Professional Documents
Culture Documents
ON
Submitted by:
MASROOR AHMAD
MUNIB FAZAL
MD TAJ RAZA
Department of computer science
Jamia Hamdard (Hamdard University)
2
ACKNOWLEDGEMENT
I extend my gratitude towards him for continuously giving him full Cooperation and
Suggestion for the betterment of the Project as Well as helping me to solve my
difficulties. It was his custom, ever willing help and constant encouragement that made
this study possible; no words are enough to express my sincere thanks to providing
necessary facilities for completion of this Project.
3
MASROOR AHMAD,
MD TAJ RAZA
& MUNIB FAZAL
Place: - Delhi
system, Information is given by the system on the basis of whatever we stored about
relieve the burden of department to almost all extent by providing user friendly, fully
automated, highly recurred software. The main objective of this software is to keep
4
track of information regarding the management of Employee. Here on of the exquisite
techniques of structure design of the database is followed also has some security
checks for reliability. This system generates all designed reports in improved and
more informative format. The input forms have been designed with the view that
SYSTEM SPECIFICATION
MINIMUM HARDWARE SPECIFICATION
Hardware:
Processor : Pentium IV
Ram : 256 MB
Hard Disk : 20 GB
SOFTWARE SPECIFICATION
5
The project entitled "EMPLOYEE MANAGEMENT" is choosen by me because I have a
great interest in management systems and specially the"EMPLOYEE MANAGEMENT
SYSTEM" have its various attractive features which forced me to choose this project.
FEATURES
There are various attractive features of this project which makes its effective and more
acceptable.I give some of these features which will present this software well:-
1.SECURITY: Due to password facility no one other than faculty can access this system
so it makes this system more secure than any other system without password facility.
2.EASY TO UNDERSTAND FOR NEW USER: Due to use of easy coding and
keywords any user can work on this system and access the system data easily if he/she is
a faculty member.
4.EFFECTIVE DATABASES: There are effective concepts of the database in this project
.Due to presence of different databases for different type of data chances of mixing of
data are ery less.
6
TESTING
For this project (Employee Manageme nt System)we are doing two types of testing to
make the project effective and error free.
7
White-box testing: - It is also known as glass-box testing. It is a test design method that
uses the control structure of the procedural design to derive test cases. using white box
testing method ,the s/w engineer can derive test case that:-
Guarantee that all independent path within a module have been exercised at least once
Exercise all logical decisions on their true or false sides.
Execute all loops at their boundaries and within their operational bounds.
Exercise internal data structures to ensure their validity.
8
FEASIBILITY STUDY
All projects are feasible – given unlimited resources and
infinite time. Unfortunately, the development of a
computer – based system is more likely to be plagued by a
scarcity of resources and difficulty delivery dates. It is
both necessary and prudent to evaluate the feasibility of
the project at the earliest possible time. Months and years
of effort, thousands or millions of dollars, and untold
professional embarrassment can be averted if an ill-
conceived system is recognized early in the definition
phase.
In this phase, the development team visits the customer and studies their need. By the end
of the feasibility study, the team furnishes a document that holds the different specific
recommendations for the candidate system. It also includes the personnel assignments,
costs, project schedule, and target dates. The requirements gathering process is intensified
and focused specially on software. To understand the nature of the program(s) to be built,
the system engineer (“analyst”) must understand the information domain for the software,
as well as required function, behavior, performance and interfacing.
9
An Important step before choosing the software paradigm is to investigate
whether the system requested is feasible. We studied the feasibility of the
project to determine whether the software tool requested by the Placement
Department was feasible or not!!! The following three main considerations
were taken into account
as shown in Fig. below:
Technical Feasibility
Economical Feasibility
Behavioral Feasibility
FEASIBILITY
STUDY
TECHNICAL
FEASIBILITY
ECONOMIC
FEASIBILITY
BEHAVIORAL
Figure Feasibility Study
FEASIBILITY
10
Technical Feasibility
Economical Feasibility
This is an in house project and is going to be used inside the organization by its
Placement Department. A cost analysis of the project was done. All the costs and
benefits associated with the software were considered. It was found that the
software would result in increased productivity for the business. Overall it was
conducted that the benefits outweigh the costs associated with the software. Hence,
software is economically feasible.
Behavioral Feasibility
The staff of the organization was open-minded towards the acceptance of this new
concept. No specialized training would be needed, only a few hours of instructed
demo needs to be given to the user. Hence, the software exhibits behavioral
feasibility.
Time Estimates
Time is a very critical factor and as mentioned before in the project constraints, the time
available for the completion wasn’t overly adequate. However, the major tasks were
identified and time estimates were planned. Using tools such as Gantt charts and Project
tables, once can keep track of the time allocated. Using project tables, one can keep tab
on the labor as well. These charts and tables can be prepared for the whole project or for
individuals or even for separate functions.
REQUIREMENT ANALYSIS:
Requirement analysis is done in order to understand the problem the software system, is
to solve. The problem could be automating an existing manual process, developing a
new automated system, or a combination of two. For large systems that have many
11
features, and that need to perform many different tasks, understanding the requirements
of the system is a major task.
There are two major activities in this phase: problem understanding or analysis
and requirement specification. In problem analysis the analyst has to understand the
problem and its context. A clear understanding is needed of the important data entities
in the system, major centers where the action is taken, the purpose of the different
actions that are performed, and inputs and outputs.
Environmental, and security reasons. In other words, besides the functionality required
from the system, all the factors that may affect the design and the proper functioning of
the system should be specified in the requirement document. A
preliminary user manual that describes all the major user interfaces frequently forms a
part of requirement document.
12
METHODOLOGY TO BE USED CARRYING OUT THE STUDY
13
Project Overview
Product prospective
It will be able to manage information about Employee in more user friendly way. This
system will manage Employees information at various field offices. User ID and
password has been given to all the field offices so that they can enter their employee’s
information into central database. Their access to the central database is restricted to
their information only. Various reports based on the data entered by employees at field
offices are generated at Head Quarter. These reports are helpful in Manpower
management decisions.
User Interface
User will have to select the options form the given menu.
Product Function
14
It is advisable to have weekly data backups. The system administrator will do the data
recovery. Selection of panel is user-initiated operation, while indent handling is client
initiated
Constraints
General Constraints
1) This system will not take care of any virus problem, which
might occur either on the client or the server system.
Avoiding the use of pirated software and ensuring that
floppies and other removable media are scanned for viruses
before use could minimize the possibility of viral infection.
15
3. The use of pirated software should
be avoided as it may lead to data loss
and system crashes due to viral
infections.
OPERATIONAL MANUAL:
To use this system, there is a user identification number to each user of the system. There
is a password facility and different persons are given access according to their roles.
MODES:
Most of the modules work under five modes. They are Insert, Updation, Retrieval,
Deletion and Exit.
16
INSERT MODE: This mode allows insertion of new records. Integrity of database is
maintained and no duplicate records can be entered. A message will flash indicating the
error.
DELETE MODE: This mode allows deletion of a particular record depending upon the
primary key.
RETRIEVAL MODE: This mode allows the retrieval of records with the help of
retrieval arguments.
UPDATION MODE: This mode allows the Updation of records and if any, Integrity
violation is there, and no changes are committed.
17
THE WATER FALL MODEL
18
The waterfall model derives its name due to the cascading
This Model each phase well define starting and ending point
1. REQUIREMENT PHASE
2. SPECIFICATION
3. DESIGN
4. IMPLEMENTATION
5. INTEGRATION
6. MAINTENANCE
NOTE
19
UPDATED
REQUIRMENT
REQUIREMENT PHASE
SPECIFICATION PHASE
DESIGN PHASE
IMPLEMENTATION PHASE
INTEGRATION PHASE
MAINTENANCE PHASE
20
1. REQUIREMENT PHASE
i) In this phase problem is specified along with desired services
Objectives (goals)
2. SPECIFICATION PHASE
i) In this phase system specification is produced.
As single phase.
3. DESIGN PHASE
21
DATA SRUCTURE
SOFTWARE ARCHITECTURE
ALGORITHMIC DETAIL
INTERFACE REPRESENTATION
The hardware requirements are also determined at this stage along with a picture
of the all over system architecture. By the end of this stage the software engineer
should be able to identify the relationship between the hared ware and soft ware
and the associated interfaces. Any fault in the specification should ideally not pass
down the stream.
In this stage, all the program units are integrated and tested to ensure that
the complete system meets the software requirements.
22
AFTER THIS STAGE THE SOFTWARE IS DELIVERED TO THE
CUSTOMER,
6. MAINTENANCE PHASE
NOTE
23
ITS DOCUMENTATION DRIVEN, THAT IS ITS DOCUMENTATION IS
PRODUCED AT EVERY STAGE.
LIMITATIONS
The waterfall model is the oldest and the most widely used paradigm. However
projects rarely follow its sequential flow. This due to the inherent problems
associated with it rigid format
ii) As the client usually only has a vague idea of exactly what is required
from the software project, this WM has difficulty accommodation the
natural uncertainty that exist at the beginning of the project
iii) The customer sees a working version of the project after it has been
coded. This may result in disaster if any undetected problems are
precipitate to this stage
iv) It is at time difficult for the client for the client to explicitly state the
requirement as a Result, modification is performed at every stage which
consume lot of time and resources
DFD (0 LEVEL)
24
EMPLOYEE DATABASE REPORTS
INFORMATION
USER
EMPLOYEE SEARCHING
UPDATE
INFORMATION
TRANSACTION
25
26
27
DFD (Ist Level)
EMPLOYEE
GETS
INFORMATION
CHEEK EMPLOYEE
EMPLOYEE MANAGEMENT CALCULATE
CODE SYSTEM PAY
DATABASE
EMPLOYEE
ATTENDENCE
CALCULATE
PAY
GETS CHEEK
EMPLOYEE
ATTENDENCE
SEARCH
EPLOYEE’s
GET USER
INFORMATION,
INFORMATIO
ATTENDENCE,
N
TRANSITION &
USER INFORMATION
USER
INFORMATION
REPORT
28
e1
EMPLOYEE WORKS FOR
DEPARTMENT
e2
r1 d1
e3
r2
d2
e4
r3
d3
e5 r4
r5 d4
e6
d5
r6
d6
e7
r7
d7
30
31