SlideShare a Scribd company logo
1 of 17
University of Baluchistan
Quetta
Habibullah
Roll number 20
2nd Semester (Final
Morning)
Session 2015 to 2017
Introduction
Planning, codding, designing,
implementation
Process model
Debugging process
Its matrices, measurement
Its function point
Its quality
Introduction
Online biometric security and registration
system is the system which provide to any
institute the security as well as register their
employs. This software plays an important role
in the security basis and no one can enter in
this institute rather then the employee. This
software is developed in v process model and
also many standard technologies were include
in it like its matrices, measurement, its FP
(function point),
Many process model are used for biometric system like
prospective Models SDLC, V Process Model etc. In my point
of view V Process model is so useful for biometric system.
Because V process model is so efficient for this software.
Following phases are used in V process Model are as
below………
Requirement modeling
It is the first phase use for biometric system.
In this phase of software we have planning, in planning we
have decided many things about software like Modern
technologies, Budget, not noisy place, expert staff, time
table or schedule for the successful software.
Planning
In the planning of this smart software first we looked
for the special environment and call the experience
staff to discuss each other about this software after
that we decide that how much budget we have for
this software and also for the use of standard
technologies in this software. The group decide that
which kind of process model will be use and also the
many things like its debugging process, its codding,
its designing, its testing, its measurement, its
matrices, its function point, its quality and then we
start working for the software and also discuss the
Communication
In this phase of software communication so important
between the staff
With their managers. And all the staff communicate on the
software to full fill all the requirements.
Designing
In this phase of software we set all the design of biometric
system and use well technics that our software run well at
the end. That our software get more interest and use more
and more.
Architectural design
This is the second best phase in this phase we will design
the biometric system high level design and put the module
functionality and dependency b/w the module. At last work
on biometric system data base system to design well and
remove the faults. There are five functions we perform here
for this software dependency between the module mean
that well efficient in design. And database system to keep
all entities on the right spot and design well. In high level
design we always use the excellent technique and require
well expert management.
Component design
In this phase we create interface in design of biometric system that
design well and customer no difficulty to use it comfortable and give
the well result. Such examples like fonts use in the software and the
names, title, etc.
Coding
In this phase we simplify do the coding of the software to
design well.
Precaution
In this phase we see all the precautions for the
perfect software.
Verification & validation of software
In this phase we discus the unit testing. Integration
testing mean we combine all the phases again and
then test after verification and correct validation we
improve again our s/w and then go to another testing
called system testing.
System testing
In this of biometric system we discus and see the
user attesting techniques UAT for the user can be
installed in every where and give the efficient result.
Use of Debugging process in bio matric
software
In debugging process we fix all the problems of software. Its also
depend on the cost of this software. There are many types of bugs
that we use to solve the every kind of problems.
1 . Memory leaks
In this process we bugs out the memory allocate or deallocate
because its create the confusion in the time of implantation of this
software.
2 . Logical leaks
This kind of bugs can create the problem that the output of this
software don’t give the exact report we also use this kind of debug
in this software and fix this problem.
3 . Codding error
in this kind of bugs its effect the program in codding and shows the
Two kind of strategies used in debugging
process.
1.There are two strategies but we use only
one kind of strategy in this biometric
system is Brute force debugging process
in which solve the highly complex
problems by simple algorithms.
Matrices measurement of the software
As we know that the improvement structure of the software
is called the matric of the software & the different phases of
the project are counted and calculated.
1. We perform all these processes for the biometric
software.
There are three types of matrices that we use for this
software.
Process . Project . And Product
Process matrices that we use in the software
In this process we discuss all the all the developed time from a
process to process vary and discuss all the methodologies used in
biometric security and registration system like what type of
designing, codding, planning, deployment and what technologies we
use for the software.
Project matrices that we use in this software
In this phase of matric number of risks rather they were know and
predictable risks.
And see all the efforts on the basis of time and this time can be
measure to see this time we have a formula that can determined
percentage = actual time/expected time * 100
percentage = 6 months / 8 months * 100
percentage = 75 % of time realized in the project
Measurement potion we measure all phases
of the software in biometric system.
Their regular feed back & a many of measurements of
attributes to set a perfect product.
We have a formula for these all aspects to calculate
the programmer activity.
Programmer activity = functionality /
time
programmer activity = 95.66 / 6
months
programmer activity = 15.94
The function point of biometric system
There are three categories of calculating the FP of this system one is
simple moderate and complex we developed this system in highly
complex and now we determine it by the help of this formula.
Parameters
Input
Output
Inquires
Interface
project size
This software is developed in complex size.
There are 14 values in a project and the values are
5
5
5
5
5
so the formula is
FP = raw FP * [0.65+0.01* CAF]
Parameters complex
Input 5 * 5
Output 5 * 5
Inquires 5 * 5
Interface 5 * 5
Files 5 * 5
Raw FP = 10+10+10+10+10 = 50
FP = 50 * [0.65+0.0l+CAF]
FP = 50 * [0.65+0.70]
FP = 50 * [1.33]
FP = 67.5
Quality of this biometric system
There are many qualities in this biometric system are given below.
This system is very reliable to use because we use all the processes
that not be use in other systems.
This system is Very efficient in time and give the smart output every
time.
This system use by every one have are the owner of this software.

More Related Content

What's hot

GSPM (General Software Process Model)
GSPM (General Software Process Model)GSPM (General Software Process Model)
GSPM (General Software Process Model)
muhammad naeem
 
Software Reliability Testing Training Crash Course - Tonex Training
Software Reliability Testing Training Crash Course - Tonex TrainingSoftware Reliability Testing Training Crash Course - Tonex Training
Software Reliability Testing Training Crash Course - Tonex Training
Bryan Len
 

What's hot (20)

Software metrics
Software metricsSoftware metrics
Software metrics
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
GSPM (General Software Process Model)
GSPM (General Software Process Model)GSPM (General Software Process Model)
GSPM (General Software Process Model)
 
Software Metrics - Software Engineering
Software Metrics - Software EngineeringSoftware Metrics - Software Engineering
Software Metrics - Software Engineering
 
Lecture 20 software testing (2)
Lecture 20   software testing (2)Lecture 20   software testing (2)
Lecture 20 software testing (2)
 
Spm unit iii-configuration mgmt-intro
Spm unit iii-configuration mgmt-introSpm unit iii-configuration mgmt-intro
Spm unit iii-configuration mgmt-intro
 
Software reliability
Software reliabilitySoftware reliability
Software reliability
 
Software reliability growth model
Software reliability growth modelSoftware reliability growth model
Software reliability growth model
 
Software Metrics
Software MetricsSoftware Metrics
Software Metrics
 
Software Metrics
Software MetricsSoftware Metrics
Software Metrics
 
Bai giang-spm-13feb14
Bai giang-spm-13feb14Bai giang-spm-13feb14
Bai giang-spm-13feb14
 
Lecture3
Lecture3Lecture3
Lecture3
 
software metrics(process,project,product)
software metrics(process,project,product)software metrics(process,project,product)
software metrics(process,project,product)
 
Unit 8 software quality and matrices
Unit 8 software quality and matricesUnit 8 software quality and matrices
Unit 8 software quality and matrices
 
Software Reliability Testing Training Crash Course - Tonex Training
Software Reliability Testing Training Crash Course - Tonex TrainingSoftware Reliability Testing Training Crash Course - Tonex Training
Software Reliability Testing Training Crash Course - Tonex Training
 
Software testing
Software testingSoftware testing
Software testing
 
SYSTEM DEVELOPMENT LIFE CYCLE
SYSTEM DEVELOPMENT LIFE CYCLESYSTEM DEVELOPMENT LIFE CYCLE
SYSTEM DEVELOPMENT LIFE CYCLE
 
Software size estimation
Software size estimationSoftware size estimation
Software size estimation
 
The importance of quality software
The importance of quality softwareThe importance of quality software
The importance of quality software
 
Software metrics
Software metricsSoftware metrics
Software metrics
 

Similar to Online Bio metric security system

Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineering
smumbahelp
 
Chapter-2 ppt for the MBA 4rh seme6y.pdf
Chapter-2 ppt for the MBA 4rh seme6y.pdfChapter-2 ppt for the MBA 4rh seme6y.pdf
Chapter-2 ppt for the MBA 4rh seme6y.pdf
VikasRai405977
 
Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineering
smumbahelp
 
CP7301 Software Process and Project Management notes
CP7301 Software Process and Project Management   notesCP7301 Software Process and Project Management   notes
CP7301 Software Process and Project Management notes
AAKASH S
 
6 basic steps of software development process
6 basic steps of software development process6 basic steps of software development process
6 basic steps of software development process
Riant Soft
 

Similar to Online Bio metric security system (20)

Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineering
 
SE-Lecture-7.pptx
SE-Lecture-7.pptxSE-Lecture-7.pptx
SE-Lecture-7.pptx
 
Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineering
 
Computer1
Computer1Computer1
Computer1
 
Software Engineering
Software  EngineeringSoftware  Engineering
Software Engineering
 
Chapter-2 ppt for the MBA 4rh seme6y.pdf
Chapter-2 ppt for the MBA 4rh seme6y.pdfChapter-2 ppt for the MBA 4rh seme6y.pdf
Chapter-2 ppt for the MBA 4rh seme6y.pdf
 
Develop a process model
Develop a process modelDevelop a process model
Develop a process model
 
functional testing
functional testing functional testing
functional testing
 
Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineering
 
Ch 02 s.e software process models 1
Ch 02 s.e software process models   1Ch 02 s.e software process models   1
Ch 02 s.e software process models 1
 
What is software development life cycle
What is software development life cycleWhat is software development life cycle
What is software development life cycle
 
Mi0033 software engineering
Mi0033  software engineeringMi0033  software engineering
Mi0033 software engineering
 
CP7301 Software Process and Project Management notes
CP7301 Software Process and Project Management   notesCP7301 Software Process and Project Management   notes
CP7301 Software Process and Project Management notes
 
Development of computer program
Development of computer program Development of computer program
Development of computer program
 
55 sample chapter
55 sample chapter55 sample chapter
55 sample chapter
 
55 sample chapter
55 sample chapter55 sample chapter
55 sample chapter
 
6 basic steps of software development process
6 basic steps of software development process6 basic steps of software development process
6 basic steps of software development process
 
Beit 381 se lec 3 - 46 - 12 feb14 - sd needs teams to develop intro
Beit 381 se lec 3 - 46  - 12 feb14 - sd needs teams to develop introBeit 381 se lec 3 - 46  - 12 feb14 - sd needs teams to develop intro
Beit 381 se lec 3 - 46 - 12 feb14 - sd needs teams to develop intro
 
Online Exam Management System(OEMS)
Online Exam Management System(OEMS)Online Exam Management System(OEMS)
Online Exam Management System(OEMS)
 

Recently uploaded

一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
F
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 

Recently uploaded (20)

💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 

Online Bio metric security system

  • 1. University of Baluchistan Quetta Habibullah Roll number 20 2nd Semester (Final Morning) Session 2015 to 2017
  • 2. Introduction Planning, codding, designing, implementation Process model Debugging process Its matrices, measurement Its function point Its quality
  • 3. Introduction Online biometric security and registration system is the system which provide to any institute the security as well as register their employs. This software plays an important role in the security basis and no one can enter in this institute rather then the employee. This software is developed in v process model and also many standard technologies were include in it like its matrices, measurement, its FP (function point),
  • 4. Many process model are used for biometric system like prospective Models SDLC, V Process Model etc. In my point of view V Process model is so useful for biometric system. Because V process model is so efficient for this software. Following phases are used in V process Model are as below……… Requirement modeling It is the first phase use for biometric system. In this phase of software we have planning, in planning we have decided many things about software like Modern technologies, Budget, not noisy place, expert staff, time table or schedule for the successful software.
  • 5. Planning In the planning of this smart software first we looked for the special environment and call the experience staff to discuss each other about this software after that we decide that how much budget we have for this software and also for the use of standard technologies in this software. The group decide that which kind of process model will be use and also the many things like its debugging process, its codding, its designing, its testing, its measurement, its matrices, its function point, its quality and then we start working for the software and also discuss the
  • 6. Communication In this phase of software communication so important between the staff With their managers. And all the staff communicate on the software to full fill all the requirements. Designing In this phase of software we set all the design of biometric system and use well technics that our software run well at the end. That our software get more interest and use more and more.
  • 7. Architectural design This is the second best phase in this phase we will design the biometric system high level design and put the module functionality and dependency b/w the module. At last work on biometric system data base system to design well and remove the faults. There are five functions we perform here for this software dependency between the module mean that well efficient in design. And database system to keep all entities on the right spot and design well. In high level design we always use the excellent technique and require well expert management.
  • 8. Component design In this phase we create interface in design of biometric system that design well and customer no difficulty to use it comfortable and give the well result. Such examples like fonts use in the software and the names, title, etc. Coding In this phase we simplify do the coding of the software to design well. Precaution In this phase we see all the precautions for the perfect software.
  • 9. Verification & validation of software In this phase we discus the unit testing. Integration testing mean we combine all the phases again and then test after verification and correct validation we improve again our s/w and then go to another testing called system testing. System testing In this of biometric system we discus and see the user attesting techniques UAT for the user can be installed in every where and give the efficient result.
  • 10. Use of Debugging process in bio matric software In debugging process we fix all the problems of software. Its also depend on the cost of this software. There are many types of bugs that we use to solve the every kind of problems. 1 . Memory leaks In this process we bugs out the memory allocate or deallocate because its create the confusion in the time of implantation of this software. 2 . Logical leaks This kind of bugs can create the problem that the output of this software don’t give the exact report we also use this kind of debug in this software and fix this problem. 3 . Codding error in this kind of bugs its effect the program in codding and shows the
  • 11. Two kind of strategies used in debugging process. 1.There are two strategies but we use only one kind of strategy in this biometric system is Brute force debugging process in which solve the highly complex problems by simple algorithms.
  • 12. Matrices measurement of the software As we know that the improvement structure of the software is called the matric of the software & the different phases of the project are counted and calculated. 1. We perform all these processes for the biometric software. There are three types of matrices that we use for this software. Process . Project . And Product
  • 13. Process matrices that we use in the software In this process we discuss all the all the developed time from a process to process vary and discuss all the methodologies used in biometric security and registration system like what type of designing, codding, planning, deployment and what technologies we use for the software. Project matrices that we use in this software In this phase of matric number of risks rather they were know and predictable risks. And see all the efforts on the basis of time and this time can be measure to see this time we have a formula that can determined percentage = actual time/expected time * 100 percentage = 6 months / 8 months * 100 percentage = 75 % of time realized in the project
  • 14. Measurement potion we measure all phases of the software in biometric system. Their regular feed back & a many of measurements of attributes to set a perfect product. We have a formula for these all aspects to calculate the programmer activity. Programmer activity = functionality / time programmer activity = 95.66 / 6 months programmer activity = 15.94
  • 15. The function point of biometric system There are three categories of calculating the FP of this system one is simple moderate and complex we developed this system in highly complex and now we determine it by the help of this formula. Parameters Input Output Inquires Interface project size This software is developed in complex size. There are 14 values in a project and the values are 5 5 5
  • 16. 5 5 so the formula is FP = raw FP * [0.65+0.01* CAF] Parameters complex Input 5 * 5 Output 5 * 5 Inquires 5 * 5 Interface 5 * 5 Files 5 * 5 Raw FP = 10+10+10+10+10 = 50 FP = 50 * [0.65+0.0l+CAF] FP = 50 * [0.65+0.70] FP = 50 * [1.33] FP = 67.5
  • 17. Quality of this biometric system There are many qualities in this biometric system are given below. This system is very reliable to use because we use all the processes that not be use in other systems. This system is Very efficient in time and give the smart output every time. This system use by every one have are the owner of this software.