CHAPTER IINTRODUCTION IntroductionThe instructional presence of students could be very crucial because it will have an effect on college students from acquiring their know-how and abilities in addition to their grades. This project relates to scholar attendance gadget thru matching their fingerprint to verify their presence. The primary reason of implementing this task is to increase a student attendance device wherein web-primarily based packages are advanced to get pupil attendance with fingerprint.Due to the present day technological trends, especially within the discipline of verbal exchange and biometric technology, many programs seem to match our normal lives. Biometric generation is extensively used as a shape of user identification and manipulate. Finger is one of the many varieties of biometrics used to pick out individuals and affirm their identity. Fingerprint sensor is an electronic device used to capture digital photos of fingerprint patterns and cannot be created or destroyed.
This fingerprint feature makes it specific and very comfortable.The presence of FTMK Students Fingerprint Attendance may be diagnosed as the high-quality confirmation to music the document of the presence of person students. Additionally, according to trendy era, it’s far no longer uncommon to take the presence of students via their fingerprints. Therefore, the cause of fingerprint sensor implementation on this task is to make the each day recurring simple and cleanProblem Statement1.No backup for the attendance facts as soon as the lecturer accidentally lost the attendance sheet. At some point of the whole semester, the lecturer will most effective report and evaluate the attendance of college students via a piece of attendance sheet.
- Thesis Statement
- Structure and Outline
- Voice and Grammar
Nearly some weeks before the end of the semester, scholar attendance will be the important thing to the present day system by using the lecturer to supply a bar listing file. However if the lecturer loses the attendance sheet, which means the document could be misplaced and the lecturer will grow to be not capable of input the right attendance report into the device in the previous few weeks of the semester.2.
Course mate enables individuals who did now not attend the class sign the attendance which additionally referred to as ‘friend-signing’.Maximum of the time, teachers confronted a trouble with a class that turned into empty however a full list of attendance. This is because maximum college students will only attend instructions for the primary few weeks however afterwards they’ll ask their friends who’re usually attending instructions to help them sign up for attendance. In view that academics are always busy in university and do no longer have time to take a look at their presence separately, then college students take advantage of this factor to assist their buddies sign.3.Hard in studying and tracking pupil performances based on attendance thing.
In assessing the academic performance of individual college students, it is important to review the facts of their presence. therefore, through attendance records, teachers can easily discover whether college students with negative performance because of terrible attendance elements or other elements. with out right and accurate scholar attendance, it is difficult to evaluate the actual performance of terrible overall performance.?ObjectiveIn developing this device, several assignment goals had been decided. some of the goals of this undertaking have been identified and listed under.To replace existing student presence systems for computerized and automatic attendance device.2.
To increase laptop-based applications that reap student fingerprint every time they attend a class for attendance marker functions.3. To dispose of possibilities for college kids to ask their buddies for their presence through the implementation of the fingerprint attendance machine.Project Scope Student ModuleIn the student module, it allows users to include information for all students in schools, colleges, and universities. There are several functions provided in student modules that include student records, entering new student records, and updating student records.
Student information will not be removed / deleted and will be stored in the system as student history for future reference.Fingerprint moduleIn the fingerprint module, it is used to store fingerprints of all students into the system for future achievement while students attend each class for previously registered subjects. First, students will need to register their fingerprints into the system when they first come to class. Then, each time they attend a class, they need to scan their fingerprints through the hardware provided in the class to perform fingerprint matching with the fingerprint record that has been stored in the system. Attendance will be automatically signed by the system when the student fingerprint corresponds to the fingerprint record in the system. If a student’s fingerprint does not exist in the system when making a match, the system will ask for a message indicating “invalid fingerprint” while when the match is successful, the system will also prompt a successful message to indicate “Attendance taken” to let students know.
Report ModuleIn the report module, it is used to let users produce reports on student attendance records. First of all, each time the class is over, the student’s attendance list list for the class will be automatically sent to the system and stored. This report will be the presence of students for the whole semester. It aims to ease the lecturers and users in analyzing student attendance for the whole semester. In addition, the system automatically calculates the percentage of student attendance for the semester.
Users only need to generate reports without doing much calculations and adjustments. Project Impact, Significance, and ContributionIn the advanced initiatives, there are some contributions that are diagnosed. With the aid of imposing the Attendance Presence of FTMK Student Fingerprint Attendance, it will provide a extra unique and green student presence report to fully utilize the computerized device. With the aid of the usage of this gadget, users will truely realize that the procedure of this machine might be faster and less difficult than the complex machine nowadays.
Similarly, this machine can help teachers take student attendance greater successfully with out stressful approximately losing or destructive their attendance sheet while turning in it to students throughout the elegance.Further, as mentioned in advance, maximum universities are actually using a conventional attendance gadget that calls for students to sign on a paper gift and gift them to college students for the duration of the elegance in order that every student attends the elegance signing. Even though traditional attendance structures appear to be very powerful it is a sort of time-eating process and will intrude with the student’s recognition on paying attention to lectures in addition to at some point of the take a look at.
Consequently, in preventing this stuff from occurring once more, in an superior gadget, the system could be developed with a purpose to require college students to match their fingerprints as quickly as they input the study room with the hardware provided within the study room. The use of fingerprint to advantage student attendance can be considered as one of the more desirable machine innovations. Additionally, this will truly help the school to put off the pal signing problem as nicely.In the end, the donations supplied in this gadget will help academics control the pupil’s attendance file extra without problems and appropriately.
This will provide a better coaching environment for academics as teachers will no longer face empty training whenever they train in front of the degree thru the implementation of the fingerprint attendance machine. No longer only that, students may also improve their educational performance. Therefore, this machine desires to be developed because it will help save time from pointless processes and promote a completely correct and efficient way to seize pupil attendance.ConclusionThis chapter offers a general advent to the challenge includes an introduction, problem statement and describes scopes, assignment huge and additionally describes the targets of the project. finally, through using the board, the teachers and students are now not in hassle and a database machine this is constructed will be fast and efficient use for customers.CHAPTER II LITERATURE REVIEW AND PROJECT METHODOLOGY IntroductionLiterature evaluate can be called a revision of the current gadget conducted via previous researchers and a evaluate of the gadget to be evolved.
Literature studies also focuses on the information and thoughts set up on their subjects and their strengths and weaknesses. These days, technology is getting higher and replacing the traditional system to hurry up the technique through introducing a automated gadget. There are several sorts of attendance structures delivered nowadays at colleges, colleges, and universities.Manual Attendance Management SystemInside the presence of current structures, college students will sign a attendance list as evidence that they may come to magnificence.
This system is a guide system that calls for more human interaction inside the attendance record process. This system requires a lecturer or administrator to generate reports manually every month and update the record to the system.On this device, there are many weaknesses that may be observed. First, the machine requires a lecture to carry a list of attendance to the elegance. There may be also no cloud backup in case of any catastrophe. Moreover, the pair of publications can help folks who are not attending class signing attendance, additionally referred to as ‘buddy-signing’.RFID Based Attendance Management SystemIn the presence of the existing system, students will sign the attendance list as evidence that they will come to class.
This system is a manual system that requires more human interaction in the attendance record process. This system requires lecturers / administrators to generate reports manually every month and update reports to the system.In this system, there are many weaknesses that can be found. First, the system requires a lecture to bring a list of attendance to the class. There is also no cloud backup in case of any disaster. Additionally, the pair of courses can assist those who are not attending the attendance of the class signer, also known as ‘buddy-signing’.Barcode Scanner Based Student Attendance SystemBarcode scanner presence systems have been introduced to enhance admin body of workers management techniques consisting of pupil attendance reports every day, weekly and yearly. In barcode scanner era, students might be issued a student card for each of them with the bar code shown on the card for scanning functions each time they attend the class.
In addition, the barcode scanner gadget also presents a feature that if the pupil does now not meet the attendance requirements, the device will robotically generate a caution letter to the scholar to be sent to their dad and mom. Moreover, it minimizes mistakes that can be because of human mistakes as it is nearly absolutely automated systems that depend totally on bar code scanners.But, the gadget calls for students to have their student card with a unique bar code displayed on their student card every time they attend the class. Further, even though the system lets in the admin body of workers to produce a caution letter if the pupil does now not meet the attendance necessities, however, the generated warning letters can be given to college students and then skip to their dad and mom thru the scholar themselves with out giving instantaneous messages or emails to their dad and mom. Consequently, the student can also become throwing letters and pretending they’ve surpassed a caution letter to his mother and fatherComparison between existing solution and proposed solutionTable 1 shows the comparison netwwen existing solution and the proposed solution for the student attendance.Table SEQ Table * ARABIC 1 Comparison between existing solution and proposed solutionComparisonsSystems Unique Identifier Accurate and efficient attendance records Saves Time Display on Board Special Hardware Identity Card1. Manual Student Attendance Management NO NO NO NO NO NO2. RFID Based Attendance Management System NO NO YES YES YES YES3.
Bar Code Scanner Based Student Attendance System NO YES YES NO YES YES4. FTMK Student Fingerprint Attendance System YES YES YES YES YES NOFact and FindingThere are numerous kinds of reality locating methods that can be used to acquire useful statistics that allows in analyzing the areas related to the developer device designed to be advanced. Truth finding is a very vital technique had to find critical information and help humans in making high-quality choices. The techniques of finding information are categorised into categories that consist of questionnaires, observations, interviews, surveys, study of written assets and others. This approach is used to collect the records required by way of researchers to behavior analysis. In sporting out this undertaking, a few methods of locating information which includes evaluate of the supply of written and observational techniques have been used to accumulate vital recordsProject MethodologyThere are various types of models that can be used in development such as Rapid Application Development (RAD), Model V, Iterative Model and others. In this project, we chose the Hybrid Waterfall-Agile Model as this model allows teams to define requirements and adapt to changing needs through continuous feedback and transmission. Figure 2.
1 below shows the Agile Air Hybrid Model.Figure STYLEREF 1 s 3.0 Structure of Waterfall-Agile Hybrid ModelWithin the Waterfall-Agile Hybrid technique, you aren’t watching for a segment to finish before beginning the next phase; as a substitute you begin the following segment as soon as you can. This means you could initiate independent development of numerous modules or additives at the same time as the planning phase continues to be in technique. The improvement phase follows the precept of normal waterfalls.Project RequirementSoftware RequirementThis software is part of a computer system that consists of coded information or computer commands, in contrast to the physical hardware which is a system built. It is a collection of commands that allow users to interact with computers, hardware or perform tasks assigned.
There are several types of software such as antivirus, operating system, presentation, utility, and others. In this case, the software used is a database and application software. Arduino IDE 1.8.
5Figure STYLEREF 1 s 4. SEQ Figure * ARABIC s 1 1 Arduino IDE 1.8.5On September 29, 2017, Arduino released IDE 1.8.5.
In this version, it includes an Arduino builder which is a pure line-up command that controls the diagram, completes the dependency of the library and establishes a compilation unit. It can also be used as a separate program in a continuous integration environment. Next is the USB pluggable core which means it can act as many different USB devices without changing the core. Finally is a serial plotter that allows us to plot data in real timeAPPSERVFigure STYLEREF 1 s 4. SEQ Figure * ARABIC s 1 2 APPSERVIT infrastructure is expensive to own and manage. With Appserv, your IT becomes a subscription-based, with the costs incurred in a monthly bill and no capital expenditure.
With Appserv managing day-to-day IT and providing support to your employees, you and your team can focus on building a better business. Access your business information via desktop, laptop, tablet or smartphone anywhere and anytime. Your IT is consistent and reliable, whether your users are in the office or not. Access the level of IT capabilities and services you will struggle to achieve yourself, ensuring that it is always a normal business.
Since 1999, The Appserv Cloud has been our ultimate focus, we develop long-term professional relationships with our customers and provide tailor-made advice to clients’ individual business needs. Appserv Cloud offers full IT infrastructure services to companies that require reliability, security and flexibility.MySQLFigure STYLEREF 1 s 4. SEQ Figure * ARABIC s 1 3 MySQLMySQL is an open source relational database management system (RDBMS). Its name is a combination the name of co-founder and his daughter and the abbreviation for Structured Query Language. It has several paid edition with additional functionally for proprietary use. MySQL mainly associated with web-based applications and online publishing and is an important component of LAMP.phpMyAdminFigure STYLEREF 1 s 4.
SEQ Figure * ARABIC s 1 4 phpMyAdminphpMyAdmin is a free software tool written in PHP, intended to handle MySQL administration via the Web. phpMyAdmin supports multiple operations on MySQL. Frequently used operations (managing databases, tables, columns, contacts, indexes, users, permissions, etc.) Can be done through the user interface, while you still have the ability to execute SQL statements directly. For ease of use to multiple people, phpMyAdmin is being translated into 72 languages ??and supports both LTR and RTL languages. phpMyAdmin is an eight year project with a stable and flexible code base.
Project Schedule and MilestoneActivity/Week 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15Project Briefing and title discussion Review project proposal Identify project requirement Design system and Construct prototyping Developing application Testing and modifying codes Testing final application Improvement/implementation Finalizing application Design and complete the final report Submit final report and LogBook Table 2 Gantt ChartConclusionGenerally, technique segment offers a guideline what should do in developing the gadget. Besides, it used to manipulate tasks from begin to finish. It additionally describes each step inside the undertaking lifestyles cycle in depth, so developers know precisely which responsibilities to finish, whilst and the way.The methodology that will be used within the device improvement existence cycle (SDLC) for the FTMK FSA has six stages of development, starting with requirement phase, system design, implementation, integration and checking out, deployment and protection phase.
All of the phases of the method are associated with each different because, if one of the phases of the technique cannot be achieved or finished on time, the subsequent mission or segment could be affected.CHAPTER IIIANALYSIS3.1 IntroductionOn this chapter will speak the segment of evaluation and analysis of needs. Analyzing system is an vital step in organising an amazing and efficient device.
By using analyzing the current machine and backup system, we will get some data about the gadget in order that the proposed device can be correctly developed and meet the needs of the customers. First off, the analysis will come across issues encountered within the cutting-edge gadget. That is an important step because it will offer beneficial statistics to developers to increase an awesome device thereby overcoming the problems faced via the current machine. Then, a brand new device analysis to be advanced soon can be carried out. This can be completed by way of representing a diagram showing the drift of facts within the new system. Some reasons can also be given to offer short facts on the brand new device.3.2 Problem Analysis3.
2.1 Background of Current SystemAt present, the presence of the existing UTEM students’ faculty of Information Technology and Communication (FTMK) will sign a list of attendance as proof that they will come to class. This system is a manual system that requires more human interaction in the attendance record process. This system requires a lecturer / administrator to generate reports manually every month and update the report to the system.In this system, there are many weaknesses that can be found. First, the system requires a lecture to bring a list of attendance to the class. There is also no cloud backup in case of any disaster. Furthermore, the pair of courses can assist those who are not attending class signing attendance, also known as ‘buddy-signing’.
3.3 Requirement AnalysisFacts requirements, purposeful necessities, non-functional requirements and other requirements will be blanketed in requirement evaluation. Context diagram and data flow diagram the attendance of the FTMK Student Fingerprint Attendance will be protected in the functional requirements. Software program necessities, hardware necessities and network requirements may be stated in different necessities.3.3.1 Data RequirementData requirements, useful requirements, non-functional necessities and different requirements may be blanketed in requirement evaluation. Context diagram and statistics flow diagram the attendance of the FTMK Student Fingerprint Attendance might be covered within the purposeful necessities.
Software program program requirements, hardware requirements and network requirements can be stated in distinctive requirements. Other tables refer to appendix A.StudentData Data Type KeyStudent_ID Vachar(25) Primary KeyStudent_Name Vachar(25) Table 3 List of attribute (Student)3.3.2 Functional RequirementThe problem has been analyzed to get the function of this system. The explanation below demonstrates using a system’s functional case and explains what users can do with the systemFigure 3.1 Use Case Diagram of FTMK Student Fingerprint AttendanceWe represent the use case above to explain and understanding the requirement of the system.
Based on the figure 3.1, admin as administrator can manage FTMK Student Fingerprint Attendance information include add subject, change status of subject. The others function can be done by lecturer and student also.
Student can register fingerprint and profile, enrol subject and view attendance. Lecturer can register profile, insert class details, enrol subject, view attendance and print reportFunctional Requirement (Process Model)1.Could make an attendance.2.
Can track all attendance data with the database of students.3. Can upload, update certain matters to facilitate it.3.3.4Non-functional Requirement1. This system can be used using a web browser.2.
Validate field for required data is not null. User need to fullfill all the data required and control continue if the field is null.3.3.5Other Requirement3.3.5.
1 Software RequirementNFR Type Software Description No. SR_01 Platform/Oper 1) Microsoft Operating machine ating System Windows As a platformin which the system will be makes use of.MySQL databases are availableSR_02 Database 2) MySQL in all foremost programminglanguages with language-unique API.The Apache HTTP Server is aWeb Server web server which is canSR_03 3) Apache support programming languageExtension originally of PHP and MySQLdatabase.
SR_04 Sublime Text 4) PHP PHP is a reflective programming language originally designed for producing dynamic web pages.SR_05 Arduino IDE 5) Arduino Board Used as device to run the the fingerprint sensor Table 4 Description of Software Requirements18.104.22.168 Hardware Requirement574167036258500NFR Devices Hardware Description No. HR_01 Laptop To be able to view the webbased system.HR_02 Printer The printer is used to printdocuments, and reports.HR_03 Memory 512 Need to make the systemoperate easily and smoothly.
HR_04 Fingerprint Sensor Fingerprint Sensor Used to make an attendance recordHR_05 Uno R3 ATmega328P Board Module Board Used to run the fingerprint sensorHR_06 Ethernet Shield W5100 Board Module for ArduinoTable 4 Description of Hardware Requirement22.214.171.124 Network RequirementNFR No. Requirement DescriptionNR_01 Network Cable RJ-45 As connector to cable5741670-27876500Table 6 Description of Network Requirement3.
4ConclusionIn conclusion, this bankruptcy explains how the contemporary system operates and the methods used to make sure the destiny system will conquer the hassle. in addition, on this chapter it briefly explains how the waft of records for each process includes the specified requirements including functional requirements, non-functioning and others. For the next chapter to be formed, this chapter will in short describe the proposed design for this system.CHAPTER IV DESIGN 4.
1IntroductionDesign is the most vital section in machine development. This consists of conceptual layout, logical design and physical layout. The concept design will illustrate the relationship of the entity courting diagram (ERD) within the form of enterprise regulations. For logical design, the statistics dictionary will be entered and validate the conceptual layout. Whilst for physical layout it’s going to briefly describe DBMS choice.This chapter is split into three (3) designs namely gadget architecture layout, database design and graphical person interface. Each design method is critical to increase the system according to the desires of the person.
It’s going to help in developing interactive systems.4.2Database designSystem structure is a version that describes the system structure. Conceptual models, logical and physical fashions are the styles of models.
Entity courting diagram is an example of a conceptual model. Even as the statistics dictionary is an instance of a logical version. Final however no longer least, coding and interface are examples of physical fashions.Device architecture allows to understand system functions. Developers of development systems need to make customers that the device architecture meets the needs of the customers and offers interactive interfaces for the system4.2.1 Conceptual designThe concept layout will give an explanation for how the system have to work on the basis of need.
it’s miles essential for the device to fulfill user necessities and performance. figure 4.10 is an Entity relationship Entity (ERD) for the Attendance of FTMK Student Fingerprint Attendance.3549655588000Figure 4.
10 FTMK Student Fingerprint Attendance Entity RelationshipDiagram(ERD) 4.2.2Logical designOn this section, it’s going to describe that data dictionary for the system. The data dictionaries of FTMK Student Fingerprint Attendance are described in more element inside the desk beneath. Different tables refer to appendix b.Attribute Content Data Format Required PK/ Examplename type FK Table : lecturer Lecturer_ID Lecturer int (10) 999999 Y PK 1ID Lecturer_Name Lecturer varchar Xxxxxx AdminName (20) Table 7 Lecturer Data Dictionary4.2.3Physical designPhysical design is ready the choice of Database control system (DBMS).
DBMS choosing this system is mysql. This DBMS is supported by means of phpmyadmin. This mysql has an clean graphical person interface for developers walking database obligations.The DBMS used is to design coding for database duties as a design device. Coding builds DBMS such as encoded brief database (insert), triggers and saved tactics. The encodings constructed into mysql can show whether or not there are errors or issues inside the interface. It may additionally display the success of coding built by way of displaying the output within the interface.
The saved technique function is to manage and hold records without problems. It has the productivity and convenience to use whilst it has a powerful database software. The coding method is stored in Phpmyadmin connected to the selected language so that it will make the language easy to get facts from the database using easy queries.Triggers work almost similar to stored processes however they’ll run as devices. Furthermore, the trigger additionally works for the atom to generate the cost of the columns obtained.4.3Graphical User Interface (GUI) DesignThis module that will be used in the interface will provide an explanation for element in this segment. A number of the feature includes in the machine are login and other could be explain.
Figure 4.11 Homepage of FTMK Student Fingerprint AttendanceFigure STYLEREF 1 s 4.12 Login Page (Admin)Figure STYLEREF 1 s 4.13 Login Page (Student And Lecture)Figure STYLEREF 1 s 4.
14 Lecture Registration PageFigure STYLEREF 1 s 4.15 Student Registration PageFigure STYLEREF 1 s 4.16 Register Fingerprint PageFigure STYLEREF 1 s 4.17 Register Fingerprint Page (Inserted Data)Figure STYLEREF 1 s 4.18 Attendance Page Figure STYLEREF 1 s 4.
19 Attendance Page (Arduino)Figure STYLEREF 1 s 4.20 Attendance List (Lecturer)Figure STYLEREF 1 s 4.21 Attendance List (Student)Figure STYLEREF 1 s 4.
22 Class List PageFigure STYLEREF 1 s 4.23 Subject List PageFigure STYLEREF 1 s 4.24 Student List PageFigure STYLEREF 1 s 4.25 Subject Registration PageFigure STYLEREF 1 s 4.26 Active Subject PageFigure STYLEREF 1 s 4.27 Deactivated Subject PageFigure STYLEREF 1 s 4.28 Lecturer’s Class List PageFigure STYLEREF 1 s 4.
29 Pie chart of Student Attend by Week4.4ConclusionThis chapter discusses extra approximately how the system layout is being constructed that includes all sorts of designs together with conceptual design, logic, physical and person interface. Every kind offers one of a kind systems and capabilities but with the same objective. All styles of designs relate to each different to make the machine work. This design is constructed and carried out to make it real and may be used by targeted customers.CHAPTER VIMPLEMENTATION & TESTING5.1 IntroductionThis section will focus on how to handle FTMK Student Fingerprint Attendance. The use and delivery of the framework is the part where the framework will be actualized and transmitted, in fact, to be used.
The framework must be actualized and communicated when the framework and inspection plan is completed. Testing procedures will also be complete to ensure the framework works wonderfully and achieves customer fulfillment. This framework will be tried by designers and end customers by taking the best strategy to recognize the implementation of the framework5.2 Development Environment SetupThe development environment setup for FTMK Fingerprint Attendance will involve hardware and software requirements. All inventories will be stated step by step and clearly indicated. Hardware and software requirements are described in Chapter IV and will be further described for connection in the section below.5.
2.1 Hardware Development SetupIn this project, the hardware used are stated in the Chapter IV. There are a few jumper wires, Ethernet V2 shield, Ethernet wire, and UNO R3, fingerprint sensor, that will be attached to the ATmega328 Microcontroller. ATmega328 Microcontroller will receive command from the Arduino IDE software application to control the hardware. The below shows the detail pins that will be inserted by the hardware to the ATmega328 Microcontroller.Figure 5.1 shows the project prototype that is been developed. This prototype includes a few jumper wires for connection, fingerprint sensor, arduino uno r3, etherrnet shield, and Atmega328 microcontroller.
All connection is followed by the table 5.1.Figure 5.
1: Details of ATmega328 MicrocontrollerTable 5.1: Details of Each Pins NumbersHardware Wire PinsLed Light (Yellow) Power GSignal D6Fingerprint Sensor VCC 3VOutput A0GND 3VArduino UNO GND GVCC 3VSDA D2SCL D1Ethernet shield Yellow 3VRed D5Black GFigure 5.2 shows the idea of prototype to demonstrate the real environment at the room. This prototype is set up by the all hardware needed. The hardware connection such as Arduino UNO R3 is connected to the PC via USB port.Figure 5.2: View of The Prototype5.
2.1.1 Software Development SetupFor server part, users have to type “http: localhost” in a web browser like Google Chrome or Mozilla Firefox, a web browser will display the main page of the Appserv server. The user should create a folder that will store the entire PHP interface or language in the “C: appserv www trial” registry so users can see the interface in the web browser.1242695-30924500Figure 5.3: AppServ LogoStep 1 : Obtain a copy APPSERV by downloadTo get a copy of APPSERV, users will must download it from https://www.apachefriends.
org/download_success.html. it’s going to give you a choice whether the 32 or 64-bit surroundings depends at the configuration of your laptop. similarly this down load includes phpMyAdmin that will help you manage higher databases via an internet-based GUI.
Step 2 : Install the softwareAPPSERV is downloaded and does no longer load; the person ought to start the set up process.126.96.36.199 Database Development Setup – ServerThe database server refers to a lower back-quit device in the consumer / server structure.
The database server functions carry out duties inclusive of facts evaluation, storage and manipulation. It pertains to database management device (DBMS). DBMS is a group of programs that allow records from the database. The DBMS used in this system is (phpmyadmin mysql APPSERV Server).
This DBMS has been selected due to the fact it’s far a dependable way to carry out duties which includes taking, growing, updating and deleting database gadgets. It additionally runs square statements and scripts, edits and decodes sq. Code and manipulates information.
Step 1 : Configuring MySQL databaseSince the APPSERV server has provided MySQL, it is easier to use as it only needs to click on phpMyAdmin in Between Analyzing APPSERV Server Configuration.650875-33655000Figure 5.4 phpMyAdmin databaseIf someone desires to create a database, click on on new in the left sidebar. Then a new database may be collected. The person wants to go into the name of the database in the field provided. If the database is created, the customer can maintain to create tables, triggers or strategies inside the database.
188.8.131.52 Coding Fingerprint Sensor Figure 5.
5 Coding Fingerprint SensorThe coding above shows the connection for fingerprint id. It will detect the available fingerprint to sign an attandance.5.
3 Version Control ProcedureFTMK Student Fingerprint Attendance is new implemented and documented. It is new to introduce to the market and the version for the final product system will be 1.05.4 Implementation StatusIn this section, the duration of each component development will be discussed and explained in detail as illustrated in table 5.
2.No. Component Description Duration forcompleted1 Assembling Hardware Process to connect the jumper wires, Ethernet 13 daysShield, Fingerprint sensor to the microcontroller. Board by assigning the pins on the USB port of laptop. 2 Building Prototype This process is to setup the prototype of 14 daysthe project. 3 Upload Fingerprint Coding This process is to ensure the Arduino Uno Connect with Fingerprint sensor 5 days4 Developing system All the functions of the system will be 60 dayscreated by using Arduino IDE. Table 5.2: Implementation Status5.
5ConclusionImplementation phase is the final stage shifting from phase of improvement to generation level. FTMK FSA makes use of appserv server as a server side content and MySQL as database for storing and storing such information. nearly, triggers and saved techniques are used to handle the glide framework primarily based at the business rationale.
the following levels are the test levels tried by the customer to approve and study the necessities and additions to recognise the FTMK Fingerprint Attendance (FTMK FSA) mistakes. The check degree could be defined in chapter 6 and consists of test plans, test strategies, test designs, test results and evaluation.CHAPTER VITESTING6.1IntroductionThis section analyzes FTMK Student Fingerprint Attendance (FTMK SFA) testing and activities. Testing is a technique with the goal of recognizing issues in structure or programming and to know the quality level to meet customer needs. It has been coordinated with the FTMK SFA to approve and review the structure with the objective of being able tothe requirements of the merger. System testing is very important as it avoids chaos until known to customers and thereby avoids combinations including having a terrible reputation.
The test of programming is mainly working. However, testing is not limited to the execution of structures with the inspiration of driving the search for the desert. It also needs to choose the test configuration, test methods, test order, test results and exams at the heart of the test stage. Item tests can be intense and viable by following the rules, for example, choosing the right strategy strategy strategy game.
This can ensure that the system will work effectively and free of any bugs.6.2 Testing PlanTesting configuration portrays the activities, augmentation, and essential testing for the structure. It is basic to ensure all the objective achieved and as a rule of the system is running effectively.
Any bugs or mix-ups can be distinguished and settled it before sending to the customer.Test OrganizationIn this section, there will be two (2) persons responsible to carry out testing process in the system. The first one is the system developer who develop the system and the second one is the end user. Both tester plays different roles in the testing process.System DeveloperSystem Developers are responsible for testing the entire system, finding bugs or errors in the system. He is also responsible for the stability and smoothness of the system.
End UserEnd Users are responsible for identifying any system vulnerabilities, providing feedback on interfaces, functions, and ways to improve the system.Software TesterAnalyze and review functional requirements. Monitor system performance.Test EnvironmentOn this sub topic will describe information about the location where this system has been tested. Table 6.2 shows the details of the tests which have been made.System Configuration SpecificationOperating System Windows 10Operating System phpMyAdmin MySQLServer Appserv Server version 3.
0.12Web browser Google Chrome, Mozilla FirefoxSystem/ Programming Language Hypertext Preprocessor (PHP), HyperText Markup Language (HTML), Arduino 1.8.5Table 6.2 Environment Setup SpecificationTest ScheduleThe testing processes for the system will take period of time. Any bugs or error being found will return be back to the implementation phase to check again. This is the continuation process until the system is error-free and able to execute successfully.
Activities Description Start Date End DurationDate Unit Used to test functions 10 July 13 July 3 daysTesting and code module. 2018 2018 Integration Used to Test integrated 14 July 17 July 3 daysTesting module and verify 2018 2018 combined functionality after integration. System Evaluate system 18 July 21 July 3 daysTesting Compliance with its 2018 2018 specific requirements. Acceptance Test completed system 22 July 25 July 3 daysTesting to end user. 2018 2018 Table 6.
3 Test Schedule DetailTest StrategyFor FTMK Student Fingerprint Attendance System, Dynamic Test will be used to evaluate this system. Partial or system product implementation is a matter of Dynamic Testing. Dynamic Testing Techniques are separated into two different strategies known as the Black Box Test and White Box Test. Testing Discovery is known as a social test centered around a system plan, while White Box Testing is trying to give customers a look at the internal structure of the program. Table 6.4 illustrates the views on this methodology.Approaches ExplanationsWhite Box Testing Testing that assess the interior structure of the program or assessing framework through designer utilizing the program code. White box testing has three distinctive strategy, branch scope strategy and finally way path coverage method.
Black Box Testing Testing the system through their purposeful or non-useful without references to the inner structure of the component or device. Black container trying out is focused solely on the output generated in reply to selected input and execution condition.Table 6.4 Details of Testing typeTest Design6.4.1Test DescriptionTest configuration talks about the experiment distinguishing proof, test cases and expected outcome for every situation which are composed and recorded. The test depiction examines combination test and functionality test.
Table 5.3-5.8 demonstrates the consequence of testing.Login Test DescriptionSign-in module is important for authorized users. Users involved in this module are Administrators, Lecturers and Students.
Users need to enter their ID and password for system login. Below is a table 6.5 that will display the login test case.Test Case Test Case Step to Execute Expected ResultID TC001_01 Check page. UI should be perfect.Check allText box,DropdownMenu andButton.. TC001_02 Check when 1.
Enter invalid User should not loginPass invalid id. Id. And should show proper2. Enter correct Error message.Password. 3. Click on Login Button. TC001_03 Check when 1.
Enter valid id. User should not loginPass correct id 2. Enter incorrect And should show properAnd invalid Password.
Error message.Password 3. Click on Login Button. 5741670-2914015005741670-889000TC001_04 Check keeping 1. Enter valid id. User should not loginPassword blank 2. Do not enter And should show properPassword. Error message.
3. Click on Login Button. TC001_05 Check keeping 1.
Do not enter User should not loginId blank Id. And should show proper2. Enter valid Error message.Password. 3. Click on Login Button.
TC001_06 Check when 1. Enter valid id. User should login.Pass correct id 2.
Enter valid And password Password. 3. Click on Login Button TC001_07 Check the 1. Do not enter User should not loginRequired field Any value in And should show properBy not filing The field. Required error message.Any data. 2. Click on Login Button.
TC001_08 Check not 1. Do not enter User should not loginInput any Any value in And should show properValue. The field. Error message.2. Click on Login Button 5741670-889000Table 6.
5 Test Case of LoginProfile Test DescriptionThe profile module is for students to update their own profile and store it to the database. here is a desk of 6.6 in order to display a profile test case.Test Case Test Case Step to Execute Expected ResultID TC002_01 Check all the 1. Click on UI should be perfecttext boxes, button.
dropdown menu and button TC002_02 Check the 1. Do not enter User should notrequired fields any value in update and shouldby not filling the field. show proper requiredany data 2. Click on error message.Update Profile Button. TC002_03 Check the 1.
Enter value in User should be updaterequired fields required their profileby filling the fields. successfully anddata 2. Click on successful registrationUpdate Profile message should show.Button. TC002_04 – Check the 1. Enter invalid It should show theemail text field emails.
validation message forthat has Email 2. Click on email.address without Update Profile @ symbol.
Button. -Check the Email text field that has @ symbol written in words. 5741670-889000TC002_05 Check all valid 1. Enter valid It should not show anyemails email.
validation message2. Click on Update Profile Button. TC002_06 Check the 1. Enter alphabet It should show thevalidation phone data in phone error message fornumber field. Phone Number2. Click on Update Profile Button. TC002_07 Check the 1. Enter numeric It should not show anyvalidation phone data in phone error messagenumber field.
2. Click on Update Profile Button. Table 6.6 Test Case of ProfileAttendace Test DescriptionAttendance module is for student to insert problem information and it’ll keep in database. under are desk 6.7 on the way to display the attendance take a look at case.Test Case Test Case Step to Execute Expected ResultID TC003_01 Check all the 1. Click on button.
UI should be perfecttext boxes, dropdown menu and button TC003_02 Check the 1. Do not enter User should notrequired fields any value in the submit and shouldby not filling field. show proper requiredany data 2.
Click on Submit error message.Appointment Button. TC003_03 Check the 1. Enter value in User should be submitrequired fields required fields. enrollby filling the 2. Click on Submit successfully anddata Appointment successful submitButton. message should show.
TC003_04 Check the end 1. Choose the User should be submittime field time to make an enrollappointment. successfully and2. The end time successful submitwill display and message should show.add an hour from the start date. 3. Click on Submit Appointment Button. TC003_05 Check the 1.
Choose the System will show theinvalid invalid class proper error messageclass time time. 2. Click on Submit Enroll Button. TC003_06 Check the 1. Choose the User should be submitvalid class valid class enrolltime time. successfully and2. Click on successful submitSubmit message should show.Enroll Button.
TC003_07 Check all the 1. Do not enter 1. It should not ask tooptional field any detail in fill the optionalwhen do not optional fields. fields.fill data 5737225-2914015005737225-8890002.
Enter data in 2. User should berequired fields. submit3. Click on Save enrollChanges successfully andButton. successful submitmessage shouldshow.TC003_08 Check all the 1.
Enter data in User should be submitoptional field optional fields. appointmentwhen fill data 2. Enter data in successfully andrequired fields. successful submit3. Click on Save message should show.
Changes Button. Table 6.7 Test Case of Attendance Proposal Test DescriptionTable 6.8 shows class test cases. It is for lecturers to upload and update class details and it will be stored in the database Test Case Test Case Step to Execute Expected ResultID TC004_01 Check all the 1. Click on button. UI should be perfectText boxes, Dropdown Menu and Button TC004_02 Check the 1. Do not enter User should notRequired fields Any value in the Submit and shouldBy not filling Field. Show proper requiredAny data 2. Click on Submit Error message.Form Button. TC004_03 Check the 1. Enter value in User should be submitRequired fields Required fields. Successfully andBy filling the 2. Click on Submit Successful submitData Form Button. Message should show.TC004_04 Check all the 1. Do not enter 1. It should not ask toOptional field Any detail in Fill the optionalWhen do not Optional fields. Fields.Fill data 2. Enter data in 2. User should beRequired fields. Submit3. Click on Successfully andSubmit Review Successful submitButton. Message shouldShow.TC004_05 Check all the 1. Enter data in User should be submitOptional field Optional fields. Successfully andWhen fill data 5737225-8890002. Enter data in 2. Successful submitRequired fields. Message should show.Click on Submit Review Button. Table 6.8 Test Case of Class Final Report Test DescriptionTable 6.9 shows a graph report test case. It is for lecturers to upload and update graph report details and it will be stored in the database.Test Case Test Case Step to Execute Expected ResultID TC005_01 Check all the 1. Click on button. UI should be perfectText boxes, Dropdown Menu and Button TC005_02 Check the 1. Do not enter User should notRequired fields Any value in the Submit and shouldBy not filling Field. Show proper requiredAny data 2. Click on Error message.Submit Form Button. TC005_03 Check the 1. Enter value in User should be submitRequired fields Required fields. Successfully andBy filling the 2. Click on Successful submitData Submit Form Message should show.Button. TC005_04 Check all the 1. Do not enter 1. It should not ask toOptional field Any detail in Fill the optionalOptional fields. Fields.When do not 2. Enter data in 2. User should beFill data Required fields. Submit3. Click on Successfully andSubmit Review Successful submitButton. Message shouldShow.TC005_05 Check all the 1. Enter data in User should be submitOptional field Optional fields. Successfully andWhen fill data 2. Enter data in Successful submitRequired fields. Message should show.Click on Submit Review Button. Table 6.9 Test Case of Graph reportForgot password Test DescriptionTable 6.10 indicates the password change test case. The user will enter their password and store it in the database.Test case Test case Step to execute Expected result Id TC007_01 Check all the 1. Click on button. Ui should be perfect Text boxes and Button TC007_02 Check the 1. Do not enter User should not Required fields Any value in the Change password and By not filling Field. Should show proper Any data 2. Click on Required error Forgot Message. Password Button. TC007_03 Check the 1. Enter email in User should be received email that contain the Required fields Required fields. By filling the 2. Click on Data Forgot Password Button. 5737225-889000Table 6.10 Test Case of Forgot passwordSearch Test DescriptionTable 6.11 shows a search test case. Users can search to see all the required information.Test Case Test Case Step to Execute Expected ResultID TC008_01 Validate that 1. Enter the name System display allsearch by name or course or information based ofor course or department or searchingdepartment or status or status or position. position for 2. Click on Search searching is Button. valid 3. Validate the information TC008_02 Validate that 1. Enter any value System display allno field is left in the field. information based ofnull 2. Click on Search searchingButton. TC008_03 Validate that 1. Do not enter No data displayfield is left null any value in the field. 2. Click on Search Button. 5737225-889000Table 6.11 Test Case of SearchSubject Test DescriptionTable 6.12 shows the test case of assignation. User can add and remove subject from the classTest Case Test Case Step to Execute Expected ResultID TC009_01 Check the add 1. Click on Button System willbutton Add automatically add thefunction. studentTC009_02 Check the 1. Click on Button System willremove button Remove automatically removefunction. the studentTC009_03 Check the 1. Click on Button System will showmaximum Add limitation errorallocation of message.student Table 6.12 Test Case of Subject6.4.2 Test DataIn the FTMK Student Fingerprint student test data test system is used to confirm with the test plan to achieve the expected results. Validation is done by testing, verifying and verifying software behavior.Login Test Data574167035179000Test Case ID Attribute DataTC001_01 Nil NilTC001_02 id admin01password admin01TC001_03 id admin01password 123TC001_04 id admin01password -TC001_05 id -password admin01TC001_06 id admin01password admin01TC001_07 id -password -Table 6.13 Login Test Data for AdminTest Case ID Attribute DataTC001_01 Nil NilTC001_07 id -password -TC001_02 id B031620041password abc123TC001_03 id B031620041password 123TC001_04 id B031620041password -TC001_05 id -password abc123TC001_06 id B031620041password abc123Table 6.14 Login Test Data for Studentii.Profile Test DataTest Case ID Attribute DataTC002_01 Nil NilTC002_02 Email -Lecturer_Num -TC002_03 Email [email protected]_Num 0137266266TC002_04 Email 1. testAtgmail.com2. @gmail.com3. test.comTC002_05 Email 1. [email protected]_06 Lecturer_Num iaoisjduTC002_07 Lecturer_Num 01289856495741670-889000Table 6.15 Profile Test Data for LecturerTest Case ID Attribute DataTC002_01 Nil NilTC002_02 StudentEmail -StudentNum -TC002_03 StudentEmail [email protected] 0134546571TC002_04 StudentEmail 1. testAtgmail.com2. @gmail.com3. test.comTC002_05 StudentEmail 1. [email protected]_06 StudentNum sdsdfsffsffTC002_07 StudentNum 0198848456Table 6.16 Profile Test Data for StudentClass Test DataTest Case ID Attribute DataTC003_01 Nil NilTC003_02 Subject_ID -Class_session -TC003_03 Subject_ID BITS1113Class_session 05.20 PMTC003_04 Nil NilTC003_05 Nil NilTable 6.17 Appointment Test Data for ClassTest Case ID Attribute DataTC003_01 Nil NilTC003_02 location -status -TC003_03 location -status 1TC003_09 location -status -TC003_10 location BK9 ; BK10status 1TC003_11 color #008000status 1Table 6.18 Appointment Test Data for classForgot password Test DataTest Case ID Attribute DataTC007_01 Nil NilTC007_02 email -TC007_03 password abc123TC007_04 email -TC007_05 password -TC007_06 email [email protected]_07 password abc123Search Test Data Test Case ID Attribute DataTC008_01 course BitsTC008_02 Nil NilTC008_03 Nil NilTable 6.19 Search Test Data 5743575-166243000Assign Subject Test DataTest Case ID Attribute DataTC009_01 Nil NilTC009_02 Nil NilTC009_03 SubjectID Bits3212TC009_04 ClassSession 8AM-9AMTC009_05 SubjectID Bits3212TC009_06 ClassSession Table 6.20 Assign Subject Test Data 6.5Test Result and AnalysisTest results are the results after using the FTMK Fingerprint Attendance system in various test cases. In this result, each test case will be tested and the results are shown as table below.Test Case Identification Test Identification Result (Passed/Failed) TC001 : Login Test Description TC001_01 OK Passed TC001_02 OK Passed TC001_03 OK Passed TC001_04 OK Passed TC001_05 OK Passed TC001_06 OK Passed TC001_07 OK Passed TC001_08 OK Passed TC002 : Profile Test Description TC002_01 OK Passed TC002_02 OK Passed TC002_03 OK Passed TC002_04 OK Passed TC002_05 OK Passed TC002_06 OK Passed TC002_07 OK Passed TC003 : Class Test Description TC003_01 OK PassedTC003_02 OK PassedTC003_03 OK PassedTC003_04 OK PassedTC003_05 OK PassedTC003_06 OK PassedTC003_07 OK PassedTC003_08 OK PassedTC003_09 OK PassedTC003_10 OK PassedTC003_11 OK PassedTC004 : Graph Report Test Description TC004 _01 OK PassedTC004 _02 OK PassedTC004 _03 OK PassedTC004 _04 OK PassedTC004 _05 OK PassedTC005 : Forgot password Test Description TC005 _01 OK PassedTC005 _02 OK PassedTC005 _03 OK Passed137486691666800190055590043000666242090043000TC006 : Search Test DescriptionTC006 _01 OK PassedTC006 _02 OK PassedTC006 _03 OK PassedTC007 : Assignation Test Description TC007 _01 OK PassedTC007 _02 OK PassedTC007 _03 OK PassedTable 6.21 Test Result6.6 ConclusionConclusions that can be made after completing the system have evolved to facilitate users to manage documentation management by imposing multiple functions within the system. Although the system does not meet all targets, it does not work well. However, if there are multiple improvements that are uploaded to the system along with user-friendly or backup devices and recovery, the system can be better and move forward.CHAPTER VIICONCLUSION7.1IntroductionFTMK student Fingerprint Attendance is a system advanced for students and academics worried in Workshop 1 and Workshop 2courses that make method and tactics clean and time-saving and FTMK FSA will meet my qualifications to obtain a Bachelor’s degree of laptop science (software development) degree. however, this gadget has many risks but there are a few benefits and it improvements in the end. in the course of this development device, there’s a extraordinary deal of understanding that i’ve the requirements of the very last file of the framework, designing gadget and float records. that is the maximum tough three-and-a-half years at Universiti Teknikal Malaysia Melaka (UTeM). therefore, this machine has the ability to expand greater sophisticated with better knowledge than my lack of awareness and knowledge in this area. further, I suppose this system has fee to go through the marketplace. In end, it has developed a gadget that achieves 80% of the key success targets notwithstanding many weaknesses and failures within the work. i am quite happy with my greatness as i can increase my own system.7.2Observation of Weak and Strengtha) Strength• Can manage reports on line (not post on a bit of paper).• Can manipulate day by day presence.• Reduce using time while customers need to make a presence.• Can track their documents and duties successfully.b) Weakness• No notification machine.• The device does now not offer backup and recuperation.7.3Propositions of improvementThe system developer would like to suggest a few enhancements that could be done to improvise this project such as:The “Register” coding of the hardware devices should be able in looping to make it easier when the fingerprints’ ID is stored.Connect FTMK SFA with Student Information System so that the student no need to register their profile.7.4ContributionFTMK Student Fingerprint Attendance is a web-based system to be developed for attendance management. This system is to replace existing student attendance system processes for computerized and automated student attendance systems. The FTMK Student Attendance System (FTMK SFA) was built to enable the administrator to monitor the attendance status of lecturers. It is a computerized system that can improve the required faculty more effectively and accurately.This project is to improve the existing system used to record and update the attendance status of lecturers without displaying them els. Additionally, this project is made using Arduino IDE for fingerprint device encoding and for establishing integration between system and device. In addition, phpMyAdmin at Appserv is used as a platform for database development and allows web designers to design and test the system on its own without Internet access. Databases are developed to store and update the attendance status of lecturers.Overall, the attendance status of lecturers is useful for lecturers and students to save time in everyday life. This report documents the design, implementation and evaluation of projects with full potential for viewing the database system for a single facultyTherefore, this system is very useful for student attendance management system (FTMK SFA) because it has 80% fulfillment for purpose. It will contribute to facilitating user management.7.5ConclusionConclusions may be made after finishing the system, were developed to facilitate the user to manage attendance management by performing numerous capabilities in the system. although the system does no longer meet all of the objectives, it may nevertheless paintings smoothly. Implementation of the fingerprint sensor on this venture is to make day by day ordinary in college existence easier. It additionally encloses a database device with it to offer exposure to the presence of academics for the general public, particularly students on board. It benefits maximum users and saves time searching out teachers in big faculties. it is a combination of hardware and software program. eventually, we are hoping our projects are useful for lectures and students on the faculty.REFERENCESThe World’s Largest Web Developer Site. Retrieved October 11, 2017, fromhttps://www.w3schools.com/default.aspSubramaniam, H. et al. (2013). Bar Code Scanner Based Student Attendance System (SAS), Retrieved November 15, 2017, from http://www.researchgate.net/publication/245025631_Bar_Code_Scanner_Based_Student_Attendance_System_(SAS)Microtonics Technologies. (2013, June 4). RFID Based Attendance Management System. Retrieved November 15, 2017, from http://www.projectsof8051.com/rfid-based-attendance-management-system/Improved Version UNO R3 ATMEGA328P Board Module + Ethernet Shield W5100 Module for Arduino. Retrieved September 30, 2017 from https://www.lazada.com.my/improved-version-uno-r3-atmega328p-board-module-ethernet-shieldw5100-module-for-arduino-11577584.html?spm=a2o4k.searchlist.list.16.22c05236mGVFGUArduino IDE 1.6.6 Released. Retrieved October 11, 2017 from https://www.arduino.cc/en/Main/SoftwareWaterfall-Agile Hybrid Model Retrieved October 11, 2017, from http://binarysemantics.com/software-development-process-sdlc.htmlAPPENDIXAPPENDIX A(ATTENDANCE SHEET)Current Attendance SheetFSAS Attendance SheetAPPENDIX B(USER MANUAL)USER’S MANUALFTMK STUDENT FINGERPRINT ATTENDANCE SYSTEM (FTMK SFA)Faculty of Information and Communication TechnologyAUGUST 2018User ManualINTRODUCTIONGenerally, our product is a combination of biometric technology and informative board that is built using a fingerprint sensor device attached with an Ethernet V2.0 stacked on Arduino Uno R3 that is connected to a laptop and a monitor acts as a board. It is called as FTMK Student Fingerprint Attendance System (FTMK FSA) that is developed to understand the market’s demand to identify individuals in groups that are under surveillance such as lecturers and to makes daily routine of students’ life easier and convenient with the addition of board. Therefore, this manual book will give users details on the hardware and software requirements on its uses, an overview of the main function and will navigate on how to use the FSAS.This product includes with many function as it have both device and database system to achieve the objectives as this product will fulfil the users’ needs. The objectives of the FSAS are to register and transmit the fingerprint’s ID from the fingerprint sensor device to database system. Also, our product has been configured by connecting it to a board so it will display the lectures’ attendance status for the student. Further explanation of the product will be discussed in this user manual.ABOUT FTMK STUDENT FINGERPRINT ATTENDANCE SYSTEM (FTMK FSA)Welcome to FSAS manual book! Firstly, you need to know the component of Arduino Uno R3board.Figure 1: Arduino Uno Board1. External Power Supply2. USB plug3. Pin (Analog Reference Pin, Ground Digital, Digital I / O, Serial Out / In, Reset, 3.3 V, 5V)4. Reset the button5. Series Serial Programmers6. ATmega328 MicrocontrollerFigure 2: Fingerprint Sensor Device1. Ground wire2. Rx (Data In) wire3. TX (Data Out) wire4. Vin wireGETTING STARTEDWelcome to Fingerprint Monitoring Attendance Board user manual. To use Fingerprint Monitoring Attendance Board, you need to ensure that you have all the components of the devices.Figure 3: Fingerprint Monitoring Attendance BoardArduino Uno R3 The Arduino Uno R3 board is placed inside the prototype box to protect the components inside.Figure 4: The mainboard of Arduino Uno R3 model.Ethernet Shield V2.0The Ethernet Shield V2.0 is stacked on top of Arduino Uno R3 board to provide local host connection for the device.Figure 5: The Ethernet Shield V.20 model.Fingerprint Sensor DeviceThe fingerprint sensor is connected to the board for allowing the data to transmit to the database system.Figure 6: The Fingerprint Sensor Device• Power supplyThis Pi is powered by Micro USB power supply (like most standard handset chargers). You need a quality power supply that can supply at least 2A and 5V for Model 3B, or 700mA and 5V for lower and lower models. Low power supply (~ 700mA) will workfor basic use, but may cause Pi to reboot if it draws too much power.NOTICE: Plug the charger into the power connector port.• Ethernet Cable (Network) Model B / B + / 2/3 OnlyIt is possible for users to use Ethernet cables to connect your products to local networks and the internet. This is to enable Wi-Fi connection and access to the Internet.Figure 7: The Ethernet CableNOTICE: User may connect the RJ45 to the Ethernet port.HOW TO USE FINGERPRINT STUDENT ATTENDANCE SYSTEMThis user manual will guide users on how to use the product by procedures according to its functionality.SETTING UPBefore using the device, you need to connect the device on the PC/laptop to set up the Fingerprint Student Attendance System (FSAS) according to its functionality.ii) Hardware:1. Plug in the power supply into the USB cable port.2. Connect the Ethernet Cable to the laptop from the device.POWER ONThe device needs a power supply to operate normally. Use the power supply every time you are using it. Ensure the USB cable and Ethernet cable is connected to the boards and PC/laptop.Wait until the LED on boards is blinking.Register User’s FingerprintRegister Fingerprint’s ID into Fingerprint Sensor DeviceUser put their specific fingerprint on the fingerprint sensor device to be stored inside.Register User’s Fingerprint into Database SystemAdmin will register your fingerprint into Database System before you can use the products.Your fingerprint’s ID will successfully save when the database system shows a successful message.Change User Status From 0 (Absent) To 1 (Available)User has to put their fingerprint to change their attendance status from absent to available.Once the fingerprint matched, it will update into the database system.To register next fingerprint, repeat the steps one by one and close the serial monitor of Arduino IDE.APPENDICES VIIFTMK Student Fingerprint AttendanceMy name is Muhamad Najmi Syauki bin Sahrom. I am a final year student who currently studying Bachelor of Computer Science (Software Development) with Honors (BITS) in Universiti Teknikal Malaysia Melaka. I am conducting my final year project on the “FTMK Student Fingerprint Attendance”. The purpose of this survey is to gather the opinions and views from the public regarding the the management of student system in the market.Your response has been carefully considered and selected to represent your opinion for this important study.Your open and complete response is vital, as it will form the basis towards knowledge and industry improvement.STATEMENT OF CONFIDENTIALITYThe information you provide will be held in the strictest confidence. We will neither publish, release, nor disclose any information on or identifiable with individual person or organization or companies. If you agreed, please sign on the below. Thank you.__________________________ Date: