Documente Academic
Documente Profesional
Documente Cultură
Abstract
This project title is “Cloud Based Petition Acquisition in Public Sector”. It describes
the process of applying various petitions through online. This system developed to manage the
various petitions processing through website. This system is any member can apply using Name,
Address, Aadhaar details through website. And, also in this project used to help the public and
given the greater profitability through direct communication to government sector via online.
This service is used to enhance the system for public to optimize their requests . The petitions
that has been requested by the user or people will be provided efficiently using this system. The
applicants can track their application status by using their ID and password that has been
provided by the administrator This process completely provides the status of the certificates and
the petitions that has been admitted by the user .So the admin can efficiently access the system
that has been initiated and their requests will be processed in an timely manner.
Introduction
The project “Cloud Based Petition Acquisition in Public Sector” provides the proper
procedure for applying certificates and petition information to the users who have applied based
on their demands. The users are provided with proper response for the petitions applied by them
and the status of the petitions that has been processed by the administrator and the officials. The
status of the complaint details will be intimated to the users with which the concerned user can
gather the knowledge of the corresponding certificates and petition applied by them to the
administrator. Since it is an decentralized process the efficiency of the process has been
increased. By doing the so the user has been allotted with reduced latency work process and the
complaint information will be processed in an enormous way which increases performance
evaluation of the system.
Problem Description
The major problem in the current scenario is the user is unable to apply and receive
proper approval for the petitions that has been applied to the public sector management. Since it
is totally a manual process the report maintenance and the customer requests will not be
processed properly. At the same time in the admin side there exists vast user data which is a
complex process for the admin to gather and process the user request. The user was unable to
view or receive proper intimation of the status of the petitions that has been applied. It increases
the latency of the system and improper in maintaining the reports and data. At the same time the
entire procedure decreases the robustness and performance evaluation on the user side. Moreover
the administrator was unable satisfy the conditions and the requirements of the user in an
efficient manner.
Objectives:
Existing System
In the existing procedure the records of the public are maintained are maintained in an
usual paper format, which is a more latent process and it ensures lack of data assurance. The
existing system does not provide better knowledge about the details and information about the
steps and assumption for attaining the certificates in various public sector. Each sector have
some separate rules and protocols to perform their operations for the public. More paper work is
needed and lots and lots of work load has been generated. There may be a chance of scam
occurrence in the payment process in the existing procedure, which is a more intolerable activity.
The main disadvantage is, the public has to present in the authorized administrator office for the
sake of his request.
Disadvantages
The proposed system exceeds the entire process that has been maintained in the existing
system. The public can apply their needed certificates, property requirements, petition process
through online from which the latency has been reduced to its core. The payment for the
application, certificates, can be payed through online which reduces the financial scam. The user
can apply for the certificates from any location through online. The time redundancy has been
very much reduced in this process. The status of every use will be provided to them through
message or through mail which enhances the system.
Advantages
What are the user’s demonstrable needs and how does a candidate system meet them?
What resources are available for given candidate system?
What are the likely impacts of the candidate system on the organization?
Whether it is worth to solve the problem?
During feasibility analysis for this project, following primary areas of interest are to be
considered. Investigation and generating ideas about a new system does this.
Technical feasibility
A study of resource availability that may affect the ability to achieve an acceptable
system. This evaluation determines whether the technology needed for the proposed system is
available or not.
Can the work for the project be done with current equipment existing software
technology & available personal?
Can the system be upgraded if developed?
If new technology is needed then what can be developed?
Economical feasibility
Economic justification is generally the “Bottom Line” consideration for most systems.
Economic justification includes a broad range of concerns that includes cost benefit analysis. In
this we weight the cost and the benefits associated with the candidate system and if it suits the
basic purpose of the organization i.e. profit making, the project is making to the analysis and
design phase. The financial and the economic questions during the preliminary investigation are
verified to estimate the following:
• The cost of hardware and software for the class of application being considered.
• The proposed system will give the minute information, as a result the performance is improved
which in turn may be expected to provide increased profits.
• This feasibility checks whether the system can be developed with the available funds. The
Hospital Management System does not require enormous amount of money to be developed.
This can be done economically if planned judicially, so it is economically feasible. The cost of
project depends upon the number of man hours required.
Operational Feasibility
The system is operationally feasible as it very easy for the End users to operate it. It only
needs basic information about Windows platform.
Schedule feasibility
`Time evaluation is the most important consideration in the development of project. The
time schedule required for the developed of this project is very important since more
development time effect machine time, cost and cause delay in the development of other
systems. A reliable Hospital Management System can be developed in the considerable amount
of time.
Hardware Requirements:
Software Requirements:
FEATURES OF PHP
PHP was originally created by Rasmus Lerdorf in 1995[1] and has been in
continuous development ever since. The main implementation of PHP is now
produced by The PHP Group and serves as the de facto standard for PHP as there
is no formal specification. PHP is free software released under the PHP License,
which is incompatible with the GNU General Public License (GPL) because
restrictions exist regarding the use of the term PHP.
1. Your browser sends a request to that web page's server (computer) for the
file (HTML or image) you wish to view.
2. The web server (computer) sends the file requested back to your computer.
3. Your browser displays the file appropriately.
4. If you request a PHP file (ends with ".php"), the server handles it differently.
PHP originally stood for personal home page. Its development began in 1994
when the Danish/Greenlandic programmer Rasmus Lerdorf initially created a set
of Perl scripts he called 'Personal Home Page Tools' to maintain his personal
homepage, including tasks such as displaying his résumé and recording how much
traffic his page was receiving. He rewrote these scripts as C programming
language Common Gateway Interface (CGI) binaries, extending them to add the
ability to work with web forms and to communicate with databases and called this
implementation 'Personal Home Page/Forms Interpreter' or PHP/FI. PHP/FI could
be used to build simple, dynamic web applications. Lerdorf released PHP/FI as
'Personal Home Page Tools (PHP Tools) version 1.0' publicly on June 8, 1995, to
accelerate bug location and improve the code. This release already had the basic
functionality that PHP has today. This included Perl-like variables, form handling,
and the ability to embed HTML. The syntax was similar to Perl but was more
limited and simpler, although less consistent. A development team began to form
and, after months of work and beta testing, officially released PHP/FI 2 in
November 1997.
A new major version has been under development alongside PHP 5 for
several years. This version was originally planned to be released as PHP 6 as a
result of its significant changes, which included plans for full Unicode support.
However, Unicode support took developers much longer to implement than
originally thought, and the decision was made in March 2010 to move the project
to a branch, with features still under development moved to trunk.
PHP currently does not have native support for Unicode or multibyte
strings; Unicode support is under development for a future version of PHP and will
allow strings as well as class, method, and function names to contain non-ASCII
characters.
The PHP interpreter only executes PHP code within its delimiters. Anything
outside its delimiters is not processed by PHP (although non-PHP text is still
subject to control structures described within PHP code). The most common
delimiters are <?php to open and ?> to close PHP sections. <script
language="php"> and </script> delimiters are also available, as are the shortened
forms <? or <?= (which is used to echo back a string or variable) and ?> as well as
ASP-style short forms <% or <%= and %>. While short delimiters are used, they
make script files less portable as support for them can be disabled in the PHP
configuration, and so they are discouraged. The purpose of all these delimiters is to
separate PHP code from non-PHP code, including HTML.
The first form of delimiters, <?php and ?>, in XHTML and other XML
documents, creates correctly formed XML 'processing instructions'. This means
that the resulting mixture of PHP code and other markup in the server-side file is
itself well-formed XML.
Variables are prefixed with a dollar symbol and a type does not need to be
specified in advance. Unlike function and class names, variable names are case
sensitive. Both double-quoted ("") and heredoc strings allow the ability to embed a
variable's value into the string. PHP treats newlines as whitespace in the manner of
a free-form language (except when inside string quotes), and statements are
terminated by a semicolon. PHP has three types of comment syntax: /* */ marks
block and inline comments; // as well as # are used for one-line comments. The
echo statement is one of several facilities PHP provides to output text (e.g. to a
web browser).
In terms of keywords and language syntax, PHP is similar to most high level
languages that follow the C style syntax. if conditions, for and while loops, and
function returns are similar in syntax to languages such as C, C++, Java and Perl.
Benefit of PHP
Because the server does processing, the output of PHP files changes when its
input changes. For example, most of the pages on the Horticulture site have only
two (2) PHP commands:
1. Include the header file that defines the links on the left, the banner, and the
quick links at the top.
2. Include the footer file that displays the mission statement and Horticulture
contact information.
Because including the files is performed every time the PHP file is accessed, when
the header/footer files change, the new content will be immediately updated. In
other words, if you add a new link, every page that includes the header will
immediately display the new link.
PHP has become the most popular Web programming language not only
because it is free. PHP is a full-fledged programming language (unlike HTML for
example, which is more of a presentation means) and many complex applications
can be written it it. Another benefit of applications written in PHP is that they are
fast and if written properly, they could be pretty secure. There are also tons of
ready PHP scripts and functions, which you can customize to your liking and use
in your PHP applications.
Before building website you need to know which language you are going to
use in a professional looking website. PHP is one of the best and easy to use
programming language as it can be run to any operating system. PHP is free
language so that is the huge advantage of this language. For handling database
connections, formatting date, editing strings, handling emails and all PHP can be
very useful. It can be easily extend for some specific functions that you would like
to add in your website. Reliability of this language is extra ordinary as PHP already
runs on millions of servers around the world, which means that it's powerful
enough for even the most demanding situations. It provides web developers much
more liberation in creating website with some of the outstanding features and they
can use regular elements frequently. PHP can be very much successful for creating
Dynamic Websites. PHP programmers with the use of open source codes benefit
from the flexibility of editing, modifying and updating the source code when there
is mandatory.
PHP is based on C++ programming language and the syntax used in PHP is
fairly similar to C, C++. There is huge community of developers who still believes
that C/C++ is still the best programming language. For every website to get
reasonable progress it can be use Content Management System such as Joomla,
Word Press etc. here PHP and MySQL are very helpful in successful CMS
running. There are so many IT companies which provide best quality PHP web
development work from India. The reason for Outsourcing PHP development to
India is that it is very cost effective with better quality. In the professional field of
Web and software development services we have achieved great amount of victory
with skilled and experienced PHP programmers.
PHP has been supported by almost every hosting company. PHP can be the
best choice to run an application on Linux based hosting platforms. PHP is a server
side scripting language originally designed to build dynamic websites. Modern
web 2.0 applications are largely characterized by mashups and desktop style user
interfaces. php is an excellent choice for interacting with other websites and
providing rich user experience. Simple php commands like curl or fopen allow you
to grab data from other websites with relative ease. Php works well with javascript
so you can provide your end users with modern, responsive interfaces that are way
beyond the old static interfaces of days past.
BACK END SOFTWARE
MYSQL
FEATURES OF MYSQL
MYSQL INTRODUCTION
The MySQL® database has become the world's most popular open source
database because of its consistent fast performance, high reliability and ease of use.
It's used on every continent -- Yes, even Antarctica! -- by individual Web
developers as well as many of the world's largest and fastest-growing organizations
to save time and money powering their high-volume Web sites, business-critical
systems and packaged software -- including industry leaders such as Yahoo!,
Alcatel-Lucent, Google, Nokia, YouTube, and Zappos.com.
Not only is MySQL the world's most popular open source database, it's also
become the database of choice for a new generation of applications built on the
LAMP stack (Linux, Apache, MySQL, PHP / Perl / Python.) MySQL runs on more
than 20 platforms including Linux, Windows, Mac OS, Solaris, HP-UX, IBM AIX,
giving you the kind of flexibility that puts you in control.
MySQL can be built and installed manually from source code, but this can
be tedious so it is more commonly installed from a binary package unless special
customizations are required. On most Linux distributions the package management
system can download and install MySQL with minimal effort, though further
configuration is often required to adjust security and optimization settings.
Though MySQL began as a low-end alternative to more powerful
proprietary databases, it has gradually evolved to support higher-scale needs as
well. It is still most commonly used in small to medium scale single-server
deployments, either as a component in a LAMP based web application or as a
standalone database server. Much of MySQL's appeal originates in its relative
simplicity and ease of use, which is enabled by an ecosystem of open source tools
such as phpMyAdmin. In the medium range, MySQL can be scaled by deploying it
on more powerful hardware, such as a multi-processor server with gigabytes of
memory.
There are however limits to how far performance can scale on a single
server, so on larger scales, multi-server MySQL deployments are required to
provide improved performance and reliability. A typical high-end configuration
can include a powerful master database which handles data write operations and is
replicated to multiple slaves that handle all read operations.[18] The master server
synchronizes continually with its slaves so in the event of failure a slave can be
promoted to become the new master, minimizing downtime. Further improvements
in performance can be achieved by caching the results from database queries in
memory using memcached, or breaking down a database into smaller chunks
called shards which can be spread across a number of distributed server clusters.
HTML
Features of HTML
A data flow diagram (DFD) is a graphical representation of the "flow" of data through
an information system, modeling its process aspects. DFDs can also be used for
the visualization of data processing (structured design)
Data Flow Diagram:
Symbol Description
An entity. A source of data or a
destination for data.
A data flow.
Level 0
Cloud Based
ADMIN
Petition Database
Acquisition in
Public Sector
Level 1
Register
User Database
Login
Level 2
Login
Applicant
Details
Response to
Applicants
ADMIN Database
Status
Verification
Reports &
Feedback
Message
Intimation
Level 3
Register
& Login
Request
Demands
Acquire Petition/
Certificates Database
User
Message
Intimation
Queries &
Feedback
Architecture Diagram
User Admin
Login
Register & Login
View & Response
Request Demands to Applicants
Status Verification
Acquire
Petition/Certificate
s
Reports & Feedback
Message Intimation
Officials
Request Demands
Acquire Petitions/Certificates
Users
Response to Users
Message Intimation
Status Verification
Sequence Diagram
Request Demands
View Request
View Request
Acquire Petition/Certifivcates
Response to Users
Response to Users
Message Intimation
Message Intimation
Status Verification
Status Verification
Collaboration Diagram
4: View Request
7: Response to Users
8: Message Intimation
11: View & Response to Applicants
13: Status Verification
User
Admin
6: Response to Users
3: View Request 9: Message Intimation
Officials
Activity Diagram
Register &
Login
Request
Demands
Acquire Petition/
Certificates
Response to
User
Message
Intimation
Queries &
Feedback
Status
Verification
Class Diagram
ER Diagram
Diagram
S.NO. Types
1. Entity types
2. Relationship Types
Response to
Response Verification
Queries
Password
Mobile number
Message Username
Intimation Status
Verification
ID Admin
View
Officials
Control
User
User Name
User ID
Password Message
Intimation
Apply Petition
Status
Feedback
Mobile Number
METHODOLOGY
Requirement Analysis
System Design
Implementation
Testing
Deployment
Maintenance
WATERFALL MODEL
The Waterfall Model was first Process Model to be introduced. It is also referred to as the
linear sequential life cycle model It is very simple to understand and use. In a Waterfall model,
each phase must be completed before the next phase can begin and there is no overlapping in the
phases. Waterfall model is the earliest SDLC approach that was used for software development
Requirement
Analysis
System Design
Implementation
System Testing
System Deployment
System
Maintenance
Requirement Analysis
Requirements analysis encompasses those tasks that go into determining the needs or
conditions to meet for a new or altered project, taking account of the possibly
conflicting requirements of the various stakeholders, analyzing, documenting, validating and
managing software or system requirements.
The initial requirement of this proposed system of the project is to apply and submit the
petition request to the administrator by the common people and the requested petition has been
processed by the administrator for further processes. It enhances the entire system and reduces te
man power usage and paper works and also the corruption.
System Design
Systems design. Systems design is the process of defining the architecture, modules,
interfaces, and data for a system to satisfy specified requirements. There is some overlap with the
disciplines of systems analysis, systems architecture and systems engineering.
The user has to register into the site to attain the user ID and password to access the
system . So to access the system and gain the better access the user has to provide their details
which helps the administrator to process the system in an convenient way. By doing so the
common public can access the system in an enhanced manner and the requested certificates or
the petitions of the users can be processed without interruption.
SPRINTS
1st Part:
o Creating Product Backlog
o Determining the Sprint Goal.
o Participants: Product Owner, Scrum Master, Scrum Team
2nd Part:
o Participants: Scrum Master, Scrum Team
o Creating Sprint Backlog
4.4.8 SPRINT
Scrum team takes the Sprint Goal and decides what tasks are necessary
Team self-organizes around how they’ll meet the Sprint Goal
Manager doesn’t assign tasks to individuals
o Managers don’t make decisions for the team
Sprint Backlog is created
Changes
o Team adds new tasks whenever they need to in order to meet the Sprint Goal
o Team can remove unnecessary tasks
o But: Sprint Backlog can only be updated by the team
Estimates are updated whenever there’s new information
Sprint Backlog:
A subset of Product Backlog Items, which define the work for a Sprint
Is created ONLY by Team members
Each Item has it’s own status
Should be updated every day
No more than 300 tasks in the list
If a task requires more than 16 hours, it should be broken down
Team can add or subtract items from the list. Product Owner is not allowed to do it
SYSTEM IMPLEMENTATION
INTRODUCTION
The whole process has been undertaken by the administrator and the actors in the system
are the common people in the environment. The needs of the user are solved by the admin. By
acquiring the details of the actors that has been registered can be accessed by the admin and their
needed requirements are processed in an efficient way. At the same time the applied petitions are
processed in an efficient way.
PROJECT DESCRIPTION
LIST OF MODULES
Modules:
Admin
Petition Consultant Officer
Applicant Registration
Information Subsystem
Applicant Subsystem
User Subsystem
Report
Feedback
MODULE DETAILS
Admin
Admin is the head for the entire system that controls the whole process
under his guidance. The applicants, officials, workers who are all involved in the
entire system will com e under the guidance of the admin.
The petitions that are applied by the applicants are passed on to the
consultant who has been the official for the concerned department and the related
documents are moved on to him for further procedures. The documents are moved
on to the concerned departments through online, which avoids corruption and
increases the efficiency and speed of the process.
Applicant Registration
The applicants have to register the required information that has been
denoted by the admin side. It helps to access their needs and requests for applying
certificates in many public sectors. It requires the name, address, mobile and mail
ID, adhaar number and so on.
Applicant Login
After the registration process the applicants are provided with unique ID and
password to access their separate account details and at the same time they can
apply for the certificates of different categories through online.
Information Subsystem
It holds the information of the user requests from which the officials of the
concerned department can access and get a clear view about the request that has
been done by the user which helps to provide necessary requirements. The info
mentioned above can be accessible by both the admin and as well as the official
sides.
Applicant Subsystem
Here the applicants can submit their requests according to the department
wise. Each department has an separate age so that the user can get a clear structure
about the process and submit their request to the concerned department without an
hesitation.
Report
The report provides the detailed description about the entire system like the
applicant details, their requests, the operation done to the request that has been
requested to the admin by the user. It helps the admin side for reference and at the
same time for future evaluations to improve the entire system. Based on this the
verification and cross checking can also be done by the admin for his clearance.
Feedback
The user can admit their queries and feedback to the admin through this
module, from which the admin can enhance the system with better efficiency. Here
the user can also submit their complaints on the officials as well as the demerits in
the system.
FORM DESIGN
TESTING
INTRODUCTION
Testing is an activity to verify that a correct system is being built and is performed with
the intent of finding faults in the system. However testing is not restricted to being performed
after the development phase is complete. But this is too carried out in parallel with all stages of
system development, starting with requirements specification. Testing results, once gathered and
evaluated, provide a qualitative indication of software quality and reliability and serve as a basis
for design modification if require a project is said to be incomplete without proper testing.
Unit Testing
It is the testing of an individual unit or group of related units. It is done by programmer to
test that the implementation is producing expected output against given input and it falls under
white box testing. Unit testing is done in order to check registration whether the user properly
registered into the cloud. It is done in order to check whether a file is properly uploaded into the
cloud. And an encryption and decryption is checked with unit testing if it is converted properly.
Then deduplication is checked with unit testing.
Integration Testing
All the modules should be integrated into a single module and it should be checked that it
is still working still by integration testing.
System Testing
It is done to ensure that by putting the software in different environments and check that
it still works. System Testing is done by uploading same file in this cloud checking whether any
duplicate file exists.
Validation
Validation is the process to make sure the product satisfies the specified requirements at
the end of the development phase. In other words, to make sure the product is built as per
customer requirements.
TEST CASE
3 View & Add Approve User Request and Approved & Pass
Approval Request Status Intimated Reported
to the User Successfully.
Cloud Computing is gaining popularity and advancement day-by-day. But still the
security threat hinders the success of Cloud Computing. In this paper, some of the privacy threats
are addressed and the techniques to overcome them are surveyed. While some approaches
utilized traditional methods to achieve privacy, some other approaches kept them away and
focused on alternate methodologies in achieving privacy. Also, approaches to preserve privacy at
the time of public auditing are also discussed. Thus, to conclude it is necessary that every cloud
user must be guaranteed that his data is stored, processed, accessed and audited in a secured
manner at any time. Data freshness is essential to protect against misconfiguration errors or
rollbacks caused intentionally. We can develop an authenticated file system that supports the
migration of an enterprise-class distributed file system into the cloud efficiently, transparently
and in a scalable manner. It’s authenticated in the sense that enables an enterprise tenant to verify
the freshness of retrieved data while performing the file system operations. The user must be
given complete access control over the published data. Also, powerful security mechanisms must
always supplement every cloud application. Attaining all these would end up in achieving the
long dreamt vision of secured petition processing in the nearest future. In future, this proposed
model could be used to get the secure petition processing environment which would be a great
enhancement in the petition processing and certificate application through cloud..