Академический Документы
Профессиональный Документы
Культура Документы
TABLES OF CONTENTS
01 1.1 Introduction 6
1.2 Database 7
1.2.1 A Database Management System (DBMS) 7
1.2.2 Object-oriented database systems 8
1.2.3 Industry Profile 8
1.2.4 Historical Perspective 9
1.3 Characteristics of DBMS 10
1.3.1 Represent Some Aspects of real world applications 10
1.3.2 Self-Describing nature 10
1.3.3 Logical relationship between records and data 10
1.3.4 Control Data Redundancy 10
1.3.5 Query Language 10
1.3.6 Multi User and Concurrent Access 11
1.3.7 Multiple views of database 11
1.4 Purpose 12
1.5 Scope 12
1.5.1 Login module 12
1.5.2 Search module 12
1.5.3 Registration Module 12
1.5.4 User Management 13
2.4 Syntax 17
2.5 Back End: MySQL 18
2.5.1 Features of MySQL 18
2.5.2 Stored Procedure 20
2.6 Syntax 20
03 3.1 Database Design 21
3.2 Overall description 21
3.2.1 Product Perspective 21
05 5.1 CONCLUSION 40
5.2 SCOPE OF THE PROJECT 40
06 BIBLIOGRAPHY 41
ABSTRACT
Throughout the project the focus has been on presenting information in an easy and
intelligible manner. The project is very useful for those who want to know about Student
Information Management Systems and want to develop softwares/websites based on the same
concept.
The project provides facilities like online registration and profile creation of students
thus reducing paperwork and automating the record generation process in an educational
institution.
ACKNOWLEDGEMENT
The satisfaction and euphoria that accompanies the successful completion of any task
would be incomplete without the people who made it possible, whose constant guidance and
We fall short of words to thank and express gratitude to our beloved Principal,
Dr. Padmanabha S.
We wish to thank our Head of the Department Dr. Panduranga Rao M V, Professor
and HOD, Department of Computer Science and Engineering, for his kind co-operation and
We convey our regards and thanks to our guide Mr. Madhu C.K, M Tech for his
immense support, guidance, specifications and ideas without which the project would have
We thank our friends and family for their immense support and encouragement in the
Finally a note of thanks the department of ISE, the staff both teaching and
We also thank VTU for providing such an interesting assignment, which helped us in
CHAPTER 1
1.1 Introduction
Student Information Management System deals with all kind of student details,
academic related reports, college details, course details, curriculum, batch details and other
resource related details too. It tracks all the details of a student from the day one to the end of
his course which can be used for all reporting purpose, tracking of attendance, progress in the
course, completed semesters years, coming semester year curriculum details, exam details,
project or any other assignment details, final exam result etc.
Our design can facilitate us to explore all the activities happening in the college, even
we can get to know which faculty is assigned to which course, the current status of a student,
attendance percentage of a student and upcoming requirements of a student. The student
management system is an automated version of manual Student Management System. It can
handle all details about a student. The details include college details, subject details, student
personnel details, academic details, exam details etc.
In case of manual system they need a lot of time, manpower etc. Here almost all work
is computerized. So the accuracy is maintained. Maintaining backup is very easy. It can do
with in a few minutes. Our system has two type of accessing modes, administrator and user.
Student management system is managed by an administrator. It is the job of the administrator
to insert update and monitor the whole process. When a user log in to the system. He/she
would only view details of the student. He/she can’t perform any changes. Our system has
seven modules, they are administrator, student, course, department, exam, attendance, and
section. These modules and its attributes with entity relationship module presented in the ER
diagram sesion.
1.2 Database
● accessing data
● inserting, updating, and deleting data
● security
● integrity, facilitated by:
a. locking
b. logging
c. application-defined rules, including triggers
● supporting batch and online programs
● facilitating backups and recoveries
● optimizing performance
● maximizing availability
● maintaining the catalogue and directory of database objects
● managing the buffer pools
● acting as an interface to other systems programs
● supporting user interface packages, such as the popular SQL interface for
relational database systems
The database industry generated about $7 billion in revenue in 1994 and is growing at
35% per year. Among software industries, it is second only to operating system software. All
the leading corporations in this industry are US-based: IBM, Oracle, Sybase, Informix,
Computer Associates, and Microsoft. In addition, there are two large specialty vendors, both
also US-based: Tandem, selling over $1 billion per year of fault-tolerant transaction
processing systems, and AT&T-Teradata, selling about $500 million per year of data mining
systems. A relatively modest federal research investment, complemented by an also-modest
industrial research investment, has led directly to our nation's dominance of this key industry.
During this era, there was considerable experimentation with systems to manage an
online database that could capture transactions as they happened, rather than in daily batches.
At first these systems were ad hoc, but late in the decade "network" and "hierarchical"
database products emerged. A network data model standard (DBTG) was defined, which
formed the basis for most commercial systems during the 1970s. Indeed, in 1980
DBTG-based Cullinet was the leading software company.
A database represents some features of real world applications. Any change in the real
world is reflected in the database. For example, let us take railway reservation system; we
have in our mind some certain applications of maintaining records of attendance, waiting
list,train arrival and departure time, certain day etc. related to each train.
A database gives a logical relationship between its records and data. So, a user can
access various records depending upon the logical conditions by a single query from the
database.
DBMS follows the rules of normalization, which splits a relation when any of its
attributes is having redundancy in values. Normalization is a mathematically rich and
scientific process that reduces data redundancy.
DBMS is equipped with query language, which makes it more efficient to retrieve and
manipulate data. A user can apply as many and as different filtering options as required to
retrieve a set of data. Traditionally it was not possible where file-processing system was used.
DBMS supports multi-user environment and allows them to access and manipulate
data in parallel. Though there are restrictions on transactions when users attempt to handle the
same data item, but users are always unaware of them.
Basically, a view is a subset of the database. A view is defined and devoted for a user
of the system. Different users of the system may have different views of the same system.
Every view contains only the data of interest to a user or a group of users. It is the
responsibility of users to be aware of how and where the data of their interest is stored.
1.4 Purpose
The main purpose of this SRS document is to illustrate the requirements of the project
Student information System and is intended to help any organization to maintain and manage
its student’s personal data.
1.5 Scope
Without a Student information System, managing and maintaining the details of the
student is a tedious job for any organization. Student Information system will store all the
details of the students including their background information, educational qualifications,
personal details and all the information related to their resume.
1.5.1 Login module: Login module will help in authentication of user accounts. Users
who have valid login id and password can only login into their respective accounts.
1.5.2 Search module: Suppose there are hundreds of students and from this we have to
search a particular student and we know the name of the student .In manual system it is a
tedious task though we know the name of the student, but using this module we can easily
search the student by specifying the name of the student in the search criteria. Thus this
module will help the administrator in searching the student with various criteria easily.
1.5.3 Registration Module: and Account Management: This module will help the
student get registered from anywhere if internet is present .This module will really simplify
the task of on paper registration. Also after successful registration the user can update
information and change their password as and when required.
Purpose of project is to maintain details of the students such as storing information about:
● Student ID
● Student password
● Student name
● Student DOB
● Student mailing address
● Gender
● Registration date
● Student status
● Contact no
● Qualification
● City
● Resume
● Image
● Personal details: Details of student such as user id, phone number, address, image,
resume, e-mail address etc.
● Contact details: Details of contact associated with the student.
● SRS: System requirement Specification.
● WWW: World Wide Web.
● Administrator: A Login Id representing the user is an administrator & can access
all the records details.
CHAPTER 2
2.0 Software Requirement and Specification
2.1 Front End: PHP
PHP code may be embedded into HTML code, or it can be used in combination with
various web template systems, web content management systems, and web frameworks. PHP
code is usually processed by a PHP interpreter implemented as a module in the web server or
as a Common Gateway Interface (CGI) executable. The web server combines the results of
the interpreted and executed PHP code, which may be any type of data, including images,
with the generated web page. PHP code may also be executed with a command-line interface
(CLI) and can be used to implement standalone graphical applications.
PHP/FI could be used to build simple, dynamic web applications. To accelerate bug reporting
and improve the code, Lerdorf initially announced the release of PHP/FI as "Personal Home
The fact that PHP was not originally designed, but instead was developed organically
has led to inconsistent naming of functions and inconsistent ordering of their parameters.
In some cases, the function names were chosen to match the lower-level libraries which PHP
was "wrapping", while in some very early versions of PHP the length of the function names
was used internally as a hash function, so names were chosen to improve the distribution of
hash values.
It is most popular and frequently used world wide scripting language, the main
reason of popularity is; It is open source and very simple.
● Simple
● Faster
● Interpreted
● Open Source
● Case Sensitive
● Simplicity
● Efficiency
● Platform Independent
● Security
● Flexibility
● Familiarity
● Error Reporting
● Loosely Typed Language
● Real-Time Access Monitoring
2.3.1 Simple: It is very simple and easy to use, compare to other scripting language it is
very simple and easy, this is widely used all over the world.
2.3.3 Faster: It is faster than other scripting language e.g. asp and jsp.
2.3.4 Open Source: Open source means you no need to pay for use php, you can free
download and use.
2.3.5 Platform Independent: PHP code will be run on every platform, Linux, Unix,
Mac OS X, Windows.
2.3.6 Case Sensitive: PHP is case sensitive scripting language at time of variable
declaration. In PHP, all keywords (e.g. if, else, while, echo, etc.), classes, functions, and
user-defined functions are NOT case-sensitive.
2.3.7 Error Reporting: PHP have some predefined error reporting constants to generate
a warning or error notice.
2.3.8 Real-Time Access Monitoring: PHP provides access logging by creating the
summary of recent accesses for the user.
2.3.9 Loosely Typed Language: PHP supports variable usage without declaring its
data type. It will be taken at the time of the execution based on the type of data it has on its
value.
<!DOCTYPE html>
<html>
<head>
<title>PHP Test</title>
</head>
<body>
<?php echo '<p>Hello World</p>'; ?>
</body>
</html>
<?='Hello world';
Before using our database, we must create a table. A table is a section of the database
for storing related information. In a table we will set up the different fields which will be used
in that table. Creating a table in phpMyAdmin is simple, we just type the name, select the
number of fields and click the ‘go’ button. we will then be taken to a setup screen where you
must create the fields for the database.Another way of creating databases and tables in
phpMyAdmin is by executing simple SQL statements.We have used this method in order to
create our database and tables.
● Easy to use: MySQL is easy to use. You have to get only the basic knowledge of
SQL. You can build and interact with MySQL with only a few simple SQL
statements.
● It is secure: MySQL consist of a solid data security layer that protects sensitive data
from intruders. Passwords are encrypted in MySQL.
● Free to download: MySQL is free to use and you can download it from MySQL
official website.
● Allows roll-back: MySQL allows transactions to be rolled back, commit and crash
recovery.
● High Performance: MySQL is faster, more reliable and cheaper because of its
unique storage engine architecture.
● High Productivity: MySQL uses Triggers, Stored procedures and views which
allows the developer to give a higher productivity.
The DBMS accepts SQL comma, panels generated from a variety of user interfaces,
produces query evaluation plans, executes these plans against the databc4'le, and returns the
answers. (This is a simplification: SQL commands can be embedded in host-language
application programs, e.g., Java or COBOL programs).
When a user issues a query, the parsed query is presented to a query optimizer, which
uses information about how the data is stored to produce an efficient execution plan for
evaluating the query. An execution plan is a blueprint for evaluating a query, usually
represented as a tree of relational operators (with annotations that contain additional detailed
information about which access methods to use, etc.).
The DBMS accepts SQL comma, panels generated from a variety of user interfaces,
produces query evaluation plans, executes these plans against the databc4'le, and returns the
answers. (This is a simplification: SQL commands can be embedded in host-language
application programs, e.g., Java or COBOL programs. When a user issues a query, the parsed
query is presented to a query optimizer, which uses information about how the data is stored
to produce an efficient execution plan for evaluating the query. An execution plan is a
blueprint for evaluating a query, usually represented as a tree of relational operators (with
● CREATE
● INSERT
● DELETE
● UPDATE
● ALTER
● ADD
● MODIFY
● DROP
● SELECT
2.6 Syntax:
CREATE PROCEDURE <procedure name><parameter>
< Local declaration>
< Procedure body>
CREATE FUNCTION <function name><parameter>
<Return type>
<Local declaration>
<Function body>
CHAPTER 3
3.1 Database Design
Database is critical for all businesses. A good database does not allow any form of
anomalies and stores only relevant information in an ordered manner. If a database has
anomalies, it is affecting the efficiency and data integrity. For example, delete anomaly arise
upon the deletion of a row which also forces other useful data to be lost. As such, the tables
need to be normalised. This fulfils the last objective of ensuring data are accurate and
retrieved correctly. For the database of this project, the tables are normalised to BCNF as
shown below.
The features that are available to the Administrator are: An Administrator can login
into the system and perform any of the available operations. Can enable/disable student. Can
edit student information to the database. Can make search for a specific student. Can access
all the details of the student.
● Administrator
● Student
3.2.5 Constraints :
Figure 3.1: shows the use case model of student information system
● Login
● Update student details
● Search student details
● Display student details
● Enable/Disable student
Use-case: Login
Brief Description: This use case is used when the administrator wants to access the database
to enable/disable/update the personal details of the student.
Preconditions: The Administrator must be login in order for this use case to begin.
The system prompts the administrator for the username and password. The
Administrator enters the user name and password. The system verifies the password and sets
the user’s authorization. The Administrator is given access to the database to perform his
tasks.
The administrator enters invalid username and password then he will not be allowed
to enter the database
Post conditions:
Figure 3.2 : Use Case Report- Login into the student database
Brief Description: This use case is used when the administrator wants to view the personal
details of the students already existing in the database on the screen.
Preconditions:
● The Administrator must be logged into the system in order for this use case to begin
● The details of the student must pre-exist in the database
● The student id must be entered correctly.
The System prompts for the student detail from one of the above keys. The student
details are displayed on the screen.
Alternative Flow: Student Not Found If in the Display a student sub-flows, a student with
the specified id number does not exist, The system displays an error message. The
Administrator can then enter a different id number or cancel the operation, at which point the
use case ends.
Post conditions: The student details are displayed on the screen already existing in the
system. The state of the system remains unchanged.
Figure 3.3 Use Case Report- Edit Student Details Into Database
Brief Description: This use case is used when the administrator wants to edit the personal
details of the himself/herself already existing in the database.
Preconditions:
● The Administrator must be logged into the system in order for this use case to begin.
● The details of the student must pre-exist in the database
● First/last name
● Gender
● DOB
● Contact no
● Qualification
● City
● Email
● Address
● Description
Figure 3.4 Use Case Report- Edit student detail into the database
The Administrator will be given more powers (enable/disable/ update) than other
users. It will be ensured that the information entered is of the correct format. For example
name cannot contain numbers. In case if incorrect form of information is added, the user will
be asked to fill the information again.
The proposed system that we are going to develop will be used as the Chief
performance system for providing help to the organization in managing the whole database of
the student studying in the organisation. Therefore, it is expected that the database would
perform functionally all the requirements that are specified.
The database may get crashed at any certain time due to virus or operating system
failure. Therefore, it is required to take the database backup.
We are going to develop a secured database. There are different categories of users
namely Administrator ,Student who will be viewing either all or some specific information
form the database. Depending upon the category of user the access rights are decided. It
means if the user is an administrator then he can be able to modify the data, append etc. All
other users only have the rights to retrieve the information about database.
The overall system design objective is to provide an efficient, modular design that
will reduce the system’s complexity, facilitate change and result in an easy implementation.
This will be accomplished by designing strongly cohesion system with minimal coupling. In
addition, this document will provide interface design models that are consistent user friendly
and will provide straight forward transition through the various system functions.
System Architecture Design – The System architecture section has detailed diagram of the
system, server and client architecture.
Data Design – The data Design include an ERD as well as Database design.
Functional Design Description – This section has the functional partitioning from the SRS,
and goes into great detail to describe each function.
The SIMS is a system which contain major part which include: student Detail, Student
image and resume. The user selects one of the available options as an input to the system.
According to the input by the user the system acts and the rest of the functions are performed
accordingly.The administrator can operate on any student details.But the normal student or
users can only access their details of all the functionalities.
An entity is a real-world item or concept that exists on its own. Entities are equivalent
to database tables in a relational database, with each row of the table representing an instance
of that entity.
CHAPTER 4
4.0 RESULTS
The system prompts the administrator for the username and password. The
Administrator enters the user name and password. The system verifies the password and sets
the user’s authorization.
The Administrator logs onto the System, and provides sufficient details of the student.
The system updates the database according to details.
● First/last name
● Gender
● DOB
● Contact no
● Qualification
● City
● Email
● Address
● Description
login records and state of the student database. Student Not Found If in the Display a student
sub-flows, a student with the specified id number does not exist, The system displays an error
message. The Administrator can then enter a different id number or cancel the operation
CHAPTER 5
5.1 CONCLUSION:
The need for available secure and reliable information solution is heightened by the
increasing dependence on systems and database technologies to provide educational services,
develop efficient academic products, administer daily activities and perform both short and
long term management functions.
Using database technology as a case study, this project has elaborated on the technical
and operational requirements of developing an academic information system. Issues on web
and database concept and technologies,analysis and design tools, security and content
maintenance were adequately explained,
These technologies have come to stay, no doubt that every organization, institution
and government parastatal wants to join the e-race.Designing a functional academic database.
Without a Student information System, managing and maintaining the details of the
student is a tedious job for any organization. Student Information system will store all the
details of the students including their background information, educational qualifications,
personal details and all the information related to their resume.
CHAPTER 6
BIBLIOGRAPHY
• PHP book by Vasvani (TMH publications).
• www.google.com.
• www.wikipedia.com
• www.w3schools.com
• Head First PHP & MySQL by Lynn Beighley and Michael Morrison(O’Reilly)