Вы находитесь на странице: 1из 43

E-VOTING

By
Miss. Sana-Hafiz

Under Guidance
Of
Mr. jitendra.K.Pareek

Submitted to the Sikkim Manipal University


of Health Medical and Sciences
in partial fulfillment of the requirements
for the degree of

Bsc.I.T

Sikkim Manipal University


of Health, Medical and Technological Sciences
Distance Education Wing
Electronic-Voting

SUBMITTED BY:

Sana-Hafiz

[Reg No. - 520688012]

[LC Code - 01691]


E-Voting

By
Sana-Hafiz

Under Guidance
Of
Mr. Jitendra.K.Pareek

Submitted to the Sikkim Manipal University


of Health Medical and Sciences
in partial fulfillment of the requirements
for the degree of

Bsc.I.T

Sikkim Manipal University


of Health, Medical and Technological Sciences
Distance Education Wing
th
5 Mile, Tadong, Gangtok – 737102 Sikkim.
Sikkim Manipal University
of Health, Medical and Technological Sciences
Distance Education Wing

PROFORMA FOR SUGGESTIONS OF e-voting PROJECT PROPOSAL

Learning Centre :

Calibre
IT Education
[A Unit of Calibre Edutech (p) Ltd]
J- 20 Jawahar Nagar, Main Road,
Opp. District Centre, Kota (Raj.)
Tel: +91-744-2406600, 2426600

Registration No.: 520688012


E-mail: sana_hafiz2003@yahoo.com
Telephone No.: (+91) 0744-2422636
1. Name and Address of the Student: Sana-Hafiz
H.No. - 5-B-5 Vigyan Nagar
Kota (Rajasthan)

2. Title of the Project: E-Voting


3. Name and Address of the Counsellor: Mr. Jitendra.K.Pareek
H.No.- J-20,
Jawahar Nagar
Kota (Rajasthan)

4. Educational Qualification of the Counsellor: MCA

5. Working / Teaching experience of the Counsellor: 5 yrs

6. Software used in the Project: Visual Studio


Microsoft Access 2000.

Signature of the Student: Signature of the Counsellor:


Date: …………………… Date: ……………………
CERTIFICATE OF AUTHENTICATED WORK

This is to certify that the project report entitled Electronic-Voting submitted to Sikkim

Manipal University in partial fulfillment of the requirement for the award of the degree

of Bsc I.T is an original work carried out by Miss. SANA-HAFIZ Registration No.

520688012 under my guidance. The matter embodied in this project is authentic and is

genuine work done by students and have not been submitted whether to this University or

to any other University / Institute for the fulfillment of the requirement of any course of

study.

Signature of the Student: Signature of the Counsellor:

Date: Date:

Sana-Hafiz Mr. Jitendra.K.Pareek


5-B-5 Vigyan Nagar Senior Lecturer
Kota (Raj.) Calibre IT Education
H.No.- J-20,
Jawahar Nagar
Kota (Rajasthan)
ROLES AND RESPONSIBILITIES FORM
Name of the Project: Electronic Voting System

Name of the Team Member Role Tasks and Responsibilities


1. Sana-Hafiz Team Coordinator Conducting meeting,
Coordinating the team.
Quality Manager Quality assurance and
Maintenance.
Data Manager/ Record and Information
Audit Maintenance.

Name and Signature of the Project Team Member:

Sana-Hafiz Signature

Signature of the Counsellor Date


ABSTRACT

Times since independence, general elections in India have come a long


way, but throughout this post-independence era they have truly reflected
the federal nature of the Indian polity. When in the neighboring countries
of India, still ballot-paper polling is still in practice, Indian voting system
has moved onto electronic voting machines. Certainly, this has eased up
and fast-tracked the polling process but still there is a lot of scope
for improvements. Main aim of conducting elections in any region is t
o act as a filter to prevent the 'rouge' elements from entering in the
legislative process and at the same time reflect the true voice of the
poorest of the poor man. Unfortunately, elections in India still have a long
way to go in this respect.

. If India aims to reach a 100% voting mark, it will have to solve this problem
sooner or later. Election Commission can start e-voting for the people who can
cast their votes sitting miles away from their homeland and at the same time
issue e-voter id cards to the working class. With the advent of 3G and broadband,
this would be no big deal for the IT giants of the country. At the same time it
would not only open new sources of employment for the IT professionals in times
of recession but at the same time bring down the election budget.

Secondly, there is an urgent need for reforms in the election process of the
country though district collectors on the use of plastics, cloth material or means
of transport which lead to waste of limited resources of the country and do harm
to the environment and in turn parties should be compelled to make campaigns
more tech-savvy. If such changes are not introduced in our system soon, election
process would reduce to a mere formality and would reduce down to a liability
rather than an asset of our great constitutional framework.
ACKNOWLEDGEMENT

We wish to take this opportunity to express our deep sense of gratitude to Shri
Hemendra Gupta (Director), Shri Bhuvnesh Gupta (Director), Shri Rajkumar
Gupta (Director), Shri Jitendra (Counsellor) who provided us his valuable support and
guidance for the development of this project. It was indeed a great learning experience,
which enabled us to put to use all that we have learnt while developing this project.

This project has provided us a thorough insight and opportunity to work on and build a
Project of Electronic-Voting. The work on the project also enlightened us about the
versatility of JAVA and Power of Swing.

Finally we wish to thank our team and Harpej Sir who have been very helpful during the
development of this Project.

Name: SANA-HAFIZ
Registration No : 520688012

Signature: __________________

Course : Bsc.I.T
Semester : VI
Project Code : BTOO

Project Title : ELECTRONIC-VOTING

Table of Contents

S.No. Contents Page No.

1. Introduction 2
1.1 Purpose 2
1.2 Scope of Project 2
2. Technology Used 3
2.1 Visual Basic 3
2.2 V.B 6.0 6

2.4 DataBase 13
3. Requirement And Analysis 15
3.1 Conceptual Model 16
3.2 Data Flow Diagram 16
3.3 Entity Relationship Diagram 24
4. System Design 27
4.1 Data Dictionary 28
4.2 Class Diagram 30
5. Implementation And Testing 34
5.1 User Interface And Coding 34
5.2 System Study 177
5.3 System Testing 177
5.4 Maintenance 179
5.5 Security Mechanism 180
6. Overview Of Existing System 180
7. Bibliography 182
“An Introduction to e-voting “
The Indian Electronic Voting Machines (EVM) are designed and developed by two
Government Owned Defense Equipment Manufacturing Units, Bharat Electronics
Limited (BEL) and Electronics Corporation of India Limited (ECIL). Both systems are
identical, and are developed to the specifications of Election Commission of India.

The System is a set of two devices running on 6V batteries. One device, the Voting
Unit is used by the Voter, and another device called the Control Unit is operated by
the Electoral Officer. Both units are connected by a 5 meter cable. The Voting unit
has a Blue Button for every candidate, the unit can hold 16 candidates, but up to 4
units can be chained, to accommodate 64 candidates. The Control Units has Three
buttons on the surface, namely, one button to release a single vote, one button to
see the total umber of vote casted till now, and one button to close the election
process. The result button is hidden and sealed, It cannot be pressed unless the
Close button is already pressed.

The voting unit has a list of candidate's names and their Party Symbols pasted on the
surface, and a Blue button to cast a vote faces ever candidate's name. The Party
Symbols (like a Lotus, an elephant, a horse etc.) are approved by the election
commission to be unique, All political parties use these symbols while campaigning,
and illiterate people can identify their candidates by looking at his symbol, and
pressing the blue button in front of his symbol.Here is how the voting process goes,

The Voter is Identified, by his Government Issued Voter Identity Card, or his
Public Distribution System's Ration Card, when he enters the polling station.

1. Voter's finger is marked with a special ink, in such a way that the ink
spreads from finger skin to nail in a small dot. One cannot remove this Ink
without hurting himself. The Ink washes away in two week's time.

2. The Electoral Officer then Presses a button on his Control Unit, that
releases a single ballot, for the voter to use, this of course is electronic so it
just enables the Voting unit to register one Vote.

3. Now Voter enters the voting Booth, and preses a Button in front of
name and Election Symbol of the Candidate. This action blinks an LED in front
of the candidate's name and sounds a loud and long Beep, that declares that
the vote is casted.

Its fairly easy for an election officer or opposition political agents to identify people
who attempt to appear twice with different identity. (The Ink on the finger is the
main reason).
And here is how the results are obtained from the machines.

1. After the voting is over, electoral officer presses the Close switch on
the Control Unit, after which no votes are registered by the unit. The total
number of the Votes registered are noted by all stake holders (political party
agents) and then the control units are put into its own special carrying case,
and sealed for transport.

2. Control Units from all Polling stations are transported to the nearest
District headquarters.

3. On the day of counting the seals of the Control Units are opened. The
control unit has a Results Button which is physically secured by a protective
seal, this button is pressed to obtain the results. The Machine gives the Serial
number of the Candidate, and the votes that he has won.

4. The Election commission takes a decision to ask for a re-election if the


machines are found to be tempered with. Or if the count of signatures or
thumb impressions (yes, India's illiterate also take part in the democracy) on
the voter register do not tally with the number of votes registered by the
Voting Machine. In this election, about a 100 polling booths, (I think) were
asked to conduct the election again. This number is small, for the size of
Indian elections.

5. In case of disputes, the machines are preserved for the courts to


decide upon, other machines are used for next election after reseting the
memory.

The Indian EVM is just plain circuit, with some assembly code. A few LEDs, and two
Seven Segment LED displays. One EVM can list 16 candidates, but up to 4 EVMs can
be Linked to accommodate 64 candidates. (In a country of a billion people its
possible to have 64 candidates for one single constituency.)
Diebold has received its share of criticism from Techies and Paranoids. Techies are
Concerned about the vulnerability of the system. unimaginable risk. I mean, we all
know how safe is a windows box on a network ;-). But, some criticism is just not
right, like the keyboard interface, and card reader jamming etc. No, electoral
officer in his sane mind would allow a voter to walk into a booth with a keyboard in
hand, and would not let him be inside the booth long enough to duplicate a smart
card or to open the voting machine to do some EPROM Programming, or to run a
forceful algorithm to break DES.
India's leading daily newspaper, carried an article on the eve of the elections, saying
that the microchip containing the code of the EVM machines can be copied in
minutes. The article was titled, “Winning Elections Made Easy”. The article was
written by an Indian Professor living and teaching in America. But I don't think it is
possible, as long as the Electoral system and Election officials function to their
expectations. Usually Indian elections take place during school Vacations, Teachers
are recruited by the Indian Election Commission to perform duty as election officers.

PURPOSE

The purpose of the Electronic-Voting Project is to maintains and controls the voting
Informations details and generates various reports for the counting and declaration
of results.

SCOPE OF PROJECT

Times since independence, general elections in India have come a


long way, but throughout this post-independence era they have truly
reflected the federal nature of the Indian polity. When in the
neighboring countries of India, still ballot-paper polling is still in
practice, Indian voting system has moved onto electronic voting
machines. Certainly, this has eased up and fast-tracked the polling
process but still there is a lot of scope for improvements. Main aim of
conducting elections in any region is to act as a filter to prevent the
'rouge' elements from entering in the legislative process and at the
same time reflect the true voice of the poorest of the poor man.
Unfortunately, elections in India still have a long way to go in this
respect.
TECHNOLOGY USED

VISUAL STUDIO:
Microsoft visual studio is the main integrated development environment (IDE) from
Microsoft. It can be used to develop console and graphical user interface applications
along to window forms applications, websites and web serious is in both native code
together to managed code for all platforms supported by Microsoft windows, windows
mobile, framework & Microsoft seluerlight. Visual studio includes a code editor.
Supporting intelligence as well as code refractory. The integrated debugger works both as
a sense level debugger & a machine level debugger.

Visual studio supports language by mean of language serious which allow any
programming language built in language include C/C++, VB.NET, C# support of other
language such as ruby, chrome etc. has been made available via language serious are to
be installed separately. It also supports XML/XSLT, HTML/XMHTL, JavaScript &

FEATURE:

● Code editor: - it support syntax wghlighting & code compilation setting bookmarks in
code for quick navigation.
● debugger:- it works both as a level debugger as well as machine level debugger works
both managed native code allows setting of weak points
● Designer: - includes a host of visual designer to aid in development of application
tools, designers, web designer, class designer, data designer mapping designer.

VERSIONS

The first edition of visual studio was released by Microsoft in 1997 bundling many so its
programming tools together for first time.
1. Visual studio 97 was released in 2 edition professional & elapses.
2. Visual studio 6.0 in June 1998 is the last to run on windows 9X platform.
3. Visual studio.net was released in Feb. 2002. Its biggest change was introduction
to managed code development environment using .net framework. The code is
compiled while being executed into appropriate language.
4. Visual studio 2003 in April 2003. It was shipped in 4 edition academic,
professional, enterprise develop and enterprise architect.
5. Visual studio 2005 was released online in October 2005.
6. Visual studio 2008 Microsoft released since pack for visual studio 2008 on 11
august 2008. It is focused on window vista 2007 office system and web
application.
7. Visual studio 2010 codenamed “Hawaii” is under development. Though the full
feature set has not been finalized.
An Introduction to VB:

VB is a highly popular language is the commercial world because it allows for the
rapid development of windows based programs. VB in particularly strong at
creating front ends of database. This can be dome is imaging time through use of
wizards. VB is developed by Microsoft for building standalone windows based
programs, is deriver heavily from basic, developer can use it for quickly building
GUI application. If you are looking for a fast way too build programs visual basic
may be give what you need. VB language is growing up, to Microsoft VB.net
was reengineered rather then released as VB 6.0 added feature. VB.net is fully
object oriented programming version of VB and as such support OOPS concepts
such as abstraction, inheritance, polymorphism & aggregation.VB is an event
driven programming language and associated development environment created
by Microsoft.VB enables RAD of GUI application access to database using DAO,
RDO or ADO & creating active conation.

DATABASE

A database management system (DBMS) is computer software designed for the purpose
of managing databases, a large set of structured data, and run operations on the data
requested by numerous users. Typical examples of DBMSs include Oracle, DB2,
Microsoft Access, Microsoft SQL Server, Firebird, PostgreSQL, MySQL, SQLite,
FileMaker and Sybase Adaptive Server Enterprise. DBMSs are typically used by
Database administrators in the creation of Database systems. Typical examples of DBMS
use include accounting, human resources and customer support systems.

Originally found only in large companies with the computer hardware needed to support
large data sets, DBMSs have more recently emerged as a fairly standard part of any
company back office.
Data: - It is the row information provided by the user to the computer.

Database: - A database is a collection of related records (data) organized in a tabular


form with appropriated field hints.
Data Base Management: - Data base management concert of all the operation, which we
perform on over database. Editing new records modifying and deleting existing records
arranging and filtering on records etc.

Data Base Management System (DBMS): - DBMS is software or a graph of software,


which provides facility to, manages to play and perform all the operation related to data
base management.
Relational Data Base Management System (RDBMS): - A RDBMS provides facility
to establish a relationship between two or more table of related data and to extracted the
complete information. MS Access is a RDBMS and the companion software of MS-
office pages. In MS-Access is a data base is a collection of tables, queries froms, reports,
pages, micros and modules which we used to manage and present data these components
one is also called object of database.

MS-Access

Data: - It is the row information provided by the user to the computer.

Database: - A database is a collection of related records (data) organized in a tabular


form with appropriated field hints.

Data Base Management: - Data base management concert of all the operation, which we
perform on over database. Editing new records modifying and deleting existing records
arranging and filtering on records etc.
Data Base Management System (DBMS): - DBMS is software or a graph of software,
which provides facility to, manages to play and perform all the operation related to data
base management.

Relational Data Base Management System (RDBMS): - A RDBMS provides facility


to establish a relationship between two or more table of related data and to extracted the
complete information. MS Access is a RDBMS and the companion software of MS-
office pages. In MS-Access is a data base is a collection of tables, queries froms, reports,
pages, micros and modules which we used to manage and present data these components
one is also called object of database.
REQUIREMENT AND ANALYSIS
The program needs the following software and hardware specification to run:

 Software Requirment:

 Operating System : Windows 2000


: Windows XP

Languages :Visual Studio6.0

 Data Base : MS Access

 Nominal Hardware Requirment:

 CPU or Processor : Pentium IV or Higher

 RAM : 512 MB Or Higher

 Hard disk Space : 80 GB HDD or Larger

 Input Device : Key Board

 Pointing Device : Mouse

 Visual Display Unit : Color Monitor


CONCEPTUAL MODELS

DATA FLOW DIAGRAMS


Data flow diagrams provide a logical model of the system and show the flow of data and
the flow of logical involved. Data Flow Diagram (DFD) have the following
characteristics: They shows the passage of data through the system.
They focus on the process that transforms incoming data flows (input) into outgoing data
flows (outputs). The processes that perform this transformation normally create as well as
use data. External entities send and receive data flows from the system. Data flow
diagram is also known as Bubble chart.
DFD supports a top-down approach for analysis, i.e. begin with a general understanding
of the system, the further draws each component.

Symbols used in DFDs


DFD consist of a series of symbols joined together by a line. There are may be a single
DFD for entire system or it may be exploded into various levels, namely Lavel1, Lavel2,
Lavel3 etc. The top-level diagram is often called a context diagram. Context diagram
contains a single process and it shows an overall view of the system under development.

Four symbols are used in drawing dataflow diagrams. These are:

1.External entities (Source or sink) Entity Name

2. Data Flow

Process
3.Process Number
Process
Name
4.Data Source Data Store Name

Entity Relation Ship Modeling


P.P. Chen introduced the E- R model. Entity – Relation ship modeling is a details logical
representation of the entities, associations and data elements for an organization or
business area.
Entities
An Entity is a person, place, thing or event of interest to the organization and about which
data are captured, stored or processed.
Attributes
Various types of data items that describe an entity are known as attributes.
Relationship
An association of several entities in a Entity-Relation model is called relationship.
Entity Relationship Diagram
The over all logical structure of a database can be expressed graphically by an entity
relationship diagram.

Name Symbol Meaning


Rectangle Represents Entity set

Oval Represents Attribute

Diamond Represents relationship


among entity set

Line

Links attribute to entity


sets and entity sets to relationship
Three Types of relationship exist among entities:
There are:
1. One- to-one
2. One-to-many
3. Many-to-Many

One to One Relationship (1:1)


A one to one (1:1) relationship is an associated only between two entities.

Automobile Engine
1:1 Relationship

One to Many Relation ship (1:M)


A one to many (1:M) relationship exist when one entity is related to more entities.

Father Children
1:M Relationship

Many to many Relation ship (M:M)


A many to many (M:M) relationship describe entities may have many relationship among
each other.

Student Courses
M:M Relationship
Zero level DFD
One level DFD for process 1.0: -
S.no Field Name Field Type Size

1. cId varchar 20
2 cName varchar 40
3. cage integer 10
4. cQualification varchar 40
5. cSymbol varchar 50
6. cOccupation varchar 40
7. cSex varchar 10
8. cContactNumber integer 20
10. cCity varchar 30
11. cState varchar 30

Voters Detail

S.no Field Name Field Type Size


1. vId integer 20
2. vName varchar 40
3. vFathersName varchar 40
4. vAddress varchar 40
5. vAge integer 20
6. vOccupation varchar 40
7. vDob integer 20
SYSTEM DESIGN

Maintenance Feasibility
study

Evaluation System
Analysis

Implementation
System
design

System Testing
Development

of Software

SYSTEM DEVELOPMENT LIFE CYCLE


CanGenDetails
CanGenDetails(String stitle)
public void actionPerformed(ActionEvent ae)
public void emptyField()
public void getNewId()
public static void main(String args[])

EDetails
EDetails(String title)
public void actionPerformed(ActionEvent ae)
public void emptyFields()
public boolean emptyCheck()
public int getNewId()
public void fillTable()
public void fillQualification()
public void emptyFieldsE()
public boolean emptyCheckE()
public int getNewIdE()
public void fillTableE()
public void onOffExp(boolean b)
public void itemStateChanged(ItemEvent ie)
public void fillCandidate()
public void fillCandidateCode()
public static void main(String args[])

EditCanGenDetails
EditCanGenDetails(String sTitle)
public void itemStateChanged(ItemEvent ie)
public void actionPerformed(ActionEvent ae)
public void fillCandidate()
public static void main(String args[])

CompanyGeneralDetails
CompanyGeneralDetails(String title)
public void actionPerformed(ActionEvent ae)
public void emptyFields()
public boolean emptyCheck()
public int getNewId()
public void fillTable()
public void fillQualification()
public void emptyFieldsE()
public boolean emptyCheckE()
public int getNewIdE()
public void fillTableE()
public void onOffExp(boolean b)
public void itemStateChanged(ItemEvent ie)
public void fillCandidate()
public void fillCandidateCode()
public static void main(String args[])
ComRequirement

ComRequirement(String sTitle)
public void itemStateChanged(ItemEvent ie)
public void actionPerformed(ActionEvent ae)
public void emptyFields()
public boolean emptyCheck()
public int getCompId()
public void fillTable()
public void emptyFieldsR()
public boolean emptyCheckR()
public int getJobId()
public void fillTableR()
public void fillCompany()
public static void main(String args[])

EditComRequirement
EditComRequirement(String sTitle)
public void itemStateChanged(ItemEvent ie)
public void actionPerformed(ActionEvent ae)
public void emptyFields()
public boolean emptyCheck()
public void fillTable()
public void emptyFieldsR()
public boolean emptyCheckR()
public void fillTableR()
public void fillCompany()
public void fillDesignation()
public static void main(String args[])

CandidateSearch

CandidateSearch(String stitle)
Public void itemStateChanged(Item Event ie)
public void actionPerformed(ActionEvent ae)
void fillRequirementDetailsTable()
void fillCompany()
void fillDesignation()
public static void main(String args[])

CompanySearch

CompanySearch(String sTitle)
public void itemStateChanged(ItemEvent ie)
public void actionPerformed(ActionEvent ae)
public void CandidateDetailsTable()
public void fillCandidate()
public static void main(String args[])
MatchRequirement
MatchRequirement(String sTitle)
public void itemStateChanged(ItemEvent ie)
public void
actionPerformed(ActionEvent ae)
public void fillCompanyVacancyTable()
public void fillCandidate()
public static void main(String args[])

MatchRequirementComp
MatchRequirementComp(String sTitle)
public void itemStateChanged(ItemEvent ie)
public void
actionPerformed(ActionEvent ae)
public void fillCandidateTable()
public void fillCompany()
public static void main(String args[])

DevelopmentTeam

DevelopmentTeam(String sTitle)
public static void main(String args[])

HelpCenter

HelpCenter(String sTitle)
public static void main(String args[])

ChangePassword
ChangePassword(String title)
public void actionPerformed(ActionEvent ae)
boolean checkPassword()
public static void main(String args[])

NewQualification
NewQualification(String sTitle)
public void
actionPerformed(ActionEvent ae)
public int getNewId()
public static void main(String args[])
IMPLEMENTATION AND TESTING

USER INTERFACES AND CODING DETAILS

1. Welcome

CODE:

import java.awt.*;
import java.awt.event.*;
import javax.swing.*;

public class Welcome extends JFrame implements Runnable


{
JLabel img,img1,img2,img3,img4,img5,img6,img7;
ImageIcon ic,ic1,ic2,ic3,ic4;
JProgressBar jp;
Container con;
int max=100;
int min=0;
int value;
Thread t;
Font f;
Color cf;
Color cb;
int incr=(max-min)/100;
public Welcome(String tit)
{
super(tit);
cf=new Color(0,64,200);
cb=new Color(210,210,166);
setSize(1024,768);

con= getContentPane();
con.setLayout(null);
t=new Thread(this);

ic= new ImageIcon("Images/welcome.jpg");


img= new JLabel(ic);
img.setBounds(80,255,400,280);
con.add(img);

ic2= new ImageIcon("Images/welcome1.jpg");


img4= new JLabel(ic2);
img4.setBounds(460,220,400,280);
con.add(img4);

Font f1 = new Font("Arial",Font.BOLD,12);


Color cf1=new Color(128,0,0);

img1=new JLabel("~: By :~");


img1.setFont(f1);
img1.setForeground(cf1);
img1.setBounds(840,570,350,20);
con.add(img1);

img5=new JLabel("Jitendra K. Pareek");


img5.setFont(f1);
img5.setForeground(cf1);
img5.setBounds(840,590,350,20);
con.add(img5);

img6=new JLabel("Reg No :~ 520689253");


img6.setFont(f1);
img6.setForeground(cf1);
img6.setBounds(840,610,350,20);
con.add(img6);

img7=new JLabel("LC - 01691");


img7.setFont(f1);
img7.setForeground(cf1);
img7.setBounds(840,630,350,20);
con.add(img7);

Font f = new Font("Arial Black",Font.BOLD,40);


img2=new JLabel("WELCOME TO");
img2.setFont(f);
img2.setForeground(cf);
img2.setBounds(335,60,350,50);
con.add(img2);

f = new Font("Arial Black",Font.BOLD,40);


img3=new JLabel("BLOSSOM PLACEMENT AGENCY");
img3.setFont(f);
img3.setForeground(cf);
img3.setBounds(120,145,780,50);
con.add(img3);

jp= new JProgressBar();


jp.setMaximum(max);
jp.setMinimum(min);
jp.setForeground(cf);
con.setBackground(cb);
t.start();

setVisible(true);

jp.setBounds(0,670,1025,30);
con.add(jp);

setLocation(0,0);

addWindowListener(new WindowAdapter()
{
public void windowClosing(WindowEvent we)
{
System.exit(0);
}
});
}
public void run()
{
try
{
for(int i=0;i<100;i++)
{
Thread.sleep(60);
value= value + incr;
jp.setValue(value);
}
}
catch(InterruptedException e)
{
System.out.println("Error:"+e);
}
end();
}
public void end()
{
dispose();
new Login(" ~: User Login :~ ");

}
public static void main(String args[])
{
new Welcome("~:Welcome To BLOSSOM PLACEMENT AGENCY:~");

}
}
SYSTEM STUDY

 FEASIBILITY STUDY

 TECHNICAL FEASIBILITY

 ECONOMICAL FEASIBILITY

 SCHEDULE FEASIBILITY

SYSTEM TESTING
TESTING: -A testing technique is in which participant’s examine program code for
predictable language specific errors.
Inspection is formal group activities where participants manually examine code for
occurrence of well-known errors. There are four type of testing.

Testing

Integration System
TUnit
ESTING :
Testing
Testing Testing
Stub Testing

 UNIT TESTING- Each module is tested alone in an attempt to discover any error
White
in its code. Black Box
Box/Glassbox Interface
/Functional Alpha Testing Beta Testing
/Structure
 INTIGRATION Testing
TestingTESTING-Integration testing gradual first we test the
Testing
coordinating modules (root modules in a structure tree), and only one of its
subordinates modules. After the first test, we add one or two other subordinates
modules from the same levels.
Once the program has been tested with the coordinating module and all of its
immediately subordinates modules. We add module from next level and then we
test the program. We continue this procedure until the entire program has been
tested.
MAINTENANCE:

Maintenance

Corrective Adaptive Perfective Preventive


Maintenance Maintenance Maintenance Maintenance

Maintenance:- the changes made to a system to fix or enhance its functionality.

There are four types of maintenance as below:

1) corrective maintenance:-the changes made to a system to repair


flaws in its design ,coding or implementation.
2) Adaptive maintenance:- the changes made to a system to evolve
its functionality to changing business needs or technology.
3) Perfective maintenance:-the changes made to a system to add
new features are to improve performance.
4) Preventive maintenance:-the preventive maintenance changes
made to a system to avoid possible futures problems.
SECURITY MECHANISM

In today’s scenario security is a very important aspect for every system to provide a
safe working environment and prevent unauthorized access Or misuse of data.
In this project LoginId and password has been in corporate to ensure authorized Administrator and Customer access the system.
A Employee who does not have the LoginId and password needs to register to be able to make use of the system.

OVERVIEW OF EXISTING SYSTEM


The Current System is a manual system, which is not totally computerized especially

placement services. The system takes lots of time in performing different activities, and

there is no data handling. There is no integration in the current system upon common data

format. There is no report generation of the particular candidate and company details.

LIMITATIONS IN EXISTING SYSTEM

• Very slow process and manually system


• Need to search to search the entire database for a single record access.
• Data Handling is difficult in the current system
PROPOSED SYSTEM
This maintains and controls the job requirement and company needs. This system allows
multi-divisional, multi-department system handling that includes various activities. In
this system it gives the entire reports of the candidate and company searched details.
This system can be used as an application for the placement agency and professionals to
manage the job requirement information. Employee logging should be able to upload the
information of the any professional and companies. Administrator representatives log in
may also access, search and update any information of proessionals, companies related
to jobs.

The purpose of the Blossom Placement Agency Project is to maintains and controls the
Job Requirement Informations details and generates various reports for the
professionals and companies.

This project is aimed to automate the operations of Placement Service Management


system. The system is an application that can be accessed in the organization as well with
proper login provided, which will give better service to the employees.

ADVANTAGES OVER EXISTING SYSTEM


• Data Accessing is very fast in this system
• Data is maintained in centralized manner
• Record accessing from the database is easy
• This system provides automated operations
BIBLIOGRAPHY

1. Complete Reference [Herbert Schildt.]

2. Java 2 [E.Balagurusamy.]

3. Java 2 [Dr. K. Swomesundram]

4. How to Program in Java [Dietel & Dietel]

-----------------------********-----------------------

5th Mile, Tadong, Gangtok – 737102 Sikkim.

Вам также может понравиться