You are on page 1of 91

PROJECT REPORT ON

“ONLINE CASS SYSTEM”

SUBMITTED BY-
Ms.APURVA SINGH
UNDER THE GUIDANCE OF
Prof. ANU THOMAS

TO UNIVERSITY OF MUMBAI
IN PARTIAL FULFILLMENT OF
T.Y.BSc(INFORMATION TECHNOLOGY) SEM-VI
ACADEMIC YEAR 2016-2017

SIES COLLEGE, SCIENCE AND COMMERCE


NERUL, NAVI MUMBAI-400703

1
ACKNOWLEDGEMENT
We have taken efforts in this project. However, it would not have been possible
without the kind support and help of many individuals. We would like to extend our
sincere thanks to all of them.

We are highly indebted to our project guide Prof. Anu thomas for his guidance and
constant supervision as well for providing necessary information regarding the
project and also for his support in completing the project.

We would like to express our gratitude towards our parents for their kind co-
operation and encouragement which helped us in the completion of the project.

Our thanks and appreciations also go to our classmates in boosting up our confidence
and for their constant encouragement, co-operation and support and to people who
have willingly helped us out with their abilities.

Last but not the least, we would like to thank our lab assistants for permitting us
internet services and lab access.

Ms Apurva Singh

T.14.42, A-38

2
INDEX

Sr. No PARTICULARS Page No.

PRELIMINARY INVESTIGATION

1 Organization Overview. 5

2 Description Of Current System. 6

63 Limitations Of Current System. 6

4 Proposed System And Its Advantages. 7

5 Software and Hardware Requirements . 9

6 Feasibility Study. 10

7 Gantt Chart 17

SYSTEM ANALYSIS

8 Event Table 18

9 Use Case Diagram. 19

10 Activity Diagram. 22

11 Class Diagram. 27

3
12 Sequence Diagram. 30

SYSTEM
13 ER diagram. DESIGN 35

14 List of Table With Attributes And Constraints. 37

15 Deployment Diagram. 40

SYSTEM
CODING
16 Coding 43

17 Design Patterns Used. 47

18 Program List Index. 50

19 Snapshots 79

SYSTEM
TESTING
20 Testing 85

SYSTEM IMPLEMENTATION

21 Implementation and Maintenance 88

22 Future Enhancements. 89

23 Conclusion 90

24 Bibliography. 91

4
Introduction
Problem Statement
Coaching Institute Management system is aimed at developing an online institute
management website for a coaching institute.

This system is an online system that can be accessed throughout the organization and
outside as well with proper login provided.

Our system has two type of accessing modes they are administrator, staff and
student.

It is the job of the administrator to admit and monitor and work on all the process
and every operation.

The staff manages some specific operations of the Admin.

Need for Identification


As the use of technologies is increasing tremendously, manual maintenance
of database in excel sheets and papers is very difficult. Hence, the need for a
website is inevitable.

In case of manual system they need a lot of time, manpower and consume lot of
space. Here almost all work is computerized. So the accuracy is maintained.
Maintaining backup is very easy.

Purpose
The main purpose of a coaching institute management system is to reduce the job
required to manage all the information of various Students, staffs and faculties, a
new system is proposed which is processed through computers.

Scope of the project


The project covers a wide scope.
It is an administrative online solution for coaching institute that automates the
entire process of running the institution.
It offers an interactive, real-time medium to execute the functions of the institution.

5
It also gives the capability of conventionally managing all operations.
It integrates all the processes, departments, and functions of an institution by
consolidating information on a central server, making the function more organized
and stream lined, thus ensuring an increase in efficiency due to the enhanced
productivity.

Description of Current System


The current website is built using simple html. It is less scalable. The overall layout
of the website is based on <table> tags, which is not recommended by the W3C. The
current website is static. The data is redundant and less organized.

Limitations of current system


 Unattractive look with clustered data.

 Redundancy of links and data.

 Based on plain HTML and Table tags, which is very difficult to maintain and
update.

 Static webpages with data in it.

 No additional feature for student and teachers.

 Does not provide a User Friendly Environment.

 They lack in Reliable Working.

 They cause the user to function slowly in recording the Values in the Data
Base.

 Require much man power i.e. much efforts, much cost and hard to operate and
maintain.

 Since, all the work is done in papers so it is very hard to locate a particular
student record when it is required.

 Can’t extend their reach to geographically scattered students.

 No centralized data handling.

6
Existing System
The main aim of this project is to modernize the website and take it to a next level.

Advantages
 Attractive and User-friendly look.
 Improved functionality.
 Removal of redundant links and data.
 Proper classification and placement of links.
 The proposed system the user need not do all the hectic work.
 The system provides an interface with which we can easily get the work
done.
 The system provides Reliable Functionality with Data Base Handling.
 It makes the Administrator to Maintain Record easily by readymade
textbox and button option.
 Centralized data handling.
 Paperless data storage with reduced manpower.
 Operational efficiency
 Cost cutting

Product Features
 Login section for Admin/Staff and Students.
 Enquiry Registration.
 Online payment of salary.
 Daily timetable schedule.
 Notice announcement

Requirement Analysis
We are overcoming the difficulty of student details which were manual in the
current system and here we generate detailed information about the students which
will save our time to inform each and every batch and section and student profile is
maintained.

7
Functional Requirement
A student should be able to login to the system through the first page of the
application, and mention his required user name and he should get his detail
which he can view and update it. An administrator can login into his account and
he will update the details.

Non Functional Requirements:


Usability:

 This section includes all of those requirements that effect usability.


 We get the response withinseconds.
 The software must have a simple, user-friendly interface so customers
can save time andconfusion.

Compatibility:

 The software should run compatibly (i.e. under the same operating
system, database and networking capabilities) with the other subsystems
software it works together with.
 It should allow an Administrator to enroll new staffs and give them
access rights required by their duties.

Reliability and Availability:

 Any failure should cause no more than 10-minute downtime, with the
average not exceeding 2 minutes.
 Backup should spot-tested to ensure they are reliable.

Supportability:

 The system is designed to be the cross platform supportable. The


system is supported on a wide range of hardware and any software platform.
This application is being developed using xampp, hence it is
extremelyportable.
8
Performance:

 It should allow up to 5 forms to work on simultaneously.

Implementation of security mechanism:

 Login Process has proper check for authentic user to login.


 No login process shall happen until unless username and password are
provided.
 Admin can revoke registration of staff.

Interface:

 The application is developed using Windows From.

9
Feasibility Study
A feasibility analysis usually involves a thorough assessment of the
operational (need), financial and technical aspects of a proposal. Feasibility
study is the test of the system proposal made to identify whether the user
needs may be satisfied using the current software and hardware technologies,
whether the system will be cost effective from a business point of view and
whether it can be developed with the given budgetary constraints. A
feasibility study should be relatively cheap and done at the earliest possible
time. Depending on the study, the decision is made whether to go ahead with
a more detailed analysis.
When a new project is proposed, it normally goes through feasibility
assessment. Feasibility study is carried out to determine whether the
proposed system is possible to develop with available resources and what
should be the cost consideration. Facts considered in the feasibility analysis
were
 Technical Feasibility
 Economic Feasibility
 Operational Feasibility

Technical Feasibility:
Technical feasibility includes whether the technology is available in the
market for development and its availability. The assessment of technical
feasibility must be based on an outline design of system requirements in
terms of input, output, files, programs and procedures. This can be qualified
in terms of volumes of data, trends, frequency of updating, cycles of activity
etc, in order to give an introduction of technical system. Considering our
project it is technically feasible. Coaching institute management system, with
its emphasis on a more strategic decision making process is fast.

Economic Feasibility:
This feasibility study present tangible and intangible benefits from the
project by comparing the development and operational cost. The technique
of cost benefit analysis is often used as a basis for assessing economic
feasibility. This system needs some more initial investment than the existing
10
system, but it can be justifiable that it will improve quality of service.
Thus feasibility study should center along the following points:
 Improvement resulting over the existing method in terms of accuracy,
timeliness.
 Cost comparison
 Estimate on the life expectancy of thehardware.
 Overall objective.
My project is economically feasible. It does not require much cost to be
involved in the overall process. The overall objective is in easing out the
recruitment processes.

Operational Feasibility:
This analysis involves how it will work when it is installed and the
assessment of managerial environment in which it is implemented. People
are inherently resistant to change and computers have been known to
facilitate change. The new proposed system is very much useful to the
users and therefore it will accept broad audience from around the world.

11
Software Engineering applied

The two main programming approaches are top-down approach and bottom-up
approaches. In bottom up method, the sub modules are designed and developed and
these are assembled together to get the main system. The individual modules are
coded and debugged with example data given checks ready for the major project
design. The individual module transaction processing can be checked thoroughly so
that minute mistakes and correction can be passed from one module to other when
required and these requisition are also considered at the development stage of code
module. These checked and corrected modules will be integrated to make the entire
system. This project also followed the bottom up design. The sub modules are
prepared very keenly and minute notations are made. In the online admission
system, the sub modules are designed first, these sub modules are integrated into
main modules. Other modules also designed in the same fashion.
Each module is tested at the beginning when they are integrated with the sub-
modules these checked and corrected modules are integrated to make the main
system, i.e. Coaching Institute Management system.

12
Requirement Specification
The final output is the requirements specification document (SRS).For
smaller problems or problems that can easily be comprehended; the
specification activity might come after the entire analysis is complete.
However, it is more likely that problem analysis and specification are done
concurrently. All the information for specification activity as following the
analysis activity. The transition from analysis to specification should also not
be expected to be straightforward, even if some formal modeling is used
during analysis. Essentially, what passes from requirements analysis activity
to the specification activity is the knowledge acquired about the system. The
modeling is essentially a tool to help obtain a thorough and complete
knowledge about the proposed system.

Analysis of Factual Data:


Analysis of data is a process of inspecting, cleaning, transforming, and
modeling data with the goal of highlighting useful information, suggesting
conclusions, and supporting decision making. Data analysis has multiple
facets and approaches, encompassing diverse techniques under a variety of
names, in different business, science, and social science domains. Data
mining is a particular data analysis technique that focuses on modeling and
knowledge discovery for predictive rather than purely descriptive purposes.

Identification of Essential Requirement:


Identification of essential requirement is an important task in developing the
project. In this system the essential requirements are identified through
surveying. By surveying, the important needs of the user in our website are
known. In the surveying, the different possibilities of tour information that
have to be included in the website are given by questionnaire.

13
Selection of Requirement Strategies:
From the survey analysis graph it is clear that which are all the requirements
that the user requires the most. It is decided to include the required
information and omit the less priority ones.

Objective of SRS
The objective of this SRS document is to specify software requirements of
the Online Admission for the college. It is intended to be a complete
specification of what functionality the admission provides. The main purpose
of the system is to automate the task carried out by different peoples in the
organization to perform the student admission. Specific design and
implementation details will be specified in a further document.

Overview of SRS
SRS will include two sections.

 Overall Description will describe major components of the system,


interconnection and external interfaces.
 Specific Requirements will describe the functions of actors, their role
in the system and constraints.

Overall Description
The SRS document will give further details on the overall product
description, including the hardware, software, and communications
interfaces, product functions, user characteristics, and any assumptions that
will be made.

Specific Requirements

14
The SRS document will also include the specific requirements needed. These
will include the functions, performance, design, and software attributes. This
document is organized in a logical manner and is easy to follow. Readers
should refer to the table of contents, appendices, or index if looking for
something in specific. Otherwise, reading this document from start to finish
will start with a vague description and get more specific and detailed as
changing sections and reading further.

Software and Hardware Requirements

Hardware Requirements:

 System: Multimedia PC
 Processor: Pentium 4 or above
 Memory: 512MB RAM
 Hard Disk: 80GB or above
 Keyboard: 104 standards
 Monitor: SVGA
 Modem: Dial up/Broadband

Software Requirements:

 Front end: PHP, HTML, CSS, JavaScript


 Back end: MYSQL
 Operating System: Windows

15
Methodology adopted:
 Object oriented approach since the components created can be reused
later on in other Sub-systems. Scalability and Reliability also makes it
towards object orientation.
 So the requirement specifications are to be done with UML diagrams
for the front– end and processing which consists of -
1. Use case diagrams
2. Activity diagrams
3. Sequence diagrams
4. Class diagram
5. An E-R model will help to incorporate the information storage in the
form of relational tables in the chosen ORDBMS environment.
The overall methodology and description constitutes the SRS of the system.

16
GANTT CHART
A timeline chart can be developed for the entire project. Alternatively,
separate charts can be developed for each project function or for each
individual working on the project. When multiple bars occur at the same
time on the calendar, task concurrency is implied. The diamonds indicate
milestones. Once the information necessary for the generation of a timeline
chart has been input, the majority of software project scheduling tools
produce project tables a tabular listing of all project tasks, their planned and
actual start- and end-dates, and a variety of related information. Used in
conjunction with the timeline chart, project tables enable the project manager
to track progress.

17
SYSTEM ANALYSIS
Event Table
Sr Event Triggers Source Activity Response Destination
no name

1 new register Visitor Send details Enquiry Admin


enquiry request to admin successful
register
2 admin Login Admin verify login redirect to Admin
login Request information admin page
3 Create Create Admin Add data to Show Staff
Staff Request database, confirmation
provide login
4 Create Create Admin, Add data to Show Admin, staff
Faculty Request staff database confirmation
5 Create Create Admin Add data to Show Staff
Student Request database, confirmation
provide login
6 View view Admin, Fetch data show Admin, student,
Lectures request student, from confirmation staff
staff database
7 Update Update Admin, Update show display lectures
lectures request staff lectures confirmation
8 Update Update Admin, Update show display notice
notice request staff notice confirmation
9 Update Update Admin Update show mail
password request password confirmation
10 Delete Delete Admin Delete data Show admin
teacher, request from confirmation
staff database
11 Pay Payment Admin Pay balance Show admin
salary to request from account confirmation
staff

18
Use Case Diagrams
A use case diagram at its simplest is a representation of a user's interaction
with the system that shows the relationship between the user and the
different use cases in which the user is involved. A use case diagram can
identify the different types of users of a system and the different use cases
and will often be accompanied by other types of diagrams as well.

Basic Use Case Diagram Symbols and Notations

 System: Draw your system's boundaries using a rectangle that contains use cases.
Place actors outside the system's boundaries.

 Use Case: Draw use cases using ovals. Label the ovals with verbs that represent the
system's functions.

 Actors: Actors are the users of a system. When one system is the Actor of another
system, label the actor system with the actor Stereotype.

 Relationships: Illustrate relationships between an actor and a use case with a simple
line. For relationships among use Cases, use arrows labeled either "uses" or
"extends." A "uses" relationship indicates that one use case is needed by another in
order to perform a task. An "extends" relationship indicates alternative options under
a certain use case.

19
Use Case Diagram for Coaching Institute Management System
Admin and staff:

20
Student:

21
Activity Diagram
An activity diagram visually presents a series of actions or flow of control in
a system similar to a flowchart or a data flow diagram. Activity diagrams are
often used in business process modeling. They can also describe the steps in
a use case diagram. Activities modeled can be sequential and concurrent. In
both cases an activity diagram will have a beginning and an end.

Basic Activity Diagram Notations and Symbols

 Initial State or Start Point: A small filled circle followed by an


arrow represents the initial action state or the start point for
any activity diagram. For activity diagram using swim lanes,
make sure the start point is placed in the top left corner of the
first column.

 Activity or Action State: An action state represents the


non-interruptible action of objects. You can draw an
action state using a rectangle with rounded corners.

 Action Flow: Action flows, also called edges and paths,


illustrate the transitions from one action state to another.
They are usually drawn with an arrowed line.

 Object Flow: Object flow refers to the creation and modification


of objects by activities. An object flow arrow from an action to an
object means that the action creates or influences the object.
An object flow arrow from an object to an action indicates that
the action state uses the object.

 Decisions and Branching: A diamond represents a decision with


alternate paths. When an activity requires a decision prior to
22
moving on to the next activity, add a diamond between the
two activities. The outgoing alternates should be labeled with
a condition or guard expression. You can also label one of the paths "else."

 Synchronization: A fork node is used to split a single incoming flow into multiple
concurrent flows. It is represented as a straight, slightly thicker line in an activity
diagram. A join node joins multiple concurrent flows back into a single outgoing
flow. A fork and join mode used together are often referred to as synchronization.

 Guards: In UML, guards are a statement written next to a decision diamond that
must be true before moving next to the next activity. These are not essential, but are
useful when a specific answer, such as "Yes, three labels are printed," is needed
before moving forward.

 Final State or End Point: An arrow pointing to a filled circle nested


inside another circle represents the final action state.

23
Activity Diagram for Coaching Institute Management System
Admin:

24
Staff:

25
Student:

26
Class Diagram
In software engineering, a class diagram in the Unified Modeling Language
(UML) is a type of static structure diagram that describes the structure of a system
by showing the system's classes, their attributes, operations (or methods), and the
relationships among objects.

Basic Class Diagram Symbols and Notations

 Classes: Classes represent an abstraction of entities with


common characteristics. Associations represent the
relationships between classes. Illustrate classes with
rectangles divided into compartments. Place the name
of the class in the first partition (centered, bolded, and capitalized),
list the attributes in the second partition
(left-aligned, not bolded, and lowercase),andwrite operations into
the third.

 Active Classes: Active classes initiate and control the flow of


activity, while passive classes store data and serve other classes.
Illustrate active classes with a thicker border.

 Visibility: Use visibility markers to signify who can access the


information contained within a class. Private visibility, denoted
with a - sign, hides information from anything outside the class
partition. Public visibility, denoted with a + sign, allows all other
classes to view the marked information. Protected visibility,
denoted with a # sign, allows child classes to access information
they inherited from a parent class.
 Associations: Associations represent static relationships
between classes. Place association names above,
on, or below the association line. Use a filled
arrow to indicate the direction of the
27
relationship. Place roles near the end of an
association. Role represent the way the two
classes see each other.
 Multiplicity (Cardinality): Place multiplicity notations near the ends of an
association. These symbols indicate the number of instances of one class linked to
one instance of the other class. For example, one company will have one or more
employees, but each employee works for just one company.

 Generalization: Generalization is another name for inheritance or an "is a"


relationship. It refers to a relationship between two classes where one class is a
specialized version of another. For example, Honda is a type of car. So the class
Honda would have a generalization relationship with the class car.

28
Class Diagram for Online Admission System

29
Sequence Diagram

Sequence diagrams describe interactions among classes in terms of an


exchange of messages over time. They're also called event diagrams. A
sequence diagram is a good way to visualize and validate various runtime
scenarios. These can help to predict how a system will behave and to
discover responsibilities a class may need to have in the process of modeling
a new system.

Login:

30
Logout:

31
Admin:

32
Staff:

33
SYSTEM DESIGN
The most creative and challenging face of the system development is System
Design. It provides the understanding and procedural details necessary for
the logical and physical stages of development. In designing a new system,
the system analyst must have a clear understanding of the objectives, which
the design is aiming to fulfill. The first step is to determine how the output is
to be produced and in what format. Second, input data and master files have
to be designed to meet the requirements of the proposed output. The
operational phases are handled through program construction and testing.

Design of the system can be defined as a process of applying various


techniques and principles for the purpose of defining a device, a process or a
system in sufficient detail to permit its physical realization. Thus system
design is a solution to “how to” approach to the creation of a new system.
This important phase provides the understanding and the procedural details
necessary for implementing the system recommended in the feasibility
study. The design step provides a data design, architectural design, and a
procedural design.

34
ER Diagram
An entity–relationship model (ER model) is a data model for describing the data
or information aspects of its process requirements, in an abstract way that lends
itself to ultimately being implemented in a database such as a relational
database. The main components of ER models are entities (things) and the
relationships that can exist among them.

An entity relationship diagram is a means of visualizing how the information a


system produces is related. There are five main components of an ERD:

 Entities which are represented by rectangles, An entity is an object


or concept about which you want to store information.

 Weak entity is an entity that must defined by a foreign key


Relationship with Another entity as it cannot be uniquely identified
by its own attributes alone.
 Actions which are represented by diamond shapes, show how
Two entities share information in the database.
 Attributes, which are represented by ovals. A key attribute is the unique,
Distinguishing characteristic of the entity.

 Connecting lines, solid lines that connect attributes to show


the Relationships of entities in thediagram.
 Cardinality specifies how many instances of an entity
relate toone Instance of another entity. Ordinality is also
closely linked to cardinality.While cardinality specifies
the occurrences of a relationship, ordinality Describes
the relationship as either mandatory or optional. In other
words, cardinality specifies the maximum number of
relationships And ordinality specifies the absolute minimum
number of relationships.

35
ER Diagram for Coaching Institute Management System:

36
Database Tables with attributes and constraints
Table name Fields Data type Constraints
Admin Id int(11) Not Null, PRIMARY
KEY,
AUTO_INCREMENT
Name varchar(30) Not Null,
Password varchar(100) Not Null,

admission_taken Id int(11) Not Null, PRIMARY


KEY,
AUTO_INCREMENT
form_id varchar(25) Not Null,
Std varchar(100) Not Null,
Year varchar(100) Not Null,
Name varchar(100) Not Null,
Dob varchar(100) Not Null,
Gender varchar(100) Not Null,
maths_marks varchar(100) Not Null
science_marks varchar(30) Not Null
Overall varchar(20) Not Null
s_email varchar(100) Not Null,
p_email varchar(100) Not Null,
Address varchar(100) Not Null,
contact_no Int(10) Notnull,
school_college_name varchar(100) Not Null,
g_name varchar(100) Not Null,
g_occupation varchar(100) Not Null,
g_contact_no Int(10) Notnull,

cet_lect Id int(11) Not Null, PRIMARY


KEY,
AUTO_INCREMENT
batch_timing varchar(100) Not Null,
lecture_1 varchar(100) Not Null,
lecture_2 varchar(100) Not Null,
Subject varchar(100) Not Null,
subject1 varchar(100) Not Null,
Orderby int(11) Not Null
37
eleven_lecture Id int(11) Not Null, PRIMARY
KEY,
AUTO_INCREMENT
batch_timing varchar(100) Not Null,
lecture_1 varchar(100) Not Null,
lecture_2 varchar(100) Not Null,
Subject varchar(100) Not Null,
subject1 varchar(100) Not Null,
Orderby int(11) Not Null

enquiry Id int(11) Not Null, PRIMARY


KEY,
AUTO_INCREMENT
Name varchar(100) Not Null,
Dob varchar(100) Not Null,
Gender varchar(100) Not Null,
Address varchar(100) Not Null,
email_id_student varchar(100) Not Null,
email_id_parent varchar(100) Not Null,
contact_no Int(10) Notnull,
school_college_name varchar(100) Not Null,
Std varchar(100) Not Null,
came_about_us varchar(100) Not Null,

notice Id int(11) Not Null, PRIMARY


KEY,
AUTO_INCREMENT
Message varchar(500) Not null,

payment_details Id int(11) Not Null, PRIMARY


KEY,
AUTO_INCREMENT
Name varchar(100) Not Null,
email_id varchar(100) Not Null,
Payment Int(10) Notnull,
Paid varchar(100) Not Null,

38
staff_login Id int(11) Not Null, PRIMARY
KEY,
AUTO_INCREMENT
Name varchar(100) Not Null,
contact_no Int(10) Notnull,
Email varchar(100) Not Null,
Password varchar(100) Not Null,

state_bank Id int(11) Not Null, PRIMARY


KEY,
AUTO_INCREMENT
Name varchar(100) Not Null,
Email varchar(100) Not Null,
Balance Int(10) Notnull,

student_login Id int(11) Not Null, PRIMARY


KEY,
AUTO_INCREMENT
Name varchar(100) Not Null,
Email varchar(100) Not Null,
Password varchar(100) Not Null,

twelve_lecture Id int(11) Not Null, PRIMARY


KEY,
AUTO_INCREMENT
batch_timing varchar Not Null
lecture_1 varchar Not Null,
lecture_2 varchar Not Null,
Subject varchar Not Null,
subject1 varchar Not Null,
Orderby int(11) Not Null

39
Deployment Diagram
Deployment diagrams are useful for system engineers. An efficient deployment
diagram is very important because it controls the following parameters
 Performance
 Scalability
 Maintainability
 Portability

So before drawing a deployment diagram the following artifacts should be


identified:

 Nodes

 Relationships among nodes

The application is assumed to be a web based application which is deployed in a


clustered environment using server 1, server 2 and server 3. The user is connecting
to the application using internet. The control is flowing from the caching server to
the clustered environment.

40
41
Coding
A code is an ordered collection symbols to provide unique identification of data.
Codes can be used by people who do not with data processing; the following are
characters of a good code generation. Characteristics of good coding are

 Uniqueness
 Meaningfulness
 Stability
 Uniform Size and Format
 Simplicity
 Conciseness
 Versatility
The goal of the coding or programming phase is to translate the design of the system
produced during the design phase into code in a given programming language, which
can be executed by a computer and that performs the computation specified by the
design. The coding phase affects both testing and maintenance profoundly. As we
saw earlier, the time spent in coding is a small percentage of the total software cost,
while testing and maintenance consume the major percentage. Thus it should be clear
the goal during coding should not be to reduce the implementation cost, but the goal
should be to reduce the cost of later phases, even if it means that the cost of this
phase has to increase. In other words, the goal during this phase is not to simplify the
job of the programmer. Rather the goal should be to simplify the job of the tester and
the maintainer.

42
Code Efficiency
Correctness
The tester and the maintainer are not the programmers itself. Therefore it is very
important to produce correct and simple code. The code for the proposed system is
correct and simple. Anyone who knows HTML and PHP can understand the code
very easily.

Reliability
The program must be reliable, that is, it must be execute reliably in a variety of
systems. The code for proposed system is consistent.

Robustness

The robustness of the code is associated with memory management and exception
handling. Since he proposed system is developed with HTML this feature is not
ensured profoundly.

Development Efficiency

The PHP ensures development efficiency by providing compatibility with almost


all web servers used today. Extending PHP is pretty easy. It is a full-fledged
development environment consisting of a several megabytes of source code. PHP
scripts are browser neutral, the script cannot be captured via a browsers View
Source capabilities.

Execution Efficiency

PHP is easy to learn and runs efficiently and quickly on any compatible web
server. The PHP is a parsed language. The parsers which execute PHP produce the
desired result as HTML code. The code written for the proposed system consists of
many PHP files which execute on the web server and return output as HTML to the
browser.

43
Technology Specification
PHP (Hypertext Preprocessor)
PHP, which stands for "PHP: Hypertext Preprocessor" is a widely-used Open
Source general-purpose scripting language that is especially suited for Web
development and can be embedded into HTML. Its syntax draws upon C, Java, and
Perl, and is easy to learn. The main goal of the language is to allow web developers
to write dynamically generated web pages quickly, but you can do much more with
PHP.

Security
PHP is a powerful language and the interpreter, whether included in a web server
as a module or executed as a separate CGI binary, is able to access files, execute
commands and open network connections on the server. These properties make
anything run on a web server insecure by default. PHP is designed specifically to
be a more secure language for writing CGI programs than Perl or C, and with
correct selection of compile-time and runtime configuration options, and proper
coding practices, it can give you exactly the combination of freedom and security
you need. As there are many different ways of utilizing PHP, there are many
configuration options controlling its behavior. A large selection of options
guarantees you can use PHP for a lot of purposes, but it also means there are
combinations of these options and server configurations that result in an insecure
setup. The configuration flexibility of PHP is equally rivaled by the code
flexibility. PHP can be used to build complete server applications, with all the
power of a shell user, or it can be used for simple server-side includes with little
risk in a tightly controlled environment. How you build that environment, and how
secure it is, is largely up to the PHP developer.

Features
PHP manages freeing all resources. Users do not required to free file handle
resource, database resources, memory, etc, unless programmer need to free
resource during script execution. All resources are released after script
executionPHP4 also have reference count feature. For example, memory for

44
variables is shared when it assigned to other variable. If contents have been
changed, PHP4 allocate new memory for it. Programmer does not have to use pass
by reference for large parameters for better performance with PHP4.It would be a
nice section for new PHP users, if there is "Resource Handling" section or like.
Explanation about reference count feature in PHP4 would be very helpful to write
better PHP4 scripts also.

My SQL
My SQL query () sends a unique query (multiple queries are not supported) to the
currently active database on the server that's associated with the specified link
identifier. The query string should not end with a semicolon. If the link identifier
is not specified, the last link opened by My SQLconnection is assumed. If no
such link is found, it will try to create one as if mysql_connect () was called with
no arguments. If by chance no connection is found or established, an
E_WARNING level warning is generated.

45
Optimization of Code
Code optimization aims at improving execution efficiency of a program. This is
achieved in two ways:

 Redundancies in a program are eliminated.


 Computations in a program are rearranged or rewritten to make it execute
efficiently.

The optimization must not change the meaning of a program. The Event
Management system optimizes the code by using the optimization techniques such
as dead code elimination and frequency reduction. Thus improves the execution
efficiency.

Validation Checks
Validation means observing the behavior of the system. The verification and
validation means that will ensure that the output of a phase is consistent with its
input and that the output of the phase is consistent with the overall requirements of
the system. This is done to ensure that it is consistent with the required output. If
not we apply certain mechanisms for repairing and thereby achieved the
requirement.

46
Design Pattern used
Two tier Architecture:
 In this system 2 tier architecture is implemented.
 The direct communication takes place between client and server.
 There is no intermediate between client and server.
 The 2 tiers of two tier architecture are:
 Database (Data tier)
 Client Application (Client tier)
 Advantage is:
 Understanding and maintenance is easier.
 For better performance this system will be made to follow Three Tier
Architecture in future.

47
Admin Login:
<?php
session_start();
include_once 'dbconnect.php';

if(isset($_SESSION['user'])!="")
{
header("Location: index.php");
}

if(isset($_POST['btn-login']))
{
$email = mysql_real_escape_string($_POST['email']);
$upass = mysql_real_escape_string($_POST['pass']);

$email = trim($email);
$upass = trim($upass);

$res=mysql_query("SELECT name, password FROM admin WHERE


name='$email'");
$row=mysql_fetch_array($res);

$count = mysql_num_rows($res);

48
if($count == 1 && $row['password']==md5($upass))
{
$_SESSION['email']=$email;
$_SESSION['check']='admin';

header("Location: notice_update.php");
}
else
{
?>
<script>alert('Username / Password Seems Wrong !');</script>
<?php
}

}
?>
<?php
if(isset($_SESSION['email']))
{
include_once "include/online_nav.php";

}
else
{
include_once "include/admin_off_nav.php";

49
}
?>

Admission Form:
<?php
session_start();
include_once 'dbconnect.php';

if(isset($_SESSION['user'])!="")
{
header("Location: index.php");
}
if(isset($_POST['submit']))
{
$form_id=$_POST['form_id'];
$std=$_POST['std'];
$year=$_POST['year'];
$name=$_POST['fname'];
$date=$_POST['date'];
$sex=$_POST['sex'];
$maths=$_POST['maths'];
$science=$_POST['science'];
$overall=$_POST['overall'];
$s_email=$_POST['s_email'];
$p_email=$_POST['p_email'];

50
$add=$_POST['add'];
$number=$_POST['number'];
$s_c_name=$_POST['s_c_name'];
$g_name=$_POST['g_name'];
$g_occupation=$_POST['g_occupation'];
$g_number=$_POST['g_number'];

$std=trim($std);
$year=trim($year);
$name=trim($name);

$sex=trim($sex);
$maths=trim($maths);
$science=trim($science);
$overall=trim($overall);
$s_email=trim($s_email);
$p_email=trim($p_email);
$add=trim($add);
$number=trim($number);
$s_c_name=trim($s_c_name);
$g_name=trim($g_name);
$g_occupation=trim($g_occupation);
$g_number=trim($g_number);

51
if(empty($std))
{
echo '<script type="text/javascript"> alert("please enter the
Std");</script>';

}
else if(empty($year))
{
echo '<script type="text/javascript"> alert("please enter the Year
");</script>';

}
else if(empty($name))
{
echo '<script type="text/javascript"> alert("please enter the Name of
student ");</script>';

}
else if(empty($sex))
{

echo '<script type="text/javascript"> alert("please select the


gender");</script>';
52
}
else if(empty($maths))
{

echo '<script type="text/javascript"> alert("please enter the maths


marks");</script>';

}
else if(empty($science))
{

echo '<script type="text/javascript"> alert("please enter the science


marks");</script>';

}
else if(empty($overall))
{

echo '<script type="text/javascript"> alert("please enter overall %


");</script>';

}
else if(empty($s_email))
{

53
echo '<script type="text/javascript"> alert("please enter student email
id ");</script>';

}
else if(empty($p_email))
{

echo '<script type="text/javascript"> alert("please enter student parent


email id ");</script>';

}
else if(empty($add))
{

echo '<script type="text/javascript"> alert("please enter Address


");</script>';

}
else if(empty($number))
{

echo '<script type="text/javascript"> alert("please enter Number


");</script>';

}
else if(empty($s_c_name))
{
54
echo '<script type="text/javascript"> alert("please enter school/college
name");</script>';

}
else if(empty($g_name))
{

echo '<script type="text/javascript"> alert("please enter Guardian


names ");</script>';

}
else if(empty($g_occupation))
{

echo '<script type="text/javascript"> alert("please enter Guardian


occupation ");</script>';

}
else if(empty($g_number))
{

echo '<script type="text/javascript"> alert("please enter Guardian


number ");</script>';

}
else if($number==$g_number)
55
{
echo '<script type="text/javascript"> alert("your number
and Guardian number should different ");</script>';

else if (!preg_match("/^[a-zA-Z ]*$/",$name)) {


echo '<script type="text/javascript"> alert("Only letters allowed student name
");</script>';

}
else if (!preg_match("/^[a-zA-Z ]*$/",$g_name)) {
echo '<script type="text/javascript"> alert("Only letters allowed Guardian name
");</script>';

else
{
$select="select * from admission_taken where s_email='$s_email' ";
$row=mysql_query($select);
$rows=mysql_num_rows($row);
if($rows>0)

56
{
echo '<script type="text/javascript"> alert("Student email is
register .try another ");</script>';

}
else
{

$insert="INSERT INTO `admission_taken`(`id`, `form_id`, `std`,


`year`, `name`, `dob`, `gender`, `maths_marks`, `science_marks`, `overall`,
`s_email`, `p_email`, `address`, `contact_no`, `school_college_name`, `g_name`,
`g_occupation`, `g_contact_no`) VALUES
('','$form_id','$std','$year','$name','$date','$sex','$maths','$science','$overall','$s_email
','$p_email','$add','$number','$s_c_name','$g_name','$g_occupation','$g_number')";
if(mysql_query($insert))
{
$create_pass='forwardclass';
$stringss="1234567890";
$pass=substr(str_shuffle($stringss),1,5);
require 'phpmailer/PHPMailerAutoload.php';

$mail = new PHPMailer;


$send_email=$s_email;
$send_email2=$p_email;
$mail->SMTPDebug = false;
// Enable verbose debug output

57
$mail->isSMTP(); //
Set mailer to use SMTP
$mail->Host = "smtp.gmail.com"; // Specify
main and backup SMTP servers
$mail->SMTPAuth = true;
// Enable SMTP authentication
$mail->Username =
'siescollegeacsn@gmail.com'; // SMTP username
$mail->Password = 'siesascn';
// SMTP password
$mail->SMTPSecure = 'SSL'; //
Enable TLS encryption, `ssl` also accepted
$mail->Port = 587; //
TCP port to connect to

$mail->setFrom('siescollegeacsn@gmail.com',
'Forward Class');
$mail->addAddress($send_email, ''); // Add
a recipient
$mail->addAddress($send_email2, ''); //
Add a recipient
$mail->addReplyTo($send_email,
'Information');
$mail->addCC($send_email);
$mail->addBCC('bcc@example.com');

$mail->isHTML(true);

58
$mail->Subject = 'ID & Password';
$mail->Body = 'ID :- '.$s_email.'<br>
Password :- '.$create_pass.$pass;

if(!$mail->send())
{
echo "Mailer Error: " . $mail-
>ErrorInfo;
}
else
{
include_once 'dbconnect.php';
$passcreate=md5($create_pass.$pass);
$student_log_create="INSERT INTO
`student_login`(`id`, `name`, `email`, `password`) VALUES
('','$name','$s_email','$passcreate')";
mysql_query($student_log_create);
echo ' <script type="text/javascript">
alert("Student ID & password is created ");</script>';
echo ' <script type="text/javascript">
alert("We sending the ID & password to student");</script>';
echo ' <script type="text/javascript">
alert("admission form_ created success");</script>';
echo '<script>
window.open("admission_form.php","_self");</script>';
}

59
}
else
{
echo ' <script type="text/javascript"> alert("something is gone
wrong!!");</script>';
echo ' <script>
window.open("admission_form.php","_self");</script>';

60
Enquiry:
<?php
session_start();
include_once 'dbconnect.php';

if(isset($_SESSION['user'])!="")
{
header("Location: index.php");
}
if(isset($_POST['submit']))
{
$name=$_POST['fname'];
$date=$_POST['date'];
$sex=$_POST['sex'];
$add=$_POST['add'];
$semail=$_POST['semail'];
$pemail=$_POST['pemail'];
$number=$_POST['number'];
$s_c_name=$_POST['s_c_name'];
$optradio=$_POST['optradio'];
$std=$_POST['std'];

$name=trim($name);

$sex=trim($sex);

61
$add=trim($add);
$semail=trim($semail);
$pemail=trim($pemail);
$number=trim($number);
$s_c_name=trim($s_c_name);
$optradio=trim($optradio);
$std=trim($std);

if(empty($name))
{
echo '<script type="text/javascript"> alert("please enter the
name");</script>';

}
else if(empty($sex))
{
echo '<script type="text/javascript"> alert("please select the gender
");</script>';

}
else if(empty($add))
{

62
echo '<script type="text/javascript"> alert("please enter the Address
");</script>';

}
else if(empty($semail))
{

echo '<script type="text/javascript"> alert("please enter the Student


email id");</script>';

}
else if(empty($pemail))
{

echo '<script type="text/javascript"> alert("please enter parent email


id");</script>';

}
else if(empty($number))
{

echo '<script type="text/javascript"> alert("please enter the Contact


Number");</script>';

}
else if(empty($s_c_name))
63
{

echo '<script type="text/javascript"> alert("please enter School/college


name");</script>';

}
else if(empty($optradio))
{

echo '<script type="text/javascript"> alert("How you came to know


about us .select one atlest ");</script>';

}
else if(empty($std))
{

echo '<script type="text/javascript"> alert("Std .select one atleast


");</script>';

else
{

64
$select="select * from enquiry where contact_no='$number' ";
$row=mysql_query($select);
$rows=mysql_num_rows($row);
if($rows>0)
{
echo '<script type="text/javascript"> alert("This contact number
already enquired ");</script>';

}
else
{
$insert="INSERT INTO `enquiry`(`id`, `name`, `dob`, `gender`,
`address`, `email_id_student`, `email_id_parent`, `contact_no`,
`school_college_name`,`std`, `came_about_us`) VALUES
('','$name','$date','$sex','$add','$semail','$pemail','$number','$s_c_name','$std','$optra
dio') ";
if(mysql_query($insert))
{
echo ' <script type="text/javascript"> alert("Soon We will contact
your");</script>';
echo ' <script> window.open("index.php","_self");</script>';
}
else
{
echo ' <script type="text/javascript"> alert("something is gone
wrong!!");</script>';
echo ' <script> window.open("index.php","_self");</script>';
65
}

Lecture Update:
<?php
session_start();
include_once 'dbconnect.php';

if(isset($_SESSION['user'])!="")
{
header("Location: index.php");
}
if(isset($_POST['submit']))
{
$batch_time=$_POST['batch_time'];
$lecture=$_POST['lecture'];

66
$subject=$_POST['subject'];
if($lecture=='lecture_1')
{
$subjectt="subject";

}
else
{
$subjectt="subject1";

}
$update="UPDATE `twelve_lecture` SET `$subjectt`='$subject' WHERE
batch_timing='$batch_time' ";
if(mysql_query($update))
{
echo ' <script type="text/javascript"> alert("Lecture is update");</script>';
header("location:lecture_update.php");
}
else
{
echo ' <script type="text/javascript"> alert("something is gone
wrong!!");</script>';
echo ' <script type="text/javascript">
window.open("lecture_update.php","_self");</script>';
}
}

67
Payment:
<?php
include_once 'dbconnect.php';
if(isset($_GET['submit']))
{
$name=$_GET['name'];
$email=$_GET['email'];
$payment=$_GET['payment'];
$update="UPDATE `payment_detail` SET `paid`='yes' WHERE
email_id='$email'";
mysql_query($update);
$update2="select *from state_bank where id=1";
$row=mysql_query($update2);
$rows=mysql_fetch_array($row);
$balance=$rows['balance'];
$balance=$balance-$payment;
$update3="UPDATE `state_bank` SET `balance`='$balance' WHERE id=1";
mysql_query($update3);
require 'phpmailer/PHPMailerAutoload.php';

$mail = new PHPMailer;

$send_email=$email;
$mail->SMTPDebug = false;
// Enable verbose debug output

68
$mail->isSMTP(); //
Set mailer to use SMTP
$mail->Host = "smtp.gmail.com"; // Specify
main and backup SMTP servers
$mail->SMTPAuth = true;
// Enable SMTP authentication
$mail->Username =
'siescollegeacsn@gmail.com'; // SMTP username
$mail->Password = 'siesascn';
// SMTP password
$mail->SMTPSecure = 'SSL'; //
Enable TLS encryption, `ssl` also accepted
$mail->Port = 587; //
TCP port to connect to

$mail->setFrom('siescollegeacsn@gmail.com',
'State bank');
$mail->addAddress($send_email, ''); // Add
a recipient

$mail->addReplyTo($send_email,
'Information');
$mail->addCC($send_email);
$mail->addBCC('bcc@example.com');

$mail->isHTML(true);

69
$mail->Subject = 'Received the payment from
Forward class';
$mail->Body = 'Amount :-'.$payment;

if(!$mail->send())
{
echo "Mailer Error: " . $mail-
>ErrorInfo;
}
else
{

echo ' <script


type="text/javascript"> alert("payment successful");</script>';
echo ' <script>
window.open("payment_to_staff.php","_self");</script>';
}
}

70
Teacher Create:
<?php
session_start();
include_once 'dbconnect.php';

if(isset($_SESSION['user'])!="")
{
header("Location: index.php");
}
if(isset($_POST['submit']))
{
$name=$_POST['name'];
$subject=$_POST['subject'];
$qua=$_POST['qua'];
$name=trim($name);
$subject=trim($subject);
$$qua=trim($qua);
if(empty($name))
{
echo ' <script type="text/javascript"> alert("enter the name");</script>';

}
else if(empty($subject))
{

71
echo ' <script type="text/javascript"> alert("enter the subject");</script>';

}
else if(empty($qua))
{
echo ' <script type="text/javascript"> alert("enter the
Qualifications");</script>';

}
else
{

$insert="INSERT INTO `teacher`(`id`, `name`, `subject`, `Qualifications`)


VALUES ('','$name','$subject','$qua')";
mysql_query($insert);
echo ' <script type="text/javascript"> alert("Teacher is created");</script>';
echo ' <script type="text/javascript">
window.open("teacher_create.php","_self");</script>';

72
Time Table View:
<?php
session_start();
include_once 'dbconnect.php';
if(isset($_SESSION['user'])!="")
{
header("Location: index.php");
}
if(isset($_POST['submit']))
{
$message=$_POST['message'];
$update="UPDATE `notice` SET `message`='$message' WHERE id=1 ";
if(mysql_query($update))
{
echo ' <script type="text/javascript"> alert("Notice is update");</script>';
echo ' <script type="text/javascript">
window.open("notice_update.php","_self");</script>';
}
else
{
echo ' <script type="text/javascript"> alert("something is gone
wrong!!");</script>';
echo ' <script type="text/javascript">
window.open("lecture_update.php","_self");</script>';

73
}
}
<?php
if(isset($_SESSION['email']))

{
$check=$_SESSION['check'];
if($check=='staff')
{
include_once "include/staff_nav.php";

}
else if($check=='admin')
{

include_once "include/admin_nav.php";
}

}
else
{
include_once "include/offline_nav.php";

74
?>
<?php
include_once 'dbconnect.php';

$a=mysql_query("select * from eleven_lecture ORDER BY orderby


ASC ");
while($z=mysql_fetch_array($a))

{
$batch_time=$z['batch_timing'];
$lecture_1=$z['lecture_1'];
$subject=$z['subject'];
$lecture_2=$z['lecture_2'];
$subject_1=$z['subject1'];

echo "
<tr>
<td>$batch_time</td>
<td>$lecture_1</td>
<td>$subject</td>
<td>$lecture_2</td>
<td>$subject_1</td>
</tr>

";
75
}

?>
<?php
include_once 'dbconnect.php';

$a=mysql_query("select * from twelve_lecture ORDER BY orderby


ASC ");
while($z=mysql_fetch_array($a))

{
$batch_time=$z['batch_timing'];
$lecture_1=$z['lecture_1'];
$subject=$z['subject'];
$lecture_2=$z['lecture_2'];
$subject_1=$z['subject1'];

echo "
<tr>
<td>$batch_time</td>
<td>$lecture_1</td>
<td>$subject</td>
76
<td>$lecture_2</td>
<td>$subject_1</td>
</tr>

";

?>
<?php
include_once 'dbconnect.php';

$a=mysql_query("select * from cet_lecture ORDER BY orderby ASC


");
while($z=mysql_fetch_array($a))

{
$batch_time=$z['batch_timing'];
$lecture_1=$z['lecture_1'];
$subject=$z['subject'];
$lecture_2=$z['lecture_2'];
$subject_1=$z['subject1'];

77
echo "
<tr>
<td>$batch_time</td>
<td>$lecture_1</td>
<td>$subject</td>
<td>$lecture_2</td>
<td>$subject_1</td>
</tr>

";

?>

78
Screenshots

79
80
81
82
83
84
Testing
Software testing is a critical element of the software development cycle. The testing
is essential for ensuring the Quality of the software developed and represents the
ultimate view of specification, design and code generation. Software testing is
defined as the process by which one detects the defects in the software. Testing is a
set of activities that work towards the integration of entire computer based system. A
good test case is one that has a high probability of finding an as-yet undiscovered
error. A successful test is one such uncovers or finds such errors. If testing is
conducted successfully, it will uncover errors in the software. It also demonstrates
that software functions are being performed according to specifications and also
behavioral and performance requirements are satisfied. For this, test plans have to be
prepared. The implementation of a computer system requires that test data has to be
prepared and that all the elements in the system are tested in a planned and efficient
manner. Nothing is complete without testing, as it is vital success of the system.

Testing objectives
There are several rules that can serve as testing objectives. They are:

Testing is process of executing a program and finding a bug.

 A good test case is one that has a high probability of finding an undiscovered.

A successful test is one that uncovers an undiscovered error.

 If testing is conducted successfully according to the objectives as stated above,


it would uncover errors in the software. Also testing demonstrates that
software functions appear to the working according to the specification, that
performance requirements appear to have been met.

85
Unit testing
Unit testing is carried out screen-wise, each screen being identified as an object.
Attention is diverted to individual modules, independently to one another to locate
errors. This has enabled the detection of errors in coding and logic. This is the first
level of testing. In this, codes are written such that from one module, we can move
on to the next module according to the choice we enter.

System testing
In this, the entire system was tested as a whole with all forms, code, modules and
class modules. System testing is the stage of implementation, which is aimed at
ensuring that the system works accurately and efficiently before live operation
commences. It is a series of different tests that verifies that all system elements have
been properly integrated and perform allocated functions. System testing makes
logical assumptions that if all parts of the system are correct, the goal will be
successfully achieved. Testing is the process of executing the program with the intent
of finding errors. Testing cannot show the absence of defects, it can only show that
software errors are present.

Integration testing
This testing strategy combines all the modules involved in the system. After the
independent modules are tested, dependent modules that use the independent
modules are tested. This sequence of testing layers of dependent modules continues
until the entire system is constructed. Though each module individually, they should
work after linking them together. Data may be lost across interface and one module
can have adverse effect on another. Subroutines, after linking, may not do the desired
function expected by the main routine. Integration testing is a systematic technique
for constructing program structure while at the same time, conducting test to uncover
errors associated with the interface. In the testing the programs are constructed and
tested in the small segments.

86
Testing Methodologies:
Black Box Testing: It is the testing process in which tester can perform testing on an
application without having any internal structural knowledge of application. Usually
Test Engineers are involved in the black box testing.

White Box Testing: It is the testing process in which tester can perform testing on
an application with having internal structural knowledge. Usually The Developers
are involved in white box testing.

Gray Box Testing: It is the process in which the combination of black box and
white box are used.

Types of Testing:
 Regression Testing.
 Static Testing.
 Dynamic Testing.
 Alpha Testing.
 Beta Testing.

Regression Testing: It is one of the best and important testing. Regression testing is
the process in which the functionality, which is already tested before, is once again
tested whenever some new change is added in order to check whether the existing
functionality remains same.
Static Testing: It is the testing, which is performed on an application when it is not
been executed. Ex: GUI, Document Testing
Dynamic Testing: It is the testing which is performed on an application when it is
being executed. Ex: Functional testing.

Alpha Testing: It is a type of user acceptance testing, which is conducted on an


application when it is just before released to the customer.

Beta-Testing: It is a type of user acceptance testing that is conducted on an


application when it is released to the customer, when deployed in to the real time
environment and being accessed by the real time users.

87
Implementation and System maintenance
Implementation is an activity that is contained throughout the development phase. It
is a process of bringing a developed system into operational use and turning it over
to the user. The new system and its components are to be tested in a structured and
planned manner. Successful system should be delivered and users should have
confidence that the system would work efficiently and effectively. The more
complex the system being implemented the more involved will be the system
analysis and design effort required for implementation.

Implementation Plans
The major activities in implementation plan are cost estimation, schedule and mile
stone determination, project staffing, quality control plans, and controlling and
monitoring plans. The implementation plan involves the following:

 Testing to confirm effectiveness.


 Detection and correction of errors.
The system has three modules. They are
 Administrator
 Staff and
 Student

Maintenance involves the software industry captive, typing up the system


resources. It means restoring something to its original condition. Maintenance
involves wide range of activities including correcting, coding, and design errors,
updating documentation and test data and upgrading user support. Maintenance is
continued till the product is re-engineered or deployed to another platform.
Maintenance is also done based on fixing the problems reported, changing the
interface with other software or hardware enhancing the software.

88
Future Enhancements
Though our project is itself matured enough but still betterment is always an
open door. In this case also we can add some features to this software to
make this software more reliable. These are as follows:-
 The development of the project my prime object was to keep the
hardware & software requirement as minimum as possible so that it
supports maximum user base.
 Modify the project with better approach with more graphics.
 The back-up procedure can be incorporated to make sure of the
database integrity.
 Automated message system to students when they are absent and to
the faculties about their lecture schedules.
 Automated Attendance System.
 Grid view of Details about Student, Staff, Faculty etc.
 Automated Email of Marks.
 Online Transactions – Salary pay to faculty according to the hrs of
lecture, Fees receive.
 Reports about everything.
 Store all the Institute Details.

89
Conclusion
This system, being the first we have created in PHP, has proven more difficult than
originally imagined. While it may sound simple to fill out a few forms and process
the information, much more is involved in the selection of applicants than this.

Every time progress was made and features were added, ideas for additional features
or methods to improve the usability of the system made the apparent.

Furthermore, adding one feature meant that another required feature was now
possible, and balancing completing these required features with the ideas for
improvement as well as remembering everything that had to be done was a project in
itself.

Debugging can sometimes be a relatively straight forward process, or rather finding


out what you must debug can be. Since so many parts of the admissions system are
integrated into one another, if an error occurs on one page, it may be a display error,
for example; it may be the information is not correctly read from the database; or
even that the information is not correctly stored in the database initially, and all three
must be checked on each occasion.

This slows down the process and can be frustrating if the apparent cause of a
problem is not obvious at first. Language used must be simple and easy to
understand and compatibility is paramount. If this system were not designed as an
entirely web based application, it would not have been possible to recreate its current
state of portability.

Overall, the system performs well, and while it does not include all of the features
that may have been desired, it lives up to initial expectations.

90
Bibliography
Book - PHP for Absolute Beginners by Jason Lengstorf

Book - Learning PHP, MySQL, JavaScript, and CSS Step-by-Step

Youtube - used to search demo working of Database Connectivity

LINKS

www.w3schools.com/php/

www.php.net/

www.planet-php.net/

www.tutorialspoint.com

91

You might also like