Академический Документы
Профессиональный Документы
Культура Документы
KAKINADA
In partial fulfillment of the requirements for the award of the Degree of
BACHELOR OF TECHNOLOGY
In
COMPUTER SCIENCE AND ENGINEERING
By
P.CHAMUNDESWARI
(12481A05C0)
S.SAI SIRISHA
(12481A05C9)
Guided By
Ms. B. Asha Teja
Assistant Professor, CSE Department
2015-16
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
CERTIFICATE
This is to certify that the project Report entitled EMPLOYEE
ATTENDENCE TRACKING SYSTEM is a bonafide record of work carried out
by
P.Chamundeswari,S.SaiSirisha,K.NagaChandrasekhar,P.TarunNagaSaiKumar
under the guidance and supervision in partial fulfillment of the requirements for the
award of the degree of Bachelor of Technology in Computer Science And
Engineering of Jawaharlal Nehru Technological University Kakinada, Kakinada
during the academic year 2015-2016.
Project Guide
(Ms.B.Asha Teja)
ACKNOWLEDGEMENT
The satisfaction that accompanies the successful completion of any task
would be incomplete without the mention of people who made it possible and whose
constant guidance and encouragements crown all the efforts with success.
We would like to express our deep sense of gratitude and sincere thanks to
Ms.B.AshaTeja, Assistant Professor, Department of Computer Science and
Engineering for her constant guidance, supervision and motivation in completing the
project work.
We feel elated to express our floral gratitude and sincere thanks to
Dr. M. BabuRao, Head of the department, Computer Science and Engineering for his
encouragements all the way during analysis of the project. His annotations,
insinuations and criticisms are the key behind the successful completion of the project
work.
We would like to take this opportunity to thank our beloved principal
Dr. P. NageswaraReddy for providing a great support for us in completing our
project and giving us the opportunity for doing project.
Our Special thanks to the faculty of our department and programmers of
our computer lab. Finally, we thank our family members, non-teaching staff, attainders
and our friends, who had directly or indirectly helped and supported us in completing
our project in time.
Team members
P.Chamundeswari
S.Sai Sirisha
K.Naga Chandra sekhar
3
CONTENTS
TITLE
Page No.
1
ABSTRACT
CHAPTER 1: INTRODUCTION
2
1.1 Purpose
1.2 Scope
2
3
2.1Existing System
8
8
10
11
12
5.1 Introduction
13
14
5.4 Screens
15
33
6.1 Introduction
34
35
36
CHAPTER 7: RFERENCES
37
ABSTRACT:-
CHAPTER - 1
INTRODUCTION
Monitoring of employees all the time and storing their records
manually can be a big trouble. Many companies use conventional way of storing
data with orthodox help by using physical copies that are developed by pen and
registers. But they are not much effective and time saving.
Scheduling of employees
The reduction of time slips and mistakes can be achieved by using this system thus it
decreases the administrative issues. Some large companies where work schedules change
according to demands, these systems are being used. The use of this system has greatly
reduced the major issue Buddy Punching being faced by employers.
Another important fact that many automated software are available in the market that
record data by using cyber space and there is no need of labor work and thus useful in
understanding the beneficial trends of organizations employees about the time they spend in
the office. This software can provide a company with a complete record of employee
attendance from remote location anywhere in the world. Managers can be informed directly
through emails about any alarming situations. Even an employee is on vacation for some
reason then employee will be sure of getting 100% accurate data and 0% tampering chance as
far as this system is concerned. The software can also save salary expenses as there is no
manual labor involved thus chances of errors are eliminated.
These new systems may provide various methods of managing part-time employees
because it can cover the non-work schedules as lunch breaks, paid and unpaid time off and
6
overtime. These systems show a complete list of absenteeism and allow for late punches.
Many systems might use auditing and reporting tools as well as provide managers with a
detailed sheet of information about their employees.
The use of these systems is not needed in those companies where employees know
well that the business has to run properly and for profit only therefore they work hardly.
Employees know they have to complete their tasks and meet deadlines so they would take
time as needed and time off when possible in the tough schedule of the company. This can
have a positive effect on employees as well as on managers but in some companies they
require a deep and hard effort to manage the employee attendance.
Employee attendance tracking system is used in those organizations where
employees numbers hit 25 or 50 because the intensity of the need increases with the size of
the organization. Companies possessing more than 1000 employees purchase more complex
and well organized systems that can manage complicated scheduling tasks which may include
advanced labor planning and work availability schedules. Employee attendance tracking
system which is in fact Time and Labor Management system is specifically designed for
larger companies which perform more complicated functions.
session or in the between of the session.The scope of the project is the system
on which the software is installed, i.e. the project is developed as a desktop
application, and it will work for a particular institute. But later on the project can
be modified to operate it online.
CHAPTER 2
SYSTEM ANALYSIS
In the existing system all work is done on paper. The whole session
attendance is stored in register and at the end of the session the reports are
generated. We are not interested in generating report in the middle of the
session or as per the requirement because it takes more time in calculation.
Disadvantages of Existing system:1. Not User Friendly:- The existing system is not user friendly because the
retrieval of data is very slow and data is not maintained efficiently.
2. Difficultly
generate the report so it is generated at the end of the session. And the
student not get a single chance to improve their attendance.
3. Manual Control:-
4. Lots of paper work:- Existing system requires lot of paper work. Loss of
even a single register/record led to difficult situation because all the
papers are needed to generate the reports.
3. Very less paper work: - The proposed system requires very less paper
work. All the data is feted into the computer immediately and reports can
be generated through computers. Moreover work becomes very easy
because there is no need to keep data on papers.
10
considered
and
conclude
that
the
project
is
behaviorally feasible.
11
CHAPTER - 3
SYSTEM REQUIREMENTS SPECIFICATION
3.1
Software Requirements:-
Processor
RAM
: 512 MB or more
Hard disk
20 GB or more
Monitor
VGA/SVGA
Keyboard
104 Keys
Mouse
3.2
2 buttons/ 3 buttons
Hardware Requirements:-
: Html
: MS Access
12
CHAPTER 4
SYSTEM DESIGN
4.1 Introduction to system design:Design is the first step into the development phase for any
engineered product or system. Design is a creative process. A good design is the
key to effective system. The term design is defined as the process of applying
various techniques and principles for the purpose of defining a process or a
system in sufficient detail to permit its physical realization. It may be defined as
a process of applying various techniques and principles for the purpose of
defining a device, a process or a system in sufficient detail to permit its physical
realization. Software design sits at the technical kernel of the software
engineering process and is applied regardless of the development paradigm that
is used. The system design develops the architectural detail required to build a
system or product. As in the case of any systematic approach, this software too
has undergone the best possible design phase fine tuning all efficiency,
performance and accuracy levels. The design phase is a transition from a user
oriented document to a document to the programmers or database personnel.
System design goes through two phases of development: Logical and Physical
Design.
4.1.1 Input Design:-
14
Retrive
Login
Vi ew reports
Admi nistrati on
Add Employee
D elete Employee
View Employee
logout
15
Login
View Reports
user
Logout
Administration
Authentication
Home
Employee
Information
View
Reports
Logout
1: Login
2: Authentication
3: Fail
4: Success
5: Add Employee
6: View Employee
7: Delete Employee
8: Input date
9: Reports
10: Logout
16
User
Authentication
Home
View
Reports
Logout
1: Login
2: Authentication
3: Fail
4: Success
5: Input Date
6: View Reports
7: Logout
4.2
Database design:-
CHAPTER 5
17
SYSTEM IMPLEMENTATION
5.1
of
web
pages.
HTML
is
written
in
the
form
of HTML
elements consisting of tags, enclosed in angle brackets (like <html>), within the
web page content. HTML tags most commonly come in pairs like <h1> and </h1>,
although some tags, known as empty elements, are unpaired, for example<img>.
The first tag in a pair is the start tag, the second tag is the end tag (they are also
called opening tags and closing tags). In between these tags web designers can
add text, tags, comments and other types of text-based content.
The purpose of a web browser is to read HTML documents and compose them into
visible or audible web pages. The browser does not display the HTML tags, but uses the tags
to interpret the content of the page.
HTML elements form the building blocks of all websites. HTML allows images
and objects to be embedded and can be used to create interactive forms. It provides a means
to create structured documents by denoting structural semantics for text such as headings,
paragraphs, lists, links, quotes and other items. It can embed scripts in languages such
as JavaScript which affect the behavior of HTML web pages.
Web browsers can also refer to Cascading Style Sheets (CSS) to define the
appearance and layout of text and other material. The W3C, maintainer of both the HTML
and the CSS standards, encourages the use of CSS over explicitly presentational HTML
markup.
Microsoft Office Access, previously known as Microsoft Access, is a relational
database management system from Microsoft that combines the relational Microsoft Jet
Database Engine with a graphical user interface and software-development tools. It is a
member of the Microsoft Office suite of applications, included in the Professional and higher
editions or sold separately. In May 12 2010, the current version of Microsoft Access 2010
18
was released by Microsoft in Office 2010; Microsoft Office Access 2007 was the prior
version.
MS Access stores data in its own format based on the Access Jet Database
Engine. It can also import or link directly to data stored in other applications and databases.
Software developers and data architects can use Microsoft Access to develop
application software, and "power users" can use it to build simple applications. Like
other Office applications, Access is supported by Visual Basic for Applications, an objectoriented programming language that can reference a variety of objects including DAO (Data
Access Objects), ActiveX Data Objects, and many other ActiveX components. Visual objects
used in forms and reports expose their methods and properties in the VBA programming
environment, and VBA code modules may declare and call Windows operatingsystem functions.
5.2
Project Modules:
Admin Modules
User Modules
19
5.3
Screens:Admin module:
20
21
User Module:
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
CHAPTER 6
SYSTEM TESTING
6.1
Introduction:-
39
Test cases:
Sno
Test case
Test case
input
First Name
Text
First name
of the user
If
any
numbers
are given it
will
show
the error
Middle name
text
Middle
name of the
user
If
any
numbers
are given it
will
show
the error
Last name
Text
Last name
of the user
If
any
numbers
are given it
will
show
the error
Birth date
number
Date
birth
If the date
is
not
entered, it
will
show
the default
date.
Mail id
Password
Contact
Expected
output
of
Remarks
If email is
not
given
error occurs
Password
Password
If password
is not valid
gives error
occurs
Number
Number
If letters are
given it will
show
an
42
error
CHAPTER 7
RFERENCES
References:-
J. Ortega-Garcia, J.
Authentication
43
44