Escolar Documentos
Profissional Documentos
Cultura Documentos
1. INTRODUCTION
In this project, suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.This is very useful in real-time scenario in which you can resume the anti-social activities.
Suspicious email detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb,RDX., are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails.
This is very useful in real-time scenario in which you can resume the anti-social activites.It consists of 5 modules.The users of this system are compose mails to the other users who are authenticated already. If the composed mails consist of the keywords such as bomb,RDX,Terroist etc.These suspected mails are blocked (or) discarded by the administrator so that they connot be forwarded. This system is designed in such a way that the users can easily interact with the system with minimum knowledge to browse the internet.
MEC
The models that depict information, function and behavior must be partitioned in a hierarchical or layered fashion.
The analysis process must move from essential information to Implementation detail
MEC
Hardware Requirements:
Processor:: Pentium-III (or) Higher Ram:: 64MB (or) Higher Cache:: 512MB Hard disk:: 10GB
Additional Tools:
MEC
3. SYSTEM ANALYSIS
3.1 System Architecture
Architecture flow:
Below architecture diagram represents mainly flow of requests from users to database through servers. In this scenario overall system is designed in three tires separately using three layers called presentation layer, business logic layer and data link layer. This project was developed using 3-tire architecture.
User
SERVER
Request Response
Dat a Bas e
MEC
URL Pattern:
Presentatio n Layer
DATABASE
URL pattern represents how the requests are flowing through one layer to another layer and how the responses are getting by other layers to presentation layer through server in architecture diagram.
MEC
In the proposed system the suspicious users are detected and the offensive mails are blocked. Features of proposed system: This helps in finding out anti social elements. This provides the security to system which adapts it. This also helps the intelligence bureau, crime branch etc., Insurance premium calculations, for quarterly, half yearly and annually is completely automated gives us a reliable environment. The system provides claim reporting and status enquiry.
MEC
Requirements Gathering
CODE
UNIT TEST
ASSESSM ENT
DELIVERY/INS TALLATION
ACCEPTANCE TEST
TRAINING
Umbrella Activity
Umbrella Activity
SDLC is nothing but Software Development Life Cycle. It is a standard which is used by software industry to develop good software.
Stages in SDLC:
MEC Requirement Gathering Analysis Designing Coding Testing Maintenance 8
These requirements are fully described in the primary deliverables for this stage: the Requirements Document and the Requirements Traceability Matrix (RTM). The requirements document contains complete descriptions of each requirement, including diagrams and references to external documents as necessary. Note that detailed listings of database tables and fields are not included in the requirements document.
MEC
Analysis Stage:
The planning stage establishes a bird's eye view of the intended software product, and uses this to establish the basic project structure, evaluate feasibility and risks associated with the project, and describe appropriate management and technical approaches.
MEC
10
The most critical section of the project plan is a listing of high-level product requirements, also referred to as goals. All of the software product requirements to be developed during the requirements definition stage flow from one or more of these goals. The minimum information for each goal consists of a title and textual description, although additional information and references to external documents may be included. The outputs of the project planning stage are the configuration management plan, the quality assurance plan, and the project plan and schedule, with a detailed listing of scheduled activities for the upcoming Requirements stage, and high level estimates of effort for the out stages.
Designing Stage:
The design stage takes as its initial input the requirements identified in the approved requirements document. For each requirement, a set of one or more design elements will be produced as a result of interviews, workshops, and/or prototype efforts. Design elements describe the desired software features in detail, and generally include functional hierarchy diagrams, screen layout diagrams, tables of business rules, business process diagrams, pseudo code, and a complete entity-relationship diagram with a full data dictionary. These design elements are intended to describe the software in sufficient detail that skilled programmers may develop the software with minimal additional input.
MEC
11
When the design document is finalized and accepted, the RTM is updated to show that each design element is formally associated with a specific requirement. The outputs of the design stage are the design document, an updated RTM, and an updated project plan.
MEC
12
The RTM will be updated to show that each developed artifact is linked to a specific design element, and that each developed artifact has one or more corresponding test case items. At this point, the RTM is in its final configuration. The outputs of the development stage include a fully functional set of software that satisfies the requirements and design elements previously documented, an online help system that describes the operation of the software, an implementation map that identifies the primary code entry points for all major system functions, a test plan that describes the test cases to be used to validate the correctness and completeness of the software, an updated RTM, and an updated project plan.
MEC
13
During the installation and acceptance stage, the software artifacts, online help, and initial production data are loaded onto the production server. At this point, all test cases are run to verify the correctness and completeness of the software. Successful execution of the test suite is a prerequisite to acceptance of the software by the customer. After customer personnel have verified that the initial production data load is correct and the test suite has been executed with satisfactory results, the customer formally accepts the delivery of the software.
MEC
14
The primary outputs of the installation and acceptance stage include a production application, a completed acceptance test suite, and a memorandum of customer acceptance of the software. Finally, the PDR enters the last of the actual labor data into the project schedule and locks the project as a permanent project record. At this point the PDR "locks" the project by archiving all software items, the implementation map, the source code, and the documentation for future reference.
Maintenance:
Outer rectangle represents maintenance of a project, Maintenance team will start with requirement study, understanding of documentation later employees will be assigned work and they will under go training on that particular assigned category. For this life cycle there is no end, it will be continued so on like an umbrella (no ending point to umbrella sticks).
MEC
15
Java Architecture:
Java architecture provides a portable , robust , high performing environment for development. Java provides portability by compiling the byte codes for the java virtual machine which are then interpreted on each platform by the runtime environment . java also provides stringent compile and runtime checking and automatic memory management in order to ensure solid code .
MEC
16
Source code
)))
Paradigm Of Java:
Dynamic down loading applets(small application programs); Elimination of flatware phenomenon that is providing those features of a product that user needs at a time. The remaining features of a product can remain in the server.
MEC
17
About Html:
HTML (hyper text markup language) is a language used to create hyper text documents that have hyper links embedded in them . it consists of tags embedded in the text of a document with HTML. We can build web pages or web document s. it is basically a formatting language and not a programming language. The browser reading the document interprets mark up tags to help format the document for subsequent display to a reader. HTML is a language for describing structured documents. HTML is a platform independent. WWW(world wide web) pages are written using HTML. HTML tags control in part the representation of the WWW page when view with web browser. The browser interpretes HTML tags in the web document and displays it. Different browsers show data differently. Examples of browsers used to be web pages include: Netscape Internet Explorer
MEC
18
Features:
Java script is embedded into HTML documents and is executed with in them. Java script is browser dependent Javascript is an interpreted languaged that can be interpreted by the browser at run time . Java script is loosely typed language Java script is an object based language. Java script is an Eent-Driven language and supports event handlers to specify the functionality of a button.
Advantages:
1. java script can be used for client side application 2. java script provides means to contain multiframe windows for presentation of the web. 3. java script provides basic data validation before it is sent to the server. Eg : login and password checking or whether the values entered are correct or whether all fields in a from are filled and reduced network traffic 4. it creates interactive forms and client side lookup tables .
MEC
19
Oracle Is Compatible:
Oracle commands can be used for communicating with IBM DB2 mainframe RDBMS that is different from Oracle, that is Oracle compatible with DB2. Oracle RDBMS is a high performance fault tolerant DBMS, which is specially designed for online transaction processing and for handling large database applications.
The JDBC API only defines interfaces for objects used for performing various database-related tasks like opening and closing connections, executing SQL commands, and retrieving the results. We all write our programs to interfaces and not implementations. Either the resource manager vendor or a third party provides the implementation classes for the standard JDBC interfaces. These software implementations are called JDBC drivers. JDBC drivers transform the
MEC
20
Depending on the mechanism of implementation, JDBC drivers are broadly classified into four types.
TYPE1:
Type1 JDBC drivers implement the JDBC API on top of a lower level API like ODBC. These drivers are not generally portable because of the independency on native libraries. These drivers translate the JDBC calls to ODBC calls and ODBC sends the request to external data source using native library calls. The type1 driver. JDBCODBC driver that comes with the software distribution for J2SE is an example of a
MEC
21
TYPE2:
Type2 drivers are written in mixture of java and native code. Type2 drivers use vendors specific native APIs for accessing the data source. These drivers transform the JDBC calls to vendor specific calls using the vendors native library. These drivers are also not portable like type1 drivers because of the dependency on native code.
TYPE3:
Type3 drivers use an intermediate middleware server for accessing the external data sources. The calls to the middleware server are database independent. However, the middleware server makes vendor specific native calls for accessing the data source. In this case, the driver is purely written in java.
TYPE4:
Type4 drivers are written in pure java and implement the JDBC interfaces and translate the JDBC specific calls to vendor specific access calls. They implement the data transfer and network protocol for the target resource manager. Most of the leading database vendors provide type4 drivers for accessing their database servers.
3.6 Servlets:
Servlets provides a Java-Based solution used to address the problems currently associated with doing server side programming, including inextensible scripting solutions, platform specific APIs, and incomplete interfaces. Servlets are objects conform to a specific interface that can be plugged into a Java-based server. Servlets are to the server-side what applets are to the client-side-object byte codes that can be dynamically loaded off the net. They differ from applets in that they are faceless objects (without graphics or a GUI component). They serve as platform
MEC
22
4. FEASIBILTY STUDY
Preliminary investigation examines project feasibility, the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. All systems are feasible if they are given unlimited resources and infinite time. There are aspects in the feasibility study portion of the preliminary investigation: MEC Technical Feasibility 23 Computer Science &Engineering
Economical Feasibility
Reliability:
The package wills pick-up current transactions on line. Regarding the old transactions, User will enter them in to the system.
Security:
The web server and database server should be protected from hacking, virus etc
Portability:
The application will be developed using standard open source software (Except Oracle) like Java, tomcat web server, Internet Explorer Browser etc these
MEC
24
Availability:
This software will be available always.
Maintainability:
The system called the ewheelz uses the 2-tier architecture. The 1st tier is the GUI, which is said to be front-end and the 2nd tier is the database, which uses MySQL, which is the back-end.The front-end can be run on different systems (clients). The database will be running at the server. Users access these forms by using the user-ids and the passwords.
5. SYSTEM DESIGN
Input design is a part of overall system design. The main objective during the input design is as given below: To produce a cost-effective method of input. To achieve the highest possible level of accuracy. To ensure that the input is acceptable and understood by the user.
Input Stages:
MEC 25 Computer Science &Engineering
Input Types:
It is necessary to determine the various types of inputs. Inputs can be categorized as follows: system? Interactive, which are inputs entered during a dialogue. External inputs, which are prime inputs for the system. Internal inputs, which are user communications with the system. Operational, which are computer departments communications to the
Input Media:
At this stage choice has to be made about the input media. To conclude about the input media consideration has to be given to; Type of input Flexibility of format Speed Accuracy Verification methods Rejection rates Ease of correction Storage and handling requirements Security Easy to use Portability
MEC
26
Output Design:
In general are: External Outputs whose destination is outside the organization. Internal Outputs whose destination is with in organization and they are the Users main interface with the computer. Outputs from computer systems are required primarily to communicate the results of processing to users. They are also used to provide a permanent copy of the results for later consultation. The various types of outputs Operational outputs whose use is purely with in the computer department. Interface outputs, which involve the user in communicating directly with the system.
Output Definition: The outputs should be defined in terms of the following points:
Type of the output Content of the output Format of the output Location of the output Frequency of the output Volume of the output Sequence of the output
It is not always desirable to print or display data as it is held on a computer. It should be decided as which form of the output is the most suitable. For Example MEC Will decimal points need to be inserted Should leading zeros be suppressed. 27 Computer Science &Engineering
Output Media:
In the next stage it is to be decided that which medium is the most appropriate for the output. The main considerations when deciding about the output media are: The suitability for the device to the particular application. The need for a hard copy. The response time required. The location of the users The software and hardware available. Keeping in view the above description the project is to have outputs mainly coming under the category of internal outputs. The main outputs desired according to the requirement specification are: The outputs were needed to be generated as a hard copy and as well as queries to be viewed on the screen. Keeping in view these outputs, the format for the output is taken from the outputs, which are currently being obtained after manual processing. The standard printer is to be used as output media for hard copies.
5.1 Modules:
It consists of six modules. They are 1) Login Module 2) Registration Module 3) Administration Module MEC 28 Computer Science &Engineering
Login Module:
This module is used by administrator and users (who are authenticated) to login into the Colours mail. The login details of the specified person will be entered and hence can enter into the Colours mail.
Registration Module:
This module is used by the unauthenticated users who are unregistered. The users must register themselves such that they can login into the Colours mail.
Administration Module:
This module is used by the administrator to perform the functions like managing the keywords, entering new keywords and to check out the block list of the discarded mails.
Encryption Module:
This module is used by the administrator to perform the functions like encryption of the words. The encrypted words are sent to the database and hence managed by the administrator.
User Module:
This module is used by the users to do operations like composing mail, checking out the mails in inbox and finally sending the mails to the authenticated users by attaching a message. MEC 29 Computer Science &Engineering
5.2 DATA DICTIONARY: High level design Data design Table Name: Users Description: This table is used to maintain the registered users information.
SL.NO FIELD NAME 1 USERNAME
DATA TYPE
Varchar2(10)
DESCRIPTION
This is unique identifier given to an user to identify him uniquely. This is the Primary Key of the table. This the password of the user
PASSWORD
Varchar2(20)
Table Name: block list Description: This table is used for clients mailing information.
MEC
30
FIELD NAME
MAIL TO MAIL FROM SUBJECT MESSAGE
DATA TYPE
Varchar2(10) Varchar2(20) Varchar2(40) Varchar2(40)
DESCRIPTION
To whom the user wants to send the mails From whom the users got the mails. The subject present in the mail. The message or the data present in the mail.
Table Name: keywords Description: This table consists of the keywords of the mailing system.
SL.NO 1
FIELD NAME
keyword
DESCRIPTION
The suspected keywords of the mails.
MEC
31
A UML system is represented using five different views that describe the system from distinctly different perspective. Each view is defined by a set of diagram, which is as follows. User Model View i. This view represents the system from the users perspective. ii. The analysis representation describes a usage scenario from the end-users perspective. Structural model view i. In this model the data and functionality are arrived from inside the system. ii. This model view models the static structures.
Behavioral Model View It represents the dynamic of behavioral as parts of the system, depicting the interactions of collection between various structural elements described in the user model and structural model view.
Implementation Model View In this the structural and behavioral as parts of the system are represented as they are to be built.
In this the structural and behavioral aspects of the environment in which the system is to be implemented are represented.
UML is specifically constructed through two different domains they are: UML Analysis modeling, this focuses on the user model and structural model MEC 32 Computer Science &Engineering
MEC
33
MEC
34
Manage Keywords
User
Compose Mails
Inbox
Sent Items
MEC
35
Keywords
Admin
Alert Mails
Informative Mails
Compose Mail
User
Inbox
Sent Items
MEC
36
6. SYSTEM TESTING
Introduction to Testing:
Testing is a process, which reveals errors in the measure employed during software program. It is the major quality during software development,
development,during testing, the program is executed with a set of test cases and the output of the program for the test cases is evaluated to determine if the program is performing as it is expected to perform.
In order to make sure that the system does not have errors, the different levels of testing strategies that are applied at differing phases of software development are:
Unit Testing:
Unit Testing is done on individual modules as they are completed and become executable. It is confined only to the designer's requirements. Each module can be tested using the following two Strategies:
MEC
37
Integrating Testing:
Integration testing ensures that software and subsystems work together a whole. It tests the interface of all the modules to make sure that the modules behave properly when integrated together.
System Testing:
Involves in-house testing of the entire system before delivery to the user. Its aim is to satisfy the user the system meets all requirements of the client's specifications.
Acceptance Testing:
It is a pre-delivery testing in which entire system is tested at client's site on real world data to find errors.
MEC
38
Bottom up Approach:
Testing can be performed starting from smallest and lowest level modules and proceeding one at a time. For each module in bottom up testing a short program executes the module and provides the needed data so that the module is asked to perform the way it will when embedded with in the larger system. When bottom level modules are tested attention turns to those on the next level that use the lower level ones they are tested individually and then linked with the previously examined lower level modules.
Validation:
The system has been tested and implemented successfully and thus ensured that all the requirements as listed in the software requirements specification are completely fulfilled. In case of erroneous input corresponding error messages are displayed
MEC
39
7. SAMPLE CODE
ADMIN.JSP:
<%@page %> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=windows-1252"> <meta http-equiv="Content-Language" content="en-us"> <title>Admin</title> <!--<link rel="stylesheet" type="text/css" href="images/sddm.css" > <link rel="stylesheet" type="text/css" href="images/cour.css" >--> </head> <body topmargin="0"> <table border="0" height="19"> <tr bgcolor=""> <td width="9%" height="13" valign="middle" align="center"background="images/tp_bg.gif"><font face="Arial" size="2" color="Black"><a HREF="login.html"><b><%=request.getParameter("user") %></b></font></td> <td width="18%" height="13" valign="middle" align="center"background="images/tp_bg.gif" > <font face="verdana" size="6" color="Black"><b> SECURE MAIL </b></font> </td> <td width="9%" height="13" valign="middle" align="center"background="images/tp_bg.gif"><font face="Arial" size="2" color="Black"><a HREF="login.html"><b>Logout</b></font></td> </tr> <tr> <table> <tr> <td width="15%" height="355" valign="top">
MEC
40
USER.JSP:
html> <head> <meta http-equiv="Content-Type" content="text/html; charset=windows-1252"> <meta http-equiv="Content-Language" content="en-us"> <title>User Login</title> <!--<link rel="stylesheet" type="text/css" href="images/sddm.css" > <link rel="stylesheet" type="text/css" href="images/cour.css" >--> </head> <body topmargin="0"> <table border="0" height="19"> <tr bgcolor="">
MEC
41
MEC
42
8. SCREEN SHOTS
MEC
43
Home page:
MEC
44
MEC
45
MEC
46
MEC
48
Users login:
MEC
49
MEC
51
MEC
52
MEC
53
MEC
54
9. CONCLUSION
MEC
55
Foreseeable enhancements:
There is always a room for improvement in any software package, however good and efficient it may be. The important thing is that the website should be flexible enough for further modifications. Considering this important factor, the web site is designed in such a way that the provisions are given for further enhancements. At present this website provides all the information using static pages and reservation forms.In future we can enhance our project by providing options like. Include many sites information.
10. REFERENCES
JAVA Technologies:
MEC 56 Computer Science &Engineering
HTML:
HTML Black Book by Holzner
JDBC:
Java Database Programming with JDBC by Patel moss. Software Engineering by Roger Pressman
11. BIBLIOGRAPHY
MEC
57
MEC
58