Documente Academic
Documente Profesional
Documente Cultură
Management System
SYNOPSIS
In this project, attendance maintenance is the main concept to generate report and
produce leave report form. In this world of growing technologies everything has been
computerized. With large number of work opportunities the Human workforce has increased.
Thus there is a need of a system which can handle the data of such a large number of
Employees in an organization. This project simplifies the task of maintain records because of
its user friendly nature.
The EMPLOYEE ATTENDANCE MANAGEMENT SYSTEM has been developed
to override the problems prevailing in the practicing manual system. This software is
supported to eliminate and in some cases reduce the hardships faced by this existing system.
Moreover this system is designed for the particular need of the company to carry out
operations in a smooth and effective manner.
The application is reduced as much as possible to avoid errors while entering the data.
It also provides error message while entering invalid data. No formal knowledge is needed
for the user to use this system. Thus by this all it proves it is user-friendly.
This project will allow admin to add new employees after proper authentication.
Admin can also add new record and posts. It can allocate employees to different departments
at different posts. Database should store all personal details of employees such as date of
birth full name etc. and his educational background, work experience, skill sets, current and
past details in different tables with proper relations.
This system enables employees to perform their own profile. It enables the
automation of work flow notifications and leave request. Work flow notification from
administrator are stored in the backend and notified to employee, once employee log in to the
system. Leave request made by the employee is placed for administrator approval, the
administrator module checks up with the leave availability and approves or rejects the
request.
1. INTRODUCTION TO THE PROJECT
These systems will ultimately allow you to better manage resources. One of the main
features in employee management system is time tracking for employees. Effective time
tracking mechanism saves both time and money for the organization. This system will reduce
the complexity of employee management. By using this system we can easily maintain all the
records. It will reduce searching time. It can be easily handled by the person who has
elementary knowledge of computer because it provides a user friendly environment. Its
hardware and software configuration is not very costly that means developed to override the
problems prevailing in the practicing manual system. This project will allow admin to add
new employees after proper authentication mainly propose and attendance maintenance
report. Admin can also add new record and posts.
User can easily view there Leave reports using separate user ID and password. It can
allocate employees to switch different departments at different posts and maintain report
about the employee. But employee can able to view only the report form not able to update or
Edit the records in the database. Database should store all personal details of employees such
as date of birth full name etc. and his educational background, work experience, skill sets,
current and past details in different tables with proper relations.
Admin can edit employee details and store the details in the database but in the case
of details that can be provided by the employee only. The main concept is to maintain the
attendance report of the employee. In that case the employee daily information should be
monitored and take a list of information to update the records in the database for user details
and also for performance rating of the employee is in future records.
This system provides easy to use and reliable employee attendance tracking and
reporting. It allows employee to clock in and clock out using the PC keyboard with the clock
program. The employee also can apply leave and check leave through the system. The system
will monitor the employees working time. Besides, the system can store the records for
employees such as their personal details information. The system will calculate the amount of
employees who works over time, coming late and apply leave for certain purpose. Based on
the calculation of the above categories, the system is able to generate various reports such as
attendance record, monthly attendance record and employee attendance analysis.
PLATFORM : Windows 7
FRONT END : Visual basics 6.0
BACK END : MS Access
SYSTEM STUDY
2. INTRODUCTION
The project has shown the economic feasibility by the study of the fact that by using this
software the increased number of the consumers can be given service effectively and
efficiently and can save a lot time and saving time means saving money. The cost and benefit
analysis has shown that cost that have incurred in developing the project is less than the
benefits that the project is going to provide once it is developed, so this project has passed
the feasibility test. The working staff members are also interested in this project, as it will
help them to do work with ease and efficiently without complexity, so they supported the
development of this project with full enthusiasm. This shows the behavioral feasibility of the
project. Technical feasibility centers on the existing computer system (Hardware, Software
etc) and to what extent it supports the existing system. As the existing system computer
system is viable so there is no matter of technical feasibility that is the system is technically
feasible. It is the determination of whether a proposed project can be implemented fully
within stipulated time frame. The project was decided to be done in three months and was
thought to be feasible enough.
The company uses an application which is a single user system to find the employee
information.
The important and the most significant drawback is that the system is done by
feeding in excel. There is no proper application is exist. There are errors due to
carelessness or oversight that may result in loss to the data and as to the organization.
For an organization, time is very important factor .
The employee information are stored in the application which is like a excel sheet.
This makes it impossible to search for company information in such a long table
manually and to add a new query if the searched query is not available.
2.2. DRAWBACKS
In existing system there are not complete details about the leave report of the
employee.
Its main disadvantage is updating is not available.
Attendance information is not updated properly.
You cant manipulate data.
Data retrieved is very difficult , Time conception and Inefficient.
The proposed system is designed to eliminate all the drawbacks of the existing system. The
system is part of a large Human Resource Management System Application and shall be
responsible for maintaining information about employees, positions, attendance,
administration.
This system will reduce the complexity of employee management. By using this system we
can easily maintain all the records about ON.EMPLOYEES or OFF EMPLOYEES.
It will reduce searching time. It can be easily handled by the person who has elementary
knowledge of computer because it provides a user friendly environment. Its hardware and
software configuration is not very costly that means.
2.5. INPUT AND OUTPUT
2.5.1. Inputs:
Admin enter his user id and password for login.
User enters his user id and password for login.
Admin enter user id or date for track the user login information.
New users give his completed personnel, address and phone details for registration.
Admin gives different kind of user information for search the user data.
User gives his user id, hint question, answer for getting the forgotten password.
Employee attendance details before process the queries.
Employees search the report information while process.
2.5.2. Outputs:
Admin can have his own home page.
Users enter their own home page.
The user defined data can store in the centralized database.
Admin will get the login information of a particular user.
The new users data will be stored in the centralized database.
Admin get the search details of different criteria.
User can get his attendance details.
2.6. MODULES
Login
Administrator
Attendance Details
Login
Create a Login form for Main Form.
Administrator
Create database to store data of employee in the system and to maintain the record of
employee of the company under the maintenance of admin and update the report.
Attendance Details
Create report for employee and update the report form for generating user details.
SOFTWARE DESCRIPTION
Introduction:
VISUAL BASIC is a high level programming language which evolved from the earlier DOS
version called BASIC. BASIC means Beginners' All-purposeSymbolic Instruction Code. It is
a very easy programming language to learn. The code looks a lot like English Language.
Different software companies produced different versions of BASIC, such as Microsoft
QBASIC, QUICKBASIC, GWBASIC, and IBM BASICA and so on. However, people prefer
to use Microsoft Visual Basic today, as it is a well developed programming language and
supporting resources are available everywhere. Now, there are many versions of VB exist in
the market, the most popular one and still widely used by many VB programmers is none
other than Visual Basic 6. We also have VB.net, VB2005, VB2008 and the latest VB2010.
Both Vb2008 and VB2010 are fully object oriented programming (OOP) language.
VISUAL BASIC is a VISUAL and events driven Programming Language. These are the main
divergence from the old BASIC. In BASIC, programming is done in a text-only environment
and the program is executed sequentially. In VB, programming is done in a graphical
environment. In the old BASIC, you have to write program code for each graphical object
you wish to display it on screen, including its position and its color. However, In VB , you
just need to drag and drop any graphical object anywhere on the form, and you can change its
color any time using the properties windows.
On the other hand, because the user may click on a certain object randomly, so each object
has to be programmed independently to be able to response to those actions (events).
Therefore, a VB Program is made up of many subprograms, each has its own program code,
and each can be executed independently and at the same time each can be linked together in
one way or another.
With VB 6, you can create any program depending on your objective. For example, if you are
a college or university lecturer, you can create educational programs to teach business,
economics, engineering, computer science, accountancy , financial management, information
system and more to make teaching more effective and interesting. If you are in business, you
can also create business programs such as inventory management system , point-of-sale
system, payroll system, financial program as well as accounting program to help manage
your business and increase productivity. For those of you who like games and working as
games programmer, you can create those programs as well. Indeed, there is no limit to what
program you can create ! There are many such programs in this tutorial, so you must spend
more time on the tutorial in order to learn how to create those programs.
Before you can program in VB 6, you need to install Visual Basic 6 in your computer.
On start up, You can choose to either start a new project, open an existing project or select a
list of recently opened programs. A project is a collection of files that make up your
application. There are various types of applications that we could create, however, we shall
concentrate on creating Standard EXE programs (EXE means executable program). Now,
click on the Standard EXE icon to go into the actual Visual Basic 6 programming
environment.
MS ACCESS:
In this lab, we will be implementing the theories on database design that we learned in class
with a commercial Relational Database Management System called Microsoft Access (MSA).
If you have a laptop, we encourage you to install MSA on your computer and bring it to the
lab sessions, since we dont have enough computers to accommodate every student
individually.
If you do not have a copy of MSA on your home PC, you can launch it on any of the lab
machines by selecting Start All Programs Microsoft Office Microsoft Office
Access 2007. To use the lab machines, you will need to set up an account with the IEOR
department; please see Jay Sparks on the fourth floor for details on this procedure.
Most of the information provided in this lab can be accessed in greater detail under Microsoft
Accesss extensive help files. All the information provided in this tutorial is based on MS
Access 2007 unless otherwise specified. If you have a different version installed on your
machine, you should expect to see some minor differences between what is described here
and what you observe on your screen
Uses
In addition to using its own database storage file, Microsoft Access also may be used
as the 'front-end' with other products as the 'back-end' tables, such as Microsoft SQL
Server and non-Microsoft products such as Oracle and Sybase. Multiple backend sources can
be used by a Microsoft Access Jet Database (accdb and mdb formats). Similarly, some
applications such as Visual Basic, ASP.NET, or Visual Studio .NET will use the Microsoft
Access database format for its tables and queries. Microsoft Access may also be part of a
more complex solution, where it may be integrated with other technologies such as Microsoft
Excel, Microsoft Outlook, Microsoft Word, Microsoft PowerPoint and ActiveX Controls.
Access tables support a variety of standard field types, indices, and referential
integrity including cascading updates and deletes. Access also includes a query interface,
forms to display and enter data, and reports for printing. The underlying Jet database, which
contains these objects, is multiuser-aware and handles record-locking.
There are template databases within the program and for download from
their website. These options are available upon starting Access and allow users to enhance a
database with predefined tables, queries, forms, reports, and macros. Database templates
support VBA code but Microsoft's templates do not include VBA code.
Programmers can create solutions using the programming language Visual Basic for
Applications (VBA), which is similar to Visual Basic 6.0 (VB6) and used throughout
the Microsoft Office programs such as Excel, Word, Outlook and PowerPoint. Most VB6
code, including the use of Windows API calls, can be used in VBA. Power users and
developers can extend basic user solutions to a professional solution with advanced
automation, data validation, error trapping, and multi-user support.
FEASIBILITY
REPORT
3. FEASIBILITY
Preliminary investigation examine project feasibility, the likelihood the system will be
useful to the organization. The main objective of the feasibility study is to test the Technical,
Operational and Economical feasibility for adding new modules and debugging old running
system. All system is feasible if they are unlimited resources and infinite time. There are
aspects in the feasibility study portion of the preliminary investigation:
Technical Feasibility
Operational Feasibility
Economical Feasibility
The technical issue usually raised during the feasibility stage of the investigation
includes the following:
Proposed projects are beneficial only if they can be turned out into information
system. That will meet the organizations operating requirements. Operational feasibility
aspects of the project are to be taken as an important part of the project implementation.
Some of the important issues raised are to test the operational feasibility of a project includes
the following: -
The well-planned design would ensure the optimal utilization of the computer resources and
would help in the improvement of performance status.
A system can be developed technically and that will be used if installed must still be a
good investment for the organization. In the economical feasibility, the development cost in
creating the system is evaluated against the ultimate benefit derived from the new systems.
Financial benefits must equal or exceed the costs.
The system is economically feasible. It does not require any addition hardware or
software. Since the interface for this system is developed using the existing resources and
technologies available at NIC, There is nominal expenditure and economical feasibility for
certain.
LOGICAL DESIGN
5.1. FILE DESIGN
The design of error messages is an important part of the user interface design. As user
is bound to commit some errors or other while designing a system the system should be
designed to be helpful by providing the user with information regarding the error he/she has
committed. This application must be able to produce output at different modules for different
inputs.
5.2. PERFORMANCE REQUIREMENTS
Performance is measured in terms of the output provided by the application.
The requirement specification for any system can be broadly stated as given below:
The importance can be stated with a single word Quality. Design is the place where
quality is fostered in software development. Design provides us with representations of
software that can assess for quality. Design is the only way that we can accurately translate a
customers view into a finished software product or system. Software design serves as a
foundation for all the software engineering steps that follow. Without a strong design we risk
building an unstable system one that will be difficult to test, one whose quality cannot be
assessed until the last stage.
Database designed based on the E-R model may have some amount of inconsistency,
ambiguity and redundancy. To resolve these issues we have to do some amount of refinement
is required. This refinement process is called as Normalization.
7.1.1. Determinant
Example: In RESULT relation, Empno. attribute may decide t he Empsalary attribute. This is
represented as Empno. Employee and read as Empno. decides Employee.
In the RESULT relation, Empno. attribute is not a key attribute. Hence it can be concluded
that key attributes are determinants but not all the determinants are key attributes.
7.1.2. Functional Dependency
Formal definition of full functional dependency is: In a given relation R, X and Y are
attributes. Y is fully functionally dependent on attribute X only if it is not functionally
dependent on sub-set of X. However X may be composite in nature.
7.1.4. Partial Dependency
In the above relationship DEPT Name, IName, Workplace# are partially dependent on
composite attributes Employee# DEPT# because DEPT# alone defines the
DEPT Name, IName, Workplace#.
Partial Dependency
Formal definition of partial dependency is: In a given relation R, X and Y are attributes.
Attribute Y is partially dependent on the attribute X only if it is dependent on subset of
attribute X. However X may be composite in nature.
7.1.5. Transitive Dependency
In above example, Workplace# depends on IName and in turn IName depends on DEPT#.
Hence Workplace# transitively depends on DEPT#.
Transitive Dependency
In a given relationship R, if the attribute X uniquely defines all other attributes, then the
attribute X is a Key attribute which is nothing but the candidate key.
In a given relationship R, all the attributes which are not key attributes are considered as non-
key attributes.
7.2. Types of Normal Forms
7.2.1. First Normal Form (1NF)
A relation is in first normal form if it meets the definition of a relation:
Each attribute (column) value must be a single value only.
All values for a given attribute (column) must be of the same type.
Each attribute (column) name must be unique.
The order of attributes (columns) is insignificant
No two tuples (rows) in a relation can be identical.
The order of the tuples (rows) is insignificant.
100 A CSE
101 B ECE
102 C CSE
103 D MECH
104 E EEE
Manager 15 L
Tech Lead 9L
Software Tech 8L
Tech Associate 10 L
Foremen 4L
7.2.3. Third Normal Form (3NF)
Emp.ID Position
100 Manager
101 Tech Lead
102 Software Tech
103 Tech Associate
104 Foremen
8. DATA-FLOW DIAGRAM
LEVEL 0
USER
ENTER
THE
DETAILS
LOGIN
LEVEL 1
ADMINISTRATOR
LOGIN
EMPLOYEE
DETAIL REPORT
ATTENDANCE
DETAILS
VIEW DETAILS
LEVEL 2
9. DATABASE DESIGN AND ANALYZING:
Database Name: payroll
Table: branch
FIELD NAME DATA TYPE DESCRIPTION
brh_code Text branch code for identity
cmp_code Text company code for identity
addr1 Text Address 1 for details
addr2 Text Address 2 for details
addr3 Text Address 3 for details
pin-code Number Pin code for verification
tel Number Telephone number
fax Number Fax Number
email Text E-mail id for sending details
web Text web site id
date of comm. Date / Time date and time for details
TABLE: emp_leave_availed
FIELD NAME DATATYPE DESCRIPTION
emp_code Text
month Text
TABLE: emp_leave_details
FIELD NAME DATATYPE DESCRIPTION
emp_code Text
year Number
cas_leave Number
sck_leave Number
pri_leave Number
oth_leave Number
mrt_leave Number
TABLE: emp_person
FIELD NAME DATATYPE DESCRIPTION
emp_code Text Employee code for identity
grd_code Text Grade code for
emp_name Text
sck_leave Text
father_name Text
addr1 Text Address 1 for details
addr2 Text Address 2 for details
addr3 Text Address 3 for details
pincode Number Pin code for verification
tel Number Telephone number
maritalstat Yes / No marital states of a person
sex Yes / No Gender details
bloodgrp Text blood group details
qualification Text qualification details
date of join Date / Time date of joining in the company
date of confirm Date / Time date and time for details
TABLE: Loan_availed
FIELD NAME DATATYPE DESCRIPTION
emp_code Text
in_name Text
date of avail Text
amt_availed Number
amt_paid Number
tot_instal Number
bal_instal Number
amt_per_instal Number
TABLE: Loan_Master
FIELD NAME DATATYPE DESCRIPTION
in_name Text
rate_interest Number
TABLE: salary
FIELD NAME DATATYPE DESCRIPTION
emp_code Text
dateofissual Date / Time
basic Number
hra Number
cca Number
da Number
medical Number
washing Number
conveyance Number
ita Number
otr1 Number
oth2 Number
pf Number
gpf Number
medical_ded Number
ptax Number
incometax Number
incometax1 Number
income3 Number
loan1 Number
loan2 Number
loan3 Number
lossofpay Number
othded Number
splallw Number
spldedn Number
gross Number
netsal Number
SOURCE CODE
AND FORM
Main Form
REPORT
SYSTEM TESTING
This phase determine the error in the project. If there is any error then it must be removed
before delivery of the project. For determining errors various types of test action are
performed.
Unit Testing
Unit testing focuses verification effort on the smallest unit of software design
the module. Using the detail design description as a guide, important control paths are
tested to uncover errors within the boundary of the module. The relative complexity of
tests and the errors detected as a result is limited by the constrained scope established for
unit testing. The unit test is always white box oriented, and the step can be conducted in
parallel for multiple modules.
Unit testing is normally considered an adjunct to the coding step. After source
level code has been developed, reviewed, and verified for correct syntax, unit test case
design begins. A review of design information provides guidance for establishing test
cases that are likely to uncover errors. Each test case should be coupled with a asset of
expected results.
Because a module is not a stand-alone program, driver and/or stub software must
be developed for each unit test. In most applications a driver is nothing more than a main
program that accepts test case data passes such data to the module(to be tested), and prints
the relevant results. Stubs serve to replace modules that are subordinate (called by) the
module to be tested. Stub or dummy subprogram users the subordinate modules
interface, may do minimal data manipulation, prints verification of entry and returns.
Drivers and stubs represent overhead. That is, both are software that must be written but
tat is not delivered with the final software product. If drivers and stubs are kept simple,
actual overhead is relatively low. Unfortunately, many modules cannot be adequately unit
tested with simple overhead software. In such cases, complete testing can be postponed
until the integration test step.
Unit testing is simplified when a module with high cohesion is designed. When
only one function is addressed by a module, the number of test cases is reduced and errors
can be more easily predicted and uncovered.
System Testing
Software is only one element of a larger computer based system. Ultimately,
software is incorporated with other system elements (e.g. new hardware, information),
and a series of system integration and validation tests are conducted. Steps taken during
software design and testing can greatly improve the probability of successful software
integration in the larger system.
A classics system testing problem is finger pointing. This occurs when a defect
is uncovered, and one system element developer blames another for the problem. Rather
that including in such nonsense, the software engineer should anticipate potential
interfacing problems and (1) design error handling paths that test all information coming
from other elements of the system.(2) conduct a series of tests that simulate bad data or
other potential errors at the software interface; (3) record the results or tests to use as
evidence if finger pointing does occur (4) participate in the planning and design of
system test to ensure that software is adequately tested.
There are many types of system tests, which are worthwhile for software-based systems, as
detailed hereunder:
Recovery testing is a system test that forces the software to fail in a variety of
ways that verifies that recovery is properly performed.
Security testing attempts to verify that protection mechanisms built into a system
will protect it from improper penetration
Stress tests are designed to confront programs with abnormal situations.
Performance testing is designed to test the run-time performance of software
within the context of an integrated system.
Integration Testing: -
A neophyte in the software world might ask a seemingly legitimate question once
all modules have been unit-tested. If they all work individually, why do you doubt that
theyll work when we put tem together? The problem, of course, is putting them together
interfacing. Date can be lost across an interface; one module can have an inadvertent,
adverse effect on anther, sub functions, when combined, may not produce the desired
major function; individually acceptable imprecision may be magnified to unacceptable
levels; global data structures can present problems. Sadly, the list goes on and on.
Integration testing is a systematic technique for construction the program structure
while at the same time conduction test to uncover errors associated with interfacing. The
objective is to take unit tested modules and build a program structure that has been
dictated by design. There is often a tendency to attempt non-incremental integration; that
is, to construct the program using a big bang approach. All modules are combined in
advance. The entire program is tested as a whole. And chaos usually results! A set of
errors are encountered. Correction is difficult because the isolation of causes is
complicated by the vast expanse of the entire program. Once these errors are corrected,
new ones appear and the process continues in a seemingly endless loop.
Incremental integration is the antithesis of the big bang approach. The program
is constructed and tested is small segments, where errors are easier to isolate and correct;
interfaces are more likely to be tested completely, and a systematic test approach may be
applied.
Integration testing can be categorized into two types, namely top-down integration
or bottom-up integration. Top-down integration is an incremental approach to the
construction of program structure. Modules are integrated by moving downward through
the control hierarchy, beginning with the main control module. Modules subordinate to
the main control module are incorporated into the structure in either a depth-first or
breadth-first manner. The bottom-up integration testing as its name implies, begins
construction and testing with atomic modules. Because modules are integrated for the
bottom up processing required for modules subordinate to given level is always available
and the need for stubs is eliminated.
The selection of an integration strategy depends upon software characteristic and,
sometime project schedule. In general, a combined approach that uses the top-down
strategy for the upper levels of the program structure, coupled with a bottom-up strategy
for the subordinate levels, may be the best compromise.
SYSTEM SECURITY
10. INTRODUCTION
The protection of computer based resources that includes hardware, software, data,
procedures and people against unauthorized use or natural
Disaster is known as System Security.
Security
Integrity
Privacy
Confidentiality
SYSTEM SECURITY refers to the technical innovations and procedures applied to the
hardware and operation systems to protect against deliberate or accidental damage from a
defined threat.
DATA SECURITY is the protection of data from loss, disclosure, modification and
destruction.
PRIVACY defines the rights of the user or organizations to determine what information they
are willing to share with or accept from others and how the organization can be protected
against unwelcome, unfair or excessive dissemination of information about it.
Forms cannot be submitted without filling up the mandatory data so that manual mistakes
of submitting empty fields that are mandatory can be sorted out at the client side to save
the server time and load.
Tab-indexes are set according to the need and taking into account the ease of user while
working with the system.
Some checks cannot be applied at client side. Server side checks are necessary to save
the system from failing and intimating the user that some invalid operation has been
performed or the performed operation is restricted. Some of the server side checks imposed
is:
Server side constraint has been imposed to check for the validity of primary key and
foreign key. A primary key value cannot be duplicated. Any attempt to duplicate the
primary value results into a message intimating the user about those values through the
forms using foreign key can be updated only of the existing foreign key values.
Using server side validation, constraints on several restricted operations are imposed.
FUTURE ENHANCEMENT
As a future work, some additional stuff could be implemented and integrated into the
application code making it much more reliable and flexible; especially what concerns a pay-
roll module, for instance. Apparently, the role of such systems is basic and essential within
each company that wants to keep a really good control and record concerning its personnel
data, functionality and performance on all levels in its structure. Employee management
system will be enhanced up to all departments of Group. Integrating Leave management and
Attendance system. As organization is multinational make application internet base.
CONCLUSION
In this report, an information systems development has been presented. It was emphasized on
the basic steps, consequently taken during the projects development course as a particular
attention was turned to the basic operative functions performed upon the data into the
database. The reports content comprises the whole task solution, starting from the
programming environments have been selected, going through the database, the applications
analyze and construction, and finishing with the code-implementation and test-samples.
Every organization, in nowadays, has the necessity of managing its staff on a really good
level as the staff has definitely the greatest merit of building up a company as such as it is.
The well managed staff means giving the appropriate financial awareness and all kind of
benefits as such as they have been deserved. Thats why the development of such systems is
not just a programming business a lot of people are ordinarily involved in such projects and
one of the basic requirements is the reliability of the system, especially what concerns the
storage of data and all of the operations that will be performed upon it.