Professional Documents
Culture Documents
COLLEGE SHIKARPUR
[Affiliated By Ch. Charan Singh University,Meerut]
A
Project Report
On
TRANSPORT SYSTEM
• Certificate ……………………
• Acknowledgement ……………………
• Student declaration ……………………
• Objective of project ……………………
o User problem
o Solution of user problem
• Needs of computerization …………………...
• System development life cycle……………….
o Introduction
o SDLC ten phases
Initial phase
Conceptual proposal
Planning phase
Requirement analysis
Designing phase
Development phase
Integration test phase
Implementation phase
Operation and Maintainence
• Data flow diagram …………………...
• Entity relationship diagram………………….
• Hardware & software used…………………..
• Backend ……………………
• Screen shots (Designing) ……………………
• Result reports ……………………
• Coding ……………………
• Conclusion ……………………
o Result
o Conclusion
• Scope ……………………
• Bibliography ……………………
Transportation System S.S.P.G. COLLEGE SHIKARPUR
CERTIFICATE
Signature of guide/Supervisor
Mrs.Seema Sachan
Head of
Deptt. Of Computer Science
S.S.P.G. College Shikarpur
We heartfelt love to our dearest parents and other family members and our
team members whose blessing, constant inspiration, encouragement and
cooperation has being a source of inspiration for us.
for the award of any other degree/diploma of any university. It has been
made for partial fulfillment of the requirement
Objective of a
project
USER PROBLEM:
• Possible damage of peper carrying the information and hence the chance of
losing valuable information
Software
development life cycle
[SDLC]
Maintenance
Testing
Coding
Design
Risk Analysis
Problem Definition
2.1 INTRODUCTION
Transportation System S.S.P.G. COLLEGE SHIKARPUR
The SDLC includes ten phases during which defined IT work products are
created or modified. The tenth phase occurs when the system is disposed of
and the task performed is either eliminated or transferred to other system. The
tasks and work products for each phase are described in subsequent
chapters. Not every project will require that phases be sequentially executed.
However, the phases are interdependent. Depending upon the size and
complexity of the project, phases may be combined or may overlap.
• Identify and assign the roles and responsibilities of all involved parties,
including functional and technical managers, throughout the system
development life cycle.
System Boundary Document identifies the scope of the system and requires
Senior Official approval and funding before beginning the Planning Phase.
The physical characteristics of the system are designed during this phase. The
operating environment is established, major subsystems and their inputs and
outputs are defined, and processes are allocated to resources. Everything
requiring user input or approval must be documented and reviewed by the
user. The physical characteristics of the system are specified and a detailed
design is prepared. Subsystems identified during design are used to create a
detailed structure of the system. Each subsystem is partitioned into one or
more design units or modules. Detailed logic specification is prepared for each
software module.
The detailed specifications produced during the design phase are translated
into hardware, communications, and executable software. Software shall be
2.3.1 OBJECTIVE
2.4.1 OBJECTIVE
System Concept Development begins when the Conceptual Proposal has been
formally approved and requires study and analysis that may lead to System
development activities.
The review and approval of the Concept Proposal begins the formal studies
and analysis of the need in the System Concept Development Phase and
begins the life cycle of an identifiable project.
2.6.1 OBJECTIVE
The Requirement Analysis Phase will begin when the previous phase
documentation has been approved or by management direction.
Documentation related to user requirement from the planning phase shell be
used as the basis for further user needs analysis and the
Development of detailed user requirements. The analysis may reveal new
insights into the Overall information system requirements, and, in such
instances, all deliverables should be revised to reflect this analysis. During the
Requirement Analysis phase, the system shall be defined in ore detail with
regard to system inputs, processes, outputs, and interfaces. This definition
process occurs At the function level .The system shall be described in terms of
the function to be performed, not in terms of computer programs, files, and
data streams. The emphasis in this phase is on determining what function
must be performed rather than how to perform those functions.
First consolidate and affirm the business needs. Analyze the intended use of
the system
And specify the functional and data requirements. Connect the functional
requirements to the data requirements. Defines functional and system
requirements that are not easily
Expressed in data and process models Refine the high level architecture and
logical design to support the system and functional requirement.
A logical model is constructed that describes the fundamental processes and
data needed to support the desired business functionality. This logical model
will show how processes interact and how processes created and use data.
These processes will be derived from the activity descriptions provided in the
System Boundary Document.
Functions and entity types contained in the logical model are extended and
refine from those provided in the Concept Development Phase. End-user and
business areas experts will evaluate all identified processes and data
structures to ensure accuracy, logical consistency, and completeness. An
analysis of business activities and data structure perform to produce entity-
relationship diagrams, process hierarchy diagrams, process dependency
diagrams, and associated documentation. An interaction analysis produce
Process logic and action diagrams, definitions of the business algorithms,
entity life-cycle diagrams, and entity state change matrices .A detailed analysis
of the current technical architecture, application software, and data is
conducted to ensure that limitation or
Unique requirements have not been overlooked.
Include all possible requirements including those for:
• Functional and capability specifications, including performance, physical
characteristics, and environmental conditions under which the software item is
to perform;
• Interfaces external to the software item;
• Safety specification, including those related to methods of operation and
maintenance, environment influences, and personnel injury;
Transportation System S.S.P.G. COLLEGE SHIKARPUR
Security specification, including those related to compromise of
sensitive information;
• Human-factors engineering, including those related to manual
operations, human- equipment interactions, constraints on personnel, and
areas needed concentrated human attention, that are sensitive to human
errors and training;
2.8.1 OBJECTIVE
The objective of the development phase will be to convert the deliverables of
the design phase into a complete information system. Although much of the
activity in the development phase addresses the computer programs that
make up the system, this phase also puts in place the hardware, software, and
communications environment for the system and other important elements of
the overall systems.
The activities of this phase translate the system design produced in the design
phase into a working information system capable of addressing the information
system requirements. The development phase contains activities for building
the system, testing the system, and conducting functional qualification testing,
to ensure the system functional processes satisfy the functional process
requirements in the
The results of the audits shall be documented. If both hardware and software
are under development of integration, the audits may be postponed until the
System Qualification Testing. Upon successful completion of the audits, if
conducted, update and prepare the deliverable software product for System
Integration, System Qualification Testing, Hardware Installation, or Software
Acceptance Supports as applicable. Also, establish a baseline for the design
and code of the software item.
Transportation System S.S.P.G. COLLEGE SHIKARPUR
• Integrate System
Integrate the software configuration items with hardware configuration items,
manual operations, and other systems as necessary, into the system. The
aggregates shall be tested, as they are developed, against their requirements.
The integration and the test results shall be documented. For each
qualification requirement of the system, a set of tests, test cases (inputs,
outputs, test criteria), and test procedure for conducting System Qualification
Testing shall be developed and documented. Ensure that the integration
system is ready for System Qualification Testing.
• Install Software
Install the software product in the target environment as designed and
2.9.1 OBJECTIVE
The objective of this phase is to prove the developed system that the
developed system satisfies the requirements defined in the FRD. Several
types of tests will be conducted in the phase. First, Subsystem integration
tests shall be executed and evaluate by the development team to prove that
the program components integrate properly into the subsystems and that the
subsystems integrate properly into a application. Next, the testing team
conducts and evaluates system tests to ensure the developed system meets
all technical requirements, including performance requirement. Next, the
testing team and the security program manager conduct security tests to
validate that the access and data security requirements are met. Finally, users
participate in acceptance testing to confirm that the developed system meets
all user requirements as stated in the FRD. Acceptance testing shall be done
in a simulated “real” user environment with the users using simulating or real
target platforms and infrastructures .
The test and evaluation team is responsible for creating/loading the test
database(s) and executing the integration test(s). This is to ensure that
program components integrate properly into the subsystems and the
subsystem integrates properly into an application.
During this phase, the systems technical lead or the developers will finalize the
software development document from the development phase. He/They will
also finalize the operations or systems administration manual, user manual,
training plan maintenance manual, conversion plan, implementation plan ,
contingency plan and update the interface control document from the design
phase. The project manager should finalize the system security plan and the
security risks assessment form the requirement analysis phase and the project
management plan from the planning phase. The configuration manager should
finalize the configuration management
plan from the planning phase. The quality assurance office/person should
finalize the quality assurance plan from the planning phase. And finally, the
project manager should finalize the cost benefit analysis and the risk
management plan from the system concept development phase.
2.10.1 OBJECTIVE
In the phase, the system or system modification are installed and made
operational in a production environment. The phase is initiated after the
system has been tested and accepted by the user and project manager.
Activities in the phase include notification of implementation to end users,
execution of the previously defined training plan, Data Entry of Conversion,
and post implementation review. This phase continues until the system is
operating in production in accordance with the defined user requirements.
The new system can fall into three categories, replacement of a manual
process, replacement of a legacy system, or upgrade to an existing system
regardless of the type of system, all expects of the implementation phase
should be followed. This will ensure the smoothest possible transition to the
organization’s desired goal.
2.11.1 OBJECTIVE
More then half of the life cycle costs are attributed to the operations and
maintenance of systems .In this phase, it is essential that all facets of
operations and maintenance are performed. The system is being used and
scrutinized to ensure that it meets the needs initially stated in the planning
phase. Problems are detected and new needs arise. This may require
modification to existing code, new code to be developed and/or hardware
configuration changes. Providing user support is an ongoing activity. New
users will require training and other will require training as well. The emphasis
of this phase will be to ensure that the users needs are met and the system
continues to perform as specified in the operational environment. Additionally,
as operations and maintenance personal monitor the current system they may
become aware of better ways to improve the system
And therefore make recommendations. Changes will be required to fix
problems, possibly add features and make improvements to the system. This
phase will continue as long as the system is in use.
input data and output data and databases are correct and continually checked
for accuracy and completeness. This includes ensuring that any regularly
scheduled jobs are submitted and completed correctly. Software and
databases should be maintained at (or near) the current maintenance level.
The backup and recovery processes for databases are normally different
Then day-to-day DASD volume backups. The backup and recovery processes
of the databases should be done as a data/Software administration tasks by a
data administrator.
A checklist of data /Software administration tasks and activities are:
(DFD)
Data Flow Diagrams
E R Diagram
These are the people, places, things, events and concepts of interest to an
organization. In short,
anything which an organization needs to store data about.
Entity relationship diagrams are the abstractions of the real word, which
simplify the problem to be
solved while retaining its essential features.
There are three type of relationship, which can exist between two different entities:
• One-to-One Relationships
• One-to-Many Relationships
• Many-to-One Relationships
• Many-to-Many Relationships
Primary Key is defined as that unique key that is unique in the whole table
and that cannot be null and duplicate in any circumstances.
Foreign Key is defined as the key that is particularly primary key in other
table and represent as a field in this current table.
Entity
Entity An entity is an object or concept about which you
Want to store information.
Weak Entity
Entity A weak entity is dependent on another entity to exist
Attributes
Attribute Attributes are the properties or characteristics of an
Entity.
Key Attributes
Attribute A key attribute is the unique, distinguishing
Characteristic of the entity. For example, Student’s
Roll No. might be the Student’s key attribute.
Transportation System S.S.P.G. COLLEGE SHIKARPUR
Multi valued attribute
Attribute A multi valued attribute can have more than one
value. For example, an employee entity can have
multiple skill values.
Derived attribute
Attribute A derived attribute is based on another attribute. For
example, an employee’s monthly salary is based on
the employee’s annual salary.
Relationship Relationships
Relationships illustrate how to entities share
information in the database structure.
HARDWARE &
SOFTWARE USED
This Software can run within any windows platform which are hire to the
windows 9.x. this Software needs at least 400 Mhz or hire Processor . RAM
required more then 32 MB for best performance, at least 2.1 Hard Disk is
required for installing this Software but it will refer on the amount of the
Database used for this Software, SVGA, display of 1 MB video memory and
color monitor but with this lot of processor power consumed and speed of the
system will be very slow. Therefore a realistic hardware and software
configuration for this Software is:
RAM : 128 MB
Hard Disk : 40 GB
Printer : Laser
# MS-OFFICE.
-> Enterprise Edition: Typical installation 128 MB, full installation 147MB.
-> Additional components (if required): MSDN (for documentation): 67 MB, Internet
Explorer4.x: approximately 66 MB.
Part 6
Database
Screen Shots
Bill Report
Transportation System S.S.P.G. COLLEGE SHIKARPUR
5.2.3 Enquiry Report
Transportation System S.S.P.G. COLLEGE SHIKARPUR
Transportation System S.S.P.G. COLLEGE SHIKARPUR
Transportation System S.S.P.G. COLLEGE SHIKARPUR
5.3.1 Exit Msg
End If
Label4.Caption = ProgressBar1.Value
End If
End Sub
Form7.Hide
Form6.Show
Else
MsgBox "PLEASE INSERT CORRECT PASSWORD "
End If
End Sub
End Sub
End Sub
End Sub
End Sub
Label2.Visible = True
Shape4.Visible = True
Label4.Visible = False
Label5.Visible = False
Label9.Visible = False
Label10.Visible = False
Label14.Visible = False
End Sub
Label5.Visible = True
Label1.Visible = True
Shape2.Visible = True
Label3.Visible = False
Label9.Visible = False
Label10.Visible = False
Label14.Visible = False
End Sub
End Sub
Label4.Visible = False
Shape4.Visible = False
Label5.Visible = False
End Sub
Label5.Visible = False
End Sub
End Sub
Dim cn As Connection
Dim rs As Recordset
End Sub
rs.MoveNext
If rs.EOF = True Then
rs.MoveLast
End If
If IsNull(rs.Fields(0)) = False Then
Text1.Text = rs.Fields(0)
Else
Text1.Text = ""
End If
If IsNull(rs.Fields(1)) = False Then
Text2.Text = rs.Fields(1)
Else
Text2.Text = ""
End If
If IsNull(rs.Fields(2)) = False Then
Text3.Text = rs.Fields(2)
Else
Text3.Text = ""
End If
If IsNull(rs.Fields(3)) = False Then
Text4.Text = rs.Fields(3)
Transportation System S.S.P.G. COLLEGE SHIKARPUR
Else
Text4.Text = ""
End If
If IsNull(rs.Fields(4)) = False Then
Text5.Text = rs.Fields(4)
Else
Text5.Text = ""
End If
If IsNull(rs.Fields(5)) = False Then
Text6.Text = rs.Fields(5)
Else
Text6.Text = ""
End If
If IsNull(rs.Fields(6)) = False Then
Text7.Text = rs.Fields(6)
Else
Text7.Text = ""
End If
If IsNull(rs.Fields(7)) = False Then
Text8.Text = rs.Fields(7)
Else
Text8.Text = ""
End If
If IsNull(rs.Fields(8)) = False Then
Text9.Text = rs.Fields(8)
Else
Text9.Text = ""
End If
If IsNull(rs.Fields(9)) = False Then
Text10.Text = rs.Fields(9)
Else
Text10.Text = ""
End If
If IsNull(rs.Fields(10)) = False Then
Text11.Text = rs.Fields(10)
Else
Text11.Text = ""
End If
If IsNull(rs.Fields(11)) = False Then
Combo1.Text = rs.Fields(11)
Transportation System S.S.P.G. COLLEGE SHIKARPUR
Else
Combo1.Text = ""
End If
If rs!category = "A\C" Then
Option3.Value = True
Else
Option4.Value = False
End If
End Sub
End Sub
End Sub
rs.Fields(0) = Text1.Text
rs.Fields(1) = Text2.Text
Transportation System S.S.P.G. COLLEGE SHIKARPUR
rs.Fields(2) = Text3.Text
rs.Fields(3) = Text4.Text
rs.Fields(4) = Text5.Text
rs.Fields(5) = Text6.Text
rs.Fields(6) = Text7.Text
rs.Fields(7) = Text8.Text
rs.Fields(8) = Text9.Text
rs.Fields(9) = Text10.Text
rs.Fields(10) = Text11.Text
rs.Fields(11) = Combo1.Text
If Option3.Value = True Then
rs!category = "A\C"
Else
rs!category = "NON A\C"
End If
rs.Update
End Sub
End Sub
rs.MovePrevious
If rs.BOF = True Then
rs.MoveFirst
End If
If IsNull(rs.Fields(0)) = False Then
Text1.Text = rs.Fields(0)
End If
If IsNull(rs.Fields(1)) = False Then
Text2.Text = rs.Fields(1)
Transportation System S.S.P.G. COLLEGE SHIKARPUR
End If
If IsNull(rs.Fields(2)) = False Then
Text3.Text = rs.Fields(2)
End If
If IsNull(rs.Fields(3)) = False Then
Text4.Text = rs.Fields(3)
End If
If IsNull(rs.Fields(4)) = False Then
Text5.Text = rs.Fields(4)
End If
If IsNull(rs.Fields(5)) = False Then
Text6.Text = rs.Fields(5)
End If
If IsNull(rs.Fields(6)) = False Then
Text7.Text = rs.Fields(6)
End If
If IsNull(rs.Fields(7)) = False Then
Text8.Text = rs.Fields(7)
End If
If IsNull(rs.Fields(8)) = False Then
Text9.Text = rs.Fields(8)
End If
If IsNull(rs.Fields(9)) = False Then
Text10.Text = rs.Fields(9)
End If
If IsNull(rs.Fields(10)) = False Then
Text11.Text = rs.Fields(10)
End If
If IsNull(rs.Fields(11)) = False Then
Combo1.Text = rs.Fields(11)
End If
Option3.Value = False
Option4.Value = False
If rs!category = "A\C" Then
Option3.Value = True
Else
Option4.Value = True
End If
End Sub
rs.AddNew
Text1.Text = ""
Text2.Text = ""
Text3.Text = ""
Text4.Text = ""
Text5.Text = ""
Text6.Text = ""
Text7.Text = ""
Text8.Text = ""
Text9.Text = ""
Text10.Text = ""
Text11.Text = ""
Combo1.Text = ""
Text10.Text = Date
Text11.Text = Time
End Sub
Transportation System S.S.P.G. COLLEGE SHIKARPUR
Private Sub Command6_Click()
Form1.Hide
Form2.Show
End Sub
End Sub
End Sub
End Sub
End Sub
End Sub
End Sub
End Sub
End Sub
End Sub
End Sub
End Sub
Private Sub Text8_KeyPress(KeyAscii As Integer)
If KeyAscii = 13 Then
Text9.SetFocus
End If
End Sub
Dim cn As Connection
Dim rs As Recordset
End If
End If
Text15.Text = rsfound!category
End Sub
End Sub
rs.AddNew
rs!BOOKINGNO = Text1.Text
rs!Date = Text2.Text
rs!ADDRESS = Text3.Text
rs!PHONENUMBER = Text4.Text
rs!MOBILENUMBER = Text5.Text
rs!NUMBEROFVEHICLE = Text6.Text
rs!KILOMETER = Text7.Text
rs!VEHICLENO = Text8.Text
rs!Time = Text9.Text
rs!Name = Combo1.Text
rs!Source = Text12.Text
rs!DESTINATION = Text13.Text
rs!TYPEOFVEHICLE = Text14.Text
rs!BOOKEDBY = Text10.Text
rs!category = Text15.Text
rs!ADVANCEPAYMENT = Text11.Text
rs.Update
End Sub
Form6.Show
Unload Me
End Sub
Combo1.AddItem rslist!Name
End If
rslist.MoveNext
Wend
End Sub
End Sub
fperkm = Text3.Text
Form4.Show
Unload Me
End Sub
End If
End If
End Sub
Combo1.AddItem rslist!Name
End If
rslist.MoveNext
Wend
End Sub
Dim J As Integer
Maintenance Coding
Transportation System S.S.P.G. COLLEGE SHIKARPUR
Dim cn As ADODB.Connection
Dim rs As ADODB.Recordset
Dim cn As ADODB.Connection
Dim rs As ADODB.Recordset
Dim cn As ADODB.Connection
Dim rs As ADODB.Recordset
Text1.SetFocus
End Sub
End Sub
End Sub
End Sub
End Sub
Dim cn As ADODB.Connection
Dim rs As ADODB.Recordset
End Sub
End If
End Sub
Conclusion
Result:
o Huge data collection, fast data retrieval and easy with the latest
developm
o ent in the information system
o High security of your Software with a Username and Password before
beg
o ging of the Software. With type a proper Username and Password you
o can’t access the Software. Due to This security nobody can make
change
o in your Software
o Huge data may be used to retrieve data for work
Conclusion:
When I was developing the Software there was many problem before me, first the
more coding. When your coding is more you can face many confusions in it. So to
remove the confusions in the Software coding I developed many ActiveX User Control
for saving the coding. Second I wanted to provide better information of error messages.
So due to this reason I used the Microsoft Agent Control 2.0 in the Software.
Once I face a serious problem on my PC that was a virus infection. All the data
have removed from my PC; due to this problem I develop whole Software within
half period.
In conclusion the work carried out by the help of this Software would lead to the
fast accessing of data and highly secured data. The end result of the Software is
working and it retrieves the information very quickly. After installing this Software you
can easily work on the database of Doctor, patient and test Information. So the user
has only to install the Software to their machine.
SCOPE
The scope of this Software is that the Software has developed for
& Passenger detail. This Software fills all the requirements of the
detail with their sample and Transport detail. This Software can be used
Part 8
Bibliography