synopsis nitin

download synopsis nitin

of 17

Transcript of synopsis nitin

  • 8/7/2019 synopsis nitin

    1/17

    INDEX

    S.NO CONTENT PAGE NO. REMARKS

    1 Acknowledgement 3

    2 Introduction 4

    3 Objective of the project 5

    4 System analysis And Feasibility

    Analysis

    6, 7

    5

    Tools and Platform

    8

    6 DFD

    Symbols Description

    12

    9 Hardware And Software

    Requirements

    15

    10 Security and Validation 16, 17

    11 Scope Of Future Application And

    Scope of Improvement

    18

  • 8/7/2019 synopsis nitin

    2/17

    Acknowledgement

    An understanding such as this one is never the work of asingle person and this project is not an exception. We, at this

    is very outset, thank all those who directly or indirectly help

    us in the completion of our project and encouraged us in

    moments of our desire.

    We wish to express our appreciation to Mrs. Monika

    Madam under whom we worked. Interacted and whoseinsights and thoughts helped not only in completion of our

    project but also in enhancing our knowledge. We are highly

    indebted to her for her generous help and guidance through

    out the development of our project.

    Her opinion and hospitality will be everlasting in our

    life. And last but certainly not the least; we acknowledge our

    deep gratitude to all the persons concerned.

  • 8/7/2019 synopsis nitin

    3/17

    INTRODUCTION

    Student Placement Profile System is a system which can be rightly called a

    consequence of computerization of the student placement profile. This system is a

    step towards the use of computer in the field of manufacturing needs.

    The software has been tailored to solve the problem of existing system. The

    existing system, which is a manual one, is slow, cumbersome and sometimes

    unreliable as well. The data can be easily manipulated by the user, which may

    result in loss of important information and may loss the in between relationship.

    The software provides full access to the database of the material. It provides

    administrative control over the database. It keeps track of the placement, vacancies

    etc.

  • 8/7/2019 synopsis nitin

    4/17

    OBJECTIVES OF THE PROJECT

    This project Placement System will be develop for college, which manageplacements of their students.

    The main objective is the automation of the whole Placement cell management

    system: -

    Handling the management of different types of users.

    Reduction in the effort involved in the various transactions.

    To reduce the cost incurred due to manual work.

    Handling the management of Administrator such as Login, and Logout etc.

    Handling the full management of Students.

    Handling the full management of Company such as updating, deletion,

    modification and show report.

    Handling the full management of Placement such as updating, deletion,

    modification and show report.

    To facilities easy report generation

    To provide immediate results to various queries.

    Another important objective is security. Data stored in this manner will be

    confidential and outsiders will not be able to access the important

    information.

  • 8/7/2019 synopsis nitin

    5/17

    SYSTEM ANALYSIS

    Developing/ Operating/ Maintenance Environments:

    The successful environments for software engineering are built on an

    environment architecture that encompasses appropriate system software. In

    addition, the environment architecture must consider the human work

    patterns that are applied during the software engineering process.

    EXTERNAL INTERFACE AND DATA FLOWS

    External Interface:

    External interface design begins with an evaluation of each external entity

    represented in the DFDs of the analysis model. The data and the controlrequirements of the external entity are determined and appropriate external

    interfaces are designed. In this project of placement Profile we are require

    special things like checking of digital signatures as external interface.

    The interface should be coupled with data validation and error handling

    algorithms with in a module. Because side effects propagate across program

    interfaces, it is essential to check all data flowing from module to module.

  • 8/7/2019 synopsis nitin

    6/17

    Data Flows:

    Information is transformed as it flows through a computer based system.

    The system accepts input in a variety of forms, applies hardware, software

    and human elements to transform input into output and produces output in

    a variety of forms. Input may be control signal transmitted by a transducer,

    a series of numbers and operator, a pack of informormation transmitted on

    a network link, or a voluminous data file retrieved from a cd-rom. The

    transformation may comprise a single logical comparison, a complex

    numerical algorithm or rule-interface approach of an experh system. Wecan create a flow model for any computer based system, regardless of size

    and complexity.

    FEASIBILITY ANALYSIS

    A feasibility study is a test of a system proposal according to its work

    ability to meet user needs, and effective use of resources. It focuses on

    identifying and evaluating alternative candidate system with a

    recommendation of the best system for the job. The feasibility study is

    conducted to evaluate the feasibility of the candidate systems to produce the

    desired outputs. Most successful system projects are not necessarily the

    biggest or most visible in a business but rather those that truly meets userexpectation. Three key considerations are involved in the feasibility study.

  • 8/7/2019 synopsis nitin

    7/17

    Economical Feasibility:

    Economic analysis is the most frequent used method for evaluating the

    effectiveness of a candidate system. Most commonly known as cost/benefit

    analysis, the procedure is to determine the benefits and savings that are

    expected from a candidate system and compare them with cost. If benefits

    outweigh costs, then the decision is made to design and implement the

    system.

    Behavioral Feasibility:

    People are inherently resistant to change, and the computers have been

    known to facilitate change. An adverse reaction and resistance is always

    from the user staff. In case our candidate system the case is different. An

    estimate should be made of how strong a reaction a user staff is likely to

    have a development of a computerized system. On the basis of the feasibility

    analysis it is recommended that the project may be approved from design,

    development implementation.

    Technical Feasibility:

    Technical feasibility centers around the existing computer system

    and to what extent it can support the proposed systems in case of our

    candidate system the required technical know how already exists.

    TOOLS AND PLATFORM

  • 8/7/2019 synopsis nitin

    8/17

    FRONT-END:

    Today in this time of competence in the field of the software development need a window

    based application which can connect to relational database engine. This gives the

    programmer the opportunity to develop client-server based commercial application which

    gave user the power and ease of user of online based.

    From the my point of view, java is a simple and powerful object oriented programming

    language that is capable of developing robust and secure distributed application. Java is

    used not only for interactive Internet programming but also for developing stand alone

    applications. Java has many features in programming language, such as simple object

    oriented, multithreaded, robust, distributed, secure, platform independent. Java was

    designated to be very simple and easy to learn. Thus we aware of the various object

    oriented concepts can easily develop applications in java. The multi platform

    environment of the web places high demand on the reliability of the program to execute

    on a Varity of system. Java is one of the rapid application development tools as it enables

    the programmers to develop application very easily and very quickly. Java is true oops

    language (it supports abstraction, encapsulation, polymorphism, inheritance)

    multithreaded application. Java is designed to be used in networked and distributed

    environments where security is of permanent interface. Java was designed to support

    applications on heterogeneous network environments composed of a Varity of

  • 8/7/2019 synopsis nitin

    9/17

    processors, the operating system architectures and multiple programming language

    interfaces. To enables a java application to execute any where on the network.

    All coding techniques used by the programmer in oops and in great detail this is coupled

    with material on how to use the carrier tools.

    . BACK END:

    SQL Server 2005 is an RDBMS package developed by Microsoft Corporation. This

    RDBMS package can manage any type of data in a well-designed manner. SQL Server

    can handle more data and users by providing unprecedented scalability using network

    technology to support tens of thousands of users. SQL Server can deliver speed and

    performance for any user population while lowering the cost of the computing

    infrastructure. SQL Server, the Worlds most powerful relational database is the heart of

    open, standards based Network Computing Architecture. Network Computing

    Architecture allows IT organizations to spend less time struggling with interoperability

    issues and more time focusing on deploying solutions. Standards based network

    architectures make it possible to introduce objects into mainstream enterprise

    environments. This product allows creation of user defined function, procedure, database,

  • 8/7/2019 synopsis nitin

    10/17

    trigger and other specific database processing. It has introduced a large number of new

    features such as analysis queries, scalar sub-queries, joins, pivot insert statement and

    merger statement. It continues to provide the most secure application development and

    deployment platform in the industry. Exception handling and user defined locking are

    fully supported. It also provides the key concept such as primary key, unique key and

    foreign key.

  • 8/7/2019 synopsis nitin

    11/17

    Invalid Student

    Roll Number ForSearching

    Accessing Student Info

    Placement Info

    AccessingPlacement Info

    Valid Student For Display

    STUDENT

    Search Process

    Display Process

    1 Placement

    DFD FOR PLACEMENT ENQUIRY

  • 8/7/2019 synopsis nitin

    12/17

    Invalid Company

    Company Code ForSearching

    Accessing Company Info

    Company Info

    Accessing Company Info

    Valid Company For Display

    COMPANY

    Search Process

    Display Process

    1 Company

    DFD FOR COMPANY ENQUIRY

  • 8/7/2019 synopsis nitin

    13/17

    ik

    Invalid User Matched

    Accessing User Information

    Valid User For Software Access

    User Enter Their Password & User_id for opening the

    application

    USER

    Password

    Validity

    Process

    1 USER

    DFD FOR USER LOGIN

    PCMS

  • 8/7/2019 synopsis nitin

    14/17

    . HARDWARE AND SOFTWARE REQUIREMENTS

    Minimum requirement of hardware:-

    256 MB RAM or above

    10 GB HARD DISK or above

    Pentium-III or above processor

    A printer or more

    A scroll mouse

    A keyboard

    Minimum requirement of software:-

    O/S-Windows XP

    Languages-SQL/PL-SQL

    Front end tool-JAVA

    Back end tool-SQL SERVER 2005

  • 8/7/2019 synopsis nitin

    15/17

    Security and Validations

    Security:

    This project uses SQL SERVER 2005 as back-end and JAVA as front-end. It is

    good to store data on server and provide facilities to access data with restricted

    permission to the client. This feature can be easily deployed to SQL database. SQL

    Server database is a secure database. The reality of SQL Server security is very broad

    up to which we cant deal. No one can view/edit database without prior permission.

    Nevertheless we can roughly make a distinction of the security features which is

    provided by SQL Server 2005 and can be applied in the project.

  • 8/7/2019 synopsis nitin

    16/17

    VALIDATION CHECK

    This project dedicated to solve the internal restriction of the databases as per security

    reasons. In this project, the key concepts of primary key, foreign key, null values are

    frequently used. It does not support redundant value. If user attempt to input

    meaningless/unnecessary data then such type of data is not accepted by this project.

    This means that it has high validation checking for inputted data. In this project JAVA

    validators are used to validate the data. The required field validator, expression

    validators etc. are such validators used in this project. Thus proper validation

    arrangements are made to maintain the consistency of data and information.

  • 8/7/2019 synopsis nitin

    17/17

    FUTURE SCOPE AND ENHANCEMENT

    This project has been prepared to fulfill the requirements of Placement Profile

    System, keeping in mind the standard rules and regulations as well as the standard

    data of Managing System that will be save our time and cost.

    As far as our project covers all-important details regarding its placement and their

    respective information. Therefore, in future it will help together such information

    about Student..

    Storing large amount of data for future point of view.

    Reducing manual efforts for maintaining the records.

    Reducing the lead-time.

    It gives correct information about student that has to

    be further interpreted.