17
University of Baluchistan Quetta Habibullah Roll number 20 2 nd Semester (Final Morning) Session 2015 to 2017 Online biometric

Online Bio metric security system

Embed Size (px)

Citation preview

Page 1: Online Bio metric security system

University of Baluchistan Quetta

Habibullah Roll

number 202nd

Semester (Final Morning)Session 2015 to 2017Online biometric security & registration system.

Page 2: Online Bio metric security system

IntroductionPlanning, codding, designing, implementation

Process model Debugging processIts matrices, measurementIts function pointIts quality

Page 3: Online Bio metric security system

IntroductionOnline biometric security and registration system is the system which provide to any institute the security as well as register their employs. This software plays an important role in the security basis and no one can enter in this institute rather then the employee. This software is developed in v process model and also many standard technologies were include in it like its matrices, measurement, its FP (function point),Its standard quality, its debugging process, its codding, designing, and secure implementation.

Page 4: Online Bio metric security system

Many process model are used for biometric system like prospective Models SDLC, V Process Model etc. In my point of view V Process model is so useful for biometric system. Because V process model is so efficient for this software. Following phases are used in V process Model are as below………Requirement modelingIt is the first phase use for biometric system.In this phase of software we have planning, in planning we have decided many things about software like Modern technologies, Budget, not noisy place, expert staff, time table or schedule for the successful software.

Page 5: Online Bio metric security system

PlanningIn the planning of this smart software first we looked for the special environment and call the experience staff to discuss each other about this software after that we decide that how much budget we have for this software and also for the use of standard technologies in this software. The group decide that which kind of process model will be use and also the many things like its debugging process, its codding, its designing, its testing, its measurement, its matrices, its function point, its quality and then we start working for the software and also discuss the duration of this software.

Page 6: Online Bio metric security system

CommunicationIn this phase of software communication so important between the staff With their managers. And all the staff communicate on the software to full fill all the requirements.

DesigningIn this phase of software we set all the design of biometric system and use well technics that our software run well at the end. That our software get more interest and use more and more.

Page 7: Online Bio metric security system

Architectural design

This is the second best phase in this phase we will design the biometric system high level design and put the module functionality and dependency b/w the module. At last work on biometric system data base system to design well and remove the faults. There are five functions we perform here for this software dependency between the module mean that well efficient in design. And database system to keep all entities on the right spot and design well. In high level design we always use the excellent technique and require well expert management.

Page 8: Online Bio metric security system

Component designIn this phase we create interface in design of biometric system that design well and customer no difficulty to use it comfortable and give the well result. Such examples like fonts use in the software and the names, title, etc.

Coding In this phase we simplify do the coding of the software to design well.

PrecautionIn this phase we see all the precautions for the perfect software.

Page 9: Online Bio metric security system

Verification & validation of softwareIn this phase we discus the unit testing. Integration testing mean we combine all the phases again and then test after verification and correct validation we improve again our s/w and then go to another testing called system testing.

System testingIn this of biometric system we discus and see the user attesting techniques UAT for the user can be installed in every where and give the efficient result.

Page 10: Online Bio metric security system

Use of Debugging process in bio matric softwareIn debugging process we fix all the problems of software. Its also depend on the cost of this software. There are many types of bugs that we use to solve the every kind of problems.1 . Memory leaksIn this process we bugs out the memory allocate or deallocate because its create the confusion in the time of implantation of this software.2 . Logical leaksThis kind of bugs can create the problem that the output of this software don’t give the exact report we also use this kind of debug in this software and fix this problem.3 . Codding error in this kind of bugs its effect the program in codding and shows the warnings. Its is not the syntax error in the program.And we can also fix and solve the program.

Page 11: Online Bio metric security system

Two kind of strategies used in debugging process.1.There are two strategies but we use only one kind of strategy in this biometric system is Brute force debugging process in which solve the highly complex problems by simple algorithms.

Page 12: Online Bio metric security system

Matrices measurement of the softwareAs we know that the improvement structure of the software is called the matric of the software & the different phases of the project are counted and calculated.1. We perform all these processes for the biometric

software.There are three types of matrices that we use for this software.Process . Project . And Product

Page 13: Online Bio metric security system

Process matrices that we use in the software In this process we discuss all the all the developed time from a process to process vary and discuss all the methodologies used in biometric security and registration system like what type of designing, codding, planning, deployment and what technologies we use for the software.

Project matrices that we use in this software In this phase of matric number of risks rather they were know and predictable risks.And see all the efforts on the basis of time and this time can be measure to see this time we have a formula that can determined

percentage = actual time/expected time * 100

percentage = 6 months / 8 months * 100percentage = 75 % of time realized in

the project

Page 14: Online Bio metric security system

Measurement potion we measure all phases of the software in biometric system.Their regular feed back & a many of measurements of attributes to set a perfect product.

We have a formula for these all aspects to calculate the programmer activity.

Programmer activity = functionality / time

programmer activity = 95.66 / 6 months

programmer activity = 15.94

Page 15: Online Bio metric security system

The function point of biometric systemThere are three categories of calculating the FP of this system one is simple moderate and complex we developed this system in highly complex and now we determine it by the help of this formula.ParametersInputOutputInquiresInterface

project size This software is developed in complex size.There are 14 values in a project and the values are555

Page 16: Online Bio metric security system

55 so the formula is FP = raw FP * [0.65+0.01* CAF]Parameters complexInput 5 * 5Output 5 * 5Inquires 5 * 5Interface 5 * 5Files 5 * 5Raw FP = 10+10+10+10+10 = 50FP = 50 * [0.65+0.0l+CAF]FP = 50 * [0.65+0.70]FP = 50 * [1.33]FP = 67.5

Page 17: Online Bio metric security system

Quality of this biometric systemThere are many qualities in this biometric system are given below.

This system is very reliable to use because we use all the processes that not be use in other systems.

This system is Very efficient in time and give the smart output every time.

This system use by every one have are the owner of this software.