This action might not be possible to undo. Are you sure you want to continue?
Abstract…………………………………………………………………………………….iv List of Tables………………………………………………………………………………vi List of Figures……………………………………………………………………………..vii
Chapter I: Introduction 1.1. 1.2. Organization Profile……………………………………………………….......01 Problem Definition………………………………………………………….....02
Chapter II: System Analysis 2.2. Existing System Architecture…………………………………………………... 2.2. Proposed System Architecture…………………………………………………
Chapter III: Development Environment 3.1. Hardware Environment…………………………………………………………… 3.2. Software Environment…………………………………………………………… 3.2.1. Software Description………………………………………………………
Chapter IV: System Design
4.1. Data Model 4.1.1. Entity Relationship Diagram……………………………………. 4.1.2. Data Dictionary………………………………………………….
4.2. Process Model 4.2.1. Context Analysis Diagram………………………………………. 4.2.2. Data Flow Diagram………………………………………………
Chapter v: Software Development 5.1. Phases of Software Development………………………………………… 5.1.1. Phase I: Planning………………………………………………... 5.1.2. Phase II: Analysis………………………………………………. 5.1.3. Phase III: Design……………………………………………… 5.1.4. Phase IV: Development……………………………………… 5.2. Modular Description…………………………………………………..
Chapter VI: Testing 6.1. System Testing……………………………………………………………. 6.2. Software Testing Strategy………………………………………………… 6.2.1. Unit Testing…………………………………………………..
6.2.2. Integrating Testing……………………………………………..
Chapter VII: System Implementation 7.1. Introduction…………………………………………………………… 7.2. Implementation…………………………………………………………
Chapter VIII: Performance and Limitations 8.1. Merits of the system………………………………………………….. 8.2. Limitations of the system……………………………………………… 8.3. Future Enhancements……………………………………………………
Chapter IX: Appendices 9.1. Sample Screen……………………………………………………….. 9.2. User Manual……………………………………………………………
Chapter X: References…………………………
Data mining techniques provide people with new power to research and manipulate the existing large volume of data. Data mining process discovers interesting information from the hidden data which can either be used for future prediction and/or intelligently summarizing the details of the data. There are many achievements of applying data mining techniques to various areas such as marketing, medical, financial, and car manufacturing. In this paper, a proposed data mining application in car manufacturing domain is explained and experimented. The application results analysis such as Predicting Future Car market Demand such analysis help in providing car market with base for more accurate prediction of future market demand.
CHAPTER 1 INTRODUCTION
1. such tools can be used by business users (not only statisticians) for analyzing huge amount of data for patterns and trends. During the pre-processing stage. The challenge is met with the ability to identify patterns. and the kinds of techniques to be utilized. rules. trends. and a subset of data is generated from the accumulated data. Consequently. handle missing information and transformed it to an appropriate format. the kinds of knowledge to be discovered. Data mining techniques used in business-oriented applications are known as Business Intelligence (BI). The difficulty of discovering and deploying new knowledge in the BI context is due to the lack of intelligent and complete data mining system. and relationships from volumes of information which is too large to be processed by human analysis alone. . The measure of any business intelligence solution is its ability to derive knowledge from data. BI is a general term to mean all processes. the data mining problem and all sources of data are identified. Different classification schemes can be used to categorize data mining methods and systems based on the kinds of databases to be studied. these characteristics help providing powerful tools for decision makers. INTRODUCTION Data mining application are characterized by the ability to deal with the explosion of business data and accelerated market changes. and tools that gather and analyze data for the purpose of supporting enterprise users to make better decisions. A data mining technique or a combination of techniques appropriate for the type of knowledge to be discovered is applied to the derived data set. To ensure quality the data set is processed to remove noise. The last stage is postprocessing in which the discovered knowledge is evaluated and interpreted. data mining has become a research area with increasing importance and it involved in determining useful patterns from collected data or determining a model that fits best on the collected data. techniques. A data mining task includes pre-processing. the actual data mining process and postprocessing.
and Dow Kokam) have their facilities fully online and ready to produce.000 less. and the Ford Focus EV ($39. LG Chem. the optimal price for a plug-in electric vehicle to engage consumers is $23. Many potential EV buyers were disappointed that Nissan raised the price of the LEAF for 2012.625). Most of the award recipients (including Saft. Manufacturers of lithium ion batteries in the United States spent 2011 readying new and established factories for the expected surge in electric car and plug-in hybrid sales. The 2009 American Recovery and Reinvestment Act provided funding for scaling up production so that the United States can compete with Japan. In order to analyze the impacts of these and other key issues facing the EV industry. While the Chevrolet Volt will sell for $1. and China in EV batteries. Pike Research does not expect this trend to stop in 2012. EnerDel.000). Unfortunately. the Honda Fit BEV ($36. the production and sales of the cars needs to catch up. The fruits of the multi-billion dollar investments in recent years in lithium ion battery manufacturing facilities will provide abundance in capacity that could outpace demand. plug-in electric vehicles will take major strides toward becoming a mature if small component of the overall vehicle fleet. consumers hoping for an affordable EV ride have been left wanting. but any oversupply will not impact vehicle pricing.995) all north of $30. Now.750.In 2012. Johnson Controls. With the 2012 Toyota Prius PHEV ($32. .000 (before federal incentives). According to data from Pike Research’s annual Electric Vehicle Consumer Survey. the car comes without several features that were standard but consumers now must pay for as options. EV prices will continue to disappoint many consumers. Korea. The number of battery electric and plug-in hybrid vehicles sold and the variety of options for consumers will rapidly expand. Pike Research has prepared a white paper that makes 10 predictions about the continuing evolution of the market in 2012 and beyond. Here are three of those predictions: Battery production will get ahead of vehicle production.
In 2012.1 COMPANY PROFILE . an EV could coordinate with the clothes dryer or pool pump to make sure that the power consumption doesn’t surpass a certain threshold. manufacturers of the vehicles—as well as charging equipment—will introduce technology that will enable EVs to interact with other home appliances. Other long term applications could include downloading music or movies to the vehicle. home energy management devices. For example. and other types of appliances. the EV will be the device that consumes the most energy and power. with commercialization soon to follow. Automakers want EVs to be good “citizens” in balancing their energy requirement with the rest of the building. which requires establishing communications with smart meters.EVs will begin to function as home appliances. The first vehicles demonstrating this capability will likely be out in 2012. 1. In many households.
and explained. A dcx1 case study will be presented in detail in order to demonstrate the capability of data mining techniques in the field of car manufacturing. After a vehicle owner opts in to use the service. The use and benefits of these two analyses will be identified. Here’s how this system would work.3 NEED OF THE PROJECT Using historical data. traffic and driver usage. The application results analysis such as predicting future car market demand such analysis help in providing car market with base for more accurate prediction of future market demand. as well as many other areas. The new prediction api. an encrypted driver data usage profile is built based on routes and time of travel.4 OBJECTIVE OF THE PROJECT In this project. car maker is collaborating to develop software that will help its cars predict the best route that drivers can take to save energy and time if car maker experiment in making self learning cars takes off. The system analyzes driving habits. the system learns key information about how the driver is using the vehicle and where he wants to go. your car will never be the same again. a proposed data mining application in car manufacturing domain is explained and experimented. In essence. 1. knowledge of routes and combines it with real-time traffic information to suggest the best possible energy-efficient route.2 SCOPE OF THE PROJECT The aim of this paper is to provide a proposed data mining solution that can be used for automotive market. 1. This solution can provide inventory managers with important analysis such as launch analysis and slow turning analysis. . to create software that will give its cars the capability to predict the destination and the most energy-efficient route. Using the power of the cloud to analyze historical data of routes.1. a cloud-based analytics service that contains a suite of algorithms with the ability of analyzing historical business data and the capability to predict future trends or outcome.
CHAPTER 2 SYSTEM ANALYSIS .
2 PROPOSED SYSTEM .2.1 EXISTING SYSTEM 2.
vol. Anomalies in the discovery process merit further investigation of the application of genetic programming to the dataset for the problem domain. A data mining process discovers interesting information from the hidden data that can either be used for future prediction and/or intelligently summarizing the details of the data. S. “Applications of genetic programming in data mining”. “A data mining application: analysis of problems occurring during a software project development process”. Kerdprasop. Kerdpraso.3 LITERATURE REVIEW R. 19. Elkaffas and A. 2005. International Journal Of Software Engineering & Knowledge Engineering. In this paper. no. Some algorithms may find millions of patterns. Data mining (DM) is the process of finding and extracting frequent patterns that can describe the data. pp. a proposed data mining application in software engineering domain is explained and experimented. It is thus the difficult job for data analysts to select appropriate models and interpret the discovered knowledge. vol. Potentially interesting classification rules are discovered. although few of them can be currently seen in software engineering domain. N.4. vol. and financial. Each algorithm may produce a mining result completely different from the others. Our system is . and cash flow statements for North American public companies. The empirical results demonstrate the capability of data mining techniques in software engineering domain and the potential benefits in applying data mining in this area. 117-122. There are many achievements of applying data mining techniques in various areas such as marketing. These goals are achieved by using various learning algorithms. This paper details the application of a genetic programming framework for induction of useful classification rules from a database of income statements. medical. Enformatika. and K. “Moving data mining tools toward a business intelligence system”. we describe a framework of an intelligent and complete data mining system called SUT-Miner. 2006. or predict unknown or future values. Toony. balance sheets. In this paper. 2007. 647-663. Data mining techniques provide people with new power to research and manipulate the existing large volume of data.15.. Qiu.2. 17. 1-5. pp. Nayak and T. pp. Enformatika.
W. identifies their roles in the data mining process. pp. and identifies opportunities for future research in this area. 1-32. Scheduling courses (“timetabling”) at a University is a persistent challenge. Specifically it uses association rules to evaluate a nonstandard (“aberrant”) timetabling pilot study undertaken in one College at a University. It is the post-DM packages that ease the DM deployment for business intelligence applications. This study takes an alternate approach. . no. inductive methods are indeed applicable. Communications Of AIs. This survey reviews the interestingness measures for rules and summaries. Smith. ACM Computing Surveys. Howard. vol. 463-474. vol. but negligible. Good measures also allow the time and space costs of the mining process to be reduced. These measures are intended for selecting and ranking patterns according to their potential interest to the user. 2005. Liqiang and J. 2). classifies them from several perspectives. Allocating course sections to prescribed “time slots” for courses requires advanced quantitative techniques. both summary and detailed results can be understood by key decision-makers. such as goal programming. 3. pre-DM and post-DM functionalities. 2005. scheduling exclusionary effects that may impact course availability and diversity negatively. “Interestingness measures for data mining: a survey”. compares their properties. and 3). no. 38. and collecting a large amount of multi-criteria data at least six to eight months in advance of a semester. regardless of the kind of patterns being mined. The results indicate that 1). “Applying data mining to scheduling courses at a university“. 16. straightforward. repeatable SQL queries can be used as the chief analytical technique on a recurring basis. It demonstrates the feasibility of applying the principles of data mining. pp. In addition. gives strategies for selecting appropriate measures for applications. 2006. G. Interestingness measures play an important role in data mining.comprised of a full complement of major DM algorithms. this study was one of the first empirical studies to provide an accurate measure of the discernable.
CHAPTER 3 SYSTEM SPECIFICATION .
2 Software configuration Operating system Front End Programming Language Back End : : : : Windows2000/XP Professional JSP/ SERVLETS J2EE MYSQL 5.1 .3.1 Hardware Requirements Processor/system Main memory Cache memory Processor speed Hard disk drive : : : : : Pentium IV 1 GB RAM 512 KB 600 MHz 40 GB 3.
simple and portable across platforms. whether it's a Java development tool or a Web browser that can run Java applets.3. For example.2 Java Platform A platform is the hardware or software environment in which a program runs. and Macintosh. This figure illustrates how this works. run anywhere" possible.1 ABOUT JAVA Java is an object oriented programming language developed by Sun Microsystems. hardware-based platforms.3. Java byte codes help make "write once.3. . Every Java interpreter. 3. The Java VM can also be implemented in hardware. You can compile your Java program into byte codes on any platform that has a Java compiler. is an implementation of the Java VM. With an interpreter. interpretation occurs each time the program is executed. Solaris. Modeled on C++. Compilation happens just once. Java is also unusual in that each Java program is both compiled and interpreted. With a compiler. the same Java program can run on Windows NT. java was designed to be small. Most other platforms are described as a combination of hardware and operating system. you translate a Java program into an intermediate language called Java byte codes--the platform-independent codes interpreted by the Java interpreter. The Java platform differs from most other platforms in that it's a software-only platform that runs on top of other. The byte codes can then be run on any implementation of the Java VM. each Java byte code instruction is parsed and run on the computer.3 SOFTWARE DESCRIPTION The software used for the development of the project is: 3.
and deliver client-side content.2. Due the potential security feasibilitys associated with running applets from external and potentially malicious sources. Another specialized program is a servlet. and boot servers. 3. Examples of servers include Web servers. Application It is a program that we can execute from any operating system prompt.3. Servlets are similar to applets in that they are runtime extensions of applications. Applets are commonly used to enhance the interactivity of a web page. and can display graphics. Instead of working in browsers. and a full range of functionality is provided for in the way of pre-written Java classes. Applets run in their own frame.1.2 Applet It is a java program that executes inside a web page. Stand-alone applications have no such restrictions. and impose additional restrictions on applets. 3. proxy servers. accept input from GUI components. or they can have a graphical userinterface. servlets run within Java servers. configuring the server.2. by opening a new window or dialog box.3. . such as graphical user interface (GUI) widgets. most web browsers limit file access. Stand-alone applications can run as a console application (writing text to the screen or terminal window). mail servers.The Java platform has two components: The Java Virtual Machine (JVM) The Java Application Programming Interface (Java API) The Java API is a large collection of ready-made software components that provide many useful capabilities. and even open network connections. It requires a java enabled browser which requires an interpreter. print servers. A special kind of application known as a server serves and supports clients on a network. The Java API is grouped into libraries (packages) of related components.
and certificates. Java Database Connectivity (JDBC): Provides uniform access to a wide range of relational databases. Networking: URLs.The important thing required for writing stand-alone Java applications is a java compiler/interpreter. 3. . However. Java can be a bit slower than native code. and just-in-time byte code compilers can bring Java's performance close to that of native code without threatening portability. While there are commercial offerings available. It contains a compiler. including electronic signatures. well-tuned interpreters. date and time. threads.3.3 Features It is an object-oriented internet programming language. access control. smart compilers. robust and secure. TCP and UDP sockets. high performance and platform-independent It is a distributed and interpreted language. Object serialization: Allows lightweight persistence and communication via Remote Method Invocation (RMI). a freely available SDK is available from Sun. It is a well-structured. and so on. input and output. The core API is the API included in every full implementation of the Java platform. debugger. Public/private key management. numbers. system properties. interpreter. As a platform-independent environment. strings. such as Visual J++ and Borland JBuilder. and IP addresses. The core API gives you the following features: The Essentials: Objects. Security: Both low-level and high-level. It is simple.2. Your browser may not support display of this image. data structures.
Typically. too. an object can be easily passed around the system. Also.2. A software object maintains its state in variables and implements its behavior with methods.object can maintain private information and methods that can be changed at any time without affecting the other objects that depend on it.2. Software objects are modeled after real-world objects in that they.2.5 Object An object is a software bundle of variables and related methods.7 Benefits Modularity-The source code for an object can be written and maintained independently of the source code for other objects. . Information hiding. 3. 3. have state and behavior.6 Encapsulation Packaging an object's variables within the protective custody of its methods is called encapsulation. encapsulation is used to hide unimportant implementation details from other objects 3.3.2. It is multi-threaded.4 Advantages Get started quickly Write less code Write better code Develop programs faster Avoid platform dependencies with 100% Pure Java: Write once.3. dynamic and portable.3.3. run anywhere Distribute software more easily 3.
2. in which case. a Java class may implement. you create an object of that type and the system allocates memory for the instance variables declared by the class. or be bound to an object that implements the interface. the root class of the Java type system) must have exactly one base class. Object references in Java may be specified to be of an interface type.Object.10 Method overriding Method Overriding. An interface may never contain method definitions.3.2.3. 3. and may only contain method signatures and constant declarations (variable declarations that are declared to be both static and final). however an interface may not implement an interface. The implementation in the subclass overrides (replaces) the implementation in the super class.lang. or be an abstract class. 3.9 Interface An interface in the Java programming language is an abstract type that is used to specify an interface (in the generic sense of the term) that classes must implement. All classes in Java (other than java. When you create an instance of a class. multiple inheritance of classes is not allowed. . The class must implement all of the methods described in the interface. One benefit of using interfaces is that they simulate multiple inheritance. in object oriented programming. they cannot be directly instantiated except when instantiated by a class that implements the said interface. is a language feature that allows a subclass to provide a specific implementation of a method that is already provided by one of its super classes.8 Class A class is a prototype that defines the variables and methods common to all objects of a certain kind.2. and an interface may extend any number of interfaces. Furthermore. they must either be null. Interfaces are declared using the interface keyword.3. As interfaces are implicitly abstract.3.
2. an object must be passed as a parameter. In many cases. Another example would be a Print (object O) method. Constraints on the similarity of return type vary from language to language. classes that exist only in order to have specialized subclasses derived from them. abstract classes are designed — i. If we write the overloaded print methods for all objects our program will "print". we never have to worry about the type of the object. the abstract super class defines a common interface which all the subclasses inherit.3. To call the latter. and the correct function call again. This means that the subclass's method has the same name and parameter list as the super class’s overridden method. 3. This may or may not involve an inability to subclass from a given class. In this case one might like the method to be different when printing. text or pictures. Method overriding is an important feature that facilitates polymorphism in the design of object-oriented programs. A common error would be to assign a default value to the object in the second method. as some languages support covariance on return types. C#. whereas the former does not require a parameter. Print(image_object P). Some languages allow the programmer to prevent a method from being overridden. The two different methods may be overloaded as Print(text object T). Such abstract classes have methods that do not perform any useful operations and are meant to be overridden by specific implementations in the subclasses. C++. or disallow method overriding in certain core classes. .A subclass can give its own definition of methods which also happen to have the same signature as the method in its super class. doTask () and doTask (object O) are overloaded methods. Thus. For example.e. as the compiler wouldn't know which of the two methods to use. for example. and is called with an empty parameter field. D and Java that allows the creation of several methods with the same name which differ from each other in terms of the type of the input and the type of the output of the function. which would result in an ambiguous call error. the call is always: Print(something).11 Method overloading It is a feature found in various programming languages such as Ada.
which require the development from scratch of native peers for each of the AWT widgets. Here's an example: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4. a project called Caciocavallo has been created. you are really just making a number of different methods that happen to have the same name. make you generate the entire page via your program. especially for the set of AWT GUI widgets. and user-interface widget toolkit. its implementation on a new operating system may involve a lot of work. When overloading a method. graphics.2. static HTML with dynamically-generated HTML.0 Transitional//EN"> <HTML> <HEAD><TITLE>Welcome to Our Store</TITLE></HEAD> <BODY> <H1>Welcome to Our Store</H1> . It is resolved at compile time which of these methods are used 3. But most CGI variations. Since the opening of Java.Method overloading is usually associated with statically-typed programming languages which enforce type checking in function calls. even though most of it is always the same. The project has successfully experimented the implementation of AWT widgets using Java2D Java Server Page: Java Server Pages (JSP) is a technology that lets you mix regular. JSP lets you create the two parts separately. Many Web pages that are built by CGI programs are mostly static.3. The AWT is now part of the Java Foundation Classes (JFC) — the standard API for providing a graphical user interface (GUI) for a Java program. It aims to provide a Java API based on the Open JDK to ease AWT implementation on new systems. including servlets. As AWT is a bridge to the underlying native user interface.AWT is also the GUI toolkit for a number of Java ME profiles. with the dynamic part limited to a few small locations.12 AWT The Abstract Window Toolkit (AWT) is Java's original platform-independent windowing.
or WebStar. the overhead of starting the process can dominate the execution time. This simplifies operations that need to look up images and other data stored in standard places. you already know Java. in traditional CGI. and the like. the Java Virtual Machine stays up. If the CGI program does a relatively fast operation. a new process is started for each HTTP request. With servlets. servlets can talk directly to the Web server (regular CGI programs can't). handling cookies. However. Servlets are supported directly or via a plugin on almost every major Web server. if there are N simultaneous request to the same CGI program. Servlets also have more alternatives than do regular CGI programs for optimizations such as caching previous computations. Convenient. with the major exception of Apache. simplifying things like session tracking and caching of previous computations. Why learn Perl too? Besides the convenience of being able to use a familiar language. Powerful. Inexpensive. servlets have an extensive infrastructure for automatically parsing and decoding HTML form data. With servlets. With traditional CGI. There are a number of free or very inexpensive Web servers available that are good for "personal" use or low-volume Web sites. Consequently. keeping database connections open. Servlets can also share data among each other. Servlets are written in Java and follow a well-standardized API. They can also maintain information from request to request. which is free. not a heavyweight operating system process. Microsoft IIS. adding servlet support to it (if it doesn't come preconfigured to support servlets) is generally free or cheap. . reading and setting HTTP headers. most commercial-quality Web servers are relatively expensive. once you have a Web server. Portable. no matter the cost of that server. Hey. however. tracking sessions. For one thing. making useful things like database connection pools easy to implement. and many other such utilities. Similarly. there are N threads but only a single copy of the servlet class. and each request is handled by a lightweight Java thread.Efficient. say I-Planet Enterprise Server can run virtually unchanged on Apache. Java servlets let you easily do several things that are difficult or impossible with regular CGI. servlets written for. Nevertheless. then the code for the CGI program is loaded into memory N times.
or URL rewriting. A Servlet is an object that receives a request and generates a response based on that request. mapping a URL to a particular servlet and ensuring that the URL requester has the correct access rights. The package javax. Although servlets can respond to any type of request. They are not tied to a specific client-server protocol. as well as objects to reflect the servlet's configuration parameters and execution environment. The Web container is responsible for managing the lifecycle of servlets. the word "Servlet" is often used in the meaning of "HTTP Servlet". a Web container must be used. Servlets are the Java counterpart to non-Java dynamic Web content technologies such as CGI and ASP. Servlets can maintain state in session variables across many server transactions by using HTTP cookies. The basic servlet package defines Java objects to represent servlet requests and responses. but are most often used with the HTTP protocol. a protocol by which a Java class may respond to requests. A Web container (also known as a Servlet container) is essentially the component of a Web server that interacts with the servlets. but may be other data such as XML. a software developer may use a servlet to adddynamic content to a Web server using the Java platform.Servlet: A servlet is a Java programming language class used to extend the capabilities of servers that host applications access via a response programming. The servlet API. it can be thought of as a Java Applet that runs on a server instead of abrowser.servlet. The generated content is commonly HTML.servlet. defines the expected interactions of the Web container and a servlet. Therefore. including session management objects that track multiple requests and responses between the Web server and a client. . contained in the Java package hierarchy javax. Thus. A Servlet is a Java class in Java EE that conforms to the Java Servlet API. To deploy and run a Servlet. Thus.NET.http defines HTTP-specific subclasses of the generic servlet elements. they are commonly used to extend the applications hosted by Web servers. Servlets may be packaged in aWAR file as a Web application.
These services can include: New features Runtime changes to content Runtime changes to presentation New standard protocols (such as FTP) New custom protocols . A somewhat older usage is to use servlets in conjunction with JSPs in a pattern called "Model 2". A servlet is a Java component that can be plugged into a Java-enabled web server to provide custom services. The difference between Servlets and JSP is that Servlets typically embed HTML inside Java code. while JSPs embed Java code in HTML.Servlets can be generated automatically from JavaServer Pages (JSP) by the JavaServer Pages compiler. While the direct usage of Servlets to generate HTML (as shown in the example below) has become rare. which is a flavor of the model-viewcontroller pattern. the higher level MVC web framework in Java EE (JSF) still explicitly uses the Servlet technology for the low level request/response handling via the FacesServlet.
Let us consider a typical user scenario to understand when these methods are called. They are implemented by every servlet and are invoked at specific times by the server. like init ().Life cycle of a servlet During initialization stage of the Servlet life cycle. . the method of the parent class is called. The developer of the servlet must provide an implementation for these methods. This request is then sent to the appropriate server. 2. After initialization. The container passes an object implementing theServletConfig interface via the init() method. the servlet can service client requests. the web container initializes the servlet instance by calling the init() method. The server maps this request to a particular servlet. Each request is serviced in its own separate thread. and destroy(). The servlet is dynamically retrieved and loaded into the address space of the server. The browser then generates an HTTP request for this URL. Three methods are central to the life cycle of a servlet. is called only once in the lifecycle of a servlet. Assume that a user enters a Uniform Resource Locator (URL) to a web browser. The HTTP request is received by the web server. Finally. typically resulting in an error being returned to the requester. The Web container calls the service () method of the servlet for every request. If a request for a method that is not implemented by the servlet is made. the Web container calls the destroy () method that takes the servlet out of service. The destroy () method. The service () method determines the kind of request being made and dispatches it to an appropriate method to handle the request. 1. service(). This configuration object allows the servlet to access name-value initialization parameters from the web application. These are init().
It is possible to pass initialization parameters to the servlet so it may configure itself.3. 8. The server invokes the init () method of the servlet. handles that are allocated for the servlet. The server calls the destroy () method to relinquish any resources such as file 7. The servlet remains in the server’s address space and is available to process any 5. It may also formulate an HTTP response for the client. . The server invokes the service () method of the servlet. The server may. The algorithms by which this determination is made are specific to each server. important data may be saved to a persistent store. You will see that it is possible for the servlet to read data that has been provided in the HTTP request. decide to unload the servlet from its memory. 6. other HTTP requests received from clients. at some point. 4. This method is called to process the HTTP request. The memory allocated for the servlet and its objects can then be garbage collected. This method is invoked only when the servlet is first loaded into memory. The service () method is called for each HTTP request.
MySQL is also used in many high-profile. Linux. FreeBSD. Microsoft Windows. and is a central component of the widely used LAMP open source web application software stack—LAMP is an acronym for "Linux. For commercial use. large-scale World Wide Web products. NetBSD. SCO UnixWare. QNX.3. These include MySQL Connector/Net for integration with . Platforms And Interfaces MySQL works on many different system platforms. phpBB. IRIX. Perl/PHP/Python". MySQL is an open source database management system and is used in some of the most frequently visited websites on the Internet. WordPress.1 MySQL is the world's most used relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. OS/2 Warp. Apache. now owned by Oracle Corporation. Drupal and other software built on the LAMP software stack. HPUX. SunOS. Uses MySQL is a popular choice of database for use in web applications. Novell NetWare. i5/OS. and offer additional functionality. OpenSolaris. including AIX. SCO OpenServer. A port of MySQL to OpenVMS also exists. eComStation. the Swedish company MySQL AB. Joomla. The MySQL development project has made its source code available under the terms of the GNU General Public License. Applications which use MySQL databases include: TYPO3. MySQL was owned and sponsored by a single for-profit firm. Free-software-open source projects that require a full-featured database management system often use MySQL. as well as under a variety of proprietary agreements. including Wikipedia. several paid editions are available. Mac OS X.3. BSDi. Symbian. The SQL phrase stands for Structured Query Language. OpenBSD. MySQL.4 MYSQL 5. Many programming languages with language-specific APIs include libraries for accessing MySQL databases. Solaris. Sanos and Tru64.
Though MySQL began as a low-end alternative to more powerful proprietary databases. Much of MySQL's appeal originates in its relative simplicity and ease of use. It is still most commonly used in small to medium scale single-server deployments. so on larger scales. allowing direct interaction between a MySQL database and any web client via structured URLs. A typical high-end configuration can include a powerful master database which handles data write operations and is replicated to multiple slaves that handle all read operations. an ODBC interface called MyODBC allows additional programming languages that support the ODBC interface to communicate with a MySQL database. . The master server synchronizes continually with its slaves so in the event of failure a slave can be promoted to become the new master. On most Linux distributions the package management system can download and install MySQL with minimal effort. Deployment MySQL can be built and installed manually from source code. There are however limits to how far performance can scale on a single server. such as ASP or ColdFusion.Microsoft's Visual Studio (languages such as C# and VB are most commonly used) and the JDBC driver for Java. In the medium range. Further improvements in performance can be achieved by caching the results from database queries in memory using memcached.URL-based query method also ships with a MySQL adapter. such as a multi-processor server with gigabytes of memory. MySQL can be scaled by deploying it on more powerful hardware. either as a component in a LAMP-based web application or as a standalone database server. though further configuration is often required to adjust security and optimization settings. The HTSQL . multi-server MySQL deployments are required to provide improved performance and reliability. or breaking down a database into smaller chunks called shards which can be spread across a number of distributed server clusters. but this can be tedious so it is more commonly installed from a binary package unless special customizations are required. In addition. it has gradually evolved to support higher-scale needs as well. minimizing downtime. which is enabled by an ecosystem of open source tools such as phpMyAdmin.
which runs on EC2. or use a ready-made machine image with an optimized installation of MySQL on it. as well as extensions Cross-platform support Stored procedures Triggers Cursors . only Rackspace offers managed hosting for MySQL databases. There are two common deployment models for MySQL on the cloud: Virtual Machine Image . the database service provider takes responsibility for installing and maintaining the database. Rackspace and Heroku. and the Xeround Cloud Database.Cloud-Based deployment Main article: Cloud database Another deployment option is running MySQL on cloud computing platforms such as Amazon EC2. As of 2011. Two notable cloud-based MySQL services are the Amazon Relational Database Service. Features A broad subset of ANSI SQL 99. and application owners pay according to their usage. Instead. In this configuration. of the major cloud providers. but the cloud provider hosts the database and manages it on the application owner's behalf. application owners do not have to install and maintain the MySQL database on their own. such as the one provided by Amazon EC2. where the database is not offered as a service.cloud users can upload a machine image of their own with MySQL installed.some cloud platforms offer MySQL "as a service". A third option is managed MySQL hosting on the cloud. MySQL as a Service .
nested SELECTs) Replication support (i. and Cluster storage engines.e.e. Updatable Views Information schema Strict mode[further explanation needed] X/Open XA distributed transaction processing (DTP) support. two phase commit as part of this. using Oracle's InnoDB engine Independent storage engines (MyISAM for read speed. no automatic support for multiple masters per slave. InnoDB for transactions and referential integrity. many slaves per master. Master-Master Replication & Master-Slave Replication) with one master per slave. savepoints with InnoDB SSL support Query caching Sub-SELECTs (i. MySQL Archive for storing historical data in little space) Transactions with the InnoDB. Full-text indexing and searching using MyISAM engine Embedded database library Partial Unicode support (UTF-8 and UCS-2 encoded strings are limited to the BMP) ACID compliance when using transaction capable storage engines (InnoDB and Cluster) Partititoned tables with pruning of partitions in optimiser Shared-nothing clustering through MySQL Cluster .
Hot backup (via mysqlhotcopy) under certain conditions . CHAPTER 4 SYSTEM DESIGN .
New user means create the new account for enter that process of car product.1 Modules Design 4. If already login means. 4.1 Authentication: Authentication module contains user name and password. Orders: Order stage generates the reporting order data mart. Production Plan: “Production Plan” data source is a list of models quantities that are planned to be produced for a specific period.4. .1. The order data is a snapshot of the dealer orders on the cutoff date. The inventory data is a snapshot of the inventory stock on the cutoff date.2 Supply Chain Process Sales: Sale stage generates the reporting sale data mart that covers the studied period. Inventory: Inventory stage generates the reporting inventory data mart.1. they must enter the username and password for encountered the process of car marketing.
Geographic dimension is used to map “ZipCode” to “Zone/Business Center/ State”.1. and reduce days on lot. scrubbing it. This dimension is used to map vehicles “Franchise/ Year/ Model/ Package/ Option” to their "Codes/Descriptions/Option Types/Default Options”. These analyzes are related because they all require gathering data. 4. Web Activities: “Web Activity” data source is used to track all user web hits/requests on DCX websites . TOPs dimension used to map all car configurations under production. Having a data warehouse that combines online and offline behavioral data for decision-making purposes is a strategic tool which business users can leverage to improve sales demand forecasting.3 Manufacturing information It Contains car configurations/packages/options codes and description. Dealer dimension id used to map DCX dealers. “CarConfig” is used to store “Build and Price” configurations made on DCX web-sites.1. mapping it and finally aggregating it for the purpose of research and analysis. DCX also wants to make early indication on which vehicle configurations are likely to sell well during new vehicles launching. storing it. improve model/trim level mix planning. DCX wants to help the inventory managers to move vehicles faster. adjust body model/trim level mix with inventory data.4 Customers’ trends information Websites: Managers are interested especially in integrated data spanning DCX’s relationship with its customers and prospects regardless of whether the systems are online or offline. In order to do this it needs to identify which vehicles stay long in stock as well as which vehicles move faster.4.
2.2 Data Model 4.1 Entity relationship diagram: .4.
2 Data Dictionary: .2.4.
3.1 Context Analysis Diagram: .3 Process model: 4.4.
3.3 Architecture Diagram .4.
3 Data Flow Diagram Level 0: Level 1: Level 2: .3.4.
and the models and methodologies that people use to develop these systems. but they are always present. This step involves breaking down the system in different pieces and drawing diagram to analyze the situation. PHASE II-ANALYSIS The goal of systems analysis is to determine where the problem is in an attempt to fix the system. 5. 5.2. testing. coding starts at the bottom and validation phase starts right of the Vmodel. In software engineering. or test results. design. which may be documents. implementation.1. DCOII project plan depends on the V shaped modeling of verification phase starts at left of V shape. and attempt to engage users so that definite requirements can be defined.1. Each phase has its own products. break down functions that need to be created. analysis. code. . PHASE I-PLANNING Planning is to generate a high-level view of the intended project and determine the goals of the project. In DCOII system V-model software development life cycle is followed.1 PHASES OF SOFTWARE DEVELOPMENT The normal phases of a development project are planning.CHAPTER-V SOFTWARE DEVELOPMENT Software Development Life Cycle in systems engineering and software engineering. and enhancement. development. the SDLC concept underpins many kinds of software development methodologies. Different methodologies may call these phases by different names. is the process of creating or altering systems. 5.1. which is diagrammatically represented as follows. These methodologies form the framework for planning and controlling the creation of software development process. Analyze project goals.
. Software specification document which serves as a blueprint for the development phase is generated.3. DCOII system design is developed by the webmaster based on the user requirements documents.1.1 SOFTWARE TESTING : . They figure out possibilities and techniques by which the user requirements can be implemented. Unit testing and module testing are done in this stage by the CDOII develops. This document contains the general system organization. some samples screens are created. 5.5. menu structures. Development stage is inter mingled with the next in that individual modules will need testing before integration to the man project.1.4. Goals & targets. PHASE III-DESIGN Systems design is the phase where system engineers analyze and understand the business of the proposed system by studying the user requirements document. PHASE IV-DEVELOPMENT Modular and subsystem programming code will be accomplished during this stage. of DCOII system is achieved by establishing schedules during project development. data structures etc. Chapter vi TESTING 6.
site preparation and file-sites. INTRODUCTION It is the process of bringing developed system into operational use. Implementation is one of the most important tasks in project.1. the test of the network along with the system are also included under implementation. . Implementation is the phase. It is primarily concerned with user training. because all the efforts undertaken during the project will be fruitful only if the tool is properly implemented according to the plans made. if the implementation phase is not carefully planned and controlled. The implementation phase is less creative than system design. Thus proper implementation is essential to provide a reliable system to meet managerial requirements. in which one has to be cautions. it can be lead to many critical problems.CHAPTER-VII SYSTEM IMPLEMENTATION 7.
Here the new system is implemented to an operational use. Maintenance is far more than fixing mistakes. It may be that even after through testing the user will find errors. IMPLEMENTATION The system has been tested in the location of the developer. The initial parameters of the management information system should be modified as a result of programming efforts. modifications to existing function and general enhancements are received from the user. . Adaptive maintenance – as activity that modifies software to properly interface with a changing environment – is both necessary and common place. to satisfy this request perceptive maintenance is used. or to provide a better basic for future enhancements. The maintenance can be defined using four activities that are undertaken after a program is released for use. This developed system supports for corrective maintenance. which is characterized by reverse engineering and re-engineering technique. Programming provides a real test for the assumption made by the analyst. 7. This is often called preventive maintenance. The third activity that may be applied to definition of maintenance occurs when software package is successful. In such a case the user when reports the errors it is possible to correct those errors as that coding has been documents and it is possible to find out the location where the error is occurring and the reason for error can be analyzed and corrected. The fourth maintenance activity occurs when software is changed to improve future maintainability or reliability. But it is not possible to find all errors here. As the software is used new recommendations for new capabilities. Implementation is used here to mean the process of converting a new or revised system into an operation one.2. The second activities that contribute to a definition of maintenance occurs because of the rapid change that encountered in every aspect of computing.Depending on the nature of the system extensive user training maybe required programming is itself a design works.
Chapter : viii PERFORMANCE AND LIMITATION 8. If there is a need to include any new modules then it has been externally and then includes to it with the exits architecture. which a team needs.1 MERIT OF THE SYSTEM: . But up to now the system holds all the possible reports generation tools.As this software can be run with the requirements given above and it does not involve any particular hardware as such and it can be run with the rapid development that is being encountered in the computer industry. Later on it correspondence with this limitation may upgrade the system.
1SAMPLE SCREENS: .Chapter: ix APPENDICES 9.
Chapter : x REFERENCES .
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.