E Fund Management System

Download as pdf or txt
Download as pdf or txt
You are on page 1of 61

-1-

INTRODUCTION
 Theoretical background

Our project is complete GUI based, menu driven project so we have to only click to perform any
kind of functions because GUI based, menu driven system is more user friendly as compared to CUI
based system. Our system can support VB and many of other picture formats. This project is able to
maintain the databases of the clients, sub-brokers, transactions, logins of each client etc. We can easily
add new clients, new sub-brokers, brokers and transaction details of the clients. This project is operated
by many kinds of users As far as user characteristic are concerned that any user is able to operate the
project hence very much skills are not required, thus the user characteristics decide the training plan
also.

 Types of Funds

These funds are of various types and setup for various purposes and objectives. Some are closed
ended with contributions from members collected during a definite time – frame of a few days to a few
months. Thus, the issue of Can Growth was kept open for only a few days, while the LIC Mutual Fund
(viz., Dhanaraksha) was kept open for a few months. The life of the Fund, which is close- ended, may
also be for a specific period of 5 to 7 years after which the income and profits in the form of capital
appreciation etc. Are all distributed back to the members after deduction of expenses of the Funds by
its Trustees. Some of the Mutual Funds are open -ended like the UTI scheme of 1964 under which units
are purchased and sold throughout the year and a member can enter the scheme anytime or walk out
of it also any time.

Further, the Fund can be classified into three types by objectives, namely, those incomes alone,
for growth alone and for both. The income Funds aim at the maximization of income without pursuing
the growth objectives while the growth Funds specialize in securing capital appreciation, irrespective of
income. But income and growth Funds aim at both and in a judicious mix.

These Funds can also be classified into various types based on the pattern of their investments.
Some Funds may invest in debentures alone or fixed interest securities like the Government Bonds and
Treasury Bills. Others may invest in variable dividend securities like equities and semi-government Bonds
called GILT FUNDS. In advanced countries these are Fund specializing in this manner in fact some Funds
are set up only for investment in real estate. In the countries like the USA and the UK, where the mutual
Fund business has grown vastly, there are thousands of such Funds, some of them being quoted and
traded on the stock exchanges as well. In these countries, mutual funds are well regulated but permitted
to be setup in the private sector. Besides, the Funds business has just been initiated by breaking the
monopoly of the UTI for the first time but even so, the permission to set up mutual Funds in INDIA was
granted only to public sector agencies until 1992. The policy has been liberalized since, to permit private
sector also to set up Mutual Fund. There are at present 32 private Mutual sector Funds operating in
addition to 12 public sector Mutual Funds.

 Sources of Funds

For every business enterprise, there are two sources of business Fund. These are:

1. Owner's Fund.
2. Borrowed Fund.
1. Owner's Fund

Owner’s Fund refers to the Funds contributed by owners as well as the accumulated profit of
company. This Fund remains with the company and it has no liability to return this Fund.
-2-

For Example, equity shares, retained earnings.

Main Features of Owners Fund are:

▪ Source of permanent Capital. The owners Fund remains permanently invested in the business. It
is not refundable like loan or borrowed Fund. A large part of owner Fund is used for acquiring fixed
assets. This type of finance is available for all purposes throughout the life of business.
▪ Provision of Risk Capital. The owners Fund is also known as the risk capital of the business, as the
result on this capital depends upon the rate of earning of the company. In case company is
incurring loss then it is not compulsory to pay any return on owners Fund. If loss continues owners
may be unable the recover even their original investment. The return on owners varies with the
profit earning of the company, which is why it is called risky capital.
▪ No Security Required. No security required.
▪ Sources of Owner's Fund. The owner fund comprises of share unity has to be offered against
ownership capital retained earnings.

➢ MERITES OF OWNER'S FUND

The advantages of ownership capital are:

✓ Permanent Capital. The owner's Fund remains with the business permanently. It is not
refundable capital.
✓ Improve credit. Worthiness. The amount of owner's fund in the capital improves the
credit-worthiness of the company.
✓ No Security Required. Company has to offer no security for raising capital from owner's
Fund.
✓ High amount of Funds can be generated. Unlimited amount of capital can be raised by
issue of owner's Fund security.
✓ Right to Control. The final decision in the business organization is taken by the owner's

➢ DEMERITS OF OWNER'S FUND

There are certain limitations of ownership capital. These are:

✓ Diffusion of Control. This may reduce the control and powers of the real owners who
have promoted the company.
✓ Under-Utilization of Capital. Ownership Funds cannot be reduced easily as this are a
permanent source of capital.

2. BORROWED FUND

Borrowed Fund refers to the borrowing if the firm. It includes all Funds available by way of loans
or credit.

Features of Borrowed Fund Capital are:

▪ Fixed Time. The Borrowed Fund is raised by business firm for specified periods. These Funds
may be raised for short term, medium term or long term.
▪ Security. Generally firm can borrowed Funds against the security of assets. Bank and financial
institutions offer loans on different terms against the security of assets.
▪ Regular Payment of Interest. It is legal compulsion of business firm to pay a regular amount
of interest on borrowed fund. The principal amount also has to be paid within a fixed time
period.
▪ Control. The borrowed Fund security holders have the right to sue the firm in case there is
default in payment of Interest or repayment of loan amount.
-3-

➢ Merits of Borrowed Fund

✓ Inference Infer. Borrowed Fund security holders do not get any right to control.
✓ Interest as an Expense. The interest paid on borrowed fund is treated as an expense and is
deducted from the total income of the firm while calculating the income tax. So the tax
liability is reduced.
✓ Flexibility. The amount of borrowed Fund can be increased by raising more and can be
decreased by paying them back.
✓ Fixed Rate of Interest. A fixed rate of interest is paid on borrowed Fund.

➢ Demerits of borrowed Funds

✓ Adequate security. Borrowed Funds are usually available up to 80% of the value of assets.
✓ Fixed liability. Payment of interest and repayment of principal amount of borrowed fund is
a fixed liability of company.

 Methods of Raising Fund

Companies can raise fund from the following methods:

❖ Retained earnings
❖ Trade credit
❖ Factoring
❖ Public deposit
❖ Commercial paper
❖ Shares: Equity shares and Preference shares
❖ Debentures
❖ Commercial banks

❖ Retained Profits/Earnings

Retained profits are also known as plaguing back of profit, retained earnings, self-fund or
internal fund, reserves or surplus. Retained earnings refer to undistributed profits after payment or
divided and taxes. It provides and the basis of expansion and growth of companies. It is considered the
most important source of fund; since it is internally generated, this method of fund is known as FUND
Self.

➢ Features of Retained earnings:

✓ Cushion of Security. The retained earnings are considered as a Cushion of Security


because they provide support in times of adversity.
✓ Funds for new and innovative Projects. The retained earnings are a common source of
funds for financing risky and innovative Projects. It is used for research work.
✓ Medium and long term Finance, Retained profit Is considered as an ownership Fund.

❖ Trade Credit

Trade Credit refers to arrangements were by a manufactures is granted credit from the supplier
of raw materials, inputs, spare parts etc. The suppliers allow their customers to pay their outstanding
balance, within a credit period. Generally the duration of trade credit is three to six months and thus it
is a short term financing facility. The availability of trade credit depends upon:

▪ Nature of the firm


▪ Size of the firm
▪ Status or credit worthiness of the firm.
-4-

❖ Factoring

Factoring is a financial serviSystem Requirement Specificationce under which factor


renders the following services:

✓ Discounting of Bills of Exchange: When goods are sold on credit then a supplier generally draws
bills of exchange upon customers who are required to accept the same. The term of bills of
exchange is generally three months. Instead of holding or keeping the bill with himself the
supplier gets it enchased before maturity date is called Discounting of Bills.
✓ Providing information regarding the Creditworthiness of Prospective clients: Factors collect
detailed Information regarding the financial history of different companies, which can be used
by the financier who may lend money to these companies.
✓ Leasing Financing: Leasing is a contract between lesser and lessee, whereby the lesser permits
the lessee to use the asset acquired by the lesser in return of a payment called rent.
✓ Lesser: Lesser is called the owner of the assets and lessee hires the assets by paying rent. With
leasing contract the lessee can use the assets without investing a high amount of fund for
buying it.

❖ Public Deposits

Public Deposits refers to unsecured deposits invited from the public. A company
wishing to invite public deposits places advertisement in newspapers. Any member of
public can fill up the prescribed from and deposit money with the company.

Public deposits are simple to rise. A company simply has to place and
advertisements in the newspaper. Any member of the public can deposit money with
company by filling a prescribed form. The company issues a deposit receipt in return and
on the reverse of the receipt the term and condition of the deposits are printed.

❖ Commercial papers

Commercial papers are a source of short-term funds. The commerce paper was
introduced in India for the first time in 1990. It is an unsecured promissory note issued by
public or privet sector companies with a fixed maturity period, which varies from 3 to 12 months.
Since these are unsecured that is why companies having a good reputation generally issue these, it is
a continuous source of Funds as its maturity can be changed according to the requirement of the
company. Cost of issuing commercial paper is low. It is lower than the cost involved in taking loan.
Commercial papers are freely negotiable instruments; Companies can also invest their axis money in
discounting the commercial papers and earn a good amount of return. Commercial papers are an
impersonal method of financing.

❖ Shares

A share is the smallest unit in which owner's capital of the company is divided. A share
is the interest of the shareholder in the company measured by a sum of money for the purpose of
liabilities and interest. Shares are two types:

✓ Equity shares.
✓ Preferences shares

✓ Equity shares

Equity share is the common security issued under permanent or owner's fund. The
equity shares are those shares, which do not carry any special or preferential rights in the payment of
annual dividend or repayment of capital, at the time of winding up also capital of equity shareholders
is returned only after every claim has been settle. Act permitting companies to issue two categories of
Equity Shares:
-5-

▪ Equity shares with equal rights.


▪ Equity shares with differential rights as to dividend.

✓ Preferences shares

The face value of preference share is generally high. The preferences attract cautious
and conservative investors. The risk involved in preference shares is relatively less. Preferences
shares are those shares, which get preference over equity shares in respect; preference shares are of
two types:

▪ The payment of dividend.


▪ The repayment of investment amount during winding up.

❖ Debentures

Debentures are common securities issued under borrowed fund capital Debentures are
instruments for raising long-term debt capital. Debentures are called creditors ship securities because
debentures-holders are called creditors of a company.

"A debentures can be defined as a document or a certificate issued by a company


under its seal as acknowledgement of its debt. Holder of debenture certificate is called
debenture holder."

❖ Commercial Bank

Commercial banks occupy a very important position as they provide funds for
different purposes and different periods. Firms of all size can approach commercial
banks. Generally commercial banks provide short and mediums term loans but nowadays
they have started giving long-term loans again security.
-6-

OBJECTIVE AND SCOPE OF THE PROJECT


The main aim to design the project is to manage funds of the clients of the organization. Using
this system any person can manage his fund transaction, can view his broker and sub-broker details
and can view each and every detail of their funds in a very convenient manner. This project is able to
maintain the databases of the clients, sub-brokers, transactions, logins of each client etc. We can easily
add new clients, new sub-brokers, brokers and transaction details of the clients. E-Fund Management
is been developed to provide solution to companies that are doing business of providing funds to their
clients. We have provided five forms as Client form, Sub Broker form, Transaction form, MIS Entries
form, and Report form. The most interesting part of the software is that you can create report at any
time and especially you can create report of the profit or growth of company between specific intervals.
-7-

IDENTIFICATION OF THE PROBLEM


The first step in an initial investigation is to define the problem that led to the user request. The
problem must be stated clearly, understood & agreed upon by the user and the analyst. It must state
the objective the user is trying to achieve the result the user want to see. Emphasis should be on the
logical requirement of the problem rather than the physical requirements.

Given user identification of need the analyst proceeds to verify the problem by separating
symptoms from causes. Related to the problem identification is the verification of customer
requirement- the quick and accurate of project information.

The project named "E-Fund Management System" is the project, which enables the
organization to maintain the database of each and every client and their transactions, reports and to
view all these reports.

While making this project we felt that the project is planed only for certain specifics tasks and
is also restricted to online working. Secondly, since the system requires data handling, a suitable
database should be used with tables for storing various types of data. There is a question of referential
integrity involved, so the SQL should be provided for that also.

Since this system has heavy interaction with user, it should have a powerful end user interface;
preferably graphical user interface should be used. It should be able to handle function. It is supposed
to handle & should be correct. It implies correction as criticism. The performance of the system should
be fast and reliable.

The result should be consistent that is no two simultaneous operation of the same produce
different results depending on their order of application. There should be no data redundancy. Any
one should not manipulate the client records except authorized members that are security should be
enforced.

SQL as a back- end must be used since large volume of interrelated data is involved. Hence, the
error may also occur by conflicting between differences of various operating systems. If you will make
this project under Windows XP and Office 2003 & will run and test it on an older operating system such
as Windows 98 having MS-Office 97 or 2000, then at the time of running this project, a runtime error
will generate.
-8-

PLANNING MATRIX
The database tables should be normalized in order to avoid redundancy. Since if, only computer is used
for transaction, so no concurrency problem will arrive. Since there are some tables that work as back-
end, so a password facility must be provided, hence this project is constructed under windows based
application, & a window is a graphical user interface, so a graphical user interface must be provided, so
that users may find interaction with the system with easy task.

User cannot do any more correction in this project without having any knowledge about coding in
visual basic.net. User cannot understand the coding of this project without in-depth knowledge of coding
in visual basic.net.

I have faced a lot of problem during making this project. For example: - compilation error, coding errors,
wrong events and wrong connection make calling errors. These errors are human generated so this fact
doesn't have any doubt that if the above error will occur at the running of this project the output will
not be up to user satisfaction.

Besides the problem of reliability, validity, accuracy, economy and timeliness capacity are common. A
capacity problem occurs when a component of a system is not large enough.

PERT CHART

It means program evaluation review technique chart. It is used to represent graphically the
project task activities and their relationship. Different features on the PERT chart can highlight the
different types of tasks. The special feature of the PERT is that connecting an activity with its predecessor
and successor activities shows the ordering of activities. But the relative size of node, which represents
an activity by arcs, does not imply the activity duration.

Features of PERT: -

1. PERT usually shows the sequence decencies between activities of software project.
2. PERT never shows the time overlap of activities but it can be done in parallel.
3. The slake time between two processes is represented in PRTS by showing data within the
activity network.
4. It forces the manager to do planning properly.
5. It shows the interrelationship among the tasks in the project and in particular, clearly identifies
the critical path of the project.
6. It exposes all possible parallelism in the activities and thus helps in allocating resources.
7. It enables manager to monitor and control the project.

Project scheduling and management requires that time, casts and resources be controlled resources &
any person, group of people, piece of equipment of material used in accomplishing an activity & PERT is
a critical path scheduling technology used for controlling resources. A critical path refers to a sequence
of activities whose order and duration directly method PERT is one of the most widely used and best
known. PERT control time and cost during the project and also facilitates finding the right balance
between completing the project on time and completing it within the budget. PERT recognizes that
projects are complex, that some task must be completed before the others can be started, and the
appropriate way to manage a project is to define and control each task. PERT is designed to facilitate
getting a project back on schedule.
-9-

START
Docu
Analys
menta
is
tion

Desig
End
n

Deplo Codin
yment g

Testin Integr
g ation

GANTT CHART

A Gantt chart is a horizontal bar chart developed as a production control tool in 1917 by Henry
L. Gantt, An American Engineer and social scientist. Frequently used in project management, Gantt chart
provides a graphical illustration of a schedule that helps to plan, coordinate, & track specific task in the
project. Gantt charts may be simple versions created on graph paper or more complex automated
versions created using project management applications. Such as Microsoft project or Excel
permanently. It is not refundable capital.
- 10 -

21 Nov 25 Nov 3 Dec. 9 Dec. 11 Dec. 14 Dec. 16Dec.

Start

Analysis

Design

Coding

Integration

Testing

Deployment

Documentation
- 11 -

WATERFALL MODEL

It is the simplest, oldest and most widely used process model. In this model, each phase of the
life cycle is completed before the start of a new phase. It is actually the first engineering approach of the
software development. The waterfall model provides a systematic and sequential approach to software
development; it can accommodate new requirements only in the maintenance phase. There is no way of
judging the problem of the software in-between different.

Update and

Requirement requirement

Specification

Design

Implementation

Integration

Maintenence
- 12 -

PLATFORM SPECIFICATION
This project is very small scale project thus required nominal H/W like

➢ Memory - 16 MB RAM
➢ Monitor - PCI/VGA
➢ Keyboard - 108 keys
➢ Hard Disk - 30 MB
➢ Floppy Disk - 1.44 MB
➢ Mouse - Two Buttons
➢ Processor - 100 MHz
➢ Printers - Laser/Inkjet Printer

This project is simple to run in windows environment with its product specification i.e.,
➢ Operating System – Windows XP or above
➢ Frontend Required – Visual C#2008
➢ Backend Required – SQL 2005

❖ Concurrency Issues

Concurrency issue are considered when the project is multi-user so these issues details
about the limitations of multi-user system but our project is a single user so these issues have no
consideration at all.

❖ Performance required

▪ Efficiency

Efficiency tells the accuracy and preciseness of the project. The calculation efficiency
depends on the software that is used to develop the project limit but we have to make as efficiency
need project which fulfil the organization need efficiently.

▪ Response time

The duration between two events when system accepts the data and provides the out
response time which mainly depends on the processors speed in the machine and the complete
transition path, which travel the data over project, limited number of modules and thus response
time is only fraction as second.
- 13 -

SYSTEM REQUIREMENT SPECIFICATION


❖ OS Software

The software is generated using Windows XP as operating system Visual studio. Net 2008, SQL server
2005

❖ FRONT END:- VISUAL C#.NET 2008

.NET is a "software platform". It is a language-neutral environment for developing rich .Net


experiences and building applications that can easily and securely operate within it. When developed,
those applications will target .Net and will execute wherever .Net is implemented instead of targeting a
particular hardware OS combination. The components that make up the .Net platform are collectively
called the .Net framework.

The .Net framework is a managed, type-safe environment for developing and executing
applications. The .Net framework manages all aspects of program execution, like allocation of memory
for the storage of data and instructions, granting and denying permissions to the application,
managing execution of the application and reallocation of memory for resources that are not needed
j
❖ Operating System

Windows XP*2 Is considered as a standard operating system to develop this project but it can
also be developed at all derivatives of windows operating system.

Windows XP-2 includes following new features.

✓ A web-aware user interface that allows web like views of local resources and a single tool for
browsing local. Network and internet resources.
✓ Integrated internet software including Microsoft internet Explorer, outlook Express,
NetMeeting, personal Web Server, Front Pad, and NetShow.
✓ Improved networking support with a faster TCP/IP protocol stack, improved dialup
networking. And support for virtual private networking.
✓ Support for FAT-32 drives and a FAT-32 conversion utility.
✓ Support for Universal Versatile Disc (DVD) and for multiple monitors on a single computer.

❖ Browser

These are specially required when the web pages are included within the project and the project
is internet or internet based project some popular web browser are Internet Explorer, Netscape
navigator etc. but here no such requirement of this browser.

❖ Server

Servers are all required when the project servers are puts IIS, Apache etc. but here such
requirement is not necessary.

 Feasibility Study

When once relevant team members recognize a need then the proposed system is evaluated
with reference to certain parameters related to our organization. With reference to each given below
parameter, the fact is determined that "Whether the system is feasible or not" and after only this
evaluation system will proceed. Parameters are given below:
- 14 -

❖ Economical Feasibility

Whatever the project worth for an organisation but this feasibility decides the cost/benefit
analysis of the system because until and unless the project is not economical so it is not feasible to us.
As we are designing our college project with very less resources so its cost is Rs. 5.00 only.

❖ Technical Feasibility

This feasibility determines the utilization of existing available hardware and software resources
with the organization as we are automating the system and we are not having any concerned of the
software or hardware installed. Concerning software part people will take a short training and will be
sufficient to handle the project.

❖ Time Feasibility

System is so good but it cannot be developed in the desired schedule so it has no use. Our project
is time feasible because we were able to develop this project within the given time course.

❖ Resource Feasibility

This feasibility decides the utilization of remaining all existing resources of an organization. Our
project is very simple and it requires very less resources apart from desired, so we have no need to spend
additional resources cost.

❖ Behavioural Feasibility

Behavioural feasibility is the most important feasibility, which decides the under acceptance of
the project within the organization. Our project is user friendly as it takes very less time for training and
is easy to operate or handle the project.
- 15 -

INFORMATION GATHERING

Policies

Goals The
Objectives Organization

Organization Structure

Authority Relationship To
User staff Information
Job functions
Gathering
Information Relationships

Interpersonal Relationships

Work Flow

Methods and
The Work
Procedures
Itself
Work Schedules

Categories of Information

Information Gathering:

The analyst must decide on the information gathering tool and how it must be used. Although
there are no standard rules for specifying their use, an important rule is that information must be
required accurately, methodically, under the right conditions, and with minimum interruption to user
personnel.

For example, if the analyst needs only information available in existing manual is not up to date.
- 16 -

Review literature,
Procedure, and Forms

On-site Observation

Information
Data
Gathering Interview
Organization
Tools

The work itself

Information Gathering Methods


- 17 -

SYSTEM ANALYSIS
❖ Application Security

Unauthorized users can not access any kind of information within project for this we are
providing the user-id and password and a master password option which can be accessed by only
authorized users.

❖ Maintainability

The project is user friendly and provides certain helping tips for manage and maintain the system
easily. Due to this small error can be removed by the user himself,

❖ Reliability

The system does not have any problem within it and it performs process complexly and
effectively.

❖ Portability

Current systems standard operating system is windows 98/XP-2 but it is portable to any version
or derivates of windows as well as it can be used with stand alone PC per with network system.

❖ Extensibility

Additional of certain new modules as per the requirements of user do not afford the remaining
project and easily it will be added to fulfil the need of user.

❖ Reusability

The project has certain generalized modules and these modules can be utilized to extension and
enhance the project so reusability of these module make the enhancement very easy.

Start

Enter your username & password


Register yourself If new user
then

Yes No

Add client, sub-broker,


transaction, MIS entry detail

View client,sub-
broker,transaction, MISreport
detail

Stop
- 18 -

ENTITY DEFINITION
❖ E-R Diagrams

A diagram explains physical and logical arrangement of the database table and relationship, that
diagram is known as ER diagram. Due to less space, we had first shown entity and their attributes of our
project and then relationship between these entities. Entity relationship model for data uses three
features to describe data are: -

• Entities: - which specify distinct-real-world items in an application.

• Relationships: - which connect entities and represent meaningful dependencies between them.

• Attribute: - which specify properties of entities and relationships.

❖ Data Flow Diagrams (DFDs)

This first step is to draw a "Data-Flow-Diagram". The DFD was first developed by Larry Constantine
as a way of expressing system requirements in a graphical form. A DFD is also known as a "BUBBLE
CHART". It has the purpose of clarifying system requirements & identifying major transactions.

A DFD consists of a series of bubble joined by lines. The bubbles represent data transactions & the
lines represent data flow in the system. A DFD typically shows the minimum contents of data about
project, means the diagrammatic representation of project. Questionnaires can be used to provide
information for a first-cut. The DFD methodology is quite effective, especially when the required design
in unclear & the user & the analyst need a national language for communication.

• Source or destination of data: - Source or destination shows the square.

• Data Flow:- An arrow shows the data flow, data in motion. It is pipeline through which data flows
in a specific direction from origin to designator in the form of document letter, telephone or other
medium. Data flows in a packet of data's.

• Process: - A process or bubble shows process of data flowing in the form of incoming data to
outgoing data.
19

• Data store:- An open or close rectangular shows data-store. Data in rest or temporary
restoring of data. Here data are stored; it may be representing computer or non-computer
devices. Each components of DFD is labelled as a descriptive name.
20

DETAILED LIFE CYCLE OF THE PROJECT ERD,


DFD, UML DIAGRAMS
E-R DIAGRAMS

LEVEL 1

Name
Title
State DOB
Client Title
code E mail
F name
Ph.no.
Country
L name State

Have
Client Sub-brokers

Pin code
DOB a\c no.
Salary
a\c no. Country
E code
Post Experienc
Name of bank e
Gender Address of Joining
bank date Branch code
21

LEVEL 2

state
Clint code title Client no.
Client name

L name F name Ph. No. Transaction


no. Fund For year
name

CLINTE HA TRANSACTION
VE

DOB Pin code Amt in rupees


Fund

Account country
Investment date
No. Sub-broker
Gender Name of bank Name

Address of bank

LEVEL3: SUB-BROKER & MIS ENTRY

Transaction
Basic Fund
no.
amount name

Sub broker date Sub broker


Transaction
no. name
month Paid amt
Client name Fund name
Client name Allocation
charge
CONT MIS Entry
Add Transact
-AINS

Administrati
Fund mgmt
Fund on charge
For year
Actual amt

Investme Amt in Fund


nt date rupees Fund rate
scheme
22

DATAFLOW DIAGRAM

LEVEL0:
23

LEVEL 1:
24

LEVEL 2:

LEVEL 3:
25

LEVEL4:
26

MAIN LEVEL OF ENTITY – RELATIONSHIP


DIAGRAMS
Title
Client Code L Name

Title DOB
L Name F Name State
F Name

State Country

CLIENT Have Sub Broker

Salary
State
Address Pin Code
Experience
E Code
Post
Gender Country

Joining Date Branch


Code

DO

Basic Fund Name


Mai
Amt
nta Transactio
n No Sub Broker
Name

Date
Transaction Sub Broker Paid Amt
No. Name
Month
Allocation
Fund Name Charge
Client Name Client

MIS Entry
Add Transaction CONTAI
NS

Administration
For Year Fund Scheme Fund
Charge
Actual Amt

Fund Rate
Investmen Amt in
Fund Mgt
t Date Rupees
27

ACTIVITIES DIAGRAM

START LOGIN

MAIN FORM ADD & SAVE


CLIENT DETAIL

ADD & SAVE ADD & SAVE


SUB-BROKER TRANSACTION
DETAIL DETAIL

ADD & SAVE VIEW CLIENT


MIS REPORT

VIEW SUB- VIEW


BROKER TRANSACTION
REPORT

VIEW MIS EXIT


REPORT
28

USE CASE DIAGRAM

Login to your account. If


new user then register.

Add client, sub-broker,


USER transaction & MIS as per
requirement

View your client, sub-


broker, transaction &
MIS details.

Exit

SEQUENCE DIAGRAM FOR FUND MANAGEMENT


29

USER SCREEN SYSTEM

(1) Command to add new client


(2) Command to add new client
(3) Open form to fill
(4) Show Form client detail.

(5) Command to save client


detail (6) Command to save client
detail
(7) Client details saved
& main page is shown
(8) Main form displayed
(9) Command to add new
transaction, MIS

(10) Command to add new

(11) Transaction &


MIS added

(12) Command to view client,


sub-broker transaction & MIS (13) Command to view client,
details as per requirement sub-broker transaction & MIS
details

(14) Details shown


to user
(15) Details shown to user
(16) Details shown to user

STATE TRANSACTION DIAGRAM


30

LOGIN IF EXISTING
USER ELSE

REGISTER ADD CLIENT

ADD

ADD
TRANSACTION

ADD MIS
REPORT

EXIT
31

WORK BREAKDOWN STRUCTURE

E-FUND
MANAGEMENT

DESIGN CODING INTEGRATI TESTING DEPLOYME DOCUMEN


ON NT TATION
32

Create serial No
S

Y
Enter client, sub-broker transaction information
S S

Insert Information
E T

R Submit Information M

Prompt information is submitted

DATABASE
33

PROCESS INVOLVED
Login

Correct Incorrect

EXIT
Add View

Add MIS View


entry View Transaction
Add Client Client

View Sub-
Add broker
Transaction View MIS
Add Sub- entry
broker

1. First for login, enter user id and password.


2. If user id and password is correct then, following forms will appear,
(I) Add (II) View
In Add the following forms will appear.
a) Add client, which contains the details about client.
b) Add sub-broker, which contains the details about sub-broker.
c) Add Transaction, which contains the details about Transaction.
d) Add MIS entry, which contains the details about MIS entry,
In view the following forms will appear:
a) View client, which contains the details about client.
b) View sub-broker, which contains the details about sub-broker.
c) View Transaction, which contains the details about Transaction.
d) View MIS entry, which contains the details about MIS entry.
3. And if user id and password is incorrect then, exit.
34

SYSTEM DESIGN
System design is a solution that tells us to approach to the creation of the new system. It
provides the understanding and procedural details necessary for implementing the feasibility study.

✓ Coding: -

Coding is the process of translating of the procedure design specification into a suitable
programming language. It envelops the development of the computer program each of which forms a
component of system, which is integrated to achieve all our function

✓ Testing: -

Software testing is a critical element of software quality assurance and represents the
coding. It also uncovers errors in software.

✓ Implementing: -

Implementation means the process of converting a new or revised system design into an
operational one and post implementation review measures, the system perform against predefined
requirements.

✓ Support: -

Waterfall diagram supports us to show the clear description of our project in a very
systematic manner so that one can understand the project in one glance.
35

DATA DESIGN
Design has been described as a multi step process in which representations of data
structures, program structures, interface characteristics and procedural details are synthesized from
information requirements.

Design is an activity concerned with making major decisions often of a structural nature. It
shares with programming a concern for abstracting information representation and processing
sequences, but the level of detail is quite different at the extremes. Design builds coherent, well-
planned.

Representations of programs that concentrate on the interrelationships of parts at


the higher level and logical operations at the lower level
36

INTERFACE REQUIREMENT
Software interface: The term software interface defines the additional software, which is required to
run the project smoothly. In our project we aren't required additional software interface the project is
smoothly developed in.net frame work 3.5.

Hardware interface: If the project has some additional hardware requirement to run smoothly than
these are considered as hardware interface like modem, network card etc. required for all network and
internet bases projects but there is no requirement of these types of hardware interface to our project.

Communication interface: When the project is networking based project than the project required
communication interface like TCP/IP, IPX / SPX etc are required to implement the project but our
project had no need of such communication interface as the project is PC based project.

Design constrains:

Standard Compliance: Each and every organization has some specific business rules within over
organization the project is always concentrate on all those business rules .The rules are the standard
compliance for the project, but the developed project is a demo concept only.
37

INTERFACE DESIGN
WELCOME FORM

MASTER PASSWORD
38

LOGIN FORM

CREATION OF ID
39

AUTHORIZED LOGIN

HOME SCREEN
40

ADD SUB-BROKER
41

SUB-BROKER VALUES SAVED IN THE DATABASE


42

EDIT SUB-BROKER DETAIL


43

ADD CLIENT
44

INFORMATION OF CLIENT SAVED IN DATABASE


45

EDIT CLIENT FORM


46

ADD TRANSACTION FORM


47

MIS ENTRY
48

DATA SAVE IN MIS


49

MIS FIELDS
50

UPDATE MIS ENTRIES


51

SUB-BROKER REPORT
52

CLIENT REPORT
53

COMPANY GROWTH REPORT


54

MIS ENTIES REPORT


55

LOGIN FORM REPORT


56

TRANSACTION REPORT
57

TESTING
After completing and integrating the software module, software must be tested to
uncover as many errors as possible before deliver to our customer. Testing is a process of executing
with the intent of finding an error. To uncover all possible errors of our project we are going to
perform following four testing's:

1. Black Box Testing


2. White Box Testing
3. Alpha Testing
4. Beta Testing

✓ BLACKBOX TESTING

This testing allowed to tests that are conducted at the software interface. Although they
are designs to uncover errors, black box testing are used to demonstrate that software functions
are operational, that input is properly accepted and out is correctly produced, and that the integrity
of external information is maintained. A black box test examines some fundamental aspects of the
system with little regard for the internal logical structure of the software.

Without complete knowledge of internal workings it is difficult to design test cases. Black
box testing is also called Behavioural testing, focuses on the functional requirements of the
software. That is black box testing enables us to derive sets of input conditions that will fully exercise
all functional requirements of the program. Black box testing is not an alternative to White box
testing. Rather, it is complimentary approach that is likely to uncover a different class of errors than
white box methods.

(a) Black box testing attempts to find errors.


(b) Incorrect or missing functions.
(c) Interface errors.
(d) Errors in data structure or external database access.
(e) Behaviour or performance of errors.
(f) Initialization and termination errors.

✓ WHITEBOX TESTING

Although Visual C# itself is capable to judge the control structure errors quite accurately
but still to ensure that the correct logical flow of coding, white box testing is required. White box
testing of software is predicted on close examination procedural detail. Logical paths through the
software are tested by providing test cases that exercise specific sets of condition and/or loops. The
status of the program may be examined at various points to determine if the expected or asserted
status corresponds to the actual status. But in practice it is revealed that taking logical paths is
almost impossible even for s small program and hence several white box testing is done on small
number of paths where flow of data is important from result point of view.

White box testing is also called, as glass box testing is a case design method that used the
control structures of the procedural design test case. Using white box some tests were derived that:
58

➢ Guarantee that all independent paths within a module have been exercised at least once.
➢ Exercise all logical decisions on their true and false sides.
➢ Execute all selected loops at their boundaries and within their operational bounds.
➢ Exercise internal data structures to ensure their validity.

✓ ALPHA TESTING

It is the routine testing at developers end in which all the possible bugs are removed, all
possible modules are presented according to user, all desired calculations are correctly performed.

✓ BETA TESTING

This is the real testing of project, which is performed at the user's site, Here user himself
test the project on his own interest parameters and the extent at which the customers is satisfied
will be decided otherwise some modifications are suggested by the user and then apply this
modification to the project to make that project up to date.

DEBUGGING
Debugging is a consequence of successful testing. That is when a test care uncovers an
error, debugging is the process that results in the removal of errors. There are mainly two types of
debugging.

Backtracking: Backtracking is a fairly common debugging approach that can be used successfully in
small programs. Beginning at the site where a symptom has been uncovered, the source code is
traced backward until the site of the cause is found.

Brute Forcing: This is the most common category of debugging which involves loading the source
code with write statements and tracking line by line execution to isolate possible errors.
59

FUTURE SCOPE
There are many future scopes on this project.

1. We will create an online website for this.


2. The client can easily maintain the records and transaction.
3. Easily calculate the interest rate of the client’s borrowing fund.
4. Gives a simplified report over each and every transaction.
5. In this we can add as much facility we can give to you.

In this project we used C# .NET and SQL but in future we also improve the technologic so we’ll give
you many facilities.
60

CONCLUSION
Practical Training is a very important part of the curriculum as it strengthens the concepts
and enhances knowledge about the practical implementation of all the theory concepts, we have
learnt so far in different subjects.

This training helped us learn a lot. In this training we did the project on railway reservation
system. This project is used to keep a track on reserving the seat to the passenger. It helps
managing the system very efficiently and conveniently.

Finally, this gives us a lot of mental satisfaction that the project we have worked upon is
a real time project, which will be installed at the customer site after some more session of regress
testing.

Although the project work has been done in a complete and detailed manner but due to
the constraint of time, we could not include some more features we wanted to. We left these
features as a part of the future development. As soon as we’ll get time we’ll try to add them to
my project.
61

REFERENCES
➢ www.investopedia.com for detailed study of fund management and funding in an
organization.

➢ Mastering Visual Basic.Net (by Evangelos petrotsos) for connectivity coding.

➢ http://www.fundcn.org (Fund china organization) to study how to provide the interface


between the system being developed and the organization

You might also like