Beruflich Dokumente
Kultur Dokumente
Synopsis:
Operational feasibility
Technical feasibility
Economic feasibility
The software being made should definitely yield benefits, greater than the
Cost of expenditure in creating the software, the software as for its objective is
concerned, will certainly yield better fruits, as it is designed for the purpose of Managing
money and other inputs and output of the system. Also the system Greatly reduces the
time factor it also reduces the maintenance cost of the records significantly.
This system is used to track the project status .The main thing used in the
project is the mail system. These status and reports can easily shared between the Project
Leader, Team Leader and Project Leader. The System is maintained by J2EE technology.
The datas are stored in database automatically.
SOFTWARE CONFIGURATION
JAVA:
Java is used as front-end tool for developing the project. To run Java there
is no need to have any particular operating system, as it is platform independent. This
must have certain hardware and software installed on your computer. The key
considerations were summed up by the Java team in the following list of buzzwords:
Simple
Security
Portability
Object-oriented
Robust
Multithreaded
Architecture-Neutral
Interpreted
High Performance
Distributed
Dynamic
HTML was specifically developed to use along with the Hyper Text
Transfer Protocol (HTTP) to encode documents for display on the World Wide Web.
HTML is defined in the HTML Standard, currently Version 4.0x. HTML
standards are recommended by the World Wide Web Consortium, W3C. W3C also
oversees the standardization of technologies related to the World Wide Web and
publishes the HTTP (Hypertext Transfer Protocol) standards. HTML is initials for Hyper
Text Markup Language. HTML is pronounced one letter at a time as if you are spelling
the word HTML. It is not pronounced as "hit mill" and it is NOT a programming
language. HTML cannot be used to write programs and it cannot control the precise
layout of a web page.
Web browsers are used to view HTML documents. Two popular web
browsers are the Netscape Navigator 4.x and the Microsoft Internet Explorer 5.x.
Browsers control the layout of a web page.
JAVA SCRIPT:
MACROMEDIA DREAMWEAVER:
It is used to attach Sound files and Animation files along with our Source.
that create dynamic content easily but with maximum power and
flexibility.
Advantages:
JSP page:
A JSP page is a text-based document that describes how to process a request to create a
response. The description intermixe template data with some dynamic actions and
leverages on the Java Platform.The features in the JSP technology support a number of
different paradigms for authoring of dynamic content. JSP pages can be used in
combination with Servlets, HTTP, HTML, XML, Applets,JavaBeans
components and Enterprise JavaBeans components to implement a broad
variety of application architecture(s) or models.
Maximum performance and scalability through its unique design with the
Windows NT multi-threaded architecture.
Central and easy-to-use the Graphical User Interface (GUI).
Automatic authentication of users by the Operating System.
Overall goals:
• Enterprise JavaBeans applications will follow the “Write Once, Run Anywhere”
philosophy of the Java programming language. An enterprise Bean can be developed
once, and then deployed on multiple platforms without recompilation or source code
modification.
• The Enterprise JavaBeans architecture will define the contracts that enable
tools from multiple vendors to develop and deploy components that can inter operate at
runtime.
CORBA protocols.
The Enterprise Bean Provider is the producer of enterprise beans. The system
output is an ejb-jar file that contains one or more enterprise beans. The Bean Provider is
responsible for the Java classes that implement the enterprise bean’s business methods,
the definition of the bean’s remote and home interfaces and the bean’s deployment
descriptor.
The deployment descriptor includes the structural information of the enterprise
bean and declares all the enterprise bean’s external dependencies.
Application Assembler
Deployer
The Deployer takes one or more ejb-jar files produced by a Bean Provider or
Application Assembler and deploys the enterprise beans contained in the ejb-jar files in a
specific operational environment. The operational environment includes a specific EJB
Server and Container. The Deployer is an expert at a specific operational environment
and is responsible for the deployment of enterprise Beans.The Deployer uses tools
supplied by the EJB Container Provider to perform the deployment tasks. The
deployment process is typically two-stage:
• The Deployer first generates the additional classes and interfaces that enable the
container to manage the enterprise beans at runtime. These classes are container-specific.
• The Deployer performs the actual installation of the enterprise beans and the
additional classes and interfaces into the EJB Container.
System Administrator
.
4.SYSTEM DESIGN
Database design is the first design in the designing of the system. It forms
the bases on which the whole system has to be designed. If the database is carried out well
then the design of the modules can be carried out easily without any worry about the data.
The main objective of the data base design is to structure the data in such a way that is free
from the program modules. The two main objectives the database design are listed below,
Database Integrity
It means that the database should be valid at all times and give the user the exact
details, which he wants. The integrity of the database can be questioned when there is more
that one copy of the data. In such a case the data at all the places should be updated
simultaneously so that the database gives the exact information whenever it is queried.
Thus the system satisfies the database integrity.
Database Independency
This ensures that the data is independent of the application. The application
program must be independent of the database. If this is ensured, then the application can be
modified in the future without any change to the database. This change also doesn’t affect
the other application in the system. Similarly a change made to the database does not affect
any programs if data independence is ensured. This database independency is satisfied by
the current system.
TABLES
TABLE: EMP_PERDET:
Company can have profile details of every Employee.
TABLE: LOGIN
Login details have the credentials of employee to login.
TABLE: PJDET
This table contains complete details about the new project,members assigned and
status of project.
TABLE: DOCUSTORED
The uploaded documents regarding projects are displayed in this table.
TABLE: PLMAILS
The mails sent to Project Leader are stored in this table with date and time of mails.
TABLE: TLMAILS
The mails sent to Team Leader are stored in this table with date and time of mails.
TABLE: TMMAILS
The mails sent to Team Member are stored in this table with date and time of mails.
NORMALIZATION
The normal forms are used to ensure that various types of anomalies and are not
introduced inconsistencies into the database.
Unnormalized form
An Unnormalized relation contains non-atomic values i.e. each rows may contain
multiple set of values for some of the columns these multiple values in a single row are also
called non-atomic values. There are no tables in unnormailzed form.
A relation scheme is said to be in the first normal form (1NF) if the values in the
domain if each attribute of the relation are atomic. In other words only one value is
associated with each attribute and the value is not a set of values or list of values. All the
tables here are atomic.
A relation is in Second Normal Form (2NF) if it is in the first normal form and if all
nonprime attributes are fully functionally dependant on the relation key(s). All tables satisfy
the second normal form.
Modular Description
Login screen
An authenticated user having a valid Employee code can login. There are three
users namely Project Leader (PL) and Team Leader (TL) and Team Member (TM).
Update/Delete Projects
PL can update the details of the existing projects and also has the option for
deleting the project when completed.
Allot workers
PL can allot workers needed for the project by their codes according to the
availability and needs of the project.
Release Workers
PL can release workers from the project once it is finished ,so that the workers
can be assigned to the next project.
Uploading Documents
TL uploads the documents to the concerned Team members. This can be viewed
and downloaded by team members.
Status update
Access to Documents
TM can view, download and delete the documents send to him by his leader
regarding the project.
4.6 ER-DIAGRAM
Projects
Clients Allot TL
TM
Process TM
Update
Status
4.7 DATA DICTIONARY
EMP_PERDET
LOGIN
PJDET
DOCUSTORED
FIELD NAME DESCRIPTION
Name Name
Filename File name
PLMAILS
TLMAILS
Data Flow
LEVEL 0
Automation
Employee PL, TL, TM of process information Status Report
Process
.
Data Flow Diagram (DFD)
Help Menu
Login
Re Login Login
Screen
Invalid Password Valid Password
PL
Upload Document
TM Allocates Project
Checks the documents
TL
Add project
Project Status Table
Project Complete
Table
2. SYSTEM DESCRIPTION
The system for tracking the project process, which involves three phases :-
The system helps the PL, TL and TM to view the status of the project and
helps in tracking information about the project and sharing messages by Mailing system.
At the initiation phase, each project must complete certain documents in a particular
duration. The PL will get notification about the incomplete documents whenever he
logins.
PL is given permission to add new projects, update/delete the existing
projects and release workers. PL is given permission to view the current status of the
documents, pending documents, completed documents, update the documents, and view
the document categories wise.
PL is given permission to view the completed and pending documents of
the projects.
Regular Phase: -
Regular Phase is other wise termed as execution stage of the project. Team
Members come in to picture. As per the documents completed in phase one, design,
coding and maintainability of the project starts. PL allocates modules to team members.
Modular Description
Login screen
An authenticated user having a valid Employee code can login. There are three
users namely Project Leader (PL) and Team Leader (TL) and Team Member (TM).
Update/Delete Projects
PL can update the details of the existing projects and also has the option for
deleting the project when completed.
Allot workers
PL can allot workers needed for the project by their codes according to the
availability and needs of the project.
Release Workers
PL can release workers from the project once it is finished ,so that the workers
can be assigned to the next project.
Status update
Access to Documents
TM can view, download and delete the documents send to him by his leader
regarding the project.
MODULES DESCRIPTION
1.Prover
2.Witness
3.Location Proof Server
4.Certificate Authority
5.Verifier
6.Threat Model
Prover:
The node who needs to collect location proofs from its neighboring nodes. When
a location proof is needed at time t, the prover will broadcast a location proof request to
its neighboring nodes through Bluetooth. If no positive response is received, the prover
will generate a dummy location proof and submit it to the location proof server.
Witness:
Once a neighboring node agrees to provide location proof for the prover, this node
becomes a witness of the prover. The witness node will generate a location proof and
send it back to the prover.
PROCESS:
Online Route API
Examples are: Google/Bing route APIs. Such API computes the shortest route between
two points on a road network, based on live traffic. It has the latest road network G with
live travel time information.
Mobile User
Using a mobile device (smartphone), the user can acquire his current geo-location q and
then issue queries to a location-based server. In this paper, we consider range and KNN
queries based on live traffic.
Location-Based Service/Server
It provides mobile users with query services on a data set P, whose POIs (e.g.,
restaurants, cafes) are specific to the LBS’s application. The LBS may store a road
network G with edge weights as spatial distances, however G cannot provide live travel
times. In case P and G do not fit in main memory, the LBS may store P as an R-tree and
store the G as a disk-based adjacency list.
End Users
In this module, there are n numbers of users present. User should register to a particular
group before doing any operations. After registration successful he has to login by using
authorized user name and password. After logged in he will do some operations such as
View Route MAP, View My History, View My Transaction, and List Other Users.
True
Testing is vital to the success of the system. System testing makes a logical
assumption that if all parts of the system are correct, the goal will be successfully
achieved. The candidate system is subject to variety of tests-on-line response, Volume
Street, recovery and security and usability test. A series of tests are performed before the
system is ready for the user acceptance testing. Any engineered product can be tested in
one of the following ways. Knowing the specified function that a product has been
designed to from, test can be conducted to demonstrate each function is fully operational.
Knowing the internal working of a product, tests can be conducted to ensure that “al
gears mesh”, that is the internal operation of the product performs according to the
specification and all internal components have been adequately exercised.
Unit Testing:
Unit testing is the testing of each module and the integration of the overall system
is done. Unit testing becomes verification efforts on the smallest unit of software design
in the module. This is also known as ‘module testing’. The modules of the system are
tested separately. This testing is carried out during the programming itself. In this
testing step, each model is found to be working satisfactorily as regard to the expected
output from the module. There are some validation checks for the fields. For example,
the validation check is done for verifying the data given by the user where both format
and validity of the data entered is included. It is very easy to find error and debug the
system.
Integration Testing:
Data can be lost across an interface, one module can have an adverse effect on
the other sub function, when combined, may not produce the desired major function.
Integrated testing is systematic testing that can be done with sample data. The need for
the integrated test is to find the overall system performance. There are two types of
integration testing. They are:
White Box testing is a test case design method that uses the control structure of
the procedural design to drive cases. Using the white box testing methods, we derived
test cases that guarantee that all independent paths within a module have been exercised
at least once.
In ‘functional testing’, is performed to validate an application conforms to its
specifications of correctly performs all its required functions. So this testing is also called
‘black box testing’. It tests the external behavior of the system. Here the engineered
product can be tested knowing the specified function that a product has been designed to
perform, tests can be conducted to demonstrate that each function is fully operational.
TESTING METHODOLOGIES
o Unit Testing.
o Integration Testing.
o User Acceptance Testing.
o Output Testing.
o Validation Testing.
Unit Testing
Unit testing focuses verification effort on the smallest unit of Software design that
is the module. Unit testing exercises specific paths in a module’s control structure to
ensure complete coverage and maximum error detection. This test focuses on each
module individually, ensuring that it functions properly as a unit. Hence, the naming is
Unit Testing.
During this testing, each module is tested individually and the module interfaces
are verified for the consistency with design specification. All important processing path
are tested for the expected results. All error handling paths are also tested.
Integration Testing
Integration testing addresses the issues associated with the dual problems of
verification and program construction. After the software has been integrated a set of
high order tests are conducted. The main objective in this testing process is to take unit
tested modules and builds a program structure that has been dictated by design.
2. Bottom-up Integration
This method begins the construction and testing with the modules at the lowest
level in the program structure. Since the modules are integrated from the bottom up,
processing required for modules subordinate to a given level is always available and the
need for stubs is eliminated. The bottom up integration strategy may be implemented
with the following steps:
The low-level modules are combined into clusters into clusters that
perform a specific Software sub-function.
A driver (i.e.) the control program for testing is written to coordinate test
case input and output.
The cluster is tested.
Drivers are removed and clusters are combined moving upward in the
program structure
The bottom up approaches tests each module individually and then each module is
module is integrated with a main module and tested for functionality.
User Acceptance of a system is the key factor for the success of any system. The
system under consideration is tested for user acceptance by constantly keeping in touch
with the prospective system users at the time of developing and making changes
wherever required. The system developed provides a friendly user interface that can
easily be understood even by a person who is new to the system.
After performing the validation testing, the next step is output testing of the
proposed system, since no system could be useful if it does not produce the required
output in the specified format. Asking the users about the format required by them tests
the outputs generated or displayed by the system under consideration. Hence the output
format is considered in 2 ways – one is on screen and another in printed format.
Text Field:
The text field can contain only the number of characters lesser than or equal to its
size. The text fields are alphanumeric in some tables and alphabetic in other tables.
Incorrect entry always flashes and error message.
Numeric Field:
The numeric field can contain only numbers from 0 to 9. An entry of any
character flashes an error messages. The individual modules are checked for accuracy
and what it has to perform. Each module is subjected to test run along with sample data.
The individually tested modules are integrated into a single system. Testing involves
executing the real data information is used in the program the existence of any program
defect is inferred from the output. The testing should be planned so that all the
requirements are individually tested.
A successful test is one that gives out the defects for the inappropriate data and
produces and output revealing the errors in the system.
Taking various kinds of test data does the above testing. Preparation of test data
plays a vital role in the system testing. After preparing the test data the system under
study is tested using that test data. While testing the system by using test data errors are
again uncovered and corrected by using above testing steps and corrections are also noted
for future use.
Live test data are those that are actually extracted from organization files. After a
system is partially constructed, programmers or analysts often ask users to key in a set of
data from their normal activities. Then, the systems person uses this data as a way to
partially test the system. In other instances, programmers or analysts extract a set of live
data from the files and have them entered themselves.
Artificial test data are created solely for test purposes, since they can be generated
to test all combinations of formats and values. In other words, the artificial data, which
can quickly be prepared by a data generating utility program in the information systems
department, make possible the testing of all login and control paths through the program.
The most effective test programs use artificial test data generated by persons other
than those who wrote the programs. Often, an independent team of testers formulates a
testing plan, using the systems specifications.
The package “Virtual Private Network” has satisfied all the requirements
specified as per software requirement specification and was accepted.
7.3 MAINTAINENCE
This covers a wide range of activities including correcting code and design errors.
To reduce the need for maintenance in the long run, we have more accurately defined the
user’s requirements during the process of system development. Depending on the
requirements, this system has been developed to satisfy the needs to the largest possible
extent. With development in technology, it may be possible to add many more features
based on the requirements in future. The coding and designing is simple and easy to
understand which will make maintenance easier.
TESTING STRATEGY :
A strategy for system testing integrates system test cases and design techniques
into a well planned series of steps that results in the successful construction of software.
The testing strategy must co-operate test planning, test case design, test execution, and
the resultant data collection and evaluation .A strategy for software testing must
accommodate low-level tests that are necessary to verify that a small source code
segment has been correctly implemented as well as high level tests that validate
major system functions against user requirements.
Software testing is a critical element of software quality assurance and represents the
ultimate review of specification design and coding. Testing represents an interesting
anomaly for the software. Thus, a series of testing are performed for the proposed
system before the system is ready for user acceptance testing.
SYSTEM TESTING:
Software once validated must be combined with other system elements (e.g.
Hardware, people, database). System testing verifies that all the elements are proper and
that overall system function performance is
achieved. It also tests to find discrepancies between the system and its original objective,
current specifications and system documentation.
UNIT TESTING:
In unit testing different are modules are tested against the specifications produced
during the design for the modules. Unit testing is essential for verification of the code
produced during the coding phase, and hence the goals to test the internal logic of the
modules. Using the detailed design description as a guide, important Conrail paths are
tested to uncover errors within the boundary of the modules. This testing is carried out
during the programming stage itself. In this type of testing step, each module was found
to be working satisfactorily as regards to the expected output from the module.
In Due Course, latest technology advancements will be taken into consideration.
As part of technical build-up many components of the networking system will be generic
in nature so that future projects can either use or interact with this. The future holds a lot
to offer to the development and refinement of this project.
Implementation:
The above said testing can be done virtually. In order to implement the
VB .Net for Knowledge Based Decision Support System. Implementation includes all
those activities that take place to convert from an old system to a new one.
Three aspects of implementation are:
1. Training Personnel.
2. Conversion.
3. Point Implementation Review.
TRAINING:
The quality of training received by the personnel involved with the
system in various capacities helps or hinders, and may even prevent, the successful
implementation of an information system. Both system operators and users need
training.
The training ensured that they were able to handle all possible
operations, both routine and extraordinary. Training also involved run procedures,
which involves working through the sequence of activities needed to use a new
system on an ongoing basis.
CONVERSION:
The system would be installed throughout the organization using the phase in
methods. This approach had the advantage of providing a sound training ground
before full implementation.
Review Questions: - The most fundamental concern during the post implementation
review is determining whether the system has met its objective, that is analysts want to
know whether the performance level of users has improved and if the system is producing
the result intended.
CONCLUSION & FUTURE SCOPE:
1. Abbreviations
JIT Just-In-Time
www.microsoft.com
www.msdn.com
www.roseindia.net
www.softlandindia.com
REFERENCES:
[2] 9th DIMACS Implementation Challenge on Shortest Paths. (2013). [Online]. Available:
http://www.dis.uniroma1.it/challenge9/data/tiger/
[5] Bing Maps Licensing and Pricing Information. (2013). [Online]. Available:
http://www.microsoft.com/maps/product/licensing.aspx
[6] Google Directions & Bing Maps: Live Traffic Information. (2013). [Online]. Available:
http://support.google.com/maps/bin/answer.py?hl=en&answer=2549020&topic=1687356&http:/
/msdn.microsoft.com/en-us/library/aa907680.aspx
[14] E. P. F. Chan and Y. Yang, “Shortest path tree computation indynamic graphs,” IEEETrans.
Comput., vol. 58, no. 4, pp. 541–557,Apr. 2009.
[17] A. Dingle and T. Partl, “Web cache coherence,” Comput. Netw., vol. 28, pp. 907–920,
1996.