Escolar Documentos
Profissional Documentos
Cultura Documentos
INTRODUCTION
The use of Information Technology for Government services facilitates an efficient, speedy and transparent process for disseminating Information to the public and other agencies and performing government administrations activities. The emphasis has been an providing better services to citizen and in improving internal productivity.
This has redefined the fundamentals and has the potential to change the institutions as well as the mechanisms of delivery of services forever. It is in this context that the issues of Smart Governance Electronic Governance needs to be analyzed. Quite obviously, therefore, the objective of achieving Electronic Governance (EG) goes far beyond mere computerization of standalone back office operations. It means to fundamentally change as to how the Government operates and this implies a new set of responsibilities for the executive, legislature and the citizenry. The effort should aim to bring about a social catharsis, which needs to be orchestrated in a comprehensive, concerted and planned fashion. Electronic Governance is the application of Information Technology to the processes of Government functioning to bring about
E-Governance demands standards in all areas. Some of the key areas are:
Identification of Govt. Departments with maximum citizen interface Government departments which have maximum interaction with the public must be identified for the use of IT. Listed below are a few such departments that can be considered:
Public Grievances: Electricity, Water, Telephone, Ration Card, Sanitation, Public Rural Services: Land Records, Below Poverty Line (BPL) /EWS Families
Social Services: Registration of Licenses and Certificates Ration Cards, Birth Certificates, Income Certificate.
E-Governance: I use the phrase "Representative E-Government" to describe the e-democracy activities of government institutions. Others call this "e-governance ". In our project we choose some of the public sectors where there is more need of the Govt. activities such as electricity bill payments, issue of cast & birth certificates, telephone bill payments and we are also doing online chatting so the user can interact directly to the Govt. and can provide his /her suggestions for better governance. By using our project a person can pay his/her utility bills very easily, without the need of going to the particular offices and waiting for a long time.
CHAPTER 2
SYSTEM ANALYSIS
System analysis is a logical process. The objective of the analysis phase is not actually solving a problem, but to determine exactly what must be done to solve the problem. During the analysis the system analyst works with the user to develop a model of the system using such tools as use case diagrams and analog either sequence diagrams. The first step in developing anything is to state the requirements. This applies just as much to leading edge research as to simple programs and to personal programs, as well as to large team efforts. Being vague about your objective only postpones decisions to a later stage where changes are much more costly. The problem statement should state what is to be done and not how it is to be done. The requestor should avoid describing system internals, as this restricts implementation flexibility.
2.3.3Operational Feasibility
It refers to the feasibility of the product to be operational. Some products may work very well at design and implementation but may fail in the real time environment. It includes the study of additional human resource required and their technical expertise.
CHAPTER 3
MODULE DESCRIPTION
The Electronic Governance Services project has been divided into two modules. They are:
USER ADMINISTRATOR
Module-One: User
User sends a request to agent then the agent will send response to user. This module deals with the management of the user information such as the personal details, applications, birth certificates, income certificates, telephone bills, electricity bill, login id, password, etc., He fill his details if they are correct then the user gets registered and he can buy the products there. If the information he gave is not correct then he will be not registered. In the login authentication form name, address, contact number, email id all other things have to be entered. After filling these details the user entered into online by getting registered
Module-Two: Administrator
This module deals with the management of the user information such as the payment criteria etc. Other responsibilities might include planning for future expansion and creating data base and table spaces, adding users and maintain security. The administrator is the monitoring authority of the system.
CHAPTER 4
SYSTEM REQUIREMENTS
System Requirements
The software requirement analysis is produced at the culmination of the function and performance allocated to software as part of system engineered refined by establishing a complete information description, a detailed constraint, appropriate validation criteria, and other data related to requirements.
CHAPTER 5
LITERATURE SURVEY
A programming tool or software tool is a program or application that software developers use to create, debug, maintain, or otherwise support other programs and applications. The term usually refers to relatively simple programs that can be combined together to accomplish a task. The Chapter describes about the software tool that is used in our project.
Importance of java to internet? Java has had a profound effect on the Internet. This is because; Java expands the Universe of objects that can move about freely in Cyberspace. In a network, two categories of objects are transmitted between the Server and the Personal computer. They are: Passive information and Dynamic active programs. The Dynamic, Self-executing programs cause serious problems in the areas of Security and probability.
ROBUST The multi-platform environment of the Web places extraordinary demands on a program, because the program must execute reliably in a variety of systems. The ability to create robust programs was given a high priority in the design of Java. Java is strictly typed language; it checks your code at compile time and run time. Java virtually eliminates the problems of memory management and de-allocation, which is completely automatic.
10
The request and response cycle of JSP You are familiar with the request and response cycle of the interaction between a server and clients. The steps involved in the request and response cycle are listed here. 1. The client sends an HTTP request for a JSP page to the server. The request can be sent by using either a GET method or a POST method. 2. The browser identifies the JSP file and compiles and loads the corresponding servlet class if the servlet class is not already present in the JVM. The server calls the service () method. The default service () method often passes the request and response to the doGet () method or doPost () method. The servlet processes the input from the request and prepares an HTML page as a response. 3. The response is sent back to the client browser .JSP can be used in different application mode.
The simple model The n-tier model The loosely coupled Model The including Request Model The Forwarding Requests Model
11
5.5.2. JDBC DRIVER TYPES: There are four types of JDBC drivers each having its own functionality. They are classified based on how they access data from the databases. NATIVE JDBC DRIVER: A JDBC driver, which is partially written in java and most of it, is
implemented using native methods to access the databases. This is useful in case of a java application that can run only on some specific platforms. ALL-JAVA JDBC NET DRIVERS: A JDBC net driver, which uses a common network protocol to connect an inner intermediate server, which in turn employs native calls to connect to the databases. This approach is suited for swings where the request must go to through the intermediate server. JDBC ODBC NET DRIVERS: A bridge driver provider with JDBC can connect to any type of database that is ODBC complaint. This approach is recommended since using ODBC Drivers. Which are industry standard now, would make an application truly portable across databases. NATIVE PROTOCOL ALL JAVA DRIVERS: This type of JDBC driver is written completely in java, and can access the database by making use of native protocols of the databases. This method of data access is suitable in case of intranets, where everything can run as an application, instead of a swing. 5.5.3. JDBC ARCHITECTURE: Data Base Management: Database provides Storing and managing the data. It reduces the time of accessing. DBMS (Data Base Management System) used to retrieve data in the form of reports. MS-ACCESS stores data in the .mdb file format where as Ms-SQL stores data in the .dot file format. Java is one of the commonly used webbased GUI programming languages. Sun micro Systems has included JDBC-API as a part of JDK to enable java applications to communicate with a database. JDBC API: Java program can't directly communicate with an ODBC Driver. The ODBC API is written in the 'C' programming language .It uses pointers and other constructs that are not supported in java. JDBC provides a set of API's that can be used by java programs to connect to and manage the database only jdbc-odbc bridge+odbc driver. This type of jdbc driver provides DBMS or RDBMS can only understand SQL statements and not java language statements. There are four types of JDBC Drivers
12
1. JDBC-ODBC bridge + ODBC Driver 2. Native API, partly java driver 3. JDBC-Net, pure java driver 4. Native protocol, pure java driver. We are using database access using the odbc driver.
JDBC DRIVER
DB DB DB
JDBC DRIVER MANAGER: Function of the driver manager is to find out available drivers in the system and connect the application to the appropriate database whenever a connection is requested. However to help the driver manager identify different types of drivers, each should be registered with the driver manager. JDBC DRIVER: Function of the JDBC driver is to accept the SQL calls from the application and convert them into native calls to the database. However, in this process it may take help from other drivers or even servers, which depend on the type of JDBC driver we are using. Also it is possible that the total functionality of the database server could be built into server itself. Sun soft provider a special JDBC Driver called JDBCODBC Bridge driver, which can be used to connect any existing database that is ODBC complaint
13
JDBC-ODBC BRIDGE: If possible, use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This completely eliminates the client configuration required by ODBC. It also eliminates the potential that the Java VM could be corrupted by an error in the native code brought in by the Bridge (that is, the Bridge native library, the ODBC driver manager library, the ODBC driver library, and the database client library.
What Is the JDBC- ODBC Bridge? The JDBC-ODBC Bridge is a JDBC driver, which implements JDBC operations by translating them into ODBC operations. To ODBC it appears as a normal application program. The Bridge implements JDBC for any database for which an ODBC driver is available. The Bridge is implemented as the
JDBC connectivity: Sun.jdbc.odbc Java package and contains a native library used to access ODBC. The Bridge is a joint development of Innersole and Java Soft. The JDBC provides database-independent connectivity between the J2EE platform and a wide range of tabular data sources. JDBC technology allows an Application Component Provider to: Perform connection and authentication to a database server Manager transactions Move SQL statements to a database engine for preprocessing and execution Execute stored procedures Inspect and modify the results from Select statement
Application: Application is a java program that needs the information to be modified in some database or wants to retrieve information.
14
CHAPTER 6
SYSTEM DESIGN
Introduction:
Design is the first step in the development phase for any engineering product (or) system. It may be defined as the process of applying various techniques and principles for the purpose of defining a device, a process, or a system insufficient detail to permit its physical realization. Software design is an iterative process through which requirements are translated into a Blue print for constructing the software. The design is represented at a high level of abstraction. A level that can be directly translated to specific data, functional and behavioral requirements. Preliminary design is concerned with the transformation of architecture. Detail design focuses on requirements into a data and software
detailed Data structure and algorithmic representation for software. In the design step, the element of the analysis model gets converted into a data design, and architectural design, an interface design and a procedural design. The data design transforms the information domain model created during analysis into the data structures that will be required to implement software. The architectural design defines the relationship among major structural elements of the program. The interface design describes how the software communicates within itself, to systems that interoperate with it, and with humans who use it. An interface implies a flow of information (e.g., data and /pr control). Therefore, the data and control flow diagrams provide the information required for interface design.
15
1. System Design or Top Level Design: In the system design the focus is on deciding which modules are needed for the system, the specification of these modules and how these modules should be interconnected. 2. Design or Detailed Logical Design: In detailed design the interconnection of the modules or how the specifications of the modules can be satisfied is decided . Some properties for a software system design are
Design principles: Basic design principles that enable the software engineer to navigate the design process are. The design process should not suffer from Tunnel vision. The design should be traceable to the analysis model. The design should not reinvent the wheel. The design should minimize the intellectual distance between the Software and the problem, as it exists in the real would. The design should exhibit uniformity and integrity. The design should be structured to accommodate changes.
16
6.1.1Uml diagrams:
Use case Diagram: Use case is a description of a set of sequence of actions that a system performs that yields an observable result of value to a particular thing in a model. Graphically, use case is rendered as an ellipse with dashed lines, usually including only its name as shows below
User
Use of use case diagram: It is used for testing executable systems and also for understanding the executable systems. It is widely used in modeling the context of a system These diagrams are also recognized in modeling requirement of a system.
17
Sequence Diagrams: A sequence diagram is an interaction diagram that emphasizes the time ordering of the messages. Graphically, a sequence diagram is a table that shows objects arranged along the X-axis and messages, ordered in increasing time, along the Y-axis.
:Admin
:Login
:Electricity bill
:Credit card
3.success
18
:User
:HSC
:Electricity bill
:Birth certificate
19
To reduce redundancy. To arrive at loss-less join. To reduce the time as compared to the present system. To reduce the number of errors
6.2.1.Data Flow Diagrams: This Diagram server two purpose. Provides an indication of how date is transformed as it moves through the system. Disputes the functions and sub functions that transforms the dataflow. The Data flow diagram provides additional information that is used during the analysis of the information domain, and server as a basis for the modeling of functions. The description of each function presented in the DFD is contained is a process specifications called as PSPE
20
Notations: NAME
DATAFLOW
DESCRIPTION
Data move in a specific direction from an origin to a destination
SYMBOLS
PROCESS
People, procedures, or devices that Use or produce (Transform) Data. The physical Component is not Identified. External sources or destination of data, which may be People, programs, organizations or other entities. Here data are stored or referenced by a process in the System.
SOURCE
DATA STORE
Context-level DFD (Level 0) A level 0 DFD also called a fundamental system model or a context model... Represent the entire software element as a single bubble with input and output data indicated by incoming and outgoing arrows respectively. Additional process and information flow paths are represented as level 0 DFD is partitioned to reveal more details.
USER
E-GOV
DATA BASE
21
LEVEL1DFD
Registration
User store
USER
Login
Change User
Birth Certificate
Birth
e-bill
Electricity Bill
Pay Bill
Admin
22
6.2.2 Data base tables A data dictionary is a catalog a repository of the elements in the system. As the name suggests, these elements center on data and the way they are structured to meet user requirements and organization needs. A data dictionary is a collection of data about data. The basic idea is to provide information on the definition, structure and the user of the element an organization uses. In this project we create two tables using MS-ACCESS queries
DESCRIPTION CONSUMER NUMBER CREDIT CARD NO BALANCE AMOUNT NAME OF THE BANK
DESCRIPTION PHONE NUMBER NAME OF THE USER PRESENT ADDRESS NO OF LOCAL CALLS NO OF STD CALLS AMOUNT TO PAY LAST DATE TO PAY
23
NAME APLN SEX DOB FNAME MNAME COMTY FCOMTY MCOMTY TEXT TEXT
TYPE
DESCRIPTION NAME OF APLN SEX OF APLN DATE OF BIRTH FATHERS NAME MOTHERS NAME COMMTY OF THE USER FATHERS COMMTY MOTHERS COMMTY
TYPE
DESCRIPTION NAME OF THE USER ADRS TO WHICH CONN IS REQ PHONE NUMBER FOR VERF-N DESIGNATION OF USER
NUMBER TEXT
24
TABLE NAME: vid NAME VID NAME ADDRESS TEXT TEXT TEXT TYPE VOTER ID NAME OF THE USER ADDRESS OF THE USER DESCRIPTION
NAME
TYPE
DESCRIPTION
USERID PASSWORD
TEXT TEXT
25
CHAPTER 7
SYSTEM IMPLEMENTATION
Introduction:
implementation is the process of assuring that the information system is operational and then allowing users take over it s operation for use and evaluation obtaining and installing the system hardware. The implementation stage involves careful planning, investigation of existing system and its constrains on implementation, designing of methods to achieve change over and evaluation of changeover methods..The most visible component of implementation process is the system conversion. The four basic conversion strategies include
Direct Conversion : In direct conversion, the organization stops using the old system and starts using the new one at the same time. Parallel Conversion; A parallel conversion involves running both old system and hews system and comparing their results. The new system is accepted only after the results have matched for an acceptable period. Pilot Conversion : Pilot conversion means introducing the new system to a small part of the organization, expanding its use once it is known to operate property there. Eventually, it will be in use by the entire organization. Phased Conversion : Phased conversion means introducing a system in stages, one component or module at a time, waiting until that one is operating properly before introducing the next.
26
CHAPTER 8
SCREEN SHOTS
Whenever the server starts we have to deploy the server in click on deployment icon and select project under Add, in that select server(tomcat6) click
27
In this select our project name then it will automatically displays the login page of our project.. Figure: 8.2.home screen of tomcat server
28
INTRODUCTION
29
ADMIN LOGIN
30
ADMIN PAGE
31
32
33
CREDIT DETAILS
34
35
36
BILL DETAILS
37
38
39
40
SENDING MESSAGE
41
42
43
44
45
46
CHAPTER 9
TESTING
Introduction
System testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing fundamentals define the overriding objectives for software testing. Testing is one of the steps in the software engineering process that could be viewed (psychologically, at least) as destructive rather than constructive. This will create two problems.
Time delay between the cause and appearance of the problem. The effect of the system errors on files and records within the system.
The purpose of the system testing is to consider all the likely variations to which it will be suggested and push the system to its limits. The testing process focuses on logical intervals of the software ensuring that all the statements have been tested and on the function intervals (i.e.,) conducting tests to uncover errors and ensure that defined inputs will produce actual results that agree with the required results.
White-Box Testing (GLASS-BOX TESTING) White-box tests focus on the program control structures. Test cases are derived to ensure that all statement in the program has been executed at least once during testing and that all logical conditions have been exercised. Knowing the internal working of a product, tests can be conducted to ensure that all gears mesh, that is the internal operation performs according to specification and all internal components have been adequately exercised. White box testing is a test case design methods that uses the control Guarantee that all independent paths within a module have been exercised at least . Exercise all logical decision on their and false sides Execute all loops at their boundaries and within their operational bounds. Exercise internal data structures to ensure their validity.
47
Black-Box Testing: Black-Box testing focuses on the functional requirements of the software .it is not an alternative to whitebox techniques. Rather, it is a complementary approach that is likely to uncover a different class of errors than white-box methods. Black- box testing attempts to find the following types of Errors o o o o o Incorrect or missing functions. Interface errors. Errors in data structures or external database access. Performance errors and Initialization and termination errors.
Unit Testing Unit testing focuses verification effort on the smallest unit of software design. Using the procedural design description, important control paths are tested to uncover errors within the boundary of the module. The unit test is normally the constrained scope established for unit testing. The unit test is normally white box oriented, and the step can be conducted in parallel for multiple Modules.
Integration Testing Integration testing is a systematic technique for constructing the program structure while conducting tests to uncover errors associate with interfacing. The objective is to take unit tested modules and build a program structure that has been dictated by design. There is often a tendency to attempt non-incremental integration to construct the program using big bang approach. Incremental integration is the anti thesis of big bang approach.
Verification and Validation: Validation is a process of finding out if the product being built is right? I.e. whatever the software product is being developed; it should do what the user expects it to do. The software product should functionally do what it is supposed to, it should satisfy all the functional requirements set by the user. Validation is done during or at the end of the development process in order to determine whether the product satisfies specified requirements.
48
CHAPTER 10
CONCLUSION
This project is able to successfully incorporate all the requirements as specified by the public. Our state govt... Proposed this system. There is no complexity to the public & private sectors. It maintains efficiently and effectively all the governmental activities. Appropriate changes have been taken during the database design to maintain database integrity and to avoid redundancy data. Validations are done instantaneously to avoid inconsistency of the data. The user provided a friendly interface by hiding all technical complexities. With the help of this application compared to the old existing system which is done manually the time is reduced very much and is very useful and applicable for the users. Our application
consists about Tender Extractions ,All Certificates related to govt like Birth certificates, income certificates and using this we can pay the electricity bills, telephone bills etc.
49
CHAPTER 11
BIBLIOGRAPHY
1. Software Engineering - Practitioners Approach by Roger S. Pressman, McGraw Hill International Edition. 2. An Introduction to Database System by C. J. Date. 3. Java Complete References by Patrik Norton. 4. CORE Servlets & JSP from sun micro systems by MARTHALL 5. UML in 24 Hours - SAMS outline by JOSEPH SCHMULLER. 6. Thinking in Java by Bruce Eckel. 7. Java2 Complete Reference by Herbert Scheldt.
WEBSITES REFERRED The following links were searched and exploited extensively for the project development and implementation. 1. 2. 3. 4. 5. 6. www.microsoft.com/iis www.oracle.com www.Jsp.com www.javascript.com www.sun.com www.Jsp-help.com
50