CHAPTER 1
INTRODUCTION
The use of Information Technology for Government services facilitates an efficient, speedy and transparent process for disseminating Information to the public and other agencies and performing government administrations activities. The emphasis has been an providing better services to citizen and in improving internal productivity.
This has redefined the fundamentals and has the potential to change the institutions as well as the mechanisms of delivery of services forever. It is in this context that the issues of Smart Governance Electronic Governance needs to be analyzed. Quite obviously, therefore, the objective of achieving Electronic Governance (EG) goes far beyond mere computerization of standalone back office operations. It means to fundamentally change as to how the Government operates and this implies a new set of responsibilities for the executive, legislature and the citizenry. The effort should aim to bring about a social catharsis, which needs to be orchestrated in a comprehensive, concerted and planned fashion. Electronic Governance is the application of Information Technology to the processes of Government functioning to bring about
Simple Moral Accountable Responsive and Transparent Governance.
E-Governance demands standards in all areas. Some of the key areas are:
Identification of Govt. Departments with maximum citizen interface Government departments which have maximum interaction with the public must be identified for the use of IT. Listed below are a few such departments that can be considered:
Public Grievances: Electricity, Water, Telephone, Ration Card, Sanitation, Public Rural Services: Land Records, Below Poverty Line (BPL) /EWS Families
Social Services: Registration of Licenses and Certificates Ration Cards, Birth Certificates, Income Certificate.
E-Governance: I use the phrase "Representative E-Government" to describe the e-democracy activities of government institutions. Others call this "e-governance ". In our project we choose some of the public sectors where there is more need of the Govt. activities such as electricity bill payments, issue of cast & birth certificates, telephone bill payments and we are also doing online chatting so the user can interact directly to the Govt. and can provide his /her suggestions for better governance. By using our project a person can pay his/her utility bills very easily, without the need of going to the particular offices and waiting for a long time.
CHAPTER 2
SYSTEM ANALYSIS
System analysis is a logical process. The objective of the analysis phase is not actually solving a problem, but to determine exactly what must be done to solve the problem. During the analysis the system analyst works with the user to develop a model of the system using such tools as use case diagrams and analog either sequence diagrams. The first step in developing anything is to state the requirements. This applies just as much to leading edge research as to simple programs and to personal programs, as well as to large team efforts. Being vague about your objective only postpones decisions to a later stage where changes are much more costly. The problem statement should state what is to be done and not how it is to be done. The requestor should avoid describing system internals, as this restricts implementation flexibility.
2.1. Existing system:
The present system of doing work in government agencies which are the are used largely have either manual way of working or computerized to local networks. This method of working introduces great delays into the system as processes of notifications and billing take large amount of valuable time for both users and work force. The complexity of doing these manually is too large and inefficient; also people have to be locally available for doing their work. Also with the increasing population the users are too many to maintain the system in a efficient and effective manner. Some of the government departments are telecom, electricity, bookings and various others have a tiring manual procedures and large work force needed for doing all these. Disadvantages: The work is done manually so that it takes much time for transaction. We cant assess the calculations accurately. Amount of time is more needed when the more customers come to counter. It counts time factor. As there are thousands of customer records; Searching process is a difficult task
2.2. PROPOSED SYSTEM
The use of Information Technology for Government services facilitates an efficient, speedy and transparent process for disseminating Information to the public and other agencies and performing government administrations activities. The emphasis has been providing a better service to citizens and in improving internal productivity. This has redefined the fundamentals and has the potential to change the institutions as well as the mechanisms of delivery of services forever. It is in context that the issues of Smart Governance - Electronic Governance needs to be analyzed. Advantages: A fast and more efficient service to all customers. As there are Searching process is an easy task. Saving in staff time in entering and manipulating data. Easy input, deletion and manipulation of lot of customer details. Capable of printing both full and selected information. Simple correction of input errors and we can assess the calculation accurately thousands of customer records;
2.3. FEASIBILITY STUDY
All projects are feasible given unlimited resources and infinite time! Unfortunately, the development of computer-based system or product is more Likely plagued by a scarcity of resources and difficult delivery dates, it is both Necessary and prudent to evaluate the feasibility of a project at the earliest Possible time. Months or years of effort, thousands or millions of dollars, and Untold professional embarrassment can be averted if an ill-conceived system Is recognized early in the definition phase. The feasibility of proposed Online Leave Management System of RSR Engineering college of computer sciences could be evaluated as follows. There are three types of feasibility which are equally important. They are
o Economical feasibility o Technical feasibility o Operational feasibility
2.3.1. Economic Feasibility
Economic analysis is the most frequently used method for equating the effectiveness of a candidate system. More commonly known as cost / benefit analysis. The procedure is to determine the benefits and savings that are accepted from a candidate system and compare them with cost . The bottom line set up cost elements for introducing intranet services newly into an organization include Cost of set up, including hardware and software Cost of inventing information for use on your intranet Cost of creating new information Cost of designing and programming for intranet applications Cost of training
2.3.2. Technical feasibility
Technical feasibility centers on the existing system (hardware, s/w etc) and to what extent it can support the proposed addition. If the current computer is operating at 80% of capacity, then running another application could overload the system or require additional h\w. This involves financial considerations to accommodate technical enhancements. If the budget is a serious constraint, then the project is judged not feasible.The proposed system is planned to run on windows platform starting from 98-second version with Internet feasibility.
2.3.3Operational Feasibility
It refers to the feasibility of the product to be operational. Some products may work very well at design and implementation but may fail in the real time environment. It includes the study of additional human resource required and their technical expertise.
CHAPTER 3
MODULE DESCRIPTION
The Electronic Governance Services project has been divided into two modules. They are:
USER ADMINISTRATOR
Module-One: User
User sends a request to agent then the agent will send response to user. This module deals with the management of the user information such as the personal details, applications, birth certificates, income certificates, telephone bills, electricity bill, login id, password, etc., He fill his details if they are correct then the user gets registered and he can buy the products there. If the information he gave is not correct then he will be not registered. In the login authentication form name, address, contact number, email id all other things have to be entered. After filling these details the user entered into online by getting registered
Module-Two: Administrator
This module deals with the management of the user information such as the payment criteria etc. Other responsibilities might include planning for future expansion and creating data base and table spaces, adding users and maintain security. The administrator is the monitoring authority of the system.
CHAPTER 4
SYSTEM REQUIREMENTS
System Requirements
The software requirement analysis is produced at the culmination of the function and performance allocated to software as part of system engineered refined by establishing a complete information description, a detailed constraint, appropriate validation criteria, and other data related to requirements.
4.1. Software Requirements:
The following are the software specifications used for the development of this project. Operating system Web Server Server side scripting Client side scripting Back-end Database : : : : : Windows XP [NT based OS] Java Web Server Java server pages Java Script MS-ACCESS
4.2. Hardware Requirements:
The following are the hardware specifications used for development of the project Processor RAM Hard disk : : : Pentium IV 512 MB 80 GB
CHAPTER 5
LITERATURE SURVEY
A programming tool or software tool is a program or application that software developers use to create, debug, maintain, or otherwise support other programs and applications. The term usually refers to relatively simple programs that can be combined together to accomplish a task. The Chapter describes about the software tool that is used in our project.
5.1. JAVA TECHNOLOGY
Initially the language was called as oak but it was renamed as Java in 1995. The primary motivation of this language was the need for a platform-independent (i.e., architecture neutral) language that could be used to create software to be embedded in various consumer electronic devices. Java is a programmers language. Java is cohesive and consistent. Except for those constraints imposed by the Internet environment, Java gives the programmer, full control. Finally, Java is to Internet programming where C was to system programming.
Importance of java to internet? Java has had a profound effect on the Internet. This is because; Java expands the Universe of objects that can move about freely in Cyberspace. In a network, two categories of objects are transmitted between the Server and the Personal computer. They are: Passive information and Dynamic active programs. The Dynamic, Self-executing programs cause serious problems in the areas of Security and probability.
5.2. FEATURES OF JAVA
SECURITY: Every time you that you download a normal program, you are risking a viral infection. Prior to Java, most users did not download executable programs frequently, and those who did scan them for viruses prior to execution. Most users still worried about the possibility of infecting their systems with a virus. In addition, another type of malicious program exists that must be guarded against. This type of program can gather private information, such as credit card numbers, bank account balances, and passwords. Java answers both these concerns by providing a firewall between a network application and your computer. PORTABILITY: For programs to be dynamically downloaded to all the various types of platforms connected to the Internet, some means of generating portable executable code is needed .As you will see, the same mechanism that helps ensure security also helps create portability. Indeed, Javas solution to these two problems is both elegant and efficient. JAVA ARCHITECTUER: Java architecture provides a portable, robust, high performing environment for development. Java provides portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted on each platform by the run-time environment. Java is a dynamic system, able to load code when needed from a machine in the same room or across the planet OBJECT-ORIENTED: Java was not designed to be source-code compatible with any other language. This allowed the Java team the freedom to design with a blank slate. One outcome of this was a clean usable, pragmatic approach to objects. The object model in Java is simple and easy to extend, while simple types, such as integers, are kept as high-performance non-objects.
ROBUST The multi-platform environment of the Web places extraordinary demands on a program, because the program must execute reliably in a variety of systems. The ability to create robust programs was given a high priority in the design of Java. Java is strictly typed language; it checks your code at compile time and run time. Java virtually eliminates the problems of memory management and de-allocation, which is completely automatic.
5.3. AN OVERVIEW OF JSP Introduction to JSP:
Java server pages (JSP) is a technology used to create dynamic content on the web. With the spread of the Internet and increasing number of users registering with web sites, the static pages developed using HTML have become obsolete. A web site displays a welcome message along with the name to the reregistered user when the user logs on. Imagine that a static HTML page is developed for the each user. In this scenarios, when a user logs on, the server looks for the HTML pave of the user and sends the page back to the client. You can use JSP to create dynamic Web pages. Essentially, a JSP page is an HTML document with Embedded java code .A JSP file must be saved with the .jsp extension .A web application consists of both presentation and Business logic .Presentation represents the elements used to design the structure of a Web page in terms of page layout, color, and text. Business logic involves application of financial and business calculations. JSP technology segregates presentation from the business logic .For example; a web designer can design html pages.
5.4. LIFE CYCLE OF JSP:
When a client browser sends a request to the server, the server recognizes the request for JSP files by the file extension. The server compiles and converts JSP page into a servlet class. The server calls the process calls page compile to convert the JSP page into a servlet. The process creates the servlet class and builds a service () method by extracting contents of the JSP file. All the HTML tags in the JSP page are wrapped in the print method or the output methods. The elements of the JSP file and HTML java code are appear in the servlet in the same order as they are in the JSP file. The servlet is then compiled and run. The servlet creates an HTTP response, which is send to the client. The subsequent request will not go through the translation phase. Instead the subsequent requests to the server will call the compiled .class file. Therefore, the overhead of the page compilation usually happens at the first call to the server.
10
The request and response cycle of JSP You are familiar with the request and response cycle of the interaction between a server and clients. The steps involved in the request and response cycle are listed here. 1. The client sends an HTTP request for a JSP page to the server. The request can be sent by using either a GET method or a POST method. 2. The browser identifies the JSP file and compiles and loads the corresponding servlet class if the servlet class is not already present in the JVM. The server calls the service () method. The default service () method often passes the request and response to the doGet () method or doPost () method. The servlet processes the input from the request and prepares an HTML page as a response. 3. The response is sent back to the client browser .JSP can be used in different application mode.
The JSP Application Models
The JSP application model defines how JSPs can interact with each other. The JSP1.1 specification defines many models that describe how JSPs can interact. Some of these applications are listed here: o o o o o
The simple model The n-tier model The loosely coupled Model The including Request Model The Forwarding Requests Model
5.5. INTRODUCTION TO JDBC
5.5.1. WHAT IS JDBC AND WHY JDBC? JDBC is a front end tool that enables databases access from programs written in java language and it uses the ODBC for the connectivity, JDBC is essentially a low level application-programming interface. It is called a low-level API since any data manipulations, storage and retrievals have to be done by the program itself. The next question that needs to be answered is why we need JDBC, once we have ODBC on hand. ODBC on hand. We can use the same ODBC as proven technology. Problem for doing this is ODBC gives C language API, which uses pointers extensively.
11
5.5.2. JDBC DRIVER TYPES: There are four types of JDBC drivers each having its own functionality. They are classified based on how they access data from the databases. NATIVE JDBC DRIVER: A JDBC driver, which is partially written in java and most of it, is
implemented using native methods to access the databases. This is useful in case of a java application that can run only on some specific platforms. ALL-JAVA JDBC NET DRIVERS: A JDBC net driver, which uses a common network protocol to connect an inner intermediate server, which in turn employs native calls to connect to the databases. This approach is suited for swings where the request must go to through the intermediate server. JDBC ODBC NET DRIVERS: A bridge driver provider with JDBC can connect to any type of database that is ODBC complaint. This approach is recommended since using ODBC Drivers. Which are industry standard now, would make an application truly portable across databases. NATIVE PROTOCOL ALL JAVA DRIVERS: This type of JDBC driver is written completely in java, and can access the database by making use of native protocols of the databases. This method of data access is suitable in case of intranets, where everything can run as an application, instead of a swing. 5.5.3. JDBC ARCHITECTURE: Data Base Management: Database provides Storing and managing the data. It reduces the time of accessing. DBMS (Data Base Management System) used to retrieve data in the form of reports. MS-ACCESS stores data in the .mdb file format where as Ms-SQL stores data in the .dot file format. Java is one of the commonly used webbased GUI programming languages. Sun micro Systems has included JDBC-API as a part of JDK to enable java applications to communicate with a database. JDBC API: Java program can't directly communicate with an ODBC Driver. The ODBC API is written in the 'C' programming language .It uses pointers and other constructs that are not supported in java. JDBC provides a set of API's that can be used by java programs to connect to and manage the database only jdbc-odbc bridge+odbc driver. This type of jdbc driver provides DBMS or RDBMS can only understand SQL statements and not java language statements. There are four types of JDBC Drivers
12
1. JDBC-ODBC bridge + ODBC Driver 2. Native API, partly java driver 3. JDBC-Net, pure java driver 4. Native protocol, pure java driver. We are using database access using the odbc driver.
JAVA APPLICATIONS JDBC API
JDBC DRIVER MANAGER
JDBC DRIVER
JDBC/ ODBC DRIVER ODBC
JDBC NET DRIVER MIDDLE WARE
DB DB DB
Fig: 5.5.3.1. JDBC Architecture
JDBC DRIVER MANAGER: Function of the driver manager is to find out available drivers in the system and connect the application to the appropriate database whenever a connection is requested. However to help the driver manager identify different types of drivers, each should be registered with the driver manager. JDBC DRIVER: Function of the JDBC driver is to accept the SQL calls from the application and convert them into native calls to the database. However, in this process it may take help from other drivers or even servers, which depend on the type of JDBC driver we are using. Also it is possible that the total functionality of the database server could be built into server itself. Sun soft provider a special JDBC Driver called JDBCODBC Bridge driver, which can be used to connect any existing database that is ODBC complaint
13
JDBC-ODBC BRIDGE: If possible, use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This completely eliminates the client configuration required by ODBC. It also eliminates the potential that the Java VM could be corrupted by an error in the native code brought in by the Bridge (that is, the Bridge native library, the ODBC driver manager library, the ODBC driver library, and the database client library.
What Is the JDBC- ODBC Bridge? The JDBC-ODBC Bridge is a JDBC driver, which implements JDBC operations by translating them into ODBC operations. To ODBC it appears as a normal application program. The Bridge implements JDBC for any database for which an ODBC driver is available. The Bridge is implemented as the
JDBC connectivity: Sun.jdbc.odbc Java package and contains a native library used to access ODBC. The Bridge is a joint development of Innersole and Java Soft. The JDBC provides database-independent connectivity between the J2EE platform and a wide range of tabular data sources. JDBC technology allows an Application Component Provider to: Perform connection and authentication to a database server Manager transactions Move SQL statements to a database engine for preprocessing and execution Execute stored procedures Inspect and modify the results from Select statement
Application: Application is a java program that needs the information to be modified in some database or wants to retrieve information.
14
CHAPTER 6
SYSTEM DESIGN
Introduction:
Design is the first step in the development phase for any engineering product (or) system. It may be defined as the process of applying various techniques and principles for the purpose of defining a device, a process, or a system insufficient detail to permit its physical realization. Software design is an iterative process through which requirements are translated into a Blue print for constructing the software. The design is represented at a high level of abstraction. A level that can be directly translated to specific data, functional and behavioral requirements. Preliminary design is concerned with the transformation of architecture. Detail design focuses on requirements into a data and software
refinements to the architectural representation. That leads to
detailed Data structure and algorithmic representation for software. In the design step, the element of the analysis model gets converted into a data design, and architectural design, an interface design and a procedural design. The data design transforms the information domain model created during analysis into the data structures that will be required to implement software. The architectural design defines the relationship among major structural elements of the program. The interface design describes how the software communicates within itself, to systems that interoperate with it, and with humans who use it. An interface implies a flow of information (e.g., data and /pr control). Therefore, the data and control flow diagrams provide the information required for interface design.
15
6.1. Design Process
Design process is in between the analysis and implementation process. The following design diagrams (data flow diagrams and E-R diagrams) make it easy to understand and implement. The design process of software system has two levels.
1. Systems Design or Top Level Design. 2. Detailed Design or Logical Design.
1. System Design or Top Level Design: In the system design the focus is on deciding which modules are needed for the system, the specification of these modules and how these modules should be interconnected. 2. Design or Detailed Logical Design: In detailed design the interconnection of the modules or how the specifications of the modules can be satisfied is decided . Some properties for a software system design are
Verifiability. Completeness. Consistency. Trace ability. Simplicity/understandability.
Design principles: Basic design principles that enable the software engineer to navigate the design process are. The design process should not suffer from Tunnel vision. The design should be traceable to the analysis model. The design should not reinvent the wheel. The design should minimize the intellectual distance between the Software and the problem, as it exists in the real would. The design should exhibit uniformity and integrity. The design should be structured to accommodate changes.
16
6.1.1Uml diagrams:
Use case Diagram: Use case is a description of a set of sequence of actions that a system performs that yields an observable result of value to a particular thing in a model. Graphically, use case is rendered as an ellipse with dashed lines, usually including only its name as shows below
enter hsc no login
User
receive bill Admin generate e-bill pay bill
request birth certificate
enter credit card details
Fig: 6.1.1.1.Use case Diagrams
Use of use case diagram: It is used for testing executable systems and also for understanding the executable systems. It is widely used in modeling the context of a system These diagrams are also recognized in modeling requirement of a system.
17
Sequence Diagrams: A sequence diagram is an interaction diagram that emphasizes the time ordering of the messages. Graphically, a sequence diagram is a table that shows objects arranged along the X-axis and messages, ordered in increasing time, along the Y-axis.
Administrator Sequence Diagram
:Admin
:Login
:Electricity bill
:Credit card
1.enter login details 2.check
3.success
4.generate electricity bill
5.update the user credit card details
Figure: 6.1.1.2.Sequence diagram for Administrator
18
User sequence diagram:
:User
:HSC
:Electricity bill
:Birth certificate
1.enter hsc number 2.check
3.pay the bill
4.fill the details for birth certificate
Figure: 6.1.1.3.Sequence diagram for birth certificate
19
6.2 .Database design
The goal of Database Design is to generate a set of relation schemes that allow us to store information without unnecessary redundancy and allows us to retrieve information easily. We can achieve optimization, ease of use in maintenance by designing the database using relational model between or among the tables.
To reduce redundancy. To arrive at loss-less join. To reduce the time as compared to the present system. To reduce the number of errors
6.2.1.Data Flow Diagrams: This Diagram server two purpose. Provides an indication of how date is transformed as it moves through the system. Disputes the functions and sub functions that transforms the dataflow. The Data flow diagram provides additional information that is used during the analysis of the information domain, and server as a basis for the modeling of functions. The description of each function presented in the DFD is contained is a process specifications called as PSPE
20
Notations: NAME
DATAFLOW
DESCRIPTION
Data move in a specific direction from an origin to a destination
SYMBOLS
PROCESS
People, procedures, or devices that Use or produce (Transform) Data. The physical Component is not Identified. External sources or destination of data, which may be People, programs, organizations or other entities. Here data are stored or referenced by a process in the System.
SOURCE
DATA STORE
Table: 6.2.1.a. Data Flow notations
Context-level DFD (Level 0) A level 0 DFD also called a fundamental system model or a context model... Represent the entire software element as a single bubble with input and output data indicated by incoming and outgoing arrows respectively. Additional process and information flow paths are represented as level 0 DFD is partitioned to reveal more details.
USER
E-GOV
DATA BASE
Figure: 6.2.1.1. Dataflow diagram for Context level 0
21
LEVEL1DFD
Registration
User store
USER
Login
Change User
Birth Certificate
Fill in Accounting Period Data
Birth
Print
e-bill
Electricity Bill
Pay Bill
Admin
Figure: 6.2.1.2Dataflow diagram for level1
22
6.2.2 Data base tables A data dictionary is a catalog a repository of the elements in the system. As the name suggests, these elements center on data and the way they are structured to meet user requirements and organization needs. A data dictionary is a collection of data about data. The basic idea is to provide information on the definition, structure and the user of the element an organization uses. In this project we create two tables using MS-ACCESS queries
Table Name: credit
NAME HSC CRDNO AMOUNT BANK
TYPE NUMBER NUMBER NUMBER TEXT
DESCRIPTION CONSUMER NUMBER CREDIT CARD NO BALANCE AMOUNT NAME OF THE BANK
Table 6.2.2.1. User credit table
TABLE NAME: e-bill
NAME HSCNO NAME ADDRESS PRV PRS AMOUNT LASTDATE
TYPE NUMBER TEXT TEXT NUMBER NUMBER NUMBER DATE
DESCRIPTION PHONE NUMBER NAME OF THE USER PRESENT ADDRESS NO OF LOCAL CALLS NO OF STD CALLS AMOUNT TO PAY LAST DATE TO PAY
Table 6.2.2.2User e-bill table
23
TABLE NAME: birth
NAME APLN SEX DOB FNAME MNAME COMTY FCOMTY MCOMTY TEXT TEXT
TYPE
DESCRIPTION NAME OF APLN SEX OF APLN DATE OF BIRTH FATHERS NAME MOTHERS NAME COMMTY OF THE USER FATHERS COMMTY MOTHERS COMMTY
DATE&TIME TEXT TEXT TEXT TEXT TEXT
Table 6.2.2.3.User birth table
TABLE NAME: new user
NAME NAME ADDRESS PHNO DESG TEXT TEXT
TYPE
DESCRIPTION NAME OF THE USER ADRS TO WHICH CONN IS REQ PHONE NUMBER FOR VERF-N DESIGNATION OF USER
NUMBER TEXT
Table: 6.2.2.4.New user Table
24
TABLE NAME: vid NAME VID NAME ADDRESS TEXT TEXT TEXT TYPE VOTER ID NAME OF THE USER ADDRESS OF THE USER DESCRIPTION
Table 6.2.2.5.User vid table
TABLE NAME: admin login
NAME
TYPE
DESCRIPTION
USERID PASSWORD
TEXT TEXT
USER ID USER PASSWORD
Table:6.2.2.7.User admin login table
25
CHAPTER 7
SYSTEM IMPLEMENTATION
Introduction:
implementation is the process of assuring that the information system is operational and then allowing users take over it s operation for use and evaluation obtaining and installing the system hardware. The implementation stage involves careful planning, investigation of existing system and its constrains on implementation, designing of methods to achieve change over and evaluation of changeover methods..The most visible component of implementation process is the system conversion. The four basic conversion strategies include
Direct Conversion Parallel Conversion Pilot conversion Phased Conversion
Direct Conversion : In direct conversion, the organization stops using the old system and starts using the new one at the same time. Parallel Conversion; A parallel conversion involves running both old system and hews system and comparing their results. The new system is accepted only after the results have matched for an acceptable period. Pilot Conversion : Pilot conversion means introducing the new system to a small part of the organization, expanding its use once it is known to operate property there. Eventually, it will be in use by the entire organization. Phased Conversion : Phased conversion means introducing a system in stages, one component or module at a time, waiting until that one is operating properly before introducing the next.
26
CHAPTER 8
SCREEN SHOTS
Configuring the server
Here we are configuring the Apache Tomcat server
Whenever the server starts we have to deploy the server in click on deployment icon and select project under Add, in that select server(tomcat6) click
Figure:8.1. Deploying tomcat server
After completion redeploying it we have to open the web browser
27
In this select our project name then it will automatically displays the login page of our project.. Figure: 8.2.home screen of tomcat server
28
INTRODUCTION
Fig: 8.3.Introduction page
29
ADMIN LOGIN
Fig: 8.4.Admin Login page
30
ADMIN PAGE
Fig: 8.5.Admin home page
31
ADD HSC DETAILS
Fig: 8.6.Add HSC details
32
USER ADD SUCCESSFULLY
Fig: 8.7.User added database
33
CREDIT DETAILS
Fig: 8.8. User Credit Details
34
ADD CREDIT USER
Fig: 8.9.Added credit details in database
35
ELECTRCITY BILLING FORM
Fig: 8.10.Electricity bill form
36
BILL DETAILS
Fig:8.11. Check the bill details
37
PAY THE ELECTRICITY BILL
Fig: 8.12.Pay the electricity bill
38
Fig: 8.13.User paid the electricity bill
39
Fig: 8.13.1.Total Amount Details
40
SENDING MESSAGE
Fig: 8.14. Sending message
41
SUCCESSFULLY SEND A MAIL
Fig: 8.15.Successfully send a mail
42
USER REGISTRATION PAGE
Fig: 8.16.User Birth certificate registration form
43
USER APPLICATION FORM
Fig:8.17.User Application form
44
FILL THE APPLICATION DETAILS
Fig: 8.18.Fill the application details
45
USER DATA IS REGISTERED
Fig: 8.19.User data is registered
46
CHAPTER 9
TESTING
Introduction
System testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing fundamentals define the overriding objectives for software testing. Testing is one of the steps in the software engineering process that could be viewed (psychologically, at least) as destructive rather than constructive. This will create two problems.
Time delay between the cause and appearance of the problem. The effect of the system errors on files and records within the system.
The purpose of the system testing is to consider all the likely variations to which it will be suggested and push the system to its limits. The testing process focuses on logical intervals of the software ensuring that all the statements have been tested and on the function intervals (i.e.,) conducting tests to uncover errors and ensure that defined inputs will produce actual results that agree with the required results.
White-Box Testing (GLASS-BOX TESTING) White-box tests focus on the program control structures. Test cases are derived to ensure that all statement in the program has been executed at least once during testing and that all logical conditions have been exercised. Knowing the internal working of a product, tests can be conducted to ensure that all gears mesh, that is the internal operation performs according to specification and all internal components have been adequately exercised. White box testing is a test case design methods that uses the control Guarantee that all independent paths within a module have been exercised at least . Exercise all logical decision on their and false sides Execute all loops at their boundaries and within their operational bounds. Exercise internal data structures to ensure their validity.
structure of the procedural design to design to derive test cases.
47
Black-Box Testing: Black-Box testing focuses on the functional requirements of the software .it is not an alternative to whitebox techniques. Rather, it is a complementary approach that is likely to uncover a different class of errors than white-box methods. Black- box testing attempts to find the following types of Errors o o o o o Incorrect or missing functions. Interface errors. Errors in data structures or external database access. Performance errors and Initialization and termination errors.
Unit Testing Unit testing focuses verification effort on the smallest unit of software design. Using the procedural design description, important control paths are tested to uncover errors within the boundary of the module. The unit test is normally the constrained scope established for unit testing. The unit test is normally white box oriented, and the step can be conducted in parallel for multiple Modules.
Integration Testing Integration testing is a systematic technique for constructing the program structure while conducting tests to uncover errors associate with interfacing. The objective is to take unit tested modules and build a program structure that has been dictated by design. There is often a tendency to attempt non-incremental integration to construct the program using big bang approach. Incremental integration is the anti thesis of big bang approach.
Verification and Validation: Validation is a process of finding out if the product being built is right? I.e. whatever the software product is being developed; it should do what the user expects it to do. The software product should functionally do what it is supposed to, it should satisfy all the functional requirements set by the user. Validation is done during or at the end of the development process in order to determine whether the product satisfies specified requirements.
48
CHAPTER 10
CONCLUSION
This project is able to successfully incorporate all the requirements as specified by the public. Our state govt... Proposed this system. There is no complexity to the public & private sectors. It maintains efficiently and effectively all the governmental activities. Appropriate changes have been taken during the database design to maintain database integrity and to avoid redundancy data. Validations are done instantaneously to avoid inconsistency of the data. The user provided a friendly interface by hiding all technical complexities. With the help of this application compared to the old existing system which is done manually the time is reduced very much and is very useful and applicable for the users. Our application
consists about Tender Extractions ,All Certificates related to govt like Birth certificates, income certificates and using this we can pay the electricity bills, telephone bills etc.
49
CHAPTER 11
BIBLIOGRAPHY
1. Software Engineering - Practitioners Approach by Roger S. Pressman, McGraw Hill International Edition. 2. An Introduction to Database System by C. J. Date. 3. Java Complete References by Patrik Norton. 4. CORE Servlets & JSP from sun micro systems by MARTHALL 5. UML in 24 Hours - SAMS outline by JOSEPH SCHMULLER. 6. Thinking in Java by Bruce Eckel. 7. Java2 Complete Reference by Herbert Scheldt.
WEBSITES REFERRED The following links were searched and exploited extensively for the project development and implementation. 1. 2. 3. 4. 5. 6. www.microsoft.com/iis www.oracle.com www.Jsp.com www.javascript.com www.sun.com www.Jsp-help.com
7. www.egov.mit.gov.in 8. www.undp.org.in 9. www.digitalgovernance.org
50