Sie sind auf Seite 1von 50

CHAPTER 1

INTRODUCTION

The use of Information Technology for Government services facilitates an efficient, speedy and transparent process for disseminating Information to the public and other agencies and performing government administrations activities. The emphasis has been an providing better services to citizen and in improving internal productivity.

This has redefined the fundamentals and has the potential to change the institutions as well as the mechanisms of delivery of services forever. It is in this context that the issues of Smart Governance Electronic Governance needs to be analyzed. Quite obviously, therefore, the objective of achieving Electronic Governance (EG) goes far beyond mere computerization of standalone back office operations. It means to fundamentally change as to how the Government operates and this implies a new set of responsibilities for the executive, legislature and the citizenry. The effort should aim to bring about a social catharsis, which needs to be orchestrated in a comprehensive, concerted and planned fashion. Electronic Governance is the application of Information Technology to the processes of Government functioning to bring about

Simple Moral Accountable Responsive and Transparent Governance.

E-Governance demands standards in all areas. Some of the key areas are:
Identification of Govt. Departments with maximum citizen interface Government departments which have maximum interaction with the public must be identified for the use of IT. Listed below are a few such departments that can be considered:

Public Grievances: Electricity, Water, Telephone, Ration Card, Sanitation, Public Rural Services: Land Records, Below Poverty Line (BPL) /EWS Families

Social Services: Registration of Licenses and Certificates Ration Cards, Birth Certificates, Income Certificate.

E-Governance: I use the phrase "Representative E-Government" to describe the e-democracy activities of government institutions. Others call this "e-governance ". In our project we choose some of the public sectors where there is more need of the Govt. activities such as electricity bill payments, issue of cast & birth certificates, telephone bill payments and we are also doing online chatting so the user can interact directly to the Govt. and can provide his /her suggestions for better governance. By using our project a person can pay his/her utility bills very easily, without the need of going to the particular offices and waiting for a long time.

CHAPTER 2

SYSTEM ANALYSIS

System analysis is a logical process. The objective of the analysis phase is not actually solving a problem, but to determine exactly what must be done to solve the problem. During the analysis the system analyst works with the user to develop a model of the system using such tools as use case diagrams and analog either sequence diagrams. The first step in developing anything is to state the requirements. This applies just as much to leading edge research as to simple programs and to personal programs, as well as to large team efforts. Being vague about your objective only postpones decisions to a later stage where changes are much more costly. The problem statement should state what is to be done and not how it is to be done. The requestor should avoid describing system internals, as this restricts implementation flexibility.

2.1. Existing system:


The present system of doing work in government agencies which are the are used largely have either manual way of working or computerized to local networks. This method of working introduces great delays into the system as processes of notifications and billing take large amount of valuable time for both users and work force. The complexity of doing these manually is too large and inefficient; also people have to be locally available for doing their work. Also with the increasing population the users are too many to maintain the system in a efficient and effective manner. Some of the government departments are telecom, electricity, bookings and various others have a tiring manual procedures and large work force needed for doing all these. Disadvantages: The work is done manually so that it takes much time for transaction. We cant assess the calculations accurately. Amount of time is more needed when the more customers come to counter. It counts time factor. As there are thousands of customer records; Searching process is a difficult task

2.2. PROPOSED SYSTEM


The use of Information Technology for Government services facilitates an efficient, speedy and transparent process for disseminating Information to the public and other agencies and performing government administrations activities. The emphasis has been providing a better service to citizens and in improving internal productivity. This has redefined the fundamentals and has the potential to change the institutions as well as the mechanisms of delivery of services forever. It is in context that the issues of Smart Governance - Electronic Governance needs to be analyzed. Advantages: A fast and more efficient service to all customers. As there are Searching process is an easy task. Saving in staff time in entering and manipulating data. Easy input, deletion and manipulation of lot of customer details. Capable of printing both full and selected information. Simple correction of input errors and we can assess the calculation accurately thousands of customer records;

2.3. FEASIBILITY STUDY


All projects are feasible given unlimited resources and infinite time! Unfortunately, the development of computer-based system or product is more Likely plagued by a scarcity of resources and difficult delivery dates, it is both Necessary and prudent to evaluate the feasibility of a project at the earliest Possible time. Months or years of effort, thousands or millions of dollars, and Untold professional embarrassment can be averted if an ill-conceived system Is recognized early in the definition phase. The feasibility of proposed Online Leave Management System of RSR Engineering college of computer sciences could be evaluated as follows. There are three types of feasibility which are equally important. They are

o Economical feasibility o Technical feasibility o Operational feasibility

2.3.1. Economic Feasibility


Economic analysis is the most frequently used method for equating the effectiveness of a candidate system. More commonly known as cost / benefit analysis. The procedure is to determine the benefits and savings that are accepted from a candidate system and compare them with cost . The bottom line set up cost elements for introducing intranet services newly into an organization include Cost of set up, including hardware and software Cost of inventing information for use on your intranet Cost of creating new information Cost of designing and programming for intranet applications Cost of training

2.3.2. Technical feasibility


Technical feasibility centers on the existing system (hardware, s/w etc) and to what extent it can support the proposed addition. If the current computer is operating at 80% of capacity, then running another application could overload the system or require additional h\w. This involves financial considerations to accommodate technical enhancements. If the budget is a serious constraint, then the project is judged not feasible.The proposed system is planned to run on windows platform starting from 98-second version with Internet feasibility.

2.3.3Operational Feasibility
It refers to the feasibility of the product to be operational. Some products may work very well at design and implementation but may fail in the real time environment. It includes the study of additional human resource required and their technical expertise.

CHAPTER 3

MODULE DESCRIPTION

The Electronic Governance Services project has been divided into two modules. They are:

USER ADMINISTRATOR

Module-One: User
User sends a request to agent then the agent will send response to user. This module deals with the management of the user information such as the personal details, applications, birth certificates, income certificates, telephone bills, electricity bill, login id, password, etc., He fill his details if they are correct then the user gets registered and he can buy the products there. If the information he gave is not correct then he will be not registered. In the login authentication form name, address, contact number, email id all other things have to be entered. After filling these details the user entered into online by getting registered

Module-Two: Administrator
This module deals with the management of the user information such as the payment criteria etc. Other responsibilities might include planning for future expansion and creating data base and table spaces, adding users and maintain security. The administrator is the monitoring authority of the system.

CHAPTER 4

SYSTEM REQUIREMENTS

System Requirements
The software requirement analysis is produced at the culmination of the function and performance allocated to software as part of system engineered refined by establishing a complete information description, a detailed constraint, appropriate validation criteria, and other data related to requirements.

4.1. Software Requirements:


The following are the software specifications used for the development of this project. Operating system Web Server Server side scripting Client side scripting Back-end Database : : : : : Windows XP [NT based OS] Java Web Server Java server pages Java Script MS-ACCESS

4.2. Hardware Requirements:


The following are the hardware specifications used for development of the project Processor RAM Hard disk : : : Pentium IV 512 MB 80 GB

CHAPTER 5

LITERATURE SURVEY

A programming tool or software tool is a program or application that software developers use to create, debug, maintain, or otherwise support other programs and applications. The term usually refers to relatively simple programs that can be combined together to accomplish a task. The Chapter describes about the software tool that is used in our project.

5.1. JAVA TECHNOLOGY


Initially the language was called as oak but it was renamed as Java in 1995. The primary motivation of this language was the need for a platform-independent (i.e., architecture neutral) language that could be used to create software to be embedded in various consumer electronic devices. Java is a programmers language. Java is cohesive and consistent. Except for those constraints imposed by the Internet environment, Java gives the programmer, full control. Finally, Java is to Internet programming where C was to system programming.

Importance of java to internet? Java has had a profound effect on the Internet. This is because; Java expands the Universe of objects that can move about freely in Cyberspace. In a network, two categories of objects are transmitted between the Server and the Personal computer. They are: Passive information and Dynamic active programs. The Dynamic, Self-executing programs cause serious problems in the areas of Security and probability.

5.2. FEATURES OF JAVA


SECURITY: Every time you that you download a normal program, you are risking a viral infection. Prior to Java, most users did not download executable programs frequently, and those who did scan them for viruses prior to execution. Most users still worried about the possibility of infecting their systems with a virus. In addition, another type of malicious program exists that must be guarded against. This type of program can gather private information, such as credit card numbers, bank account balances, and passwords. Java answers both these concerns by providing a firewall between a network application and your computer. PORTABILITY: For programs to be dynamically downloaded to all the various types of platforms connected to the Internet, some means of generating portable executable code is needed .As you will see, the same mechanism that helps ensure security also helps create portability. Indeed, Javas solution to these two problems is both elegant and efficient. JAVA ARCHITECTUER: Java architecture provides a portable, robust, high performing environment for development. Java provides portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted on each platform by the run-time environment. Java is a dynamic system, able to load code when needed from a machine in the same room or across the planet OBJECT-ORIENTED: Java was not designed to be source-code compatible with any other language. This allowed the Java team the freedom to design with a blank slate. One outcome of this was a clean usable, pragmatic approach to objects. The object model in Java is simple and easy to extend, while simple types, such as integers, are kept as high-performance non-objects.

ROBUST The multi-platform environment of the Web places extraordinary demands on a program, because the program must execute reliably in a variety of systems. The ability to create robust programs was given a high priority in the design of Java. Java is strictly typed language; it checks your code at compile time and run time. Java virtually eliminates the problems of memory management and de-allocation, which is completely automatic.

5.3. AN OVERVIEW OF JSP Introduction to JSP:


Java server pages (JSP) is a technology used to create dynamic content on the web. With the spread of the Internet and increasing number of users registering with web sites, the static pages developed using HTML have become obsolete. A web site displays a welcome message along with the name to the reregistered user when the user logs on. Imagine that a static HTML page is developed for the each user. In this scenarios, when a user logs on, the server looks for the HTML pave of the user and sends the page back to the client. You can use JSP to create dynamic Web pages. Essentially, a JSP page is an HTML document with Embedded java code .A JSP file must be saved with the .jsp extension .A web application consists of both presentation and Business logic .Presentation represents the elements used to design the structure of a Web page in terms of page layout, color, and text. Business logic involves application of financial and business calculations. JSP technology segregates presentation from the business logic .For example; a web designer can design html pages.

5.4. LIFE CYCLE OF JSP:


When a client browser sends a request to the server, the server recognizes the request for JSP files by the file extension. The server compiles and converts JSP page into a servlet class. The server calls the process calls page compile to convert the JSP page into a servlet. The process creates the servlet class and builds a service () method by extracting contents of the JSP file. All the HTML tags in the JSP page are wrapped in the print method or the output methods. The elements of the JSP file and HTML java code are appear in the servlet in the same order as they are in the JSP file. The servlet is then compiled and run. The servlet creates an HTTP response, which is send to the client. The subsequent request will not go through the translation phase. Instead the subsequent requests to the server will call the compiled .class file. Therefore, the overhead of the page compilation usually happens at the first call to the server.

10

The request and response cycle of JSP You are familiar with the request and response cycle of the interaction between a server and clients. The steps involved in the request and response cycle are listed here. 1. The client sends an HTTP request for a JSP page to the server. The request can be sent by using either a GET method or a POST method. 2. The browser identifies the JSP file and compiles and loads the corresponding servlet class if the servlet class is not already present in the JVM. The server calls the service () method. The default service () method often passes the request and response to the doGet () method or doPost () method. The servlet processes the input from the request and prepares an HTML page as a response. 3. The response is sent back to the client browser .JSP can be used in different application mode.

The JSP Application Models


The JSP application model defines how JSPs can interact with each other. The JSP1.1 specification defines many models that describe how JSPs can interact. Some of these applications are listed here: o o o o o

The simple model The n-tier model The loosely coupled Model The including Request Model The Forwarding Requests Model

5.5. INTRODUCTION TO JDBC


5.5.1. WHAT IS JDBC AND WHY JDBC? JDBC is a front end tool that enables databases access from programs written in java language and it uses the ODBC for the connectivity, JDBC is essentially a low level application-programming interface. It is called a low-level API since any data manipulations, storage and retrievals have to be done by the program itself. The next question that needs to be answered is why we need JDBC, once we have ODBC on hand. ODBC on hand. We can use the same ODBC as proven technology. Problem for doing this is ODBC gives C language API, which uses pointers extensively.

11

5.5.2. JDBC DRIVER TYPES: There are four types of JDBC drivers each having its own functionality. They are classified based on how they access data from the databases. NATIVE JDBC DRIVER: A JDBC driver, which is partially written in java and most of it, is

implemented using native methods to access the databases. This is useful in case of a java application that can run only on some specific platforms. ALL-JAVA JDBC NET DRIVERS: A JDBC net driver, which uses a common network protocol to connect an inner intermediate server, which in turn employs native calls to connect to the databases. This approach is suited for swings where the request must go to through the intermediate server. JDBC ODBC NET DRIVERS: A bridge driver provider with JDBC can connect to any type of database that is ODBC complaint. This approach is recommended since using ODBC Drivers. Which are industry standard now, would make an application truly portable across databases. NATIVE PROTOCOL ALL JAVA DRIVERS: This type of JDBC driver is written completely in java, and can access the database by making use of native protocols of the databases. This method of data access is suitable in case of intranets, where everything can run as an application, instead of a swing. 5.5.3. JDBC ARCHITECTURE: Data Base Management: Database provides Storing and managing the data. It reduces the time of accessing. DBMS (Data Base Management System) used to retrieve data in the form of reports. MS-ACCESS stores data in the .mdb file format where as Ms-SQL stores data in the .dot file format. Java is one of the commonly used webbased GUI programming languages. Sun micro Systems has included JDBC-API as a part of JDK to enable java applications to communicate with a database. JDBC API: Java program can't directly communicate with an ODBC Driver. The ODBC API is written in the 'C' programming language .It uses pointers and other constructs that are not supported in java. JDBC provides a set of API's that can be used by java programs to connect to and manage the database only jdbc-odbc bridge+odbc driver. This type of jdbc driver provides DBMS or RDBMS can only understand SQL statements and not java language statements. There are four types of JDBC Drivers

12

1. JDBC-ODBC bridge + ODBC Driver 2. Native API, partly java driver 3. JDBC-Net, pure java driver 4. Native protocol, pure java driver. We are using database access using the odbc driver.

JAVA APPLICATIONS JDBC API

JDBC DRIVER MANAGER

JDBC DRIVER

JDBC/ ODBC DRIVER ODBC

JDBC NET DRIVER MIDDLE WARE

DB DB DB

Fig: 5.5.3.1. JDBC Architecture

JDBC DRIVER MANAGER: Function of the driver manager is to find out available drivers in the system and connect the application to the appropriate database whenever a connection is requested. However to help the driver manager identify different types of drivers, each should be registered with the driver manager. JDBC DRIVER: Function of the JDBC driver is to accept the SQL calls from the application and convert them into native calls to the database. However, in this process it may take help from other drivers or even servers, which depend on the type of JDBC driver we are using. Also it is possible that the total functionality of the database server could be built into server itself. Sun soft provider a special JDBC Driver called JDBCODBC Bridge driver, which can be used to connect any existing database that is ODBC complaint

13

JDBC-ODBC BRIDGE: If possible, use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This completely eliminates the client configuration required by ODBC. It also eliminates the potential that the Java VM could be corrupted by an error in the native code brought in by the Bridge (that is, the Bridge native library, the ODBC driver manager library, the ODBC driver library, and the database client library.

What Is the JDBC- ODBC Bridge? The JDBC-ODBC Bridge is a JDBC driver, which implements JDBC operations by translating them into ODBC operations. To ODBC it appears as a normal application program. The Bridge implements JDBC for any database for which an ODBC driver is available. The Bridge is implemented as the
JDBC connectivity: Sun.jdbc.odbc Java package and contains a native library used to access ODBC. The Bridge is a joint development of Innersole and Java Soft. The JDBC provides database-independent connectivity between the J2EE platform and a wide range of tabular data sources. JDBC technology allows an Application Component Provider to: Perform connection and authentication to a database server Manager transactions Move SQL statements to a database engine for preprocessing and execution Execute stored procedures Inspect and modify the results from Select statement

Application: Application is a java program that needs the information to be modified in some database or wants to retrieve information.

14

CHAPTER 6

SYSTEM DESIGN

Introduction:
Design is the first step in the development phase for any engineering product (or) system. It may be defined as the process of applying various techniques and principles for the purpose of defining a device, a process, or a system insufficient detail to permit its physical realization. Software design is an iterative process through which requirements are translated into a Blue print for constructing the software. The design is represented at a high level of abstraction. A level that can be directly translated to specific data, functional and behavioral requirements. Preliminary design is concerned with the transformation of architecture. Detail design focuses on requirements into a data and software

refinements to the architectural representation. That leads to

detailed Data structure and algorithmic representation for software. In the design step, the element of the analysis model gets converted into a data design, and architectural design, an interface design and a procedural design. The data design transforms the information domain model created during analysis into the data structures that will be required to implement software. The architectural design defines the relationship among major structural elements of the program. The interface design describes how the software communicates within itself, to systems that interoperate with it, and with humans who use it. An interface implies a flow of information (e.g., data and /pr control). Therefore, the data and control flow diagrams provide the information required for interface design.

15

6.1. Design Process


Design process is in between the analysis and implementation process. The following design diagrams (data flow diagrams and E-R diagrams) make it easy to understand and implement. The design process of software system has two levels.

1. Systems Design or Top Level Design. 2. Detailed Design or Logical Design.

1. System Design or Top Level Design: In the system design the focus is on deciding which modules are needed for the system, the specification of these modules and how these modules should be interconnected. 2. Design or Detailed Logical Design: In detailed design the interconnection of the modules or how the specifications of the modules can be satisfied is decided . Some properties for a software system design are

Verifiability. Completeness. Consistency. Trace ability. Simplicity/understandability.

Design principles: Basic design principles that enable the software engineer to navigate the design process are. The design process should not suffer from Tunnel vision. The design should be traceable to the analysis model. The design should not reinvent the wheel. The design should minimize the intellectual distance between the Software and the problem, as it exists in the real would. The design should exhibit uniformity and integrity. The design should be structured to accommodate changes.

16

6.1.1Uml diagrams:
Use case Diagram: Use case is a description of a set of sequence of actions that a system performs that yields an observable result of value to a particular thing in a model. Graphically, use case is rendered as an ellipse with dashed lines, usually including only its name as shows below

enter hsc no login

User

receive bill Admin generate e-bill pay bill

request birth certificate

enter credit card details

Fig: 6.1.1.1.Use case Diagrams

Use of use case diagram: It is used for testing executable systems and also for understanding the executable systems. It is widely used in modeling the context of a system These diagrams are also recognized in modeling requirement of a system.

17

Sequence Diagrams: A sequence diagram is an interaction diagram that emphasizes the time ordering of the messages. Graphically, a sequence diagram is a table that shows objects arranged along the X-axis and messages, ordered in increasing time, along the Y-axis.

Administrator Sequence Diagram

:Admin

:Login

:Electricity bill

:Credit card

1.enter login details 2.check

3.success

4.generate electricity bill

5.update the user credit card details

Figure: 6.1.1.2.Sequence diagram for Administrator

18

User sequence diagram:

:User

:HSC

:Electricity bill

:Birth certificate

1.enter hsc number 2.check

3.pay the bill

4.fill the details for birth certificate

Figure: 6.1.1.3.Sequence diagram for birth certificate

19

6.2 .Database design


The goal of Database Design is to generate a set of relation schemes that allow us to store information without unnecessary redundancy and allows us to retrieve information easily. We can achieve optimization, ease of use in maintenance by designing the database using relational model between or among the tables.

To reduce redundancy. To arrive at loss-less join. To reduce the time as compared to the present system. To reduce the number of errors

6.2.1.Data Flow Diagrams: This Diagram server two purpose. Provides an indication of how date is transformed as it moves through the system. Disputes the functions and sub functions that transforms the dataflow. The Data flow diagram provides additional information that is used during the analysis of the information domain, and server as a basis for the modeling of functions. The description of each function presented in the DFD is contained is a process specifications called as PSPE

20

Notations: NAME
DATAFLOW

DESCRIPTION
Data move in a specific direction from an origin to a destination

SYMBOLS

PROCESS

People, procedures, or devices that Use or produce (Transform) Data. The physical Component is not Identified. External sources or destination of data, which may be People, programs, organizations or other entities. Here data are stored or referenced by a process in the System.

SOURCE

DATA STORE

Table: 6.2.1.a. Data Flow notations

Context-level DFD (Level 0) A level 0 DFD also called a fundamental system model or a context model... Represent the entire software element as a single bubble with input and output data indicated by incoming and outgoing arrows respectively. Additional process and information flow paths are represented as level 0 DFD is partitioned to reveal more details.

USER

E-GOV

DATA BASE

Figure: 6.2.1.1. Dataflow diagram for Context level 0

21

LEVEL1DFD

Registration

User store

USER

Login

Change User

Birth Certificate

Fill in Accounting Period Data

Birth

Print

e-bill

Electricity Bill

Pay Bill

Admin

Figure: 6.2.1.2Dataflow diagram for level1

22

6.2.2 Data base tables A data dictionary is a catalog a repository of the elements in the system. As the name suggests, these elements center on data and the way they are structured to meet user requirements and organization needs. A data dictionary is a collection of data about data. The basic idea is to provide information on the definition, structure and the user of the element an organization uses. In this project we create two tables using MS-ACCESS queries

Table Name: credit

NAME HSC CRDNO AMOUNT BANK

TYPE NUMBER NUMBER NUMBER TEXT

DESCRIPTION CONSUMER NUMBER CREDIT CARD NO BALANCE AMOUNT NAME OF THE BANK

Table 6.2.2.1. User credit table

TABLE NAME: e-bill

NAME HSCNO NAME ADDRESS PRV PRS AMOUNT LASTDATE

TYPE NUMBER TEXT TEXT NUMBER NUMBER NUMBER DATE

DESCRIPTION PHONE NUMBER NAME OF THE USER PRESENT ADDRESS NO OF LOCAL CALLS NO OF STD CALLS AMOUNT TO PAY LAST DATE TO PAY

Table 6.2.2.2User e-bill table

23

TABLE NAME: birth

NAME APLN SEX DOB FNAME MNAME COMTY FCOMTY MCOMTY TEXT TEXT

TYPE

DESCRIPTION NAME OF APLN SEX OF APLN DATE OF BIRTH FATHERS NAME MOTHERS NAME COMMTY OF THE USER FATHERS COMMTY MOTHERS COMMTY

DATE&TIME TEXT TEXT TEXT TEXT TEXT

Table 6.2.2.3.User birth table

TABLE NAME: new user

NAME NAME ADDRESS PHNO DESG TEXT TEXT

TYPE

DESCRIPTION NAME OF THE USER ADRS TO WHICH CONN IS REQ PHONE NUMBER FOR VERF-N DESIGNATION OF USER

NUMBER TEXT

Table: 6.2.2.4.New user Table

24

TABLE NAME: vid NAME VID NAME ADDRESS TEXT TEXT TEXT TYPE VOTER ID NAME OF THE USER ADDRESS OF THE USER DESCRIPTION

Table 6.2.2.5.User vid table

TABLE NAME: admin login

NAME

TYPE

DESCRIPTION

USERID PASSWORD

TEXT TEXT

USER ID USER PASSWORD

Table:6.2.2.7.User admin login table

25

CHAPTER 7

SYSTEM IMPLEMENTATION

Introduction:
implementation is the process of assuring that the information system is operational and then allowing users take over it s operation for use and evaluation obtaining and installing the system hardware. The implementation stage involves careful planning, investigation of existing system and its constrains on implementation, designing of methods to achieve change over and evaluation of changeover methods..The most visible component of implementation process is the system conversion. The four basic conversion strategies include

Direct Conversion Parallel Conversion Pilot conversion Phased Conversion

Direct Conversion : In direct conversion, the organization stops using the old system and starts using the new one at the same time. Parallel Conversion; A parallel conversion involves running both old system and hews system and comparing their results. The new system is accepted only after the results have matched for an acceptable period. Pilot Conversion : Pilot conversion means introducing the new system to a small part of the organization, expanding its use once it is known to operate property there. Eventually, it will be in use by the entire organization. Phased Conversion : Phased conversion means introducing a system in stages, one component or module at a time, waiting until that one is operating properly before introducing the next.

26

CHAPTER 8

SCREEN SHOTS

Configuring the server


Here we are configuring the Apache Tomcat server

Whenever the server starts we have to deploy the server in click on deployment icon and select project under Add, in that select server(tomcat6) click

Figure:8.1. Deploying tomcat server

After completion redeploying it we have to open the web browser

27

In this select our project name then it will automatically displays the login page of our project.. Figure: 8.2.home screen of tomcat server

28

INTRODUCTION

Fig: 8.3.Introduction page

29

ADMIN LOGIN

Fig: 8.4.Admin Login page

30

ADMIN PAGE

Fig: 8.5.Admin home page

31

ADD HSC DETAILS

Fig: 8.6.Add HSC details

32

USER ADD SUCCESSFULLY

Fig: 8.7.User added database

33

CREDIT DETAILS

Fig: 8.8. User Credit Details

34

ADD CREDIT USER

Fig: 8.9.Added credit details in database

35

ELECTRCITY BILLING FORM

Fig: 8.10.Electricity bill form

36

BILL DETAILS

Fig:8.11. Check the bill details

37

PAY THE ELECTRICITY BILL

Fig: 8.12.Pay the electricity bill

38

Fig: 8.13.User paid the electricity bill

39

Fig: 8.13.1.Total Amount Details

40

SENDING MESSAGE

Fig: 8.14. Sending message

41

SUCCESSFULLY SEND A MAIL

Fig: 8.15.Successfully send a mail

42

USER REGISTRATION PAGE

Fig: 8.16.User Birth certificate registration form

43

USER APPLICATION FORM

Fig:8.17.User Application form

44

FILL THE APPLICATION DETAILS

Fig: 8.18.Fill the application details

45

USER DATA IS REGISTERED

Fig: 8.19.User data is registered

46

CHAPTER 9

TESTING

Introduction
System testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing fundamentals define the overriding objectives for software testing. Testing is one of the steps in the software engineering process that could be viewed (psychologically, at least) as destructive rather than constructive. This will create two problems.

Time delay between the cause and appearance of the problem. The effect of the system errors on files and records within the system.
The purpose of the system testing is to consider all the likely variations to which it will be suggested and push the system to its limits. The testing process focuses on logical intervals of the software ensuring that all the statements have been tested and on the function intervals (i.e.,) conducting tests to uncover errors and ensure that defined inputs will produce actual results that agree with the required results.

White-Box Testing (GLASS-BOX TESTING) White-box tests focus on the program control structures. Test cases are derived to ensure that all statement in the program has been executed at least once during testing and that all logical conditions have been exercised. Knowing the internal working of a product, tests can be conducted to ensure that all gears mesh, that is the internal operation performs according to specification and all internal components have been adequately exercised. White box testing is a test case design methods that uses the control Guarantee that all independent paths within a module have been exercised at least . Exercise all logical decision on their and false sides Execute all loops at their boundaries and within their operational bounds. Exercise internal data structures to ensure their validity.

structure of the procedural design to design to derive test cases.

47

Black-Box Testing: Black-Box testing focuses on the functional requirements of the software .it is not an alternative to whitebox techniques. Rather, it is a complementary approach that is likely to uncover a different class of errors than white-box methods. Black- box testing attempts to find the following types of Errors o o o o o Incorrect or missing functions. Interface errors. Errors in data structures or external database access. Performance errors and Initialization and termination errors.

Unit Testing Unit testing focuses verification effort on the smallest unit of software design. Using the procedural design description, important control paths are tested to uncover errors within the boundary of the module. The unit test is normally the constrained scope established for unit testing. The unit test is normally white box oriented, and the step can be conducted in parallel for multiple Modules.

Integration Testing Integration testing is a systematic technique for constructing the program structure while conducting tests to uncover errors associate with interfacing. The objective is to take unit tested modules and build a program structure that has been dictated by design. There is often a tendency to attempt non-incremental integration to construct the program using big bang approach. Incremental integration is the anti thesis of big bang approach.

Verification and Validation: Validation is a process of finding out if the product being built is right? I.e. whatever the software product is being developed; it should do what the user expects it to do. The software product should functionally do what it is supposed to, it should satisfy all the functional requirements set by the user. Validation is done during or at the end of the development process in order to determine whether the product satisfies specified requirements.

48

CHAPTER 10

CONCLUSION

This project is able to successfully incorporate all the requirements as specified by the public. Our state govt... Proposed this system. There is no complexity to the public & private sectors. It maintains efficiently and effectively all the governmental activities. Appropriate changes have been taken during the database design to maintain database integrity and to avoid redundancy data. Validations are done instantaneously to avoid inconsistency of the data. The user provided a friendly interface by hiding all technical complexities. With the help of this application compared to the old existing system which is done manually the time is reduced very much and is very useful and applicable for the users. Our application

consists about Tender Extractions ,All Certificates related to govt like Birth certificates, income certificates and using this we can pay the electricity bills, telephone bills etc.

49

CHAPTER 11

BIBLIOGRAPHY

1. Software Engineering - Practitioners Approach by Roger S. Pressman, McGraw Hill International Edition. 2. An Introduction to Database System by C. J. Date. 3. Java Complete References by Patrik Norton. 4. CORE Servlets & JSP from sun micro systems by MARTHALL 5. UML in 24 Hours - SAMS outline by JOSEPH SCHMULLER. 6. Thinking in Java by Bruce Eckel. 7. Java2 Complete Reference by Herbert Scheldt.

WEBSITES REFERRED The following links were searched and exploited extensively for the project development and implementation. 1. 2. 3. 4. 5. 6. www.microsoft.com/iis www.oracle.com www.Jsp.com www.javascript.com www.sun.com www.Jsp-help.com

7. www.egov.mit.gov.in 8. www.undp.org.in 9. www.digitalgovernance.org

50