You are on page 1of 5

ACKNOWLEDGEMENT

We are glad to express our deep sense of gratitude to Mr. M. RAVISANKAR, for guiding throughout this project and for her persistent encouragement in bringing this main project to a successful completion. We express our heartfelt gratitude and deep indebtedness to our beloved Head of the Department Ms. B.RENUKA DEVI for his great help and encouragement in doing our main project successfully. We express sincere thanks to our Principal Dr. M. VENKATA RAO for his guidance in the main project. We also express our proud gratitude to our honorable Director Dr. V.

MADHUSUDHAN RAO, for his encouragement and facilities provided during the course of project. We express our heartfelt gratitude to all Lab Technicians, who helped us in all aspects of lab work. We thank one and all who have rendered help to us directly or indirectly in the completion of this work.

By D.ANUSHA-08FE1A1201 G.SRIRAM KUMAR-08FE1A1246 B.N.SANDEEP SINGH-08FE1A1227 G.L.SRAVANI-08FE1A1221

ABSTRACT

An automated security credit checking system for checking a credit application for fraud before a credit card is issued. The credit checking system helps determine whether the application is legible, and whether there is a discrepancy between the post mark and the mailing address. It automatically determines whether the application is a corporate or individual application, and whether the application is one of numerous requests from the same person, employer, or address. It also tracks the status of each application and the route each type of application has taken, whether it is a corporate application, a suspected fraudulent application, a verified fraudulent application, or a rejected application. The automated credit checking system keeps a daily tally of the number of corporate applications received, the percentage of individual applications approved, the percentage of individual applications declined or rejected, and the percentage of individual applications that were detected as being fraudulent.

ii

CONTENTS
TOPICS
ACKNOWLEDGEMENT ABSTRACT LIST OF FIGURES

PAGE NO
i ii v 1 2 2 2 3 3 4 4 5 5 6 7 7 7 7 8 9 11

1. 2.

INTRODUCTION SYSTEM REQUIREMENTS


2.1 2.2 Software Requirements Hardware Requirements

3.

SYSTEM ANALYSIS
3.1 3.2 3.3 3.4 Existing System Proposed System Software Requirement Specification User Requirement Specification 3.4.1 3.4.2 3.5 User Characteristics Functional Requirements

Feasibility Study 3.5.1 3.5.2 3.5.3 Technical Feasibility Economic Feasibility Operational Feasibility

3.6

Requirements

4.

SYSTEM DESIGN
4.1 Introduction to Java

iii

4.2

UML Diagrams 4.2.1 4.2.2 4.2.3 4.2.4 4.2.5 4.2.6 4.2.7 4.2.8 4.2.9 Data Flow Diagrams Use case Diagrams Sequence Diagrams Collaboration Diagrams Activity Diagrams State Chart Diagrams Class Diagrams Object Diagrams Component Diagrams

16 19 21 22 24 26 27 27 28 29 29 31 32 32 32 34 36 42 43 43 43

4.2.10 Deployment Diagrams

5. 6.

CODING TESTING
6.1 6.2 6.3 Four Levels of Testing Error Messages Testing Techniques

7. 8.

SCREEN SHOTS CONCLUSION

BIBLIOGRAPHY
References Websites

iv

LIST OF FIGURES

FIGURE NO CONTENT
4.2.1 4.2.2 Data Flow Diagrams Use case Diagrams

PAGE NO
19 21

4.2.3 4.2.4 4.2.5 4.2.6 4.2.7 4.2.8 4.2.9 4.2.10

Sequence Diagrams Collaboration Diagrams Activity Diagrams State Chart Diagrams Class Diagrams Object Diagrams Component Diagrams Deployment Diagrams

22 24 26 27 27 28 29 29

You might also like