Traffic Rules Mastery1

52
TRAFFIC RULES MASTERY 1. Introduction 1.1 overview of Existing System The traffic police officers used to send the CHALLAN’S to that individual person who breach the rules are they collect money at that time only. The existing system can’t control the traffic once the motorist cross the rule and pay the challan’s we can’t say again the particular motorist cannot cross the rules. 1.1.1 Limitations in Existing System There is no database regarding previously rules crossed by the motorist. Some individuals can miss use the money from the vehicular. 1.2 Overview of Proposed System This service has the excellent features and high security applications. Here we are providing the card system of different

Transcript of Traffic Rules Mastery1

Page 1: Traffic Rules Mastery1

TRAFFIC RULES MASTERY

1. Introduction

1.1 overview of Existing System

The traffic police officers used to send the CHALLAN’S to that individual person who breach the

rules are they collect money at that time only. The existing system can’t control the traffic once

the motorist cross the rule and pay the challan’s we can’t say again the particular motorist cannot

cross the rules.

1.1.1 Limitations in Existing System

There is no database regarding previously rules crossed by the motorist.

Some individuals can miss use the money from the vehicular.

1.2 Overview of Proposed System

This service has the excellent features and high security applications. Here we are providing

the card system of different types. They are issued according to the violations made by the

persons. Moreover the FINE amount should be paid as the DEMAND DRAFT (DD).And we

provide a database for vehicle details with previous rules crossed by the motorist for further step

to taken on them. The proposed system provides information about vehicle with fast and accurate

result. We provide an upadtion function for updating the rules crossed and any further information

is to be modify. Once the final card is issue to motorist the vehicle is to be sized.

1.2.2 Advantages over Existing System:

Page 2: Traffic Rules Mastery1

Free of charge

User friendly interface

Works on all Java enabled systems

Optimized searching method - results are returned quickly

Miss use of money by individual can over come and traffic problems can over come

1.3 System Scope

This service has the excellent feature to provide the details of the vehicles based on their input

(vehicle number).It has the feasibility to provide the rules crossed by the violator. Whenever

the user want see the status of the particular vehicle. When he opens the application it shows

the previous violations made by the violator. To view the present status of that vehicle we have

to do the updation of the database to get the current details of the violator. Based on the

database of vehicle is to be sized by this we can maximum avoid the traffic.

1.4 System Purpose

The main purpose of this project is to avoid the problems being faced by traffic police. Here we are going to store the database of the each and every vehicle. Where it helps us to find out the rules crossed by the person. It is a card system which is of four different formats and payment FINE should be done by DD(Demand Draft), hence there is no chance of misusing the acquired money by individual TRAFFIC POLICE officer as it will goes into the particular bank account.

The overview of the project is to search the vehicle data from the database and shows the what

action to be taken on particular violator after updating the current database of motorist .This

project is based on the card system so we give a particular card to the violator based on number

of times rules crossed by the motorist

1.5 System modules

The project traffic rules mastery consists of following modules.

Page 3: Traffic Rules Mastery1

1.5.1 User Interface Manager

Design GUI for traffic mastery

This module handles Creating user interface by using j2me technology. For the searching

the vehicle number there should arrange a text field and one update button so that for the

interface design we use classes

1.5.2 Collect vehicles database

When user enters the vehicle number in the text field that should be verifies the in .ddb

libraries. This module handles and maintains all the database files .these files are acting like a

database for the vehicular.

1.5.3 Implementing search method

This module handles search operations for the given vehicle number and displays all possible

data which are retrieved from the database libraries with the number as input, and from the

database files it searches the violations of the motorist.

2.  LITERATURE SURVEY

.

2.1 Project Description:

This application consists of three important functionalities which are used to design the

modules. First one is the designing functionality for user interface through system. Second

Page 4: Traffic Rules Mastery1

functionality is related to database for maintaining the database which consisting of vehicle data

such as vehicle number, Driver licenses, number of times rules crossed and type of vehicle, the

final functionality is that for implementing the search methodology for displaying the particular

vehicle database which entered in the text field and also consisting of update button for updating

the rules crossed, based on this rules it display which card is issue to the vehicle owner. It is an

optimized search which returns quickly and works on all java enabled system and also much

efficient and user friendly.

Through updation we can go for want action to be taken on particular person who breach the

rules. Once the vehicle is sized after a particular time the vehicle is going to dispatch to the

motorist. This period of time also store in database once the time is out it indicate the message

from database. The existing system has high security feature. In this we use back end language is

database sql and front end is java standard edition.

2.2 Overview of java

Java is very powerful and popular language that supports the development of system based

application and web based application. It provides a number of capabilities that complement

those provide by JavaScript.

What is java?

The rapid growth in the popularity of the java language is nothing short of a phenomenon. In

less than a year, java went from a relatively unknown alpha version to an incredibly successful

version 1.0 release. Every major computer hardware and software vendor has since endorsed

Java its remarkable success is summed up by fact that Microsoft, its chief rival, not only

supports java with Internet explorer, but also sells J++, a popular development environment. In

this section we'll explore various aspects of Java

Features of java

Java is platform-independent:

Java’s phenomenal success is due to the fact that it provides the capability of develop compiled

software that runs, without modification, on a large variety of operating systems platform-

Page 5: Traffic Rules Mastery1

including Microsoft windows, Apple Macintosh, IBM os/2, Linux, and several varieties of

UNIX. In addition, and perhaps more importantly, specially designed java programs known as

applets run in the context of java-enabled web browsers, such as Netscape navigator and

Microsoft Internet explorer.

The java virtual machine is the key to java’s platform-independence. The java virtual machine

(JVM) provides a machine-independent and operating system-independent platform for the

execution of java code. The JVM is a program that executes java programs that are compiled

into the JVM byte code

Java Is Object-Oriented

Java is an object-oriented language, and provides all of the benefits of object-oriented

programming: classification, inheritance, object composition, encapsulation, and polymorphism.

Java supports single Inheritance, but not multiple Inheritances; however, it provides the interface

construct, which can be used to obtain the benefits of multiple inheritance without having to deal

with any of its drawbacks.

Java Is Familiar

One of the most striking characteristics of java, at least from a programmer's perspective,

is its familiarity. Java is based on c++ and retains much of its syntax. This makes the language

very easy to learn for c++ programmers. Since JavaScript is also based on both c++ and Java,

Java's syntax will be easy for you to learn. However, since java is a full object-oriented language

(as opposed to an object-based language, like JavaScript), you will have to learn some additional

programming constructs.

Java Is Simpler and More Reliable

Page 6: Traffic Rules Mastery1

Although java is based on c++, it is simpler and easier to use. This is because the

designers of java eliminated many of the complex and dangerous

2.3 JAVA DATABASE CONNECTIVITY (JDBC)

JDBC OVERVIEW:

JDBC is a Java API for executing SQL statements. (JDBC is as trademark and is not an acronym; JDBC is often thought of as understanding for "Java Database Connectivity"). It consists of a set of classes and Interfaces written in the Java Programming Language. JDBC provides a standard API for tool/database developers and makes it possible to write database applications using a pure Java API.

Using JDBC it is easy to send SQL statements to virtually any relational database. In other words, with the JDBC API, it is not necessary to write one program to access a Sybase database, another program to access a Oracle database, another program to access a Informix database, and so on.

One can write a single program using the JDBC API, and with in ail application written in Java programming language, one also doesn't have to worry about writing different applications to run on different platforms. The combination of Java and JDBC lets a programmer to write it once run it anywhere.

Java, being robust, secure, easy to understand, and automatically downloaded on a network, is an excellent language basis for database application. What is needed is a way for Java applications to walk to a variety of different databases. JDBC is the mechanism for doing this.

The JDBC Structure

The JDBC is two-dimensional structure. The reasoning for the split is to separate the low-level programming from the high-level application interface. The low-level programming is the JDBC driver. The idea is that database vendors and third-party software vendors will supply pre-built drivers for connecting to different databases. JDBC drivers are quite flexible: They can be local data sources or remote database servers. The implementation of the actual connection to the data source/database is left entirely to the JDBC driver. The structure of the JDBC includes these key concepts:

Page 7: Traffic Rules Mastery1

The goal of the JDBC is a DBMS independent interface, a “generic SQL database access framework,” and a uniform interface to different data sources.

The programmer writes only one database interface; using JDBC, the program can access any data source without recoding. The JDBC is not only a specification for using data sources in Java applets and applications, but it also allows you to create and use low-level drivers to connect and “talk” with data sources. You have now explored the JDBC architecture and seen how the ODBC fits into the picture. The important concept to remember about the JDBC is that the modular design of the JDBC interface allows you to change between drivers—hence databases—without recoding your Java programs.

The architecture of JDBC

The Driver Manager class is used to open a connection to a database via a JDBC driver, which must register with the Driver Manager before the connection can be formed. When a connection is attempted, the Driver Manager chooses from a given list of available drivers to suit the explict

JAVA APPLICATION

JDBC DRIVER MANAGER

JDBC API

Jdbc driver Jdbc driver

DBMS DBMS

Page 8: Traffic Rules Mastery1

type of database Connection. After a connection is formed, the calls to query and fetch results are made directly with the JDBC driver. The JDBC driver must implement the classes to process these functions for the specific database, but the rigid specification of the JDBC ensures that the drivers will perform as expected. Essentially, the developer who has JDBC drivers for a certain database does not need to worry about changing the code for the Java program if a different type of database is used (assuming that the JDBC driver for the other database is available). This is especially useful in the scenario of distributed databases.

WHAT DOES JDBC DO?

Simply put, JDBC makes it possible to do three things:

1. Establish a connection with the database

2. Send SQL statements

3. Process the results

The following code fragments give a basic example of these three steps:

ConnectionCon = DriverManager.getconnection (“jdbc: odbc:”sn,”login”,”password”).

2.4 Overview of Uml

Unified modeling language is a popular language that has been using for modeling the object

oriented software. It is a language for visualizing, specifying, constructing and documentation of

software artifacts. Object Management Group (OMG) has first adopted in 1997 as a language for

Object-Oriented Analysis and Design. It uses graphical notations to articulate the software design

projects. UML is a very significant part of development processes. (Grady Booch & Jim

Rumbaing, 1994)

GOALS OF UML:

1. It offers the users to express visual modeling language and ready to use.

Page 9: Traffic Rules Mastery1

2. To extend the core concepts, various extensibility and specialization mechanisms are

provided.

3. Development processes and programming language which are in particular are made to be

independent by the UML design.

4. Necessary understanding of the language is provided formally.

5. Development concepts like components, frameworks, collaborations and patterns.

6. The market of the Object-Oriented tools growth must be encouraged.

2.5 Overview of Data flow diagrams

DATA DESIGN

The data design transforms the information domain model into the data structures that will be required to implement the software. The data objects and relationships defined in the entity relationship diagram and the detailed data content depict in the data dictionary provide the basis for the data design activity. Part of data design may occur in conjunction with the design of software architecture. More detailed data design of software architecture. More detailed data design occurs as each software component is design. Data design creates a model of data and information that is represented at the high level of abstraction. This data model is then refined into progressively more implementation. Specific representations that can be processed by the computer- based system. The structure of data has always been an important part of software design.

Architectural Design

Ever since has the first program was divided into modules, software systems has had architectures and programmers have been responsible for the interaction and programmers have been responsible for the interactions among the modules and architectures have been implicit accidents of implementation.

The software architecture of a program or computing system is the structure of structures of the system, which comprise software components, the relation ship among them. Three keys reasons that software architecture is important.

Representation of software architecture is an enabler for communication between all

Page 10: Traffic Rules Mastery1

parties interested in the development of a computer- based system. The architecture highlights of early design decisions that will have a profound impact on

all software engineering work that follows and as important. On the ultimate success of the system as an operational entity.

The architecture constitutes a relatively small, intellectually graspable model of how the system is structured and how its components work together.

USER INTERFACE DESIGN

Interface design focuses on three areas of concern.

The design of interfaces between software components. The design of interface between the software and other non-human producers and

consumers of information. The design of the interface between a human and the computer.

2.6 FEASIBILITY STUDY

Feasibility study, which the proposed system is subjected as discussed below. The objective is to

feasibility study is a high level capsule version of the entire system analysis and design process.

After problem is clearly understood and solutions are proposed the next step is to conduct the

feasibility study, which is the part of the system analysis as well as design process. The main

objective of the study is to determine whether the proposed system is feasible or not. Mainly there

are three types of determine quickly at a minimum expense how to solve a problem. The purpose

of feasibility is not to solve the problem but to determine if the problem is worth solving. The

system has been tested for feasibility in the following points.

Technical feasibility

Operational feasibility

Economical feasibility

Technical Feasibility:

Page 11: Traffic Rules Mastery1

As we are developing this Image Processor Application on Java 2 platform edition which is an

open source and free of cost. Once we started developing this application in Java 2 platform

edition then they is no need of purchasing any special software or application software for

support. Java it self provides all necessary functionalities and resources for developing j2me

application For Example like developing GUI can be developed by Java.

Operational Feasibility:

To determine the operational feasibility of the system we should take into consideration the

awareness level of the user and management. Every thing will be understood by user once he sees

the application. The proposed system offers greater levels of user’s friendliness combine with

greater processing speed. Therefore the cost of maintenance can be reduced.

Economic Feasibility:

To decide whether a project is economically feasible, or not we have to consider various factors

as:

Cost benefit analysis

Long-term returns

Maintenance costs

3. System Analysis

3.1 Software Requirement specification

Page 12: Traffic Rules Mastery1

Software requirement specification is clear documentation of sotware.srs is clear then project

is clear. Software Requirements used are Windows XP and any other latest editions. Java

Technologies and oracle.

3.1.1 Introduction

3.1.1.1 Document Conventions

Typing is done on the 12 point size letters for the running text, 14 point size for the sub-

headings and 16 point size for main headings/titles/chapter names/etc. The font type is TIMES

NEW ROMAN.

The layout margin to be provided is 4 cm on the left, 3 cm on the top and bottom, 1.5 cm on

the right. Fresh paragraph is commenced after 5 spaces.

3.1.2 Overall Description

3.1.2.1 Hard Requirements:

The hardware used for the development of project is:

512MB RAM

40GB hard disk

Pentium IV Processor

3.1.2.2 Software Requirements

Java 2 standard Edition

Oracle 8i

Java database connectivity

Page 13: Traffic Rules Mastery1

Microsoft windows or Linux or Mac any version

3.1.3 Nonfunctional Requirements

3.1.3.1 Software Quality Attributes

Reliability: The system is reliable and produces accurate resulting from implementation

of security measures. Security is provided using password protection, release when time

out etc., by using these technologies the system is made more secure and more authentic.

Maintainability: The system will be designed as a closed system. New methods can be

added easily with little or no changes in the existing architecture.

Portability: The system should be portable. It can be deployed on any windows platform

and used.

Security: The protection of computer based resources includes hardware, software, data,

procedures and people against unauthorized use or natural disaster is known as system

security.

3.2 System Analysis

The unified modeling language allows the software engineer to express an analysis model

using the modeling notation that is governed by a set of syntactic semantic and pragmatic rules. A

Page 14: Traffic Rules Mastery1

UML system is represented using five different views that describe the system from distinctly

different perspective. Each view is defined by a set of diagram, which is as follows.

User Model View

This view represents the system from the user’s perspective.

The analysis representation describes a usage scenario from the end-users perspective.

Structural model view

In this model the data and functionality are arrived from inside the system.

This model view models the static structures.

Behavioral Model View

It represents the dynamic of behavioral as parts of the system, depicting the

interactions of collection between various structural elements described in the user

model and structural model view.

Implementation Model View

In this the structural and behavioral as parts of the system are represented as they are to

be built.

Environmental Model View

In this the structural and behavioral aspects of the environment in which the system is

to be implemented are represented.

3.2.1 Class Diagram:

Class diagrams are widely used to describe the types of objects in a system and their

relationships.  Class diagrams model class structure and contents using design elements such as

classes, packages and objects.  Class diagrams describe three different perspectives when

Page 15: Traffic Rules Mastery1

designing a system, conceptual, specification, and implementation.   These perspectives become

evident as the diagram is created and help solidify the design. Class diagram tell about the list of

classes with their attributes and methods which are used in each and every module.

3.2.2 Use Case Diagram:

Use case is a sequence of transactions performed by system which yields an observable result

of value for a particular actor.

A transaction consists of set of action, decision and message to other actor

To realize a software system and their requirements and relationship among actors and there

cases “use case diagrams” are very useful to understand all. A use case is a set of scenarios that

describing an interaction between a user and a system. A use case diagram displays the

relationship among actors and use cases.  The two main components of a use case diagram are use

cases and actors.

Here a user or a client is another system nothing but an “actor”, an actor will interact with the

system modeling.  A use case is an external view of the system that represents some action the

user might perform in order to complete a task. Use cases are used in almost every project.   They

are helpful in exposing requirements and planning the project.

Use case: USER

Here user is the main heart of our application and we are providing so many options to get all

meanings based on the words,

Page 16: Traffic Rules Mastery1

In this initially he should give the word to see the meaning for that user has search options,

whenever he giving a word that should be valid word. From the .ddb libraries checks all

information based on the user given data an that information will retrieve from .ddb. While user

viewing the data that should be show in the mobile

3.2.3 Sequence Diagram:

Sequence diagrams demonstrates the sequential flow of software architecture used in this

application .Sequence diagrams document the interactions between classes to achieve a result,

such as a use case. Because UML is designed for object oriented programming, this

communications between classes are known as messages. The sequence diagrams lists diagrams

lists objects horizontally, and time vertically, and models these messages over time

3.2.4 State machine

The behavior of an entity is not only a direct consequence of its input, but it also depends on its

preceding state. The history of an entity can best be modeled by a finite state diagram. State

Machine diagram can show the different states of an entity also how an entity responds to various

events by changing from one state to another.

State machine diagram specify state machines. This clause outlines the graphic element that may be shown in state machine diagram, and provides cross reference where detailed information about the semantics and concrete notation for each element can be found. It also furnishes examples that illustrate how the graphic elements can be assembled into diagrams

3.2.5 Data Flow Diagrams

The data flow diagram (DFD) is one of the most important modeling tools used by the system

analysis. DFD’s use a number of symbols to represents systems. There are four kinds of symbols

and are used to represent four kinds of system components namely process, data stores, data flows

and external entities. DFDs are used to illustrate how data flows and external entities. DFDs are

used to illustrate how data flows in a system.

Page 17: Traffic Rules Mastery1

Process Data Flow

External Entity Data Store

Process show what systems do. This describes how input data is converted output data. Each

process has a unique name and number. Each process has one or more inputs and produces one or

more outputs. Files or data stores are repository of data. It contains data that is retained in the

system. Process can enter data into a data or retrieve data from the data store. Each data store has

a unique name. External entities are outside the system but they either supply input data into

system or use the system output.

They are entities over which the designer has no control. External entities that supply data into

system are sometimes called source. External entities that use system data are sometimes called

sinks.

Data flows model the passage of data in the system. An arrow indicates the direction of the flow. Flows of data can be tack place between two processes from a data store to a process from a process to a process and from a process to a sink.

For describing the system by DFD’s common way is to model the whole system by one process, the DFD that does this is know as the context diagram. It shows the external entities that interact with the system and the data flow between these external entities and the system. This does not describe the system in detail. The DFD shows the major system processes is called the top level DFD. This shows the various processes that makeup the system; the DFD that describes the flow of physical data components between physical operations in a system is called physical DFD.

Page 18: Traffic Rules Mastery1

DFDs have a number of features, which can be used to ensure that they type are self explanatory, complete and unambiguous. The features are:

Absence of flowchart structures.

Conservation of data and

Good naming conservations

A good DFD should

Have no data flows that split up into a number of other data flows,

Have no crossing lines,

Not include flow chart loops of control elements and

Not include data flows that act as signals to active processes

4. System design

System design is transition from a user oriented document to programmers or data base personnel.

The design is a solution, how to approach to the creation of a new system. This is composed of

several steps. It provides the understanding and procedural details necessary for implementing the

system recommended in the feasibility study. Designing goes through logical and physical stages

of development, logical design reviews the present physical system, prepare input and output

specification, details of implementation plan and prepare a logical design walkthrough.

SOFTWARE DESIGN

In designing the software following principles are followed:

1. Modularity and partitioning: software is designed such that, each system should

consists of hierarchy of modules and serve to partition into separate function.

2. Coupling: modules should have little dependence on other modules of a system.

Page 19: Traffic Rules Mastery1

3. Cohesion: modules should carry out in a single processing function.

4. Shared use: avoid duplication by allowing a single module is called by other that need the

function it provides

4.1 Class diagrams

Motoristname = stringaddress = stringvehicle num = varchar

rulescrosed()

Userusername : string

update db()getdetails()

Databasename : string(15)vehiclenum : varchar(10)licencenum : varchar(10)addres : varchar(20)phone num : int(15)

update()add()delete()

Motoristname : stringaddres : varcharvehicle num : varcharname2 : type = initval

rules crossed()

Page 20: Traffic Rules Mastery1

4.2 Use case diagram

loging into the system

maintaing database

administrator

Page 21: Traffic Rules Mastery1

NewClass

enter vechile number

display details

4.3 Sequence diagram

Page 22: Traffic Rules Mastery1

user : NewClass

:Login :Enter the vehiclenumbere

:Database :Displaydetails

enter(username,password)

submit

enter vehicle numberrequest to database

response

display the detailsof vehicle

4.4 Tables

The basic units in SQL are tables, columns, and rows. So where does the “relational” model fit

into the SQL units

Page 23: Traffic Rules Mastery1

Strictly speaking, in terms of the relation model, the “relation” is mapped in the table: It provides

a way to relate the data contained within the table in a simple manner. A column represents a data

element present in a table, while a row represents an instance of a record, or entry, in a table. Each

row contains one specific value for each of the columns; a value can be blank or undefined and

still be considered valid. The table can be visualized, you guessed it, as a matrix, with the

columns being the vertical fields and the rows being the horizontal fields.

Attributes Constraint Data Type

Name Notnull Char(20)

Address Not null Varchar(20)

Vehicle number Primary key Varchar(15)

Rules crossed Notnull Int(10)

5. Implementation

5.1 Methodologies

Java Technology:

Page 24: Traffic Rules Mastery1

Initially the language was called as “oak” but it was renamed as “Java” in 1995. The

primary motivation of this language was the need for a platform-independent (i.e., architecture

neutral) language that could be used to create software to be embedded in various consumer

electronic devices.

Java is a programmer’s language.

Java is cohesive and consistent.

Except for those constraints imposed by the Internet environment, Java gives the

programmer, full control.

Finally, Java is to Internet programming where C was to system programming.

Importance of Java to the Internet:

Java has had a profound effect on the Internet. This is because; Java expands the Universe

of objects that can move about freely in Cyberspace. In a network, two categories of objects are

transmitted between the Server and the Personal computer. They are: Passive information and

Dynamic active programs. The Dynamic, Self-executing programs cause serious problems in the

areas of Security and probability. But, Java addresses those concerns and by doing so, has opened

the door to an exciting new form of program called the Applet.

Java can be used to create two types of programs:

Applications and Applets : An application is a program that runs on our Computer

under the operating system of that computer. It is more or less like one creating using C or C++.

Java’s ability to create Applets makes it important. An Applet is an application designed to be

transmitted over the Internet and executed by a Java –compatible web browser. An applet is

actually a tiny Java program, dynamically downloaded across the network, just like an image. But

Page 25: Traffic Rules Mastery1

the difference is, it is an intelligent program, not just a media file. It can react to the user input and

dynamically change.

Features of Java Security:

Every time you that you download a “normal” program, you are risking a viral infection.

Prior to Java, most users did not download executable programs frequently, and those who did

scan them for viruses prior to execution. Most users still worried about the possibility of infecting

their systems with a virus. In addition, another type of malicious program exists that must be

guarded against. This type of program can gather private information, such as credit card

numbers, bank account balances, and passwords. Java answers both these concerns by providing a

“firewall” between a network application and your computer.

When you use a Java-compatible Web browser, you can safely download Java applets without

fear of virus infection or malicious intent.

5.2 Sample Code

1. Coding with Output Screens

Import statements;

Public class Prof extends Frame implements ActionListener

{

Declaration of variables;

}

Page 26: Traffic Rules Mastery1

Prof ()

{

//constructor

//add buttons

}

Public void actionPerformed (ActionEvent ae)

{

//data base connection

//operations

}

Public void paint (Graphics g)

{

//displaying on frame

}

}

Page 27: Traffic Rules Mastery1

5.3 Screens

Page 28: Traffic Rules Mastery1
Page 29: Traffic Rules Mastery1
Page 30: Traffic Rules Mastery1
Page 31: Traffic Rules Mastery1
Page 32: Traffic Rules Mastery1
Page 33: Traffic Rules Mastery1
Page 34: Traffic Rules Mastery1
Page 35: Traffic Rules Mastery1

6. TESTING

Page 36: Traffic Rules Mastery1

Software Testing

Testing Software testing is a critical element of software quality assurance and represents the

ultimate review of specification, design and code generation.

6.1 TESTING OBJECTIVES

To ensure that during operation the system will perform as per specification.

TO make sure that system meets the user requirements during operation

To make sure that during the operation, incorrect input, processing and output will

be detected

To see that when correct inputs are fed to the system the outputs are correct

To verify that the controls incorporated in the same system as intended

Testing is a process of executing a program with the intent of finding an error

A good test case is one that has a high probability of finding an as yet

undiscovered error

The software developed has been tested successfully using the following testing strategies and

any errors that are encountered are corrected and again the part of the program or the procedure or

function is put to testing until all the errors are removed. A successful test is one that uncovers an

as yet undiscovered error.

Note that the result of the system testing will prove that the system is working correctly. It will

give confidence to system designer, users of the system, prevent frustration during

implementation process etc.,

6.2 TEST CASE DESIGN:

White box testing

Page 37: Traffic Rules Mastery1

White box testing is a testing case design method that uses the control structure of the procedure

design to derive test cases. All independents path in a module are exercised at least once, all

logical decisions are exercised at once, execute all loops at boundaries and within their

operational bounds exercise internal data structure to ensure their validity. Here the customer is

given three chances to enter a valid choice out of the given menu. After which the control exits

the current menu.

Black Box Testing

Black Box Testing attempts to find errors in following areas or categories, incorrect or missing

functions, interface error, errors in data structures, performance error and initialization and

termination error. Here all the input data must match the data type to become a valid entry.

The following are the different tests at various levels:

Unit Testing:

Unit testing is essentially for the verification of the code produced during the coding phase

and the goal is test the internal logic of the module/program. In the Generic code project, the

unit testing is done during coding phase of data entry forms whether the functions are

working properly or not. In this phase all the drivers are tested they are rightly connected or

not.

Integration Testing:

All the tested modules are combined into sub systems, which are then tested. The goal is to

see if the modules are properly integrated, and the emphasis being on the testing interfaces

between the modules. In the generic code integration testing is done mainly on table creation

module and insertion module.

Validation Testing

This testing concentrates on confirming that the software is error-free in all respects. All the

specified validations are verified and the software is subjected to hard-core testing. It also aims at

Page 38: Traffic Rules Mastery1

determining the degree of deviation that exists in the software designed from the specification;

they are listed out and are corrected.

System Testing

This testing is a series of different tests whose primary is to fully exercise the computer-based

system. This involves:

Implementing the system in a simulated production environment and testing it.

Introducing errors and testing for error handling.

Test Cases:

Test case 1: vehicle number verification Priority (H, L): High

Test Objective: user should be avail Traffic rules mastery software features in system

Test Description: get information from database

Requirements Verified: Yes

Test Environment: J2SE development environment

Test Setup/Pre-Conditions:

Actions Expected Results

User should give the word and get the information. Find the information through .ddb

Page 39: Traffic Rules Mastery1

Pass: Yes Conditions pass: Yes Fail: No

Problems / Issues: NIL

Notes: Successfully Executed

6.3 Screens for Failure Test Cases

Page 40: Traffic Rules Mastery1
Page 41: Traffic Rules Mastery1

7. Conclusion

The project gives the fast and efficient detail of a particular vehicle or motorist. So, by using

this we can know the present status of a motorist and when the vehicle is to be sized .This can

be done using update method .After certain period of time the vehicle is dispatched to vehicle

owner .By this we can control the traffic problems. And we can overcome the problem of miss

use of money by individuals.

Page 42: Traffic Rules Mastery1

When it comes to the conclusion part of our project where here we have the certain limitations

of crossing the rules after it goes into the vehicle seize situation. Moreover the fine amount

should be paid through demand draft where no third part can involve in it. Thus it helps us to

improve the security. By implementing through this project the traffic problems may limit

unto certain extent.

The proposed system has high security regarding to database and application it consist of

login and password through this particular authentication person can access it.

BIBLORAPHY

1. http://www.oracle.com/index.html

2. http://weblogs.sqlteam.com/jeffs/archive/2007/10/31/sql-server-2005-date-time-only-data-

types.aspx