CHAPTER 1

INTRODUCTION

[1]

1. INTRODUCTION
1.1 OVERVIEW
Tech Fest Registration System is a new online as well as offline registration concept which uses
the client – server application for online registration and Console application for the offline
registration.
It Include:
1. The complete knowledge of each and every events like its totle no. of rounds, max. & min no.
of participants, participation fees etc.
2. The interested participant can register himself by using online registration.
3. An automated user-id and password will be sent to the email-id of participant.
4. usng the unique user-id and password, participant can login to various events make the online
payment using the secure gateway(here IDBI).
As a new registration system, it has been developed fast in china, But I think the development
progress is different form the western countries.
 Client – Server Application for online registration.
 Console Application for offline registraion.

The following list is a quick summary of Techfest modalities currently in use:
1. Online registration for distance participants (no face-to-face meetings)
2. Blended instruction (combining online and face-to-face registration)
3. Synchronous: real-time, multiple participants can register online, instructor-led.
4. Asynchronous: participant can register himself in online mode but using his unique userid he/she can make payment in offline mode.
5. We use multiple layering .

[2]

1.2

SCOPE

 TechFest registration System has world wide scope because any distant participant can
get the information about the events and register thereselves for various events.
 The biggest advantage of Techfest registration lies in its ability to cover distances. For the
participants who are spread across multiple locations, traditional registration becomes a
constraint. All participants need to come to a university/college for the registration.
Additionally, sometimes participant also does not get time to go again and again to the
university due to lack of time hence online registration is the solution for all this type of
problem.

1.3 PURPOSED WORK
1.) Console registration software will be provided for registrations on the helpdesk in the
fest. Central database server will be used for both offline and online registrations.
Graphics will relate to the proposed theme that is “SPACE”.
2.) Events will be categorized into multiple categories as follows  Technical events: This category of events will contain the events which are related

to technology, science or engineering or technical skills. Some technical events are
 Robo war
 Code combat
 Kaizen
 Prakshepan etc.
Non-technical Events: This category of events will include the events which do not
require technical skills but these are for fun and cultural activities. So we will sub

categories into two these are:
 Performance events: These events are like some physical activities or performance.
Some are as follows:
 Style check
 Band wars
[3]

 Zayka
 Bacchanalia – the dancing event etc.
 Fun/Cultural events: These events are for fun and some crazy events. Some are as
follows:
 Rajneeti
 Art mania
 Motoracezz
 Clash of titans (chess game) etc.

Workshops: workshops, in the techfest are categorised separately. It contains
workshops like Autonix, Robodroid and Metasploit

.
3.) There will be three types of users of the Software

Administrator - This type of user has power to update the database and


authenticate users. Head of the events will be administrator.
Coordinators – This type of user will be able to register participants for the events.
Participants – This type of user will be able to register their self for the events
online.

1.4

Related work:
Similar functions of the software can be seen on multiple websites. Some are:
1.) http://www.apogee.org etc.
Websites were developed previously. But online registrations were not there. Offline
registration software was not introduced.

[4]

CHAPTER 2
NOMENCLATURE & ABBRIVIATIONS

2. NOMENCLATURE

2.1 HTTP:

HTTP governs the transfer of Hypertext (is a text uses by a standard system called

HTML) between two or more computers based on client server architecture. It is a transaction
oriented client/server protocol between web browser & web server.
[5]

ibm. web pages of different following sites are shown: > http://www.3 PHP: PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language.netscape.com > > http://www.com http://shareware. the [6] .com 2.com > http://www. PHP is now installed on more than 244 million websites and 2. Originally created by Rasmus Lerdorf in 1995.2 HTML: Hypertext Markup Language used to create web document or web pages.1 million web servers.yahoo.1 : HTML In the right hand side of above figure.2. FIG 2.

0: [7] . 2. which is incompatible with the GNU General Public License (GPL) due to restrictions on the usage of the term PHP. a recursive acronym. MySQL is a popular choice of database for use in web applications. It is named after co-founder Michael Widenius' daughter. the Swedish company MySQL AB. free of charge. MySQL.reference implementation of PHP is now produced by The PHP Group. and is a central component of the widely used LAMP open source web application software stack (and other 'AMP' stacks)." Freesoftware-open source projects that require a full-featured database management system often use MySQL. PHP code is interpreted by a web server with a PHP processor module which generates the resulting web page: PHP commands can be embedded directly into an HTML source document rather than calling an external file to process data. officially. The SQL phrase stands for Structured Query Language. It has also evolved to include a command-line interface capability and can be used in standalone graphical applications. MySQL was owned and sponsored by a single for-profit firm. Perl/PHP/Python. PHP can be deployed on most web servers and also as a standalone shell on almost every operating system and platform.5 Wamp 2. PHP is free software released under the PHP License. but also called "My Sequel") is the world's most widely used open source relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. 2. The MySQL development project has made its source code available under the terms of the General Public License. LAMP is an acronym for "Linux. it now stands for PHP: Hypertext Pre-processor.4 MySQL: MySQL ("My S-Q-L". as well as under a variety of proprietary agreements. my. Apache. While PHP originally stood for Personal Home Page. now owned by Oracle Corporation.

Used in the market. It is most widely used server application. [8] . PHP. Other programs may also be included in a package.6 HTTPS: Secure Hypertext Transfer Protocol is a HTTP over SSL (secure socket layer). And available with free user licence .This web server application for php technology. the suite of communication protocols used to connect hosts on the Internet. WAMPs are packages of independently created programs installed on computers that use a Microsoft Windows operating system. WAMP is an acronym formed from the initials of the operating system Microsoft Windows and the principal components of the package: Apache. 2. such as phpMyAdmin which provides a graphical user interface for the MySQL database manager.7 TCP/IP: Transmission Control Protocol/Internet Protocol. Apache is a web server. MySQL is an open-source database. Perl or Python. MySQL and one of PHP. the two main ones being TCP and IP. 2. Perl and Python are scripting languages that can manipulate information held in a database and generate web pages dynamically each time content is requested by a browser. TCP/IP uses several protocols.

LITERATURE SURVEY 3. magazines. newspapers.CHAPTER 3 LITERATURE SURVEY 3.1 GROWTH OF PROJECT Literature survey is the documentation of a comprehensive review of the published and unpublished work from secondary sources data in the areas of specific interest to the researcher. journals. The library is a rich storage base for secondary data and researchers used to spend several weeks and sometimes months going through books. conference [9] .

The literature review can be in any area of the business. S E R V EE R The Techfest is a collaborative software to assist the participant to register in an interactive manner. [10] . Reviewing the literature on the topic area at this time helps the researcher to focus further interviews more meaningfully on certain aspects found to be important is the published studies even if these had not surfaced during the earlier questioning. 3.1. doctoral dissertations. It aims to reduce the paper work and benefit distant student. r a i j o s e i n v c t t i o d i v e .2 WORKING PROCESS OF PROJECT O m oW eA pM .P u b .2. 3. How It Work:  Firstly student traverse the whole website.proceedings. So the literature survey is important for gathering the secondary data for the research which might be proved very helpful in the research. master's theses. The literature survey can be conducted for several reasons. government publications and financial reports to find information on their research topic. The researcher could start the literature survey even as the information from the unstructured and structured interviews is being gathered. and gathered the required information for various events like technical events and non technical events from “EVENTS” module.  If participant need any other details then he/she can get contact information from “ABOUT US” module. r . .

 Automated generated ID and password will sent to the student’s email-id.  Particiant can make an online payment or he can book his seat and pay the fee in offline mode. Participant can know about workshop like who organizes the workshop. Using his Id and Password he can login for the registration of various events registration. [11] .  Once Student done with traversing the website he can Register himself as a Participant. duration of workshop etc via “WORKSHOP” module.

PROJECT DESCRIPTION 4. [12] . of participants.CHAPTER : 4 PROJECT DISCRIPTION 4. participation fees etc. It Include: 1.1 OBJECTIVE OF PROJECT Tech Fest Registration System is a new online as well as offline registration concept which uses the client – server application for online registration and Console application for the offline registration. max. of rounds. & min no. The complete knowledge of each and every events like its totle no.

Rajniti etc. 3. Events  It enables a participant to go through all types of evevts. code combat.  These events include: Workshops. Technical Events:  These are those events which are related to technology. As a new registration system. [13] . 2. participant can login to various events make the online payment using the secure gateway(here IDBI).  It contain all the necessary information about each and every event.  Client – Server Application for online registration.2. 4. Rangoli. robobar etc.  Console Application for offline registraion. 2.  An automated user-id and password will be send to the user’s email id. usng the unique user-id and password. it has been developed fast in china. But I think the development progress is different form the western countries. Non Technical Events:  These events include the events which are related to performance such as: Zayaka . An automated user-id and password will be sent to the email-id of participant.2 PROJECT MODULES It contains the following elements:1. The interested participant can register himself by using online registration. Registration:  It enables a user to register themselves as a participant for the Techfest events .

Login:  Participant view all the details related to all the events. Workshops: workshops. self-paced registration.college. Budgets and cash flows will need to be negotiated. About Us: It include all the necessary information regarding the university.  Proof of registration. 4.3.3 ADVANTAGES OF TECHFEST REGISTRATION  Reduced overall cost is the single most influential factor in aTechfest registration.  Increased retention and application form to the register averages an increase of 25 percent over traditional methods  Consistent delivery of content is possible with asynchronous. meeting room rentals. 2. in the techfest are categorised separately. is given by Unique User-id. co- ordinators contacts so that user can satisfy completely from his side if he/she has any doubt by callin or emailing the co-ordinator/mentor. and travelling cost. 2. The reduction of time spent away from the job by user may be the most positive offshoot. It contains workshops  Autonix  Robodroid  Metasploit 5. and meals are directly quantifiable. [14] .  Interactivity engages the user to understand the site only by seeing the graphics. lodging. The elimination of costs associated with instructor's salaries.  The registered participant can login himself /herself in any events.4 DISADVANTAGES OF TECHFEST REGISTRATION  Up-front investment required of an Techfest solution is larger due to development costs and deployment cost.

[15] . whether additional tech expenditures can be justified. and whether compatibility of all software and hardware can be achieved. Technology issues that play a factor include whether the existing technology infrastructure can accomplish the training goals.

CHAPTER 4 SOFTWARE AND HARDWARE REQUIREMENTS [16] .

2 TECHNOLOGIES SOFTARWE AND HARDWARE REQUIREMENTS 4.0 * Dreamweaver * HTTP * HTTPS * TCP/IP b) For console registration application: * java * MySQL server * JVM * Netbeans [17] .1.1 ) Technologies: a) For website: * php * MySQL server * wamp 2.4.

The Client software is to provide the user interface on the system user client side and for this TCO/IP protocols are used.  On the server side web server is for EJB and Database server is for storing the information.4.4.2 INTERFACE: a) For website: fig:  The web pages (XHTML/JSP) are present to provide the user interface on client side. [18] . Communication between client user and server is provided through HTTP/HTTPS  protocols.

MySQL. b ) For console application software: * Operating System (Any like Linux . HTML.4) Hardware Interface:  Client Side: * Mozilla Firefox (for best view).3 ) Software Interface: a ) For website: * Operating System (Any like Linux. * MySQL * Development End: (java. windows) * Client on Internet: Web Browser * Client on Intranet: Client Software. Netbeans ). css). MySQL. Web Browser * WebServer * MySQL * Development End: (php. 4.4.windows) * Java( JVM ) installed. * Processor: Pentium II at 500 MHz * Ram: 64 MB  Server Side: [19] . Web Server. javascript.1.1.

0 * Processor: Pentium II at 500 MHz * Ram: 64 MB * Disk space: 1GB 4.5 ) Communication Interface: * Client on Internet will be using HTTP/HTTPS protocol * Client on Intranet will be using TCP/IP protocol.1.0 * Processor: Pentium II at 500 MHz * Ram: 256 MB * Disk space: 1GB * MySQL server 5. [20] .* Wamp v2.

CHAPTER 5 SOFTWARE ENGINEERING PARADIGM [21] .

Once a phase of development is completed. and the controls and the deliverables that are required. The advantage of waterfall development is that it allows for departmentalization and managerial control. The waterfall model is a popular version of the systems development life cycle model for software engineering. it cannot turn back. technical development. Various process model are as follows:      The linear sequential model The prototype model The RAD model The incremental model The spiral model 5. It is the same with waterfall development.1 INTRODUCTION To solve actual problems in an industry setting.5. methods and tools layers and the generic phases. be delivered on [22] . problem definition identifies the specific problem to be solved. a software engineer or a team of engineers must co-operate a development strategy that encompasses the process. All software development can be characterized as a problem solving loop in which four distinct stages are encountered: status quo. SOFTWARE ENGINEERING PARADIGM 5. the waterfall model describes a development method that is linear and sequential. Waterfall development has distinct goals for each phase of development. Status quo represents current state of the affairs. all of the stages coexist simultaneously at some level of the details. problem definition. the method and tools to be used . Once the water has flowed over the edge of the cliff and has begun its journey down the side of the mountain. technical development and solution integration.2 PARADIGM USED WATERFALL MODEL In our project we have used the waterfall model. the development proceeds to the next phase and there is no turning back. technical development to be solved the problem through the application of some technology.It is chosem based on the nature of the project and application. This strategy is often referred to as a process model or a software engineering paradigm. Often considered the classic approach to the systems development life cycle. and theoretically. A schedule can be set with deadlines for each stage of development and a product can proceed through the development process like a car in a carwash. Regardless of the process model chosen . and solution integration delivers the result to those who requested the solution in the first place. Imagine a waterfall on the cliff of a steep mountain.

and ends up at operation and maintenance. Development moves from concept. troubleshooting.time. implementation. without any overlapping or iterative steps. installation. The disadvantage of waterfall development is that it does not allow for much Reflection and Revision. [23] . through design. testing. Each phase of development proceeds in strict order.

CHAPTER 6 SOFTWARE REQUIREMENT SPECIFICATION [24] .

software and human interfaces are described for external system elements and internal software functions. The information description provides a detail description of the problem that the software must solve. SOFTWARE REQUIREMENT SPECIFICATION 6.6. A description of each function required to solve the problem is presented in the functional description. design constraints are sated and justified . implementation details are developed. The introduction of the software requirement specification states the goal and objectives of the software describing it in the context of the computer based system. [25] . In many cases SRS may be accompanied by an executable prototype or a preliminary user’s manual. Information. The behavioral description section of the specification examines the operation of the software as a consequence of external events and internally generated control characteristics. Analysis must focus on the information. flow and structure are documented. Validation criteria are the most important section of SRS. modes are created. Specification of validation criteria acts as an implicit review of all other requirements. To better understand what is required.1 OVERVIEW & SUMMARY Requirement analysis is the first technical step in the software process. performance characteristics are stated and one or more diagrams are included to graphically represent the overall structure of the software and interplay among software function and other system elements. functional and behavioral domain of a problem. Hardware . later. A processing narratives is provided for each function. the problem is partitioned and representations that depict the essence of requirement and.SRS include a bibliography and appendix. It is at this point that a general statement of software scope is refined into a concrete specification that becomes the foundation for all software engineering activities that follow.

member limit in the event.6.1: Admin Table Field name data type Description Name Varchar Password Varchar It is the user id for the admin . Participation information in the events in which team size is single. Personal information about the participants of the events.it is the primary key of the table.2. events kronos13 eventinfo kronos13 admins desk_reg coordinators desk_reg Participates_single desk_reg singleevnt desk_reg grpevntprticpt desk_reg Information about events their fees. paymentinfo kronos13 Payment information of the online registration process. User name and password of the administrator of the window application. Participation information in the events in which team size is more than one. This contain the password related to the name. Information about the authenticated users of the offline software. Table 6. [26] .2 DATABASE SUMMARY Table Name Schem a Description personalinfo kronos13 Personal information about register Users of the website. Information about the users who have registered for events.

Email varchar Email id of one user from the group.3: Single user Field name data type Description Team id varchar Grpnames varchar It contains the unique id of the group. Mobileno. varchar It contains the mobile no of the user.through which admin id . Date Date It contains the date of registration. Table 6.2: Coordinator Table :- Table 6. Event name varchar Amount Int It contains the name of related event which is register by the coordinator. Password varchar It contain the password related to the user. It is the primary key for the table. Created by varchar Clg varchar Branch varchar This field contain . This contains the name related to the team id.this coordinator id is created.Field name Data type Description Name varchar It contain the name of the coordinator. Total amount related to the group event. Mbraded Int Total registration is done by this coordinator.2. Added by varchar This contains the information of [27] . This field contain the college name of related user.2. Amount varchar Total amount earned by this coordinator. noofmembers Int Total no of member in a group. Branch of the coordinator.

Table 6. Date Date Date of registration. Password varchar This field contains the password related to the user id. Email varchar Contains the email id of related user.4: singleevent Field name Data type Description Id varchar This is the primary key for the single participant table. Added by varchar Contains the information of coordinator which register the user. Total no of event of a single user. varchar Contains the Mobile no of the user. Table 5: Event info[28] . City varchar Contains the city information of the user. Totalamt Int Noofevnt Int Contains the information of total amount of related event in which user registered.2. Event name Varchar Contains the event name related to particular id. Field name Data type Description Id Varchar This is the primary key for this table . Clg varchar College information Mobile no.

Grp_id Varchar Contains the id of the particular group.which contains the information of event no. if 0 means not accepted or 1 means accepted . Date Date Information of date of registration. Table 6.6: Event Table 6.7:Paymentinfo[29] . This field contains the fees information of related event. Name of event in which participant has taken part. This contains the name of related event.2. Max member in particular group E_date Date Date of registration E_type Varchar Min_member Int Contains the information of particular type of the event either technical or nontechnical Min member in a particular group.it contains the user id.Field name Data type Description U_id Varchar E_name Varchar This is the primary key for this table.2. Field name Data type Description E_no Int E_name Varchar E_fees Int Max_member Int This the primary key . This field contains the information of pay mode either online or offline. No_member Int Total no of member in a group Acceptance Tinyint Pay type Varchar This field contains the information any event in two way.

E_mail Varchar Email id of the participant. Name Varchar Name of the participants. Branch Varchar Stream of the participant. Payment_flag Tinyint Payment _type Varchar Payment type eiher online or off line.3 FUNCTIONAL REQUIREMENT [30] . E_name Varchar Name of the particular event.contains the user id.Field name Data type Description U_id Varchar Amount Int This the primary key for this table . Clg Varchar College name of the participant in which he/she is Phone Varchar No_event Int City Varchar State Varchar Dateregistration Date Pwd Varchar U_id Varchar 6. Field name Data type Description S_no Int Serial number. Amount info of particular event.

3.2 STUDENT/PARTICIPANT USE      Traverse the whole website Get himself /herself register View information about all the events Register for events. After that the id is verified and they can pursue the facilities provide to the student like view all information. 6. Functional requirements are listed in the following sections as use cases for the instructor and student actors separately. The Third module of the project defines itself in terms of being used by Native User. 6. User have to enter their user-id and password which automatically send to his email-id by an aumated system. Online payment [31] .3. online payment .The functional requirement of the project is defined under two modules. register for any event.1 ADMINISTRATOR USE     Manage user information Manage daily database Manage website Update payment status. view all information about events and register theirselves. manage daily Database. They can traverse whole website . manage user info. manage Website. Update payment status . The second module of the project defines itself in terms of being used by the Registered user. The first module allows the system Administrator(admin) to log into his account and has the privileges to do multiple things some of the include.

CHAPTER 7 TOOLS AND TECHNOLOGIES USED [32] .

dictionaries. such as the GNU Compiler for Java and GNU Class path. Others have also developed alternative implementations of these Sun technologies. sets. The original and reference implementation Java compilers. Examples of these libraries are:  The core libraries. 7.1 JAVA LIBRARIES Java libraries are the compiled bytecodes of source code developed by the JRE implemention to support application development in Java. Java applications are typically compiled to byte code that can run on any Java virtual machine (JVM) regardless of computer architecture. TOOLS AND TECHNOLOGIES USED 7. virtual machines. and dynamic". queues and double-ended queue. which include:  Collection libraries that implement data structures such as lists. threaded. As of May 2007.  PRIMARY GOALS There were five primary goals in the creation of the Java language:      It should be "simple. It should execute with "high performance".1. in compliance with the specifications of the Java Community Process. Validating) libraries  Security [33] . Transforming.7. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities. It should be "architecture neutral and portable". It should be "interpreted. and class libraries were developed by Sun from 1995. Sun made available most of their Java technologies as free software under the GNU General Public License. or stacks  XML Processing (Parsing. It should be "robust and secure". object-oriented.1 JAVA Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. trees. and familiar".

Swing includes all the components you would expect from a modern toolkit: table controls. event handling. [34] .2 JAVA SWING Swing is the primary Java GUI widget toolkit. Swing is far from a simple component toolkit. buttons. scroll panes.  Java Naming and Directory Interface (JNDI) for lookup and discovery RMI. integrated internationalization and accessibility support. The ability to create a custom look and feel is made easier with Synth.  The integration libraries. however. Swing provides a native look and feel that emulates the look and feel of several platforms. and labels. trees. It has more powerful and flexible components than AWT. including the ability to create your own look and feel. Instead they are written entirely in Java and therefore are platform.1. a look and feel specifically designed to be customized. To truly leverage the cross-platform capabilities of the Java platform. 7. In addition to familiar components such as buttons. The term "lightweight" is used to describe such an element.-independent. customizable painting. Swing was developed to provide a more sophisticated set of GUI components than the earlier Abstract Window Toolkit (AWT). Swing provides several advanced components such as tabbed panel. Swing components are not implemented by platform-specific code. These libraries include:  The Java Database Connectivity (JDBC) API for database access. tree controls. Unlike AWT components. The Swing toolkit includes a rich set of components for building GUIs and adding interactivity to Java applications. and window management. and also supports a pluggable look and feel that allows applications to have a look and feel unrelated to the underlying platform. Swing supports numerous look and feels. It includes rich undo support. list controls. check box and labels. It is part of Oracle's Java Foundation Classes (JFC) — an API for providing a graphical user interface (GUI) for Java programs. a highly customizable text package. Swing wouldn't be a component toolkit without the basic user interface primitives such as drag and drop. tables and lists. which allow the application writer to communicate with external systems. Internationalization and localization libraries.

like many of the APIs in Java. Structured Query Language (SQL-92). The JFC also include other features important to a GUI program. the first sub protocol available is the “jdbcodbc bridge. but it generally provides a logical name that is mapped by the database administration software to a physical directory where the database tables are located. A great promise of Java has been the ability to build platform-independent client/server database applications. To open a database.2 this has come to fruition with Java DataBase Connectivity (JDBC).forName( ).3 JAVA DATABASE CONNECTIVITY (JDBC) It has been estimated that half of all software development involves client/server operations.” specified by “odbc” The database identifier. JDBC.Swing is part of the Java Foundation Classes (JFC). (The process of registration varies from platform to platform. The driver objects register themselves with the driver manager at the time of loading. create a statement and execute the query. To allow this platform independence. There is a “standard” database language. calls to the logical operations when gathering data from a database: connect to the database. we must create a “database URL” that specifies: That we’re using JDBC with “jdbc” The “sub protocol”: the name of the driver or the name of a database connectivity mechanism.1. In Java 1. This varies with the database driver used. such as the ability to add rich graphics functionality and the ability to create a program that can work in different languages and by users with different input devices.) [35] . and look at the result set. so doesn’t need to worry about the database while programming. 7. we must register the name using our database administration software. JDBC is designed to be platform-independent. and we can force the loading using Class. For our database identifier to have any meaning. JDBC provides a driver manager that dynamically maintains all the driver objects that were database queries will need. Since the design of JDBC was inspired by ODBC.

The executeQuery( ) method returns a ResultSet object. Also note that the capitalization of the field name is ignored – it doesn’t matter with an SQL database. the user name. this first call to next( ) will return false. We get back a Connection object that we can then use to query and manipulate the database. etc. When we’re ready to connect to the database. we can select the fields using (among other approaches) the field name as a string.” the database URL could be: String dbUrl = "jdbc:odbc:news". Note that we must call next( ) once before trying to read any record data. we can use the resulting Connection object to create a Statement object using the createStatement( ) method. If the result set is empty.All this information is combined into one string. Java Application JDBC-ODBC Bridge SQL Command ODBC Driver [36] Result Set . Once the connection is made with DriverManager. We determine the type we’ll get back by calling getInt( ). At this point. getFloat( ).getConnection( ). an exception is not thrown). getString( ).” For example. With the resulting Statement. which is quite a bit like an iterator: the next( ) method moves the iterator to the next record in the statement. the “database URL. and a password to get into the database.getConnection( ). passing it the database URL. or returns false if the end of the result set has been reached. we’ve got our database data in Java native format and can do whatever we want with it using ordinary Java code. we can call executeQuery( ). We’ll always get a ResultSet object back from executeQuery( ) even if a query results in an empty set (that is. For each record in the result set. we call the static method DriverManager. to connect through the ODBC sub protocol to a database identified as “people. passing in a string containing an SQL-92 standard SQL statement.

but also called "My Sequel") is the world's most widely used open source relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. [37] . It is named after co-founder Michael Widenius' daughter. now owned by Oracle Corporation. The SQL phrase stands for Structured Query Language. MySQL. The MySQL development project has made its source code available under the terms of the General Public License. Apache. LAMP is an acronym for "Linux.2 MYSQL (BACK END):- MySQL ("My S-Q-L"." Free-software-open source projects that require a full-featured database management system often use MySQL. Perl/PHP/Python. my. MySQL is a popular choice of database for use in web applications. and is a central component of the widely used LAMP open source web application software stack (and other 'AMP' stacks).DATABASE Proprietary protocol 7. officially. the Swedish company MySQL AB. as well as under a variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit firm.

CHAPTER 8 DESIGN AND DEPLOYMENT [38] .

2 ARCHITECTURE DIAGRAM:- [39] . GUI 3: This screen is the users main work area from the navigation menu the user selects for the operation to be performed and is taken to the respective domain of the project 8.1 Design of project GUI 1: Main provides the basic navigation access to the user allowing him to choose his login type as Administrator. Design and Development 8. Faculty or Student. GUI 2: Based on the users’ selection on the first screen he is navigated to the other screen on the basis of selection he/she made.8.

The main purpose of a use case diagram is to show what system functions are performed for which actor. Use Case diagrams are formally included in two modeling languages defined by the OMG: the Unified Modeling Language (UML) and the Systems Modeling Language (SysML).3 Use Case Diagram:A use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram defined by and created from a Use-case analysis. their goals (represented as use cases). Its purpose is to present a graphical overview of the functionality provided by a system in terms of actors.8. Roles of the actors in the system can be depicted. and any dependencies between those use cases. USE CASE DIAGRAM:[40] .

Use case model :For web-application: [41] .

2. So if a user registers him in any event with the option pay later and after that the person comes to the organizers and submits the fees. First is pay online and second is pay later. [42] . it will work as a flag for the payment. no of registration in particular event etc. Update the payment status: As we know that we have two payment modes. There are following use cases of the registered user: 1. View all information: This type of user can traverse the whole website and see whole information about the events in the techfest. Then administrator will update his/her payment status and an acceptance mail will be sent to the user automatically. There are following use cases of the administrative user: 1. Register in different events: There are several events in the fest he register himself for different events in the fest. Manage Daily Database: Administrator can have daily updated information of the database like no of registration. 4. Manage website: Administrator will have the responsibility to maintain the website. 3. 2. Manage user information: Administrator will have the authority to access and manage user’s information.Administrator User: This type of user will supervise the registration process and information given on the website and software. Registered user: This type of user is registered on our website means we have information about this user in our database. In the database we have put an attribute acceptance for this problem. Native user: This type of user can traverse the whole website and see information given on the website. He can also register himself on the website.

[43] . It differs from the system flowchart as it shows the flow of data through processes instead of hardware.4 Data Flow Diagram:A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system.Use Case Modal For Console Appliction 8.

There may be a single DFD for the entire system or it may be exploded into various levels. so it means the DFD doesn’t depend on the hardware. data structure or file organization. A Data Flow Diagram is logical model of the system and shows the flow of the data and the flow of logic so this all thing describes what takes place in a proposed system. Context Free Diagram First Level DFD Second Level DFD Data Flow Diagram 0-level DFD: 1-level DFD: Admin LOGIN PROCESS STUDENT [44] Co-ordinator . software. 3. 2. We have noted that the DFD describes what the flow is rather then how they are processed. 1.The DFD a way of expressing the system in a graphical format in a modular design was developed by Larry Constrains. not how the activities are accomplished. This DFD is also known as “Bubble Chart” has the purpose to classify the system requirement and to identify the major information that will be a program in system design. DFD consist of a series of symbols joined together by a line.

2-level DFD: TechFest PORTAL REGISTE R RETRY LOGIN STUDENT ADMINISTRATOR Co-ordinator MATCHED ADMINISTRAT OR UPDATE PAYMENT STATUS PARTICIPANT TRAVERS E WEBSITE MANAGE DAILY INFO MANAGE USER INFO MANAGE WEBSITE MAKE PAYMENT [45] DATABASE GET REGIST ER .

a sales rep could have no customers or could have one or many customers. within an information system. The entity is represented by a rectangle and labeled with a singular noun. verbs are used to label the relationships.  Analyze the nature of the interactions. In the example above.  Determine all significant interactions. object.5 Entity Relationship Diagram:An entity-relationship diagram is a data modeling technique that creates a graphical representation of the entities. by the line connecting the entities. if you consider the information system for a business. For example. The three main components of an ERD are:  The entity is a person. Entity Relationship Diagram Notations Peter Chen developed ERDs in 1976.8. and orders as well. place or event for which data is collected. entities would include not only customers. In either case. the customer places an order. Since then Charles Bachman and James Martin have added some slight refinements to the basic ERD principles. or mandatory The steps involved in creating an ERD are:  Identify the entities. A relationship may be represented by a diamond shape.  The cardinality defines the relationship between the entities in terms of numbers. but the customer's address. or more simply. Entity An entity is an object or concept about which you want to store information . and the relationships between entities.  The relationship is the interaction between the entities. An entity may be optional: for example. [46] . so the word "places" defines the relationship between that instance of a customer and the order or orders that they place.

distinguishing characteristic of the entity. an employee's social security number might be the employee's key attribute Multivalued attribute A multivalued attribute can have more than one value. [47] . For example. Relationships Relationships illustrate how two entities share information in the database structure. Key attribute A key attribute is the unique. For example.Weak Attributes are characteristics the of Entity properties or an entity. an employee entity can have multiple skill values.

E-R DIAGRAM: [48] .

CHAPTER 9 SNAPSHOT PORTAL [49] .

CHAPTER-10 USER MANUAL & TESTING [50] .

Step5-Write cd\rmi press enter. Step4-Now open command prompt. text pad. click on logout. Step2-Copy all the programs to ” envieonment variables “ folder into c drive and add their path with in Step3-Compile all the programs in text pad. User Manual: 10. perform all the features included in it . MYSQL. Click to enter any of the two zones(student .1.0 in the system. User Manual: Step1-Install Java. Step-7 Now Run frontpage program.2 TESTING 10. Step10-you will successfully logout from the project. give user id and password . then rmiregistry press enter.you will be login Step8-Once you are login successfully .1 PREPARATION FOR TEST DATA [51] . 10. Step6-The home page will be displayed. Step9-After doing your work. rmic AddServerImpl press enter. Step-6 Now Run AddServer Program. Administrator) Step7-In the particular zone . wamp 2.10.2.

Finally some aspects are better tested manually e.2. 10. For applications that run on a range of devices.g. including browser issues. Detecting content or behavior that may adversely affect the behavior of the device. and particularly errorprone when trying to obtain consistent. and there are numerous gaps and contradictions in the data we have which we need to sift through to determine the key issues and their likely impact. e. mundane tasks. Trying to test using all possible devices is impractical.2 OUR TESTING FOCUSGiven the vast problem space. Some types of applications can be automated relatively easily and successfully.g. Discovering and working around limitations in the software on the device. When automation is used appropriately we can be significantly more effective and reduce the overall time needed to test each software release. client applications. accurate test data may be hard to obtain. to tedious. accurate results. etc Some factors that could affect the test results may be outside our direct control. etc. Trying to multiply that testing across the rest of the factors exacerbates the problems. we need to focus our testing if we are to be effective. They may hard to even identify and therefore even harder to measure. Measuring performance of remote applications is an imperfect art. to assess the rendering of the UI on actual devices. others are more challenging e. These problems include: Finding incompatibilities ranging from not installing. to understanding what factors and issues affect the results of our testing. different versions of the underlying software. where there are lots of variations between devices and where upgrades can be expensive or difficult. When we do test. ranging from practical limitations. Once we've tested for these issues the next step is determining whether users get the most technically suitable content for their [52] . and our typically severely constrained resources. to poor rendering. network operator.g. we first want to focus on finding and addressing problems that would prevent users from being able to use the application on their device.We face various challenges inherent to testing remote applications.

easy-to-use. weaknesses. However. This is particularly relevant when the problem is related to external factors e. To quickly detect issues so they can be addressed. etc. the wow factor. while they are still intimately familiar with it. 10. Fast feedback to developers. To ensure we deliver attractive. then our users have plenty of alternatives available. client-side rendering. To have justified confidence in the quality of our software. Performance. and server-side timings. Lots of happy. an operator’s network configuration. Ideally. frequent users help show our software is successful and useful. most of the bugs would be found and fixed before the software is widely used. Providing accurate information on the quality of software is an important aspect of software testing. For example we can use combination testing techniques select our test cases and use exploratory testing techniques to help guide our testing. Here are some of the goals I've used over the years to help you identify goals that suit you and your work. Here we focus on: Usability. for internal company applications.device. we can adopt existing techniques and good practices from elsewhere in the software testing communities. For all our applications we want our users to like using them. working applications for as many users as practical.g. and communicate the results so other people understand the strengths. Fast feedback helps them to fix the code while it's still 'warm'. etc. When we test well.2.g. over-the-air transmission times. Note: we tend to make changes to our software as that’s the [53] . and the test coverage. unless we have a monopoly e. with releasing our application. there should be few surprises after deploying the software to our users.3 OUR GOALS WHEN TESTING Testing our software is a 'means to an end' – part of the journey rather than the ultimate goal. After all. measurable goals then we can keep track of how well we're doing and whether our testing is useful for the applications we're testing. risks. without testing every possible permutation! Thankfully. which is an umbrella term that includes: a user’s perception of responsiveness. Test design helps us to increase the effectiveness of each test. or a specific handset model. if we have clear.

fastest way to fix the issue from the user’s perspective. CHAPTER 11 CONCLUSION [54] . We can then work with the relevant third parties to address the underlying issues in a more considered fashion.

1 CONCLUSION We are here conclude that our project is in two part 1. Through Web site we can easily register in any technical on non technical event smoothly and through off line project which is a consol application . Online 2.11.registration are done very easily and smoothly. Almost 2000 registration are done through these application . CONCLUSION 11. Offline Both are running successfully. there is also a appreciation mail [55] .

BOOKS AND MANUALS:[56] .for over website and the console application received by the HACK PLANET pvt. they have been helping a lot in doing the project. We also convey a special thanks to all these software’s and websites. limited. BIBLIOGRAPHY We convey a special thanks to our department and to our college.

java.html [57] .com/jdk141/doc.org /  http://www. Software Engineering Principles Author : Roger. senn Tata McGraw Hill 3.html  http://www. Pressman Web Reference:URL’S :  http://www. JAVA-2 Mastering Java2 Author : John Zukowski Publisher : BPB Publications Complete Reference: Java 2. Software Engineering Concepts Author : Publisher : Fairley Tata McGraw Hill Publication.sun.S.xml. System Analysis & Designing Author : Publisher : James A.com/resources/paper.html  http://www. 4.1.apache.xmldb.org/xerces.3rd Edition.

org  http://www.w3schools. – 0915CS091084 [58] .com  http://www.com PROFILE OF GROUP MEMBERS RAGHVENDRA CHOUBEY Roll No.com/article. http://www.answers.org  http://www.com  http://www.com/images  http:// www.8982561668 Email -choubey.w3c.asp?id=11046  E-book of ROGER S PRESSMAN  http://yahooanswers.com Siddhartha Sahu Roll No. – 0915CS091063 Mob.google.raghvendra@gmail.com  http://www.campus-technology.google. .wikipedia.

com Ankita Khare Roll No.9022@gmail.9039148299 Email – sid.khare27@gmail. . – 0915CS091014 Mob. – 9039419146 Email.ankita.Mob.com [59] .