Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
Identifying the genetic basis for human diseases plays an important role in elucidating
disease mechanisms and discovering targets of drug treatments. For computational strategies
to predict disease-associated genes, integrating new data may lead to new discoveries.
Traditional approaches exploited genomic data and prioritized genes for a disease if the genes
are functionally similar to the known disease genes. Recent studies incorporated clinical
phenotype data to increase the ability of identifying new disease-associated genes assuming
that similar disease phenotypes reflect overlapping genetic causes.
However, most current disease gene prediction approaches used only one single data
source of human disease phenotypes. Phenotypic similarity databases were usually obtained by
extracting phenotype knowledge from texts, such as biomedical literature. We demonstrated
that DMN not only reflects genetic relationships among diseases, but also contains different
knowledge compared with the existing database. We hypothesize that integrating this new
phenotype network with the widely used disease phenotype data will improve the prediction of
disease genetics.
In this study, we developed a novel and generic approach to combine multiple different
data sources on human disease phenotype, and predict disease-associated genes from
seamlessly integrated phenotypic and genomic data. To demonstrate the approach, we
integrated DMN, mimMiner, a protein interaction network and known disease–gene
associations. We predicted new disease-associated genes from the heterogeneous network, and
demonstrated the benefit of incorporating an additional phenotype network DMN by
comparing with a baseline approach, which is also based on network analysis but only used
mimMiner.
1
We demonstrated that the disease–gene associations predicted by our approach, in
combination with the drug target data, may guide the discovery of new candidate drugs. We
used Crohn’s disease as an example, which has increasing worldwide prevalence and is
currently incurable. We predicted candidate genes for Crohn’s disease, and prioritized
candidate drugs based on the rank of drug target genes. We validated the result with the Food
and Drug Administration-approved therapies for Crohn’s disease. Our result provides
empirical evidence that our disease genetics prediction strategy, which combined unique data
and a novel system approach, can lead to rapid drug discovery.
The proposed system has been designed with several modules which are as follows,
Authentication Module
DNA Dataset Collection
RNA Dataset Collection
Pre Processing
DNA & RNA Sequence Analysis
Human Disease Prediction
Report Generation
2
1.1MODULES DESCRIPTION
1. AUTHENTICATION MODULE
This module is mainly based on admin. System will check the admin user name and
password for authentication. After the verification for authorization the admin can be able to
precede the process. All works are done under his control.
This module collects the datasets from the laboratory for initial analysis. . The collected
dataset contains the DNA sequence dataset for different types of structures such as primary and
secondary dataset. These details will be extracted and stored in the database.
The RNA dataset collection module collects the RNA datasets from the laboratory. The
collected dataset contains the RNA sequence dataset. These details will be extracted and stored
in the database.
4. PRE PROCESSING
The next module is the pre-processing details, which eliminates the unwanted contents
and irrelevant contents from the report. This eliminates auxiliary data’s.
3
5. DNA & RNA SEQUENCE ANALYSIS
Using this modules system automatically process admin enter the patient test report with
medical data set and give dynamic DNAs and RNAs details report to patient .so that admin can
check their disease based their DNAs and RNAs. All these report details store in separate table
so that admin can view test report easiest way.
The disease Prediction gets the patient DNA and RNA details and finds whether they
are normal or affected by disease. This has been calculated with the consideration of each DNA
and RNA sequence. So every DNA and RNA sequence will be used in the disease prediction
process.
7. REPORT GENERATION
This module deals with all the reports that can be generated from analyzing the patient’s
disease condition. In this final report generation admin can get detail information about patient
analyzed result using this application.
4
1.2 BIOINFORMATICS APPLICATIONS
MOLECULAR MEDICINE
The human genome will have profound effects on the fields of biomedical research and
clinical medicine. This may be inherited (as is the case with an estimated 3000-4000 hereditary
disease including Cystic Fibrosis and Huntington’s disease) or a result of the body’s response
to an environmental stress which causes alterations in the genome (e.g. cancers, heart disease,
diabetes.).The completion of the human genome means that we can search for the genes directly
associated with different diseases and begin to understand the molecular basis if these disease
more clearly. This new knowledge of the molecular mechanisms of disease will enable better
treatments, cures and even preventative tests to be developed.
PERSONALIZED MEDICINE
Clinical medicine will become more personalized with the development of the field of
pharmacogenomics. This is the study of how an individual’s genetic inheritance affects the
body response. At presence, some drugs fail to make it to the market because a small percentage
of the clinical patient population shows adverse effect to the drug due to sequence variants in
their DNA.
PREVENTATIVE MEASURE
With the specific details of the genetic mechanism of disease being unravelled, the
development of diagnostic test to measure a person susceptibility of different disease may
became the distinct reality. Preventative actions such as change of life style or having treatment
at the earlier possible stages when they are more likely to be successful, could result in huge
advances in our struggle to conquer in disease.
GENE THERAPY
In the too distant future, the potential for using genes themselves to treat disease may
became the reality. Gene therapy is the approach uses do treat, cure or even prevent disease by
changing the expression of the person’s genes. Currently, this field is in its infantile stage with
clinical trail for many different types of cancer and other disease ongoing.
5
1.3HUMAN DISEASE TARGETS
Gene sequencing panels are useful tools for analyzing specific mutations in a given
sample. Focused panels contains a select set of genes or gene regions that have known or
suspected associations with the disease or phenotype under the study. Next generation
sequencing (NGS) offers the scalability, speed and resolution to evaluate targeted gene of
interest.
Targeted cancer panels focus on a select set of genes or gene regions that have known
associations with cancer. The deep coverage offered by targeted resequencing studies enables
high sensitivity for rare variant calling.
Sequencing genes that have known involvement in certain disorders or conditions , such
as autism or cardiovascular disease , can enable researchers to detect variants that contribute to
inherited disorders.
HLA SEQUENCING
HLA (human leukocyte antigens) typing research with NGS (next generation anthrax
vaccine) generates phase resolved results using a single assay, in contrast to conventional
methods , which requires multiple assays , systems and analysis programs.
6
1.4 ORGANIZATION PROFILE
Dr. R. Balamurugan was conferred with MBBS degree and M.D (General Medicine)
by Madras Medical College, Chennai during the year 1982 - 1991. He received a special
Diploma in Diabetology from the same institution in the year 1994. After a brief stint in the
Government Hospital, in the year 1996, he started a clinic exclusively for Diabetics with the
objective of providing quality treatment and creating awareness through 'state of the art'
technology. In course of time, infrastructures have been continuously up-dated to fulfil the
objective, thus resulting in a magnificent edifice, KOVAI DIABETES SPECIALITY CENTRE
& HOSPITAL, with 50 beds & all amenities to treat multiple disciplines of diabetes, at Ram
Nagar, Coimbatore.
DIABETIC CANTEEN
Specially designed kitchen is functioning within the hospital premises. The Head Cook
and his assistants are provided necessary guidance by the Dietitians to prepare exclusive food
according to the individual requirements of the Diabetics. At most care is taken to ensure the
basic concept of Diabetic food i.e., HIGH FIBRE & LOW CALORIE.
7
ADDRESS
8
1.5 SYSTEM REQUIREMENTS
9
1.6 SOFTWARE FEATURES
LANGUAGE SPECIFICATION
• Embedded
• Home Edition (1 CPU) for private user (Oct. 2001)
• Professional Edition (2 CPU) for business user (Oct. 2001)
• Media Center (1 CPU) especially for multimedia devices (Nov. 2002)
• Tablet PC Edition especially for Tablet PCs (Nov. 2002)
• Server Edition (4 CPU)
• Advanced Server (8 CPU), also 64-bit Intel CPUs
As the most visual innovation the revised Windows interface with the new design is
well done, the design called Luna (as of beta 2428) can display window elements in high
colour. The return to the interface as of Windows 2000 is further possible. The
representation and organization of the central registry is quit the same as used in Windows
2000.
10
FEATURES
The graphic device interface (GDI) in the version GDI+ can take advance of gamma
correction and 3D interfaces in high color depth. Windows XP is more based on HTML than
previous versions. The system control was designed complete in HTML. With the new CD-
R/CD-RW software. It is it is possible to create easy and simple CDs. The Windows terminal
service makes the access to shared Windows XP desktop with an terminal client like the
VNC solution.
The Service Pack 2 (SP2) for Windows XP needs about 900 mbyte of free storage
space. Another system modification is the Security Center, which shows the status and
settings of the firewall, automatic updates and one additional anti virus program. The new
memory function "data execution prevention" protects software code in the memory in front
of manipulation like the insert of malicious program code to be executed, the protection
works only with 64-bit processors. The improved firewall now can detect waiting ports for
connections and the definition of exception rules for various network services.
The browser was extended by a pop-up blocker; the file execution protection with
information about the used download zone was revised generally. Downloaded programs
inherit the zone information of the browser and warn before the execution from Internet files
as well as with the NTFS file system also before executing on local partitions.
Versions are,
1. Service Pack1
2. Service Pack2
3. Service Pack3
11
FEATURES OF VISUAL STUDIO .NET
There are different types of application, such as Windows-based applications and Web-
based applications. To make communication on distributed environment to ensure that code
be accessed by the .NET Framework can integrate with any other code.
The common language runtime is the foundation of the .NET Framework. It manages
code at execution time, providing important services such as memory management, thread
management, and remoting and also ensures more security and robustness. The concept of
code management is a fundamental principle of the runtime. Code that target the runtime is
known as managed code, while code that does not target the runtime is known as unmanaged
code.
The .NET Framework can be hosted by unmanaged components that load the common
language runtime into their processes and initiate the execution of managed code, thereby
creating a software environment that can exploit both managed and unmanaged features.
12
The .NET Framework not only provides several runtime hosts, but also supports the
development of third-party runtime hosts.
The common language runtime manages memory; thread execution, code execution,
code safety verification, compilation, and other system services these are all run on CLR.
• Security
• Robustness
• Productivity
• Performance
SECURITY
The runtime enforces code access security. The security features of the runtime thus
enable legitimate Internet-deployed software to be exceptionally feature rich. With regards
to security, managed components are awarded varying degrees of trust, depending on a
number of factors that include their origin to perform file-access operations, registry-access
operations, or other sensitive functions.
ROBUSTNESS
The runtime also enforces code robustness by implementing a strict type- and code-
verification infrastructure called the common type system (CTS). The CTS ensures that all
managed code is self-describing. The managed environment of the runtime eliminates many
common software issues.
PRODUCTIVITY
The runtime also accelerates developer productivity. For example, programmers can
write applications in their development language of choice, yet take full advantage of the
runtime, the class library, and components written in other languages by other developers.
13
PERFORMANCE
ASP.NET
ASP.NET is the next version of Active Server Pages (ASP); it is a unified Web
development platform that provides the services necessary for developers to build
enterprise-class Web applications. While ASP.NET is largely syntax compatible, it also
provides a new programming model and infrastructure for more secure, scalable, and stable
applications.
ASP.NET has been designed to work seamlessly with WYSIWYG HTML editors and
other programming tools, including Microsoft Visual Studio .NET. Not only does this make
Web development easier, but it also provides all the benefits that these tools have to offer,
including a GUI that developers can use to drop server controls onto a Web page and fully
integrated debugging support.
Developers can choose from the following two features when creating an ASP.NET
application. Web Forms and Web services, or combine these in any way they see fit. Each
is supported by the same infrastructure that allows to use authentication schemes; cache
frequently used data, or customizes your application's configuration, to name only a few
possibilities.
14
Web Forms allows us to build powerful forms-based Web pages. When building these
pages that use ASP.NET server controls to create common UI elements, and program them
for common tasks. These controls allow to rapidly build a Web Form out of reusable built-
in or custom components, simplifying the code of a page. An XML Web service provides
the means to access server functionality remotely. Using Web services, businesses can
expose programmatic interfaces to their data or business logic, which in turn can be obtained
and manipulated by client and server applications. XML Web services enable the exchange
of data in client-server or server-server scenarios, using standards like HTTP and XML
messaging to move data across firewalls. XML Web services are not tied to a particular
component technology or object-calling convention. As a result, programs written in any
language, using any component model, and running on any operating system can access
XML Web services
ASP.NET provides a simple model that enables Web developers to write logic that
runs at the application level. Developers can write this code in the global.aspx text file or in
a compiled class deployed as an assembly. This logic can include application-level events,
but developers can easily extend this model to suit the needs of their Web application.
ASP.NET provides easy-to-use application and session-state facilities that are familiar
to ASP developers and are readily compatible with all other .NET Framework APIs.
ASP.NET offers the IHttpHandler and IHttpModule interfaces. Implementing the
IHttpHandler interface gives you a means of interacting with the low-level request and
response services of the IIS Web server and provides functionality much like ISAPI
extensions, but with a simpler programming model. Implementing the IHttpModule
interface allows you to include custom events that participate in every request made to your
application.
15
ASP.NET provides extensive caching services (both built-in services and caching
APIs). ASP.NET also ships with performance counters that developers and system
administrators can Visual Basic .NET, the latest version of visual basic, includes many new
features. The Visual Basic supports interfaces but not implementation inheritance. Visual
basic.net supports implementation inheritance, interfaces and overloading. In addition,
Visual Basic .NET supports multithreading concept. Monitor to test new applications and
gather metrics on existing applications.
16
VISUAL BASIC .NET
LANGUAGE
ABOUT C#.NET
17
C#.NET FEATURES
There are no global variables or functions. All methods and members must be declared
within classes. Static members of public classes can substitute for global variables and
functions.
Local variables cannot shadow variables of the enclosing block, unlike C and C++.
Variable shadowing is often considered confusing by C++ texts.
Managed memory cannot be explicitly freed; instead, it is automatically garbage
collected. Garbage collection addresses the problem of memory leaks by freeing the
programmer of responsibility for releasing memory which is no longer needed.
In addition to the try...catch construct to handle exceptions, C# has a try...finally
construct to guarantee execution of the code in the finally block.
Multiple inheritances are not supported, although a class can implement any number
of interfaces. This was a design decision by the language's lead architect to avoid
complication and simplify architectural requirements throughout CLI.
Enumeration members are placed in their own scope.
C# provides properties as syntactic sugar for a common pattern in which a pair of
methods, accessor (getter) and mutator (setter) encapsulate operations on a single
attribute of a class.
Full type reflection and discovery is available.
C# currently has 77 reserved words.
Checked exceptions are not present in C# (in contrast to Java). This has been a
conscious decision based on the issues of scalability and versionability.
18
FEATURES OF SQL SERVER
The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server
2008 Analysis Services. The term OLAP Services has been replaced with the term Analysis
Services. Analysis Services also includes a new data mining component. The Repository
component available in SQL Server version 7.0 is now called Microsoft SQL Server 2008 Meta
Data Services. References to the component now use the term Meta Data Services. The term
repository is used only in reference to the repository engine within Meta Data Services
They are,
1. TABLE
2. QUERY
3. FORM
4. REPORT
5. MACRO
19
TABLE
VIEWS OF TABLE
1. Design View
2. Datasheet View
DESIGN VIEW
To build or modify the structure of a table we work in the table design view. We can
specify what kind of data will be hold.
DATASHEET VIEW
To add, edit or analyses the data itself we work in tables datasheet view mode.
QUERY
A query is a question that has to be asked the data. Access gathers data that answers
the question from one or more table. The data that make up the answer is either dynaset (if
edit it) or a snap shot (it cannot be edited).Each time we run query, we get latest information
in the dynaset. Access either displays the dynaset or snapshot for us to view or perform an
action on it, such as deleting or updating.
FORMS
A form is used to view and edit information in the database record by record. A form
displays only the information we want to see in the way we want to see it. Forms use the
familiar controls such as textboxes and checkboxes. This makes viewing and entering data
easy.
20
VIEWS OF FORM
Work with forms in several primarily there are two views are,
1. Design View
2. Form View
DESIGN VIEW
To build or modify the structure of a form, we work in forms design view. We can add
control to the form that are bound to fields in a table or query, includes textboxes, option
buttons, graphs and pictures.
FORM VIEW
The form view which display the whole design of the form.
REPORT
A report is used to vies and print information from the database. The report can ground
records into many levels and compute totals and average by checking values from many
records at once. Also the report is attractive and distinctive because we have control over
the size and appearance of it.
MACRO
A macro is a set of actions. Each action in macros does something. Such as opening a
form or printing a report .We write macros to automate the common tasks the work easy and
save the time.
MODULE
Modules are units of code written in access basic language. We can write and use
module to automate and customize the database in very sophisticated ways.
21
2. SYSTEM ANALYSIS
It involves analysis a procedure or business in order to identify its goals and purposes
and create systems and procedures that will achieve them in an efficient way. Use cases are a
widely used systems analysis modeling tool for identifying and expressing the functional
requirements of a system.
The system is studied to the minutest detail and analyzed. The system analyst plays the
role of the interrogator and dwells deep into the working of the present system. The system is
viewed as a whole and the input to the system are identified. The outputs from the organizations
are traced to the various processes.
System analysis is concerned with becoming aware of the problem, identifying the
relevant and decisional variables, analyzing and synthesizing the various factors and
determining an optimal or at least a satisfactory solution or program of action.
22
2.1 EXISTING SYSTEM
In existing system sequence analysis for human disease targets is much time consuming
because of user want to know their disease based on DNA and RNA they have go directly
laboratory have to wait long time. Taking these important aspects into consideration. Hence
for that more human resource is needed in laboratory to predict disease based DNA and RNA
level so that time is needed for analysis. It will not help the management to solve the problem
in time and also very difficult to maintain all the record details and here there is no
computerized transaction.
Time consuming
Did not get the exact result
It is take long duration for analysis test result
23
2.2 PROPOSED SYSTEM
The proposed work brings a new web application with DNA and RNA based human
disease targets. The system helps to improve the service of medical field. The user/ patient can
find out the disease using their DNA and RNA. Initially the system ask the admin to patients
basic information’s such as name, gender, date of birth etc., then the admin should enter, after
successful registration admin should enter patients DNA and RNA Test samples report such as
hair, nails, blood so that system automatically process with medical data set and give diseases
DNAs and RNAs details report to patient .so that patient can check their disease based their
DNA efficient way using this application.
The proposed method for the analysis of DNA using only their nucleus information
Result based on DNA and RNA
We get the exact test result
No time consuming
24
2.3 BEHAVIORAL MODEL
FEASIBILITY STUDY
A system is a feasible system only if it is feasible within limited recourse and time. In
this system each and every process can be feasible for the user and also developer. It proved
user friendly input such as device independent inputs and getting proper solution for the
problem.
Technical Feasibility
Behavioral Feasibility
Economical Feasibility
Operational Feasibility
TECHNICAL FEASIBILITY
Technical Feasibility is the assessment of the technical view of the system. The system
is developed for Dot net environment; a platform independent tool is used to develop the
system.
The consideration those are normally associated with the technical feasibility include
the following Development risk, Resource availability, Technology
The development risk concerns the probability, the function of all elements and its
performance should be same in all platforms and in the system that is being developed. This
system is developed according to the standards and the development software tools are selected
in such a way to avoid the problems cited above.
The software used to develop this system is Windows XP, visual studio Dot net is done
efficiently, and the concept of SQL helps to create the application backend. These components
are also helpful in providing interactivity to Java applications.
25
BEHAVIORAL FEASIBILITY
ECONOMICAL FEASIBILITY
This is the most frequently used method for evaluating the effectiveness of a user
system. More commonly, known as cost analysis the procedure is to determine the benefits and
savings that are expected from a candidate system and compare them with costs.
This system getting hundreds present economical feasibility. It will be achieved goal
very efficiently. And evolution of development cost (hardware and software needed) is
weighted against the ultimate income or benefit derived from the system. Finally, it is assured
that this project is economically feasible.
OPERATIONAL FEASIBILITY
Operational Feasibility deals with the study of prospects of the system. This system
operationally eliminates all the tensions of the administrator and helps in effectively tracking
the project progress. This kind of automation will surely reduce the time and energy, which
previously consumed in manual work. Based on the study, the system proved to be
operationally feasible.
26
2.4 DATA FLOW DIAGRAM
DFD depict hoe data interact with the system. DFD are extremely useful in modeling
many aspects of a business function because they systematically subdivide a task into basic
parts, helping the analyst understand the system that they trying to model.
A data flow diagram models a system by using external entities from which data flow
to a process which transmission the data and creates output data which goes to other processes
on external entities of files. Data may also flow to process as inputs.
The symbols appearing in the DFD has been explained below:
- Represents a process
27
Level-0
FIG 2.4.1
28
Level-1
Retrieve user name, password
Sequence
Admin analysis
for Login table
Human
If login Success
Get Report
Report
FIG 2.4.2
29
Level-2
If login Success
FIG 2.4.3
30
SYSTEM FLOW DIAGRAM:
Pre-Processing
Disease Prediction
Report Generation
31
3. SYSTEM DESIGN
The system design includes business process design and database design. Business
process design implements the order of various functions and links between the various
functions. Database design mainly realizes data tables and the relationship between data tables.
In a database environment, common data are available which several authorized users
can use. The concept behind a database is an integrated collection of data and provides a
centralized access to the data from the program. It makes possible to treat data as a separate
resource.
While designing database, several objectives must be considered:
Controlled redundancy
Data Independence
More information at low cost
Accuracy and Integrity
Recovery from failure
Privacy and security
Performance
32
3.1TABLE DESIGN
A table is a data structure that organizes information into rows and columns. It can be
used to both store and display data in a structured format. For example, databases store data
in tables so that information can be quickly accessed from specific rows.
Table Design
33
Table Name: DNA and RNA Table
34
Table Name: Users table
35
3.2 INPUT DESIGN
36
Form Name: Login form
Form Description: This form is used to enter valid user name and password in login form
Form 3.2.1
37
Form Name: Data collections
Form 3.2.2
38
Form Name: Patient details
Form 3.2.3
39
Form Name: Medical data collection
Form Description: This form shows the medical details of the patient
Form 3.2.4
40
Form Name: DNA & RNA profile generation
Form Description: This form shows the DNA & RNA sequence of the patient
Form 3.2.5
41
Form Name: Disease target analysis
Form Description: This form shows the target analysis of the disease
Form 3.2.6
42
Form Name: Disease analysis
Form Description: This form shows the disease to predict disease targets
Form 3.2.7
43
3.3 FORM DESIGN:
44
3.4 OUTPUT DESIGN
Outputs are the most important and direct source of information to the customer and
management. Intelligent output design will improve the system's relationship with the user and
help in decision making. Outputs are used to make permanent hard copy of the results for later
consultation. The output generated by the system is often regarded as the criteria for evaluating
the performance of the system. The output design was based on the following factors.
Usefulness determining the various outputs to be printed to the system user
Differentiating between the outputs to be displayed and those to be printed
The format for the presentation of the output
For the proposed system, it is necessary that the output should be compatible with the
existing manual reports. The outputs have been formatted with this consideration in mind. The
outputs are obtained after all the phase, from the system can be displayed or can be produced
in the hard copy. The hard copy is highly preferred since it can be used by the controller section
for future reference and it can be used for maintaining the record.
45
Form Name: Patient details
Form 3.4.1
46
Form Name: Medical data collections
Form Description: This shows the medical data collections are uploaded successfully
Form 3.4.2
47
Form Name: DNA &RNA profile generation
Form Description: This shows the DNA & RNA profile generation is loaded successfully
Form 3.4.3
48
Form Name : DNA & RNA profile generation
Form 3.4.4
49
Form Name: Disease target analysis
Form 3.4.5
50
Form Name: Detected disease
Form Description: This form shows the detected disease using DNA & RNA sequence
Form 3.4.6
51
Form Name: Dataset summary
Form 3.4.6
52
Form Name: Dataset Summary
Form 3.4.7
53
Form Name: Dataset summary
Form 3.4.8
54
4. SYSTEM TESTING AND IMPLEMENTATION
Software testing is a critical element of software quality assurance that represents the
ultimate review of specifications, design and coding. The user tests the developed system and
changes are made according to their needs. The testing phase involves the testing of developed
system using various kinds of data. It involves user training, system testing and successful
running of the developed system.
The changes are made according to their needs. The testing phase involves the testing
of the developed system using various kinds of data. While testing, errors are noted and
corrections are made system testing is the stage of implementation, which is aimed at ensuring
that the system works accurately and efficiently before live operation commences. The
candidate system is subject to a variety of test: stress recovery, and security and usability tests.
TEST PLAN
Testing is the process of executing a program with the intent of finding any errors. A
good test of course has the high probability of finding a yet undiscovered error. A successful
testing is the one that uncovers a yet undiscovered error.
A test is vital to the success of the system; system test makes a logical assumption that
if all parts of the system are correct, then goal will be successfully achieved. The candidate
system is subjected to a verity of tests online like responsiveness, its value, stress and security.
A series of tests are performed before the system is ready for user acceptance testing.
55
TESTING METHODS
Unit Testing
Integration Testing
Validation Testing
Output Testing
User Acceptance Testing
Unit Testing
Unit testing focuses verification efforts on the smallest unit of software design, the
module. This is also known as “Module Testing” The modules are tested separately this testing
is carried out during programming stage itself. In this step each module is found to be working
satisfaction as regard to the expected output from the module.
Integration Testing
Integration testing focuses on the design and construction of the software architecture.
Data can be lost across an interface, one module can have adverse effect on another sub
functions and show on. Thus integration testing is a systematic technique for constructing test
to uncover errors associated with in the interface. In this project, all the modules are companied
and then the entire program is tested as a whole.
Validation Testing
Thus the proposed system under consideration has been tested by using validation
testing and found to be working satisfactory.
56
Output Testing
After performing the validation testing, the next step is the output testing of the
proposed system, since no system could be useful if it does not produce required output in the
specific format. Tested asking the users about the format required by them, the output is
considered into two ways: one is on the screen and the other is printed format.
The output format on the screen is found to be correct as the format designed according
to the user needs, for the hard copy also, the output comes as specified by the user. Hence
output testing does not result in correction in the system.
White box Testing is done with the project which drive test cases that do the following
Guarantee that all the independent paths with in modules have been exercise at
least once
Exercise all logical decision on the true and false side
Execute all loops at the boundaries and within their operation bounds
Exercise internal data structures to ensure the validity
It is aimed at ensuring that the system works accurately and efficiently before live operation
command.
Black box System methods focus on the functional requirement of the software. Using
the black box testing method the following errors are identified and rectified in the package.
User acceptance testing of a system is the key factor for the success of any system. The
system under consideration is tested for user acceptance by constantly keep in touch with the
prospective system user at time of developing and making changes wherever required.
57
4.2 SYSTEM IMPLEMENTATION
In this project, propose virtualizing Harvard architecture on top of the existing memory
architecture of modern computers, including those without non-executable memory page
support, so as to prevent the injection of malicious code entirely. Harvard architecture is simply
one wherein code and data are stored separately. Data cannot be loaded as code and vice-versa.
In essence, we create an environment where in any code injected by an attacker into a process’
address space cannot even be addressed by the processor for execution.
In this way, we are attacking the code injection problem at its root by regarding the
injected malicious code as data and making it un addressable to the processor during an
instruction fetch. Split memory architecture produces an address space where data cannot be
fetched by the processor for execution. For an attacker attempting a code injection, this will
prevent him from fetching and executing any injected code.
The maintenance plan specifies the scheduled servicing tasks and intervals (preventive
maintenance) and the unscheduled servicing tasks (adaptive or corrective maintenance). Tasks
in the maintenance plan are allocated to the various maintenance agencies. A maintenance
allocation chart is developed to tag the maintenance tasks to the appropriate maintenance
agencies. These include: in-service or in-house work centers, approved contractors, affiliated
maintenance or repair facilities, original equipment manufacturer, etc. The maintenance plan
also establishes the requirements for the support resources.
58
5. CONCLUSION
Remarkable technological innovations have emerged in recent years allowing for rapid
and cost-effective whole genome direct sequencing. This generation of massive amounts of
genomic data was made with the assumption that the better understanding of the Genomics
DNA,RNA would aid in the identification of new causes for genetic disorders, as well as
discovering new therapeutic targets. Due to this assumption, many genomes from different
organisms, including humans, have been sequenced, resulting in an immense amount of genetic
data. However, in order to best use this data, a similar expansion in our ability to process and
analyze the data on a large scale will be necessary. The present review focuses on the impact
of genome sequencing projects on the identification of novel genes and proteins, with a special
focus on the role of sequencing pathogenic genomes in potential human disease targets.
59
BIBLIOGRAPHY
BOOK REFERENCES
1. Alex Homer , ‘Professional VB.NET 1.1’, 2004 Edition, Wrox Publications
2. Clayton crooks II ‘Learning Visual Basic .Net Through Applications’
3. Roger S Pressman, ‘Software Engineering’, 2000 Edition, Dreamtech Publications
4. Steven Holzner, ‘Visual Basic.NET Black Book’, 2003 Edition, Dreamtech
Publications
5. A.Keyton Weissinger ,“ASP IN A NUTSHELL”,Shroff Publishers and distributors
Pvt.Ltd, February 1999
6. A.Russel Jones, ”ASP.NET Complete Reference”, Sybex Publications, February
18,2002
7. DATABASE SYSTEM CONCEPTS, Henry F.Korth, Megraw-Hill, Third Edition, 1997
8. Steven Holzner, ‘C#.NET Black Book’, 2003 Edition, Dreamtech Publications
9. SQL SERVER HIGH AVAILABILITY, Paul Bertucci, Sams publishing, First Edition, 2004. [5]
SOFTWARE ENGINEERING ONCEPT,Richared E.Fairly Tata Megraw-Hill Publications,
Third Edition, 1997
WEBSITES REFERENCE
1. http://www.C#corner.net
2. http://www.w3schools.com/asp.net
3. http://asp.net-tutorial.com
4. http://en.wikipedia.org/wiki/asp.net
5. www.msdn.microsoft.com
6. www.vbcity.com
7. www.vbdotnetheaven.com
8. www.codeproject.com
9. www.dotnetjohn.com
60
WEBSITES REFERENCE
10. http://www.C#corner.net
11. http://www.w3schools.com/asp.net
12. http://asp.net-tutorial.com
13. http://en.wikipedia.org/wiki/asp.net
14. www.msdn.microsoft.com
15. www.vbcity.com
16. www.vbdotnetheaven.com
17. www.codeproject.com
18. www.dotnetjohn.com
61
62