Professional Documents
Culture Documents
This project is being designed to provide the information about the universities
in Andhra Pradesh. Andhra Pradesh is a state where there are more and more
opportunities to those people who wishes to join different courses of studies through
online. This site is being designed to provide that information to those people who
wish to register themselves in any of the universities through online. The new
education policy of Government of Andhra Pradesh provides with much more
opportunities by increasing the number of seats per course per college, which will
provide the much larger opportunities for the education lovers.
Existing System:
Proposed System:
Modules:
Registration
Student
-1-
Admin
ACKNOWLEDGEMENT
I wish you to express gratitude to Mr. C Vinay Kumar and the professor
Mr. Vijay Kumar chairman and director of Nishitha College of engineering and
technology for providing us with the environment and mean to enrich our skills and
motivating us in our endeavors and helping us realize our full potential.
Last but not least, we greatly acknowledge all the initiatives and dedicated
efforts of the team members for effectively carrying out the project activities in their
respective capabilities.
Rakesh
Karthik
Naresh
-2-
CONTENTS
1. INRODUCTION
2. LITERATURE OVERVIEW
3. REQUIREMENT ANAYSIS
4. PROJECT DESIGN
-3-
5. IMPLEMENTATION ………………………… 40
6. PROJECT TESTING
9. CONCLUSION ………………………… 69
REFERENCE ………………………… 71
-4-
INTRODUCTION
-5-
1. INTRODUCTION
This project is being designed to provide the information about the universities
in Andhra Pradesh. Andhra Pradesh is a state where there are more and more
opportunities to those people who wishes to join different courses of studies through
online. This site is being designed to provide that information to those people who
wish to register themselves in any of the universities through online. The new
education policy of Government of Andhra Pradesh provides with much more
opportunities by increasing the number of seats per course per college, which will
provide the much larger opportunities for the education lovers.
Existing System:
Proposed System:
-6-
Modules:
Registration
Student
Modules
-7-
LITERATURE
OVERVIEW
-8-
2. LITERATURE OVERVIEW
Java started out as a bit of an accident. A team under Bill Joy was working at
Sun on a new programming language for embedded applications. Java was originally
expected to work in toasters and fridges, not on modern computers! The initial
prognosis for Java was not good and it was only the rise of the Internet which saved
Java from oblivion. Since then, neither the Net nor Sun nor Java has looked back and
all have grown from strength to strength.
Java Environment
Java environment includes a large number of tools which are part of the
system known as java development kit (JDK) and hundreds of classes, methods, and
interfaces grouped into packages forms part of java standard library (JSL).
Java Architecture
-9-
Java Virtual Machine
When we compile the code, java compiler creates machine code (byte code)
for a hypothetical machine called java virtual machine (jvm). The JVM will execute
the byte code and overcomes the issue of portability. The code is written and compile
for one machine and interpreted all other machines. This machine is called java virtual
machine.
Java Features
Simple because Java inherits the C/C++ syntax and many of the objected
oriented features of C++, most programmers have a little trouble in learning
Java. Some of the more confusing concepts from C++ are either left out of Java are
implemented in a cleaner, more approachable manner.
Secure because when we use a Java- compactable Web browser, you can
safely download applets with out fear of viral infection or malicious intent. Java
achieves this protection by confining a Java program to the Java execution
environment and not allowing it to access other parts of computer.
Portable because many types of computers are operating systems are in use
through out the world and many is connected to the internet .for programs to be
dynamically downloaded to all various types of plat forms connected to the internet,
some means of generating portable executable code is needed. Java’s solution to
these two problems is both elegant and efficient.
- 10 -
Deal locating it. Deal location is automatic since it provides garbage collector.
Exceptional conditions in traditional environments often arise in situations such as
‘division by zero’ or ‘file not found’. Java helps in this area by providing object
oriented exception handling.
Multi threaded because Java was designed to meet the real- world
requirement of creating interactive programs. To accomplish this, Java supports
multithreaded programming that allows you to write programs that do many things
simultaneously.
- 11 -
The essential aspects included in object-oriented approach
Identity.
Classification.
Polymorphism.
Inheritance.
Identity
Classification
Classification means that object with same data structure and behavior are
grouped into a class. A class is an abstract that describes the properties important to
an application and ignores the rest. Each class describes a possibly infinite set of
individual objects. Objects contain an implicit reference to its own class it "knows
what kind of thing it is".
Polymorphism
Inheritance
- 12 -
Paradigm of Java
- 13 -
2.2 J2EE
The JDBC 1.0 API provided result sets that had the ability to scroll in a
forward directionally. Scrollable result sets allow for more flexibility in the
processing of results by providing both forward and backward movement through
their contents. In addition, Scrollable result sets allow for relative and absolute
positioning. For example, it’s possible to move to the fourth row in a scrollable result
set directly, or to move directly to the third row following the current row provided
the row exists. The JDBC API allows result sets to be directly updatable, as well.
The Java Naming and Directory Interface (JNDI) API can be used in addition
to a JDBC technology-based driver manager (JDBC driver manager) to obtain a
connection to a database. When an application uses the JNDI API, it specifies a
logical name that identifies a particular database instance and JDBC driver for
accessing that database. This has the advantage of making the application code
independent of a particular JDBC driver and JDBC technology URL.
- 14 -
SERVLETS:
Servlets are the Java counterpart to non-Java dynamic Web content technologies such
as PHP, CGI and ASP.NET. Servlets can maintain state across many server
transactions by using HTTP cookies, session variables or URL rewriting.
The Servlets API, contained in the Java package hierarchy javax.servlet, defines
the expected interactions of a Web container and a servlet. A Web container is
essentially the component of a Web server that interacts with the servlets. The Web
container is responsible for managing the lifecycle of servlets, mapping a URL to a
particular servlet and ensuring that the URL requester has the correct access rights.
A Servlet is an object that receives a request and generates a response based on that
request. The basic servlet package defines Java objects to represent servlet requests
and responses, as well as objects to reflect the servlet's configuration parameters and
execution environment. The package javax.servlet.http defines HTTP-specific
subclasses of the generic servlet elements, including session management objects that
track multiple requests and responses between the Web server and a client. Servlets
may be packaged in a WAR file as a Web application.
- 15 -
Lifecycle of a Servlet:
The container calls the init() method. This method initializes the servlet and
must be called before the servlet can service any requests. In the entire life of a
After initialization, the servlet can service client requests. Each request is
serviced in its own separate thread. The container calls the service() method
of the servlet for every request. The service() method determines the kind of
request. The developer of the servlet must provide an implementation for these
made, the method of the parent class is called, typically resulting in an error
Finally, the container calls the destroy() method that takes the servlet out of
service. The destroy() method like init() is called only once in the
lifecycle of a Servlet.
- 16 -
Java Server Pages:
Java Server Pages (JSP) is a Java technology that allows software developers
to create dynamically generated web pages, with HTML, XML, or other document
types, in response to a Web client request. The technology allows Java code and
certain pre-defined actions to be embedded into static content.
The JSP syntax adds additional XML-like tags, called JSP actions, to be used to
invoke built-in functionality. Additionally, the technology allows for the creation of
JSP tag libraries that act as extensions to the standard HTML or XML tags. Tag
libraries provide a platform independent way of extending the capabilities of a Web
server.
JSPs are compiled into servlets by a JSP compiler. The compiler either generates a
servlet in Java code that is then compiled by the Java compiler, or it may compile the
servlet to byte code which is directly executable. JSPs can also be interpreted on-the-
fly, reducing the time taken to reload changes.
Regardless of whether the JSP compiler generates Java source code for a servlet or
emits the byte code directly, it is helpful to understand how the JSP compiler
transforms the page into a Java servlet.
JSP pages embed tags within a HTML or XML document that are evaluated by the
compiler. This can be done through the use of scripting tags similar to those used in
PHP or ASP.NET, or by importing a JSP Tag Library.
- 17 -
2.3 About HTML
HTML (hyper text markup language) is a language used to create hyper text
documents that have hyper links embedded in them. It consists of tags embedded in
the text of a document with HTML. We can build web pages or web documents. It is
basically a formatting language and not a programming language. The browser
reading the document interprets mark up tags to help format the document for
subsequent display to a reader. HTML is a language for describing structured
documents. HTML is a platform independent. WWW (World Wide Web) pages are
written using HTML. HTML tags control in part the representation of the WWW page
when view with web browser. The browser interprets HTML tags in the web
document and displays it. Different browsers show data differently. Examples of
browsers used to be web pages include:
Mozilla Firefox
Internet Explorer
Java Script
Java scripts dynamically typed that are programs do not declare variable types,
and the type of variable is unrestricted and can change at runtime. Source can be
generated at run time and evaluated against an arbitrary scope. Typical
implementations compile by translating source into a specified byte code format, to
check syntax and source consistency. Note that the availability to generate and
interpret programs at runtime implies the presence of a compiler at runtime.
- 18 -
Java script is a high level scripting language that does not depend on or expose
particular machine representations or operating system services. It provides automatic
storage management, typically using a garbage collector.
Features:
Advantages:
- 19 -
2.4 MySQL
SQL Server stores records relating to each other in a table. Different tables
are created for the various groups of information. Related tables are grouped together
to form a database.
My SQL is a fully web-enabled database and has a strong support for XML
and HTTP which are two of the main infrastructure technologies for Java.
My SQL some of the most important new My SQL features are direct access
to the database from a browser, query of relational data with results returned
as XML, as well as storage of XML in relational formats.
Primary Key:
Relational Database:
- 20 -
Foreign Key:
When a field in one table refers the primary key of another table, this key is
identified as a foreign key. A foreign key is a field or a group of fields in one table
whose values match those of the primary key of another table. This is used to achieve
Referential Integrity in the database, i.e. consistency among various tables.
Referential Integrity: Ensuring that the data among related tables is correctly
matched is referred to as maintaining referential integrity.
Physical level: This is the lowest level of abstraction at which one describes how
the data are actually stored.
Conceptual Level: At this level of database abstraction all the attributes and
actual data that is stored and describes relationship among them.
View level: This is the highest level of abstraction at which one describes only part
of the database.
Features of My SQL:
- 21 -
SQL is high performance fault tolerant DBMS which is specially designed for online
transactions processing and for handling large database application.
- 22 -
REQUIREMENT
ANALYSIS
- 23 -
3. REQUIREMENT ANALYSIS
The existing trading system is a complete manual system which has many
issues like redundancy of entries, manipulation of entries and no specific level of
usage. Lack of security measurements for the entries.
- 24 -
3.3 Feasibility Study:
Feasibility Study is a high level capsule version of the entire process intended
to answer a number of questions like: What is the problem? Is there any feasible
solution to the given problem? Is the problem even worth solving? Feasibility study
is conducted once the problem clearly understood. Feasibility study is necessary to
determine that the proposed system is Feasible by considering the technical,
Operational, Economical factors. By having a detailed feasibility study the
management will have a clear-cut view of the proposed system and it enables the
developers for easy accessing of the system being developed.
The following feasibilities are considered for the project in order to ensure that
the project is variable and it does not have any major obstructions. Feasibility study
encompasses the following things:
Technical Feasibility
Economical Feasibility
Operational Feasibility
Technical Feasibility:
This project is technically feasible because, all the technology needed for Trade
Processing system project is readily available.
Economical Feasibility:
- 25 -
Economical Feasibility determines whether the project goal can be within the
resource limits allocated to it or not. It refers to the benefits or outcomes we are
deriving from the system compared to the total cost we are spending for developing
the product. If the benefits are more or less the same as the older system then it is not
feasible to develop the product. It must determine whether it is worthwhile to carry
out the process with the entire project .Financial benefits must be equal or exceed the
costs. In this issue, we should consider:
The cost to conduct a full system investigation.
The cost of h/w and s/w for the class of application being considered.
The development tool.
The cost of maintenance etc.,
Operational Feasibility:
This project is operationally feasible because the time requirements and personnel
requirements are satisfied.
- 26 -
3.4 Hardware/Software Requirements
The configuration given below are the hardware and software handled for the
system development.
Hardware Specifications:
Software Specifications:
- 27 -
3.5 Module Description
Administration
Login
In this login module the User will logged into University Online Admission to
maintain the Online Dairy i.e., the events of a User which will be present in future. By
this site any user can be informed about an event specified date, time and address to
him by remind to his mobile.
- 28 -
Schedule
In Schedule module it contains the details of user events which have saved
when he comes to have new programs in his real life to get remember he is
maintaining an online help to help him to attend the events at correct time.
This application enables the users to plan their work schedule, keep a track of
their calls and attend them only when they are free. The users enter the details of their
work such as status, start time, end time, category, message and action to be
performed, through the scheduler portal.
A web application which helps the user to schedule and organize his/her day
to day activity. The portal helps to maintain his status shown to all and available time
for call.
- 29 -
3.6 Non - Functional requirements
Performance Requirements
Performance testing validates that the quality of the service parameters defined
at the requirements stage is met by the final product. In the cases of the Trade
Processing System the performance requirements include to handle the number of
stock and ensuring them that the data is real.
Security Requirements:
- 30 -
PROJECT DESIGN
- 31 -
- 32 -
4. PROJECT DESIGN
Introduction
The most creative and challenging phase of the life cycle is system
design. The term design describes a final system and the process by which it is
developed. It refers to the technical specifications that will be applied in
implementations the candidate system. The design may be defined as “the process of
applying various techniques and principles for the purpose of defining a device, a
process or a system in sufficient details to permit its physical realization”.
- 33 -
Application Design:
USERS:
In this application each and every user must having their own User ID
and Password, using these User ID and Password only they can directly enter into
their corresponding Login forms.
After enter into their Login forms each user will interact with the
following functionalities.
But according to their responsibilities only they will use the above
functionalities.
In this function registered users can perform following tasks without login. He
can able to search for the friends but unable to add them to their friends list. He can
able to view the existing gangs but unable to join in a gang. If any situation he wants
to change the password then he can directly change the password on his own. He can
able to view or update his profile.
- 34 -
4.2 Database Design
Database Tables: The total number of database tables that were identified to build
the system.
1. Transactional components:
The Transactional components are useful in recording the transactions
made by the system. Consignment bookings, material particulars, dealership requests
and feedbacks etc.
3. General components:
These components are used to store the general information like login information etc.
Data Dictionary:
- 35 -
Database Tables
Schedule Table:
This table has field for Scheduling. It contains the user schedule details like
event, date of an event, time of an event and address.
Acbreg Table:
The table for the User Registration Details to the University Online Admission
with the specified details in Registration form. The table uses for the usage of Login
into the Web-site.
- 36 -
4.3 OVERALL PROJECT ARCHITECTURE
Cust. Details
Stored
Schedule Database
Details SERVERS
ADMINISTRATOR Account Details Retrieved
Updation Details
- 37 -
4.4 UML Diagrams
This phase determines how the problem is to be solved. In short analysis gives
the understanding of what is to be done and design phase provides the idea of how the
system will meet the requirements. This process gives the programmers firm
understanding the requirements and guides them in the development of the system
with the help of UML diagrams and data dictionary. This information domain analysis
can be represented as a continuous flow that undergoes a series of transformations
(process) as it evolves from input-to-output. The UML diagram (Rational Rose) used
as a graphical tool to depict information flow.
Class diagrams to describe the structure of the system. Classes are abstraction
that specifies the common structure and behavior of a set of objects. Class diagrams
describe the system in terms of objects, classes, attributes, operations and their
associations
Class Diagram
Administrator
user name : char
pwd : char
login()
univ updates()
checks the student details()
logout()
Applicant
Registration user id : char
Name user pwd : char
Father Name
Gender Registration()
DOB Login()
Email-ID Select Course()
Submition()
Email-Id Validation() View Confirmation()
Login() Log out()
Database
- 38 -
4.3.2 Use Case Diagrams
This view of a system architecture encompasses the use cases (or the complex
modules) that describe the behaviour of the system as seen by its end users, analysts
and testers.
Hence we chose the following blocks to describe a Structural View of our model.
Actor – A coherent set of roles of users of use – case plays when interacting with the
use case.
Use case Diagram - That shows a set of use – cases and actors and their
relationships to address the static view of our model. Global Use Diagram:-
Registration
Login
Select Course
Admin
Degree
Applicant
PG
Others
- 39 -
This diagram completely represents the use cases, actors that are a part of
trade processing system and even the complete flow of the application.
4.3.3 Sequence Diagram
Sequence diagram depicts the interactions between class instances, in the form
of method calls and call returns shows a specific scenario of execution in the system
in terms of object instances. This diagram focuses on the time ordered messages
between objects that collaborate to accomplish some task.
Registered Successfully
Login
Select a Course
Apply For a selected course
verify details
- 40 -
IMPLEMENTATION
- 41 -
5. IMPLEMENTATION
Home Page
The main page is the page which has all modules included init. With the
project description has Information, Login and Registration.
Login Page
The main page is the page next to the login page which appears only if the
user login to the application. On the screen of main page, we have links that direct to
the modules namely Login, Registration, and Information.
Registration Page
This is the main page for the module Registration which deals with the new
user registration, displaying the success after entering all details.
- 42 -
Error Page
This is the main page to display the error messages while logging into an
account and while registering, changing the settings.
- 43 -
TESTING
- 44 -
6. TESTING
Once the source code has been generated the software must be tested to
uncover as many errors as possible before delivery to the customer. Software testing
is a critical element of software quality assurance and represents the ultimate review
of specification design and code generation.
Testing should begin “In the Small” and progress towards “In the Large”.
The Pareto principle applies to software testing. The pareto principle implies
that 80 percent of all errors uncovered during testing, will likely be traceable
to 20 percent of all program components.
1. White-Box Testing
2. Black-Box Testing
- 45 -
6.3.1 White-Box Testing
Guarantee that all independent paths with in a module have exercised at least
once.
Exercise all logic decisions on their true and false sides.
Execute all loops at their boundaries and with their operational bounds
Performance errors
- 46 -
Initialization and termination errors.
- 47 -
Testing Process
Except for small computer, systems should not be tested as a single monolithic
unit. Large systems are built out of subsystems which are built out modules, which are
composed of procedures and functions. The testing process should therefore proceed
in stages where testing is carried out incrementally in conjunction with system
implementation. Software testing is a client element of software review of
specification, design and code generation. The goal of software testing is to design a
series of test cases that have a high like hood of finding errors.
1. Unit Testing
Individual components are tested to ensure that they operate correctly. Unit
testing treats components as stand-alone entity which does not need other components
during the testing process.
2. Integration Testing
It tests for the errors resulting from integration modules. One specific target
of integration testing is the interface: whether parameters match on both sides as to
type, permissible ranges and meaning. Analyst tries to find areas where modules have
been designed with different specifications. This is the top-level testing. In this all
modules tested separately would be put together and tested for producing the ultimate
result of the system. The main emphasis during this testing will be on the interface
between the modules. By applying various business rules generated as a part of test
cases, we where able to ease certain design level complexities.
3. System Testing
The main objective of the system testing is to find out the discrepancies
between the developed system and its original objective, current specifications and the
- 48 -
system documentation. It also verifies for the compatibility of the system with the
operational environment. The following system testing tasks are essential.
4. Stress Testing
5. Procedure Testing:
Acceptance Testing: This is final stage in the testing process before the
system is accepted for operational use. It involves testing the system with data
supplied by the system prowler rather than simulated data developed as a part
of the testing process. Acceptance testing is sometimes called as Alpha
Testing.
- 49 -
“looking over the shoulder “of the user and recording errors and usage
problems. Alpha tests are conducted in a controlled environment.
Beta Testing: The beta testing is conducted at one or more customer sites
by the end user of the software. Unlike, alpha testing the developer generally
is not present. Therefore, the betas test is a “live” application of the software
in an environment that cannot be controlled by the developer. The customer
records all the problems that are encountered during bets testing and reports
there to the developer at regular intervals. As result of problems reported
during bets, tests the software developer makes modifications and then
prepare for release of the software product to the entire customer here.
System testing is designated to uncover weakness that was not detected in the
earlier tests. The total system is tested for recovery and fallback after various major
failures to ensure that no data are lost. An acceptance test is done to validity and
reliability of the system. The philosophy behind the testing is to find error in project.
- 50 -
SCREEN SHOTS
- 51 -
7. SCREEN SHOTS
- 52 -
- 53 -
- 54 -
- 55 -
- 56 -
- 57 -
- 58 -
- 59 -
- 60 -
- 61 -
- 62 -
- 63 -
- 64 -
- 65 -
- 66 -
FUTURE
ENHANCEMENTS
- 67 -
8. FUTURE ENHANCEMENTS
Globalizing the application by making it useful for many other products of this
variant.
the departments.
Multiple centralized databases can be managed for multiple users either over
internet or intranet.
- 68 -
CONCLUSION
- 69 -
9. Conclusion
This project has been able to successfully incorporate all the requirements as
specified by the user. Appropriate care must be taken during database design to
maintain database integrity and to avoid redundancy of data. Validation is done
instantaneously to avoid data inconsistency. The package was designed in such a way
that any further modifications needed can be done easily. The user is provided with a
friendly interface by hiding all technical complexities. The user can easily interact
with the package. It has been thoroughly tested and implemented.
- 70 -
REFERENCE
- 71 -
REFERENCE
Books
International Editions)
Sudarshan
Web Sites
http://www.w3schools.com
http://www.ebizgc.com
http://www.cde.state.co.us
http://lists.webjunction.org/libweb/
http://libraryautomation.com/
http://www.librarytechnology.org/
http://marylaine.com
http://www.inm.com/
- 72 -