Вы находитесь на странице: 1из 61

CHAPTER-1

1. INTRODUCTION

1.1

INTRODUCTION & OBJECTIVE


The objective of the project is to develop a system that retrieves information and

documents very efficiently and which limits the number of returned documents by performing an intelligent search procedure. The purpose is to design a system that displays only relevant information to the user, by suppressing unnecessary and irrelevant information. Suppose there is a store of documents and a person (user of the store) formulates a question (request or query) to which the answer is a set of documents satisfying the information need expressed by his question. Solution: User can read all the documents in the store retain the relevant documents and discard all the others Perfect Retrieval.

The problem of IR:

 Document and query indexing  How to best represent their contents?  Query evaluation (or retrieval process)
1
Restrained Netting 08M21AO5B5

 To what extent does a document correspond to a query?  System evaluation  How good is a system?  Are the retrieved documents relevant? (precision)  Are all the relevant documents retrieved? (recall) Input:  The main problem here is to obtain a Representation of each Document and Query suitable for a computer to use.  Most Computer-Based Retrieval Systems store only a representation of the Document (or Query)  Implies actual text is lost, an artificial language used instead.  User needs to be taught to express his information need in the language.  The main problem here is to obtain a Representation of each Document and Query suitable for a computer to use.  Most Computer-Based Retrieval Systems store only a representation of the Document (or Query)  Implies actual text is lost, an artificial language used instead.  User needs to be taught to express his information need in the language.  The document representative consists of a list of class names, each name representing a class of words occurring in the total input text.  A document will be indexed by a name if one of its significant words occurs as a member of that class. Text Processing System: Such system will consist of three parts:  Removal of high frequency words  Suffix stripping  Detecting equivalent stems Removal of High Freq words:  One way of implementing Luhns upper cut-off.  Maintain list of stop list; compare and remove
2
Restrained Netting 08M21AO5B5

 Document size reduces by 30 to 50 % Suffix stripping more involved  Complete list of suffixes; match and remove the longest possible one.  Context free removal leads to Error : Removing UAL from FACTUAL and EQUAL  Solution : Have some rules Equivalent Stems:  Map to same morphological form on removal of suffixes.  Other kinds, which do not match on mere removal of suffixes. (ABSORB- and ABSORPT-)  For these, a list of equivalent stem-endings is maintained. (For e.g. B and PT are equivalent stem ending) The final output from a conflation algorithm is a set of classes, one for each stem detected. A class name is assigned to a document if and only if one of its members occurs as a significant word in the text of the document. A document representative then becomes a list of class names. These are often referred to as the documents index terms or keywords. Queries: Queries are handled in the same way.

1.2.

EXISTING SYSTEM

Traditional Restrained Netting consult databases of the most frequently used words in documents, such as words drawn from documents title and first few sentences, hence they won't retrieve documents in which the keywords for which one is searching are buried somewhere within document. They are useful only for searching specific information in World Wide Web (WWW). Many page authors send Confined Web Spider numerous web pages containing various tricks like irrelevant title tag or repeating certain words in first few levels that are irrelevant to actual contents of the page, to boost the ratings. It might lead to situation where in not even one of the top ten sites listed would be of subject you would expect. Anyone can put up a webpage .Results can return academic results or internet gossip. HTML doesn't provide any standard method to identify contents of documents; it is extremely difficult for Confined Web
3
Restrained Netting 08M21AO5B5

Spider to identify contents of web page to index them. As World Wide Web seems to be ever expanding, with increasing threat to quality of information available on the web

1.3.

PROPOSED SYSTEM XML (extended Markup Language) is a simplified language of the mother of all document defining language, SGML (Standardized General Markup Language ) though XML is not as powerful as SGML but much easier to use . Developing web pages using XML is much similar to HTML but provides author with ability to invent their own tags, the tag names and what they mean are left to author to define depending on subject matter. The most important thing about XML is it allows more details to be included in document, searching for specific topics should become more accurate avoiding many mismatches. This application automates the process of sending queries to these websites using advanced technology and presents the search result from all the sites to the user. It is a Confined Web Spider developed for easy search. This Confined Web Spider software is developed using state of art, high calibrated. It is very much operational with current technologies and practices. In addition, the user interface provided in this application will make user / administrator more comfortable with all the complex tools at his/her easy disposal. Implementation of the Confined Web Spider software tool in any organization website is very much practical as it doesnt demand any other external resources or components.

4
Restrained Netting 08M21AO5B5

CHAPTER-2 2. SYSTEM SPECIFICATION

2.1 FUNCTIONAL REQUIREMENTS :


This application consists following modules.

1. Administrator Module 2. User module 3. Products module 4. Jobs module 5. Yellow pages module 6. Resume module
2.1.1 Administrator Module:
This module is about an Administrator who maintains this application. This module allows Administrator to add all objects to this application. The entire application is under control of an Administrator. The administrator has authority to add details of data which is presented in the database.

2.1.2 User Module:


This module is about user. Through this module the user can view all the functionalities of an application and one can search for required products, and jobs etc. Users can post his /her resumes by registering in this application.

5
Restrained Netting 08M21AO5B5

2.1.3 Products Module:


This module is about product. User can search products here .The products that are added by the administrator are displayed. Through this module the user can view the functionalities of product with respect to the price of the product.

2.1.4 Jobs Module:


This module is about jobs. Through this module the user can view all the jobs application desired by the. Users can post his /her resumes by registering in this application .The user can search jobs based on the selected criteria such as experience, location, part time, full time etc.

2.1.5 Yellow Pages Module:


This module is about yellow pages. Through this module the user can view all the details of an applicant and one can search the details of applicants, and also other details of applicants etc. This module maintains details of companies and organizations who provide services of various types and sectors.

2.1.6 Resume Module:


This module is about resume. Through this module the administrator can view the resumes of applicants. Applicants can post his /her resumes by registering in this application This module provides resume services. Through this module the registered applicants can post their resumes.

6
Restrained Netting 08M21AO5B5

2.2 HARDWARE REQUIREMENTS:


Pentium processor RAM Capacity Hard Disk CD-ROM Drive Keyboard Mouse Monitor : : : : : : : 233 MHZ 28M 20GB 32 HZ 108 Standard Optical 15 Color Monitor

2.3 SOFTWARE REQUIREMENTS

Operating System Technology Web Technologies IDE Web Server Database

: Windows : Java/J2EE : Html, JavaScript, CSS : My Eclipse : Tomcat : XML


7

Restrained Netting

08M21AO5B5

Java Version

: J2SDK1.5.

CHAPTER-3 3. LANGUAGE SPECIFICATIONS

3.1. INTRODUCTION TO JAVA About Java:

Initially the language was called as oak but it was renamed as java in 1995.The primary motivation of this language was the need for a platform-independent(i.e. architecture neutral)language that could be used to create software to be embedded in various consumer electronic devices. Java is a programmers language Java is cohesive and consistent Except for those constraint imposed by the Internet environment. Java gives the programmer, full control Finally Java is to Internet Programming where c was to System Programming.

3.1.1 Importance of Java to the Internet


Java has had a profound effect on the Internet. This is because; java expands the Universe of objects that can move about freely in Cyberspace. In a network, two categories of objects are transmitted between the server and the personal computer. They are passive information and Dynamic active programs. in the areas of Security and probability. But Java addresses these

8
Restrained Netting 08M21AO5B5

concerns and by doing so, has opened the door to an exciting new form of program called the Applet.

3.1.2 Applications and applets


An application is a program that runs on our Computer under the operating system of that computer. It is more or less like one creating using C or C++ .Javas ability to create Applets makes it important. An Applet I san application, designed to be transmitted over the Internet and executed by a Java-compatible web browser. An applet I actually a tiny Java program, dynamically downloaded across the network, just like an image. But the difference is, it is an intelligent program, not just a media file. It can be react to the applicant input and dynamically change.

3.1.3 Java Architecture


Java architecture provides a portable, robust, high performing environment for development. Java provides portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted on each platform by the run-time environment. Java is a dynamic system, able to load code when needed from a machine in the same room or across the planet.

3.1.4 Compilation of code


When you compile the code, the Java compiler creates machine code (called byte code)for a hypothetical machine called Java Virtual Machine(JVM). The JVM is supposed t executed the byte code. The JVM is created for the overcoming the issue of probability. The code is written and compiled for one machine and interpreted on all machines .This machine is called Java Virtual Machine.

9
Restrained Netting 08M21AO5B5

3.1.5 Compiling and interpreting java source code

Pc compiler Macintosh compiler Source code

Java Byte code

Java interpreter

SPARC Compiler

Platform independ ent

Java interpreterm acintosh Java interpreter( SPARC)

During run-time the Java interpreter tricks the byte code file into thinking that it is running on a Java Virtual Machine. In reality this could be an Intel Pentium windows 95 or sun SPARCstation running Solaris or Apple Macintosh running system and all could receive code from any computer through internet and run the Applets.

3.2 Servlets/JSP INTRODUCTION

10
Restrained Netting 08M21AO5B5

A Servlet is a generic server extension. a Java class that can be loaded Dynamically to expand the functionality of a server. Servlets are commonly used with web servers. Where they can take the place CGI scripts. A servlet is similar to proprietary server extension, except that it runs inside a Java Virtual Machine (JVM) on the server, so it is safe and portable Servlets operate solely within the domain of the server. Unlike CGI and Fast CGI, which use multiple processes to handle separate program or separate requests, separate threads within web server process handle all servlets. This means that servlets are all efficient and scalable. Servlets are portable; both across operating systems and also across web servers. Java Servlets offer the best possible platform for web application development. Servlets are used as replacement for CGI scripts on a web server, they can extend any sort of server such as a mail server that allows servelts t extend its functionality perhaps by performing a virus scan on all attached documents or handling mail filtering tasks. Servlets provide a Java-based solution used to address the problems currently associated with doing server-side programming including inextensible scripting solutions platform-specific APIs and incomplete interface. Theyre faster and cleaner then CGI scripts They use a standard API( the servlet API) They provide all the advantages of Java (run on a variety of servers without needing to be rewritten)

3.2.1 Advantages of the servlet API


One of the great advantages of the servlet API is protocol independent. It assumes nothing about: The protocol being used to transmit on the net How it is loaded
11
Restrained Netting 08M21AO5B5

The server environment it will be running in These quantities are important, because it allows the Servlet API to be embedded in many different kinds of servers. There are other advantages to the servelt API as well These include: Its extensible-you can inherit all your functionality from the base classes made available to you

3.2.2 Features of Servlets


Servlets are persistent .Servlet are loaded only by the web server and can maintain services between requests. Servlets are fast. Since servlets only need to be l\loaded once, they offer much better performance over their CGI counterparts. Servlets are platform independent. Servlets are extensible Java is a robust, object-oriented programming language, which easily can be extended to suit your needs. Servlets are secure Servlets are used with a variety of client. Servlets are classes and interfaces from tow packages,javax .servlet and javax.servlet.http.The java.servlet package contains classes t support generic, protocol-independent servlets.The classes in the javax.servelt.http package To and HTTP specific functionality extend these classes

3.2.3 Loading Servlets


Servlets can be loaded from their places. From a directory that is on the CLASSPATH. The CLASSPATH of the Java Web Server includes service root/classes/, which is where the system classes reside From the <SERVICE_ROOT/servlets/directory.This is not in the servers classpath. A class loader is used to create servlets form this directory.New servlets can be added-existing servlets can be recompiled and the server will notice these changes. From a remote location.For this a

12
Restrained Netting 08M21AO5B5

code base like http://nine.eng/classes/foo/ is required in addition to the servlets class name.Refer to the admin Gui docs on servlet section to see how to set this up. Loading Remote Servlets Remote servlets can be loaded by: Configuring the admin Tool to setup automatic loading of remote servlets. Selecting up server side include tags in .html files

3.2.4 Invoking Servlets


A servlet invoker is a servlet that invokes the server method on a named servlet. If the servlet is not loaded in the server, then the invoker first loads the servlet(either form local disk or from the network) and the then invokes the service method. Also like applets,local servlets in the server can be identified by just the class name.In other words, if a servlet name is not absolute.it is treated as local. A Client can Invoke Servlets in the Following Ways: The client can ask for a document that is served by the servlet. The client(browser) can invoke the servlet directly using a URL, once it has been mapped using the SERVLET ALIASES Section of the admin GUI The servlet can be invoked through server side include tags. The servlet can be invoked by placing it in the servlets/directory The servlet can be invoked by using it in a filter chain

3.2.5 The Servlet Life Cycle


The Servlet life cycle is one of the most exciting features of Servlets. This life cycle is a powerful hybrid of the life cycles used in CGI programming and lower-level NSAPI and ISAPI programming. The servlet life cycle allows servlet engines to address both the performance and resource problems of CGI and the security concents of low level server API programming.

13
Restrained Netting 08M21AO5B5

Servlet life cycle is highly flexible Servers have significant leeway in how they choose to support servlets .The only hard and fast rule is that a servlet engine must conform to the following life cycle contact: Create and initialize the servlets Handle zero or more service from clients Destroy the servlet and then garbage Collects it. Its perfectly legal for a servlet be loaded, created an initialized in its own JVM, only to be destroyed an garbage collected without handling any client request or after handling just one request The most common and most sensible life cycle implementations for HTTP servelts are: Single java virtual machine and astatine persistence.

3.2.6 APPLICANT AUTHORIZATION


One way to perform session tracking is to leverage the information that comes with Applicant authorization. When a web server restricts access to some of its resources to only those clients that log in using a recognized applicant tname and password. After the client logs in, the applicant name is available to a servlet through getRemoteApplicant() Mean use the applicant name to track the session. Once a applicant has logged in, the browser remembers her applicant tname and resends the name and password as the applicant views new pages on the site. A servlet can identify the applicant through her applicantname and theyre by Track her session. The biggest advantage of using applicant authorization to perform session tracking is that its easy to implement. Simply tell the protect a set of pages, and use getRemoteApplicant() to identify each client.Another advantage is that the technique works even when the applicant accesses your site form or exists her browser before coming back. The biggest disadvantage of applicant authorization is that it requires each applicant to register for an account and then log in each time the starts visiting your site. Most applicants will tolerate
14
Restrained Netting 08M21AO5B5

registering and lagging in as a necessary evil when they are accessing sensitive information, but its all overkill for simple session tracking .Other problem with applicant authorization is that a applicant cannot simultaneously maintain more than one session at the same site.

3.3 JDBC

3 .3.1 What is JDBC?


Any relational database. One can write a single program using the JDBC API, and the JDBC is a Java API for executing SQL ,Statements(As a point of interest JDBC is trademarked name and is not an acronym; nevertheless, Jdbc is often thought of as standing for Java Database Connectivity. It consists of a set of classes and interfaces written in the Java Programming language .JDBC provides a standard API for tool/database developers and makes it possible to write database applications using a pure Java API Using JDBC, it is easy to send SQL statements to virtually program will be able to send SQL .statements to the appropriate database. The Combination of Java and JDBC lets a programmer writes it once and run it anywhere.

3.3.2 What Does JDBC Do?


Simply put,JDBC makes it possible to do three things o o o o o o Establish a connection with a database Send SQL statements Process the results JDBC Driver Types The JDBC drivers that we are aware of this time fit into one of four categories JDBC-ODBC Bridge plus ODBC driver
15
Restrained Netting 08M21AO5B5

o o o

Native-API party-java driver JDBC-Net pure java driver Native-protocol pure Java driver

An individual database system is accessed via a specific JDBC driver that implements the java.sql. Driver interface. Drivers exist for nearly all-popular RDBMS systems, through few are available for free. Sun bundles a free JDBC-ODBC bridge driver with the JDK to allow access to a standard ODBC, data sources, such as a Microsoft Access database, Sun advises against using the bridge driver for anything other than development and very limited development. JDBC drivers are available for most database platforms, from a number of vendors and in a number of different flavors.

3.3.3 JDBC-ODBC Bridge


If possible use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This completely eliminates the client configuration required by ODBC. It also eliminates the potential that the Java VM could be corrupted by an error in the native code brought in by the Bridge(that is, the Bridge native library, the ODBC driver manager library, library, the ODBC driver library, and the database client library)

3.3.4 What Is The JDBC-ODBE Bridge ?


The JDBC-ODBC Bridge is a Jdbc driver, which implements JDBC operations by translating them into ODBC operations. To ODBC it appears as a normal application program. The Bridge is implemented as the sun.jdbc.odbc Java package and contains a native library used to access ODBC.The Bridge is joint development of Inter solve and Java Soft

3.4 XML

16
Restrained Netting 08M21AO5B5

How Can XML be Used? XML is used in many aspects of web development, often to simplify data storage and sharing

3.4.1 XML Separates Data from HTML


If you need to display dynamic data in your HTML document, it will take a lot of work to edit the HTML each time the data changes. With XML, data can be stored in separate XML files. This way you can concentrate on using HTML for layout and display, and be sure that changes in the underlying data will not require any changes to the HTML. With a few lines of JavaScript code, you can read an external XML file and update the data content of your web page.

3.4.2 XML Simplifies Data Sharing


In the real world, computer systems and databases contain data in incompatible formats.XML data is stored in plain text format. This provides a software- and hardware-independent way of storing data. This makes it much easier to create data that can be shared by different applications

3.4.3 XML Simplifies Data Transport


One of the most time-consuming challenges for developers is to exchange data between incompatible systems over the Internet. Exchanging data as XML greatly reduces this complexity, since the data can be read by different incompatible applications

17
Restrained Netting 08M21AO5B5

3.4.4 XML Simplifies Platform Changes


Upgrading to new systems (hardware or software platforms), is always time consuming. Large amounts of data must be converted and incompatible data is often lost. XML data is stored in text format. This makes it easier to expand or upgrade to new operating systems, new applications, or new browsers, without losing data.

3.4.5 XML is Used to Create New Internet Languages


A lot of new Internet languages are created with XML
y y y y y y

XHTML WSDL for describing available web services WAP and WML as markup languages for handheld devices RSS languages for news feeds RDF and OWL for describing resources and ontology SMIL for describing multimedia for the web The first line is the XML declaration. It defines the XML version (1.0) and the encoding used (ISO-8859-1 = Latin-1/West European character set). The next line describes the root element of the document (like saying: "this document is a note"): And finally the last line defines the end of the root element:

3.5 HTML
Hypertext Markup Language(HTML), the languages of the world wide web(WWW), allows applicants to produces web pages that included text, graphics and pointer to other web pages (Hyperlinks).

18
Restrained Netting 08M21AO5B5

HTML is not a programming language but it is an application of ISO Standard 8879,SGML(Standard Generalized Markup Language),but Specialized to hypertext and adapted to the Web. The idea behind Hypertext one point to another point. We can navigate through the information based on out interest and preference. A markup language is simply a series of items enclosed within the elements should be displayed. Hyperlinks are underlined or emphasized works that load to other documents or some portions of the same document. Html can be used to display any type of document on the host computer, which can be geographically at a different location. It is a versatile language and can be used on any platform or desktop HTML provides tags(special codes) to make the document look attractive. HTML provides are not case-sensitive. Using graphics, fonts, different sizes, color, etc.. can enhance the presentation of the document. Anything That is not a tag is part of the document itself.

3.5.2 ADVANTAGES
A HTML document is small and hence easy to send over the net.It is small because it does not include formatted information. HTML is platform independent HTML tags are not case-sensitive.

3.6 JAVA SCRIPT


JavaScript is a compact, object-based scripting language for developing client and server internet applications. Netscape Navigator 2.0 interprets JavaScript statements embedded directly in an HTML page. and Livewire enables you to create server-based applications similar to common gateway interface programs.

19
Restrained Netting 08M21AO5B5

In a client application for Navigator, JavaScript statements embedded in an HTML Page can recognize and respond to applicant events such as mouse clicks form Input, and page navigation. For example, you can write a JavaScript function to verify that applicants enter valid information into a form requesting a telephone number or zip code . Without any network transmission, an Html page with embedded Java Script can interpret the entered text and alert the applicant with a message dialog if the input is invalid or you can use JavaScript to perform an action (such as play an audio file, execute an applet, or communicate with a plug-in) in response to the applicant opening or exiting a page.

CHAPTER -4 4. SYSTEM DESIGN

4.1.1 INTRODUCTION
System design is the process or art of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. One could see it as the application of systems theory to product development. There is some overlap and synergy with the disciplines of systems analysis, systems architecture and systems engineering. Systems design is the process of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. One could see it as the application of systems theory to product development. There is some overlap with the disciplines of systems analysis, systems architecture and systems engineering. If the broader topic of product development "blends the perspective of marketing, design, and manufacturing into a single approach to product development," then design is the act of taking the marketing information and creating the design of the product to be manufactured. Systems design is therefore the process of defining and developing systems to satisfy specified requirements of the applicant. Until the 1990s systems design had a crucial and respected role in the data processing industry. In the 1990s standardization of hardware and software resulted in the ability to build modular systems. The increasing importance of software running on generic platforms has enhanced the discipline of software engineering. Object-oriented analysis and design methods are becoming the most widely used methods for computer systems design. The UML has become the standard language in object-oriented
20
Restrained Netting 08M21AO5B5

analysis and design. It is widely used for modeling software systems and is increasingly used for high designing non-software systems and organizations.

4.1.2 Logical design


The logical design of a system pertains to an abstract representation of the data flows, inputs and outputs of the system. This is often conducted via modelling, using an over-abstract (and sometimes graphical) model of the actual system. In the context of systems design are included.

4.1.3Physical design
The physical design relates to the actual input and output processes of the system. This is laid down in terms of how data is input into a system, how it is verified/authenticated, how it is processed, and how it is displayed as output. Physical design, in this context, does not refer to the tangible physical design of an information system. To use an analogy, a personal computer's physical design involves input via a keyboard, processing within the CPU, and output via a monitor, printer, etc. It would not concern the actual layout of the tangible hardware, which for a PC would be a monitor, CPU, motherboard, hard drive, modems, video/graphics cards, USB slots, etc. it involve detail design of applicant and a product database structure processing and control processor .The H/S personal specification a develop for the proposed system .

4.2 DATA FLOW DIAGRAMS

4.2.1 Context Diagram:

Context Diagram:
S E End User

Restrained Netting Web Confined Spider


Administrator 21
Restrained Netting

A R C H
08M21AO5B5

websites database

4.2.2 Top Level Diagram:

Password info

Keyword User System Validation Administrator

Admin
Search Process

Password modify

New Web Site

22
Restrained Netting 08M21AO5B5

Search Result

Password info

websites Database

4.2.3 Low Level Diagram-Applicant

Websites database

Keyword User
Search process

Search Result

23
Restrained Netting 08M21AO5B5

4.2.4 Low Level Diagram-Administrator

Administrator

Password Info

Validation

Valid

Invalid Applicant Password modificatio


Restrained Netting

Website db New/modif 24 Login


08M21AO5B5

Password info database

Websites

4.3 UML DIAGRAMS

Unified Modeling Language


The Unified Modeling Language allows the software engineer to express an analysis model using the modeling notation that is governed by a set of syntactic semantic and pragmatic rules. A UML system is represented using five different views that describe the system from distinctly different perspective. Each view is defined by a set of diagram, which is as follows. y Applicant Model View

i. This view represents the system from the applicants perspective. ii. The analysis representation describes a usage scenario from the end-applicants perspective. y Structural model view

i. In this model the data and functionality are arrived from inside the system. ii. This model view models the static structures. y Behavioral Model View It represents the dynamic of behavioral as parts of the system, depicting the interactions of collection between various structural elements described in the applicant model and structural model view. y Implementation Model View
25
Restrained Netting 08M21AO5B5

In this the structural and behavioral as parts of the system are represented as they are to be built. y Environmental Model View In this the structural and behavioral aspects of the environment in which the system is to be implemented are represented. UML is specifically constructed through two different domains they are:  UML Analysis modeling, this focuses on the applicant model and structural model views of the system.  UML design modeling, which focuses on the behavioral modeling, implementation of modeling.

UML DIAGRAMS 4.3.1 Use Case Diagrams For Administrator

26
Restrained Netting 08M21AO5B5

In this diagram one actor that is admin and fourteen use cases that are login, address, product, job, yellow pages, resumes, logout, adding address, deleting address, add product, modify product, delete product, add jobs and delete jobs. Admin has association relationship with all the usecases

4.3.2 Use Case Diagrams For User

27
Restrained Netting 08M21AO5B5

In this diagram one actor that is admin and thirteen use cases that are registrations, login, change password, advance searching , select topic, search, mailing, banking, component, careers, product, website url, search keyword . Admin has association relationship with all the usecases.

4.3.3Class Diagram:

28
Restrained Netting 08M21AO5B5

In this class diagram we have twenty four classes that are GUI component, menu, input screen, option screen, report, data store, urls information, global info, administrator information, add reports, user information, keyword information, address, data manipulation, registration, change pwd, option , product , yellow pages, login, validation, address, products, jobs , and resumes. GUI has association relationship with input screen, optional screen and reports. GUI has dependency relationship with data manipulation. Data store has dependency relationship with data manipulation.

4.3.4 Activity Diagram

29
Restrained Netting 08M21AO5B5

In this activity diagram, initial state and final state are used between which action states are used that are register, login, customer options, options, post resumes, view jobs, view product, advanced searching, topic wise search, yellow pages, view jobs and a rhombus is used which indicates whether the customer is valid or not. If he is valid following operations take place, if not it will not be validated.

4.3.5 Sequence Diagram


30
Restrained Netting 08M21AO5B5

In this sequence diagram, eight objects are used that are login, menu, address, products, jobs, yellow pages, resume, sign out, Administrator has login with user name and performed the operations like invalidation, adding urls, adding new product info, adding new category job, back to menu, adding new address of city, back home, verifying resumes and add in application, returning to home page

4.3.6 Collaboration Diagram

31
Restrained Netting 08M21AO5B5

In this collaboration diagram, eight objects are used that are login, menu, address, products, jobs, yellow pages, resume, sign out, Administrator has login with user name and performed the operations like invalidation, adding urls, adding new product info, adding new category job, back to menu, adding new address of city, back home, verifying resumes and add in application, returning to home page

4.3.7 State Diagram for Administrator:

32
Restrained Netting 08M21AO5B5

In this diagram, three actions states that are state unauthentication, validation, authentication. It explains the flow of events between the action states that are user id , password, if the process is valid then it proceeds else it goes for validation again.

33
Restrained Netting 08M21AO5B5

CHAPTER-5 5. SYSTEM TESTING


5.1 INTRODUCTION TO TESTING
Testing is a process, which reveals errors in the program. It is the major quality

measure employed during software development. During software development. During testing, the program is executed with a set of test cases and the output of the program for the test cases is evaluated to determine if the program is performing as it is expected to perform.

5.2 TESTING IN STRATEGIES


In order to make sure that the system does not have errors, the different levels of testing strategies that are applied at differing phases of software development are:

5.2.1Unit Testing
Unit Testing is done on individual modules as they are completed and become executable. It is confined only to the designer's requirements. Each module can be tested using the following two Strategies:

5.2.2Black Box Testing


In this strategy some test cases are generated as input conditions that fully execute all functional requirements for the program. This testing has following categories: Incorrect or missing functions Interface errors Errors in data structure or external database access Performance errors
34
Restrained Netting 08M21AO5B5

been uses to find errors in the

Initialization and termination errors. In this testing only the output is checked for correctness. The logical flow of the data is not checked.

5.2.3White Box testing


In this the test cases are generated on the logic of each module by drawing flow graphs of that module and logical decisions are tested on all the cases. It has been uses to generate the test cases in the following cases:  Guarantee that all independent paths have been Executed.  Execute all logical decisions on their true and false Sides.  Execute all loops at their boundaries and within their operational bounds  Execute internal data structures to ensure their validity.

5.2.4 Integrating Testing


Integration testing ensures that software and subsystems work together a whole. It tests the interface of all the modules to make sure that the modules behave properly when integrated together.

5.2. 5 System Testing


Involves in-house testing of the entire system before delivery to the applicant. It's aim is to satisfy the applicant the system meets all requirements of the client's specifications.

5.2.6 Acceptance Testing


It is a pre-delivery testing in which entire system is tested at client's site on real world data to find errors. Test Approach :

35
Restrained Netting 08M21AO5B5

5.2.7 Testing can be done in two ways:


Bottom up approach Top down approach

5.2.8 Bottom up Approach


Testing can be performed starting from smallest and lowest level modules and proceeding one at a time. For each module in bottom up testing a short program executes the module and provides the needed data so that the module is asked to perform the way it will when embedded with in the larger system. When bottom level modules are tested attention turns to those on the next level that use the lower level ones they are tested individually and then linked with the previously examined lower level modules.

5.2.9 Top down approach:


This type of testing starts from upper level modules. Since the detailed activities usually performed in the lower level routines are not provided stubs are written. A stub is a module shell called by upper level module and that when reached properly will return a message to the calling module indicating that proper interaction occurred. No attempt is made to verify the correctness of the lower level module.

5.2.10 Validation
The system has been tested and implemented successfully and thus ensured that all the requirements as listed in the software requirements specification are completely fulfilled. In case of erroneous input corresponding error messages are displayed

36
Restrained Netting 08M21AO5B5

CHAPTER-6 6.RESULTS

SCREENS:

Introduction page

37
Restrained Netting 08M21AO5B5

Advanced panel

38
Restrained Netting 08M21AO5B5

Product panel

39
Restrained Netting 08M21AO5B5

Registration form for product panel

40
Restrained Netting 08M21AO5B5

Job panel

41
Restrained Netting 08M21AO5B5

Registration form for job panel

42
Restrained Netting 08M21AO5B5

Database for job panel

43
Restrained Netting 08M21AO5B5

Yellow pages

44
Restrained Netting 08M21AO5B5

Registration form for yellow pages

45
Restrained Netting 08M21AO5B5

Placement panel

46
Restrained Netting 08M21AO5B5

Post Resume

47
Restrained Netting 08M21AO5B5

Login of applicant

48
Restrained Netting 08M21AO5B5

Registration of new applicant

49
Restrained Netting 08M21AO5B5

Registration completed

50
Restrained Netting 08M21AO5B5

Administrator login

51
Restrained Netting 08M21AO5B5

Retrieve password

52
Restrained Netting 08M21AO5B5

Attaching Resume

53
Restrained Netting 08M21AO5B5

Post of Resume

54
Restrained Netting 08M21AO5B5

Adding up of new URLS

55
Restrained Netting 08M21AO5B5

Adding up of categories

56
Restrained Netting 08M21AO5B5

Adding of job details

57
Restrained Netting 08M21AO5B5

Adding of yellow pages

58
Restrained Netting 08M21AO5B5

Adding of Resumes

59
Restrained Netting 08M21AO5B5

CHAPTER 7

7. CONCLUSION AND FUTURE WORK

It has been a great pleasure for me to work on this exciting and challenging project. This project proved good for me as it provided practical knowledge to develop a system that retrieves information and documents very efficiently and which limits the number of returned documents by performing an intelligent search procedure. The purpose is to design a system that displays only relevant information to the applicant, by suppressing unnecessary and irrelevant information. It also provides knowledge about the latest technology used in developing web enabled application and client server technology that will be great demand in future. This will provide better opportunities and guidance in future in developing projects independently.

BENEFITS: The project is identified by the merits of the system offered to the applicant. The merits of this project are as follows: y y Its a web-enabled project. This project offers applicant to enter the data through simple and interactive forms. This is very helpful for the client to enter the desired information through so much simplicity. y The applicant is mainly more concerned about the validity of the data, whatever he is entering. There are checks on every stages of any new creation, data entry or updation so that the applicant cannot enter the invalid data, which can create problems at later date. y Decision making process would be greatly enhanced because of faster processing of information since data collection from information available on computer takes much less time than manual system.

60
Restrained Netting 08M21AO5B5

CHAPTER -8 8.BIBLIOGRAPHY

R e fe r e nc e s

fo r

t he

P r o je c t

D e ve lo p m e nt

w er e

Taken

Fro m

t he

fo l lo w i n g B o o k s a nd We b S it e s .

[1] JAVA Technologies: By Doug Tidwell [2] JAVA Complete Reference: By Herbert Shildt [3] Java Script Programming : By Yehuda Shiran [4] JAVA2 Networking : By Pistoria [5] JAVA Security : By Scotl oaks [6] J2EE : J2EE Professional by Shadab siddiqui [7] JAVA server pages : By Larne Pekowsley [8] HTML : The Complete Reference by Thomas A. Powell [9] JDBC : Java Database Programming with JDBC by Patel moss. [10] Software Engineering : By Roger Pressman

61
Restrained Netting 08M21AO5B5

Вам также может понравиться