WORDPROJECT
WORDPROJECT
INTRODUCTION
1.1 INTRODUCTION:
1
2. LITERATURE SURVEY
The aim of this research is to consider an analysis through case studies on how knowledge
sharing may be successfully implemented. The study will clarify a conceptualisation that
provides a new understanding of the relationship between unemployed graduates and the
human capital concept. The cases adopted web documentation for the research technique,
and an interpretive approach was used as the research paradigm. Two online recruitment
agency sites were analysed through qualitative analysis. The connections show how
knowledge sharing can be used as a medium to help unemployed graduates to get jobs
through online recruitment agencies. High quality candidates must have good soft skills,
problem-solving skills and employable value added skills to get the best jobs. The findings
will be expressed as qualitative results from the two online recruitment agencies researched
as the case studies for the paper. From these case studies, the findings will contribute to the
ongoing study on how to implement knowledge sharing among undergraduates after they
finished their studies.
Online service quality is a much-studied concept. There is considerable evidence that user
expectations and perceptions of self-service and online service quality differ in different
business domains. In addition, the nature of online services is continually changing and
universities have been at the forefront of this change, with university websites increasingly
acting as a portal for a wide range of online transactions for a wide range of stakeholders .
In this qualitative study, we conduct focus groups with a range of stakeholders in a
university web portal . Our study offers a number of insights into the changing nature of
the relationship between organisations and customers. New technologies are influencing
customer expectations. Customers increasingly expect organisations to have integrated
2
information systems, and to utilise new technologies such as SMS and web portals.
Organisations can be slow to adopt a customer-centric viewpoint, and persist in providing
interfaces that are inconsistent or require inside knowledge of organisational structures and
processes. This has a negative effect on customer perceptions.
3
3. SYSTEM ANALYSIS
The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in
systems engineering, information systems and software engineering, is the process of
creating or altering systems, and the models and methodologies that people use to develop
these systems. In software engineering the SDLC concept underpins many kinds of
software development methodologies.
Existing System:
In the existing system all the student information is added manually and the data is stored
in the records. Takes lot of time and physical effort in searching and adding the
information. In the existing system there is a possibility of losing data and no proper
maintenance of data.
Disadvantages
Proposed System:
The proposed system provides student an easy and accurate data about projects and
academic percentages. Students can view all the information in just one click which saves
lot of time and effort. The proposed system maintains a database to store all the
information. In this system there is no chance of losing data. Adding and searching the
information is very easy which does not take much time and physical effort.
4
Advantages
5
4. IMPLEMENTATION
Modules:
Admin:
Admin can get login by entering valid username and password. Admin can view all the
details of the users and need to authorize them. Admin can upload projects by giving all the
details of the project. Admin can add all the details of student’s attendance and marks.
Admin can view added students and the progress in graph.
Student:
Student need to enter all the details in the registration form. Student should be authorized
by admin to get login into the application. Student can search projects based on title,
year and Guide name. Students can view all the details of his/her attendance and marks.
Students can view graph for his attendance and marks
Initially Java language was called as “oak” but it was renamed as “java” in 1995.The
primary motivation of this language was the need for a platform-independent i.e.
architecture neutral language that could be used to create software to be embedded in
various consumer electronic devices.
An application is a program that runs on our Computer under the operating system of that
computer. It is more or less like one creating using C or C++ .Java’s ability to create
Applets makes it important. An Applet I san application, designed to be transmitted over
the Internet and executed by a Java-compatible web browser. An applet I actually a tiny
Java program, dynamically downloaded across the network, just like an image. But the
difference is, it is an intelligent program, not just a media file. It can be react to the user
input and dynamically change.
6
4.1.2 Java Architecture
When we compile the code, the Java compiler creates machine code called byte code for a
hypothetical machine called Java Virtual Machine (JVM). Compiling and interpreting java
source code.
During run-time the Java interpreter tricks the byte code file into thinking that it is running
on a Java Virtual Machine. In reality this could be an Intel Pentium windows 95 or sun
SPARCstation running Solaris or Apple Macintosh running system and all could receive
code from any computer through internet and run the Applets.
7
4.1.4 Simple
Java was designed to be easy for the Professional programmer to learn and to use
effectively. If you are an experienced C++ Programmer, learning Java will oriented
features of C++. Most of the confusing concepts from C++ are either left out of Java or
implemented in a cleaner, more approachable manner. In Java there are a small number of
clearly defined ways to accomplish a given task.
Java was not designed to be source-code compatible with any other language. This allowed
the Java team the freedom to design with a blank state. One outcome of this was a clean
usable, pragmatic approach to objects. The object model in Java is simple and easy to
extend, while simple types, such as integers, are kept as high-performance non-objects.
4.1.6 Robust
8
5. SOFTWARE REQUIREMENT SPECIFICATION
Requirement Specification provides a high secure storage to the web server efficiently.
Software requirements deal with software and hardware resources that need to be installed
on a serve which provides optimal functioning for the application. These software and
hardware requirements need to be installed before the packages are installed. These are the
most common set of requirements defined by any operation system. These software and
hardware requirements provide a compatible support to the operation system in developing
an application.
The hardware requirement specifies each interface of the software elements and the
hardware elements of the system. These hardware requirements include configuration
characteristics.
System : Pentium IV 2.4 GHz.
Hard Disk : 100 GB.
Monitor : 15 VGA Color.
Mouse : Logitech.
RAM : 1 GB.
The software requirements specify the use of all required software products like data
management system. The required software product specifies the numbers and version.
Each interface specifies the purpose of the interfacing software as related to this software
product.
Database : MySQL
IDE : Netbeans
Server : Tomcat 7.0
All the other requirements which do not form a part of the above specification are
categorized as Non-Functional needs. A system perhaps needed to gift the user with a
show of the quantity of records during info. If the quantity must be updated in real
time, the system architects should make sure that the system is capable of change the
displayed record count at intervals associate tolerably short interval of the quantity of
records dynamic. Comfortable network information measure may additionally be a
non-functional requirement of a system.
Accessibility
Availability
Backup
Certification
Compliance
10
Configuration Management
Documentation
Disaster Recovery
Interoperability
Preliminary investigation examines project feasibility; the likelihood the system will be
useful to the organization. The main objective of the feasibility study is to test the
Technical, Operational and Economical feasibility for adding new modules and debugging
old running system. All systems are feasible if they are given unlimited resources and
infinite time. There are aspects in the feasibility study portion of the preliminary
investigation:
11
Technical Feasibility
Operation Feasibility
Economical Feasibility
The technical issue usually raised during the feasibility stage of the investigation includes
the following:
Does the necessary technology exist to do what is suggested?
Do the proposed equipments have the technical capacity to hold the data required to
use the new system?
Will the proposed system provide adequate response to inquiries, regardless of the
number or location of users?
Can the system be upgraded if developed?
Are there technical guarantees of accuracy, reliability, ease of access and data security?
User-friendly
Customer will use the forms for their various transactions i.e. for adding new routes,
viewing the routes details. Also the Customer wants the reports to view the various
transactions based on the constraints. These forms and reports are generated as user-
friendly to the Client.
Reliability
The package wills pick-up current transactions on line. Regarding the old transactions,
User will enter them in to the system.
Security
The web server and database server should be protected from hacking, virus etc
Portability
The application will be developed using standard open source software (Except Oracle)
like Java, tomcat web server, Internet Explorer Browser etc these software will work both
12
on Windows and Linux o/s. Hence portability problems will not arise.
Availability
This software will be available always.
Maintainability
The system uses the 2-tier architecture. The 1st tier is the GUI, which is said to be front-
end and the 2nd tier is the database, which uses My-Sql, which is the back-end.
The front-end can be run on different systems (clients). The database will be running at the
server. Users access these forms by using the user-ids and the passwords.
The computerized system takes care of the present existing system’s data flow and
procedures completely and should generate all the reports of the manual system besides a
host of other management reports.
It should be built as a web based application with separate web server and database server.
This is required as the activities are spread throughout the organization customer wants a
centralized database. Further some of the linked transactions take place in different
locations.
Open source software like TOMCAT, JAVA, Mysql and Linux is used to minimize the
cost for the Customer.
13
6. Methodology
Umbrella
DOCUMENT CONTROL
Activity
• Feasibility Study
• TEAM FORMATION
• Project Specification
Requirements PREPARATION ANALYSIS & ASSESSMENT
Gathering DESIGN CODE UNIT TEST
INTEGRATION ACCEPTANCE
& SYSTEM DELIVERY/INS TEST
TESTING TALLATION
Umbrella
TRAINING
Activity
SDLC is nothing but Software Development Life Cycle. It is a standard which is used by
software industry to develop good software.
The requirements gathering process takes as its input the goals identified in the high-level
requirements section of the project plan. Each goal will be refined into a set of one or more
requirements. These requirements define the major functions of the intended application,
define operational data areas and reference data areas, and define the initial data entities.
Major functions include critical processes to be managed, as well as mission critical inputs,
outputs and reports. A user class hierarchy is developed and associated with these major
functions, data areas, and data entities. Each of these definitions is termed a Requirement.
14
Requirements are identified by unique requirement identifiers and, at minimum, contain a
requirement title and textual description.
These requirements are fully described in the primary deliverables for this stage: the
Requirements Document and the Requirements Traceability Matrix (RTM). The
requirements document contains complete descriptions of each requirement, including
diagrams and references to external documents as necessary. Note that detailed listings of
database tables and fields are not included in the requirements document.
The title of each requirement is also placed into the first version of the RTM, along with
the title of each goal from the project plan. The purpose of the RTM is to show that the
product components developed during each stage of the software development lifecycle are
formally connected to the components developed in prior stages.
In the requirements stage, the RTM consists of a list of high-level requirements, or goals,
by title, with a listing of associated requirements for each goal, listed by requirement title.
In this hierarchical listing, the RTM shows that each requirement developed during this
stage is formally linked to a specific product goal. In this format, each requirement can be
traced to a specific product goal, hence the term requirements traceability.
15
The outputs of the requirements definition stage include the requirements document, the
RTM, and an updated project plan.
The planning stage establishes a bird's eye view of the intended software product, and uses
this to establish the basic project structure, evaluate feasibility and risks associated with the
project, and describe appropriate management and technical approaches.
The most critical section of the project plan is a listing of high-level product requirements,
also referred to as goals. All of the software product requirements to be developed during
the requirements definition stage flow from one or more of these goals. The minimum
16
information for each goal consists of a title and textual description, although additional
information and references to external documents may be included. The outputs of the
project planning stage are the configuration management plan, the quality assurance plan,
and the project plan and schedule, with a detailed listing of scheduled activities for the
upcoming Requirements stage, and high level estimates of effort for the out stages.
The design stage takes as its initial input the requirements identified in the approved
requirements document. For each requirement, a set of one or more design elements will be
produced as a result of interviews, workshops, and/or prototype efforts. Design elements
describe the desired software features in detail, and generally include functional hierarchy
diagrams, screen layout diagrams, tables of business rules, business process diagrams,
pseudo code, and a complete entity-relationship diagram with a full data dictionary. These
design elements are intended to describe the software in sufficient detail that skilled
programmers may develop the software with minimal additional input.
When the design document is finalized and accepted, the RTM is updated to show that
17
each design element is formally associated with a specific requirement. The outputs of the
design stage are the design document, an updated RTM, and an updated project plan.
The development stage takes as its primary input the design elements described in the
approved design document. For each design element, a set of one or more software artifacts
will be produced. Software artifacts include but are not limited to menus, dialogs, data
management forms, data reporting formats, and specialized procedures and functions.
Appropriate test cases will be developed for each set of functionally related software
artifacts, and an online help system will be developed to guide users in their interactions
with the software.
18
6.6 Integration & Test Stage
During the integration and test stage, the software artifacts, online help, and test data are
migrated from the development environment to a separate test environment. At this point,
all test cases are run to verify the correctness and completeness of the software. Successful
execution of the test suite confirms a robust and complete migration capability. During this
stage, reference data is finalized for production use and production users are identified and
linked to their appropriate roles. The final reference data (or links to reference data source
files) and production user list are compiled into the Production Initiation Plan.
19
6.7 Installation & Acceptance Test
During the installation and acceptance stage, the software artifacts, online help, and initial
production data are loaded onto the production server. At this point, all test cases are run to
verify the correctness and completeness of the software. Successful execution of the test
suite is a prerequisite to acceptance of the software by the customer.
After customer personnel have verified that the initial production data load is correct and
the test suite has been executed with satisfactory results, the customer formally accepts the
delivery of the software.
Maintenance
Outer rectangle represents maintenance of a project, Maintenance team will start with
requirement study, understanding of documentation later employees will be assigned work
and they will undergo training on that particular assigned category.
20
7. System Design
The purpose of the design phase is to arrange an answer of the matter such as by the
necessity document. This part is that the opening moves in moving the matter domain to
the answer domain. The design phase satisfies the requirements of the system. The design
of a system is probably the foremost crucial issue warm heartedness the standard of the
software package. It’s a serious impact on the later part, notably testing and maintenance.
The output of this part is that the style of the document. This document is analogous to a
blueprint of answer and is employed later throughout implementation, testing and
maintenance. The design activity is commonly divided into 2 separate phases System
Design and Detailed Design.
System Design conjointly referred to as top-ranking style aims to spot the modules that
ought to be within the system, the specifications of those modules, and the way them
move with one another to supply the specified results.
At the top of the system style all the main knowledge structures, file formats, output
formats, and also the major modules within the system and their specifications square
measure set. System design is that the method or art of process the design, components,
modules, interfaces, and knowledge for a system to satisfy such as needs. Users will read
it because the application of systems theory to development.
Detailed Design, the inner logic of every of the modules laid out in system design is
determined. Throughout this part, the small print of the info of a module square measure
sometimes laid out in a high-level style description language that is freelance of the target
language within which the software package can eventually be enforced.
In system design the main target is on distinguishing the modules, whereas throughout
careful style the main target is on planning the logic for every of the modules.
21
Figure 7.1: Architecture diagram
Data Flow Diagram can also be termed as bubble chart. It is a pictorial or graphical
form, which can be applied to represent the input data to a system and multiple functions
carried out on the data and the generated output by the system.
A graphical tool accustomed describe and analyze the instant of knowledge through
a system manual or automatic together with the method, stores of knowledge, and delays
within the system. The transformation of knowledge from input to output, through
processes, is also delineate logically and severally of the physical elements related to the
22
system. The DFD is also known as a data flow graph or a bubble chart.The BasicNotation
used to create a DFD’s are as follows:
Dataflow:
Process:
.
Source:
Data Store:
Rhombus: decision
In this model the data and functionality are arrived from inside the system. This model
view models the static structures.
It represents the dynamic of behavioral as parts of the system, depicting the interactions of
collection between various structural elements described in the user model and structural
model view.
In this the structural and behavioral as parts of the system are represented as they are to be
built.
24
25
Figure 7.3.1 Use Case Diagram
26
5.3.2 CLASS DIAGRAM
The class diagram is the main building block of object oriented modeling. It is used both
for general conceptual modeling of the systematic of the application, and for detailed
modeling translating the models into programming code. Class diagrams can also be used
for data modeling. The classes in a class diagram represent both the main objects,
interactions in the application and the classes to be programmed. A class with three
sections, in the diagram, classes is represented with boxes which contain three parts:
27
5.3.3 SEQUENCEDIAGRAM
28
Figure 7.3.3: Sequence diagram
29
Figure 7.3.4: Activity Diagram
30
Component Diagram
31
Deployment Diagram
32
33
8. TESTING
Testing is the process where the test data is prepared and is used for testing the modules
individually and later the validation given for the fields. Then the system testing takes place
which makes sure that all components of the system property functions as a unit. The test
data should be chosen such that it passed through all possible condition. The following is
the description of the testing strategies, which were carried out during the testing period.
Testing has become an integral part of any system or project especially in the field of
information technology. The importance of testing is a method of justifying, if one is ready
to move further, be it to be check if one is capable to with stand the rigors of a particular
situation cannot be underplayed and that is why testing before development is so critical.
When the software is developed before it is given to user to user the software must be
tested whether it is solving the purpose for which it is developed. This testing involves
various types through which one can ensure the software is reliable. The program was
tested logically and pattern of execution of the program for a set of data are repeated. Thus
the code was exhaustively checked for all possible correct data and the outcomes were also
checked.
To locate errors, each module is tested individually. This enables us to detect error and
correct it without affecting any other modules. Whenever the program is not satisfying the
required function, it must be corrected to get the required result. Thus all the modules are
individually tested from bottom up starting with the smallest and lowest modules and
proceeding to the next level. Each module in the system is tested separately. For example
the job classification module is tested separately. This module is tested with different job
and its approximate execution time and the result of the test is compared with the results
that are prepared manually. Each module in the system is tested separately. In this system
the resource classification and job scheduling modules are tested separately and their
corresponding results are obtained which reduces the process waiting time.
34
8.3 INTEGRATION TESTING
After the module testing, the integration testing is applied. When linking the modules there
may be chance for errors to occur, these errors are corrected by using this testing. In this
system all modules are connected and tested. The testing results are very correct. Thus the
mapping of jobs with resources is done correctly by the system
When that user fined no major problems with its accuracy, the system passers through a
final acceptance test. This test confirms that the system needs the original goals, objectives
and requirements established during analysis without actual execution which elimination
wastage of time and money acceptance tests on the shoulders of users and management, it
is finally acceptable and ready for the operation.
35
8.5 TEST CASES:
36
04 Prediction Whether If not Random Random High High
Random Prediction applied tree is not tree is
Forest algorithm generated generated
applied on
the data or
not
05 Recomme Whether If not It cannot It can view High High
ndation predicted displayed view prediction
data is prediction containing
displayed containing patient data
or not patient
data
06 Noisy Whether If graph is It does not It shows Low Mediu
Records the graph not show the the m
Chart is displayed variations variations
displayed in in between
or not between clean and
clean and noisy
noisy records
records
37
9. SCREEN SHOTS
Homepage
38
Admin home page
39
Upload project page
40
Add attendance page
41
Add placement page
42
View applied page in admin
43
Attendance graph
Marks graph
44
Student registration page
45
10. CONCLUSION
. “Student Performance with Graph & Academic Project Work Reporting System”
project satisfies all the requirements of students in searching the projects and finding
details about his\her attendance and marks. This project also satisfies the requirement of
admin in adding all the details of the project and he can easily find the progress of
student’s attendance and marks.
Future Enhancements:
It is not possible to develop a system that makes all the requirements of the user. User
requirements keep changing as the system is being used. Some of the future enhancements
that can be done to this system are:
46
11. REFERENCES
BIBLIOGRAPHY
JAVA Technologies
47
Mastering JAVA Security
HTML
JDBC
SAMPLE CODE
/*
* To change this license header, choose License Headers in
Project Properties.
* To change this template file, choose Tools | Templates
* and open the template in the editor.
*/
package test;
import com.sun.org.apache.xerces.internal.impl.dv.util.Base64;
import java.io.BufferedReader;
import java.io.File;
import java.io.FileWriter;
import java.io.IOException;
import java.io.InputStream;
import java.io.InputStreamReader;
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.PreparedStatement;
import java.util.Iterator;
import java.util.List;
import java.util.logging.Level;
import java.util.logging.Logger;
import javax.crypto.KeyGenerator;
import javax.crypto.SecretKey;
import javax.servlet.ServletException;
48
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import org.apache.commons.fileupload.FileItem;
import org.apache.commons.fileupload.FileItemFactory;
import org.apache.commons.fileupload.FileUploadException;
import org.apache.commons.fileupload.disk.DiskFileItemFactory;
import org.apache.commons.fileupload.servlet.ServletFileUpload;
import org.apache.poi.hwpf.HWPFDocument;
import org.apache.poi.xwpf.extractor.XWPFWordExtractor;
import org.apache.poi.xwpf.usermodel.XWPFDocument;
/**
*
* @author java2
*/
public class Upload extends HttpServlet {
}
else if
(fileItem.getFieldName().equals("studentname")) {
studentname = fileItem.getString();
System.out.println("File Keyword" +
studentname);
}
else if
(fileItem.getFieldName().equals("year")) {
year = fileItem.getString();
System.out.println("File Keyword" +
year);
}
else if
(fileItem.getFieldName().equals("guide")) {
guide = fileItem.getString();
System.out.println("File Keyword" +
guide);
}
else if
(fileItem.getFieldName().equals("abstract1")) {
abstract1 = fileItem.getString();
System.out.println("File Keyword" +
abstract1);
}
else {
}
boolean isFormField =
fileItem.isFormField();
if (isFormField) {
} else {
try {
50
connection =
DriverManager.getConnection("jdbc:mysql://localhost:3306/studentpe
rformance","root","root");
pstm = connection.prepareStatement("insert
into file (file, title, studentname, year, guide, abstract1,
CDate, data)values(?,?,?,?,?,?,?,?)");
System.out.println("getD " +
fileItem.getName());
String str =
getStringFromInputStream(fileItem.getInputStream(),fileItem.getCon
tentType());
pstm.setBinaryStream(1,
fileItem.getInputStream());
pstm.setString(2, title);
pstm.setString(3, studentname);
pstm.setString(4, year);
pstm.setString(5, guide);
pstm.setString(6, abstract1);
pstm.setDate(7, getCurrentDate());
pstm.setString(8, str);
int i = pstm.executeUpdate();
if (i == 1) {
response.sendRedirect("upload.jsp?msg1=success");
} else {
response.sendRedirect("upload.jsp?msgg=failed");
}
connection.close();
} catch (Exception e) {
response.sendRedirect("upload.jsp?m3=Duplicate Data");
}
}
}
} catch (FileUploadException e) {
} catch (Exception ex) {
Logger.getLogger(Upload.class.getName()).log(Level.SEVERE, null,
ex);
}
} finally {
out.close();
}
}
}
51
private static String getStringFromInputStream(InputStream
is,String fileType) {
String line = null;
} catch (IOException e) {
e.printStackTrace();
}
}
else { //is not a docx
try {
HWPFDocument doc = new HWPFDocument(is);
// WordExtractor extractor = new WordExtractor(doc);
// System.out.println(extractor.getText());
} catch (IOException e) {
e.printStackTrace();
}
}
return line ;
}
/**
* Handles the HTTP <code>GET</code> method.
*
* @param request servlet request
* @param response servlet response
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
@Override
protected void doGet(HttpServletRequest request,
HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}
/**
* Handles the HTTP <code>POST</code> method.
52
*
* @param request servlet request
* @param response servlet response
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
@Override
protected void doPost(HttpServletRequest request,
HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}
/**
* Returns a short description of the servlet.
*
* @return a String containing servlet description
*/
@Override
public String getServletInfo() {
return "Short description";
}// </editor-fold>
53