Documente Academic
Documente Profesional
Documente Cultură
ON
CONTENTS
Chapter
1
1.1
1.2
1.3
1.4
Chapter
2
2.1
2.2
2.3
2.4
2.5
2.6
2.7
Chapter
3
3.1
3.2
3.3
3.4
Chapter
4
4.1
4.2
4.3
4.4
4.5
Chapter
Introduction
Problem Definition
Purpose
Project Requirement
Tools and Platforms Hardware and Software Requirements
8
8
8
8
System Analysis
Identification of need
Feasibility study
Project planning
Project scheduling
Software Requirement Specification (SRS)
Software engineering paradigm
Data Models (DFD & ER)
10
11
13
14
17
26
28
System Design
Data integrity and constraints
Database design
User interface design
Test cases
31
36
Coding
Sample project coding
Comments and Description of Coding segments
Error handling
Parameters calling/passing
Validation checks
Testing
39
39
40
5.1
5.2
Chapter
46
48
6.1
6.2
Database/data security
Creation of User profiles and access rights
Chapter
Chapter
Reports
Chapter
Chapter
10
Conclusion
Bibliography
49
50
Chapter 1
Introduction
Online Case Management System (OCMS) is a Online Portal for Advocates, very useful to
all the Advocates. It keeps information about an advocates clients, opponents, cases no., case
status, next hearing date etc. There are reports and transaction. It tracks hearings previous
date, next date and court name. To ensure a strong control over all the cases one requires a
reliable and viable System. This most effective and efficient Technique, which can track and
feed the required information online and let not miss any case in any court.
1.1
Problem Definition
The proceess related to a case like managing clients, managing cases, keeping case
documents etc. are generally paper based. It consume lots of time. Sometimes advocate may
lost case related documents or he can forget and miss his cases in court.
It is required to Design of a Computerized Automated Case Management System, make
it easy to use system by keeping all his information online and can retrieve form anywhere
when needed.
1.2
Purpose
It also supports processes like fees from the clients, generates invoice, and send SMS
automatically to the clients.
1.3
Project Requirements
Automate manual paper work done at the time of client registration, case entry, case
documents that has to be submitted at the time of hearing in court.
Front-End:
PHP5
Other Technology:
Hardware requirements:
Hardware
Processor
Memory (RAM)
Hard Disk Space
Monitor
Pointing device
CD-ROM drive
Minimum Requirements
Intel Pentium 4, Pentium Dual core, Core 2 duo and
higher.
512MB Minimum; 1024 MB Recommended or Higher.
3 GB for the database and the client software.
VGA or higher resolution. 800x600 or higher resolution
required for the MySQL Server graphical tools
Microsoft Mouse or compatible
Required for installation purposes only.
Software requirements:
Operating System: Windows 8/Windows 7/Windows vista/Windows xp/Linux/Unix.
Application software: Dream Weaver CS4, MS-Office Word and Notepad++.
Chapter 2
System Analysis
System analysis is a process of collecting factual data, understand the process involved,
identifying problems and recommending feasible suggestions for improving the system
functioning. This involves studying the business processes, gathering operational data,
understand the informational flow, finding out bottlenecks and evolving solutions for
overcoming the weaknesses of the system. Analysis also includes subdividing of complex
process involving the entire system, identification of data store and manual processes. The
major objectives of the system analysis are to find answers for each business process: what is
being done, why it is done and how it can be improved? It is more of a thinking process and
involves the creative skills of the system analyst. It attempts to give birth to a new efficient
system that satisfies the current needs of the user and has scope of the future growth within
the organizations constraints. The result of this process is a logical system design. System
analysis is an iterative process that continues until a preferred and acceptable system
emerges.
In business, system analysis and design refers to the process of examining a business
situation with the intent of improving it with a better procedures and methods. It is the
process of gathering and interpreting the facts, diagnosing problems and using the
information to recommend improvements to the system.
Since Online Case Management System is a web based system that is why it has to be
a user friendly and interactive one. When I started to develop Online Case Management
System, my first work was to understand the system. So I discussed the system with my
guide and tried to collect some meaningful, factual data about the system which helped me to
develop the system. Along with collecting data, I was trying to identify the problems and its
possible solution related to the system to be developed. I designed a logical model of the
system and broken the complex process of the system into some other processes.
Proposed System:
1. It is automated computerized web based software system.
2. It uses latest technologies like PHP and MY SQL.
3. The system provides better data management facilities.
4. The system provides security measures to access to information lowering data security
threats.
Identification
Description
If we carry out the feasibility study thoroughly, it will become convenient for us, on the
part of the developer to design and implement the system with least effort.
In fact, many feasibility studies are disillusioned by both the developers as well as the
users. When for the first time ,the feasibility document is being prepared, the developer
reaches a position that he or she can almost depict the true picture of the system. Basically,
the feasibility study aims to overlook the confusion occurred during the system development.
It tends to answer three obvious main questions:
a) Is there any better way to accomplish which will more effectively fulfill the users
requirement ?
b) What will be the additional cost that will be incurred /or saving in pursuing that
particular alternative/those alternatives ?
Technical Feasibility determines whether the work for the project be done with the
present equipment, current procedures, existing softwares technology and available
personnel?
If new technology is needed then what alternatives will be needed in the present
structure and work ethos?
Technical feasibility determines whether the technology needed for the proposed system
is available and how it can be integrated within the Online Case Management System and
Technical evaluation must also assess whether the existing system can be upgraded to use the
new technology and whether the Online Case Management System has the expertise to use
it.
Economic feasibility
Economic feasibility looks at the financial aspects of the project. Economic feasibility
concerns with the returns from the investments in a project. It determines whether it is
worthwhile to invest the money in the proposed system. It is not worthwhile spending a lot of
money on a project for no returns.To carry out an economic feasibility for a system, it is
necessary to place actual money value against any purchases or activities needed to
implement the project.
The Online Case Management System plans to acquire the necessary hardware and
software requires for the system and there is no hindrance whether economical or otherwise
towards its purchase. A brief description of the hardware and software required in the system
is given later in the report.
Operational feasibility
Operational feasibility covers two aspects. One is the technical performance aspect and other
is the acceptance within the Online Case Management System. Operational feasibility
determines how the proposed system will fit in the current operations and what, if any job
restructuring and retraining may be needed to implement the system.
In the system operational feasibility checks, whether the user who is going to use the
system is able to work with the softwares with which the system is coded and also the mind
of the user going to use the system. If the user does not understand or is able to work on the
system further development is of waste.
Cover letter presents briefly the nature, general findings and the recommendations to
be considered.
Table of Contents gives the various parts and their respective locations on the report.
Overview is the narration of the purpose and scope of the project. It also includes the
name of the person who did the feasibility study, when it begun, and the other
necessary information that explains well how the study is being carried out.
Detailed finding gives the method present in the manual system or the proposed
system(new system).The system efficiency as well as the operating costs are also
given here.
Conclusion gives the other remarks after having the entire study .
Appendixes documents all the memos and the data compiled during the investigation.
The appendix is added at the end of the feasibility report.
2.2.2 Conclusion
The above observations made from the feasibility study recommends that the proposed
computerized storing of car information & car sales report is feasible for its development
and implementation.
Estimation
The following project estimates have to be estimated.
Duration:
Effort:
The effectiveness of all other planning activities such as scheduling and staffing are
based on the accuracy of these estimations.
Scheduling
After the estimations are made, the schedules for manpower and other resources have to be
developed.
Feasibility
Study
Analysis
Design
(30 hours)
Initial
Investigatio
n
Testing
Coding
(30 hours)
Start
Implementation
Post implementation
Finish
Gantt Chart
A Gantt chart is a type of bar chart that illustrates a project schedule. Gantt charts illustrate
the start and finish dates of the terminal elements and summary elements of a project.
Terminal elements and summary elements comprise the work breakdown structure of the
project. Some Gantt charts also show the dependency (i.e., precedence network) relationships
between activities. Gantt charts can be used to show current schedule status using percentcomplete shadings and a vertical "TODAY" line as shown here.
Although now regarded as a common charting technique, Gantt charts were considered
revolutionary when they were introduced. In recognition of Henry Gantt's contributions, the
Henry Laurence Gantt Medal is awarded for distinguished achievement in management and
in community service. This chart is used also in Information Technology to represent data
that have been collected.
A common error made by those who equate Gantt chart design with project design is that
they attempt to define the project work breakdown structure at the same time that they define
schedule activities. This practice makes it very difficult to follow the 100% Rule. Instead the
WBS should be fully defined to follow the 100% Rule, then the project schedule can be
designed.
Although a Gantt chart is useful and valuable for small projects that fit on a single sheet
or screen, they can become quite unwieldy for projects with more than about 30 activities.
Larger Gantt charts may not be suitable for most computer displays. A related criticism is that
Gantt charts communicate relatively little information per unit area of display. That is,
projects are often considerably more complex than can be communicated effectively with a
Gantt chart. Gantt charts only represent part of the triple constraints (cost, time and scope) of
projects, because they focus primarily on schedule management. Moreover, Gantt charts do
not represent the size of a project or the relative size of work elements, therefore the
magnitude of a behind-schedule condition is easily miss communicated. If two projects are
the same number of days behind schedule, the larger project has a larger impact on resource
utilization, yet the Gantt does not represent this difference.
1.Initial Investigation
(30 hrs)
2.Feasibility Study
(30 hrs)
3.System Analysis
(60 hrs)
4.System Design
(100 hrs)
5.Coding
(160 hrs)
6.Testing
(30 hrs)
7.Implementation
(20 hrs)
8.Post Implementation
(30 hrs)
9.Finish
2.5.1.1 Purpose
The Software Requirements Specification (SRS) will provide a detailed description of the
requirements for the Online Case Management System. This SRS will allow for a complete
understanding of what is to be expected of the Online Case Management System to be
constructed. The clear understanding of the Online Case Management System and its
functionality will allow for the correct software to be developed for the end user and will be
used for the development of the future stages of the project. This SRS will provide the
foundation for the project. From this SRS, the Online Case Management System can be
designed, constructed, and finally tested.
We will use the SRS to fully understand the expectations of this Online Case
Management System to construct the appropriate software. The end users will be able to use
this SRS as a test to see if the constructed system is up to their expectations. If it is not to
their expectations the end users can specify how it is not to their liking and the SRS will be
changed to fit the end users needs.
2.5.1.3 Goals
The main goal of the system is to automate the process carried out in the Advocate
office/Law firm with improved performance .
Some of the goals of the system are listed below:
2.5.3 Overview
SRS will include two sections.
Overall Description will describe major components of the system, interconnection and
external interfaces.
Specific Requirements will describe the functions of actors, their role in the system and
constraints.
Administrator
Web server
Reporting
Advocates
Database
User Classes:
Some of the users identified for this system through use case analysis are listed below:
Administrator
Adocates
Advocates can view their profile by log in with their password and user ids and can
edit their profile, store client and case related information etc. but cannot edit other
profiles, donot have any access to others profile or modify information.
Some functions are already created and informations available for use.
The user interface for this system will have to be simple and clear. Most importantly,
the ages must be easy to read, easy to understand and accessible.
Screen Name
Description
Login
User registration
Clients
Case entry
Case proceeding
Fees Transaction
Reminder
Setting
Registration: Advocates will carry out their own registration, providing the system
with a way to associate a user to their registration(s). This will enable the system to
display personalized information
Validation: On the completion of each form in the system, the system will use a set of
validation functions to ensure that information is of the right type in each field.
There are no other specific performance requirements that will affect development.
Security Requirements
Some of the factors that are identified to protect the software from accidental or malicious
access, use, modification, destruction, or disclosure are described below. Specific
requirements in this area could include the need to:
Reliability
Some of the attributes identified for the reliability is listed below:
All data storage for user variables will be committed to the database at the time of
entry.
Feasibility
study
Requirements analysis
and specification
Design
Maintenance
During this phase the design is tested in small modules in isolation from rest of the software
product. Then all the modules are integrated together and tested.
Implementation
Release of software inaugurates the operation and life cycle phase of theoperation.The phases
always occur in this order and do not overlap.
DFD Symbols
1. External Entity
The producer or the consumer of information that resides outsides the bound of the
system to be modeled. The following rectangular shape denotes it.
2. Process
It is the agent that performs the transformation of information from one state to
another. The following shape denotes it.
4. Data Store
A repository of data is a passive object within a DFD for later access. A data store
does not generate any operations on its own but merely responds to requests to store
and access data. The following shape denotes it.
Context diagram
E-R Diagram:
The most important consideration in designing the database is how to information will be
used. The various application and procedures that will be used the database introduces the
requirements upon the structure of data.
In a relational database, representation of data and data relationship is a collection of
tables. Each table has one or more columns.
The first step in creating a database is designing it. First plan what we require and what
data they will contain. It also determines how the tables were created. This is a very
important step and deserves careful considerations.
It should determine what things we want to store information about (entities) and how
these things are related (relationship). A useful technique in designing the database is to draw
a picture of the tables. This graphical display of database is called an Entity Relationship
Diagram (E-R Diagram). Usually, each box in E-R Diagram corresponds to a foreign key.
REPRESENT AN ENTITY
REPRESENT AN ATTRIBUTE
REPRESENT RELATIONSHIP
REPRESENT CARDINALITY
Chapter 3
System Design
The most creative and challenging phase of system life cycle is system design. The system
design describes the final system and the process by which it is developed. It refers to
technical specification that will be applied in implementing the candidate system. Designing
the software means to plan how various part of the software are going to meet the desired
goals. It should be done the performance of the entire system. As a result it may take more
processing time, more coding and extra workload.
System design is a how to approach to the creation of the new system. This important
phase is composed of several steps. It provides the procedural details necessary for
implementing the system recommended in the feasibility. It gives emphasis on translating the
performance requirements to design specifications. System design goes through two phases
of development Logical design and Physical design.
3.1
All data stored in a database must adhere to certain business rules. For example, there may be
a business rule specifying a minimum hourly wage for any employee or another rule stating
that the discount for sale items cannot be more than 100%. In either case if an INSERT or
UPDATE statement attempts to violate the integrity rule, the statement must be roll back and
return an error.
Integrity Constraints
An integrity constraint defines a business rule for a table column. When enabled, the rule will
be enforced by database. To create an integrity constraint all existing table data must satisfy
the constraint.
Default values are also subject to integrity constraint checking (defaults are included as
part of an INSERT statement before the statement is parsed.) If the results of an INSERT or
UPDATE statement violate an integrity constraint, the statement will be rolled back.
Integrity constraints are stored as part of the table definition, (in the data dictionary.)
If multiple applications access the same table they will all adhere to the same rule.
The following integrity constraints are supported by Oracle:
NOT NULL
UNIQUE
CHECK constraints for complex integrity rules
PRIMARY KEY
FOREIGN KEY integrity constraints - referential integrity actions: On Update On Delete
Delete CASCADE Delete SET NULL
Data type
Integer
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Varchar
Size
20
30
100
30
30
30
30
100
Constraints
Primary key
Not null
Not null
Not null
Not null
Unique key
Unique key
Not null
Data type
Integer
text
Size
20
40
Constraints
primary
Not null
Data type
integer
varchar
Size
20
40
Constraints
Primary key
Not null
Table: case_stages
Field name
cs_id
c_stage
Table: court
Field name
court_id
court_name
location
Data type
Integer
Varchar
Varchar
Size
20
50
50
Constraints
Primary key
Not null
Not null
Data type
Integer
Varchar
Varchar
Varchar
Varchar
Varchar
Integer
Varchar
Varchar
Varchar
date
Varchar
Varchar
Varchar
Varchar
Varchar
Integer
Varchar
Varchar
Varchar
Varchar
Integer
Varchar
Varchar
Varchar
Varchar
Varchar
date
Size
20
30
30
20
20
80
20
30
30
50
Constraints
Primary key
Not null
Not null
Not null
Not null
Not null
Not null
Unique key
Unique key
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Unique key
Not null
Not null
Not null
Not null
Unique key
Not null
Not null
Not null
Not null
Not null
Data type
Integer
Varchar
Varchar
Size
20
30
50
Table: advocates
Field name
adv_id
name
address1
city
state
country
pin
email
contact
photo
dob
office
office_address1
office_city
office_state
office_country
office_pin
username
password
gender
activation
status
enroll_no
speciality
academic_qualificatio
court_of_practice
area_of_practice
practice_since
30
80
30
30
80
20
30
100
30
80
10
30
30
30
50
30
Table: clients
Field name
client_id
client_name
address
Constraints
Primary key
Not null
Not null
city
state
country
pin
email
contact
gender
adv_id
Table: case_entry
Field name
case_no
case_title
ct_id
prov_of_law
court_id
client_id
opp_party
reg_date
year
adv_id
Varchar
Varchar
Varchar
Integer
Varchar
Varchar
Varchar
Integer
30
30
100
20
30
30
30
20
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Foreign key
Data type
Integer
Varchar
Integer
Integer
Integer
Integer
Varchar
Date
Year
Integer
Size
50
100
20
30
20
20
30
Constraints
Primary key
Not null
Foreign key
Not null
Foreign key
Foreign key
Not null
Not null
Not null
Foreign key
Data type
Integer
Integer
Integer
Integer
date
date
Varchar
Integer
Size
20
30
20
20
100
20
Constraints
Primary key
Foreign key
Foreign key
Foreign key
Not null
Not null
Not null
Foreign key
Data type
Integer
Integer
Integer
Size
20
30
20
Constraints
Primary key
Foreign key
Foreign key
4
20
Table: case_proceeding
Field name
prceed_id
client_id
case_no
cs_id
proceed_date
next_hear_date
result
adv_id
Table: case_document
Field name
document_id
client_id
case_no
d_name
document
dat
adv_id
Varchar
Varchar
date
Integer
100
80
Data type
Integer
Integer
Integer
date
Varchar
decimal
decimal
decimal
decimal
Integer
Size
20
20
30
Data type
Integer
Integer
Integer
Varchar
date
Integer
Size
20
30
20
100
Data type
Integer
Varchar
Varchar
Varchar
text
Size
20
30
30
30
20
Not null
Not null
Not null
Foreign key
Table: case_fees
Field name
fee_id
client_id
case_no
date
pay_mode
legal_fees
court_fees
received
balance
adv_id
30
30,2
30,2
30,2
30,2
20
Constraints
Primary key
Foreign key
Foreign key
Not null
Not null
Not null
Not null
Not null
Not null
Foreign key
Table: case_reminder
Field name
reminder_id
client_id
case_no
r_detail
date
adv_id
20
Constraints
Primary key
Foreign key
Foreign key
Not null
Not null
Foreign key
Table: contact
Field name
m_id
name
email
contact
message
Constraints
Primary key
Not null
Unique key
Unique key
Not null
status
date
Varchar
datetime
20
Not null
Not null
Data type
Integer
Varchar
Varchar
Varchar
Varchar
Varchar
Text
Varchar
Datetime
Varchar
Varchar
Size
20
30
30
30
30
30
Constraints
Primary key
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Data type
Integer
Varchar
Varchar
Varchar
Varchar
Varchar
Text
Varchar
Datetime
Size
20
30
30
30
30
30
Data type
Size
Table: message
Field name
msg_id
subject
msg_to
to_name
msg_from
from_name
message
attach
date
status
place
100
20
20
Table: msg_sent
Field name
m_id
subject
msg_to
to_name
msg_from
from_name
message
attach
date
80
Constraints
Primary key
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Not null
Table: chat
Field name
Constraints
id
from
to
message
sent
recd
Integer
Varchar
Varchar
text
datetime
int
10
80
80
30
10
Primary key
Not null
Not null
Not null
Not null
Not null
Keeping in view the user requirements, the inputs screens have been designed and
developed for easy and error free data entry. Based on the various types of inputs to be fed to
the computer in using the proposed system, all input screens have been designed in real mode
(GUI).
The details of all input screens are shown as follows:
Output Design
Computer output is the most important and direct source of information to the user. Efficient,
intelligible output design should improve the systems relationship with the user and help in
decision making. A major form of output is a hard copy from the printer. The output screens
for displaying the information have been designed in such a way that maximum information
can be viewed using minimum effort and time.
The details of all output screens are shown as follows:
Chapter 4
Coding
The input to coding phase is the design document produced at the end of the design phase.
During the coding phase, different modules identified in the design document are coded
according to their respective module specifications.
The objective of the coding phase is to transform the design of a system into code in a
high level language, and then unit test this code.
The software development organizations formulate their own coding standard that suits
them most. The main advantages of adhering to a standard style of coding are as following:
(i)
(ii)
(iii)
<script></script> The HTML script element is used to insert client side script code into a
document.
This can be achieved in two ways: inserting the code directly as content of this
element or referring to an external file containing script code with the "src" attribute. In the
second case, user agents should ignore the content of the element.
<?php...?>
Expression
The smallest building blocks of PHP are the indivisible tokens, such as numbers (3.14159),
strings (.two.), variables ($two), constants (TRUE), and the special words that make up the
syntax of PHP itself like if, else, while, for and so forth.
Every well-constructed PHP application should have error handling. While there is no
definitive method for handling errors since it varies depending on application needs and a
developer's style, nonetheless, there are some "best practices" that should be implemented in
all PHP applications.
When creating scripts and web applications, error handling is an important part. If code
lacks error checking code, program may look very unprofessional and we may be open to
security risks.
There are different error handling methods:
Error reporting
Trigger an Error
In a script where users can input data it is useful to trigger errors when an illegal input occurs.
In PHP, this is done by the trigger_error() function.
Example
In this example an error occurs if the "test" variable is bigger than "1":
<?php
$test=2;
if ($test>1) {
trigger_error("Value must be 1 or below");
}
?>
The output of the code above should be something like this:
Notice: Value must be 1 or below
in C:\webfolder\test.php on line 6
Exceptions Handling:
PHP 5 has an exception model similar to that of other programming languages. Exceptions
are important and provides a better control over error handling.
Lets explain thre new keyword related to exceptions.
Try - A function using an exception should be in a "try" block. If the exception does
not trigger, the code will continue as normal. However if the exception triggers, an
exception is "thrown".
Throw - This is how you trigger an exception. Each "throw" must have at least one
"catch".
Catch - - A "catch" block retrieves an exception and creates an object containing the
exception information.
Example:
<?php
try {
$error = 'Always throw this error';
throw new Exception($error);
// Code following an exception is not executed.
echo 'Never executed';
} catch (Exception $e) {
echo 'Caught exception: ', $e->getMessage(), "\n";
}
// Continue execution
echo 'Hello World';
?>
Before the browser sends the information, it encodes it using a scheme called URL encoding.
In this scheme, name/value pairs are joined with equal signs and different pairs are separated
by the ampersand.
name1=value1&name2=value2&name3=value3
The GET method produces a long string that appears in your server logs, in the
browser's Location: box.
Never use GET method if you have password or other sensitive information to be sent
to the server.
GET can't be used to send binary data, like images or word documents, to the server.
The data sent by GET method can be accessed using QUERY_STRING environment
variable.
The PHP provides $_GET associative array to access all the sent information using
GET method.
<?php
if( $_GET["name"] || $_GET["age"] )
{
echo "Welcome ". $_GET['name']. "<br />";
echo "You are ". $_GET['age']. " years old.";
exit();
}
?>
<html>
<body>
<form action="<?php $_PHP_SELF ?>" method="GET">
Name: <input type="text" name="name" />
Age: <input type="text" name="age" />
<input type="submit" />
</form>
</body>
</html>
The POST method does not have any restriction on data size to be sent.
The POST method can be used to send ASCII as well as binary data.
The data sent by POST method goes through HTTP header so security depends on
HTTP protocol. By using Secure HTTP you can make sure that your information is
secure.
The PHP provides $_POST associative array to access all the sent information using
POST method.
<?php
if( $_POST["name"] || $_POST["age"] )
{
echo "Welcome ". $_POST['name']. "<br />";
echo "You are ". $_POST['age']. " years old.";
exit();
}
?>
<html>
<body>
<form action="<?php $_PHP_SELF ?>" method="POST">
Name: <input type="text" name="name" />
Age: <input type="text" name="age" />
<input type="submit" />
</form>
</body>
</html>
The simplest change you can make to your forms is to mark a text input field as 'required':
Your Name: <input type="text" name="name" required>
By changing the input type to email while also using the required attribute, the browser can
be used to validate (in a limited fashion) email addresses:
Email Address: <input type="email" name="email" required placeholder="Enter
a valid email address">
The number and range input types also accept parameters for min, max and step. In most
cases you can leave out step as it defaults to 1.
Here you see an example including both a number input, typically displayed as a 'roller' and a
range input displayed as a 'slider':
Age:
<input
type="number"
size="6"
name="age"
min="18"
value="21"><br>
Satisfaction:
<input
type="range"
name="satisfaction" min="1" max="5" value="3">
color
date
datetime
datetime-local
month
search
tel
time
week
max="99"
size="2"
<script type="text/javascript">
<!-// Form validation code will come here.
function validate()
{
if( document.myForm.Name.value == "" )
{
alert( "Please provide your name!" );
document.myForm.Name.focus() ;
return false;
}
return( true );
}
//-->
</script>
}
return( true );
}
//-->
Server-side validation is the most robust, in that it can't be bypassed by disabling JavaScript
or otherwise modifying the front-end code, and it is important when you are submitting
information directly into a business-critical database with strict requirements.
<script type="text/javascript">
$(document).ready(function() {
$("#myform").validate({
[validation options go here]
});
});
</script>
Chapter 5
Testing
Software testing is a critical element of software quality assurance and represents the ultimate
review of specification, design and coding. In fact, testing is the one step in the software
engineering process that could be viewed as destructive rather than constructive.
A strategy for software testing integrates software test case design methods into a wellplanned series of steps that result in the successful construction of software. Testing is the set
of activities that can be planned in advance and conducted systematically. The underlying
motivation of program testing is to affirm software quality with methods that can
economically and effectively applied to both strategic to both large and small-scale systems
Testing Objectives
The testing objectives are summarized in the following three steps:
1. Testing is a process of executing a program with the intent of finding an error.
2. A good test case is one that has a high probability of finding an as yet undiscovered
error.
3. A successful test is the one that uncover an as yet undiscovered error.
Our objective is to design tests that systematically uncover different classes of errors and
do so with a minimum amount of time and effort.
Testing Principles
a) All tests should be traceable to customer requirement.
b) Tests should be planned long before testing begins that is the test- planning can begin
as soon as the requirement model is complete.
Testing should begin in the small and progress towards testing in the large. The first
plan and executed generally focus on individual program modules. As the testing progresses,
testing shifts focus in an attempt to find errors in integrated clusters of modules and
ultimately in the entire system.
The number of path permutations for even a moderately sized program is exceptionally
large. For this reason, it is impossible to execute every combination of paths during testing. It
is possible, however to adequately cover program logic and to ensure that all conditions in the
procedural design have been exercised. To be more effective, testing has highest probability
of finding the errors.
The following are the attributes of a good test:
1. A good test has the high probability of finding the errors.
2. A good test is not redundant.
3. A good test should be best of breed.
4. A good test should be neither too simple nor too complex.
This process has two parts:
a) Planning: This involves writing and reviewing unit, integration, functional, validation
and acceptance test plans.
b) Execution: This involves executing these test plans, measuring, collecting data and
verifying if it meets the quality criteria set in the Quality Plan. Data collected is used
to make appropriate changes in the plans related to development and testing.
The quality of a product or item can be achieved by ensuring that the product meets the
requirements by planning and conducting the following tests at various stages.
Unit
Testing
Module
Testing
Integration
Testing
Acceptance
Testing
Table shows the Tests Conducted on the Online Case Management System management
system
Unit Testing
Unit Testing will be done to test field validations, navigation, functionality of the programs
and its blocks. These tests are applied on various functions within each program and other
critical program blocks.
Module Testing
Module testing will be done to test the interaction between the various programs within one
module. It checks the functionality of each program with relation to other programs within
the same module. It then tests the overall functionality of each module.
Intregation Testing
Integration testing is done to test the functionality and interfacing between the modules. The
system is built up of various modules, which work together to automate the activities of the
Online Case Management System management system. These modules should work together
in a seamless way to achieve the desired results. Integration testing will test for this property
of the modules. The modules display a cause and effect relationship, if data in one module is
changed, then it affects the data to change in some other module also. Integration testing
needs to check if the modifications do not adversely affect some other modules.
Acceptance Testing
Acceptance testing was done after the implementation of the system. The acceptance testing
will check if the system works correctly in the user environment and if the entire user
specified functionalities are present. It also tests if the system adheres to the company
policies and quality standard.
5.2 Debugging
Debugging occurs as a consequence of successful testing. That is, when a test case uncover
an error, debugging can and should be an orderly process that result in the removal of the
error. Although debugging can should be an orderly process, it is still very much an art.
The debugging process will always have one of the two outcomes:
The software was tested thoroughly before implementation and when errors were found
they were corrected and removed.
After a through testing of the different aspect of the system as described above the
system is ready for implementation.
Chapter 6
Privacy
It defines the right of the users and the organizations to determine what information they are
willing to share with or accept from others and how the organization can be protected
against unwelcome ,unfair or excessive dissemination of information about it.
Confidentiality
The term confidentiality is the special status given to the sensitive information in a database
to minimize the possible disclosure of information that characterizes its need for protection.
System security is the technical means of providing such protection .In contrast , privacy is
basically a procedure of how the information available are used.
Data privacy and security are issues that go beyond the scope of system development.
They are actually a social concern . An organization that depends heavily on the use of
databases requires special control to maintain viable information.
These controls are classified into three general categoriesa) Physical Security.
b) Database Security.
c) Application Security.
d) Operating System Level Security.
Physical Security
It refers the security or protection from fire ,flood or the other physical damages.Physical
security is the protection of personnel, hardware, programs, networks, and data from physical
circumstances and events that could cause serious losses or damage to an enterprise, agency,
or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism,
and terrorism.There are three main components to physical security. First, obstacles can be
placed in the way of potential attackers and sites can be hardened against accidents and
environmental disasters. Such measures can include multiple locks, fencing, walls, fireproof
safes, and water sprinklers. Second, surveillance and notification systems can be put in place,
such as lighting, heat sensors, smoke detectors, intrusion detectors, alarms, and cameras.
Third, methods can be implemented to apprehend attackers (preferably before any damage
has been done) and to recover quickly from accidents, fires, or natural disasters.
Database/data security
Registration level authentication and authorization mechanisms should be considered as an
effective means of providing database security. Registration and authorization provides
abstraction .The primary benefit of abstraction is that of a single sign on capability across
multiple databases and database platforms. A single sign-on system should store the database
users credentials (login id and password), and authenticate to the database on behalf of the
user.Database security concerns the use of a broad range of information security controls to
protect databases (potentially including the data, the database applications or stored
functions, the database systems, the database servers and the associated network links)
against compromises of their confidentiality, integrity and availability. It involves various
types or categories of controls, such as technical, procedural/administrative and
physical. Database security is a specialist topic within the broader realms of computer
security, information security and risk management.
Application Security
It refers to the control measures of the application software through passwords ,encryption
and monitoring users on a regular basis. The client was given the application software in
floppies or compact disk, so that if some of the files get corrupted accidentally or
intentionally ,the whole system can again be loaded from backup disks and the database can
be recovered back. Application security is the use of software, hardware, and procedural
methods to protect applications from external threats. Once an afterthought in software
design, security is becoming an increasingly important concern during development as
applications become more frequently accessible over networks and are, as a result, vulnerable
to a wide variety of threats. Security measures built into applications and a sound application
security routine minimize the likelihood that unauthorized code will be able to manipulate
applications to access, steal, modify, or delete sensitive data.
Chapter 7
Where,
a) KLOC is the estimated size of the software product expressed in Kilo Lines of Code.
b) a1, a2, b1, b2 are constants for each category of software product.
c) Tdev is the estimated time to develop the software, expressed in months.
d) Effort is the total effort required to develop the software product expressed in Person
Months.
: Effort = 2.4(KLOC)1.05 PM
: Effort = 3.6(KLOC)1.20PM
Semidetached
Embedded
Chapter 8
Reports
Chapter 9
Chapter 10
Conclusion
The design of the system is done with great effort to understand the need of the users, the
various facilities in the day to day operation of a proposed system which intends to assist
Online Case Management System management system.The tool used for the developing the
system are
Dreamweaver cs4.
Wamp server
The designed software can be run on any IBM compatible machines providing the
minimum hardware and software requirements are satisfied. The software is intended to serve
the need of the proposed institute. The design of the software is made in such an way that the
user can operate the software using both key-board and the mouse. The menus are designed
in a very user friendly manner. There is some definite possibility of enhancement of the
software so as to fulfill the users requirement in future .People having the knowledge of
DBMS based packages can go for further enhancement of the software.
Biblography