Академический Документы
Профессиональный Документы
Культура Документы
Abstract
The term “virtual university” is used to describe an open-learning institution that uses the
Internet, to create an imaginary university environment, in which the students, faculty,
and staff can communicate and share information at any time, regardless of location. In
many respects, it is commonly associated with the field of advanced learning technology,
which deals with both the technologies and associated methodologies in learning using
networked and/or multimedia technologies. This VU project envisages the design and
development of multimedia course that is web-enabled that goes towards the curriculum
of a full-fledged degree program.It strives for structural changes in the university
infrastructure. Networks of scholars within a discipline carry out collaboration, division
of labour and specialization in both teaching and research. This virtual university
attempts to mirror all parts of a real university in a computer and internet-based
environment. Its components comprise different kinds of courses as well as
communication and administration activities.
1
2. Introduction
2.2 Advantages
2
3. Flexibility of study as to place and location. Time flexibility is an organic result of
combined/distance form of study and learning. Stu-dents can themselves devote study
activities time interval which is to their individualtime schedule. Time management may
lead to higher efficiency comparison with classical form of centrally made scheduling.
Application
Students located at remote areas will be able to access the tutorials and can
enhance their skills at their own time.
Objectives
To facilitate student community to enhance their skills.
Benefits
Without expensive infrastructure excellent teaching material prepared by trained
faculty members can be shared with the student community.
3
3. System Analysis
System analysis is a detailed study of various operations performed by a system and their
relationships within and outside the system. It deals with defining the boundaries of the
system and determining whether or not candidate systems should consider other related
systems. For analysis, data is collected from available fields, decision points and
transactions handled by the present system.
The education being provided currently in the university is more or like the traditional
guru-shishya form of education where the student and the faculty exist in a face-to-
face environment.To make the best possible use of time it is mandatory for the
student to be in the vicinity of the institution. Its tedious to group the top class
proffersors to deliver their lectures at a particular place. The gap that arouses from
absence of a lecture is not easy to be bridged.This system is not flexible for the
student to work at his own pace.
The proposed system intends to create a new structure that takes the advantage of the
Internet and other technologies to increase access to and improve the qual-ity of
higher education. . This system envisages the design and development of multimedia
course that is web-enabled that goes towards the curriculum of a full-fledged degree
program .VU courses are hand-crafted in meticulous detail by acknowledged experts
in the field.This is cost-effective as there are no buildings and no campus to go
because students study on the Internet. In most cases, only a personal computer and
an Internet connection are needed. Through this connection students access the virtual
university and then do the same as other students do: attend classes, access course
material , discuss cases, take tests,ask questions, etc. Likewise they communicate
with lecturers, tutors, administrative staff, etc., but it happens over the Internet. Since
these courses are web-enabled, the student can work in his own comfortable
environment and is not restricted to the classroom.Moreover he can work at a pace
4
with which he finds convenient. Additionally, students can use the lectures to review
an entire course before their examinations – a facility simply not available in the
conventional face-to-face environment. Virtual programs are best suited for people
who appreciate flexibility. "Study anywhere at any time".
o Only Authorized persons who are registered with the site are permitted to use this
Site .
o Though every thing is claimed to be done over the internet,subjective test for
certifying the degree is not done online, and even the documents claiming the
prequalification have to be sent to the administration office.
o To avail the added desktop sharing feature the sent software installation is to be
supported .
5
3.3 Module Description
3.3.1.1 Functionalities:
• Password Prompts:
User will be prompted with a success message or rejected message accordingly. This
may be required for security reasons to ensure protection of the account.
6
3.3.2 Module 2: Student Information and Services Module:
In this module the authenticated student can view the details regarding the courses and
the sessions,fee related to these courses offered. From this point acesss to various
services is course specific.The user is provided access to course syllabus,course
material(lecture handouts,videos) which can be downloaded.As a facility for the student
to evaluate his performance self-assessment quizzes are also provided.Apart from these
the user is also granted with a service to acess library.An important added service is the
desktop sharing,where the Instructor can share his/her desktop with students so that they
can see how the Instructor is working or viceversa.
3.3.2.1 Functionalities
• Download files:
An authenticated user can download the course lecture handouts and
videos related to it along with the library contents made available.
• Online Examination:
This feature is exclusively meant for the students. After going through
the lessons in the portal, he may wish to test his level of understanding and
evaluate his performance. This can be achieved by taking an online exam
provided to him.
• Interaction facility
The student can get his doubts clarified by posting the query to the
faculty through email.The other facility provided is desktop-sharing where the faculty
can virtually take over the desktop of the student to monitor his work.
7
3.3.3 Module 3:Administrator Module:
As the administrator is the whole and sole authority and the only handler of
the database directly,this module deals with the automation of the administrator
functionalities.The adiminstrator is responsible for the authentication of a user in the
VU,by cross checking the details provided during the registration and the posted
documents.He can insert or update courses,sessions and fee related to them,course
material contents,library information.Administrators functionality also includes the
preparation of quizz paper under the intimation from the faculty.
3.3.3.1 Functionalities
• Authentication
• Uploading/Updating content
• Examination
Under the instructions from the course related faculty the administrator can
set the quiz paper for the student .
8
4 . Feasibility Analysis
Operational Feasibility defines the urgency of the problem and the acceptability of any
solution ie if the system is developed,it deals with the study of whether it will be used,
how well the system can perform the operations that are assigned to it,how do the end-
users feel about their role in the new system. Thus it refers to the feasibility of the
product to be operational. It is observed that the proposed system is very user friendly
and has all the features mentioned above
9
4.3 Technical Requirements
The technologies and the standard used for the development of the project are as follows:
(b) Software will be rented as a hosted service over the Internet instead of
purchased on a store shelf. Essentially, the Internet will be housing all
where applications and data.
(c) Users will have access to their information on the Internet from any
device, anytime, anywhere.
(d) There will be new ways to interact with application data, such as speech
and handwriting recognition.
Consistency
Using Master Page, Themes and using Cascaded Style Sheet feature of ADO.NET, one
can achieve this feature.
Personalization
This is done in regards with the Users taste. It may be in terms of colors, font size,
background colors, and look and feel with respect t the application. After gathering
10
requirements from the user by making use of and using Themes, Skin and Cascaded Style
Sheet feature of ADO.NET we can achieve personalization.
Themes and skins
These are new feature of ASP. Net. By this way you can customize your sites look and
feel. Like the master pages they also improve the maintainability of your site and avoid
unnecessary duplication of code for shared style.
A theme is a collection of property settings that allow you to define the look of pages and
controls, and then apply the look consistently across pages in a Web application, across
an entire Web application, or across all Web applications on a server.
A skin file has the file name extension. Skin and contains property settings for individual
controls such as Button, Label, Textbox, or Calendar controls. Control skin settings are
like the control markup itself, but contain only the properties you want to set as part of
the theme.
Every site requires tools for navigation. The List of Navigation tools available in
.NET is as follows:
11
Tree View These are structured links. User can know where they are currently located
The new Site Navigation features in ASP.NET 2.0 can make building navigation
structures across a web-site much easier.
At a high-level, the new Site Navigation features allow you to define (outside of code or
pages) the “site map” structure of how your site is laid out. Specifically, it allows you to
define the relationships between pages on the site – what is the “home” entry-point, what
are the sub-sections of it, and how individual pages fit within it. This information is
cached by ASP.NET, and you can then get access to this sitemap structure at runtime.
ASP.NET includes a basic built-in XML based SiteMap provider that allows you to
define this site structure within an XML file whose default name is “web.sitemap” (note:
you can change the name if you want). For example, web.sitemap XML file can contain
several levels of hierarchy (a homepage root, then three sub-nodes, and under the
products node three additional sub-nodes).
12
Security
In .NET security considerations can be verified by carrying out authentication of entries,
password checking, password reminders and facility to create new users. It helps in
permitting authorized users and denies access to unauthorized users.
Wizard
NET provides a wizard called as “Web Site Administrative Tools” which facilitates in the
• Database Providers
• Security Management – Provides security consideration like password and
username checking
• Roles Management – Which pages and folders a user is permitted to view.
With built in Windows authentication, you can be assured that your applications are
secure.
Database controls
These controls are used to connect with the database and then retrieve, display or edit the
contents of the database. They can be categorized as:
Data-bound Controls
These perform the task of taking information provided by Data Source Controls and
render it into HTML. Examples of Data Bound controls are Grid View, Data List, Details
View, Form View and Repeater.
Componentization
Code for the various parts of the page can be handled independently.
• Code for the presentation layer can be kept in a separate file i.e. ‘default.aspx’
file.
13
• Code for the execution is kept in a separate file i.e. ‘default.aspx.cs’ file.
Web Services
Web Services are methods of making information available in a standardized way that
could be accessed by any developer’s application over the web. A web service on its own
• Is not an application
• Can’t be seen as web pages.
• Can’t be seen as an .exe files.
• They come as part of user interface.
• Helps in preventing code duplication & thus save time.
They can be created & exposed to web for other applications to share it or one can
search for web service to add to his own application
Deployment
• In the past series of steps were required to be carried out to register and configure
the site on the host machine.
• ASP .NET 2.0 has devised DOS XCOPY type of folder copying mechanism.
• This XCOPY deploys your site from the development machine to the deployment
host.
• All registration and machine level customizations occur automatically when the
first request hits the site.
• XCOPY/ FTP will suffice for simple applications – for more sophisticated
requirements it may well be preferable to create a Windows Installer based setup
package.
• There are many common installation tasks that are not possible via XCOPY, some
of which are
• Creating IIS web sites or virtual directories
• However, if you do need any of these you have Microsoft Windows Installer at
your disposal
14
4.3.1.2 Summary of ASP .NET
ASP.NET is a programming framework built on the common language runtime that can
be used on a server to build powerful Web applications. ASP.NET offers several
important advantages over previous Web development models:
Enhanced Performance:
ASP.NET is compiled common language runtime code running on the server. Unlike its
interpreted predecessors, ASP.NET can take advantage of early binding, just-in-time
compilation, native optimization, and caching services right out of the box. This amounts
to dramatically better performance before you ever write a line of code.
World-Class Tool Support:
A rich toolbox and designer in the Visual Studio integrated development
environment complement the ASP.NET framework. WYSIWYG editing, drag-
anddrop server controls, and automatic deployment are just a few of the features
this powerful tool provides.
Power and Flexibility:
Because ASP.NET is based on the common language runtime, the power and
flexibility of that entire platform is available to Web application developers. The
.NET Framework class library, Messaging, and Data Access solutions are all
seamlessly accessible from the Web. ASP.NET is also language-independent, so
you can choose the language that best applies to your application or partition your
application across many languages.
Simplicity:
ASP.NET makes it easy to perform common tasks, from simple form submission
and client authentication to deployment and site configuration. For example, the
ASP.NET page framework allows you to build user interfaces that cleanly
separate application logic from presentation code and to handle events in a
simple, Visual Basic - like forms processing model. Additionally, the common
language runtime simplifies development, with managed code services such as
automatic reference counting and garbage collection.
15
Security:
With built in Windows authentication and per-application configuration, you can
be assured that your applications are secure.
Language Independency:
ASP.NET is language-independent, so you can choose the language that best
applies to your application or partition your application across many languages.
ASP .NET 2.0 supports more than 20 different languages.
Irrespective of language the code is converted to Intermediate Language prior to
execution.
Database mirroring
Database mirroring is a new high-availability feature in SQL Server 2005. It's similar to
server clustering in that fail over is achieved by the use of a stand-by server; the
difference is that the fail over is at the database level rather than the server level. The
primary database continuously sends transaction logs to the backup database on a
separate SQL Server instance. A third SQL Server instance is then used as a witness
database to monitor the interaction between the primary and the mirror databases.
Database snapshots
A database snapshot is essentially an instant read-only copy of a database, and it is a great
candidate for any type of reporting solution for your company. In addition to being a
great reporting tool, you can revert control from your primary database to your snapshot
database in the event of an error. The only data loss would be from the point of creation
of the database snapshot to the event of failure.
16
CLR integration
With SQL Server 2005, creation of custom .NET objects is possible with the database
engine. For example, stored procedures, triggers, and functions can now be created using
familiar .NET languages such as VB and C#. Exposing this functionality gives tools that
never had access to before such as regular expressions.
Service Broker
This feature gives the ability to create asynchronous, message-based applications in the
database entirely through TSQL. The database engine guarantees message delivery,
message order consistency, and handles message grouping. In addition, Service Broker
gives you the ability to send messages between different SQL Server instances. Server
Broker is also used in several other features in SQL Server 2005. For example, defining
Event Nonfictions in the database to send a message to a Queue in the database when
someone attempts to alter a table structure, of if there is a string of login failures.
DDL triggers
DDL triggers are defined at the server or database level and fire when DDL statements
occur. This gives the ability to audit when new tables, stored procedures, or logins are
created.
Ranking functions
SQL Server 2005 provides the ability to rank result sets returned from the database
engine. This allows customizing the manner in which result sets are returned, such as
creating customized paging functions for Web site data.
XML integration
SQL Server 2005 introduces the new XML data-type. Using this feature, full XML
documents in this new data-type, and validations can be placed on the well-formed
documents in the database. Additional enhancements include the ability to query the
XML documents and create indexes on the XML data-type.
17
TRY...CATCH
Use of new TRY...CATCH constructs in SQL Server 2005 helps to catch and handle
deadlocks when they occur in the database. This long-awaited feature simplifies error
handling in the database.
Database Mail
Database Mail, the eventual successor to SQL Mail, is a greatly enhanced e-mail solution
available in the database engine. With Database Mail, there is no longer a dependency on
Microsoft Outlook or MAPI e-mail clients. Database Mail uses standard SMTP to send e-
mail messages. These messages may contain query results, attachments (which can be
governed by the DBA), and is fully cluster aware. In addition, the e-mail process runs
outside of the database engine space, which means that messages can continue to be
queued even when the database engine has stopped.
Fast Recoveries
A new faster recovery option improves availability of SQL Server databases.
Administrators can reconnect to a recovering database after the transaction log has been
rolled forward.
Security Enhancements
The security model in SQL Server 2005 separate users from objects, provides fine-grain
access, and enables greater control of data access. Additionally, all system tables are
implemented as views, providing more control over database system objects.
18
Web Services
With SQL Server 2005 developers can develop Web services in the database tier, making
SQL Server a hypertext transfer protocol (HTTP) listener and providing a new type of
data access capability for Web services-centric applications.
T-SQL
T-SQL (Transact-SQL) is the primary means of programming and managing SQL Server.
It exposes keywords for the operations that can be performed on SQL Server, including
creating and altering database schemas, entering and editing data in the database as well
as monitoring and managing the server itself. Client applications, both which consume
data or manage the server, leverage SQL Server functionality by sending T-SQL queries
and statements which are then processed by the server and results (or errors) returned to
the client application. SQL Server allows it to be managed using T-SQL. For this it
exposes read only tables from which server statistics can be read. Management
functionality is exposed via system-defined stored procedures, which can be invoked
from T-SQL queries to perform the management operation.
Replication Monitor
With its intuitive user interface and wealth of data metrics, Replication Monitor is a tool
that sets a new standard for ease of use in managing complex data replication operations.
SQL Server 2005 and Visual Studio 2005 together provide even deeper integration in the
area of application debugging. The combination lets you seamlessly debug both CLR and
Transact-SQL code using the same Visual Studio debugging interface, and enables you to
debug from CLR to Transact-SQL and back again, regardless of the location of the code,
whether it is on the developer computer or stored in the SQL Server database
19
4.3.3 Standards used
SCORM stands for "Shareable Content Object Reference Model", is a standard for
developing, packaging and delivering high-quality training materials for online training
Courses. We are following SCORM standards in our project. SCORM was developed
based on the concept of "using a common e-learning Standard to modernize education
and training courses". Now, with the SCORM standard, and more specifically SCORM
compliant tools/platforms, you can find, import, share, reuse and export learning contents
through compliant web-based learning systems.
The benefits of using SCORM standards are as follows:
Reusability
Lowers cost because learning contents can be used many times. SCORM incorporated
contents can be easily incorporated into multiple applications, allowing for learning
contents to be easily modified and used by different tools and platforms. This allows you
to spend less effort in creating new contents from scratch and focus more on
incorporating existing contents to meet the specific needs of the learner and corporation.
Accessibility
Increased access to learning information. The SCORM standard offers you the ability to
access learning contents from anywhere and at anytime. It enables you to customize the
delivery of your learning contents from one remote location and deliver them too many
other locations. It allows you to search, identify, access and retrieve contents that are
widely distributed in SCORM compliant repositories. This way, it is easier for learners to
identify, retrieve, and incorporate valuable content from many trusted sources.
Interoperability
Systems work efficiently together. SCORM provides an extension for compliant
courseware and similar tools/platforms to communicate under a common interface. With
consistent content production specifications, learning contents developed using one set of
tools/platform can be easily identified, and launched with a different set of tools/platform.
In other words, SCORM compliant learning contents can be authored and/or launched by
any SCORM compliant authoring tools and/or platforms, providing maximum flexibility.
20
Durability
Learning contents will not easily become obsolete. SCORM is becoming the
technological standard for the e-Learning industry because SCORM compliant contents
are preserved and portable even when base technology (tools/platform) changes. This
means learning contents do not need to go through a Redesign or redevelopment process,
even when technology changes (platforms, tools, Access, devices, products, vendors).
Manageability
A track of system usage and learning experience can be maintained. SCORM can keep
track of the learners' learning experiences and activities, and more Specifically how
learning objects are created, stored, assembled, and delivered to individuals. Also it
provides tracking based on an individuals learning assessment, which gives a better
evaluation reference for determining the learning results. Thus, corporations purchasing
SCORM compliant software (such as TCMS 2.0 or Stream Author 2.5) can better assess
their e-Learning environment and provide a more detailed measurement for their ROI.
21
5. System Design
5.1 Introduction
Systems design is the process or art of defining the architecture, components, modules,
interfaces, and data for a system to satisfy specified requirements. Once the software
requirements are analyzed and specified, the software design involves three technical
activities-- design, code generation and testing that are required to build and verify the
software. The design activities are of main importance in this phase because in this
activity decisions ultimately affecting the success of the software implementation and its
ease of maintenance are made. These decisions have the final bearing upon the reliability
and maintainability of the system. Design is the only way to accurately transfer the
customer requirements into a finished software or system.
A use case diagram is a type of behavioral diagram defined by the Unified Modeling
Language(UML). Its purpose is to present a graphical overview of the functionality
provided by a system in terms of actors, their goals represented as use cases and any
dependencies between those use cases.
Use Case
A use case describes a sequence of actions that provide a measurable value to an actor. A
use case is drawn as a horizontal ellipse on a UML use case diagram.
22
Fig 5.1 Use Case
Actor
An actor is a person, organization, or external system that plays a role in one or more
interactions with your system (actors are typically drawn as stick figures on UML Use
Case diagrams)
Relationships
There are several types of relationships that may appear on a use case diagram:
Include
In one form of interaction, a given use case uses another. The first use case often depends
on the outcome of the included use case. This is useful for extracting truly common
behaviors from multiple use cases into a single description. The notation is a dashed
arrow from the including to the included use case, with the label "«include»".
Extend
In another form of interaction, a given use case (the extension) may extend another. This
relationship indicates that the behavior of the extension use case may be inserted in the
extended use case under some conditions. The notation is a dashed arrow from the
extension to the extended use case, with the label '«'extend'»
23
Generalization
Module 1
24
Module 2
25
Module 3
26
5.2.2 Sequence diagrams:
Sequence diagrams demonstrate the behavior of objects in a use case by describing the
objects and the messages they pass.A sequence diagram shows, as parallel vertical lines,
different processes or objects that live simultaneously, and, as horizontal arrows, the
messages exchanged between them, in the order in which they occur.
Class roles
Class roles describe the way an object will behave in context
Activation
Activation boxes represent the time an object needs to complete a task. Activation boxes,
are opaque rectangles drawn on top of lifelines to represent that processes are being
performed in response to the message.
Lifelines
Lifelines are vertical dashed lines that indicate the object's presence over time. The dotted
lines extending downwards indicate the lifeline.
27
Messages
Messages are arrows that represent communication between objects. The arrows
represent messages (stimuli) from an actor or object to other objects.
Loops
A repetition or loop within a sequence diagram is depicted as a rectangle. Place the
condition for exiting the loop at the bottom left corner in square brackets [ ].
Module 1
28
Fig 5.7 Sequence Diagram for account creation/authentication module
Module 2
29
:Student :Course_info :CourseAdmin :Course DB :Library DB
2: Access library
3: Display(library)
4: Take Quiz()
5: Store(quiz)
6: Ack()
7: View(Quiz)
8: Display()
9: Post results()
10: Ack()
12: Display()
Module 3
30
Fig 5.9 Sequence Diagram for Administrator module
31
Basic Class Diagram Symbols and Notations
Classes represent an abstraction of entities with common characteristics. Associations
represent the relationships between classes.
Classes
Classes are represented with rectangles divided into compartments. The name of the
class is placed in the first partition , the attributes are listed in the second partition, and
operations are written into the third.
Active Class
Active classes initiate and control the flow of activity, while passive classes store data
and serve other classes.Active classes are illustrated with a thicker border.
Visibility
Visibility markers are used to signify who can access the information contained within a
class. Private visibility hides information from anything outside the class partition. Public
visibility allows all other classes to view the marked information. Protected visibility
allows child classes to access information they inherited from a parent class.
Associations
Associations represent static relationships between classes.
Generalization
Generalization is another name for inheritance or an "is a" relationship. It refers to a
relationship between two classes where one class is a specialized version of another
32
Class diagram
An activity diagram is to model the workflow behind the system being designed. . An
activity represents an operation on some class in the system that results in a change in the
33
state of the system. Typically, activity diagrams are used to model workflow or business
processes and internal operation.
Action states
Action states represent the noninterruptible actions of objects.
Action Flow
Action flow arrows illustrate the relationships among action states.
Initial State
A filled circle followed by an arrow represents the initial action state.
Final State
An arrow pointing to a filled circle nested inside another circle represents the final action
state.
Swimlanes
Swimlanes group related activities into one column
34
Activity diagram
35
elements. The elements may be computational entities related by control flow or business
entities connected by semantic constraints. It is a multi-perspective, quality-based
approach to ensuring that software is built to fit its purpose.
The architecture below explains the complete flow of the project:
36
Database tables are used to organize and group the data by common
characteristics or principles. The database can contain as many tables as needed to
organize the data. Database tables involved in this project for storing and
retrieving the data/information are as following:
• Login Table
• Register Table
37
User Name String 50
Password String 50
• Faculty table
38
• Session Details Table
• Tutorials
39
• Syllabus Details
• Video Table
• Exam Table
40
• Result Table
6.Testing
In general, testing is finding out how well something works. In computer hardware and
software development, testing is used at key checkpoints in the overall process to
determine whether objectives are being met. For example, in software development,
product user representatives test product objectives. When the design is complete, coding
follows and each programmer tests the finished code at the unit or module level, at the
component level by the group of programmers involved; and at the system level when all
components are combined together. At early or late stages, a product or service may also
be tested for usability. Software testing is a critical element of software quality assurance
and represents the ultimate review of specification design and code generation.
41
Software testing methods are traditionally divided into black box testing and white box
testing. These two approaches are used to describe the point of view that a test engineer
takes when designing test cases.
42
• Performance errors
• Initialization and termination errors.
All the modules have been thoroughly tested in order to find if all the functions,
interfaces designed for the user, all the data structures used are working as per the
intended requirement.
Unit testing is a procedure used to validate that individual units of source code are
working properly. This would test the interaction of many functions but confine the test
within one unit. Unit testing involves only those characteristics that are vital to the
performance of the unit under test. This encourages developers to modify the source code
without immediate concerns about how such changes might affect the functioning of
other units or the program as a whole. Unit testing must be done with an awareness that it
may not be possible to test a unit for every input scenario that will occur when the
program is run in a real-world environment.
Keeping in mind the above rules, each and every module of our project was tested
individually and seen that all the modules are working in an error-free manner.
Integration testing is a logical extension of unit testing. In its simplest form, two units
that have already been tested are combined into a component and the interface between
them is tested. A component, in this sense, refers to an integrated aggregate of more than
one unit. Integration testing can expose problems with the interfaces among program
components before trouble occurs in real-world program execution. Simulated usage of
43
shared data areas and inter-process communication is tested and individual subsystems
are exercised through their input interfaces.
After testing the individual modules, we have combined all the modules and tested if all
the modules as a whole are working properly or not.
44
7. Implementation
The first page that is displayed to the visitor gives an overview of the virtual education
and also answers to the frequently raised doubts .If the student wants to know more
information about the university he needs to create an account .If the details entered are
according to the specification he is granted to use the account id and password he has
chosen, then the details of various courses offered along with their session, fee details can
be known. Now if the student is interested in registering he should fill the online
application form and send the copy of certificates to the university .If the student logs in
with the registered id and password he is provided access to various course specific
services like he can view the syllabus ,tutorials(lecture handouts),video of the lectures.
Authenticated student is also granted access to library .To facilitate the student to
estimate his knowledge ,self assessment quizess also provided ie..he needs to take a
online examination which is evaluated and the result is made known to him immediately .
If the student needs to clarify his doubts ,he can post the doubt to any of the course
related faculty as their email ids are listed to him. Apart from this an added service is the
desktop sharing through which the virtually overtaking of the desktop is possible through
which the difficulties can be monitored. once the faculty gets registered by he filling in
the details and the administrator validating them he gets his login id and password. The
faculty service includes viewing the course tutorials , videos ,syllabus, library.Faculty can
also set the quiz paper for the student. The administrator who is whole and sole authority
45
of the database is also provided with an interface to automate some of his activities .
Firstly the registration details of the users(students, faculty) are listed which can be
verified with the documents he received and if they are found to be valid and if they fit
into the criteria of the university ,the administrator then assigns them their respective ids
and passwords and intimates through email .The admin can now insert new course ,
session, fee , tutorials , syllabus ,videos and library details as well as can edit the existing
details through the interface.
46
Fig 7.1 home page of the virtual university
47
Fig 7.2 Page displaying the information about virtual learning
48
Fig 7.3 Page displaying the frequently asked questions about university
education system
49
Fig 7.4 Account creation for new user (student)
50
Fig 7.5 Page displaying the basic information links for account created student
51
Fig 7.6 list of various courses offered
52
Fig 7.7 session details of various courses offered
53
Fig 7.8 fee details of various course sessions offered
54
Fig 7.9 student registration page
55
Fig 7.10 Page displaying various services offered to students
56
Fig 7.11 Page displaying the syllabus details of the course
57
Fig 7.12 Page displaying the tutorial contents
58
Fig 7.13 Page displaying the video links for the course content
59
Fig 7.14 Demo of the video file
60
Fig 7.15 Page displaying the library service
61
Fig 7.16 Online examination for student
62
Fig 7.17 Displaying result for the exam taken
63
Fig 7.18 Page Displaying email ids of the course related faculty
64
Fig 7.19 Faculty registration
65
Fig 7.20 Page displaying various services offered to faculty
66
Fig 7.21 Setting the question paper for quizz
67
Fig 7.22 Page displaying the activities of the administrator
68
Fig 7.23 Administrator authenticating student
69
Fig 7.24 Administrator authenticating faculty
70
Fig 7.25 Inserting new course details and viewing the record
71
Fig 7.26 updating course details and viewing the modified record
72
Fig 7.27 Inserting new fee details and session details
73
Fig 7.28 Inserting new syllabus details and library details
74
8. Conclusions and Scope for Future enhancements
8.1 Conclusions
This virtual university attempts to mirror all parts of a real university in a computer and
internet-based environment. It allows authenticated students to follow its rigorous
programs regardless of their physical locations. The web-enabled course contents
facilitates the student to work in his own comfortable environment unlike restricting to
the classroom. Moreover he can work at a pace with which he finds convenient. It
enhances the time management skills which is supposed to be the greatest of the greater
skills.
o The scope of the project is high,Apart from making them avail a degree ,the
university can make an attempt to offer the student the training required for the
student to get placements through the portal itself.
o Disscussion rooms can be provided for the students to share their ideas and grow.
o Video conferencing for the live interaction can be provided.
75
9. References
76