CHAPTER IINTRODUCTION IntroductionThe instructional presence of students could be very crucial because it will have an effect on college students from acquiring their know-how and abilities in addition to their grades

CHAPTER IINTRODUCTION IntroductionThe instructional presence of students could be very crucial because it will have an effect on college students from acquiring their know-how and abilities in addition to their grades. This project relates to scholar attendance gadget thru matching their fingerprint to verify their presence. The primary reason of implementing this task is to increase a student attendance device wherein web-primarily based packages are advanced to get pupil attendance with fingerprint.

Due to the present day technological trends, especially within the discipline of verbal exchange and biometric technology, many programs seem to match our normal lives. Biometric generation is extensively used as a shape of user identification and manipulate. Finger is one of the many varieties of biometrics used to pick out individuals and affirm their identity. Fingerprint sensor is an electronic device used to capture digital photos of fingerprint patterns and cannot be created or destroyed. This fingerprint feature makes it specific and very comfortable.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

The presence of FTMK Students Fingerprint Attendance may be diagnosed as the high-quality confirmation to music the document of the presence of person students. Additionally, according to trendy era, it’s far no longer uncommon to take the presence of students via their fingerprints. Therefore, the cause of fingerprint sensor implementation on this task is to make the each day recurring simple and clean

Problem Statement1.No backup for the attendance facts as soon as the lecturer accidentally lost the attendance sheet.
At some point of the whole semester, the lecturer will most effective report and evaluate the attendance of college students via a piece of attendance sheet. Nearly some weeks before the end of the semester, scholar attendance will be the important thing to the present day system by using the lecturer to supply a bar listing file. However if the lecturer loses the attendance sheet, which means the document could be misplaced and the lecturer will grow to be not capable of input the right attendance report into the device in the previous few weeks of the semester.

2.Course mate enables individuals who did now not attend the class sign the attendance which additionally referred to as ‘friend-signing’.

Maximum of the time, teachers confronted a trouble with a class that turned into empty however a full list of attendance. This is because maximum college students will only attend instructions for the primary few weeks however afterwards they’ll ask their friends who’re usually attending instructions to help them sign up for attendance. In view that academics are always busy in university and do no longer have time to take a look at their presence separately, then college students take advantage of this factor to assist their buddies sign.

3.Hard in studying and tracking pupil performances based on attendance thing.
In assessing the academic performance of individual college students, it is important to review the facts of their presence. therefore, through attendance records, teachers can easily discover whether college students with negative performance because of terrible attendance elements or other elements. with out right and accurate scholar attendance, it is difficult to evaluate the actual performance of terrible overall performance.?
ObjectiveIn developing this device, several assignment goals had been decided. some of the goals of this undertaking have been identified and listed under.

To replace existing student presence systems for computerized and automatic attendance device.

2. To increase laptop-based applications that reap student fingerprint every time they attend a class for attendance marker functions.

3. To dispose of possibilities for college kids to ask their buddies for their presence through the implementation of the fingerprint attendance machine.

Project Scope Student Module
In the student module, it allows users to include information for all students in schools, colleges, and universities. There are several functions provided in student modules that include student records, entering new student records, and updating student records. Student information will not be removed / deleted and will be stored in the system as student history for future reference.

Fingerprint module
In the fingerprint module, it is used to store fingerprints of all students into the system for future achievement while students attend each class for previously registered subjects. First, students will need to register their fingerprints into the system when they first come to class. Then, each time they attend a class, they need to scan their fingerprints through the hardware provided in the class to perform fingerprint matching with the fingerprint record that has been stored in the system. Attendance will be automatically signed by the system when the student fingerprint corresponds to the fingerprint record in the system. If a student’s fingerprint does not exist in the system when making a match, the system will ask for a message indicating “invalid fingerprint” while when the match is successful, the system will also prompt a successful message to indicate “Attendance taken” to let students know.

Report Module
In the report module, it is used to let users produce reports on student attendance records. First of all, each time the class is over, the student’s attendance list list for the class will be automatically sent to the system and stored. This report will be the presence of students for the whole semester. It aims to ease the lecturers and users in analyzing student attendance for the whole semester. In addition, the system automatically calculates the percentage of student attendance for the semester. Users only need to generate reports without doing much calculations and adjustments.

Project Impact, Significance, and ContributionIn the advanced initiatives, there are some contributions that are diagnosed. With the aid of imposing the Attendance Presence of FTMK Student Fingerprint Attendance, it will provide a extra unique and green student presence report to fully utilize the computerized device. With the aid of the usage of this gadget, users will truely realize that the procedure of this machine might be faster and less difficult than the complex machine nowadays. Similarly, this machine can help teachers take student attendance greater successfully with out stressful approximately losing or destructive their attendance sheet while turning in it to students throughout the elegance.

Further, as mentioned in advance, maximum universities are actually using a conventional attendance gadget that calls for students to sign on a paper gift and gift them to college students for the duration of the elegance in order that every student attends the elegance signing. Even though traditional attendance structures appear to be very powerful it is a sort of time-eating process and will intrude with the student’s recognition on paying attention to lectures in addition to at some point of the take a look at. Consequently, in preventing this stuff from occurring once more, in an superior gadget, the system could be developed with a purpose to require college students to match their fingerprints as quickly as they input the study room with the hardware provided within the study room. The use of fingerprint to advantage student attendance can be considered as one of the more desirable machine innovations. Additionally, this will truly help the school to put off the pal signing problem as nicely.

In the end, the donations supplied in this gadget will help academics control the pupil’s attendance file extra without problems and appropriately. This will provide a better coaching environment for academics as teachers will no longer face empty training whenever they train in front of the degree thru the implementation of the fingerprint attendance machine. No longer only that, students may also improve their educational performance. Therefore, this machine desires to be developed because it will help save time from pointless processes and promote a completely correct and efficient way to seize pupil attendance.

ConclusionThis chapter offers a general advent to the challenge includes an introduction, problem statement and describes scopes, assignment huge and additionally describes the targets of the project. finally, through using the board, the teachers and students are now not in hassle and a database machine this is constructed will be fast and efficient use for customers.

CHAPTER II
LITERATURE REVIEW AND PROJECT METHODOLOGY
Introduction
Literature evaluate can be called a revision of the current gadget conducted via previous researchers and a evaluate of the gadget to be evolved. Literature studies also focuses on the information and thoughts set up on their subjects and their strengths and weaknesses. These days, technology is getting higher and replacing the traditional system to hurry up the technique through introducing a automated gadget. There are several sorts of attendance structures delivered nowadays at colleges, colleges, and universities.

Manual Attendance Management SystemInside the presence of current structures, college students will sign a attendance list as evidence that they may come to magnificence. This system is a guide system that calls for more human interaction inside the attendance record process. This system requires a lecturer or administrator to generate reports manually every month and update the record to the system.

On this device, there are many weaknesses that may be observed. First, the machine requires a lecture to carry a list of attendance to the elegance. There may be also no cloud backup in case of any catastrophe. Moreover, the pair of publications can help folks who are not attending class signing attendance, additionally referred to as ‘buddy-signing’.

RFID Based Attendance Management SystemIn the presence of the existing system, students will sign the attendance list as evidence that they will come to class. This system is a manual system that requires more human interaction in the attendance record process. This system requires lecturers / administrators to generate reports manually every month and update reports to the system.

In this system, there are many weaknesses that can be found. First, the system requires a lecture to bring a list of attendance to the class. There is also no cloud backup in case of any disaster. Additionally, the pair of courses can assist those who are not attending the attendance of the class signer, also known as ‘buddy-signing’.

Barcode Scanner Based Student Attendance SystemBarcode scanner presence systems have been introduced to enhance admin body of workers management techniques consisting of pupil attendance reports every day, weekly and yearly. In barcode scanner era, students might be issued a student card for each of them with the bar code shown on the card for scanning functions each time they attend the class. In addition, the barcode scanner gadget also presents a feature that if the pupil does now not meet the attendance requirements, the device will robotically generate a caution letter to the scholar to be sent to their dad and mom. Moreover, it minimizes mistakes that can be because of human mistakes as it is nearly absolutely automated systems that depend totally on bar code scanners.

But, the gadget calls for students to have their student card with a unique bar code displayed on their student card every time they attend the class. Further, even though the system lets in the admin body of workers to produce a caution letter if the pupil does now not meet the attendance necessities, however, the generated warning letters can be given to college students and then skip to their dad and mom thru the scholar themselves with out giving instantaneous messages or emails to their dad and mom. Consequently, the student can also become throwing letters and pretending they’ve surpassed a caution letter to his mother and father
Comparison between existing solution and proposed solutionTable 1 shows the comparison netwwen existing solution and the proposed solution for the student attendance.

Table SEQ Table * ARABIC 1 Comparison between existing solution and proposed solutionComparisons
Systems Unique Identifier Accurate and efficient attendance records Saves Time Display on Board Special Hardware Identity Card
1. Manual Student Attendance Management NO NO NO NO NO NO
2. RFID Based Attendance Management System NO NO YES YES YES YES
3. Bar Code Scanner Based Student Attendance System NO YES YES NO YES YES
4. FTMK Student Fingerprint Attendance System YES YES YES YES YES NO
Fact and FindingThere are numerous kinds of reality locating methods that can be used to acquire useful statistics that allows in analyzing the areas related to the developer device designed to be advanced. Truth finding is a very vital technique had to find critical information and help humans in making high-quality choices. The techniques of finding information are categorised into categories that consist of questionnaires, observations, interviews, surveys, study of written assets and others. This approach is used to collect the records required by way of researchers to behavior analysis. In sporting out this undertaking, a few methods of locating information which includes evaluate of the supply of written and observational techniques have been used to accumulate vital records
Project MethodologyThere are various types of models that can be used in development such as Rapid Application Development (RAD), Model V, Iterative Model and others. In this project, we chose the Hybrid Waterfall-Agile Model as this model allows teams to define requirements and adapt to changing needs through continuous feedback and transmission. Figure 2.1 below shows the Agile Air Hybrid Model.

Figure STYLEREF 1 s 3.0 Structure of Waterfall-Agile Hybrid ModelWithin the Waterfall-Agile Hybrid technique, you aren’t watching for a segment to finish before beginning the next phase; as a substitute you begin the following segment as soon as you can. This means you could initiate independent development of numerous modules or additives at the same time as the planning phase continues to be in technique. The improvement phase follows the precept of normal waterfalls.

Project Requirement
Software RequirementThis software is part of a computer system that consists of coded information or computer commands, in contrast to the physical hardware which is a system built. It is a collection of commands that allow users to interact with computers, hardware or perform tasks assigned. There are several types of software such as antivirus, operating system, presentation, utility, and others. In this case, the software used is a database and application software.

Arduino IDE 1.8.5

Figure STYLEREF 1 s 4. SEQ Figure * ARABIC s 1 1 Arduino IDE 1.8.5On September 29, 2017, Arduino released IDE 1.8.5. In this version, it includes an Arduino builder which is a pure line-up command that controls the diagram, completes the dependency of the library and establishes a compilation unit. It can also be used as a separate program in a continuous integration environment. Next is the USB pluggable core which means it can act as many different USB devices without changing the core. Finally is a serial plotter that allows us to plot data in real time
APPSERV

Figure STYLEREF 1 s 4. SEQ Figure * ARABIC s 1 2 APPSERV
IT infrastructure is expensive to own and manage. With Appserv, your IT becomes a subscription-based, with the costs incurred in a monthly bill and no capital expenditure. With Appserv managing day-to-day IT and providing support to your employees, you and your team can focus on building a better business. Access your business information via desktop, laptop, tablet or smartphone anywhere and anytime. Your IT is consistent and reliable, whether your users are in the office or not. Access the level of IT capabilities and services you will struggle to achieve yourself, ensuring that it is always a normal business. Since 1999, The Appserv Cloud has been our ultimate focus, we develop long-term professional relationships with our customers and provide tailor-made advice to clients’ individual business needs. Appserv Cloud offers full IT infrastructure services to companies that require reliability, security and flexibility.

MySQL

Figure STYLEREF 1 s 4. SEQ Figure * ARABIC s 1 3 MySQLMySQL is an open source relational database management system (RDBMS). Its name is a combination the name of co-founder and his daughter and the abbreviation for Structured Query Language. It has several paid edition with additional functionally for proprietary use. MySQL mainly associated with web-based applications and online publishing and is an important component of LAMP.

phpMyAdmin

Figure STYLEREF 1 s 4. SEQ Figure * ARABIC s 1 4 phpMyAdminphpMyAdmin is a free software tool written in PHP, intended to handle MySQL administration via the Web. phpMyAdmin supports multiple operations on MySQL. Frequently used operations (managing databases, tables, columns, contacts, indexes, users, permissions, etc.) Can be done through the user interface, while you still have the ability to execute SQL statements directly. For ease of use to multiple people, phpMyAdmin is being translated into 72 languages ??and supports both LTR and RTL languages. phpMyAdmin is an eight year project with a stable and flexible code base.

Project Schedule and Milestone
Activity/Week 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Project Briefing and title discussion Review project proposal Identify project requirement Design system and Construct prototyping Developing application Testing and modifying codes Testing final application Improvement/implementation Finalizing application Design and complete the final report Submit final report and LogBook Table 2 Gantt Chart
Conclusion
Generally, technique segment offers a guideline what should do in developing the gadget. Besides, it used to manipulate tasks from begin to finish. It additionally describes each step inside the undertaking lifestyles cycle in depth, so developers know precisely which responsibilities to finish, whilst and the way.

The methodology that will be used within the device improvement existence cycle (SDLC) for the FTMK FSA has six stages of development, starting with requirement phase, system design, implementation, integration and checking out, deployment and protection phase. All of the phases of the method are associated with each different because, if one of the phases of the technique cannot be achieved or finished on time, the subsequent mission or segment could be affected.

CHAPTER IIIANALYSIS3.1 Introduction
On this chapter will speak the segment of evaluation and analysis of needs. Analyzing system is an vital step in organising an amazing and efficient device. By using analyzing the current machine and backup system, we will get some data about the gadget in order that the proposed device can be correctly developed and meet the needs of the customers. First off, the analysis will come across issues encountered within the cutting-edge gadget. That is an important step because it will offer beneficial statistics to developers to increase an awesome device thereby overcoming the problems faced via the current machine. Then, a brand new device analysis to be advanced soon can be carried out. This can be completed by way of representing a diagram showing the drift of facts within the new system. Some reasons can also be given to offer short facts on the brand new device.

3.2 Problem Analysis
3.2.1 Background of Current System
At present, the presence of the existing UTEM students’ faculty of Information Technology and Communication (FTMK) will sign a list of attendance as proof that they will come to class. This system is a manual system that requires more human interaction in the attendance record process. This system requires a lecturer / administrator to generate reports manually every month and update the report to the system.

In this system, there are many weaknesses that can be found. First, the system requires a lecture to bring a list of attendance to the class. There is also no cloud backup in case of any disaster. Furthermore, the pair of courses can assist those who are not attending class signing attendance, also known as ‘buddy-signing’.

3.3 Requirement Analysis
Facts requirements, purposeful necessities, non-functional requirements and other requirements will be blanketed in requirement evaluation. Context diagram and data flow diagram the attendance of the FTMK Student Fingerprint Attendance will be protected in the functional requirements. Software program necessities, hardware necessities and network requirements may be stated in different necessities.

3.3.1 Data Requirement
Data requirements, useful requirements, non-functional necessities and different requirements may be blanketed in requirement evaluation. Context diagram and statistics flow diagram the attendance of the FTMK Student Fingerprint Attendance might be covered within the purposeful necessities. Software program program requirements, hardware requirements and network requirements can be stated in distinctive requirements. Other tables refer to appendix A.

Student
Data Data Type Key
Student_ID Vachar(25) Primary Key
Student_Name Vachar(25) Table 3 List of attribute (Student)3.3.2 Functional Requirement
The problem has been analyzed to get the function of this system. The explanation below demonstrates using a system’s functional case and explains what users can do with the system

Figure 3.1 Use Case Diagram of FTMK Student Fingerprint Attendance
We represent the use case above to explain and understanding the requirement of the system. Based on the figure 3.1, admin as administrator can manage FTMK Student Fingerprint Attendance information include add subject, change status of subject. The others function can be done by lecturer and student also. Student can register fingerprint and profile, enrol subject and view attendance. Lecturer can register profile, insert class details, enrol subject, view attendance and print report
Functional Requirement (Process Model)
1.Could make an attendance.

2. Can track all attendance data with the database of students.

3. Can upload, update certain matters to facilitate it.

3.3.4Non-functional Requirement
1. This system can be used using a web browser.

2. Validate field for required data is not null. User need to fullfill all the data required and control continue if the field is null.

3.3.5Other Requirement
3.3.5.1 Software Requirement
NFR Type Software Description No. SR_01 Platform/Oper 1) Microsoft Operating machine
ating System Windows As a platform
in which the system will be makes use of.

MySQL databases are available
SR_02 Database 2) MySQL in all foremost programminglanguages with language-
unique API.

The Apache HTTP Server is a
Web Server web server which is can
SR_03 3) Apache support programming language
Extension originally of PHP and MySQL
database.

SR_04 Sublime Text 4) PHP PHP is a reflective programming language originally designed for producing dynamic web pages.

SR_05 Arduino IDE 5) Arduino Board Used as device to run the the fingerprint sensor Table 4 Description of Software Requirements
3.3.5.2 Hardware Requirement574167036258500
NFR Devices Hardware Description No. HR_01 Laptop To be able to view the web
based system.

HR_02 Printer The printer is used to print
documents, and reports.

HR_03 Memory 512 Need to make the system
operate easily and smoothly.

HR_04 Fingerprint Sensor Fingerprint Sensor Used to make an attendance record
HR_05 Uno R3 ATmega328P Board Module Board Used to run the fingerprint sensor
HR_06 Ethernet Shield W5100 Board Module for Arduino
Table 4 Description of Hardware Requirement
3.3.5.3 Network Requirement
NFR No. Requirement Description
NR_01 Network Cable RJ-45 As connector to cable
5741670-27876500Table 6 Description of Network Requirement
3.4Conclusion
In conclusion, this bankruptcy explains how the contemporary system operates and the methods used to make sure the destiny system will conquer the hassle. in addition, on this chapter it briefly explains how the waft of records for each process includes the specified requirements including functional requirements, non-functioning and others.
For the next chapter to be formed, this chapter will in short describe the proposed design for this system.

CHAPTER IV
DESIGN
4.1Introduction
Design is the most vital section in machine development. This consists of conceptual layout, logical design and physical layout. The concept design will illustrate the relationship of the entity courting diagram (ERD) within the form of enterprise regulations. For logical design, the statistics dictionary will be entered and validate the conceptual layout. Whilst for physical layout it’s going to briefly describe DBMS choice.

This chapter is split into three (3) designs namely gadget architecture layout, database design and graphical person interface. Each design method is critical to increase the system according to the desires of the person. It’s going to help in developing interactive systems.

4.2Database design

System structure is a version that describes the system structure. Conceptual models, logical and physical fashions are the styles of models. Entity courting diagram is an example of a conceptual model. Even as the statistics dictionary is an instance of a logical version. Final however no longer least, coding and interface are examples of physical fashions.

Device architecture allows to understand system functions. Developers of development systems need to make customers that the device architecture meets the needs of the customers and offers interactive interfaces for the system
4.2.1 Conceptual design
The concept layout will give an explanation for how the system have to work on the basis of need. it’s miles essential for the device to fulfill user necessities and performance. figure 4.10 is an Entity relationship Entity (ERD) for the Attendance of FTMK Student Fingerprint Attendance.

3549655588000
Figure 4.10 FTMK Student Fingerprint Attendance Entity RelationshipDiagram(ERD)
4.2.2Logical design
On this section, it’s going to describe that data dictionary for the system. The data dictionaries of FTMK Student Fingerprint Attendance are described in more element inside the desk beneath. Different tables refer to appendix b.

Attribute Content Data Format Required PK/ Example
name type FK Table : lecturer Lecturer_ID Lecturer int (10) 999999 Y PK 1
ID Lecturer_Name Lecturer varchar Xxxxxx Admin
Name (20) Table 7 Lecturer Data Dictionary
4.2.3Physical design
Physical design is ready the choice of Database control system (DBMS). DBMS choosing this system is mysql. This DBMS is supported by means of phpmyadmin. This mysql has an clean graphical person interface for developers walking database obligations.

The DBMS used is to design coding for database duties as a design device. Coding builds DBMS such as encoded brief database (insert), triggers and saved tactics. The encodings constructed into mysql can show whether or not there are errors or issues inside the interface. It may additionally display the success of coding built by way of displaying the output within the interface.

The saved technique function is to manage and hold records without problems. It has the productivity and convenience to use whilst it has a powerful database software. The coding method is stored in Phpmyadmin connected to the selected language so that it will make the language easy to get facts from the database using easy queries.

Triggers work almost similar to stored processes however they’ll run as devices. Furthermore, the trigger additionally works for the atom to generate the cost of the columns obtained.

4.3Graphical User Interface (GUI) Design
This module that will be used in the interface will provide an explanation for element in this segment. A number of the feature includes in the machine are login and other could be explain.

Figure 4.11 Homepage of FTMK Student Fingerprint Attendance

Figure STYLEREF 1 s 4.12 Login Page (Admin)
Figure STYLEREF 1 s 4.13 Login Page (Student And Lecture)
Figure STYLEREF 1 s 4.14 Lecture Registration Page
Figure STYLEREF 1 s 4.15 Student Registration Page
Figure STYLEREF 1 s 4.16 Register Fingerprint Page
Figure STYLEREF 1 s 4.17 Register Fingerprint Page (Inserted Data)
Figure STYLEREF 1 s 4.18 Attendance Page
Figure STYLEREF 1 s 4.19 Attendance Page (Arduino)
Figure STYLEREF 1 s 4.20 Attendance List (Lecturer)
Figure STYLEREF 1 s 4.21 Attendance List (Student)

Figure STYLEREF 1 s 4.22 Class List Page
Figure STYLEREF 1 s 4.23 Subject List Page
Figure STYLEREF 1 s 4.24 Student List Page
Figure STYLEREF 1 s 4.25 Subject Registration Page
Figure STYLEREF 1 s 4.26 Active Subject Page
Figure STYLEREF 1 s 4.27 Deactivated Subject Page
Figure STYLEREF 1 s 4.28 Lecturer’s Class List Page
Figure STYLEREF 1 s 4.29 Pie chart of Student Attend by Week4.4Conclusion
This chapter discusses extra approximately how the system layout is being constructed that includes all sorts of designs together with conceptual design, logic, physical and person interface. Every kind offers one of a kind systems and capabilities but with the same objective. All styles of designs relate to each different to make the machine work. This design is constructed and carried out to make it real and may be used by targeted customers.

CHAPTER V
IMPLEMENTATION & TESTING
5.1 Introduction
This section will focus on how to handle FTMK Student Fingerprint Attendance. The use and delivery of the framework is the part where the framework will be actualized and transmitted, in fact, to be used. The framework must be actualized and communicated when the framework and inspection plan is completed. Testing procedures will also be complete to ensure the framework works wonderfully and achieves customer fulfillment. This framework will be tried by designers and end customers by taking the best strategy to recognize the implementation of the framework
5.2 Development Environment Setup
The development environment setup for FTMK Fingerprint Attendance will involve hardware and software requirements. All inventories will be stated step by step and clearly indicated. Hardware and software requirements are described in Chapter IV and will be further described for connection in the section below.

5.2.1 Hardware Development Setup
In this project, the hardware used are stated in the Chapter IV. There are a few jumper wires, Ethernet V2 shield, Ethernet wire, and UNO R3, fingerprint sensor, that will be attached to the ATmega328 Microcontroller. ATmega328 Microcontroller will receive command from the Arduino IDE software application to control the hardware. The below shows the detail pins that will be inserted by the hardware to the ATmega328 Microcontroller.

Figure 5.1 shows the project prototype that is been developed. This prototype includes a few jumper wires for connection, fingerprint sensor, arduino uno r3, etherrnet shield, and Atmega328 microcontroller. All connection is followed by the table 5.1.

Figure 5.1: Details of ATmega328 Microcontroller
Table 5.1: Details of Each Pins Numbers
Hardware Wire Pins
Led Light (Yellow) Power G
Signal D6
Fingerprint Sensor VCC 3V
Output A0
GND 3V
Arduino UNO GND G
VCC 3V
SDA D2
SCL D1
Ethernet shield Yellow 3V
Red D5
Black G
Figure 5.2 shows the idea of prototype to demonstrate the real environment at the room. This prototype is set up by the all hardware needed. The hardware connection such as Arduino UNO R3 is connected to the PC via USB port.

Figure 5.2: View of The Prototype
5.2.1.1 Software Development Setup
For server part, users have to type “http: localhost” in a web browser like Google Chrome or Mozilla Firefox, a web browser will display the main page of the Appserv server. The user should create a folder that will store the entire PHP interface or language in the “C: appserv www trial” registry so users can see the interface in the web browser.

1242695-30924500
Figure 5.3: AppServ Logo
Step 1 : Obtain a copy APPSERV by download
To get a copy of APPSERV, users will must download it from https://www.apachefriends.org/download_success.html. it’s going to give you a choice whether the 32 or 64-bit surroundings depends at the configuration of your laptop. similarly this down load includes phpMyAdmin that will help you manage higher databases via an internet-based GUI.

Step 2 : Install the software
APPSERV is downloaded and does no longer load; the person ought to start the set up process.

5.2.1.2 Database Development Setup – Server
The database server refers to a lower back-quit device in the consumer / server structure. The database server functions carry out duties inclusive of facts evaluation, storage and manipulation. It pertains to database management device (DBMS). DBMS is a group of programs that allow records from the database. The DBMS used in this system is (phpmyadmin mysql APPSERV Server). This DBMS has been selected due to the fact it’s far a dependable way to carry out duties which includes taking, growing, updating and deleting database gadgets. It additionally runs square statements and scripts, edits and decodes sq. Code and manipulates information.

Step 1 : Configuring MySQL database
Since the APPSERV server has provided MySQL, it is easier to use as it only needs to click on phpMyAdmin in Between Analyzing APPSERV Server Configuration.

650875-33655000
Figure 5.4 phpMyAdmin database
If someone desires to create a database, click on on new in the left sidebar. Then a new database may be collected. The person wants to go into the name of the database in the field provided. If the database is created, the customer can maintain to create tables, triggers or strategies inside the database.

5.2.1.3 Coding Fingerprint Sensor

Figure 5.5 Coding Fingerprint Sensor
The coding above shows the connection for fingerprint id. It will detect the available fingerprint to sign an attandance.

5.3 Version Control Procedure
FTMK Student Fingerprint Attendance is new implemented and documented. It is new to introduce to the market and the version for the final product system will be 1.0
5.4 Implementation Status
In this section, the duration of each component development will be discussed and explained in detail as illustrated in table 5.2.

No. Component Description Duration for
completed
1 Assembling Hardware Process to connect the jumper wires, Ethernet 13 days
Shield, Fingerprint sensor to the microcontroller. Board by assigning the pins on the USB port of laptop. 2 Building Prototype This process is to setup the prototype of 14 days
the project. 3 Upload Fingerprint
Coding This process is to ensure the Arduino Uno
Connect with Fingerprint sensor 5 days
4 Developing system All the functions of the system will be 60 days
created by using Arduino IDE. Table 5.2: Implementation Status
5.5Conclusion
Implementation phase is the final stage shifting from phase of improvement to generation level. FTMK FSA makes use of appserv server as a server side content and MySQL as database for storing and storing such information. nearly, triggers and saved techniques are used to handle the glide framework primarily based at the business rationale.

the following levels are the test levels tried by the customer to approve and study the necessities and additions to recognise the FTMK Fingerprint Attendance (FTMK FSA) mistakes. The check degree could be defined in chapter 6 and consists of test plans, test strategies, test designs, test results and evaluation.

CHAPTER VI
TESTING
6.1Introduction
This section analyzes FTMK Student Fingerprint Attendance (FTMK SFA) testing and activities. Testing is a technique with the goal of recognizing issues in structure or programming and to know the quality level to meet customer needs. It has been coordinated with the FTMK SFA to approve and review the structure with the objective of being able to
the requirements of the merger. System testing is very important as it avoids chaos until known to customers and thereby avoids combinations including having a terrible reputation. The test of programming is mainly working. However, testing is not limited to the execution of structures with the inspiration of driving the search for the desert. It also needs to choose the test configuration, test methods, test order, test results and exams at the heart of the test stage. Item tests can be intense and viable by following the rules, for example, choosing the right strategy strategy strategy game. This can ensure that the system will work effectively and free of any bugs.

6.2 Testing Plan
Testing configuration portrays the activities, augmentation, and essential testing for the structure. It is basic to ensure all the objective achieved and as a rule of the system is running effectively. Any bugs or mix-ups can be distinguished and settled it before sending to the customer.

Test Organization
In this section, there will be two (2) persons responsible to carry out testing process in the system. The first one is the system developer who develop the system and the second one is the end user. Both tester plays different roles in the testing process.

System Developer
System Developers are responsible for testing the entire system, finding bugs or errors in the system. He is also responsible for the stability and smoothness of the system.

End User
End Users are responsible for identifying any system vulnerabilities, providing feedback on interfaces, functions, and ways to improve the system.

Software Tester
Analyze and review functional requirements. Monitor system performance.

Test Environment
On this sub topic will describe information about the location where this system has been tested. Table 6.2 shows the details of the tests which have been made.

System Configuration Specification
Operating System Windows 10
Operating System phpMyAdmin MySQL
Server Appserv Server version 3.0.12
Web browser Google Chrome, Mozilla Firefox
System/ Programming Language Hypertext Preprocessor (PHP), Hyper
Text Markup Language (HTML), Arduino 1.8.5
Table 6.2 Environment Setup Specification
Test Schedule
The testing processes for the system will take period of time. Any bugs or error being found will return be back to the implementation phase to check again. This is the continuation process until the system is error-free and able to execute successfully.

Activities Description Start Date End Duration
Date Unit Used to test functions 10 July 13 July 3 days
Testing and code module. 2018 2018 Integration Used to Test integrated 14 July 17 July 3 days
Testing module and verify 2018 2018 combined functionality after integration. System Evaluate system 18 July 21 July 3 days
Testing Compliance with its 2018 2018 specific requirements. Acceptance Test completed system 22 July 25 July 3 days
Testing to end user. 2018 2018 Table 6.3 Test Schedule Detail
Test Strategy
For FTMK Student Fingerprint Attendance System, Dynamic Test will be used to evaluate this system. Partial or system product implementation is a matter of Dynamic Testing. Dynamic Testing Techniques are separated into two different strategies known as the Black Box Test and White Box Test. Testing Discovery is known as a social test centered around a system plan, while White Box Testing is trying to give customers a look at the internal structure of the program. Table 6.4 illustrates the views on this methodology.

Approaches Explanations
White Box Testing Testing that assess the interior structure of the program or assessing framework through designer utilizing the program code. White box testing has three distinctive strategy, branch scope strategy and finally way path coverage method.

Black Box Testing Testing the system through their purposeful or non-useful without references to the inner structure of the component or device. Black container trying out is focused solely on the output generated in reply to selected input and execution condition.

Table 6.4 Details of Testing type
Test Design
6.4.1Test Description
Test configuration talks about the experiment distinguishing proof, test cases and expected outcome for every situation which are composed and recorded. The test depiction examines combination test and functionality test. Table 5.3-5.8 demonstrates the consequence of testing.

Login Test Description
Sign-in module is important for authorized users. Users involved in this module are Administrators, Lecturers and Students. Users need to enter their ID and password for system login. Below is a table 6.5 that will display the login test case.

Test Case Test Case Step to Execute Expected Result
ID TC001_01 Check page. UI should be perfect.

Check all
Text box,
Dropdown
Menu and
Button.. TC001_02 Check when 1. Enter invalid User should not login
Pass invalid id. Id. And should show proper
2. Enter correct Error message.

Password. 3. Click on Login Button. TC001_03 Check when 1. Enter valid id. User should not login
Pass correct id 2. Enter incorrect And should show proper
And invalid Password. Error message.

Password 3. Click on Login Button. 5741670-2914015005741670-889000
TC001_04 Check keeping 1. Enter valid id. User should not login
Password blank 2. Do not enter And should show proper
Password. Error message.

3. Click on Login Button. TC001_05 Check keeping 1. Do not enter User should not login
Id blank Id. And should show proper
2. Enter valid Error message.

Password. 3. Click on Login Button. TC001_06 Check when 1. Enter valid id. User should login.

Pass correct id 2. Enter valid And password Password. 3. Click on Login Button TC001_07 Check the 1. Do not enter User should not login
Required field Any value in And should show proper
By not filing The field. Required error message.

Any data. 2. Click on Login Button. TC001_08 Check not 1. Do not enter User should not login
Input any Any value in And should show proper
Value. The field. Error message.

2. Click on Login Button 5741670-889000
Table 6.5 Test Case of Login
Profile Test Description
The profile module is for students to update their own profile and store it to the database. here is a desk of 6.6 in order to display a profile test case.

Test Case Test Case Step to Execute Expected Result
ID TC002_01 Check all the 1. Click on UI should be perfect
text boxes, button. dropdown menu and button TC002_02 Check the 1. Do not enter User should not
required fields any value in update and should
by not filling the field. show proper required
any data 2. Click on error message.

Update Profile Button. TC002_03 Check the 1. Enter value in User should be update
required fields required their profile
by filling the fields. successfully and
data 2. Click on successful registration
Update Profile message should show.

Button. TC002_04 – Check the 1. Enter invalid It should show the
email text field emails. validation message for
that has Email 2. Click on email.

address without Update Profile @ symbol. Button. -Check the Email text field that has @ symbol written in words. 5741670-889000
TC002_05 Check all valid 1. Enter valid It should not show any
emails email. validation message
2. Click on Update Profile Button. TC002_06 Check the 1. Enter alphabet It should show the
validation phone data in phone error message for
number field. Phone Number
2. Click on Update Profile Button. TC002_07 Check the 1. Enter numeric It should not show any
validation phone data in phone error message
number field. 2. Click on Update Profile Button. Table 6.6 Test Case of Profile
Attendace Test Description
Attendance module is for student to insert problem information and it’ll keep in database. under are desk 6.7 on the way to display the attendance take a look at case.

Test Case Test Case Step to Execute Expected Result
ID TC003_01 Check all the 1. Click on button. UI should be perfect
text boxes, dropdown menu and button TC003_02 Check the 1. Do not enter User should not
required fields any value in the submit and should
by not filling field. show proper required
any data 2. Click on Submit error message.

Appointment Button. TC003_03 Check the 1. Enter value in User should be submit
required fields required fields. enroll
by filling the 2. Click on Submit successfully and
data Appointment successful submit
Button. message should show.

TC003_04 Check the end 1. Choose the User should be submit
time field time to make an enroll
appointment. successfully and
2. The end time successful submit
will display and message should show.

add an hour from the start date. 3. Click on Submit Appointment Button. TC003_05 Check the 1. Choose the System will show the
invalid invalid class proper error message
class time time. 2. Click on Submit Enroll Button. TC003_06 Check the 1. Choose the User should be submit
valid class valid class enroll
time time. successfully and
2. Click on successful submit
Submit message should show.

Enroll Button. TC003_07 Check all the 1. Do not enter 1. It should not ask to
optional field any detail in fill the optional
when do not optional fields. fields.

fill data 5737225-2914015005737225-889000
2. Enter data in 2. User should be
required fields. submit
3. Click on Save enroll
Changes successfully and
Button. successful submit
message should
show.

TC003_08 Check all the 1. Enter data in User should be submit
optional field optional fields. appointment
when fill data 2. Enter data in successfully and
required fields. successful submit
3. Click on Save message should show.

Changes Button. Table 6.7 Test Case of Attendance
Proposal Test Description
Table 6.8 shows class test cases. It is for lecturers to upload and update class details and it will be stored in the database
Test Case Test Case Step to Execute Expected Result
ID TC004_01 Check all the 1. Click on button. UI should be perfect
Text boxes, Dropdown Menu and Button TC004_02 Check the 1. Do not enter User should not
Required fields Any value in the Submit and should
By not filling Field. Show proper required
Any data 2. Click on Submit Error message.

Form Button. TC004_03 Check the 1. Enter value in User should be submit
Required fields Required fields. Successfully and
By filling the 2. Click on Submit Successful submit
Data Form Button. Message should show.

TC004_04 Check all the 1. Do not enter 1. It should not ask to
Optional field Any detail in Fill the optional
When do not Optional fields. Fields.

Fill data 2. Enter data in 2. User should be
Required fields. Submit
3. Click on Successfully and
Submit Review Successful submit
Button. Message should
Show.

TC004_05 Check all the 1. Enter data in User should be submit
Optional field Optional fields. Successfully and
When fill data 5737225-889000
2. Enter data in 2. Successful submit
Required fields. Message should show.

Click on Submit Review Button. Table 6.8 Test Case of Class Final Report Test Description
Table 6.9 shows a graph report test case. It is for lecturers to upload and update graph report details and it will be stored in the database.

Test Case Test Case Step to Execute Expected Result
ID TC005_01 Check all the 1. Click on button. UI should be perfect
Text boxes, Dropdown Menu and Button TC005_02 Check the 1. Do not enter User should not
Required fields Any value in the Submit and should
By not filling Field. Show proper required
Any data 2. Click on Error message.

Submit Form Button. TC005_03 Check the 1. Enter value in User should be submit
Required fields Required fields. Successfully and
By filling the 2. Click on Successful submit
Data Submit Form Message should show.

Button. TC005_04 Check all the 1. Do not enter 1. It should not ask to
Optional field Any detail in Fill the optional
Optional fields. Fields.

When do not 2. Enter data in 2. User should be
Fill data Required fields. Submit
3. Click on Successfully and
Submit Review Successful submit
Button. Message should
Show.

TC005_05 Check all the 1. Enter data in User should be submit
Optional field Optional fields. Successfully and
When fill data 2. Enter data in Successful submit
Required fields. Message should show.

Click on Submit Review Button. Table 6.9 Test Case of Graph report
Forgot password Test Description
Table 6.10 indicates the password change test case. The user will enter their password and store it in the database.

Test case Test case Step to execute Expected result Id TC007_01 Check all the 1. Click on button. Ui should be perfect Text boxes and Button TC007_02 Check the 1. Do not enter User should not Required fields Any value in the Change password and By not filling Field. Should show proper Any data 2. Click on Required error Forgot Message. Password Button. TC007_03 Check the 1. Enter email in User should be received email that contain the
Required fields Required fields. By filling the 2. Click on Data Forgot Password Button. 5737225-889000
Table 6.10 Test Case of Forgot password
Search Test Description
Table 6.11 shows a search test case. Users can search to see all the required information.

Test Case Test Case Step to Execute Expected Result
ID TC008_01 Validate that 1. Enter the name System display all
search by name or course or information based of
or course or department or searching
department or status or status or position. position for 2. Click on Search searching is Button. valid 3. Validate the information TC008_02 Validate that 1. Enter any value System display all
no field is left in the field. information based of
null 2. Click on Search searching
Button. TC008_03 Validate that 1. Do not enter No data display
field is left null any value in the field. 2. Click on Search Button. 5737225-889000
Table 6.11 Test Case of Search
Subject Test Description
Table 6.12 shows the test case of assignation. User can add and remove subject from the class
Test Case Test Case Step to Execute Expected Result
ID TC009_01 Check the add 1. Click on Button System will
button Add automatically add the
function. student
TC009_02 Check the 1. Click on Button System will
remove button Remove automatically remove
function. the student
TC009_03 Check the 1. Click on Button System will show
maximum Add limitation error
allocation of message.

student Table 6.12 Test Case of Subject
6.4.2 Test Data
In the FTMK Student Fingerprint student test data test system is used to confirm with the test plan to achieve the expected results. Validation is done by testing, verifying and verifying software behavior.

Login Test Data
574167035179000
Test Case ID Attribute Data
TC001_01 Nil Nil
TC001_02 id admin01
password admin01
TC001_03 id admin01
password 123
TC001_04 id admin01
password –
TC001_05 id –
password admin01
TC001_06 id admin01
password admin01
TC001_07 id –
password –
Table 6.13 Login Test Data for Admin
Test Case ID Attribute Data
TC001_01 Nil Nil
TC001_07 id –
password –
TC001_02 id B031620041
password abc123
TC001_03 id B031620041
password 123
TC001_04 id B031620041
password –
TC001_05 id –
password abc123
TC001_06 id B031620041
password abc123
Table 6.14 Login Test Data for Student
ii.Profile Test Data
Test Case ID Attribute Data
TC002_01 Nil Nil
TC002_02 Email –
Lecturer_Num –
TC002_03 Email [email protected]
Lecturer_Num 0137266266
TC002_04 Email 1. testAtgmail.com
2. @gmail.com
3. test.com
TC002_05 Email 1. [email protected]
TC002_06 Lecturer_Num iaoisjdu
TC002_07 Lecturer_Num 0128985649
5741670-889000
Table 6.15 Profile Test Data for Lecturer
Test Case ID Attribute Data
TC002_01 Nil Nil
TC002_02 StudentEmail –
StudentNum –
TC002_03 StudentEmail [email protected]
StudentNum 0134546571
TC002_04 StudentEmail 1. testAtgmail.com
2. @gmail.com
3. test.com
TC002_05 StudentEmail 1. [email protected]
TC002_06 StudentNum sdsdfsffsff
TC002_07 StudentNum 0198848456
Table 6.16 Profile Test Data for Student
Class Test Data
Test Case ID Attribute Data
TC003_01 Nil Nil
TC003_02 Subject_ID –
Class_session –
TC003_03 Subject_ID BITS1113
Class_session 05.20 PM
TC003_04 Nil Nil
TC003_05 Nil Nil
Table 6.17 Appointment Test Data for Class
Test Case ID Attribute Data
TC003_01 Nil Nil
TC003_02 location –
status –
TC003_03 location –
status 1
TC003_09 location –
status –
TC003_10 location BK9 ; BK10
status 1
TC003_11 color #008000
status 1
Table 6.18 Appointment Test Data for class
Forgot password Test Data
Test Case ID Attribute Data
TC007_01 Nil Nil
TC007_02 email –
TC007_03 password abc123
TC007_04 email –
TC007_05 password –
TC007_06 email [email protected]
TC007_07 password abc123
Search Test Data Test Case ID Attribute Data
TC008_01 course Bits
TC008_02 Nil Nil
TC008_03 Nil Nil
Table 6.19 Search Test Data 5743575-166243000
Assign Subject Test Data
Test Case ID Attribute Data
TC009_01 Nil Nil
TC009_02 Nil Nil
TC009_03 SubjectID Bits3212
TC009_04 ClassSession 8AM-9AM
TC009_05 SubjectID Bits3212
TC009_06 ClassSession Table 6.20 Assign Subject Test Data 6.5Test Result and Analysis
Test results are the results after using the FTMK Fingerprint Attendance system in various test cases. In this result, each test case will be tested and the results are shown as table below.

Test Case Identification Test Identification Result (Passed/Failed) TC001 : Login Test Description TC001_01 OK Passed TC001_02 OK Passed TC001_03 OK Passed TC001_04 OK Passed TC001_05 OK Passed TC001_06 OK Passed TC001_07 OK Passed TC001_08 OK Passed TC002 : Profile Test Description TC002_01 OK Passed TC002_02 OK Passed TC002_03 OK Passed TC002_04 OK Passed TC002_05 OK Passed TC002_06 OK Passed TC002_07 OK Passed
TC003 : Class Test Description TC003_01 OK Passed
TC003_02 OK Passed
TC003_03 OK Passed
TC003_04 OK Passed
TC003_05 OK Passed
TC003_06 OK Passed
TC003_07 OK Passed
TC003_08 OK Passed
TC003_09 OK Passed
TC003_10 OK Passed
TC003_11 OK Passed
TC004 : Graph Report Test Description TC004 _01 OK Passed
TC004 _02 OK Passed
TC004 _03 OK Passed
TC004 _04 OK Passed
TC004 _05 OK Passed
TC005 : Forgot password Test Description TC005 _01 OK Passed
TC005 _02 OK Passed
TC005 _03 OK Passed
137486691666800190055590043000666242090043000TC006 : Search Test Description
TC006 _01 OK Passed
TC006 _02 OK Passed
TC006 _03 OK Passed
TC007 : Assignation Test Description TC007 _01 OK Passed
TC007 _02 OK Passed
TC007 _03 OK Passed
Table 6.21 Test Result
6.6 Conclusion
Conclusions that can be made after completing the system have evolved to facilitate users to manage documentation management by imposing multiple functions within the system. Although the system does not meet all targets, it does not work well. However, if there are multiple improvements that are uploaded to the system along with user-friendly or backup devices and recovery, the system can be better and move forward.

CHAPTER VII
CONCLUSION
7.1Introduction
FTMK student Fingerprint Attendance is a system advanced for students and academics worried in Workshop 1 and Workshop 2courses that make method and tactics clean and time-saving and FTMK FSA will meet my qualifications to obtain a Bachelor’s degree of laptop science (software development) degree. however, this gadget has many risks but there are a few benefits and it improvements in the end. in the course of this development device, there’s a extraordinary deal of understanding that i’ve the requirements of the very last file of the framework, designing gadget and float records. that is the maximum tough three-and-a-half years at Universiti Teknikal Malaysia Melaka (UTeM). therefore, this machine has the ability to expand greater sophisticated with better knowledge than my lack of awareness and knowledge in this area. further, I suppose this system has fee to go through the marketplace. In end, it has developed a gadget that achieves 80% of the key success targets notwithstanding many weaknesses and failures within the work. i am quite happy with my greatness as i can increase my own system.

7.2Observation of Weak and Strength
a) Strength
• Can manage reports on line (not post on a bit of paper).

• Can manipulate day by day presence.

• Reduce using time while customers need to make a presence.

• Can track their documents and duties successfully.

b) Weakness
• No notification machine.

• The device does now not offer backup and recuperation.

7.3Propositions of improvement
The system developer would like to suggest a few enhancements that could be done to improvise this project such as:
The “Register” coding of the hardware devices should be able in looping to make it easier when the fingerprints’ ID is stored.

Connect FTMK SFA with Student Information System so that the student no need to register their profile.

7.4Contribution
FTMK Student Fingerprint Attendance is a web-based system to be developed for attendance management. This system is to replace existing student attendance system processes for computerized and automated student attendance systems. The FTMK Student Attendance System (FTMK SFA) was built to enable the administrator to monitor the attendance status of lecturers. It is a computerized system that can improve the required faculty more effectively and accurately.

This project is to improve the existing system used to record and update the attendance status of lecturers without displaying them els. Additionally, this project is made using Arduino IDE for fingerprint device encoding and for establishing integration between system and device. In addition, phpMyAdmin at Appserv is used as a platform for database development and allows web designers to design and test the system on its own without Internet access. Databases are developed to store and update the attendance status of lecturers.

Overall, the attendance status of lecturers is useful for lecturers and students to save time in everyday life. This report documents the design, implementation and evaluation of projects with full potential for viewing the database system for a single faculty
Therefore, this system is very useful for student attendance management system (FTMK SFA) because it has 80% fulfillment for purpose. It will contribute to facilitating user management.

7.5Conclusion
Conclusions may be made after finishing the system, were developed to facilitate the user to manage attendance management by performing numerous capabilities in the system. although the system does no longer meet all of the objectives, it may nevertheless paintings smoothly. Implementation of the fingerprint sensor on this venture is to make day by day ordinary in college existence easier. It additionally encloses a database device with it to offer exposure to the presence of academics for the general public, particularly students on board. It benefits maximum users and saves time searching out teachers in big faculties. it is a combination of hardware and software program. eventually, we are hoping our projects are useful for lectures and students on the faculty.

REFERENCES
The World’s Largest Web Developer Site. Retrieved October 11, 2017, from
https://www.w3schools.com/default.aspSubramaniam, H. et al. (2013). Bar Code Scanner Based Student Attendance System (SAS), Retrieved November 15, 2017, from http://www.researchgate.net/publication/245025631_Bar_Code_Scanner_Based_Student_Attendance_System_(SAS)Microtonics Technologies. (2013, June 4). RFID Based Attendance Management System. Retrieved November 15, 2017, from http://www.projectsof8051.com/rfid-based-attendance-management-system/Improved Version UNO R3 ATMEGA328P Board Module + Ethernet Shield W5100 Module for Arduino. Retrieved September 30, 2017 from https://www.lazada.com.my/improved-version-uno-r3-atmega328p-board-module-ethernet-shieldw5100-module-for-arduino-11577584.html?spm=a2o4k.searchlist.list.16.22c05236mGVFGUArduino IDE 1.6.6 Released. Retrieved October 11, 2017 from https://www.arduino.cc/en/Main/SoftwareWaterfall-Agile Hybrid Model Retrieved October 11, 2017, from http://binarysemantics.com/software-development-process-sdlc.html
APPENDIX
APPENDIX A
(ATTENDANCE SHEET)
Current Attendance Sheet

FSAS Attendance Sheet

APPENDIX B
(USER MANUAL)

USER’S MANUAL
FTMK STUDENT FINGERPRINT ATTENDANCE SYSTEM (FTMK SFA)
Faculty of Information and Communication Technology
AUGUST 2018

User Manual
INTRODUCTION
Generally, our product is a combination of biometric technology and informative board that is built using a fingerprint sensor device attached with an Ethernet V2.0 stacked on Arduino Uno R3 that is connected to a laptop and a monitor acts as a board. It is called as FTMK Student Fingerprint Attendance System (FTMK FSA) that is developed to understand the market’s demand to identify individuals in groups that are under surveillance such as lecturers and to makes daily routine of students’ life easier and convenient with the addition of board. Therefore, this manual book will give users details on the hardware and software requirements on its uses, an overview of the main function and will navigate on how to use the FSAS.

This product includes with many function as it have both device and database system to achieve the objectives as this product will fulfil the users’ needs. The objectives of the FSAS are to register and transmit the fingerprint’s ID from the fingerprint sensor device to database system. Also, our product has been configured by connecting it to a board so it will display the lectures’ attendance status for the student. Further explanation of the product will be discussed in this user manual.

ABOUT FTMK STUDENT FINGERPRINT ATTENDANCE SYSTEM (FTMK FSA)
Welcome to FSAS manual book! Firstly, you need to know the component of Arduino Uno R3board.

Figure 1: Arduino Uno Board
1. External Power Supply
2. USB plug
3. Pin (Analog Reference Pin, Ground Digital, Digital I / O, Serial Out / In, Reset, 3.3 V, 5V)
4. Reset the button
5. Series Serial Programmers
6. ATmega328 Microcontroller

Figure 2: Fingerprint Sensor Device
1. Ground wire
2. Rx (Data In) wire
3. TX (Data Out) wire
4. Vin wire

GETTING STARTED
Welcome to Fingerprint Monitoring Attendance Board user manual. To use Fingerprint Monitoring Attendance Board, you need to ensure that you have all the components of the devices.

Figure 3: Fingerprint Monitoring Attendance Board
Arduino Uno R3
The Arduino Uno R3 board is placed inside the prototype box to protect the components inside.

Figure 4: The mainboard of Arduino Uno R3 model.

Ethernet Shield V2.0
The Ethernet Shield V2.0 is stacked on top of Arduino Uno R3 board to provide local host connection for the device.

Figure 5: The Ethernet Shield V.20 model.

Fingerprint Sensor Device
The fingerprint sensor is connected to the board for allowing the data to transmit to the database system.

Figure 6: The Fingerprint Sensor Device

• Power supply
This Pi is powered by Micro USB power supply (like most standard handset chargers). You need a quality power supply that can supply at least 2A and 5V for Model 3B, or 700mA and 5V for lower and lower models. Low power supply (~ 700mA) will workfor basic use, but may cause Pi to reboot if it draws too much power.

NOTICE: Plug the charger into the power connector port.

• Ethernet Cable (Network) Model B / B + / 2/3 Only
It is possible for users to use Ethernet cables to connect your products to local networks and the internet. This is to enable Wi-Fi connection and access to the Internet.

Figure 7: The Ethernet Cable
NOTICE: User may connect the RJ45 to the Ethernet port.

HOW TO USE FINGERPRINT STUDENT ATTENDANCE SYSTEM
This user manual will guide users on how to use the product by procedures according to its functionality.

SETTING UP
Before using the device, you need to connect the device on the PC/laptop to set up the Fingerprint Student Attendance System (FSAS) according to its functionality.

ii) Hardware:
1. Plug in the power supply into the USB cable port.

2. Connect the Ethernet Cable to the laptop from the device.

POWER ON
The device needs a power supply to operate normally. Use the power supply every time you are using it.

Ensure the USB cable and Ethernet cable is connected to the boards and PC/laptop.

Wait until the LED on boards is blinking.

Register User’s Fingerprint
Register Fingerprint’s ID into Fingerprint Sensor Device
User put their specific fingerprint on the fingerprint sensor device to be stored inside.

Register User’s Fingerprint into Database System
Admin will register your fingerprint into Database System before you can use the products.

Your fingerprint’s ID will successfully save when the database system shows a successful message.

Change User Status From 0 (Absent) To 1 (Available)
User has to put their fingerprint to change their attendance status from absent to available.

Once the fingerprint matched, it will update into the database system.

To register next fingerprint, repeat the steps one by one and close the serial monitor of Arduino IDE.

APPENDICES VII
FTMK Student Fingerprint Attendance
My name is Muhamad Najmi Syauki bin Sahrom. I am a final year student who currently studying Bachelor of Computer Science (Software Development) with Honors (BITS) in Universiti Teknikal Malaysia Melaka. I am conducting my final year project on the “FTMK Student Fingerprint Attendance”. The purpose of this survey is to gather the opinions and views from the public regarding the the management of student system in the market.

Your response has been carefully considered and selected to represent your opinion for this important study.

Your open and complete response is vital, as it will form the basis towards knowledge and industry improvement.

STATEMENT OF CONFIDENTIALITY
The information you provide will be held in the strictest confidence. We will neither publish, release, nor disclose any information on or identifiable with individual person or organization or companies. If you agreed, please sign on the below. Thank you.

__________________________
Date: