Project Sample
Project Sample
INTRODUCTION
Bharathamatha College
TOW PAL 2
1. INTRODUCTION
Bharathamatha College
TOW PAL 3
Bharathamatha College
TOW PAL 4
Bharathamatha College
TOW PAL 5
The user can easily access the service provided from any place at any
time. This application will provide the accurate information needed newly coming
person. Receiving people complaints and provide people complaint status. Higher
speed of receiving complaints.
Provides a framework for managing complaints from the public, as a
means of improving customer service in all areas. Ensures that issues which are the
subject of complaints are addressed promptly and in a manner which, as far as
possible, ensures that such issues will not be the subject of future complaints.
Ensures validity of a complaint is ascertained through proper investigation.
Registered user can apply the complaint and admin receive the user complaints and
provide user complaint status.
Bharathamatha College
TOW PAL 6
In the existing system the people must go to the office for any kind of help. The
users can post their problems but cannot get the details of the problems and some
other services. This system doesn’t have much popularity and is not user friendly.
DRAWBACKS
This site not enhancing different complaint for user.
Enquiring process not provide more detail.
ADVANTAGES
The web complaint management software allows the user to record the complaint
and loads it to the complaints database.
It offers a strategic method for online lodging and tracking of customer concerns
and issues.
You can access each complaint’s history and check the status update. It has the
details of how a complaint is being progressed and what actions are being taken.
After a complaint is recorded by a user, it is reviewed by an Administrator and
then led to the complaints workflow.
The admin can assign it to a particular service engineer for resolving the issue.
Bharathamatha College
TOW PAL 7
SYSTEM ANALYSIS
Bharathamatha College
TOW PAL 8
This document provides the feasibility of the project that is being designed and lists
various areas that were considered very carefully during the feasibility study of this
project such as:
Technical feasibility
Economic feasibility
Operational feasibility
They must be evaluated from the technical viewpoint first. The assessment of this
feasibility must be based on an outline design of the system requirement in terms of
input, output, programs, procedures and staff. Having identified an outline system,
the investigation must be go on to suggest the type of equipment, required method of
developing the system, method of running the system once it has been designed.
The projects should be developed such that the necessary functions and performance
are achieved within the constraints. The project is developed with the latest
technology. Through the technology may become obsolete after period of time. Due
to the fact that newer versions of some support older versions, the system may still
be used. So that, there are only minimal constraints involved with this project.
This system has been developed using PHP AND ANDROID, which is very user
friendly. MYSQL is used as back end to avoid the problems in term of volume of
data, trends, frequency of updating, cycles of activity etc…
Bharathamatha College
TOW PAL 9
Because we used the system, which support PHP and MYSQL. Mostly, it does not
cause any fault hence maintenance cost to gain. But we can make modifications
based on our technological development.
System requirements are more detailed description of the user requirements. They
may serve as the basis for a contract for the implementation of the system and should
therefore be a complete and consistent specification of the whole system. They are
used by the software engineers as the starting point for the system design. The
system requirement specification may include different models of the system such as
an object model or a data flow model. The system requirements should state what
the system should do and not how it should be implemented. SRS is a document
created by system analyst after the requirements are collected from various
stakeholders.
SRS defines how the intended software will interact with hardware, external
interfaces, speed of operation, response time of system, portability of software across
various platforms, maintainability, speed of recovery after crashing, Security,
Quality, Limitations etc.
Bharathamatha College
TOW PAL 10
The requirements received from client are written in natural language. It is the
responsibility of system analyst to document the requirements in technical language
so that they can be comprehended and useful by the software development team.
Bharathamatha College
TOW PAL 11
1. Admin
2.Mechanic
3. User
1. Admin
The Admin is responsible for overseeing and managing the entire system.
Admins have access to the system's backend, allowing them to monitor user
activities, manage service providers, and ensure the system's overall functionality.
They can view analytics, resolve disputes, and have the authority to make system-
wide decisions.
2. Mechanic
3. Drivers
Bharathamatha College
TOW PAL 12
RAM : 1 GB
Hard disk : 20 GB
Bharathamatha College
TOW PAL 13
PHP
What is PHP?
PHP Features
o Performance: Script written in PHP executes much faster than those scripts
written in other languages such as JSP & ASP.
o Open Source Software: PHP source code is free available on the web, you can
developed all the version of PHP according to your requirement without paying any
cost.
o Platform Independent: PHP are available for WINDOWS, MAC, and LINUX
& UNIX operating system. A PHP application developed in one OS can be easily
executed in other OS also.
o Compatibility: PHP is compatible with almost all local servers used today like
Apache, IIS etc.
Bharathamatha College
TOW PAL 14
o Embedded: PHP code can be easily embedded within HTML tags and script.
Escaping to PHP
The PHP parsing engine needs a way to differentiate PHP code from other elements
in the page. The mechanism for doing so is known as 'escaping to PHP'. There are
four ways to do this -
If you use this style, you can be positive that your tags will always be correctly
interpreted.
Short tags are, as one might expect, the shortest option you must do one of two
things to enable PHP to recognize the tags −
Set the short_open_tag setting in your php.ini file to on. This option must be
disabled to parse XML with PHP because the same syntax is used for XML tags.
A comment is the portion of a program that exists only for the human reader and
stripped out before displaying the programs result. There are two commenting
formats in PHP −
Single-line comments − They are generally used for short explanations or notes
relevant to the local code. Here are the examples of single line comments.
The main way to store information in the middle of a PHP program is by using a
variable. Here are the most important things to know about variables in PHP.
Bharathamatha College
TOW PAL 15
All variables in PHP are denoted with a leading dollar sign ($).
Bharathamatha College
TOW PAL 16
Variables are assigned with the = operator, with the variable on the left-hand side
and the expression to be evaluated on the right.
Variables in PHP do not have intrinsic types - a variable does not know in
advance whether it will be used to store a number or a string of characters.
PHP does a good job of automatically converting types from one to another
when necessary.
Bharathamatha College
TOW PAL 17
A website is called responsive website which can automatically adjust itself to look
good on all devices, from smart phones to desktops etc.
Scaffolding: Bootstrap provides a basic structure with Grid System, link styles,
and background.
CSS: Bootstrap comes with the feature of global CSS settings, fundamental HTML
elements style and an advanced grid system.
JavaScript Plugins: Bootstrap also contains a lot of custom jQuery plugins. You
can easily include them all, or one by one.
BACKEND
MySQL
MySQL is a fast, easy to use relational database. It is currently the most popular
open-source database. It is very commonly used in conjunction with PHP scripts to
create powerful and dynamic server-side applications.
MySQL is used for many small and big businesses. It is developed, marketed and
supported by MySQL AB, a Swedish company. It is written in C and C++.
Bharathamatha College
TOW PAL 18
Reasons of popularity
Bharathamatha College
TOW PAL 19
RDBMS Terminology
Before we proceed to explain the MySQL database system, let us revise a few
definitions related to the database.
Database − A database is a collection of tables, with related data.
Table − A table is a matrix with data. A table in a database looks like a simple
spreadsheet.
Column − One column (data element) contains data of one and the same
kind, for example the column postcode.
Row − A row (= tuple, entry or record) is a group of related data, for
example the data of one subscription.
Redundancy − Storing data twice, redundantly to make the system faster.
Primary Key − A primary key is unique. A key value cann ot occur twice in
one table. With a key, you can only find one row.
Foreign Key − A foreign key is the linking pin between two tables.
Compound Key − A compound key (composite key) is a key that consists of
multiple columns, because one column is not sufficiently unique.
Index − An index in a database resembles an index at the back of a book.
Referential Integrity − Referential Integrity makes sure that a foreign key
value always points to an existing row.
MySQL Database
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.
MySQL is developed, marketed and supported by MySQL AB, which is a Swedish
company. MySQL is becoming so popular because of many good reasons −
MySQL is released under an open-source license. So you have nothing to pay to
use it.
MySQL is a very powerful program in its own right. It handles a large subset
of the functionality of the most expensive and powerful database packages.
MySQL uses a standard form of the well-known SQL data language.
MySQL works on many operating systems and with many languages including
PHP, PERL, C, C++, JAVA, etc.
MySQL works very quickly and works well even with large data sets.
MySQL is very friendly to PHP, the most appreciated language for web
development.
Bharathamatha College
TOW PAL 20
Bharathamatha College
TOW PAL 21
Bharathamatha College
TOW PAL 22
The System Design includes the maintenance of the secure file transfer service with
a prescribed encryption format and split at the interested level of encryption, and
embed process and the receiving service at the other end with de-embed and
decryption process. The design also includes the provision of facility to the user to
manipulate the concerned information according to his personal use and
communication process.
The design also needs to provide the communication channel to the user to
communicate with other registered users through the mailing services in a reliable
and secured format. Authorization and authentication services are preferred most for
this purpose. The System Design includes the maintenance authorization services,
File and directory services with a prescribed encryption format at the interested level
of encryption and the receiving service at the other end with decryption process. The
design also includes the provision of facility to the user to manipulate the concerned
information according to his personal use. The design of Effective Privacy
Preserving key Generation for Multimedia Application system, basically involve the
interface architecture, Security services, and communication system.
In the interface design we involve with the design of the user interface with GUI
standards and a proper navigation system where the user need to enter into the flow
of transactions authorization services are check and further access is provided into
the system. Then the user needs to select into the operations provided through the
GUI where encryption, embedding, de-embedding, Decryption, and sending of the
file, General Information and exit are provided. Here the Encryption and decryption
and services are provided connecting to the security services module where the
encryption and decryption are carried out using the cryptographic standards
implementing the tiny algorithm.After decryption process is completed the user is
selecting the file for encryption. After encryption of the file is completed the user is
to select the file for embedding it to the video file and sending through the network
to the desired user .Then the system gets connected to the targeted user and delivers
the file in video format after which the user working with the Effective key
Generation for Multimedia Application software should go for the option De-Embed
Files and decrypt the file by selecting the file path by which the file gets decrypted
the file and is viewed on the system.
Bharathamatha College
TOW PAL 23
Process
Process show what system does. Each process has one or more data inputs and
produces one or more data output, Circles in a data flow diagram represent process.
Each process has unique name and number. This name and number appear inside
the circle that represents the processes in a data flow diagram.
Data Stores:
File or data store is depositary of data. They contain data that is retained in the
system. Processes can enter the data into a data store or retrieve data from the data
store. Each data store is represented by thin line in the data flow diagram and each
data store has a unique name.
External Entities:
External entities are outside the system but they either supply input data into the
system or use the system output, they are entities which the designer has no control.
Square or rectangle may represent external entities that supply data into a system or
sometimes called sources. External entities that use the system data are sometimes
called sinks.
Bharathamatha College
TOW PAL 24
Data Flows:
Dataflow model the passage of data in the system and are represented lines joining
system components. An arrow indicates the direction of the flow and the line labeled
by the name of the data flow.
The data flow diagram is one of the most improvement tools used by the system
analyst DeMacro (1978), Nad Gand Sarson (1979) popularized the use if the data
flow diagram as modeling tools through their structured system analysis
methodologies.
A data flow diagram should be the first tool used by system analyst to model system
components. These components are the system processes; the data used by this
processes and external entities that interact with the system and the information
flows in the system.
Bharathamatha College
TOW PAL 25
Level 0: Login
Login Master
Enter
Open login username User home
form &password page
Verification
Bharathamatha College
TOW PAL 26
Level 1:
Bharathamatha College
TOW PAL 27
You can’t find a solution until you have a clear idea of what the problem is.
Collect Information
Collect sketches, take photographs and gather data to start giving you inspiration.
Begin to sketch, make, and study so you can start to understand how all the data and
information you’ve collected may impact your design.
Develop Solutions
Take your preliminary ideas and form multiple small-scale design solutions.
Gather Feedback
Improve
Bharathamatha College
TOW PAL 28
They actively deal with the design of the physical database. A key is to determine
how to access paths are to be implemented. A physical path is derived from a logical
path., pointers, chains, or other mechanism may be implemented. The general theme
behind database is to handle information as a whole. The general objective is to
make information access easy, quick, inexpensive and flexible for the user. Database
design is the most critical part of the design phase. Database design transforms the
information domain model created during the analysis into the data structures that
will be required to implement the software system.
Bharathamatha College
TOW PAL 29
Bharathamatha College
TOW PAL 30
Bharathamatha College
TOW PAL 31
Bharathamatha College
TOW PAL 32
Input design is a part of overall system design, which requires carefully attention. If
the data going into the system is incorrect, then the processing and output will
magnify these errors. The main objective during the input design is as given below:
Bharathamatha College
TOW PAL 33
Outputs from computer systems are required primarily to communicate the results of
processing to users. They are also used to provide a permanent copy of the results for
later consultation. The various types of outputs in general are:
External Outputs, whose destination is outside the organization,
Internal Outputs whose destination is within organization and they are the
User’s main interface with the computer.
Operational outputs whose use is purely within the computer department.
Interface outputs, which involve the user in communicating directly
Bharathamatha College
TOW PAL 34
Bharathamatha College
TOW PAL 35
4.1 TESTING
Software testing is a critical element of software quality assurance and represents the
ultimate review of specification, design and coding. In fact, testing is the one step in
the software engineering process that could be viewed as destructive rather than
constructive.
A strategy for software testing integrates software test case design methods into a
well-planned series of steps that result in the successful construction of software.
Testing is the set of activities that can be planned in advance and conducted
systematically. The underlying motivation of program testing is to affirm software
quality with methods that can economically and effectively apply to both strategic to
both large and small-scale systems.
Unit testing focuses verification effort on the smallest unit of software design - the
software component or module. Using the component level design description as a
guide, important control paths are tested to uncover errors within the boundary of the
module. The relative complexity of tests and uncovered scope established for unit
testing. The unit testing is white-box oriented, and step can be conducted in parallel
for multiple components.
The modular interface is tested to ensure that information properly flows into and out
of the program unit under test. The local data structure is examined to ensure that
data stored temporarily maintains its integrity during all steps in an algorithm's
execution. Boundary conditions are tested to ensure that all statements in a module
have been executed at least once. Finally, all error handling paths are tested.
INTEGRATION TESTING
Bharathamatha College
TOW PAL 36
Are corrected, new ones appear and the process continues in a seemingly endless
loop. After unit testing in Sell-Soft System all the modules were integrated to test for
any inconsistencies in the interfaces. Moreover differences in program structures
were removed and a unique program structure was evolved.
VALIDATION TESTING
This is the final step in testing. In this the entire system was tested as a whole with
all forms, code, modules and class modules. This form of testing is popularly known
as Black Box testing or System testing.
Black Box testing method focuses on the functional requirements of the software.
That is, Black Box testing enables the software engineer to derive sets of input
conditions that will fully exercise all functional requirements for a program. Black
Box testing attempts to find errors in the following categories; incorrect or missing
functions, interface errors, errors in data structures or external data access,
performance errors and initialization errors and termination errors.
SECURITY TESTING
Security testing is to verify that protection mechanism built into a system that it
would protect it from improper penetration. During security testing, the tester plays
the role of individual who desire to penetrate the system. Due to any case in the
security that is, the software must work consistently and the data should not be
trapped.
BLACKBOX TESTING
This test involves the manual evaluation of the flow from one module to the other
and check accordingly for the process flow. This process of testing is with the
following criteria.
Administrator Process
Auditorium process
Charity Process
Booking process
Quit Process
Bharathamatha College
TOW PAL 37
WHITEBOX TESTING
White box testing is a testing case design method that uses the control structure of
the procedure design to derive test cases. All independents path in a module are
exercised at least once, all logical decisions are exercised at once, execute all loops at
boundaries and within their operational bounds exercise internal data structure to
ensure their validity. Here the customer is given three chances to enter a valid choice
out of the given menu.
Bharathamatha College
TOW PAL 38
The proposed approach requires both the transport (in terms of end-to-end rate
allocation) and the physical layer (in terms of channel and power schedule) to be
aligned. Coordination between the two layers can be implemented on different
timescales end-to- end rate allocation on the fast time-scale and incremental channel
and power updates on the slow time-scale. As demonstrated, most of the common
variants can be interpreted as distributed methods for solving the optimization
network flow problem (determines the end-to-end rates under fixed link capacity).
Based on an initial schedule (a simple link schedule for the first L slots), we run the
scheme until convergence (this may require the schedule to be applied repeatedly).
After rate convergence, each node reports the link prices associated with its
incoming and outgoing links to gateway where the proposed resource allocation
scheme is adopted. On receiving the link prices from the entire set of node, the
gateway finds the channels and transmit powers by applying the resource allocation
scheme proposed it then augments the schedule.
Bharathamatha College
TOW PAL 39
CORRECTIVE MAINTENANCE
ADAPTIVE MAINTENANCE
PERFECTIVE MAINTENANCE
PREVENTIVE MAINTENANCE
Preventive maintenance must be conducted to enable the software to serve the needs
of its end-users. In essence, preventive maintenance makes changes to computer
programs so that they can be more easily corrected, adapted and enhanced.
Bharathamatha College
TOW PAL 40
CONCLUSION
Bharathamatha College
TOW PAL 41
5. CONCLUSION
This application is mainly used for the helping the public PLAINTE
was developed to enhance the current complaint management system by using the
web application. Therefore PLAINTE enable to provide several channels for filling
the complaint which enable users to send the complaint easier.it is capable of
classifying the complaint and directly send to responsible department. Therefore the
system could reduce the loss and time of operation.
Bharathamatha College
TOW PAL 42
Bharathamatha College
TOW PAL 43
The entire project has been developed and deployed as per the requirements stated by
the user, it is found to be bug free as per the testing standards that is implemented.
Any specification-untraced errors will be concentrated in the coming versions, which
are planned to be developed in near future. The system at present does not take
care of lower level check constraints in accessing the file types in distributed
environments, which is to be considered in the future up gradations.
As per the present status the project developed is well equipped to handle the Central
file system of an organization in a cloud and provide access to the users with various
privileges as prescribed by the higher authorities in the password file.
Bharathamatha College
TOW PAL 44
BIBLIOGRAPHY
Bharathamatha College
TOW PAL 45
REFERENCE:
FOR INSTALLATION
www.wamp.ccom
www.w3schools.com
FOR SQL
www.phptpoint.com
FOR Pup
www.php.com/net/quickstart/aspplus/default.com
www.php.net
www.fmexpense.com/quickstart/aspplus/default.com
www.4guysfromrolla.com/index.com
Bharathamatha College
TOW PAL 46
APPENDIX
Bharathamatha College
TOW PAL 47
LOGIN PAGE
Bharathamatha College