Sunteți pe pagina 1din 49

CLOUD BASED PETITION ACQUISITION IN PUBLIC SECTOR

Abstract

This project title is “Cloud Based Petition Acquisition in Public Sector”. It describes
the process of applying various petitions through online. This system developed to manage the
various petitions processing through website. This system is any member can apply using Name,
Address, Aadhaar details through website. And, also in this project used to help the public and
given the greater profitability through direct communication to government sector via online.
This service is used to enhance the system for public to optimize their requests . The petitions
that has been requested by the user or people will be provided efficiently using this system. The
applicants can track their application status by using their ID and password that has been
provided by the administrator This process completely provides the status of the certificates and
the petitions that has been admitted by the user .So the admin can efficiently access the system
that has been initiated and their requests will be processed in an timely manner.
Introduction

The project “Cloud Based Petition Acquisition in Public Sector” provides the proper
procedure for applying certificates and petition information to the users who have applied based
on their demands. The users are provided with proper response for the petitions applied by them
and the status of the petitions that has been processed by the administrator and the officials. The
status of the complaint details will be intimated to the users with which the concerned user can
gather the knowledge of the corresponding certificates and petition applied by them to the
administrator. Since it is an decentralized process the efficiency of the process has been
increased. By doing the so the user has been allotted with reduced latency work process and the
complaint information will be processed in an enormous way which increases performance
evaluation of the system.
Problem Description

The major problem in the current scenario is the user is unable to apply and receive
proper approval for the petitions that has been applied to the public sector management. Since it
is totally a manual process the report maintenance and the customer requests will not be
processed properly. At the same time in the admin side there exists vast user data which is a
complex process for the admin to gather and process the user request. The user was unable to
view or receive proper intimation of the status of the petitions that has been applied. It increases
the latency of the system and improper in maintaining the reports and data. At the same time the
entire procedure decreases the robustness and performance evaluation on the user side. Moreover
the administrator was unable satisfy the conditions and the requirements of the user in an
efficient manner.

Objectives:

 Increases the working procedures


 Provides the user friendly environment
 Reduces the latency
 Mainly avoids corruption
 Generates a clear accessing status to the customer.
About the Organization
SYSTEM ANALYSIS

Existing System

In the existing procedure the records of the public are maintained are maintained in an
usual paper format, which is a more latent process and it ensures lack of data assurance. The
existing system does not provide better knowledge about the details and information about the
steps and assumption for attaining the certificates in various public sector. Each sector have
some separate rules and protocols to perform their operations for the public. More paper work is
needed and lots and lots of work load has been generated. There may be a chance of scam
occurrence in the payment process in the existing procedure, which is a more intolerable activity.
The main disadvantage is, the public has to present in the authorized administrator office for the
sake of his request.

Disadvantages

 Consumes more paper work and timing to complete the process.


 Exceeds redundant latency.
 Access time is inefficient.
 Chance of loss or damage of files.
Proposed System

The proposed system exceeds the entire process that has been maintained in the existing
system. The public can apply their needed certificates, property requirements, petition process
through online from which the latency has been reduced to its core. The payment for the
application, certificates, can be payed through online which reduces the financial scam. The user
can apply for the certificates from any location through online. The time redundancy has been
very much reduced in this process. The status of every use will be provided to them through
message or through mail which enhances the system.

Advantages

 Consumers are provided with better performance evaluation.


 Reduces the unauthorized evaluation
 Increased efficiency.
Feasibility Study
Depending on the results of the initial investigation the survey is now expanded to a more
detailed feasibility study. “FEASIBILITY STUDY” is a test of system proposal according to its
workability, impact of the organization, ability to meet needs and effective use of the resources.
It focuses on these major questions:

 What are the user’s demonstrable needs and how does a candidate system meet them?
 What resources are available for given candidate system?
 What are the likely impacts of the candidate system on the organization?
 Whether it is worth to solve the problem?

During feasibility analysis for this project, following primary areas of interest are to be
considered. Investigation and generating ideas about a new system does this.

Technical feasibility

A study of resource availability that may affect the ability to achieve an acceptable
system. This evaluation determines whether the technology needed for the proposed system is
available or not.

 Can the work for the project be done with current equipment existing software
technology & available personal?
 Can the system be upgraded if developed?
 If new technology is needed then what can be developed?
Economical feasibility

Economic justification is generally the “Bottom Line” consideration for most systems.
Economic justification includes a broad range of concerns that includes cost benefit analysis. In
this we weight the cost and the benefits associated with the candidate system and if it suits the
basic purpose of the organization i.e. profit making, the project is making to the analysis and
design phase. The financial and the economic questions during the preliminary investigation are
verified to estimate the following:

• The cost to conduct a full system investigation.

• The cost of hardware and software for the class of application being considered.

• The benefits in the form of reduced cost.

• The proposed system will give the minute information, as a result the performance is improved
which in turn may be expected to provide increased profits.

• This feasibility checks whether the system can be developed with the available funds. The
Hospital Management System does not require enormous amount of money to be developed.
This can be done economically if planned judicially, so it is economically feasible. The cost of
project depends upon the number of man hours required.

Operational Feasibility

It is mainly related to human organizations and political aspects. The points to be


considered are:

 What changes will be brought with the system?


 What organization structures are disturbed?
 What new skills will be required? Do the existing staff members have these
skills? If not, can they be trained in due course of time?

The system is operationally feasible as it very easy for the End users to operate it. It only
needs basic information about Windows platform.
Schedule feasibility

`Time evaluation is the most important consideration in the development of project. The
time schedule required for the developed of this project is very important since more
development time effect machine time, cost and cause delay in the development of other
systems. A reliable Hospital Management System can be developed in the considerable amount
of time.
Hardware Requirements:

 Processor : Intel processor 3.0 GHz


 RAM : 2GB
 Hard disk : 500 GB
 Compact Disk : 650 Mb
 Keyboard : Standard keyboard
 Mouse : Logitech mouse
 Monitor : 15 inch color monitor

Software Requirements:

 Front End : PHP


 Back End : MYSQL
 Server : WAMP
 Operating System : Windows OS
 System type : 32-bit or 64-bit Operating System
 IDE : DREAMWEAVER
 DLL : Depends upon the title
SOFTWARE DESCRIPTION
PHP

FEATURES OF PHP

PHP: Hypertext Preprocessor (the name is a recursive acronym) is a widely


used, general-purpose scripting language that was originally designed for web
development to produce dynamic web pages. For this purpose, PHP code is
embedded into the HTML source document and interpreted by a web server with a
PHP processor module, which generates the web page document. As a general-
purpose programming language, PHP code is processed by an interpreter
application in command-line mode performing desired operating system operations
and producing program output on its standard output channel. It may also function
as a graphical application. PHP is available as a processor for most modern web
servers and as standalone interpreter on most operating systems and computing
platforms.

PHP was originally created by Rasmus Lerdorf in 1995[1] and has been in
continuous development ever since. The main implementation of PHP is now
produced by The PHP Group and serves as the de facto standard for PHP as there
is no formal specification. PHP is free software released under the PHP License,
which is incompatible with the GNU General Public License (GPL) because
restrictions exist regarding the use of the term PHP.

Hypertext refers to files linked together using hyperlinks, such as HTML


(HyperText Markup Language) files. Preprocessing is executing instructions that
modify the output. Below is a demonstration of the difference between HTML and
PHP files.
Accessing an HTML Page

1. Your browser sends a request to that web page's server (computer) for the
file (HTML or image) you wish to view.
2. The web server (computer) sends the file requested back to your computer.
3. Your browser displays the file appropriately.
4. If you request a PHP file (ends with ".php"), the server handles it differently.

Accessing a PHP Page


1. Your browser sends a request to that web page's server for the PHP file you
wish to view.
2. The web server calls PHP to interpret and perform the operations called for
in the PHP script.
3. The web server sends the output of the PHP program back to your computer.
4. Your browser displays the output appropriately.

PHP originally stood for personal home page. Its development began in 1994
when the Danish/Greenlandic programmer Rasmus Lerdorf initially created a set
of Perl scripts he called 'Personal Home Page Tools' to maintain his personal
homepage, including tasks such as displaying his résumé and recording how much
traffic his page was receiving. He rewrote these scripts as C programming
language Common Gateway Interface (CGI) binaries, extending them to add the
ability to work with web forms and to communicate with databases and called this
implementation 'Personal Home Page/Forms Interpreter' or PHP/FI. PHP/FI could
be used to build simple, dynamic web applications. Lerdorf released PHP/FI as
'Personal Home Page Tools (PHP Tools) version 1.0' publicly on June 8, 1995, to
accelerate bug location and improve the code. This release already had the basic
functionality that PHP has today. This included Perl-like variables, form handling,
and the ability to embed HTML. The syntax was similar to Perl but was more
limited and simpler, although less consistent. A development team began to form
and, after months of work and beta testing, officially released PHP/FI 2 in
November 1997.

A new major version has been under development alongside PHP 5 for
several years. This version was originally planned to be released as PHP 6 as a
result of its significant changes, which included plans for full Unicode support.
However, Unicode support took developers much longer to implement than
originally thought, and the decision was made in March 2010 to move the project
to a branch, with features still under development moved to trunk.

Changes in the new code include the removal of register_globals, magic


quotes, and safe mode. The reason for the removals was that register_globals had
given way to security holes, and the use of magic quotes had an unpredictable
nature, and was best avoided. Instead, to escape characters, magic quotes may be
replaced with the addslashes() function, or more appropriately an escape
mechanism specific to the database vendor itself like mysql_real_escape_string()
for MySQL. Functions that will be removed in future versions and have been
deprecated in PHP 5.3 will produce a warning if used.

PHP currently does not have native support for Unicode or multibyte
strings; Unicode support is under development for a future version of PHP and will
allow strings as well as class, method, and function names to contain non-ASCII
characters.

PHP interpreters are available on both 32-bit and 64-bit operating


systems, but on Microsoft Windows the only official distribution is a 32-bit
implementation, requiring Windows 32-bit compatibility mode while using
Internet Information Services (IIS) on a 64-bit Windows platform. As of PHP
5.3.0, experimental 64-bit versions are available for MS Windows.
Security

The PHP interpreter only executes PHP code within its delimiters. Anything
outside its delimiters is not processed by PHP (although non-PHP text is still
subject to control structures described within PHP code). The most common
delimiters are <?php to open and ?> to close PHP sections. <script
language="php"> and </script> delimiters are also available, as are the shortened
forms <? or <?= (which is used to echo back a string or variable) and ?> as well as
ASP-style short forms <% or <%= and %>. While short delimiters are used, they
make script files less portable as support for them can be disabled in the PHP
configuration, and so they are discouraged. The purpose of all these delimiters is to
separate PHP code from non-PHP code, including HTML.

The first form of delimiters, <?php and ?>, in XHTML and other XML
documents, creates correctly formed XML 'processing instructions'. This means
that the resulting mixture of PHP code and other markup in the server-side file is
itself well-formed XML.
Variables are prefixed with a dollar symbol and a type does not need to be
specified in advance. Unlike function and class names, variable names are case
sensitive. Both double-quoted ("") and heredoc strings allow the ability to embed a
variable's value into the string. PHP treats newlines as whitespace in the manner of
a free-form language (except when inside string quotes), and statements are
terminated by a semicolon. PHP has three types of comment syntax: /* */ marks
block and inline comments; // as well as # are used for one-line comments. The
echo statement is one of several facilities PHP provides to output text (e.g. to a
web browser).
In terms of keywords and language syntax, PHP is similar to most high level
languages that follow the C style syntax. if conditions, for and while loops, and
function returns are similar in syntax to languages such as C, C++, Java and Perl.

Benefit of PHP

Because the server does processing, the output of PHP files changes when its
input changes. For example, most of the pages on the Horticulture site have only
two (2) PHP commands:

1. Include the header file that defines the links on the left, the banner, and the
quick links at the top.
2. Include the footer file that displays the mission statement and Horticulture
contact information.
Because including the files is performed every time the PHP file is accessed, when
the header/footer files change, the new content will be immediately updated. In
other words, if you add a new link, every page that includes the header will
immediately display the new link.

PHP has become the most popular Web programming language not only
because it is free. PHP is a full-fledged programming language (unlike HTML for
example, which is more of a presentation means) and many complex applications
can be written it it. Another benefit of applications written in PHP is that they are
fast and if written properly, they could be pretty secure. There are also tons of
ready PHP scripts and functions, which you can customize to your liking and use
in your PHP applications.

Web development is becoming a more prosperous industry lately. Since the


Internet and the computer wave in general are becoming quite lucrative, web
development is becoming a booming industry in which everyone wants to be a
part. However, it is also a very competitive industry since there are many
professionals that are quite adept at programming. Therefore, learning proper PHP
development strategies is beneficial. If you already have prior knowledge of
computer language and coding, PHP should come as a second nature to you. The
fact that is can be used in its most primal forms for basic programming as well as
incredibly advanced programming only ads to its possible potential for
programmers.

Before building website you need to know which language you are going to
use in a professional looking website. PHP is one of the best and easy to use
programming language as it can be run to any operating system. PHP is free
language so that is the huge advantage of this language. For handling database
connections, formatting date, editing strings, handling emails and all PHP can be
very useful. It can be easily extend for some specific functions that you would like
to add in your website. Reliability of this language is extra ordinary as PHP already
runs on millions of servers around the world, which means that it's powerful
enough for even the most demanding situations. It provides web developers much
more liberation in creating website with some of the outstanding features and they
can use regular elements frequently. PHP can be very much successful for creating
Dynamic Websites. PHP programmers with the use of open source codes benefit
from the flexibility of editing, modifying and updating the source code when there
is mandatory.

PHP is based on C++ programming language and the syntax used in PHP is
fairly similar to C, C++. There is huge community of developers who still believes
that C/C++ is still the best programming language. For every website to get
reasonable progress it can be use Content Management System such as Joomla,
Word Press etc. here PHP and MySQL are very helpful in successful CMS
running. There are so many IT companies which provide best quality PHP web
development work from India. The reason for Outsourcing PHP development to
India is that it is very cost effective with better quality. In the professional field of
Web and software development services we have achieved great amount of victory
with skilled and experienced PHP programmers.

PHP has been supported by almost every hosting company. PHP can be the
best choice to run an application on Linux based hosting platforms. PHP is a server
side scripting language originally designed to build dynamic websites. Modern
web 2.0 applications are largely characterized by mashups and desktop style user
interfaces. php is an excellent choice for interacting with other websites and
providing rich user experience. Simple php commands like curl or fopen allow you
to grab data from other websites with relative ease. Php works well with javascript
so you can provide your end users with modern, responsive interfaces that are way
beyond the old static interfaces of days past.
BACK END SOFTWARE

MYSQL

FEATURES OF MYSQL

MYSQL INTRODUCTION

The MySQL® database has become the world's most popular open source
database because of its consistent fast performance, high reliability and ease of use.
It's used on every continent -- Yes, even Antarctica! -- by individual Web
developers as well as many of the world's largest and fastest-growing organizations
to save time and money powering their high-volume Web sites, business-critical
systems and packaged software -- including industry leaders such as Yahoo!,
Alcatel-Lucent, Google, Nokia, YouTube, and Zappos.com.

Not only is MySQL the world's most popular open source database, it's also
become the database of choice for a new generation of applications built on the
LAMP stack (Linux, Apache, MySQL, PHP / Perl / Python.) MySQL runs on more
than 20 platforms including Linux, Windows, Mac OS, Solaris, HP-UX, IBM AIX,
giving you the kind of flexibility that puts you in control.

Whether you're new to database technology or an experienced developer or


DBA, MySQL offers a comprehensive range of certified software, support, training
and consulting to make you successful.

MySQL can be built and installed manually from source code, but this can
be tedious so it is more commonly installed from a binary package unless special
customizations are required. On most Linux distributions the package management
system can download and install MySQL with minimal effort, though further
configuration is often required to adjust security and optimization settings.
Though MySQL began as a low-end alternative to more powerful
proprietary databases, it has gradually evolved to support higher-scale needs as
well. It is still most commonly used in small to medium scale single-server
deployments, either as a component in a LAMP based web application or as a
standalone database server. Much of MySQL's appeal originates in its relative
simplicity and ease of use, which is enabled by an ecosystem of open source tools
such as phpMyAdmin. In the medium range, MySQL can be scaled by deploying it
on more powerful hardware, such as a multi-processor server with gigabytes of
memory.

There are however limits to how far performance can scale on a single
server, so on larger scales, multi-server MySQL deployments are required to
provide improved performance and reliability. A typical high-end configuration
can include a powerful master database which handles data write operations and is
replicated to multiple slaves that handle all read operations.[18] The master server
synchronizes continually with its slaves so in the event of failure a slave can be
promoted to become the new master, minimizing downtime. Further improvements
in performance can be achieved by caching the results from database queries in
memory using memcached, or breaking down a database into smaller chunks
called shards which can be spread across a number of distributed server clusters.
HTML

HTML remains for Hyper Text Markup Language. It is a basic content


designing dialect used to make hypertext records. It is a stage free dialect not at all
like most other programming dialect. HTML is impartial and can be utilized on
numerous stage or desktop. It is this component of HTML that makes it
mainstream as standard on the WWW. This adaptable dialect permits the making
of hypertext connections, otherwise called hyperlinks. These hyperlinks can be
utilized to unite reports on diverse machine, on the same system or on an alternate
system, or can even indicate purpose of content in the same record. HTML is
utilized for making archives where the accentuation is on the presence of the
record. It is likewise utilized for DTP. The records made utilizing HTML can have
content with diverse sizes, weights and hues. It can also contain graphics to make the

document more effective. Hyper Text Markup Language, commonly referred to


as HTML, is the standard markup language used to create web pages. Along
with CSS, and JavaScript, HTML is a cornerstone technology, used by most
websites to create visually engaging web pages, user interfaces for web
applications, and user interfaces for many mobile applications.[1] Web
browsers can read HTML files and render them into visible or audible web pages.
HTML describes the structure of a website semantically along with cues for
presentation, making it a markup language, rather than a programming language.
HTML elements form the building blocks of all websites. HTML allows images
and objects to be embedded and can be used to create interactive forms. It provides
a means to create structured documents by denoting structural semantics for text
such as headings, paragraphs, lists, links, quotes and other items. The language is
written in the form of HTML elements consisting of tags enclosed in angle
brackets (like <html> ). Browsers do not display the HTML tags and scripts, but
use them to interpret the content of the page. HTML can embed scripts written in
languages such as JavaScript which affect the behavior of HTML web pages. Web
browsers can also refer to Cascading Style Sheets (CSS) to define the look and
layout of text and other material.

Features of HTML

 Web Workers: Certain web applications use heavy scripts to perform


functions. Web Workers use separate background threads for processing
and it does not affect the performance of a web page.
 Video: You can embed video without third-party proprietary plug-ins or
codec. Video becomes as easy as embedding an image.
 Canvas: This feature allows a web developer to render graphics on the fly.
As with video, there is no need for a plug in.
 Application caches: Web pages will start storing more and more information
locally on the visitor's computer. It works like cookies, but where cookies
are small, the new feature allows for much larger files. Google Gears is an
excellent example of this in action.
 Geo location: Best known for use on mobile devices, geolocation is coming
with HTML5.
Introduction

A data flow diagram (DFD) is a graphical representation of the "flow" of data through
an information system, modeling its process aspects. DFDs can also be used for
the visualization of data processing (structured design)
Data Flow Diagram:

A two-dimensional diagram that explains how data is processed and transferred in a


system. The graphical depiction identifies each source of data and how it interacts with other
data sources to reach a Cable Operator Management on output. Individuals seeking to draft a
data flow diagram must identify external inputs and outputs, determine how the inputs and
outputs relate to each other, and explain with graphics how these connections relate and what
they result in. This type of diagram helps business development and design teams visualize how
data is processed and identify or improve certain aspects.

Data flow Symbols:

Symbol Description
An entity. A source of data or a
destination for data.

A process or task that is


performed by the system.

A data store, a place where data is


held between processes.

A data flow.
Level 0

Cloud Based

ADMIN
Petition Database
Acquisition in
Public Sector

Level 1

Register

User Database

Login
Level 2

Login

Applicant
Details

Response to
Applicants
ADMIN Database
Status
Verification

Reports &
Feedback

Message
Intimation
Level 3

Register
& Login

Request
Demands

Acquire Petition/
Certificates Database
User

Message
Intimation

Queries &
Feedback
Architecture Diagram

Cloud Based Petition Acquisition in Public Sector

User Admin

Login
Register & Login
View & Response
Request Demands to Applicants

Status Verification
Acquire
Petition/Certificate
s
Reports & Feedback
Message Intimation

Queries & Feedback Send Message Intimation


Database
UML DIAGRAMS

Register & Login

Officials
Request Demands

Acquire Petitions/Certificates

Users
Response to Users

Message Intimation

Queries & Feedback Admin

View & Response to Applicants

Status Verification
Sequence Diagram

User Admin Officials

Register & Login

Request Demands

View Request

View Request

Acquire Petition/Certifivcates

Response to Users

Response to Users

Message Intimation

Message Intimation

Queries & Feedback

View & Response to Applicants

Status Verification

Status Verification
Collaboration Diagram

4: View Request
7: Response to Users
8: Message Intimation
11: View & Response to Applicants
13: Status Verification
User
Admin

1: Register & Login


2: Request Demands
5: Acquire Petition/Certifivcates
10: Queries & Feedback

6: Response to Users
3: View Request 9: Message Intimation

12: Status Verification

Officials
Activity Diagram

Register &
Login

Request
Demands

Acquire Petition/
Certificates

Response to
User

Message
Intimation

Queries &
Feedback

View & Response


to Applicants

Status
Verification
Class Diagram
ER Diagram

An entity–relationship model is the result of using a systematic process to describe and


define a subject area of business data. It does not define business process; only visualize business
data. The data is represented as components (entities) that are linked with each other by
relationships that express the dependencies and requirements between them, such as: one
building may be divided into zero or more apartments, but one apartment can only be located in
one building. The three schema approach to software engineering uses three levels of ER models
that may be developed.
ER Diagram Symbol:

Diagram
S.NO. Types

1. Entity types

2. Relationship Types

3. Atomic attribute types

4. Composite attribute types

5. Multi valued attribute types

6. Derived Attribute types


View Status View User Requests

Response to
Response Verification
Queries
Password

Mobile number
Message Username
Intimation Status
Verification

Password User List

ID Admin

View
Officials

Control

User

User Name
User ID

Password Message
Intimation

Apply Petition
Status

Feedback
Mobile Number
METHODOLOGY

Cloud Based Petition Acquisition in Public Sector is based on providing petition


information and certificate details for the people who have been applied to the administrator.
With this the public can access the government sector in an enhanced manner and can avoid loot.
The procedure will be carried out in an decentralized system so that the users from various
geographic location can apply and access the process with better performance evaluation. At the
same time the government public sector provides the services up to user satisfaction. Along with
that the requirements for the application of the petitions are clearly provided to the users from
which every user can access the complete system in an efficient way and apply the petition. The
status of the petitions can be intimated to the user from the admin side so that the user can gain
the knowledge of the applied petitions. At the same time the actions can be taken from the admin
side in an enhanced manner by gaining the reference from the users' application.

Requirement Analysis

System Design

Implementation

Testing

Deployment

Maintenance
WATERFALL MODEL

The Waterfall Model was first Process Model to be introduced. It is also referred to as the
linear sequential life cycle model It is very simple to understand and use. In a Waterfall model,
each phase must be completed before the next phase can begin and there is no overlapping in the
phases. Waterfall model is the earliest SDLC approach that was used for software development

WATERFALL MODEL DESIGN

Requirement
Analysis

System Design

Implementation

System Testing

System Deployment

System
Maintenance
Requirement Analysis

Requirements analysis encompasses those tasks that go into determining the needs or
conditions to meet for a new or altered project, taking account of the possibly
conflicting requirements of the various stakeholders, analyzing, documenting, validating and
managing software or system requirements.

The initial requirement of this proposed system of the project is to apply and submit the
petition request to the administrator by the common people and the requested petition has been
processed by the administrator for further processes. It enhances the entire system and reduces te
man power usage and paper works and also the corruption.

System Design

Systems design. Systems design is the process of defining the architecture, modules,
interfaces, and data for a system to satisfy specified requirements. There is some overlap with the
disciplines of systems analysis, systems architecture and systems engineering.

The user has to register into the site to attain the user ID and password to access the
system . So to access the system and gain the better access the user has to provide their details
which helps the administrator to process the system in an convenient way. By doing so the
common public can access the system in an enhanced manner and the requested certificates or
the petitions of the users can be processed without interruption.
SPRINTS

 Scrum projects make progress in a series of “sprints”


o Analogous to XP iterations
 Target duration is one month
o +/- a week or two
o But, a constant duration leads to a better rhythm
 Product is designed, coded, and tested during the sprint

SPRINT PLANNING MEETING

Fig. No. 4.2 SPRINT PLANNING MEETING

Parts of Sprint Planning Meeting:

 1st Part:
o Creating Product Backlog
o Determining the Sprint Goal.
o Participants: Product Owner, Scrum Master, Scrum Team
 2nd Part:
o Participants: Scrum Master, Scrum Team
o Creating Sprint Backlog

4.4.8 SPRINT

 A month-long iteration, during which is incremented a product functionality


 No outside influence can interfere with the Scrum team during the Sprint
 Each Sprint begins with the Daily Scrum Meeting

SPRINT REVIEW MEETING

 Team presents what it accomplished during the sprint


 Typically takes the form of a demo of new features or underlying architecture
 Informal
o 2-hour prep time rule
 Participants
o Customers
o Management
o Product Owner
o Other engineers

4.4.11 SPRINT RETROSPECTIVE MEETING

 Scrum Team only


 Feedback meeting
 Three questions
o Start
o Stop
o Continue
 Don’t skip for the first 5-6 sprints!!!
Product Backlog:

 A list of all desired work on the project


o Usually a combination of
 story-based work (“let user search and replace”)
 task-based work (“improve exception handling”)
 List is prioritized by the Product Owner
o Typically a Product Manager, Marketing, Internal Customer, etc.
 Requirements for a system, expressed as a prioritized list of Backlog Items
 Is managed and owned by a Product Owner
 Spreadsheet (typically)
 Usually is created during the Sprint Planning Meeting
 Can be changed and re-prioritized before each PM

From Sprint Goal to Sprint Backlog:

 Scrum team takes the Sprint Goal and decides what tasks are necessary
 Team self-organizes around how they’ll meet the Sprint Goal
 Manager doesn’t assign tasks to individuals
o Managers don’t make decisions for the team
 Sprint Backlog is created

Sprint Backlog during the Sprint:

 Changes
o Team adds new tasks whenever they need to in order to meet the Sprint Goal
o Team can remove unnecessary tasks
o But: Sprint Backlog can only be updated by the team
 Estimates are updated whenever there’s new information

Sprint Backlog:

 A subset of Product Backlog Items, which define the work for a Sprint
 Is created ONLY by Team members
 Each Item has it’s own status
 Should be updated every day
 No more than 300 tasks in the list
 If a task requires more than 16 hours, it should be broken down
 Team can add or subtract items from the list. Product Owner is not allowed to do it
SYSTEM IMPLEMENTATION

INTRODUCTION

Implementation is the carrying out, execution, or practice of a plan, a method, or


any design, idea, model, specification, standard or policy for doing something. As
such, implementation is the action that must follow any preliminary thinking in order for
something to actually happen

The whole process has been undertaken by the administrator and the actors in the system
are the common people in the environment. The needs of the user are solved by the admin. By
acquiring the details of the actors that has been registered can be accessed by the admin and their
needed requirements are processed in an efficient way. At the same time the applied petitions are
processed in an efficient way.

PROJECT DESCRIPTION

LIST OF MODULES

Modules:

 Admin
 Petition Consultant Officer
 Applicant Registration
 Information Subsystem
 Applicant Subsystem
 User Subsystem
 Report
 Feedback
MODULE DETAILS

Admin

Admin is the head for the entire system that controls the whole process
under his guidance. The applicants, officials, workers who are all involved in the
entire system will com e under the guidance of the admin.

Petition Consultant Officer

The petitions that are applied by the applicants are passed on to the
consultant who has been the official for the concerned department and the related
documents are moved on to him for further procedures. The documents are moved
on to the concerned departments through online, which avoids corruption and
increases the efficiency and speed of the process.

Applicant Registration

The applicants have to register the required information that has been
denoted by the admin side. It helps to access their needs and requests for applying
certificates in many public sectors. It requires the name, address, mobile and mail
ID, adhaar number and so on.

Applicant Login

After the registration process the applicants are provided with unique ID and
password to access their separate account details and at the same time they can
apply for the certificates of different categories through online.
Information Subsystem

It holds the information of the user requests from which the officials of the
concerned department can access and get a clear view about the request that has
been done by the user which helps to provide necessary requirements. The info
mentioned above can be accessible by both the admin and as well as the official
sides.

Applicant Subsystem

Here the applicants can submit their requests according to the department
wise. Each department has an separate age so that the user can get a clear structure
about the process and submit their request to the concerned department without an
hesitation.

Report

The report provides the detailed description about the entire system like the
applicant details, their requests, the operation done to the request that has been
requested to the admin by the user. It helps the admin side for reference and at the
same time for future evaluations to improve the entire system. Based on this the
verification and cross checking can also be done by the admin for his clearance.

Feedback

The user can admit their queries and feedback to the admin through this
module, from which the admin can enhance the system with better efficiency. Here
the user can also submit their complaints on the officials as well as the demerits in
the system.
FORM DESIGN
TESTING

INTRODUCTION

Testing is an activity to verify that a correct system is being built and is performed with

the intent of finding faults in the system. However testing is not restricted to being performed

after the development phase is complete. But this is too carried out in parallel with all stages of

system development, starting with requirements specification. Testing results, once gathered and

evaluated, provide a qualitative indication of software quality and reliability and serve as a basis

for design modification if require a project is said to be incomplete without proper testing.

Unit Testing
It is the testing of an individual unit or group of related units. It is done by programmer to
test that the implementation is producing expected output against given input and it falls under
white box testing. Unit testing is done in order to check registration whether the user properly
registered into the cloud. It is done in order to check whether a file is properly uploaded into the
cloud. And an encryption and decryption is checked with unit testing if it is converted properly.
Then deduplication is checked with unit testing.
Integration Testing
All the modules should be integrated into a single module and it should be checked that it
is still working still by integration testing.
System Testing
It is done to ensure that by putting the software in different environments and check that
it still works. System Testing is done by uploading same file in this cloud checking whether any
duplicate file exists.
Validation
Validation is the process to make sure the product satisfies the specified requirements at
the end of the development phase. In other words, to make sure the product is built as per
customer requirements.
TEST CASE

Test ID Test case Input Expected Actual Result Remark


Condition Result
Description
1 Admin &User Login to the Homepage Home page Pass
Authentication System with should open opened with
Verification Active with correct modules
Directory Appropriate
Credentials modules

2 DB Server Login with All integrated All integrated Pass


farm check Credentials database database should
should appear be appeared
in the DB
Cloud

3 View & Add Approve User Request and Approved & Pass
Approval Request Status Intimated Reported
to the User Successfully.

Table.No.6.1 TEST CASE


CONCLUSIONS AND FUTURE ENHACEMENT

Cloud Computing is gaining popularity and advancement day-by-day. But still the
security threat hinders the success of Cloud Computing. In this paper, some of the privacy threats
are addressed and the techniques to overcome them are surveyed. While some approaches
utilized traditional methods to achieve privacy, some other approaches kept them away and
focused on alternate methodologies in achieving privacy. Also, approaches to preserve privacy at
the time of public auditing are also discussed. Thus, to conclude it is necessary that every cloud
user must be guaranteed that his data is stored, processed, accessed and audited in a secured
manner at any time. Data freshness is essential to protect against misconfiguration errors or
rollbacks caused intentionally. We can develop an authenticated file system that supports the
migration of an enterprise-class distributed file system into the cloud efficiently, transparently
and in a scalable manner. It’s authenticated in the sense that enables an enterprise tenant to verify
the freshness of retrieved data while performing the file system operations. The user must be
given complete access control over the published data. Also, powerful security mechanisms must
always supplement every cloud application. Attaining all these would end up in achieving the
long dreamt vision of secured petition processing in the nearest future. In future, this proposed
model could be used to get the secure petition processing environment which would be a great
enhancement in the petition processing and certificate application through cloud..

S-ar putea să vă placă și