Transcript

STUDENT TRAINEE MANAGEMENTSTUDENT TRAINEE MANAGEMENT SYSTEMSYSTEM

Developed For

National Informatics CentreNew Delhi

A PROJECT REPORT SUBMITTEDIN PARTIAL – FULFILMENT OF THE REQUIREMENT

FOR THE AWARD OF THE DEGREEOF

MASTER OF COMPUTER APPLICATIONMASTER OF COMPUTER APPLICATION

BY

SUMIT PARIAHRSUMIT PARIAHR(04/MCA/30)

COMPUTER SCIENCE ENGINEERING & MCA DEPARTMENTKUMAON ENGINEERING COLLEGE, DWARAHAT 263653, UTTARAKHAND

JUNE 2007JUNE 2007

2

GOVERNMENT OF INDIAMINISTRY OF COMMUNICATIONS & INFORMATION

TECHNOLOGYDEPARTMENT OF INFORMATION TECHNOLOGY

National Informatics CentreNational Informatics Centre

This is to certify that SUMIT PARIHAR ID.N0 9506 a student Of Master Of

Computer Application (MCA) from KUMAON ENGINEERING COLLEGE

DWARAHAT,UTTARAKHAND is doing his full-semester project training at

TRAINING Division, NIC, New Delhi, from.

The project work entitled ” Design and Development of Student Trainee

Management System” embodies the original work done by Sumit Parihar

during his above full semester project training period.

Rajendra Prasad(Scientist C) Dr. S.C.GuptaProject Guide/HOD Head, Training Division

3

CERTIFICATE

This is to certify that the Project report entitled STUDENT TRAINEE MANAGEMENT SYSTEM submitted by SUMIT PARIHAR, to the Computer Science Engineering Department, Kumaon Engineering College, Dwarahat, for the award of degree of MCA, is a bonafide project work carried out by him.

This project work has been carried out under the supervision of ______ in the ________________ organization. This work is original and has not been submitted, in part or full, to any other University or Institution for the award of any other degree.

Student Supervisor

4

DECLARATIONS

I, Sumit Parihar hereby declare that the project entitled “Design and Development of Student Trainee Management System” which have to be submitted in the partial fulfillment of the requirements for the awards of Master Of Computer Application in the Kumaun University Nainital, is an own record carried out by me under the supervision of my teacher DR Rajiv Aggarwaal HOD (Comp .Sc). The matter embodied in this project has not been submitted so far for the award of any degree.

(Sumit Pairhar)Signature

5

Acknowledgements

I deem it is my proud privilege to express my sincere regards and gratitude to ‘NIC Training Division’ for providing this valuable opportunity to pursue the training at their place. Training at NIC is real implementation of knowledge & practical experience.I feel privileged to offer my sincere thanks and deep sense of gratitude to Dr S.C.Gupta, Head Training Division at Training Division, NIC, for expressing their confidence in me by letting me work on a project of this magnitude and using latest technologies and providing their support, help & encouragement in implementing this project. I am grateful for the co-operation & valuable suggestions rendered by Mr Rajendra Prasad and all the staff members of the National Informatics Centre, New Delhi and my team members.

Sumit Parihar

6

PrefacePreface

This project is intended to computerize and provide information about the current status of the Trainees. This is exclusive and live s/w that gives various facilities to the user i.e. the user can fill his form online. The project is divided into various sections that present a clear picture of the system. Simplicity is more Importance while designing. All possible aspects of the system are taken into consideration. User friendliness is aimed in this project. The project is developed in one source platform, using JSP, Hibernate and SQLServer 2005.

Java is a general-purpose class based, object oriented programming language. It isDesigned to be the simple enough that many programmers can achieve fluency in the language. The main Advantages of Java is its platform independent property. This made Java a powerful tool as it can adapt to any change in environment.In discussing Java, it is important to distinguish between the Java programming language, The Java Virtual Machine (JVM), and the Java platform. The Java programming language is the language in which Java application (applets, servlets etc.) are written

Java Server Pages, also known as JSPs are simple but powerful technology used to generate dynamic HTML on severs side. They are a direct extension of Java Sevlets and provide a way to separate content generation from content presentation. The JSP engine is just another Servlet that is mapped to the extension *.jsp.

Hibernate is a free, open source Java package that makes it easy to work with relational databases. Hibernate makes it seem as if your database contains plain Java objects like you use every day, without having to worry about how to get them out of (or back into) mysterious database tables. It liberates you to focus on the objects and features of your application, without having to worry about how to store them or find them later

SQL Server 2005 introduces an integrated suite of management tools and management application programming interfaces (APIs) to provide ease of use, manageability, and support for operating large-scale SQL Server deployments.

7

ABSTRACT

Project Title: StudentStudent Trainee Management SystemTrainee Management System.

Abstract:The project entitled “ STUDENT TRAINEE MANAGEMENT SYSTEM” is a web based application software for online registration of student willing to do full semester project work at NIC. This Trainees Management System is also for maintaining the record of students at Training Division and to generate the various reports acquired by the other departments of NIC .It consist of four modules as given below

Data Entry Data Processing MIS Reports

The Data Entry module contains seven forms namely new Student Information Entry

form, HOD detail form, institute detail form, student detail form, HOD requirement form,

stipend sanction form, software details form, monthly stipend entry form. With the help

of this module we can register new trainee, modify, delete and view existing records.

Data Processing module contain two form namely Student Selection and Selection

According HOD. In this module we basically process the data entered with the help of

data entry module.

MIS Module contains only one form .In this module we get the list of total no of

students who get selected in NIC for training. It provides name, batch, joining, and

selection information of all the trainees who applied in NIC.

Report module deals with report generation. It consist of forms for the generation of

various reports like student report, HOD report, stipend report, institute report,

miscellaneous report including monthly stipend report of a batch, complete student

stipend report, eligible candidates report etc. This Module is Under Construction.

8

Components assigned:

The components assigned include the enhancement of the existing modules and to make

an interface for generating the reports. The enhancement of the existing module contains

the layout design of web form with addition of Graphical user interfaces. In enhancement

module various changes have to be included as given below:

Authentication Form Applicant’s Interfaces Form Manipulation Interface Form Searching Interface Form

The Report Module contains the various forms for the generation of reports, as given below:

Student Reports Institute Reports HOD Reports Miscellaneous Reports

Tools & Technologies used :

JDK 1.5 Servlet Java Server Pages (JSP)-2.0 Hibernate 3.1 Tomcat –5.0.28 MS SQL Server2005 Microsoft SQL Server 2005 Driver for Hibernate iReport Generator

Keywords: SERVLET, JAVA BEANS, JSP,POJO, MANAGEMNET SYSTEM,

9

CONTENTS Page no

Chapter 1: Company Profile ………………………………………………………. 11

1.1 About NIC

Chapter 2: Introduction to project………………………………………………… 22

2.1 Brief description

2.2 Objectives

2.3 System Study

2.3.1 Existing System with Limitation

2.3.2 Proposed System with Objectives

2.4 System Feasibility

2.4.1 Technical Feasibility

2.4.2 Operational Feasibility

2.4.3 Economical Feasibility

Chapter 3: Component Assigned…………………………………………………… 29

3.1 Modules Assigned

3.2 Report Design

3.3 Designing Reports

Chapter 4: Technology Environment..…………………………………………….. 33

4.1 Hardware Software Requirement Specification

4.1.1 Development Desktop Requirement

4.1.2 Client Requirement

4.1.3 Server Requirement

Chapter 5: System Requirement and Specification ………………………………. 36

5.1 Introduction

5.2 Requirements specifications

5.3 Technical Architecture

5.4 Design Specifications

5.4.1 System Flow charts

5.4.2 Data Flow Diagrams

5.4.3 ER Diagram

Chapter 6: System Design………………………………………………………….. 62

6.1 Introduction

6.2 Project Module Design

6.3 Database Design

6.4 Screen Design & Shots

Chapter 7: System Security ………………………………………………………….92

7.1 Introduction

7.2 Project Security

Chapter 8: System Testing and Implementation…………………………………….96

8.1 Introduction

8.2 Test Cases

Chapter 9: Project Legacy…………………………………………………………..100

Chapter 10: Discussion ………………………………………………………………102

10.1 Conclusions

Chapter 11: References……………………………………………………………….105

11

11

11. CompanyCompany ProfileProfile

12

12

Company Profile

National Informatics Centre (NIC) o f the Department of Information Technology is providing network backbone and e-Governance support to Central Government, State Governments, UT Administrations, Districts and other Government bodies. It offers a wide range of ICT services including Nationwide Communication Network for decentralized planning, improvement in Government services and wider transparency of national and local Governments. NIC assists in implementing Information Technology Projects, in close collaboration with Central and State Governments, in the areas of (a) Centrally sponsored schemes and Central sector schemes, (b) State sector and State sponsored projects, and (c) District Administration sponsored projects. NIC endeavors to ensure that the latest technology in all areas of IT is available to its users .

Genesis

The Electronics Commission and the DOE put forward a proposal to

UNDP for assistance to set up a National Computer Centre in Delhi for

bui lding up national databases, developing the methodologies for ut i l iz ing

these, and for defining the various options and paths in decision-making

at the national level. A UNDP team visited Delhi in March 1975 to study

the proposal. The UNDP agreed to fund the National Informatics Centre

to the extent of US $4.4 mil l ion for the purchase of a large computer

system (costing approximately US $3.3 mil l ion), other hardware, training,

the services of experts, etc.

The 1976-’77 Annual Report of the DOE noted:

‘ In view of this, act ion has been taken to proceed with the prel iminary

work relat ing to the National Informatics Centre so that when UNDP

f inancial assistance becomes avai lable and the major hardware is

commissioned ( in 1978 on the basis of current information), the Centre

can get on with i ts work on an expedit ious basis. NIC is a plan project

13

13

administered by the Information, Planning and Analysis Group (IPAG) of

the Electronics Commission in i ts ini t ial stages’.

Objective

The long-term object ive of the National Informatics Centre, as approved

by the Planning Commission, Ministry of Finance and the Electronics

Commission, is ‘ to establ ish the feasibi l i ty of a system for the provision

of detai led information to government ministr ies and agencies to assist

them in making decisions relat ing to the country’s economic and social

development planning and program implementation’. (Annual Report of

the Department of Electronics, Government of India, 1977-’78, p172.)

NIC was set up with the object ive to promote economic, social, scienti f ic

and technological act ivi t ies, and also for macro-economic adjustment

program of the Government, through the applicat ions of IT.

Mandate

As laid down in the Annual Reports of DOE 1976-'77 and 1977-'78, NIC

was given the mandate to

Provide this informatics service to various user agencies in Government

Play a promotional role in creating appropriate information systems in Government

Act as a focal point for developing, managing and operating information system in Government

Act as a focal point for development of methodologies for designing and implementing national information systems and data management techniques

Act as a focal point for maintaining inventories of primary data and computer-based systems for data col lect ion and dissemination

Train users in information systems, data management and computing techniques

Ten information systems were planned for development by NIC in the fol lowing sectors:

Agriculture Construct ion and Transport Education and Manpower Energy

14

14

Finance Industry Small-Scale Industr ies Socio-Economic Index Trade and Media Government Archival Information

With this, NIC embarked on a grandiose mission to develop various

national databases for use in planning and decision-making by the

government.

Evolution

Start ing as a small program under an external st imulus by an UNDP

project in early 1970s, NIC started functioning in 1977 and since then

i t has grown incremental ly and later exponential ly as one of India’s

major S&T Organizations promoting Informatics-led Development,

which has helped to usher in the required transformation to cope

with the trends in the new mil lennium .

NIC has played an important role of an active catalyst and facilitator in

informatics development program in Governments at the national, state

and distr ict levels, during the last 26 years which made them take pol icy

decisions to create knowledge societ ies – societ ies that can exploit

knowledge to derive competit ive advantage using the opportunit ies

provided by digital technology. NIC has been instrumental in adopting

Information Technology and Communication Technology to reach out into

India i .e. by implementing IT appl icat ions in Social and Public

Administrat ions.

15

15

Services & Products

Computer Aided Design

CollabCAD is a 3D CAD/CAM Software system for the collaborative design & development of Industrial Designs from the Computer Aided Design (CAD) Group of National Informatics Centre (NIC), the IT supports professionals from India.

CollabCAD Advantages:

Collaborative & Comprehensive Economical CAD Solutions Flexible & Easy to Use Database Connectivity Programmable Scripting Interface Powerful Reverse Engineering Slicing/Cross sectioning, Generating Cross section points Customizable User Interface Standard Data Exchange Formats VRML Preview BAR Code for ERP Solution Plot Configurator and BOM XML based geometry data storage and Database connectivity Multiple language (English, French, German, Spanish, Norwegian and Italian)

support Content Management System and Work Flow Interface to Enterprise Automation Application

16

16

Geographical Information System (GIS)

Through its GISNIC software, NIC offers to undertake the tasks to generate and plot

various types of thematic maps (Flow Lines maps, Graduated Symbol maps, Choropleth

maps, Pie charts and Bar charts). The various tasks related to geographic analysis such as

creation of buffer zones, performing polygon overlay and manipulating tabular data, are

also carried out using GISNIC.

GOV.IN Domain Registration

This website provides Information & Services with respect to GOV.IN Domain.  The use

of GOV.IN Domain is restricted to the constituents of Indian Government at various

levels right from Central, State/UT, and District & Sub-District. National Informatics

Centre (NIC) is the exclusive Registrar for GOV.IN domain names.

17

17

Informatics

1. Biomedical Informatics

A Centre jointly setup by NIC and ICMR to cater to the information needs of

Medical community of India.

2. Patent Informatics

Website: http://patinfo.nic.in

It is one of the most comprehensive databases on the Patent Bibliography. This

database is known as EPIDOS (European Patent Information and Document

Service). European Patent Office (EPO) publishes this database. EPO has been

receiving the bibliography of all the patents filed and granted in approximately 71

countries since 1968. It contains over 33 millions references from 1968 onwards.

Almost 3 millions references are added each year.

3. Rural Informatics

Since time immmemorial, India has been a land of village communities. With

more than 75 percent people living in rural areas, no development, can be

successful unless it focuses on rural areas and rural people. In 1986, National

Informatics Centre introduced IT to facilitate planning, monitoring and exchange

of information between various agencies in Rural Development administration.

The journey towards evolution of Rural Informatics witnessed several ups and downs.Insight is an effort to Harness Past Experiences, Share Best Practices and Standardize Processes of Rural Informatics

18

18

Internet Data Centre (IDC)

Website: http://idc.nic.in

With more and more business processes and citizen services operating over the net,

demand for protection of data has risen with efficient backup and recovery solutions.

Thus there is a need to set up a strategic infrastructure that facilitates high

availability, quick scalability, efficient management & optimized utilization of

resources. To fulfill the need, NIC has set up state of art Internet Data Centers at NIC

Hq, New Delhi and 29 small data centers at various state capitals to cater the services

to Government entities. NIC Internet Data Centers combine around-the-clock systems

management with onsite personnel trained in the areas of Server Administrators,

Database Administrators, Internet, and systems management.

Mathematical Modeling and Simulation

Website: http://modelling.nic.in

In order to propagate and promote, the scientific decision making as a process, full

fledged division, taking care of the following major activities for the government

departments (central and state as well as public sector undertakings) is operational

in NIC Headquarters from its inception.

The Mathematical Modelling & Simulation Division has developed infrastructure

facilities and expertise in the area of computer aided modelling techniques using

state-of-the-art quantitative quantitative and simulation techniques besides

development of   Business Intelligence (BI) applications and providing consultancy

and trainings .

19

19

For planning in a dynamic economic environment and choice among strategic

option(s), the use of quantitative, qualitative, management and simulation techniques

for a scenario generation has been well established and been used world wide .

Computer Aided Model(s) and Decision support system (s) DSS have been widely

used by planners, policy makers, administrators and academicians for strengthening

the decision making as a process.  Computer systems linked with powerful computer

communication network have further increased the utility and operationalization of

such systems worldwide.

   The two major areas of support includes:

Quantitative Modelling & Simulation

Business Intelligence for Competitive Advantage

Networking

Website: http://satcom.nic.in.

National Informatics Center is the nodal Information Technology organization for

informatics development and networking in Government and Government related

Organizations. NICNET facility has been established in all Central Government

departments, 35 States/UTs and about 600 District centers to facilitate informatics

development for decision support and information exchange. A high speed NICNET

National info-Highway, an incremental overlay over the existing network had been

setup with SCPC , FTDMA, TDMA VSATs, DVB Broadband VSAT technology and

Wireless MAN to take advantage of Internet technology in India.

Services Corporate Communications Internet/Intranet E-mail EDI Web enabled database access Emergency voice communication Data broadcast

20

20

Multimedia broadcast Multicasting Distance Learning

Office Procedure Automation (OPA)

Easy Tracking System  OPA is a comprehensive package developed to help monitor pendency of cases and assist in easy tracking of letters and files. It is an integrated package which gives administrative support right from diarising of receipts, updating its status, opening of new files, tracking the movement of the files, despatch of letters/ files and finally record management. It is based on Manual of Office Procedure and is a proven system for Government / Semi-Government Offices and Public Sector Organizations.  Highlights  Complete Software Solution for:  

 Electronic File System by automating all File related operations  Diarisation of Receipts/Despatches  Tracking of Files & Receipts  Pendency Monitoring  Task Management  Report Generation

Features

 Tailor made for Government offices as per Manual of Office Procedure  Menu-driven user friendly interface  Screen design for easy data feeding  Extensive data validation checks built-in  Context sensitive help  Built-in Department of Administrative Reforms file naming concepts  Authorization checks for data access  Multi-user data entry & query  File register, key words and Precedent books to help locate relevant files  Modular and flexible  Codification to save time and reduce data entry errors

Benefits  

21

21

 Easy tracking of receipt and files  No effort or time required for report preparation  Monitors pendency across the organization  Record keeping made easy  Support for Indian Languages data entry and re-port generation  Increases efficiency and productivity by timely availability of standard and

uniform reports  Helps timely disposal of letters  Summary reports for sectional/divisional/ depart-mental level monitoring  Enforces a uniform working procedure  Easy to install, learn and use the system

Web Site Development & Hosting

Website: http://webservices.nic.in.

Amongst the various ways in which the 'Net' has now become a part of our lives lies

'WWW', or the World Wide Web which has effectively rendered the concept of

International Boundaries and physical distances  meaningless.Web presence today

has become a vital element for an organization striving to fulfil its objectives in an

efficient manner. And equally important, if not more, in the mantra of success is the

role of the web service provider. Setting up a powerful web presence is a voyage of

discovery. And in this journey, you will need a partner who knows the latest.. in

technology and technique.

22

22

2. Project IntroductionProject Introduction

23

23

2.1 About Project

The project titled “Student Trainee Management System” is being developed in

Training Division, head office National Informatics center, Delhi, Govt. of India.

National Informatics Centre, Ministry of Communication & Information Technology

enrolls final year students from various educational institutions for undertaking full

semester project work.

Students are selected on the basis of marks obtained in previous semester/years of the

degree under which the project is to be done & availability of suitable projects in NIC.

Selected Students are normally eligible for stipend as per NIC's norms. Till now trainee’s

information are maintained manually this involves large manpower and consumes a lot of

time. The project includes the making of a web based system so that all the manual work

become computerized & easily manageable .The web-enabled software will help in the

new trainee’s to enroll their applications remotely by using web and will be answer of

certain queries and also generating reports that are to be used by the various other

departments time to time.

2.2 Objectives

Study of existing System

Enhancement in existing system

Design of new system

Design and Development of Database

Design and Development of web pages.

Security and Authentication

Testing and Implementation of the web based TMS.

24

24

2.3 System Study

In the system study we try to analyze the problems of existing systems, define the objectives to be attained by a solution and evaluate various solution alternatives.

2.3.1 Limitation of Existing System

The existing Training management system suffers from many problems: The existing system is manual. Difficult to maintain details of applicant. Selection procedure takes too much time. Huge amount of data gets collected during data entry. Consumes lot of time. Delay in declaring selection results. Delay in sending selection letters to different institutes.

2.3.2 Proposed System:

In the present project a purely web enabled software will be developed using JAVA and J2EE with Hibernate as ORM tool and SQL Server 2005 as backend and iReport as reporting tool. The system will take care of each and every information of the trainee’s who are doing or have done their project work at NIC. Dynamic web pages based on client server model are to be developed, so that the trainees can apply and interact online.

25

25

(Proposed System)

Objectives of the project

Development of requirements documents.

Analysis of available database table.

Design of web pages.

Development of codes for web pages.

Validations Implementation.

Testing of various coding interfaces.

Implementation of the system.

Advantage of proposed system

26

26

Fully web based system.

Easy maintenance of large volume of data.

Trainees can register themselves online.

No delay in selection procedure.

Easily reports will be generated.

Lesser manpower and manual work.

27

27

2.4 System Feasibility

Preliminary investigation examine project feasibility, the likelihood the system will be

useful to the organization. The main objective of the feasibility study is to test the

Technical, Operational and Economical feasibility for adding new modules and

debugging old running system. All system is feasible if they are unlimited resources and

infinite time. There are aspects in the feasibility study portion of the preliminary

investigation:

Technical Feasibility Operation Feasibility Economical Feasibility

2.4.1 Technical Feasibility

The technical issues usually raised during the feasibility stage of the investigation

includes the following

1. Does the necessary technology exist to do what is suggested?

2. Does the proposed equipments have the technical capacity to hold the data

required to use the new system?

3. Will the proposed system provide adequate response to inquiries, regardless of the

number or location of users?

4. Can the system be upgraded if developed?

5. Are there technical guarantees of accuracy, reliability, ease of access and data

security?

The current system developed is technically feasible. It is a web based user interface for

trainees at NIC. Thus it provides an easy access to the users. The database’s purpose is to

create, establish and maintain a workflow among various entities in order to facilitate all

concerned users in their various capacities or roles. Permission to the users would be

granted based on the roles specified. Therefore, it provides the technical guarantee of

accuracy, reliability and security. The software and hard requirements for the

development of this project are not many and are already available in-house at NIC or are

available as free as open source. The work for the project is done with the current

28

28

equipment and existing software technology. Necessary bandwidth exists for providing a

fast feedback to the users irrespective of the number of users using the system.

2.4.2 Operational Feasibility

Proposed projects are beneficial only if they can be turned out into information system.

That will meet the organization’s operating requirements. Operational feasibility aspects

of the project are to be taken as an important part of the project implementation. Some of

the important issues raised are to test the operational feasibility of a project includes the

following: -

Is there sufficient support for the management from the users?Will the system be used and work properly if it is being developed and implemented?Will there be any resistance from the user that will undermine the possible application benefits?

The well-planned design would ensure the optimal utilization of the computer resources and would help in the improvement of performance status.

2.4.3 Economic Feasibility

A system can be developed technically and that will be used if installed must still be a

good investment for the organization. In the economical feasibility, the development cost

in creating the system is evaluated against the ultimate benefit derived from the new

systems. Financial benefits must equal or exceed the costs.

The system is economically feasible. It does not require any addition hardware or

software. Since the interface for this system is developed using the existing resources and

technologies available at NIC, There is nominal expenditure and economical feasibility

for certain.

29

29

. 3. ComponentComponent AssignedAssigned

30

30

3.1 Modules Assigned

The project entitled “STUDENT TRAINEES MANAGEMENT SYSTEM” is a web based application software for online registration of student willing to do full semester project work at NIC. This Trainees Management System is also for maintaining the record of students at Training Division and to generate the various reports acquired by the other departments of NIC. Reports are portable, printed reports are convenient and even necessary in some situations. Printed output or reports are also used in the turn around documents which can be used later on for the same system or for other system. In Training management system, it consist of four modules as given below:

Data Entry Data Processing Reports MIS

The components assigned include the enhancement of the existing modules & to make an interface for generating the reports. The enhancement of the existing module contains the layout design of web form with addition of Graphical user interfaces. In enhancement module various changes have to be included as given below:

Authentication Form New User Sign up. Login Form. Applicant’s Interfaces Form Online Registration Form.

Manipulation Interface Forms For

Trainee’s Project Details.Institute’s Details.HOD Details.

Searching Interface Forms For

Student’s Details.

31

31

The Report Module contains the various forms for the generation of reports, as given below:

Student ReportsInstitute Reports HOD Reports Miscellaneous Reports

Student Reports

Student report form generates the various reports regarding the applied students, selected students, Joined students, Recommended Students. In this form, reports will be generated on the entered value of Batch (Year), semester (January/July) and selected value (Y/N) by user.

Applied Student Report will provide the list of all the students who have/had applied for the training at NIC. Student’s Details will be sorted on the basis of marks obtained by them in their respective university examinations. Applied student does not require any selected option (Y/N).

Selected Student Report will provide the list of all the students who were /are selected for the training by NIC training department. Selected Student’s details will be categorized according to the assigned college’s category and students are sorted on the basis of marks obtained by them in their respective university examinations.

Similarly the Joined Student Report will list out the details of the student either they had/have joined their training or not Details of student will include the Student Id, Name, Discipline ,Marks, Training starting Date, Ending date & Duration of training in months.Recommended Students Report will help to know the applicant’s names that are recommended by some senior official or by any other person. By entering the value of batch (Year) and semester (January/July) report will be generated with details & total number of student.

Institute Reports

Institute Report Form generates the report regarding the labels of the Institute, Lists of institute & the summary of institute’s students applied, selected, joined for the entered Batch (year).Summary include the details that how many student of an institute applied in and respective number of student selected by NIC Department in a year and how many of them joined for training. Labels of institute will remove the handwork for the writing the colleges address for postal letter’s envelop.

32

32

HOD Reports

Hod report form generates the report regarding the Head Of department detail list, semester wise requirement, and summary. Hod list report will generate the document contains the name of all head of department officers with their contact number & detail information

Miscellaneous Reports

This includes the various other reports which will be helpful for trainees & the staff of NIC. Clearance Report, Expenditure, Monthly Stipend report, software list, Sanction letter or student marks report etc.

33

33

4. TechnologyTechnology EnvironmentEnvironment

34

34

4.1 Hardware Software Requirement Specification

This section describes the various hardware & software requirement by the

developer during the development of project & the tools used. It also includes

specification required by the client for implementing & using the system. This includes

the decision about the operating system to be used. The alternatives are passed through

the Mandatory requirements and screening criteria, which is a combination of the

requirements and some implicit requirements that the alternative should satisfy.

4.1.1 Developing Desktop Requirement

Hardware Intel Pentium processor® at 2.66 GHz

256 MB RAM minimum, Recommended 512 MB Ram

And other regular hardware devices

Software:

Jdk1.5 JSP2.0 Hibernate Microsoft SQL Server 2005 JDBC Driver of Microsoft SQL Server 2005

35

35

4.1.2 Software and Hardware Used for Client

Software

Os independent Internet browser

Hardware

Intel Pentium P III 450MHz or higher 128 MB RAM, recommended 256 or MB higher And other regular hardware devices

4.1.4 Software and Hardware for Server

Software

Operating System:

Os independent Software:

Jdk1.5.0 JSP2.0 Hibernate Microsoft SQL Server 2005 Tomcat Web Server

Hardware

Intel Pentium IV ® at 2.66 GHz minimum, recommended 3.02 GHz

512 MB RAM minimum, Recommended 1 GB Ram

And other regular hardware devices

36

36

5. System5. System RequirementRequirement & & Specification Specification

37

37

5.1 Introduction

SRS task refers to the process of specifying the requirements formally in a document and get it approved by the client. SRS documents all the ideas into a formal document that acts as a standard to be referred any time during the software development process. Requirements and specifications are very important components in the development of any project. Requirements analysis is the first step in the system design process, where a user's requirements should be clarified and documented to generate the corresponding specifications. While it is a common tendency for designers to be anxious about starting the design and implementation, discussing requirements with the customer is vital in the construction of safety-critical systems. For activities in this first stage has significant impact on the downstream results in the system life cycle. For example, errors developed during the requirements and specifications stage may lead to errors in the design stage. This leads not only to more time wasted but also the possibility of other requirements and specifications Therefore, it is necessary that the requirements are specified correctly to generate clear and accurate specifications.

The first step toward developing accurate and complete specifications is to establish correct requirements. In requirements, it is important to specifically establish the functions, attributes, constraints, preferences, and expectations of the product. Usually in the process of gaining information, functions are the first ones to be defined. Functions describe what the product is going to accomplish. It is also important to determine the attributes of a product. Attributes are characteristics desired by the client, and while 2 products can have similar functions, they can have completely different attributes. After all the attributes have been clarified and attached to functions, we must determine the constraints on each of the attributes. Preferences, which is a desirable but optional condition placed on an attribute, can also be defined in addition to its constraints. Finally, we must determine what the client's expectations are. This will largely determine the success of the product.

38

38

The System Requirement Specification for as system should have the following characteristics:

SRS should specify all the functions that the software is supposed to do and response to various inputs.

Requirements stated should not be ambiguous. Formal language specifications should be used.

Requirements stated should be verifiable & should not conflict with one other. SRS should be flexible enough to incorporate any change to it.

Main components are Functional requirements Performance requirements Design constraints

39

39

System Requirement Specification

5.2 Functional Requirement Specification:

40

40

The development of Training management system is required for removing the drawback

of the existing system. National Informatics Centre, Ministry of Communication &

Information Technology enrolls final year students from various educational institutions

for undertaking full semester project work.

Students are selected on the basis of marks obtained in previous semester/years of the

degree under which the project is to be done & availability of suitable projects in NIC.

Selected Students are normally eligible for stipend as per NIC's norms till now trainee’s

information are maintained manually which involves large manpower, and consumes a

lot of time. The web-enabled software will help in the answer of certain queries and also

generating reports that are to be used by the various other departments time to time.

Functional requirement specify all the functions of the system and the outputs to be

produced from the given inputs. These requirements explain the input-output relationship

between the entities of the system. Mainly the functions are displayed with the help of

use case or dataflow diagrams.

The existing Training management system suffers from many problems:

The existing system is manual. Selection of student takes too much time. Huge data storage during selection Consumes lot of time Delay in sending selection letters to different institutes Report Generation is manually

41

41

So the inputs for the new system are to make the existing systemFully web based, remotely access, online registration

Easy maintenance of large volume of data.

No delay in selection procedure.

Easily reports will be generated Efficient data storage in database Efficient utilization of resources. Easy manipulation & retrieval of student’s information.

So to meet the requirement as given above we have to develop a web application.The new system requires various web forms for performing the online registration,

selection task & data retrieval, generating reports.

System Requirements are being categorized in following modules:

Data Entry Data Processing Reports MIS

42

42

Performance Requirements

These requirements specify the performance characteristics of a system. There are two

types of performance requirements:

Static Requirements

Dynamic Requirements

Static Requirements also called as capacity requirements, these do not effect the

executions of the system. While Dynamic requirements specify constraints related to the

time in which the system is able to complete an operation and the number of operations

that a system performs in a unit time.

Design Constraints

Design constraints cover the various aspects as given :

Software & hardware limitations

Security

Standards

43

43

5.2 Technical Architecture

Initial requirement for building the project

Windows XP or Windows 2003 ,Linux Jdk1.5.0 Hibernate 3.1 Microsoft SQL Server 2005 Minimum P III or equivalent. Recommended dual CPU P III, 1200 MHz. 512 MB RAM minimum, recommended 1 GB RAM

In project a purely web enabled software will be developed using JSP with Hibernate is

used as ORM tool, SQL Server is used as backend and iReport is used for reporting

purposes. The system will take care of each and every information of the person who are

doing or have done there project work at NIC. Dynamic web pages based on client server

model are to be developed, so that the trainees can apply and interact online.

JAVA:

Java is a general-purpose class based, object oriented programming language. It is

designed to be the simple enough that many programmers can achieve fluency in the

language. The main Advantages of Java is its platform independent property. This made

Java a powerful tool as it can adapt to any change in environment.

In discussing Java, it is important to distinguish between the Java programming

language, The Java Virtual Machine (JVM), and the Java platform. The Java

programming language is the language in which Java application (applets, servlets etc.)

are written. It is the source code and it’s extension is .java. After compilation it is

converted to byte codes (which have an extension .class) that are portable machine

language of a CPU architecture known as the Java Virtual Machine. The JVM is usually

implemented in the form of a software program that interprets and executes these byte

codes.

44

44

The Java platform is distinct from both Lava language and JVM. The Java platform is the

predefined set of Java classes that exist on every Java installation; these classes are

available for use by all Java programs. TheJava Platform is also sometimes referred to as

the Java runtime environment.

Why is Java used?

Java is the most powerful language today.

When properly applied, the features of Java (eg. Encapsulation, inheritance etc.)

combine to produce a programming environment that supports the development

of far more robust and scalable programs.

A well-designed hierarchy of classes helps programmers in reusing the code.

Encapsulation allows programmer to migrate his implementation over time

without breaking the code that depends on the public interface of the classes as in

encapsulation public methods can be used to protect private data.

Inheritance interacts with encapsulation as well.

Polymorphism ( one interface multiple methods) allow a programmer to create

clean, sensible, readable and resilient code.

Java is platform independent. Java lets us deploy the same Servlet and JSPs on

many different platforms, be it UNIX, Linux, Windows or Macintosh. In fact,

switching platforms with Servlet/JSP applications can be simple as copying a

single file into the proper directory.

Java is web centre. Java is designed for distributed environment of the internet,

thet makes the implementation more convenient in case of online application.

Java’s highly object oriented nature encourages developer to write maintainable

and reusable code, which is deal in ever changing nature of web application.

45

45

46

46

JAVA SERVLETS

Java Servlet technology provides web developers with a simple, consistent mechanism for extending the functionality of a web server and for accessing existing business systems. A servlet can almost be thought of as an applet that runs on the server side -- without a face. Java servlets have made many web applications possible.

Servlets are the Java platform technology of choice for extending and enhancing web

servers. Servlets provide a component-based, platform-independent method for building

web-based applications, without the performance limitations of CGI programs. And

unlike proprietary server extension mechanisms (such as the Netscape Server API or

Apache modules), servlets are server- and platform-independent. This leaves you free to

select a "best of breed" strategy for your servers, platforms, and tools.

Servlets have access to the entire family of Java APIs, including the JDBC API to access

enterprise databases. Servlets can also access a library of HTTP-specific calls and receive

all the benefits of the mature Java language, including portability, performance,

reusability, and crash protection.

47

47

Portability

Because servlets are written in Java and conform to a well defined and widely accepted

API, they are highly portable across operating systems and server implementations.With

servlets you can truly say “write once, serve everywhere” reason being a class file is

made which is nothing but machine-independent bytecodes. We can develop a servlet on

Windows NT machine running the Java Web Server and later deploy it effortlessly on a

Unix server running Apache.

Safety

Servlets support safe programming practices on a number of levels. Firstly, servlets

inherit the strong type safety of Java language. Secondly, Java’s automatic garbage

collection mean that servlets are safe from memory management problems like dangling

pointers, invalid pointer references and memory leaks.

Etensibility and Flexibility

The servlet API is designed to be easily extensible. The API includes classes that are

optimized for HTTP servlets but at a later date it could be extended and optimized for

another type of servlets by a third party.

Sevlets are also quite flexible. An HTTP servlet can be used to generate a complete

webpage it can be added to a static page using a <SERVLET> tag in what is known as a

server-side include and it can be used in cooperation with any number of servlets to filter

the content in something known as servlet chain.

48

48

Integration

Servlets are tightly integrated with the server. A servlet can use the server to translate file paths, perform logging, check authorization, perform MIME type mapping and, in some cases, even add users to the server’s user database.

Elegance

Servlet code is clean, simple, object-oriented, modular and amazingly simple. A servlet API can include methods and classes to handle many type of routine chores.

Efficiency

Servlet invocation is highly efficient. Once a servlet is loaded, it generally remains in

servers memory as a single object instance so it automatically maintains its state and can

hold on to external sources such as database connections that may otherwise take several

seconds to establish. Unlike with CGI servlet can begin handling the request

immediately. Multiple, concurrent request are handled by multiple threads, so servlets are

highly scalable. Today, servlets are a popular choice for building interactive web

applications.

Java Server Pages (JSP):

Java Server Pages, also known as JSPs are simple but powerful technology used to

generate dynamic HTML on severs side. They are a direct extension of Java Sevlets and

provide a way to separate content generation from content presentation. The JSP engine

is just another Servlet that is mapped to the extension *.jsp.

The source code of a JSP document looks like any other HTML document with some added tags containing Java code. The source code is stored in a file called XXX.jsp and copied to the document directory of the Web server. When a request is made for this document, the server recognizes the *.jsp extension and realizes that special that special handling is required. The first time the file is requested, it is compiled into a Servlet object and stored in the memory, and the output is sent back to the requesting client.

49

49

After the first request, the server checks to see whether the *.jsp file has changed. If it has not changed, then the server invokes the previously compiled Servlet object.

Steps required for JSP request:

The user visits a web site made using JSP. He goes to a JSP page (ending with .jsp). The web browser makes the request via internet.

The JSP request is sent to the web server. The web server recognizes that the file required is special (.jsp), therefore passes

the file to the JSP Sevlet engine. If the file has been called for the first time, the JSP file is parsed, other wise go to

step 7. The next step is to generate a special Servlet from JSP file. The entire HTML is

converted into ‘println’ statements. The Servlet source code is compiled into a class. The Servlet is instantiated, calling the init and service methods. HTML from the Servlet output sent via Internet. HTML results are displayed on the user’s web browser.

50

50

Hibernate:

Hibernate is a free, open source Java package that makes it easy to work with relational

databases. Hibernate makes it seem as if your database contains plain Java objects like

you use every day, without having to worry about how to get them out of (or back into)

mysterious database tables. It liberates you to focus on the objects and features of your

application, without having to worry about how to store them or find them later

History and Background

Most applications have some need to work with data. Java applications, when running,

tend to encapsulate data as networks of interconnected objects, but those objects vanish

in a puff of logic when the program ends, so there needs to be some way to store them.

And sometimes the data is already "out there" before the application is even written, so

there needs to be a way to read it in and represent it as objects. Writing code by hand to

51

51

perform these tasks is tedious and error-prone, and can represent a major portion of the

effort involved in the overall application.

As good object-oriented developers got tired of this repetitive work, their typical

tendency towards enlightened laziness started to manifest itself in the creation of tools to

help automate the process. When working with relational databases the culmination of

such efforts were object/relational mapping tools.

How Hibernate Works

Rather than utilize bytecode processing or code generation, Hibernate uses runtime reflection to determine the persistent properties of a class. The objects to be persisted are defined in a mapping document, which serves to describe the persistent fields and associations, as well as any subclasses or proxies of the persistent object. The mapping documents are compiled at application startup time and provide the framework with necessary information for a class. Additionally, they are used in support operations, such as generating the database schema or creating stub Java source files.A SessionFactory is created from the compiled collection of mapping documents. The SessionFactory provides the mechanism for managing persistent classes, the Session interface. The Session class provides the interface between the persistent data store and the application.The Session interface wraps a JDBC connection,which can be user-managed or controlled by Hibernate, and is only intended to be used by a single application thread, then closed and discarded.

52

52

The Configuration File

<?xml version='1.0' encoding='UTF-8'?><!DOCTYPE hibernate-configuration PUBLIC "-//Hibernate/Hibernate Configuration DTD 3.0//EN" "http://hibernate.sourceforge.net/hibernate-configuration-3.0.dtd">

<!-- Generated by MyEclipse Hibernate Tools. --><hibernate-configuration>

<session-factory><property name="connection.username">root</property><property name="connection.url">

jdbc:sqlserver://CABIIN49\SQLEXPRESS:1433</property><property name="dialect">

org.hibernate.dialect.SQLServerDialect</property><property name="myeclipse.connection.profile">

server2005</property><property name="connection.password">nic123</property><property name="connection.driver_class">

com.microsoft.sqlserver.jdbc.SQLServerDriver</property><mapping resource="sumitparihar/Sanction.hbm.xml" /><mapping resource="sumitparihar/InstCod.hbm.xml" /><mapping resource="sumitparihar/Stuinfo.hbm.xml" />

</session-factory>

</hibernate-configuration>

53

53

The Mapping Documents

Our example utilizes one trivial class Sanction. The mappings for these class isshown below.

<?xml version="1.0" encoding="utf-8"?><!DOCTYPE hibernate-mapping PUBLIC "-//Hibernate/Hibernate Mapping DTD 3.0//EN""http://hibernate.sourceforge.net/hibernate-mapping-3.0.dtd"><!-- Mapping file autogenerated by MyEclipse - Hibernate Tools--><hibernate-mapping> <class name="sumitparihar.Sanction" table="sanction" schema="dbo" catalog="hi"> <id name="stuId" type="java.lang.Integer"> <column name="STU_ID" /> <generator class="assigned" /> </id> <property name="sanDate" type="java.util.Date"> <column name="SAN_DATE" length="23" /> </property> <property name="sanAmount" type="java.lang.Float"> <column name="SAN_AMOUNT" precision="53" scale="0" /> </property> <property name="instCode" type="java.lang.Short"> <column name="INST_CODE" /> </property> </class></hibernate-mapping>

54

54

The mapping documents are reasonably clear, but certain areas warrant explanation. The

id

element block describes the primary key used by the persistent class. The attributes of the

id

element are:

name: The property name used by the persistent class.

column: The column used to store the primary key value.

type: The Java data type used. In this case, we’re going to use longs.

unsaved-value: This is the value used to determine if a class has been made

persistent, i.e., stored to the database. If the value of the id attribute is null, Hibernate

knows that this object has not been persisted. This is important when calling the

55

55

HIBERNATE - Features of HibernateHIBERNATE - Features of Hibernate

  Transparent persistence without byte code processing

    Transparent persistence     JavaBeans style properties are persisted     No build-time source or byte code generation / processing    Support for extensive subset of Java collections API    Collection instance management    Extensible type system     Constraint transparency    Automatic Dirty Checking     Detached object support  Object-oriented query language

    Powerful object-oriented query language    Full support for polymorphic queries    New Criteria queries    Native SQL queries  Object / Relational mappings

    Three different O/R mapping strategies    Multiple-objects to single-row mapping    Polymorphic associations     Bidirectional associations    Association filtering    Collections of basic types     Indexed collections     Composite Collection Elements     Lifecycle objects   Automatic primary key generation     Multiple synthetic key generation strategies     Support for application assigned identifiers     Support for composite keys   Object/Relational mapping definition

    XML mapping documents    Human-readable format    XDoclet support  HDLCA (Hibernate Dual-Layer Cache Architecture)

    Thread safeness     Non-blocking data access     Session level cache     Optional second-level cache

56

56

    Optional query cache    Works well with others  High performance

    Lazy initialization     Outer join fetching     Batch fetching    Support for optimistic locking with versioning/timestamping    Highly scalable architecture     High performance     No "special" database tables    SQL generated at system initialization time    (Optional) Internal connection pooling and PreparedStatement caching  J2EE integration

    JMX support     Integration with J2EE architecture (optional)     New JCA support

57

57

SQL Server 2005SQL Server 2005

The following table provides an overview of several key enhancements in SQL Server

2005, focusing on enterprise data management, developer productivity, and business

intelligence..

Enterprise Data ManagementTechnology CapabilitiesHigh Availability Failover clustering and database mirroring technology in SQL Server 2005 will

enable enterprises to deliver highly reliable, available applications to employees,

customers, and partners.

Management

Tools

SQL Server 2005 introduces an integrated suite of management tools and

management application programming interfaces (APIs) to provide ease of use,

manageability, and support for operating large-scale SQL Server deployments.

Security

Enhancements

SQL Server 2005 has been designed to help provide the highest level of security

for enterprise data through features such as database encryption, more secure

default settings, password policy enforcement, granular permissions control, and

an enhanced security model.

Scalability Scalability advancements in SQL Server 2005 include table partitioning,

replication enhancements, and 64-bit support.

Developer ProductivityTechnology Capabilities

Common Language

Runtime (CLR)

Integration

SQL Server 2005 introduces the capability to develop database objects

using any Microsoft .NET language.

Deep XML Integration SQL Server 2005 delivers a new XML data type, enabling the storage of

XML fragments or documents in SQL Server databases.

Transact-SQL

Enhancements

New query types and the capability to use error handling in transactions

provide developers with more flexibility and control in SQL Server query

development.

SQL Server 2005

Compact Edition

Full integration of SQL Server 2005 Compact Edition with SQL Server 2005

and Visual Studio 2005 provides a platform for developers to rapidly build

applications that extend enterprise data management capabilities to

mobile devices.

Business IntelligenceTechnology Capabilities

Analysis

Services

Analysis Services provides a unified and integrated view of all your business data as

the foundation for all of your traditional reporting, OLAP analysis, Key Performance

Indicator (KPI) scorecards and data mining.

Integration

Services

SQL Server Integration Services (SSIS) is a next generation data integration platform

that can integrate data from any source. SSIS provides a scalable and extensible

58

58

Business IntelligenceTechnology Capabilities

platform that empowers development teams to build, manage, and deploy

integration solutions to meet unique integration needs.

Reporting

Services

SQL Server Reporting Services is a comprehensive, server-based reporting solution

designed to help you author, manage, and deliver both paper-based and interactive

Web-based reports.

Data Mining SQL Server 2005 Analysis Services (SSAS) provides tools for data mining with which

you can identify rules and patterns in your data, so that you can determine why

things happen and predict what will happen in the future – giving you powerful

insight that will help your company make better business decisions.

59

59

MyEclipse Enterprise Workbench is a commercial Java IDE created and supported by

the company Genuitec, LLC

MyEclipse, first released in 2003, is built upon the Eclipse platform, specifically using

the Web Tools Platform (WTP) for much of its functionality. The MyEclipse tools are

most comparable to the IBM Rational Software toolkit, JetBrains (IntelliJ IDEA), and

BEA Systems tools.

MyEclipse is available in two versions (Standard and Professional.)

60

60

Flow chart :

61

Start ssssatraasss

Institute Fills online registration form in NIC

Student receives selection letter from NIC

Branch is allocated to selected student

HOD and Project guide allocated

Project is allocated

Stipend is sanctioned at the end of every month

Student receives Stipend

Stop

Selected

61

5.4.2 Data Flow Diagrams

Selection InformationReview of Old Cases

Registers View Details

View Details Data Entry Data processing

Reports

62

Student trainee

Registration

NIC Training Department

62

5.4.3 E-R Diagram

63

Student

Instcode

SidSname

Works on

Works in

Register in

Project

NIC

BranchesWorks under

has

Project guideAssigned by

Supervises by

HOD

Marks

Nic location

No of branches

Hname

Hid Age

No of trainees

Phone no

Age Sex

Bhod

Blocation

Name

Id

age

sexNo of stud

allocatedUses

Technology

S/w tool S/w type

bname

63

6. System DesignSystem Design

64

64

6.1 Introduction

Systems design is the third phase in the system development life cycle. Now

we are ready to begin the physical design system that will meet the specification

described in the system requirements document

User Interface, Input and Output Design

Interface Issue

User interface, input and output design begins the systems design phase of the SDLC. The user interface should include all the tasks, commands and communication between users and the system. In GUI environment a user can display and

work with multiple windows on the single screen.

Input Design Issues During input design, determine how data will be captured and

entered into the system. Data capture is the identification and recording of source data.

Data entry is the process of converting source data into computer readable form and

entering it into or from system.

Input Design has six main objectives.

1. To select a suitable input and data entry method

2. To reduce the input volume

3. To design attractive data entry screen

4. To use validation check to reduce input errors

5. To design required source documents

6. To develop effective input control

65

65

Output Design issues

It Includes

What is the purpose of output?

Who wants the information, why it is needed and how it will be used?

Will the output be printed, viewed on screen or both?

Do security or confidentiality issues exist?

Reports like any other elements of the user-computer interface should be attractive,

professional, and easy to use. System analysts should realize that printed output is highly

visible and manages sometimes judges project by the quality of reports they receive.

66

66

6.2 Project Module Design:

System Requirement & specification phase’s output takes to the design step.

After going through the requirement & analysis in the last section now have to design the

project.

In Training management system, it consist of four modules as given below:

6.3 Database Designing

67

STMS

Data Entry

Data Processing Reports MIS

Main FormStudent Details Institute Details Hod Details etc

Student Reports Institute Reports Hod Reports Misc. Reports

67

List of Tables:

Allocation

Allocation_st

Allocation_hod

Criteria

Discip

Hod

Hodsummary

Inst_code

Monthlystipend

Monthname

Recommranks

Relaxation

Requ

Sanction

Studetail

Stuinfo

swtools

68

68

Student Database

69

69

The design of various tables used in the database are as follows:Table 1: stuinfo

Name Type Size Null

SNO int 4 NOT NULL

NAME char 50 NULL

BATCH Smallint 7 NULL

SEMI char 7 NULL

INST_CODE Smallint 2 NULL

ADD_INST1 char 60 NULL

ENT_DATE datetime 8 NULL

SD datetime 8 NULL

DURA smallint 2 NULL

ED datetime 8 NULL

STIPEND char 3 NULL

ST1 smallint 2 NULL

DISCI char 3 NULL

SEM_1 float 8 NULL

SEM_2 float 8 NULL

SEM_3 float 8 NULL

SEM_4 float 8 NULL

SEM_5 float 8 NULL

SEM_6 float 8 NULL

SEM_7 float 8 NULL

SEM_8 float 8 NULL

70

70

PERS float 8 NULL

PERS_ORIG float 8 NULL

SELECTED char 3 NULL

LIST_NO smallint 2 NULL

JOINED char 3 NULL

RECOMM char 20 NULL

NIC char 3 NULL

COURSE_CAT char 13 NULL

CATEGORY char 7 NULL

OS1 char 20 NULL

OS2 char 20 NULL

OS3 char 20 NULL

DB1 char 20 NULL

DB2 char 20 NULL

DB3 char 20 NULL

LANG1 char 20 NULL

LANG2 char 20 NULL

LANG3 char 20 NULL

PER_ADD1 char 65 NULL

PER_ADD2 char 65 NULL

RELAX_PERS float 8 NULL

SELECTED_LIST smallint 2 NULL

71

71

Table 2:Allocation_hod

Name Data Type Size Nulls

SERIAL NO Small int 2 NOT NULL

HOD Char 20 NULL

HDISCI Char 20 NULL

HDB char 20 NULL

HLANG Char 20 NULL

STUDID Int 4 NULL

SDISCI Char 20 NULL

SOS Char 20 NULL

SDB Char 20 NULL

SLANG Char 20 NULL

WEIGHTAGE nvarchar 20 NULL

Table 3: Allocation_st

Name Data type Size Nulls

SNO int 4 NOT NULL

HOD Char 20 NULL

DISCI Char 20 NULL

OS Char 20 NULL

DB Char 20 NULL

LANG Char 20 NULL

STATUS Char 20 NULL

ST_ID int 4 NULL

WEIGHTAGE Char 20 NULL

72

72

Table 4: criteria

Name Data type Size Nulls

BATCH int 4 NULL

SEMESTER char 10 NULL

CUT_OFF_PERCENTAGE float 8 NULL

CDATE1 datetime 8 NULL

CDATE2 datetime 8 NULL

CATA int 4 NULL

CATB int 4 NULL

CATC int 4 NULL

LIST_NO smallint 2 NULL

Table 5:Dicip

Name Data Type Size Nulls

Disc char 20 NULL

Table 6:hod

Name Data Type Size NullsHOD Char 8 NULL

HOD_NAME Char 30 NULL

DESIG Char 5 NULL

ADDRESS Char 50 NULL

DIVISION Char 30 NULL

PHONE_O Decimal 9(18,0) NULL

PHONE_R Decimal 9(18,0) NULL

INTER Char 5 NULL

EMAIL Char 50 NULL

73

73

Table 7:hod summary

Name Data Type Size NullBATCH Smallint 2 NOT NULLHODNAME Char 50 NULLTOTALINUSE Smallint 2 NULLTOTALABS Smallint 2 NULLTOTALREQ Smallint 2 NULLTOTALJOIN Smallint 2 NULL

Table 8:inst_code

Name Data Type Size NullDESIG Char 35 NULLSTATUS Char 3 NULL ADD_INST1 Char 60 NULLADD2 Char 35 NULLADD3 Char 35 NULLADD4 Char 25 NULLPIN Char 7 NULLCATA char 1 NULLTELNO Numeric 9(18,0) NULLFAXNO Numeric 9(18,0) NULLINSTMAIL Char 50 NULL

Table 9: relaxation

Name Data Type Size NullYEAR smallint 2 NULLSEMESTER char 7 NULLRELAX_SC Float 8 NULLRELAX_ST Float 8 NULLRELAX_OBC Float 8 NULL

74

74

Table 10: requ

Name Data Type Size NullSESSION Char 7 NULLYEARS int 4 NULLTOT_NO_RE Smallint 2 NULLTOT_NO_SA Smallint 2 NULLTOT_NO_JO smallint 2 NULLHOD char 8 NULLDIVISION char 25 NULLINST_TYPE Char 1 NULLTOT1 Smallint 2 NULLDISCI1 char 20 NULLOS1 Char 20 NULLDB1 Char 20 NULLLANG1 Char 20 NULLTOT2 Smallint 2 NULLDISCI2 Char 20 NULLOS2 Char 20 NULLDB2 Char 20 NULLLANG2 Char 20 NULLTOT3 Smallint 2 NULLDISCI3 Char 20 NULLOS3 Char 20 NULLDB3 Char 20 NULLLANG3 char 20 NULL

Table11:sanction

Name Data Type Size NullSTU_ID Int 4 NULLSANC_DATE Datetime 8 NULLSANC_AMNT Float 8 NULLINST_CODE smallint 2 NULLPROJ_GUIDE Char 5 NULL

75

75

Table 12: sw_tools

Name Data Type Size NullSW_TOOL Char 20 NULLTYPE Char 3 NULL

Table 13:studetail

Name Data Type Size NullSNO Int 4 NOT NULLNAME Char 3 NULLINST_CODE Char 30 NULLPROJ_TITLE Char 60 NULL PROJ_LEAD Char 8 NULLPROJ_GUIDE Char 30 NULLPROJ_LOC Char 50 NULLPHONE Numeric 9(18,0) NULLINTER Char 5 NULLCLEARANCE Char 3 NULLIMPLEMENT Char 3 NULLMOD_USE Char 3 NULLABSCONDING Char 3 NULL

76

76

6.4 Screen Shots

Description:

When you will type the web address(Here http://localhost:8080/now/MAIN.jsp) of the STMS application, following page will open which is the home page of the application.On this page there is an option for new users to sign up. Existing NIC employee can use their user id & password for log in.

Login Page

77

77

Login Fail

78

78

79

79

Student Registration Form

80

80

81

81

Login Form

82

82

Description:

After Login success NIC Employee will be navigated to the menu form where there are four modules performing different functions

Menu Form

83

83

Student Information Entery Form

Student Information Entery Form

84

84

Student Detail Form

85

85

HOD Details SearchHOD Details Search FormForm

86

86

Hod RequirementHod Requirement

87

87

Sanction Released FormSanction Released Form

88

88

Institute Detail Form

89

89

Available Software Detail

90

90

Student Selection

91

91

Student Selection According To HOD Requirement

92

92

MIS

93

93

7. SecuritySecurity IssuesIssues

94

94

7.1 Introduction

The protection of computer based resources that includes hardware, software, data,

procedures and people against unauthorized use or natural

Disaster is known as System Security.

System Security can be divided into four related issues:

Security

Integrity

Privacy

Confidentiality

System Security refers to the technical innovations and procedures applied to the

hardware and operation systems to protect against deliberate or accidental damage from a

defined threat.

Data security is the protection of data from loss, disclosure, modification and destruction.

System Integrity refers to the power functioning of hardware and programs, appropriate

physical security and safety against external threats such as eavesdropping and

wiretapping.

Privacy defines the rights of the user or organizations to determine what information they

are willing to share with or accept from others and how the organization can be protected

against unwelcome, unfair or excessive dissemination of information about it.

Confidentiality is a special status given to sensitive information in a database to minimize

the possible invasion of privacy. It is an attribute of information that characterizes its

need for protection.

95

95

7.2 Project Security

System security refers to various validations on data in form of checks and controls to

avoid the system from failing. It is always important to ensure that only valid data is

entered and only valid operations are performed on the system. The system employees

two types of checks and controls:

8.2.1 Client Side validation

If the web browser allows running the Java script then client side validation code is run

otherwise validation is done at the server side automatically. Various client side

validations are used to ensure on the client side that only valid data is entered. Client side

validation saves server time and load to handle invalid data. Some checks imposed are:

Validation is used to ensure those required fields are filled with suitable data only.

Maximum lengths of the fields of the forms are appropriately defined.

Forms cannot be submitted without filling up the mandatory data so that manual mistakes

of submitting empty fields that are mandatory can be sorted out at the client side to save

the server time and load.

Tab-indexes are set according to the need and taking into account the ease of user while

working with the system.

8.2.2 Server Side Validation

Some checks cannot be applied at client side. Server side checks are necessary to save the

system from failing and intimating the user that some invalid operation has been

performed or the performed operation is restricted. Some of the server side checks

imposed are:

96

96

Server side constraint has been imposed to check for the validity of primary key and

foreign key. A primary key value cannot be duplicated. Any attempt to duplicate the

primary value results into a message intimating the user about that value through the

forms using foreign key can be updated only of the existing foreign key values.

User is intimating through appropriate messages about the successful operations or

exceptions occurring at server side.

Various Access Control Mechanisms have been built so that one user may not agitate

upon another. Access permissions to various types of users are controlled according

to the organizational structure. Only permitted users can log on to the system and can

have access according to their category. User- name, passwords and permissions are

controlled o the server side.

Using server side validation, constraints on several restricted operations are imposed.

97

97

8. System TestingSystem Testing&&

ImplementationImplementation

98

98

8.1 Introduction

In this phase the system is tested. Normally programs are written as a series of individual

modules, these subjects to separate and detailed test. The system is then tested as a

whole. The separate modules are brought together and tested as a complete system. The

system is tested to ensure that interfaces between modules work (integration testing), the

system works on the intended platform and with the expected volume of data (volume

testing) and that the system does what the user requires (acceptance/beta testing).

The developed software is tested to the customer to detect the possible errors. A software

test program should aim at detecting maximum number of errors in the software. The

process of testing involves creating the test cases and implementing those test cases on

the software to detect errors. Testing validates that the actual performances of the

software meets the user requirements. The Testing Strategy and plan TSP document is a

formal document that contains the test plan and the list of all types of test to be done on

the software

Test Plan consists of the components to be tested, people involved in testing, test cases

and the acceptance criterion for the software. Some guidelines to be followed while

creating test plan are as follows:

The test planned for the software should be such that they detect the deviation of the

software from client requirements. The test planned in the test plan should begin from

smaller module and move to cover the entire system.

The test plan should assign the task of testing to a third person. This is because a person

from outside the development team has the better chances of detecting errors. Software

testing can be broadly classified into two categories:

White Box Testing

Black Box Testing

99

99

A testing strategy describes the steps that are performed during the testing of software.

Unit Testing

Integration Testing

System Testing

Functional Testing

8.2 Creating Test Cases

Developing test case is an important task of testing. An efficient test case detects the

maximum number of errors.

General Format for test Cases is given below:

Test Case ID Test Case Description

Expected Output Actual output

1. Fill The Following Details…

An Error message Should be displayed..

100

100

Test Case for Login Form:

Test Case ID

Test Case Description Expected Output Actual output

1.Fill The Following Details…

User Name= Leave Blank

Password = nic123

Click Submit

An Error message Should be displayed.

“Can’t be Blank”

2Fill The Following Details…

User Name=root

Password =

Click Submit

An Error message Should be displayed

“Access Denied”

101

101

9. Project LegacyProject Legacy

102

102

10.1 Project Enhancements:

While developing software a developer take care of every requirement of user, but it not fair to say that a project completes ever. Many enhancements & new features are required by user & added in future. Software is enhanced & marketed with the version numbers.

At this time the major enhancements which I feel this project require are:

Security needs to be tightening & password strength should be added. More dynamic users interface using flash. Client Side validation have to be improved. Report formats to be change. File Uploading like bio-data provision should be added.

103

103

10. DISCUSSIONDISCUSSION

104

104

10.1 CONCLUSION

It has been a great pleasure for me to work on this exciting and challenging project. This

project proved good for me as it provided practical knowledge of not only programming

in JAVA as well as working of web based application and no some extent Windows

Application and SQL Server, but also about all handling procedure related with “Design

and Development of Sudent Trainees Management System”. It also provides knowledge

about the latest technology used in developing web enabled application and ORM Tool

such as Hibernate that will be great demand in future. This will provide better

opportunities and guidance in future in developing projects independently.

Benefits:

The project is identified by the merits of the system offered to the user. The merits of this project are as follows: -

It’s a web-enabled project.

This project offers user to enter the data through simple and interactive web

forms. This is very helpful for the client to enter the desired information through

so much simplicity.

The user is mainly more concerned about the validity of the data, whatever he is

entering. There are checks on every stages of any new creation, data entry or

updation so that the user cannot enter the invalid data, which can create problems

at later date.

User is provided the option of monitoring the records he entered earlier. He can

see the desired records with the variety of options provided by him.

From every part of the project the user is provided with the links through framing

so that he can go from one option of the project to other as per the requirement.

This is bound to be simple and very friendly as per the user is concerned. That is,

we can say that the project is user friendly which is one of the primary concerns

of any good project.

Data storage and retrieval will become faster and easier to maintain because data

is stored in a systematic manner and in a single database.

105

105

Decision making process would be greatly enhanced because of faster processing

of information since data collection from information available on computer takes

much less time then manual system.

Allocating of sample results becomes much faster because at a time the user can

see the records of last years.

Easier and faster data transfer through latest technology associated with the

computer and communication.

Through these features it will increase the efficiency, accuracy and transparency,

106

106

11. REFERENCES11. REFERENCES

107

107

BIBLIOGRAPHY:

1. Hibernate in action by Christian Bauer and Gavin King

2. Head First Servlets and JSP by Bryan Basham, Kathy Sierra, Bert Bates

3. Beginning JSP 2.0 by Ben Galbraith, Wrox

4. Professional Jsp by Wrox Press Limited

5. Date, C.J (Third edition) An introduction to database system Addition wesley/

Narosa Publication.

108

108

Websites :

These are various websites which is helpful in developing the project in coding prospect

http://www.roseindia.net/hibernate/

http://www.hibernate.org

http://pdf.coreservlets.com/

http://www.w3schools.com/html/

http://www.echoecho.com/html.htm

109

109

110

110


Top Related