CONTENTS

Title

Page No

Abstract…………………………………………………………………………………….iv List of Tables………………………………………………………………………………vi List of Figures……………………………………………………………………………..vii

Chapter I: Introduction 1.1. 1.2. Organization Profile……………………………………………………….......01 Problem Definition………………………………………………………….....02

Chapter II: System Analysis 2.2. Existing System Architecture…………………………………………………... 2.2. Proposed System Architecture…………………………………………………

Chapter III: Development Environment 3.1. Hardware Environment…………………………………………………………… 3.2. Software Environment…………………………………………………………… 3.2.1. Software Description………………………………………………………

Chapter IV: System Design

4.1. Data Model 4.1.1. Entity Relationship Diagram……………………………………. 4.1.2. Data Dictionary………………………………………………….

4.2. Process Model 4.2.1. Context Analysis Diagram………………………………………. 4.2.2. Data Flow Diagram………………………………………………

Chapter v: Software Development 5.1. Phases of Software Development………………………………………… 5.1.1. Phase I: Planning………………………………………………... 5.1.2. Phase II: Analysis………………………………………………. 5.1.3. Phase III: Design……………………………………………… 5.1.4. Phase IV: Development……………………………………… 5.2. Modular Description…………………………………………………..

Chapter VI: Testing 6.1. System Testing……………………………………………………………. 6.2. Software Testing Strategy………………………………………………… 6.2.1. Unit Testing…………………………………………………..

6.2.2. Integrating Testing……………………………………………..

Chapter VII: System Implementation 7.1. Introduction…………………………………………………………… 7.2. Implementation…………………………………………………………

v

Chapter VIII: Performance and Limitations 8.1. Merits of the system………………………………………………….. 8.2. Limitations of the system……………………………………………… 8.3. Future Enhancements……………………………………………………

Chapter IX: Appendices 9.1. Sample Screen……………………………………………………….. 9.2. User Manual……………………………………………………………

Chapter X: References…………………………

Data mining process discovers interesting information from the hidden data which can either be used for future prediction and/or intelligently summarizing the details of the data. The application results analysis such as Predicting Future Car market Demand such analysis help in providing car market with base for more accurate prediction of future market demand. financial. In this paper.ABSTRACT Data mining techniques provide people with new power to research and manipulate the existing large volume of data. There are many achievements of applying data mining techniques to various areas such as marketing. medical. a proposed data mining application in car manufacturing domain is explained and experimented. and car manufacturing. .

CHAPTER 1 INTRODUCTION .

the actual data mining process and postprocessing. INTRODUCTION Data mining application are characterized by the ability to deal with the explosion of business data and accelerated market changes. The challenge is met with the ability to identify patterns. and a subset of data is generated from the accumulated data. techniques. The difficulty of discovering and deploying new knowledge in the BI context is due to the lack of intelligent and complete data mining system. data mining has become a research area with increasing importance and it involved in determining useful patterns from collected data or determining a model that fits best on the collected data. During the pre-processing stage. Data mining techniques used in business-oriented applications are known as Business Intelligence (BI). The last stage is postprocessing in which the discovered knowledge is evaluated and interpreted. BI is a general term to mean all processes.1. rules. and the kinds of techniques to be utilized. A data mining task includes pre-processing. A data mining technique or a combination of techniques appropriate for the type of knowledge to be discovered is applied to the derived data set. the data mining problem and all sources of data are identified. Different classification schemes can be used to categorize data mining methods and systems based on the kinds of databases to be studied. and relationships from volumes of information which is too large to be processed by human analysis alone. trends. . the kinds of knowledge to be discovered. To ensure quality the data set is processed to remove noise. The measure of any business intelligence solution is its ability to derive knowledge from data. these characteristics help providing powerful tools for decision makers. and tools that gather and analyze data for the purpose of supporting enterprise users to make better decisions. such tools can be used by business users (not only statisticians) for analyzing huge amount of data for patterns and trends. Consequently. handle missing information and transformed it to an appropriate format.

the car comes without several features that were standard but consumers now must pay for as options. Now. the Honda Fit BEV ($36. While the Chevrolet Volt will sell for $1. In order to analyze the impacts of these and other key issues facing the EV industry. The number of battery electric and plug-in hybrid vehicles sold and the variety of options for consumers will rapidly expand. Pike Research does not expect this trend to stop in 2012.000 (before federal incentives).000).995) all north of $30. and the Ford Focus EV ($39. the production and sales of the cars needs to catch up. consumers hoping for an affordable EV ride have been left wanting.In 2012. EnerDel. Pike Research has prepared a white paper that makes 10 predictions about the continuing evolution of the market in 2012 and beyond. Johnson Controls. . and China in EV batteries. LG Chem. Manufacturers of lithium ion batteries in the United States spent 2011 readying new and established factories for the expected surge in electric car and plug-in hybrid sales. Here are three of those predictions: Battery production will get ahead of vehicle production.625). plug-in electric vehicles will take major strides toward becoming a mature if small component of the overall vehicle fleet. Korea. With the 2012 Toyota Prius PHEV ($32. EV prices will continue to disappoint many consumers. and Dow Kokam) have their facilities fully online and ready to produce. Unfortunately. The fruits of the multi-billion dollar investments in recent years in lithium ion battery manufacturing facilities will provide abundance in capacity that could outpace demand.750. Most of the award recipients (including Saft. the optimal price for a plug-in electric vehicle to engage consumers is $23. The 2009 American Recovery and Reinvestment Act provided funding for scaling up production so that the United States can compete with Japan.000 less. Many potential EV buyers were disappointed that Nissan raised the price of the LEAF for 2012. but any oversupply will not impact vehicle pricing. According to data from Pike Research’s annual Electric Vehicle Consumer Survey.

EVs will begin to function as home appliances. In many households, the EV will be the device that consumes the most energy and power. In 2012, manufacturers of the vehicles—as well as charging equipment—will introduce technology that will enable EVs to interact with other home appliances. Automakers want EVs to be good “citizens” in balancing their energy requirement with the rest of the building, which requires establishing communications with smart meters, home energy management devices, and other types of appliances. For example, an EV could coordinate with the clothes dryer or pool pump to make sure that the power consumption doesn’t surpass a certain threshold. Other long term applications could include downloading music or movies to the vehicle. The first vehicles demonstrating this capability will likely be out in 2012, with commercialization soon to follow.

1.1 COMPANY PROFILE

1.2 SCOPE OF THE PROJECT
The aim of this paper is to provide a proposed data mining solution that can be used for automotive market, as well as many other areas. This solution can provide inventory managers with important analysis such as launch analysis and slow turning analysis. The use and benefits of these two analyses will be identified, and explained. A dcx1 case study will be presented in detail in order to demonstrate the capability of data mining techniques in the field of car manufacturing.

1.3 NEED OF THE PROJECT
Using historical data, car maker is collaborating to develop software that will help its cars predict the best route that drivers can take to save energy and time if car maker experiment in making self learning cars takes off, your car will never be the same again. Using the power of the cloud to analyze historical data of routes, traffic and driver usage, to create software that will give its cars the capability to predict the destination and the most energy-efficient route. The new prediction api, a cloud-based analytics service that contains a suite of algorithms with the ability of analyzing historical business data and the capability to predict future trends or outcome. Here’s how this system would work. After a vehicle owner opts in to use the service, an encrypted driver data usage profile is built based on routes and time of travel. In essence, the system learns key information about how the driver is using the vehicle and where he wants to go. The system analyzes driving habits, knowledge of routes and combines it with real-time traffic information to suggest the best possible energy-efficient route.

1.4 OBJECTIVE OF THE PROJECT
In this project, a proposed data mining application in car manufacturing domain is explained and experimented. The application results analysis such as predicting future car market demand such analysis help in providing car market with base for more accurate prediction of future market demand.

CHAPTER 2 SYSTEM ANALYSIS

1 EXISTING SYSTEM 2.2 PROPOSED SYSTEM .2.

2006. Our system is . Kerdpraso. 2005. 19.4. a proposed data mining application in software engineering domain is explained and experimented. and financial. vol. Enformatika. Each algorithm may produce a mining result completely different from the others. In this paper.. N. balance sheets. pp. Some algorithms may find millions of patterns. or predict unknown or future values. It is thus the difficult job for data analysts to select appropriate models and interpret the discovered knowledge. S.2. 647-663. Anomalies in the discovery process merit further investigation of the application of genetic programming to the dataset for the problem domain. Qiu. A data mining process discovers interesting information from the hidden data that can either be used for future prediction and/or intelligently summarizing the details of the data. pp. 2007. vol. Potentially interesting classification rules are discovered. Enformatika. International Journal Of Software Engineering & Knowledge Engineering. pp. we describe a framework of an intelligent and complete data mining system called SUT-Miner. In this paper. These goals are achieved by using various learning algorithms.3 LITERATURE REVIEW R. Data mining techniques provide people with new power to research and manipulate the existing large volume of data. “Moving data mining tools toward a business intelligence system”. There are many achievements of applying data mining techniques in various areas such as marketing. and K. medical. vol. 117-122.15. Kerdprasop. no. “A data mining application: analysis of problems occurring during a software project development process”. “Applications of genetic programming in data mining”. Elkaffas and A. 1-5. although few of them can be currently seen in software engineering domain. Toony. Nayak and T. The empirical results demonstrate the capability of data mining techniques in software engineering domain and the potential benefits in applying data mining in this area. and cash flow statements for North American public companies. 17. Data mining (DM) is the process of finding and extracting frequent patterns that can describe the data. This paper details the application of a genetic programming framework for induction of useful classification rules from a database of income statements.

inductive methods are indeed applicable. It is the post-DM packages that ease the DM deployment for business intelligence applications. 463-474. These measures are intended for selecting and ranking patterns according to their potential interest to the user. G. 2006. and collecting a large amount of multi-criteria data at least six to eight months in advance of a semester. 38. “Applying data mining to scheduling courses at a university“. regardless of the kind of patterns being mined. vol. no. 1-32. 3. Interestingness measures play an important role in data mining. vol. scheduling exclusionary effects that may impact course availability and diversity negatively. 2). 16. identifies their roles in the data mining process. 2005. Good measures also allow the time and space costs of the mining process to be reduced. such as goal programming. . both summary and detailed results can be understood by key decision-makers. this study was one of the first empirical studies to provide an accurate measure of the discernable. “Interestingness measures for data mining: a survey”. Howard. It demonstrates the feasibility of applying the principles of data mining. pre-DM and post-DM functionalities. Smith. 2005. ACM Computing Surveys. Scheduling courses (“timetabling”) at a University is a persistent challenge. pp. repeatable SQL queries can be used as the chief analytical technique on a recurring basis. Allocating course sections to prescribed “time slots” for courses requires advanced quantitative techniques. gives strategies for selecting appropriate measures for applications. W. but negligible. pp. compares their properties. Communications Of AIs. This study takes an alternate approach. classifies them from several perspectives. straightforward. In addition. The results indicate that 1). Specifically it uses association rules to evaluate a nonstandard (“aberrant”) timetabling pilot study undertaken in one College at a University. Liqiang and J. This survey reviews the interestingness measures for rules and summaries.comprised of a full complement of major DM algorithms. no. and identifies opportunities for future research in this area. and 3).

CHAPTER 3 SYSTEM SPECIFICATION .

1 .2 Software configuration  Operating system  Front End  Programming Language  Back End : : : : Windows2000/XP Professional JSP/ SERVLETS J2EE MYSQL 5.1 Hardware Requirements  Processor/system  Main memory  Cache memory  Processor speed  Hard disk drive : : : : : Pentium IV 1 GB RAM 512 KB 600 MHz 40 GB 3.3.

each Java byte code instruction is parsed and run on the computer. With a compiler.3. Solaris. The Java VM can also be implemented in hardware. The Java platform differs from most other platforms in that it's a software-only platform that runs on top of other. Java byte codes help make "write once. Java is also unusual in that each Java program is both compiled and interpreted.3 SOFTWARE DESCRIPTION The software used for the development of the project is: 3.3. is an implementation of the Java VM. you translate a Java program into an intermediate language called Java byte codes--the platform-independent codes interpreted by the Java interpreter. With an interpreter. For example. whether it's a Java development tool or a Web browser that can run Java applets. 3.3. interpretation occurs each time the program is executed. run anywhere" possible.1 ABOUT JAVA Java is an object oriented programming language developed by Sun Microsystems. java was designed to be small. You can compile your Java program into byte codes on any platform that has a Java compiler. simple and portable across platforms. the same Java program can run on Windows NT.2 Java Platform A platform is the hardware or software environment in which a program runs. Every Java interpreter. and Macintosh. This figure illustrates how this works. . hardware-based platforms. Most other platforms are described as a combination of hardware and operating system. Compilation happens just once. The byte codes can then be run on any implementation of the Java VM. Modeled on C++.

configuring the server. Due the potential security feasibilitys associated with running applets from external and potentially malicious sources. Instead of working in browsers. 3. by opening a new window or dialog box. or they can have a graphical userinterface. Applets run in their own frame.1. and a full range of functionality is provided for in the way of pre-written Java classes. Applets are commonly used to enhance the interactivity of a web page. mail servers. Another specialized program is a servlet.2. and impose additional restrictions on applets. It requires a java enabled browser which requires an interpreter. most web browsers limit file access. and even open network connections. and deliver client-side content. Application It is a program that we can execute from any operating system prompt. such as graphical user interface (GUI) widgets.2 Applet It is a java program that executes inside a web page. servlets run within Java servers.3. and can display graphics. accept input from GUI components.2.The Java platform has two components:   The Java Virtual Machine (JVM) The Java Application Programming Interface (Java API) The Java API is a large collection of ready-made software components that provide many useful capabilities. Stand-alone applications have no such restrictions.3. . A special kind of application known as a server serves and supports clients on a network. Stand-alone applications can run as a console application (writing text to the screen or terminal window). and boot servers. Servlets are similar to applets in that they are runtime extensions of applications. Examples of servers include Web servers. 3. The Java API is grouped into libraries (packages) of related components. proxy servers. print servers.

data structures. robust and secure. a freely available SDK is available from Sun.  It is simple. The core API gives you the following features:  The Essentials: Objects.The important thing required for writing stand-alone Java applications is a java compiler/interpreter. strings.  It is a well-structured. such as Visual J++ and Borland JBuilder. numbers.  Security: Both low-level and high-level.  Networking: URLs.2. high performance and platform-independent  It is a distributed and interpreted language. and just-in-time byte code compilers can bring Java's performance close to that of native code without threatening portability. Public/private key management. and certificates. 3. As a platform-independent environment.  Java Database Connectivity (JDBC): Provides uniform access to a wide range of relational databases. including electronic signatures. input and output. system properties. It contains a compiler. and IP addresses. well-tuned interpreters.  Object serialization: Allows lightweight persistence and communication via Remote Method Invocation (RMI). While there are commercial offerings available.3. date and time. smart compilers. However. . TCP and UDP sockets.3 Features  It is an object-oriented internet programming language. The core API is the API included in every full implementation of the Java platform. interpreter. Java can be a bit slower than native code. Your browser may not support display of this image. access control. debugger. threads. and so on.

A software object maintains its state in variables and implements its behavior with methods.7 Benefits  Modularity-The source code for an object can be written and maintained independently of the source code for other objects. Typically.2.3.object can maintain private information and methods that can be changed at any time without affecting the other objects that depend on it.5 Object An object is a software bundle of variables and related methods.2. too. .2.4 Advantages  Get started quickly  Write less code  Write better code  Develop programs faster  Avoid platform dependencies with 100% Pure Java:  Write once.3. dynamic and portable.  Information hiding.3. 3. It is multi-threaded. have state and behavior.3. Software objects are modeled after real-world objects in that they. encapsulation is used to hide unimportant implementation details from other objects 3. an object can be easily passed around the system. run anywhere  Distribute software more easily 3.2. 3.6 Encapsulation Packaging an object's variables within the protective custody of its methods is called encapsulation. Also.

. and an interface may extend any number of interfaces. in which case. and may only contain method signatures and constant declarations (variable declarations that are declared to be both static and final). Object references in Java may be specified to be of an interface type. or be bound to an object that implements the interface.2.Object. is a language feature that allows a subclass to provide a specific implementation of a method that is already provided by one of its super classes. however an interface may not implement an interface. The class must implement all of the methods described in the interface. 3. 3. An interface may never contain method definitions. the root class of the Java type system) must have exactly one base class. you create an object of that type and the system allocates memory for the instance variables declared by the class. multiple inheritance of classes is not allowed.2. a Java class may implement. The implementation in the subclass overrides (replaces) the implementation in the super class. All classes in Java (other than java. As interfaces are implicitly abstract.8 Class A class is a prototype that defines the variables and methods common to all objects of a certain kind.3.3.10 Method overriding Method Overriding.3. they must either be null. One benefit of using interfaces is that they simulate multiple inheritance.lang. they cannot be directly instantiated except when instantiated by a class that implements the said interface.3.2. When you create an instance of a class. Interfaces are declared using the interface keyword.9 Interface An interface in the Java programming language is an abstract type that is used to specify an interface (in the generic sense of the term) that classes must implement. or be an abstract class. Furthermore. in object oriented programming.

whereas the former does not require a parameter. or disallow method overriding in certain core classes. A common error would be to assign a default value to the object in the second method. Thus. For example. Method overriding is an important feature that facilitates polymorphism in the design of object-oriented programs. To call the latter. Constraints on the similarity of return type vary from language to language. classes that exist only in order to have specialized subclasses derived from them. The two different methods may be overloaded as Print(text object T). and is called with an empty parameter field. Another example would be a Print (object O) method.11 Method overloading It is a feature found in various programming languages such as Ada. as some languages support covariance on return types. Such abstract classes have methods that do not perform any useful operations and are meant to be overridden by specific implementations in the subclasses. an object must be passed as a parameter.3.e. as the compiler wouldn't know which of the two methods to use. D and Java that allows the creation of several methods with the same name which differ from each other in terms of the type of the input and the type of the output of the function. doTask () and doTask (object O) are overloaded methods. abstract classes are designed — i. which would result in an ambiguous call error. Print(image_object P). the abstract super class defines a common interface which all the subclasses inherit. This may or may not involve an inability to subclass from a given class.2. and the correct function call again. we never have to worry about the type of the object. 3. the call is always: Print(something). In many cases. . C++. In this case one might like the method to be different when printing.A subclass can give its own definition of methods which also happen to have the same signature as the method in its super class. Some languages allow the programmer to prevent a method from being overridden. text or pictures. This means that the subclass's method has the same name and parameter list as the super class’s overridden method. If we write the overloaded print methods for all objects our program will "print". C#. for example.

3. including servlets. make you generate the entire page via your program. Many Web pages that are built by CGI programs are mostly static. Here's an example: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4. It aims to provide a Java API based on the Open JDK to ease AWT implementation on new systems. JSP lets you create the two parts separately. It is resolved at compile time which of these methods are used 3. and user-interface widget toolkit. The project has successfully experimented the implementation of AWT widgets using Java2D Java Server Page: Java Server Pages (JSP) is a technology that lets you mix regular. a project called Caciocavallo has been created. As AWT is a bridge to the underlying native user interface.AWT is also the GUI toolkit for a number of Java ME profiles.0 Transitional//EN"> <HTML> <HEAD><TITLE>Welcome to Our Store</TITLE></HEAD> <BODY> <H1>Welcome to Our Store</H1> . with the dynamic part limited to a few small locations.12 AWT The Abstract Window Toolkit (AWT) is Java's original platform-independent windowing.Method overloading is usually associated with statically-typed programming languages which enforce type checking in function calls. static HTML with dynamically-generated HTML. Since the opening of Java. But most CGI variations. its implementation on a new operating system may involve a lot of work. even though most of it is always the same. especially for the set of AWT GUI widgets.2. When overloading a method. The AWT is now part of the Java Foundation Classes (JFC) — the standard API for providing a graphical user interface (GUI) for a Java program. which require the development from scratch of native peers for each of the AWT widgets. you are really just making a number of different methods that happen to have the same name. graphics.

SSI is really only intended for simple inclusions. </BODY></HTML> Advantages of JSP: Active Server Pages (ASP) is a similar technology from Microsoft. not for "real" programs that use form data. not Visual Basic or other MS-specific language. the dynamic part is written in Java. and the like. SSI is a widely-supported technology for including externally-defined pieces into a static Web page. leaving places for your servlet programmers to insert the dynamic content.User name is "New User" for first-time visitors --> <% out. HTTP and form submission data is not available to JavaScript. click <A HREF="Account-Settings.</A></SMALL> <P> Regular HTML for all the rest of the on-line store's Web page. it is portable to other operating systems and non-Microsoft Web servers. %> To access your account settings. But it is more convenient to write (and to modify!) regular HTML than to have a zillion println statements that generate the HTML. With the exception of cookies.JSP doesn't give you anything that you couldn't in principle do with a servlet. make database connections. <!-. JSP is better because it lets you use servlets instead of a separate program to generate that dynamic part. by separating the look from the content you can put different people on different tasks: your Web page design experts can build the HTML. This is a useful capability. .<SMALL>Welcome. The advantages of JSP are twofold.getUserNameFromCookie(request)). JavaScript can generate HTML dynamically on the client. Second. Besides.println(Utils.html">here. First. Pure Servlets . so it is more powerful and easier to use. but only handles situations where the dynamic information is based on the client's environment. Plus.

They are programs that run on a Web server and build Web pages. Java Servlets: Servlets are Java technology's answer to CGI programming. more powerful. . perhaps returning a previously built page if it is still up to date.And. and cheaper than traditional CGI and than many alternative CGI-like technologies. pricing information. Previously. Regular HTML. and the like. a weather-report or news headlines page might build the page dynamically. catalogs. the cost of using dynamic data would preclude its use in all but the most valuable instances. For example. For example. Advantage of Servlets Over "Traditional" CGI? Java servlets are more efficient. more portable. (More importantly. you would use this for making a Web page at an on-line store that lists current prices and number of items in stock. JavaScript can't access server-side resources like databases. and programs that process orders for e-commerce sites do this as well. easier to use. servlet developers get paid more than Perl programmers :-). Building Web pages on the fly is useful (and commonly done) for a number of reasons: The Web page is based on data submitted by the user. since it runs on the client. cannot contain dynamic information. For example the results pages from search engines are generated this way. The Web page uses information from corporate databases or other such sources. of course. The data changes frequently. JSP is so easy and convenient that it is quite feasible to augment HTML pages that only benefit marginally by the insertion of small amounts of dynamic data.

keeping database connections open. there are N threads but only a single copy of the servlet class. the Java Virtual Machine stays up. Similarly. adding servlet support to it (if it doesn't come preconfigured to support servlets) is generally free or cheap. . For one thing. if there are N simultaneous request to the same CGI program. and each request is handled by a lightweight Java thread. They can also maintain information from request to request. However. Nevertheless. most commercial-quality Web servers are relatively expensive. say I-Planet Enterprise Server can run virtually unchanged on Apache. Consequently. with the major exception of Apache. Hey. tracking sessions. This simplifies operations that need to look up images and other data stored in standard places. and many other such utilities. servlets have an extensive infrastructure for automatically parsing and decoding HTML form data. Convenient. then the code for the CGI program is loaded into memory N times. If the CGI program does a relatively fast operation. no matter the cost of that server. you already know Java. making useful things like database connection pools easy to implement. however. or WebStar. which is free. Java servlets let you easily do several things that are difficult or impossible with regular CGI. servlets written for. not a heavyweight operating system process. Portable. With servlets. handling cookies.Efficient. servlets can talk directly to the Web server (regular CGI programs can't). a new process is started for each HTTP request. Servlets also have more alternatives than do regular CGI programs for optimizations such as caching previous computations. once you have a Web server. There are a number of free or very inexpensive Web servers available that are good for "personal" use or low-volume Web sites. With servlets. simplifying things like session tracking and caching of previous computations. and the like. Servlets are supported directly or via a plugin on almost every major Web server. reading and setting HTTP headers. Powerful. Servlets can also share data among each other. Why learn Perl too? Besides the convenience of being able to use a familiar language. Microsoft IIS. Inexpensive. Servlets are written in Java and follow a well-standardized API. in traditional CGI. the overhead of starting the process can dominate the execution time. With traditional CGI.

The generated content is commonly HTML. including session management objects that track multiple requests and responses between the Web server and a client. .[2] A Servlet is an object that receives a request and generates a response based on that request. To deploy and run a Servlet. Thus. The servlet API. mapping a URL to a particular servlet and ensuring that the URL requester has the correct access rights. they are commonly used to extend the applications hosted by Web servers.http defines HTTP-specific subclasses of the generic servlet elements. They are not tied to a specific client-server protocol. defines the expected interactions of the Web container and a servlet. it can be thought of as a Java Applet that runs on a server instead of abrowser.servlet. Servlets are the Java counterpart to non-Java dynamic Web content technologies such as CGI and ASP. a protocol by which a Java class may respond to requests.Servlet: A servlet is a Java programming language class used to extend the capabilities of servers that host applications access via a response programming.[1] A Servlet is a Java class in Java EE that conforms to the Java Servlet API. The package javax. Servlets can maintain state in session variables across many server transactions by using HTTP cookies. or URL rewriting.servlet. a Web container must be used. Servlets may be packaged in aWAR file as a Web application. but may be other data such as XML. Thus. a software developer may use a servlet to adddynamic content to a Web server using the Java platform. contained in the Java package hierarchy javax. the word "Servlet" is often used in the meaning of "HTTP Servlet". but are most often used with the HTTP protocol. The Web container is responsible for managing the lifecycle of servlets. The basic servlet package defines Java objects to represent servlet requests and responses. Although servlets can respond to any type of request. Therefore. as well as objects to reflect the servlet's configuration parameters and execution environment.NET. A Web container (also known as a Servlet container) is essentially the component of a Web server that interacts with the servlets.

A servlet is a Java component that can be plugged into a Java-enabled web server to provide custom services. A somewhat older usage is to use servlets in conjunction with JSPs in a pattern called "Model 2". These services can include:      New features Runtime changes to content Runtime changes to presentation New standard protocols (such as FTP) New custom protocols . while JSPs embed Java code in HTML.Servlets can be generated automatically from JavaServer Pages (JSP) by the JavaServer Pages compiler. the higher level MVC web framework in Java EE (JSF) still explicitly uses the Servlet technology for the low level request/response handling via the FacesServlet. which is a flavor of the model-viewcontroller pattern. The difference between Servlets and JSP is that Servlets typically embed HTML inside Java code. While the direct usage of Servlets to generate HTML (as shown in the example below) has become rare.

The Web container calls the service () method of the servlet for every request. The browser then generates an HTTP request for this URL. This configuration object allows the servlet to access name-value initialization parameters from the web application. 1. The container passes an object implementing theServletConfig interface via the init() method.   2. Three methods are central to the life cycle of a servlet. the web container initializes the servlet instance by calling the init() method.   Assume that a user enters a Uniform Resource Locator (URL) to a web browser.  Finally.  After initialization. The destroy () method. the Web container calls the destroy () method that takes the servlet out of service. The servlet is dynamically retrieved and loaded into the address space of the server. . They are implemented by every servlet and are invoked at specific times by the server. These are init(). is called only once in the lifecycle of a servlet.Life cycle of a servlet  During initialization stage of the Servlet life cycle. The service () method determines the kind of request being made and dispatches it to an appropriate method to handle the request. The developer of the servlet must provide an implementation for these methods. typically resulting in an error being returned to the requester. service(). The HTTP request is received by the web server. like init (). If a request for a method that is not implemented by the servlet is made. the servlet can service client requests. and destroy(). Let us consider a typical user scenario to understand when these methods are called. Each request is serviced in its own separate thread. the method of the parent class is called. This request is then sent to the appropriate server. The server maps this request to a particular servlet.

.  The algorithms by which this determination is made are specific to each server.3. You will see that it is possible for the servlet to read data that has been provided in the HTTP request. This method is invoked only when the servlet is first loaded into memory. The server calls the destroy () method to relinquish any resources such as file 7. other HTTP requests received from clients.  It may also formulate an HTTP response for the client.   The server invokes the service () method of the servlet. It is possible to pass initialization parameters to the servlet so it may configure itself. important data may be saved to a persistent store. The memory allocated for the servlet and its objects can then be garbage collected. The server may. 8.   The server invokes the init () method of the servlet. This method is called to process the HTTP request. 4. at some point. decide to unload the servlet from its memory.  The service () method is called for each HTTP request. handles that are allocated for the servlet. 6. The servlet remains in the server’s address space and is available to process any 5.

and offer additional functionality. large-scale World Wide Web products. BSDi. Apache. several paid editions are available. Applications which use MySQL databases include: TYPO3. Uses MySQL is a popular choice of database for use in web applications. including Wikipedia. SCO UnixWare. i5/OS. Joomla. Novell NetWare. Drupal and other software built on the LAMP software stack.3. as well as under a variety of proprietary agreements. Perl/PHP/Python". Solaris. including AIX. The SQL phrase stands for Structured Query Language.4 MYSQL 5. SCO OpenServer. The MySQL development project has made its source code available under the terms of the GNU General Public License.1 MySQL is the world's most used relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. Mac OS X. MySQL. SunOS. the Swedish company MySQL AB.3. MySQL was owned and sponsored by a single for-profit firm. MySQL is also used in many high-profile. OpenBSD. IRIX. A port of MySQL to OpenVMS also exists. WordPress. MySQL is an open source database management system and is used in some of the most frequently visited websites on the Internet. Platforms And Interfaces MySQL works on many different system platforms. OS/2 Warp. eComStation. NetBSD. HPUX. QNX. and is a central component of the widely used LAMP open source web application software stack—LAMP is an acronym for "Linux. OpenSolaris. Microsoft Windows. now owned by Oracle Corporation. FreeBSD. These include MySQL Connector/Net for integration with . Sanos and Tru64. Symbian. Free-software-open source projects that require a full-featured database management system often use MySQL. Many programming languages with language-specific APIs include libraries for accessing MySQL databases. phpBB. For commercial use. Linux.

The HTSQL . an ODBC interface called MyODBC allows additional programming languages that support the ODBC interface to communicate with a MySQL database. which is enabled by an ecosystem of open source tools such as phpMyAdmin. or breaking down a database into smaller chunks called shards which can be spread across a number of distributed server clusters. Deployment MySQL can be built and installed manually from source code. allowing direct interaction between a MySQL database and any web client via structured URLs.Microsoft's Visual Studio (languages such as C# and VB are most commonly used) and the JDBC driver for Java. either as a component in a LAMP-based web application or as a standalone database server. A typical high-end configuration can include a powerful master database which handles data write operations and is replicated to multiple slaves that handle all read operations. It is still most commonly used in small to medium scale single-server deployments. Further improvements in performance can be achieved by caching the results from database queries in memory using memcached. such as a multi-processor server with gigabytes of memory. it has gradually evolved to support higher-scale needs as well. though further configuration is often required to adjust security and optimization settings. In the medium range. MySQL can be scaled by deploying it on more powerful hardware. On most Linux distributions the package management system can download and install MySQL with minimal effort. There are however limits to how far performance can scale on a single server. so on larger scales. Much of MySQL's appeal originates in its relative simplicity and ease of use. The master server synchronizes continually with its slaves so in the event of failure a slave can be promoted to become the new master. multi-server MySQL deployments are required to provide improved performance and reliability. . In addition. minimizing downtime. Though MySQL began as a low-end alternative to more powerful proprietary databases. but this can be tedious so it is more commonly installed from a binary package unless special customizations are required. such as ASP or ColdFusion.URL-based query method also ships with a MySQL adapter.

[26] Two notable cloud-based MySQL services are the Amazon Relational Database Service. There are two common deployment models for MySQL on the cloud: Virtual Machine Image . of the major cloud providers. A third option is managed MySQL hosting on the cloud. As of 2011. MySQL as a Service . or use a ready-made machine image with an optimized installation of MySQL on it. Instead. and application owners pay according to their usage. application owners do not have to install and maintain the MySQL database on their own. which runs on EC2. In this configuration.some cloud platforms offer MySQL "as a service". only Rackspace offers managed hosting for MySQL databases. Features  A broad subset of ANSI SQL 99. and the Xeround Cloud Database.Cloud-Based deployment Main article: Cloud database Another deployment option is running MySQL on cloud computing platforms such as Amazon EC2. where the database is not offered as a service. Rackspace and Heroku. the database service provider takes responsibility for installing and maintaining the database.cloud users can upload a machine image of their own with MySQL installed. as well as extensions  Cross-platform support  Stored procedures  Triggers  Cursors . such as the one provided by Amazon EC2. but the cloud provider hosts the database and manages it on the application owner's behalf.

InnoDB for transactions and referential integrity. two phase commit as part of this. using Oracle's InnoDB engine  Independent storage engines (MyISAM for read speed.e. savepoints with InnoDB  SSL support  Query caching  Sub-SELECTs (i. Master-Master Replication & Master-Slave Replication) with one master per slave. no automatic support for multiple masters per slave.e. many slaves per master.  Full-text indexing and searching using MyISAM engine  Embedded database library  Partial Unicode support (UTF-8 and UCS-2 encoded strings are limited to the BMP)  ACID compliance when using transaction capable storage engines (InnoDB and Cluster)  Partititoned tables with pruning of partitions in optimiser  Shared-nothing clustering through MySQL Cluster . MySQL Archive for storing historical data in little space)  Transactions with the InnoDB. and Cluster storage engines. Updatable Views  Information schema  Strict mode[further explanation needed]  X/Open XA distributed transaction processing (DTP) support. nested SELECTs)  Replication support (i.

CHAPTER 4 SYSTEM DESIGN . Hot backup (via mysqlhotcopy) under certain conditions .

1.1. they must enter the username and password for encountered the process of car marketing. 4. . The inventory data is a snapshot of the inventory stock on the cutoff date. Production Plan: “Production Plan” data source is a list of models quantities that are planned to be produced for a specific period. The order data is a snapshot of the dealer orders on the cutoff date. Inventory: Inventory stage generates the reporting inventory data mart.1 Authentication: Authentication module contains user name and password.1 Modules Design 4.4.2 Supply Chain Process Sales: Sale stage generates the reporting sale data mart that covers the studied period. If already login means. New user means create the new account for enter that process of car product. Orders: Order stage generates the reporting order data mart.

This dimension is used to map vehicles “Franchise/ Year/ Model/ Package/ Option” to their "Codes/Descriptions/Option Types/Default Options”.4.3 Manufacturing information It Contains car configurations/packages/options codes and description. adjust body model/trim level mix with inventory data. Having a data warehouse that combines online and offline behavioral data for decision-making purposes is a strategic tool which business users can leverage to improve sales demand forecasting. Dealer dimension id used to map DCX dealers. mapping it and finally aggregating it for the purpose of research and analysis. These analyzes are related because they all require gathering data.1.4 Customers’ trends information Websites: Managers are interested especially in integrated data spanning DCX’s relationship with its customers and prospects regardless of whether the systems are online or offline. DCX also wants to make early indication on which vehicle configurations are likely to sell well during new vehicles launching.1. improve model/trim level mix planning. 4. DCX wants to help the inventory managers to move vehicles faster. Geographic dimension is used to map “ZipCode” to “Zone/Business Center/ State”. and reduce days on lot. “CarConfig” is used to store “Build and Price” configurations made on DCX web-sites. TOPs dimension used to map all car configurations under production. storing it. scrubbing it. In order to do this it needs to identify which vehicles stay long in stock as well as which vehicles move faster. Web Activities: “Web Activity” data source is used to track all user web hits/requests on DCX websites .

2 Data Model 4.2.4.1 Entity relationship diagram: .

.

2 Data Dictionary: .2.4.

.

.

4.3.3 Process model: 4.1 Context Analysis Diagram: .

4.3.3 Architecture Diagram .

4.3 Data Flow Diagram Level 0: Level 1: Level 2: .3.

CHAPTER 5 SOFTWARE DEVELOPMENT .

These methodologies form the framework for planning and controlling the creation of software development process. or test results.1 PHASES OF SOFTWARE DEVELOPMENT The normal phases of a development project are planning.1.1. implementation.1. the SDLC concept underpins many kinds of software development methodologies. In DCOII system V-model software development life cycle is followed. 5. 5. analysis. Analyze project goals. In software engineering.2. PHASE I-PLANNING Planning is to generate a high-level view of the intended project and determine the goals of the project. coding starts at the bottom and validation phase starts right of the Vmodel. testing. is the process of creating or altering systems. which is diagrammatically represented as follows. and the models and methodologies that people use to develop these systems. break down functions that need to be created. 5. and attempt to engage users so that definite requirements can be defined. PHASE II-ANALYSIS The goal of systems analysis is to determine where the problem is in an attempt to fix the system. Different methodologies may call these phases by different names. and enhancement. which may be documents. code. This step involves breaking down the system in different pieces and drawing diagram to analyze the situation. but they are always present. DCOII project plan depends on the V shaped modeling of verification phase starts at left of V shape. development. Each phase has its own products. design. .SOFTWARE DEVELOPMENT Software Development Life Cycle in systems engineering and software engineering.

PHASE IV-DEVELOPMENT Modular and subsystem programming code will be accomplished during this stage. This document contains the general system organization.1. menu structures. . Unit testing and module testing are done in this stage by the CDOII develops. Development stage is inter mingled with the next in that individual modules will need testing before integration to the man project. PHASE III-DESIGN Systems design is the phase where system engineers analyze and understand the business of the proposed system by studying the user requirements document.4.3. Software specification document which serves as a blueprint for the development phase is generated.. They figure out possibilities and techniques by which the user requirements can be implemented.5.1. DCOII system design is developed by the webmaster based on the user requirements documents. some samples screens are created. data structures etc. Goals & targets. of DCOII system is achieved by establishing schedules during project development. 5.

CHAPTER 6 SYSTEM TESTING .

For this reason.  A successful test is one that uncovers an as yet undiscovered error. as well as errors that occur in later design and development stages. that performance requirements appear to have been met. a template for software testing – a set of steps into which places specific test case design techniques and testing methods-should be designed for the software engineering process. As a secondary benefit. Software Testing is a critical element of software quality assurance and represents the ultimate review of specification. Testing is a set of activities that can be planned in advance and conducted systematically. design and coding.6. If testing is conducted successfully. .1 SYSTEM TESTING The development of a software system involves a series of production activities where opportunities for injection of human fallibilities are enormous. it will uncover errors in the software.  A good test case is one that has a high probability of finding an as yet and discovered error. Errors may begin to occur at the very inception of the process where the objectives may be erroneously or imperfectly specified. The following are the testing objectives:  Testing is a process of executing a program with the intent of finding an error. testing demonstrates that software functions appear to be working according to specification.

Black Box Testing. the test is designed to uncover errors. Although. tests can be conducted that demonstrates each function fully operational.In addition.White Box Testing. Testing cannot show the absence of errors. Any engineered product can be tested in one of the two ways:  Knowing the specified function that a product has been designed to perform. that the internal operations of the product performs according to specifications and all internal components have been adequately exercised. that is. . A black box test examines some aspect of a system with little regard for the internal logical structure of the software. The test design for software and other engineered products can be as challenge as the initial design of the product itself. tests can be conducted to ensure that “all the gears mesh”.  Knowing the internal workings of a product. data collected as testing is conducted to provide a good indication of software reliability and some indication of software quality as a whole. black box tests are used to demonstrate the operational of the software functions means that the integrity maintained by the external information. The tests will be designed such that it should have the highest likelihood of finding the most errors with the minimum amount of the time and effort. it can only show the presence of the software defects.

A schedule for integration. Software testing is an element of a broader topic which is often referred to as verification and validation. The “status of the program” may be examined at various points to determine if the expected or asserted status corresponds to the actual status. Each of the phases and sub-phases delineates a broad functional category within the software and can generally be related to a specific domain of the program structure.) the start and end dates for each phase is established and availability of windows for unit-tested modules are defined. Testing is divided into phases and builds the address specific functional and characteristics of the software. Validation refers to a different set of activities that the software that has been built is traceable to member requirements. Verification.White box testing of the software is predicted on a close examination of the procedural detail. program builds are created to correspond to each phase. Therefore. The test plan describes the overall strategy for integration.“Are we building the product right?” Validation .e. (i.“Are we building the right product?” Verification refers to the set of activities that ensure that software correctly implements a specific function. .

2. all error-handling paths are tested.1 Unit Testing Unit testing focuses verification effort on the smallest unit of the software design module. Boundary conditions are tested to ensure that the operation of the modules established to limit or restrict processing at the boundaries. Because a module is not a stand-alone program. SOFTWARE TESTING STRATEGY 6. Stubs serve to replace modules interface. And finally. In most applications a driver is nothing more than a “main program” that accepts test case data to the module to be tested. The modules were tested for .6. The module interface is tested to ensure the information about the program under testing. In this project. All independent paths of the control structures have to be exercised to verify that all statements in a module have been executed at least once. Unit testing is a white-box testing and the steps can be conducted in multiple modules parallel. The relative complexity of the tests and the errors detected as a result is limited by the constrained scope. and prints the relevant results. a driver and/or stub software must be developed for each unit test. the unit testing is done step by step where each module has to be tested separately in order to get the desired output. The local data structure is examined to ensure the integrity of the data which is stored temporarily during the execution of the algorithm sequence. prints verification of entry and returns. which is established for unit testing. may do minimal data manipulation.2.

Integration testing for this project was carried out using the Bottom-up integration-testing model. one module can have an inadvertent. The image transferring from mobile the system is also tested. beginning with the main control module. Then the modules were integrated with the index page of the website to test if the session is being tracked with consistency and the process is tested to get the output without any errors. The atomic modules were first tested unit-wise for output. independent paths.2 Integration Testing A new event or modification in the software world might ask a seemingly legitimate question one all modules have been unit tested. 6. as its name itself implies. may not produce desired major functions. the testing is done for the retrieval and updating of needed files by specifying the filenames. Top-Down Integration is an incremental approach for the construction of program structure. Bottom-Up Integration testing. . processing required for modules subordinate to a give level is always available and the need for stubs is eliminated. error handling paths. begins construction and testing with the atomic modules.2. Data can be lost across the interface – putting modules together. Integration testing is a systematic technique test to uncover errors associated with interfacing. Modules subordinate to the main control module are incorporated into the structure in depth-first manner. adverse affect on another sub-function when combined.boundary conditions. Here. Modules are integrated by moving downward through the control hierarchy. Because modules are integrated from the bottom up.

Although each test has a different purpose. project it from improper penetration.  Recovery Testing is a system test that forces the software to fail in a variety of ways and verifies that recovery is properly performed.  Stress Testing is designed to confront programs with abnormal situation. in fact. .  Performance Testing is designed to test the run-time performance of the software within the context of integration. all work should verify that all system elements have been properly integration and perform allocated functions.  Security testing attempts to verify that protection mechanism built into a system will.3 System Testing System testing is actually a series of different tests whose primary purpose is to fully exercise the computer-based system.6.2.

Option screen displayed Success 2 Feeding wrong User Name and Password of the user to login When “Search File button” is clicked.4 Test cases in details SN O TEST CASE NAME Mandator y fields in “User name and Password ” Mandator y fields in “User name and Password ” “Search File Option” is Click for File search “Search File Option” Click for File search PROCEDUR E EXPECTED RESULT ACTUAL RESULT STATUS/ RESULT 1 Feeding User Name and Password of the user to login Loading and display next page. then type filename with extension When “Search File button” is clicked. then type wrong filename Invalid user name and password Invalid user name and password is displayed Failure 3 Search Results should be display.6. Search Results displayed Success 4 Empty Screen textbox Textbox is display as empty Failure .2.

File is update Text file updated Success 6 Click Upload image button Image is upload to PC Image uploaded. it lists the picture from the gallery.with extension 5 Edit display text Update Button is click When “Upload image Button” is clicked. Success CHAPTER 7 SYSTEM IMPLEMENTATION .

site preparation and file-sites. The implementation phase is less creative than system design. Implementation is one of the most important tasks in project. INTRODUCTION It is the process of bringing developed system into operational use. It is primarily concerned with user training.SYSTEM IMPLEMENTATION 7.1. in which one has to be cautions. if the implementation phase is not carefully planned and controlled. The initial parameters of the management information . it can be lead to many critical problems. Depending on the nature of the system extensive user training maybe required programming is itself a design works. Thus proper implementation is essential to provide a reliable system to meet managerial requirements. the test of the network along with the system are also included under implementation. Implementation is the phase. because all the efforts undertaken during the project will be fruitful only if the tool is properly implemented according to the plans made.

In such a case the user when reports the errors it is possible to correct those errors as that coding has been documents and it is possible to find out the location where the error is occurring and the reason for error can be analyzed and corrected. As the software is used new recommendations for new capabilities. Implementation is used here to mean the process of converting a new or revised system into an operation one. This is often called preventive maintenance. The third activity that may be applied to definition of maintenance occurs when software package is successful. The second activities that contribute to a definition of maintenance occurs because of the rapid change that encountered in every aspect of computing. But it is not possible to find all errors here. This developed system supports for corrective maintenance. Maintenance is far more than fixing mistakes.system should be modified as a result of programming efforts. The fourth maintenance activity occurs when software is changed to improve future maintainability or reliability. Programming provides a real test for the assumption made by the analyst. . It may be that even after through testing the user will find errors. to satisfy this request perceptive maintenance is used. 7. which is characterized by reverse engineering and re-engineering technique. or to provide a better basic for future enhancements. Here the new system is implemented to an operational use. IMPLEMENTATION The system has been tested in the location of the developer. The maintenance can be defined using four activities that are undertaken after a program is released for use. Adaptive maintenance – as activity that modifies software to properly interface with a changing environment – is both necessary and common place.2. modifications to existing function and general enhancements are received from the user.

CHAPTER 8 PERFORMANCE AND LIMITATIONS . which a team needs. If there is a need to include any new modules then it has been externally and then includes to it with the exits architecture. But up to now the system holds all the possible reports generation tools. Later on it correspondence with this limitation may upgrade the system.As this software can be run with the requirements given above and it does not involve any particular hardware as such and it can be run with the rapid development that is being encountered in the computer industry.

 Optimizing on-line interaction systems and tracking and understanding on-line consumer behavior to predict market trends off-line. or distributors. financing offers. and market share forecasting.1 MERITS OF THE SYSTEM 8. agents.  Market segmentation and precise targeting to the segment and the individual as appropriate. loyalty rates. and other incentives issues to dealers. down to “micro-market” segmentation and predicting of sales.  Incentive effectiveness analysis and tracking and scoring of special marketing investment such as rebates.2 FUTURE ENCHANCEMENTS Future work can be done using the same architecture includes:  Market demand forecasting.8. .

CHAPTER 9 APPENDICES .Sales prediction by individual item model tailored to each individual “micro-market” and accounting for general market trend information including a modeling of changing consumer trends.

and the kinds of techniques to be adopted. the kinds of knowledge to be discovered. This survey is organized according to one classification scheme: the kinds of knowledge to be mined. A classification of the available data mining techniques was also provided. .4 CONCLUSION We provided in this paper. A DCX case study was presented in order to demonstrate the capability of data mining techniques in providing important analysis such as launch analysis and slow turning analysis.9. based on the kinds of databases to be mined. a survey on the data mining techniques developed in car market area.

2001. Nardi. pp. 6. 10.  L. 39. 2003. pp. no. International Journal Of Cooperative Information Systems. “An architecture for data warehousing supporting data independence and interoperability: an architecture for data warehousing”.  N. 2007. Chan. vol. 10. . 141-168.  D. pp. Journal Of The Association For Information Systems. IIE Transactions. no. G. Bongsik. Rosati. International Journal Of Cooperative Information Systems. 2001. D. Calvanese. “Data integration in data warehousing”. 4. vol. 3. 3. Lenzerini. Cabibbo and R. no. 237. “An exploratory investigation of system success factors in data warehousing”.BIBILIOGRAPHY  S. “Data mining of resilience indicators”. and R. M. Giacomo. H. vol. 617-627. vol. Wong. Torlone. D.

Wimmer. AI Magazine. Ester.  U. USA. “Applications of genetic programming in data mining”. Piatetsky-Shapiro. 37-54. H. pp. 17. J. American Association For Artificial Intelligence. “From data mining to knowledge discovery in databases”. Fayyad. Sander. 1-5. P. vol. New York. and X. Xu. 1996. Kriegel. Smyth. M. Proceedings Of The 24th Vldb Conference. and P. S.  M. 1998. Elkaffas and A. Toony. G. . 2006. “Incremental clustering for mining in a data warehousing environment”. Enformatika. pp.

Sign up to vote on this title
UsefulNot useful