Smita - PROJECT (BlackBook)
Smita - PROJECT (BlackBook)
Smita - PROJECT (BlackBook)
ON
( PEHLAY AKSHAR )
SUBMITTED BY
Ms. SMITA JAILKAR
Roll No: MC2122050
Project development requires commitment from all the people who are
involved in it. And also, I would like to share the credit for the success of my
project with all the people who extended their valuable support to me.
I am grateful to my project guide Mrs. Pooja Danke, Project Head, who
helped me to schedule my project and taught me practically systematic way
of developing a project. I am immensely thankful for the patience with which
she stood by me till the end of my project.
Smita Jailkar
INSTITUTE OF MANAGEMENT & COMPUTER
STUDIES
(IMCOST)
Certificate of Approval
This is to certify that the project report titled
“PEHLAY AKSHAR”
Is a Bonafede record of the work done by
Ms. Smita Jailkar
Under the Guidance of
Prof. Mahesh Mahajan
6.1 Maintenance 60
6.2 Evaluation 61
7. USER/OPERATIONAL MANUA 62
9. LIMITATIONS 67
10. CONCLUSION 69
11. BIBLIOGRAPHY 71
CHAPTER 1 INTRODUCTION
1
1.1 Synopsis of the project:
http://www.pehlayakshar.org/
2
1.1.2 About the Project:
Pehla Akshr Project is based on teachers student and Admin. Pehla Akshar project use for
student teaching and teacher training. Pehla Akshr is a running Live Project. Pehla Akshar is have
Google Play Store App also for download and using daily in some school by teacher or student.
Objective
The objective of the "Pehlay Akshar" project is to improve teacher involvement and
enhance the management of educational programs. The project aims to achieve this by
implementing a software solution that includes a mobile app for field teams and a web-
based application for program administration and management. The primary goal is to
streamline program activities, capture detailed information about the activities, track
progress, and generate reports for initiative leaders..
3
Scope
The scope of the "Pehlay Akshar" project initially includes the development and implementation of a
mobile app for the field team. This app will allow the team to manage the program smoothly and
efficiently. It will enable them to capture activity details, such as attendance, lesson plans, and
assessments. The app will also provide a means of communication and collaboration among the field
team members.
In addition to the mobile app, the project scope encompasses the creation of a web-based application.
This application will serve as the administrative and management platform for the program. It will
provide features to track the progress of various initiatives, generate reports, and facilitate effective
communication between the field team, program leaders, and other stakeholders.
As the project progresses, the scope expands to include additional functionalities that cater to the
needs of students. This may involve incorporating various classroom activity sections within the
software solution to enhance student engagement and participation. Additionally, the project scope
may include the integration of learning management system (LMS) modules to provide a
comprehensive educational platform.
The scope of the project also involves continuous improvement and adaptation based on feedback
and evolving requirements. It aims to create a scalable and flexible software solution that can
accommodate future enhancements and modifications as needed.
Overall, the scope of the "Pehlay Akshar" project encompasses the development and implementation
of a mobile app, web-based application, and associated functionalities to improve teacher
involvement, program management, and student engagement in educational initiatives.
4
1.3 Problem DefinitionExisting System
(PEHLAY AKSHAR) is a systematic approach to do a CURD Create Update Delete on the
Content management system capture,
Store, Process & Retrieve division wise land related documents at tenure level.
Proposed System
the functionality that must be added to the new site to meet these goals.
Notice Generation
5
1.4 Theoretical Background:
MySQL
MySQL is a very popular open-source relational database management system
(RDBMS).
Database Management is the most important part when you have humungous data
around you. MySQL is one of the most famous Relational Database to store & handle
your data.
6
Apache 2
Introduction
Apache HTTP Server is a free and open-source web server that delivers web content through the
internet. It is commonly referred to as Apache and after development, it quickly became the most
popular HTTP client on the web. It’s widely thought that Apache gets its name from its development
history and process of improvement through applied patches and modules but that was corrected back
in 2000. It was revealed that the name originated from the respect of the Native American tribe for its
resiliency and durability.
Now, before we get too in depth on Apache, we should first go over what a web application is and the
standard architecture usually found in web apps.
Apache functions as a way to communicate over networks from client to server using the TCP/IP
protocol. Apache can be used for a wide variety of protocols, but the most common is HTTP/S. HTTP/S
or Hyper Text Transfer Protocol (S stands for Secure) is one of the main protocols on the web, and the
one protocol Apache is most known for.
HTTP/S is used to define how messages are formatted and transmitted across the web, with instructions
for browsers and servers on how to respond to various requests and commands. Hypertext Transfer
Protocol Secure is usually through port 443 with the unsecured protocol being through port 80.
The Apache server is configured via config files in which modules are used to control its behavior. By
default, Apache listens to the IP addresses configured in its config files that are being requested. This
is where one of Apaches many strengths come into play.
7
CHAPTER 2: SYSTEM ANALYSIS
8
2.1 Feasibility Study
Hardware requirement.
We analyse the technical and capabilities of the software development team members.
We ascertain that the technology chosen for software development has large number of user
so that they can be consulted when problems arise, or when improvements are required.
This feasibility study present tangible and intangible benefits by comparing the development and
operational cost.
The technique of cost benefit analysis is often used as a basis for assessing economic feasibility.
9
2.2 Cost Benefit Analysis
Economic feasibility determines whether there are sufficient benefits in creating to make the cost
acceptable, or is the cost of the system too high.
On the behalf of the cost-benefit analysis, the proposed system is feasible and is economical
regarding its pre-assumed cost for making a system.
As we know that the system development costs are usually one-time costs that will not recur after
the project has been completed.
10
CHAPTER 3: SYSTEM DESIGN
11
3.1 Software Requirement Specification:
3.1.1 Introduction:
CPU : 2 vCPUs
RAM : 4 GB
Software to be used:
Tools to be used:
12
3.1 Methodologies Adapted:
The methodology adapted for software development is Spiral Model. The spiral model combines
the idea of iterative development with the systematic, controlled aspects of the waterfall model.
This Spiral model is a combination of iterative development process model and sequential linear
development model i.e. the waterfall model with a very high emphasis on risk analysis.
The following approach is used to design this system, which is called “Spiral Model” or “Meta
Model”. Spiral Model is a combination of a waterfall model and iterative model. Each phase in
spiral model begins with a design goal and ends with the client reviewing the progress.
The advantage of spiral lifecycle model is that it allows elements of the product to be added in,
when they become available or known. This assures that there is no conflict with previous
requirements and design.
This method is consistent with approaches that have multiple software builds and releases which
allows making an orderly transition to a maintenance activity. Another positive aspect of this
method is that the spiral model forces an early user involvement in the system development
effort.
13
Spiral Model – Design
The following illustration is a representation of the Spiral Model, listing the activities in each
Phase-
The spiral model has four phases. A software project repeatedly passes through these phases
in iterations called Spirals.
Identification-
This phase starts with gathering the business requirements in the baseline spiral. In the
subsequent spirals as the product matures, identification of system requirements, subsystem
requirements and unit requirements are all done in this phase.
Design-
The Design phase starts with the conceptual design in the baseline spiral and involvesarchitectural
design, logical design of modules, physical product design and the final design inthe subsequent spirals.
14
Construct or Build
The Construct phase refers to production of the actual software product at every spiral.
In the baseline spiral, when the product is just thought of and the design is being
developed a POC (Proof of Concept) is developed in this phase to get customer
feedback.
Then in the subsequent spirals with higher clarity on requirements and design details a
working model of the software called build is produced with a version number. These
builds are sent tothe customer for feedback.
Risk Analysis includes identifying, estimating and monitoring the technical feasibility
and management risks, such as schedule slippage and cost overrun. After testing the
build, at the end of first iteration, the customer evaluates the software and provides
feedback.
15
3.3.1 Modules:
Admin Module:
Admin Module add all the content or a any document for the students and teachers.
Content Management System Using Admin Module Uses to add the all resources, content or a
document.
Resources
Lesson Plan
Worksheet
Assessment
Teacher Module:
In the Teacher module Teacher only have to watch a module or a content of the Admin which
updated in the Pehlay Akshar Application.
Teacher Module done with the Content management system present in the see uploaded
document .
Student Module:
In the Pehlay Akshar Project Which Based on the Content Management system.
In this Student Module student are login or a register and watch their session or a lesson plan,
assessment or a daily updated videos watch for study.
16
3.3.2 Object Oriented Analysis & Design Diagrams:
Each object represents some entity of interest in the system being modelled,
and is characterized by its class, its state (data elements), and its behaviour.
Various models can be created to show the static structure, dynamic behaviour,
and run-time deployment of these collaborating objects. There are a number of
different notations for representing these models, such as the Unified
Modelling Language (UML).
A typical OOA model would describe computer software that could be used to
satisfy a set of customer-defined requirements.
17
3.3.2.1 UML Diagrams:
1) Pehlay Akshar Use Case Diagram
Interaction Diagram’s
Sequence Diagram
18
Sequence Diagram for Login
19
Sequence Diagram for Student
20
Activity Diagrams
21
Activity Diagram for Admin
22
Data Flow Diagrams:
Level 0: Data Flow Diagram of Pehlay Akshar
23
Class Diagram
Class Diagram for Admin
24
3.3.4 Database Tables
25
26
27
28
29
30
31
3.3.5 ER Diagram
32
3.3.6 I/O Screen Layouts
Screenshots
5.1 Steps involving for starting the project
1. Open browser by double clicking Google Chrome or Mozilla Firefox. The
icons for the same will be present on desktop or on Task bar.
2. Enter http://pehlayakshar.igmite.in in the address bar of the browser. The
following screen would appear.
33
Login The Admin Dashboard open
34
Then click on Program which have to add or update for student and a teacher
35
Then open teacher to add teacher or show a teacher list
36
Then the click on cohort for adding a cohort list
Now we want to download a data by download a config file in the clicking on the
download button with show the popup message also of file downloaded or not
37
Then clicking on program location mapping its show a program mapping location
list
Then show video list for adding a video for the teacher or a student as well as
motivation video also
38
On its click on content then open a student content list for which admin add a
content for a student for study material.
39
In that show a quize of the student which student have to do for a study purpose
Session training list shows a list of the traing session of the teacher which done the
traning or not to done training
40
Category list shows a list of all category In the Application by Admin add or
updated a category
In that have the access control of the list add or update for the content
41
In that show a sub category of the student
42
Byline list show in th click on byline button item
43
In that category list admin add by APi Call to get the list of version updated in
the column
44
CHAPTER 4 TESTING
45
4.1 Methodologies used for Testing
In a software project, errors can be injected at any stage during development. Because
code isthe only product that can be executed frequently & whose actual behaviour can
be observed, testing is the phase where the remaining errors from all the previous
phases must be detected. Testing performs a critical role for quality assurance & for
ensuring the reliability of software. During testing, the program to be tested is executed,
with a set of test cases, & the output of the program for the test cases is evaluated to
determine if the program is performing as expected.
Due to this approach, dynamic testing can only ascertain the presence of errors in the
program;the exact nature of errors is not usually decided by testing.
Testing is a procedure to execute a program with the intent of finding errors. Testing
is an important part of the software development process, to detect bugs, improve
software design and to reduce usability problems. There are a number of test techniques
such as the traditionalunit, system, integration and acceptance tests, and a large number
of software tools, which support testing in different ways. Testing flow proceeds from
left to right and from top to bottom, user visible elements of the web application design
are tested first followed by infrastructure design element.
Testing Objectives
Testing is a process of executing a program with the intent of finding errors. A good
test case is one that has a high probability of finding an as yet undiscovered error. A
successful test is one that uncovers an undiscovered error.
Testing Principle
Testing should begin “in the small” & progress towards “the large”.
46
4.2 Types of Testing used to test Portal:
Interface features are tested to ensure that design rules, aesthetics and related
visualcontent are available for the user without error.
Individual interface mechanisms are tested that are equivalent to unit testing.
Navigation Testing
1) Navigation links: Internal links within the web application, external links to
other web application should be tested to ensure that proper content or
functionality is reached when the link is chosen.
Integration Testing
The purpose of unit testing is to determine that each independent module is correctly
implemented. This gives little chance to determine that the interface between modules
47
is also correct, and for this reason integration testing must be performed. One specific
target of integration testing is the interface: whether parameters match on both sides as
to type, permissible ranges, meaning and utilization.
The individual modules were aggregated one by one and functional testing was
performed. The integrated product was considered as a black box and the output (report)
is generated dependingupon the data present in the flat files.
System Testing
Usable: The product is convenient and easy to use. A naïve user can also
compare the flat files by browsing the files from their computer and selecting
the corresponding interface. User can also add the new interface and can also
make modifications in the existing interface.
Secure: Only the authorized user is able to use this tool.
Performance Testing
Performance testing is used to uncover performance problems that can result from lack
of server-side resources, inappropriate network bandwidth, inadequate database
capabilities, faulty or weak operating system capabilities, poorly designed web
application functionality, and other hardware and software issues that can lead to
degraded client-server performance.
48
4.2.1 White Box Testing
White box testing is a test cases design method that uses the control structure
of theprocedural design to derive test cases. Test cases can be derived that
Guarantee that all independent paths within a module have been exercised
at least once,
Exercised all logical decision on their true and false sides,
Execute all loops at their boundaries and within their operational bounds,
Path coverage
49
4.2.2 Black Box Testing
Black box testing attempts to drive set of inputs that will fully exercise all the
functionalrequirements of a system. It is not an alternative to white box testing.
Errors,
Performance errors,
What data rates and data volume can the system tolerate?
White box testing should be performed early in the testing process, while black box
testing tends to be applied during later stages. Test cases should be derived which
reduces the number of additional test cases that must be designed to achieve
reasonable testing, and tell us something about the presence or absence of classes of
error rather than an error associatedonly with the specific test at hand.
Following are the black box techniques which were used for ‘Mobile Social Network’ testing
50
Boundary value analysis
Faults often occur at the boundary of equivalence classes, because
boundariesare not often defined clearly or misunderstood by programmers.
Application having range fields such as amount, date ranges are tested using
this technique.
Pehlay Akshar
Prepared By Vishwajeet No. of Test Cases 9
Reviewed By vishwajeet Testcases Pass 9
Prepared Date 10/06/2023 Testcases Fail 0
Reviewed Date 10/06/2023 Testcases NA 0
51
52
53
54
4.1 Test Report:
4.4.1 Testing & Result:
Entire website is tested at all testing levels and its working correctly.
This software has been tested by NIC Scientists.
55
CHAPTER 5 SYSTEM IMPLEMENTATION
56
5.1 Hardware required at Client side
RAM : 2 GB
Tools to be used:
57
5.3 Testing done as
End User Acceptance
Testing
Acceptance testing, a testing technique performed to determine whether or not the software
system has met the requirement specifications. The main purpose of this test is to
evaluate the system's compliance with the business requirements and verify if it is
having met the required criteria for delivery to end users.
Alpha Testing
Beta Testing
Beta Testing
Beta testing also known as user testing takes place at the end users’ site by the end users
to validate the usability, functionality, compatibility, and reliability testing.
Beta testing adds value to the software development life cycle as it allows the "real"
customer an opportunity to provide inputs into the design, functionality, and usability of a
product.
These inputs are not only critical to the success of the product but also an investment into
future products when the gathered data is managed effectively.
58
CHAPTER 6: SYSTEM MAINTANANCE AND
EVALUATION
59
6.1 Maintenance
60
6.2 Evaluation
Ensure that necessary, adequate data are acquired and analysed to determine and
assess theadvisability, adequacy and effectiveness of the management system in the
areas of quality, environment and occupational health and safety, including the
Policy and Objectives, as well as identifying and establishing guidelines and
actions for improvement.
Integration:
In all cases, the requirements point out the need to analyse the data to obtain
relevant information and the use of this information by Management for review
of the management system.
Therefore, it may be said that, regardless of the area, this process always has
the samestructure
Another aspect that promotes integration in this process is precisely the fact
that the Management, as shown by its commitment, must assume the
responsibility for systemreview.
This simultaneous analysis and review of the three areas further promotes the
understanding of the interrelationships between them so that decisions and
guidelines taken are more compensated and balanced.
Indicators:
The indicators that are proposed are the same regardless of the area in which
they are to be applied, and can be calculated for the three systems together or
independently.
61
CHAPTER 7: USER/OPERATIONAL MANUAL
62
7.1 Security Aspects, Access Rights:
1. Authentication based on token generated for each login with Username, Password
The system will be prevented against any damage, accidentally or otherwise as far
as possible. The system will be accessible to authorized persons only.
Standard Database functions may be utilized for this purpose or this functionality
may be provided through the software.
The access to the system will be controlled through security system, which will
provide thefollowing layers of security.
User Access restriction- There will be restricted access to the system. Username
and passwords will be defined for the users having permission to access the system.
There willbe mainly two types of users.
Administrator- This user will act as a super user. The main privileges for
this user will be to manage other users, alter any master information. The
user who is having administrator privilege can also grant administrative
privileges to another user.
Other user- This user that is not an administrator will be normal user who
can perform data entry.
TAB- Normal user who can perform assessment and reassessment of properties.
63
7.2 Backup & Recovery
Application Backup - Daily basis with retention is 3 days
Application Backup
Database Backup
Recovery for Land and Revenue Management System covers the control
measures forthe following types of failures:
64
CHAPTER 8: FUTURE ENHANCEMENTS
65
Future Enhancement:
The project “PEHLAY AKSHAR” can further elaborate for the following:
Notice Generation: Currently the generation of notice to print out is done for each individual
lease holder manually. In future, this can be implemented to generate notice automatically for
all lease holders on single click.
Tenure Issue: Currently the tenure payment module focuses mainly on Land Tenure Abolition.
In future, all other tenures can be implemented into the system.
Development issue: The project has been developed on Plain PHP. It is adopted to reduce
complexity of application and to make it web based. In future, this can be implemented using
PHP framework like Laravel, CakePHP or Codeigniter for better utilization of web resources,
authentication and authorization.
66
CHAPTER 9: LIMITATIONS
67
Limitations:
Currently offline content management with complete directory structure is not possible
due to technical limitations but going forward this can be achieved
There are not many limitations of the project but any of these limitations will affect the
wholesystem. But anyhow it includes some limitations, which are listed below:
Loss of data while migration from .dbf to MYQL database due to filtering of
datasuch as invalid or incomplete details.
68
CHAPTER 10: CONCLUSION
69
Conclusion:
The project named as “PEHLAY AKSHAR” is an internal project developed for
the RPF Foundation, to the school for student or a teaching faculties(teachers).
This system offers great flexibility for future expansion. It requires maintenance
on dailybasis.
This project has been developed to cater the demands of department users to enter
date or period to generate reports daily/monthly basics.
This project is still under up gradations as per the requirement of user. It is too an
ongoingwhich needs maintenance and changes.
70
CHAPTER 11: BIBLIOGRAPHY
71
Bibliography
https://ubuntu.com/server/docs/web-servers-apache
https://dev.mysql.com/downloads/mysql/5.7.html
https://www.w3schools.com
https://angular.io/
https://learn.microsoft.com/en-us/aspnet/core/introduction-to-aspnet-
core?view=aspnetcore-7.0
72