Professional Documents
Culture Documents
INTRODUCTION
________________________________________________
90
The SIS module is a component covering many other student aspects from
application to retirement. The system records basic personal information, admission
information, education information regarding student. Leading edge systems provide the
ability to "read" applications and enter relevant data to applicable database fields, notify
student and provide result. Student management function involves
Manage quota
Manage board
Manage category
Fees payment
90
Manage faculty
Manage designation
Exam scheduling
Result management
Subject management
Block management
In SIS, every user has a Login ID and Password. Also all the users have different
permission rights to access the applications. These rights are Dynamic and can be
changed.
There are three main roles in the system. Admin, accountant and operator. Admin has
complete access to the whole system, while accountant is only concerned with payment of
fees for the admission of the student. Operator is the role that is responsible for the use of
the system.
Manage faculties
Manage subjects
Seat management
Management of semester
90
Set examination
Search student
Block allocation
Result, etc
Now when the user with the particular role Logs on he can see only those pages which
are allowed to them.
1.2 PURPOSE
The project is about to handle all the information of the student regarding
admission and examination. Also it manages resources which were managed and handled
by manpower previously. The main purpose of the project is to integrate distinct sections
of the organization into consistent manner so that complex functions can be handled
smoothly by any technical or non-technical persons.
90
All the above-mentioned matters are to be incorporated in the application along with some
additional requirements.
The main purpose of the Admin Module is to introduce new things and configure
important aspects. For e.g. only admin is authorized to introduce quota, board, subject,
category, etc. and only admin is allowed to configure exam and set fees structure. So the
master screens for all these are visible to only admin role. This is done by the Admin
Module. It also can create the users and Physical and Logical Locations. Thus the main
purpose of the Admin Module is to managing the dynamic working of the system.
1.3 SCOPE
The scope of the project includes the following
Any college can use this system as it is not client centric.
All admission and examination related work for the student can be done using this
system.
Deliver Electronic Workplace
Provide Bi-lingual support
Application Support & Maintenance after deployment to production
The Admin Module can be reused for projects as well which have many users with
different rights. Hence it is reusable.
90
ASP.NET, the latest version of Active Server Pages, is Microsofts technology for
building dynamic pages, database-driven Web sites. Active Server Pages is one of the most
popular languages for building scalable, interactive Web sites. Several of the highest
traffic Web sites on the Internet employs Active Server Pages. Examples include Dell
Online, Barnes and Noble, 1-800-flowers, and the Microsoft site itself.
90
ASP.NET lets you leverage your current programming language skills. Unlike
classic ASP, which supports only interpreted VBScript and JScript, ASP.NET now
supports more than 25 .NET languages (including built-in support for VB.NET, C#, and
JScript.NET -- no tool required), giving you unprecedented flexibility in your choice
of language.
You can harness the full power of ASP.NET using any text editor -- even Notepad!
But Visual Studio 2008 adds the productivity of Visual Basic-style development to the
Web. Now you can visually design ASP.NET Web Forms using familiar drag-dropdouble-click techniques, and enjoy full-fledged code support including statement
completion and color-coding. VS.NET also provides integrated support for debugging and
deploying ASP.NET Web applications.
The Professional version of Visual Studio 2008 delivers life-cycle features to help
organizations plan, analyze, design, build, test, and coordinate teams that develop
ASP.NET Web applications. These include UML class modeling, database modeling
(conceptual, logical, and physical models), testing tools (functional, performance and
scalability), and enterprise frameworks and templates, all available within the integrated
Visual Studio .NET environment.
90
ASP.NET is much faster than classic ASP, while preserving the "just hit save"
update model of ASP. However, no explicit compile step is required! ASP.NET will
automatically detect any changes, dynamically compile the files if needed, and store the
compiled results to reuse for subsequent requests. Dynamic compilation ensures that your
application is always up to date, and compiled execution makes it fast.
ASP.NET output caching can dramatically improve the performance and scalability
of your application. When output caching is enabled on a page, ASP.NET executes the
page just once, and saves the result in memory in addition to sending it to the user. When
another user requests the same page, ASP.NET serves the cached result from memory
without re-executing the page. Output caching is configurable, and can be used to cache
individual regions or an entire page. Output caching can dramatically improve the
performance of data-driven pages by eliminating the need to query the database on every
request.
90
ASP.NET session state lets you share session data user-specific state values across
all machines in your Web farm. Now a user can hit different servers in the web farm over
multiple requests and still have full access to her session. And since business components
created with the .NET Framework are free-threaded, you no longer need to worry about
thread affinity.
ASP.NET automatically detects and recovers from errors like deadlocks and
memory leaks to ensure your application is always available to your users.
For example, say that your application has a small memory leak, and that after a week the
leak has tied up a significant percentage of your server's virtual memory. ASP.NET will
detect this condition, automatically start up another copy of the ASP.NET worker process,
and direct all new requests to the new process. Once the old process has finished
processing its pending requests, it is gracefully disposed and the leaked memory is
released. Automatically, without administrator intervention or any interruption of service,
ASP.NET has recovered from the error.
ASP.NET now lets you update compiled components without restarting the web
server. In the past with classic COM components, the developer would have to restart the
web server each time he deployed an update. With ASP.NET, you simply copy the
component over the existing DLL -- ASP.NET will automatically detect the change and
start using the new code.
90
Presentation
Control Object
Business
Logic
Data access
10101010
10101010
01110101
00101011
10101010
10100010
10101010
10011110
ASP.net
ASP
VB + JS
.ascx
page
SQL Server
ASP
SQL Server
ASP + JS
For designing the entire software we have divided the whole software into four main
layers. And each layer provides service to the other layer. So we can easily proceed
towards the target. These layers are namely
Presentation layer
Business layer
Control layer
Presentation Layer
The Presentation layer is responsible for the user interface and communicates
directly with the business logic layer. Separating the presentation layer from the rest of the
application enables the development of different user interface (i.e. Web form, Windows
form, mobile devices) that all uses the same business logic and database access code.
90
Business Layer
The logic layer separates the code specific to the application, for the way company
does the business, from the user interface and the database specific code. Other line of
business Applications a company build can use the business logic layer if needed,
maximizing the code reuse.
Control Layer
The Control layer is responsible for communication between business layer and
presentation layer. It connects the logic and data with each other and gives a better
connectivity and separation between layers.
Project Flow Lines and Artificial Lift use a Microsoft SQL Server Express
Edition database.
90
Chapter 2
PROJECT MANAGEMENT
________________________________________________
90
We have used Iterative and Incremental Development model (IID) for our project
development. This development approach is also referred to as Iterative Waterfall
Development approach. Iterative and Incremental Development is a software development
process developed in response to the more traditional waterfall model.
90
Life Cycle:
At each iteration, the procedure itself consists of the Initialization step, the
Iteration step, and the Project Control List. The initialization step creates a base version of
the system. The goal for this initial implementation is to create a product to which the user
can react. It should offer a sampling of the key aspects of the problem and provide a
solution that is simple enough to understand and implement easily. To guide the iteration
process, a project control list is created that contains a record of all tasks that need to be
performed. It includes such items as new features to be implemented and areas of redesign
90
of the existing solution. The control list is constantly being revised as a result of the
analysis phase.
The iteration involves the redesign and implementation of a task from project
control list, and the analysis of the current version of the system. The goal for the design
and implementation of any iteration is to be simple, straightforward, and modular,
supporting redesign at that stage or as a task added to the project control list. The code
can, in some cases, represent the major source of documentation of the system. The
analysis of an iteration is based upon user feedback, and the program analysis facilities
available. It involves analysis of the structure, modularity, usability, reliability, efficiency,
and achievement of goals. The project control list is modified in light of the analysis
results.
During the implementation of the project by this approach, a step called V&V i.e.
Verification and Validation is carried out at certain intervals.
Once we examine that the project is feasible, we undertake project planning. The table below
describes how we planned our project.
Table 2.1 Project Plan
Phases
Feasibility Analysis
Time Period
15th Nov 2013
21st
Nov 2013.
Requirement
22nd
Gathering
2013
No. of days
90
Phases
Time Period
No. of days
Analysis
Design
Design document
Implement Coding
Implementation of system
Testing
Testing Document
Final Evaluation
Report Submit
Responsibility
Project Guide
Defining scope
Team/Member
Project Developer
Self
(Aradhna
Dubey
Nirupama Waretwar)
90
&
2.1.3
Schedule Representation
Scheduling the project tasks is an important project planning activity. It involves deciding
which tasks would be taken up when. In order to schedule the project activities, a software
project manager needs to do the following:
Advantage
Immigration
Requirement
Specification
Database
part
Desig
n
Graphical
user
interface
Cod
e
Database
part
Test
Docume
nt
Graphical
user
interface
90
Specificatio
n
Design
database
part
Code
database
part
Design
Code GUI
part
GUI part
Integrate and
test
Finish
Write user
manual
Software Risk Management is a proactive approach for minimizing the uncertainty and
potential loss associated with a project. Some categories of risk include product size,
business impact, customer-related, process, technology, development environment,
staffing (size and experience), schedule, and cost. Risk Management is a practice with
processes, methods, and tools for managing risks in a project. It provides a disciplined
environment for proactive decision making to
2.2.1
Risk Identification
90
A. Project Risk:
The Project Risk threatens the project plan. The project risks here are:
A1. Schedule slippage.
A2. Incomplete requirement specification.
A3. Change in user Requirements.
A4. Non-availability of required resources.
A5. Lack of communication with end user.
A6. Improper vision about the project.
A7. Staffing and organization problems.
A8. Non-technical customer with high technical expectations.
B. Technical Risk:
The Technical Risk threatens the quality and timeliness of the software to be produced.
If the technical risk becomes a reality, implementation may become difficult or
impossible. The technical risks identified in our project are:
B1. Unavailable library files.
B2. Problem in connection to database server.
B3. Problem in application server.
90
2.2.2
Risk Analysis
Each identified risk is considered and the effect and probability of each risk is identified
during risk analysis.
2.2.3
Risk Planning
Risk planning lists the checkpoints that are made continually to find out situation where the risk
can becomes reality.
90
2.3 ESTIMATION
The estimation of various project parameters is a basic project planning activity. The
important project parameters that are estimated include: project size, effort required to
develop the software, project duration and cost. These estimates not only help in quoting
the project cost to the customer, but also prove useful in resource planning and scheduling.
Heuristic techniques
Effort = a1 * (KLOC) a2 PM
Tdev = b1 * (Effort) b2 months
90
Where a1, a2, b1, b2 are constants for each category of software process. KLOC is the estimated
size of product in Kilo Lines of Code. Tdev is the estimated time to develop the software,
expressed in months. Effort is the total effort required to develop the software product, expressed
in person month.
Organic
Semidetached
Embedded
We followed the most common and feasible approach for estimating the effort required in
the software development in which project size is variable and the equation of the effort is
given by
EFFORT = a * SIZE b.
According to the survey and analysis carried out at IBM Federal System Division, if the
size estimate is in KDLOC and the project is ranging from 4000 to 467000 lines of
delivered source code then the equation for total effort, E, in person months (PM) can be
given by
E = 4.1 * 5 0.7 = 12.64 PM.
Where 3.2 and 0.7 are values of a and b determined depending upon the data about the
projects that has been performed in the past.
As mentioned earlier we used the survey and analysis results given by IBM Federal System
Division and according to those results the total duration, D , in calendar months can be estimated
by the equation
90
D = a * E b.
Again determining the values of a and b from the data about the projects that has been performed
in the past we get the equation
D = 2.3 * 12.64 0. 38 = 6.03 Months.
90
Chapter 3
SYSTEM REQUIREMENT STUDY
________________________________________________
90
3.1
USER CHARACTERISTICS
Administrator:
The administrator has all the rights to access the system. He is the one who has all rights to
view the applicant details, modify those details, The administrator also keeps a track of the
file status of the applicants.
User :
Applicant is the one who wish to visit SIS website. The applicant can fill in his own
details and register himself for membership to use portal services. The applicant has rights
to view and modify his own details, generate its candidature of containing his own details
in academic web part. The applicant also rights to create groups, modify groups, invite
member, modify member, join group, slam book requests, etc. In sort, the applicant can
access the application like a moderator of his/her group.
Faculty :
He can view log sheet submitted by trainee day to day filled student which is applying for
his/her status and day to day log sheet submission- this can be done, only when the
supervisor approve their log sheet, faculty gives review to trainee after looking his/her
remarks by the supervisor.
Supervisor :
The Supervisor is approve the log sheet is done by administrator and give them remarks on
it and supervisor also update trainee log sheet.
90
3.2
The following are minimum hardware and requirements that should be present to run the
project successfully.
Development tools
JavaScript, XML
Microsoft visual studio 2008, SQL server 2005
Application server
Database
Operating system
management studio
IIS 7.5
SQL
Windows 7 & Windows 8 Edition, Windows Vista
Web browser
Hardware
Enterprise Edition
Internet Explorer 6.0 and above
P-IV 2.4, 1 GB RAM, 80 GB HDD
Hardware Requirements
90
Software Requirements
3.3
C
ONSTRAINTS
3.3.1
Regulatory Policies
3.3.2
Reliability Requirements
90
3.3.3
3.3.4
Chapter 4
SYSTEM ANALYSIS
________________________________________________
90
4.1
The current system for the Student Management System deals with maintaining a
physical contact with the academy management dept. for filling all the details and the
documentation work. The management doesnt needs to visit the academy management
dept. and collect the assignment and submitting his/her documents directly.
According to the current system, the management has to fill in the forms manually,
go to the account management dept., and submit him the form. The applicant needs to visit
90
the academy portal now and then in order to get his work accomplished. The admin also
has to manage all the users. He needs to maintain records of all the users, their activity
status, submission methods and installation details on paper. The Manual process is more
error prone and also slow. Moreover Students in the academy can interface his/her work
area only. But if an online application is available then they can communicate whole
system. Thus a simulation of this entire process can be a boon to the applicants as well as
the admin.
4.2
The present system has certain major disadvantages. A few to be listed can be
excessive paperwork, time consuming process flow, laborious work environment
for employees, difficulty to access historical data and all these problems lead to
inefficient working of government sector causing dissatisfaction in the general
public.
Apart from the above stated problems there is lack of transparency in the existing
system. This being one of the major drawbacks in the system needs special
attention.
The problem stated above have certain deep rooted problems like time consuming
process flow for which the government may need to change the structure of the
process flow in certain cases so that the system output can become faster.
4.3
The following listed are the problems or weaknesses of the current system:
data
It is difficult to prepare report for decision making.
Attendance related module is not there.
90
4.3.1
User Requirements
R1: login
Actor: Admin, Operator, Accountant
Pre Condition: None
Input: User Id and Password
Output: Home Page as per role
Flow:
(1) User Logs in with username and password.
(2) If correct then Home Page is displayed.
Alternate Flow:
(1) If the username is wrong then it is asked to login again.
(2) If the password is wrong then the user is asked to enter again.
R2:Pay fees
Actor: Accountant
Pre Condition: User must be logged on
Input: Student ID
Output: Fees paid
Flow:
(1) Accountant enters student ID
(2) Details of student is shown with the status of fees paid or not.
(3) If fees not paid then Accountant collects the fees.
(4) student can get the print receipt of paid fees.
Alternate Flow:
90
(1) If the fields marked with * are empty then alert is displayed.
(2) If student ID does not exist then the system alerts it.
R4: Enrolment
Actor: operator
Pre Condition: User must be logged on and student has already got admission.
Input: Details for the enrolment of the student.
Output: student has got enrolment.
Flow:
90
4.3.2
System Requirements
90
4.3.3
Non-Functional Requirements
Usability
The interface should use terms and concepts, which are drawn from the
experience of the people who will make most of the system. For example,
map and date should be displayed in its traditional fashion.
Efficiency
The system must provide easy and fast access without consuming more
cost.
Reliability
90
User should never be surprised by the behaviour of the system and it should
also provide meaningful feedback when errors occur so that user can
recover from the errors.
4.4
FEASIBILITY STUDY
The system has been developed for any user who wants to use this system. We have
given a demo of our project and the users found the system friendly and easy to use. The
interoperability with the existing system is also checked after uploading the website. So
they may face certain problems in using the user interface. So keeping this consideration
in mind we have provided field for each and every field on the forms. The administrator
also may be non-technical, so the user interface is designed in such a way that it gets
comfortable for the non-technical person to operate easily.
Technical Feasibility:
It determines if the system can be implemented using the current technology. This
system has been developed using asp.net (VB) as front end and SQL Server 2005 as
backend. Though the MVS 2008 technology was new to us it was not so difficult for us to
learn it. This was also new to us but it didnt take much effort and time to get used to it.
We had earlier worked with Access and not SQL Server 2005 but getting familiar with it
was also easy.
90
Economical Feasibility:
The company being a well-to-do company didnt have any problem in buying any
software that was required in developing the application. The softwares we used were
readily available. So as such we didnt face any economical constrains.
Implementation Feasibility:
This project can easily be made available online without much consideration of the
hardware and software. The only required thing at the applicants side is the Internet
connection and a web browser, which are a no difficult issue these days. A database server
and application server are required to set up at the admin side. After setting up the project
online, even the administrator can access the system from anywhere.
4.5
REQUIREMENTS VALIDATION
90
4.6
FUNCTIONS OF SYSTEM
4.6.1
Use Case
The use case model for any system consists of a set if use cases. Intuitively, use
cases represent the different ways in which the users can use a system. Following is the
use case representation of the advantage immigration system.
90
90
4.7
DATA MODELING
4.7.1
Class Diagram
90
A class diagram describes the static structure of a system. It shows how a system is
structured rather than how it behaves. The static structure of a system consists of a number
of class diagrams and their dependencies. The main constituents of a class diagram are
classes and their relationships: generalization, aggregation, association, and various kinds
of dependencies.
Following diagram represents various classes of the system. The relations between
these classes are shown in the next diagram.
90
4.7.2
90
4.7.3
90
90
4.7.4
Data Dictionary
A data dictionary is a catalog --a repository-- of the elements in a system. It
includes list of all the elements composing the data flowing through a system. The major
elements are data flows, data stores, and processes. It store definitions and detailed
descriptions of the data used in an organizations information system
It is important because
90
Exam Details
Exam Master
Exam Type Master
Student Admission Details
Student Education Details
Student Personal Details
Type
Varchar(15)
Numeric(18,0)
DateTime
DateTime
Null
NO
NO
NO
NO
Key
FK
FK
Desciption
Exam Master
Subject Exam Type Detail
Date of Exam
Time of Exam
Null
NO
NO
NO
Key
PRI
FK
FK
Desciption
Primary Key
Year Course Sem
Exam Type Master
Key
PRI
Description
Primary key
Name of Exam Type
Description of exam type
Type
Varchar(15)
Varchar(15)
Varchar(15)
Type
Varchar(15)
Varchar(50)
Varchar(Max)
Null
NO
NO
90
Type
Varchar(15)
Varchar(15)
DateTime
Varchar(10)
Varchar(10)
Bit
Varchar(10)
Varchar(5)
Varchar(15)
Varchar(10)
Varchar(10)
Bit
Varchar(MAX)
Null
NO
NO
NO
NO
NO
NO
NO
NO
NO
NO
NO
NO
Key
FK
FK
Description
Student Personal Details
FK
FK
FK
FK
FK
Board Master
Category Master
Quota Master
Speciality Master
Faculty Master
Type
Numeric(18,0)
Varchar(15)
Varchar(30)
Varchar(30)
Varchar(30)
Numeric(4,2)
Numeric(4,0)
Varchar(MAX)
Null
NO
NO
NO
NO
NO
NO
NO
Key
PRI
FK
Description
primary key
Student Personal Details
Type
Varchar(15)
Varchar(20)
Varchar(20)
Varchar(20)
DateTime
Varchar(5)
Decimal(10,2)
Varchar(5)
Varchar(20)
Varchar(30)
Varchar(30)
Null
NO
NO
Key
PRI
NO
NO
NO
NO
FK
FK
NO
90
Description
Primary key
City
Pincode
State
Nation
Phone_Res
Phone_Mob
Email_id
Alternate_email
Status
Varchar(30)
Varchar(10)
Varchar(20)
Varchar(20)
Varchar(15)
Varchar(15)
Varchar(30)
Varchar(30)
Bit
NO
NO
NO
NO
NO
NO
4.8
4.8.1
Context Diagram
The context diagram is the most abstract data flow representation of a system. It
represents the entire system as a single bubble and. The various external entities with
which the system interacts and the data flows occurring between the system and the
external entities are also represented. The name context diagram is well justified because it
represents the context in which the system is to exist i.e. the external entities (users) that
would interact with the system and specific data items they would be receiving from the
system.
90
90
4.9
Admission Module
o Student Registration
o Semester Screen
o Category Screen
o Payment Screen
o Faculty Screen
o Seat Master
90
Examination Module
o Exam Type Screen
o Examination Scheduling Screen
o Subject Master Screen
o Subject Examination Marks Allocation Screen
o Subject Allocation Master
o Result Entry Screen
o Examination Scheduling Report
Java Script.
ASP.NET
PHOTSHOP
AJAX
AAA LOGO
1. JavaScript:
90
Java Scripts can be inserted into HTML documents, to make the web pages
more dynamic and interactive
2. ASP .NET:
90
The .NET Framework 3.5 introduces new features for the technologies in 2.0 and
3.0 and additional technologies in the form of new assemblies. The following technologies
are introduced with the .NET Framework 3.5:
ASP.NET AJAX.
Style sheets
Scripting
Internationalization
Accessibility
XML tags are not predefined in XML. You must define your own tags.
90
Chapter 5
SYSTEM DESIGN
________________________________________________
90
INTRODUCTION
During analysis, the focus is on what needs to be done intendment of how it is done.
During design, decisions are made about how the problem will be solved, first at a high
level, then at increasingly detailed levels.
System design is the first stage in which the basic approach to solving the problem is
selected. During system designing the overall structure and style are decided. The system
architecture is the overall organization of the system into components called system.
System design deals with transforming the customer requirements, as described in the SRS
document, into a form that is implement able using the programming language. Certain
items such as modules, relationships among identified modules, data structures,
relationships between the data structures, and algorithms for implementation should be
designed during this phase.
As a system designer we are tried to take following design decisions:
90
5.1DATABASE DESIGN
90
ADDRESS_2
ID
CITY
STUDENT_ID
STATE
DISCIPLINE
PINCODE
BOARD_OF_STUDY
NATION
INSTITUTE
PHONE_NUMBER_RES
PERCENTAGE
MOBILE_NUMBER
YEAR_OF_COMPLETION
EMAIL_ID
ACHIEVMENTS
ALTERNATE_EMAIL_ID
STATUS
QUOTA_ID
DATE_OF_ADMISSION
QUOTA_NAME
GENERAL_MERIT_NO
BOARD_ID
CATEGORY_MERIT_NO
FACULTY_NAME
DESIGNATION_ID
SPECIALIZATION_ID
FRESHER
BOARD_ID
CATEGORY_ID
SPECIALITY_ID
QUOTA_ID
CATEGORY_ID
HOSTEL
CATEGORY_NAME
FACULTY_ID
DESCRIPTION
REMARKS
YCS_ID
BOARD_NAME
COURSE_ID
COURSE_ID
DESCRIPTION
COURSE_NAME
COURSE_DURATION
DESCRIPTION
90
SMS_SUBJECT_MASTER
SMS_SUBJECT_EXAM_TYPE_DETAIL
SUB_EXAM_I D
SUB_CODE
SUB_I D
SUB_NAME
EXAM_TYPE_I D
TEXT_BOOK
REFERENCE_BOOK
YCS_I D
DESCRI PTI ON
DURATI ON
SMS_EXAM_TYPE_MASTER
TOTAL_MARKS
EXAM_TYPE_CODE
PASSI NG_MARKS
EXAM_TYPE_NAME
SMS_RESULT_DATA
DESCRI PTI ON
EXAM_I D
YCS_I D
SMS_YEAR_COURSE_SEM *
SUB_I D
STUDENT_I D
SMS_EXAM_SCHEDULE_DETAIL
YCS_I D
YCS_I D
YEAR_I D
MARKS
YEAR_OF_STUDY
COURSE_ID
EXAM_TYPE_CODE
SEM_I D
SMS_EXAM_DETAIL
EXAM_I D
SMS_SUBJECT_SEMESTER_ALLOCATI ON *
ID
YCS_I D
SUB_CODE
SMS_EXAM_MASTER
SUB_EXAM_I D
EXAM_I D
DATE
YCS_I D
EXAM_TI ME
EXAM_TYPE_I D
90
90
Chapter 6
IMPLEMENTATION PLANNING
________________________________________________
90
This layer gives a user access to the application. It contains all the web pages so it
is this interface through which user can access the application.
This layer presents data to the user and optionally permits data manipulation and
data entry.
This layer gives a well separation between code and its connectivity with database.
This layer includes the code (VB.NET code) and JS. Mainly this layer includes the
replica of presentation layer pages and these pages are mainly control pages.
It consists of business and data rules. Also referred to as the business logic tier, the
middle tier is where we as developers can solve mission-critical business problems
and achieve major productivity advantages. The components that make up this
layer can exist on a server machine, to assist in resource sharing. These
components can be used to enforce business rules, such as business algorithms and
data rules, which are designed to keep the data structures consistent within either
90
specific or multiple databases. Because these middle-tier components are not tied
to a specific client, they can be used by all applications and can be moved to
different locations, as response time and other rules require.
In this layer we have implemented the basic function through data can be
accessed like insert, update, delete, selection.
Objects
The below are the naming convention for the design element used in the form.
Prefix
Example
Check Box
Combo Box
Chk
Cmb
chkReadOnly
cmbEnglish
cmd
dlg
dgr
dtp
frm
grp
hsb
fra
img
ils
lbl
lin
lnb
lst
lvw
mnu
pnl
pic
prg
rad
rpt
rtx
shp
sts
tpg
txt
tmr
tlb
tip
vsb
rev
rfv
cmv
vas
cmdExit
dlgFileOpen
dgrOrderDetails
dtpDateOfBirth
frmEntry
grpPymntDtls
hsbVolume
fraLanguage
imgIcon
ilsAllIcons
lblHelpMessage
linVertical
lnbGotoWebSite
lstPolicyCodes
lvwFolderDtls
mnuFileOpen
pnlOrder
pbxImage
pbrInstallProgress
radSelect
rptQtr1Earnings
rtxAddressDtls
shpCircle
staDateTime
tpgPayerDtls
txtLastName
tmrAlarm
tlbActions
tipTxtName
VsbRate
revUserName
rfvUserName
cmvStartDate
vasValidationSummary
90
cbl
cblDefectPattern
All Hidden Fields should be place one after the other to reserve the space in the form.
Description & purpose of each hidden field should be documented in the design spec of
the appropriate components.
Variables
<prefix>_<meaningful name>
prefix : 2 character code.
First alphabet represents the scope of the variable
l - Local
g - Global
Second alphabet represents the type
b - Boolean
c - Currency
s - String
f - Float
i - Integer
l - Long
t - Time
a - Array
v - Variant
The body of the variable names and function names should use mixed case and
should be as long as needed to describe their purpose. To keep the name length reasonable,
abbreviations can be used for standard terms like Init for initialization, Tbl for table, Cnt
for count, Grp for Group etc. Wherever abbreviations are used, try to use them
consistently to improve readability. And in meaningful variable name variable name start
with lower case salphabet and second part of the name should be start with upper case
alphabet like for student name variable name should be studentName.
Recommended Maximum Length for variable names is 32 characters.
90
Example:
For declaring a global string variable for Group name: gs_grpName.
When passing values to a subroutine/function, use the same variable names in the
called routine as in the calling routine.
For Functions and Subroutines
<prefix>_<meaningful name>
For Functions: prefix is fn
Chapter 7
TESTING
______________________________________________
90
7.1
TESTING PLAN
Software Testing has a dual function; it is used to identify the defects in program and it is
used to help judge whether or not program is usable in practice. Thus software testing is
used for validation and verification, which ensure that software conforms to its
specification and meets need of the software customer.
Developer resorted Alpha testing, which usually comes in after the basic design of the
program has been completed. The project scientist will look over the program and give
suggestions and ideas to improve or correct the design. They also report and give ideas to
get rid of around any major problems. There is bound to be a number of bugs after a
program have been created.
90
Unit
Testing
Modul
e
Testin
g
Subsystem
Testing
Syste
m
Testin
g
Acceptanc
e Testing
Branch coverage
It is strategy in which test cases are designed to make each branch condition
assume true & false values.
Conditional coverage
In this testing test cases are designed to make each component of composite
conditional expression both true & false.
90
Requirement Traceability
As most interested portion is whether the system is meeting its requirements or not, for
that testing should be planned so that all requirements are individually tested. We checked
the output of certain combination of inputs so that we can know whether it gives desirable
results or not. Strictly sticking to your requirements specifications, give you the path to get
desirable results from the system.
Testing Schedule
We have tested each procedure back-to-back so that errors and omissions can be found as
early as possible. Once the system has been developed fully we tested it on other
machines, which differs in configuration.
7.2
TESTING STRATEGY
While deciding on the focus of testing activities, study project priorities. For
example, for an on-line system, pay more attention to response time. Spend more
time on the features used frequently.
Decide on the effort required for testing based on the usage of the system. If the
system is to be used by a large number of users, evaluate the impact on users due
to a system failure before deciding on the effort.
90
Write test cases for invalid and unexpected as well as valid and expected input
conditions.
Unit Testing
Objective
The objective of Unit Testing is to test a unit of code (program or set of programs) using
the Unit Test Specifications, after coding is completed. Since the testing will depend on
the completeness and correctness of test specifications, it is important to subject these to
quality and verification reviews.
Input
Code to be tested
Testing Process
Verify that all boundary and null data conditions are included.
Features to be tested
90
Test Specification
Description
of
result
sets/connections
Handling of Null values.
Action
Expected Result
Observed result
On
pressing Should clear the screen and allow As Expected
Add Button
90
Verified
YES
Modify= Disable
Save= Enable
Query= Disable
Fetch= Disable
Delete= Disable
2.
On
Cancel= Enable
pressing Set the fields to accept the query As Expected
Query Button
YES
condition.
State of other Buttons in Toolbar
Modify= Disable
Save= Disable
Add = Disable
Fetch= Enable
Delete= Disable
3.
On
Cancel= Enable
pressing Get all the records, which satisfy As Expected
Fetch button
YES
4.
On
Cancel= Disable
pressing Record should be inserted in As Expected
Save button
database
State of other Buttons in Toolbar
Modify= Enable
Add= Enable
Query= Enable
Fetch= Disable
Delete= Enable
Cancel= Disable
90
YES
5.
On
As Expected
YES
YES
Modify button
6.
On
Cancel button
mode of screen
State of other Buttons in Toolbar
Modify= Disable
Save= Disable
Query= Enable
Fetch= Disable
Delete= Disable
Add= Enable
7.
Delete button.
Not Applicable
As Expected
YES
8.
YES
Mode
9.
YES
Security
bar
According to the Access rights As Expected
Features
defined
the
buttons
should
corresponding
/Disabled
Integration Testing
90
be
Enabled
YES
After our individual modules were tested out we proceed to the integration testing to
create a complete system. This integration process involves building the system and
testing the resultant system for problems that arise from component interactions.
We have applied top-down strategy to validate high-level components of a system before
design and implementations have been completed. Our development process started with
high-level components and we worked down the component hierarchy.
System Testing
System testing is actually a series of tests whose purpose is to fully exercise the computerbased system. It verifies that system elements have been properly integrated and perform
allocated functions. It checks whether the system as a whole works as per requirement. We
have used Performance testing. Performance testing - designed to test the run-time
performance of software, especially real-time software.
Performance Testing
This is designed to test the run-time performance of software within the context of an
integrated system. Performance testing occurs throughout all steps in the testing process.
Our system is checked for high load as well as low load.
Statistical Testing
Statistical Testing is used to test the programs performance and reliability and to check
how it works under operational conditions. Tests are designed to reflect the actual user
inputs and their frequency.
The stages involved in the static analysis for this system are follows.
Control flow analysis
Unreachable code
90
Declared variables
Interface analysis
7.3
TEST CASES
A test case is a set of conditions or variables and inputs that are developed for a particular
goal or objective to be achieved on a certain application to judge its capabilities or
features.
It might take more than one test case to determine the true functionality of the application
being tested. Every requirement or objective to be achieved needs at least one test case.
Some software development methodologies like Rational Unified Process (RUP)
recommend creating at least two test cases for each requirement or objective; one for
performing testing through positive perspective and the other through negative
perspective.
90
Chapter 8
SCREEN SHOTS AND USER MANUAL
______________________________________________
90
ADMISSION MODULE
90
At the time of admission students information like personal details, contact details,
admission details and education details are saved in the database and the student id is
generated by the system.
90
In fetch mode as you can see when you click on the student id LoV it will display
the list of students information (student id and name) according to the type of attribute
you select whether it is student id or it may be student name. Now from the list of the
students in the LoV you can select any one student and on that basis you can fetch his/her
information.
90
In fetch mode according to student id you select from the LoV (list of values), when
you click on the fetch all the information of the student will be displayed on the screen as
shown in the figure.
90
Fig 8.4 Screen shot showing validation in new admission in save mode
In Add Mode if mandatory fields are not mentioned and the user try to save, then
system will prompt to fill the mandatory fields.
90
In Saved mode, after clicking the Save button from the Button Bar, system will pop
up a message box showing the current Student ID generated.
90
EXAMINATION MODULE
In this screen, the menu is shown which contains the entire screen module wise and
this menu is auto hidden when a screen name is clicked from the menu.
90
Fig 8.7 Screen shot showing Subject Master Screen in Add mode
In add mode, the subject code and subject name are mandatory and text book and
reference book name, description are optional.
90
Chapter 9
LIMITATIONS AND ENHANCEMENTS
______________________________________________
9.1 LIMITATIONS
90
The part of the system can be implemented using the current technology although
some modifications had to be done at various places. At various places some alterations
with the prototypes and functionalities would be done in order to work out the cost
constraints and to cope with the scheduling constraints.
student.
In this application search is limited to String or by number. Cannot do search by
photo and figure prints.
Chapter 10
90
______________________________________________
10.1 CONCLUSION
90
SIS will be helpful to perform paperless work and manage all data.
This provides easy, accurate, unambiguous and faster data access.
Lesser learning curve - Consistent user interface, customized for the group of
users, statistical information in various graphical and tabular forms.
10.2 DISCUSSION
10.2.1 Self Analysis of Project Viabilities
SIS is a very efficient system for the management of student admission and
examination. Most of all the task of admission and examination can be easily done
with this system. This can be used by any organization.
Also this system uses the latest technologies like AJAX, XML. So it was easy
enough to develop the project. If any changes in the system are to be made then they
can be done very easily.
Problem of creating control using JavaScript were faced during development. But
with help of internal guide and other team members problems were solved.
Moreover the lack of practical know-how of these aspects did cause a few
hindrances in early stages of training but later with the help and guidance of team
members it became easier to cope up with these concepts and applications.
REFERENCES
90
Web Sites
www.msdn.microsoft.com
-Microsoft official website
http://sourceforge.net/
- Largest repository of open source code and applications available on the
internet
http://www.gnu.org
- Web site of the Free Software Foundation (FSF) which supports the open
source community
http://www.thefreecountry.com
- Large collection of good programming resources
http://www.1001tutorials.com/
- Large collection of good tutorials for reference
http://www.codeguru.com/
- Good articles on programming.
90
Books
JavaScript In 21 Days
JavaScript Bible
By: Danny Goodman
Software Engineering
By: Ian Somerville
90
..
Sign
Week 2(24th Feb - 2th Mar14)
Remark :
..
Sign
Week 3(3th Mar - 9th Mar14)
Remark :
..
S
ign
Week 4(17th Mar - 23th Mar14)
Remark :
..
Sign
90
..
Sign
Week 6(14th Apr - 20th Apr14)
Remark :
..
Sign
Week 7(28th Apr - 4th May14)
Remark :
..
Sign
90