Ip Final Report

Download as pdf or txt
Download as pdf or txt
You are on page 1of 42

A REPORT

ON

PROMINDS
BY

PUSHPENDRA KR BHARTI

111EC00066

AT

(NIIT SELAQUI)

An Internship Program-III station of

FACULTY OF SCIENCE & TECHNOLOGY


The ICFAI University, Dehradun
(December, 2014)

A REPORT
ON

PROMINDS
BY

PUSHPENDRA KR. BHARTI

111EC00066

Prepared in partial fulfillment of the


IP 401 Internship Program III Course

AT
(NIIT SELAQUI)

An Internship Program-III station of


FACULTY OF SCIENCE & TECHNOLOGY
The ICFAI University, Dehradun
(December, 2014)

ECE

ICFAI INSTITUTE OF SCIENCE AND TECHNOLOGY


Internship Program Division
Station: NIIT

Center: SELAQUI

Duration:

Date of Start: 2/07/2014

6 Months

Date of Submission :10/12/2014


Title of the Project: PROMINDS
ID No./Name/
Discipline/of
the student: 111EC00066/PUSHPENDRA KR. BHARTI/ELECTRONICS&COMM.
Name and designation
of the expert: MR. PRADEEP PUNDIR/ TRAINING HEAD (NIIT)
Name of the
IP Faculty: MR. GAURAV BHANDARI
Key Words: Prominds(consultancy services Application) developed using Java.
Project Areas: MIS (Management information system).
Abstract: In accordance with the requirement of B.Tech course, I have training
project on the topic Prominds. ProMinds will be a MIS application to automate the
recruitment process for the companies and available professionals. A company that
provides consultancy services provides professionals to companies according to
their need.
For this purpose the consultancy services needs to maintain the records of all
companies available for professionals and also all the professionals available
recruitment. ProMinds will consider all the requirements and will manage
resume of candidate professionals and search through the resumes to look for
right candidate for a company.

Signature of Student

Signature of IP Faculty

Date

Date

the
for
the
the

ACKNOWLEDGEMENT

The internship opportunity I had with NIIT was a great chance for learning and professional
development. Therefore, I consider myself as a very lucky individual as I was provided with
an opportunity to be a part of it. I am also grateful for having a chance to meet so many
wonderful people and professionals who led me though this internship period. Our first
sincere appreciation and gratitude goes to respected Mr. Gaurav Bhandari, my internship
faculty who extended his wholehearted cooperation, moral support and rendering ungrudging
assistance whenever and wherever need arisen. I would also like to thank our esteemed Head
Training (NIIT) Mr. Pradeep Pundir, for his invaluable and untiring guidance and
supervision throughout our training Period. He actually laid the ground for conceptual
understanding of technologies used in project.

Thank you,
Pushpendra Kr. Bharti

COMPANY PROFILE

NIIT is a leading Global Talent Development Corporation, building skilled manpower pool
for global industry requirements. The company which was set up in 1981, to help the
nascent IT industry overcome its human resource challenges, has today grown to be
amongst world's leading talent development companies offering learning solutions to
Individuals, Enterprises and Institutions across 40 countries. Leading IT journal Dataquest
has conferred upon NIIT the 'Top IT Training Company' award successively for the past 20
years, since the inception of this category.
NIIT's training solutions in IT, Banking, Finance and Insurance, Knowledge Process
Outsourcing (KPO), Business Process Management (BPM), Executive Management
Education, Vocational Skills, School Learning Solutions and Communication and
Professional Life Skills has impacted over 35 million learners since inception. NIIT's
expertise in learning content development, training delivery and education process
management make it the most preferred training partner, worldwide.
Research-based Innovation, a key driver at NIIT, has enabled the organisation to develop
programs and curricula that use cutting-edge instructional design methodologies and
training delivery. NIIT has provided computer-based learning to over 17,000 government
and private schools across the country cumulatively impacting lives of more than 10 million
students.

PROJECT

The project named PROMINDS is developed using JAVA during the industrial training.

INTRODUCTION

ProMinds will be a MIS application to automate the recruitment process for the companies
and available professionals. A company that provides consultancy services provides
professionals to companies according to their need. For this purpose the consultancy services
needs to maintain the records of all the companies available for professionals and also all the
professionals available for recruitment. It is very difficult to maintain the record of all the
companies and professionals and accordingly their requirements. To provide a user interface
and automate the processing of recruitment according to different requirements given by
companies and professionals, ProMinds is to be developed.
It will manage the resume of candidate professionals and search through the resumes to look
for the right candidate for a company.
ProMinds will be easy to use and can act as general system to manage details of Professionals
available for recruitment, for any company that provides consultancy services. It will be
developed using Java technologies.

WORKING ENVIRONMENT

INTRODUCTION TO JAVA
Java is an object-oriented programming language with a built-in application programming
interface (API) that can handle graphics and user interfaces and that can be used to create
applications or applets. Because of its rich set of API's, similar to Macintosh and Windows,
and its platform independence, Java can also be thought of as a platform in itself. Java also
has standard libraries for doing mathematics. In Java we distinguish between applications,
which are programs that perform the same functions as those written in other programming
languages, and applets, which are programs that can be embedded in a Web page and
accessed over the Internet. Our initial focus will be on writing applications. When a program
is compiled, a byte code is produced that can be read and executed by any platform that can
run Java.

CHARACTERISTICS OF JAVA
Platform independent
Java is a platform for application development. A platform is a loosely defined computer
industry buzzword that typically means some combination of hardware and system software
that will mostly run all the same software.
Java byte code is exactly the same on every platform. Java programs that have been compiled
into byte code still need an interpreter to execute them on any given platform. The interpreter
reads the byte code and translates it into the native language of the host machine on the fly.
Since the byte code is completely platform independent, only the interpreter and a few native
libraries need to be ported to get Java to run on a new computer or operating system.
Object oriented

In object-oriented programs data is represented by objects. Objects have two sections, fields
(instance variables) and methods. Fields tell you what an object is. Methods tell you what an
object does. These fields and methods are closely tied to the object's real world characteristics
and behavior. When a program is run messages are passed back and forth between objects.
When an object receives a message it responds accordingly as defined by its methods.
Robust
Java implements a robust exception handling mechanism to deal with both expected and
unexpected errors. The worst that an applet can do to a host system is bringing down the
runtime environment. It cannot bring down the entire system.. A Java enabled web browser
checks the byte codes of an applet to verify that it doesn't do anything nasty before it will run
the applet.
Multithreaded
Java is inherently multi-threaded. A single Java program can have many different threads
executing independently and continuously. Three Java applets on the same page can run
together with each getting equal time from the CPU with very little extra effort on the part of
the programmer.

Dynamic
Java programs carry with them substantial amounts of run-time type information that is used
to verify and resolve accesses to objects at run-time. This makes it possible to dynamically
link code in a safe and expedient manner. The java programming language is unusual than
other programming languages it first compiles and then interprets the program. Compile first
translate the program into intermediate language called intermediate language called java
byte code. Java byte code is platform independent code, which is further interpreted by the
interpreter on the java platform. Interpreter parses and run each java byte code instruction on
the computer. Compilation occurs only once, interpretation occurs each time when the
program is executed.

Java byte code helps in making the program write once, run anywhere. The program can be
compiled into byte code by any platform that is having the java compiler; the compiled java
byte code program is ready to run on any machine having the java virtual machine (JVM).
JVM is an interpreter for byte code.

Java platform
A java platform is the hardware or software environment in which a program runs. The java
platform has two components:
Java Virtual Machine (JVM)
Java Application Programming Interface (Java API)
JVM is a standardized hypothetical computer, which is emulated inside your computer by a
program.

Java
Source
Code

Java
Compiler

Java
Object
Code

Java Virtual Machine


Java interpreter

The program executed by the interpreter.

Computer Operating System

The Java API is a large collection of ready-made software components that provide
many useful capabilities, such as graphical user interface (GUI). The java API is
grouped into libraries of related classes and interfaces these libraries are known as
packages.

Programming language
Java language fundamentals
a) Java is purely object-oriented programming language.
b) Java is neither a superset nor a subset of C / C++.

C++

Java

INTRODUCTION TO MYSQL
The MySQL (R) software delivers a very fast, multi-threaded, multi-user, and robust SQL
(Structured Query Language) database server. MySQL Server is intended for mission-critical,
heavy-load production systems as well as for embedding into mass-deployed software.
MySQL is a trademark of MySQL AB.

MAIN FEATURES OF MySQL


Internals and Portability

Written in C and C++.


Tested with a broad range of different compilers.
Works on many different platforms. Uses GNU Auto make, Autoconf, and Libtool
for portability.
APIs for C, C++, Eiffel, Java, Perl, PHP, Python, Ruby, and Tcl are available.
Fully multi-threaded using kernel threads. This means it can easily use multiple
CPUs if they are available.
Provides transactional and non-transactional storage engines.
A very fast thread-based memory allocation system.
Very fast joins using an optimized one-sweep multi-join.
In-memory hash tables which are used as temporary tables.

SQL functions are implemented using a highly optimized class library and should
be as fast as possible. Usually there is no memory allocation at all after query
initialization.
Column Types
Many column types: signed/unsigned integers 1, 2, 3, 4, and 8 bytes long,
FLOAT, DOUBLE, CHAR, VARCHAR, TEXT, BLOB, DATE, TIME,
DATETIME, TIMESTAMP, YEAR, SET, ENUM, and OpenGIS geometry types.
Fixed-length and variable-length records.
Commands and Functions
Full operator and function support in the SELECT and WHERE clauses of
queries. For example:
mysql> SELECT CONCAT (first_name, ' ', last_name)
-> FROM tbl_name
-> WHERE income/dependents > 10000 AND age > 30;
Full support for SQL GROUP BY and ORDER BY clauses. Support for group
functions (COUNT (), COUNT (DISTINCT), AVG (), STD (), SUM (), MAX (),
MIN (), and GROUP_CONCAT ()).
Support for LEFT OUTER JOIN and RIGHT OUTER JOIN with both standard
SQL and ODBC syntax.
Support for aliases on tables and columns as required by SQL-92.
DELETE, INSERT, REPLACE, and UPDATE return the number of rows that
were changed (affected). It is possible to return the number of rows matched
instead by setting a flag when connecting to the server.
The MySQL-specific SHOW command can be used to retrieve information about
databases, tables, and indexes. The EXPLAIN command can be used to determine
how the optimizer resolves a query.

Security
A privilege and password system that is very flexible and secure, and allows hostbased verification. Passwords are secure because all password traffic is encrypted
when you connect to a server.
Scalability and Limits
Handles large databases. We use MySQL Server with databases that contain 50
million records. We also know of users that use MySQL Server with 60,000 tables
and about 5,000,000,000 rows.
Up to 32 indexes per table are allowed. Each index may consist of 1 to 16
columns or parts of columns. The maximum index width is 500 bytes (this may be
changed when compiling MySQL Server). An index may use a prefix of a CHAR
or VARCHAR column.
Connectivity
Clients may connect to the MySQL server using TCP/IP sockets on any platform.
On Windows systems in the NT family (NT, 2000, or XP), clients may connect
using named pipes. On UNIX systems, clients may connect using UNIX domain
socket files.
The Connector/ODBC interface provides MySQL support for client programs that
use ODBC (Open-Database-Connectivity) connections. For example, you can use
MS Access to connect to your MySQL server. Clients may be run on Windows or
UNIX. Connector/ODBC source is available.
The Connector/JDBC interface provides MySQL support for Java client programs
that use JDBC connections. Clients may be run on Windows or UNIX.
Connector/JDBC source is available.
The server can provide error messages to clients in many languages.
All data is saved in the chosen character set. All comparisons for normal string
columns are case-insensitive.
Sorting is done according to the chosen character set (the Swedish way by
default). It is possible to change this when the MySQL server is started. To see an

example of very advanced sorting, look at the Czech sorting code. MySQL Server
supports many different character sets that can be specified at compile and
runtime.

How Big MySQL Tables Can Be?


MySQL Version 3.22 had a 4 GB (4 gigabyte) limit on table size. With the MyISAM storage
engine in MySQL Version 3.23, the maximum table size was increased to 8 million terabytes
(2 ^ 63 bytes). With this larger allowed table size, the maximum effective table size for
MySQL databases now normally is determined by operating system constraints on file sizes,
not by MySQL internal limits.
The following table lists some examples of operating system file-size limits:
Operating System

File-Size Limit

Linux-Intel 32-bit

2 GB

Linux-Alpha

8 TB

Solaris 2.5.1

2 GB

Solaris 2.6

4 GB

Solaris 2.7 Intel

4 GB

Solaris 2.7 UltraSPARC

512

Installation

Before installing MySQL, you should do the following:


1. Determine whether or not MySQL runs on your platform.
2. Choose a distribution to install.
3. Download the distribution and verify.
Choosing Which MySQL Distribution to Install

When preparing to install MySQL, you should decide which version to use. MySQL
development occurs in several release series, and you can pick the one that best fits your
needs. After deciding which version to install, you can choose a distribution format. Releases
are available in binary or source format.

BUSINESS FUNCTIONS PROVIDED IN PROPOSED SYSTEM

1. Login: To access this application, users would be required to login through a login screen.
After authentication user would be able to access only those areas for which permissions are
given.
2. User Maintenance: That allows adding or updating the details of all employees who are
accessing this application.
3. Company Maintenance: That allows adding, updating and viewing of the details of all
companies who have given requirements for a candidate.
4. Professional Maintenance: That allows adding, updating and viewing the details of all
professionals who have given their resumes for job requirements.
5. Search Professionals: That allows the user to search professionals, through database and
document files of resumes, for companies.
6. Search Company: That allows the user to search Company for professionals on the basis
of their qualification.
7. Reports: Generate reports for this project like list of all employees, list of all the
Professionals, list of all companies.

INPUT REQUIREMENTS

1. Login.
2. Employees Details
3. Company Details
4. Professional Details
5. Specify the options for which company and professionals are to be searched
Confidential Page

OUTPUT REQUIREMENTS

1. Listing of all employees.


2. Listing of all companies.
3. Listing of all the professionals.
4. Interface which provides interactive search for professionals and companies.
5. Optimized search algorithm to search professionals according to Company requirements,
and search companies according to the profiles of the professionals.
6. Generate report for the list of companies and professionals

TECHNOLOGIES TO BE USED
1. Java- Java is Platform Independent, Secure, Object Oriented, Scalable, and Robust
Programming Language
It consists of two parts
JVM stands for Java Virtual Machine, which is run time environment to execute the
java programs.
Java API (Application Programming Interface) that consists of inbuilt classes used in
java programs.

2. JDBC (Java Database Connectivity) is an API, which is used for the communication of
java programs with different databases.

3. Windows Programming
Swings: Swings in java is a rich set of components for building GUIs and adding
interactivity to java applications. Swing includes all the components that you would
expect from a modern GUI toolkit that is table controls, list controls, tree controls,
buttons and labels. The basic architecture of swing is MVC. And are entirely made in
java.

4. Jasper Reports
Jasper Reports is an open source reporting engine. Using Jasper Reports can
generated in any type of application i.e. console application, desktop application, web
application, enterprise application.

5. MySQL
MySQL is used as database, used to store data. It is RDBMS.

PLANNING PHASE
Problem Recognition

A problem is well defined very rarely. It corps out with a vague feeling of some
statements that lead to vague conclusions. So the first task is to get more crucial
information by interviewing and meeting concerned people. It clarifies how the problem
is felt, how often it occurs, how it affects the business and which departments are
suffering with this. This phase consists of the following tasks.
Problem Definition And Initial Investigation

This phase has been identified the end-user directly involved in the system who were the
managers, assistant officer and database administrator, and the development department.
By understanding the working of database, its flow and also after conducting meetings
and interviews with the concerned persons of the department, a clear idea about the
working was obtained. A flexible approach is adapted towards people who are
interviewed. Short hand written notes are prepared based on the response of the
employees. The interviews are preferably conducted at the work place of the person
being interviewed. Detailed investigation is done in order to define the scope of the
problem .The interview is concluded with a quick resume of the ground covered during
the interview .The Questionnaire technique is combined with interviews to get the best
result. Proper care has been taken in the design of such questionnaires so that the persons
answering these questions do not feel hesitant.
Feasibility study
A feasibility study is a test of a system proposal according to its workability impact on
organization, ability to meet user needs and effective use of resources. The objective of a
feasibility study is not to solve a problem but to acquire a sense of its scope. During the
study, the problem definition is crystallized and the aspects of the problem to be included in
the system are determined. Feasibility study was done in three phases documented below.

a) Behavioral feasibility: The objective this feasibility phase is to take the operational
staff into confidence. As the success of a good system depends upon the willingness
of the operating staff, they were taken into full confidence that the new proposed
system would make their jobs easier, relieve them from the unnecessary overheads
and reduce the possibility of errors creeping into the system.
b) Economic feasibility: Economic feasibility is the most frequently used method for
evaluating the effectiveness of the candidate system. More

commonly known as

cost\benefit analysis, the procedure is to determine the benefits and savings that are
expected from a candidate system and compare them with the costs.. A cost\benefit
analysis was done for the proposed system to evaluate whether it would be
economically viable or not. Considering the programmer time and the negligible
hardware/software cost required for developing the system, it was found that the
benefits in terms of reduced overhead as a result of elimination of the requirement of
database migration and conversion was more than the cost.
c) Technical feasibility: Technical feasibility centers on the existing computer system.
(Hardware/software) and to what extent it can support the proposed addition also the
organization already has sufficient high-end machines to serve the processing
requirements of the proposed system. The project analysis phase was conducted to
learn about the proposed system, to study the problems and finally select a system that
would take care of the problems identified in the working of the present system.

ANALYSIS PHASE

Detailed Study of the Existing System

This phase provides the overall requirement for the system what is to be done. Input for
this phase is the information collected through several data collecting schemes such as
survey, cross-questioning-answering etc and the raw data obtained which is not properly
ordered and not in the precise manner. So here this raw data is converted into useful
information written in precise manner and thus output is a formal document. After

collecting all the information and requirements, they were verified from the concerned
persons by presenting a diagrammatic version of the proposed system. It helps in
reducing the total development cost and also establishes the various points for validation
and verification.

Existing System Details and Problems

It was difficult to set the JDK information on the system in the mean time. Moreover
it was a time consuming affair if a person is new to start working with java.
It was difficult to solve the problems those were arising during a particular installation
of the software because of hardware compatibility issues.
Moreover there is usage an issue concerned with the software .This issue has been
resolved by the WEB-IDE by providing Integrated Environment facility to its users.
This system provides the feature of uploading a java file already on the local machine
of the user or he can make altogether a new java program using this IDE and save it
on his local machine also..

User Requirements
Since end users are the ones who are finally going to use the system, their
requirements need to be identified. This involves questioning the end users what their
expectations were. The main requirement of the end user is that the system should be
easy to use and take less time. In addition to these another important factor was to
eliminate the need for database conversion and migration that had to be carried out
presently. After conducting interviews with the users a document called the software
requirement specification was created. This is the most important document that
forms the basis for system development. It should be consistent, complete,
unambiguous, traceable and inter-related.

Functional Requirements

The functional requirements specify relationship between the inputs and outputs. All
the operations to be performed on the input data to obtain output are to be specified.
This includes specifying the validity checks on the input and output data, parameters
affected by the operations and the other operations, which must be used to transform
the inputs into outputs. Functional requirements specify the behavior of the system
for valid input and outputs.

SOFTWARE REQUIREMENTS

1. JDK 1.7
Net Beans 7.2.1
2. Database
MySQL Database Server 5.5
3. Reports
Jasper Reports 4.7
4. Jdbc Driver for MySQL Database Server
mysql-connector-java-5.1.22-bin.jar
5. Operating System
Windows Vista / XP sp3 / Win 8 / Linux Fedora

HARDWARE REQUIREMENTS

1. Intel P4 processor with minimum 2.0 GHz Speed


2. RAM: Minimum 512MB
3. Hard Disk: Minimum 20GB

DESIGN PHASE

After the analysis phase we have with us the details of the existing system and the
requirements of the user for the new system. This phase diverts focus from the problem
domain to the solution domain. It acts as a bridge between the requirement phase and its
solution. The design phase focuses on the detailed implementation of the system
recommended in the feasibility study. Emphasis is on translating performance specifications
into design specifications.

The External Design


External design consists of conceiving, planning out and specifying the externally observable
characteristics of the software product. These characteristics include user displays or user
interface forms and the report formats, external data sources and the functional
characteristics, performance requirements etc. External design begins during the analysis
phase and continues into the design phase.

FLOW DIAGRAM DATA

SYSTEM IMPLEMENTATION AND TESTING

Implementation Issues
Implementation phase of the software development is concerned with translating the design
specifications into the source code. After the system has been designed, arrives the stage of
putting it into actual usage known as the implementation of the system. This involves putting
up of actual practical usage of the theoretically designed system. The primary goal of
implementation is to write the source code and the internal documentation so that
conformance of the code to its specifications can easily be verified and so the debugging,
modifications and testing are eased. This goal can be achieved by making the source code as
clear and as straightforward as possible. The system implementation is a fairly complex and
expensive task requiring numerous inter-dependent activities. It involves the effort of a
number of groups of people: user and the programmers and the computer operating staff etc.
This needs a proper planning to carry out the task successfully. Thus it involves the following
activities:
Writing and testing of programs individually
Testing the system as a whole using the live data
Training and Education of the users and supervisory staff
Source code clarity is enhance buy using structured coding techniques, by efficient
coding style, by appropriate supporting documents, by efficient internal comments and by
features provided in the modern programming language.

The following are the structured coding techniques:


1) Single Entry, Single Exit
2) Data Encapsulation
3) Using recursion for appropriate problems

Testing
The most important activity at the implementation stage is the system testing with the
objective of validating the system against the designed criteria. During the development
cycle, user was involved in all the phases that are analysis, design and coding. After each
phase the user was asked whether he was satisfied with the output and the desired
rectification was done at the moment. During coding, generally bottom up technique is used.
Firstly the lower level modules are coded and then they are integrated together. Thus before
implementation, it involves the testing of the system. The testing phase involves testing first
of separate parts of the system and then finally of the system as a whole. Each independent
module is tested first and then the complete system is tested. This is the most important phase
of the system development. The user carries out this testing and test data is also prepared by
the user to check for all possible combinations of correct data as well as the wrong data that is
trapped by the system. So the testing phase consists of the following steps:
Unit testing
In the bottom of coding technique, each module is tested individually. Firstly the
module is tested with some test data that covers all the possible paths and then the
actual data was fed to check for results.
Integration testing
After all the modules are ready and duly tested, these have to be integrated into the
application. This integrated application was again tested first with the test data and
then with the actual data.
Parallel testing
The third in the series of tests before handling over the system to the user is the
parallel processing of the old and the new system. At this stage, complete and
thorough testing is done and supports out the event that goes wrong. This provides the
better practical support to the persons using the system for the first time who may be
uncertain or even nervous using it.
The testing will be performed considering the following points:
1) Clerical procedure for collection and disposal of results
2) Flow of data within the organization
3) Accuracy of report output

4) Software testing which involves testing of all the programs together. This involves
the testing of system software utilities being used and specifically develops
application software.
5) Incomplete data formats
6) Halts due to various reasons and the restart procedures.
7) Range of items and incorrect formats
8) Invalid combination of data records.

SCREEN SHOTS

Splash Screen

Frame: Login Frame


Tables to be used: user master
Users: Administrator, Employee

Frame: MainFrame
Table To be Used: N/A
Users: Administrator

Panel: ProfileDetail
Table to be used: user master
Users: Administrator, Employee

Panel: User Detail


Table to be used: user master.
Dropdown will have following option:
User Type: It will contain Administrator or Employee
User Status: It will contain Active or Inactive Users Administrator

Panel: ProfessionalPersonalDetail
Table to be used: professionalpersonaldetail
Users: Administrator, Employee

Panel: ProfessionalSkillSetDetail
Tables to be used: professionalskillset
Users: Administrator, Employee

Panel: ProfessionalExperienceDetail
Table to be used: professionalexperience
Users: Administrator, Employee

Panel: CompanyRequirementDetail
Table to be used: companyrequirementmaster
Users: Administrator, Employee

Panel: Upload Rsum


Tables to be used: uploadresumemaster
Users: Administrator, Employee

Panel: Search Company


Table to be used: professionalpersonaldetail,
Companyrequirementmaster
Users: Administrator, Employee

Panel: SearchProfessional
Table to be used: professionalpersonaldetail,
Companyrequirementmaster
Users: Administrator, Employee

CONCLUSIONS

The development of the proposed system is done keeping in view the problems in the existing
system. The proposed system will not only overcome the limitations of the present system but
will also provide the following characteristics:

To provide a platform to the user for developing java programs without any input
from the user.
To save the end user from the difficult task of setting up the environment for his
programs.
To provide the end user a user friendly interface for developing his programs.
To make the life easy of a new programmer in java.

The system has been developed for the given condition and is found working
effectively. The developed system is flexible and changes can be made easily
whenever required. Using the facilities and functionalities of JAVA, the software has
been developed in a neat and simple manner, thereby reducing the operators work.

REFERENCES

The following books are being used to fulfill the requirements of the proposed project and are
helpful in the understanding, development and the maintenance of the project:

1. Software Engineering
2. JAVA

Roger S. Pressman
K.A. Mugal

3. Database System Concepts

Henry F. Korth

4. Structured Query Language

Ivan Bayros

BIBLIOGRAPHY
1. The Complete Reference Java 2
Herbert

Schildt

Java

Programming

Cookbook (ISBN

Osborne/McGraw Hill, 2007)


2. Begging Java 2
Ivor Horton Beginning Java 2,JDK Edition 5
3. Pure JFC Swing
Dr Satyaraj Pantham, Sams, Indianapolis 1999
4. Professional Java Programming
Brett Spell J2SE 5.0,Second Edition

0-07-226315-6,

You might also like