Beruflich Dokumente
Kultur Dokumente
in
debugging
these
programs
has
led
to
the
capabilities
which
reduces
the
burden
of
the
Literature survey
Exiting System
Notepad
Notepad is a text editor, which is a program similar to a word
processor but cannot perform any special editing. No embedded
codes are inserted into the document.
Text files also called: unformatted text files and ASCII (American
Standard Code for Information Interchange).
With Notepad, you can:
Create simple text documents
Multi-tasking/create/edit batch files
Print a file
The Notepad++
Notepad++ is a source code editor and is also a text editor. This
software is distributed free. For displaying and editing text and as
well as programming language source code files, the Notepad++
makes use of the Scintilla editor module.
Dreamweaver
Dreamweaver starts up rather slower than Notepad++. However
the design and source view in Dreamweaver, though sometimes if
you make a change in the design view can often interfere with the
original code and so you have to make changes.
Proposed solution
The proposed system is a Complete language editor with many
additional features.
INTELLIGENT EDITOR is a type of editor used for writing source
code in a specified language. It provides many features such as
Auto Indentation, Syntax Highlighting, Automatically adds
matching
parenthesis,
Remove
of
Comments,
FTP
Development process
Development process
The waterfall model is a popular version of the systems
development life cycle model for software engineering. Often
considered the classic approach to the systems development life
cycle, the waterfall model describes a development method that
is linear and sequential. Waterfall development has distinct goals
for each phase of development. Imagine a waterfall on the cliff of
a steep mountain. Once the water has flowed over the edge of the
cliff and has begun its journey down the side of the mountain, it
cannot turn back. It is the same with waterfall development. Once
Requirement
Gathering
and
analysis: All
possible
requirements of the system to be developed are captured in this
phase and documented in a requirement specification doc.
System Design: The requirement specifications from first
phase are studied in this phase and system design is prepared.
System Design helps in specifying hardware and system
requirements and also helps in defining overall system
architecture.
Implementation: With inputs from system design, the system
is first developed in small programs called units, which are
integrated in the next phase. Each unit is developed and tested
for its functionality which is referred to as Unit Testing.
Integration and Testing: All the units developed in the
implementation phase are integrated into a system after testing
of each unit. Post integration the entire system is tested for any
faults and failures.
Deployment of system: Once the functional and non
functional testing is done, the product is deployed in the customer
environment or released into the market.
Product overview
next line. In short, it wraps the text to the user such that they are
able to see all the text without having to scroll horizontally.
Friendly easy to use interface This notepad editor is easy to use,
just like any other text editor.
Functional requirement
Seeking commonly implemented functions for working with
intelligent text editor, and the degrees of granularity at which
these functions can be implemented
Functions derived from previous work which has contributed to
the definition of the range.
Text selection
one or more constituents at morph, word, phrase level
differentiate content from structure select across
morph/word/phrase cells and obtain content, structure
or both
Cut, copy & paste
any unit of selected text, with or without rendered
orthographic support
combinations will facilitate split and merge type actions
multiple selection clipboard
Multiple level redo and undo
the
block
of
code
the
editor
should
quotes
after
encountering
the
opening
Performance requirement
Performance requirement
Guaranteed performance
Guaranteed performance means that, in the face of a abrupt
increase in traffic to an
unexpected level, which can degrade its performance due to
overload to cloud system, a
cloud system autonomously selects a provider that offers an SLA
that satisfies the
that the consumer can see all the services involved as a one-stop
service.
Exception handling
Missing or defective exception handling provisions have caused
many failures in critical software intensive systems even though
they had undergone extensive review and test.
The failures occurred under conditions that had not been covered
in the reviews and tests because of incomplete or imprecise
system requirements. To curb this cause of failures the paper
addresses the generation of system requirements for exception
handling.
The systems most in need of precise exception handling
requirements are real-time control systems because in these
there is usually no opportunity to roll back and try a second time.
In keeping with the EWICS TC7 convention [1] such systems are in
the following called critical systems. They are found in aerospace,
process control, and increasingly in automotive applications.
Software for critical systems is expected to protect against a wide
range of anomalies that can include
Unusual environmental conditions
Erroneous inputs from operators
Faults in the computer(s), the software and communication lines
The portions of the programs that are charged with providing this
protection are called exception handling provisions or exception
handlers. Their purpose is (a) to detect that an anomalous
condition has been encountered and (b) to provide a recovery
path that permits continued system operation, sometimes with
reduced capabilities. In critical systems a large part of the
software can be devoted to exception handling and in some cases
2.
3.
4.
measured in bits per second. The larger the bandwidth, the more
data you can get through in a shorter period of time. Think of this
as the difference between a small diameter hose and a larger
one. Youll have the advantage in a water fight with the larger
hose.
Bit: Short for binary digit, the smallest unit of information on a
machine. A single bit can hold only one of two values: 0 or 1. More
meaningful information is obtained by combining consecutive bits
into larger units. For example, a byte is composed of 8
consecutive bits.
Blog: Short for Web log, a blog is a Web page that serves as a
publicly accessible personal journal for an individual. Typically
updated daily, blogs often reflect the personality of the author.
Browser: Short for Web browser, a software application used to
locate and display Web pages. The most popular browser is
Microsoft Internet Explorer a graphical browser, which means
that it can display graphics as well as text. In addition, most
modern browsers can present multimedia information, including
sound and video, though they require plug-ins for some formats.
Cloud Computing: Cloud computing is the use of computing
resources (hardware and software) that are delivered as a service
over a network (typically the Internet). The name comes from the
use of a cloud-shaped symbol as an abstraction for the complex
infrastructure it contains in system diagrams. Cloud computing
entrusts remote services with a user's data, software and
computation.
Convergence: The condition or process of combining
complementary technologies such as telecommunications,
networking and multimedia.
Cookies: The main purpose of cookies is to identify users and
possibly prepare customized Web pages for them. When you
enter a website using cookies, you may be asked to fill out a form
providing such information as your name and interests. This
information is packaged into a cookie and sent to your Web
browser which stores it for later use. The next time you go to the
same website, your browser will send the cookie to the Web
server. The server can use this information to present you with
custom Web pages. So, for example, instead of seeing just a
generic welcome page you might see a welcome page with your
name on it.
Customer Relationship Management (CRM): A database that
stores all customer information for easy retrieval.
Cyber attack: The leveraging of a target's computers and
information technology, particularly via the Internet, to cause
physical, real-world harm or severe disruption.
DHCP: Short for Dynamic Host Configuration Protocol, DHCP is
software that automatically assigns temporary IP addresses to
client stations logging onto an IP network. It eliminates having to
manually assign permanent "static" IP addresses. DHCP software
runs in servers and routers.
Digitizing: The process of converting data, images, audio, video,
etc. into a digital (binary) form.
DNS - Domain Name System: Computers on the Internet are kept
separate by the use of names and addresses. These addresses
are usually expressed as a sequence of four sets of numbers
separated by a decimal (for example 172.18.1.0). Because this
would be difficult to remember and also hard to type in without
making a mistake, we use the www.address.com style names for
us humans. Theyre translated into the numbering system.
DSL: Short for Digital Subscriber Lines, DSL technologies use
sophisticated modulation schemes to pack data onto copper
wires. They are sometimes referred to as last-mile technologies
because they are used only for connections from a telephone
switching station to a home or office, not between switching
stations.
Dynamic Sites: Through the use of Database programming, this
type of website offers more than a static site since it can
Internet Protocol (IP): The format that all computers use to talk
over the Internet.
IP Address: Short for Internet Protocol address, an IP address is
the address of a device attached to an IP network (TCP/IP
network). Every client, server, and network device must have a
unique IP address for each network connection (network
interface). Every IP packet contains a source IP address and a
destination IP address. An IP network is somewhat similar to the
telephone network in that you have to have the phone number to
reach a destination. The big difference is that IP addresses are
often temporary. Each device in an IP network is either assigned a
permanent address (static IP) by the network administrator or is
assigned a temporary address (dynamic IP) via DHCP software.
ISP (Internet Service Provider): A company that provides access to
the Internet. For a monthly fee, the service provider gives you a
software package, username, password, and access phone
number. Equipped with a high-speed device, you can then log on
to the Internet and browse the World Wide Web, and send and
receive e-mail.
Key Words: See Meta Tags
Local Area Network (LAN): An Ethernet switch and the cables that
go to computers that are geographically close together.
Meta Tags: A list of approximately thirty (30) words that are Key
to helping search engines find your website. This list should be
made in the order of importance as well as common misspellings
since its a human entering the search words into a search
engine. For example: Harbor Freight: Harbor, Harbour, Freight,
Frieght
Network: A group of two or more computer systems linked
together. There are many types of computer networks, including:
local-area networks (LANs) where the computers are
geographically close together (that is, in the same building); and
wide-area networks (WANs) where the computers are farther
System design
Use Case Model
ER Diagram
Flow Chart
Implementation
Module Specifications
The modules specified in the design are implemented using
various .htm, .jsp and .class files. These files in the source
code shares the common routines and share data structures, to
establish the hierarchical relationship.
Techniques of testing
Black Box Testing
White Box Testing
Equivalence Portioning
Boundary Value Analysis
Ad-hoc Testing
Unit testing
Unit testing is normally considered as an adjunct to the coding
step. After source level code has been developed, reviewed and
verified for correspondence to component level design. A review
of design information provides guidance for establishing test
cases that are likely to uncover errors in each of the categories.
Unit testing is responsible for testing each module in software
structure independently.
Integration testing
Tested modules are put together and tested in their integrity.
Integration testing is a systematic technique for constructing the
program structure while at the same time conducting tests to
uncover errors associated with interfacing. The objectives are to
take unit tested components and build a program structure that
has been discarded by design.
Testing strategies
A testing strategy is general approach to the testing process
rather than a method of devising particular system or
components tests. Different strategies a may be adopted
depending on the type of system to be tested and the
development process used.
The testing strategies which discuss in this are:
Top-down testing where testing starts with the most abstract
component and works downwards.
CONCLUSION
This editor developed is very evolutionary. This application is
very flexible and more convenient for the users. This editor is very
easy to use and edit the text and easily set different colors and
fonts. And also it is easy to access. Using Intelligent Editor is easy
to open any language documents and edit them.
Future Enhancement
As for future enhancement it can be made to support more
features like running and compiling the programs.
In future this application can further be extended to have lots of
other advanced features such as find, replace, auto correction and
etc.
References
2. Java 2 Platform
author- Jamie Jaworski
pubisher Techmedia Publication, First edition.
WEBSITE:
1. www.sun.com
2. www.oreilly.com
3. www.lucener.com
Appendices
IEEE Reference Papers
1. J. Albert Bickford, 1997. A Rich Model for Presenting Interlinear
Text. SILEWP 1997-003. SIL Electronic Working Papers. Summer