Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
1.1 SCOPE OF PROJECT
The project aims at providing corporate information and hospital statistics can be viewed in a web on the Internet. This Information is to be integrated into the existing web page of the company but the access to it would be restricted to the Administrator and Directors or anybody who has been authorized or register users. According patients needs the hospital management introduce Health Card Schemes like one year health card, two year health card and lifelong Health Cards? First Patient chooses the health card according to the patient requirement, depending on Health card patient get the discount on medical bill. Every person who is willing to take the health cards, depending on card value, first they pay Card Value to Organization. This information is shared to all the branches of the Hospital group so that they can maintain global information of the group. The system developed and installed will be good benefit to the organization. The system will be developed and operated in the existing hardware and software infrastructure. So there is no need of additional hardware and software for the system This system can be implemented in the organization because there is adequate support from management and users. Being developed in Java so that the necessary operations are carried out automatically. If the subscriber of the Health Card is suffering with ill health they will be given initial treatment without any consultancy charges.
2. SYSTEM ANALYSIS
2.1 FEASIBILITY STUDY
A feasibility study is a high-level capsule version of the entire System analysis and Design Process. The study begins by classifying the problem definition. Feasibility is to determine if its worth doing. Once an acceptance problem definition has been generated, the analyst develops a logical model of the system. A search for alternatives is analyzed carefully. There are 3 parts in feasibility study. 1. Operational 2. Technical 3. Economical
This system can be implemented in the organization because there is adequate support from management and users. Being developed in Java so that the necessary operations are carried out automatically.
The project is developed on Pentium III with 128 MB RAM. The environment required in the development of system is any windows platform. The observer pattern along with factory pattern will update the results eventually. The language used in the development is JAVA J2SDK1.4.0, Servlets, JDBC, Tomcat Server and database as Oracle 8i.
development of DFDS is done in several levels. Each process in lower level diagrams can be broken down into a more detailed DFD in the next level. The loplevel diagram is often called context diagram. It consists a single process bit, which plays vital role in studying the current system. The process in the context level diagram is exploded into other process at the first level DFD. DFD Symbols In the DFD, there are four symbols 1. A square defines a source(originator) or destination of system data 2. An arrow identifies data flow. It is the pipeline through which the information flows 3. A circle or a bubble represents a process that transforms incoming data flow into outgoing data flows. 4. An open rectangle is a data store, data at rest or a temporary repository of data
Admin Dfd
3. SYSTEM DESIGN
3.1 UML DIAGRAMS(Unified Modeling Language)
UML is a notation that resulted from the Unification of Object Modeling Technique and Object Oriented Software Technology .UML has been designed for broad range of application. Hence, it provides constructs for a broad range of systems and activities. USE CASE DIAGRAMS To model a system the most important aspect is to capture the dynamic behaviour. To clarify a bit in details, dynamic behaviour means the behaviour of the system when it is running, operating. Purpose The purpose of use case diagram is to capture the dynamic aspect of a system. But this definition is too generic to describe the purpose. Because other four diagrams (activity, sequence, collaboration and Statechart) are also having the same purpose. So we will look into some specific purpose which will distinguish it from other four diagrams. Use case diagrams are used to gather the requirements of a system including internal and external influences. These requirements are mostly design requirements. So when a system is analyzed to gather its functionalities use cases are prepared and actors are identified. Now when the initial task is complete use case diagrams are modelled to present the outside view. So in brief, the purposes of use case diagrams can be as follows:
Used to gather requirements of a system. Used to get an outside view of a system. Identify external and internal factors influencing the system. 10
11
Admin
Reports
12
Login
Reports
Card Created
13
login
Enquiry
Registration
Reports
Logout
Logout Success
14
15
16
17
18
Field Name
username password
Data Type
Varchar2(20) Varchar2(20)
Constraint
not null not null
Table:3.3.1
Data Type
Constraint
primary key
Data Type
number(5) varchar2(10) number varchar2(10) Number 20
Constraint
primary key
amount
data type
varchar2(20) number varchar2(10) varchar2(20) varchar2(20) varchar2(20) varchar2(20) varchar2(20) number(20) number(5) varchar2(20) date Table 3.3.4
constraint
Data Type
number(5) varchar2(20) number(4) varchar2(20) number(4) number(5) number(5) varchar2(20) varchar2(20) varchar2(10) number(10) varchar2(20) varchar2(20) varchar2(20) number(10) varchar2(20) 21
Constraint
foreign key
primary key
jdate district
Data Type
number varchar2(20) varchar2(7) number varchar2(20) Table:3.3.6
Constraint
foeign key
4. IMPLEMENTATION
4.1 INTRODUCTION
Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and its constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods.
22
J2EE multitier applications are generally considered to be three-tiered applications because they are distributed over three different locations: client machines, the J2EE server machine, and the database or legacy machines at the back end.
J2EE Components
A J2EE component is a self-contained functional software unit that is assembled into a J2EE application with its related classes and files. The J2EE specification defines the following J2EE components:
Application clients and applets are components that run on the client. Java Servlet and Java Server Pages components that run on the server. Enterprise JavaBeans (EJB ) components (enterprise beans) are business (JSP ) technology components are Web
J2EE components are written in the Java programming language and are compiled in the same way as any program in the language.
J2ee Clients
A J2EE client can be a Web client or an application client.
as in the case of a client running in a browser, by going through JSP pages or Servlets running in the Web tiers
Web Components
J2EE Web components can be either Servlets or JSP pages. Servlets are Java programming language classes that dynamically process requests and construct responses. JSP pages are text-based documents that execute as Servlets but allow a more natural approach to creating static content. Like the client tier and as shown in Figure 7-c, the Web tier might include a JavaBeans component to manage the user input and send that input to enterprise beans running in the business tier for processing.
24
Business Components
Business code, which is logic that solves or meets the needs of a particular business domain such as banking, retail, or finance, is handled by enterprise beans running in the business tier. Figure 7-d shows how an enterprise bean receives data from client programs, processes it (if necessary), and sends it to the enterprise information system tier for storage. An enterprise bean also retrieves data from storage, processes it (if necessary), and sends it back to the client program.
Fig 4.1.4 Business and EIS Tiers JDBC API 2.0 The JDBC API lets you invoke SQL commands from Java programming language methods. You use the JDBC API in an enterprise bean when you override the default container-managed persistence or have a session bean access the database. The JDBC API has two parts: an application-level interface used by the application components to access a database, and a service provider interface to attach a JDBC driver to the J2EE platform.
Introduction To Jsp
25
The goal of the java server page specification is to simplify the creation and management of dynamic web page by separating content and presentation JSP as basically files that combine html and new scripting tags. the JSP there look somewhat like HTML but they get translated into java Servlet the first time are invoked by a client. The resulting Servlet is a combination of the html from the JSP file and embedded dynamic content specified by the new tag. The first time JSP is loaded by the JSP container. The Servlet code necessary to fulfill the JSP tags is automatically generated compiled and loaded into the Servlet container. From then on as long as the JSP source for the page is not modified. This compiled Servlet processes browser request for the JSP page. If you modify the JSP source code, it is automatically recompiled and relocated the next time that page is request
Some general rule of JSP page: JSP tags are case sensitive. Directive and scripting element have a syntax which is not based on xml alternative page. Tags Based On Html Syntax Are Also Available.
26
HTTP Request
As an application level protocol, HTTP defines types of request that clients can send to server HTTP specifies three type of request method GET,POST and HEAD has addition request meet most of the common application development needs.
used when you need to send large amount of complex information to the server. . For example you can use POST REQUEST TO UPLOAD TEXT OR BINARY FILES.
Http Response
In responses to a HTTP request, the server responds with the status of the responses, all these are part of the response header.
Features Of HTTP
HTTP is very simple and lightweight protocol. In the protocol the client always initiate request the server can never make a callback connection to the client. The HTTP requires the client to establish connection prior to each request and the server to close the connection after sending the response this guarantees that the client cannot hold on to a connection even after receiving the request.
JSP provider certain implicit object based on the Servlet API. These objects are accessed using standard variable and are automatically available for use in your JSP without writing any extra code. The impact objects available in a JSP page are: Request Response page context session application out config 28
page
REQUEST OBJECT
The request object represents the request that the server invocation. It is the http servlet request that provides access to the incoming HTTP header request type and request parameter. The object implements specific subclass of javax.Servlet.ServletRequest.
THE RESPONSE OBJECT The response object is the http servlet response instance that response instance that the server to the request. It is legal to set HTTP status code and header in the JSP page onceoutput has been sent to the client, javax.servlet.ServletResponse. THE SESSION OBJECT The object represent the session creates for the request client. THE APPLICATION OBJECT The application object represents the servlet context obtained from the servlet configuration object. It is of type javax.Servlet context and has application scope. THE OUT OBJECT The out object is the write into the output stream to the client. To make the represent useful this is a buffered version of the java.io.printwriter class of type the buffer size can be adjusted via the buffer attribute of the page directive. THE CONFIG OBJECT The config object is the servlet config for this JSP and has page scope. It is of type javax.Servlet.servlet config.
29
Tomcat Server
Tomcat is a web server which can be used to execute the J2EE components. Tomcat provides many new and changed features, including the following: Dynamic reloading and compilation - You can configure Tomcat to dynamically recompile and reload servlet, servlet helper classes, and Java Server Page (JSP) helper classes when a servlet or JSP is called. Dynamic creation of database tables for entity beans - When you deploy an entity bean and its required database tables do not yet exist, Tomcat generates tables for you if you configured the appropriate settings in the Tomcat deployment descriptor. JRun Management Console (JMC) - The redesigned, JMX-enabled JMC provides an easy-to-use, intuitive graphical user interface for managing your local and remote JRun servers.
30
Architecture of JDBC
JDBC Architecture contains three layers: JDBC Application JDBC Drivers JDBC Drivers Fig 4.1.5 Architecture of JDBC When a request received by the application, the JDBC driver passes the request to the ODBC driver, the ODBC driver communicates with the database and sends the request and gets the results. The results will be passed to the JDBC driver and in turn to the application. So, the JDBC driver has no knowledge about the actual database, it knows how to pass the application request o the ODBC and get the results from the ODBC. Within the file, divide your data into separate storage containers called tables; view, add, and update table data by using online forms; find and retrieve just the data you want by using queries; and analyze or print data in a specific layout by using reports. To store your data, create one table for each type of information that you track. To bring the data from multiple tables together in a query, form, report, or data access page, define relationships between the tables. To find and retrieve just the data that meets conditions that you specify. A query can also update or delete multiple records at the same time, and perform predefined or custom calculations on your data. To easily view, enter, and change data directly in a table, create a form. When you open a form, Microsoft Access retrieves the data from one or more tables, and displays it on the screen with the layout you choose in the Form Wizard, or a layout that you create from scratch
31
OFFERED SYSTEM The existing system is the harder one to bid the product. The blue-collar (manual) system is prone to blunder. It is time consuming. It is very intricate for a person to turn out the testimony. There are odds for changing the scheme testimony and do malpractice. This system engages a lot of blue-collar entries with the appliance to achieve the preferred task. This existing system is intricate to be aware of. And other shortcomings in blue-collar system are as follows: Increased disbursement for papers shuffle and storage. Less control of Amounts. Personnel who are sited in poles apart of the world cannot transact resourcefully. ANTICIPATED SYSTEM The anticipated system is premeditated to eradicate the negative aspect of the offered system. The primary aim of the new system is to accelerate business dealings. The testimony is primed for the schemes and put into practice under the regulation of the concerned bureaucrat. This anticipated System is used to trim down the difficulties. Anticipated system is very constructive and is trouble-free. Dozens of companies are in the race to convince auction and bidding that a pot of auction product awaits those who conduct their business on the Internet. In this fast battle of commerce and moneymaking, no country, no corporation and no creature would like to descend back. One and all want to lead the group. Now, no more individual aspires at the local market is also just a click of button away. Hence, everyone is trying to make the best use of Internet; our anticipated system also meets up the desires of the patron who can bid all the way through online.
32
</table> <p> </p> <p></p> </body> </html> <%@ page import="java.sql.*" errorPage="" %> <html> <head> <title>Untitled Document</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> </head> <body bgcolor="#009966"> <form name="form1" method="post" action="./chairmansuccess.jsp"> <CENTER><marquee behavior="alternate"> <table width="601" border="0" cellpadding="0" cellspacing="0"> <tr> <td height="55" > <div align="center"><font color="#FFFF00" size="4" face="Monotype Corsiva">WELCOME TO SMART CARD ADMINISTRATOR</font></div></td> </tr> </table></marquee><p> </p></CENTER> <table width="274" border="0" align="center" cellpadding="2" cellspacing="4"><tr> <td width="101" height="10" bgcolor="white"><font color="#0000FF" face="Monotype Corsiva">User Name</font></td> <td width="159"><font color="#FF9900"><input name="username" type="text" id="username"></font></td> </tr> <tr> <td height="10" bgcolor="white"><font color="#0000FF" face="Monotype Corsiva">Pass Word</font></td> <td> <font color="#FF9900"><input name="password" type="password" id="password"></font></td> 34
</tr> <tr> <td><center> <font color="#00FF66"><input name="Submit" type="submit" id="Submit" value="Login"></font> </center></td> <td><center> <input type="reset" name="Submit2" value="Reset"> </center></td> </tr> </table> <p> </p> <p> </p> <p> </p> <p> </p> <p> </p> <p> </p> <p> </p> <p> </p> </form> </body> </html>
35
5. TESTING
Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. In fact, testing is the one step in the software engineering process that could be viewed as destructive rather than constructive. A strategy for software testing integrates software test case design methods into a well-planned series of steps that result in the successful construction of software. Testing is the set of activities that can be planned in advance and conducted systematically. The underlying motivation of program testing is to affirm software quality with methods that can economically and effectively apply to both strategic to both large and small-scale systems.
UNIT TESTING
Unit testing focuses verification effort on the smallest unit of software design, the module. The unit testing we have is white box oriented and some modules the steps are conducted in parallel.
36
Conditional Testing
In this part of the testing each of the conditions were tested to both true and false aspects. And all the resulting paths were tested. So that each path that may be generate on particular condition is traced to uncover any possible errors.
The definition-use chain method was used in this type of testing. These were particularly useful in nested statements.
Loop Testing
In this type of testing all the loops are tested to all the limits possible. The following exercise was adopted for all loops: All the loops were tested at their limits, just above them and just below them. All the loops were skipped at least once. For nested loops test the inner most loop first and then work outwards. For concatenated loops the values of dependent loops were set with the help of connected loop. Unstructured loops were resolved into nested loops or concatenated loops and tested as above. Each unit has been separately tested by the development team itself and all the input have been validated.
38
TESTCASES
Test Case ID Testcase name TestCase descrption Expecting Output Actual output Result
is Accepting user id
a It
will Pass
39
6.OUTPUT SCREENSHOTS
Home Screen
Admin Screen
41
42
43
44
45
Modification Of Table
Fig 6.7
Modification Of Table
46
Modification of card
47
Branchhead login
48
Enquiry form
49
New Registration
50
RelationTable
51
Modifyregistration
52
Registration
53
Relation Modify
54
Relation Modify
55
Check Number
56
Details
57
Cardwise Amount
58
Branchwise Details
59
60
BIBLIOGRAPHY
1. H.M.DIETEL.P.J.DIETEL, Java How to Program, PhL, Second Edition 2. Gray Cornett, Horstmann, CorelJava, Sunsoft Press, 1996. 3. Patrick Naughton & Herbert Schildt, Java : The Complete Reference, Tata McGraw-Hill, Macrch 1997. 4. Grady Booch, Object Oriented Analysis and Design with Applications, the Benjimin/Cummings, 1994.
61