Co Ma PR
Co Ma PR
Co Ma PR
1. Certificate 2. Certificate of approval 2 3. Declaration 4. Acknowledgement 5. Objective & Scope of the Project 6. Theoretical Background 7. Definition of Problem 8. System Analysis & User Requirements 9. System Planning (PERT Chart) 10. Methodology adopted, System Implementation & Details of H/W& S/W used 11. Detailed Life Cycle of the Project 12. ERD, DFD 13. Process involved, Algorithm, Flowchart, Database diagram 32 14. Input and Output Screen Design(Snapshots) 39 15. Methodology used for testing 56
3 4 6 8 21 22 23 25 26 29
16. User/Operational Manual (security aspects, access rights, back up, controls, etc.) 58 17. Future enhancement 18. Conclusions 19. references 60 61 63
1.1 Objective This is a web oriented application allows us to access the whole information about the college, staffs, students, facilities etc. This application provides a virtual tour of Campus. Here we will get the latest information about the students and staffs. This generic application designed for assisting the students of an institute regarding information on the courses, subjects, classes, assignments, grades and timetable. It also provides support that a faculty can also check about his daily schedule, can upload assignments, and notices to the students. Here administrator will manage the accounts of the student and faculties, makes the timetable, and upload the latest information about the campus. 1.2 Scope College information: Through this service one can access the complete information about the college campus such as courses available, admission procedure, placements, college events, achievements etc. Student tracking: Any company or any organization that want to check the summary about the student of the college, so that they will be able to choose the particular students for their campus placement And for that purpose they will be given a particular link through which they can access the information required.
Student attendance status: It gives the attendance status of students. Faculty will update the attendance periodically and can be seen by students and parents.
Students performance in exams: This facility provides the performance of the student in each exam which is conducted by university or college such as midterm performance. Marks obtained by students in exams will be updated by faculties that can be access by students and parents.
Exam Notification: This facility notifies students and parents about examination schedule.
Events: It will give information about different events that will be conducted by college time to time. Information about these events will be updated by administrator.
Online assignments: This service provides the facility to faculty to upload assignments and to students to submit these assignments online.
Information about staff: It will help in maintaining complete information about college faculty members such as their department, cadre, date of joining, salary, etc. Administrator will register new faculties and remove their account when they leave the college.
2. Theoretical Background
Today in colleges student details are entered manually. The student details in separate records are tedious task. Referring to all these records and updating is needed. There is a chance for more manual errors. Problems in existing system: It was limited to a single system. It was less user-friendly. It have a lots of manual work (Manual system does not mean that we are working with pen and paper, it also include working on spread sheets and other simple software's) It requires more no of employees need to work. It was time consuming process. The present system was very less secure. It is unable to generate different kinds of report.
Solution to these problems: The development of the new system contains the following activities, which try to automate the entire process keeping in view of the database integration approach. User friendliness is provided in the application with various controls. The system makes the overall project management much easier and flexible. It can be accessed over the Internet.
Various classes have been used to provide file upload and mail features. There is no risk of data mismanagement at any level while the project development is under process.
It provides high level of security using different protocols like https etc.
3. Problem Definition
The problem is to provide the complete information about the college campus. In which the college staff members, students and parents can access the information and will be familiar with college campus. It will provide interactive environment for the staff, students and parents by getting knowledge of student attendance, remarks, exams performances, grades, timetables, notices etc.
After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the activities are equally important, but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking and understanding of existing running system is also difficult, improper understanding of present system can lead diversion from solution. 4.2 Analysis Model This document play a vital role in the development of life cycle (SDLC) as it describes the complete requirement of the system. It means for use by developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. SPIRAL MODEL was defined by Barry Boehm in his 1988 article, A spiral Model of Software Development and Enhancement. This model was not the first model to discuss iterative development, but it was the first model to explain why the iteration models. As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase starts with a design goal and ends with a client reviewing the progress thus far. Analysis and engineering efforts are applied at each phase of the project, with an eye toward the end goal of the project. The steps for Spiral Model can be generalized as follows: The new system requirements are defined in as much details as possible. This usually involves interviewing a number of users representing all the external or internal users and other aspects of the existing system. A preliminary design is created for the new system.
A first prototype of the new system is constructed from the preliminary design. This is usually a scaled-down system, and represents an approximation of the characteristics of the final product.
A second prototype is evolved by a fourfold procedure: 1. Evaluating the first prototype in terms of its strengths, weakness, and risks. 2. Defining the requirements of the second prototype. 3. Planning and designing the second prototype. 4. Constructing and testing the second prototype.
At the customer option, the entire project can be aborted if the risk is deemed too great. Risk factors might involved development cost overruns, operatingcost miscalculation, or any other factor that could, in the customers judgment, result in a less-than-satisfactory final product.
The existing prototype is evaluated in the same manner as was the previous prototype, and if necessary, another prototype is developed from it according to the fourfold procedure outlined above.
The preceding steps are iterated until the customer is satisfied that the refined prototype represents the final product desired.
The final system is constructed, based on the refined prototype. The final system is thoroughly evaluated and tested. Routine maintenance is carried on a continuing basis to prevent large scale failures and to minimize down time.
In the flexibility of the uses the interface has been developed a graphics concept in mind, associated through a browses interface. The GUIS at the top level have been categorized as 1. Administrative user interface 2. The operational or generic user interface The administrative user interface concentrates on the consistent information that is practically, part of the organizational activities and which needs proper authentication for the data collection. The interfaces help the administrations with all the transactional states like Data insertion, Data deletion and Date updation along with the extensive data search capabilities. The operational or generic user interface helps the users upon the system in transactions through the existing data and required services. The operational user interface also helps the ordinary users in managing their own information helps the ordinary users in managing their own information in a customized manner as per the assisted flexibilities. 4.4 Number of Modules The system after careful analysis has been identified to be presented with the following modules: The modules involved are: 1. College information: Through this service one can access the complete information about the college campus such as courses available, admission procedure, placements, college events, achievements etc. 2. Student tracking: Any company or any organization that want to check the summary about the student of the college, so that they will be able to choose the particular students for their campus placement And for that purpose they will be given a particular link through which they can access the information required. 3. Student attendance status: It gives the attendance status of students. Faculty will update the attendance periodically and can be seen by students and parents.
4. Students performance in exams: This facility provides the performance of the student in each exam which is conducted by university or college such as midterm performance. Marks obtained by students in exams will be updated by faculties that can be access by students and parents. 5. Exam Notification: This facility notifies students and parents about examination schedule. 6. Events: it will give information about different events that will be conducted by college time to time. Information about these events will be updated by administrator. 7. Online assignments: This service provides the facility to faculty to upload assignments and to students to submit these assignments online. 8. Information about staff: It will help in maintaining complete information about college faculty members such as their department, cadre, date of joining, salary, etc. Administrator will register new faculties and remove their account when they leave the college.
6. Methodology Adopted, System Implementation & Details of Hardware & Software Used
7.1 Requirement Analysis: This process is also known as feasibility study. In this phase, the development team studied the site requirement. They investigate the need for possible dynamic representation of the site and increase security features. By the end of feasibility study, the team furnishes a document that holds the different specific recommendations for the candidate system. It also includes personnel assignments, costs, project schedules, target dates etc. the requirement gathering process is intensified and focused specially on software. The essential purpose of this phase is to find the need and to define the problem that needs to be solved. During this phase following facts were gathered.
Establish the goals and objective for the proposed system Feasibility for the new system
7.2 System Analysis and Design: In this phase the softwares overall structure and its nuances are defined. In terms of client server technology the no of tiers needed for the package architecture, database design, data structure design etc are defined in this phase. Analysis and Design are very crucial in entire development cycle. Any glitch in this phase could be expensive to solve in the later stage of software development. Hence following is the essential approach taken during website designing:
7.3 Testing: Once the code is generated, the website testing begins. Different testing methodologies are done to unravel the bugs that were committed during the previous phases. Different testing methodologies are used:
Login
Admin
Students info
Admin
Login Login
Id
Passwor d
Admin
Enter details
Student table
Modify
Faculty info.
Notification
Login
Student
Students info
Student
Login Login
Id
Password
Student table
Student
Student Faculty
Submission
Database Design:-
without any knowledge of internal implementation. Black box testing methods include: equivalence partitioning, boundary value analysis, all-pairs testing, fuzz testing, model-based testing, traceability matrix, exploratory testing and specification-based testing.
2) White box testing - White box testing, by contrast to black box testing, is when
the tester has access to the internal data structures and algorithms (and the code that implement these).White box testing methods can also be used to evaluate the completeness of a test suite that was created with black box testing methods. This allows the software team to examine parts of a system that are rarely tested and ensures that the most important function points have been tested.
3) Grey Box Testing - Grey box testing involves having access to internal data
structures and algorithms for purposes of designing the test cases, but testing at the user, or black-box level. Manipulating input data and formatting output do not
qualify as "grey box," because the input and output are clearly outside of the "black-box" that we are calling the system under test. This distinction is particularly important when conducting integration testing between two modules of code written by two different developers, where only the interfaces are exposed for test. Grey box testing may also include reverse engineering to determine, for instance, boundary values or error messages.
Security testing is essential for software which processes confidential data and to prevent system intrusion by hackers.
Internationalization and localization is needed to test these aspects of software, for which a pseudo localization method can be used.
11. User/Operational Manual - Including SECURITY ASPECTS, ACCESS RIGHTS, BACK UP, CONTROLS, etc.
13. Conclusion
14. References