Sie sind auf Seite 1von 49

A Project Report (Project Group 2) on

A LEARNING ENVIRONMENT FOR MOBILE
  COMPUTING INTEGRATING J2ME AND                  
 SOFTWARE COMPONENTS                                      
Submitted for Partial Fulfillment of Award of degree in

BACHELOR OF TECHNOLOGY

IN

                   INFORMATION TECHNOLOGY                                  
By

Ashish kr. Singh(0729013013)

Jainendra Nagar(0729013019)

Mohammed Sajid(0729013024)

Under the guidance of

 Mr. Rajdev Tiwari 
(Lecturer in C.S.E. & I.T. Department)

Department of Information Technology

ABES Institute of Technology

ABES INSTITUTE OF TECHNOLOGY GHAZIABAD, U.P., INDIA
DECLARATION

We hereby declare that this submission is our own work and that, to the best of our knowledge
and belief, it contains no material previously published or written by another person nor material
which to a substantial extent has been accepted for the award of any other degree or diploma of
the university or other institute of higher learning, except where due acknowledgment has been
made in the text.

Name: Roll No. Signature

1. Ashish Kumar Singh 0729013013

2. Jainendra Nagar 0729013019

3. Mohd. Sajid 0729013024

Date:
CERTIFICATE

This is to certify that Project Report entitled as “A LEARNING ENVIRONMENT FOR


MOBILE COMPUTING INTEGRATING J2ME AND SOFTWARE COMPONENTS”, is
submitted in partial fulfillment of requirement for the award of degree Bachelor of Technology in
Information Technology from U. P. Technical University, Lucknow, is a bonafied work carried
out by:
Ashish Kumar Singh, Jainendra Nagar, Mohd. Sajid

Under our guidance and supervision in the department during the academic session 2010-
2011and has not been submitted for the award of any other degree or diploma according the best
of our knowledge.

GUIDE:

Mr. Rajdev Tiwari

Lecturer

Date: Deptt. Of Computer Sc. & Engg.


ACKNOWLEDGEMENT

It gives us a great sense of pleasure to present the report of the B. Tech Project undertaken during
B. Tech. Final Year. We owe special debt of gratitude to lecturer Mr. Rajdev Tiwari,
Department of Computer Science & Engineering, for his constant support and guidance
throughout the course of our work. His sincerity, thoroughness and perseverance have been a
constant source of inspiration for us. It is only his cognizant efforts that our endeavors have seen
light of the day.

We also do not like to miss the opportunity to acknowledge the contribution of all faculty
members of the department for their kind assistance and cooperation during the development of
our project. Last but not the least, we acknowledge our friends for their contribution in the
completion of the project.

Name: Roll No.

1. Ashish Kumar Singh 0729013013

2. Jainendra Nagar 0729013019

3. Mohd. Sajid 0729013024

Date:
ABSTRACT

This paper describes a dual-module application that allows educational content to


be created for Mobile Computing environments, offering the student mobility in
the educational process. One of the modules of this application,developed for use
with conventional desktops, allows for the Creation of Exercise Lists with Multiple
Choice and True or False questions. The other module allows Exercise Lists
generated by the application to be viewed and the exercises solved through devices
that use Wireless Communication to access the World Wide Web, namely
Palmtops. The application enables Palmtop users to access educational content
regardless of their physical location, using the advantages inherent to Wireless
Networks, such as independence from conventional cabled connections and
mobility. The second module communicates over the air with a Web Server and
with Java Servlets, which are able to correct the student’s answers and send
him/her a performance report indicating the correct and incorrect answers given.
The module developed for desktops also generates statistical reports about the
student’s performance in solving the exercises of the Exercise Lists, enabling
teachers to evaluate students and improve the educational process. The application
described in this paper was implemented using the Software Component-Based
technique, exploiting this development technique together with the Java 2 Micro
Edition, a version of the Java technology developed specifically for the creation of
mobile device applications.
CONTENTS

Page

DECLARATION I

CERTIFICATE II

ACKNOWLEDGEMENT III

ABSTRACT IV

LIST OF TABLES V

LIST OF FIGURES VI

CHAPTER 1 (INTRODUCTION)
1.1. OBJECTIVE 1
1.2. THEORITICAL BACKGROUND 2

1.3 USERS OF SOFTWARE 3


1.4 SYSTEM ARCHITECTURE 3
1.5 THE LEARNING ENVIRONMENT INTERFACE 6

CHAPTER 2 (SYSTEM ANALYSIS)

2.1 IDENTIFICATION OF NEED 7


2.2 EXCEPTED REQUIREMENTS 7
2.3 SECURITY REQUIREMENTS 8
2.4 FEASIBILITY STUDY 8
2.5 SOFTWARE ENGINEERING PARADIGM 9
2.6 PROJECT PLAN 11

CHAPTER 3 (REQUIREMENT SPECIFICATION)


3.1 HARDWARE & SOFTWARE SPECIFICATION 13
3.1.1 HARDWARE PLATFORM 13
3.1.2 SOFTAWRE PLATFORM 13

CHAPTER 4 (SYSTEM DESIGN)


4.1 DATA FLOW DIAGRAM 14
4.1.1 CONTEXT LEVEL DFD 14

4.1.2 1ST LEVEL DFD 15


4.1.3 E-R DIAGRAM 16
4.2 DATABASE ARCHITECTURE 17
4.3 PROCESS LOGIC & MODULE 22

CHAPTER 5(FORM LAYOUT) 25

CHAPTER 6 (TESTING) 41

CHAPTER 7 (MAINTENANCE) 42

CHAPTER 8 (CONCLUSION) 43

CHAPTER 9 (FUTURE ENHANCEMENT) 44

CHAPTER 10 (BIBLOGRAPHY) 45
INTRODUCTION
CHAPTER-1
INTRODUCTION

OBJECTIVE OF PROGRAM

Distance Education is a teaching method consecrated and consolidated all around


the world [1]. Several years ago, teachers and other professionals discovered the
advantages of Distance Education and decided that new technologies should be
applied in the educational process. One of the advantages of Distance Education is
the economic aspect, which frees students from travel and accommodation-related
expenses. Another advantage is that students can study during their free time,
according to their own learning pace new technologies, particularly computers and
computer networks, have extended the possibilities and advantages of Distance
Education. Computer networks, particularly the World Wide Web, enable anyone
in any part of the world where the Web can be accessed to find a large amount of
educational content. Wireless communication and mobile computing further
expand the possibilities of Distance Learning applications because, with the use of
these technologies, the only limit for the distribution of educational content is the
area covered by a Wireless Network, and not the existence of a conventional
connection to a computer network. The main objective of this paper is to present a
software component-based environment that allows for the easy, efficient and
intuitive creation of educational content. This content, however, is not destined for
use on conventional desktops or other similar devices, but for access by and use on
small-dedicated devices, namely Palmtops. Palmtops today can receive data from
the World Wide Web through wireless networks, enabling users to access the
educational content generated wherever they are, without the need for a
conventional computer network. The environment described herein consists of two
modules: the Teacher’s Module and the Student’s Module. The Teacher’s Module,
which was developed for use on desktops, allows lists of exercises to be created
with multiple choice and true or false questions for posting on Web Servers.
Theoretical Background
• Standardizing data, resulting in fewer corrections and significantly lowering
the incidence of missing or incorrect data

• Consolidating data stores into one location ensuring data integrity and
providing a database for future statistical and management reporting, i.e. a
single database will be used
• Reducing the time spent by member filling out forms, freeing resources for
more critical tasks;
• Reducing the amount of time spent by administration creating and
publishing schedules.

Users of the software:

The proposed application can be used by registered students . Interested students


can visit the site to gain the knowledge of facility provided by the site, registered
members can use the application to current updates and teachers and staff member
will use the software to manage the whole thing. Any authorized members can
update, add and delete the data from anywhere or at any place from the network.

SYSTEM ARCHITECTURE
Large system are decomposed into subsystem that provide a related set of services,
this resort management system is divided into following sub system so that we can
easily maintain the system

THE LEARNING ENVIRONMENT INTERFACE

This section presents the interface of the learning environment described here,
giving an example of the creation of an exercise list in the Teacher’s Module and
its solution through the Student’s Module. In this example, an exercise list
containing two questions is created. One of the questions is a true or false question
and the other is a multiple choice question. The example also shows, after the

student’s solution of thequestions, the interfaces involved in the performance


reports generated by the learning environment. An illustration is given of the
interface that enables individual and collective performance to be evaluated by
teachers, as well as the Student’s Module interface that allows the student to
evaluate his/her individual performance.
The main interface of the environment is showed in

As seen in Figure 2, several options are available to the teacher, who may, for
instance, create a new list (option “New List” in the “File” Menu of Figure 2). The
teacher’s choice of the option New List leads him to the interface shown in Figure
3. In this interface, the teacher fills in the fields with the data required to create a
new list of exercises.These data are the names of the teacher and subject, the
subject code,division, title of the list, date of creation and deadline. Asingle click
on the “Create List” button creates a new list of exercises, in which the teacher can
create the questions making up the new list. If the teacher chooses to include a true
or false question in the list, the interface of Figure 4 is
Shown
The teacher must write the question text and an explanation of the reason why the
question text is true or false. This explanation is presented to the student when a
question is incorrectly answered. The teacher is also required to indicate the correct
answer (true or false). One click on the “Include Question” button includes this
question in the exercise list. If the teacher decides to include a multiple choice
question, the interface of Figure 5 is shown. Similarly, the teacher must write the
question text and an explanation of the correct answer, which is presented to the
student when a question is incorrectly answered. The
teacher is also required to write the five option texts and indicate the correct
answers. One click on the “Include Question” button includes this question in the
Exercise List.
SYSTEM
ANALYSIS
CHAPTER-2
SYSTEM ANALYSIS

2.1 IDENTIFICATION OF THE NEED

In the field of education the method of Distance education plays a very important
role for the purpose of providing education through distance and for this we don’t
have any existing system which will help students to get education in there own
places they need to travel to the respected university to take monthly test or they
have to take the help of conventional post system which have some disadvantages
and in this system there is interaction between student and teacher directly.
For the above problem we are trying to solve by using computer
technology by constructing a system which provide a greater help
for the distance education in this system. We have two modules which
are Student module and teacher module these modules will support for the
communication between teacher and student through world wide web or wireless
communication media e.g. Bluetooth and also we try to provide the evaluation
system where student can get there results soon after sending his answer paper to
the teacher and also student can get the reason for why there answers were consider
wrong. The use of the J2ME technology renders the Student’s Module attractive to
users, since the applications developed

With this technology include a good graphic user interface, connection to remote
Internet Web Servers, communication with servlets and manipulation of remote
databases. All these features are present in the Student’s Module, The learning
environment was developed using the Software Component-Based technique in the
two modules. Details of this technique are also described in this paper. All the
software components developed are easily extendable.

2.2 Expected Requirements:-

These requirements are implicit to the product or system and may be so functional
that the customer does not state them.
The following are listed:

1. Indexing
2. Ease of human/machine interaction
3. Reliability and operational correctness
4. Ease of software installation
5. Single point data storage for each data element
6. Maintenance of integrity and inter-linkages of data
7. Extensive query facility to provide immediate answers for management
8. Matching of physical and logical movement of file
9. Should be upgradeable t incorporate new features.
10. Should be expandable
11. Should have fastest possible response while processing queries and
reports.

2.3 Security Requirements:-

The following security requirements are considered in this project.

1. User level authentication


2. Data should be prevented to any unwanted access. Since data is has to be
accessed on the intranet, we have to take extra care of the security of the
data.
3. Accessibility of the data should be divided as per the system requirements, it
means those data which need extra care should be available to only
managerial category employee.
2.4 FEASIBILITY STUDY:-

Once scope has been identified it is reasonable to ask, “Can we build software to
meet this scope? Is the project feasible? Feasibility analysis is a cross life cycle
activity, which has to be continuously performed throughout the system
development. By using the creeping commitment approach, feasibility is measured
at different times in the system development. Feasibility of a project can be
changed during the system development. For reevaluate feasibility, there are
different checkpoints in the development. A project may be canceled or revised at
any checkpoint, despite whatever resources have been spent. That doesn’t mean the
costs already spent are not important. Costs must eventually be recovered if the
investment is ever to be considered a success.

There are different types of Feasibility:

1) Technical Feasibility
2) Economical Feasibility
3) Operational Feasibility

2.4.1 Technical Feasibility: -

In order to study technical feasibility the following factors are considered:

a) Does Organization process the technologies which is


Used in this project?

The technologies, which are used in this application widely, used products in
software industry. Obtaining these technologies won’t be difficult. Any
organization that wishes to use these products can purchase them easily.
b) Does necessary expertise available?

Since this application will be developed in asp.net with c#, basic knowledge of .Net
framework will be required so the development team should have a sound
knowledge of these technologies and they should have a idea about the web
applications.

2.4.2 Economic feasibility: -

The economic feasibility study (EFS) should demonstrate the net benefit of the
proposed application in light of the benefits and costs to the agency, other state
agencies and the general public as a whole. The agency must submit its EFS and
request for approval to the Office of Financial Management (OFM) prior to
accepting or disbursing electronic funds/benefits. Approval from OFM is required
for pilot and permanent applications, and both Internet and retail applications.
When completing the EFS, the agency should consider only those portions of the
proposed application that are related to electronic payment processing.

Elements can be expressed quantitatively in the analytical worksheets and


summarized in the business case, if possible, or they can be expressed qualitatively
in the business case.

The elements include, but are not limited to:

a. Increased revenue;
b. Increased revenue to other system and/or the general public;

2.4.3Operational Feasibility: -

How well the solution will work in the organization and how the end-users
and managers feel about the system. This people oriented test measures the
urgency of problem or the acceptability of a solution. Is the problem worth
solving? How end-users and management feel about the problem?

This is important because a workable solution can be thrown away because


of end-user or management doesn’t want the system. Therefore usability is
another important factor.

2.5 SOFTWARE ENGINEERING PARADIGM

I have chosen the waterfall model or the linear sequential model for developing this
software. The classical waterfall model divides the life cycle of a software
development process into the phases shown in the following figure:
Reasons for selecting this model: The requirements of the system are well
understood. The system is already functioning on papers, only automation is
needed.

Feasibility Study: The main aim of feasibility study is to determine whether


developing the product is financially and technically feasible. The collected data
are analyzed to arrive at the following:

o An abstract definition of the system.


o Formulation of the different solution strategies.
o Examination of alternative solution strategies and their benefits, indicating
resources required.
o A cost/benefits analysis is performed to determine which solution is the best.
Require Analysis and specification: The requirements gathering process is
intensified and focused specifically on software. To understand the nature of the
program to be built, the software engineer must understand the information domain
for the software, as well as required function, behavior, performance, and interface.
Requirements for both the system and the software are documented and reviewed
with the customer.

Design: Software design is actually a multi step process that focuses on four
distinct attributes of a program: data structure, software architecture, interface
representations, and procedural detail. The design process translates requirements
into a representation of the software that can be assessed for quality before coding
begins. Like requirements, the design is documented and becomes part of the
software configuration.

Coding: The design must be translated into a machine-readable form. The code
generation step performs this task. If design is performed in a detailed manner,
code generation can be accomplished mechanistically.

Testing: Once code has been generated program testing begins. The testing
process focuses on the logical internals of the software, ensuring that all statements
have been tested, and on the functional externals; that is conducting tests to
uncover errors and ensure that defined input will produce actual results that agree
with required results.

Maintenance: Software will undoubtedly undergo change after it is delivered to


the customer. Change will occur because errors have been encountered, because
the software must be adapted to accommodate changes in its external environment
(e.g. change required because of a new operating system or peripheral device), or
because the customer requires functional or performance enhancements. Software
support/maintenance reapplies each of the preceding phases to an existing program
rather than a new one.
2.6 PROJECT PLAN
REQUIREMENT
SPECIFICATION
CHAPTER 3

REQUIREMENT SPECIFICATION

3.1 HARDWARE AND SOFTWARE REQUIREMENT SPECIFICATION:-

3.1.1Hardware platform:

 PC with Pentium IV processor


 256 MB RAM
 minimum1GB hard disk space
 GPRS/Bluetooth enabled Mobile phone.

3.1.2Software platform:
 Windows XP

 JAVA

 SQL Yog 5.02

 My SQL 5.0

 Jakarta-Tomcat 5.0.16

 J2ME wireless Toolkit


CHAPTER 4
SYSTEM DESIGN

4.1 DATA FLOW DIAGRAM

Data-flow diagram (DFD) is a graphical representation of the "flow" of data


through an information system. DFDs can also be used for
the visualization of data processing (structured design).

Data Flow Example

Data Flow Symbols

The Process symbol represents an activity that transforms or manipulates


the data (A process transforms incoming data flow into outgoing data flow).
The Data Store symbol represents data that is saved on some file or in a
table.

The External Entitysymbol represents sources of data to the system, or


destinations of data from the system.

The Data Flow symbol represents movement of data.


4.1.1 Context Level DFD

L o g in
R e s u lt
Q u e s tio n
Teacher A n s w e Tr e s t S tu d e n t
R e s u lt A nsw er
TEACHER`S MODULE

USER_TABLE
Multiple
choice True/
False

Teacher LOGIN Test

Test List
STUDENT`S MODULE

Student ID Student Name

STUDENT Submit LOGIN TEST


Su
b
mi
tR
es
ul t

RESULT
IMPLEMENTATION
CHAPTER5

FORM LAYOUT

HOME PAGE
LOGIN PAGE
MULTIPLE CHOICES
PAGE
STUDENT REGISTRATION
PAGE
TEST ATTENDENCE LIST
PAGE
CREATING TEST
PAGE
TRUE OR FALSE MASTER ENTRY
PAGE

DEFAULT COLOR PHONE


STUDENT ACCESS MULTIPLE CHOICE
QUESTION

STUDENT ACCESS TRUE/FALSE


QUESTION
TESTING

CHAPTER 6
TESTING

6.1 SYSTEM TESTING:

System testing is used to test the whole system. According to our


need , we can test the whole system or test our software module wise.according to
this testing we test our whole software and our project is completely done that
means it is completely error free.

6.1.1 Alpha testing:

Alpha testing refers to the system testing carried out by the test
team with in the developing organization.

6.1.2 Beta testing :

Beta testing is the system testing performed by a select group of


friendly customers.

6.1.3 Acceptance testing:

If an user want an easier working for our software and fast


processing with desired environment internally and externally very fast and fully
,then if the software system is keeping all the giving requirements and fulfilling the
need of desires of next users or clients, then it can be said that the project has
fulfilling the acceptance testing. Here we test our software according to acceptance
testing and find that it will fulfill all the requirements of the necessary conditions.

According to client requirements this software is fully accepted and completely


error free.

CHAPTER 7
MAINTENANCE

7.1 OVERVIEW OF MAINTAINENCE:-

After a system has been executed and produced satisfactory results, it’s stored as a
software package or in system library. The needs of an organization may change
with time and a lot more may be expected from the system and this needs either
development of a new system or modifications in the existing program.
Modifications in the system may also be required if it fails to working changed
environments, which may be caused by the use of better machines.

The system maintenance means continuous modifications and updating of the


system to meet the requirements of the users. It’s certainly cheaper than developing
a new system. Technical documentation plays an important roli in the system
maintenance.

Maintenance:-

Software system maintenance covers a wide range of activities, including


correcting, coding and design errors, updating documentation and test data and
upgrading user support. It is the process of changing the system to maintain its
ability to survive. The system design can adopt any of the under given system
maintenance strategies.

7.1.1. Corrective Maintenance:-


The design software can be maintained by corrective maintenance that is concerned
with fixing reported errors in the software. Coding errors are relatively

cheap to fix as compared to design errors and requirement errors. The requirement
errors are more expensive, as redesigning of the entire system is to fix them.

7.1.2. Adaptive Maintenance:-

The design software can be maintained by adaptive maintenance in case there is a


need to change the system environment such as a different hardware platform or
for using it with different system.

7.1.3. Predictive maintenance:-

The design system can be maintained by predictive maintenance if there is need to


implement new functional requirements. They are generated due to changing
requirement of the software customers as their organization or business changes.
CONCLUSION

CHAPTER-8

CONCLUSION
The main objective is to allow for the creation of simple and intuitive lists of
exercises. The focus of this environment is the creation of a specific architecture
and an interface. To enable students using mobile devices to access learning
content through a wireless connection. The use of the J2ME technology renders the
Student’s Module attractive to users.
The J2ME technology includes a good graphic user interface
Connection to remote Internet Web Servers, communication with Servlets and
manipulation of remote databases
FUTURE
ENHANCEMENT

CHAPTER-9
FUTURE ENHANCEMENT
Few requirements which are considered as the enhancement plans are listing
below:

1. The database can be modified for quicker access.

2. Administrator can add department, designation of resorts.

3. Administrator can calculate total profit and lost.

4. Member can change vacation plan.

5. Administrator can provide vacation packages to registered

6. Member can find out resort name by searching method.

CHAPTER 10
BIBLOGRAPHY

We have consulted the following books for the project development and
implementation.

[1] KEEGAN, D, “Foundations of Distance Education”, Routledge, 3rd.


edition, 1996.

[2] DAY, B, “Developing Wireless Applications With J2ME


Technology”,

[3] MUCHOW, J, “Core J2ME Technology and MIDP ”, Prentice-Hall,


2001.

[4] GUIGERE, E, “J2ME Tech Tips – Client-Server Communication


Over HTTP Using MIDP and Servlets”,

The following Links are also searched and exploited extensively for the project
development and implementation.
• http://www.m-learning.org/

• http://ref-notes.blogspot.com/2009/04/mobile-learning-transforming-
delivery.html