Professional Documents
Culture Documents
We are glad to express our deep sense of gratitude to Mr. M. RAVISANKAR, for guiding throughout this project and for her persistent encouragement in bringing this main project to a successful completion. We express our heartfelt gratitude and deep indebtedness to our beloved Head of the Department Ms. B.RENUKA DEVI for his great help and encouragement in doing our main project successfully. We express sincere thanks to our Principal Dr. M. VENKATA RAO for his guidance in the main project. We also express our proud gratitude to our honorable Director Dr. V.
MADHUSUDHAN RAO, for his encouragement and facilities provided during the course of project. We express our heartfelt gratitude to all Lab Technicians, who helped us in all aspects of lab work. We thank one and all who have rendered help to us directly or indirectly in the completion of this work.
ABSTRACT
An automated security credit checking system for checking a credit application for fraud before a credit card is issued. The credit checking system helps determine whether the application is legible, and whether there is a discrepancy between the post mark and the mailing address. It automatically determines whether the application is a corporate or individual application, and whether the application is one of numerous requests from the same person, employer, or address. It also tracks the status of each application and the route each type of application has taken, whether it is a corporate application, a suspected fraudulent application, a verified fraudulent application, or a rejected application. The automated credit checking system keeps a daily tally of the number of corporate applications received, the percentage of individual applications approved, the percentage of individual applications declined or rejected, and the percentage of individual applications that were detected as being fraudulent.
ii
CONTENTS
TOPICS
ACKNOWLEDGEMENT ABSTRACT LIST OF FIGURES
PAGE NO
i ii v 1 2 2 2 3 3 4 4 5 5 6 7 7 7 7 8 9 11
1. 2.
3.
SYSTEM ANALYSIS
3.1 3.2 3.3 3.4 Existing System Proposed System Software Requirement Specification User Requirement Specification 3.4.1 3.4.2 3.5 User Characteristics Functional Requirements
Feasibility Study 3.5.1 3.5.2 3.5.3 Technical Feasibility Economic Feasibility Operational Feasibility
3.6
Requirements
4.
SYSTEM DESIGN
4.1 Introduction to Java
iii
4.2
UML Diagrams 4.2.1 4.2.2 4.2.3 4.2.4 4.2.5 4.2.6 4.2.7 4.2.8 4.2.9 Data Flow Diagrams Use case Diagrams Sequence Diagrams Collaboration Diagrams Activity Diagrams State Chart Diagrams Class Diagrams Object Diagrams Component Diagrams
16 19 21 22 24 26 27 27 28 29 29 31 32 32 32 34 36 42 43 43 43
5. 6.
CODING TESTING
6.1 6.2 6.3 Four Levels of Testing Error Messages Testing Techniques
7. 8.
BIBLIOGRAPHY
References Websites
iv
LIST OF FIGURES
FIGURE NO CONTENT
4.2.1 4.2.2 Data Flow Diagrams Use case Diagrams
PAGE NO
19 21
Sequence Diagrams Collaboration Diagrams Activity Diagrams State Chart Diagrams Class Diagrams Object Diagrams Component Diagrams Deployment Diagrams
22 24 26 27 27 28 29 29