0% found this document useful (0 votes)
358 views34 pages

Project Report Ict

This document provides a project report for developing a gym management system. It includes declarations, approval from guides, acknowledgements and an abstract. The system aims to simplify management of gym members and their information for the fitness center administrator. It allows tracking members' progress and generating useful reports. Modules include membership management, booking system, sales, and reporting. Data flow diagrams and demonstrations of components like the customer profile and database are provided to explain the system structure and functionality.

Uploaded by

fizza amjad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
358 views34 pages

Project Report Ict

This document provides a project report for developing a gym management system. It includes declarations, approval from guides, acknowledgements and an abstract. The system aims to simplify management of gym members and their information for the fitness center administrator. It allows tracking members' progress and generating useful reports. Modules include membership management, booking system, sales, and reporting. Data flow diagrams and demonstrations of components like the customer profile and database are provided to explain the system structure and functionality.

Uploaded by

fizza amjad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 34

<<GYM CORNER >>

A Project Report
Submitted in partial fulfillment of the
Requirements for the award of the Degree of

ASSOCIATE OF SCIENCE DEGREE IN INFORMATION COMMUNICATION AND


TECHNOLOGY

BY
<<CANDIDATE NAME-1>> <<USER-ID>>
<<CANDIDATE NAME-2>> <<USER-ID>>
<<CANDIDATE NAME-3>> <<USER-ID>>

DEPARTMENT OF MATHEMATICS & COMPUTER SCIENCE


MODERN COLLEGE OF BUSINESS AND SCIENCE
[SESSION] – [YEAR]
DECLARATION

I certify that
a. The work has not been submitted to any other College/Institute/University for any degree or
diploma.
b. I have followed the guidelines provided by the college in the writing project report.
c. I have conformed to the norms and guidelines given in the Ethical Code of Conduct of the college.
d. Whenever I have used materials (data, theoretical analysis, and text) from other sources, I have given
due credit to them by citing them in the text of the project report and giving their details in the
references.
e. Whenever I have quoted written materials from other sources, I have put them under quotation
marks and given due credit to the sources by citing them and giving required details in the
references.

Date: DD/MM/YEAR
(NAME OF THE STUDENT)

APPROVAL OF THE GUIDE

This is to certify that the work presented in the project report entitled “<<Topic of the Project>>”, by

<Student-Name>>, UserId <<xxxxxx>>, in partial fulfillment of the requirement for the award of Degree of

Associate Science Degree in Information Communication and Technology of Modern College of Business

and Science is an authentic work carried out under my supervision and guidance.
2
To the best of my knowledge the content of this report does not form a basis for the award of any

previous Degree to any one else.

Date: DD/MM/YEAR
<<Name of Guide>>
<<Designation>>
Department of Mathematics & Computer Science
Modern College of Business and Science

ACKNOWLEDGEMENT

I would like to thank the project supervisor who has given us a guideline
at every step.
At last, I would like to pay my thanks to the participants of the study who had helped us out and cooperated in
test administration. I am also thankful to the institution of which I have been apart. Also, I would like to thank
faculty members, Lab staff, and library faculty members who had helped in completing my report.

(NAME OF THE STUDENT)

3
ABSTRACT

To make things simpler for members, gym corners were created. The fitness center's administrator has access to
all of the fitness center's members, as well as their personal information. The following is a list of the system's
primary modules. This project is a web-based tool for managing gym members, personal information, and
administrative tasks. This system also keeps track of each student's development, allowing for useful reports to
be generated on their progress.

4
CONTENTS

PAGE
CONTENTS
NUMBER
DECLARATION ii
DECLARATION CETIFICATE iii
ABSTRACT iv
ACKNOWLEDGEMENT v
CONTENTS vi

Chapter
INTRODUCTION
1
1.1 PREAMBLE
1.2 PROBLEM STATEMENT
1.3 AIM & OBJECTIVE
1.4 METHODOLOGY
1.5 SCOPE OF THE PROJECT
1.6 DEFINITION OF TERMS
1.7 OUTLINE OF THE PROJECT
2 LITERATURE REVIEW
2.1 INTRODUCTION
2.2
3 SYSTEM ANALYSIS AND DESIGN
3.1 INTRODUCTION
3.2 SYSTEM ANALYSIS
3.3 SYSTEM DESIGN
3.4 TOOLS USED FOR SYSTEM DEVELOPMENT
4. EXPERIMENTAL WORK

5
4.1 INTRODUCTION
4.2 IMPLEMENTATION
4.3 TESTING
5 RESULT & DISCUSSION
6 SUMMARY, CONCLUSION & RECOMMENDATIONS
APPENDICES
REFERENCES

LIST OF FIGURES

PAGE
CONTENTS
NUMBER
Fig 1.1
Fig 3.2

LIST OF TABLES

PAGE
CONTENTS
NUMBER
Table 1 20

6
Introduction 1

1.1 Preamble
Management of gym and health club memberships is handled by our Gym Management Software. You can
keep track of your members and their memberships, as well as communicate with them quickly and easily. Also
included in Gym Operation are a booking system, sales point, concessions, and a variety of reports to aid in the
management of the facility.
With our Gym Management Software you can manage your members, subscriptions, and activities in a one
system. It is intended for use in fitness clubs, leisure centres, and other similar establishments.
With our Gym Management Software, you'll have access to a wide range of features, including the ability to
input client information, keep track of all the details of a customer's payment plan and physical fitness.
There is a lot of information on the machinery and coaches recorded in this suggested system. This system is
also used to manage Gym's many services.
This system's structure is now much easier to grasp thanks to the Data Flow Diagram we supplied. In this case
study, there are also several charts and diagrams that provide context. On top of that, we give demonstrations of
how to use various components of the programme, such as the customer profile form and a software database.

1.2 Problem Statement


 There was a manual mechanism in place before.

 A lot of time was needed to enter data that included computations.

 It was quite difficult to do a search since there may be hundreds of submissions each year.

 In comparison to the current system, the new system is predicted to be quicker


 The Project was designed to meet the specific needs of the fitness facility. Frequently, the individual in
charge of running the center must manually record all of the transactions and data. Maintaining separate
registers for each job is a common practice. Because of this, they are unable to manage the whole
process by hand. Furthermore, the consequences of incorrect data entry might be dire.

 Because of the potential for data loss caused by a variety of factors, such as register misplacement or
destruction or illegal access, the store's Manually Managed system was particularly vulnerable.
7
 The expense of data and transaction records' upkeep and preservation is prohibitive.

1.3 Aim and Objectives

 The project's primary goal is to provide software that makes it easier for the gym to store, maintain, and
retrieve data.
 It is important to keep a record of consumers, employees who have access to records, and the service
provided by a gym.
 In addition, only staff members have access to any database and may make any essential modifications,
if needed.
 Create software that is simple to use and effectively manages the interaction between customers and
employees.
 To create a system that requires little in the way of user education. Like any other Windows platform,
most of the features and functions are the same

1.4 Methodology

In charge of creating a computerized system for a gym, I was delegated. The project's schedule and budget were
severely constrained. Each and every session and every activity must be organized in order to maximize the
utilization of practical time. Efficient project management abilities are essential for good planning, and these
skills then uncover the optimal approach to be used.
The following are some of the components of my process:

Topic Understanding:
For the project to succeed, the new area of application must be completely new. After the project was assigned
to me, I spent a lot of time going through the project requirements to figure out what was expected of me.

Modular Break –Up of The System:


 Assemble The System's Different Modules.

 It's important to put them in their proper place in the hierarchy.

8
 Recognize Where They Need the Most Help In Growing.

Web applications may be built using the Model View Controller (MVC) architectural paradigm. The following

are the three components of a Model View Controller design pattern:

• Model - The most basic level of the pattern, which is responsible for storing and retrieving data.

View-  It's up to the user to decide how much or how little of the data is shown to him or her.

Controller- Model-View interaction is managed by a piece of software code called a controller.

MVC- When it comes to software development, MVC is a popular choice since it separates the

application logic from the user interface. All requests for the application are received by the Controller,

which then works with the Model to produce any data that the View may need. This data is subsequently

used to build a final, visually appealing answer by the View. Here is a visual representation of the MVC

abstraction:

1.5 Scope of the project

People's desire to gain muscle and improve their health is growing exponentially thanks to
advancements in technology and science. Because of this, a computer-based gymnasium
management system has become a need for both society and the gymnasium sector.
With the aid of this system, owners and administrators of the gymnasium may save and manage a
vast amount of information on gym members and their daily transactions. Also suited for automatic
attendance and an online profile for the users of the system. We believe that our Gymnasium
Management System is your best bet.
Work advances and major concerns are uncovered early, making estimates (i.e., budget, timeline,
etc.) more accurate.
It can better adapt to the constant flux of software development. It is possible for software developers
to get their hands on the heart of a project far sooner than previously thought possible.

9
1.6 Definition of terms

It is necessary to begin with a technical assessment of the system. An overview design of the system's input,

output, programmes, and processes must be used to determine the viability of this project. If you've identified an

outline system, you'll need to recommend the sort of equipment, the development procedure, and how to operate

your system after it's built.

When doing an inquiry, we came across the following:

 If a newer model is proposed, is the present technology adequate?

 Is there a way to extend the system?

Functionality and performance requirements must be met while adhering to project limits. The most recent

technology is being used in the creation of this project.

1.7 Outline of the projects

It is necessary to begin with a technical assessment of the system. An overview design of the system's input,

output, programmes, and processes must be used to determine the viability of this project. If you've

identified an outline system, you'll need to recommend the sort of equipment, the development procedure,

and how to operate your system after it's built.

Using a DFD, you may get an understanding of both the information and the functional domains at the same

time. The DFD is broken down into various levels. With each iteration of DFD, more information about the

system is integrated. We break down the system into functional subsystems when constructing a DFD. As a

consequence of the DFD refinement, the data have been refined as well.

10
"Proposed System "'s" DFD is shown below. There are now two stages of refinement in the system. It has

been numbered according to the DFD rule. Even though we have attempted to include all of its components,

there is still a possibility of additional improvisation due to the ongoing project development research.

Context Level or Zero Level DFD


This level depicts the whole system as a single process in its operational environment and in its overall context.

11
ENTITY-RELATIONSHIP DIAGRAM

12
Gannt Chart:

13
Literature Review 2

2.1 Introduction
2.2
System Analysis and Design 3

3.1 Introduction

Our plan is to provide a better infrastructure for our current facilities. There are
no constraints to the suggested system, and it can surpass them all. The method
minimizes manual labor while providing adequate security.

 Security of data.
 Ensure data accuracy’s.
 Proper control of the higher officials.
 Minimize manual data entry.
 Minimum time needed for the various processing.
 Greater efficiency.
 Better service.
 User friendliness and interactive.
 Minimum time required.

3.2 System Analysis

Statistics on web page views may be discovered in the web server log file, which
keeps a running tally of all the requests the server sends and receives. Any file
that is provided generates a hit. Photos are also files, thus a page with five images
may create six hits in addition to the page's own file count (the 5 images and the
page itself). An individual page view is created whenever someone visits a web
site, regardless of whether or not they actually see any of the pages on the site. In
order to reach the widest possible audience, Web Traffic Analyzer is designed
towards suppliers that wish to reach out to the widest possible audience. Project
aims to bridge the gap between retailers, wholesalers and consumers. In order to
achieve the aforementioned goal, Web Traffic Analyzer must be user-friendly,
14
'easy to learn,' and dependable. OSM is designed to be self-contained and
independent of any other software. No matter what operating system you're using,
it should be compatible.

2.1 PRODUCT FUNCTIONS

The volume of data transmitted and received by users of a website is referred to as


web traffic. Internet users use it in significant numbers. According to the number
of visitors and the amount of time spent on each page, this is determined. Internet
service providers (ISPs) keep track of all the traffic entering and leaving a website
in order to determine which sections or pages are the most popular and if any
patterns emerge, such as a certain page being heavily frequented by visitors from
a particular geographical region. There are several techniques to monitor this
traffic, and the data acquired may be used to better organize websites, expose
security issues, or suggest a possible shortage of bandwidth—not all online traffic
is welcomed. In exchange for greater web traffic (visitors), some firms provide
advertising strategies that pay for screen space on the site. The inclusion in search
engines and Search engine optimization (SEO) are additional common ways for
websites to boost their traffic.

15
3.3 System Design

FEASIBILITY STUDY

Feasibility studies are conducted to see if the project will accomplish its stated
goals for the amount of time, effort, and resources invested. Using a feasibility
study, a project developer can predict the project's usefulness in the long term.
System proposals are evaluated for feasibility based on their workability, which is
measured in terms of their influence on an organization's ability to satisfy user
demands and its efficient use of resources. Thus, when a novel application is
suggested, a feasibility study is usually conducted first. In this document, you can
learn about the project's viability as well as the factors that were taken into
account during the project's feasibility study, such as the project's technical,
economic, and operational aspects. This is what it has to offer:

TECHNICAL FEASIBILITY

First and foremost, the system must be assessed in terms of its technological
capabilities. For this feasibility evaluation, an explanation of the system
requirements in terms of input, output, programmes, and processes is needed.
Once an outline system has been found, the study must go on to recommend the
kind of equipment, the needed technique of constructing the system, and the way
of operating the system once it has been built and implemented.

3.4 Tools used for system development


The tools used in this project are followings:
o HTML
o CSS
o JAVA SCRIPT
16
o PHP

Experimental Work 4
4.1 Introduction

Homepage:

Membership plan:

17
About us:

18
19
20
4.2 Implementation

Software and hardware requirements are fine-tuned during this phase of systems development life cycle.
Programming strategies are established, users are trained, comprehensive testing processes are implemented,
and the design and operational specifications are evaluated.
21
1. Technical Design

Specifications developed during the new system design are expanded upon in this activity via the
addition of precise technical specifications and documentation.

2. Test Specifications and Planning

Detailed test requirements for individual modules and programmes, task streams, subsystems, and the overall
system are prepared in this activity.

3. Programming and Testing

Detailed test requirements for individual modules and programmes, task streams, subsystems, and the overall
system are prepared in this activity.

4. User Training

This includes developing user manuals, preparing user training materials, running training programmes, and
performing tests.

5. Acceptance Test

Procedural evaluation before a system is operational to show the system and get user acceptance.

6. Installation Phase
22
At the end of this stage, a new computerized system is put in place, new processes are applied, and the new
system's potential is examined in detail.

7. System Installation

beginning and teaching users how to utilize a system in a practical way.

8. Review Phase

During this phase, you'll assess your project's progress and determine whether or not your new
Computerized Transystem delivered on the advantages and cost reductions you had hoped for at the
beginning of the project.

9. Development Recap

Reviewing a project as soon as it has been completed in order to identify any achievements or
difficulties that may arise in the future.

10. Post-Implementation Review

An evaluation of the actual system performance in comparison to the initial expectations and estimates
for cost-benefit improvements, carried out after a new system has been in operation for some time.
Additionally, it identifies initiatives for system enhancement or improvement.

4.3 Testing

Software must be tested before it can be released to the public. It is impossible to develop
a system that is completely error-free. Two steps of evaluation are also used. The first stage
occurs during the development of the module's software. During this phase, the software is
completed. To ensure that the whole collection of applications works as a unit, this is called
system testing.

23
White Box Testing:

Species sets of conditions or loops are used to test the careful inspection of logical
sections using software in this approach. logical aspects of the programme were inspected at least
once To fix typographical mistakes, incorrect logical expressions that should only be run once,
and incorrect controls and loops, you may use this approach. For each module's logic decisions,
all loops, boundaries and internal data structures to verify validity were tested once throughout
the box testing process, ensuring that all independent parts of a module's logic were tested.

Black Box Testing:

The software engineer may use this methodology to create input strategies that exercise
all of a program's functional needs. In black-box testing, the input, output, and external data are
all examined. the input data is verified to be valid and the intended output is obtained.

Alpha Testing:

Acceptance testing, or alpha testing, is another term for this process. Customized systems
are created for a specific consumer. There will be no more alpha testing carried out until both the
software developer and the client are satisfied that what has been given meets the system
specifications to be used.

Beta Testing:

Beta testing, on the other hand, is used when a system is being marketed as a
software product. As part of beta testing, prospective customers are given the opportunity
to try out a new product or service before the final product is released. The developers
are then alerted to any issues that may have arisen from the consumers' feedback. This
enables the product to be put to real-world usage and identifies flaws that the system
developers may not have foreseen.

Unit Testing:

As a whole, each module is evaluated separately. It focuses on the source code


implementation of each piece of software. the procedure is known as a "white box test."

Integration Testing:

An integration test builds the structure of the programme at the same time as

24
creating tests to find flaws in the interface between modules. adopting a top-down
approach, modules are plugged together.

Validation Testing:

To guarantee that all of the functional and performance criteria were satisfied,
we conducted validation testing. '

System Testing:

It is running programmes to examine logical changes made to it in the hope of


identifying flaws in the code. – A system's online response time, transaction volume, and
recovery from failure are just a few of the things that are examined. The purpose of
system testing is to make certain that the system meets all of the needs of its users.

Results and Discussions 5

The previous manual approach was plagued by a number of shortcomings. Because the
whole system had to be managed by hand, storing, preserving, and retrieving data was a time-
consuming and laborious procedure. The records were never organized in a logical manner.
Associating a transaction with a certain context used to be difficult, but that's no longer the case.
The only way to find information was to look through all of the various registries and papers,
hence there was no such thing as a report production system. When entering and retrieving
records, time is continually being wasted in an inefficient manner. Another issue was that it was
very difficult to see mistakes when inputting the information. Updating the records was almost
impossible after they had been entered. Electricity board work is still done manually, which is a
major problem for the agency. It's because owning a company involves managing a large amount
of data and remembering it all. Because of this, we have included features. Although the current
method is mostly automated (computerized), it is still a time-consuming process since one must
input the same information in three distinct locations to complete the process.

Summary, Conclusion & Recommendations 6


The webpage for the gym section is specifically designed for keeping track of your workouts. All members,
employees and inventory information had to be entered into an inventory management system that could be

25
used by this project's team. The designed system is capable of meeting all of the fundamental criteria. Members'
and workers' records will also benefit from the planned system, which would automate the whole operation and
so minimize the amount of labor required. System security is also a major consideration.

It doesn't matter how efficient a system is, there's always opportunity for improvement. It is critical that the
system be adaptable enough to accommodate future changes. The system has been broken down into smaller
parts so that it can better handle future adjustments. To ensure that it meets the needs of every user, every effort
has been taken to make it user-friendly.

 Goal achieved: The System is able to give an interface to the owner so that he may reproduce the data
he needs.

 User-friendliness: Despite the fact that most of the system's functions are designed to take place in the
background, it has been made as easy as possible for the user to engage with the system. At every stage
of creation, consideration was given to how the project would integrate with the already existing system.

Appendices 6

26
27
28
29
30
31
32
References 6

 http://www.bluedart.com/
 http://www.wampserver.com/en/
 http://www.HTML.net/
 http://www.tutorialspoint.com/mysql/
 httpd.apache.org/docs/2.0/misc/tutorials.html
 www.wikipedia.org
 www.codeproject.com
33
 Visual Basic 6.0 Resource Center| http://msdn.microsoft.com/hi-in/vbrun/default(en-us).aspxVisual
Basic 6 Black Book By Steven Holzner

34

You might also like