Professional Documents
Culture Documents
SYNOPSIS
SYNOPSIS
TITLE PAGE NO
1. INTRODUCTION
2. SYSTEM SPECIFICATION
2.1. HARDWARE SPECIFICATION
2.2. SOFTWARE SPECIFICATION
2.3. SOFTWARE FEATURES
3. SYSTEM ANALYSIS
3.1. EXISTING SYSTEM
3.2. LIMITATION OF EXISTING SYSTEM
3.3. PROPOSED SYSTEM
3.4. FEATURES OF PROPOSED SYSTEM
4. PROJECT DESCRIPTION
5. SYSTEM DESIGN
5.1. INPUT DESIGN
5.2. OUTPUT DESIGN
5.3. DATABASE DESIGN
5.4. DATA FLOW DIAGRAM
6. SYSTEM TESTING AND IMPLEMENTATION
6.1. TESTING
6.2. SYSTEM IMPLEMENTATION
7. CONCLUSION AND FUTURE ENHANCEMENT
7.1. CONCLUSION
7.2. FUTURE ENHANCEMENT
BIBLIOGRAPHY
APPENDIX
SCREEN DESIGN
REPORTS
ONLINE EVENT MANAGEMENY SYSYEM
ABSTRACT
Our project emphasis on making the task user friendly and easy
for students and faculties to register for various events organized by
the college through the common server and also see the ongoing
events at a particular time .As a result of solving problem, reducing the
paper work and manual processes with online registration .It allows you
provide to the students and faculties with a comprehensive set of
online self service functionality. With event management system,
there’s no more need for paper trails or time consuming manual
processes.
EXISTING SYSTEM:
4. More than one person cannot access the data at same time.
PROPOSED SYSTEM:
CHAPTER-1 INTRODUCTION
1.1 OBJECTIVE OF THE PROJECT:
TECHNICAL FEASIBILITY
OPERATIONAL FEASIBILITY
ECONOMICAL FEASIBILITY
Before commencing the project, we have to be very clear about what are the
technologies that are to be required for the development of the new system.
DISADVANTAGES:
Lot of paper work required.
Man power was more.
Time consuming process.
If the hourly rate is $14 including social security and benefits, total
labor cost per year equals ($14 x 10) x (226 work days) = $31, 640.
The above analysis does not include overhead cost for retrieving
and filing old documents. If included, the cost of retrieving and filing
paper documents will be a lot more than you realize
2.1.2 LOST AND MISSING DOCUMENTS:
In the existing system lot of paper work was required and it was time
consuming process. As it was manual process retrieving data was very
difficult. More than one person cannot access the data.
The EMS is easy to use, full-featured and flexible participant registration and
feedback assessment web application.
The EMS is proposed to use the following open technologies i.e. centos
Linux 5.5, Apache/Tomcat Application server and MySQL as database
server.
The PHP Pages/Servlets will be used for implementing the program logic at
server end.
The efforts will be focused on the graphical user interface (GUI), which
shall not be restricted to static pages; rather the user can experience a
dynamic environment, in which he or she can navigate in a natural way.
Students
Faculty
Administrator
3.3.1 ADMINISTRATOR does login, upload events, and verify events registration
form, logout.
Use cases:
Login
Upload events
Delete events
Verify events registration
Logout
3.3.2 A STUDENT does login, registration, view events, events registration, event
status, logout.
Use cases:
Login
Registration
View events
Event Registration
Event status
Logout
3.3.3 FACULTY does login, register, and view events, view register students,
logout.
Use cases:
Login
Register
View events
View register students
Logout
CHAPTER-4
User: does login, registration, view events, events registration, event status, logout.
Faculty: does login, register, view events, view register students, logout.
4.3.1FUNCTIONAL REQUIREMENTS:-
Stimulus/Response Sequences:
Stimulus: Administrator logins with his/her user id and
password.
Response: If it is validate user then it get accessed or
accessed denied.
Stimulus: Administrator provides user id and password
to all the users.
Response: Administrator updates, modify the data if
required.
A user is the one that create an id and then login with the
help of it and performs various activities like view events, register
for the events, checks the events status.
Stimulus/Response Sequences:
Stimulus: User logins with id and passwords.
Response: if it is validate then it get accessed or denied.
A faculty is the one who register and checks for the registered students for
attendance and view the events.
Stimulus/Response:
Stimulus: faculty login with id and password.
Response: if it is validate faculty then it get accessed or denied.
PERFORMANCE REQUIREMENTS
The system should be fast, despite many users accessing the database at once.
SECURITY REQUIREMENTS
ERROR CONDITIONS
Upon detection of an error condition, the system should generate a suitable error
message that should be displayed to the user. Make sure that system is still reliable with
large number of users.
USER FRIENDLINESS
The system should be designed to have a user-friendly interface so that user can be
guided easily. The system must be designed efficiently so that a user can operate easily
without any formal training or delay.
EASE OF USE
Make user interaction easy and obvious so that non computer-proficient user can use
the system.
Hard disk:
The database connectivity requires a hardware configuration that is on-line. This makes it
necessary to have a fast database system running on high rpm hard disk permitting
complete data redundancy and back-up systems to support the primary goal of reliability.
The system must interface with the standard output device, keyboard and mouse to
interact with this software.
Registration form: where the users can register for various programs by specifying
his/her details such as name, id, password etc...
Programs details: where the users can view details about the entire program such
as title of the program, code for the program, numbers of students participating etc.
Feedback form: where the users can indicate their satisfaction level by rating the
program on various parameters held.
Faculty form: To participate in different events and for students attendance.
Students form: To participate in events held with valid password and id.
2. Participant table: It consists of participant details such as their login id, password,
program code, date of registration and fee details.
3. Feedback table: It consists of participant id, program code, and feedback evaluation
parameters.
Micro processor I3
Hard Disk Drive:250
RAM: 4GB
Keyboard
Mouse
Technology: PHP
Database: My SQL.
Web Server: Tomcat Apache5.0.
Operating system: Windows XP & above
Browser: Internet Explorer7.0.
5.1.1 Description
PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open source general-
purpose scripting language that is especially suited for web development and can be embedded
into HTML PHP is a server-side scripting language designed for web development but also used
PHP reference implementation is now produced by The PHP Group. PHP originally stood
for Personal Home Page, but it now stands for the recursive backronym PHP: Hypertext
Preprocessor. PHP code may be embedded into HTML code, or it can be used in combination
with various web template systems, web content management system and web frameworks. PHP
code is usually processed by a PHP interpreter implemented as a module in the web server or as
a Common Gateway Interface (CGI) executable. The web server combines the results of the
interpreted and executed PHP code, which may be any type of data, including images, with the
generated web page. PHP code may also be executed with a command-line interface (CLI) and
the PHP License. PHP has been widely ported and can be deployed on most web servers on
What distinguishes PHP from something like client-side JavaScript is that the code is executed
on the server, generating HTML which is then sent to the client. The client would receive the
results of running that script, but would not know what the underlying code was. You can even
configure your web server to process all your HTML files with PHP, and then there's really no
way that users can tell what you have up your sleeve.
The best things in using PHP are that it is extremely simple for a newcomer, but offers many
advanced features for a professional programmer. Don't be afraid reading the long list of PHP's
features. You can jump in, in a short time, and start writing simple scripts in a few hours.
MySQL:
MySQL is a flexible and capable RDBMS that has a rich feature set, performs well on the
majority of queries, and has a large support base for access from many different languages.
MySQL released its 5.0 database which added such enterprise features as triggers, stored
procedures and constraints to its Open Source database engines. MySQL has a unique capability
among database vendors - it fits the underlying database storage engines to the nature and use of
each specific database instance. Now all database vendors claim that they do the same; but
MySQL is the only vendor with pluggable engines like MyISAM for queries and BI, Innodb and
the new Falcon engines for high speed transaction processing, or the Cluster engine for large
scale cluster processing. And because MySQL is Open Source users can and do write their own
special storage engines for changing routines called depending on whether a database instance is
clustered or not, partitioned or not, used for BI with dimensional organization or not, etc.
MySQL supports GUI Toolkits for DB Administration, Designs, Migration, and Query.
PORTABILITY:
MySQL runs on almost every flavor of UNIX, as well as Windows and MacOS X. You can
obtain binaries or source code for the MySQL server as well as the tools that access it. More
ports of the software become available every day. It is almost a given that MySQL will run on
SPEED:
Using techniques such as efficient indexing mechanisms, in memory temporary tables, and
highly optimized join algorithms, MySQL executes most queries much faster than most other
database systems.
SCALABILITY:
Because of its modularity and its flexibility in configuration, MySQL can run in
systems varying in size from embedded systems to large multiprocessor UNIX servers hosting
databases with tens of millions of records. This scalability also allows you to run a copy of
MySQL on a developer-class machine, and later use the same database system on a larger
multiple users, compared to other database servers that start full-fledged processes for each user.
MySQL lets you choose the table types you need to meet your software’s requirements, ranging
from in-memory heap tables, fast on-disk MyISAM tables, merge tables that group together
other sets of tables to form larger “virtual” tables, and transaction-safe tables such as InnoDB.
MySQL is also very tunable and includes many parameters that can be changed to increase
performance for a given solution. However, MySQL comes with sensible defaults for these
parameters, and many users never have to tune MySQL to reach a performance they are happy
with.
EASE OF USE:
MySQL is easy to install and administer. While other database systems require
special knowledge and training, not to mention special operating system configurations, MySQL
can be installed in less than 10 minutes if you’ve done it before. Even if you are a newcomer,
you should be able to install MySQL in under an hour. Once it’s installed, MySQL requires little
maintenance and administration other than adding or changing user permissions and creating or
removing databases.
You can restrict users’ rights from an entire database down to the column level based on login
name, password, and the hostname that users are connecting from. This allows you to create
secure systems by partitioning responsibilities and capabilities of different users and applications
There are libraries and APIs for connecting to MySQL from Java (the focus of this book),
C/C++, Perl, PHP, ODBC (Microsoft Windows applications), TCL, Eiffel, and Lisp. Because of
this, a whole set of tools has appeared surrounding the use of MySQL from these languages and
systems.
Requirement
Definition
Operation &
Maintenance
Fig.6.1 Process model
The classic software life cycle also known as Waterfall Model models usually
include following activities.
During this phase feasibility study is conducted to identify whether the system
under development meets the organizational objectives. Identifies and analyzes the
requirements of the software system under development with respect to its
operational capabilities, its desired performance, keeping the technology, resource
and budgetary constraints in mind.
The design concepts provide the software designer with a foundation from
which more sophisticated methods can be applied. A set of fundamental design
concepts has evolved. They are:
Compatibility - The software is able to operate with other products that are
designed for interoperability with another product. For example, a piece of
software may be backward-compatible with an older version of itself.
Extensibility - New capabilities can be added to the software without major
changes to the underlying architecture.
Fault-tolerance - The software is resistant to and able to recover from
component failure.
Maintainability - The software can be restored to a specified condition within
a specified period of time. For example, antivirus software may include the
ability to periodically receive virus definition updates in order to maintain the
software's effectiveness.
Modularity - the resulting software comprises well defined, independent
components. That leads to better maintainability. The components could be
then implemented and tested in isolation before being integrated to form a
desired software system. This allows division of work in a software
development project.
Packaging - Printed material such as the box and manuals should match the
style designated for the target market and should enhance usability. All
compatibility information should be visible on the outside of the package. All
components required for use should be included in the package or specified as a
requirement on the outside of the package.
Reliability - The software is able to perform a required function under stated
conditions for a specified period of time.
Reusability - the software is able to add further features and modification with
slight or no modification.
Robustness - The software is able to operate under stress or tolerate
unpredictable or invalid input. For example, it can be designed with resilience
to low memory conditions.
Security - The software is able to withstand hostile acts and influences.
Usability - The software user interface must be usable for its target
user/audience. Default values for the parameters must be chosen so that they
are a good choice for the majority of the users.
6.2.3 DESIGN PATTERNS:
6.2.4 USAGE:
The use case diagram is used to identify the primary elements and processes
that form the system. The primary elements are termed as "actors" and the
processes are called "use cases." The use case diagram shows which actors interact
with each use case.
Use case diagrams model the functionality of a system using actors and use cases. Use
cases are services or functions provided by the system to its users.
registration
login
view event
student
event registration
event status
logout
register
login
faculty
view events
logout
login
upload event
logout
Use case of administrator first login then upload event if any wrong it delete event
then goes to verify registered events add logout.
6.3.2 CLASS DIAGRAM:
The class diagram is used to refine the use case diagram and define a
detailed design of the system. The class diagram classifies the actors defined in the use
case diagram into a set of interrelated classes. Each class in the class diagram may be
capable of providing certain functionalities. These functionalities provided by the class
are termed "methods" of the class. Apart from this, each class may have certain
"attributes" that uniquely identify the class
Fig: 6.3.2 Class Diagram
UML sequence diagrams model the flow of logic within a system in a visual
manner, enabling both to document and validate logic, and are commonly used for
both analysis and design purposes. Sequence diagrams are the most popular UML
artifact for dynamic modeling, which focuses on identifying the behavior within a
system.
Interaction Diagrams
1: login
4: home page
5: upload events
6: stores events
7: delete events
9: retrieve data
12: logout
1: register
3: login data
4: validate
5: home page
6: view events
7: register events
8: response
9: display status
10: logout
3: login data
4: validate
5: homepage
6: view events
9: registration data
11: logout
databas
e
Collaboration diagram:
3: login data
8: response
databas
e
3: login data
9: registration data
databas
e
student
login
valid
yes
home
page
perform
activity
logout
login
valid
yes
home
page
student's
attendance
perform
activity
event
status
view event
event registration
logout
login
valid
yes
home
page
Upload
events
Delete
events
event
status
view event
event registration
logout
database
database
Stimulus/Response Sequences:
Stimulus: Administrator logins with his/her user id and
password.
Response: If it is validate user then it get accessed or accessed
denied.
Stimulus: Administrator provides user id and password to all
the users.
Response: Administrator updates modify the data if required.
A user is the one that create an id and then login with the help of it
and performs various activities like view events, register for the events,
checks the events status.
Stimulus/Response Sequences:
Stimulus: User logins with id and passwords.
Response: if it is validate then it get accessed or denied.
User: does login, registration, view events, events registration, event status, logout
7.1.3 FACULTY MODULE:
A faculty is the one who register and checks for the registered
students for attendance and view the events.
Stimulus/Response:
Stimulus: faculty login with id and password.
Response: if it is validating faculty then it get accessed or denied.
Faculty: does login, register, and view events, view register students, logout.