Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
24 views

Programming

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Programming

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

AMERICAN COLLEGE OF HIGHER EDUCATION

BTEC HND IN COMPUTING (LEVEL 5)


ASSIGNMENT COVERSHEET 2020

UNIT TITLE & CODE UNIT 1: Programming LEVEL 4


Unit Code: D/615/1618
STUDENT NAME CREDITS 15

ASSESOR Mr. Gamini Ranawaka PEARSON REF.


NO.
ASSESSMENT Introduction to Algorithms I.V by: Mr.Rasika Piyasiri Word
and Programming Count
ASSIGNMENT ISSUE ASSIGNMENT
DATE SUBMISSION
DATE
ASSIGNMENT ASSIGNMENT
DISCUSSION DATE(s): RESUBMISSION
DATE
FINAL GRADE: ORIGINAL RESUBMISSION
SUBMISSION
ASSESMENT CRITERIA TO BE ASSESSED IN THIS ASSIGNMENT

(Identify all criteria to be assessed in this assignment)

Achieved Pass P1 P2 P3 P4 P5
Criteria
Original
Submission
Merit Criteria Distinction Criteria
Grade M1 M2 M3 M4 D1 D2 D3 D4
Achieved
Original
Submission

AUTHENCITY STATEMENT

I certify that the attached material is my original work. No other person’s work or ideas have been
used without acknowledgement. Except where I have stated that I have used some of this material
elsewhere, I have not presented it for examination / assessment any other course or unit at this or
any other institution.

SIGNATURE: …………………………………… DATE:………….…..…

Assessment has been internally verified for use.

Internal Verifier Name: Mr. Rasika Piyasiri

Signature: Date Verified :


ASSESSORS FEEDBACK

GENERAL COMMENTS

SPECIFIC COMMENTS

HOW TO IMPROVE YOUR ACHIEVEMENTS IN THE FUTURE

ASSESSORS SIGNATURE AND DATE


Assignment: Programming
Unit code: D/615/1618

Unit Learning Outcomes

LO1 Define basic algorithms to carry out an operation and outline the process
of programming an application

LO2 Explain the characteristics of procedural, object-orientated and event-


driven programming, conduct an analysis of a suitable Integrated
Development Environment (IDE)
LO3 Implement basic algorithms in code using an IDE.
LO4 Determine the debugging process and explain the importance of a coding
standard.

Part
. I
Submission Format
The submission is in the form of a ten-minute Microsoft® PowerPoint® style presentation to be
presented to your colleagues. The presentation can include links to performance data with
additional speaker notes and a bibliography using the Harvard referencing system. The
presentation slides for the findings should be submitted with speaker notes. You are required
to make effective use of headings, bullet points and subsections as appropriate. Your research
should be referenced using the Harvard referencing system. The recommended word limit is
500 words, including speaker notes, although you will not be penalised for exceeding the total
word limit.
You are an IT Associate attached to an IT department who is currently working at one of centers
for scientific research in Physics. One of your main duties at the research center is to train
researchers like Graduate students and PhD students on computer programming to develop
software related to their studies. Apart from that it is your duty to provide the necessary
consultancy on developing applications related to on-going research projects currently carried
out by graduate student. In preparation, students are given a proper introductory level training
on application programming and development of applications.
Therefore, in order to deliver on a training session, you have been given to prepare a
presentation on introduction to computer programming and application development. In the
presentation, it is necessary to explain the application development process proceed with a
brief clear explanation on algorithms. And then you will need to describe how algorithms are
used in application development in the development process with examples. It is also
necessary to show in the presentation how to implement algorithms in application
development using some common programming languages related specifically to scientific
research.
Part 2
Submission Format
The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all work must be supported with
research and referenced using the Harvard referencing system. Please also provide a
bibliography using the Harvard referencing system. The recommended word limit is 2,000–
2,500 words, although you will not be penalised for exceeding the total word limit.
In the research center you are currently working has acquired an approval to carry on a minor
research in disaster management in pandemic situations. To share and monitor data relevant
to research, the research team has decided develop a desktop application.

Carry out a study on different programming techniques (E.g. procedural, object-orientated and
event-driven programming) and programming languages with mentioned programming
techniques. Conduct a research on programming frameworks (Set of tools) and the Integrated
Development Environments to find out the most suitable programming framework and IDE to
develop the application. Present your findings as a report to the head of research team so the
development can be started.

Part 3
Submission Format
The submission is in the form of five documents/files:

1. Stage 1 – Development Document


2. Stage 2 – Report (IDE Evaluation)
3. Stage 3 – Report (Debugging Evaluation)
4. Stage 4 – Report (Evaluation Report) including fully commented source code
5. An installable and executable version of your application

You are required to make use of appropriate structure, including headings, paragraphs, subsections
and illustrations as appropriate, and all work must be supported with research and referenced using
the Harvard referencing system.

As a center for scientific research in the country, it is an obligation to conduct surveys on behalf of
the government. So the government is advised in making proper decisions. During this year a census
was carried out country wide to collect information regarding prevention of Dengue fever. Among
the collected information, the following were organized into files in CSV (Comma Separated Values)
format.
<Social Security No>, <First Name>, <Last Name>, <Date of Birth>, <Address 1>, <Address 2>,
<City>, <Province>, <Gender>, <Position>, <No. of members> etc.
e.g.:
857654326V, Cadence, Smith, 06-06-2000, Chelsea Street, Beverly Hills, Normandy, Pasadena,
Female, 1, 8 …
Your task is to guide software developers in the research center to develop an algorithm which
can be integrated in the census management application currently developing. In application, the
following are expected by the algorithm. When integrating the algorithm into application, decide
the programming language that have to be used according to the development of the application.
1. Sort the records in an efficient way according to criteria. Criteria can be sorting records in
CSV format according to a specific field value such as <NIC No>, <City> etc.
2. The records in CSV format must be able to ported into tables with given fields into a
database.
Plan and carry on an appropriate procedure to debug the program with the algorithm before
integrating it to the application.
Learning Outcomes and Assessment Criteria
Pass Merit Distinction

LO1 Define basic algorithms to carry out an operation and outline the process of programming an
application .
P1 Provide a M1 Determine the steps taken from D1 Evaluate the implementation of an
definition of what writing code to execution. algorithm in a suitable language and the
an algorithm is and relationship between the written
outline the process algorithm and the code variant
in building an
application.

LO2 Explain the characteristics of procedural, object orientated and event-driven programming
P2 Give explanations of M2 Compare and contrast the D2 Critically evaluate the source code of
what procedural, object- procedural, object an application which implements the
orientated and event-and event driven paradigms procedural, object-orientated and event
driven paradigms are; used in given source code of driven paradigms, in terms of the code
their characteristics and an structure and characteristics.
application the relationship
between them.

LO3 Implement basic algorithms in code using an IDE

P3 Write a program M3 Use the IDE to manage the D3 Evaluate the use of an IDE
that implements an development process of the program. for development of
algorithm using an applications contrasted with
IDE. not using an IDE.

LO4 Determine the debugging process and explain the importance of a coding standard
P4 Explain the M4 Evaluate how the debugging D4 Critically evaluate why a coding
debugging process process can be used to help develop standard is necessary in a team as well
and explain the more secure, robust applications. as for the individual.
debugging facilities
available in the IDE.
P5 Outline the
coding standard
you have used in
your code.
Assignment Guidelines
Type your assignment clearly

Font type: Times new Roman/Arial

1. Headings : 14 pt, Bold, Underlined


2. Sub-headings : 12 pt, Bold, Underlined
3. Body : 12 pt, normal
4. Align : Justify
5. Line spacing : 1.5
6. Margins : 1” form each side
7. Numbering : at the bottom right hand corner
8. Header : Left side- subject name
: Right side- individual/group assignment
9. Footer : Left side- batch number
: Right side-page number

10. Assignment compiling order

a) Assessment Record Sheet


b) Cover sheet
c) Assignment Brief
d) Acknowledgement
e) Executive Summary
f) Contents
g) Introduction
h) Body
i) Conclusion
j) References
k) Appendix
• All the Figures, Tables, Diagrams etc. should be numbered
• Label sketches properly and neatly.
• Write on only one side of the paper.
• Utilize a table of contents and section headings where applicable.
• Use size A4 paper.
• Provide a title page and a front cover.
• Do not forget to sign the plagiarism statement on the cover sheet of your assignment.
• Please note that plagiarism is treated as a serious offence and therefore the work you
produce must be individual and original although may work in groups in some instance
• All sources of information must be referenced using “Harvard referencing” where a
reference listing should be included at the end of the assignment
• Students should use minimum of 4 books and 5 journals in their referencing list.
• Assignments returned to students for re-working must be re-submitted within 15 days
(Please refer to Student Handbook on Assignments – Re-submission).
• Failure to re-submit the previously marked assignment with the re-submitted
assignment will mean that results cannot be released for the respective unit.
• Please note that the technical failures which occur during the assignment processing
period are not counted as an excuse for late submissions. As a precaution you are
expected to have a backup file (a copy of your assignment) by all means saved in the
system to avoid sudden system crashes and technical failures.
• The ethical procedures of the course strictly maintain a data security policy on students’
work and you should submit a soft copy of your completed assignment along with your
completed assignment hard copy in order to avoid assignment information distribution
among others.
Acknowledgement

I'm exceptionally thankful to each one of the individuals who have helped me, as I have
completed my task on schedule and viably. Taking all things together modesty and
appreciation, I am overpowered to perceive my profundity to each one of the individuals who
have assisted me with bringing these thoughts into great use.

I might want to thank my (subject)teacher (name) as well. She figured out how to give me
backing and support and guided me on various points. Also, with the guide from her
accommodating counsel, criticism, and inspiration I got ready to execute these venture
exercises.

To wrap things up, I additionally need to thank my mom who assisted a great deal with social
affair various subtleties, assemble data, or direct me to frame promptly to make this task.
Given their feverish timetables, they offered me different plans to help this undertaking
exceptional.
Executive Summary

The Disaster Project seeks to promote public/private sector disaster management and
preparedness initiatives and to carry out pilot projects in specific communities, with the goal
of establishing community-based, sustainable disaster preparedness and prevention programs.
system has assisted with the establishment of disaster management committees in three
communities in the southwest peninsula. To further the work of these committees, system
contracted consultants to prepare these community-based hazard assessments. Disasters,
whether caused by natural or technological hazards, have the effect of setting most people
back and stifling development. Four essential dimensions capture the most significant effects
of disasters:

Life: direct and indirect loss of life as a result of natural or technological hazards.

Livelihood: the extent to which livelihood systems are disrupted or made less resilient (more
vulnerable) through direct or indirect effects of natural or technological hazards. Measure:
number of working days lost or spent on recovery, and increase in dependence on single
income source

Health: Reduce the extent to which human health is affected by natural or technological
hazards.

Property: Reduce the extent to which property (houses, land, crops, animals, goods) is
damaged through natural or technological hazards.

In order for disasters to occur, natural phenomena must intersect with people who are exposed
to it. To understand the processes by which these two elements interact and to identify
effective mitigation interventions, natural and social phenomena need to be examined in
tandem and the two perspectives must inform and guide each other in an iterative way.
Table of contents

Task 01 ................................................................................................................................. 14

Task 02 ................................................................................................................................. 30

Task 3 ................................................................................................................................... 36

Conclusion............................................................................................................................ 56

Reference .............................................................................................................................. 57
Table of Figures

Figure 1 .................................................................................................................................... 14
Figure 2 .................................................................................................................................... 14
Figure 3 .................................................................................................................................... 15
Figure 4 .................................................................................................................................... 15
Figure 5 .................................................................................................................................... 16
Figure 6 .................................................................................................................................... 16
Figure 7 .................................................................................................................................... 17
Figure 8 .................................................................................................................................... 17
Figure 9 .................................................................................................................................... 18
Figure 10 .................................................................................................................................. 18
Figure 11 .................................................................................................................................. 19
Figure 12 .................................................................................................................................. 19
Figure 13 .................................................................................................................................. 20
Figure 14 .................................................................................................................................. 20
Figure 15 .................................................................................................................................. 21
Figure 16 .................................................................................................................................. 21
Figure 17 .................................................................................................................................. 22
Figure 18 .................................................................................................................................. 22
Figure 19 .................................................................................................................................. 23
Figure 20 .................................................................................................................................. 23
Figure 21 .................................................................................................................................. 24
Figure 22 .................................................................................................................................. 24
Figure 23 .................................................................................................................................. 25
Figure 24 .................................................................................................................................. 25
Figure 25 .................................................................................................................................. 26
Figure 26 .................................................................................................................................. 26
Figure 27 .................................................................................................................................. 27
Figure 28 .................................................................................................................................. 27
Figure 29 .................................................................................................................................. 28
Figure 30 .................................................................................................................................. 28
Figure 31 .................................................................................................................................. 29
Figure 32 .................................................................................................................................. 29
Figure 33 .................................................................................................................................. 39
Figure 34 .................................................................................................................................. 40
Figure 35 .................................................................................................................................. 40
Figure 36 .................................................................................................................................. 41
Figure 37 .................................................................................................................................. 41
Figure 38 .................................................................................................................................. 42
Figure 39 .................................................................................................................................. 42
Figure 40 .................................................................................................................................. 55
Task 01
Presentation

Figure 1

Figure 2
Figure 3

Figure 4
Figure 5

Figure 6
Figure 7

Figure 8
Figure 9

Figure 10
Figure 11

Figure 12
Figure 13

Figure 14
Figure 15

Figure 16
Figure 17

Figure 18
Figure 19

Figure 20
Figure 21

Figure 22
Figure 23

Figure 24
Figure 25

Figure 26
Figure 27

Figure 28
Figure 29

Figure 30
Figure 31

Figure 32
Task 02
What is Procedural Programming?

Procedural Programming might be the primary programming paradigm that another designer
will learn. In a general sense, the procedural code is the one that straightforwardly educates a
gadget on the best way to complete an errand in intelligent advances. This paradigm utilizes a
direct big picture perspective and treats information and strategies as two unique substances.
In view of the idea of a system call, Procedural Programming isolates the program into
techniques, which are otherwise called schedules or capacities, basically containing a
progression of steps to be completed.

Basically, Procedural Programming includes recording a rundown of directions to mention to


the PC what it ought to do bit by bit to complete the job that needs to be done.
Simply put, Procedural Programming involves writing down a list of instructions to tell the
computer what it should do step-by-step to finish the task at hand.

Key Features of Procedural Programming

The key features of procedural programming are given below:

Predefined functions: A predefined function is typically an instruction identified by a name.


Usually, the predefined functions are built into higher-level programming languages, but they
are derived from the library or the registry, rather than the program. One example of a pre-
‘charAt ()’

Local Variable: A local variable is a variable that is declared in the main structure of a method
and is limited to the local scope it is given. The local variable can only be used in the method
it is defined in, and if it were to be used outside the defined method, the code will cease to
work.

Global Variable: A global variable is a variable which is declared outside every other
function defined in the code. Due to this, global variables can be used in all functions, unlike
a local variable.
Modularity: Modularity is when two dissimilar systems have two different tasks at hand but
are grouped together to conclude a larger task first. Every group of systems then would have
its own tasks finished one after the other until all tasks are complete.

Parameter Passing: Parameter Passing is a mechanism used to pass parameters to functions,


subroutines or procedures. Parameter Passing c ‘ ’ ‘
’ ‘ ’ ‘ - ’ ‘ ’

Advantages and Disadvantages of Procedural Programming

Procedural Programming comes with its own set of pros and cons, some of which are
mentioned below.

Advantages

• Procedural Programming is phenomenal for broadly useful programming.


• The coded straightforwardness alongside simplicity of execution of compilers and
mediators.
• A huge assortment of books and online course material accessible on tried calculations,
making it simpler to learn end route.
• The source code is compact, subsequently, it tends to be utilized to focus on an
alternate CPU too
• The code can be reused in various pieces of the program, without the need to duplicate
it.
• Through Procedural Programming strategy, the memory prerequisite additionally
slices.
• The program stream can be followed without any problem.
Disadvantages

1. The program code is harder to write when Procedural Programming is employed


2. The Procedural code is often not reusable, which may pose the need to recreate the
code if is needed to use in another application
3. Difficult to relate with real-world objects
4. The importance is given to the operation rather than the data, which might pose issues
in some data-sensitive cases
5. The data is exposed to the whole program, making it not so much security friendly

There are various kinds of programming paradigm as we referenced previously, which are
only a way of programming. Comprehend that the paradigm doesn't oblige a particular
language however to the manner in which the program is composed. The following is an
examination between Procedural Programming and Object-Oriented Programming.

What Is Object-Oriented Programming (OOP)

OOP is an approach to deal with programming which perceives life as far as we might be
concerned as an assortment of objects, which work pair with one another to take care of a
specific issue close by. The essential thing to think about OOP is encapsulation, which is the
possibility that each object which holds the program is self-manageable, which implies that
every one of the parts that make up the article are inside the actual article. Presently since
every module inside this worldview is self-manageable, articles can be taken from one
program and used to determine one more issue nearby with practically zero modifications.

Advantages

• Due to modularity and encapsulation, OOP offers ease of management


• OOP mimics the real world, making it easier to understand
• Since objects are whole within themselves, they are reusable in other programs
Disadvantages

• Object-Oriented programs tend to be slower and use up a high amount of memory


• Over-generalization
• Programs built using this paradigm may take longer to be created

What is Event-Driven Programming?

Simply put, event-driven programming is when a program is designed to respond to user


engagement in various forms. It is known as a programming paradigm in which the flow of
“ ”
or key press, in response to prompt from the system. To visualize event programming more
clearly, imagine the opposite of event-programming is a software that requires zero user
interaction.

Events are observed by a code (or capacity) known as an occasion audience. In the event that
the occasion audience identifies that an appointed occasion has happened, it will trigger a
callback work, known as an event overseer, which will perform said event, e.g., clicking (the
event) a "print" button (occasion audience) enacts the real print measure (occasion controller).

For what reason is Event-Driven Programming Popular?

In the period of mobile and desktop applications, keeping the client drew in with your program
is the best way to keep an application sound, dynamic, and important. event-driven
programming serves the client with the snappiest and most exact reactions, which ordinarily
converts into better client experience for any given application or program.

The vast lion's share of programming languages support event-driven programming, albeit
some are better intended to execute these sorts of activities, like Adobe Flash. Many
programming dialects and program manufacturers even give code layouts to events overseers,
so the developer simply needs to give the code that characterizes the move the program should
make when the occasion happens. From that point, occasion driven programming takes into
consideration customization from the profoundly intricate to the moderately straightforward.

Frame works and languages

A framework has become critical for the development and maintenance of websites. With a
lot of choices available, it becomes extremely difficult to decide on one. Here we have curated
a list of the best libraries and frameworks along with their numerous features that are used
today for ease of development.

1. Ruby on Rails-Language: Ruby


2. Laravel-Language:PHP
3. Django:Phython
4. ASP.NET-Language: C#
5. EXPRESS-Javascript
6. Bootstrap-PHP

Why are frameworks useful?

Web development frameworks act as building blocks for websites and web applications. They
provide multiple features that make client-side and server-side web development hassle-free.
The most popular sites and apps use these frameworks for generating business. You can use
the templates that the frameworks provide for cutting down the development time and libraries
and additional tools help in optimizing performance and increasing web traffic.

A web development framework is not absolutely necessary for building a web application.
But it surely provides tools that can simplify the process and makes it hassle-free. Using a
framework is a good practice as developing, testing and maintaining web apps becomes almost
impossible without it.

Here we are going to use bootstrap framework for this system. because we are going to use
the php. for this system. Bootstrap is used to make the website responsive, Responsive means
that if you open a website in PC, open it in laptop or open in tablet or open in any small mobile,
the screen size of bootstrap website will automatically adjust, and the website content shows
well. Because of this, the long process that used to be heard for the responsiveness of the
website becomes easy, which saves your time. So nowadays bootstrap is used a lot. Nowadays
you will find a lot of web templates on the internet of which 98% are responsive.
Task 3
Disaster management system

Introduction

Populace development and urbanization measures, patterns in land use, expanding


impoverishment of huge portions of the populace, utilization of improper mechanical
frameworks in the development of houses and fundamental foundation, and wrong association
frameworks, among others, are factors that have expanded the weakness of the populace
opposite the wide variety of physical and normal occasions.

Nonetheless, absence of methodical, homogeneous, and viable records of catastrophe


typologies, perceived as the impact of the event of compromising occasions on the weakness
of country, from one viewpoint, and emphasis on considering debacles just as impacts of
occasions of immense extents and high effect, on the other, have covered up the huge number
of little and medium scale calamities that happen each year in country.

The Disaster Information Management System is an economical plan inside an organization


for the orderly assortment, documentation and investigation of information about misfortunes
brought about by characteristic and man house keeper debacles.

The Disaster Information Management System is an instrument that assists with investigating
the calamity patterns and their effects in a methodical way. With expanded comprehension of
the catastrophe patterns and their effects, better anticipation, relief and readiness measures can
be wanted to diminish the effect of calamities on the networks.

This undertaking plans to decide the hazardous zones by topographical examinations before
cataclysmic events. The other objective of this undertaking is to deal with a dire and successful
assistance administrations during and after the debacle.
System analysis could be an important part of software development life cycle. During this
analysis chapter, it will specialize in this scenario of disaster managemen ’
gathering techniques used to gather and deliver the goods the project goal.

Functional requirements capture the intended behavior of the system. This behavior may be
expressed as services, tasks or functions the system is required to perform. In service
development, it is useful to distinguish between the baseline functionality being necessary for
any system to compete in that service domain, and features that differentiate the system from
competitors.

Hardware Requirements
• Pentium 4 computers or above.
• Basic Printer for report printing.

Software Requirements
• Any Operating Systems (Windows/ Linux/ etc.)
• Any Web Browsers (Google chrome, Firebox, etc.)

System Developed Tools and Technologies


• HTML.
• CSS.
• JavaScript.
• JQUERY.
• Ajax.
• PHP.
• WAMP server with PHP5 and MySQL.
• Bootstrap.
• Sublime Text/ Notepad++.
• Adobe Photoshop.
• Microsoft Word.
• Microsoft Visio.
• Microsoft Project.
• MySQL Workbench
Special Requirements
• Internet Connection.
• Web hosting and domain registration.

Designing

System design focused on the technical or implementation aspect of the system development
project. System analysis phase of the system development project is implementation
independent. Design is much more creative process than analysis. System designer converts
the requirements from the requirement analysis phase into technical solutions. System design
considers the software architecture, database design and interfaces design.

In the automation, to a methodology developed in making an information system, the more


robust it is required and also to provide a validated system to the client. A validated system is
one that has no flaws and meets the requirements of the client. A system development
methodology is a very formal and precise system development process, which defines a set of
activities, methods, best practices, services and automated tools for system developers and
project managers to use to develop and maintain an information system.

An application in which all or some parts of the software are downloaded from the web each
’ -based application is Uniform Resource Locator
(URL) driven; disconnected mode and unlimited number of users can access the application
from any various places.

Table 1

Alternate solutions Windows based Network based Web based


Access from anywhere No Limited area Yes
Graphical User Interface No Yes Yes
Multiple users No Yes (Limited) Yes
Internet facility No Limited Yes
Security Less Average High
Sharing facilities No Yes (Limited area) Yes
Database normalization is the process of organizing the fields and tables of a relational
database to minimize redundancy. Normalization usually involves dividing large tables into
smaller and less redundant tables and defining relationships between them.

User interface

Home page

Figure 33
Login page

Figure 34

User registration

Figure 35
Contact information

Figure 36

News panel

Figure 37
Debugging

Figure 38

Figure 39

User-friendly describes a hardware device or software interface that is easy to use. It is


"friendly" to the user, meaning it is not difficult to learn or understand. While "user-friendly"
is a subjective term, the following are several common attributes found in user-friendly
interfaces. In this Interface Design section, we provide the user interface of system online
reading news system. System user interface, feels simple and easy to access, provide the guide
to access the system and have icons, button and navigation to clearly shown to the user to
access the system.

In this chapter implementation I describe what activities were carried out during the
development of Online news materials system. After design stage, the result of the design stage
is transformed into physical design and we implemented that result of design stage. When it
comes to a good login page design, we want to make it as easy for our users as possible to gain
access to your product or service.
CODING

LOGIN PAGE

<?php require_once("includes/header.php");?>

<div id="templatemo_menu">

<ul>

<li><a href="index.php?id=1" class="current">Homepage</a></li>

<li><a rel="nofollow" href="login.php?id=1" >Login</a></li>

<li><a href="user_reg.php">User Registration</a></li>

<li><a href="contact.php">Contact Information</a></li>

</ul>

</div> <!-- end of menu -->

<div class="cleaner"></div>

<div class="box">

<h3><span></span>News</h3>

<img src="images/quake.jpg" alt="image" />

<div class="news_title"><a href="http://edition.cnn.com/2015/04/29/asia/nepal-


earthquake/"> Nepal Earthquake</a></div>

<p>Nepal- A powerful earthquake, the country's worst in 80 years, rocked


mountainous Nepal on Saturday, 25th April. On Sunday, Nepal was struck by a major
aftershock.</p>

<div class="cleaner"></div>

<br/>

<img src="images/quake2.jpg"/>
<div class="news_title"><a href="http://www.bloomberg.com/news/articles/2015-04-
27/counting-the-economic-cost-of-natural-disasters">Counting the Economic Cost of Natural
Disasters</a></div>

<p>The Asia-Pacific region is the world's most disaster-prone, with earthquakes


and floods wreaking havoc on economies.</p>

</div>

</div> <!-- end of side column -->

<div id="templatemo_main_column">

<?php $id=$_GET['id'];

if($id==0) echo "<div id='disp_name'>Login Unsuccessful</div>";

?>

<div class="main_column_box">

<div class="cleaner_h80"></div>

<h3><span></span>User Login</h3>

<form action="login_check.php" method="post">

<table border="1" style="width: 85%;padding: 10px;">

<tr>

<td><h4>Username : </h4></td>

<td><input type="text" name="uname" /></td>

</tr>

<tr>

<td><h4>Password : </h4></td>
<td><input type="password" name="pass"/></td>

</tr>

</table>

<input type="submit" style="width: auto;" >

<input type="reset" style="width: auto;" >

</form>

<div class="cleaner_h30"></div>

</div>

</div>

<div class="cleaner"></div>

<div id="top"></div>

<div id="bottom"></div>

</div>

<?php require("includes/footer.php"); ?>


HOME PAGE

<?php require_once("includes/ses.php"); ?>

<?php require_once("includes/header.php"); ?>

<?php require_once("includes/nav.php"); ?>

<?php require("includes/news.php"); ?>

<!-- end of side column -->

<div id="templatemo_main_column">

<a href="home.php"><div id="disp_name">

<?php echo $val;?>

</div></a>

<div class="main_column_box">

<div class="cleaner_h80"></div>

<h3 id="topic1"><span></span>Welcome to NDMS!</h3>

<img id="image1" class="image_wrapper fl_image" src="images/nd3.jpg"


alt="image" />

<p class="em_text" id="desc1">A natural disaster is a major adverse event resulting


from natural processes of the Earth; examples include floods, volcanic eruptions, earthquakes,
tsunamis, and other geologic processes. A natural disaster can cause loss of life or property
damage, and typically leaves some economic damage in its wake, the severity of which depends
on the affected population's resilience, or ability to recover.</p>

<div class="cleaner"></div>

<p id="cont"></p>
</div>

<div class="main_column_box" id="topic_head">

<h3 id="topic2"><span></span>Our Services</h3>

<img id="image3" class="image_wrapper fr_image" src="images/nd4.jpg"


alt="image" />

<p id="desc2">The NDMS provides its users with information on how to survive a
Natural Disaster. We want the people out there to know the dangers of Natural Disasters and
to understand how important it is to be prepared incase of a Natural Disaster.</p>

<div class="cleaner_h30"></div>

<ul class="list_02" id="list1">

<li>We provide interactive videos which depict every step needed to take in
time of a disaster.</li>

<li>We provide a descriptive account of those people who already witnessed a


disaster and how they survived it.</li>

<li>We provide a Lost and Found Functionality for those people who went
missing in a recent event.</li>

<li>We provide a descriptive overview of every disaster known.</li>

<li>We provide maps.</li>

</ul>

<div class="cleaner_h30"></div>

</div>

<img id="image2" src="" style="width: 100%;"/>

</div>

<div class="cleaner"></div>

<div id="top"></div>
<div id="bottom"></div>

</div>

<?php require("includes/footer.php"); ?>

INDEX PAGE

<?php require_once("includes/header.php"); ?>

<div id="templatemo_menu">

<ul>

<li><a href="index.php?id=1" class="current">Homepage</a></li>

<li><a rel="nofollow" href="login.php?id=1" >Login</a></li>

<li><a href="user_reg.php">User Registration</a></li>

<li><a href="contact.php">Contact Information</a></li>

</ul>

</div> <!-- end of menu -->

<div class="cleaner"></div>

<div class="box">

<h3><span></span>News</h3>

<img src="images/quake.jpg" alt="image" />

<div class="news_title"><a href="http://edition.cnn.com/2015/04/29/asia/nepal-


earthquake/"> Nepal Earthquake</a></div>
<p>Nepal- A powerful earthquake, the country's worst in 80 years, rocked
mountainous Nepal on Saturday, 25th April. On Sunday, Nepal was struck by a major
aftershock.</p>

<div class="cleaner"></div>

<br/>

<img src="images/quake2.jpg"/>

<div class="news_title"><a
href="http://www.bloomberg.com/news/articles/2015-04-27/counting-the-economic-cost-of-
natural-disasters">Counting the Economic Cost of Natural Disasters</a></div>

<p>The Asia-Pacific region is the world's most disaster-prone, with earthquakes


and floods wreaking havoc on economies.</p>

</div>

</div> <!-- end of side column -->

<div id="templatemo_main_column">

<?php $id=$_GET['id'];

if($id==0) echo "<div id='disp_name'>Logout Successful</div>";

?>

<div class="main_column_box">

<div class="cleaner_h80"></div>

<h3 id="topic1"><span></span>Welcome to NDMS!</h3>

<img id="image1" class="image_wrapper fl_image" src="images/nd3.jpg"


alt="image" />

<p class="em_text">A natural disaster is a major adverse event resulting from natural
processes of the Earth; examples include floods, volcanic eruptions, earthquakes, tsunamis, and
other geologic processes. A natural disaster can cause loss of life or property damage, and
typically leaves some economic damage in its wake, the severity of which depends on the
affected population's resilience, or ability to recover. </p>

<div class="cleaner"></div>

</div>

<p id="cont"></p>

<div class="main_column_box" id="topic_head">

<h3><span></span>Our Services</h3>

<img class="image_wrapper fr_image" src="images/nd4.jpg" alt="image" />

<p>The NDMS provides its users with information on how to survive a Natural
Disaster. We want the people out there to know the dangers of Natural Disasters and to
understand how important it is to be prepared incase of a Natural Disaster.</p>

<div class="cleaner_h30"></div>

<ul class="list_02">

<li>We provide interactive videos which depict every step needed to take in
time of a disaster.</li>

<li>We provide a descriptive account of those people who already witnessed a


disaster and how they survived it.</li>

<li>We provide a Lost and Found Functionality for those people who went
missing in a recent event.</li>

<li>We provide a descriptive overview of every disaster known.</li>

<li>We provide maps.</li>

</ul>

<div class="cleaner_h30"></div>

</div>

</div>
<div class="cleaner"></div>

<div id="top"></div>

<div id="bottom"></div>

</div>

<?php require("includes/footer.php"); ?>

CONTACT PAGE

<?php require_once("includes/header.php"); ?>

<div id="templatemo_menu">

<ul>

<li><a href="index.php?id=1" class="current">Homepage</a></li>

<li><a rel="nofollow" href="login.php?id=1" >Login</a></li>

<li><a href="user_reg.php">User Registration</a></li>

<li><a href="contact.php">Contact Information</a></li>

</ul>

</div> <!-- end of menu -->

<div class="cleaner"></div>

<div class="box">

<h3><span></span>News</h3>

<img src="images/nd1.jpg" alt="image" />

<div class="news_title"><a href="#"> Mudslides Explained: Behind the


Washington State Disaster</a></div>
<p>A fatal mudslide in rural northwestern Washington State over the weekend
underscores the dangers of this fast-moving natural hazard.</p>

<div class="cleaner"></div>

<img src="images/nd2.jpg"/>

<div class="news_title"><a
href="http://www.huffingtonpost.com/2014/03/26/extreme-weather-natural-disasters-
insurance-losses_n_5033351.html">Extreme Weather, Natural Disasters Led To $45 Billion
In Insurance Losses In 2013</a></div>

<p>GENEVA- Disasters such as floods in Europe, winter storms in the U.S.


and typhoons in Asia cost insurance companies $45 billion in 2013, a leading Swiss firm said
Wednesday.</p>

</div>

</div> <!-- end of side column -->

<div id="templatemo_main_column">

<div class="main_column_box">

<div class="cleaner_h80"></div>

<h3 id="topic1"><span></span>Contact Information</h3>

<img id="image1" class="image_wrapper fl_image" src="images/admin3.jpg"


alt="image" />

<div class="cleaner"></div>

</div>

<p id="cont">For any queries please contact any of the following<ul style='font-
size:17px;'><li>Thanusha<br>+9477889512<br>20@vit.ac.lk</li><br><li>k.keerthiha<br>
+9466778894<br>athy2021@vit.ac.lk</li><br></ul></p>

</div>

<div class="cleaner"></div>
<div id="top"></div>

<div id="bottom"></div>

</div>

<?php require("includes/footer.php"); ?>

CONNECTION PAGE

<?php

$con=mysql_connect("localhost","root","");

if(!$connection)

die("server error");

$db=mysql_select_db("ndms");

if(!$db)

die("database error");

?>
DENGUE PREVENTION SYSTEM CSV ATTRIBUTES

1. Number of cases
Number of reported dengue cases at this location
2. Street address
Street address where dengue cases are reported
3. Latitude
Latitude of the street address
4. Longitude
Longitude of the street address
5. Cluster number
Every dengue cluster is labeled with the serial number
6. Recent cases in cluster
Number of dengue cases within two weeks
7. Total cases in cluster
Total number of cases reported in the cluster
8. Date
Date string YY/MM/DD format
9. Month number
Index number of the month, where 1=January and 12=December
Figure 40
Conclusion

Misfortunes of life and property from cataclysmic events in the United States-and all through
the world-have been huge and the potential for generously more prominent future misfortunes
looms. It is unmistakably in the public interest to decrease these effects and to empower the
improvement of networks that are tough to calamities. This objective can be accomplished
through insightful and supported endeavors including moderation, readiness, reaction, and
recuperation. Executing such endeavors, especially even with restricted assets and contending
needs, requires exact data that is introduced in a convenient and suitable way to encourage
educated choices. Significant data as of now exists that could be utilized to this end, yet there
are various snags to getting to this data, and strategies for incorporating data from an assortment
of hotspots for dynamic are as of now lacking. Execution of an improved public or worldwide
organization for improving data accessible in an all the more ideal way could considerably
advance the circumstance.

As verified in the Preface, a government change group is thinking about the issues and needs
connected with executing a worldwide or public fiasco data network as portrayed in the report
by the Disaster Information Task Force (1997). This National Research Council report was
dispatched by the progress group to give guidance on how a debacle data organization could
best settle on data accessible to improve dynamic, with a definitive objective of diminishing
misfortunes from cataclysmic events. The report is expected to give the premise to a superior
enthusiasm for which sorts of information and data ought to be created in a data program and
how this data could best be scattered to leaders.
Reference

eliteinfoworld, 2014. [Online] Available at: http://www.eliteinfoworld.com/blog/top-10-


benefits-using-php-web-development [Accessed 14 March 2021].
revoky, 2011. [Online] Available at: https://www.revolvy.com/main/index.php?s=Server-
side%20scripting [Accessed 10 March 2021].
Anon., 2016. [Online] Available at: http://www.ewebdiscussion.com/html/2766-what-is-the-
purpose-of-html.html [Accessed 12 March 2021].
Hotseller, 2016. [Online] Available at: https://www.hostseller.com/what-is-scripting-language
[Accessed 09 March 2021].
revoky, 2011. [Online] Available at: https://www.revolvy.com/main/index.php?s=Server-
side%20scripting [Accessed 10 March 2021].

You might also like