Finger Print Attendance
Finger Print Attendance
Finger Print Attendance
1.0 1.1Synopsis 1
1.2 Organization Profiles
5.0 Design 42
5.1Frontend design
5.2Backend design
7.0 Testing 72
8.0 Conclusion 76
10.0 References 80
CHAPTER 1
SYNOPSIS
In the current period due to the increase in the number of road accident and
kidnapping cases, parents always worry about their children’s. This paper is used and to
identify the students a biometric identification is used which is inbuilt in the system.
Whenever a student’s boards a bus, the biometric identification is done in the bus and the
system will identify the student and update login server will send to the office consisting
of the date and time. Officials can see the attendance of the students, they will be notified
when the students are getting into the bus or getting down from the bus. College bus plays
an essential role in carrying most of the students every day all over the world. While there
are several problems that might disturb the parents with respect to the travel of college
going students; the paper aspires to look into initiating the safety with respect of college
buses through bus tracking and security system that will help the school kids’
transportation in a protected and more secure way. The circumstance of forgetting kids on
the bus is one of the problems suffered, that has risen considerably in recent years. This
has often led to the demise of many students due to suffocation
1.2 ORGANIZATION PROFILES
ADMINISTRATION OFFICE
OFFICE ADDRESS:
No.17/595, 1st Floor Mannar Sarefoji Nagar 2nd Street,Opp.New Bus Stand,
Thanjavur-5.
CONTACT: 04362-228899, 9597754496.
E-MAIL: [email protected].
CHAPTER 2
SYSTEM ANALYSIS
2.1EXISTING SYSTEM
Upon observation of the processes in the office, manual processing is very evident
in most transactions running at the said office. Hence, it is assumed that the administrator
of the finds difficulties in managing the attendance system program in bus. Moreover, in
the traditional record keeping, other requirements for attendance can be misplaced.
Finding records is also a tedious job using the manual filing specially when there is a bulk
of compilations.
Disadvantages
Advantages
1. This reduces the need for any biometric scanner or any other device which
ultimately need immense amount of expenditure.
2. Tackle of human error.
3. Cost effective.
2.3 PROJECT DESCRIPTION
SYSTEM CONFIGURATION
Hardware Requirements
Hard disk : 1 TB
RAM : 4 GB
Processor : Core i3
Monitor : 15’’Color Monitor
Microcontroller
Fingerprint sensor
CHAPTER 4
SYSTEM DESIGN
4.1SOFTWARE DESCRIPTION
Micro-Controller.
ESP32 is a low-power, and highly integrated microcontroller that is widely used in the
Internet of Things (IoT) applications.
It is based on the Xtensa LX6 processor, which is a dual-core 32-bit microcontroller with
integrated Wi-Fi and Bluetooth connectivity.
The ESP32 features a wide range of peripherals such as GPIO, ADC, DAC, I2C, SPI,
UART, and more, which makes it highly versatile for a wide range of applications.
It also supports various development platforms such as Arduino, MicroPython, and ESP-
IDF, making it easy for developers to get started with the platform.
Fingerprint sensor
A fingerprint sensor is a biometric identification system that uses an individual's unique
fingerprints to authenticate or verify their identity.
The sensor captures an image of the fingerprint, which is then processed to extract unique
features of the fingerprint, such as ridge endings and bifurcations.
These features are then stored as a digital template, which is used to compare against
other fingerprints for identification or verification purposes.
Fingerprint sensors can be found in a variety of devices, including smartphones, laptops,
and access control systems. They are often used as a more secure and convenient
alternative to traditional authentication methods such as passwords and PINs.
4.2 DOMAIN INTRODUCTION
Internet of Things
Since the coining of the term in 1999, the internet of things (IoT) has transformed
from a mere vision to a palpable reality. This can be attributed to the extensive use of the
Internet Protocol (IP), the rise of ubiquitous computing, and the continued advancement
of data analytics, among other drivers of development. By 2020, it is estimated that there
will be 20.4 billion devices connected to the IoT. Despite its continuing expansion,
however, the IoT remains to some degree an obscure concept, something that’s often
referred to in abstract terms even as it provides manifest benefits.
The IoT can be described as an extension of the internet and other network
connections to different sensors and devices or “things” affording even simple objects,
such as light bulbs, locks, and vents, a higher degree of computing and analytical
capabilities.
Interoperability is one of the key aspects of the IoT that contribute to its growing
popularity. Connected or “smart” devices as “things” in the IoT are often called have the
ability to gather and share data from their environments with other devices and networks.
Through the analysis and processing of the data, devices can perform their functions with
little or no need for human interaction.
Given the ever-increasing number of connected devices, the IoT continues its path of
evolution, adding different layers to the data that is already being shared and processed,
and giving rise to sophisticated algorithms that result in improved levels of automation.
And because of the variety of “things” that can be connected to it, the IoT has enabled
diverse applications for individual users and entire industries alike.
4.3 DIAGRAMS
Block Diagram
Micro
Controlle Invalid
Finger Print
sensor r
Attendance
Entry
Architecture Diagram
Data Flow Diagram
A data-flow diagram (DFD) is a way of representing a flow of a data of
a process or a system. The DFD also provides information about the outputs and inputs of
each entity and the process itself. A data-flow diagram has no control flow; there are no
decision rules and no loops. Specific operations based on the data can be represented by
a flowchart.
Use Case Diagram
A use case diagram is a graphic depiction of the interaction among the elements of a
system. A Use case diagram is methodology used in system analysis to identify, clarify,
and organize system requirements .the actor, usually individuals involved with system
defined according to their roles.
Class Diagram
Class diagram is the type of static structure diagram that describe the structure of a
system by showing the systems classes, their attributes operations or methods under
relationship among the objects.
Activity Diagram
Activity diagram is another important diagram in UML to describe the dynamic
aspects of the system. Activity diagram is basically a flowchart to represent the flow from
one activity to another activity. The activity can be described as an operation of the
system. The control flow is drawn from one operation to another. This flow can be
sequential, branched, or concurrent. Activity diagrams deal with all type of flow control
by using different elements such as fork, join, etc.
E-R Diagram
An Entity Relationship (ER) Diagram is a type of flowchart that illustrates how
“entities” such as people, objects or concepts relate to each other within a system. ER
Diagrams are most often used to design or debug relational databases in the fields of
software engineering, business information systems, education and research.
CHAPTER 5
DESIGN
5.1 FRONTEND DESIGN
CHAPTER 6
SAMPLE CODING
TESTING
SYSTEM TESTING
TYPES OF TESTS:
UNIT TESTING:
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual
software units of the application .it is done after the completion of an individual unit
before integration.
This is a structural testing, that relies on knowledge of its construction and is invasive.
Unit tests perform basic tests at component level and test a specific business process,
application, and/or system configuration. Unit tests ensure that each unique path of a
business process performs accurately to the documented specifications and contains
clearly defined inputs and expected results.
INTEGRATION TESTING:
FUNCTIONAL TEST:
Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and user
manuals.
PERFORMANCE TESTING:
System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of system
testing is the configuration oriented system integration test. System testing is based on
process descriptions and flows, emphasizing pre-driven process links and integration
points.
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of
tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document. It is a testing in
which the software under test is treated, as a black box .you cannot “see” into it. The test
provides inputs and responds to outputs without considering how the software works.
ACCEPTANCE TESTING:
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered
CHAPTER 8
CONCLUSION
Fingerprint based attendance in bus for safety and security reason are incredibly
vital. Presently, as a result of an increase in mishaps of students getting out at wrong
status or student getting missed out at the bus this may lead to demise due to suffocation.
This proposal shows that finger print based college bus attendance technology is a
feasible alternative for supervising student’s attendance report during their drive to and
from college.
CHAPTER 9
FUTURE ENHANCEMENT
In future the work of instant messaging and further module development can be
done which will make our project fully automated and also more reliable software for the
event should be provided. Near future, will be given permission to access, like and
comment on it for better conduction of fest next year.
CHAPTER 10
REFERENCES