Software Requirements Specification
Software Requirements Specification
Specification
for
ii
Table of Contents
Table of Contents .......................................................................................................................... ii
1. Introduction .............................................................................................................................. i
1.1
1.2
1.3
1.4
1.5
Purpose.............................................................................................................................................. i
Document Conventions ..................................................................................................................... i
Intended Audience and Reading Suggestions ................................................................................... i
Product Scope ................................................................................................................................... i
References ......................................................................................................................................... i
Product Perspective.......................................................................................................................... ii
Product Functions ............................................................................................................................ ii
User Classes and Characteristics ..................................................................................................... ii
Operating Environment .................................................................................................................... 3
Design and Implementation Constraints .......................................................................................... 3
User Documentation ........................................................................................................................ 3
Assumptions and Dependencies ..................................................................................................... iii
Appendix A: Glossary..................................................................................................................13
Appendix B: Analysis Models .....................................................................................................13
Appendix C: To Be Determined List ..........................................................................................13
1. Introduction
1.1 Purpose
The purpose of this SRS document is to provide a detailed overview of our software
product, its parameters and goals. This document describes the project target , its user interface,
hardware and software requirements. It defines how this software will work. The following .it
defines the functional and nonfunctional requirement. This Software Requirements Specification
document only covers the main system and does not describe the implementation of the database
in which the main system interacts.
1.5 References
I.
II.
III.
Cappelli, R., Lumini, A., Maio, D. and Maltoni, D. (2007). Fingerprint Image Reconstruction from
Standard Templates, IEEE Transactions, vol. 29, pp.1489-1503.
Cappelli, R., Maio, D., Maltoni, D., Wayman, J., L. and Jain, A. K. (2006). Performance evaluation
of fingerprint verification systems, IEEE Trans. Pattern Anal., 28(1), pp. 3-18.
Chirillo, J. and Scott, B. (2007). Implementing Biometric Security. Indianapolis: John Wiley
Publishing Inc., ISBN: 0 7654 25026.
ii
2. Overall Description
2.1 Product Perspective
The Attendance Management System is intended to replace the manual model of attendance
record keeping by means of paper records. The paper records are replaced with a single
interaction between the teacher and the Attendance Management System. Professors will be able
to view details regarding attendance of individual students on their PC and quickly maintain
attendance records. The system will be developed in such a way to provide easy addition of
enhanced features, which may be desired in subsequent versions.
iii
The time allotted for this project will be limited to the end of June 2015.
The language for the project will be VB.Net and the development environment will be
the embedded Visual Basic 6.0 environment.
The system will provide an online user manual in HTML that describes the functionality
and options available to the user.
The system will provide a hard copy of the user manual, which is identical to the manual.
The Attendance Management System shall provide details of teacher in the department.
iv
These details can be clicked with a mouse in order to view a particular teachers
sattendance record.
All modifications to the database will be done through a keyboard.
Application will be accessed through a Browser Interface. The interface would be viewed
best using 1024 x768 and 800 x 600 pixels resolution setting.
For Database
VB.Net
Programming language
4. System Models
System model helps the analysts to understand the functionality of the system and models are
used to communicate with the system. The system model is composed of three individual
models:-The functional model: represented by use case and Scenario.
Administrator: Keep track of attendance, generate monthly attendance summary, and reports to
the faculty
vi
Login
Administrator, End User
The username and password to login for Administrator and User
Administrator and User must be authorized
Login is successfully
Basic course of Actions
Administrator and User want to Login
Fill the user name and password on the space provide
Administrator login as Admin and User login as standard user
Click Login button
Use case ends
Capture fingerprint
Administrator, End user ( fingerprint scanner)
The capture fingerprints process provides a predefined capture
sequence
The administrator and user has chosen the capture biometrics
feature of device application
The fingerprint capturing process is completed
Basic course of Actions
Fingerprint reader displays platen and active capture area of current presenter
finger tips
Administrator and User places requested print on scanner platen
Scanner captures the print image after it determines that the print image is
acceptable
The Application displays the fingerprint captured to the administrator and user
Repeat steps 1 to 3 until all required print images are captured
Use case ends
vii
Character identification
Administrator
The Administrator chooses character identification option,
selects an image and then character to identify
The image must exist and be processed in order for the
characters to be extracted
New information will be stored in the database
Basic course of Actions
Administrator logs into the system
Verification of log in information is correct
Administrator clicks on character identification option
A grid view is made available and returns an image that have already been
entered into the system
Administrator selects an image from a grid view or adds a new image to the
selection
A new page is displayed with all of the characters that have made appearances
in the selected image
Administrator selects an image for a list of photos
Administrator fills in known information pertaining to selected character
Data is inserted into the database
Administrator can either view the characters image gallery, view who the
current character interacted with, go on to another page or logout
Logs the user out or redirects to another page
viii
Display information
End User
The device application will display all available information by
using the biometric image captured.
Device application successfully launched
Information displayed
Basic course of Actions
The Device application resets the alert indication (i.e. all information displayed
chronologically)
The device application displays to the user the information that match entries
in the Database
Use case ends
Alternate of courses of Action
Alternative course A: 2. If captured image does not match any entries in the database, access
the details of the information
Alternate Course A : 3. Use case ends
Review (Update) Analyses Use case
Use case name
Actor(s)
Description
Precondition
Post condition
Review analyses
Administrator
The Administrator is able to look frame analyses or documents
by other user or their own
Frames must already be analyzed and documents must be
submitted in order for them to be reviewed later
Users can only make changes to their own frame analyses or
documents submitted
Basic course of Actions
Administrator logs into the system
Verification login information is correct
Administrator clicks on review link
ix
A grid view is made available returns review that have already been entered
into the system
Administrator selects review from a grid view
A new page displays with a drop down list of reviews from a particular photo
and documents submitted
Administrator selects a review from a drop down list or a document from a
grid view
Administrator views this information
Verification user is able make changes, redirects to the home page, logs the
user out.
Administrator can make changes, return to main menu or exit by logging out
Alternate of courses of Action
Alternative course A: 2. If the Administrator fails verification at the login, an error message
will displayed, user will not be able to access the system and the user will be prompted to try
again
Alternate Course A : 9. If Administrator fails verification to make changes, an error message
will display and the user will be unable to make any changes, go to step 10
Alert Notice Use case
Use case name
Actor(s)
Description
Precondition
Post condition
Alert notice
End User
The system will continuously monitor the return responses and
indicate when there is a positive match response received
The system application must be launched with an active
connection
Matched transaction is indicated
Basic course of Actions
Checks if there is a new match response
If there is a new match the system application presents to the user
Use case ends
11
5 Specific Requirements
5.1 Functional Requirements
In this section, we are included the set of functional requirments. Each functional requirement are
carried out with brief explanation.
In a database , the admin will register each of the teacher name and their unique finger print.
Later on , this information will use for the proper indentification.
Our system will be uniquely identify each of the teacher in the department.
When teacher enters and leave the department , identification is done.
This system will be able to store all teacher information into database.
12
When the identification period is done, a text file is created which consist of records of
the teacher name date , in out time, finger print, all personal and professional
information.
The system will be able to download the indetification data into the Microsoft Excel
readable text file.
In an Excel spreadsheet, the data should be formatted.
The software will support when multiple concurrent access user terminals.
The software will handle the textual and finger information
With the client (users) and servers running on the same machine, then the response time
will be maximum of 2 sec.
But mostly 95% transactions are proceed within the less than 5 sec.
5.2.4 Maintainability
The system shall be distributed with independent modules or classes for database interface for the
databases. This independency brings to easy testability, maintainability, flexibility and easy to use.
In general, after the system has been produced, change or improvement may be needed. This could
happen because design faults are identified after the system has been failed tested or because
functions need to be added.
12
5.2.5 Accuracy
Human face and fingerprint recognition system need an accurate and correct data from the system
that he/she uses for the preparation of reports as well as to make relevant decisions.
5.2.6 Backup
There should avoid damaging the record. A simple backup function for the whole teacher
attendance data.
Appendix A: Glossary
SRS: Software Requirement Specification
RAM: Random Access Memory
OS: operating system
DB: Databases
SQL: Structured Query Language