0% found this document useful (0 votes)
17 views47 pages

Project Sample

Uploaded by

aswing21bca
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views47 pages

Project Sample

Uploaded by

aswing21bca
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 47

TOW PAL 1

INTRODUCTION

Bharathamatha College
TOW PAL 2

1. INTRODUCTION

The PLAINTE is based on a web application. The title PLAINTE is a


French word which means complaint. It provides an online way of solving the
problems faced by the public by saving time and eradicate corruption. The objective
of the complaints management system is to make complaints easier to coordinate,
monitor, track and resolve, and to provide company with an effective tool to identify
and target problem areas, monitor complaints handling performance. Online
Complaint Management is a management technique for assessing, analyzing and
responding to user complaints. Complaints management software is used to record
resolve and respond to user complaints, requests as well as facilitate any other
feedback.
Online mechanism to enable submission of complaints about women
harassments, minor complaint and employee’s complaint. PLAINTE make user
complaint easier. Complaint management is process of handling managing,
responding and reporting these graviances.it is a user friendly PLAINTE features
help people to handle issues and complaints in a timely and efficient manner.

Bharathamatha College
TOW PAL 3

1.1 TOW PAL

PLAINTE, it is an online complaint management system and it is


web based application.it is an online mechanism to be enable submission of
complaints about women harassment, minor complaints , employee’s complaints and
education complaint. PLAINTE make public complaint easier. Complaint
management is process of handling managing, responding and reporting these
grievances.
In this existing system the people must go to the office for any kind
of help. The user can post their problems and some other services. This system is not
user friendly. The objective of online complaint management system to make
complaint easier to coordinate, monitor, track and resolve. To provide organization
with an effective tool to identify and target problem areas. PLAINTE feature help
people to handle issues and complaints in a timely and efficient manner.
The significant of this project is to serve better than the existing
system which is highly manual and therefore difficult in terms of monitoring the
complaint, it improve database and enhance effectiveness, efficiency and security of
system. It also intended that the study will help in development of new and hopefully
and standard better computer aided system.
The system is expected to be easy as person can login their
complaint anytime management also can equally response to online complaint in a
more easy way and reduced turnaround time in responding to issues, it can be used
by general public.

Bharathamatha College
TOW PAL 4

SCOPE OF THE PROJECT

Bharathamatha College
TOW PAL 5

1.2 SCOPE OF THE PROJECT

The user can easily access the service provided from any place at any
time. This application will provide the accurate information needed newly coming
person. Receiving people complaints and provide people complaint status. Higher
speed of receiving complaints.
Provides a framework for managing complaints from the public, as a
means of improving customer service in all areas. Ensures that issues which are the
subject of complaints are addressed promptly and in a manner which, as far as
possible, ensures that such issues will not be the subject of future complaints.
Ensures validity of a complaint is ascertained through proper investigation.
Registered user can apply the complaint and admin receive the user complaints and
provide user complaint status.

Bharathamatha College
TOW PAL 6

1.3 EXISTING SYSTEM

In the existing system the people must go to the office for any kind of help. The
users can post their problems but cannot get the details of the problems and some
other services. This system doesn’t have much popularity and is not user friendly.

DRAWBACKS
 This site not enhancing different complaint for user.
 Enquiring process not provide more detail.

1.4 PROPOSED SYSTEM

The Complaint Management System is one of the most significant


and resource intensive project in which proposed system the citizen need not
go to the government office for getting his problem solved. He can get his
problem solved by posting his problem in this proposed system thus is to encourage
and assist public sector and he can suggest a possible solution to the problems posted
on the system. He can even get the information of the funds and other details of
his place in detail through this system. Our proposed system provides solution to
existing system by extending its facilities as follows:
 Registration is provided so that officer can solve the problems easily
 Complete information regarding the place is displayed.
 Can suggest a solution for solving the problems in a better way.

ADVANTAGES

The web complaint management software allows the user to record the complaint
and loads it to the complaints database.
 It offers a strategic method for online lodging and tracking of customer concerns
and issues.
 You can access each complaint’s history and check the status update. It has the
details of how a complaint is being progressed and what actions are being taken.
 After a complaint is recorded by a user, it is reviewed by an Administrator and
then led to the complaints workflow.
 The admin can assign it to a particular service engineer for resolving the issue.

Bharathamatha College
TOW PAL 7

SYSTEM ANALYSIS

Bharathamatha College
TOW PAL 8

2.1 FEASIBILITY STUDY

The feasibility study is made to see if the project on completion will


serve the purpose of the organization for the amount of work, effort and time that is
spent on it. Feasibility study lets the developer foresee the future of the project and
its usefulness. Feasibility study is a test of system proposed regarding its workability,
impact on the organization, ability to meet the needs and effective use of resources.
Thus when a new project is proposed, it normally goes through a feasibility study
before it is approved for development.

This document provides the feasibility of the project that is being designed and lists
various areas that were considered very carefully during the feasibility study of this
project such as:

 Technical feasibility
 Economic feasibility
 Operational feasibility

2.1.1 TECHNICAL FEASIBILITY

They must be evaluated from the technical viewpoint first. The assessment of this
feasibility must be based on an outline design of the system requirement in terms of
input, output, programs, procedures and staff. Having identified an outline system,
the investigation must be go on to suggest the type of equipment, required method of
developing the system, method of running the system once it has been designed.

The projects should be developed such that the necessary functions and performance
are achieved within the constraints. The project is developed with the latest
technology. Through the technology may become obsolete after period of time. Due
to the fact that newer versions of some support older versions, the system may still
be used. So that, there are only minimal constraints involved with this project.

This system has been developed using PHP AND ANDROID, which is very user
friendly. MYSQL is used as back end to avoid the problems in term of volume of
data, trends, frequency of updating, cycles of activity etc…

Bharathamatha College
TOW PAL 9

2.1.2 ECONOMICAL FEASIBILITY

Developing system must be justified by cost and benefit .Criteria to


ensure that effort is concentrated on project that will give best return at the earliest.
One of the factors that affect the development of a new system is the cost it would
require.

Because we used the system, which support PHP and MYSQL. Mostly, it does not
cause any fault hence maintenance cost to gain. But we can make modifications
based on our technological development.

2.1.3 OPERATIONAL FEASIBILITY

As estimated should be made to determine how much effort and care


will go into the developing of the system including the training to be given to the
user. Usually, people are reluctant to changes that that come in their progression. The
computer initialization will certainly affected the turn over, transfer and employee
job status. Hence an additional effort is to be made to train and educate the users on
the new way of the system.

2.2 SOFTWARE REQUIREMENT SPECIFICATION

System requirements are more detailed description of the user requirements. They
may serve as the basis for a contract for the implementation of the system and should
therefore be a complete and consistent specification of the whole system. They are
used by the software engineers as the starting point for the system design. The
system requirement specification may include different models of the system such as
an object model or a data flow model. The system requirements should state what
the system should do and not how it should be implemented. SRS is a document
created by system analyst after the requirements are collected from various
stakeholders.

SRS defines how the intended software will interact with hardware, external
interfaces, speed of operation, response time of system, portability of software across
various platforms, maintainability, speed of recovery after crashing, Security,
Quality, Limitations etc.

Bharathamatha College
TOW PAL 10

The requirements received from client are written in natural language. It is the
responsibility of system analyst to document the requirements in technical language
so that they can be comprehended and useful by the software development team.

SRS should come up with following features:

 User Requirements are expressed in natural language.


 Technical requirements are expressed in structured language, which is
used inside the organization.
 Design description should be written in Pseudo code.
 Format of Forms and GUI screen prints.
 Conditional and mathematical notations for DFDs etc.

Bharathamatha College
TOW PAL 11

2.3 MODULE DESCRIPTION

1. Admin
2.Mechanic
3. User

1. Admin

The Admin is responsible for overseeing and managing the entire system.
Admins have access to the system's backend, allowing them to monitor user
activities, manage service providers, and ensure the system's overall functionality.
They can view analytics, resolve disputes, and have the authority to make system-
wide decisions.

2. Mechanic

Mechanics are service providers registered in the system to offer assistance


during vehicle breakdowns. They receive service requests from the system, detailing
the breakdown location and issue description. Mechanics use the system to update
their availability, location, and the status of ongoing service requests. They may have
access to a dashboard displaying assigned breakdowns, navigation tools, and
customer details

3. Drivers

Drivers are individuals experiencing a vehicle breakdown who use the


system to request assistance. They register their vehicles, report breakdown
incidents, and receive real-time updates on the status of their service request. Drivers
may communicate with assigned mechanics through the system and provide
additional information or clarification. They have access to a service history,
allowing them to review past breakdown incidents and services received.

Bharathamatha College
TOW PAL 12

2.4 SYSTEM SPECIFICATION

A system specification describes the operational and performance requirements of a


system, such as a computer. It is considered a high-level document that dictates
global functions.

2.4.1 HARDWARE SPECIFICATION

 Process : Pentium –III

 Processor speed : 2.4 GHz

 Mother board : Intel 915 GVSR chipset

 RAM : 1 GB

 Hard disk : 20 GB

 CD drive : 52X Samsung drive

2.4.2 SOFTWARE SPECIFICATION

 Operating System : Windows/Linux

 Application Server : Apache

 Front End : PHP

 Back End : MYSQL

 Document Tool : Microsoft word

 Tools Used : Sublime text editor

Bharathamatha College
TOW PAL 13

PHP

PHP is an open source, interpreted and object-oriented scripting language i.e.


executed at server side. It is used to develop web applications (an application i.e.
executed at server side and generates dynamic page).

What is PHP?

o PHP is a server side scripting language.

o PHP is an interpreted language, i.e. there is no need for compilation.

o PHP is an object-oriented language.

o PHP is an open-source scripting language.

o PHP is simple and easy to learn language.

PHP Features

There are given many features of PHP.

o Performance: Script written in PHP executes much faster than those scripts
written in other languages such as JSP & ASP.

o Open Source Software: PHP source code is free available on the web, you can
developed all the version of PHP according to your requirement without paying any
cost.

o Platform Independent: PHP are available for WINDOWS, MAC, and LINUX
& UNIX operating system. A PHP application developed in one OS can be easily
executed in other OS also.

o Compatibility: PHP is compatible with almost all local servers used today like
Apache, IIS etc.

Bharathamatha College
TOW PAL 14

o Embedded: PHP code can be easily embedded within HTML tags and script.

Escaping to PHP

The PHP parsing engine needs a way to differentiate PHP code from other elements
in the page. The mechanism for doing so is known as 'escaping to PHP'. There are
four ways to do this -

Canonical PHP tags

The most universally effective PHP tag style is −


<?php...?>

If you use this style, you can be positive that your tags will always be correctly
interpreted.

Short-open (SGML-style) tags

Short or short-open tags look like this −


<?...?>

Short tags are, as one might expect, the shortest option you must do one of two
things to enable PHP to recognize the tags −

 Choose the --enable-short-tags configuration option when you're building PHP.

 Set the short_open_tag setting in your php.ini file to on. This option must be
disabled to parse XML with PHP because the same syntax is used for XML tags.

Commenting PHP Code

A comment is the portion of a program that exists only for the human reader and
stripped out before displaying the programs result. There are two commenting
formats in PHP −

Single-line comments − They are generally used for short explanations or notes
relevant to the local code. Here are the examples of single line comments.

The main way to store information in the middle of a PHP program is by using a

variable. Here are the most important things to know about variables in PHP.

Bharathamatha College
TOW PAL 15
 All variables in PHP are denoted with a leading dollar sign ($).

Bharathamatha College
TOW PAL 16

 The value of a variable is the value of its most recent assignment.

 Variables are assigned with the = operator, with the variable on the left-hand side
and the expression to be evaluated on the right.

 Variables can, but do not need, to be declared before assignment.

 Variables in PHP do not have intrinsic types - a variable does not know in
advance whether it will be used to store a number or a string of characters.

 Variables used before they are assigned have default values.

 PHP does a good job of automatically converting types from one to another
when necessary.

Bharathamatha College
TOW PAL 17

What is a responsive website

A website is called responsive website which can automatically adjust itself to look
good on all devices, from smart phones to desktops etc.

What Bootstrap package contains

Scaffolding: Bootstrap provides a basic structure with Grid System, link styles,
and background.

CSS: Bootstrap comes with the feature of global CSS settings, fundamental HTML
elements style and an advanced grid system.

Components: Bootstrap contains a lot of reusable components built to provide


iconography, dropdowns, navigation, alerts, pop-overs, and much more.

JavaScript Plugins: Bootstrap also contains a lot of custom jQuery plugins. You
can easily include them all, or one by one.

Customize: Bootstrap components are customizable and you can customize


Bootstrap's components, LESS variables, and jQuery plugins to get your own style.

BACKEND

MySQL

MySQL is a fast, easy to use relational database. It is currently the most popular
open-source database. It is very commonly used in conjunction with PHP scripts to
create powerful and dynamic server-side applications.

MySQL is used for many small and big businesses. It is developed, marketed and
supported by MySQL AB, a Swedish company. It is written in C and C++.

Bharathamatha College
TOW PAL 18

Reasons of popularity

MySQL is becoming so popular because of these following reasons:

 MySQL is an open-source database so you don't have to pay a single penny to


use it.
 MySQL is a very powerful program so it can handle a large set of functionality
of the most expensive and powerful database packages.
 MySQL is customizable because it is an open source database and the open-
source GPL license facilitates programmers to modify the SQL software according to
their own specific environment.
 MySQL is quicker than other databases so it can work well even with the large
data set.
 MySQL supports many operating systems with many languages like PHP,
PERL, C, C++, JAVA, etc.
 MySQL uses a standard form of the well-known SQL data language.
 MySQL is very friendly with PHP, the most popular language for web
development.
 MySQL supports large databases, up to 50 million rows or more in a table. The
default file size limit for a table is 4GB, but you can increase this (if your operating
system can handle it) to a theoretical limit of 8 million terabytes (TB).
A database is a separate application that stores a collection of data. Each database has
one or more distinct APIs for creating, accessing, managing, searching and
replicating the data it holds.
Other kinds of data stores can also be used, such as files on the file system or large
hash tables in memory but data fetching and writing would not be so fast and easy
with those type of systems.
Nowadays, we use relational database management systems (RDBMS) to store and
manage huge volume of data. This is called relational database because all the data is
stored into different tables and relations are established using primary keys or
other keys known as Foreign Keys.
A Relational DataBase Management System (RDBMS) is a software that −
 Enables you to implement a database with tables, columns and indexes.
 Guarantees the Referential Integrity between rows of various tables.
 Updates the indexes automatically.
 Interprets an SQL query and combines information from various tables.

Bharathamatha College
TOW PAL 19

RDBMS Terminology
Before we proceed to explain the MySQL database system, let us revise a few
definitions related to the database.
 Database − A database is a collection of tables, with related data.
 Table − A table is a matrix with data. A table in a database looks like a simple
spreadsheet.
 Column − One column (data element) contains data of one and the same
kind, for example the column postcode.
 Row − A row (= tuple, entry or record) is a group of related data, for
example the data of one subscription.
 Redundancy − Storing data twice, redundantly to make the system faster.
 Primary Key − A primary key is unique. A key value cann ot occur twice in
one table. With a key, you can only find one row.
 Foreign Key − A foreign key is the linking pin between two tables.
 Compound Key − A compound key (composite key) is a key that consists of
multiple columns, because one column is not sufficiently unique.
 Index − An index in a database resembles an index at the back of a book.
 Referential Integrity − Referential Integrity makes sure that a foreign key
value always points to an existing row.
MySQL Database
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.
MySQL is developed, marketed and supported by MySQL AB, which is a Swedish
company. MySQL is becoming so popular because of many good reasons −
 MySQL is released under an open-source license. So you have nothing to pay to
use it.
 MySQL is a very powerful program in its own right. It handles a large subset
of the functionality of the most expensive and powerful database packages.
 MySQL uses a standard form of the well-known SQL data language.
 MySQL works on many operating systems and with many languages including
PHP, PERL, C, C++, JAVA, etc.
 MySQL works very quickly and works well even with large data sets.
 MySQL is very friendly to PHP, the most appreciated language for web
development.

Bharathamatha College
TOW PAL 20

 MySQL supports large databases, up to 50 million rows or more in a table. The


default file size limit for a table is 4GB, but you can increase this (if your operating
system can handle it) to a theoretical limit of 8 million terabytes (TB).
MySQL is customizable. The open-source GPL license allows programmers to
modify the MySQL software to fit their own specific environments.

Bharathamatha College
TOW PAL 21

DESIGN AND DEVELOPMENT PROCESS

Bharathamatha College
TOW PAL 22

3.1 FUNDAMENTAL DESIGN CONCEPT

The System Design includes the maintenance of the secure file transfer service with
a prescribed encryption format and split at the interested level of encryption, and
embed process and the receiving service at the other end with de-embed and
decryption process. The design also includes the provision of facility to the user to
manipulate the concerned information according to his personal use and
communication process.
The design also needs to provide the communication channel to the user to
communicate with other registered users through the mailing services in a reliable
and secured format. Authorization and authentication services are preferred most for
this purpose. The System Design includes the maintenance authorization services,
File and directory services with a prescribed encryption format at the interested level
of encryption and the receiving service at the other end with decryption process. The
design also includes the provision of facility to the user to manipulate the concerned
information according to his personal use. The design of Effective Privacy
Preserving key Generation for Multimedia Application system, basically involve the
interface architecture, Security services, and communication system.

In the interface design we involve with the design of the user interface with GUI
standards and a proper navigation system where the user need to enter into the flow
of transactions authorization services are check and further access is provided into
the system. Then the user needs to select into the operations provided through the
GUI where encryption, embedding, de-embedding, Decryption, and sending of the
file, General Information and exit are provided. Here the Encryption and decryption
and services are provided connecting to the security services module where the
encryption and decryption are carried out using the cryptographic standards
implementing the tiny algorithm.After decryption process is completed the user is
selecting the file for encryption. After encryption of the file is completed the user is
to select the file for embedding it to the video file and sending through the network
to the desired user .Then the system gets connected to the targeted user and delivers
the file in video format after which the user working with the Effective key
Generation for Multimedia Application software should go for the option De-Embed
Files and decrypt the file by selecting the file path by which the file gets decrypted
the file and is viewed on the system.

Bharathamatha College
TOW PAL 23

3.2 DESIGN NOTATIONS

Process

Process show what system does. Each process has one or more data inputs and
produces one or more data output, Circles in a data flow diagram represent process.
Each process has unique name and number. This name and number appear inside
the circle that represents the processes in a data flow diagram.

This process is represented as circle

Data Stores:

File or data store is depositary of data. They contain data that is retained in the
system. Processes can enter the data into a data store or retrieve data from the data
store. Each data store is represented by thin line in the data flow diagram and each
data store has a unique name.

The data store is represented in form of a line

External Entities:

External entities are outside the system but they either supply input data into the
system or use the system output, they are entities which the designer has no control.
Square or rectangle may represent external entities that supply data into a system or
sometimes called sources. External entities that use the system data are sometimes
called sinks.

Bharathamatha College
TOW PAL 24

Data Flows:

Dataflow model the passage of data in the system and are represented lines joining
system components. An arrow indicates the direction of the flow and the line labeled
by the name of the data flow.

3.2.1 DATA FLOW DIAGRAM

The data flow diagram is one of the most improvement tools used by the system
analyst DeMacro (1978), Nad Gand Sarson (1979) popularized the use if the data
flow diagram as modeling tools through their structured system analysis
methodologies.

A data flow diagram should be the first tool used by system analyst to model system
components. These components are the system processes; the data used by this
processes and external entities that interact with the system and the information
flows in the system.

Bharathamatha College
TOW PAL 25

Level 0: Login

Login Master

Enter
Open login username User home
form &password page

Verification

Bharathamatha College
TOW PAL 26

Level 1:

Bharathamatha College
TOW PAL 27

3.3 DESIGN PROCESS


The Design Process is an approach for breaking down a large project into
manageable chunks. Architects, engineers, scientists, and other thinkers use the
design process to solve a variety of problems.

THE DESIGN PROCESS CONSISTS OF 6 STEPS:

 Define the Problem

You can’t find a solution until you have a clear idea of what the problem is.

 Collect Information

Collect sketches, take photographs and gather data to start giving you inspiration.

 Brainstorm and Analyze Ideas

Begin to sketch, make, and study so you can start to understand how all the data and
information you’ve collected may impact your design.

 Develop Solutions

Take your preliminary ideas and form multiple small-scale design solutions.

 Gather Feedback

Present your ideas to as many people as possible: friends, teachers, professionals,


and any others you trust to give insightful comments.

 Improve

Reflect on all of your feedback and decide if or to what extent it should be


incorporated. It is often helpful to take solutions back through the Design Process to
refine and clarify them.

Bharathamatha College
TOW PAL 28

3.3.1 DATABASE DESIGN

A database is an organized collection of data. The data is typically organized to


model relevant aspect of reality. In a way that supports processes requiring this
information.

A general-purpose database management system (DBMS) is a software system


designed to allow the definition, creation, querying, update and administration of
database. Well-known DBMS include MySQL, Microsoft access.

They actively deal with the design of the physical database. A key is to determine
how to access paths are to be implemented. A physical path is derived from a logical
path., pointers, chains, or other mechanism may be implemented. The general theme
behind database is to handle information as a whole. The general objective is to
make information access easy, quick, inexpensive and flexible for the user. Database
design is the most critical part of the design phase. Database design transforms the
information domain model created during the analysis into the data structures that
will be required to implement the software system.

Table Name: usertable (login)

Bharathamatha College
TOW PAL 29

Table Name: pd (women complaints)

Bharathamatha College
TOW PAL 30

Table Name: pd1(Employee’s complaint

Bharathamatha College
TOW PAL 31

Table Name: pd2 (Minor complaint)

Bharathamatha College
TOW PAL 32

3.3.2 INPUT DESIGN


Input design is the process of converting a user-oriented description of the inputs to a
computer based business system into a programmer-oriented specification. The goal
of designing input data is to make data entry easy, logical and free from errors as
possible.

Input design is a part of overall system design, which requires carefully attention. If
the data going into the system is incorrect, then the processing and output will
magnify these errors. The main objective during the input design is as given below:

 To produce a cost-effective method of input.


 To achieve the highest possible level of security.
 To ensure that the input is acceptable and understood by the user.

Bharathamatha College
TOW PAL 33

3.3.3 OUTPUT DESIGN

Outputs from computer systems are required primarily to communicate the results of
processing to users. They are also used to provide a permanent copy of the results for
later consultation. The various types of outputs in general are:
 External Outputs, whose destination is outside the organization,
 Internal Outputs whose destination is within organization and they are the
 User’s main interface with the computer.
 Operational outputs whose use is purely within the computer department.
 Interface outputs, which involve the user in communicating directly

Bharathamatha College
TOW PAL 34

TESTING AND IMPLEMENTATION

Bharathamatha College
TOW PAL 35

4.1 TESTING

Software testing is a critical element of software quality assurance and represents the
ultimate review of specification, design and coding. In fact, testing is the one step in
the software engineering process that could be viewed as destructive rather than
constructive.

A strategy for software testing integrates software test case design methods into a
well-planned series of steps that result in the successful construction of software.
Testing is the set of activities that can be planned in advance and conducted
systematically. The underlying motivation of program testing is to affirm software
quality with methods that can economically and effectively apply to both strategic to
both large and small-scale systems.

4.1.1 TESTING METHODOLOGIES UNIT TESTING

Unit testing focuses verification effort on the smallest unit of software design - the
software component or module. Using the component level design description as a
guide, important control paths are tested to uncover errors within the boundary of the
module. The relative complexity of tests and uncovered scope established for unit
testing. The unit testing is white-box oriented, and step can be conducted in parallel
for multiple components.

The modular interface is tested to ensure that information properly flows into and out
of the program unit under test. The local data structure is examined to ensure that
data stored temporarily maintains its integrity during all steps in an algorithm's
execution. Boundary conditions are tested to ensure that all statements in a module
have been executed at least once. Finally, all error handling paths are tested.

INTEGRATION TESTING

Integration testing is systematic technique for constructing the program structure


while at the same time conducting tests to uncover errors associated with interfacing.
The objective is to take unit tested components and build a program structure that has
been dictated by design. The entire program is tested as whole. Correction is difficult
because isolation of causes is complicated by vast expanse of entire program. Once
these errors

Bharathamatha College
TOW PAL 36

Are corrected, new ones appear and the process continues in a seemingly endless
loop. After unit testing in Sell-Soft System all the modules were integrated to test for
any inconsistencies in the interfaces. Moreover differences in program structures
were removed and a unique program structure was evolved.

VALIDATION TESTING

This is the final step in testing. In this the entire system was tested as a whole with
all forms, code, modules and class modules. This form of testing is popularly known
as Black Box testing or System testing.
Black Box testing method focuses on the functional requirements of the software.
That is, Black Box testing enables the software engineer to derive sets of input
conditions that will fully exercise all functional requirements for a program. Black
Box testing attempts to find errors in the following categories; incorrect or missing
functions, interface errors, errors in data structures or external data access,
performance errors and initialization errors and termination errors.

SECURITY TESTING

Security testing is to verify that protection mechanism built into a system that it
would protect it from improper penetration. During security testing, the tester plays
the role of individual who desire to penetrate the system. Due to any case in the
security that is, the software must work consistently and the data should not be
trapped.

BLACKBOX TESTING

This test involves the manual evaluation of the flow from one module to the other
and check accordingly for the process flow. This process of testing is with the
following criteria.

 Administrator Process
 Auditorium process
 Charity Process
 Booking process
 Quit Process

Bharathamatha College
TOW PAL 37

WHITEBOX TESTING

White box testing is a testing case design method that uses the control structure of
the procedure design to derive test cases. All independents path in a module are
exercised at least once, all logical decisions are exercised at once, execute all loops at
boundaries and within their operational bounds exercise internal data structure to
ensure their validity. Here the customer is given three chances to enter a valid choice
out of the given menu.

Bharathamatha College
TOW PAL 38

4.2 System Implementation


Implementation is the stage of the project when the theoretical design is turned out
into a working system. Thus it can be considered to be the most critical stage in
achieving a successful new system and in giving the user, confidence that the new
system will work and be effective.

The implementation stage involves careful planning, investigation of the existing


system and it’s constraints on implementation, designing of methods to achieve
changeover and evaluation of changeover methods.

The proposed approach requires both the transport (in terms of end-to-end rate
allocation) and the physical layer (in terms of channel and power schedule) to be
aligned. Coordination between the two layers can be implemented on different
timescales end-to- end rate allocation on the fast time-scale and incremental channel
and power updates on the slow time-scale. As demonstrated, most of the common
variants can be interpreted as distributed methods for solving the optimization
network flow problem (determines the end-to-end rates under fixed link capacity).
Based on an initial schedule (a simple link schedule for the first L slots), we run the
scheme until convergence (this may require the schedule to be applied repeatedly).
After rate convergence, each node reports the link prices associated with its
incoming and outgoing links to gateway where the proposed resource allocation
scheme is adopted. On receiving the link prices from the entire set of node, the
gateway finds the channels and transmit powers by applying the resource allocation
scheme proposed it then augments the schedule.

4.2.1 IMPLEMENTATION PROCEDURE


This project is mainly used for security purpose. The main objective of the hall
booking management system is to manage the details, of payment, booking
customers and hall. It manages all the information about payment. The project is
totally built at administrative end and thus only the administrator is the manual work
for managing the payment, Booking Dates, inventory, booking. It tracks all the
details about the Booking Customers Hall. Provides the searching facilities based on
various factors. Such as Payment, Booking, Customers, Hall. Manage the
information of Booking Dates.

Bharathamatha College
TOW PAL 39

4.3 SYSTEM MAINTENANCE


Maintenance phase focus on change that is associated with error correction,
adoptions required as the software’s environment evolves and changes due to
enhancement brought about by the user. Software will undoubtedly undergo change
after it is delivered to the user. “PLAINTE” project uses PHP is object- oriented, so
that the user can have the concept of reusability over the software component to add
or modify some modules. So maintenance becomes easier. When the system is in
maintenance phase some people within the system are responsible for collecting
maintenance requests from users and other interested parties. System maintenance is
the activity that occurs following the delivery of the software product enhancement
to software products adapting products to new environment and correcting errors.

CORRECTIVE MAINTENANCE

Problem correction involved modification and revalidation of software to correct


errors. The process that includes the diagnosis and correction of one more error is
known as CORRECTIVE MAINTANCE.

ADAPTIVE MAINTENANCE

Adaptive maintenance results in modification of the software to accommodate


changes to its environment. As the external environments are changed in the future,
the changes can also be accommodated.

PERFECTIVE MAINTENANCE

Perfective maintenance extends the software beyond its original functional


requirements. The required additional functions are easily added to the system. These
additional functions enhance the system functionality and the system becomes more
user- friendly.

PREVENTIVE MAINTENANCE

Preventive maintenance must be conducted to enable the software to serve the needs
of its end-users. In essence, preventive maintenance makes changes to computer
programs so that they can be more easily corrected, adapted and enhanced.

Bharathamatha College
TOW PAL 40

CONCLUSION

Bharathamatha College
TOW PAL 41

5. CONCLUSION

PLAINTE is a mobile application which is provide organization with


an effective tool to identify and target problem areas. We can provide a features help
to handle issues and complaints in a timely and efficient manner. This Software
project is aimed at automation of online. Application software has been computed
successfully and was also tested successfully by taking “test cases”. It is user
friendly, and has required options, which can be utilized by the user to perform the
desired operations. Application software meets the information requirements
specified to a great extent. The system has been designed keeping in view the present
and future requirements in mind and made very flexible. The goals that are achieved
by the software are Instant access, efficient management of records.

This application is mainly used for the helping the public PLAINTE
was developed to enhance the current complaint management system by using the
web application. Therefore PLAINTE enable to provide several channels for filling
the complaint which enable users to send the complaint easier.it is capable of
classifying the complaint and directly send to responsible department. Therefore the
system could reduce the loss and time of operation.

Bharathamatha College
TOW PAL 42

SCOPE FOR FUTURE ENHANCEMENTS

Bharathamatha College
TOW PAL 43

6.SCOPE FOR FUTURE ENHANCEMENTS

The entire project has been developed and deployed as per the requirements stated by
the user, it is found to be bug free as per the testing standards that is implemented.
Any specification-untraced errors will be concentrated in the coming versions, which
are planned to be developed in near future. The system at present does not take
care of lower level check constraints in accessing the file types in distributed
environments, which is to be considered in the future up gradations.

As per the present status the project developed is well equipped to handle the Central
file system of an organization in a cloud and provide access to the users with various
privileges as prescribed by the higher authorities in the password file.

To develop different public complaint for user.


To enhance phone call for customer
To enquire the complaints to the user.
To track the location for user complaints

Bharathamatha College
TOW PAL 44

BIBLIOGRAPHY

Bharathamatha College
TOW PAL 45

REFERENCE:

 FOR INSTALLATION
www.wamp.ccom

 FOR DEPLOYMENT AND PACKING ON SERVER


www.mysql.com

www.w3schools.com

 FOR SQL
www.phptpoint.com

 FOR Pup
www.php.com/net/quickstart/aspplus/default.com

www.php.net

www.fmexpense.com/quickstart/aspplus/default.com

www.4guysfromrolla.com/index.com

Bharathamatha College
TOW PAL 46

APPENDIX

Bharathamatha College
TOW PAL 47

LOGIN PAGE

Bharathamatha College

You might also like