0% found this document useful (0 votes)
25 views33 pages

Ready Report Att

Uploaded by

vijendracs21011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views33 pages

Ready Report Att

Uploaded by

vijendracs21011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 33

Student Attendance Management System

CHAPTER1
INTRODUCTION
INTRODUCTION

The Student Attendance Management System is a technologically advanced solution


for educational institutions. It operates daily with real-time attendance tracking,
subject-specific recording, and automated calculation. The system ensures security
through unique logins, generating comprehensive weekly reports for actionable
insights. With a user-friendly interface, it replaces manual methods, contributing to a
conducive learning environment by enhancing accuracy, efficiency, and overall
attendance management.

OBJECTIVES:

 Implement a system that automates the meticulous task of recording and


monitoring student attendance to replace manual methods.

 Utilize a robust digital platform to leverage technological advancements for


accuracy, efficiency, and real-time data entry.

 Assign responsibility to staff members handling specific subjects to ensure


subject-specific expertise in attendance recording.

 Implement a secure authentication mechanism with unique usernames and


passwords to restrict access and modifications to authorized personnel.

 Automate the attendance calculation process to reduce administrative burdens and


ensure accuracy in recording student presence during class periods.

 Generate detailed weekly reports providing insights into individual student


attendance and overall class trends, enabling institutions to make informed
decisions.

 Design the system with a user-friendly interface to facilitate easy navigation for
staff members, ensuring efficient data input and report retrieval.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 1


Student Attendance Management System

DELIVERABLES:

 Real-time monitoring system to ensure accurate attendance by marking students


present only if physically in class during the designated period.

 Improved accuracy in attendance tracking through subject-specific management


by assigning responsibility to subject-specific experts.

 Streamlined attendance management process and reduced manual workload


through the automatic calculation of attendance when a student is present during
a class period.

 Enhanced data security with separate usernames and passwords for staff
members, and an authentication mechanism restricting access to authorized
personnel.

 Detailed weekly reports providing insights into individual student attendance and
overall class trends, empowering staff with actionable insights for decision-
making.

 Intuitively designed interface for effortless input of attendance data and access to
reports, ensuring efficiency and accessibility for staff members.

CONSTRAINTS:

 The system assumes that the hardware infrastructure (servers, network devices) is
robust enough to handle real-time attendance tracking, automated calculations,
and report generation without significant performance issues.

 The system relies on stable internet connectivity for real-time monitoring and
data access. Any disruptions in internet services may impact the system's
functionality.

 Assumes that staff members are adequately trained to use the system. Inadequate
training may lead to errors in data input and report interpretation.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 2


Student Attendance Management System

 The implementation is subject to budget limitations, which may impact the extent
of technological features and security measures that can be integrated into the
system.

 The system assumes compatibility with existing software and hardware


infrastructure within the educational institution. Compatibility issues may arise if
the system needs to integrate with legacy systems.

ASSUMPTIONS:

 Assumes consistent engagement from staff members responsible for attendance


management. Inconsistent usage may lead to incomplete or inaccurate attendance
records.

 Assumes timely updates and maintenance of the system to address any potential
security vulnerabilities, ensure optimal performance, and incorporate new
features or improvements.

 The accuracy of real-time attendance tracking assumes that devices used for
marking attendance have synchronized and accurate time settings.

 Assumes that the system adheres to data privacy regulations and policies. Any
changes in regulations may require updates to the system to maintain compliance.

 Assumes that staff members assigned to subject-specific attendance management


have the necessary expertise in both the subject matter and system operation.

 Assumes that staff members adhere to security protocols, such as safeguarding


login credentials. Security may be compromised if these protocols are not
followed.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 3


Student Attendance Management System

CHAPTER2

CAPSTONE PROJECT PLANNING

Work Breakdown Structure :

This structured breakdown provides a clear outline of the tasks and activities required
for the successful development, implementation, and maintenance of the Student
Attendance Management System. Each phase is designed to ensure systematic
progress and effective project management.

 Project Management: Define project scope, identify stakeholders, establish


objectives, and conduct a feasibility study.

 System Design: Gather requirements, design the database schema, create the user
interface, define system architecture, and plan for security measures.

 Development: Set up the development environment, implement real-time


tracking, develop subject-specific attendance module, code automated attendance
calculation, implement user authentication, build a user-friendly interface, and
integrate multi-key computation for data security.

 Testing: Conduct unit testing, perform integration testing, carry out system
testing, conduct security testing, and verify user interface usability.

 Implementation: Develop user training materials, conduct training sessions,


deploy the system in the educational institution, and monitor initial system usage.

 Documentation: Document system requirements, create user manuals, compile


technical documentation, develop a troubleshooting guide, and document security
protocols.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 4


Student Attendance Management System

 Monitoring and Maintenance: Establish system monitoring procedures,


implement regular updates, monitor user feedback, address system issues and
enhancements, and ensure compliance with data privacy regulations.

 Project Closure: Evaluate project success criteria, obtain user feedback, document
lessons learned, handover project deliverables, and conduct a final project review.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 5


Student Attendance Management System

Time-line Schedule

A project timeline is a visual list of tasks or activities placed in chronological


order, which lets to view the entirety of the project plan in one place.

Sl, Task Name Duration Start Date End Date Assigned


No
01 27/02/2024 04/03/2024

Project 1 Week
management
02 06/03/2024 11/03/2024
Analysis 1 Week
03 13/03/2024 03/04/2024

Design 3 Week
04 04/04/2024 02/05/2024

Developing 4 Week
05 03/05/2024 25/05/2024

Testing and 3 Week


Production

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 6


Student Attendance Management System

COST BREAKDOWN STRUCTURE

Software and Hardware Costs:Encompasses expenses for software licenses,


development tools, server hardware, networking equipment, and user devices if
needed.

Training Costs:Covers development of training materials, facilities for training


sessions, and fees for external trainers if utilized.

Security Measures:Includes costs for security software licenses, audits, penetration


testing, and implementation of security protocols.

Documentation Costs:Encompasses tools for technical documentation, printing and


distribution of user manuals, and expenses related to documentation review.

Testing Costs:Includes testing tools and software, potential external testing services,
and expenses for user interface usability testing.

Implementation Costs:Covers deployment services and user support during the initial
rollout.

Miscellaneous Costs:Includes a contingency fund and expenses related to project


management tools and software.

Training and Professional Development:Encompasses continuous training for staff on


system updates and professional development for IT personnel.

Travel and Accommodation (if applicable):Includes expenses related to project


meetings, training sessions, or any necessary travel.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 7


Student Attendance Management System

PHASES in - Student Attendence Management System Cost distribution

Phase1: Strategy Document preparing 3k

Phase2: Higher level design and specification 4k

Phase3: Front end, UI &UX 4k

Phase4: Coding 7k

Phase5: Database designing 4k

Phase6: Testing and maintenance 4k

Phase7: Deployment 7k

Total amount 33k

Risk Analysis
Department of CSE, SET POLYTECHNIC, MELUKOTE Page 8
Student Attendance Management System

Risk Analysis in project management is a sequence of processes to identify the


factors that may affect a project’s success. These processes include risk identification,
analysis of risks, risk management and control,

Risk Identification

It is the procedure of determining which risk may affect the


project most. This process involves documentation of existing risks.

The input for identifying risk will be

 Risk management plan


 Project scope statement

 Understand and prepare detailed requirement and specifications


 Prepare high level and detailed design specifications of the system
 Prepare Test Plan and Test cases
 Perform unit testing, integration and system testing
 Demonstrate a bug free application after suitable modification if needed.

 Cost management plan


Software Requirement Analysis:25%
Data Base:16%
Front End :17%
Coding : 18%
Testing : 13%
Documentation: 11%

 Schedule management plan

Software Requirement Analysis:1week


Data Base:1week
Front End :2week
Coding : 4week
Testing : 2week
Documentation: 2week

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 9


Student Attendance Management System

 Human resource management plan


 Activity cost estimates
 Activity duration estimates
 Stakeholder register
 Project documents
 Perform quantitative risk analysis
 Plan risk responses
 Monitor and control risks

Control Risks

Control risk is the procedure of tracking identified risks,


identifying new risks, monitoring residual risks and evaluating risk.

The inputs for this stage includes

 Software Project management plan


 Risk register
 Work performance data
 Work performance reports

The output of this stage would be

 Work performance information


 Change requests
 Project management plan updates
 Project documents updates
 Organizational process assets updates

Conduct Procurement process

Conduct Procurement process involves activities like

 Selecting a seller
 Receiving seller responses
 Awarding a contract

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 10


Student Attendance Management System

The benefit of conducting procurement process is that it provides alignment of external


and internal stakeholder expectations through established agreements.

The input of the conduct procurement process includes

 Project management plan


 Documents for procurement
 Source selection criteria
 Qualified seller list
 Seller proposals
 Project documents
 Make or buy decisions
 Teaming agreements

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 11


Student Attendance Management System

SYSTEMDESIGN

DATA FLOW DIAGRAM


A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data
through an information system, modeling its process aspects. A DFD is often used as
a preliminary step to create an overview of the system, which can later be
elaborated. DFDs can also be used for the visualization of data processing
(structured design). A DFD shows what kind of information will be input to and
output from the system, where the data will come from and go to, and where the data
will be stored. It does not show information about the timing of processes, or
information about whether processes will operate in sequence or in parallel. Data
Flow diagrams in general are usually designed using simple symbols such as a
rectangle, an oval or a circle depicting a processes, data stored or an external entity,
and arrows are generally used to depict the data flow from one step to another.

External Entity:An external entity is a source or destination of a data flow


which is outside the area of study. Only those entities which originate or receive data
are represented on a business process diagram. The symbol used is an oval
containing a meaningful and unique identifier.
Process:A process shows a transformation or manipulation of data flows within
the system. The symbol used is a rectangular box
Data Flow:A data flow shows the flow of information from its source to its
destination. A data flow is represented by a line, with arrowheads showing the
direction of flow. Each data flow may be referenced by the processes or data stores
at its head and tail, or by a description of its contents.

Data Store:A data store is a holding place for information within the system. It is
represented by an open ended narrow rectangle. Data stores may be long-term files
such as sales ledgers, or may be short-term accumulations: for example batches of
documents that are waiting to be processed. Each data store should be given a
reference followed by an arbitrary number.

Level 0 - Context Data Flow Diagram

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 12


Student Attendance Management System

Fig: Context data flow diagram – Level 0


A context diagram is a top level (also known as Level 0) data flow
diagram. It only contains one process node (process) that generalizes the
function of the entire system in relationship to external entities.
Level 1 - Data Flow Diagram
Draw data flow diagrams in several nested layers. A single process node on a
high level diagram can be expanded to show a more detailed data flow diagram.
Draw the context diagram first, followed by various layers of data flow
diagrams. Data flow diagrams present the logical flow of information through a
system in graphical or pictorial form. Data flow diagrams have only four
symbols, which makes it useful for communication between analysts and users.
Data flow diagrams (DFDs) show the data used and provided by processes
within a system.

Level 1:

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 13


Student Attendance Management System

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 14


Student Attendance Management System

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 15


Student Attendance Management System

DETAILED DESIGN

Use case diagrams


Use case diagrams model the functionality of a system using actors and use
cases. Use cases are services or functions provided by the system to its users.
Use case diagrams are usually referred to as behavior diagrams used to describe
a set of actions (use cases) that some system or systems (subject) should or can
perform in collaboration with one or more external users of the system (actors).
Each use case should provide some observable and valuable result to the actors
or other stakeholders of the system.

Use cases:
A use case describes a sequence of actions that provide something of
measurable value to an actor and is drawn as a horizontal ellipse.

Actors:
An actor is a person, organization, or external system that plays a role in
one or more interactions with your system. Actors are drawn as stick figures.
Associations:
Associations between actors and use cases are indicated in use case
diagrams by solid lines. An association exists whenever an actor is involved
with an interaction described by a use case.

System boundary boxes:


You can draw a rectangle around the use cases, called the system
boundary box, to indicate the scope of your system. Anything within the box
represents functionality that is in scope.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 16


Student Attendance Management System

Use case Diagram

Use case Diagram

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 17


Student Attendance Management System

Literature survey

Explores the historical significance and practical applications of punch card


attendance systems, delving into the technology's evolution and its impact on
workplace or educational attendance tracking. The analysis covers the fundamental
characteristics of punch cards, such as data encoding through punched holes, and their
role in early computing systems. Specifically, the study investigates the
implementation of punch card attendance systems, highlighting the components
involved, including punch card readers, clock mechanisms, and unique identifiers for
individuals. The advantages and challenges of such systems are discussed,
emphasizing their simplicity, cost-effectiveness, and archival benefits, while
acknowledging limitations such as susceptibility to errors and lack of real-time
tracking. The research provides insights into the role of punch cards in recording
attendance, offering a historical perspective on a technology that has largely been
replaced by more advanced electronic systems in contemporary settings.

Observation survey:

 Generate accurate attendance records based on students' presence in class.

 Operates on a daily basis for systematic tracking of attendance for each student.

 Uses separate usernames and passwords for staff members.

 Ensures only authorized personnel can access and modify attendance records.

 Staff members assigned to specific subjects record attendance.

 Enhances accuracy by having subject-specific experts manage the process.

 Marks students as present only if physically present during the designated class
period.

 Minimizes errors and ensures the reliability of attendance data.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 18


Student Attendance Management System

CHAPTER3
APPROACH AND METHODOLOGY

Description of Technology used


Frontend: Django Python
Django: Django is a high-level Python web framework that enables rapid
development and clean, pragmatic design. It provides built-in features for
authentication, URL routing, database ORM (Object-Relational Mapping),
and templating. Django's "batteries-included" philosophy allows developers to
focus on building features rather than reinventing the wheel. In this app,
Django is used for developing the frontend interface, handling user
authentication, managing URLs, and rendering dynamic web pages.

Backend: Image Processing Python


Image Processing Libraries (e.g., OpenCV, Pillow): Python offers several
powerful libraries for image processing and computer vision tasks. OpenCV
(Open Source Computer Vision Library) and Pillow (Python Imaging
Library) are widely used for tasks such as image manipulation, object
detection, face recognition, and more. In this app, the backend component
utilizes image processing libraries to handle tasks such as image uploads,
resizing, cropping, and filtering.

Database: MySQL
MySQL: MySQL is an open-source relational database management
system (RDBMS) known for its reliability, performance, and scalability. It
provides features for creating, querying, updating, and managing relational
databases. In this app, MySQL is used as the database management system to
store user data, posts, chat messages, course registrations, and other relevant
information. The schema design ensures efficient storage and retrieval of data,
maintaining data integrity and consistency.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 19


Student Attendance Management System

Description of Hardware devices

Processor:
Pentium 4 or higher: The Pentium 4 processor is a central processing unit
(CPU) manufactured by Intel. It offers capabilities suitable for running basic
to moderate computing tasks. Emphasizing the Pentium 4 or a higher
processor indicates the minimum processing power required for the system.
Speed: 1.2 GHz or higher: The specified speed denotes the clock frequency
of the processor, measured in gigahertz (GHz). A speed of 1.2 GHz or higher
ensures adequate processing power to handle computational tasks efficiently.

RAM (Random Access Memory):


2GB: RAM is a form of volatile memory that the computer uses to
temporarily store data and execute programs. The specified RAM capacity of
2GB indicates the minimum memory requirement for the system. With 2GB
of RAM, the system can handle basic multitasking and run lightweight
applications smoothly.

Hard Disk:
20GB: The hard disk is a non-volatile storage device used to store data
permanently. The specified capacity of 20GB denotes the minimum storage
space required for installing the operating system, applications, and storing
user data. While 20GB may seem small by modern standards, it is sufficient
for basic computing needs.

Description of software Products

Django Python: Django is a high-level Python web framework that enables


rapid development of web applications with clean, pragmatic design. It
follows the model-view-template (MVT) architectural pattern and includes
built-in features for authentication, URL routing, database ORM, and

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 20


Student Attendance Management System

templating. Django's "batteries-included" philosophy provides developers


with tools to quickly build robust web applications. Django is used for
developing the frontend interface of the Student Notification System App. It
handles user authentication, URL routing, rendering dynamic web pages, and
interacting with the backend components.

Image Processing Python (utilizing libraries like OpenCV, Pillow): Python


offers several powerful libraries for image processing and computer vision
tasks. OpenCV (Open Source Computer Vision Library) and Pillow (Python
Imaging Library) are commonly used for tasks such as image manipulation,
object detection, and face recognition. These libraries provide APIs for
loading, processing, and saving images in various formats. Image processing
Python libraries are utilized in the backend component of the Student
Notification System App. They handle tasks such as image uploads, resizing,
cropping, and filtering. Additionally, these libraries can be used for
processing profile pictures, course materials, or any other images uploaded by
users.

MySQL: MySQL is an open-source relational database management


system (RDBMS) known for its reliability, performance, and scalability. It
provides features for creating, querying, updating, and managing relational
databases. MySQL supports SQL (Structured Query Language) for interacting
with databases and offers various storage engines to optimize performance
and storage requirements. MySQL serves as the database management system
for storing and managing data in the Student Notification System App. It
stores user data, posts, chat messages, course registrations, and other relevant
information. The schema design ensures efficient storage and retrieval of data,
maintaining data integrity and consistency.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 21


Student Attendance Management System

Programming language

Python: Python is a high-level, interpreted programming language known


for its simplicity, readability, and versatility. It supports multiple
programming paradigms, including procedural, object-oriented, and
functional programming. Python has a rich ecosystem of libraries and
frameworks that facilitate rapid development across various domains. Python
is the primary programming language used for both frontend (Django Python)
and backend (Image Processing Python) development in the Student
Notification System App. It is well-suited for web development, data
processing, and image processing tasks, offering extensive libraries and tools
for building robust and scalable applications. Python's ease of use, extensive
libraries, and strong community support make it an excellent choice for
developing the Student Notification System App, enabling efficient
communication, collaboration, and data management within educational
institutions.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 22


Student Attendance Management System

CHAPTER4
TEST AND VALIDATION

Testing is the systematic process of assessing a system or its


components to determine if they meet the specified requirements. This
evaluation involves comparing actual outcomes with expected outcomes,
uncovering any disparities. In simpler terms, testing involves the
execution of a system to pinpoint discrepancies, errors, or missing
elements in relation to the original intentions or requirements.
Testing is the methodical practice of making impartial judgments about
the degree to which a system or device aligns with, surpasses, or falls
short of the stated objectives.
A robust testing program serves as a valuable tool for both the
organization and the integrator/supplier. Typically, it marks the conclusion
of the "Development" phase of a project, establishes the criteria for project
acceptance, and signals the commencement of the warranty period.

PURPOSES OF TESTING

Verification of Procurement Specifications and Risk Management:


Firstly, testing ensures that the product or system aligns with the
functional, performance, design, and implementation requirements
outlined in the procurement specifications. Secondly, it plays a crucial role
in managing risks for both the acquiring organization and the system's
vendor/developer/integrator. It helps identify when the work has reached
completion, allowing for contract closure, vendor payment, and the
transition of the system into the warranty and maintenance phase.

Delivering High-Quality, Reliable Software to Customers: Software


testing aims to provide customers with software that is free of bugs and
highly reliable. The objective is to prevent any issues during the software's
usage, thus ensuring efficient utilization of the developed software. Given
the significant cost associated with software development, testing is a
Department of CSE, SET POLYTECHNIC, MELUKOTE Page 23
Student Attendance Management System

critical step to avoid potential losses for customers.

Additionally, testing serves the following purposes:


Analysis of Adherence to Requirements: Testing assesses whether the
developed application aligns with the specified requirements. It focuses on
detecting defects or errors in a program, project, or product based on
predefined criteria, which could be outlined in documents like scope
documents or High-Level Design Documents (HLDD).
Enhancement of Application Quality: Testing plays a crucial role in
improving the quality of an application by identifying and rectifying errors.
The more errors that are eliminated, the higher the overall quality of the
product. Testing serves purposes such as quality assurance, verification and
validation, and reliability estimation. It involves a trade-off between budget,
time, and quality.

Key factors necessitating testing for an application include:

Reducing Code Bugs: Testing aims to minimize the number of defects in


the code, enhancing the application's reliability and performance.

Delivering a High-Quality Product: Testing ensures that the final product


meets quality standards and performs as expected.

Verification of Requirement Fulfillment: Testing verifies that all specified


requirements have been met, aligning with customer expectations.

Customer Satisfaction: Testing strives to satisfy customer needs by


delivering a product that meets their demands and functions smoothly.

Bug-Free Software: Testing aims to provide software that is free of critical


bugs, minimizing potential disruptions for users.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 24


Student Attendance Management System

Earning Software Reliability: By identifying and addressing issues, testing


contributes to the overall reliability of the software.

Preventing User-Detected Problems: Testing helps avoid situations where


users encounter problems while using the software.

Behavioral Verification: Testing ensures that the software behaves as


specified,
adhering to the intended functionality.

Validation of User Requirements: It validates that what has been specified


matches the actual desires and needs of the end user.

In essence, testing is a vital phase in software development that serves the


dual purpose of ensuring compliance with requirements and managing risks
while delivering a high-quality, dependable software product to users.

Various methods are employed in software testing, and the following


descriptions provide a brief overview of some of these methods:

BLACK BOX TESTING

Black box testing is a technique that involves testing a software application


without any prior knowledge of its internal workings. Testers operate in a
manner where they are unaware of the system's architecture and do not have
access to the source code. Typically, during black box testing, testers interact
with the system's user interface, providing inputs and observing outputs,
without knowing how or where these inputs are processed.

WHITE BOX TESTING


White box testing, also known as glass testing or open box testing, entails a
comprehensive examination of the internal logic and structure of a software's
code. To perform white box testing on an application, the tester must possess

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 25


Student Attendance Management System

knowledge of the code's internal workings. Testers delve into the source code
to identify specific units or sections of code that may exhibit inappropriate
behavior.

GREY BOX TESTING


Grey box testing is a technique that falls between black box and white box
testing. In software testing, the adage "the more you know, the better" carries
significant weight when applying grey box testing to an application. Testers
have limited knowledge of the application's internal workings, and this
knowledge can vary. Unlike black box testing, where testers solely assess the
application's user interface, grey box testing allows testers access to design
documents and the database. This additional insight enables testers to better
prepare test data and scenarios when developing their test plans.
These testing methods cater to different levels of knowledge about the
software's internal architecture and logic. Black box testing focuses on
assessing functionality without diving into the code, white box testing delves
deep into code-level details, and grey box testing offers a middle-ground
approach with limited knowledge of the internal workings while having
access to key documents and data. Each method serves specific testing needs
and objectives within the software testing process.

Different levels of testing play distinct roles in ensuring the quality and
functionality of software:

UNIT TESTING

Unit Testing is a phase of software testing that concentrates on individual


units or components of a software/system. The objective is to confirm that
each unit operates as per its design.Unit testing is primarily executed by
developers (White Box Testing) before handing over the software for formal
testing by the quality assurance team. Developers employ separate test data
from that of the quality assurance team. The key goal of unit testing is to

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 26


Student Attendance Management System

isolate and demonstrate that individual program parts meet the requirements
and function correctly.
Limitations:
Unit testing cannot detect every bug in an application.
Evaluating every execution path in complex software is not feasible.
There's a constraint on the number of scenarios and test data developers
can use to validate the source code, necessitating the eventual merging of
code segments with other units.

INTEGRATION TESTING

Integration Testing is a phase in software testing where individual units are


combined and tested collectively as a group. The main purpose is to identify
issues in the interaction between integrated units.
Integration testing assesses whether combined parts of an application
function correctly when working together. Two common methods for
Integration Testing are Bottom-up Integration Testing, which begins with
unit testing and progressively combines units, and Top-down Integration
Testing, which tests higher-level modulesbefore lower-level ones.
In most comprehensive software development environments, bottom-
up testing is typically performed first, followed by top-down testing.
Modules, each containing related components, are tested individually in
the module testing process.
Integrated System Testing (IST) is a systematic technique for validating
the construction of the overall software structure while simultaneously
conducting tests to uncover errors related to interfacing. The goal is to test
the entire software structure dictated by the design, using unit-tested
modules.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 27


Student Attendance Management System

SYSTEM TESTING

System Testing is the subsequent phase of testing that examines the


system as a whole. After all components are integrated, the complete
application is rigorously tested to ensure it meets quality standards. This
type of testing is conducted by a specialized testing team.

System Testing assesses whether the integrated system/software


complies with the specified requirements. It is crucial for several reasons,
including being the first step in the Software Development Life Cycle
where the entire application is tested, verifying adherence to functional
and technical specifications, testing in an environment similar to the
production environment, and validating both business requirements and
application architecture.

System testing aims to have an investigative approach, scrutinizing not


only design but also behavior and user expectations. It goes beyond the
boundaries defined in software/hardware requirements specifications.
Other testing models fall under the umbrella of System Testing.

In essence, these levels of testing progressively ensure the reliability,


functionality, and compliance of software with requirements, from
individual units to the complete integrated system.

ACCEPTANCE TESTING
Acceptance testing, also known as User Acceptance Testing (UAT), is a
crucial phase in the software testing process where a system is evaluated
for acceptability. The primary purpose of this testing level is to assess
whether the system aligns with the business requirements and determine if
it's suitable for delivery. User Acceptance Testing (UAT) is carried out
either by end-users or on behalf of them to ensure that the software
functions in accordance with the Business Requirement Document. UAT
focuses on several key aspects:
 Ensuring that all functional requirements are met.
Department of CSE, SET POLYTECHNIC, MELUKOTE Page 28
Student Attendance Management System

 Achieving all performance requirements.


 Verifying compliance with other requirements such as
transportability, compatibility, and error recovery.
 Ensuring that acceptance criteria specified by the user are satisfied.

Arguably, UAT is one of the most critical types of testing because it's
conducted by the Quality Assurance Team, responsible for gauging
whether the application aligns with the intended specifications and meets
the client's requirements. The QA team typically uses predefined scenarios
and test cases to evaluate the application thoroughly.
Additionally, acceptance tests serve as a means to gather insights about
the application's performance, accuracy, and the reasons behind the
project's initiation. These tests aim not only to identify simple issues like
spelling mistakes or cosmetic errors but also to pinpoint any critical bugs
that could lead to system crashes or major errors in the application. By
conducting acceptance tests, the testing team can gain a better
understanding of how the application will perform in a production
environment.

REGRESSION TESTING

Regression testing is conducted to assess changes in software behavior


resulting from modifications or additions. Its purpose is to ensure that
changes, even minor ones, do not lead to unexpected issues within the
application. The primary goal is to identify any unintended consequences
of alterations, such as a bug fix potentially causing a new functionality
problem or a violation of business rules.
Regression testing is vital for several reasons:
 It minimizes gaps in testing when changes are made to an
application, ensuring that all aspects are thoroughly tested.
 It verifies that changes made, such as bug fixes, do not negatively
impact other areas of the application.
 Regression testing helps mitigate risks associated with software
changes.
Department of CSE, SET POLYTECHNIC, MELUKOTE Page 29
Student Attendance Management System

 By increasing test coverage without extending timelines, it


enhances overall testing efficiency.
 It accelerates the time to market for the product by quickly
validating changes and preventing the introduction of new issues.
Acceptance testing evaluates the system's suitability for delivery and
alignment with business requirements, while regression testing ensures
that changes in software behavior do not introduce unexpected issues.
Both testing levels are crucial for delivering reliable and high-quality
software.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 30


Student Attendance Management System

CHAPTER5
CONCLUSION

The Student Attendance Management System presents a comprehensive solution


for educational institutions to efficiently maintain and manage students' attendance
details. Operating on a daily basis, the system ensures accurate attendance records by
tracking students' presence in class in real-time. Staff members are provided with
separate usernames and passwords, ensuring security and restricting access to
authorized personnel only. Subject-specific experts are designated to record
attendance, enhancing accuracy and reliability in attendance tracking. Automation
streamlines the attendance calculation process, reducing manual workload and
minimizing errors. Weekly attendance reports offer insights into individual student
attendance and class attendance trends, empowering educators to identify patterns and
take necessary actions. The user-friendly interface facilitates easy navigation for staff
members, making inputting attendance data and accessing reports intuitive and
efficient. Overall, the Student Attendance Management System provides an efficient
and reliable solution for educational institutions to monitor and maintain accurate
attendance records, ultimately contributing to improved administrative efficiency and
student outcomes.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 31


Student Attendance Management System

FUTURE ENHANCEMENT

The Student Attendance Management System offers an indispensable solution for


educational institutions seeking to enhance efficiency and accuracy in attendance
tracking. By leveraging real-time monitoring, subject-specific experts, and user-
friendly automation, the system ensures precise attendance records while reducing
manual workload and errors. The provision of weekly attendance reports equips
educators with valuable insights to address attendance patterns promptly, thus
fostering improved administrative efficiency and ultimately benefiting student
outcomes. With its comprehensive features and intuitive interface, the Student
Attendance Management System stands as a reliable tool for educational institutions
committed to maintaining accurate attendance records and facilitating a conducive
learning environment.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 32


Student Attendance Management System

REFERENCES

1. Punch Card available at, computerhope.com/jargon/p/punch card.html at


accessed, 10 Oct 2015
2. Punch Card attendance system bio enable tech.com/punch-card-attendance-
Html last accessed, 10 Oct 2015
3. Project Report on Attendance Management System, iisjaipur.org/iiim-
current,08/mca_iv_sem_pro_eva/15.project%20attendence%20managemnt
%20system.pdflast accessed, 10 Oct 2015
4. S. K. Jain, U. Joshi, and B. K. Sharma, “Attendance Management System,”
Masters Project Report, Rajasthan Technical University, Kota.
5. Attendance Management System ,academia.edu/9697549 attendance
management system 10 Oct 2015
6. Asghar MZ, Ahmad H, Ahmad S, Saqib SM, Ahmad B, Asghar MJ. Simplified
Neural Network Design for Hand Written Digit Recognition. International
Journal of Computer Science and Information Security. 2011 Jun 1;9(6):319
7. Asghar MZ, Ahmad S, Marwat A, Kundi FM. Sentiment Analysis on
YouTube: A Brief Survey. arXiv preprint arXiv:1511.09142. 2015 Nov 30.
8. Kundi FM, Asghar D, Zubair M. Lexicon-Based Sentiment Analysis in the
Social Web. Journal of Basic and Applied Scientific Research. 2014;4(6):238-
48
9. Asghar D, Zubair M. An Intelligent Agent for a Vacuum Cleaner. International
Journal of Digital Content Technology and its Applications. 2009;3(2):143-6.
10. Asghar MZ, Khan A, Ahmad S, Kundi FM. Preprocessing in natural language
processing. Editorial board.2013:152.
11. Asghar MZ, Khan A, Kundi FM, Qasim M, Khan F, Ullah R, Nawaz IU.
Medical opinion lexicon: an incremental model for mining health reviews.
International Journal of Academic Research. 2014 Jan 1;6(1):295-302.31
12. Asghar D, Zubair M. Lexicon based Approach for Sentiment Classification of
User Reviews. Life Science Journal. 2014;11(10):468-73.

Department of CSE, SET POLYTECHNIC, MELUKOTE Page 33

You might also like