Download - Student Trainee Management System
STUDENT TRAINEE MANAGEMENTSTUDENT TRAINEE MANAGEMENT SYSTEMSYSTEM
Developed For
National Informatics CentreNew Delhi
A PROJECT REPORT SUBMITTEDIN PARTIAL – FULFILMENT OF THE REQUIREMENT
FOR THE AWARD OF THE DEGREEOF
MASTER OF COMPUTER APPLICATIONMASTER OF COMPUTER APPLICATION
BY
SUMIT PARIAHRSUMIT PARIAHR(04/MCA/30)
COMPUTER SCIENCE ENGINEERING & MCA DEPARTMENTKUMAON ENGINEERING COLLEGE, DWARAHAT 263653, UTTARAKHAND
JUNE 2007JUNE 2007
GOVERNMENT OF INDIAMINISTRY OF COMMUNICATIONS & INFORMATION
TECHNOLOGYDEPARTMENT OF INFORMATION TECHNOLOGY
National Informatics CentreNational Informatics Centre
This is to certify that SUMIT PARIHAR ID.N0 9506 a student Of Master Of
Computer Application (MCA) from KUMAON ENGINEERING COLLEGE
DWARAHAT,UTTARAKHAND is doing his full-semester project training at
TRAINING Division, NIC, New Delhi, from.
The project work entitled ” Design and Development of Student Trainee
Management System” embodies the original work done by Sumit Parihar
during his above full semester project training period.
Rajendra Prasad(Scientist C) Dr. S.C.GuptaProject Guide/HOD Head, Training Division
3
CERTIFICATE
This is to certify that the Project report entitled STUDENT TRAINEE MANAGEMENT SYSTEM submitted by SUMIT PARIHAR, to the Computer Science Engineering Department, Kumaon Engineering College, Dwarahat, for the award of degree of MCA, is a bonafide project work carried out by him.
This project work has been carried out under the supervision of ______ in the ________________ organization. This work is original and has not been submitted, in part or full, to any other University or Institution for the award of any other degree.
Student Supervisor
4
DECLARATIONS
I, Sumit Parihar hereby declare that the project entitled “Design and Development of Student Trainee Management System” which have to be submitted in the partial fulfillment of the requirements for the awards of Master Of Computer Application in the Kumaun University Nainital, is an own record carried out by me under the supervision of my teacher DR Rajiv Aggarwaal HOD (Comp .Sc). The matter embodied in this project has not been submitted so far for the award of any degree.
(Sumit Pairhar)Signature
5
Acknowledgements
I deem it is my proud privilege to express my sincere regards and gratitude to ‘NIC Training Division’ for providing this valuable opportunity to pursue the training at their place. Training at NIC is real implementation of knowledge & practical experience.I feel privileged to offer my sincere thanks and deep sense of gratitude to Dr S.C.Gupta, Head Training Division at Training Division, NIC, for expressing their confidence in me by letting me work on a project of this magnitude and using latest technologies and providing their support, help & encouragement in implementing this project. I am grateful for the co-operation & valuable suggestions rendered by Mr Rajendra Prasad and all the staff members of the National Informatics Centre, New Delhi and my team members.
Sumit Parihar
6
PrefacePreface
This project is intended to computerize and provide information about the current status of the Trainees. This is exclusive and live s/w that gives various facilities to the user i.e. the user can fill his form online. The project is divided into various sections that present a clear picture of the system. Simplicity is more Importance while designing. All possible aspects of the system are taken into consideration. User friendliness is aimed in this project. The project is developed in one source platform, using JSP, Hibernate and SQLServer 2005.
Java is a general-purpose class based, object oriented programming language. It isDesigned to be the simple enough that many programmers can achieve fluency in the language. The main Advantages of Java is its platform independent property. This made Java a powerful tool as it can adapt to any change in environment.In discussing Java, it is important to distinguish between the Java programming language, The Java Virtual Machine (JVM), and the Java platform. The Java programming language is the language in which Java application (applets, servlets etc.) are written
Java Server Pages, also known as JSPs are simple but powerful technology used to generate dynamic HTML on severs side. They are a direct extension of Java Sevlets and provide a way to separate content generation from content presentation. The JSP engine is just another Servlet that is mapped to the extension *.jsp.
Hibernate is a free, open source Java package that makes it easy to work with relational databases. Hibernate makes it seem as if your database contains plain Java objects like you use every day, without having to worry about how to get them out of (or back into) mysterious database tables. It liberates you to focus on the objects and features of your application, without having to worry about how to store them or find them later
SQL Server 2005 introduces an integrated suite of management tools and management application programming interfaces (APIs) to provide ease of use, manageability, and support for operating large-scale SQL Server deployments.
7
ABSTRACT
Project Title: StudentStudent Trainee Management SystemTrainee Management System.
Abstract:The project entitled “ STUDENT TRAINEE MANAGEMENT SYSTEM” is a web based application software for online registration of student willing to do full semester project work at NIC. This Trainees Management System is also for maintaining the record of students at Training Division and to generate the various reports acquired by the other departments of NIC .It consist of four modules as given below
Data Entry Data Processing MIS Reports
The Data Entry module contains seven forms namely new Student Information Entry
form, HOD detail form, institute detail form, student detail form, HOD requirement form,
stipend sanction form, software details form, monthly stipend entry form. With the help
of this module we can register new trainee, modify, delete and view existing records.
Data Processing module contain two form namely Student Selection and Selection
According HOD. In this module we basically process the data entered with the help of
data entry module.
MIS Module contains only one form .In this module we get the list of total no of
students who get selected in NIC for training. It provides name, batch, joining, and
selection information of all the trainees who applied in NIC.
Report module deals with report generation. It consist of forms for the generation of
various reports like student report, HOD report, stipend report, institute report,
miscellaneous report including monthly stipend report of a batch, complete student
stipend report, eligible candidates report etc. This Module is Under Construction.
8
Components assigned:
The components assigned include the enhancement of the existing modules and to make
an interface for generating the reports. The enhancement of the existing module contains
the layout design of web form with addition of Graphical user interfaces. In enhancement
module various changes have to be included as given below:
Authentication Form Applicant’s Interfaces Form Manipulation Interface Form Searching Interface Form
The Report Module contains the various forms for the generation of reports, as given below:
Student Reports Institute Reports HOD Reports Miscellaneous Reports
Tools & Technologies used :
JDK 1.5 Servlet Java Server Pages (JSP)-2.0 Hibernate 3.1 Tomcat –5.0.28 MS SQL Server2005 Microsoft SQL Server 2005 Driver for Hibernate iReport Generator
Keywords: SERVLET, JAVA BEANS, JSP,POJO, MANAGEMNET SYSTEM,
9
CONTENTS Page no
Chapter 1: Company Profile ………………………………………………………. 11
1.1 About NIC
Chapter 2: Introduction to project………………………………………………… 22
2.1 Brief description
2.2 Objectives
2.3 System Study
2.3.1 Existing System with Limitation
2.3.2 Proposed System with Objectives
2.4 System Feasibility
2.4.1 Technical Feasibility
2.4.2 Operational Feasibility
2.4.3 Economical Feasibility
Chapter 3: Component Assigned…………………………………………………… 29
3.1 Modules Assigned
3.2 Report Design
3.3 Designing Reports
Chapter 4: Technology Environment..…………………………………………….. 33
4.1 Hardware Software Requirement Specification
4.1.1 Development Desktop Requirement
4.1.2 Client Requirement
4.1.3 Server Requirement
Chapter 5: System Requirement and Specification ………………………………. 36
5.1 Introduction
5.2 Requirements specifications
5.3 Technical Architecture
5.4 Design Specifications
5.4.1 System Flow charts
5.4.2 Data Flow Diagrams
5.4.3 ER Diagram
Chapter 6: System Design………………………………………………………….. 62
6.1 Introduction
6.2 Project Module Design
6.3 Database Design
6.4 Screen Design & Shots
Chapter 7: System Security ………………………………………………………….92
7.1 Introduction
7.2 Project Security
Chapter 8: System Testing and Implementation…………………………………….96
8.1 Introduction
8.2 Test Cases
Chapter 9: Project Legacy…………………………………………………………..100
Chapter 10: Discussion ………………………………………………………………102
10.1 Conclusions
Chapter 11: References……………………………………………………………….105
11
11
Company Profile
National Informatics Centre (NIC) o f the Department of Information Technology is providing network backbone and e-Governance support to Central Government, State Governments, UT Administrations, Districts and other Government bodies. It offers a wide range of ICT services including Nationwide Communication Network for decentralized planning, improvement in Government services and wider transparency of national and local Governments. NIC assists in implementing Information Technology Projects, in close collaboration with Central and State Governments, in the areas of (a) Centrally sponsored schemes and Central sector schemes, (b) State sector and State sponsored projects, and (c) District Administration sponsored projects. NIC endeavors to ensure that the latest technology in all areas of IT is available to its users .
Genesis
The Electronics Commission and the DOE put forward a proposal to
UNDP for assistance to set up a National Computer Centre in Delhi for
bui lding up national databases, developing the methodologies for ut i l iz ing
these, and for defining the various options and paths in decision-making
at the national level. A UNDP team visited Delhi in March 1975 to study
the proposal. The UNDP agreed to fund the National Informatics Centre
to the extent of US $4.4 mil l ion for the purchase of a large computer
system (costing approximately US $3.3 mil l ion), other hardware, training,
the services of experts, etc.
The 1976-’77 Annual Report of the DOE noted:
‘ In view of this, act ion has been taken to proceed with the prel iminary
work relat ing to the National Informatics Centre so that when UNDP
f inancial assistance becomes avai lable and the major hardware is
commissioned ( in 1978 on the basis of current information), the Centre
can get on with i ts work on an expedit ious basis. NIC is a plan project
13
13
administered by the Information, Planning and Analysis Group (IPAG) of
the Electronics Commission in i ts ini t ial stages’.
Objective
The long-term object ive of the National Informatics Centre, as approved
by the Planning Commission, Ministry of Finance and the Electronics
Commission, is ‘ to establ ish the feasibi l i ty of a system for the provision
of detai led information to government ministr ies and agencies to assist
them in making decisions relat ing to the country’s economic and social
development planning and program implementation’. (Annual Report of
the Department of Electronics, Government of India, 1977-’78, p172.)
NIC was set up with the object ive to promote economic, social, scienti f ic
and technological act ivi t ies, and also for macro-economic adjustment
program of the Government, through the applicat ions of IT.
Mandate
As laid down in the Annual Reports of DOE 1976-'77 and 1977-'78, NIC
was given the mandate to
Provide this informatics service to various user agencies in Government
Play a promotional role in creating appropriate information systems in Government
Act as a focal point for developing, managing and operating information system in Government
Act as a focal point for development of methodologies for designing and implementing national information systems and data management techniques
Act as a focal point for maintaining inventories of primary data and computer-based systems for data col lect ion and dissemination
Train users in information systems, data management and computing techniques
Ten information systems were planned for development by NIC in the fol lowing sectors:
Agriculture Construct ion and Transport Education and Manpower Energy
14
14
Finance Industry Small-Scale Industr ies Socio-Economic Index Trade and Media Government Archival Information
With this, NIC embarked on a grandiose mission to develop various
national databases for use in planning and decision-making by the
government.
Evolution
Start ing as a small program under an external st imulus by an UNDP
project in early 1970s, NIC started functioning in 1977 and since then
i t has grown incremental ly and later exponential ly as one of India’s
major S&T Organizations promoting Informatics-led Development,
which has helped to usher in the required transformation to cope
with the trends in the new mil lennium .
NIC has played an important role of an active catalyst and facilitator in
informatics development program in Governments at the national, state
and distr ict levels, during the last 26 years which made them take pol icy
decisions to create knowledge societ ies – societ ies that can exploit
knowledge to derive competit ive advantage using the opportunit ies
provided by digital technology. NIC has been instrumental in adopting
Information Technology and Communication Technology to reach out into
India i .e. by implementing IT appl icat ions in Social and Public
Administrat ions.
15
15
Services & Products
Computer Aided Design
CollabCAD is a 3D CAD/CAM Software system for the collaborative design & development of Industrial Designs from the Computer Aided Design (CAD) Group of National Informatics Centre (NIC), the IT supports professionals from India.
CollabCAD Advantages:
Collaborative & Comprehensive Economical CAD Solutions Flexible & Easy to Use Database Connectivity Programmable Scripting Interface Powerful Reverse Engineering Slicing/Cross sectioning, Generating Cross section points Customizable User Interface Standard Data Exchange Formats VRML Preview BAR Code for ERP Solution Plot Configurator and BOM XML based geometry data storage and Database connectivity Multiple language (English, French, German, Spanish, Norwegian and Italian)
support Content Management System and Work Flow Interface to Enterprise Automation Application
16
16
Geographical Information System (GIS)
Through its GISNIC software, NIC offers to undertake the tasks to generate and plot
various types of thematic maps (Flow Lines maps, Graduated Symbol maps, Choropleth
maps, Pie charts and Bar charts). The various tasks related to geographic analysis such as
creation of buffer zones, performing polygon overlay and manipulating tabular data, are
also carried out using GISNIC.
GOV.IN Domain Registration
This website provides Information & Services with respect to GOV.IN Domain. The use
of GOV.IN Domain is restricted to the constituents of Indian Government at various
levels right from Central, State/UT, and District & Sub-District. National Informatics
Centre (NIC) is the exclusive Registrar for GOV.IN domain names.
17
17
Informatics
1. Biomedical Informatics
A Centre jointly setup by NIC and ICMR to cater to the information needs of
Medical community of India.
2. Patent Informatics
Website: http://patinfo.nic.in
It is one of the most comprehensive databases on the Patent Bibliography. This
database is known as EPIDOS (European Patent Information and Document
Service). European Patent Office (EPO) publishes this database. EPO has been
receiving the bibliography of all the patents filed and granted in approximately 71
countries since 1968. It contains over 33 millions references from 1968 onwards.
Almost 3 millions references are added each year.
3. Rural Informatics
Since time immmemorial, India has been a land of village communities. With
more than 75 percent people living in rural areas, no development, can be
successful unless it focuses on rural areas and rural people. In 1986, National
Informatics Centre introduced IT to facilitate planning, monitoring and exchange
of information between various agencies in Rural Development administration.
The journey towards evolution of Rural Informatics witnessed several ups and downs.Insight is an effort to Harness Past Experiences, Share Best Practices and Standardize Processes of Rural Informatics
18
18
Internet Data Centre (IDC)
Website: http://idc.nic.in
With more and more business processes and citizen services operating over the net,
demand for protection of data has risen with efficient backup and recovery solutions.
Thus there is a need to set up a strategic infrastructure that facilitates high
availability, quick scalability, efficient management & optimized utilization of
resources. To fulfill the need, NIC has set up state of art Internet Data Centers at NIC
Hq, New Delhi and 29 small data centers at various state capitals to cater the services
to Government entities. NIC Internet Data Centers combine around-the-clock systems
management with onsite personnel trained in the areas of Server Administrators,
Database Administrators, Internet, and systems management.
Mathematical Modeling and Simulation
Website: http://modelling.nic.in
In order to propagate and promote, the scientific decision making as a process, full
fledged division, taking care of the following major activities for the government
departments (central and state as well as public sector undertakings) is operational
in NIC Headquarters from its inception.
The Mathematical Modelling & Simulation Division has developed infrastructure
facilities and expertise in the area of computer aided modelling techniques using
state-of-the-art quantitative quantitative and simulation techniques besides
development of Business Intelligence (BI) applications and providing consultancy
and trainings .
19
19
For planning in a dynamic economic environment and choice among strategic
option(s), the use of quantitative, qualitative, management and simulation techniques
for a scenario generation has been well established and been used world wide .
Computer Aided Model(s) and Decision support system (s) DSS have been widely
used by planners, policy makers, administrators and academicians for strengthening
the decision making as a process. Computer systems linked with powerful computer
communication network have further increased the utility and operationalization of
such systems worldwide.
The two major areas of support includes:
Quantitative Modelling & Simulation
Business Intelligence for Competitive Advantage
Networking
Website: http://satcom.nic.in.
National Informatics Center is the nodal Information Technology organization for
informatics development and networking in Government and Government related
Organizations. NICNET facility has been established in all Central Government
departments, 35 States/UTs and about 600 District centers to facilitate informatics
development for decision support and information exchange. A high speed NICNET
National info-Highway, an incremental overlay over the existing network had been
setup with SCPC , FTDMA, TDMA VSATs, DVB Broadband VSAT technology and
Wireless MAN to take advantage of Internet technology in India.
Services Corporate Communications Internet/Intranet E-mail EDI Web enabled database access Emergency voice communication Data broadcast
20
20
Multimedia broadcast Multicasting Distance Learning
Office Procedure Automation (OPA)
Easy Tracking System OPA is a comprehensive package developed to help monitor pendency of cases and assist in easy tracking of letters and files. It is an integrated package which gives administrative support right from diarising of receipts, updating its status, opening of new files, tracking the movement of the files, despatch of letters/ files and finally record management. It is based on Manual of Office Procedure and is a proven system for Government / Semi-Government Offices and Public Sector Organizations. Highlights Complete Software Solution for:
Electronic File System by automating all File related operations Diarisation of Receipts/Despatches Tracking of Files & Receipts Pendency Monitoring Task Management Report Generation
Features
Tailor made for Government offices as per Manual of Office Procedure Menu-driven user friendly interface Screen design for easy data feeding Extensive data validation checks built-in Context sensitive help Built-in Department of Administrative Reforms file naming concepts Authorization checks for data access Multi-user data entry & query File register, key words and Precedent books to help locate relevant files Modular and flexible Codification to save time and reduce data entry errors
Benefits
21
21
Easy tracking of receipt and files No effort or time required for report preparation Monitors pendency across the organization Record keeping made easy Support for Indian Languages data entry and re-port generation Increases efficiency and productivity by timely availability of standard and
uniform reports Helps timely disposal of letters Summary reports for sectional/divisional/ depart-mental level monitoring Enforces a uniform working procedure Easy to install, learn and use the system
Web Site Development & Hosting
Website: http://webservices.nic.in.
Amongst the various ways in which the 'Net' has now become a part of our lives lies
'WWW', or the World Wide Web which has effectively rendered the concept of
International Boundaries and physical distances meaningless.Web presence today
has become a vital element for an organization striving to fulfil its objectives in an
efficient manner. And equally important, if not more, in the mantra of success is the
role of the web service provider. Setting up a powerful web presence is a voyage of
discovery. And in this journey, you will need a partner who knows the latest.. in
technology and technique.
22
22
2.1 About Project
The project titled “Student Trainee Management System” is being developed in
Training Division, head office National Informatics center, Delhi, Govt. of India.
National Informatics Centre, Ministry of Communication & Information Technology
enrolls final year students from various educational institutions for undertaking full
semester project work.
Students are selected on the basis of marks obtained in previous semester/years of the
degree under which the project is to be done & availability of suitable projects in NIC.
Selected Students are normally eligible for stipend as per NIC's norms. Till now trainee’s
information are maintained manually this involves large manpower and consumes a lot of
time. The project includes the making of a web based system so that all the manual work
become computerized & easily manageable .The web-enabled software will help in the
new trainee’s to enroll their applications remotely by using web and will be answer of
certain queries and also generating reports that are to be used by the various other
departments time to time.
2.2 Objectives
Study of existing System
Enhancement in existing system
Design of new system
Design and Development of Database
Design and Development of web pages.
Security and Authentication
Testing and Implementation of the web based TMS.
24
24
2.3 System Study
In the system study we try to analyze the problems of existing systems, define the objectives to be attained by a solution and evaluate various solution alternatives.
2.3.1 Limitation of Existing System
The existing Training management system suffers from many problems: The existing system is manual. Difficult to maintain details of applicant. Selection procedure takes too much time. Huge amount of data gets collected during data entry. Consumes lot of time. Delay in declaring selection results. Delay in sending selection letters to different institutes.
2.3.2 Proposed System:
In the present project a purely web enabled software will be developed using JAVA and J2EE with Hibernate as ORM tool and SQL Server 2005 as backend and iReport as reporting tool. The system will take care of each and every information of the trainee’s who are doing or have done their project work at NIC. Dynamic web pages based on client server model are to be developed, so that the trainees can apply and interact online.
25
25
(Proposed System)
Objectives of the project
Development of requirements documents.
Analysis of available database table.
Design of web pages.
Development of codes for web pages.
Validations Implementation.
Testing of various coding interfaces.
Implementation of the system.
Advantage of proposed system
26
26
Fully web based system.
Easy maintenance of large volume of data.
Trainees can register themselves online.
No delay in selection procedure.
Easily reports will be generated.
Lesser manpower and manual work.
27
27
2.4 System Feasibility
Preliminary investigation examine project feasibility, the likelihood the system will be
useful to the organization. The main objective of the feasibility study is to test the
Technical, Operational and Economical feasibility for adding new modules and
debugging old running system. All system is feasible if they are unlimited resources and
infinite time. There are aspects in the feasibility study portion of the preliminary
investigation:
Technical Feasibility Operation Feasibility Economical Feasibility
2.4.1 Technical Feasibility
The technical issues usually raised during the feasibility stage of the investigation
includes the following
1. Does the necessary technology exist to do what is suggested?
2. Does the proposed equipments have the technical capacity to hold the data
required to use the new system?
3. Will the proposed system provide adequate response to inquiries, regardless of the
number or location of users?
4. Can the system be upgraded if developed?
5. Are there technical guarantees of accuracy, reliability, ease of access and data
security?
The current system developed is technically feasible. It is a web based user interface for
trainees at NIC. Thus it provides an easy access to the users. The database’s purpose is to
create, establish and maintain a workflow among various entities in order to facilitate all
concerned users in their various capacities or roles. Permission to the users would be
granted based on the roles specified. Therefore, it provides the technical guarantee of
accuracy, reliability and security. The software and hard requirements for the
development of this project are not many and are already available in-house at NIC or are
available as free as open source. The work for the project is done with the current
28
28
equipment and existing software technology. Necessary bandwidth exists for providing a
fast feedback to the users irrespective of the number of users using the system.
2.4.2 Operational Feasibility
Proposed projects are beneficial only if they can be turned out into information system.
That will meet the organization’s operating requirements. Operational feasibility aspects
of the project are to be taken as an important part of the project implementation. Some of
the important issues raised are to test the operational feasibility of a project includes the
following: -
Is there sufficient support for the management from the users?Will the system be used and work properly if it is being developed and implemented?Will there be any resistance from the user that will undermine the possible application benefits?
The well-planned design would ensure the optimal utilization of the computer resources and would help in the improvement of performance status.
2.4.3 Economic Feasibility
A system can be developed technically and that will be used if installed must still be a
good investment for the organization. In the economical feasibility, the development cost
in creating the system is evaluated against the ultimate benefit derived from the new
systems. Financial benefits must equal or exceed the costs.
The system is economically feasible. It does not require any addition hardware or
software. Since the interface for this system is developed using the existing resources and
technologies available at NIC, There is nominal expenditure and economical feasibility
for certain.
29
29
3.1 Modules Assigned
The project entitled “STUDENT TRAINEES MANAGEMENT SYSTEM” is a web based application software for online registration of student willing to do full semester project work at NIC. This Trainees Management System is also for maintaining the record of students at Training Division and to generate the various reports acquired by the other departments of NIC. Reports are portable, printed reports are convenient and even necessary in some situations. Printed output or reports are also used in the turn around documents which can be used later on for the same system or for other system. In Training management system, it consist of four modules as given below:
Data Entry Data Processing Reports MIS
The components assigned include the enhancement of the existing modules & to make an interface for generating the reports. The enhancement of the existing module contains the layout design of web form with addition of Graphical user interfaces. In enhancement module various changes have to be included as given below:
Authentication Form New User Sign up. Login Form. Applicant’s Interfaces Form Online Registration Form.
Manipulation Interface Forms For
Trainee’s Project Details.Institute’s Details.HOD Details.
Searching Interface Forms For
Student’s Details.
31
31
The Report Module contains the various forms for the generation of reports, as given below:
Student ReportsInstitute Reports HOD Reports Miscellaneous Reports
Student Reports
Student report form generates the various reports regarding the applied students, selected students, Joined students, Recommended Students. In this form, reports will be generated on the entered value of Batch (Year), semester (January/July) and selected value (Y/N) by user.
Applied Student Report will provide the list of all the students who have/had applied for the training at NIC. Student’s Details will be sorted on the basis of marks obtained by them in their respective university examinations. Applied student does not require any selected option (Y/N).
Selected Student Report will provide the list of all the students who were /are selected for the training by NIC training department. Selected Student’s details will be categorized according to the assigned college’s category and students are sorted on the basis of marks obtained by them in their respective university examinations.
Similarly the Joined Student Report will list out the details of the student either they had/have joined their training or not Details of student will include the Student Id, Name, Discipline ,Marks, Training starting Date, Ending date & Duration of training in months.Recommended Students Report will help to know the applicant’s names that are recommended by some senior official or by any other person. By entering the value of batch (Year) and semester (January/July) report will be generated with details & total number of student.
Institute Reports
Institute Report Form generates the report regarding the labels of the Institute, Lists of institute & the summary of institute’s students applied, selected, joined for the entered Batch (year).Summary include the details that how many student of an institute applied in and respective number of student selected by NIC Department in a year and how many of them joined for training. Labels of institute will remove the handwork for the writing the colleges address for postal letter’s envelop.
32
32
HOD Reports
Hod report form generates the report regarding the Head Of department detail list, semester wise requirement, and summary. Hod list report will generate the document contains the name of all head of department officers with their contact number & detail information
Miscellaneous Reports
This includes the various other reports which will be helpful for trainees & the staff of NIC. Clearance Report, Expenditure, Monthly Stipend report, software list, Sanction letter or student marks report etc.
33
33
4.1 Hardware Software Requirement Specification
This section describes the various hardware & software requirement by the
developer during the development of project & the tools used. It also includes
specification required by the client for implementing & using the system. This includes
the decision about the operating system to be used. The alternatives are passed through
the Mandatory requirements and screening criteria, which is a combination of the
requirements and some implicit requirements that the alternative should satisfy.
4.1.1 Developing Desktop Requirement
Hardware Intel Pentium processor® at 2.66 GHz
256 MB RAM minimum, Recommended 512 MB Ram
And other regular hardware devices
Software:
Jdk1.5 JSP2.0 Hibernate Microsoft SQL Server 2005 JDBC Driver of Microsoft SQL Server 2005
35
35
4.1.2 Software and Hardware Used for Client
Software
Os independent Internet browser
Hardware
Intel Pentium P III 450MHz or higher 128 MB RAM, recommended 256 or MB higher And other regular hardware devices
4.1.4 Software and Hardware for Server
Software
Operating System:
Os independent Software:
Jdk1.5.0 JSP2.0 Hibernate Microsoft SQL Server 2005 Tomcat Web Server
Hardware
Intel Pentium IV ® at 2.66 GHz minimum, recommended 3.02 GHz
512 MB RAM minimum, Recommended 1 GB Ram
And other regular hardware devices
36
36
5.1 Introduction
SRS task refers to the process of specifying the requirements formally in a document and get it approved by the client. SRS documents all the ideas into a formal document that acts as a standard to be referred any time during the software development process. Requirements and specifications are very important components in the development of any project. Requirements analysis is the first step in the system design process, where a user's requirements should be clarified and documented to generate the corresponding specifications. While it is a common tendency for designers to be anxious about starting the design and implementation, discussing requirements with the customer is vital in the construction of safety-critical systems. For activities in this first stage has significant impact on the downstream results in the system life cycle. For example, errors developed during the requirements and specifications stage may lead to errors in the design stage. This leads not only to more time wasted but also the possibility of other requirements and specifications Therefore, it is necessary that the requirements are specified correctly to generate clear and accurate specifications.
The first step toward developing accurate and complete specifications is to establish correct requirements. In requirements, it is important to specifically establish the functions, attributes, constraints, preferences, and expectations of the product. Usually in the process of gaining information, functions are the first ones to be defined. Functions describe what the product is going to accomplish. It is also important to determine the attributes of a product. Attributes are characteristics desired by the client, and while 2 products can have similar functions, they can have completely different attributes. After all the attributes have been clarified and attached to functions, we must determine the constraints on each of the attributes. Preferences, which is a desirable but optional condition placed on an attribute, can also be defined in addition to its constraints. Finally, we must determine what the client's expectations are. This will largely determine the success of the product.
38
38
The System Requirement Specification for as system should have the following characteristics:
SRS should specify all the functions that the software is supposed to do and response to various inputs.
Requirements stated should not be ambiguous. Formal language specifications should be used.
Requirements stated should be verifiable & should not conflict with one other. SRS should be flexible enough to incorporate any change to it.
Main components are Functional requirements Performance requirements Design constraints
39
39
The development of Training management system is required for removing the drawback
of the existing system. National Informatics Centre, Ministry of Communication &
Information Technology enrolls final year students from various educational institutions
for undertaking full semester project work.
Students are selected on the basis of marks obtained in previous semester/years of the
degree under which the project is to be done & availability of suitable projects in NIC.
Selected Students are normally eligible for stipend as per NIC's norms till now trainee’s
information are maintained manually which involves large manpower, and consumes a
lot of time. The web-enabled software will help in the answer of certain queries and also
generating reports that are to be used by the various other departments time to time.
Functional requirement specify all the functions of the system and the outputs to be
produced from the given inputs. These requirements explain the input-output relationship
between the entities of the system. Mainly the functions are displayed with the help of
use case or dataflow diagrams.
The existing Training management system suffers from many problems:
The existing system is manual. Selection of student takes too much time. Huge data storage during selection Consumes lot of time Delay in sending selection letters to different institutes Report Generation is manually
41
41
So the inputs for the new system are to make the existing systemFully web based, remotely access, online registration
Easy maintenance of large volume of data.
No delay in selection procedure.
Easily reports will be generated Efficient data storage in database Efficient utilization of resources. Easy manipulation & retrieval of student’s information.
So to meet the requirement as given above we have to develop a web application.The new system requires various web forms for performing the online registration,
selection task & data retrieval, generating reports.
System Requirements are being categorized in following modules:
Data Entry Data Processing Reports MIS
42
42
Performance Requirements
These requirements specify the performance characteristics of a system. There are two
types of performance requirements:
Static Requirements
Dynamic Requirements
Static Requirements also called as capacity requirements, these do not effect the
executions of the system. While Dynamic requirements specify constraints related to the
time in which the system is able to complete an operation and the number of operations
that a system performs in a unit time.
Design Constraints
Design constraints cover the various aspects as given :
Software & hardware limitations
Security
Standards
43
43
5.2 Technical Architecture
Initial requirement for building the project
Windows XP or Windows 2003 ,Linux Jdk1.5.0 Hibernate 3.1 Microsoft SQL Server 2005 Minimum P III or equivalent. Recommended dual CPU P III, 1200 MHz. 512 MB RAM minimum, recommended 1 GB RAM
In project a purely web enabled software will be developed using JSP with Hibernate is
used as ORM tool, SQL Server is used as backend and iReport is used for reporting
purposes. The system will take care of each and every information of the person who are
doing or have done there project work at NIC. Dynamic web pages based on client server
model are to be developed, so that the trainees can apply and interact online.
JAVA:
Java is a general-purpose class based, object oriented programming language. It is
designed to be the simple enough that many programmers can achieve fluency in the
language. The main Advantages of Java is its platform independent property. This made
Java a powerful tool as it can adapt to any change in environment.
In discussing Java, it is important to distinguish between the Java programming
language, The Java Virtual Machine (JVM), and the Java platform. The Java
programming language is the language in which Java application (applets, servlets etc.)
are written. It is the source code and it’s extension is .java. After compilation it is
converted to byte codes (which have an extension .class) that are portable machine
language of a CPU architecture known as the Java Virtual Machine. The JVM is usually
implemented in the form of a software program that interprets and executes these byte
codes.
44
44
The Java platform is distinct from both Lava language and JVM. The Java platform is the
predefined set of Java classes that exist on every Java installation; these classes are
available for use by all Java programs. TheJava Platform is also sometimes referred to as
the Java runtime environment.
Why is Java used?
Java is the most powerful language today.
When properly applied, the features of Java (eg. Encapsulation, inheritance etc.)
combine to produce a programming environment that supports the development
of far more robust and scalable programs.
A well-designed hierarchy of classes helps programmers in reusing the code.
Encapsulation allows programmer to migrate his implementation over time
without breaking the code that depends on the public interface of the classes as in
encapsulation public methods can be used to protect private data.
Inheritance interacts with encapsulation as well.
Polymorphism ( one interface multiple methods) allow a programmer to create
clean, sensible, readable and resilient code.
Java is platform independent. Java lets us deploy the same Servlet and JSPs on
many different platforms, be it UNIX, Linux, Windows or Macintosh. In fact,
switching platforms with Servlet/JSP applications can be simple as copying a
single file into the proper directory.
Java is web centre. Java is designed for distributed environment of the internet,
thet makes the implementation more convenient in case of online application.
Java’s highly object oriented nature encourages developer to write maintainable
and reusable code, which is deal in ever changing nature of web application.
45
45
JAVA SERVLETS
Java Servlet technology provides web developers with a simple, consistent mechanism for extending the functionality of a web server and for accessing existing business systems. A servlet can almost be thought of as an applet that runs on the server side -- without a face. Java servlets have made many web applications possible.
Servlets are the Java platform technology of choice for extending and enhancing web
servers. Servlets provide a component-based, platform-independent method for building
web-based applications, without the performance limitations of CGI programs. And
unlike proprietary server extension mechanisms (such as the Netscape Server API or
Apache modules), servlets are server- and platform-independent. This leaves you free to
select a "best of breed" strategy for your servers, platforms, and tools.
Servlets have access to the entire family of Java APIs, including the JDBC API to access
enterprise databases. Servlets can also access a library of HTTP-specific calls and receive
all the benefits of the mature Java language, including portability, performance,
reusability, and crash protection.
47
47
Portability
Because servlets are written in Java and conform to a well defined and widely accepted
API, they are highly portable across operating systems and server implementations.With
servlets you can truly say “write once, serve everywhere” reason being a class file is
made which is nothing but machine-independent bytecodes. We can develop a servlet on
Windows NT machine running the Java Web Server and later deploy it effortlessly on a
Unix server running Apache.
Safety
Servlets support safe programming practices on a number of levels. Firstly, servlets
inherit the strong type safety of Java language. Secondly, Java’s automatic garbage
collection mean that servlets are safe from memory management problems like dangling
pointers, invalid pointer references and memory leaks.
Etensibility and Flexibility
The servlet API is designed to be easily extensible. The API includes classes that are
optimized for HTTP servlets but at a later date it could be extended and optimized for
another type of servlets by a third party.
Sevlets are also quite flexible. An HTTP servlet can be used to generate a complete
webpage it can be added to a static page using a <SERVLET> tag in what is known as a
server-side include and it can be used in cooperation with any number of servlets to filter
the content in something known as servlet chain.
48
48
Integration
Servlets are tightly integrated with the server. A servlet can use the server to translate file paths, perform logging, check authorization, perform MIME type mapping and, in some cases, even add users to the server’s user database.
Elegance
Servlet code is clean, simple, object-oriented, modular and amazingly simple. A servlet API can include methods and classes to handle many type of routine chores.
Efficiency
Servlet invocation is highly efficient. Once a servlet is loaded, it generally remains in
servers memory as a single object instance so it automatically maintains its state and can
hold on to external sources such as database connections that may otherwise take several
seconds to establish. Unlike with CGI servlet can begin handling the request
immediately. Multiple, concurrent request are handled by multiple threads, so servlets are
highly scalable. Today, servlets are a popular choice for building interactive web
applications.
Java Server Pages (JSP):
Java Server Pages, also known as JSPs are simple but powerful technology used to
generate dynamic HTML on severs side. They are a direct extension of Java Sevlets and
provide a way to separate content generation from content presentation. The JSP engine
is just another Servlet that is mapped to the extension *.jsp.
The source code of a JSP document looks like any other HTML document with some added tags containing Java code. The source code is stored in a file called XXX.jsp and copied to the document directory of the Web server. When a request is made for this document, the server recognizes the *.jsp extension and realizes that special that special handling is required. The first time the file is requested, it is compiled into a Servlet object and stored in the memory, and the output is sent back to the requesting client.
49
49
After the first request, the server checks to see whether the *.jsp file has changed. If it has not changed, then the server invokes the previously compiled Servlet object.
Steps required for JSP request:
The user visits a web site made using JSP. He goes to a JSP page (ending with .jsp). The web browser makes the request via internet.
The JSP request is sent to the web server. The web server recognizes that the file required is special (.jsp), therefore passes
the file to the JSP Sevlet engine. If the file has been called for the first time, the JSP file is parsed, other wise go to
step 7. The next step is to generate a special Servlet from JSP file. The entire HTML is
converted into ‘println’ statements. The Servlet source code is compiled into a class. The Servlet is instantiated, calling the init and service methods. HTML from the Servlet output sent via Internet. HTML results are displayed on the user’s web browser.
50
50
Hibernate:
Hibernate is a free, open source Java package that makes it easy to work with relational
databases. Hibernate makes it seem as if your database contains plain Java objects like
you use every day, without having to worry about how to get them out of (or back into)
mysterious database tables. It liberates you to focus on the objects and features of your
application, without having to worry about how to store them or find them later
History and Background
Most applications have some need to work with data. Java applications, when running,
tend to encapsulate data as networks of interconnected objects, but those objects vanish
in a puff of logic when the program ends, so there needs to be some way to store them.
And sometimes the data is already "out there" before the application is even written, so
there needs to be a way to read it in and represent it as objects. Writing code by hand to
51
51
perform these tasks is tedious and error-prone, and can represent a major portion of the
effort involved in the overall application.
As good object-oriented developers got tired of this repetitive work, their typical
tendency towards enlightened laziness started to manifest itself in the creation of tools to
help automate the process. When working with relational databases the culmination of
such efforts were object/relational mapping tools.
How Hibernate Works
Rather than utilize bytecode processing or code generation, Hibernate uses runtime reflection to determine the persistent properties of a class. The objects to be persisted are defined in a mapping document, which serves to describe the persistent fields and associations, as well as any subclasses or proxies of the persistent object. The mapping documents are compiled at application startup time and provide the framework with necessary information for a class. Additionally, they are used in support operations, such as generating the database schema or creating stub Java source files.A SessionFactory is created from the compiled collection of mapping documents. The SessionFactory provides the mechanism for managing persistent classes, the Session interface. The Session class provides the interface between the persistent data store and the application.The Session interface wraps a JDBC connection,which can be user-managed or controlled by Hibernate, and is only intended to be used by a single application thread, then closed and discarded.
52
52
The Configuration File
<?xml version='1.0' encoding='UTF-8'?><!DOCTYPE hibernate-configuration PUBLIC "-//Hibernate/Hibernate Configuration DTD 3.0//EN" "http://hibernate.sourceforge.net/hibernate-configuration-3.0.dtd">
<!-- Generated by MyEclipse Hibernate Tools. --><hibernate-configuration>
<session-factory><property name="connection.username">root</property><property name="connection.url">
jdbc:sqlserver://CABIIN49\SQLEXPRESS:1433</property><property name="dialect">
org.hibernate.dialect.SQLServerDialect</property><property name="myeclipse.connection.profile">
server2005</property><property name="connection.password">nic123</property><property name="connection.driver_class">
com.microsoft.sqlserver.jdbc.SQLServerDriver</property><mapping resource="sumitparihar/Sanction.hbm.xml" /><mapping resource="sumitparihar/InstCod.hbm.xml" /><mapping resource="sumitparihar/Stuinfo.hbm.xml" />
</session-factory>
</hibernate-configuration>
53
53
The Mapping Documents
Our example utilizes one trivial class Sanction. The mappings for these class isshown below.
<?xml version="1.0" encoding="utf-8"?><!DOCTYPE hibernate-mapping PUBLIC "-//Hibernate/Hibernate Mapping DTD 3.0//EN""http://hibernate.sourceforge.net/hibernate-mapping-3.0.dtd"><!-- Mapping file autogenerated by MyEclipse - Hibernate Tools--><hibernate-mapping> <class name="sumitparihar.Sanction" table="sanction" schema="dbo" catalog="hi"> <id name="stuId" type="java.lang.Integer"> <column name="STU_ID" /> <generator class="assigned" /> </id> <property name="sanDate" type="java.util.Date"> <column name="SAN_DATE" length="23" /> </property> <property name="sanAmount" type="java.lang.Float"> <column name="SAN_AMOUNT" precision="53" scale="0" /> </property> <property name="instCode" type="java.lang.Short"> <column name="INST_CODE" /> </property> </class></hibernate-mapping>
54
54
The mapping documents are reasonably clear, but certain areas warrant explanation. The
id
element block describes the primary key used by the persistent class. The attributes of the
id
element are:
name: The property name used by the persistent class.
column: The column used to store the primary key value.
type: The Java data type used. In this case, we’re going to use longs.
unsaved-value: This is the value used to determine if a class has been made
persistent, i.e., stored to the database. If the value of the id attribute is null, Hibernate
knows that this object has not been persisted. This is important when calling the
55
55
HIBERNATE - Features of HibernateHIBERNATE - Features of Hibernate
Transparent persistence without byte code processing
Transparent persistence JavaBeans style properties are persisted No build-time source or byte code generation / processing Support for extensive subset of Java collections API Collection instance management Extensible type system Constraint transparency Automatic Dirty Checking Detached object support Object-oriented query language
Powerful object-oriented query language Full support for polymorphic queries New Criteria queries Native SQL queries Object / Relational mappings
Three different O/R mapping strategies Multiple-objects to single-row mapping Polymorphic associations Bidirectional associations Association filtering Collections of basic types Indexed collections Composite Collection Elements Lifecycle objects Automatic primary key generation Multiple synthetic key generation strategies Support for application assigned identifiers Support for composite keys Object/Relational mapping definition
XML mapping documents Human-readable format XDoclet support HDLCA (Hibernate Dual-Layer Cache Architecture)
Thread safeness Non-blocking data access Session level cache Optional second-level cache
56
56
Optional query cache Works well with others High performance
Lazy initialization Outer join fetching Batch fetching Support for optimistic locking with versioning/timestamping Highly scalable architecture High performance No "special" database tables SQL generated at system initialization time (Optional) Internal connection pooling and PreparedStatement caching J2EE integration
JMX support Integration with J2EE architecture (optional) New JCA support
57
57
SQL Server 2005SQL Server 2005
The following table provides an overview of several key enhancements in SQL Server
2005, focusing on enterprise data management, developer productivity, and business
intelligence..
Enterprise Data ManagementTechnology CapabilitiesHigh Availability Failover clustering and database mirroring technology in SQL Server 2005 will
enable enterprises to deliver highly reliable, available applications to employees,
customers, and partners.
Management
Tools
SQL Server 2005 introduces an integrated suite of management tools and
management application programming interfaces (APIs) to provide ease of use,
manageability, and support for operating large-scale SQL Server deployments.
Security
Enhancements
SQL Server 2005 has been designed to help provide the highest level of security
for enterprise data through features such as database encryption, more secure
default settings, password policy enforcement, granular permissions control, and
an enhanced security model.
Scalability Scalability advancements in SQL Server 2005 include table partitioning,
replication enhancements, and 64-bit support.
Developer ProductivityTechnology Capabilities
Common Language
Runtime (CLR)
Integration
SQL Server 2005 introduces the capability to develop database objects
using any Microsoft .NET language.
Deep XML Integration SQL Server 2005 delivers a new XML data type, enabling the storage of
XML fragments or documents in SQL Server databases.
Transact-SQL
Enhancements
New query types and the capability to use error handling in transactions
provide developers with more flexibility and control in SQL Server query
development.
SQL Server 2005
Compact Edition
Full integration of SQL Server 2005 Compact Edition with SQL Server 2005
and Visual Studio 2005 provides a platform for developers to rapidly build
applications that extend enterprise data management capabilities to
mobile devices.
Business IntelligenceTechnology Capabilities
Analysis
Services
Analysis Services provides a unified and integrated view of all your business data as
the foundation for all of your traditional reporting, OLAP analysis, Key Performance
Indicator (KPI) scorecards and data mining.
Integration
Services
SQL Server Integration Services (SSIS) is a next generation data integration platform
that can integrate data from any source. SSIS provides a scalable and extensible
58
58
Business IntelligenceTechnology Capabilities
platform that empowers development teams to build, manage, and deploy
integration solutions to meet unique integration needs.
Reporting
Services
SQL Server Reporting Services is a comprehensive, server-based reporting solution
designed to help you author, manage, and deliver both paper-based and interactive
Web-based reports.
Data Mining SQL Server 2005 Analysis Services (SSAS) provides tools for data mining with which
you can identify rules and patterns in your data, so that you can determine why
things happen and predict what will happen in the future – giving you powerful
insight that will help your company make better business decisions.
59
59
MyEclipse Enterprise Workbench is a commercial Java IDE created and supported by
the company Genuitec, LLC
MyEclipse, first released in 2003, is built upon the Eclipse platform, specifically using
the Web Tools Platform (WTP) for much of its functionality. The MyEclipse tools are
most comparable to the IBM Rational Software toolkit, JetBrains (IntelliJ IDEA), and
BEA Systems tools.
MyEclipse is available in two versions (Standard and Professional.)
60
60
Flow chart :
61
Start ssssatraasss
Institute Fills online registration form in NIC
Student receives selection letter from NIC
Branch is allocated to selected student
HOD and Project guide allocated
Project is allocated
Stipend is sanctioned at the end of every month
Student receives Stipend
Stop
Selected
61
5.4.2 Data Flow Diagrams
Selection InformationReview of Old Cases
Registers View Details
View Details Data Entry Data processing
Reports
62
Student trainee
Registration
NIC Training Department
62
5.4.3 E-R Diagram
63
Student
Instcode
SidSname
Works on
Works in
Register in
Project
NIC
BranchesWorks under
has
Project guideAssigned by
Supervises by
HOD
Marks
Nic location
No of branches
Hname
Hid Age
No of trainees
Phone no
Age Sex
Bhod
Blocation
Name
Id
age
sexNo of stud
allocatedUses
Technology
S/w tool S/w type
bname
63
6.1 Introduction
Systems design is the third phase in the system development life cycle. Now
we are ready to begin the physical design system that will meet the specification
described in the system requirements document
User Interface, Input and Output Design
Interface Issue
User interface, input and output design begins the systems design phase of the SDLC. The user interface should include all the tasks, commands and communication between users and the system. In GUI environment a user can display and
work with multiple windows on the single screen.
Input Design Issues During input design, determine how data will be captured and
entered into the system. Data capture is the identification and recording of source data.
Data entry is the process of converting source data into computer readable form and
entering it into or from system.
Input Design has six main objectives.
1. To select a suitable input and data entry method
2. To reduce the input volume
3. To design attractive data entry screen
4. To use validation check to reduce input errors
5. To design required source documents
6. To develop effective input control
65
65
Output Design issues
It Includes
What is the purpose of output?
Who wants the information, why it is needed and how it will be used?
Will the output be printed, viewed on screen or both?
Do security or confidentiality issues exist?
Reports like any other elements of the user-computer interface should be attractive,
professional, and easy to use. System analysts should realize that printed output is highly
visible and manages sometimes judges project by the quality of reports they receive.
66
66
6.2 Project Module Design:
System Requirement & specification phase’s output takes to the design step.
After going through the requirement & analysis in the last section now have to design the
project.
In Training management system, it consist of four modules as given below:
6.3 Database Designing
67
STMS
Data Entry
Data Processing Reports MIS
Main FormStudent Details Institute Details Hod Details etc
Student Reports Institute Reports Hod Reports Misc. Reports
67
List of Tables:
Allocation
Allocation_st
Allocation_hod
Criteria
Discip
Hod
Hodsummary
Inst_code
Monthlystipend
Monthname
Recommranks
Relaxation
Requ
Sanction
Studetail
Stuinfo
swtools
68
68
The design of various tables used in the database are as follows:Table 1: stuinfo
Name Type Size Null
SNO int 4 NOT NULL
NAME char 50 NULL
BATCH Smallint 7 NULL
SEMI char 7 NULL
INST_CODE Smallint 2 NULL
ADD_INST1 char 60 NULL
ENT_DATE datetime 8 NULL
SD datetime 8 NULL
DURA smallint 2 NULL
ED datetime 8 NULL
STIPEND char 3 NULL
ST1 smallint 2 NULL
DISCI char 3 NULL
SEM_1 float 8 NULL
SEM_2 float 8 NULL
SEM_3 float 8 NULL
SEM_4 float 8 NULL
SEM_5 float 8 NULL
SEM_6 float 8 NULL
SEM_7 float 8 NULL
SEM_8 float 8 NULL
70
70
PERS float 8 NULL
PERS_ORIG float 8 NULL
SELECTED char 3 NULL
LIST_NO smallint 2 NULL
JOINED char 3 NULL
RECOMM char 20 NULL
NIC char 3 NULL
COURSE_CAT char 13 NULL
CATEGORY char 7 NULL
OS1 char 20 NULL
OS2 char 20 NULL
OS3 char 20 NULL
DB1 char 20 NULL
DB2 char 20 NULL
DB3 char 20 NULL
LANG1 char 20 NULL
LANG2 char 20 NULL
LANG3 char 20 NULL
PER_ADD1 char 65 NULL
PER_ADD2 char 65 NULL
RELAX_PERS float 8 NULL
SELECTED_LIST smallint 2 NULL
71
71
Table 2:Allocation_hod
Name Data Type Size Nulls
SERIAL NO Small int 2 NOT NULL
HOD Char 20 NULL
HDISCI Char 20 NULL
HDB char 20 NULL
HLANG Char 20 NULL
STUDID Int 4 NULL
SDISCI Char 20 NULL
SOS Char 20 NULL
SDB Char 20 NULL
SLANG Char 20 NULL
WEIGHTAGE nvarchar 20 NULL
Table 3: Allocation_st
Name Data type Size Nulls
SNO int 4 NOT NULL
HOD Char 20 NULL
DISCI Char 20 NULL
OS Char 20 NULL
DB Char 20 NULL
LANG Char 20 NULL
STATUS Char 20 NULL
ST_ID int 4 NULL
WEIGHTAGE Char 20 NULL
72
72
Table 4: criteria
Name Data type Size Nulls
BATCH int 4 NULL
SEMESTER char 10 NULL
CUT_OFF_PERCENTAGE float 8 NULL
CDATE1 datetime 8 NULL
CDATE2 datetime 8 NULL
CATA int 4 NULL
CATB int 4 NULL
CATC int 4 NULL
LIST_NO smallint 2 NULL
Table 5:Dicip
Name Data Type Size Nulls
Disc char 20 NULL
Table 6:hod
Name Data Type Size NullsHOD Char 8 NULL
HOD_NAME Char 30 NULL
DESIG Char 5 NULL
ADDRESS Char 50 NULL
DIVISION Char 30 NULL
PHONE_O Decimal 9(18,0) NULL
PHONE_R Decimal 9(18,0) NULL
INTER Char 5 NULL
EMAIL Char 50 NULL
73
73
Table 7:hod summary
Name Data Type Size NullBATCH Smallint 2 NOT NULLHODNAME Char 50 NULLTOTALINUSE Smallint 2 NULLTOTALABS Smallint 2 NULLTOTALREQ Smallint 2 NULLTOTALJOIN Smallint 2 NULL
Table 8:inst_code
Name Data Type Size NullDESIG Char 35 NULLSTATUS Char 3 NULL ADD_INST1 Char 60 NULLADD2 Char 35 NULLADD3 Char 35 NULLADD4 Char 25 NULLPIN Char 7 NULLCATA char 1 NULLTELNO Numeric 9(18,0) NULLFAXNO Numeric 9(18,0) NULLINSTMAIL Char 50 NULL
Table 9: relaxation
Name Data Type Size NullYEAR smallint 2 NULLSEMESTER char 7 NULLRELAX_SC Float 8 NULLRELAX_ST Float 8 NULLRELAX_OBC Float 8 NULL
74
74
Table 10: requ
Name Data Type Size NullSESSION Char 7 NULLYEARS int 4 NULLTOT_NO_RE Smallint 2 NULLTOT_NO_SA Smallint 2 NULLTOT_NO_JO smallint 2 NULLHOD char 8 NULLDIVISION char 25 NULLINST_TYPE Char 1 NULLTOT1 Smallint 2 NULLDISCI1 char 20 NULLOS1 Char 20 NULLDB1 Char 20 NULLLANG1 Char 20 NULLTOT2 Smallint 2 NULLDISCI2 Char 20 NULLOS2 Char 20 NULLDB2 Char 20 NULLLANG2 Char 20 NULLTOT3 Smallint 2 NULLDISCI3 Char 20 NULLOS3 Char 20 NULLDB3 Char 20 NULLLANG3 char 20 NULL
Table11:sanction
Name Data Type Size NullSTU_ID Int 4 NULLSANC_DATE Datetime 8 NULLSANC_AMNT Float 8 NULLINST_CODE smallint 2 NULLPROJ_GUIDE Char 5 NULL
75
75
Table 12: sw_tools
Name Data Type Size NullSW_TOOL Char 20 NULLTYPE Char 3 NULL
Table 13:studetail
Name Data Type Size NullSNO Int 4 NOT NULLNAME Char 3 NULLINST_CODE Char 30 NULLPROJ_TITLE Char 60 NULL PROJ_LEAD Char 8 NULLPROJ_GUIDE Char 30 NULLPROJ_LOC Char 50 NULLPHONE Numeric 9(18,0) NULLINTER Char 5 NULLCLEARANCE Char 3 NULLIMPLEMENT Char 3 NULLMOD_USE Char 3 NULLABSCONDING Char 3 NULL
76
76
6.4 Screen Shots
Description:
When you will type the web address(Here http://localhost:8080/now/MAIN.jsp) of the STMS application, following page will open which is the home page of the application.On this page there is an option for new users to sign up. Existing NIC employee can use their user id & password for log in.
Login Page
77
77
Description:
After Login success NIC Employee will be navigated to the menu form where there are four modules performing different functions
Menu Form
83
83
7.1 Introduction
The protection of computer based resources that includes hardware, software, data,
procedures and people against unauthorized use or natural
Disaster is known as System Security.
System Security can be divided into four related issues:
Security
Integrity
Privacy
Confidentiality
System Security refers to the technical innovations and procedures applied to the
hardware and operation systems to protect against deliberate or accidental damage from a
defined threat.
Data security is the protection of data from loss, disclosure, modification and destruction.
System Integrity refers to the power functioning of hardware and programs, appropriate
physical security and safety against external threats such as eavesdropping and
wiretapping.
Privacy defines the rights of the user or organizations to determine what information they
are willing to share with or accept from others and how the organization can be protected
against unwelcome, unfair or excessive dissemination of information about it.
Confidentiality is a special status given to sensitive information in a database to minimize
the possible invasion of privacy. It is an attribute of information that characterizes its
need for protection.
95
95
7.2 Project Security
System security refers to various validations on data in form of checks and controls to
avoid the system from failing. It is always important to ensure that only valid data is
entered and only valid operations are performed on the system. The system employees
two types of checks and controls:
8.2.1 Client Side validation
If the web browser allows running the Java script then client side validation code is run
otherwise validation is done at the server side automatically. Various client side
validations are used to ensure on the client side that only valid data is entered. Client side
validation saves server time and load to handle invalid data. Some checks imposed are:
Validation is used to ensure those required fields are filled with suitable data only.
Maximum lengths of the fields of the forms are appropriately defined.
Forms cannot be submitted without filling up the mandatory data so that manual mistakes
of submitting empty fields that are mandatory can be sorted out at the client side to save
the server time and load.
Tab-indexes are set according to the need and taking into account the ease of user while
working with the system.
8.2.2 Server Side Validation
Some checks cannot be applied at client side. Server side checks are necessary to save the
system from failing and intimating the user that some invalid operation has been
performed or the performed operation is restricted. Some of the server side checks
imposed are:
96
96
Server side constraint has been imposed to check for the validity of primary key and
foreign key. A primary key value cannot be duplicated. Any attempt to duplicate the
primary value results into a message intimating the user about that value through the
forms using foreign key can be updated only of the existing foreign key values.
User is intimating through appropriate messages about the successful operations or
exceptions occurring at server side.
Various Access Control Mechanisms have been built so that one user may not agitate
upon another. Access permissions to various types of users are controlled according
to the organizational structure. Only permitted users can log on to the system and can
have access according to their category. User- name, passwords and permissions are
controlled o the server side.
Using server side validation, constraints on several restricted operations are imposed.
97
97
8.1 Introduction
In this phase the system is tested. Normally programs are written as a series of individual
modules, these subjects to separate and detailed test. The system is then tested as a
whole. The separate modules are brought together and tested as a complete system. The
system is tested to ensure that interfaces between modules work (integration testing), the
system works on the intended platform and with the expected volume of data (volume
testing) and that the system does what the user requires (acceptance/beta testing).
The developed software is tested to the customer to detect the possible errors. A software
test program should aim at detecting maximum number of errors in the software. The
process of testing involves creating the test cases and implementing those test cases on
the software to detect errors. Testing validates that the actual performances of the
software meets the user requirements. The Testing Strategy and plan TSP document is a
formal document that contains the test plan and the list of all types of test to be done on
the software
Test Plan consists of the components to be tested, people involved in testing, test cases
and the acceptance criterion for the software. Some guidelines to be followed while
creating test plan are as follows:
The test planned for the software should be such that they detect the deviation of the
software from client requirements. The test planned in the test plan should begin from
smaller module and move to cover the entire system.
The test plan should assign the task of testing to a third person. This is because a person
from outside the development team has the better chances of detecting errors. Software
testing can be broadly classified into two categories:
White Box Testing
Black Box Testing
99
99
A testing strategy describes the steps that are performed during the testing of software.
Unit Testing
Integration Testing
System Testing
Functional Testing
8.2 Creating Test Cases
Developing test case is an important task of testing. An efficient test case detects the
maximum number of errors.
General Format for test Cases is given below:
Test Case ID Test Case Description
Expected Output Actual output
1. Fill The Following Details…
An Error message Should be displayed..
100
100
Test Case for Login Form:
Test Case ID
Test Case Description Expected Output Actual output
1.Fill The Following Details…
User Name= Leave Blank
Password = nic123
Click Submit
An Error message Should be displayed.
“Can’t be Blank”
2Fill The Following Details…
User Name=root
Password =
Click Submit
An Error message Should be displayed
“Access Denied”
101
101
10.1 Project Enhancements:
While developing software a developer take care of every requirement of user, but it not fair to say that a project completes ever. Many enhancements & new features are required by user & added in future. Software is enhanced & marketed with the version numbers.
At this time the major enhancements which I feel this project require are:
Security needs to be tightening & password strength should be added. More dynamic users interface using flash. Client Side validation have to be improved. Report formats to be change. File Uploading like bio-data provision should be added.
103
103
10.1 CONCLUSION
It has been a great pleasure for me to work on this exciting and challenging project. This
project proved good for me as it provided practical knowledge of not only programming
in JAVA as well as working of web based application and no some extent Windows
Application and SQL Server, but also about all handling procedure related with “Design
and Development of Sudent Trainees Management System”. It also provides knowledge
about the latest technology used in developing web enabled application and ORM Tool
such as Hibernate that will be great demand in future. This will provide better
opportunities and guidance in future in developing projects independently.
Benefits:
The project is identified by the merits of the system offered to the user. The merits of this project are as follows: -
It’s a web-enabled project.
This project offers user to enter the data through simple and interactive web
forms. This is very helpful for the client to enter the desired information through
so much simplicity.
The user is mainly more concerned about the validity of the data, whatever he is
entering. There are checks on every stages of any new creation, data entry or
updation so that the user cannot enter the invalid data, which can create problems
at later date.
User is provided the option of monitoring the records he entered earlier. He can
see the desired records with the variety of options provided by him.
From every part of the project the user is provided with the links through framing
so that he can go from one option of the project to other as per the requirement.
This is bound to be simple and very friendly as per the user is concerned. That is,
we can say that the project is user friendly which is one of the primary concerns
of any good project.
Data storage and retrieval will become faster and easier to maintain because data
is stored in a systematic manner and in a single database.
105
105
Decision making process would be greatly enhanced because of faster processing
of information since data collection from information available on computer takes
much less time then manual system.
Allocating of sample results becomes much faster because at a time the user can
see the records of last years.
Easier and faster data transfer through latest technology associated with the
computer and communication.
Through these features it will increase the efficiency, accuracy and transparency,
106
106
BIBLIOGRAPHY:
1. Hibernate in action by Christian Bauer and Gavin King
2. Head First Servlets and JSP by Bryan Basham, Kathy Sierra, Bert Bates
3. Beginning JSP 2.0 by Ben Galbraith, Wrox
4. Professional Jsp by Wrox Press Limited
5. Date, C.J (Third edition) An introduction to database system Addition wesley/
Narosa Publication.
108
108
Websites :
These are various websites which is helpful in developing the project in coding prospect
http://www.roseindia.net/hibernate/
http://www.hibernate.org
http://pdf.coreservlets.com/
http://www.w3schools.com/html/
http://www.echoecho.com/html.htm
109
109