ABSTRACT Hostel management by desktop application is tedious process, since it involves work load and time consumption. The project entitled “ Visitor management system ” will be developed in such a way that users will be able to use the system online. In this system, we can easily manage the hostel details, room details, student records, mess expenditure, mess bill calculation, ca lculation, easy eas y way o room allocation and hostel attendance. att endance. The main eature o this project is easy to allocate or the student and also easy to calculate mess bill. This project project is carried out using !H! as ront ront end and "y#$% "y#$% as back end. "ain objective o this project is to provide solution or hostel to manage most there work using comput computeri& eri&ed ed process process.. This This sotwa sotware re applica applicatio tion n will will help help admin admin to handle handle studen student' t'ss inorm inormatio ation, n, room room alloca allocatio tion n details details,, paymen paymentt details details,, billin billing g inorm inormatio ation n etc. etc. Hostel Hostel management gives on idea about how the student's details, room allocation, mess expenditure are maintained in the particular concern. The The (isito sitorr mana manage geme ment nt syst system em also also incl includ udes es some some spec specia iall eat eatur ures es.. The The administration has the uni)ue identity or each members as well as students details. The stock management management has also held by mess expenditure, expenditure, the mess expenditure expenditure that used to calculate calculate the mess bills o each o the students. The modules o this project are student details, attendance details, room details, mess modules.
1. INTRODUCTION 1.1 ABOUT THE PROJECT (isitor (isitor management management system is the system that manages manages the student student data, sta data students' admission process and create receipt or the ees paid by the student who stay in the hostel and also help in maintaining visitor's messages. Hostel management using a desktop application system is an onerous and time consuming process involving heavy workload. In the proposed system, one can easily manage the various unctions o a hotel in an eicient manner. manner. Things Things like, hostel details, student records, mess expenditure expenditure can be calculated and allocated in an optimi&ed manner. The key eature o this project is to easily allocate rooms and expenditures o a student. The ront end o the project has been created using !H! and the back end using "y#$%. Hostel management deals with the many unctions o a hostel, namely* student details details,, room room allocat allocation ion,, mess mess expend expenditu iture, re, etc. the system system also includes includes a ew special special eature eaturess such such as creatin creating g uni)ue uni)ue identitie identitiess or each member memberss so studen studentt details details can be accessed easily. eas ily. This system can also be used or stock management. The modules o this project include* student details, attendance details, room details, mess modules. Things like, hostel details details,, studen studentt records records,, mess mess expend expenditu iture re may be calcula calculated ted associa associated ted allotte allotted d in an opti optimi mi&e &ed d mann manner er.. The The key key eat eatur uree o this this proj projec ectt is to simp simply ly port portio ion n room roomss and and expenditures o a student. Things Things like, like, hostel hostel details details,, studen studentt record records, s, mess mess expend expenditu iture re will will be calcula calculated ted associate degrees allotted in an optimi&ed manner. The key eature o this project is to simply appo apporti rtion on room roomss and and expe expend nditu itures res o a stude student nt.. This This syste system m may be used used or or stoc stock k management. The system additionally includes a number o special options like making distinctive identities or every member thus student details will be accessed simply. The input )uality o this mission is to simply assign )uarters and expenditures o learner.
1.2 SSTE! SPECI"ICATION 1.2.1 HARD#ARE CON"I$URATION
+!
* Intel +ore i-
/"
* -0"1
Hard 2isk
* 3 41
"onitor
* 56 %4
"ouse
* %ogitech mouse
7eyboard
* 589 7eys
"other 1oard
* Intel
#peed
* -.- 4H:
;loppy 2isk 2rive
* 0"1
1.2.2 SO"T#ARE SPECI"ICATION
* =i =indows >
;ront ?nd
* !H!
1ack ?nd
* "y#
%$eports
* 2ata eport
1.% SO"T#ARE SO"T#ARE "EAT " EATURES URES 1.%.1 "RONT END &PHP'
!H! web development means developing websites and dynamic web pages using the versatile and capable server@side scripting language, !H!. It oers a plethora o beneits. Aot only is it open@source open@source but also eature@rich eature@rich and has all the unctionality unctionality that a proprietary proprietary or paid scripting language would oer. Here are a ew beneits that have made !H! web development so sought ater. "ree o( Cost
!H! is open source and is developed and updated by a community o developers rom around the globe. Thereore, all its components are ree to use and distribute. Ca)a*+e
It can be used to design any type o website and can handle websites with a lot o traic. ;acebook, Twitter, =ikipedia and many other very widely visited websites use it as their ramework. /nd because it is server@side scripting, it can do anything that other +4I programs can do. Easy
It has a readable and easily understandable syntax. Its code is embedded in the HT"% source code and it is based on +B+CC. Thereore, it is very amiliar and programmers are very comortable coding with it. P+at(orm In,e)en,ent
It can can be run run on all majo majorr opera operati ting ng syste systems ms like like %inu %inux, x, AID AID,, "ac "ac <# and and =indows. S-))orts A++ !aor #e* Ser/ers
It supports all major web servers like /pache, "icrosot II#, Aetscape, personal webserver, i!lanet server, etc.
S-))orts A++ !aor Data*ases
IT supports all major databases including "y#$%, d1ase, I1" 210, Inter1ase, ;ront1ase, <21+, !ostgre#$%, #$%ite, etc. "aster De/e+o)ments
It uses its own memory space and thus decreases the loading time and workload rom the server. The processing speed is ast and web applications like ?commerce, +", +"# and ;orums are also developed aster by it. Se0-re
It has multiple layers o security to prevent threats and malicious attacks. arge Comm-nities
It has a large community o developers who regular and timely updates tutorials, documentation, online help and ;/$s. ;/$s. Pro/en an, Tr-ste,
It is being used since close to two decades now since its inception in 5EE3. It is trusted by thousands o websites and developers and the list is increasing day by day. It has also proven its capability and versatility vers atility by developing and maintaining some o the most highly visited and popular websites. Conne0tion an,+ing
Internally in !H! a connection status is maintained. There are 9 possible states* • • • •
8 @ A<"/% 5 @ /1<T?2 0 @ TI"?<T - @ /1<T?2 and TI"?<T
=hen a !H! script is running normally, the A<"/% state is active. I the remote client disconnects, the /1<T?2 /1<T?2 state lag is turned on.
/ remote client disconnect is usually caused by the user hitting his #T
1.%.2 BAC5 END &!yS6'
"y#$% is a relational database system. I one can believe many diehard "y#$% ans, "y#$% is aster, more reliable, and cheaper @@ or, simply put, better @@ than any other database system Fincluding commercial systems such as "y#$% and 210. "any "y#$% opponents continue to challenge this viewpoint, going even so ar as to assert that "y#$% is not even a relational database system. system. "eat-res o( !yS6
The ollowing list shows the most important properties o "y#$%. This section is directe directed d to the reader reader who already already has some some knowle knowledge dge o relatio relational nal databa databases. ses. #ome #ome terminology will be used rom the relational database world without deining the terms exactly.
%ike almost all other database systems on the market, "y#$% is a relational database system. S6 0om)ati*i+ity
"y#$% supports as its database language @@ as its name suggests #$% F#tructured $uery %anguage. #$% is a standardi&ed language or )uerying and updating data and or the administration o a database. There are several #$% dialects Fabout as many as there are database systems. "y#$% adheres to the current #$% standard Fat the moment #$%*088-, altho althoug ugh h with with signi signii ica cant nt restri restricti ction onss and and a larg largee numb number er o exte extens nsio ions ns.. Thro Throug ugh h the the coniguration setting s)l@mode one can make the "y#$% server behave or the most part compatibly with various database systems. /mong these are I1" 21B0 and "y#$%. " y#$%. S-*SEECTs
#ince version 9.5, "y#$% is capable o processing a )uery in the orm #?%?+T J ;<" table5 =H?? x IA F#?%?+T y ;<" table0 FThere are also numerous syntax variants or sub#?%?+Ts.
C+ient7Ser/er Ar0ite0t-re
"y#$% "y#$% is a clientBserver system. system. There is a database server F"y#$% and arbitrarily many clients Fapplication programs, which communicate with the serverK that is, they )uery data, save changes, etc. The clients can run on the same computer as the server or on another computer Fcommunication via a local network or the Internet. /lmost all o the amiliar large l arge database systems F"y#$%, "icrosot #$% #erver, etc. are clientBserver systems. These are in contrast to the ile@server systems, which include "icrosot /ccess, d1ase and ;ox!ro. The decisive drawback to ile@server systems is that when run over a network, they become extremely ineicient as the number o users grows. Vie8s
!ut simply, simply, views relate to an #$% )uery that is viewed as a distinct distinct database object and makes possible a particular view o the database. "y#$% has supported views since version 3.8. Store, )ro0e,-res
#tored procedures F#!s or short are generally used to simpliy certain steps, such as inserting or deleting a data record. ;or client programmers this has the advantage that they do not have to process the tables directly, but can rely on #!s. %ike views, #!s help in the admini administra stratio tion n o large large databa database se project projects. s. #!s can also increas increasee eicie eiciency ncy.. "y#$% "y#$% has supported #!s since version 3.8. Triggers
Triggers Triggers are #$% commands commands that are automatically automatically executed executed by the server in certain database operations FIA#?T, !2/T?, and 2?%?T?. "y#$% has supported triggers in a limited orm rom version 3.8, and additional unctionality is promised or version 3.5. Uni0o,e
"y#$% has supported all conceivable character sets since version 9.5, including %atin@5, %atin@0, and nicode Feither in the variant T;L or +#0.
User inter(a0e
There are a number o convenient user interaces or administering a "y#$% server. "-++9te3t sear0
;ull@text search simpliies and accelerates the search or words that are located within a text ield. I one employ "y#$% or storing text Fsuch as in an Internet discussion group, one can use ull@text search to implement simply an eicient search unction. Re)+i0ation
eplication allows the contents o a database to be copied Freplicated onto a number o computers. In practice, this is done or two reasons* to increase protection against system ailure Fso that i one computer goes down, another can be put into service and to improve the speed o database )ueries. $IS (-n0tions
#inc #incee versi version on 9.5, 9.5, "y#$ "y#$% % has has supp suppor orte ted d the the storin storing g and and proc proces essin sing g o two@ two@ dimensional geographical data. Thus "y#$% is well suited or 4I# Fgeographic inormation systems applications. Programming +ang-ages
There are )uite a number number o /!Is /!Is Fapplication Fapplication programming programming interaces and libraries or the development o "y#$% applications. ;or client programming one can use, among others, the languages +, +CC, Mava, !erl, !H!, !H!, !ython, and Tcl. Tcl. ODBC
"y#$% supports the <21+ interace +onnectorB<21+. This allows "y#$% to be address addressed ed by all the usual usual progra programmi mming ng langua languages ges that that run under under "icros "icrosot ot =indo =indows ws F2elphi, (isual 1asic, etc.. The <21+ interace can also be implemented under nix, though that is seldom necessary. =indows programmers who have migrated to "icrosotNs new new .A?T .A?T plat platorm orm can, can, i they they wish wish,, use the the <21+ <21+ prov provide iderr or the the .A?T .A?T inter interac acee +onnectorBA?T.
2. SSTE! STUD 2.1 E:ISTIN$ SSTE! ?xisting system is based on desktop application work and all the process are done through desktop application, so they maintain several database registers or recording all the details details o the system. system. They maintain maintain several several registe registers rs or recording recording the entry entry o daily daily transactions such as visitors visited the hostel, visitor drop the message or a particular student, etc. They maintain the record o the students so they keep entire inormation regarding the students in the student master ile. In the similar ashion they maintain the records o their ees so they keep entire inormation inormation regarding regarding their ees details in the ees master ile. They keep the bill 1ook or receipt 1ook to maintain the record or the ees collected by the student. They They main maintai tain n the the regi registe sterr or book book or or sta sta so they they can pay the salary salary.. Thus Thus maintaining maintaining #ta inormation inormation,, #tudent #tudent Inormation Inormation,, (isitors (isitors inormation inormation,, +heck@in +heck@in and +heckout inormation and all the things are done with the help o desktop application.
2.1.1 DRA#BAC5S O" E:ISTIN$ SSTE!
The phase o system analysis process deals with problems that are aecting in the curr current ent desk deskto top p appl applic icati ation on syste system. m. The The prob proble lems ms are thos those, e, whic which h are ae aecti cting ng the the organi&ation in it daily routine work. /s the growing trend in InoTech =orld o computers need o accuracy, perectness, speed and high memory data storage is a must. ?ach and every problem must be solved with a least amount o time and energy. The problems aced by existing system are described as below* • • • • • • • • •
2iiculty in "aintenance o ecords. Time +onsuming. ?diting o data becomes a tedious job. Ao #ecurity o 2ata. "istakes
Di((i0-+ty in !aintenan0e o( Re0or,s
It is very diicult diicult to maintain data record in the system as all the records are entered in the register or the respective record books. There are chances o the record books or iles in which all the data is kept may be torn or wearied out or some other damages which results in the destroyed data. /lso a problem occurs i the data ile or register is misplaced somewhere else and is not getting at the time o actual re)uirement o the data stored. It is also diicult to maintain old iles and registers which have data o past years, which the government has kept or uture reerences. Time Cons-ming
It is very time consuming process to write each and every entry in the database register. /lso it takes a lot o time i all the entries are repeated. In the system processes such as making dierent type o reports, preparing merit lists, tedious calculations are examples o time consuming process in the system. E,iting o( Data
2esktop application written data cannot be changed or edited once written. I there is a mistake and i we try to rub and write it again it makes the register very dirty and untidy, which creates a bad impression impression o the business. business. I data is entered incorrect incorrect whole document gets incorrect while editing wrongly entered data cannot easily solve errors. I one had done some wrong entry then to edit the data one has to go through lots o records and, again and again editing the record makes it diicult to read. Data Inse0-rity
/s the data is stored in iles or registers, it is not in a secure place. /s the storage media here are iles and books or registers there are chances o getting these storage media lost, torn, or it may go in the hand o wrong person, which can destroy the database, or it can also be destroyed accidentally. ac cidentally. /lso in the system data should be shown to the person according to his position in the Hostel, everybody should not be allowed to use all the data. I the data goes in the hand o wrong person then heBshe may take the advantage o the data and the Hostel may loose its market value. #o security is the major aspects o the Hostel #ystem. Re)ort $eneration
/ter collecting all the ees o the student the collection report is prepared and on the basis o which the admission procedure is carried out. Hig Data Re,-n,an0y
/s mentioned in the current system, due to maintenance o so many registers there is a high redundancy o data i.e. same data is recorded repeatedly. Data In0onsisten0y
Here as mentioned in the above step the same inormation is written in more than one place that creates the problem, when there is a change or deletion in the recorded data. ;or example i we would like to change the name o the #tudent due to some mistake earlier or due to some other circumstances.
2.2 PROPOSED SSTE!
The desktop application system is to be computeri&ed in order to overcome the problems, which aects the existing e xisting desktop application system. +omputeri&ing the existing system with the help o some programming language, database package ease the work o the system up to a great extent. 4enerally, there has been a criterion to work on any job or task or a speciic purpose. Aobody works without speciic detailed inormation about the particular task he is perorming. Thus, any transaction can be perormed either student admission or ees collection or check in and check out. In the computeri&ed system, the irst screen o the system would be a welcome message and a list o menus. These menus contain the options o either collecting the inormation o any student or Hostel or the number o seats available in Hostel, etc. /ny transaction can be perormed in (isitor management system i.e. routine processes. /ter the transaction is completed the user can log o rom the system by simply )uitting rom the system. The main objective o the proposed system is to help the user. The system can be handy to the user in the ollowing reasons* •
To provide )uick and eicient means or gathering the student inormation along with their rooms, ;ees o #tudent and inally the +heck in and checkout o
•
student. To automate the work such as gathering student inormation, posting message,
•
gathering sta inormation. To automate automate the dierent types o reports.
2.2.1 "EATURES
The “(isitor “(isitor management system” o the organi&ation organi&ation is developed developed to overcome overcome the most o the problems occurring in the desktop application system by computeri&ing the existing system. The eatures o the newly proposed computeri&ed system are described in brie as below. /ter computeri&ing the system, the committee co mmittee o the organi&ation or the user o the system can inish their work in least amount o time and eorts. The computeri&ed system has many gains and eorts, which the desktop application system can't give, in any type o situations. In any desktop application system i we take, the main problem arising is to maintain the number o records and inding a particular record. In desktop application system the user has to not down that the check@in and checkout o each and every student and also deliver the messages o each student given by the visitors and which is very tedious task, but in the case o computeri&ed system the user just has to enter once and automatically all the messages delivered by all the visitors will be displayed and thus the user does not have to worry because all the work done is automatically and the system itsel. +omputeri&ed systems are most helpul in dealing with areas where database comes into the existence. / computer computer can hold large amount o data in its storage devices and it can operate at very high speed. The user can put the entire inormation in the computer and can be able to perorm any type o task which when done desktop application is tedious and time consuming. The new system will have the acility to sort data according to any speciic type on the basis o what the user wants in any order. /lso with the help o computeri&ed system s ystem i the user wants to access any single user's data rom many users data he can automatically get the desired data o the desired student or sta or ees details, etc. in a raction o second which is again time saving saving and very )uick. )uick. #ome o the eatures o the proposed proposed system are given below* •
"aintaining the 2atabase or student, sta, ees, Hostels, check@in and checkout, etc.
•
emoval o 2ata edundancy. edundancy.
•
2ata +onsistency.
•
%eave messages.
•
"enu driven interace.
•
?nsure data security. securit y.
The main eatures o (isitor management system are given below. •
/s computer computer can store large amount amount o data it is very useul to store inormation inormation o such a large database. /ny inormation regarding total number o students in the Hostels. /lso inormation regarding ees o each and every student.
•
The "essage !assing can be easily prepared by sorting the student and according to the visitor. =e can develop a command or program, which directly sorts the total number o applicants into ascending order.
•
Inconsistency caused due to changes in the database is removed as a separate database can be maintained or total number o students in the Hostels. #o the database is directly updated in response to the any change taking place and we don't have to go through all the orms once again.
•
+ommunication with the students to inorm them about the message arrived when they are not in the college. /nd the total number visitors visited the hostel.
•
sers can easily check the availability o rooms in hostels rom anywhere through this system.
•
I the re)uired room in the hostel is not available, then the user can set the preerence. =hen the preerred room becomes available, the user will be automatically notiied with the mail.
%. SSTE! DESI$N AND DEVEOP!ENT %.1 "IE DESI$N "+at "i+e Data*ase
/ lat ile database is a database designed around a single table. The lat ile design puts all database inormation in one table, or list, with ields to represent all parameters. / lat ile may contain many ields, oten, with duplicate data that are prone to data corruption. I data between two lat iles have to be merged, it is needed to copy and !#"te relevant inormation rom one ile to the other. There is no automation between lat iles. I two or more lat iles that contain client addresses, it is re)uired to desktop application modiy the address parameters in each ile that contains that client's inormation. +han +hangi ging ng ino inorm rmati ation on in one one ile ile has has no bear bearin ing g on othe otherr iles iles.. ;lat ;lat ile iless oe oerr the the unctionality unctionality to store inormation, inormation, manipulate manipulate ields, print or display display ormatted ormatted inormation inormation and exchange inormation with others, through email and over the Internet. #ome lat iles may be attached to external iles, such as (archarF-8 editors, to extend unctionality and manage related inormation. Re+ationa+ "i+e Data*ase
/ relational database, on the other hand, incorporates multiple tables with methods or the tables to work together. The relationships between table data can be collated, merged and displayed in database orms. "ost relational databases oer unctionality to share data* • • • •
/cross networks
2esigning lat ile databases is simple and re)uires little design knowledge. ;lat iles can be developed using just about any database engine. ;lat iles can be created in relational databa database se engine enginess by not taking taking advant advantage age o relatio relational nal design design concept concepts. s. 2esigni 2esigning ng a relational database takes more planning than lat ile databases. =ith lat iles, it is possible to add inormation, as you deem necessary.
=ith relational databases, it is re)uired to be careul to store data in tables such that the relationships make sense. 1uilding a relational database is dependent upon the ability to establish a relational model. The model must ully describe how the data is organi&ed, in terms o data structure, integrity, )uerying, manipulation and storage. elational databases allow deining certain record ields, as keys or indexes, to perorm search )ueries, join table records and establish integrity constraints. #earch )ueries are aster and more accurate when based on indexed values. Table records can be easily joined by the indexed values. Integrity constraints can be established to ensure that table relationships are valid. I the project is able to establish a one@to@many relationship in the data tables, relational database should be used because a lat ile is not suic suicient ient to handle handle the data data process processing ing needs. needs. elati elationa onall databa databases ses oer oer more more robust robust reporting with report generators that ilter and display selected ields. elational databases oer the capability to building own reporting modules. "ost relational databases also oer the capability to import and export data rom other sotware. There are three primary relational database systems, proprietary, open source and embedded. !roprietary relational databases re)uire the use o proprietary development languages, oten times, to complement #$%. "icrosot /ccess, or example, combines !H! with #$%.
%.2 INPUT DESI$N
Input is any data or instructions entered into the memory o a computer. Two types o input are data and instructions. 2ata is a collection o unorgani&ed items that can include words, numbers, pictures, sounds, and video. / computer processes data into inormation, which is organi&ed, meaningul, and useul. Instructions can be in the orm o programs, commands, or user responses. / program is a series o instructions that tells a computer how to perorm the tasks necessary to process data into inormation. / command is an instruction given to a computer program. / user response is an instruction you issue to the computer by responding to a )uestion posed by a computer program. /ny hardware component that allows entering data, programs, commands, and user responses into a computer is an input device. Inputs o (isitor (isitor management system are hid, sname, class, dept, roomno, visitor details etc.
%.% OUTPUT DESI$N
%.; DAT D ATABASE ABASE DESI$N DESI $N
2atabase is designed to manage large bodies o inormation. The management o data involves both the deinitions o structures or the storage o inormation. In addition the data base system s ystem must provide or the saety sa ety o the inormation solved, despite system crashes cras hes or due to attempts at unauthori&ed access. ;or developing an eicient database proposed project have to ulill certain conditions such as controlled redundancy. • • • • • •
2eining the data Inputting the data %ocating the data /ccessing the data +ommunicating the data evising the data
O*e0ti/es o( Data*ase ,esign
In database design several objectives are designed such as* • • • • • • • • •
?ase o use +ontrol o data integrity +ontrol o redundancy +ontrol o security 2ata independence Flogical Q physical 2ata storage protection #ystem perormance #ystem unctions #ystem compatibility
;or achieving the abovementioned criteria's we have to make use o various eatures that are available with the 21"# by enorcing integrity constrains, it is possible to ensure data integrity and reduce data inconsistency to a great extent.
%.< DESCRIPTION O" !ODUES %.<.1 !ODUE DESCRIPTION ogin !o,-+e
This is a login orm that re)uests the user to enter hisBher password and user name or validation. It reads its data rom the table “users”. The user is allowed to load the application successully i and only i he is an authori&ed user o the application. It is the surety measure placed on the application. !en- !o,-+e
This module is loaded irst i the user is an authori&ed user. It is a "2I orm ie it is the parent orm rom which all other orms can be reerenced. It has the ollowing menus and submenusK !en-
S-*men-
;ile
exit
"anagement
student registration, student records, create hostel, hostel management
eports
/ll al allocated ro rooms, al all un unallocated ro rooms u ully al allocated rooms, partially allocated rooms, hostel by names etc
=indow
earrange
Help
2ocumentation, about
Ne8 St-,ent Registration !o,-+e
The student registration orm is loaded when the sub menu registration is clicked. It is the orm that is used to collect data into table “studentino”. It has the ollowing ields like "atric number, last name, irst name, male, emale, school, department, level, course o study, name o sponsor, sponsor address, next o kin, kin address, , special, cgpa. This inormation is re)uired to be entered. It contains the ollowing buttonsK Aew entry*
This command when clicked clears all the ields and makes them
available to collect new records on a new student.
+reate entry* This button is clicked to save the records on a particular student when entered ?xit* This button when clicked closes the orm St-,ent Re0or, !o,-+e
This orm is loaded when the submenu “student record “ is clicked. It collects data rom table “studentino” which is a table designed using "# ;%?D 4I2 that takes as many rows rows and and colu column mn as possi possibl ble. e. It cont contai ains ns a list list box box rom rom whic which h to selec selectt schoo schooll and and department o student, which are read rom table “school”, and “department” respectively. There are buttons or certain operation on itK The user is re)uired to type in the surname o the student to be searched and then click the button, this automatically highlight the speciic record. ?xit* This command closes this orm on click. Hoste+ !anagement !o,-+e
This orm is loaded when the submenu “hostel management” is chosen. This orm is where the actual allocation allocation is done and other modiications. modiications. It contains contains list boxes where the user selects the hostel name, heBshe wants to allocate to a student. The inormation o the students in the speciied hostel is then displayed in the orm o table. This includes these ieldsK id, room id, hostel name, room number, capacity, allocated, sex. To allocate room, the user clicks on a matric number and then chooses a particular room by clicking on the room then heBshe clicks the “allocate room” button. This student is automatically allotted to the room in the situation where there is no mismatch in sex. I there is, it brings out a dialog box to tell the user that heBshe is trying to allocate a male hostel to a emale student or vice@versa. This orm contains the ollowing* /dd room* this command command when clicked brings brings out orm “rmaddroom “rmaddroom”. ”. This allows allows the user to enter a new room that can be allocated to students. The user then ills in the hostel name, room number, room capacity, and sex o room members. The “create room and new” button is clicked to add more rooms while the “create and exit” button is clicked to add and close the orm. The exit button is clicked to close the orm. #earch button button inds its use where the user may search or a particular particular room by typing it and
clicking on this button. The room is then highlighted or ast access. ?xit closes the hostel management orm. To view the inormation o students in a room, the user simply double clicks on the room and clicks on the view button and “de@allocate” button to de@allocate a student rom a room. Aew hostel orm is loaded when the submenu “ create hostel” is clicked. It gives room or entering data o newly constructed hallFs o residence. Re)orts !o,-+e
This orm allows the user to view certain )ueries which gives report on hostel by their names. It gives the list o students in a particular hostel in the orderK hostel name, room number, capacity, allocated.
;. TESTIN$ TESTI N$ AND I!PE!ENTA I!PE !ENTATION TION
The common view o testing held by users is that it is perormed to prove that there are no errors in a program. program. This is extremely diicult diicult since designer cannot prove prove to be one hundred percent accurate. Thereore, the most useul and practical approach is with the understanding that testing is the process o executing a program with explicit intention o inding errors that make the program ail. Testing has its own cycle. The testing process begins with the product re)uirements phase and rom there parallels the entire entir e development process. In other words, or each phase o the development process there is an important testing activity. #uccessul testing re)uires a methodical approach. It re)uires ocusing on basic critical actors* • • • • • •
!lanning !roject and process control isk management Inspections "easurement tools
TEST PAN
1eore going or testing, irst we have to decide upon the type o testing to be carried out. The ollowing actors are taken into consideration*
•
To ensure that inormation properly lows into and out o program To ind out whether the local data structures maintains its integrity during all steps
•
in an algorithm execution To ensure that the module operate properly at boundaries established to limit or
•
• •
restrict processing To ind out whether error @ handling paths are working correctly or not To ind out whether the values are correctly corr ectly updated or not +heck or validations
UNIT TESTIN$
nit nit or modu module le test testin ing g is the the proc proces esss o test testin ing g the the indi indivi vidu dual al comp compon onen ents ts Fsubprograms or procedures o a program. The purpose is to discover discrepancies between
the modules interace speciication and its actual behavior. In our system each module must be tested independently or validation. VAIDATION TESTIN$
(alidation testing provides the inal assurance that sotware meets all unctional, behavioral and perormance re)uirement. The sotware once validated must be combined with other system elements. #ystem testing veriies that as elements combine properly and that overall system unction and perormance is achieved INTE$RATION TESTIN$
Integr Integratio ation n testing testing is the process process o combin combining ing and testing testing multip multiple le compon component entss together. The primary objective o integration testing is to discover errors in the interaces between the components. In our system each o the modules mentioned above, are tested or checking the integration between them, ater each o them are tested individually.
I!PE!ENTATION
#ystem implementation is the important stage o project when the theoretical design is tunes into practical system. The main stages in the implementation are as ollows* • • • •
!lanning Training #ystem testing and +hangeover planning
!lanning is the irst task in the system implementation. !lanning is deciding on the method and the time scale to be adapted. /t the time o implementation o any system people rom dierent departments and system analysis involve. They are conirmed to practical problem o controlling various activities o people outside their own data processing departments. The line manager controlled through an implementation co@ordinate committee. The committee consists o ideas, !roblems and complaints o user department. It must also consider, • • • •
The implementation o system environment. #el selection and allocation or implementation tasks. +onsultation with unions and resources available. #tandby acilities and channels o communication.
<. CONCUSION
The The syste system m is comple completel tely y menu menu driv driven en and and extre extreme mely ly user user rie riend ndly ly sinc sincee it is developed in an eicient ront end tool !H!. /ppropriate error messages are also provided too guide the user in a proper and user riendly manner. The sotware =Visitor management system> has been developed in windows 088> environment using !H! as ront end and "y#$% as back end. Time consumptions reduced to a great extent and user as less complexity in handling it database. The project is ully ledged and user riendly, end users will be lightened in using it sotware because it is easy to have bills and reports and mostly all contents to be entered are to selected rom combo box. It reduces the calculating eorts to be carried out by the sta.
BIBIO$RAPH
RE"ERENCE BOO5S
•
?lias /ward, /ward, R#ystem /nalysis and 2esign', 7olkata, 0886. Mames. / #enn, R#ystem /nalysis /nalysis and 2esign', 1!1 !ublications, !une, 0883. !ressman, R#otware ?ngineering', Tata "c 4raw@Hill ?dition, Aew 2elhi, 0858,
•
pp.088@0-8. #. !arthasarathy, 1. =. 7halakar, R#ystem /nalysis, 2esign and Introduction to
• •
•
#otware ?ngineering', Tata "c 4raw@Hill ?dition, Aew 2elhi, 0858, pp.-E@L8. #.#. Ipress, R!H! programming, A# !ublications, Aew 2elhi, 0886, pp.5@5L8.
RE"ERENCE #EBSITE • • • • • •
www.associatedcontent.com www.codesource.com www.learneasy.com www.members.tripod.com www.phptutorials.com www.psychocoders.com
APPENDICES A. DATA "O# DIA$RA!
/ data low diagram is graphical tool used to describe and analy&e movement o data through a system. These are the central tool and the basis rom which the the other components are developed. The transormation o data rom input to output, through processed, may be described logically and independently o physical components associated with the system. These are known as the logical data low diagrams. The physical data low diagrams show the actual implements and movement o data between people, departments and workstations. / ull description o a system actually consists o a set o data low diagrams. sing two amiliar notations Sourdon, Sourdon, 4ane and #arson notation develops the data low diagrams. ?ach ?ach componen componentt in a 2;2 2;2 is labeled labeled with with a descri descriptiv ptivee name. name. !rocess !rocess is urther urther identiied with a number that will be used or identiication purpose. The development o 2;2'# is done in several levels. ?ach process in lower level diagrams can be broken broken down into a more detailed detailed 2;2 in the next level. The lop@level lop@level diagram diagram is oten called context context diagram. It consists o a single process bit, which plays vital role in studying the current system. system. The process process in the context level diagram diagram is exploded exploded into other process process at the irst level 2;2. The idea behind the explosion o a process into more process is that understanding at one level o detail is exploded into greater greater detail at the next level. This is done until urther explosion is necessary and an ade)uate amount o detail is described or analyst to understand the process. %arry +onstantine irst developed the 2;2 as a way o expressing system re)uirements in a graphical rom, this lead to the modular design. / 2;2 is also known as a “bubble +hart” has the purpose o clariying system re)uirements and identiying major transormations that will become programs programs in system design. #o it is the starting point o the the design to the lowest lowest level o detail. / 2;2 2;2 consists o a series o bubbles joined joined by data lows in the system.
D"D sym*o+s
In the 2;2, there are our symbols •
/ s)uare deines a sourceForiginator or destination o system data
•
/n arrow identiies identiies data low. low. It is the pipeline through through which the inormatio inormation n
•
lows / circle or a bubble bubble represents a process process that transorms transorms incoming data low into
•
outgoing data lows. /n open rectangle is a data store, data at rest or a temporary repository o data.
!rocess that transorm data low.
#ource or 2estination o data
2ata low
2ata #tore Constr-0ting Constr-0ting a D"D
#everal rules o thumb are used in drawing 2;2'# •
!rocess should be named named and numbered numbered or an easy reerence. ?ach name should
•
be representative o the process. The The dire direct ctio ion n o low low is rom rom top top to bott bottom om and and rom rom let let to righ right. t. 2ata 2ata traditionally low rom source to the destination although they may low back to
•
• •
the source.
/ 2;2 typically typically shows shows the minimum contents contents o data store. ?ach data store should should contain contain all the data elements elements that low in and out. $uestionnaires $uestionnaires should should contain all the data
elements that low in and out. out. "issing interaces redundancies and like is then accounted or oten through interviews. Sa+ient (eat-res o( D"D?s •
The 2;2 shows low o data, not o control loops and decision are controlled
•
considerations do not appear on a 2;2. The 2;2 does not indicate the time actor involved in any process whether the
•
datalow take place daily, weekly, m monthly onthly or yearly. yearl y. The se)uence o events is not brought out on the 2;2.
C-rrent )ysi0a+
In current physical 2;2 process label include the name o people or their positions or the names o computer systems that might provide some o the overall system@processing label includes includes an identiication identiication o the technology technology used to process the data. #imilarly #imilarly data lows and data stores are oten labels with the names o the actual physical media on which data are stored such as ile olders, computer iles, business orms or computer tapes. Ne8 +ogi0a+
This is exactly like a current logical model i the user were completely happy with the user were completely happy with the unctionality o the current system but had problems with how it was implemented typically through the new logical model will dier rom current logical model while having additional unctions, absolute unction removal and ineicient lows recogni&ed. Ne8 )ysi0a+
The new physical represents only the physical implementation o the new system. C-rrent +ogi0a+
The physical aspects at the system are removed as much as possible so that the current system is reduced to its essence to the data and the processors that transorms them regardless o actual physical orm.
Pro0ess
Ao process can have only outputs. Ao process can have only inputs. I an object has only inputs than it must be a sink. / process has a verb phrase label. Data store
2ata cannot move directly rom one data store to another data store, a process must move data. 2ata cannot move directly rom an outside source to a data store, a process, which receives, must move data rom r om the source and place the data into data store. / data store has a noun phrase label. #ource is the origin or destination o data. 2ata cannot move direly rom a source to sink it must be moved by a process. / source or sink has a noun phrase land.
e/e+ @
/dmin
%ogin process
%ogin
Hostel management access
CONTE:T EVE DIA$RA!
egistration ;orm
STUDENT egistration
1.0 Registration#end #tudent 2etails
STUDENT MASTER
eceipts
#end eceipts
2.0 /mount /ccount 2etails
ACCOUNT !ASTER
pdate
Account Office (isitor "essage
Inormation "essage 4iven
3.0 Visitor
MESSAGE (isitor (isitor "essage
Message
4.0
Inormation
STUDENT
Reort Generation
2eliver eceipt
"IRST EVE DIA$RA! "OR PROCESS 1.@ &St-,ent A,mission )ro0ess' 1.1 ;orms STUDENT
SU!M"SS"ON O# #ORMS
;illed ;orms
#ubmitted ;orm In)uiry
1.2 AVA"$A!"$"T% AVA"$A!"$"T% O# #ORMS
;orm eturn
4ive eceipt
In)uiry
&OSTE$
eceive esponse
I /vailable
1.3
pdate Inormation
#ORM eceive eceipt
pdate
A''E(TED #tudent Inormation
"IRST EVE DIA$RA! "OR PROCESS 2.@&"ees 0o++e0tion )ro0ess'
STUDENT #"$E
"IRST EVE DIA$RA! "OR PROCESS %.@&/isitor message '
B. TABE STRUCTURE Ta*+e *+e nam namee
Bra Bran0 n04 4in in(o (o
Primary ey bcode "oreign ey
null
"ie+, name
Data ty)e
Des0ri)tion
1code
Aumber
1ranch code
1name
(archarF-8
1ranch name
2uration
(archarF-8
2uration o the course
Ta*+e *+e n nam amee
(in (ine4 e4,e ,eta tai+ i+ss
Primary ey (no "oreign ey "ie+, name
roomno regno Data ty)e
Des0ri)tion
egno
(archarF-8
egistration number
#tudentname
(archarF-8
#tudent na name
Hostelname
(archarF-8
Hostel name
1locktype
(archarF-8
1lock type
1lockdesc
(archarF-8
2escription o block
oomno
Aumber
oom number
;inedesc
(archarF-8
;ine description
;ineamt
Aumber
;ine amount
2at
2ateBtime
2ate and time
;no
(archarF-8
;ine number
Ta*+e *+e nam namee
ost oste+ e+4( 4(ee ee
Primary ey regno "oreign ey "ie+, name
roomno Data ty)e
Des0ri)tion
egno
(archarF-8
egistration number
name
(archarF-8
#tudent name
Hostelname
(archarF-8
Hostel name
1locktype
(archarF-8
1lock type
1code
(archarF-8
1ranch code
roomno
Aumber
oom number
oomdesc
(archarF-8
oom description
;ees
Aumber
;ee amount
Ta*+e *+e nam namee
os oste te+4 +4in in(o (o
Primary ey oste+4name "oreign ey "ie+, name
n-++ Data ty)e
Des0ri)tion
Hostelname
(archarF-8
Hostel name
1locktype
(archarF-8
1lock type
1locktype
(archarF-8
1lock type
1lockdesc
(archarF-8
2escription o block
oomst
Aumber
oom start number
oomend
Aumber
oom end number
Ta*+e *+e name name
ite item4a+ m4a++o +o00
Primary ey n-++
"oreign ey "ie+, name
roomno regno item0o,e Data ty)e
Des0ri)tion
egno
(archarF-8
egistration number
#tudentname
(archarF-8
#tudent na name
Hostelname
(archarF-8
Hostel name
1locktype
(archarF-8
1lock type
1lockdesc
(archarF-8
2escription o block
oomno
Aumber
oom number
Itemname
(archarF-8
Aame o an item
Itemcode
Aumber
Item code
Ta*+e *+e nam namee
oi oin, n,et etai ai+s +s
Primary ey regno "oreign ey "ie+, name
roomno oste+name Data ty)e
Des0ri)tion
egno
(archarF-8
egistration number
2oj
(archarF-8
2ate o joining
Hostelname
(archarF-8
Hostel name
1locktype
(archarF-8
1lock type
1lockdesc
(archarF-8
2escription o block
oomno
Aumber
oom number
;espaid
(archarF-8
!aid ee amount
;eereceiptno
Aumber
;ee receipt number
Ta*+e *+e name name
ite item4,e m4,es0 s0
Primary ey it0o,e "ie+, name
Data ty)e
Des0ri)tion
Itemname
(archarF-8
Aame o an item
Itemcode
Aumber
Item code
Ta*+e *+e nam namee
room4 oom4a+ a++o +o00
Primary ey a))+i0ationno "oreign ey "ie+, name
roomno oste+name Data ty)e
Des0ri)tion
/ppno
(archarF-8
/pplication number
egno
(archarF-8
egistration number
Aame
(archarF-8 (archarF-8
Aame o the student
Hostelname
(archarF-8
Hostel name
1locktype
(archarF-8
1lock type
1lockdesc
(archarF-8
2escription o block
oomno
Aumber
oom number
1ranch
(archarF-8
1ranch
Hostelid
Aumber
Hostel id
Sear
Aumber
Sear
#ex
(archarF-8
#ex o the student
Ta*+e *+e name name
room4 oom4in in(o (o
Primary ey roomno "oreign ey "ie+, name
oste+name Data ty)e
Des0ri)tion
Hostelname
(archarF-8
Hostel name
oomno
Aumber
oom number
1lockdesc
(archarF-8
2escription ab about th the bl block
Aooperson
Aumber
Aumber o person
Ta*+e *+e name name
st-, st-,4i 4in( n(o o
Primary ey regno "oreign ey
a))no
"ie+, name
Data ty)e
Des0ri)tion
/ppno
(archarF-8
/pplication number
egno
(archarF-8
egistration number
Aame
(archarF-8 (archarF-8
Aame o the student
;name
(archarF-8
;ather name
"aritalst
(archarF-8
"arital st status
4name
(archarF-8
4uardian name
!addr
Aumber
!ermanent address
%addr
(archarF-8
%ocal address
1gp
Aumber
1lood group
!hno
Aumber
!hone number
#ex
(archarF-8
#ex o the student
Ta*+e *+e nam namee
/a0 /a0at atin ing4 g4,e ,eta tai+s i+s
Primary ey regno "oreign ey "ie+, name
roomno oste+name Data ty)e
Des0ri)tion
egno
(archarF-8
egistration number
Aame
(archarF-8
Aame o the student
Hostelname
(archarF-8
Hostel name
1locktype
(archarF-8
1lock type
1lockdesc
(archarF-8
2escription o block
oomno
Aumber
oom number
Itemsrecvd
(archarF-8
Items received
;inpaid
Aumber
!aid ine amount
2od
Aumber
2ate o vacation