CHAPTER TWO
LITERATURE REVIEW
2.0 Introduction
This chapter contains overview of the broad area and review of developmental technologies and
platforms used as well as the review of related works concerning the Computerized Attendance
Management System. Nowadays many schools are using a manual monitoring system and most
of the time they accidentally loss their attendance sheet so that they cannot properly monitor the
attendance of their Teachers.
Web service for Student Class Attendance management is a simple application that runs on the
web. It is built around the Web browser standards and can be used by any browser on any
platform. The important benefit of Web Services is typically work outside of private networks,
offering developers a non-proprietary route to their solutions. Services developed are likely,
therefore, to have a longer life-span, offering better return on investment of the developed
service. Web Services also let developers use their preferred programming languages. Web
Services are virtually platform-independent. Web Services allow the business logic of many
different systems to be exposed over the Web. This gives your application Services that they
need. Instead of re-inventing the wheel for each client, you need only include additional
application-specific business logic on the client-side. This allows you to develop services and/or
client-side code using the languages and tools that you want. Web Services provide not a
component-based model of application development, but the closest thing possible to zero-
coding deployment of such services. This makes it easy to reuse Web Service components as
appropriate in other services. It also makes it easy to deploy legacy code as a Web Service. In
this project using web services we will be developing Student Attendance Information
Management System. This system is developed for managing daily student attendance in
schools, colleges and institutes. The purpose of building this application is automating the
traditional manual process of attendance, which involved tedious work. It also avoids proxy
attendance. Data accuracy is maintained, within a short span of time. As the attendance is
maintained in registers it is very cumbersome to manage, track and update the data. Having
backup is also very difficult in this method.
Attendance is the act or fact of attending school or college. Also, attendance is used to define the
number of persons present on a particular day at school. An attendance policy provides the
guidelines and expectations for students’ attendance at school as defined, written, disseminated,
and implemented by the school. Depending on the school, attendance may be entered by the
class representative or by the teachers, or possibly, both. Attendance can be recorded in many
ways such as using web based, RFID, biometrics and bar code scanner. Since most of the
application developed nowadays requires the world wide accessibility, web based system is the
most common attendance system that is available. Hence we are deploying Student Attendance
Management System using Web Service.
2.1 Literature Survey
The literature survey method is an examination of information on specific subject. It is reviewing
what is known, and not what is assumed. It aims to create the final, precise representation of the
knowledge and research-based theory available topic. This method is going to be used due to
need of gathering and processing theoretical base. We are going to use different books and
articles also other sources like tutorials and forums. In this way by using different group of
sources we can get more detail idea about recommendation systems. There are plenty of
educational institutions that use RFID technology to record their student’s attendance. Easy
connection of data into internet make RFID technology most common technology used in
recording student attendance However, RFID technologies incur high cost and need experience.
people to handle the system. Apart from that, biometrics technology is another tremendous use of
technology in the domain of attendance reporting and tracking. Most of the biometrics
technology used thumb print as sign of system entry. This allows a fair and reliable attendance to
be recorded since there is no platform for any attendance cheating Biometric utilize the
fingerprint apart from thumb print method. Fingerprint peripheral used to record the attendance
and sent the data into system using wireless technology. Image recording is another recent
method used in recording attendance. These advanced technologies require high costing and
well-trained system developer. The Design and implementation of Student Attendance
Management system based on MVC paper aims at the research of Web technology, as well as the
attendance management system based on the campus network for all college students is
implemented. The system is controlled by Web Work, while data or status and logic process are
enforced by “Action”. The system uses Multi-layer structure of J2EE which has been realized by
Free Marker, Web work and Spring. Three technologies have been used in page resources layer:
HTML performs structure of document, CSS defines style of document and JavaScript decides
behavior of document. The presentation layer is realized by JSP in traditional Web development.
The modules of attendance management system include importing course-plan, adding,
modifying, querying, verifying and summarizing attendance information. The purpose of
Automation of Attendance System using RFID, Biometrics, GSM Modem with .NET framework
paper is to develop a wireless system to detect and maintain the attendance of a student and
locate a student using RFID, Biometrics, GSM modem with .net framework. For, this the
student’s ID (identification) card is tagged with an Radio-frequency identification (RFID)
passive tag which is matched against the database and only finalized once his fingerprint is
verified using the biometric fingerprint scanner. The guardian is intimated by a SMS (short
message service) sent using the GSM (Global System for Mobile Communications) modem.
RFID transponder is installed, which will be detecting the location of the student and staff. There
will be a website through which the student, teacher and the guardians can view the status of
attendance and location of a student at present in the campus. A person needs to be located can
be done by two means that is, via the website or by sending the roll number of the student as an
SMS to the GSM modem which will reply by taking the last location stored of the student in the
database. The main purpose of A Web Enabled Secured System for Attendance Monitoring and
Real Time Location Tracking using Biometric and Radio Frequency Identification paper is to
develop a safe and secure web based attendance monitoring system using Biometrics and Radio
Frequency Identification (RFID) Technology based on multi-tier architecture, for both computers
and smart phones. The system can maintain the attendance records of both students and faculty
members of an institution. The system can also detect the current location of the students,
faculties, and other staff members anywhere within the domain of institution campus. With the
help of android application one can receive live feeds of various campus activities, keep updated
with the current topics in his/her enrolled courses as well as track his/her friends on a real time
basis. An automated SMS service is facilitated in the system, which sends an SMS automatically
to the parents in order to notify that their ward has successfully reached the college. Parents as
well as student will be notified via e-mail, if the student is lagging behind in attendance. There is
a functionality of automatic attendance performance graph in the system, which gives an idea of
the student’s consistency in attendance throughout the semester. In Mobile Ubiquitous Employee
Attendance Monitoring System using Wireless sensor networks paper a Mobile Ubiquitous
Employee Attendance Monitoring System (MUEAMS) is implemented with ZigBee devices to
offer real time dynamic monitor for employee presence. This study presents a scalable
architecture to integrate wireless sensor networks and mobile technologies for dealing with
attendance monitoring application in mobile ubiquitous computing environments. The wireless
communication architecture is composed of ZigBee Sensor Network, Mobile Transfer,
Middleware Web Server, and Mobile Client. The main advantage of this architecture is that it
doesn't require costly equipment or deployment. It can be achieved in a short time and low cost.
To demonstrate the feasibility of the architecture, a Mobile Ubiquitous Employee Attendance
Monitoring System (MUEAMS) is implemented with ZigBee and Mobile devices to offer real
time dynamic monitor for employee presence. The focus A Conceptual Model for Automated
Attendance Marking System Using Facial Recognition paper is to analyze and critically evaluate
the recent attendance marking techniques using face recognition methods. Literature review
reveals the fact that the intelligent application of iterative facial recognition techniques can make
attendance management systems more reliable. In this paper, the purpose is a conceptual model
for automated attendance system through facial recognition. The proposed model uses an integral
validation process which enhances the reliability of your model. If face recognition is to be done
to mark attendance, face detection and verification would be a challenge for the system. Hence
the implementation is a difficult task.
2.2 Theoretical framework is the combine idea of the proponents to the stated system.
The study of this procedure is important because many schools encounter the same problem
during their attendance monitoring. It may become stepping stone in a more organize and
productive system of procedures in the future. This study wants to help other school’s to be
innovated involving the use of computerization inside the campus and also for future proponents
that will be involve in this kind of study.
Attendance Management System Process
In the present system all work is done on paper. The whole session attendance is stored in
register and at the of the session the reports are generated. We are not interested in generating
report in the middle of the session or as per the requirement because it takes more time in
calculation. At the end of session, the students who don’t have 75% attendance get a notice. by
selecting from and to dates. We can view the subject code, subject name, total number of classes
conducted, total number of classes attended and the attendance percentage. Separate modules are
written for each of the following functions.
Proposed System
To overcome the drawbacks of the existing system, the proposed system has been evolved. This
project aims to reduce the paper work and saving time to generate accurate results from the
student’s attendance. The system provides with the best user interface. The efficient reports can
be generated by using this proposed system.
Advantages of Proposed System
It is trouble-free to use.
It is a relatively fast approach to enter attendance
Is highly reliable, approximate result from user
Best user Interface
Efficient reports
2.3 Review of Related Works
2.3.1 Web Based Student Information Management
S.R. Bharamagoudar et al., this paper assist in automating the existing manual system. It can be
monitored and controlled remotely. This paper provides accurate information always. All years
together gathered information can be saved and can be accessed at any time. The purpose is to
design a college website which contains up to date information of the college. That should
improve efficiency of college record management.
2.3.2 Attendance Management System
G. Gangagowri et al. this system is used Way to SMS software. This software is used to send SMS
easily to their parent’s. This system can store their data about the students and those cares absent
student details. It is an efficient method to store the attendance in the Web Site rather than
wasting the paper. It also updates the student report directly on the server reducing the faculty’s
time on logging from the computer.
2.3.3 Online Student Attendance System
P. N. Garad et al, in this project, we gave access to three users i.e. Admin, Student, Others. This
project is based on client-server. Here, the serve is Tomcat and client is JSP. In this project
teachers or the admin will be filling attendance and sending message to the student who is
absent. They will have privilege to fill attendance form, update attendance form, send message to
the guardian’s account whose child is absent, also those attendance is less than 75%, and they
also have privilege to send message to the students whose fees are pending. he staff can also
view the message whenever they want and also can modify the details of students. Parents have
privilege to view attendance and to view message sent by the teacher. Students also have their
account with the privilege to view message sent by the subject teacher and to view the
attendance.
2.3.4 Web Based Coaching Institute Management System
Mayuri Kamble et al, “Coaching Institute Management System” software developed for an
institute has been designed to achieve maximum efficiency and reduce the time taken to handle
the storing activity. It is designed to replace an existing manual record system thereby reducing
time taken for calculations and for storing data. The system is strong enough to withstand
regressive daily operations under conditions where the database is maintained and cleared over a
certain time of span. The implementation of the system in the organization will considerably
reduce data entry, time and also provide readily calculated reports.
2.3.5 Classroom Attendance Application
Pranjul Khare1 et al, the scope of the project is the system on which the software is installed, i.e.
the project is developed as an ANDROID application, and it will work for a particular institute.
Android is a mobile operating system (OS) based on the Linux kernel and currently developed
by Google with a user interface based on direct manipulation. RAD approaches to software
development have put less emphasis on planning tasks and more emphasis on development. It
has revealed that an online system for recording and reporting students ’attendances is indeed a
needed application in order to make the process more efficient and time-saving where more than
70% of the sample group agreed to that matter.
2.3.6 Daily Time Record System
Modern technology is a part of our daily life. It helps individuals and industries perform their
tasks and daily routines, including their transactions. Modern technology gives an advantage in
attaining our work. This technology consists of devices and information systems that help us
attain faster and reliable transactions. Each system lessens the load in personnel and paperwork
of the management. Today, organizations and other establishments rely on computers as the
basis of their Database Management System. Computer technology brought significant and
various effects in all forms of human life such as helping people do their job faster, accurate and
efficient. But the fact is, in today’s modern age where computer has become a way of life, it is
obvious that a bulk of country institutions still do not accommodate the high technology. Some
of them prefer a manual because not all companies are computer literate in terms of
programming software for the Time-In and Time-Out Records of their employees. What they did
not know is that being manually operated leads to inaccurate information. The EASTERN Tanay
Supermarket in Tanay, Rizal is a company wherein they do execute manual for keeping the daily
time record of their employees. When it comes to paper works, the establishment works in
manual operation like writing the employees’ information and the Time-In, Time-Out operation
in a blue record book and then put it in file cabinets along with other forms such as planning
records, events, leave assistance and more. The punctuality Employees of EASTERN
Supermarket recorded in a Daily Time Record that is being confirmed at the end of the day.
These are the few things that EASTERN confronted in their daily work. In addition, depending
on the manual procedure is not an easy work for them. Because of having a lot of information, at
times it points to incorrect input of employee records, unreliable and most especially, not secures
confidential files. (Sharina Joy, Daily Time Record System, 2013)
2.3.7 Attendance Monitoring System
The computerized Students monitoring system that researchers developed is definitely for ID and
Student’s verification only. The main objective of our system is to check whether the student has
an authorized ID or a falsified one and to verify whether the student is properly enrolled in the
school. The application of the RFID Matrix card system as a boarding student monitoring system
was suggested to improve the management system and to monitor the activity group movement.
The unique RFID tags enable management to path the student’s movement in and out of the
campus. A particular without RFID card will generate the alarm and this will notify school
administration about the availability of using an online monitoring system. This system used the
main component of the RFID system, database management system, and wireless networking.
RFID tag passes through the RFID reader in a read range zone, the system recorded data from
the RFID tag to the database. Data sent online to the management for the supervision of the
students. At some point, we noticed that the registration must be covered as well. The main
reason why is that there are some records to be considered with regards to the student’s
important records in the registration files like the situation of a student in their school. All in all,
we can say that this system is more efficient and less time consuming for the school to identify
whether the student is officially enrolled and has an authorized school ID. (Joyce Erika Salud,
Attendance Monitoring, 2013).
2.3.8 Barcode Attendance Monitoring System
Monitoring is one of the great responsibilities of a teacher. This includes teaching lessons to
his/her students, writing lesson plans, and recording the achievement of the students. Teachers
have a lot of things to do in their daily routine, due to this daily task, they consume much time in
doing paper works and preparing some devices as they are required to perform because they
operate these tasks manually. The researchers will build an automated attendance monitoring
system for students using a barcode reader. Using the barcode reader, the teacher will have a
connection to the profile of each student, which will be identified by reading his or her
identification card. At the same time, this system will send a message to the parents to notify
them that their child is within the school-bound. Since the students will just put their ID’s direct
to the barcode reader, the teacher will have no more rush in monitoring the attendance of his/her
students. Furthermore, the school can assure the security of their students because it will
recognize the attendance of each student. The parents are also guaranteed the presence of their
children in school. There is a need to develop a new system because of the grievance of most of
the teachers about their daily tasks. The new system will provide a simple process for the
teachers in monitoring the students and in alerting the parents
through SMS. Therefore, the number of tasks to be done by teachers will be lessened. (Alvin
Johnson, 2015)
2.3.9 Data Security
A computer security risk is any event or action that could cause loss of or damage to computer
hardware, software, data, information, or processing capability. Some breaches to computer
security are accidental, others are planned imposition. Some infiltrators do no damage; they
merely access data, information or programs on the computer before logging off. Other
infiltrators indicate some evidence of their presence either by leaving a message or by
deliberately altering or damaging data. Computer systems are vulnerable to many threats which
can expose various types of damage resulting in significant losses. Damage can range from
minor errors that SAP database integrity to fires which destroy entire computer centers. Losses
can stem from the actions of supposedly trusted employees deceive the system to outside hackers
roaming freely through the Internet. The exact amount of computer-related losses is
impenetrable; many losses are never discovered and others are covered up to avoid adverse
publicity. (Rachelle Lucaña, 2012)
2.4 Literature Review Table
YEAR AUTHOR(S) OBJECTIVES METHODOLOGY FINDINGS PROBLEMS
2017 Monica.C, Data of student has The design is expressed The Existing The
Nithya.R, been computerized in sufficient detail so as system is a requirements
Prarthana.M, without using any to enable all the manual entry for the Software
Sonika.S.V, manual effort. developers to for the Admin to work are
Dr.M.Ramakrishn understand the and also much (Java,
a underlying architecture Faculty. Here Tomcat, PHP,
of Attendance system. the attendance Perl, MySQl,
will be carried Apache Web
out in the hand Server) etc.
written A final version
registers. was not made as
Maintaining the of then.
records for the
Faculty is a
tedious job. The
retrieval of the
information is
not as easy as
the records are
maintained in
the registers.
2016 Anusha V Pai, Analyzed report of This methodology Data accuracy Unable to create
Atul Krishna, the pattern of contains three major is maintained, final, precise
Kshama P M, student attendance phases, a.ka, attendance within a short representation
Menita Correa and time marking, attendance span of time of the
management management and report knowledge and
generation. User research-based
authentication is one of theory available
the major factors in topic
attendance monitoring
system.
2016 Abdoulrahmaine Create a Window In this we study it The new system Existing system
Mohammad, application to be capable of eliminating has been requires lot of
Mohammad Elmi used in place of time wasted during designed as per paper work.
Hassan, old paper based manual collection of the user Loss of even a
Muslim Musa, user Employee attendance and for the requirements so single
Salary manage educational as to fulfill register/record
process administration almost all them. led to difficult
-User friendly situation
-Report because all the
Generation papers are
-Less paper needed
work to generate the
reports.
2017 Shivani Jijankar, we have proposed In this we study it All the data is It requires
Anand Dhore, a system which capable of eliminating stored in the hardware for
Arti Sanganwar, will not only make time wasted during database. The execution
Kapil Chalkhure, the entire process manual collection of Client accesses (RFID) which
Prof Vikramsingh simple, but will attendance and for the this data using may lead to
R. Parihar also provide a educational internet. The another cost
well-structured administration database is
and analyzed accessed via
report of the Server and the
pattern of student application
attendance and works in the
time management browser.
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.0 Introduction
Analysis can be defined as breaking up of any whole so as to find out their nature, function etc. It
defines design as to make preliminary sketches of; to sketch a pattern or outline for plan. To plan
and carry out especially by artistic arrangement or in a skillful wall. System analysis and design
can be characterized as a set of techniques and processes, a community of interests, a culture and
an intellectual orientation.
This chapter will provide the detail analysis of the current manual system of attendance
management system and problem of the current system. It also aimed to determine how the new
system will be achieved and fact finding technique used in the development of the automated
system of attendance management system.
3.1 Description of The Current System
The Existing system is a manual entry for the students. Here the attendance will be carried out in
the hand written registers. It will be a tedious job to maintain the record for the user. The human
effort is more here. The retrieval of the information is not as easy as the records are maintained
in the hand written registers. This application requires correct feed on input into the respective
field. Suppose the wrong inputs are entered, the application resist to work. so the user finds it
difficult to use.
3.2 Software Development Life Cycle Model
The system development life cycle (SDLC) is a conceptual model used in project management
that describes the stages involved in an information development project, from the feasibility
study through maintenance of the completed software application.
For this project the
Incremental Software Development Model
Concurrent
Activities
Specification Initial Version
Outline Intermediate
Development
Description Versions
Validation
Final Version
3.3 Description of the Proposed System
To overcome the drawbacks of the existing system, the proposed system has been evolved. This
project aims to reduce the paper work and saving time to generate accurate results from the
student’s attendance. The system provides with the best user interface. The efficient reports can
be generated by using this proposed system.
3.4 Advantages of Proposed System
It is trouble-free to use.
It is a relatively fast approach to enter attendance
Is highly reliable, approximate result from user
Best user Interface
Efficient reports
3.5 Requirement Engineering
This is also known as Requirement Analysis; it is the process of determining user expectations
for a new or modified system. This is divided into Functional and Non-Functional Requirements.
3.5.1 Functional Requirements
This defines the function of a system or its component. It deals with what the system should do
or provide for users. Functional requirements for this software includes:
The Admin and the Teacher Shall be able to Login into the System using their unique username
and password.
The Admin shall be able to add students, teachers, courses, classes, holidays, check attendance
and validate teacher’s attendance.
The Teacher shall be check attendance, generate report of student and manage exams.
The attendee shall provide all the necessary registration details.
3.5.2 Non-Functional Requirements
Performance: easy tracking of record and updating can be done. All requirements relating to
performance characteristics of the systems are specified in the section below. There are two
types of requirements.
Static requirements: these requirements do not impose any constrain on the execution
characteristics of the system they are:
Number of terminals: the software make use of any underlying database that will reside at the
sever, while the front end will be available online to the administrative and departmental
computers as well as student and teachers.
Numbers of users: the number of users may vary, as this software find application in almost all
department of the organization.
Dynamic requirement: these specify constraints on the execution characteristics of the system.
They typically include response time and throughout of the system. Since these factor are not
applicable to the proposed software, it will suffice if the response tine is high and the
transactions are carried out precisely and quickly.
Availability: the software will be available only to authorized users of the college like teachers
to mark the students’ attendance, student to view enrolled course, admin to add an update student
records.
Security: the security requirement deal with the primary security. The software should be
handled only for the administrator and authorized users. Only the administrator has right to
assign permission like creating new accounts and generating password. Only authorized users
can access the system with user name and password.
Maintainability: backups for database are available.
Portability: the software is a windows-based application and is built in html and MYSQL. So it
is platform intendent and is independent of operating system.
Design constraints: this software provides security. The login form prevents the system from
being missed by unauthorized users. Only in authorized operator will be granted rights to modify
as per requirements. This software is also reliable and fault tolerant. The system developed is
designed to handle invalid inputs. Since reliability is also reliability is major area of concern the
system has a backup to avoid data loss. The user should know the programming language very
will that is used to develop software.
3.6 Techniques for gathering system requirements
The techniques I use to gather system requirements is Interviews with head of the department:
Conduct one-on-one interviews with the lectures to understand their specific needs and
requirements for the system. Ask about their day-to-day lectures, pain points, and desired
functionalities.
3.7 System Requirement Specification
System Requirements are the configuration that a system must have in order for a Hardware or
software application to run smoothly and efficiently. Failure to meet these requirements can
result in installation problems or performance problems. Its divided into two hardware
requirements and software requirement.
3.7.1 Hardware Requirements
Hardware requirement is the material that are need during the system development and this
requirement some of them are physical materials.
Table 1: Hardware Requirements
Hardware Minimum System Requirements
Processor 2.40GHZ speed or above with Intel Core 5 or
better
Random Access Memory (RAM) 4 GB
Hard Disk Space 500 GB
Monitor CRT or LCD Size 15 Or above
3.7.2 Software Requirements
Software Minimum System Requirements
Operating System Windows 10 and above
Database SQL
Development tools and Programming language HTML, CSS, and JavaScript for frontend
development. SQL for the backend Database
development.
3.8 Requirement Analysis
USE CASE: Use cases are scenario based in the UML which identify the actors in an
interaction and which describe the interaction itself.
3.9 System Design
System design is the process of defining the architecture, components, modules, interface, and
data for a system to satisfy specified requirement. this could also be seeing as the application of
the knowledge of System Analysis and Design to product development. System design is said to
be the descriptive in nature of what the system is and what it does and shows how the expected
program is to be operated.