A Project Report ON: Online Payroll Management System
A Project Report ON: Online Payroll Management System
PROJECT REPORT
ON
ONLINE PAYROLL MANAGEMENT
SYSTEM
Submitted to
GAUHATI UNIVERSITY
IN PARTIAL FULFILMENT OF THE DEGREE OF
Submitted By:
Name: Bishal Baruah
BCA
Roll No: 25120033
C E R T I F I C A T E
Guided By:
BIRINCHI KR MEDHI
ICST
Maligaon, Ghy-12
ACKNOWLEDGEMENT
We wish to thank those who with their active support and help had
made our project successful. First of all our sincere thanks must particularly
go to Mr Birinchi Kr Medhi, B.E, MD of the ICST Computer Education
Institute, Maligaon,Guwahati for his valuable guidance and all the efforts
he had taken in helping us to carry out our project work.
Last but not least, our many thanks go to our colleagues for his kind
co-operation and help in connection with our project.
CONTENTS IN DETAILS
CHAPTER 1: INTRODUCTION
1.1 INTRODUCTION
5.2 TESTING
5.3 DEBUGGING
7.2 PREVENTION.
7.3 DETECTION.
CHAPTER 7. CONCLUSION
8.1 SALIENT FEATURES OF THE PROPOSED SYSTEM
INTRODUCTION
Introduction:
Objective:
Online payroll Management system is to provide an option to generate the salary
automatically every month. It will provide monthly salary slip of each employee with full
deduction and loan debit. This software also equipped with to enter the attendance of
each employee in the organization, it help them to track each employee attendance, based
on this the system can generate the salary. The software built to generate individual pay
slip and summary of the payroll. It also has option to generate the report for Provident
Fund and ESI. So they can take the print out of Provident Fund and ESI to submit to the
department. So the system will have easy and user friendly interface to provide with the
following online services--
a. New Employee information entry.
b. Attendance registers.
c. Information and update of Basic Pay, Allowances, Deduction etc.
d. Automatic generation of monthly pay slip, salary statement etc.
e. Different report generation regarding employee, attendance etc.
f. Employee can register himself into the system and view the monthly
pay slip, salary statement, Loan premium update etc online
PROJECT ANALYSIS
2.5 DRAWBACKS
Proposed System:
Feasibility study:
Whenever we design a new system, normally the management will ask for a feasibility
report of the new system. The management wants to know the technicalities and cost
involved in creation of new system.
- Technical feasibility
- Economic feasibility
- Physical feasibility
Technical feasibility:
Technical feasibility involves study to establish the technical capability of the
system being created to accomplish all requirements to the user. The system should be
capable of handling the proposed volume of data and provide users and operating
environment to increase their efficiency.
For example, system should be capable of handling the proposed volume of data
and provide users.
Economic feasibility:
Economic feasibility involves study to establish the cost benefit analysis. Money
spent on the system must be recorded in the form of benefit from the system. The benefits
are of two types:
Tangible benefits:
- Saving man labor to do tedious tasks saves time.
Intangible benefits:
- Improves the quality of organization.
Physical feasibility:
It involves study to establish the time responses of the new system being created.
For e.g., if the new system takes more than one day to prepare crucial finance statement
for the management, wherever it was required in an hour, the system fails to provide the
same.
It should be clearly establish that the new system requirements in the form of time
responses would be completely met with. It may call for increase in cost. If the required
cost is sacrificed then the purpose of the new system may not be achieved even if it was
found to be technically feasible.
Scope of the Project:
The system under consideration must include all those activities that are necessary for the
smooth functioning of the different process. The system will
Save time
Advantages:
Drawbacks:
Software Requirements:
Programming language - PHP
Web server - WampServer
Database - MySql
Web technologies - HTML, Java script
Operating system - Windows XP, Windows 7
Hardware Requirements:
Processor: Intel Pentium III or IV or above
Memory: 2 GB RAM or above
Monitor: 15” Color Monitor
Keyboard
Mouse
CHAPTER 3
STRUCTURED ANALYSIS
3.1 INTRODUCTION.
3.1 INTRODUCTION
Context diagram.
Data flow diagram.
E-R Diagram (Entity Relationship model).
Data dictionary.
Confirm
Confirm
Confirm Confirm
Confirm Confirm
Confirm Confirm
Confirm Confirm
The context diagram is the starting point of the DFD. A DFD is a series of
bubbles joined by lines-which represents the data transformations and the lines
represent the data flows in the system. So it is also known as “BUBBLE CHART”.
There are various symbols used to draw a DFD, like-
Employee
Employee id
1.6
1.7
2.5
New Payslip Search Payslip Data
Payslip
Payslip
Payslip Data
2.5.1
Update
Confirm Update Payslip
Payslip
2.6
Loan Information New Loan Summary
Search Loan
LoanSummary
New Loan Summary
2.6.1
Update
Confirm Update Loan Data
Loan Data
3.4 E-R DIAGRAM (ENTITY RELATIONSHIP DIAGRAM)
One to one.
One to many
Many to many.
4. Lines: Line is nothing but it connects the relationships, attributes and entities.
Emp id
1
For Attendance
M
n
ti o
gna
Process
e si
p. D
Em
Dep
t. Id
1
e
1
Em p. Na m
M N Dep
t. N
Employee am e
Work Department
1
M 1 De
pt.
Ad
dr
s
e ss
Id
ddres
E-
p.
m ail
Em
A
Em p.
In Receive Process
Em p. Id
Mo
nth
Bank Name
1 1 M
Bank To Payslip
Ye
1 1
ar
Bran
Em
Em
p
p.
. Id
ch
Cu
Co
Ac
rre
nt
co
Em
ac
nt
Ba
u
p
t
sic .N
nt
N
Ba
am
o
No
la n
e
ce
3.5 DATA DICTIONARY:
Data elements: It is the smallest unit of data that provide for no further
decomposition.
Data structure: It is a group of data element handled as a unit.
Data flows & data stores: They are data structures in motion and data structures
at rest respectively.
Each data flow in the DFD has one Data Dictionary entry.
Definitions must be readily accessible by name.
There should not be data redundancy in the data definition.
The procedures for writing definition should be precise.
SYSTEM DESIGN
4.1 INTRODUCTION
System design is a solution a “how to approach the creation of a new system”. This
important phase is composed of several steps. It provides the understanding and
Procedural details necessary for implementing in the system recommended in the
feasibility study. Emphasis is on translating the performance requirement into design
specification
a. Logical Design
b. Physical Design
4.1.1 LOGICAL DESIGN:
We know that the data flow diagram shows the logical flow of the system and defines
the boundaries of the system. A logical design specifies the user needs at the level of
detail that virtually determines the information flow into and out of the system and the
required data resources. Logical design describes the inputs, outputs, databases and
procedures all in a format that meets the user requirements.
It provides the working system by defying the design specification that tells the
programmers exactly what the candidate system must do. In short it can state that
physical design is the implementation of the logical design.
Update benefits costs, conversion date and system constraints (legal, financial,
hardware etc)
Input Design
Output Design
Database Design
MENU DESIGN:
In any computer system, a user first interact with its menus, therefore it should be
good enough such that the user can feel comfortable while using it.
Like most of the system, the format will be shown along with a list of number, and
users are expected to choose appropriate option by positioning the cursor or keying the
appropriate number. A series of menus allow the user to step through a series of
hierarchical levels of increasing specificity.
The advantage of the well designed menu is that it provides a familiar format and
clear set of choice which were well understood by the user. Menus therefore require
less training than common languages. One important feature of a menu structure is the
capability of back tracking to a higher or returning to the higher level and starting ones.
An ideal interface should have shortcut. Example of a shortcut are menu of menu name
so that a user may immediately specify a lower level menu and a feature to permit
direct writing of a complex command that by passes the menu displays.
Input design is a circle part of any system design. Inaccurate input data are the
most important cause of error in data processing. Data entry can be controlled by input
design. Input design is the process of converting user oriented inputs to computer based
format. The goal of designing input data is to make data entry as easy, logical and free
from errors can possible.
While entering the data the operator needs to know the following:-
Keeping in view the users requirements, the input screens have been designed
and developed for easy and error free data entry. Based on the various types of inputs to
be fed to the computer in using the proposed system, all input screens are designed in
real mode and help are given in the form of guide the data entry operators step by step.
Computer output is the most important and direct source information to the users.
Efficient intelligible output design should improve the system relationship with the user
and help in design making. A major form of the output is a hardcopy from the printer.
In the system, under consideration printout are designed around the output
requirement of the user. The output design can be classified into two groups:
1. Form Design.
2. Report Design.
SYSTEM TESTING
5.1 INTRODUCTION
5.2 TESTING
5.3 DEBUGGING
5.1 INTRODUCTION
A system should always be tested thoroughly before implementing it, as regards its
individual programs, the system as a whole user acceptance etc. This is because
implementing a new system is a major job, which requires a lot of man, hours and a lot
of other resources, so an error not detected before implementation may cost a lot.
Effective testing early in the process translates directly into long term cost savings from
reduced number of errors. This is also necessary because in some cases, a small error
not detected and corrected before installation may explode into much larger problem.
For this reason, it is impossible to execute every combinations of path during testing. It
is possible however, to adequately cover program logic and ensure that all conditions in
the procedural design have been exercised.
Programming and testing is followed by the stage of installing the new computer based
system. Actual implementation of the system can begin at this point using either a
parallel or direct change over plan, or some blend of two. The testing and
implementation of the system “ONLINE PAYROLL MANAGEMENT SYSTEM” was
carried out as described below:
5.2 TESTING
The testing of individual modules was completed during the development itself. Some
real data entered manually and necessary testing was completed for each module.
Necessary changes were made there to make sure that the module is working
satisfactorily.
Programs are invariably related to one another and interact in a total system.
Each portion of the system is tested against the entire module with both test and live
data before the entire system is ready to be tested.
System testing is designed to uncover weaknesses that were not found in earlier
tests. This includes forced system failure and validation of the total system.
An acceptance test has the objective of selling the user on the validity and reliability of
the system. It verifies the system’s procedures operate to system specification and that
the integrity of vital data is maintained.
5.2.3 FUNCTIONAL TESTING
The functional testing specifies the operating conditions, input values and expected
results. The functional testing in this project results in positive. All the various
operating conditions and expected are accurate. When this test is carried out it does not
arise any situation it is able to take care of all the situations.
The structural testing is concerned with examining the internal processing logic of a
software system. In the project this test is carried out to make sure that while in the
calculation of excise and invoice, various taxes and total amounts are calculated with
accuracy. In this test all the logical parts are tested very carefully and it resulted in
positive.
The combining structural and functional testing of all the operating conditions,
input values, expected results along with the internal processing logic of the software
system, which means these combined effort is through the study of the whole system.
The combination of these two testing is also called as the Unit Testing. In this unit
testing the system results is almost accurate in the operating conditions, expected
results along with the internal processing logic of the system.
5.3 DEBUGGING
The software was tested vigorously before implementation and when errors were
found they were corrected and removed.
CHAPTER 6
SYSTEM SECURITY
6.2 PREVENTION.
6.3 DETECTION.
The measures for data protection taken by an organization reflect its awareness
and attitude towards Information Technology. If top management treats computers as a
de-humanized, intangible, but integrity would, at best, be lackadaisical. On the other
hand, if the management considers information as an important recourse and computers
as an aid in decision making one would find a positive approach and involvement by
the management towards security of information. This attitude naturally percolates
down to the lower levels and the workers consider the computer correspondingly as an
enemy.
One of the best and first steps in ensuring data security is to create awareness
and develop a culture within the organization towards the ways in which information
can be lost/alter and what would be the consequences, of such an occurrence, to the
organization and individuals.
While the above are relevant for any computer based MIS implementation, in case
of PCs, the rules acquisition and use must be unambiguously stated. Additional points
to be looked into are:
Information classification;
Responsibility for security;
User training to increase security awareness and propagation of do’s and do not’s.
Guidelines for creation and changes to passwords etc.
There are four time-honored principles for ensuring security and recovery in
case of breaches of security:
6.2 PREVENTION:
The best method is of course stopping all breaches of security before they occur. ‘Need-
to knows’ policy is an offshoot of the principle of prevention.
6.3 DETECTION:
However one may try to ensure it, total security is almost impossible. The next
principle, therefore, is that one must be able to detect breaches to security, whenever
they occur, within the shortest possible time. This helps in damage assessment and,
also, in devising further preventive measures.
These measures are for PCs being used by us. The measures available are:
Physically bolt down the PC to a table so that it can’t be casually lifted and taken
away.
Locate the PC in such a way that it is conveniently accessible to the user, but
hidden from casual passes-by.
Have likeable cupboards for floppies and keep them locked at all times, except
when used.
Keyboard and PC locking devices can be fitted so that the PC can’t be operated
unless these locks are opened.
Keep a record of all floppies in use; don’t permit alien floppies into the
organization.
Use lockable rooms for PCs, specially those handling sensitive data. Make it a
practice to lock the room when leaving it for even a short time.
Time above apply to server, gateways and the like.
The PCs are fairly rugged and can tolerate wide ranges of temperatures,
humidity, and voltages. To ensure trouble free and prolonged life, consider the
following measures:
Have temperature and humidity gauge placed in the close proximity of PC and
keep a casual watch to ensure that condition are within limits. Switch off if the
limits are exceeded.
If the normal electrical supply is subject to large variations of voltage and
frequency or spikes, it is prudent to have voltage and frequency stabilizers for the
PC.
Ensure that excessive dust or paper scrap does not accumulate near the PC.
The plug sockets should fit snugly and cables leading to terminals and printers
should be secured properly and not left hanging.
We may consider putting a thin transparent plastic cover on the keyboard if it
does not hamper to handling the keyboard.
The most important is the use of a vacuum cleaner at regular intervals.
6.7 SOFTWARE SECURITY:
There are some measures we can take to ensure that that is not corrupted or
modified by unauthorized users and to reinitiate the database to its known status
in case this happens and these are:
A number of measures are available for reducing the risk of being attacked by
computer viruses:
-> Don’t allow the use of outside programs for company PCs or networks;
-> Try and obtain source code for important software in use and compile it in-
house.
6.9.1 IDENTIFICATION:
The password only indicates an object with a unique identity is assigned to it. Thus it
should not become authorization to access data without further checks, if some measure
of security is desired.
6.9.2 AUTHENTICATION:
This process verifies that a person or object is who he/she or it claims to be. This
could be achieved by asking some standard questions and getting answers to them; if
the answers match with those held on the systems, the person or object is authenticated.
6.9.3 AUTHORIZATION:
This is the last step in the process; through this, we can ensure that only a given
user, terminal or other resource, can access data to which permission has been
guaranteed to read, write or alter; thus a matrix can be created to indicate which users
have access to which files, records or fields. If the user request passes the matrix he is
allowed to access, otherwise he is denied access to some part of the database.
CHAPTER 7
CONCLUSION
I have collected the information necessary for the system as much as possible and I have tried
my level best to develop user-friendly software but due to my inexperience and lack of time
there are also some limitations in the system. These are: -
Software development is never ending process and continues throughout the life of the
software. The software has been developed keeping in mind easy modification and
enhancement that may be required from time to time.
The software can be effectively used as a Online Payroll Management System to generate
the reports. But some scopes for further enhancement are still left in the system. The system
provides scope for further enhancement depending upon requirements. Even though the system
satisfies user requirements, still more and more additional work can be carried out.
CHAPTER 8
SCREEN SHOT
$con=mysql_connect("localhost","root","");
if($con)
{
$dbstatus=mysql_select_db("payroll");
$rs=mysql_query("insert into attendence
values('$empid','$ename','$designation','$department','$month','$year','$cl','$ml','
$el','$absent')");
if($rs)
{
echo "<script>Alert.render('Record inserted
successfully')</script>";
}
else
{
echo "<script>Alert.render('Record not inserted
successfully')</script>";
}
}
else
{
echo "<script>Alert.render('Connection not
successfully')</script>";
}
}*/
?>
The following is the coding for Pay slip Processing:
<?php
session_start();
$empid=$_POST['empid'];
$ename=$_POST['ename'];
$month=$_POST['month'];
$year=$_POST['year'];
$basicpay=$_POST['basicpay'];
$ta=$_POST['ta'];
$lic=$_POST['lic'];
$tax=$_POST['tax'];
$gpfadvance=$_POST['gpfadvance'];
$gpf=$_POST['gpf'];
$con=mysql_connect("localhost","root","");
mysql_select_db('payroll');
if($con)
{
$rs1=mysql_query("select * from attendence where
empid='".$empid."' and month='".$month."'");
if($row=mysql_fetch_array($rs1))
{
$count_absent=$row['absent'];
}
if($count_absent>0)
$absentd=$count_absent*500;
else
$absentd=0;
}
else if($row=mysql_fetch_array($rs3))
{
$gpfbalance=$row['gpf_closing_balance'];
}
$DA=$basicpay*50/100;
$MA=$basicpay*20/100;
$HRA=$basicpay*20/100;
$GP=$basicpay+$ta+$DA+$HRA+$MA;
$total_deduction=$lic+$tax+$gpf+$loan_emi+$absentd;
$net=$GP-$total_deduction;
$gpfbalance=$gpfbalance+$gpf-$gpfadvance;
?>