Professional Documents
Culture Documents
Payroll Management System Krish
Payroll Management System Krish
SUBMITTED BY
K.R.KRISHNA KUMAR(15UCS138)
And
R.H.AMRISH KUMAR(15ucs115)
SUBMITTED BY
K.R.KRISHNA KUMAR(15UCS138)
And
R.H.AMRISH KUMAR(15ucs115)
BONAFIDE CERTIFICATE
K.R.krishnakumar
R.H.Amrishkumar
ACKNOWLEDGEMENT
01 Introduction
1. project description
02 System Analysis
a. Existing system
b. Proposed system
03 Feasiblity Study
a. Types of Feasiblity
b. Evalvating feasibility
04 Modules
a.Module description
05 System Requirements
06 Software Description
07 System design
08 Data Flow diagram
09 System Testing & implementation
1. Acceptance Testing
10 Conclusion
PAYROLL MANAGEMENT SYSTEM
ABSTRACT:
Payroll Management System document formally defines about the requirements of the new
proposed theory and it also briefly state about the non-functional and functional requirements. At
the same time it includes a description about the interface that is used by the users as well as the
requirements of the training and documentation. Payroll Management project helps to generate
the rate of salary each month and it is also equipped with a system that can take care of the
attendance of the employee’s in a firm. It keeps a track of the employee’s attendance and on that
basis it generates the monthly salary. It also helps to generate pay slip as well as the summary of
the payroll. The report of the ESI and provident fund is generating by this system. Printout is
also available so that it can be submitted to the department.
Project Description
Payroll Management System, in this proposed system is mainly developed for the purpose of
easy to calculate salary of each employee in the company based on attendance. In this attendance
also done in this application, using employee id or employee name. Employee details also stored
in the database of application any time we retrieve that details. In this application, the
administrator is only authenticated to handle whole company report. The administrator process in
this application is like he/she is authenticate to add, edit, delete and view employee profile, entry
details and attendance calculation, which is used to calculate the monthly salary. It is provided
more security to the company department records. This system is provided computerized
process. Payroll Management project helps to generate the rate of salary each month and it is
also equipped with a system that can take care of the attendance of the employee’s in a firm. It
keeps a track of the employee’s attendance and on that basis it generates the monthly salary. It
also helps to generate pay slip as well as the summary of the payroll. The report of the ESI and
provident fund is generating by this system. Printout is also available so that it can be submitted
to the department.
EXISTING SYSTEM
The existing system is a manual process. In existing system, the whole payroll information and
reports are maintained manually like note i.e. paper work. Sometimes any records are able to
miss. The records are stored in note; so, anyone can able to make any fraud action. It raises more
problems when particular record will be needed and that record is missed. Anyone can able to
stole and modify the records. If any employee is retired within few days or months and it is
comfortable to find the vacancies in company.
DISADVANTAGES:
1. Manual Process
In this proposed system is mainly developed for the purpose of easy to calculate salary of
each employee in the company based on attendance. In this attendance also done in this
application, using employee id or employee name. Employee details also stored in the database
of application any time we retrieve that details. In this application, the administrator is only
authenticated to handle whole company report. The administrator process in this application is
like he/she is authenticate to add, edit, delete and view employee profile, entry details and
attendance calculation, which is used to calculate the monthly salary. It is provided more security
to the company department records. This system is provided computerized process.
ADVANTAGES:
1. Computerized process
The feasibility study includes complete initial analysis of all related system. Therefore the
study must be conducted in a manner that will reflect the operational, economic as well as
technical and scheduling feasibility of the system proposal. These are the four main types of
feasibility study.
Operational
This aspect defines the urgency of the problem and the acceptability of any solution. It shows
if the system is developed, will it be used. The operational study includes people-oriented and
social issues: internal issues, such as manpower problems, labor objections, manager resistance,
organizational conflicts and policies; also external issues, including social acceptability, legal
aspects and government regulations. It takes in consideration whether the current work practices
and procedures support a new system and social factors of how the organizational changes will
affect the working lives of those affected by the system.
Technical
The technical aspect explores—if the project feasibility is within the limits of current
technology and does the technology exist at all, or if it is available within given resource
constraints (i.e., budget, schedule,...). In the technical feasibility the system analyst look between
the requirements of the organization, such as, (I) input device which can enter a large amount of
data in the effective time (II) Output devices which can produce output in a bulk in an effective
time (III) The choice of processing unit depends upon the type of processing required in the
organization.
Schedule Feasibility
Given his technical expertise, the analyst should determine if the project deadlines are
reasonable whether constraints placed on the project schedule can be reasonably met. Some
projects are initiated with specific deadlines. You need to determine whether the deadlines are
mandatory or desirable. If the deadlines are desirable rather than mandatory, the analyst can
propose alternative schedules.
The bottom line in many projects is economic feasibility. During the early phases of the
project, economic feasibility analysis amounts to little more than judging whether the possible
benefits of solving the problem are worthwhile. As soon as specific requirements and solutions
have been identified, the analyst can weigh the costs and benefits of each alternative. This is
called a cost-benefit analysis.
The feasibility study is germane to the determination of whether there should be any
further plans: The conclusion might be, “We’ve looked at the proposal thoroughly, and have
concluded that it does not profitably serve our needs in the foreseeable future.” But if the
conclusions of the study are positive, it should provide you with a clear understanding of what
the implementation plan entails in terms of change, cost, benefit, risk, and time. The feasibility
study them serves two functions:
1. The study makes the case for funding the implementation project
2. The outputs of the study provide the inputs for the implementation plan
MODULES:
The Substantiate Practice Module is credentials provided are compared to those on file in a
database of authorized user’s information on a local operating system or within an authentication
server. If the admin credentials match, the process is completed; admin is granted authorization
for access. Using username and password admin login is checked if username and password will
be match to database record it will be allow accessing the application otherwise it will display
the alert message box on the screen
This Employee Process Module (or) Particularization Module is indicating employee related
information. The administrator can update each employee’s details using employee id when
occurs modification in employee phase. This id is automatically generated when the employee
details will be entering in employee phase. The administrator is only authenticated to add,
update, delete and view employee’s details in and from this application. The employee’s details
are stored in database; so, the administrator is easily retrieved any details from database. The
added fields are in the employee details phase like employee name, qualification, contact details,
address, date of birth and gender.
Salary Practice Module is based on the company attendance in particular month, if any employee
took leave at office working day it will be a loss of pay in that month salary. Attendance is
calculated by this application. In this application salary increment process also done by admin
increment amount also mentioned at an employee registration process, employee salary
increment based on the employee date of join in the office and performance of work status.
Report Process Module:
In This Report Process Module is used to defines the process of manage and view reports.
This system is also providing the facility to the report view like attendance based report, Salary
based Report. The administrator is authenticating person to view mange and view report. The
reports are so secured. This system is provides graphical representation for each record. These
reports are used to manage and view details about particular employee and salary
SYSTEM REQUIREMENTS:
Software Requirements:
Database : Wampserver2.0
Hardware Requirements:
PHP:
Usage:
Originally designed to create dynamic Web pages, PHP now focuses mainly on server-
side scripting, and it is similar to other server-side scripting languages that provide dynamic
content from a Web server to a client, such as Microsoft's ASP.NET, Sun Microsystems' Java
Server Pages, and mod_perl. PHP has also attracted the development of many frameworks that
provide building blocks and a design structure to promote rapid application development (RAD).
Some of these include Cake PHP, Symfony, Code Igniter, Yii Framework, and Zend Framework,
offering features similar to other web application frameworks.
Security:
Syntax:
The PHP interpreter only executes PHP code within its delimiters. Anything outside its
delimiters is not processed by PHP (although non-PHP text is still subject to control
structures described in PHP code). The most common delimiters are <? Php to open and?> to
close PHP sections. <script language="php"> and </script> delimiters are also available, as are
the shortened forms <? or <?= (which is used to echo back a string or variable) and ?> as well
as ASP-style short forms <% or <%= and %>. While short delimiters are used, they make script
files less portable as support for them can be disabled in the PHP configuration, and so they are
discouraged. The purpose of all these delimiters is to separate PHP code from non-PHP code,
including HTML.
The first form of delimiters, <?php and ?>, in XHTML and other XML documents,
creates correctly formed XML 'processing instructions'. This means that the resulting mixture of
PHP code and other markup in the server-side file is itself well-formed XML.
Variables are prefixed with a dollar symbol, and a type does not need to be specified in
advance. Unlike function and class names, variable names are case sensitive. Both double-quoted
("") and here doc strings provide the ability to interpolate a variable's value into the string. PHP
treats newlines as whitespace in the manner of a free-form language (except when inside string
quotes), and statements are terminated by a semicolon.
PHP has three types of comment syntax: /* */ marks block and inline comments; // as
well as #are used for one-line comments. The echo statement is one of several facilities PHP
provides to output text, e.g., to a Web browser.
Speed Optimization:
Code optimizers aim to enhance the performance of the compiled code by reducing its
size, merging redundant instructions and making other changes that can reduce the execution
time. With PHP, there are often opportunities for code optimization. An example of a code
optimizer is the accelerator PHP extension.
Another approach for reducing compilation overhead for PHP servers is using an op
code cache. Op code caches work by caching the compiled form of a PHP script (op codes)
in shared memory to avoid the overhead of parsing and compiling the code every time the script
runs. An op code cache, APC, is planned to be built into an upcoming release of PHP. Op code
caching and code optimization can be combined for best efficiency, as the modifications do not
depend on each other (they happen in distinct stages of the compilation).
Compiler:
The PHP language was originally implemented as an interpreter. Several compilers have been
developed which decouple the PHP language from the interpreter. Advantages of compilation
include better execution speed, static analysis, and improved interoperability with code written in
other languages. PHP compilers of note include Phalanger, which compiles PHP into Common
Intermediate Language (CIL) byte-code, and Hip-hop, developed at Face book and now available
as open source, which transforms the PHP Script into C++, then compiles it, reducing server load
up to 50%.
HTML:
The purpose of a web browser is to read HTML documents and compose them into visible
or audible web pages. The browser does not display the HTML tags, but uses the tags to interpret
the content of the page.
HTML elements form the building blocks of all websites. HTML allows images and
objects to be embedded and can be used to create interactive forms. It provides a means to create
structured by denoting structural semantics for text such as headings, paragraphs, lists, links,
quotes and other items. It can embed scripts in languages such as JavaScript which affect the
behavior of HTML Webpages.
Web browsers can also refer to Cascading Style Sheets (CSS) to define the appearance
and layout of text and other material. The W3C, maintainer of both the HTML and the CSS
standards, encourages the use of CSS over explicit presentational HTML markup.
Data types:
HTML defines several data types for element content, such as script data and style sheet
data, and a plethora of types for attribute values, including IDs, names, URIs, numbers, units of
length, languages, media descriptors, colors, character encodings, dates and times, and so on. All
of these data types are specializations of character data.
Html Application:
An HTML Application (HTA; file extension ".hta") is a Microsoft Windows application
that uses HTML and Dynamic HTML in a browser to provide the application's graphical
interface. A regular HTML file is confined to the security model of the web browser's security,
communicating only to web servers and manipulating only webpage objects and site cookies.
An HTA runs as a fully trusted application and therefore has more privileges, like
creation/editing/removal of files and Windows Registry entries. Because they operate outside the
browser's security model, HTAs cannot be executed via HTTP, but must be downloaded (just like
an EXE file) and executed from local file system.
MYSQL:
The My SQL development project has made its source code available under the terms of
the GNU, as well as under a variety of proprietary agreements. My SQL was owned and
sponsored by a single for-profit firm, the Swedish company My SQL AB, now owned by Oracle
Corporation.
My SQL is a popular choice of database for use in web applications, and is a central
component of the widely used LAMP open source web application software stack—LAMP is an
acronym for "Linux, Apache, My SQL, Perl/PHP/Python." Free-software-open source projects
that require a full-featured database management system often use My SQL.
Programming:
INPUT DESIGN:
Input design is the process of covering user oriented inputs to computer based format.
It also includes determining the record media, method of input, speed of capture and entry into
the system.
TYPES OF INPUT:
1. Flexibility of format
2. Speed
3. Accuracy
4. Verifications of methods
5. Rejection rates
6. Ease of correction
7. Offline facilities
11. Security
Keyboard & mouse may be used as the input media. Inaccurate input data are the most
common cause of the errors in data processing. Errors entered by user can control by the input
design. With the reference to my project port no, is given as input.
OUTPUT DESIGN:
The normal procedure is to design the output in detail first and then to work back to the inputs.
The outputs can be in the form of operational documents, lengthy reports, and the input records
have to be validated, edited, organized and accepted by the system before being processed to
produce the output may have been define.
TYPES OF OUTPUT:
1. Content
2. Format
3. Location
4. Frequency
5. Response
6. Volume
7. Sequence
8. Action
9. Action required
The next stage is to determine the most appropriate medium for output consideration will be:
1. The DFD is also called as bubble chart. It is a simple graphical formalism that can be
used to represent a system in terms of input data to the system, various processing carried
out on this data, and the output data is generated by this system.
2. The data flow diagram (DFD) is one of the most important modeling tools. It is used to
model the system components. These components are the system process, the data used
by the process, an external entity that interacts with the system and the information flows
in the system.
3. DFD shows how the information moves through the system and how it is modified by a
series of transformations. It is a graphical technique that depicts information flow and the
transformations that are applied as data moves from input to output.
4. DFD is also known as bubble chart. A DFD may be used to represent a system at any
level of abstraction. DFD may be partitioned into levels that represent increasing
information flow and functional detail.
DFD SYMBOLS:
Data flow
DFD
Start
If Incorrect
Login Process
If Correct
Admin Home
j
Add, Edit, View, and Delete
Attendance Info
Salary Info
Employee Reports
Logout
End
SYSTEM IMPLEMENTATION
Implementation is an activity that brings the developed system into operational use and
turning it over to the user. The changeover from the old to the new system can be arranged once
the computer system is tested and approved. The most important phase in software life cycle is
project implementation. The major work involved in the implementation phase is coding. After
conducting feasibility, analysis design, and the information collected from detailed study will
way but for the implementation part. As when the system is operated manually, the system is not
operated in efficient manner, the system finds lot of drawbacks, in order to overcome these
difficulties, In order to function the system efficiently, the system is subjected to
computerization. Lot of man power was spend, when the system is operated manually, the
system this involves more money in maintaining the system.
Difficulty in maintaining records, each very time a separate ledger should be maintained
for the transaction purposes and its more time consuming where the efficiency of the system is
lost and also there is no proper security in order to maintain the data and which involves Data
Redundancy leads to data inconsistency, all these problems can be solved while going for
computerized system, the computerized system will discard all human errors as said above and
which maintains accuracy and which increases the efficiency of the system for faster
transactions. Implementation is that stage in the project where the theoretical design ids turned
into a network system.
The first task in implementation is deciding on the method and time scale to be adopted.
The major effort is to ensure that the programs in the system are working properly. The most
important phase in software lifecycle is project implementation. The major work involved in the
implementation phase is coding. After conducting a feasibility study, analysis, design, the
information collected from detailed study will way out for the implementation part. As when the
system is operated manually, the system is not operated in efficient manner, the system finds lot
of drawbacks, in order to overcome these difficulties, in order to function the system efficiently,
the system is operated manually, the system requires lot of man power, and consumes lot time to
handle the transactions, this involves more in maintaining the system.
The purpose of System Implementation can be summarized as follows: making the new
system available to a prepared set of users (the deployment), and positioning on-going support
and maintenance of the system within the Performing Organization (the transition). At a finer
level of detail, deploying the system consists of executing all steps necessary to educate the
Consumers on the use of the new system, placing the newly developed system into production,
confirming that all data required at the start of operations is available and accurate, and
validating that business functions that interact with the system are functioning properly.
Transitioning the system support responsibilities involves changing from a system development
to a system support and maintenance mode of operation, with ownership of the new system
moving from the Project Team to the Performing Organization. A key difference between
System Implementation and all other phases of the lifecycle is that all project activities up to this
point have been performed in safe, protected, and secure environments, where project issues that
arise have little or no impact on day-to-day business operations. Once the system goes live,
however, this is no longer the case. Any miscues at this point will almost certainly translate into
direct operational and/or financial impacts on the Performing Organization. It is through the
careful planning, execution, and management of System Implementation activities that the
Project Team can minimize the likelihood of these occurrences, and determine appropriate
contingency plans in the event of a problem.
LIST OF PROCESSES:
A good test case is one that has a high probability of finding an as undiscovered
error. A successful test is one that uncovers an as undiscovered error.
Testing Objectives:
1. Testing is a process of executing a program with the intent of finding an error
2. A good test case is one that has a probability of finding an as yet undiscovered error
3. A successful test is one that uncovers an undiscovered error
Testing Principles:
The primary objective for test case design is to derive a set of tests that has the highest
livelihood for uncovering defects in software. To accomplish this objective two different
categories of test case design techniques are used. They are
WHITE-BOX TESTING:
White box testing is focus on the program control structure. Test cases are derived to ensure
that all statements in the program have been executed at least once during testing and that all logical
conditions have been executed.
BLOCK-BOX TESTING:
Black box testing is designed to validate functional requirements without regard to the
internal workings of a program. Black box testing mainly focuses on the information domain of
the software, deriving test cases by partitioning input and output in a manner that provides
through test coverage. Incorrect and missing functions, interface errors, errors in data structures,
error in functional logic are the errors falling in this category.
TESTING STRATEGIES:
A strategy for software testing must accommodate low-level tests that are necessary to verify
that all small source code segments has been correctly implemented as well as high-level tests that
validate major system functions against customer requirements.
TESTING FUNDAMENTALS:
Testing is a process of executing program with the intent of finding error. A good test
case is one that has high probability of finding an undiscovered error. If testing is conducted
successfully it uncovers the errors in the software. Testing cannot show the absence of defects, it
can only show that software defects present.
Information flow for testing flows the pattern. Two class of input provided to test the
process. The software configuration includes a software requirements specification, a design
specification and source code.
Test configuration includes test plan and test cases and test tools. Tests are conducted and
all the results are evaluated. That is test results are compared with expected results. When
erroneous data are uncovered, an error is implied and debugging commences.
UNIT TESTING:
Unit testing is essential for the verification of the code produced during the coding phase
and hence the goal is to test the internal logic of the modules. Using the detailed design
description as a guide, important paths are tested to uncover errors with in the boundary of the
modules. These tests were carried out during the programming stage itself. All units of Vienna
SQL were successfully tested.
INTEGRATION TESTING:
Integration testing focuses on unit tested modules and build the program structure that is
dictated by the design phase.
System testing:
System testing tests the integration of each module in the system. It also tests to find
discrepancies between the system and it’s original objective, current specification and system
documentation. The primary concern is the compatibility of individual modules. Entire system is
working properly or not will be tested here, and specified path ODBC connection will correct or
not, and giving output or not are tested here these verifications and validations are done by
giving input values to the system and by comparing with expected output. Top-down testing
implementing here.
ACCEPTANCE TESTING:
This testing is done to verify the readiness of the system for the implementation. Acceptance
testing begins when the system is complete. Its purpose is to provide the end user with the
confidence that the system is ready for use. It involves planning and execution of functional
tests, performance tests and stress tests in order to demonstrate that the implemented system
satisfies its requirements.
Test coverage Analyzer – records the control paths followed for each test case.
Timing Analyzer – also called a profiler, reports the time spent in various regions of the code are
areas to concentrate on to improve system performance.
Coding standards – static analyzers and standard checkers are used to inspect code for deviations
from standards and guidelines.
TEST CASES:
Test cases are derived to ensure that all statements in the program have been executed at least
once during testing and that all logical conditions have been executed.
Using White-Box testing methods, the software engineer can drive test cases that
1. Guarantee that logical decisions on their true and false sides.
2. Exercise all logical decisions on their true and false sides.
3. Execute all loops at their boundaries and within their operational bounds.
4. Exercise internal data structure to assure their validity.
The test case specification for system testing has to be submitted for review before system
testing commences.
CONCLUSION:
In this proposed system is mainly developed for the purpose of easy to calculate salary of each
employee in the company based on attendance. In this application, the administrator is only
authenticated to handle whole company report. The administrator process in this application is
like he/she is authenticate to add, edit, delete and view employee profile, entry details and
attendance calculation, which is used to calculate the monthly salary. It is provided more security
to the company department records. This system is provided computerized process.
REFERENCE:
[1] Jannyl Darren A. Villarama; John Paul Raphael O. Gernale; Don Airon N. Ocampo; Jocelyn
Flores Villaverde,"Wireless biometrie attendance management and payroll system",2017IEEE
9th International Conference on Humanoid, Information Technology, Year: 2017,Pages: 1 - 5
[2] Benfano Soewito; Fergyanto E. Gunawan; Manik Hapsara."Smartphone for next generation
attendance system and human resources payroll system",2017 4th International Conference on
Electrical Engineering, Computer Science and Informatics (EECSI),Year: 2017,Pages: 1 - 6
[5] Y. C. Lee and A. Y. Zomaya, “Energy efficient utilization of resources in cloud computing
systems,” J. Supercomput., vol. 60, no. 2, pp. 268–280, 2012.
[6] A. Beloglazov, R. Buyya, Y. C. Lee, and A. Zomaya, “A taxonomy and survey of energy-
efficient data centers and cloud computing systems,” Adv. Comput., vol. 82, pp. 47–111, 2011.
[7] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and
emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,”
Future Generation Comput. Syst., vol. 25, no. 6, pp. 599–616, 2009.
[8] L. Wang, G. Von Laszewski, A. Younge, X. He, M. Kunze, J. Tao, and C. Fu, “Cloud
computing: A perspective study,” New Generation Comput., vol. 28, no. 2, pp. 137–146, 2010.
[9] R. Ranjan, R. Buyya, and M. Parashar, “Special section on autonomic cloud computing:
Technologies, services, and applications,” Concurrency Comput.: Practice Exp., vol. 24, no. 9,
pp. 935–937, 2012.
[10] M. Yadin and P. Naor, “Queueing systems with a removable service station,” Operations
Res., vol . 14, pp. 393–405, 1963.
Table Structure
Attendance_system(database)
attendance(table)
Employee_detail(table)
Incremental_detail(table name)
salary_detail(table name)
Click add_attendance
Continue…..
Continue…..
Emp_list
Continue…..
Delete employee module
Continue…..
Emp reports module
Continue…..
Continue…..
Continue…..
Sample Coding:
index.php
<?php
require_once '../../library/config.php';
require_once '../library/functions.php';
$_SESSION['login_return_url'] = $_SERVER['REQUEST_URI'];
checkAdmin();
switch ($view) {
case 'detail' :
$content = 'detail.php';
break;
case 'statement' :
$content = 'statement.php';
break;
default :
$content = 'list.php';
}
$script = array('user.js','jquery.min.js');
require_once '../include/template.php';
?>
Detail.php
<?php
$accId = $_GET['accId'];
} else {
header('Location: index.php');
$sql = "SELECT u.id, u.fname, u.lname, u.bdate, u.is_active, u.email, u.phone, u.pics,
$row = mysql_fetch_assoc($result);
extract($row);
$atype = "";
?>
<tr>
<?php
?>
</td>
</tr>
<tr>
<td width="150" class="label">Address</td>
</tr>
<tr>
</td>
</tr>
<tr>
</tr>
<tr>
</tr>
<tr>
</select>
</td>
</tr>
<tr>
</tr>
<tr>
</tr>
<tr>
</tr>
</table>
<p align="center">
</p>
</form>
<script language="javascript">
$(document).ready(function(){
var str = num.toString().replace("$", ""), parts = false, output = [], i = 1, formatted = null;
if(str.indexOf(".") > 0) {
parts = str.split(".");
str = parts[0];
}
str = str.split("").reverse();
if(str[j] != ",") {
output.push(str[j]);
output.push(",");
i++;
formatted = output.reverse().join("");
};
dtMonth = dtArray[1];
dtDay= dtArray[3];
dtYear = dtArray[5];
return false;
else if (dtMonth == 2)
return true;
};
$('#amt').keyup(function(e){
$(this).val(format($(this).val()));
});
$('#btnTxType').click(function() {
if(ttype == '#') {
$("#type").focus();
return false;
if(amt == '') {
$("#amt").focus();
return;
/*
if($.isNaN(amt)) {
$("#amt").focus();
return;
*/
if(dot == '') {
$("#dot").focus();
return;
}
if(!isDate(dot)) {
alert('Invalid Date.');
$("#dot").focus();
return;
if(desc == '') {
$("#desc").focus();
return;
$('#frmTransaction').submit();
});
});//ready
</script>