Data

You might also like

You are on page 1of 63

1

CHAPTER 1

INTRODUCTION



Corporate Event Management System allows you to plan events, manage the
registrations and payments in an easy to use interface. It is a tool for an enterprise to
organize and execute the events. It automates your event planning and scheduling
activity by serving as a central place wherein users can look for various events and
register to participate in the event.
We intend to develop a user friendly application for event management company .This
helps manage users and events, budget calculation, preparing reports etc. We would
also like to provide an android app that provides a user interface. Users can register with
the company, send event requests, view estimated costs, payments, view progress of
events etc.












2



CHAPTER 2

THE ENVIORNMENTAL SPECIFICATION


2.1. SOFTWARE REQUIREMENTS
OPERATING SYSTEM : Windows 7
WEB SERVER : Apache tomcat
FRONT END : HTML
BACK END : MySQL
SERVER SIDE SCRIPTING : PHP
DEVELEPMENT TOOL : Dreamweaver

2.2. HARDWARE REQUREMENTS
PROCESSOR : Pentium III
RAM : 128 MB
HARD DISK : 1.2 GB or above
MOUSE : Standard two button or higher
KEYBOARD : Standard 101-102 key board

2.3. TECHNOLOGY
3

CORPORATE EVENT MANAGEMENT SYSTEM is developed on Dreamweaver
platform with PHP for server side scripting and jquery for client side scripting and
MySQL for database maintenance.

2.4. SOFTWARE DESCRIPTION

2.4.1 PHP


PHP is a general-purpose server-side scripting language originally designed for Web
development to produce dynamic Web pages. It is one of the first developed server-side
scripting languages to be embedded into an HTML source document, rather than calling
an external file to process data. Ultimately, the code is interpreted by a Web server with
a PHP processor module which generates the resulting Web page. It also has evolved to
include a command-line interface capability and can be used in standalone graphical
applications. PHP can be deployed on most Web servers and also as a standalone shell
on almost every operating system and platform free of charge.
Personal Home Pages Hypertext Processor, commonly known as PHP is one of the
revolutionary scripting language which has enabled us to have a much better web
presentation today. This has fast become one of the widely used scripting languages
which are used for web development. One of the key features of this language is its
an open source which will enable anybody to use the platform it provides. PHP is used
to design dynamic web pages. Here you can find the starting origination of PHP and
few basics of the scripting language.

PHP Basics
PHP has over the time evolved to be a very simple scripting language. Each evolved
version of this language has only made it easier for the user to use it for programming.
There are lot of similarities between C and PHP. More so PHP is object oriented and
has a much simpler syntax than C. Here are some of the basic features of PHP-
It has all the features of C, excluding the typed variables.
PHP is completely object oriented language.
4

The APIs (Application Program Interface) are all dedicated for the web and
database.
The syntax in this language is not case sensitive.
Advantages of PHP:
There are many positive aspects which can be observed in this preprocessor. Some of
the salient features of this scripted language are listed below:
It can be easily embedded into web pages.
It can be used to upload large quantities of data into the web.
JavaScript can be used to change the HTML pages dynamically.
It is easier to use other languages like XML, MySQL, SQLite and many others.

PHP FEATURES
Personal Home Pages Hypertext Processor, commonly known as PHP is one of
the revolutionary scripting language which has enabled us to have a much better web
presentation today. One of the key features of this language is its an open source which
will enable anybody to use the platform it provides. PHP is used to design dynamic web
pages.
Security
Vulnerabilities are caused mostly by not following best practice programming rules:
technical security flaws of the language itself or of its core libraries are not frequent
.Recognizing that programmers make mistakes, some languages include taint
checking to detect automatically the lack of input validation which induces many issues.
Such a feature is being developed for PHP,but its inclusion in a release has been
rejected several times in the past.PHPIDS adds security to any PHP application to
defend against intrusions.
Data types
PHP stores whole numbers in a platform-dependent range, either a 64-bit or 32-
bit signed integer equivalent to the C-language long type. Unsigned integers are
converted to signed values in certain situations; this behavior is different from other
programming languages. Integer variables can be assigned using decimal, octal,
5

and hexadecimal notations. Floating point numbers are also stored in a platform-specific
range. They can be specified using floating point notation, or two forms of scientific
notation. PHP has a native Boolean type that is similar to the native Boolean types
in Java and C++. Using the Boolean type conversion rules, non-zero values are
interpreted as true and zero as false, as in Perl and C++. The null data type represents a
variable that has no value. The only value in the null data type is NULL. Variables of
the "resource" type represent references to resources from external sources.

Power and Flexibility
Because PHP is based on the common language runtime, the power and flexibility of that
entire platform is available to Web application developers.
PHP has also attracted the
development of many frameworks that provide building blocks and a design structure to
promote rapid application development (RAD). Some of these
include CakePHP, Symfony, CodeIgniter, Yii Framework, and Zend Framework,
offering features similar to other web application frameworks.

Object orientability
PHP 5 introduced private and protected member variables and methods, along
with abstract classes and final classes as well as abstract methods and final methods. It
also introduced a standard way of declaring constructors and destructors, similar to that
of other object-oriented languages such as C++, and a standard exception
handling model.

Speed Optimization
PHP source code is compiled on-the-fly to an internal format that can be
executed by the PHP engine. In order to speed up execution time and not have to
compile the PHP source code every time the Web page is accessed, PHP scripts can also
be deployed in executable format using a PHP compiler.
6

Code optimizers aim to enhance the performance of the compiled code by
reducing its size, merging redundant instructions and making other changes that can
reduce the execution time. With PHP, there are often opportunities for code
optimization. An example of a code optimizer is the eAccelerator PHP extension.

Scalability and Availability

PHP has been designed with scalability in mind, with features specifically tailored to
improve performance in clustered and multiprocessor environments. Further, processes are
closely monitored and managed by the PHP runtime, so that if one misbehaves (leaks,
deadlocks), a new process can be created in its place, which helps keep your applications
constantly available to handle requests.

Language Support

The PHP Platform currently offers built-in support for three languages: ASP,Java and
JScript.

2.4.2 MySQL
MySQL is the world's most used relational database management
system (RDBMS)

that runs as a server providing multi-user access to a number of
databases. It is named after developer Michael Widenius' daughter,
My. The SQL phrase stands for Structured Query Language.
Free-open source projects that require a full-featured database management
system often use MySQL. For commercial use, several paid editions are available, and
offer additional functionality.MySQL is characterized as a free, fast, reliable open
source relational database. MySQL Advantage is a suite of four open-source software
7

packagesproven, popular, and well-supported onesthat work together to run
interactive, dynamic Internet sites.
MySQL Advantage is comprised of Enhanced MySQL, Apache, PHP, and Perl, to
create an integrated Web development environment. This technology suite delivers a
complete, stable environment for building and deploying database-driven applications
for the Internet. Available for Linux, Unix, and Windows, Advantage allows users to
develop and deploy on their choice of platforms. This flexible, multiple-platform
environment brings unity and scalability to development and Web applications.

Features

Because of its unique storage engine architecture MySQL performance is very high.
Supports large number of embedded applications which makes MySQL very
flexible.
Use of Triggers, Stored procedures and views which allows the developer to give a
higher productivity.
Allows transactions to be rolled back, commit and crash recovery.
Triggers & cursor.


Self-Tuning and Management Capabilities

Revolutionary self-tuning and dynamic self-configuring features optimize
database performance, while management tools automate standard activities. Graphical
tools and wizards simplify setup, database design, and performance monitoring,
allowing database administrators to focus on meeting strategic business needs.

8

Security
A privilege and password system that is very flexible and secure, and that
enables host-based verification. Password security by encryption of all password traffic
when you connect to a server.
Scalability and Limits:
It provides support for large databases and for up to 64 indexes per table Each index
may consist of 1 to 16 columns or parts of columns. The maximum index width is 1000
bytes; before MySQL 4.1.2, the limit is 500 bytes
Connectivity:
Clients can connect to MySQL Server using several protocols, clients can connect using
TCP/IP sockets on any platform. On Windows systems in the NT family (NT, 2000,
XP, 2003, or Vista), clients can connect using named pipes if the server is started with
the --enable-named-pipe option. Clients can connect through shared memory by using
the --protocol=memory optio
2.4.3 JQUERY
jQuery is a multi-browser (cross-browser) JavaScript library designed to
simplify the client-side scripting of HTML. It was released in January 2006 at BarCamp
NYC by John Resig. It is currently developed by a team of developers led by Dave
Methvin.
jQuery is free, open source software, licensed under the MIT License. jQuery's
syntax is designed to make it easier to navigate a document, select DOM elements,
create animations, handle events, and develop Ajax applications. jQuery also provides
capabilities for developers to create plug-ins on top of the JavaScript library. This
enables developers to create abstractions for low-level interaction and animation,
advanced effects and high-level, theme-able widgets. The modular approach to the
jQuery library allows the creation of powerful dynamic web pages and web
applications.
The set of jQuery core features: DOM element selections, traversal and
manipulation, enabled by its selector engine, created a new "programming style", fusing
9

algorithms and DOM-data-structures; and influenced the architecture of other Java
script frameworks.






























10

CHAPTER 3


SYSTEM ANALYSIS



During the analysis phase, activities like problem definition, feasibility study
and outline of the proposed system are done. The system analysis consists of the
following sub phases:
3.1 PROBLEM DEFINITION
The first stage in the development process understands the problem in question
and its requirements. Requirements may specified by the end-user or if the software
system is embedded within a larger system they may be derived from the system
requirements. Requirements, therefore includes the context in which the problem arose,
functionality expected from the system, and system constraints .At this point the
software developers decide whether it is feasible to build the system.
3.2 FEASIBILITY STUDY
The main aim of the feasibility study is to evaluate an alternative system and
propose the most feasible and desirable system for development. The feasibility study is
a test of system proposal according to its workability, impact on the organization;
ability to meet user needs and use of different resources. The feasibility of a proposed
system can be evaluated in terms of three main categories:-
Technical feasibility
Economic feasibility
Behavioural feasibility


11

3.2.1. Technical feasibility
It is a study of resources availability to achieve an acceptable system. It is
essential that the process and definition be conducted parallel with an assignment of
technical feasibility.
The hardware and software requirements of the proposed system are already
available in the market without any difficulty. This system can be deployed easily on
any machines meeting requirements. Database server used in the proposed system in
MySQL which is very commonly used in distributed database systems application. Here
the system is found to be technically feasibility.

3.2.2. Economic feasibility
In cost-benefit analysis various benefits and costs involved are considered,
calculated and compared, if the benefits are more than the cost, the project is considered
economically feasible. It is very essential because the main goal of the proposed system
is to have economically better result along with increased efficiency of the cost versus
the benefit and savings are expected from the proposed system .The implementation of
COOPERATIVE EVENT MANAGEMENT SYSTEM is economically feasible .The
development of this system work well within the budget for the system. All the resources
used are easily available and some are free software, the COOPERATIVE EVENT
MANAGEMENT SYSTEM system is economically feasible.
.
3.2.3. Behavioural feasibility
People are inherent to the resistant to change and computer has been known to
facilitate change. An estimate should be made of how strong a reaction, the user staff is
likely to have towards the development of the new system. It is common knowledge
that computer installations have something to do with turnover, transfers and change in
employee job status.
12

The COOPERATIVE EVENT MANAGEMENT SYSTEM system is very user
friendly. Thus it is easily operable and makes no ambiguity. The proposed system
highly interactive, user friendly and operations on it can be done very easily. It has
more descriptive and helpful interface, which helps the user to operate very easily.
Proposed system is extendible to incorporate modification in the future. Maintenances
in the proposed system are also very easy to do. Hence the system is behaviourally
feasible.

3.3. EXISTING SYSTEM
Corporate Event Management System manages different events like product
launch, employee training/workshops, exhibitions, seminars and conferences. In this
system, the user has to register with event management agency. Then user can book
events. Agency will inform an estimate cost to the user so that can he can decide
whether to proceed or not. After confirmation user have to pay advance amount. Based
on the availability of staff and venue agency will schedule events as per user
requirements. Agency will perform job allocation among the staff. After completion of
the event total cost need to be calculated and inform user for balance payment. Agency
has to keep track of active events and closed events. Agency need to prepare annual
reports to analyse profit/loss.
Limitations of existing system
The user has to inform the event management system directly or through phone
call. The user has to wait till his turn comes up.
After making an event request the cost estimation is made manually by staff of
the agency based on user requirements which takes time.
To know the progress of event arrangement the user has to contact company.
In the existing system the job allocation for the staff is done manually which is a
time consuming process and need much effort.
Annual report preparation and Budget calculation is also done manually.


13

3.4. PROPOSED SYSTEM
In proposed system we intend to develop a software system for event
management system in PHP-MySQL and user interface in Android. The proposed
system allows user to register with agency and book events online through smartphone.
The estimate cost can easily calculated using the proposed system. User can perform
payment through PayPal account. The proposed is capable of performing job allocation
with available staff. It can manage active and closed events and prepare annual reports.
The agency can notify user about payment and status of event.

3.4.1 Benefits of the proposed system
User friendly in the new era of information technology.
The user need not even visit the company to inform the company about the
event.
Once the requirements are specified he/she can view the estimated cost within
seconds.
Based on the estimated cost user can modify the requirements, if needed.
The proposed system is also capable of scheduling the events.
The proposed system will notify user about the event arrangements accordingly
The proposed system can perform job allocation automatically once the subtasks
are identified. It will also calculate total amount and prepare annual reports in
less time.








14

CHAPTER 4

SYSTEM DESIGN AND DEVELOPMENT



Design is the first step in the development phase for any engineered product or
system. It is the process of applying various techniques and principle for purpose of
defining a device, a process or a system in sufficient detail to permit its physical
realization.
Software design sits at the technical kernel of the software engineering products
is applied regardless of the development paradigm that is used. Beginning once
software requirement have been analyzed and specific, software design is the first of
three fundamental activities design, code and test that are required to build and verify
software.
Software design is the process through which requirement are translated into a
representation of software. Within the context of preliminary and detailed design, a
number of different activities occur. There are four types of design; Data Design,
Architectural design, Interface design and Procedural Design.
The Data Design transforms the information domain created model during the
analysis into the data structures that will be required to implement the software.
Architectural design defines the relationship among major structural components of the
program. The procedural design transforms structural components into procedural
decryption of the software. Interface design establishes the layout and interaction
mechanisms for human machine interaction



15

4.1. INPUT DESIGN
The input design is the link that ties the information system into the world of its
users. Input design consists of developing specification and procedures for the data
preparation and data entry. System analyst decides the following input design details:
What data to input.
What medium to use.
How the data should be arranged or coded
The dialogue to guide users in provides input.
Data items and transaction needing validation to detect errors
The arrangement of the messages and comments in online conversation, as well as
the placement of the data, heading and titles on display screens and source documents,
is also part of input design. An improper design that leaves the display screen blank will
refuse a user about what action to take next. Online systems include a dialogue or
conversation between the users and the system.
4.2. OUTPUT DESIGN
The output design plays a major role in providing the user with the required format.
The major function of the output is to convey information and so its layout and design
are careful consideration. Information must be careful considered to the need of the
user. Computer output is the most important and direct information source to the user.
Output design is a process that involves designing necessary outputs that should be
given to the user according to the requirements. Efficient intelligible output design
should improve the system relationship with the user and help in making decision. Since
the output direct the management for taking decisions and to draw conclusion they must
be designed with almost care and details in the output must be simple, descriptive and
clear to the user. So while designing output, the following things are to be considered
Determine what information to present
Arrange the presentation of information in an acceptable format
Desire how to distribute the output to intended receipts


16

4.3 ARCHITECTURAL DESIGN
Architectural design represents the structure of data and program components
that are required to build a mobile based system. It considers the architectural style that
the system will take, the structure and properties of the components that constitute the
system and the interrelationships that occur among all Architectural components of a
system. Architectural design begins with a data design and then proceeds to the
derivation of one or more representations of the architectural structure of the data
system. Alternative architectural styles or patterns are analyzed to derive the structure
that is best suited to customer requirements and quality attributes. One an alternative
has been selected is established using an architectural design model.
An architecture model encompassing data architecture and program structure is
created during architectural design. In addition, component properties and
relationships are described. At each stage, software design work products are reviewed
for clarity, correctness, completeness and consistency with requirements and with one
another.
4.4 MODULE DESIGN
The Modules of the system are:
Event Scheduling
Budget Calculation
Job Allocation
Customer Relationships

4.4.1 EVENT SCHEDULING
In this module we schedule events based on user requirements. This
module verifies whether to accept the user request or not based on constraints like
limit of company,budget etc.

17


4.4.2 BUDGET CALCULATION
In this module we calculate estimated cost and total cost of event. The
cost includes venue rent, food facility, transportation facility, service charges etc.
4.4.3 JOB ALLOCATION
In this module we identify the subtasks of current event and allocate those
tasks among the employees
4.4.3.1 CUSTOMER RELATIONSHIP

This module allows user registration.User can specify the requirements about
the event. The company will notify the progress of event arrangements to the user
through a mobile phone.












18


CHAPTER 5


THE DATABASE DESIGN


A database may be defined as a collection of interrelated data stored together
without harmful or unnecessary redundancy to serve multiple application; the data are
stored that they are independent of programs which use the data. A Database
management System is a software system with capabilities to organize manipulates and
manages the data. To group the given data and to give them a logical structure, a
database system is necessary. The general objective is to make information access
easily, quickly inexpensive and flexible for the user. Relational database stores data in
tables, which in turn are composed of rows also known as records, columns also know
as field.
One of the important methods of database design is ER modelling. An entity-
relationship diagram model data. It defines the entities in the application and type of
relationship between them. An entity is defined as being an item of interest the
enterprise. Usually, entities are nouns. Relationship between entities describes the
dependencies amongst them. Relationship is of different kinds. They are:-
One-to-one : This relationship is rare. Often it indicates entity
One-to-many : This is the most common relationship.
Many-to-many : This type is fairly common. We may normalize it by
an intermediary entity in between the two entities.





19



5.1. TABLE DESIGN

Table design refers to how the logical data structure is to be physically stored in
storage device. The design of table include decision making on the nature and contents
of file such as whether it is to be used for storing master details or reference information
various features are considered during the table design phase analysis.
Purpose of table.
Availability of the hardware.
Method of access.
File activity.
Output requirements.
Input requirements.
File Organization.

Table design also deals with the design of physical data base. A key field
determines how the access is to be implemented. Suitable key fields are identified
various tables and recoded approximately. The type, width and size of the field are
identified.
Techniques of the file organization are the most appropriate storage device can be
selected and an efficient data base design can be achieved specifying the data between
them identifies the interface between the system databases and other data bases. Tables
of the proposed system are:





20


1 user_details

COLUMN NAME DATATYPE CONSTRAINTS
user_id varchar(25) primary key
password varchar(15) not null
full_name varchar(30) not null
address varchar(50) not null
pincode integer not null
city varchar(25) not null
phone_no integer not null
email_id varchar(30)
Table 1.5: user_details
2 emp_details

COLUMN_NAME DATATYPE CONSTRAINTS
emp_id varchar(15) primary key
emp_name varchar(30) not null
gender char not null
date_of_birth datetime not null
address varchar(50) not null
phone_no integer not null
email_id varchar(30) not null
department varchar(15)
designation varchar(25)
emp_type varchar(15) not null
Table 2.5: emp_details
21

3 dept_details

COLUMN_NAME DATATYPE CONSTRAINTS
dept_id varchar(15) primary key
dept_name varchar(30) not null
dept_head varchar(15) not null
no_of_employees integer not null
Table 3.5: dept_details

4 event_details

COLUMN_NAME DATATYPE CONSTRAINTS
event_id varchar(15) primary key
event_name varchar(30) not null
Table 4.5: event_details

5 food_details

COLUMN_NAME DATATYPE CONSTRAINTS
food_code varchar(15) primary key
name varchar(35) not null
type varchar(15) not null
cost float not null
Table 5.5: food_details



22

6 transport_details

COLUMN_NAME DATATYPE CONSTRAINT
transport_code varchar(15) primary key
place varchar(25) not null
vehicle_type varchar(35) not null
cost double not null
Table 6.5: transport_details


7 venue_details

COLUMN_NAME DATATYPE CONSTRAINTS
venue_code varchar(15) primary key
venue_name varchar(30) not null
address varchar(50) not null
city varchar(25) not null
phone_no ineger not null
email_id varchar(30)
full_day_rent double not null
half_day_rent double not null
Table 7.5: venue_details





23

8 event_booking

COLUMN_NAME DATATYPE CONSTRAINTS
booking_id varchar(15) primary key
event_id varchar(15) foreign key
user_id varchar(15) forein key
date_of_event datetime no null
time_of event varchar(9) not null
duration varchar(10) not null
venue varchar(50) not null
place varchar(25) not null
no_of _participnats integer not null
food_required char not null
transport_required char not null
budget double not null
Table 8.5: event_booking

9 confirmed_events
COLUMN_NAME DATATYPE CONSTRAINTS
job_id varchar(15) primary key
event_id varchar(15) foreign key
user_id varchar(15) foreign key
date_of_event datetime no null
time_of event varchar(9) not null
duration varchar(10) not null
advance_amt_received double not null
venue_rent double

24

no_of _participnats integer not null
food_cost double
transport_cost double
total_cost double
balance_amt double
confirm_request char
Table 9.5: confirmed_events

10 job_allocation

COLUMN_NAME DATATYPE CONSTRAINTS
emp_id varchar(15) Primary key, Foreign key
event_id varchar(15) Primary key, Foreign key
date_of event datetime Primary key
Task_assigned varchar(25) Not null

Table 10.5: job_allocation









25

5.2 DATA FLOW DIAGRAMS
Data flow diagrams describe data flow in the system or logic of a computer
program. Flowcharts are the method of communicating complex relationships. They are
extensively used to describe analysis, design and development of computer-based
information system.
Data flow diagrams are graphical tools used to describe and analyze the
movement of data through a system including the process, data storage and delays in the
system. Data flow diagrams are the central tool and the basis for which other
components are developed. The transformation of data from input to output through
processes may be described logically and independently of the physical component and
are called logical DFD.
Data flow diagram (DFD) is a network that describes the flow of data
throughout the system. This network is constructed by using a set of symbols that do not
imply physical implementations. Four basic symbols are used to construct Data Flow
Diagrams. These symbols represent data sources, data flows, data transformations and
data storage. The four basic symbols are as shown below

Figure 1.5: DFD Symbols
The rectangle represents a data source or destination.


A directed line represents the flow of data


An enclosed figure represents a process that transforms a
data stream.

An open-ended rectangle represents data storage



.
26




LEVEL 0






Figure 2.5: DFD Level 0









27

LEVEL 1




Figure 3.5: DFD Level 1

LEVEL 2



Figure 4.5: DFD Level 2
28

LEVEL 2.1


Figure 5.5: DFD Level 2.1
LEVEL 2.2


Figure 6.5: DFD Level 2.1
29

LEVEL 2.3




Figure 7.5: DFD Level 2.3











30



CHAPTER 6



SYSTEM TESTING


Testing is the penultimate step of software development. An elaborate testing of
the data is prepared and the system is using the test data. While doing testing, errors and
noted and correction is made. The users are trained to operate the developed system.
Both hardware and software securities are made to run the developed system
successfully.
System testing is aimed at ensuring the system works accurately before the live
operations commence. Testing is vital to the system. System testing makes a logical
assumption that if all parts of the system are correct, the goal will be successfully
achieved. The candidate system is subjected to a variety of tests; Online Response,
Volume, Stress, Recovery, Security and Usable Tests. A series of testing are performed
for the proposed system before the system is ready for user acceptance testing. Nothing
is complete without testing, as it is vital success of the system.
The entire testing process can be divided into three phases.
Unit Testing
Integration Testing
Final/System Testing

6.1 UNIT TESTING
Unit testing focuses verification effort on the smallest unit of software designs
the Module. To check whether each module in the software works properly so that it
gives decide outputs to the given inputs. Control paths are tested to ensure the
31

information properly flows into the system and output of the program unit under test.
Boundary conditions are tested to ensure that the modules operate at boundaries. All
independent paths through the control structure ensure that all statements in a module
have been executed at least once.

6.2 INTEGRATION TESTING
The major concern of Integration testing is developing an incremental strategy
that will limit the complexity of the entire actions among components as they are added
to the system. Developing a component as they are added to the system, developing and
implementation and integration schedules that will make the Modules available when
needed, and designing test case that will demonstrate the viability of the evolving
system. Though each program works individually, they should also work after linking
them together. This is also referred to as interfacing. Data may be lost across interface
and one module can have adverse effect on another. Subroutines are to linking may not
do the desired function expected by the main routine. Integration testing is a symmetric
technique for constructing programs structure while at the same time conducting tests to
uncover errors associated with the interface. In the testing the programs are constructed
and tested in small segments.

6.3 SYSTEM TESTING
When a system is developed it is hoped that it performs properly. In practice
however some errors always occur. The main purpose of testing an information system
is to find the errors and correct them. A successful test is the one, which finds and error.
The main objectives of the system testing are:
To ensure during operation the system in perform as per specifications.
To make sure that system meets users requirements during operation.
To verify that controls incorporate in the system function intend.
To see that when correct inputs are fed to the system the outputs are
correct.
To make sure that during operation incorrect input and output will be
deleted.
32

The scope of the system test should include both manual operations and
computerized operations. System testing is the comprehensive evolution of the
programs, manual procedures, computer operations and controls. System testing is the
process of checking if the developed system is working according to original objectives
and requirements. All testing needs to be conducted in accordance to the test conditions
specified earlier.

6.4 BLACK BOX TESTING
This testing method focuses on the functional requirements of the software. It
attempts to find out the error of the following categories such as incorrect and missing
functions, interface error, error in data structure, performance error and initialization
and termination errors.

6.5 WHITE BOX TESTING
The testing method is also called path testing. It is a test case design method
that uses the control structure of the procedural design to drive test case. In this system,
unit test has been successfully handled. The test data was given to each and every
module in all respects and got the desired output. Each module has been tested found
working properly.

6.6 DATA VALIDATION TESTING
Data validation is done to see whether corresponding entries made in the table
are correct. Proper validations are done in the case of insertion and updating of tables. If
any such case arises, then proper error messages or warning, if any, has to be displayed.
The different test cases are:
Guaranty that all independent parts with in a Module have been
exercised at least once.
Exercise all logical decisions on their true/false side.
33

Exercise all loops at their boundaries and within their operational
bounds.
Exercise internal data structure to ensure their validity.
Each Module was tested and tested modules were linked and the
integration test was carried out.

6.7 PASSWORD TESTING
The login process is tested with some separate login trials. Password is mainly
meant for security. Incorrect will be screened.

6.8 TEST DATA
The system analyst will provide the test data, specially designed to show that the
system will operate successfully in all its aspects and produce expected results under
expected conditions. Preparation of test data and the checking of results should be
carried out in conjunction with the appropriate users and operational departments. Also
the extent to which the system should be tested must be planned.

















34

CHAPTER 7



IMPLEMENTATION & MAINTAINANCE



Implementation is the stage in the project where the theoretical design is turned
into a working system and is giving confidence on the new system for the users that it
will work efficiently and effectively. It involve careful planning, investigation of the
current system and its constraints on implementation, design of methods to achieve the
change over, an evaluation, of change over methods. Other than planning major task of
preparing the implementation are education and training users. There are three types of
implementation:
Implementation of a computer to replace manual system.
Implementation of a new computer system to replace an existing one.
Implementation of a modified application to replace an existing one, using the
same computer.

The analysis and design is converted into implementation with the help of
language coding conventions. The depth of implementation is found out with the help of
output from the implemented software. The main source for testing its accuracy is with
the help of testing methodologies.


The implementation plan involves the following:
Testing to confirm effectiveness.
Detection and correction of errors.
Making necessary changes so as to satisfy the requirements.
35


MAINTENANCE

Maintenance is the enigma of system development. It holds the software
industry captive typing up programming resources. It could be described as the
symmetric process of changing the software that is already in operation, In order to
prevent system failures and to improve the performance. Software maintenance
involves keeping software interfaces simple and standard , paying particular attention
to troublesome modules, replacing faulty components generally planning to replace
components that are old, obsolete, faulty or at risk for imminent failure.














36

CHAPTER 8



SYSTEM CODES


Coding translates a detailed design representation of software into a
programming language realization. Front-end tool coding has been selected after
analyzing.
Ease of design code translation.
Available of development tools.
Maintainability.

.Net with c# has been selected as the front end tool for the software
development. Code design has been implemented giving priority to understand
simplicity and clarity. Coding style has been chosen in such a way that it provide fast
execution speed and minimum memory requirement.

PICTURE PASSWORD
Login.php
<?php
$uid=$_POST['Username'];
$pass=$_POST['Password'];
$con=mysql_connect("172.16.50.14","group12","3183") or die("Unable to connect");
mysql_select_db("group12") or die("Error in connection");
$result=mysql_query("select * from user_details where user_name='$uid' and
password='$pass'");
37

if($row=mysql_fetch_array($result))
{
if(($row[0]=="$uid")&&($row[1]=="$pass"))
{
session_start();
$_SESSION['user']=$row[0];
$_SESSION['name']=$row[2];
$_SESSION['logged']=true;
header('Location:user_home.php');

}
}
else if(($uid=='admin')&&($pass=='admin123'))
{
session_start();
$_SESSION['user']=admin;
$_SESSION['name']=admin;
$_SESSION['logged']=true;
header('Location:admin.php');

}
else
38

{
header('Location:login.html');
exit;
}

mysql_close($con);
?>
BookEvent.php
<?php
session_start();
$uid=$_SESSION['user'];
$eid=trim($_POST['Etype']);
setcookie('eid',$eid);
$edate=trim($_POST['eventdate']);
$date = new DateTime($edate);
$edates= $date->format('Y-m-d');
setcookie('edates',$edates);
$etime=trim($_POST['Time']);
setcookie('etime',$etime);
$dur=trim($_POST['Duration']);
setcookie('dur',$dur);
$ven= trim($_POST['choose_venue']);
39

if($ven=="Other")
{
$ven=trim($_POST['Venue']);
setcookie('venue',$ven);
}
else
setcookie('venue',$ven);
$place=trim($_POST['Place']);
setcookie('place',$place);
$nop=trim($_POST['No']);
setcookie('no',$nop);
$food=trim($_POST['Food']);
setcookie('food',$food);
$trans=trim($_POST['Transport']);
setcookie('trans',$trans);
$con=mysql_connect("172.16.50.14","group12","3183") or
die("Unable to connect");
mysql_select_db("group12") or die("Error in connection");
mysql_close($con);
?>
<form id='booking-form' action='confirm.php' method='post'>
<?php
if($food=='Y')
40

{
echo "<table>";
echo "
<tr><td>
<b>Select Food Package :</b><br>
</td>
<td></td><td></td></tr>";
$con=mysql_connect("172.16.50.14","group12","3183") or die("Unable to connect");
mysql_select_db("group12") or die("Error in connection");
$result=mysql_query("select * from food_details");
$i=1;
while($row=mysql_fetch_row($result))
{
echo "<tr>
<td><input type=radio name='Food_Pack' id='r$i' class='css-radio'
value='$row[0]'><label for='r$i' class='css-label1'>$row[1]</label></td>
<td>$row[2]&nbsp;&nbsp;&nbsp;&nbsp;</td>
<td>Rs. $row[3] (per head)</td>
</tr>";
$i=$i+1;
}
echo "</table>";
mysql_close($con);
41

}
if($trans=='Y')
{
echo "<br><br><table>";
echo "
<tr><td>
<b>Provide Transportation details :</b><br>
</td>
<td></td><td></td></tr>
<tr>
<td>
Choose Vehicle Type :
</td>
<td></td><td></td>
</tr>";
//$pl=$_COOKIE['place'];
echo $place;
$con=mysql_connect("172.16.50.14","group12","3183") or die("Unable to connect");
mysql_select_db("group12") or die("Error in connection");
$result=mysql_query("select * from transport_details where place='$place'");
//$i=1;
while($row=mysql_fetch_row($result))
42

{
echo "<tr>
<td>
<input type=checkbox name='Vehicle[]' id='c$i' class='css-checkbox'
value='$row[2]'><label for='c$i' class='css-label2'>$row[2]</label></td>
<td>Rs. $row[3] &nbsp;&nbsp;&nbsp;&nbsp; </td>
<td>No.of vehicle required:<input type=text name=no$i></td>
</tr>";
$i=$i+1;
}
echo "</table>";
mysql_close($con);
}
if($food=='Y'||$trans=='Y')
{
echo"
<div class='container_122'><input type='reset' value='CLEAR' name='clear'></div>
<div class='container_122'><input type='submit' value='SAVE' name='book2'></div>";
} ?>

Admin/index.php
<?php
session_start();
43

$u=$_SESSION['user'];
if($_SESSION['user']=="admin")
echo " Welcome &nbsp; &nbsp;<b>".strtoupper($u).'</b>';
else
header('Location:login.html');
mysql_connect("172.16.50.14","group12","3183") or die("cannot establish
connection");
mysql_select_db("group12") or die("cannot establish connection");
$ename="";
echo "<div><table border='1' class='css_table'><tr>";
$z=mysql_query("select * from event_booking")or die(mysql_error());
echo "<th class='css_col'>Booking_ID</th>
<th class='css_col'>Event_Name</th>
<th class='css_col'>UserName</th>
<th class='css_col'>Date</th>
<th class='css_col'>Time</th>
<th class='css_col'>Duration</th>
<th class='css_col'>Venue</th>
<th class='css_col'>Place</th>
<th class='css_col'>No of participants</th>
<th class='css_col'> Food Required </th>
<th class='css_col'> Transport Required</th></tr>";
while($row=mysql_fetch_row($z))
44

{
$ev=mysql_query("select * from event_details where event_id='$row[1]'")or
die(mysql_error());
while($e2=mysql_fetch_row($ev))
{
$ename= $e2[1];
}
echo "<tr class='css_col'><td class='css_col'>";
echo $row[0]."&nbsp; &nbsp; </td><td class='css_col'>".$ename."</td><td
class='css_col'>".$row[2]."&nbsp; &nbsp; </td><td class='css_col'>".$row[3]."&nbsp;
&nbsp;</td><td class='css_col'>".$row[4]."</td><td
class='css_col'>".$row[5]."</td><td class='css_col'>".$row[6]."</td><td
class='css_col'>".$row[7]."</td><td class='css_col'>".$row[8]."</td><td
class='css_col'>".$row[9]."</td><td class='css_col'>".$row[10]."</td>";
echo "</tr>";
}
echo "</table></div>";
mysql_close();?>

ViewInbox.php
<?php
session_start();
$u=$_SESSION['user'];
if($_SESSION['user']=="admin")
45

{
$id=$_GET['id'];
mysql_connect("172.16.50.14","group12","3183") or die("cannot establish
connection");
mysql_select_db("group12") or die("cannot establish connection");
$z=mysql_query("select * from feedback where feedback_id='$id'")or
die(mysql_error());
if($row=mysql_fetch_row($z))
{
echo "<tr><td><b>Message</b></td><td>$row[4]<br>Name :$row[1]<br> Email
:$row[2]</td></tr>";
$email=$row[2];
$name=$row[1];
setCookie('email',$email);
setCookie('name',$name);
}
?>
</table><table>
<form action="Reply.php" method=post>
<tr><td>Reply</td><td><textarea name=reply rows="5"
cols="10"></textarea></td></tr>
<tr><td></td><td><input type=submit name=submit value=submit></td></tr>
</form></table></div></div></div></div>
<?php
46

}
else
{
header('Location:inbox.php');
}
mysql_close();?>
Inbox.php
<table border="6" cellpadding="4" cellspacing="10">
<tr><th>Name</th><th>Email</th></th><th>View</th></tr>
<?php
session_start();
$u=$_SESSION['user'];
if($_SESSION['user']=="admin")
{
mysql_connect("172.16.50.14","group12","3183") or die("cannot establish
connection");
mysql_select_db("group12") or die("cannot establish connection");
$z=mysql_query("select * from feedback")or die(mysql_error());
while($row=mysql_fetch_row($z))
{
echo "<tr><td>$row[1]</td><td>$row[2]</td><td><a
href=\"Viewinbox.php?id=$row[0]\">View</a></td></tr>";
}
47

}
else
{
header('Location:login.html');
}
mysql_close();
?></table>
































48

CHAPTER 9



SCREEN SHORTS






Home
49


About us
50


Events
51


Venues
52



Contacts
53





54

New user registration




55

Login page

User home

56


Book Event Page1

Book Event Page2
57


Book Event Page3

Feedback
58


Admin Home

Admin/Manage/Events
59


Admin/Manage/Users

Admin/Manage/Employees
60


Admin/Inbox


61

Admin/Reply


Forgot Password


62




CHAPTER 10


CONCLUSION





The project entitled Corporate Event Management System is a web
application which automates event planning and scheduling activity by serving as a
central place wherein users can look for various events and book events. Our project
deals with the corporate events like product launch, brand promotion, training/
workshops, conferences, exhibitions, seminars etc. It provides an effective means of
planning the entire course of event and scheduling the activities reduces monetary loss.
This application is mainly deigned to solve the difficulties of customers while booking
an event i.e. it helps to choose appropriate packages as per his requirement. It calculates
cost of an event before booking the event. So that customer can modify his
requirements based on it. The user need not worry about the venue, food or transport
facilities. All these are included in the project. Customer can pay amount through this
web application. It reminds the user about the payments and other details of the event
via mail or sms. The advantage of this application is that user need not contact the
agency directly.
At the agency it helps staff to efficiently schedule the events. The project can perform
job allocation automatically once the subtasks are identified. It calculates the total cost
of an event. It also prepares the monthly and annual reports about events.



63






REFERENCES



Microsoft .NET Framework 4.0 Windows based client development
by Mathew A Stoecker & Steve J Stein
http://en.wikibooks.org/wiki/jQuery/
http://en.wikibooks.org/wiki/.net_Programming/
A More Secure Steganography Method in Spatial Domain
by John Andreal & Stalin Feber

You might also like