Professional Documents
Culture Documents
By (12)
M.Vivek sai rohit - 16P61A05
K.Anvesh - 17P65A0501
P. Yeshwanth Reddy - 16P61A05
2019-2020
(A UGC Autonomous Institution, Approved by AICTE, Affiliated to JNTUH,
Kukatpally
Accredited by National Board of Accreditation (NBA),
National Assessment and Accreditation Council (NAAC))
CERTIFICATE
EXTERNAL EXAMINER
DATE
DECLARATION
We would also like to express our sincere thanks to all the staff of
Computer Science and Engineering, VBIT, for their kind cooperation and
timely help during the course of our project. Finally, we would like to thank our
parents and friends who have always stood by us whenever we were in need of
them.
CONTENTS
ABSTRACT
LIST OF FIGURES
LIST OF TABLES
1. Design of test cases and database tables
LIST OF SCREENS
CHAPTER 1
INTRODUCTION
Describe introduction about your project (or)
1.1 Problem Statement
1.2. Existing system
1.3 Proposed system
CHAPTER 2
LITERATURE SURVEY
CHAPTER 3
SYSTEM ANALYSIS
3.1Feasibility Study
3.1.1 Economic Feasibility
3.1.2 Technical Feasibility
3.1.3 Social Feasibility
3.2 Systems Requirement
3.2.1 Software requirement
3.2.2 Hardware requirement
3.3 Functional Requirements (Modules)
3.4 Non-Functional Requirements
CHAPTER 4
SYSTEM DESIGN
The design part must include the following items
▪
DFDs in case of Database projects
▪
UML diagrams. This UML diagrams must include the
following
Class Diagrams
Interaction diagrams-Sequence and Collaboration
diagrams
Object Diagrams
Usecase diagrams
▪
Control Flow diagrams
▪
Database Design
For database projects, the report must include the
following items.
o E-R Diagrams
CHAPTER 5
IMPLEMENTATION
Coding /Code Templates
Consist of coding or code outline for various files
Explain each class with functionality and methods with input and
output parameters.
For Database projects, the report consisting of
o Tables – explaining all fields and their data
types
o Stored procedures (PL/SQL)
CHAPTER 6
TESTING
Design of Test Cases and Scenarios
CHAPTER 7
Output Screens
Should include all user interfaces and output screens.
INTRODUCTION
1.1.PROBLEM STATEMENT
1.2.EXISTING SYSTEM
SYSTEM ANALYSIS
2.Economic feasibility:
3. Legal feasibility:
4. Operating feasibility:
It is a measure how we are proposed system solves the problems and takes
advantages of the opportunity identify during scope definition and how it
satisfies the requirements identified the requirements analysis phase of system
development.
5. Scheduling feasibility:
3.2.2Hardware Requirements:
The Attendance Management mainly concern with the access control data, leave
master, On-line leaves application monitoring. Reports etc. The project deals with the
attendance of the students in College.
1.Admin
2.Student
Module 1: Admin
Module 2:Student
Student can check the leave balance and apply for leaves accordingly.
3.4.1 Performance :
Easy tracking of records and updating can be done. All the requirements relating to
performance characteristics of the system are specified in the section below. There are two
types of requirements.
Static Requirements:
These requirements do not impose any constraints on the execution characteristics of the
System. They are:
Number of Terminals:
The software makes use of an underlying database that will reside at the server, while the
front end will be available online to the administrative and departmental computers as well as
students and teachers.
Number of Users:
The number of users may vary, as this software finds applications in almost all department of
the organization.
Dynamic Requirements:
These specify constraints on the execution characteristics of the system. They typically
include response time and throughout of the system. Since these factors are not applicable to
the proposed software, it will suffice if the response tine is high and the transactions are
carried out precisely and quickly.
4.4.2 Reliability
The software will not be able to connect to the centralized database in the event that the
college LAN fails or in the event of the server being down due to a hardware or software
failure.
4.4.3 Availability
The software will be available only to authorized users of the colleges like teachers to mark
the students’ attendance, student to view their enrolled course, admin to add an update
students records.
4.4.4 Security The security requirements deal with the primary security. The software
should be handled only by the administrator and authorized users. Only the administrator has
right to assign permission like creating new accounts and generating password. Only
authorized users can access the system with username and password.
SYSTEM DESIGN
CLASS DIAGRAM
USECASE DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
CHAPTER 5
IMPLEMENTATION
INTRODUCTION TO JAVA
About Java:
Initially the language was called as “oak” but it was renamed as “java” in 1995.The
primary motivation of this language was the need for a platform-independent
(i.e. architectureneutral)language that could be used to create software to be
embedded in various consumer electronic devices.
Java is a programmer’s language
Java is cohesive and consistentExcept for those constraint imposed by the Internet
environment. Java gives theprogrammer, full control Finally Java is to Internet
Programming where c was to System Programming.
Importance of Java to the Internet
Java has had a profound effect on the Internet. This is because; java expands the
Universe of objects that can move about freely in Cyberspace. In a network, two
categories of objects are transmitted between the server and the personal computer.
They are passive information and Dynamic active programs. in the areas of Security
and probability. But Java addresses these concerns and by doing so, has opened the
door to an exciting new form of program called the Applet.
Applications and applets. An application is a program that runs on our Computer
under the operating system of that computer. It is more or less like one creating using
C or C++ .Java’s ability to create Applets makes it important. An Applet I san
application, designed to be transmitted over the Internet and executed by a Java-
compatible web browser. An applet I actually a tiny Java program, dynamically
downloaded across the network, just like an image.But the difference is, it is an
intelligent program, not just a media file. It can be react to the user input and
dynamically change.
Java Architecture
Java architecture provides a portable, robust, high performing environment for
development. Java provides portability by compiling the byte codes for the Java
Virtual Machine, which is then interpreted on each platform by the run-time
environment. Java is a dynamic system, able to load code when needed from a
machine in the same room or across the planet.
Compilation of code
When you compile the code, the Java compiler creates machine code (called byte
code)for a hypothetical machine called Java Virtual Machine(JVM). The JVM is
supposed texecuted the byte code. The JVM is created for the overcoming the issue
of probability.The code is written and compiled for one machine and interpreted on all
machines .This machine is called Java Virtual Machine.
Compiling and interpreting java source code.
During run-time the Java interpreter tricks the byte code file into thinking that it is
running on a Java Virtual Machine. In reality this could be an Intel Pentium windows
95 or sun SPARCstation running Solaris or Apple Macintosh running system and all
could receive code from any computer through internet and run the Applets. Source
Code PC compiler Macintosh compiler.
SPARC Compiler Java Byte code Platform independent Java interpreter Java
interpreter macintosh Java interpreter (SPARC).
About Servlets
INTRODUCTION
A Servlet Is a generic server extension. a Java class that can be loaded Dynamically to
expand the functionality of a server.Servlets are commonly used with web servers.
Where they can take the place CGI scripts.A servlet is similar to proprietary server
extension, except that it runs inside a Java Virtual Machine (JVM) on the server, so it
is safe and portable Servlets operate solely within the domain of the server.Unlike
CGI and Fast CGI, which use multiple processes to handle separate program or
separate requests, separate threads within web server process handle all servlets. This
means that servlets are all efficient and scalable.Servlets are portable; both across
operating systems and also across web servers. Java Servlets offer the best possible
platform for web application development.Servlets are used as replacement for CGI
scripts on a web server, they can extend any sort of server such as a mail server that
allows servletsextend its functionality perhaps by performing a virus scan on all
attached documents or handling mail filtering tasks.Servlets provide a Java-based
solution used to address the problems currently associated with doing server-side
programming including inextensible scripting solutions platform-specific
API’s and incomplete interface.Servlets are objects that conform to a specific
interface that can be plugged into a Java-based server.Servlets are to the server-side
what applets are to the server-side what applets are to the client-side-object byte codes
that can be dynamically loaded off the net. They differ form applets in than they are
faceless objects(with out graphics or a GUI component).They serve as platform
independent, dynamically loadable,plugable helper byte code objects on the
server side that can be used to dynamically extend server-side functionality.
For example an HTTP servlet can be used to generate dynamic HTML content when
you use servlets to do dynamic content you get the following advantages:
They’re faster and cleaner then CGI scripts. They use a standard API( the servlet API)
They provide all the advantages of Java (run on a variety of servers without needing
to be rewritten) Attractiveness of Servlets:
They are many features of servlets that make them easy and attractive to tuse these
include: Easily configure using the GUI-based Admin tool]Can be Loaded and
Invoked from a local disk or remotely across the network.
Can be linked together or chained, so that on servlet can call another servlet, or
several servlets in sequence. Can be called dynamically from within HTML, pages
using server-side include-tags. Are secure-even when downloading across the
network, the servlet security model and servlet and box protect your system from
unfriendly behavior.Advantages of the servlet API:
One of the great advantages of the servlet API is protocol independent. It assumes
nothing about:
How it is loaded
The server environment
These quantities are important, becauseembedded in many different kinds of
servers.There are other advantages to the servelt API as well These include: It’s
extensible-you can inherit all y available to you It’s simple small, maintain services
between requests. Servlets are fast. Since servlets only better performance over their
CGI counterparts. Servlets are platform independent.
Servlets are extensible Java is a ro which easily can be extended to suit your needs.
Servlets are secure.Servlets are used with a variety of client.
Servlets are classes and interfaces. javax.servlet.http.The java.servlet package
contains classes t support generic, protocol-independent servlets.The classes in the
javax.servelt.http package To and HTTP specific functionality extend these classes
Every servlet must implement the javax.servelt extending one of two
classes.javax.servlet.GenericServlet or javax.servlet.http.HttpServlet. Aprotocol-
independent servlet should subclass Generic-Servlet.while an Http servlet should
subclass Http Servlet, which is itself a subclass of Generic-servlet with added HTTP-
specific functionality. Unlike a java program, a servlet does not have a main()
method,Instead the server in the process of handling requests invoke certain methods
of a servlet.Each time the server dispatches a request to a servlet, it invokes the
servelts Service() method,A generic servlet should override its service() method to
handle requests as appropriate for the servlet. The service() accepts two parameters a
request object and a response object .The request object tells the servlet about the
request, while the response object is used to return a response.
In Contrast.anHttp servlet usually does not override the service() method.Instead it
overrides doGet() to handle GET requests and doPost() to handle Post requests. An
Http servlet can override either or both of these modules the service() method of
HttpServlet handles the setup and dispatching to all the doXXX() methods.which is
why it usually should not be overridden.
The remainders in the javax.servlet and javax.servlet.http.package are largely support
classes.The ServletRequest and ServletResponse classes in javax.servlet provide
access to generic server requests and responses while HttpServletRequest and
HttpServletResponse classes in javax.servlet provide access to generic server requests
and responses while HttpServletRequest and HttpServletResponse in
javax.servlet.http provide access a HTTP requests and responses . The
javax.servlet.http provide contains an HttpSession class that provides built-in session
tracking functionality and Cookie class that allows quickly setup and processing
HttpCookies.
Loading Servlets:
Servlets can be loaded from their places. From a directory that is on the
CLASSPATH. The CLASSPATH of the JavaWebServer includes service
root/classes/, which is where the system classes reside From the
<SERVICE_ROOT/servlets/directory.This is not in the server’s classpath. A class
loader is used to create servlets form this directory.New servlets can be added-
existing servlets can be recompiled and the server will notice these changes. From a
remote location.For this a code base like http://nine.eng/classes/foo/ is required in
addtion to the servlet’s class name.Refer to the admin Gui docs on servlet section to
see how to set this up.Loading Remote Servlets.
Remote servlets can be loaded by:Configuring the admin Tool to setup automatic
loading of remote servlets. Selectiong up server side include tags in .html files
Defining a filter chain Configuration.
About JDBC
What is JDBC?
Any relational database. One can write a single program using the JDBC API,and the
JDBC is a Java Api for executing SQL,Statements(As a point of interest JDBC is
trademarked name and is not an acronym; nevertheless,Jdbc is often thought of as
standing for Java DatabasemConnectivity. It consists of a set of classes and interfaces
written in the Java Programming language.JDBC provides a standard API for
tool/database developers and makes it possible to write database applications using a
pure Java API Using JDBC, it is easy to send SQL statements to virtually program
will be able to send SQL .statements to the appropriate database. The Combination of
Java and JDBC lets a programmer writes it once and run it anywhere.
About Oracle
Oracle is a relational database management system, which organizes data in the form
of tables. Oracle is one of many database servers based on RDBMS model, which
manages a seer of data that attends three specific things-data structures, data integrity
and datamanipulation.With oracle cooperative server technology we can realize the
benefits of open,relational systems for all the applications. Oracle makes efficient use
of all systems resources, on all hardware architecture; to deliver unmatched
performance, price performance and scalability. Any DBMS to be called as RDBMS
has to satisfy Dr.E.F.Codd’s rules.
Features of Oracle:
Portable:
The Oracle RDBMS is available on wide range of platforms ranging from PCs to
super computers and as a multi user loadable module for Novel NetWare, if you
develop application on system you can run the same application on other systems
without any modifications.
Compatible:
Oracle commands can be used for communicating with IBM DB2 mainframe
RDBMS that is different from Oracle, which is Oracle compatible with DB2. Oracle
RDBMS is a high performance fault tolerant DBMS, which is specially designed for
online transaction processing and for handling large database applications.
Multithreaded Server Architecture. Oracle adaptable multithreaded server architecture
delivers scalable high performance for very large number of users on all hardware
architecture including symmetric multiprocessors(sumps) and loosely coupled
multiprocessors. Performance is achieved by eliminating CPU, I/O,
memory and operating system bottlenecks and by optimizing the Oracle DBMS server
code to eliminate all internal bottlenecks.
Oracle has become the most popular RDBMS in the market because of its ease of use
• Client/server architecture.
• Data independence.
• Ensuring data integrity and data security.
• Managing data concurrency.
• Parallel processing support for speed up data entry and online transaction
processing used for applications.
• DB procedures, functions and packages.
Dr.E.F.Codd’s Rules
These rules are used for valuating a product to be called as relational database
management systems. Out of 12 rules, a RDBMS product should satisfy at least 8
rules + rule called rule 0 that must be satisfied.
RULE 0: Foundation Rule
For any system to be advertised as, or claimed to be relational DBMS should manage
database with in it self, with out using an external language.
RULE 1: Information Rule
All information in relational database is represented at logical level in only one way
as values in tables.
RULE 2: Guaranteed Access
Each and every data in a relational database is guaranteed to be logically accessibility
by using to a combination of table name, primary key value and column name.
RULE 3: Systematic Treatment of Null Values
Null values are supported for representing missing information and inapplicable
information. They must be handled in systematic way, independent of data types.
RULE 4: Dynamic Online Catalog based Relation Model
The database description is represented at the logical level in the same way as
ordinary data so that authorized users can apply the same relational language to its
interrogation as they do to the regular data.
RULE 5: Comprehensive Data Sub Language
A relational system may support several languages and various models of terminal
use. However there must be one language whose statement can express all of the
following: Data Definitions, View Definitions, Data Manipulations, Integrity,
Constraints, Authorization and transaction boundaries.
RULE 6: View Updating
Any view that is theoretical can be updatable if changes can be made to the tables that
effect the desired changes in the view.
RULE 7: High level Update, Insert and Delete
The capability of handling a base relational or derived relational as a single operand
applies not only retrieval of data also to its insertion, updating, and deletion.
RULE 8: Physical Data Independence
Application program and terminal activities remain logically unimpaired whenever
any changes are made in either storage representation or access method.
RULE 9: Logical Data Independence
Application programs and terminal activities remain logically unimpaired whenever
any changes are made in either storage representation or access methods.
RULE 10: Integrity Independence
Integrity constraints specific to particular database must be definable in the relational
data stored in the catalog, not in application program.
RULE 11: Distributed Independence
Whether or not a system supports database distribution, it must have a data sub-
language that can support distributed databases without changing the application
program.
About HTML
Hypertext Markup Language(HTML), the languages of the world wide
web(WWW), allows users to produces web pages that included text, graphics and
pointer to other web pages(Hyperlinks).
HTML is not a programming language but it is an application of ISO Standard
8879,SGML(Standard Generalized Markup Language),but Specialized to hypertext
and adapted to the Web. The idea behind Hypertext one point to another point. We
can navigate through the information based on out interest and preference.
A markup language is simply a series of items enclosed within the elements should be
displayed. Hyperlinks are underlined or emphasized works that load to other
documents or some portions of the same document.
Html can be used to display any type of document on the host computer, which can be
S geographically at a different location. It is a versatile language and can be used on
any platform or desktop
HTML provides tags(special codes) to make the document look attractive.
HTML provides are not case-sensitive. Using graphics,fonts,different sizes, color,
etc.. can enhance the presentation of the document. Anything
That is not a tag is part of the document it self.
Basic Html Tags:
<!-- --> Specific Comments.
<A>………</A> Creates Hypertext links.
<B>………</B> Creates hypertext links.
<Big>……..</Big> Formats text in large-font
<Body>…….</Body> contains all tags and text in the Html-document
<Center>……</Center> Creates Text
20
<DD>………..</DD> Definition of a term.
<TABLE>……</TABLE> creates table
<Td>………..</Td> indicates table data in a table.
<Tr>………..</Tr> designates a table row
<Th>……….</Th> creates a heading in a table.
ADVANTAGES
A HTML document is small and hence easy to send over the net.It is small because it
does not include formatted information.
HTML is platform independent
HTML tags are not case-sensitive.
DATA RETRIEVAL
The main mode of retrieving data from an SQL Server database is querying for it. He
query is expressed using a variant of SQL called T-SQL, a dialect Microsoft SQL
Server share with with Sybase SQL Server due to its legacy. The query declaratively
specifies what is to be retrieved. It is processed by the by the query processor, which
figures out the sequence of steps that will be necessary to retrieve the requested data.
The sequence of actions necessary to execute a query is called a query plan. There
might be multiple ways to process the same query.
For example, for a query that contains a join statement and a select statement,
executing join on both the tables and then executing select on the results would give
the same result as selecting from each table and then executing the join, but result in
different execution plans. In such case, SQL Server chooses the plan that is expected
to yeeld the results in the shortest possible time. This is called query optimization and
is performed by the query processor itself.
SQL Server also allows stored procedures to be defined. Stored procedures are
parameterized T-SQL queries, that are stored in the serve itself (and not issued by the
client application as is the case with general queries). Stored procedures can accept
values sent by the client as input parameters, and send back results as output
parameters. They can call defined function, and other stored procedures, including the
same stored procedure (up to a set number of times). They can be selectively provided
access to. Unlike other queries, stored procedures have an associate nam, which is
used at runtime to resolve into the actual queries. Also because the code need not be
sent from the client every time (as it can be accessed by name), it reduces
network traffic and some what improves performance. Execution plans for stored
procedures are also cached as necessary.
CHAPTER 6
TESTING
INTRODUCTION:
Software testing is a critical element of software quality assurance and represents the
ultimate review of specification, design and coding. In fact, testing is the one step in
the software engineering process that could be viewed as destructive rather than
constructive.
A strategy for software testing integrates software test case design methods into a
well-planned series of steps that results in the successful construction of software.
Testing is the ser of activities that can be planned in advanced and conducted
simultaneously. The underlying motivation of program testing to affirm software
quality with methods that can economically and effectively is applied to both strategic
to both large and small-scale systems.
Integration Testing:
Module integrated by moving down the program design hierarchy. Can use depth first
or breadth first top down integration verifies major control and decision points early
in design process. Top-level structure tested most. Depth first implementation allows
a complete function to be implemented, tested and demonstrated and does depth first
implementation of critical function early. Top down integration forced (to some
extend) by some development tools in program with graphical user interfaces. Begin
construction and testing with atomic modules (lowest level modules).
Bottom up integration testing as its name implies being construction and testing with
atomic modules. Because modules are integrated from the bottom up, processing
required for module subordinate to a given level is always available and the need for
stubs is eliminated.
Top-Down Integration:
Top-Down Integration testing is an incremental approach to construction of program
structure. Modules are integrated by moving download through the computer
hierarchy, beginning with the main control module.
The Top-Down integration process is performed in the following five steps:
The main control module is used as a test driver and subs are substituted for all the
components directly subordinate to the main control module.
Depending on the integration approach selected, subordinate stubs are replaced one at
a time with actual components. Tests are conducted as each component is integrated.
On completion of each of test, another stub is replaced with the real components.
Regression testing may be conducted to ensure that new errors have not been
introduced.
Bottom-Up Integration:
Bottom-Up Integration testing as its name implies, being construction as testing with
atomic modules because components are integrated from the bottom up, processing
required for components subordinate to a given level is always available and for stuns
is eliminated. The Bottom-Up Integration is performed in the following four steps:
Low-Level components are combined into clusters that perform a specific software
stub function. Driver is written to coordinate test case input and output.
The cluster is tested.
TEST PLAN 1:
Project Name: EFFECTIVE COLLABORATION WITH INFORMATION
SHARING IN
VIRTUAL UNIVERSITIES.
Module Name: STUDENT Module.
Unit Name: User Name.
Test Result: The User Name Textbox is tested and verified.
Test Plan (Unit Module/Test Integration)
Test plan for EFFECTIVE COLLABORATION WITH INFORMATION SHARING
IN
VIRTUAL UNIVERSITIES.
Unit ID: LOGIN.
Test Case ID: Login Page.
Test Type: Unit Case.
Form Name: LOGIN.
Base Table: ATTENDANCE
PURPOSE:
Registration table is used for store the details of registered members details and along
with their Username and Password. By using these details the administrator can
perform the operations.
VALIDATION TESTING:
Validation succeeds when system functions in a manner that can be reasonably by the
end-user.
This is achieved through a series of black-test that demonstrate with requirements.
There are two tests for system conduction for the system validation:
Alpha Testing.
A customer conducts it at the developer’s site. The software is used in a nature setting
with the developer “looking over the shoulder” of the user and recording errors and
usage
problems.
Beta Testing
This test is conducted at one or more users sited by the end user of the software. Here
the
developer generally not presents. Therefore, the beta test in a “line” application of the
software in an environment that can’t be controlled by the developer.
System Testing:
Once the software product is developed, it is thoroughly tested and it is delivered to
the users.
Now, it has to be tested by developing it on the system i.e., to what the given software
is
comfortable to the environment. The software engineer should consider these issues
during early
stages of software development to release himself from the problems which are
encountered after
completion of the software. Hence, the tests conducted to ensure that the software is
comfortable
with the system, where it is deployed is referred as “System Testing”.
Recovery Testing
It is often a nature fact that certain errors may corrupt the system or may make the
system
not to function properly to a stipulated period of time. Hence, recovery testing is the
process which given software id exposed to failures and it is tested to see its recovery
capabilities.
Usually the recovery can be of two types:
Automatic through human intervention.
Recovery through human intervention.
During automatic recovery the software itself recovered. Sometimes requires certain
addition support like system restart, reutilization, data recovery, etc., for tis normal
execution when the system requires human intervention in order to recover from such
recovery is referred as recovery through human intervention. Here, mean-time-to-
repair is
a value which is calculated to ensure that the software gets recovered within
acceptable
span of time.
Security testing:
Security plays a major role especially in that software. Which are made to deal with
highly confidence data. For these systems, often several hackers try their to break the
security of the system and acquire the confidential data for their foolish requirements.
Hence, for these systems, security measures should be given vital importance. For this
purpose, the testers themselves disguise into hackers and perform series of attempts to
sbreaks the security of the given software can be truly judged.
Stress Testing
Stress testing is usually performance to check the limits of the system i.e., to what
extend
the system can resists the abnormal conditions. Hence, the system is tested by
providing
abnormal resources in different proportions. During stress testing a system can be.
Providing the excess values of data in different proportions to check its memory
management capabilities i.e., how efficiently the system manages the data which is
more
than its capability.
Exposed to certain programs demanding large memory and resources not available
with
the current system.
Providing too many interrupts during a specific period of time.
Providing with too many inputs through it can survive only few inputs etc.
Performance testing
Performance testing is essential to ensure the given software performance to the
execution when it is implemented on the system. Hence, in this case it is only the
software considered but also the hardware in which it is deployed. Here, the
performance
testing is combined with the stress testing cases to check the internal aspects such as
resources utilization and various other instances.
CHAPTER 7
CONCLUSION
The package was designed in such a way that future modifications can be done easily. The
following conclusions can be deducted from the development of the project.
Automation of the entire system improves the efficiency.
It provides a friendly graphical user interface which proves to be better when compared
to the existing system.
It gives appropriate access to the authorized users depending on their permissions.
It effectively overcomes the delay in communications.
Updating of information becomes so easier.
System security, data security and reliability are the striking features.
The system has adequate scope for modifications in future if it is necessary.
This application avoids the manual work and the problems concern with it. It is an easy and fast
way to access the updates information.
(A UGC Autonomous Institution, Approved by AICTE, Affiliated to JNTUH,
Kukatpally
Accredited by National Board of Accreditation (NBA),
National Assessment and Accreditation Council(NAAC))
This is to certify that the project report titled “TITLE” is being submitted by
CH. CHAKRAVARTHI REDDY(14P61A0533), in B. Tech IV-II semester
Computer Science & Engineering is a record bonafide work carried out by
him/her. The results embodied in this report have not been submitted to any
other University for the award of any degree.
EXTERNAL EXAMINER
DATE