Publicidad
student supervision system
student supervision system
student supervision system
student supervision system
Publicidad
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
Publicidad
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
Publicidad
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
Publicidad
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
Publicidad
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
Publicidad
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
Publicidad
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
Publicidad
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
Publicidad
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
student supervision system
Próximo SlideShare
University management systemUniversity management system
Cargando en ... 3
1 de 97
Publicidad

Más contenido relacionado

Publicidad

student supervision system

  1. A PROJECT REPORT ON “Student Supervision System” ln partial fulfillment for the award of the degree of MASTER OF COMPUTER APPLICATION (Session- 2012-2015) UTTAR PRADESH TECHNICAL UNIVERSITY, LUCKNOW(UTTAR PRADESH) INTEGRATED ACADEMY OF MANAGEMENT AND TECHNOLOGY Submitted To:- Submitted By:- Vivek Saxena NAME- Gaurav Sharma ROLL NO.-1211314007
  2. Acknowledgement Keep away from people who try to belittle your ambitions. Small people always do that, but the really great make you feel that you too, can become great. I take this opportunity to express my sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and have helped me in completing this project successfully. First of all, I would like to thank Mr. Vivek Saxena for creating opportunities to undertake me in the esteemed organization. I would also thank to my Mr. Vivek Saxena (MCA Dept.) my internal project guide who guided me a lot in completing this project. I would also like to thank my parents & project mate for guiding and encouraging me throughout the duration of the project. In all I found a congenial work environment in Stu Corner and this completion of the project will mark a new beginning for me in the coming days. Name: GAURAVSHARMA MCA -6th Sem Roll No. : 1211314007
  3. DECLARATION I, GAURAV SHARMA hereby declare that the report of the project entitled “Student Supervision System” has not presented as a part of any other academic work to get my degree or certificate except INMANTEC Ghaziabad for the fulfillment of the requirements for the degree of Master of Computer Application. Name:- GAURAV SHARMA MCA -6th Sem Roll No. : 1211314007
  4. TABLE OF CONTENTS Chapter No. TITLE PageNo. BONAFIDE i 1. Introduction 1 2. Language And Tool to be Used 3 3. Software Development Life Cycle 4 4. System Analysis 7 5. System Software Requirement(SRS) 10 5.1 Module 1 5.2 Module 2 5.3 Module 3 5.4 Module 4 6. Project Plan 13 6.1 Scope Management 6.2 People Management 6.3 Risk Management Plan 6.4 Time Management Plan 7. Feasibility Analysis 16 8. Methodology Adopted 19 9. System Design 20 10. Coding Method 32 11. Testing 46 12. Implementation 51 13. Maintenance 53 14. Module Description 55 15. System Requirements 57 16. E-R Diagram & Data Flow Diagram 58 17. Screenshots of forms 61 18. Future Scope of Project 68 19. List of Tables & Figures 69 20. Conclusion 71 21. References
  5. INTRODUCTION We have developed the “Student Supervision System” for fulfillment of my MCA project, The Benefits of This Project Is That The order of arrangement of all the top level to bottom level of hierarchy like a institute or organization . Admin is a top level management and supervisor is a middle level management and student or employe is low level management. First describe something about this application. The main objective of this application is to manage details of members of the customer and its activities.  It is helpful to manage all the data of members.  It provides all information, about student to the supervisor according to the admin.  It provides communication between supervisor or student.  It handles the hierarchy management.  Direct savings fromreduced paper, printing, and distribution costs  Indirectsavings fromtime spent handling paper documents
  6.  Quick access of all records  To match the suitable candidate to appropriatesuperviosor. This application has Seven modules:  Student module  Supervisor module  Second marker module  Admin module This project have multiple module in which helps in finding solutions to the manual systems being used in supervision system . It maintains student details, details of Supervisor, details of Admin.  It manages student & all detail of Owner.  It maintains the list of student.  Student can register him by online.  He does the online confirmation by himself.  It handles the details of Registration . This module is further divided into Multiple sub-modules:- Student Registration ,Student View ,Student assign etc. Supervisor Registration , Supervisor View Student Edit etc. Supervisor assign ,Second marker view , Second marker Edit ,etc. Account details ,search details ,about details etc.
  7. Objectives:- Student Supervision System is a project. Objective of this project is to automate the record process of the Student. The project entitled “Student Supervision System” helps in finding solutions to the manual systems being used in Superviosr. The system analyses the problem of dealing with the great deal of manual work. Manually maintenance of Student details and Supervisor details can create a lot of problem. Such as: -  Slow process  Time taking  Difficulty to Search information  Difficulty to analyzethe related Record  More Familer  More paper work  To facilitate easy maintenance of records of various Student Avalibilit In The Student Supervision System.  To check details of prospective Student through quick search provided in the Vortal.
  8.  To check for matching Supervisor with Student.  To facilitate preparation of records in the mechanized process and there by producing accuratedocuments/data’s for recording details.  Quick access of all records  To match the suitable candidate to appropriate Supervisor  Reduce manual work  Generation of Quick report. Basic Functionality:- When Student come at the Supervisor of room then registration process will start.  Searching data of owner in database by entering basic details of the owner coming to Student Supervisor System .  We can also view the data of customer.  We can also edit the data of student and update the data of student.  Provide the facility to select student of the Admin.  If no record is found then provision to enter new registration.  If record is found member may also update his/her record.  Collection of Account.  Report generation.
  9. Language And Tool to be Used PHP: Hypertext Preprocessor,is a widely used, general-purposescripting language that was originally designed for web development, to producedynamic web pages. Itcan be embedded into HTML and generally runs on a web server, which needs to be configured to process PHP codeand create web page content fromit. Itcan be deployed on mostweb servers and on almostevery operating system and platform free of charge. PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous development ever since. The main implementation of PHP is now produced by The PHP Group and serves as the de facto standard for PHP as there is no formal specification.PHP is free softwarereleased under the PHP License, which is incompatible with the GNU General Public License (GPL) because of restrictions on the use of the term PHP PHP has evolved to include a command line interface capability and can also be used in standalonegraphical applications. USAGE PHP is a general-purposescripting languagethat is especially suited for web development. PHP generally runs on a web server. Any PHP code in a requested file is executed by the PHP runtime, usually to create dynamic web page content. Itcan also be used for command-linescripting and client-side GUI applications. PHP can be deployed on most web servers, many operating systems and platforms, and can be used with many relational databasemanagement systems.
  10. Itis available free of charge, and the PHP Group provides the complete source code for users to build, customizeand extend for their own use. PHP primarily acts as a filter, taking input froma file or streamcontaining text and/or PHP instructions and outputs another streamof data; most commonly the output will be HTML. Since PHP 4, the PHP parser compiles input to producebyte code for processing by the Zend Engine, giving improved performanceover its interpreter predecessor Originally designed to create dynamic web pages, PHP now focuses mainly on server-sidescripting, and it is similar to other server-sidescripting languages that providedynamic content froma web server to a client, such as Microsoft's Active Server Pages, Sun Microsystems'JavaServer Pages and mod_perl. PHP has also attracted the development of many frameworks thatprovidebuilding blocks and a design structureto promote rapid application development (RAD). Someof these include CakePHP, Symfony, CodeIgniter, and Zend Framework, offering features similar to other web application frameworks. About HTML HTML, which stands for Hyper Text MarkupLanguage, is the predominant markup language for web pages. Itprovides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and other items. Itallows images and objects to be embedded and can be used to create interactive forms. Itis written in the formof HTML elements consisting of "tags" surrounded by angle brackets within the web page content. Itcan include or can load scripts in languages such as JavaScriptwhich affect the behavior of HTML processors like Web browsers; and Cascading StyleSheets (CSS) to define the appearanceand layout of text and other material. The W3C, maintainer of both HTML and CSS standards, encourages theuse of CSS over explicit presentational markup.
  11. Hyper Text Markup Language(HTML) is the encoding scheme used to create and formata web document. A user need not be an expert programmer to make use of HTML for creating hypertext documents that can be put on the internet. Most graphicale-mail clients allow the useof a subsetof HTML (often ill-defined) to provide formatting and semantic markup not available with plain text. This may include typographic information like coloured headings, emphasized and quoted text, inline images and diagrams. Many such clients include both a GUI editor for composing HTML e-mail messages and a rendering engine for displaying them. Use of HTML in e-mail is controversialbecauseof compatibility issues, becauseit can help disguisephishing attacks, becauseit can confuse spam filters and because the messagesize is larger than plain text. NAMING CONVENTIONS The most common filename extension for files containing HTML is .html. A common abbreviation of this is .htm, which originated because some early operating systems and file systems, such as DOS and FAT, limited file extensions to three letters. HTML APPLICATION An HTML Application is a MicrosoftWindows application that uses HTML and Dynamic HTML in a browser to provide the application's graphical interface. A regular HTML file is confined to the security model of the web browser, communicating only to web servers and manipulating only webpageobjects and site cookies. An HTA runs as a fully trusted application and thereforehas more privileges, like creation/editing/removal of files and Windows Registry entries. Because they operate outside the browser's security model, HTAs cannotbe executed via HTTP, but must be downloaded (justlike an EXE file) and executed fromlocal file system ABOUT JAVASCRIPT
  12. JavaScript is an object-oriented scripting language used to enable programmatic access to objects within both the client application and other applications. It is primarily used in the formof client-side JavaScript, implemented as an integrated component of the web browser, allowing the development of enhanced user interfaces and dynamic websites. JavaScriptis a dialect of the ECMAScript standard and is characterized as a dynamic, weakly typed, prototype-based language with first-class functions. JavaScriptwas influenced by many languages and was designed to looklike Java,butto be easierfornon-programmerstoworkwith. PROTOTYPE-BASED JavaScriptuses prototypes instead of classes for inheritance. Itis possibleto simulate many class-based features with prototypes in JavaScript. Functions double as object constructors along with their typical role. Prefixing a function call with new creates a new object and calls that function with its local this keyword bound to that object for that invocation. The constructor's prototypeproperty determines the objectused for the new object's internal prototype. JavaScript's built-in constructors, such as Array, also haveprototypes that can be modified. Unlike many object-oriented languages, there is no distinction between a function definition and a method definition. Rather, the distinction occurs during function calling; a function can be called as a method. When a function is called as a method of an object, the function's local this keyword is bound to that object for that invocation.
  13. USAGE The primary use of JavaScriptis to write functions that are embedded in or included from HTML pages and interact with the Document ObjectModel (DOM) of the page. Because JavaScriptcode can run locally in a user's browser (rather than on a remote server) it can respond to user actions quickly, making an application feel more responsive. Furthermore, JavaScriptcodecan detect user actions which HTML alone cannot, such as individual keystrokes. Applications such as Gmail take advantageof this: much of the user-interfacelogic is written in JavaScript, and JavaScriptdispatches requests for information (such as the content of an e-mail message) to the server. Thewider trend of Ajaxprogramming similarly exploits this strength. A JavaScriptengine (also known as JavaScriptinterpreter or JavaScript implementation) is an interpreter that interprets JavaScript sourcecodeand executes the scriptaccordingly. The first JavaScriptengine was created by Brendan Eich at Netscape Communications Corporation, for the Netscape Navigator web browser. A web browser is by far the most common host environmentfor JavaScript. Web browsers typically usethe public API to create "hostobjects" responsiblefor reflecting the DOMinto JavaScript.
  14. Requirements-: Hardware requirements Number Description 1 PC with 20 GB Hard disk 2 PC with 256 MB RAM 3 PC with Pentium 1 and Above Software requirements Number Description Type 1 Operating System Windows XP/Windows 2 Language PHP 3 Server side Script PHP script 4 Client side Script Java script,Html 5 Server WAMP 5.0 6 Database MySQL 7 IDE Text pad 8 Designing Tools XARA,Fireworks,Dreamweaver,Paintbrush 9 Browser Internet Explorer/Mozilla etc. Manpower requirements
  15. 3 persons should be able to complete this project in 6 weeks Software Development Life Cycle  System DevelopmentLife Cycle phases:-
  16. InitiationPhase: The initiation of a system(or project) begins when a business need or opportunity is identified. A ProjectManager should be appointed to manage the project. This business need is documented in a Concept Proposal. After the Concept Proposalis approved, the SystemConcept Development Phasebegins. System Concept Development Phase: Once a business need is approved, the approaches for accomplishing the concept are reviewed for feasibility and appropriateness. The Systems Boundary Document identifies the scope of the system and requires Senior Official approval and funding before beginning the Planning Phase. Planning Phase: The concept is further developed to describe how the business will operate once the approved system is implemented, and to assess how the system will impact employee and customer privacy. To ensure the products and /or services provide the required capability on-time and within budget, project resources, activities, schedules, tools, and reviews are defined. Additionally, security certification and accreditation activities begin with the identification of system security requirements and the completion of a high level vulnerability assessment.
  17. Requirements Analysis Phase: Functional user requirements are formally defined and delineate the requirements in terms of data, system performance, security, and maintainability requirements for the system. All requirements are defined to a level of detail sufficient for systems design to proceed. All requirements need to be measurable and testable and relate to the business need or opportunity identified in the Initiation Phase. Design Phase: The physical characteristics of the system are designed during this phase. The operating environment is established, major subsystems and their inputs and outputs are defined, and processes are allocated to resources. Everything requiring user input or approval must be documented and reviewed by the user. The physical characteristics of the system are specified and a detailed design is prepared. Subsystems identified during design are used to create a detailed structure of the system. Each subsystem is partitioned into one or more design units or modules. Detailed logic specifications are prepared for each software module. Development Phase: The detailed specifications produced during the design phase are translated into hardware, communications, and executable software. Software shall be unit tested, integrated, and retested in a systematic manner. Hardware is assembled and tested.
  18. Integration and Test Phase: The various components of the system are integrated and systematically tested. The user tests the system to ensure that the functional requirements, as defined in the functional requirements document, are satisfied by the developed or modified system. Prior to installing and operating the system in a production environment, the systemmustundergo certification and accreditation activities. Implementation Phase: The system or system modifications are installed and made operational in a production environment. The phase is initiated after the system has been tested and accepted by the user. This phase continues until the system is operating in production in accordance with the defined user requirements. Operations and Maintenance Phase: The system operation is ongoing. The system is monitored for continued performance in accordance with user requirements, and needed system modifications are incorporated. The operational system is periodically assessed through In-Process Reviews to determine how the system can be made more efficient and effective. Operations continue as long as the system can be effectively adapted to respond to an organization’s needs. When modifications or changes are identified as necessary, thesystemmay reenter the planning phase.
  19. Disposition Phase: The disposition activities ensure the orderly termination of the system and preserve the vital information about the system so that some or all of the information may be reactivated in the future if necessary. Particular emphasis is given to proper preservation of the data processed by the system, so that the data is effectively migrated to another system or archived in accordance with applicable records management regulations and policies, for potential future access. System Analysis The Student Supervision System is useful to every student which supervisior gets the different facility time to time. This project is helpful to provide registration facility at the student. It manages all the details of student and owner and collection details of accounts. It also provides the facility to modify the members’ information. 1. Feasibility Study:- Feasibility study is a test of system proposal according to its work ability, impact on the organization, ability to meet user needs, and effective use of resources. The objective for this phase is not to solve the problem but to acquire a sense of scope. During the study, the problem definition is
  20. crystallized and aspects of the problem to be included in the system are determined. We started the project by listing the possible queries that the user might want to be satisfied. And on these lines we guided the project further. The three main points, kept in mind at the time of project, are:  Possible (To build it with the given technology and resources)  Affordable (given the time and cost constraints of the organization)  Acceptable (for use by the eventual users of the system) The major areas to consider while determining the feasibility of a project are:- a) Technical Feasibility:- It is a measure of the practically of a specific technical solution and the availability of technical resources and expertise.  The proposed system uses HTML CSS as front-end and SQL server 2008 as back-end tool.  Microsoft SQL is a popular tool used to design and develop database objects such as table, views and indexes.  The above tools are readily available, easy to work with and widely used for developing commercial application. Hardware used in this project are- x86 family processor, 1 GB or above RAM, 80 GB or above hard disk. This hardware was already available on the existing computer system. The software like SQL Server 2008, IIS, PHP 5 and operating system WINDOWS-7 used were already installed on the
  21. existing computer system. So no additional hardware and software were required to purchase and it is technically feasible. b) Operational Feasibility:-The system will be used if it is developed well then be resistance for users that undetermined  No major training and new skills are required as it is based on DBMS model.  It will help in the time saving and fast processing and dispersal of user request and applications.  Improved information, better management and collection of the reports.  User involvement in the building of present system is sought to keep in mind the user specific requirement and needs. c) Economical Feasibility:-It determines whether the management has enough resources and budget to invest in the proposed system and the estimated time for the recovery of cost incurred. It also determines whether it is worthwhile to invest the money in the proposed project. Economic feasibility is determines by the means of cost benefit analysis. The proposed system is economically feasible because the cost involved in purchasing the hardware and the software are within approachable. The backend required for storing other details is also the same database that is SQL. The computers in the organization are highly sophisticated and don’t needs extra components to load the software. Hence the organization can implement the new system without any additional expenditure. Hence, it is economically feasible.
  22. d) Social Feasibility:-The assessment of social feasibility will be done alongside technical feasibility. Each of the alternative technical solutions that emerge must be evaluated for its social implications. The needs of the various people affected by the proposed system (both directly and indirectly) must be taken in account. The various social costs must also be evaluated; these will include the costs of education and training, communication, consultation, salary change, job improvements, redundancy payment, and hidden costs like those caused by hostility, ignorance and fear. But primarily the social evaluation should rank the possible technical solutions in terms of the extent to which they improve the jobs and the working environment those affected. Software Requirement Specification The purpose of Student Supervision System:-  This application is to manage details of members of the student and owner and its Admin.  It is helpful to manage all the data of members.  It provides all information, about Student Supervision System that are organized by dealer, to the student.
  23.  It provides communication between student and supervisior.  It handles the money management.  It manages student details.  It maintains all the details of the student and second marker.  It maintains the list of students.  Customer can register online.  It handles the details of Account. The following people will use this SRS in different phases of development those are follows are:- a) ProjectManager:- Project manager will get all the information about the requirement of the project, he will understand what is to be done and can assign the work accordingly. b) Developer:- Developer will come to known that what work is to be done in what sequence and will codeaccordingly. c) Tester:- Tester will understand what our project is doing and what are the functionality that must be performed by project, so he can test the project for those functionality. d) User:- User will understand that what are the functions that this project is going to perform for them.
  24. For anyone to understand the SRS, they have to start reading from the Introduction(purpose) section then the important section is document conventions without which it’s impossible to known what we are talking about. MODULE 1:- (Student) In student module, all the information of the student i.e. user-name , password ,first-name ,last- name, mobile no, email id, state , gender,programme,course,user type ,etc exits. MODULE 2:- (Supervisior) In the Supervisior module, the Student supervision system are organized by the Admin and store the information of student and owner in the database.  Provide the email and password to the supervisior.  Handle the Account details.  Provide all information of flat to the student. MODULE 3:- (Admin) In the Admin module, have the sub module of supervisior assign ,student view ,and student edit.  Supervisior have the student details.  Supervisior have all information of student . MODULE 4:- (Search)
  25. In the Search module, find the data or information between the owner and supervisior , student and second marker ,Account with student ,student with admin ,student with supervisior . If a student wants to communicate with dealer then he can easily communicate with supervisior. MODULE 5:-(Account) In the Account module ,All the information account student and owner stored in the database.  All the account information of student have in database.  All the account information of owner have in database. MODULE 6:-(About us) In the About us module ,All the information of student supervision system is exits. MODULE 6:-(Contact) In the Contact module , All the information of Admin is exits.
  26. Project Plan 1. Scope Management:- To Define a Project Scope, youmust first identify the following things:-  Project objective  Goals  Sub-phases  Tasks  Resources  Budget  Schedule The scope of the project is just limited to a laptop or a PC with an internet connection. Firstly the user, whoever it may be (customer of dealer) need to register to the website. After the registration process is completed each one of them get password and have their own user id. With these two they can access their account and for any query they can contact the administrator by sending him a mail.  Facility to schedule a meeting  Facility to see participants engagement’s diary  Facility to invite participants over mail.  Facility to apartment details  Customer registration  Dealer privilege to edit Customer’s profile.
  27. 2. People Management:- S.NO Activity Planned Start Date Planned End Date Actual Start Date Actual End Date Person Assigned Remarks 1. Identify Project 2. Making Project Plan 3. System Study 4. System Design 5. System Testing 6. Implementation 3. Risk Management Plan:- To achieve effective and efficient risk management, risk planning is required. The commonest form of risk planning is the Risk Management Plan (RMP). A risk management plan (RMP) comprises:- The risk strategy, which records how risk will be owned, evaluated, controlled, reviewed and reported upon, the plan will show:-  Who is accountable for a particular risk (ownership).  What that particular risk is (evaluation).  How that particular risk will be managed, controlled, reviewed and reported, in other words the physical actions or management actions that will be taken to avoid, reduce, control or acceptthe risk.
  28. The key to effective risk management is ownership. Each risk (and associated actions) must be owned so that there is clear responsibility and accountability for the risk and its associated action. It has become an axiom of good risk management that the ownership of a risk should lie with the party ‘best’ able to control the risk probability and its impact. Different risks and actions will need to be owned by different stakeholders. 4. Time Management:- S.NO Activity Planned Start Date Planned End Date Actual Start Date Actual End Date Person Assigned Remarks 1. Identify Project 2. Making Project Plan 3. System Study 4. System Design 5. System Testing 6. Implementation
  29. Feasibility Analysis In feasibility analysis we want to various factor related to the feasibility of the system. Whether we can make this system within the limited time, money and availability of the resources. The concept of feasibility is to determine whether or not a project is worth doing. The process followed in making this determination is called Feasibility Study or Analysis. Once it has been determined that a project is feasible, the system analyst can go ahead and prepare the project specification which finalizes project requirements. Types of feasibility:- 1. Technical Feasibility:- It is a measure of the practically of a specific technical solution and the availability of technical resources and expertise  The proposed system uses HTML CSS as front-end and SQL server 2008 as back-end tool.  Microsoft SQL is a popular tool used to design and develop database objects such as table, views and indexes.  The above tools are readily available, easy to work with and widely used for developing commercial application.
  30. Hardware used in this project are- x86 family processor, 1 GB or above RAM, 80 GB or above hard disk. This hardware was already available on the existing computer system. The software like SQL Server 2008, IIS, .net framework and operating system WINDOWS-7 used were already installed on the existing computer system. So no additional hardware and software were required to purchase and it is technically feasible. 2. Operational Feasibility:- The system will be used if it is developed well then be resistance for users that undetermined.  No major training and new skills are required as it is based on DBMS model.  It will help in the time saving and fast processing and dispersal of user request and applications.  Improved information, better management and collection of the reports.  User support.  User involvement in the building of present system is sought to keep in mind the user specific requirement and needs. 3. Economical Feasibility:- It determines whether the management has enough resources and budget to invest in the proposed system and the estimated time for the recovery of cost incurred. It also determines whether it is worthwhile to invest the money in the proposed project. Economic feasibility is determines by the means of cost benefit analysis. The proposed system is economically feasible
  31. because the cost involved in purchasing the hardware and the software are within approachable. The backend required for storing other details is also the same database that is SQL. The computers in the organization are highly sophisticated and don’t needs extra components to load the software. Hence the organization can implement the new system without any additional expenditure. Hence, it is economically feasible. Cost-saving benefit leads to reduction in administrative and operational costs. Cost avoidance benefits eliminate future administrative and operational costs improved service level benefits are those where the performance of the system is improved by the new computer based method e.g servicing a customer in two minutes rather than five to ten minutes is an example of this type of benefit. 4. Social Feasibility:- The assessment of social feasibility will be done alongside technical feasibility. Each of the alternative technical solutions that emerge must be evaluated for its social implications. The needs of the various people affected by the proposed system (both directly and indirectly) must be taken in account. The various social costs must also be evaluated; these will include the costs of education and training, communication, consultation, salary change, job improvements, redundancy payment, and hidden costs like those caused by hostility, ignorance and fear. But primarily the social evaluation should rank the possible technical solutions in terms of the extent to which they improve the jobs and the working environment those affected.
  32. Methodology Adopted Waterfall Model:- A methodology specifies some activities that according to the model, should be performed, and the order in which they should be performed. The methodology adopted while making this project is waterfall model. The waterfall model divides the life cycle of a software development process into the phase as shown in the given figure. This life cycle model is named waterfall model because its diagrammatic representation resembles a cascade of waterfall. The different phase of this model are Feasibility study, Requirement analysis and specification, Design, Coding, Coding and unit testing, Integration, System testing and maintenance. Each phase of the life cycle has a well defined starting and ending point. Fig.:-1 Feasibility Study System Analysis & Specification Design Coding and Unit Testing Maintenance Integration and System Testing
  33. System Design  Design Objective:- The primary objective of design is to deliver the requirement as specified in the feasibility report. Following objectives should be kept in mind:-  Efficiency  Cost  Flexibility  Security The aim of system design, which is sometimes also referred to as top-level design, is to identify the modules that should be in the system, the specification these modules, and how they interact with each other to produce the desire results. At the end of the system design all the major data structure file formats, output formats and the major modules in the system and their specification are needed.  Design Quality Criteria:-  A design should exhibit a hierarchical organization that makes intelligent use of control among the element of software.  A design should be modular i.e the software should be logically partitioned into the elements that perform specific function and sub- functions.
  34.  A design should contain both data and proceduralabstraction.  A design should lead to modules that exhibit independent functional characteristics.  A design should lead to interfaces that reduce the complexity of connection between modules and the external environment.  A design should be derived using a repeatable method that is driven by information obtained during software requirement analysis.  Design Concept:-  A set fundamental software design concepts has evolved:-  What criteria can be used to partition software into individual component?  How function or data is structure detail separated from a conceptual representation of the software?  Are these uniform criteria that define the technical quality of software design?
  35.  Top-down and Bottom-up Strategies:- A system consists of component, which has the components of their own, indeed a system is a hierarchy of components. The highest level component correspondsto the total system.  A top-down design approach starts with identify the major component of the system, decomposing them into their low-level components and iterating until the desired level of detail is achieved. Top-down design methods often result in some form of stepwise refinement. Starting from an abstract design, in each step the design is refined to a more concrete level, until we reach a level where no more refinement is needed and the design can be implemented directly.  A Bottom-up design approach starts with designing the most basic or primitive components and proceeds to higher-level components. Bottom-up methods works with layers of abstraction. Starting from very bottom, operation that provides a layer of abstraction is implemented. The operation of this layer are then used to implement more powerful operations and a still higher layer of abstraction, until the stage is reached where the operation supported by the layer are those desired by the system.
  36.  Structured Design:-  Structured design methodology views every software system as having some inputs that are converted into the desired outputs by the software system.  The software is viewed as a transformation function that transforms the given inputs into the desired outputs, and the central problem of designing this transformation function.  Due to this view of software, the structured design methodology is primarily function oriented and relies heavily on function abstraction and functional decomposing. The approach begins with a system specification that identifies inputs and outputs and describes the functional aspects of the system.  The next step is the definition of the modules and their relationship with one another in a form called structure chart, using data dictionary and other structured tools.  Entity-Relationship Diagram:- The E-R diagram enables a software engineer to fully specify the data objects that are input and output to/from a system, the attributes that define the properties of these objects, and the relationship between the objects.
  37. The following approachis taken:-  During requirements gathering, customers are asked to list the “things” that the application or business process addresses. These “things” evolve into the list of input and output data, objects as well as external entities that produceand consume information.  Taking the objects one at a time, the analyst and customer define whether or not a connection (unnamed at this stage) exists between the data, object and other objects.  Wherever a connection a exists, the analyst and customer create one or more object-relationship pairs. For each object-relationship pair, cardinality and modality are explored.  Steps 2 through 4 are continued iteratively until all object-relationship pairs have been defined. It is common to discover omissions as this process continues. New object and relationship will invariably be added as the number iterations grow.  The attributes of each entity are defined. An entity-Relationship diagram is formalized in review.  Steps 1 through 7 are repeated until data modelling complete.
  38.  Data Flow Diagram:-  Data Flow Diagramming is a means of representing a system at any level of detail with a graphic network of symbols showing data flows, data stores, data processes, and data sources/destination.  The data flow diagram is analogous to a road map. It is a network model of all possibilities with different detail shown on different hierarchical levels. This processes of representing different details level is called “levelling” or “partitioning” by some data flow diagram advocates.  Data Flow Diagram (DFD) uses a number of symbols to represent the systems. Data Flow Diagram also known as ‘Bubble Chart’ is used to clarify system requirements and identifying the major transformations that will become programs in system design. So it is the starting point of the design phase that functionally decomposes the requirements specifications down to the level of details. DFD have four type components:- 1. Process:- A process transforms data values. The lowest level processes are pure functions without side effects. An entire data flow graphics high level process.
  39. Fig.:-2 2. Data flows :-A data flow connects the output of an object or process to input of another object or process. It is represented by an arrow and labelled with a description of data, usually its name or type. Fig.:-3 3. Actors:-An actor is active object that drives the data flow graph by producing or consuming values. 4. Data store:-A data store is a passive object with in a data flow diagram that stores data for later access. Fig.:-4
  40. 5. External Entity:-A rectangle represents an external entity E.g. User is external entity in this project. Fig.:-5 6. Output Symbol:- This box represented data production during human computer interaction. Fig.:-6  Database Design:- The overall objectives in the development of database technology has been treat data as organizational resource and as an integrated whole. Database management system allows the data to be protected and organized separately from the resource (e.g hardware, software and program). The organization of data in a database aims to achieve three major objectives:-  Data integration  Data integrity  Data independence
  41. Table 1:Login Table 2:home page
  42. Table 3: Registrationform Table 4: supervisiordashboard
  43. Table 5:Admindashboard Table 6:Student dashboard
  44. Coding Method Home page:- <?php session_start(); ?> <!DOCTYPEhtml> <html lang="en"> <head> <style> body { padding-top: 70px; padding-bottom: 30px; } .theme-dropdown .dropdown-menu { position: static; display: block; margin-bottom: 20px; } .theme-showcase> p > .btn { margin: 5px 0; }
  45. .theme-showcase.navbar .container { width: auto; } </style> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come firstin the head; any other head content must come *after* these tags --> <meta name="description" content=""> <meta name="author" content=""> <link rel="icon" href="../../favicon.ico"> <title>Student Supervision System</title> <!-- Bootstrap core CSS --> <link href="css/bootstrap.min.css"rel="stylesheet"> <!-- Bootstrap theme --> <link href="css/bootstrap-theme.min.css" rel="stylesheet"> <!-- Just for debugging purposes. Don'tactually copy these 2 lines! --> <!--[if lt IE9]><script src="../../assets/js/ie8-responsive-file- warning.js"></script><![endif]-->
  46. <scriptsrc="js/ie-emulation-modes-warning.js"></script> <link rel="stylesheet" href="http://maxcdn.bootstrapcdn.com/bootstrap/3.3.4/css/bootstrap.min.css"> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js"></script> <script src="http://maxcdn.bootstrapcdn.com/bootstrap/3.3.4/js/bootstrap.min.js"></sc ript> <!-- HTML5 shim and Respond.js for IE8 supportof HTML5 elements and media queries --> <!--[if lt IE9]> <script src="https://oss.maxcdn.com/html5shiv/3.7.2/html5shiv.min.js"></script> <script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script> <![endif]--> </head> <body role="document"> <!-- Fixed navbar --> <nav class="navbar navbar-inversenavbar-fixed-top"> <div class="container"> <div class="navbar-header">
  47. <button type="button" class="navbar-togglecollapsed" data- toggle="collapse" data-target="#navbar" aria-expanded="false" aria- controls="navbar"> <span class="sr-only">Togglenavigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="#">Supervision System</a> </div> <div id="navbar" class="navbar-collapsecollapse"> <ul class="nav navbar-nav"> <li><a href="index.php">Home</a></li> <li ><a href="index.php?option=login">Login</a></li> <li ><a href="index.php?option=newuser">Registration</a></li> <li><a href="index.php?option=about">About</a></li> <li><a href="index.php?option=contact">Contact</a></li> </ul> </div><!--/.nav-collapse--> </div> </nav>
  48. <div class="container theme-showcase" role="main"> <!-- Main jumbotron for a primary marketing messageor call to action --> <div class="jumbotron"> <?php @$opt=$_REQUEST['option']; if($opt!="") { if($opt=="newuser") { include('regis.php'); } if($opt=="login") { include('login.php'); } if($opt=="about") { include('about.php'); } if($opt=="contact")
  49. { include('contact.php'); } if($opt=="forget_password") { include('forget_password.php'); } }else{ ?> <!---------------------slider-----------------------> <div id="myCarousel" class="carouselslide" data-ride="carousel"> <!-- Indicators --> <ol class="carousel-indicators"> <li data-target="#myCarousel" data-slide-to="0" class="active"></li> <li data-target="#myCarousel" data-slide-to="1"></li> <li data-target="#myCarousel" data-slide-to="2"></li> <li data-target="#myCarousel" data-slide-to="3"></li> </ol> <!-- Wrapper for slides --> <div class="carousel-inner" role="listbox"> <div class="item active"> <img src="img/1.jpg" alt="university">
  50. </div> <div class="item"> <img src="img/2.png" alt="setname"> </div> <div class="item"> <img src="img/7.jpg" alt="setalt message" > </div> <div class="item"> <img src="img/4.jpg" alt="Flower" > </div> </div> <!-- Left and right controls --> <a class="left carousel-control" href="#myCarousel" role="button" data- slide="prev"> <span class="glyphicon glyphicon-chevron-left" aria-hidden="true"></span> <span class="sr-only">Previous</span> </a> <a class="rightcarousel-control" href="#myCarousel" role="button" data- slide="next"> <span class="glyphicon glyphicon-chevron-right" aria-hidden="true"></span> <span class="sr-only">Next</span> </a>
  51. </div> <h2 align="center" style="color:#00FF00"> StudentSupervision System</h2> </div> </div> <!-----------------------slider---------------------> <?php }?> <div class="row"> </div> </div> <!-- /container --> <!-- Bootstrap core JavaScript ================================================== --> <!-- Placed at the end of the documentso the pages load faster --> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.2/jquery.min.js"></script> <scriptsrc="../../dist/js/bootstrap.min.js"></script> <scriptsrc="../../assets/js/docs.min.js"></script> <!-- IE10 viewporthack for Surface/desktop Windows 8 bug --> <scriptsrc="../../assets/js/ie10-viewport-bug-workaround.js"></script> </body> </html>
  52. LOGIN PAGE:- <?php require('config.php'); extract($_POST); if(isset($signup)) { if($user==1) { $que=mysql_query("selectemail,pass fromstudentwhere email='$eid' and pass=password('$pass')"); $row=mysql_num_rows($que); if($row) { $_SESSION['student']=$eid; echo "<script>window.location='student'</script>"; } else { $err="<fontcolor='red'>Invalid Student Login</font>"; }
  53. } //for Supervision if($user==2) { $que=mysql_query("selectemail,pass,status fromsupervisorwhere email='$eid' and pass=password('$pass')"); $row=mysql_num_rows($que); if($row) { $status=mysql_fetch_assoc($que); if($status['status']==1) { $err="<fontcolor='red'>Your account is not activated yet by admin</font>"; } else { $_SESSION['supervisior']=$eid; echo "<script>window.location='Supervisor'</script>"; } } else
  54. { $err="<fontcolor='red'>Invalid Supervisor Login</font>"; } } //for Second Marker if($user==3) { $que=mysql_query("selectemail,pass,status fromsecond_marker whereemail='$eid' and pass=password('$pass')"); $row=mysql_num_rows($que); if($row) { $status=mysql_fetch_assoc($que); if($status['status']==1) { $err="<fontcolor='red'>Your account is not activated yet by admin</font>"; } else { $_SESSION['second_marker']=$eid;
  55. echo "<script>window.location='second_marker'</script>"; } } else { $err="<fontcolor='red'>Invalid Second marker Login</font>"; } } //for Admin if($user==4) { $que=mysql_query("selectemail,pass fromadmin where email='$eid' and pass='$pass'"); $row=mysql_num_rows($que); if($row) { $_SESSION['admin']=$eid; echo "<script>window.location='admin'</script>"; } else {
  56. $err="<fontcolor='red'>Invalid admin Login</font>"; } } } ?> <div class="row"> <div class="col-sm-3"> </div> <div class="col-sm-6"> <div class="panelpanel-default"> <div class="panel-heading"> <h3 class="panel-title" style="color:#8F0BB0;" align="center">Login Form</h3> </div> <div class="panel-body"> <form method="post"> <div class="form-group"> <label for="exampleInputEmail1"><?php echo @$err;?></label>
  57. </div> <div class="form-group"> <label for="exampleInputEmail1">Emailaddress</label> <input type="email" class="form-control" name="eid" id="exampleInputEmail1" placeholder="Enter email"> </div> <div class="form-group"> <label for="exampleInputPassword1">Password</label> <input type="password" class="form-control" name="pass" id="exampleInputPassword1" placeholder="Password"> </div> <div class="form-group"> <label for="exampleInputEmail1">User Type</label> <select class="form-control" name="user"> <option value="1">Student</option> <option value="2">Supervisor</option> <option value="3">Second Marker</option> <option value="4">Admin</option> </select> </div>
  58. <!-- user end--> <div class="form-group"> <button name="signup" class="btn btn-lg btn-primary btn-block" style="width:45%;float:left" type="submit">Login</button>&nbsp;&nbsp; <a href="index.php?option=newuser"><button name="signup" class="btn btn-lg btn-primary btn-block" style="width:45%;float:left;margin- left:20px" type="button">Sign Up</button></a> </div> </form> </div> </div> </div> </div>
  59. REGISTRATION PAGE:- <?php require('config.php'); extract($_POST); if(isset($signup)) { if($user==1){ $que=mysql_query("selectemail fromstudentwhere email='$e'"); $row=mysql_num_rows($que); if($row) { $err="<fontcolor='red'>Student already registered</font>"; } else { mysql_query("insertinto student values('','$n','$e',password('$pass'),'$mob','$g','$prog','$course')"); echo "<script>window.location='index.php?option=login'</script>"; }} //supervisior if($user==2){
  60. $que=mysql_query("selectemail fromsupervisor whereemail='$e'"); $row=mysql_num_rows($que); if($row) { $err="<fontcolor='red'>supervisor already registered</font>"; } else { mysql_query("insertinto supervisor values('','$n','$e',password('$pass'),'$mob','$g','$prog','$course','1')"); echo "<script>window.location='index.php?option=login'</script>"; } } //Second_marker if($user==3){ $que=mysql_query("selectemail from second_marker whereemail='$e'"); $row=mysql_num_rows($que); if($row) { $err="<fontcolor='red'>Second Marker already registered</font>"; }
  61. else { mysql_query("insertinto second_marker values('','$n','$e',password('$pass'),'$mob','$g','$prog','$course','1')"); echo "<script>window.location='index.php?option=login'</script>"; } } } ?> <div class="row"> <div class="col-sm-2"> </div> <div class="col-sm-8"> <div class="panelpanel-default"> <div class="panel-heading"> <h3 class="panel-title" style="color:#8F0BB0;" align="center">Registration Form</h3> </div> <div class="panel-body">
  62. <form method="post"> <div class="form-group"> <label for="exampleInputEmail1"><?php echo @$err;?></label> </div> <div class="form-group"> <label for="exampleInputEmail1">Name</label> <input type="text" class="form-control" name="n" placeholder="Enter name" pattern="[a-z A-Z]*" required> </div> <div class="form-group"> <label for="exampleInputEmail1">Emailaddress</label> <input type="email" class="form-control" name="e" id="exampleInputEmail1" placeholder="Enter email" required> </div> <div class="form-group"> <label for="exampleInputPassword1">Password</label> <input type="password" class="form-control" name="pass" id="exampleInputPassword1" placeholder="Password" > </div> <div class="form-group">
  63. <label for="exampleInputEmail1">Mobile</label> <input type="text" class="form-control" name="mob" maxlength="13" required pattern="[0-9 + ]*" placeholder="Enter Mobile" > </div> <!--<div class="form-group"> <label for="exampleInputEmail1">Gender</label> <div class="radio"> <label> <input type="radio" name="g" value="m"> Male&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <input type="radio" name="g" value="f"> Female </label> </div></div>--> <div class="form-group"> <label for="exampleInputEmail1">Gender</label> <select class="form-control" name="g"> <option value="m">Male</option>
  64. <option value="f">Female</option> </select> </div> <!-- gender end --> <div class="form-group"> <label for="exampleInputEmail1">Programme</label> <select class="form-control" name="prog"> <option>M.Tech</option> <option>B.Tech</option> <option>BCA</option> <option>MCA</option> <option>Other</option> </select> </div> <!-- programmeend--> <div class="form-group"> <label for="exampleInputEmail1">Course</label> <select class="form-control" name="course"> <option>Course1</option> <option>Course2</option> <option>Course3</option>
  65. <option>Course4</option> <option>Course5</option> </select> </div> <!-- Courseend--> <div class="form-group"> <label for="exampleInputEmail1">User Type</label> <select class="form-control" name="user"> <option value="1">Student</option> <option value="2">Supervisor</option> <option value="3">Second Marker</option> </select> </div> <!-- user end--> <button name="signup" class="btn btn-lg btn-primary btn-block" type="submit">Sign Up</button> </form> </div>
  66. </div> </div> </div> </div> </div> About us:- <p style="background:#000000;color:#FFFFFF">AboutUs</p> <p>Students will receive a reportof their termly supervision fromtheir supervisor. Supervision reporting is controlled by a timetable with automatic email notifications and reminders. Submitted reports are immediately available to the student, supervisor. Additionally, subjectadministrators, collegeadvisors, college administrators and scholarship and funding administrators areable to view reports.</p>
  67. <p >Student tutorials are generally more academically challenging and rigorous than standard lecture and test format courses, becauseduring each session students areexpected to orally communicate, defend, analyze, and critique the ideas of others as well as their own in conversations with the tutor and fellow-students.<br/> As a pedagogic model, the tutorial systemhas great value becauseit creates learning and assessmentopportunities which are highly authentic and difficult to fake. Students are taught by faculty fellows in groups of one to three on a weekly basis </p><br/> <p>Each divisional Code of Practice for Supervision of research students offers guidanceon the maximum number of students that should be supervised by each supervisor, thetypicalnumber of meetings per term between supervisor and supervisee, and policies for supportfor new supervisors:</p> Contact us:- <?php
  68. require('config.php'); extract($_POST); if(isset($signup)) { echo $user." ".$eid." ".$pass; if($user==1) { $que=mysql_query("selectemail,pass fromstudentwhere email='$eid' and pass='$pass'"); $row=mysql_num_rows($que); if($row) { $_SESSION['student']=$eid; echo "<script>window.location='student'</script>"; } else { $err="<fontcolor='red'>Invalid Student Login</font>"; } }
  69. } ?> <form method="post"> <div class="form-group"> <label for="exampleInputEmail1"><?php echo @$err;?></label> </div> <div class="form-group"> <label for="exampleInputEmail1">Emailaddress</label> <input type="email" class="form-control" name="eid" id="exampleInputEmail1" placeholder="Enter email"> </div> <div class="form-group"> <label for="exampleInputPassword1">Mobile</label> <input type="password" class="form-control" name="pass" id="exampleInputPassword1" placeholder="Password"> </div>
  70. <div class="form-group"> <label for="exampleInputEmail1">Query</label> <textarea class="form-control" rows="3"></textarea> </div> <!-- programmeend--> <br/> <div class="form-group"> <button name="signup" class="btn btn-lg btn-primary btn-block" type="submit">Send Query</button> </div> </form>
  71. Testing  METHODOLOGY OF TESTING USED IN THE PROJECT:- Testing is the process of detecting errors. Testing performs a very critical role for quality assurance and for ensuring the reliability of the software. The results of testing are used later on during maintenance also. Here System Testing is involved in this project. Testing is vital to the success of the system. System testing makes a logical assumption that if the parts of the system are correct, the goal will be successfully achieved. In adequate testing or non-testing leads to errors that may not appear until months or even years later (Remember the New York three day power failures due to a misplaced ‘Break’ statement). This creates two problems:- 1. The time lag between the cause and the appearance of the problem. 2. The time interval effect of the system errors on files and the records on the system. A small error can conceivably explode into a much larger problem. Effective testing early in the process translates directly into long term cost savings from a reduced number of errors. Another reason for system testing is its utility as a user oriented vehicle before implementation. The best program is worthless if it does not meet the user requirements. Unfortunately, the user’s demands are often
  72. compromised by efforts to facilitate program or design efficiency in terms of processing time or design efficiency. Thus in this phase we went to test the code we wrote. We needed to know if the code compiled with the design or not? Whether the code gave the desired outputs on given inputs? Whether it was ready to be installed on the user’s computer or some more modifications were needed? The aim of testing is often to demonstrate that a program works by showing that it has no errors. The basic purpose of testing phase is to detect the errors that may be present in the program. Hence one should not start testing with the intent of showing that a program works, but the intent should be to show that a program doesn’t work. Testing is the process of executing a program with the intent of finding errors.  Testing Objectives:- The main objective of testing is to uncover a host of errors, systematically and with minimum effort and time. Stating formally, we can say  Testing is a process of executing a program with the intent of finding an error.  A successfultest is one that uncovers an as yet undiscovered error.  A good test case is one that has a high probability of finding error, if it exists.  The tests are inadequate to detect possibly present errors.  The software more or less confirms to the quality and reliable standards.
  73.  Steps of Testing of Module:- In order to uncover the errors present in different phases, we have the concept of levels of testing. The basic levels of testing are Client needs AcceptanceTesting Requirements System Testing Design Integration Testing Code Unit Testing Fig.:-7  Acceptance Testing:- Acceptance Testing is performed with realistic data of the client to demonstrate that the software is working satisfactorily. Testing here is focused on external behavior of the system; the internal logic of program is not emphasized.
  74. The testing phase is an important part of software development. It is the process of finding errors and missing operations and also a complete verification to determine whether the objectives are met and the user requirements are satisfied.  System Testing:- Here the entire software system is tested. The reference document for this process is the requirements document, and the goal is to see if software meets its requirements. Here entire ‘REGISTRATION COUNTER MANAGEMENT’ has been tested against requirements of project and it is checked whether all requirements of project have been satisfied or not.  Integration Testing:- After unit testing, we have to perform integration testing. The goal here is to see if modules can be integrated properly, the emphasis being on testing interfaces between modules. This testing activity can be considered as testing the design and hence the emphasis on testing module interactions.  Unit Testing:- Unit testing focuses verification effort on the smallest unit of software i.e. the module. Using the detailed design and the process specifications, testing is done to uncover errors within the boundary of the module. All modules must be successfulin the unit test before the start of the integration testing begins.
  75.  Debugging:- The process of testing gives symptoms, and a program’s failure is a clear symptom of the presence of the error. After getting a symptom, we begin an investigation to localize the error, that is to find out which module or interface is causing it. Then that section of the code is to be studied to determine the cause of the problem. This process is called ‘Debugging’. Hence, debugging is the activity of locating and correcting errors. In general:- A. Debugging is concerned with locating error and repairing these errors. B. Debugging involves formulating a hypothesis about the program behavior then testing these hypotheses to find the systemerror. In this project, we have also performed debugging of the system. Whenever we face any error we debug it properly and as soon as we trace the reason of the error we try to remove it and were successful in solving the problem. Hence debugging is also necessary with testing of the system.
  76. Implementation Code Efficience:- A very vital element of any engineering process is measurement. Measurement is the process by which numbers are assigned to the attributes of entities in the software developed. Until recently, software engineers had little quantitative guidance in this particular field. But now, they use technical metrics to help them build higher- quality software. The factors that affect software quality can be categorized in two broad groups: Factors that can be directly measured and Factors that can be measured only indirectly (e.g. usability or maintainability). Some of the important factors are briefly described below:- Correctness: The extent to which a program satisfies its specifications and fulfills the customer’s mission objectives is termed as its correctness. The project is fully correct in the sense that it has completely implemented the user’s requirements and needs. Reliability: Software reliability is defined in statistical terms as the probability of failure-free operation of a computer programs a specified environment for a specified time.
  77. Efficiency: The amount of computing resources and code required by a program to perform its function. Integrity: Extent to which access to software or data by unauthorized persons can be controlled. Usability: Effort required learning, operating, preparing input, and interpreting output of a program. Maintainability: Effort required locating and fixing an error in a program. Flexibility: Effort required modifying an operational program. Testability: Effort required testing a program to ensure that it performs its intended function. Portability: Effort required transferring the program from one hardware and/ or software system environment to another. Reusability: Extent to which a program can be reused in other applications-related to the packaging and scopeofthe functions that the program performs.
  78. Maintenance Maintenance of the project is very easy due to its modular design and concept any modification can be done very easily. Some of the maintenance applied is:-  BREAKDOWN MAINTENANCE:- The maintenance is applied when an error occurs & system halts and further processing cannot be done .At this time user can view documentation or consult us for rectification & we will analyze and change the codeif needed.  PREVENTATIVE MAINTENANCE:- User does this maintenance at regular intervals for smooth functioning (operation) of software as per procedure and steps mentioned in the manual. Some reasons for maintenance are: -  Error Correction: Errors, which were not caught during testing, after the system has, been implemented. Rectification of such errors is called corrective maintenance.  New or changed requirements: When Organization requirements changes due to changing opportunities.  Improved performance or maintenance requirements: Changes that are made to improve system performance or to make it easier to maintain in the future are called preventive maintenance.
  79. Maintenance can be classified as:-  Corrective  Adaptive  Perfective.  Corrective maintenance means repairing processing or performance failures or making changes because of previously uncorrected problems or false assumptions.  Adaptive maintenance means changing the program function.  Perfective maintenance means enhancing the performance or modifying the program(s) to respond to the user’s additional or changing needs. One way to reduce maintenance costs is through maintenance management and software modification audits. Software modification consists of program rewrites system level updates, and re-audits of low ranking programs to verify and correct the soft spots. The outcome should be more reliable software, a reduced maintenance backlog, and higher satisfaction and morale among the maintenance staff.
  80. E-R Diagram
  81. Data Flow Daigram 1-level
  82. Screenshots Home page: Login page:-
  83. Ragistration page: Admin dashboard:-
  84. Supervisior table: Supervisior dashboard: Student dashboard:
  85. Update password:
  86. List of Tables & Figures Particulars Page No. Figure-1 SDLC……………………………………………………………..19 Figure-2 Process.................................................................................26 Figure-3 Data Flows............................................................................26 Figure-4 Data Stores...........................................................................26 Figure-5 External Entity.......................................................................27 Figure-6 Output Symbol.......................................................................27 Table-1 TBL_LOGIN............................................................................28 Table-2 Cus_Add……………...............................................................28 Table-3 Cus_Inf………………………..................................................28 Table-4 Emp_Inf……….......................................................................28 Table-5 Emp_Add……........................................................................29 Table-6 Rent……………………………...............................................29 Table-7 Apartment…...........................................................................29 Table-8 BHK2………….......................................................................30 Table-9 3BHK…………………............................................................30 Table-10 Emp_Qual………………......................................................30 Table-11 .............................................................................................31 Figure-7 Steps of Testing....................................................................48 E-R Diagram E-R Diagram..................................................................58
  87. DFD-1 0-Level DFD...............................................................................59 DFD-2 1-Level DFD...............................................................................60 Snapshot-1 CustomerReport..............................................................61 Snapshot-2 EmployeeReport….........................................................62 Snapshot-3 ApartmentReport……..................... ...............................62 Snapshot-4 Flat Report........................................................................63 Snapshot-5 Room Report..…...............................................................63 Snapshot-6 frmReceipts......................................................................64 Snapshot-7 frmAdminLogIn.................................................................64 Snapshot-8 frmReports........................................................................65 Snapshot-9 frmAttendeesReport.........................................................65 Snapshot-10frmNewMemberReport...................................................66 Snapshot-11frmUpdateRecordReport................................................66 Snapshot-12frmChildReport...............................................................67 Snapshot-13frmFeeCollectionReport.................................................67
  88. Conclusion Overall we can say that Student Supervision System is a small project but it is flexible and easy to operate for the End-User. Through this projects’ user gets the idea how the registration process will going on. It gives information about all the data of the members of an association. It has high accuracy and there is no repetition of data. The proposed system is user friendly that can easily be used by any person irrespective of his/her location. User can easily do the registration at the event venue. There is no doubt that there always remains some scope of improvement, however good or efficient the Software may be. The important thing is that the system developed is flexible to accommodateany future. This project is satisfying all the characteristics like Easy to Use, Flexible, Portable and Proper Functional. It is easy to use. User friendly screens are provided. The usage of software increases the efficiency, decreases the effort. It has been efficiently employed as a Site management mechanism. It has been thoroughly tested and implemented.
  89. Appendix- A SQL Server 2008  Relational Database Design Principles:- The first and most important step in the development of a database is the process of defining a set of requirements and modeling how those requirements will be met using a relational database.  Key Terms:-  Data Normalization:- Dr. Codd defines a series of progressively more stringent standards, called normal forms, which further optimize data for efficient storageand retrieval.  First Normal Form:- First normal form requires that each attribute in a relation contain only one piece of information that you care about, and each piece of information that you care about should be held in only one attribute.
  90.  Second Normal Form:- Second normal form ensures that each relation models just one entity or event in the problem set. Although second normal form also looks at the attributes of a relation, it is really about the relation as a whole.  Third Normal Form:- Third normal form builds on second normal form with the additional requirement that all attributes are not functionally dependent on any other columns besides the primary key.  Boyce-Codd Normal form:- Boyce-Codd is a variation on third normal form that addresses fairly uncommon cases where there are at least two composite candidate keys with overlapping values.  Fourth Normal form:- Fourth normal form deals with separating multi-valued dependencies into separate relations, and fifth normal form deals with rare kind of three-table circular dependency.
  91.  Creating Constraints:- You can restrict the data entered in columns by setting restrictions, or constraints, on the type of values allowed. Constraints can be placed on columns as part of creating tables, or they can be added later. There are six types of constraints that you can set on columns:  Primary key: Set on a column (or set of columns) to uniquely identify a row in a table. A table can have only one primary key.  Foreign key: Set on a column (or set of columns) participating in a relationship between tables and referencing only the primary key or unique constraints in the related table. Tables can have multiple foreign keys, corresponding to relationships with up to 63 other tables in the same database. Foreign key constraints can also reference the primary key in the same table (a self join).  Not null: Null (or unknown) values are not allowed. When you allow Null values, SQL Server keeps a special bitmap in every row to indicate which null able column actually contains Null values. The Not Null constraints are equivalent to making a column required.  Unique:This constraint requires that each entry in a column (or combination of columns) be unique. A table can have up to 249 unique constraints defined. 
  92.  Triggers:- A trigger is Transact-SQL procedures that executes only on INSERT, UPDATE, or DELETE statements- there’s no such thing as a trigger for a select statement.  SSQQLL SSeerrvveerr CCaappaacciittiieess::-- FFoolllloowwiinngg lliisstt sshhoowwss tthhee ssyysstteemm lliissttss ffoorr VVaarriioouuss SSQQLL SSEERRVVEERR OObbjjeeccttss.. OOBBJJEECCTTSS LLIIMMIITTSS DDaattaabbaassee 3322,,776677 ddaattaabbaasseess TTaabblleess 22 bbiilllliioonn ttaabblleess ppeerr ddaattaabbaassee CCoolluummnnss 11002244 ccoolluummnnss ppeerr ttaabbllee TTrriiggggeerrss uupp ttoo 22 bbiilllliioonn ttrriiggggeerrss UUsseerr CCoonnnneeccttiioonnss 3322776677 ccoonnnneeccttiioonnss aarree ppoossssiibbllee OOppeenn OObbjjeeccttss 22 bbiilllliioonn ooppeenn oobbjjeeccttss aatt aa ttiimmee SSttoorreedd PPrroocceedduurreess ccaann ccoonnttaaiinn 225555 ppaarraammeetteerrss LLoocckkss 22 bbiilllliioonn lloocckkss
  93. Appendix B PHP: Hypertext Preprocessor,is a widely used, general-purposescripting language that was originally designed for web development, to producedynamic web pages. Itcan be embedded into HTML and generally runs on a web server, which needs to be configured to process PHP codeand create web page content fromit. Itcan be deployed on mostweb servers and on almostevery operating system and platform free of charge. PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous development ever since. The main implementation of PHP is now produced by The PHP Group and serves as the de facto standard for PHP as there is no formal specification.PHP is free softwarereleased under the PHP License, which is incompatible with the GNU General Public License (GPL) because of restrictions on the use of the term PHP PHP has evolved to include a command line interface capability and can also be used in standalonegraphical applications. USAGE PHP is a general-purposescripting languagethat is especially suited for web development. PHP generally runs on a web server. Any PHP code in a requested file is executed by the PHP runtime, usually to create dynamic web page content. Itcan also be used for command-linescripting and client-side GUI applications. PHP can be deployed on most web servers, many operating systems and platforms, and can be used with many relational databasemanagement systems. Itis available free of charge, and the PHP Group provides the complete source code for users to build, customizeand extend for their own use.
  94. PHP primarily acts as a filter, taking input froma file or streamcontaining text and/or PHP instructions and outputs another streamof data; most commonly the output will be HTML. Since PHP 4, the PHP parser compiles input to producebyte code for processing by the Zend Engine, giving improved performanceover its interpreter predecessor Originally designed to create dynamic web pages, PHP now focuses mainly on server-sidescripting, and it is similar to other server-sidescripting languages that providedynamic content froma web server to a client, such as Microsoft's Active Server Pages, Sun Microsystems'JavaServer Pages and mod_perl. PHP has also attracted the development of many frameworks thatprovidebuilding blocks and a design structureto promote rapid application development (RAD). Someof these include CakePHP, Symfony, CodeIgniter, and Zend Framework, offering features similar to other web application frameworks.
  95. REFERENCES Websites:-  www.google.com  www.wikipedia.org  www.w3schools.com  www.answer.com  www.msdn.microsoft.com  www.stackoverflow.com
Publicidad