Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Fina LLLLL

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 70

A Dissertation on

BACKUP ASSISTANT
A Dissertation Submitted In Partial Fulfillment of the Requirements for the Degree of

MASTER OF COMPUTER APPLICATION


by

Ramesh Kumar
(Enrollment no. 100291405242) Under the Supervision of

Mr. Naresh Chandra KIET Group of Institutions, Ghaziabad

to the FACULTY OF COMPUTER APPLICATION

MAHAMAYA TECHNICAL UNIVERSITY NOIDA, INDIA


JUNE, 2013

DECLARATION

I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or other institute of higher learning, except where due acknowledgment has been made in the text.

Ramesh Kumar Roll No. 1002914084

ii

CERTIFICATE

Certified that Ramesh kumar (Enrollment no. 100291405242) has carried out the project work presented in this project entitled IT SPARK for the award of MASTER OF COMPUTER APPLICATION from MAHAMAYA TECHNICAL UNIVERSITY, NOIDA under my supervision. The report embodies results of original work, and studies are carried out by the student himself and the contents of the report do not form the basis for the award of any other degree to the candidate or to anybody else from this or any other University/Institution.

Mr. Naresh Chandra Internal Supervisor Assistant Professor Department of Computer Applications KIET Group of Institutions, Ghaziabad External Examiner

Mr. Nikhil Singh External Supervisor It Spark, Noida

Dr. Anil Kumar Ahlawat Professor & Head Department of Computer Applications KIET Group of Institutions, Ghaziabad

iii

ABSTRACT

System is used basically to help those persons who changing their mobile handsets and also for those who are having fear in their mind that their mobile will be lost someday and they will loose all their valuable data like their important and loveones messages and their contact list.

Import Contacts and Messages: In this module of the application user can fetch back all the valuable data into his mobile handset desired directory, this application will convert text file into .csv format that is compatable to mobile application.

Export Contacts and Messages: In this module of the application we can send our valuable data information directly into our email address. This module convert all the .csv data into text file so that user can search and see his data and access later Time saving Increased efficiency Allows neat handling of data rather than error prone records. iv

Decreases overhead

ACKNOWLEDGEMENT

Attitude within ourselves during the academic period of MCA, this project is a culmination of task undertaken by me. Acknowledgement is not a mere formality or ritual but a genuine opportunity to express the indebtedness to all those without whose active support and encouragement this project wouldnt have been possible I am extremely thankful to Dr.Narendra Kumar (Director of KIET Group of Institution Ghaziabad) He provided us with all the necessary resources and guidance during the project which helped us to complete the project successfully I am highly indebted to Dr. Anil Ahlawat ( HOD, Deptt. of Computer Applications ) for his continuous effort in building a good infrastructure and develop a professional. I am extremely grateful to Mr. Naresh Chandra for his revered guidance and encouragement, which led to the completion of this project till now. Without his constant appraisal and efforts, this task would have been a mere dream. I deem it a great pleasure to thank Mr. Nikhil Singh, He helped me directly or indirectly in carrying out this term paper project work. He was always there to help us throughout this project.. I am also thankful to my colleagues and friends for their support. vi

RAMESH KUMAR

vii

TABLE OF CONTENTS

Page No Certificate Abstract Acknowledgements List of Figures List of Abbreviations CHAPTER 1:INTRODUCTION 1.1 1.2 Project Overview Technology Overview 1.2.1 Front End For Android Application 1.2.2 Back End For Android Application 1.2.2.1 Model-View-Controller Architecture 1.3 1.4 1.5 Company Overview Project Organization 1.4.1 Project Objective Software Process Model 1.4.2.1 Waterfall Model CHAPTER 2:SYSTEM ANALYSIS 2.1 2.2 Identification Of Need Feasibility Study viii ii iii iv v vi 1-9 1 1 2 5 5 6 7 7 8 9 10-13 10 10

2.2.1 Technical Feasibility 2.2.2 Economical Fessibility 2.2.3 Operational Feasibility

11 12 13

ix

CHAPTER 3:REQUIREMENT ANALYSIS 3.1 3.2 Existing System Proposed System 3.2.1 ADVANTAGES 3.2.1.1 Completely Automated 3.2.1.2 Security 3.2.1.3 Reliability 3.2.1.4 Modularity 3.2.1.5 Easy Updating/Maintenance Of Data CHAPTER 4:SYSTEM DESIGN 4.1 4.2 4.3 DESIGN OBJECTIVES SOFTWARE DESIGNS STAGES DESIGN CONCEPTS 4.3.1 Top down Approach 4.3.2 Bottom up Approach 4.4 STRUCTURE DESIGN 4.4.1 Flow Chart 4.4.2 Data Flow Diagram 4.4.2.1 Data Flow 4.4.2.2 Process 4.4.2.3 External Entity 4.4.2.4 Data Store 4.4.2.5 Context Level 4.4.2.6 Zero Level CHAPTER 5: software requirement specification (SRS) 5.1 General Requirements x

14-16 14 14 15 15 15 15 15 16 17-22 17 17 18 18 18 19 20 20 21 21 21 21 22 22 23- 24 24

5.2 5.3

Software Requirements Hardware Requirements

24 24

xi

CHAPTER 6:TESTING 6.1 6.2 6.3 6.4 Testing Testing Object Testing principal Testing Fundamental 6.4.1 Program Testing 6.4.2 Moduling Testing 6.4.3 System Testing 6.4.4 Unit Testing 6.4.5 Special Testing 6.4.6 Test Stop Criteria CHAPTER 7:IMPLEMENTATION 7.1 7.2 7.3 7.4 Characteristics of Language used Validation Checks Installation User Training Requirement 25

25-27 25 25 27 27 27 27 28 27 27 28-30 29 29 29 30 31-31 31 31 31 31 31 32-39 39-40

CHAPTER 8:MAINTENANCE Conclusion and Discussion 8.1 8.2 8.3 8.4 Limitation of the project Difficulties encountered Future Enhancements Experience gained (Technical & other) SCREEN SHORT CONCLUSION DISCUTION xii

CHAPTER 9: CHAPTER 10:

CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER 13:

FUTURE SCOPE OF THE PROJECT DATA DICTIONARY BIBLIOGRAPHY CURRICULUM VITAE

40-41 40-41 42-43 43-42

xiii

LIST OF FIGURES

Fig No Figure 1.2.2 Figure 1.2.2.1 Figure 1.4.2 Figure 4.4.1 Figure 4.4.2.1 Figure 9.1: Figure 10.5

Title of Figure Android Architecture MVC Architecture Waterfall Model Flow Chart Data Flow Diagram Screenshots of Application Pert Chart

Page No 4 6 9 20 21 36 46

xiv

LIST OF ABBREVIATIONS

DFD GB GUI SDK ADT RAM SDLC SRS

Data Flow Diagram Giga Byte Graphical User Interface Software Development Kit Android Development Kit Random Access Memory Software Development Life Cycle Software Requirement Specification

xv

CHAPTER 1 INTRODUCTION

1.1 Project Overview

System is used basically to help those persons who changing their mobile andsets and also for those who are having fear in their mind that their mobile will be lost someday and they will loose all their valuable data like their important and loveones messages and their contact list.

1.2 Technology Overview Eclipse is a multi-language software development environment comprising an integrated development environment (IDE) and an extensible plug-in system. It is written mostly in Java. It can be used to develop applications in Java and, by means of various plug-ins, ther programming languages including Ada, C, C++, COBOL, Haskell, Perl, PHP, ython, Ruby (including Ruby on Rails framework), Scala, Clojure, Groovy and cheme. It can also be used to develop packages for the software Mathematica. Development environments include the Eclipse Java development tools (JDT) for Java, Eclipse CDT for C/C++, and Eclipse PDT for PHP, among others.The Eclipse Platform uses plug-ins to provide all functionality within and on top of the runtime system, in contrast to some other applications, in which functionality is hard coded. The Eclipse Platform's runtime system is based on Equinox, an implementation of the OSGi core framework specification. The Eclipse SDK includes the Eclipse Java development tools (JDT), offering an IDE with a built-in incremental Java compiler and a full model of the Java source files. This allows for advanced refactoring techniques and code analysis. The IDE also makes use of a

workspace, in this case a set of metadata over a flat filespace allowing external file modifications as long as the corresponding workspace "resource" is refreshed afterwards.Eclipse implements widgets through a widget toolkit for Java called SWT, unlike most Java applications, which use the Java standard Abstract Window Toolkit (AWT) or Swing. Eclipse's user interface also uses an intermediate graphical user interface layer called JFace, which simplifies the construction of applications based on SWT.

1.2.1

Front End For Android Application: Android software development is the process by which new applications are

created for the Android operating system. Applications are usually developed in the Java programming language using the Android Software Development Kit, but other development tools are available. As of April 2011 more than 200,000 applications have been developed for Android, with over 3 billion downloads. The Android platform has also grown to become a favorite among mobile developers. A June 2011 research indicated that over 67% of mobile developers used the platform, at the time of publication

1.2.1.1 Android SDK The Android software development kit (SDK) includes a comprehensive set of development tools. These include a debugger, libraries, a handset emulator based on QEMU, documentation, sample code, and tutorials. Currently supported development platforms include computers running Linux (any modern desktop Linux distribution), Mac OS X 10.4.9 or later, Windows XP or later. The officially supported integrated development environment (IDE) is Eclipse using the Android Development Tools (ADT) Plug-in, though developers may use any text editor to edit Java and XML files then use command line tools (Java Development Kit and Apache Ant are required) to create, build and debug Android applications as well as control attached Android devices (e.g., triggering a reboot, installing software package(s) remotely).Android applications are packaged in .apk format and stored under /data/app folder on the Android OS (the folder is 2

accessible only to root user for security reasons). APK package contains .dex files(compiled byte code files called Dalvik executables), resource files, etc

1.2.1.2 Java standards Obstacles to development include the fact that Android does not use established Java standards, i.e. Java SE and ME. This prevents compatibility among Java applications written for those platforms and those for the Android platform. Android only reuses the Java language syntax and semantics, but does not provide the full class libraries and APIs bundled with Java SE or ME. However, there are multiple tools in the market from companies such as Myriad Group and UpOnTek that provide J2ME to Android conversion

Android Architecture: The following diagrams show the major components of the android operating system. Each section is described in detail in below.

Figure 1.1

1.2.2

Back End For Android Application In the enterprise environment, there are several common t asks

involved when building mobile apps to connect to backend applications. For example, youll need to: Connect to the backend application, typically through some web service protocol Retrieve the payload data from that backend Parse the data into a consumable form Store the data locally on the device in some form of database and employ some form of ongoing database management when data is stored locally Encrypt the data on the device (when sensitive information is involved) Make sure that data and applications can be remotely wiped if a device is lost or stolen, or an employee is terminated While apps that require synchronized offline data access on the smartphone can eliminate a number of these steps, a sync server would be required, which creates a specific task list of its own, including: Hosting the sync server Tying the sync server with the overall enterprise authentication directory Writing a sync source adapter to interact with the backend application To execute these key steps, following are best practices that will help simplify the development of connections between native applications and backend business systems. 1.2.2.1 Model-View-Controller Architecture: Model-view-controller (MVC) is an architectural pattern used in software engineering, MVC separates data (model-l The domain-specific representation of the information on which the application operates. Many applications use a persistent storage mechanism such as a database to store data.) and user interface (view- Renders the model into a form suitable for interaction) Changes to the user interface do not impact the data handling, and that the data can be reorganized without changing the user interface. MVC

solves this problem by decoupling data access and business logic from data presentation and user interaction, by introducing an intermediate component: the controller - Processes and responds to events, typically user actions, may invoke changes on the model

Figure 1.2 MVC, where the view is the actual HTML page and the code which gathers dynamic data and generates the content within the HTML is the controller. Finally the model is represented by the actual content, usually stored in a database or XML-filesThe user interacts with the user interface.

A controller handles the input event from the user interface, often via a registered handler or callback. The controller accesses the model, possibly updating it in a way appropriate to the user's action.A view uses the model to generate an appropriate user interface

1.3 Company Overview IT Spark is a company with commitment and passion for providing value to its customers by enabling technology. ITSpark brings you highly focused and career oriented technical education services with the support of professionals, who have years of years in this domain. The software engineers & other professionals employed by us make every effort to meet the exact requirements of the students. Our state-of-the-art echnologies have helped us to provide these courses in sync with the training industry norms. We have received many honors and are rated as one of renowned Software Training Centers in the city. It spark was set up in 2010 with an aim to establish itself leading global it solution providers on road to the vision the company has already emerged among India's fastest growing organizations that provide quality IT enabled services to its clients. The company motto "Your Destination For Perfection" reflects our dedication towards serving our clients. At Universal Informatics, everything else takes back stage when Client Satisfaction comes into consideration.The mission of IT Spark is to deliver custom information technology solutions to businesses worldwide, from start-ups to established industry leaders. Weve carefully built an entrepreneurial, growth-oriented company that encourages creativity, trust, the free exchange of information, and professional growth for every team member. We pride ourselves on creating and cultivating long-term, win-win relationships with our clients by delivering innovative technology advances, quality results, and superior customer service. Our interests are always aligned with those of each and every Universal Informatics client

1.4 Project Organization:

The main objective of our project is to Backup based and Android Mobile based Backup Assistant application facilitating Backup Contacts and Messages. Our application is very beneficial whenever a any body lost his/her mobile phone the his/her

lost all the contacts and message as well in this situation this application is truly benefited for that time any body use this application to save their contacts and messages. He/she can save their contacts and messages on your E-mail Id and saved their contacts. 1.4.1 Project Objective: The other objective of our project is to keep track of the various operations made by the customers approaching to BackUp the data of the Mobile. Our project is easing the manual efforts in keeping track of all the activities in the Contact such as call logs and messages as well such as send message and receive message , which includes becoming huge amount of data into the form of messages and contacts and another confident information.In our application , we are giving four options for the user for their convenience, these are Import Contacts Export Contacts Import Messages Export Messages

Import Contacts and Messages: In this module of the application user can fetch back all the valuable data into his mobile handset desired directory, this application will convert text file into .csv format that is compatable to mobile application. Export Contacts and Messages: In this module of the application we can send our valuable data information directly into our email address.This module convert all the .csv data into text file so that user can search and see his data and access later. 1.4.2 Software Process Model:

According to Webster the term process means A particular method of doing something, generally involving a number of steps or operations. The software process that deals with the technical and management issues of software development is called a software

1.4.2.1 Waterfall Model A waterfall model is optimal if the requirements are clear because every phase should be implemented in a sequential manner. Output of one phase should be the input for next phase. We select this model if projects are small in size and user requirements are constant if any mistake in one phase, same mistake will be repeated till the end of the process. Any change in the requirements, rework needs to be done from phase one.

Figure 1.3

There are some reasons that cause for us to choose this model for our project development: A waterfall model is easy to follow. It can be implemented for any size project. Every stage has to be done separately at the right time so you cannot jump stages. Documentation is produced at every stage of a waterfall model allowing people to understand what has been done. Testing is done at every stage. A waterfall model helps find problems earlier on which can cost a business less than if it was found later on. Requirements will be set and these wouldn't be changed.

10

CHAPTER 2 SYSTEM ANALYSIS

2.1 Identification of need: There are many of the origion of the mobile phones who use many backup for contacts and messages . we can schedule backup for the messages and contact time to time in our mobile phone to save our contacts and messages but we can not import the contacts message to our e-mail id and after that we can import from that id and for our future use we can export the messages and contacts on the behalf of this purpose we can use a ruithful application for the real senarion of the mobile applaction .The purposes of the BackUp Assistant is used this application in the proper manner as a current real time Android Application. The user can easly use this application because this is very user friendly and easy to use android application as we have seen most of the time many people face this kind of problem this provide the help to the uaser to save their information .Since internet is a pivot for modern business, our project which is based on internet paves a path for modernization in trade . 2.2 Feasibility Study: In the system development life cycle, the first step is to lead to a problem definition according to the idea for change in the existing system. Depending on the result of initial investigation, the survey is expanded to a mordetailed feasibility study. Feasibility study is test of system proposal according to its workability, impact on the organization, ability to meet users need and effective use of resources. The feasible study is the high

11

level capsule version of the staff the entire system analysis and design process. The objective of the feasibility study is to determine whether the proposed system is feasible. The feasibility study can be classified into the following categories.Feasibility depends upon non technical Issues like: Are the projects cost and schedule assumption realistic Does the business model realistic? Is there any market for the product? 2.2.1 Technical Feasibility 2.2.2 Economical Feasibility 2.2.3 Operational Feasibility

2.2.2 Technical Feasibility Technical feasibility centers on the existing computer system and to what extent it can support the proposed addition i.e. it evaluates existing hardware and software. In ever changing software world, selecting one tool set and platform is very difficult task. We should be extremely careful in the selection of the software platform and tools for development. If we could be able to select a tool set and platforms which can seamlessly integrate into other software platform and the support for the future can be ensured, then the system will be technically feasible. In the proposed system all details about the system is designed on the web and mobile application. User can select options for seeing their own choices. All are available on the web site and mobile app as well. To use the system, the system must be hosted on the web or one should have an android phone. Nowadays memory space for hosting the system on the web is available by giving some charge to authorized organizations. In todays age every tenth person has an android phone. The proposed system is technically feasible, as it is designed on a Is it technically feasible to provide direct communication connectivity through space from one location of globe to another location? Is it technically feasible to design a programming Language usingSanskrit

12

web it work smoothly on any computer system with internet connection. The proposed android application can be accessible easily on android phone. There are a number of technical issues, which are generally raised during the feasibility stage of investigation. They are as follows Does the necessary technology exist to do what is suggested? Does the proposed equipment have the technical capacity to hold the data required to use the new system? Can the system be upgraded if developed?
Are there technical guarantees of accuracy, reliability, ease of access and data

security? The system is designed to replace an existing manual system .The System is to be installed in a separate room with power and good infrastructure for the system. This project is done in JAVA and Android Development environment. This project needs only the minimum hardware requirements and an android enable phone, and it can operate a person with minimum computer knowledge.

2.2.2 Economical Feasibility

Economic analysis is the most frequently used method for evaluating the effectiveness of a candidate system. More commonly known as cost/benefit analysis, the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits overweigh costs, the decision is made to design and implement the system. Otherwise further alteration will have to be made if it is to have a chance of being approved. At first, management should invest as much money as needed for the specified system, peripherals and the required software under system configuration. The developer is found to be efficient and sufficient enough to operate the

13

new system and this avoids the situation for recruiting new operators, and avoids extra expenses in this field, too. The cost to conduct a full system investigation The cost of hardware and the software for the class of application being considered The benefits in flee from of reduced costs or fewer costly errors The cost of nothing changes (i.e. if the proposed system is not developed)

Proposed system is cost effective in such a way that the system can be used effectively with one computer having internet connection and for android app one should have an android phone. So the system is economically feasible. Matrimonial Web and Android Application requires only minimum hardware, and it is completely done in Java. It doesnt require any user training for the operation. So the system is very economic.

2.2.3 Operational Feasibility

Once the change takes place from existing manual system to computerized system, depending on the complexity of the installed computerized system, high quality manpower should be employed for the smooth functioning of the system. So we should select the platform and tools in such a way that, once the system is up and running, getting the right manpower for that system to function successfully, should not be cause to worry. The manpower should be easily available so that even if one person leaves he can easily replaceable. The system will be used if it is developed well then be resistance for users that undetermined Is the system will work when it is developed and installed?

Nomajor training and new skills are required as it is based on DBMS model.

14

It will help in the time saving and fast processing and dispersal of user request and applications. New product will provide all the benefits of present system with better performance.Improved information, better management and collection of the reports. User support.User involvement in the building of present system is sought to keep in mind the user specific requirement and needs. Faster and systematic processing of user application approval, allocation of Ids etc. used had greater chances of error due to wrong information entered by mistake.

15

CHAPTER 3 Requirement Analysis

3.1 Existing system In todays Whether you are a home user, student or professional, it is always important to keep and organize important information, contacts , dates and events. Mobility strategy is mobile software that helps you manage different kinds of information with ease and efficiency. Mobility startegy comes with lots of useful features, allowing you to save your time, increase productivity and focus on your job.

3.2 Proposed System:

The proposed system and android application aims at completely converting the manual system in a much productive manner. The idea is to create a website and a android application which can host by anyone approaching the matrimonial site. The system proposed in this project is a completely automated one, which is designed to provide a solution to all the drawbacks of the existing system. The proposed system is designed in Android as front end . The graphical interface designed for this project makes it easy for users to interact with the system and get information that he/she requires. . These exclusive properties of the proposed system make it better than the existing system.

3.2.1 ADVANTAGES: 3.2.1.1 Completely Automated

16

The proposed system is a completely automated system which has all the advantages of a computer system . 3.2.1.2 Security Multiple levels of security are provided in applications, so that data remains confidential. Password system is provided for privacy, 3.2.1.3 Reliability : The reliability factor is another problem in the existing system where the information given may be misleading. The proposed system being a fully automated one reduces the chances of errors and provides trustworthy information to the user. The proposed system being a fully automated one makes it extremely fast compared to the existing manual system. In the proposed system, data lies at a one click distance whereas in the existing system shows the high sp eed of the proposed system.

3.2.1.4 Modularity This project has been the following modules Blocking number, message scheduler, task manger, backup & recovery,These modules are implemented separately and integrated at a later stage.

3.2.1.5 Easy Updating/Maintenance Of Data The main Advantage of the existing system is the easiness in the updating and Maintenance. The proposed system being an automated one makes the user to update and manage data easily without much training.

17

CHAPTER 4

SYSTEM DESIGN

Design is process of developing specifications for a candidate system that meet the criteria established in the system analysis. A design should exhibit hierarchical organization that makes intelligent use of control among the elements of the system. It emphasizes on transforming performance specifications and it involves conceiving and planning and then carrying out the plan by generating necessary output.

4.1 DESIGN OBJECTIVES To introduce the process of software design. To describe the different stages in this designprocess. To show how object-oriented and functionaldesign strategies are complementary. To discuss some design quality attributes.

4.2 SOFTWARE DESIGNS STAGES Problem understanding Look at the problem from different angles to discover the design requirements Identify one or more solutions Evaluate possible solutions and choose the most appropriate depending on the designer's experience and available resources Describe solution abstractions 18

Use graphical, formal or other descriptive notations to describe the components of the design

Repeat process for each identified abstraction until the design is expressed in primitive terms Any design may be modeled as a directed graph made up of entities with attributes which participate in relationships The system should be described at several different levels of abstraction

Design takes place in overlapping stages. It is artificial to separate it into distinct phases but some separation is usually 4.3 DESIGN CONCEPTS the design must implement all of the explicit requirements contained in the analysis model, and it must accommodate all of the implicit requirements desired by the customer the design must be a readable, understandable guide for those who generate code and for those who test and subsequently support the software. the design should provide a complete picture of the software, addressing the data, functional,and behavioral domains from an implementation perspective. 4.3.1 Top down Approach A top-down approach (also known as stepwise design) is essentially the breaking down of a system to gain insight into its compositional sub-systems. In a topdown approach an overview of the system is formulated, specifying but not detailing any first-level subsystems. Each subsystem is then refined in yet greater detail, sometimes in many additional subsystem levels, until the entire specification is reduced to base elements. A top-down model is often specified with the assistance of "black boxes", these make it easier to manipulate. However, black boxes may fail to elucidate elementary mechanisms or be detailed enough to realistically validate the model. . 19

4.3.2 Bottom up Approach A bottom-up approach is the piecing together of systems to give rise to grander systems, thus making the original systems sub-systems of the emergent system. Bottom-up processing is a type ofinformation processing based on incoming data from the environment to form a perception. Information enters the eyes in one direction (input), and is then turned into an image by the brain that can be interpreted and recognized as a perception (output).

4.4 STRUCTURE DESIGN Structured software design is arranged hierarchically, Structured software follows rules:

Modules are arranged hierarchically. There is only one root (i.e., top level) module. Execution begins with the root module. Program control must enter a module at its entry point and leave at its exit point. Control returns to the calling module when the lower level module completes execution

4.4.1 FLOW CHART A flowchart is a type of diagram that represents an algorithm or process, showing the steps and their order by connecting these with arrows. This diagrammatic representation can give a step-by-step solution to a given problem. Process operations are represented in these boxes, and arrows connecting them represent flow of control. Data flows are not typically represented in a flowchart, in contrast with data flow

20

diagrams; rather, they are implied by the sequencing of operations. Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.

Figure 4.1 4.4.2 DATA FLOW DIAGRAM A DFD also known as bubble chart has the purpose of clarifying system requirements and identifying major transformations. It shows the flow of data through a

21

system. It is a graphical tool because it presents a picture. The DFD may be partitioned into levels that represent increasing information flow and functional detail.Four simple notations are used to complete a DFD. These notations are given below:4.4.2.1 DATA FLOW: - The data flow is used to describe the movement of information from one part of the system to another part. Flows represent data flow is represented by an arrow.

Figure 4.2 4.4.2.2 PROCESS: - A circle or bubble represents a process that transforms incoming data to outgoing data. Process shows a part of the system that transforms inputs to outputs.

Figure 4.3 4.4.2.3 EXTERNAL ENTITY: - A square defines a source or destination of system data. External entities represent any entity that supplies or receive information from the system but is not a part of the system.

Figure 4.4

22

4.4.2.4 DATA STORE:- The data store represents a logical file. A logical file can represent either a data store symbol which can represent either a data structure or a physical file on disk. The data store is used to collect data at rest or a temporary repository of data. It is represented by open rectangle.

Figure 4.5 4.4.2.5 Context Level Request USER Response Figure 4.6 4.4.2.6 Zero Level BackUp Assistent

Import Contac t

Export Contact
Email id in .csv file

User Import Messa ge Export Messag e

23

Figure-4.7

24

CHAPTER 5 software requirement specification (SRS)

A computerized system is adopted to overcome the problems of the existing system and an Android Application is developed having kept in mind the boom in android app market for future perspective. The new system is menu-driven and user friendly. The system keeps all the records and any data can be retrieved when the need arises. In the system, the reports of all evaluation are available for the user and administrator. In this project, we are using the Android Software Development Kit . For creating the user interface and developing the code, we use the Android Layout Files i.e. called the xml files in Android . There are three major parties involved in a new system: the client, the developer and the user. Somehow the requirements for the system will satisfy the needs of the clients and the concerns of the users have to be communicated to the developer. The problem is that the client usually does not understand the software or the software development process, and the developer often does not understand the clients problem and application area. This causes a communication gap between the parties involved in the development of the project. A basic purpose of the software requirement specification is to bridge this gap. SRS is the medium through which the client and the user requirements are accurately specified by the developer. The main advantages of SRS are: An SRS establishes the basis for agreement between the client and supplier on what the software project will do. An SRS provides reference for the validation of the final product. A high quality SRS is a prerequisite to high-quality software. A high quality SRS reduces the development cost. 25

5.1 General Requirements: A newly designed system should have all the pieces in working order. Thus we have to determine exactly what the proposed system is to do by defining its expected performance. Systems required performance is defined its outputs in a user acceptable format.

5.2 Software Requirements: Software specification is a critical aspect of the system development and must be performed before hardware selection. The first step in selection understands the users requirements within the framework of the organizations objectives and the environment in which the system is being installed. Eclipse SDK 4.2,ADT 21 Plugin JDK 1.6 as a Programming language XML for Designing Photoshop for image editing

The software for the development has been selected based on several factors such as: Support Cost effectiveness Development speed Ability to create robust applications in less time Stability

5.3 Hardware Requirements: 2 GB RAM 500 GB HDD, Dual Core Processor(Recommanded)

26

27

CHAPTER 6 TESTING

6.1 TESTING Software testing is a process of verifyingand validatingthat a software application or program. MeeSts the business and technical requirements that guided its design and development, and Works as expected.

6.2 TESTING OBJECTIVE To discuss the distinctions between validation testing and defect testing. To describe the principles of system and component testing. To describe strategies for generating system test cases. To understand the essential characteristics of tools used for test automation

. 6.3 TESTING PRINCIPLES Test a program to try to make it fail. Start testing earlier. 28

Testing is context dependent. Define test plan.

29

Design effective test cases. Test for valid as well as invalid conditions. Review test cases regularly Testing must be done by different persons at different levels.

6.4 TESTING FUNDAMENTALS The purpose of the system testing is to consider all the likely variations to which it will be suggested and push the systems to limits. The testing process focuses on the logical intervals of the software ensuring that all statements have been tested and on functional interval is conducting tests to uncover errors and ensure that defined input will produce actual results that agree with the required results. Program level testing, modules level testing integrated and carried out.

6.4.1

Program Testing This testing is done to identify and rectify the logical and syntax error in the

code.

6.4.2

Module Testing In this testing each module is tested independently. Every possible care is taken

to remove the bugs. And it is also checked here that model is performing its desired function or not. 6.4.3 System Testing

30

In this testing all the modules are combined together and tested thoroughly. A large amount of test cases has been tested to remove the bugs. In this we have made an effort to remove all the possible bugs, so that our system can run smoothly and give an accurate output.

6.4.4 Unit Testing Unit Testing is done on each coding part of a module one by one to analyze any remedies.

6.4.5 Special Test Needs Server availability. Since the images will be sent through the network and the educator will have frequent access to trainees machine, the network performance should be hight

6.4.6 Test Stop Criteria Once all the specifications are met. All the test cases are executed.

31

32

CHAPTER 7 Implementation

The term maintenance, when accompanied to software, assumes a meaning profoundly different from the meaning it assumes in any other engineering discipline. In fact, many engineering disciplines intend maintenance as the process of keeping something in working order, in repair. The key concept is the deterioration of an engineering artifact due to the use and the passing of time; the aim of maintenance is therefore to keep the artifacts functionality in line with that defined and registered at the time of release. Of course, this view of maintenance does not apply to software, as software does not deteriorate with the use and the passing of time A program that is used in a real world environment necessarily must change or become progressively less usefulin that environment. Significant changes also derive from the need to adapt software to interact with external entities, including people, organizations, and artificial systems. In fact, software is infinitely malleable and, therefore, it is often perceived as the easiest part to change in a system. The IEEE definition is as follows: Software maintenance is the process of modifying a software system or component after delivery to correct faults, improve performances or other attributes, or adapt to a changed environment.

33

7.1 CATEGORIES OF SOFTWARE MAINTENANCE Classifications of maintenance activities have been defined; these

classifications help to better understand the greatsignificance of maintenance and its implications on the cost and the quality of the systems in use. Dividing the maintenance effort into categories has first made evident that software maintenance is more than correcting errors. The IEEEdefinitions are as follows: Corrective maintenance:reactive modification of a software product performed after delivery to correct discovered faults. Adaptive maintenance:modification of a software product performed after delivery to keep a computer program usable in a changed or changing environment. Perfective maintenance:modification of a software product performed after deliveryto improve performance or maintainability. Emergency maintenance:unscheduled corrective maintenance performed to keep a system operational.

7.2 Validation Checks: Validation refers to the process of using the technique to find the errors during the time of entries are filled in the empty box. The validation is not for the security purpose of the system it is for only the clean entries to be entered in the system. In case of invalid data as input we may end up with the inconsistent data

7.3 Installation: for Android Application:Because the Android operating system is a relative newcomer to the mobile phone market, a strong and cohesive Android Internet support

34

community appears to be lacking. In order to install matrimonial applications to Android phone, we need to install APK, or Android Package, files. We can install APK files to your Android phone and take benefit of proposed Matrimonial Android application. Installing Applications through the Android Market: The Android Market is essentially Androids answer to Apples iPhone App Store. As of September 2009, the Android Market already offered well over 10,000 applications, and this number has only continued to grow. In addition to the applications the Android Market offers, you can also use it to install other downloaded third party applications. 1. Copy the APK file to your Androids memory card and insert the card into your phone. 2. Download and install the Apps Installer application from the Android Market 3. Once installed, the Apps Installer will display the APK files on the memory card. 4. Click and install your APK files.

7.4 User Training Requirement: Our blended learning approach virtually guarantees your end users will know why and when to use your new system, what to do after logging in, and where to find help when they need it. This Matrimonial application when user wants to search their expected life partner and understand them before wedding processes, the application supports. Users possess above average skill in the following areas: Communication skillsTo convey information in a concise and understandable manner Curious skillsTo become curious and quick searcher about the profiles. Computer literacya knack for quickly picking up new system processes Android knowledgeThorough understanding of the new technology android mobile to help learners relate to new application to old.

35

CHAPTER 8 MAINTENANCE

Maintenance is making adaptation of the software for external changes (requirements changes or enhancements) and internal changes (fixing bugs). When changes are made during the maintenance phase all preceding steps of the model must be revisited. There are three types of maintenance: 1. Corrective (Fixing bugs/errors) 2. Adaptive (Updates due to environment changes) 3. Perfective (Enhancements, requirements changes

36

CHAPTER 9 Screen Shots Welcome Screen of the project

Figure 9.1

37

Home Screen of the Project

Figure 9.2

38

Import contact screen

Figure 9.3

39

Import contact from .csv file screen

Figure 9.4

40

Export your contact from .csv file

Figure 9.5

41

Import message from .csv file

Figure 9.6

42

Currnt directory screen

Figure 9.7

43

Export message to .csv file screen

Figure 9.8

44

CHAPTER 10 Conclusion and Discussion:

The existing system helps the companies as well as telecommunication engineer whose profession is to do RF Survey in following ways: It creates a user-friendly interface to work on It provides security through use of proper authentications and validations before login to the application. It keeps track of the activities of the engineers all the time even when they are not connected to the local network. It helps the admin keep an eye on the userss activity.. It also allows administrator to control activity by enabling or disabling the users.

10.1 Limitation of the project: Mobility Strategy application can only be run on android enabled Smartphones. The data collection of Mobility Strategy and intermediate analysis report is out of Scope.

10.2 Difficulties encountered: Clear Vision & support of the Management Unaware of new technology Android

45

Capabilities of the software development vendor Scope & Expectations finalization towards meeting the user requirements

46

Strict implementation schedules & periodical monitoring The involvement of the IT & functional teams

10.3 Future Enhancements: It is possible to provide the web space to the users for creating his portal. It is possible to create our own mail server. It is possible to create chat server so that user can communicate with each other. It is possible to provide facility like create video album.

10.4 Experience gained (Technical & other):

For doing major project we all were not having enough technical knowledge. For doing major project our company provides us training on Advance Java, Android and Oracle technology. In Epsilon, we learned how to follow Model View Control (MVC) Architecture in our project. For MVC Architecture we use ANDROID .In our whole training session we learn how exactly work in an organization, what kind of pattern we have to follow, standard of code and design we use.

10.5 PERT CHART

PERT is a method to analyze the involved tasks in completing a given project, especially the time needed to complete each task, and to identify the minimum time needed to complete the total project. A PERT chart is a graphic representation of a projects schedule, showing the sequence of tasks, which tasks can be performed simultaneously, and the critical path of tasks that must be completed on time in order for the project to meet its completion deadline. The chart can be constructed with a variety of

47

attributes, such as earliest and latest start dates for each task, earliest and latest finish dates for each task, and slack time between tasks. A PERT chart can document an entire project or a key phase of a project.
Core java, XML Android 3 weak

Coding 4 weak Study

START

Client meating

Contract 1 weak

Design 2waek

Test 2 weak Test recode 1 waek

Scheduler 1 weak

Revised scheduler Revise contract 1 weak

Presentation 1 weak

Figure 10.1

48

CHAPTER 11 FUTURE SCOPE OF THE PROJECT

Developers always try to design their product as user-friendlier as they can, but unless and until the user uses product, developers cannot pre - examine every flaw that may later be encountered. The difference may result in user dissatisfaction, as by the time user receives final product, user needs may have changed. So the result of communication gap and time difference in product developing & product receiving may lead to errors. And as in this field, technology changes every day, developer can never ensure complete satisfaction to the user. But the product has been built in such a way that it can be enhanced with ease, as the overall approach followed is object-oriented and flexible enough to incorporate modifications.Because the Android operating system is a relative newcomer to the mobile phone market, a strong and cohesive Android Internet support community appears to be lacking. In order to install BackUp Assistant applications to Android phone, we need to install APK, or Android Package, files. We can install APK files to your Android phone and take benefit of proposed BackUp Assistant Android application. It is possible to provide the backup of contacts and message to the users for creating his portal. It is possible to create our own mail server. It is possible to provide facility like import our backup messages and contact after lost the android phone by E-mail id.

49

CHAPTER 12 DATA DICTIONARY

The term data dictionary and data repository are used to indicate a more general software utility than a catalogue. A catalogue is closely coupled with the DBMS software. It provides the information stored in it to the user and the DBA, but it is mainly accessed by the various software modules of the DBMS itself, such as DDL and DML compilers, the query optimiser, the transaction processor, report generators, and the constraint enforcer. On the other hand, a data dictionary is a data structure that stores metadata, i.e., (structured) data about data. The software package for a stand-alone data dictionary or data repository may interact with the software modules of the DBMS, but it is mainly used by the designers, users and administrators of a computer system for information resource management. These systems are used to maintain information on system hardware and software configuration, documentation, application and users as well as other information relevant to system administration.[2] If a data dictionary system is used only by the designers, users, and administrators and not by the DBMS Software, it is called a passive data dictionary. Otherwise, it is called an active data dictionary or data dictionary. An active data dictionary is automatically updated as changes occur in the database. A passive data dictionary must be manually updated. The data dictionary consists of record types (tables) created in the database by systems generated command files, tailored for each supported back-end DBMS. Command files contain SQL Statements for CREATE TABLE, CREATE UNIQUE INDEX, ALTER TABLE (for referential integrity), etc., using the specific statement required by that type of database A data dictionary, or metadata, repository, as defined in the IBM Dictionary of

50

Computing, is a "centralized repository of information about data such as meaningrelationships to other data, origin, usage, and format. The term may have one of several closely related meanings pertaining to databases and database management systems (DBMS):

a document describing a database or collection of databases an integral component of a DBMS that is required to determine its structure a piece of middleware that extends or supplants the native data dictionary of a DBMS.

51

CHAPTER 13 BIBLIOGRAPHY

Reference books 1. Herbert Schildt The Complete Reference, Fifth Edition Tata McGraw Hill Publications. 2. Ben Galbraith, Peter den Haan Beginning JSP 2.0, Wrox Press. 3. Sams Teach your self MYSQL in 21 day Elias M. Awad. System Analysis and Design, 4. Android Application Development by Daniel Switkin Websites: http://net.educause.edu/ir/library/pdf/eqm0121.pdf http://faculty.ist.psu.edu/yen/421/erp.pdf http://www.slideshare.net/Agcristi/erpppt http://www.open-source-erp-site.com/erp-modules.html

52

CHAPTER 14 CURRICULUM VITAE

TECHNICAL SKILLS

OBJECTIVE In quest of professional enrichment opportunities in an Organisation STRENGTHS

Positive attitude and willingness to learn and adopt technical practice that will help me develop along with my organization. ACADEMIC CREDENTIALS

DEGREE

INSTITUTE

UNIVERSIT Y

SESSIO N

Percentag e

1 .

MASTER OF COMPUTER APPLICATION

KRISHNA INSTITUTE OF ENGINEERING & TECHNOLOGY , GZB NANDANI NAGAR MAHA VIDYALAY NAWBABGAN G GONDA

MTU Noida U.P

2010-2013
PURSUING (FINAL YEAR

2 .

BACHELOR OF SCIENCE

DR.RAM MANOHAR LOHIYA AVADH University FAIZABAD 53

2006-2009 54

3 .

INTERMEDIAT E

KRISHAK INTER MEDIAT GAUR BASTI(UP) KRISHAK INTER MEDIAT GAUR BASTI (UP)

2004 U.P. Board 2002 U.P. Board 41 43

4.

HIGH SCHOOL

TECHNICAL SKILLS

Programming Languages: C,C++, JAVA,C#. ANDROID Operating Systems: WINDOWS XP/7 WEB Designing:HTML,CSS,PHP,Java Script. DBMS PACKAGE:SQL SERVER 2005,MySQL,SQLite

HOBBIES Jogging and gardneing. Listening soft music.

PERSONAL DETAILS

Name : Ramesh Kumar Date of Birth : 15 Sep 1988 Permanent Address : Village-padari,Post Gauri,Distt-Bastir (U.P) Pin Code 272163 Languages Known : Hindi, English Marital status : Married Gender : Male Nationality : Indian

54

DECLARATION I hereby declare that the information and details provided by me are correct to the best of my knowledge. Place: GHAZIABAD Date: RAMESH KUMAR

55

You might also like