Student Trainee Management System
Student Trainee Management System
Student Trainee Management System
MANAGEMENT SYSTEM
Developed For
BY
SUMIT PARIAHR
(04/MCA/30)
JUNE 2007
2
3
GOVERNMENT OF INDIA
MINISTRY OF COMMUNICATIONS &
INFORMATION TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
CERTIFICATE
This project work has been carried out under the supervision of ______ in the
________________ organization. This work is original and has not
been submitted, in part or full, to any other University or Institution
for the award of any other degree.
Student Supervisor
5
DECLARATIONS
I, Sumit Parihar hereby declare that the project entitled “Design and Development
of Student Trainee Management System” which have to be submitted in the
partial fulfillment of the requirements for the awards of Master Of Computer
Application in the Kumaun University Nainital, is an own record carried out by me
under the supervision of my teacher DR Rajiv Aggarwaal HOD (Comp .Sc). The
matter embodied in this project has not been submitted so far for the award of any
degree.
(Sumit Pairhar)
Signature
6
Acknowledgements
Sumit Parihar
7
Preface
This project is intended to computerize and provide information about the current
status of the Trainees. This is exclusive and live s/w that gives
various facilities to the user i.e. the user can fill his form online. The
project is divided into various sections that present a clear picture of
the system. Simplicity is more Importance while designing. All
possible aspects of the system are taken into consideration. User
friendliness is aimed in this project. The project is developed in one
source platform, using JSP, Hibernate and SQLServer 2005.
Java Server Pages, also known as JSPs are simple but powerful technology used to
generate dynamic HTML on severs side. They are a direct extension
of Java Sevlets and provide a way to separate content generation
from content presentation. The JSP engine is just another Servlet that
is mapped to the extension *.jsp.
Hibernate is a free, open source Java package that makes it easy to work with
relational databases. Hibernate makes it seem as if your database
contains plain Java objects like you use every day, without having to
worry about how to get them out of (or back into) mysterious
database tables. It liberates you to focus on the objects and features
of your application, without having to worry about how to store them
or find them later
ABSTRACT
• Data Entry
• Data Processing
• MIS
• Reports
The Data Entry module contains seven forms namely new Student Information
Entry form, HOD detail form, institute detail form, student detail form, HOD
requirement form, stipend sanction form, software details form, monthly stipend
entry form. With the help of this module we can register new trainee, modify, delete
and view existing records.
Data Processing module contain two form namely Student Selection and Selection
According HOD. In this module we basically process the data entered with the help
of data entry module.
MIS Module contains only one form .In this module we get the list of total no of
students who get selected in NIC for training. It provides name, batch, joining, and
selection information of all the trainees who applied in NIC.
Report module deals with report generation. It consist of forms for the generation
of various reports like student report, HOD report, stipend report, institute report,
9
Components assigned:
The components assigned include the enhancement of the existing modules and to
make an interface for generating the reports. The enhancement of the existing
module contains the layout design of web form with addition of Graphical user
interfaces. In enhancement module various changes have to be included as given
below:
• Authentication Form
• Applicant’s Interfaces Form
• Manipulation Interface Form
• Searching Interface Form
The Report Module contains the various forms for the generation of reports, as
given below:
• Student Reports
• Institute Reports
• HOD Reports
• Miscellaneous Reports
• JDK 1.5
• Servlet
• Java Server Pages (JSP)-2.0
• Hibernate 3.1
• Tomcat –5.0.28
• MS SQL Server2005
• Microsoft SQL Server 2005 Driver for Hibernate
• iReport Generator
Keywords:
SERVLET, JAVA BEANS, JSP,POJO, MANAGEMNET SYSTEM,
11
CONTENTS
Page no
Chapter 3: Component
Assigned…………………………………………………… 29
3.1 Modules Assigned
3.2 Report Design
3.3 Designing Reports
13
14
Chapter 9: Project
Legacy…………………………………………………………..100
Chapter 10: Discussion
………………………………………………………………102
10.1 Conclusions
Chapter 11:
References……………………………………………………………….105
14
15
1 Company Profile
.
15
16
Company Profile
Genesis
16
17
Centre can get on with its work on an expeditious basis. NIC is a plan
project administered by the Information, Planning and Analysis Group
(IPAG) of the Electronics Commission in its initial stages’.
Objective
Mandate
As laid down in the Annual Reports of DOE 1976-'77 and 1977- '78,
NIC was given the mandate to
17
18
• Agriculture
• Construction and Transport
• Education and Manpower
• Energy
• Finance
• Industry
• Small- Scale Industries
• Socio- Economic Index
• Trade and Media
• Government Archival Information
Evolution
18
19
CollabCAD Advantages:
19
20
Through its GISNIC software, NIC offers to undertake the tasks to generate and
plot various types of thematic maps (Flow Lines maps, Graduated Symbol maps,
Choropleth maps, Pie charts and Bar charts). The various tasks related to geographic
analysis such as creation of buffer zones, performing polygon overlay and
manipulating tabular data, are also carried out using GISNIC.
This website provides Information & Services with respect to GOV.IN Domain. The
use of GOV.IN Domain is restricted to the constituents of Indian Government at
various levels right from Central, State/UT, and District & Sub-District. National
Informatics Centre (NIC) is the exclusive Registrar for GOV.IN domain names.
20
21
Informatics
1. Biomedical Informatics
A Centre jointly setup by NIC and ICMR to cater to the information needs of
Medical community of India.
2. Patent Informatics
Website: http://patinfo.nic.in
It is one of the most comprehensive databases on the Patent Bibliography.
This database is known as EPIDOS (European Patent Information and
Document Service). European Patent Office (EPO) publishes this
database. EPO has been receiving the bibliography of all the patents filed
and granted in approximately 71 countries since 1968. It contains over 33
millions references from 1968 onwards. Almost 3 millions references are
added each year.
3. Rural Informatics
Since time immmemorial, India has been a land of village communities. With
more than 75 percent people living in rural areas, no development, can be
successful unless it focuses on rural areas and rural people. In 1986,
National Informatics Centre introduced IT to facilitate planning, monitoring
and exchange of information between various agencies in Rural
Development administration.
21
22
22
23
With more and more business processes and citizen services operating over the
net, demand for protection of data has risen with efficient backup and recovery
solutions. Thus there is a need to set up a strategic infrastructure that facilitates
high availability, quick scalability, efficient management & optimized utilization
of resources. To fulfill the need, NIC has set up state of art Internet Data Centers
at NIC Hq, New Delhi and 29 small data centers at various state capitals to cater
the services to Government entities. NIC Internet Data Centers combine around-
the-clock systems management with onsite personnel trained in the areas of
Server Administrators, Database Administrators, Internet, and systems
management.
Website: http://modelling.nic.in
23
24
Networking
Website: http://satcom.nic.in.
24
25
Services
• Corporate Communications
• Internet/Intranet
• E-mail
• EDI
• Web enabled database access
• Emergency voice communication
• Data broadcast
• Multimedia broadcast
• Multicasting
• Distance Learning
Highlights
Features
25
26
Benefits
uniform reports
• Helps timely disposal of letters
• Summary reports for sectional/divisional/ depart-mental level monitoring
• Enforces a uniform working procedure
• Easy to install, learn and use the system
Website: http://webservices.nic.in.
Amongst the various ways in which the 'Net' has now become a part of our lives
lies 'WWW', or the World Wide Web which has effectively rendered the concept
of International Boundaries and physical distances meaningless.Web presence
today has become a vital element for an organization striving to fulfil its
objectives in an efficient manner. And equally important, if not more, in the
mantra of success is the role of the web service provider. Setting up a powerful
26
27
web presence is a voyage of discovery. And in this journey, you will need a
partner who knows the latest.. in technology and technique.
27
28
2. Project Introduction
28
29
2.2 Objectives
29
30
In the system study we try to analyze the problems of existing systems, define the
objectives to be attained by a solution and evaluate various solution alternatives.
In the present project a purely web enabled software will be developed using JAVA
and J2EE with Hibernate as ORM tool and SQL Server 2005 as backend and
iReport as reporting tool. The system will take care of each and every information of
the trainee’s who are doing or have done their project work at NIC. Dynamic web
pages based on client server model are to be developed, so that the trainees can
apply and interact online.
30
31
(Proposed System)
Validations Implementation.
31
32
32
33
Preliminary investigation examine project feasibility, the likelihood the system will
be useful to the organization. The main objective of the feasibility study is to test the
Technical, Operational and Economical feasibility for adding new modules and
debugging old running system. All system is feasible if they are unlimited resources
and infinite time. There are aspects in the feasibility study portion of the preliminary
investigation:
• Technical Feasibility
• Operation Feasibility
• Economical Feasibility
The technical issues usually raised during the feasibility stage of the investigation
includes the following
1. Does the necessary technology exist to do what is suggested?
2. Does the proposed equipments have the technical capacity to hold the data
required to use the new system?
3. Will the proposed system provide adequate response to inquiries, regardless
of the number or location of users?
4. Can the system be upgraded if developed?
5. Are there technical guarantees of accuracy, reliability, ease of access and
data security?
The current system developed is technically feasible. It is a web based user interface
for trainees at NIC. Thus it provides an easy access to the users. The database’s
purpose is to create, establish and maintain a workflow among various entities in
order to facilitate all concerned users in their various capacities or roles. Permission
to the users would be granted based on the roles specified. Therefore, it provides
the technical guarantee of accuracy, reliability and security. The software and hard
requirements for the development of this project are not many and are already
available in-house at NIC or are available as free as open source. The work for the
33
34
project is done with the current equipment and existing software technology.
Necessary bandwidth exists for providing a fast feedback to the users irrespective of
the number of users using the system.
Proposed projects are beneficial only if they can be turned out into information
system. That will meet the organization’s operating requirements. Operational
feasibility aspects of the project are to be taken as an important part of the project
implementation. Some of the important issues raised are to test the operational
feasibility of a project includes the following: -
The well-planned design would ensure the optimal utilization of the computer
resources and would help in the improvement of performance status.
A system can be developed technically and that will be used if installed must still be
a good investment for the organization. In the economical feasibility, the
development cost in creating the system is evaluated against the ultimate benefit
derived from the new systems. Financial benefits must equal or exceed the costs.
The system is economically feasible. It does not require any addition hardware or
software. Since the interface for this system is developed using the existing
resources and technologies available at NIC, There is nominal expenditure and
economical feasibility for certain.
34
35
. 3 Component Assigned
.
35
36
• Data Entry
• Data Processing
• Reports
• MIS
The components assigned include the enhancement of the existing modules & to
make an interface for generating the reports. The enhancement of the existing
module contains the layout design of web form with addition of Graphical user
interfaces. In enhancement module various changes have to be included as given
below:
• Authentication Form
• New User Sign up.
• Login Form.
• Applicant’s Interfaces Form
• Online Registration Form.
Student’s Details.
36
37
The Report Module contains the various forms for the generation of reports, as
given below:
Student Reports
Institute Reports
HOD Reports
Miscellaneous Reports
Student Reports
Student report form generates the various reports regarding the applied students,
selected students, Joined students, Recommended Students. In this form, reports will
be generated on the entered value of Batch (Year), semester (January/July) and
selected value (Y/N) by user.
Applied Student Report will provide the list of all the students who have/had applied
for the training at NIC. Student’s Details will be sorted on the basis of marks
obtained by them in their respective university examinations. Applied student does
not require any selected option (Y/N).
Selected Student Report will provide the list of all the students who were /are
selected for the training by NIC training department. Selected Student’s details will
be categorized according to the assigned college’s category and students are sorted
on the basis of marks obtained by them in their respective university examinations.
Similarly the Joined Student Report will list out the details of the student either they
had/have joined their training or not Details of student will include the Student Id,
Name, Discipline ,Marks, Training starting Date, Ending date & Duration of
training in months.
Recommended Students Report will help to know the applicant’s names that are
recommended by some senior official or by any other person. By entering the value
of batch (Year) and semester (January/July) report will be generated with details &
total number of student.
Institute Reports
Institute Report Form generates the report regarding the labels of the Institute, Lists
of institute & the summary of institute’s students applied, selected, joined for the
entered Batch (year).Summary include the details that how many student of an
institute applied in and respective number of student selected by NIC Department in
a year and how many of them joined for training. Labels of institute will remove the
handwork for the writing the colleges address for postal letter’s envelop.
37
38
HOD Reports
Hod report form generates the report regarding the Head Of department detail list,
semester wise requirement, and summary. Hod list report will generate the
document contains the name of all head of department officers with their contact
number & detail information
Miscellaneous Reports
This includes the various other reports which will be helpful for trainees & the staff
of NIC. Clearance Report, Expenditure, Monthly Stipend report, software list,
Sanction letter or student marks report etc.
38
39
4 Technology Environment
.
39
40
This section describes the various hardware & software requirement by the
developer during the development of project & the tools used. It also includes
specification required by the client for implementing & using the system. This
includes the decision about the operating system to be used. The alternatives are
passed through the Mandatory requirements and screening criteria, which is a
combination of the requirements and some implicit requirements that the alternative
should satisfy.
Hardware
• Intel Pentium processor® at 2.66 GHz
• 256 MB RAM minimum, Recommended 512 MB Ram
• And other regular hardware devices
Software:
• Jdk1.5
• JSP2.0
• Hibernate
• Microsoft SQL Server 2005
• JDBC Driver of Microsoft SQL Server 2005
40
41
Software
Os independent
Internet browser
Hardware
Intel Pentium P III 450MHz or higher
128 MB RAM, recommended 256 or MB higher
And other regular hardware devices
Software
Operating System:
Os independent
Software:
• Jdk1.5.0
• JSP2.0
• Hibernate
• Microsoft SQL Server 2005
• Tomcat Web Server
Hardware
41
42
5. System Requirement
&
Specificatio
n
42
43
5.1 Introduction
The first step toward developing accurate and complete specifications is to establish
correct requirements. In requirements, it is important to specifically establish the
functions, attributes, constraints, preferences, and expectations of the product.
Usually in the process of gaining information, functions are the first ones to be
defined. Functions describe what the product is going to accomplish. It is also
important to determine the attributes of a product. Attributes are characteristics
desired by the client, and while 2 products can have similar functions, they can have
completely different attributes. After all the attributes have been clarified and
attached to functions, we must determine the constraints on each of the attributes.
Preferences, which is a desirable but optional condition placed on an attribute, can
also be defined in addition to its constraints. Finally, we must determine what the
client's expectations are. This will largely determine the success of the product.
43
44
The System Requirement Specification for as system should have the following
characteristics:
• SRS should specify all the functions that the software is supposed to do and
response to various inputs.
• Requirements stated should not be ambiguous. Formal language
specifications should be used.
• Requirements stated should be verifiable & should not conflict with one
other.
• SRS should be flexible enough to incorporate any change to it.
44
45
45
46
Functional requirement specify all the functions of the system and the outputs to be
produced from the given inputs. These requirements explain the input-output
relationship between the entities of the system. Mainly the functions are displayed
with the help of use case or dataflow diagrams.
46
47
So the inputs for the new system are to make the existing system
Fully web based, remotely access, online registration
• Data Entry
• Data Processing
• Reports
• MIS
47
48
Performance Requirements
These requirements specify the performance characteristics of a system. There are
two types of performance requirements:
• Static Requirements
• Dynamic Requirements
Static Requirements also called as capacity requirements, these do not effect the
executions of the system. While Dynamic requirements specify constraints related to
the time in which the system is able to complete an operation and the number of
operations that a system performs in a unit time.
Design Constraints
Design constraints cover the various aspects as given :
Software & hardware limitations
Security
Standards
48
49
In project a purely web enabled software will be developed using JSP with
Hibernate is used as ORM tool, SQL Server is used as backend and iReport is used
for reporting purposes. The system will take care of each and every information of
the person who are doing or have done there project work at NIC. Dynamic web
pages based on client server model are to be developed, so that the trainees can
apply and interact online.
JAVA:
49
50
JVM is usually implemented in the form of a software program that interprets and
executes these byte codes.
The Java platform is distinct from both Lava language and JVM. The Java platform
is the predefined set of Java classes that exist on every Java installation; these
classes are available for use by all Java programs. TheJava Platform is also
sometimes referred to as the Java runtime environment.
50
51
51
52
JAVA SERVLETS
Servlets are the Java platform technology of choice for extending and enhancing
web servers. Servlets provide a component-based, platform-independent method for
building web-based applications, without the performance limitations of CGI
programs. And unlike proprietary server extension mechanisms (such as the
Netscape Server API or Apache modules), servlets are server- and platform-
independent. This leaves you free to select a "best of breed" strategy for your
servers, platforms, and tools.
Servlets have access to the entire family of Java APIs, including the JDBC API to
access enterprise databases. Servlets can also access a library of HTTP-specific calls
and receive all the benefits of the mature Java language, including portability,
performance, reusability, and crash protection.
52
53
Portability
Because servlets are written in Java and conform to a well defined and widely
accepted API, they are highly portable across operating systems and server
implementations.With servlets you can truly say “write once, serve everywhere”
reason being a class file is made which is nothing but machine-independent
bytecodes. We can develop a servlet on Windows NT machine running the Java
Web Server and later deploy it effortlessly on a Unix server running Apache.
Safety
The servlet API is designed to be easily extensible. The API includes classes that
are optimized for HTTP servlets but at a later date it could be extended and
optimized for another type of servlets by a third party.
Sevlets are also quite flexible. An HTTP servlet can be used to generate a complete
webpage it can be added to a static page using a <SERVLET> tag in what is known
as a server-side include and it can be used in cooperation with any number of
servlets to filter the content in something known as servlet chain.
53
54
Integration
Servlets are tightly integrated with the server. A servlet can use the server to
translate file paths, perform logging, check authorization, perform MIME type
mapping and, in some cases, even add users to the server’s user database.
Elegance
Efficiency
Java Server Pages, also known as JSPs are simple but powerful technology used to
generate dynamic HTML on severs side. They are a direct extension of Java Sevlets
and provide a way to separate content generation from content presentation. The JSP
engine is just another Servlet that is mapped to the extension *.jsp.
The source code of a JSP document looks like any other HTML document with
some added tags containing Java code. The source code is stored in a file called
XXX.jsp and copied to the document directory of the Web server. When a request is
made for this document, the server recognizes the *.jsp extension and realizes that
special that special handling is required. The first time the file is requested, it is
54
55
compiled into a Servlet object and stored in the memory, and the output is sent back
to the requesting client. After the first request, the server checks to see whether the
*.jsp file has changed. If it has not changed, then the server invokes the previously
compiled Servlet object.
• The user visits a web site made using JSP. He goes to a JSP page (ending
with .jsp). The web browser makes the request via internet.
• The JSP request is sent to the web server.
• The web server recognizes that the file required is special (.jsp), therefore
passes the file to the JSP Sevlet engine.
• If the file has been called for the first time, the JSP file is parsed, other wise
go to step 7.
• The next step is to generate a special Servlet from JSP file. The entire
HTML is converted into ‘println’ statements.
• The Servlet source code is compiled into a class.
• The Servlet is instantiated, calling the init and service methods.
• HTML from the Servlet output sent via Internet.
• HTML results are displayed on the user’s web browser.
55
56
Hibernate:
Hibernate is a free, open source Java package that makes it easy to work with
relational databases. Hibernate makes it seem as if your database contains plain Java
objects like you use every day, without having to worry about how to get them out
of (or back into) mysterious database tables. It liberates you to focus on the objects
and features of your application, without having to worry about how to store them or
find them later
Most applications have some need to work with data. Java applications, when
running, tend to encapsulate data as networks of interconnected objects, but those
objects vanish in a puff of logic when the program ends, so there needs to be some
56
57
way to store them. And sometimes the data is already "out there" before the
application is even written, so there needs to be a way to read it in and represent it as
objects. Writing code by hand to perform these tasks is tedious and error-prone, and
can represent a major portion of the effort involved in the overall application.
As good object-oriented developers got tired of this repetitive work, their
typical tendency towards enlightened laziness started to manifest itself in the
creation of tools to help automate the process. When working with relational
databases the culmination of such efforts were object/relational mapping tools.
Rather than utilize bytecode processing or code generation, Hibernate uses runtime
reflection to determine the persistent properties of a class. The objects to be
persisted are defined in a mapping document, which serves to describe the persistent
fields and associations, as well as any subclasses or proxies of the persistent object.
The mapping documents are compiled at application startup time and provide the
framework with necessary information for a class. Additionally, they are used in
support operations, such as generating the database schema or creating stub Java
source files.A SessionFactory is created from the compiled collection of
mapping documents. The SessionFactory provides the mechanism for
managing persistent classes, the Session interface. The Session class provides
the interface between the persistent data store and the application.The Session
interface wraps a JDBC connection,which can be user-managed or controlled by
Hibernate, and is only intended to be used by a single application thread, then closed
and discarded.
57
58
<session-factory>
<property name="connection.username">root</property>
<property name="connection.url">
jdbc:sqlserver://CABIIN49\SQLEXPRESS:1433
</property>
<property name="dialect">
org.hibernate.dialect.SQLServerDialect
</property>
<property name="myeclipse.connection.profile">
server2005
</property>
<property name="connection.password">nic123</property>
<property name="connection.driver_class">
com.microsoft.sqlserver.jdbc.SQLServerDriver
</property>
<mapping resource="sumitparihar/Sanction.hbm.xml" />
<mapping resource="sumitparihar/InstCod.hbm.xml" />
<mapping resource="sumitparihar/Stuinfo.hbm.xml" />
</session-factory>
</hibernate-configuration>
58
59
Our example utilizes one trivial class Sanction. The mappings for these class is
shown below.
59
60
The mapping documents are reasonably clear, but certain areas warrant explanation.
The id
element block describes the primary key used by the persistent class. The attributes
of the id
element are:
type: The Java data type used. In this case, we’re going to use longs.
unsaved-value: This is the value used to determine if a class has been made
persistent, i.e., stored to the database. If the value of the id attribute is null,
Hibernate
knows that this object has not been persisted. This is important when calling the
60
61
61
62
62
63
Developer Productivity
Technology Capabilities
Common Language SQL Server 2005 introduces the capability to develop database objects
Runtime (CLR) using any Microsoft .NET language.
Integration
Deep XML Integration SQL Server 2005 delivers a new XML data type, enabling the storage of
XML fragments or documents in SQL Server databases.
Transact-SQL New query types and the capability to use error handling in transactions
Enhancements provide developers with more flexibility and control in SQL Server query
development.
SQL Server 2005 Full integration of SQL Server 2005 Compact Edition with SQL Server
Compact Edition 2005 and Visual Studio 2005 provides a platform for developers to rapidly
build applications that extend enterprise data management capabilities to
mobile devices.
Business Intelligence
Technology Capabilities
Analysis Analysis Services provides a unified and integrated view of all your business data as
Services the foundation for all of your traditional reporting, OLAP analysis, Key Performance
Indicator (KPI) scorecards and data mining.
Integration SQL Server Integration Services (SSIS) is a next generation data integration
Services platform that can integrate data from any source. SSIS provides a scalable and
63
64
Business Intelligence
Technology Capabilities
extensible platform that empowers development teams to build, manage, and deploy
integration solutions to meet unique integration needs.
Reporting SQL Server Reporting Services is a comprehensive, server-based reporting solution
Services designed to help you author, manage, and deliver both paper-based and interactive
Web-based reports.
Data Mining SQL Server 2005 Analysis Services (SSAS) provides tools for data mining with which
you can identify rules and patterns in your data, so that you can determine why
things happen and predict what will happen in the future – giving you powerful
insight that will help your company make better business decisions.
64
65
MyEclipse, first released in 2003, is built upon the Eclipse platform, specifically
using the Web Tools Platform (WTP) for much of its functionality. The MyEclipse
tools are most comparable to the IBM Rational Software toolkit, JetBrains (IntelliJ
IDEA), and BEA Systems tools.
65
66
Flow chart :
Start
ssssatraasss
Selecte
d
Student receives
selection letter from NIC
Branch is allocated to
selected student
Project is allocated
Stipend is sanctioned at
the end of every month
Stop 66
67
Student trainee
Selection Information
Review of Old Cases
Registers View Details
Registratio
n
View Details Data Entry
Data processing
Reports
67
68
Age Sex
No of
branches
Register NIC
Student in
Mark
s bnam
Work has
e
s in
Works
on Bhod
Branches
Works
under
Blocatio
n
Assign
Project ed by Project guide
age
Name
Id se
Supervi x
No of stud
ses by
Use allocated
s
HOD
6. System Design
69
70
6.1 Introduction
Systems design is the third phase in the system development life cycle.
Now we are ready to begin the physical design system that will meet the
specification described in the system requirements document
Interface Issue
User interface, input and output design begins the systems
design phase of the SDLC. The user interface should
include all the tasks, commands and communication
between users and the system. In GUI environment a user
can display and work with multiple windows on the single
screen.
Input Design Issues During input design, determine how data will be captured and
entered into the system. Data capture is the identification and recording of source
data. Data entry is the process of converting source data into computer readable
form and entering it into or from system.
70
71
It Includes
• What is the purpose of output?
• Who wants the information, why it is needed and how it will be used?
Reports like any other elements of the user-computer interface should be attractive,
professional, and easy to use. System analysts should realize that printed output is
highly visible and manages sometimes judges project by the quality of reports they
receive.
71
72
STMS
Data
Data Entry Processing Reports MIS
72
73
Allocation
Allocation_st
Allocation_hod
Criteria
Discip
Hod
Hodsummary
Inst_code
Monthlystipend
Monthname
Recommranks
Relaxation
Requ
Sanction
Studetail
Stuinfo
swtools
73
74
Student Database
74
75
SD datetime 8 NULL
ED datetime 8 NULL
75
76
76
77
Table 2:Allocation_hod
Table 3: Allocation_st
77
78
Table 4: criteria
Table 5:Dicip
Table 6:hod
78
79
Table 8:inst_code
Table 9: relaxation
79
80
80
81
Table11:sanction
81
82
Table 13:studetail
82
83
83
84
Description:
Login Page
84
85
Login Fail
85
86
86
87
87
88
88
89
Login Form
89
90
Description:
After Login success NIC Employee will be navigated to the menu form where there
are four modules performing different functions
Menu Form
90
91
91
92
92
93
93
94
Hod Requirement
94
95
95
96
96
97
97
98
Student Selection
98
99
99
100
MIS
100
101
7. Security Issues
101
102
7.1 Introduction
The protection of computer based resources that includes hardware, software, data,
procedures and people against unauthorized use or natural
Disaster is known as System Security.
System Security refers to the technical innovations and procedures applied to the
hardware and operation systems to protect against deliberate or accidental damage
from a defined threat.
Data security is the protection of data from loss, disclosure, modification and
destruction.
Privacy defines the rights of the user or organizations to determine what information
they are willing to share with or accept from others and how the organization can be
protected against unwelcome, unfair or excessive dissemination of information
about it.
102
103
System security refers to various validations on data in form of checks and controls
to avoid the system from failing. It is always important to ensure that only valid data
is entered and only valid operations are performed on the system. The system
employees two types of checks and controls:
If the web browser allows running the Java script then client side validation code is
run otherwise validation is done at the server side automatically. Various client side
validations are used to ensure on the client side that only valid data is entered. Client
side validation saves server time and load to handle invalid data. Some checks
imposed are:
Validation is used to ensure those required fields are filled with suitable data only.
Maximum lengths of the fields of the forms are appropriately defined.
Forms cannot be submitted without filling up the mandatory data so that manual
mistakes of submitting empty fields that are mandatory can be sorted out at the
client side to save the server time and load.
Tab-indexes are set according to the need and taking into account the ease of user
while working with the system.
103
104
Some checks cannot be applied at client side. Server side checks are necessary to
save the system from failing and intimating the user that some invalid operation has
been performed or the performed operation is restricted. Some of the server side
checks imposed are:
Server side constraint has been imposed to check for the validity of primary key and
foreign key. A primary key value cannot be duplicated. Any attempt to duplicate the
primary value results into a message intimating the user about that value through the
forms using foreign key can be updated only of the existing foreign key values.
User is intimating through appropriate messages about the successful operations or
exceptions occurring at server side.
• Various Access Control Mechanisms have been built so that one user may not
agitate upon another. Access permissions to various types of users are controlled
according to the organizational structure. Only permitted users can log on to the
system and can have access according to their category. User- name, passwords
and permissions are controlled o the server side.
• Using server side validation, constraints on several restricted operations are
imposed.
104
105
8. System Testing
&
Implementation
105
106
8.1 Introduction
In this phase the system is tested. Normally programs are written as a series of
individual modules, these subjects to separate and detailed test. The system is then
tested as a whole. The separate modules are brought together and tested as a
complete system. The system is tested to ensure that interfaces between modules
work (integration testing), the system works on the intended platform and with the
expected volume of data (volume testing) and that the system does what the user
requires (acceptance/beta testing).
The developed software is tested to the customer to detect the possible errors. A
software test program should aim at detecting maximum number of errors in the
software. The process of testing involves creating the test cases and implementing
those test cases on the software to detect errors. Testing validates that the actual
performances of the software meets the user requirements. The Testing Strategy and
plan TSP document is a formal document that contains the test plan and the list of
all types of test to be done on the software
Test Plan consists of the components to be tested, people involved in testing, test
cases and the acceptance criterion for the software. Some guidelines to be followed
while creating test plan are as follows:
The test planned for the software should be such that they detect the deviation of the
software from client requirements. The test planned in the test plan should begin
from smaller module and move to cover the entire system.
The test plan should assign the task of testing to a third person. This is because a
person from outside the development team has the better chances of detecting errors.
Software testing can be broadly classified into two categories:
106
107
A testing strategy describes the steps that are performed during the testing of
software.
Unit Testing
Integration Testing
System Testing
Functional Testing
Developing test case is an important task of testing. An efficient test case detects the
maximum number of errors.
107
108
Click Submit
2 Fill The Following Details… An Error message
Should be
User Name=root displayed
Click Submit
108
109
9. Project Legacy
109
110
While developing software a developer take care of every requirement of user, but it
not fair to say that a project completes ever. Many enhancements & new features are
required by user & added in future. Software is enhanced & marketed with the
version numbers.
At this time the major enhancements which I feel this project require are:
110
111
10. DISCUSSION
111
112
10.1 CONCLUSION
It has been a great pleasure for me to work on this exciting and challenging project.
This project proved good for me as it provided practical knowledge of not only
programming in JAVA as well as working of web based application and no some
extent Windows Application and SQL Server, but also about all handling procedure
related with “Design and Development of Sudent Trainees Management System”. It
also provides knowledge about the latest technology used in developing web
enabled application and ORM Tool such as Hibernate that will be great demand in
future. This will provide better opportunities and guidance in future in developing
projects independently.
Benefits:
The project is identified by the merits of the system offered to the user. The
merits of this project are as follows: -
112
113
• Data storage and retrieval will become faster and easier to maintain because
data is stored in a systematic manner and in a single database.
• Decision making process would be greatly enhanced because of faster
processing of information since data collection from information available
on computer takes much less time then manual system.
• Allocating of sample results becomes much faster because at a time the user
can see the records of last years.
• Easier and faster data transfer through latest technology associated with the
computer and communication.
• Through these features it will increase the efficiency, accuracy and
transparency,
113
114
11. REFERENCES
114
115
BIBLIOGRAPHY:
2. Head First Servlets and JSP by Bryan Basham, Kathy Sierra, Bert Bates
115
116
Websites :
These are various websites which is helpful in developing the project in coding
prospect
• http://www.roseindia.net/hibernate/
• http://www.hibernate.org
• http://pdf.coreservlets.com/
• http://www.w3schools.com/html/
• http://www.echoecho.com/html.htm
116
117
117