare - Not Used in EPP Handshake

13

Select

Spare

In

Spare - Not Used in EPP Handshake

14

Auto Linefeed

Data Strobe

Out

When Low, indicates Data transfer

15

Error / Fault

Spare

In

Spare - Not used in EPP Handshake

16

Initialize

Reset

Out

Reset - Active Low

17

Select Printer

Address Strobe

Out

When low, indicates Address transfer

18-25

Ground

Ground

GND

Ground

Pin Assignments For Enhanced Parallel Port Connector

We can see here that pin 2- 9 are bidirectional in this mode and in this project we will use them as Input Pins by sending the value 43 at the 0x37a address which sets all the pins to input mode.

Application Software:

It is the most important and critical part of the whole system. The software is called Attendance Management

It is controlled only by the touch screen interface. The software is designed in Visual Basic 6.0 and it has a collection of HTML pages which contains all the necessary information considering the Institute.

When designing the application, it is remembered that our finger is larger than a mouse pointer. The buttons are designed large enough and spaced apart enough for a finger to touch easily. We have included a graphical response to each touch. This will indicate to the user his/her touch was accepted and will not leave the user confused. Bright backgrounds will hide fingerprints more than a black background would.

Requirements for Application Software:

  1. Visual Studio 2003, Visual Basic 6.0
  2. SDK 5.0
  3. Development Time 45 hrs
  4. Programming Languages-( HTML, VB)
  5. Database – Microsoft Access
  6. Operating System- Windows 98 / 2000 / XP
  7. Processor 533 MHZ
  8. 64 MB Ram
  9. Two Button Mouse & Keyboard

SYSTEM MAINTENANCE & EVALUATION

Maintainability should be specified, and the design of the software should provide for the highest level of flexibility and ease of maintenance. These attributes should be major design goals, because

1)the maintenance of a software product is a costly enterprise, (2)a software product or parts of it may spend 65% of its operational life cycle in the maintenance phase, and (3)the benefits of designing for ease of maintenance far outweigh the cost of including maintainability as a software design requirement.

       Factors that influence maintainability are:

       a) Growth provision

      b) Reliability.

     c)  Availability

    d) Documentation.

    e) Complexity.

    

The TOUCH SCREEN ATTENDANCE MANAGEMENT  has been designed and coded such that it provides a great flexibility to the administrator that it can be enhanced in the future for the use at higher levels. Our project does not pose limitations on future enhancements and can be easily adapted to future changes if made.

COST AND BENEFIT ANALYSIS

A cost-benefit analysis can be viewed as another form of trade-off, in which financial considerations are balanced against potential benefits for available alternatives. Cost-benefit results can also one of many decision criteria within a larger trade-off context. So, results of a cost benefit analysis along with other criteria form a decision criterion. A cost-benefit analysis evaluates the financial merit of making a capital investment in a system or software product.

The cost-benefit analysis attempts to quantify the cost of acquiring or upgrading an information system and maintaining it in operational condition for its estimated lifetime. These costs are then compared with the quantified benefits derived operating the new system. There are also instances where acquisition of software development facilities may be considered as capital investments and the software engineer may find him or she directly involved in a cost-benefit analysis.

Benefits are categorized as tangible and intangible. Tangible benefits are those that are easily identified and quantified. Tangible benefits can be found in improved productivity, increased sales, decreased costs of each transaction, reduced number of required operators etc. Intangible benefits, although important, are usually difficult to quantify.

The comparison criteria of the costs and benefits can take many forms. One criterion is the payback period, which is defined as the number of elapsed months of the new system’s operation required for the benefits of the new system to pay back initial investment. It is the point in time where benefits derived from the new system equal the costs of acquiring and operating the new system.

One additional factor to be considered with a detailed discussion of the cost-benefit analysis process is cost of money or net present value.

The net present value factor accounts for the fact that a sum of money received or spent in the future is not equivalent to that same sum of money currently on hand. The difference is due to the fact that a given sum of money invested today at a given interest rate will be worth more in the future. The main summary of Cost and Benefit Lies in the following points:-

  1. Reduced manpower.

  1. Time efficient.

  1. Easy to maintain.

DETAILED LIFE CYCLE OF PROJECT

          1. Requirement Analysis

This step is first and primary step of software development lifecycle which analyzes the requirement of the software. First the analysis of the whole college is done and after collecting all valuable information the all module design comes in the mind of us and the entire requirement was given by accountants of that particular department.

2. Design

Preliminary design concerns the brief overview of the software architecture and structure rather than goes into the details of the module .This design is refined by designing each module in detail in the detailed design. As the result of this step, it produces the Software Design Specification (SDS) SDS is built to have:

After considering much software and the language we decide to make our project in ASP in front hand and Ms Access in back hand

3. Coding

The coding of whole software is done in ASP, HTML & Java Script

4. Module Level Testing

Individual developed modules are tested here. It is also called as the Unit Testing. This testing is performed for each of the module separately.

                

        

5. Integration and System Testing

All the modules are collected and integrated appropriately with        each other. Interfaces are provided among them, and then the whole system is tested fully.

DATA FLOW DIAGRAM

Zero Level DFD

One Level DFD

One Level DFD

Two Level DFD

I/P & O/P SCREEN DESIGN

Starting Form

Fig 1 shows the welcome page of the application software where user is prompt to enter the code which is assign to him.

Fig -1

Fig 2 shows the form if user by mistake enter the number instead of entering the branch first because faculty code start with branch name only

 

                                        Fig -2

Fig 3 shows the form when the user instead of entering his/her id enter the id which does not exist

 

Fig -3

Fig 4 shows the home page of the faculty member for registering the attendance the faculty has to enter the 4 digit password.

Fig -4

Fig 5 shows the form if faculty enter the wrong password

        Fig -5

Fig 6 shows that if the password is entered correctly then the faculty attendance has been registered

Fig -6

Methodology Used For Testing

Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design plus coding.

 Following is a testing strategy as laid out for testing of DLJ INFO System.  

Test Configuration:

      Testing was done in various phases. A “Bottom Up” testing methodology was followed where all modules tested before proceeding to integrating them as a whole. Testing was done in following phases

 

Scope & Strategy

 The test plan & procedure adopted for various test phases are:

Unit Testing:

   

UT is White box testing. The goal is to verify a unit of design i.e. module. UT is done to ensure 100% codes converge and all modules are tested exhaustively. After this phase the code is frozen so that further testing is executed without changing the code.

UT cases are written for each module before commencement of coding and are carried out in parallel with development. These cases are designed to cover instance such as module interface, local data structure, boundary condition and basic error-handling path through the control structure.

Feature Testing:

The basic objective of this testing is to test whether the module conforms according to the feature requirements and specifications, Module testing is Black Box in nature and aims to test the complete functionality of module including the basic error handling.

System Testing:

         System Testing is conducted in an attempt to uncover errors at hardware /software interface. System Testing is actually a series of different tests. Although each test has a different purpose, all work should verify that all system elements have been properly integrated and perform allocated functions.

Recovery Testing:

         Recovery Testing is a system test that forces the software to fail in variety of ways and verifies that recovery is properly performed. If recovery is automatic, re-initialization, check pointing mechanisms, data recovery, and restart are each evaluated for correctness. If recovery requires human intervention, the mean time to repair is evaluated to determine whether it is within acceptable limits.

Safety Testing:

       Safety testing attempt to verify that protection mechanisms built into a system will, in fact, protect it from improper penetration. During Safety Testing, the tester plays the role(s) of the individual who desires to penetrate the system the tester may attempt to acquire passwords through external clerical means.

System Performance Testing:

        Performance testing is designed to test the run-time performance of software within the context of an integrated system. Performance testing occurs throughout all steps in the testing process. Performance tests are sometimes coupled with stress testing and often require both hardware and software instrumentation.

Stress Testing:

       Stress Testing execute a system in a manner that demands resource in an abnormal quantity, frequency, or volume.

Black Box Testing:

       Black Box Testing methods focus on the functional requirements of the soft wares. In Black Box testing the tester does not know the internal structure of the software i.e. how the data are stored, structure of the data etc. Black Box testing enables the software engineer to derive sets of input, conditions that will fully exercise all functional requirements for a program.

Glass Box Testing:

       Glass Box Testing is a test case design method that uses the control structure of the procedural design to derive test cases. Using this testing method, the software engineer can derive test cases that:

  1. Guarantee that all independent paths within a module have been exercised a least once.
  2. Exercise all logical decisions on their true or false sides.
  3. Execute all loops at their boundaries and within their operational bounds.
  4. Exercise internal data structure to ensure their validity.

CODING

Welcome. Page

Dim i As Integer

Dim con As ADODB.Connection

Dim rs As ADODB.Recordset

Dim fname As String

Dim pass As String

Dim dept As String

Dim pht As String

Dim a As PictureTypeConstants

Private Sub ComCS_Click()

If Text1.Text = " " Then

    Text1.Text = ComCS.Caption

End If

End Sub

Private Sub ComEC_Click()

If Text1.Text = " " Then

    Text1.Text = ComEC.Caption

End If

End Sub

Private Sub ComEE_Click()

If Text1.Text = " " Then

    Text1.Text = ComEE.Caption

End If

End Sub

Private Sub ComEnter_Click()

If Not (LblQuest.Caption = "Password:") Then

    con.Open

    rs.Open "select * from faculty where FacultyID = '" & Text1.Text & "'", con, 1, 3

    If rs.EOF Then

        MsgBox ("NO RECORD FOUND")

        Text1.Text = " "

        con.Close

        GoTo x

    Else

        fname = rs(1)

        pass = rs(2)

        pht = rs(3)

        dept = rs(4)

        Call passwordform

        con.Close

    End If

Else

    If Trim(Text1.Text) = pass Then

        MsgBox ("Your Attendence is registered")

        Call welcomeform

    Else

        MsgBox ("Incorrect password")

        Call passwordform

    End If

End If

x:

End Sub

Private Sub ComIC_Click()

If Text1.Text = " " Then

    Text1.Text = ComIC.Caption

End If

End Sub

Private Sub ComIT_Click()

If Text1.Text = " " Then

    Text1.Text = ComIT.Caption

End If

End Sub

Private Sub Command1_Click(Index As Integer)

If (Text1.Text = " ") And Not (LblQuest.Caption = "Password:") Then

    MsgBox ("Enter Branch First")

Else

    Text1.Text = Text1.Text + Command1(Index).Caption

End If

End Sub

Private Sub Form_Load()

Set con = New ADODB.Connection

con.ConnectionString = "Provider=Microsoft.Jet.OLEDB.4.0;Data Source=C:\major proj\db.mdb;Persist Security Info=False"

Set rs = New ADODB.Recordset

End Sub

Private Sub passwordform()

    DeptName.Caption = "DEPARTMENT OF " + dept

    FacultyName.Caption = "WELCOME " + fname

    LblQuest.Caption = "Password:"

    Text1.Text = " "

    'picture1.Picture =

    ComIT.Enabled = False

    ComCS.Enabled = False

    ComIC.Enabled = False

    ComEC.Enabled = False

    ComEE.Enabled = False

End Sub

Private Sub welcomeform()

    DeptName.Caption = "DEPARTMENT OF GIT"

    FacultyName.Caption = "WELCOME "

    LblQuest.Caption = "Enter Your ID:"

    Text1.Text = " "

    ComIT.Enabled = True

    ComCS.Enabled = True

    ComIC.Enabled = True

    ComEC.Enabled = True

    ComEE.Enabled = True

End Sub

Option Explicit

Dim j As Integer

Dim i As Integer

 Private Sub Form_KeyDown(a As Integer, s As Integer)

Dim key As Integer

 'key = Chr(a)

 key = a

  If (key = 40) Then

 Line1.Y1 = Line1.Y1 + 10

 Line1.Y2 = Line1.Y2 + 20

 ElseIf (key = 38) Then

 Line1.Y1 = Line1.Y1 - 10

 Line1.Y2 = Line1.Y2 - 20

 End If

End Sub

'Sub Text1_KeyPress(KeyAscii As Integer)

 '  Mychar = Chr(KeyAscii)

   ' Perform an operation using Mychar.

'up=38

'Dim MyAngle, MyCosecant

'MyAngle = 1.3   ' Define angle in radians.

'MyCosecant = 1 / Sin(MyAngle)   ' Calculate cosecant.

Private Sub Timer1_Timer()

If (i = 180) Then

 i = i * 2

End If

If (i = 540) Then

 i = 1

End If

 If (i < 180) Then

  Line1.X2 = Line1.X1 + 650 * Sin(i * 3.14 / 180)

  Line1.Y2 = Line1.Y1 - 650 * Cos(i * 3.14 / 180)

  i = i + 1

  ElseIf (i > 180) Then

  Line1.X2 = Line1.X1 + 650 * Sin(i * 3.14 / 180)

  Line1.Y2 = Line1.Y1 + 650 * Cos(i * 3.14 / 180)

  i = i + 1

 End If

 End Sub

SCOPE FOR FUTURE WORK

Extensibility was one of the most important design goals and every component in the system was designed keeping it in mind. The usage of the web services allows us to retrieve and capture information from a variety of sources.

As the software new features can be easily added to the system:

1. The most exciting feature that can be added to the system is the SAPI (Speech Application Programming Interface) through which the user can be warned if he/she entered wrong password or try to use the project in wrong way.

2. The number of buttons can be easily doubled or quadrupled easily by adding one or two more Laser Torches.

3. this also allows for simple development of new applications, because no additional code or knowledge is required to develop software for use with the touch screen.

CONCLUSION

Touch input is suitable for a wide variety of computing applications. A touch screen can be used with most PC systems as easily as other input devices such as track balls or touch pads. Touch screen systems are being used in a variety of applications, including point-of-sale systems, public information displays, industrial control systems, and more.

Comparing Touch screen and Display Technologies, Touch screen solutions available to work with most common operating systems, including DOS, Windows 3.1/95/98/ME/NT/2000/XP, Macintosh OS, and Linux..

The touch screen emulates a mouse; touching the screen is the same as clicking your mouse at the same point on the screen. This

Allows the touch screen to work with a vast amount of pre-existing mouse driven software.

This also allows for simple development of new applications, because no additional code or knowledge is required to develop software for use with the touch screen. New touch screen applications can be developed in the same way as mouse driven software. It can work with any type of input- finger, gloved hand, stylus, pen, or any pointing device.

The project that we have undergone has helped us lot in understanding the programming language Visual Basic , apart from this we also learn to write many queries so as to retrieve data from the database MS ACESS

This project also helps us in learning the new technology “EMBEDDED TECHNOLOGY” which act as interface between the hardware and software.

We come to know about various electrical components like resistors, condensers, transistors, before this project these all thing are like bookish knowledge for us, but with this project we come to understand the practical application of these components.


USER OPERATIONAL MANUAL

Steps Involved In using the Software:-

  1. Each faculty has one User ID and Password, the User ID is given by the administrator and password is selected by the faculty

  1. The respective Id is entered at welcome screen page using the touch screen.

  1. After entering the Id the faculty will press on the enter key using touch screen.

  1. If the Id entered by the user is correct then another form will be open which ask the faculty to enter the password.

  1. If the password entered is wrong then the welcome screen is again open.

  1. If the password entered is correct then the Attendance Made message box will come on the screen to tell the faculty that his/her attendance is made.

DATA DICTIONARY

Name  of Attributes

Description

CHECKBOX

Act as a toggle

DATA

Navigate Data In Data box

IMAGE

Display Images

LABEL

Display Static Text

OLE

Act as a OLE Container

PICTURE BOX

Display Images also act as a container for other controls

TEXT BOX

Control for user input

CAPTION

Allows you to enter menu or command name that you want to appear on your menu bar or in a menu

MSG BOX

Display message in a dialog box, waits for the user click a button and return a value indicating which button is linked

CONNECTION

Maintains connection information such as cursor type, connect string query time out ,connection time out and default data

COMMAND

Maintains information about command such as query string parameter definitions etc.

RECORD SET

Contains set of rows returned from a query , including a cursor into those rows

BIBLIOGRAPHY

References:-

By Girdhari Singh & Shalini Puri

By Rogger.S. Pressman

By Ali Behfrooz & Frederick.J.Hudson

By Sanjeev Gupta

By Dr W.L.Wallace

By PHP publication

By Peter Norton

By PHP publication

By Reeta & GB Sahoo

Websites:-