Professional Documents
Culture Documents
INTRODUCTION
DEPT.COMPUTER SCIENCE
RISS TECHNOLOGIES
1. INTRODUCTION
1.1 INTRODUCTION
The Project entitled Live Stock Management System deals with the automation of various
processes that are held within a college. This system helps us to make the work simpler. Live Stock
Management System software has the perspective of attaining attraction of those colleges which
dont have one good performing software for keeping their information secure and make
their management easier. This Live Stock Management System software provides one attractive
environment where you can manipulate and handle data and information about Staff, Lab
apparatus of each Labs, Books in the library, request for new stocks, etc. So we can say the Core
purpose of designing Live Stock Management System is to manage the task related to the stock
details of labs and library to reduce the time for managing it.
This system includes adding of staffs, store details, stock updates, item details,
notifications, sending/getting requests and handling those request, etc.
DEPT.COMPUTER SCIENCE
RISS TECHNOLOGIES
DEVELOPING TOOLS
DEPT.COMPUTER SCIENCE
RISS TECHNOLOGIES
2. DEVELOPING TOOLS
2.1 FRONT END
JAVA:
Initially the language was called as oak but it was renamed as java in 1995.The primary
motivation of this language was the need for a platform-independent (i.e. architecture neutral)
language that could be used to create software to be embedded in various consumer electronic
devices.
Java is a programmers language
Java is cohesive and consistent
Except for those constraint imposed by the Internet environment. Java gives the
programmer, full control
RISS TECHNOLOGIES
byte code. The JVM is created for the overcoming the issue of probability. The code is written and
compiled for one machine and interpreted on all machines .This machine is called Java Virtual
Machine.
Compiling and interpreting java source code.
During run-time the Java interpreter tricks the byte code file into thinking that it is running
on a Java Virtual Machine. In reality this could be an Intel Pentium windows 95 or sun
SPARCstation running Solaris or Apple Macintosh running system and all could receive code from
any computer through internet and run the Applets.
Features of java
1) Compiled and Interpreter:- has both Compiled and Interpreter Feature Program of java is First
Compiled and Then it is must to Interpret it .First of all The Program of java is Compiled then after
Compilation it creates Bytes Codes rather than Machine Language Then After Bytes Codes are
Converted into the Machine Language is Converted into the Machine Language with the help of
the Interpreter So For Executing the java Program First of all it is necessary to Compile it then it
must be Interpreter
2) Platform Independent:- Java Language is Platform Independent means program of java is
Easily transferable because after Compilation of java program bytes code will be created then we
have to just transfer the Code of Byte Code to another computer .This is not necessary for
computer s having same Operating System in which the code of the java is Created and Executed
DEPT.COMPUTER SCIENCE
RISS TECHNOLOGIES
After Compilation of the Java Program We easily Convert the Program of the java top the another
Computer for Execution
3) Object-Oriented:- We Know that is purely OOP Language that is all the Code of the java
Language is Written into the classes and Objects So For This feature java is Most Popular
Language because it also Supports Code Reusability, Maintainability etc.
4) Robust and Secure:- The Code of java is Robust and Meansot first checks the reliability of the
code before Execution When We trying to Convert the Higher data type into the Lower Then it
Checks the Demotion of the Code the It Will Warns a User to Not to do this So it is called as
Robust
5) Secure : When We convert the Code from One Machine to Another the First Check the Code
either it is Effected by the Virus or not or it Checks the Safety of the Code if code contains the
Virus then it will never Executed that code on to the Machine
6) Distributed:- Java is Distributed Language Means because the program of java is compiled
onto one machine can be easily transferred to machine and Executes them on another machine
because facility of Bytes Codes So java is Specially designed For Internet Users which uses the
Remote Computers For Executing their Programs on local machine after transferring the Programs
from Remote Computers or either from the internet.
7) Simple Small and Familiar:- is a simple Language Because it contains many features of other
Languages like c and C++ and Java Removes Complexity because it doesnt use pointers, Storage
Classes and Go to Statements and java Doesnt support Multiple Inheritance
8) Multithreaded and Interactive:- Java uses Multithreaded Techniques For Execution Means
Like in other in Structure Languages Code is Divided into the Small Parts Like These Code of java
is divided into the Smaller parts those are Executed by java in Sequence and Timing Manner this
is Called as Multithreaded In this Program of java is divided into the Small parts those are Executed
by Compiler of java itself Java is Called as Interactive because Code of java Supports Also CUI
and Also GUI Programs
DEPT.COMPUTER SCIENCE
RISS TECHNOLOGIES
9) Dynamic and Extensible Code:- Java has Dynamic and Extensible Code Means With the Help
of OOPS java Provides Inheritance and With the Help of Inheritance we Reuse the Code that is
Pre-defined and Also uses all the built in Functions of java and Classes
10) Distributed:- Java is a distributed language which means that the program can be design to
run on computer networks. Java provides an extensive library of classes for communicating, using
TCP/IP protocols such as HTTP and FTP. This makes creating network connections much easier
than in C/C++. You can read and write objects on the remote sites via URL with the same ease
that programmers are used to when read and write data from and to a file. This helps the
programmers at remote locations to work together on the same project.
11) Secure: Java was designed with security in mind. As Java is intended to be used in
networked/distributor environments so it implements several security mechanisms to protect you
against malicious code that might try to invade your file system.
For example: The absence of pointers in Java makes it impossible for applications to gain
access to memory locations without proper authorization as memory allocation and referencing
model is completely opaque to the programmer and controlled entirely by the underlying run-time
platform .
12) Architectural Neutral: One of the key feature of Java that makes it different from other
programming languages is architectural neutral (or platform independent). This means that the
programs written on one platform can run on any other platform without having to rewrite or
recompile them. In other words, it follows 'Write-once-run-anywhere' approach. Java programs
are compiled into byte-code format which does not depend on any machine architecture but can
be easily translated into a specific machine by a Java Virtual Machine (JVM) for that machine.
This is a significant advantage when developing applets or applications that are downloaded from
the Internet and are needed to run on different systems.
13) Portable: The portability actually comes from architecture-neutrality. In C/C++, source code
may run slightly differently on different hardware platforms because of how these platforms
implement arithmetic operations. In Java, it has been simplified.
DEPT.COMPUTER SCIENCE
RISS TECHNOLOGIES
Unlike C/C++, in Java the size of the primitive data types are machine independent. For example,
an int in Java is always a 32-bit integer, and float is always a 32-bit IEEE 754 floating point
number. These consistencies make Java programs portable among different platforms such as
Windows, UNIX and Mac.
14) Interpreted: Unlike most of the programming languages which are either complied or
interpreted, Java is both complied and interpreted The Java compiler translates a java source file
to byte codes and the Java interpreter executes the translated byte codes directly on the system that
implements the Java Virtual Machine. These two steps of compilation and interpretation allow
extensive code checking and improved security.
15) High performance: Java programs are compiled to portable intermediate form known as byte
codes, rather than to native machine level instructions and JVM executes Java byte code on any
machine on which it is installed. This architecture means that Java programs are faster than
program or scripts written in purely interpreted languages but slower than C and C++ programs
that compiled to native machine languages.
Although in the early releases of Java, the interpretation of by byte code resulted in slow
performance but the advance version of JVM uses the adaptive and just in time (JIT) compilation
technique that improves performance by converting Java byte codes to native machine instructions
on the fly.
DEPT.COMPUTER SCIENCE
RISS TECHNOLOGIES
controller design, normally with JavaBeans as the model and Java servlets (or a framework such
as Apache Struts) as the controller. This is a type of Model 2 architecture.
JSP allows Java code and certain pre-defined actions to be interleaved with static web
markup content, such as HTML, with the resulting page being compiled and executed on the server
to deliver a document. The compiled pages, as well as any dependent Java libraries, contain Java
bytecode rather than machine code. Like any other Java program, they must be executed within
a Java virtual machine (JVM) that interacts with the server's host operating system to provide an
abstract, platform-neutral environment.
JSPs are usually used to deliver HTML and XML documents, but through the use of
OutputStream, they can deliver other types of data as well. The Web container creates JSP implicit
objects like request, response, session, application, config, page, pageContext, out and exception.
JSP Engine creates these objects during translation phase.
JSP pages use several delimiters for scripting functions. The most basic is <% ... %>,
which encloses a JSP scriptlet. A scriptlet is a fragment of Java code that is run when the user
requests the page. Other common delimiters include <%= ... %> for expressions, where the
scriptlet and delimiters are replaced with the result of evaluating the expression, and directives,
denoted with <%@ ... %>. Java code is not required to be complete or self-contained within a
single scriptlet block. It can straddle markup content, provided that the page as a whole is
syntactically correct. For example, any Java if/for/while blocks opened in one scriptlet must be
correctly closed in a later scriptlet for the page to successfully compile.
Content which falls inside a split block of Java code (spanning multiple scriptlets) is subject
to that code. Content inside an if block will only appear in the output when the if condition
evaluates to true. Likewise, content inside a loop construct may appear multiple times in the output,
depending upon how many times the loop body runs.
DEPT.COMPUTER SCIENCE
RISS TECHNOLOGIES
list to a picture gallery or the vast amounts of information in a corporate network. To add, access,
and process data stored in a computer database, you need a database management system such as
MySQL Server. Since computers are very good at handling large amounts of data, database
management systems play a central role in computing, as standalone utilities, or as parts of other
applications.
big storeroom. The database structures are organized into physical files optimized for speed. The
logical model, with objects such as databases, tables, views, rows, and columns, offers a flexible
programming environment. You set up rules governing the relationships between different data
fields, such as one-to-one, one-to-many, unique, required or optional, and pointers between
different tables. The database enforces these rules, so that with a well-designed database, your
application never sees inconsistent, duplicate, orphan, out-of-date, or missing data.
The SQL part of MySQL stands for Structured Query Language. SQL is the most
common standardized language used to access databases. Depending on your programming
environment, you might enter SQL directly (for example, to generate reports), embed SQL
statements into code written in another language, or use a language-specific API that hides the
SQL syntax. SQL is defined by the ANSI/ISO SQL Standard. The SQL standard has been
evolving since 1986 and several versions exist
Open Source means that it is possible for anyone to use and modify the software. Anybody
can download the MySQL software from the Internet and use it without paying anything. If you
wish, you may study the source code and change it to suit your needs. The MySQL software uses
the GPL (GNU General Public License), to define what you may and may not do with the software
in different situations.
DEPT.COMPUTER SCIENCE
10
RISS TECHNOLOGIES
The MySQL Database Server is very fast, reliable, scalable, and easy to use.
MySQL Server can run comfortably on a desktop or laptop, alongside your other
applications, web servers, and so on, requiring little or no attention. If you dedicate an entire
machine to MySQL, you can adjust the settings to take advantage of all the memory, CPU power,
and I/O capacity available. MySQL can also scale up to clusters of machines, network together.
SQLyog:
SQLyog provides you with powerful means to manage your MySQL databases.
Runs on all Windows version from Win XP to Win 8.x (desktop systems) as well as
"Windows Server" systems of same generations (Windows Server 2003 and higher).
HTTP and SSH Tunneling - smartly manage your MySQL server even if the MySQL port
Smart AutoComplete.
Advanced GUI Query Builder. Supports JOINs, aggregate as well as 'common' functions,
sorting (ORDER BY) and filtering (WHERE and HAVING) and ALIAS.
SQLyog Import External Data wizard - use the GUI or specify a query.
DEPT.COMPUTER SCIENCE
11
RISS TECHNOLOGIES
SQL Commends
SQL commands are instructions, coded into SQL statements, which are used to
communicate with the database to perform specific tasks, work, functions and queries with data.
SQL commands can be used not only for searching the database but also to perform various
other functions like, for example, you can create tables, add data to tables, or modify data, drop
the table, set permissions for users. SQL commands are grouped into four major categories
depending on their functionality:
database objects. The commands are CREATE, ALTER, DROP, RENAME, and
TRUNCATE.
DEPT.COMPUTER SCIENCE
12
RISS TECHNOLOGIES
Apache Tomcat:
Apache Tomcat is a web server that is an open source software implementation of the Java
Servlet and Java Server Pages technologies. The Java Servlet and Java Server Pages specifications
are developed under the Java Community Process. Apache Tomcat is developed in an open and
participatory environment. Apache Tomcat is intended to be a collaboration of the best-of-breed
developers from around the world. Apache Tomcat powers numerous large-scale, mission-critical
web applications across a diverse range of industries and organizations
Apache Tomcat is an open source software implementation of the Java Servlet and Java
Server Pages technologies. The Java Servlet and Java Server Pages specifications are developed
under the Java Community process. Apache Tomcat, Tomcat, Apache, the Apache feather, and the
Apache Tomcat project logo are trademarks of the Apache Software Foundation.
2.3 IDE
NetBeans IDE:
In computer programming, NetBeans is a multi-language software development
environment NetBeans is an open-source integrated development environment (IDE) for
developing with Java, PHP, C++, and other programming languages. NetBeans is also referred to
as a platform of modular components used for developing Java desktop applications. NetBeans is
coded in Java and runs on most operating systems with a Java Virtual Machine (JVM), including
Solaris, Mac OS, and Linux.
NetBeans manages the following platform features and components:
User settings
Storage
Framework wizard
DEPT.COMPUTER SCIENCE
13
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
14
RISS TECHNOLOGIES
OPERATING SYSTEM
Windows 7
Windows is an operating system has evolved from a basic Graphical User Interface (GUI)
like Windows 3.1 to an advanced graphical user interface (GUI) like Windows NT. Both Windows
7 provide a common goal-ease of use and manageability by users. While Windows 7 is focused on
making computing easier for anyone using a wide range personal and business applications on the
desktop and portable computers.
Window 7 provides a good user friendlier environment to work with GUI. It also includes
improved network, application and web services. It provides increased reliability and scalability,
lowers your coast of computing with powerful, flexible management services, and provides the
best foundation for running business applications. It provides network data security by protecting
data on the wire or at the network interface.
Window 7 has emerged as a powerful desktop operating system for catering to complex
business needs. Application programmers for developing scientific and financial applications also
use it. The OS provides a high level reliability, protection and security.
DEPT.COMPUTER SCIENCE
15
RISS TECHNOLOGIES
SYSTEM ANALYSIS
DEPT.COMPUTER SCIENCE
16
RISS TECHNOLOGIES
3. SYSTEM ANALYSIS
3.1 INTRODUCTION
The system analysis involves detailed study of the system, which enables to know about
the functions and operations performed within the system and also their relationship of the outside
the system. It mainly emphasize on the drawbacks of the existing system and the need of the
proposed system. It is the process of gathering and interpreting facts, diagnosing problem and
using the information to recommend improvements on the system. System analysis is a solving
activity that requires intensive communication between the system users and system developers.
It also involves studying the way an organization currently retrieves the process with a view make
it work together. Thus, system analysis is the process of investing a system, identifying problem,
and using the information to recommend improvement to the system.
Once the developers have determined the required software, it is time to analysis the type
of software that could answer the problem encountered system analysis will take a look at possible
software. The goal of the system analysis is to know the properties and function of software that
would answer the concern solicited from intended user.
System analysis would lead in determining the requirements needed in software. These
requirements in software should be implemented otherwise the software may not answer the
concern or may lack in its usage. The stage will somehow determine how the software should
function.
It is study of the system and it is specify its requirements by building a working model of
it. The model is a common language: it is readily understudy by the users who are providing
information about the system. Using working models, users and analyst work together to reach an
identical understanding of the requirements. Once the model is agreed, the system is implemented
by building a real world version of the model.
The study of an activity or procedure to determine the end and the most efficient method
of obtaining this end.
DEPT.COMPUTER SCIENCE
17
RISS TECHNOLOGIES
Time consuming
Presently the details of books, lab apparatus and lab items are stored in different
registers. If we want to add new stocks or to retrieve the details of current stocks and details
of items, this will be more time consuming.
Redundancy
Details or data of books or lab apparatus are filed and kept in different registers. There
are chances the same book or lab apparatus can be repeated in different files. Duplicate
copy of the same book or lab apparatus is thus created. Hence data redundancy occurs.
Insecure data
Data kept in files and records can be deleted by any one staff in the Colleges. Hence
DEPT.COMPUTER SCIENCE
18
RISS TECHNOLOGIES
Inconsistent data
Redundancy of data always causes data inconsistency. When duplication occurs the
entered data become inconsistent. The data might be either damaged or cannot be useful
for any future use.
Maintenance
Maintenance of separate registers is very difficult since it consumes a lot of space.
The works carried out in the existing system, makes the activities slow, tedious and
inefficient. The overall study of the existing system leads to the development of new
system.
Administrator
Stock manager
Lab assistant
Librarian
DEPT.COMPUTER SCIENCE
19
RISS TECHNOLOGIES
Data security
Since data is stored in computers and handled safely. Files may be lost or degrade
depending on time. But the data in the computer are not lost until an unexpected failure in
the operating system or hardware occurs. The data can be only handled by the admin of the
system. Any changes made to the data are done by the authorized users. Hence data is always
secure.
Reliability
The system is reliable to the users, as it has a backup for the future use and provides
security. The data is not damaged during a sudden power failure and has the ability to recover
from unexpected errors and faults
Maintainability
It is easy to maintain software than to keep the records in ledger books. Books might be
lost, or the page can be torn off accidently. But software is efficient to use on any computer
system without any wear and tear
3.3.2 FUNTIONS
Adding staffs.
Sending/view of complaints.
DEPT.COMPUTER SCIENCE
20
RISS TECHNOLOGIES
2. On-site observation:
Here the operation and physical layout of the current system were studied by direct
observation of the operations/physical layout. This method is directed toward describing and
understanding events and behavior as they occur. Recording of information and other relevant
operations were observed and studied directly from some colleges and schools.
DEPT.COMPUTER SCIENCE
21
RISS TECHNOLOGIES
SYSTEM STUDY
DEPT.COMPUTER SCIENCE
22
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
23
RISS TECHNOLOGIES
Module Admistrator
This module will have the provision to do the following after the login process:
Staff Registration
Category details
View/send notifications
Reports
Password change
View profile
Send complaint
View reply
View Notification
Add items
Report
DEPT.COMPUTER SCIENCE
24
RISS TECHNOLOGIES
Change password
View profile
View stock
View reports
View Notifications
Send complaint
View reply
Module Librarian
This module will have the provision to do the following after the login process:
Change password
View profile
View stock
View report
Book entry
Shelf creation
Book allocation
View notification
Send complaint
View reply
DEPT.COMPUTER SCIENCE
25
RISS TECHNOLOGIES
Efficient and effective way for complaint register and solving problem
Efficient and effective way for complaint register and solving problem
DEPT.COMPUTER SCIENCE
26
RISS TECHNOLOGIES
Operational feasibility
Technical feasibility
Economic feasibility
Is there sufficient support for the project from the management? From users? If the
present system is well liked and used to extent that the persons will not able to see
reasons for a change, there may be resistance.
DEPT.COMPUTER SCIENCE
27
RISS TECHNOLOGIES
Are current business methods acceptable to the users? If they are not? Users may
welcome a change that will bring about a more operational and useful system.
Are the users been involved in the planning and development of the project? If they are
involved at the earlier stage of the project developed, the changes of resistance can be
possibly reduced.
Issues that appear to be quite minor at the earlier stage can grow into major problems
after implementation. Therefore, it is always advisable to consider operational aspects
carefully.
DEPT.COMPUTER SCIENCE
28
RISS TECHNOLOGIES
be used for data collection, storage output and processing. On this system development side, the
feasibility study must consider the various ways of acquiring the system.
These include the purchase of the package the use of consultancy organization or software
house to design the system and write the programs. There are a number of technical issues, which
are generally raised during the feasibility stage of the investigation .they, are as follows:
Does the necessary technology exists to do what is suggested (and can it be acquired)?
Does the proposed equipment have the technical capacity to hold the data required to
use the new system?
DEPT.COMPUTER SCIENCE
29
RISS TECHNOLOGIES
SYSTEM SPECIFICATION
DEPT.COMPUTER SCIENCE
30
RISS TECHNOLOGIES
5. SYSTEM ANALYSIS
5.1 HARDWARE SPECIFICATION
Processor
Input devices
Mouse, Keyboard
Output devices
Monitor
Operating system
Windows 7
Frond End
Java
Back End
MySQL
Code Behind
JSP
Platform used
Windows
DEPT.COMPUTER SCIENCE
31
RISS TECHNOLOGIES
SYSTEM DESIGN
DEPT.COMPUTER SCIENCE
32
RISS TECHNOLOGIES
6. SYSTEM DESIGN
6.1 INTRODUCTION
System design provides an understanding of the procedural details, necessary for
implementing the system recommended in the feasibility study. Basically it is all about the creation
of a new system. This is a critical phase since it decides the quality of the system and as a major
impact on the testing and implementation phases.
System design consist of three major steps
Drawing of the expanded system data flow charts to identify all the processing
functions required.
The allocation of the equipment and the software to be used.
The identification of the test requirements for the system.
Characteristics of Design
A design should exhibit a hierarchical organization that makes intelligent use of control
among components of the software.
DEPT.COMPUTER SCIENCE
33
RISS TECHNOLOGIES
In input design the administrator checks that the entered data is valid or not. If the data is
valid, administrator adds data into the database otherwise rejects the data. When a registered user
login into the system, the system checks that whether the user is registered or not and if registered,
then it permits to edit his profile.
DEPT.COMPUTER SCIENCE
34
RISS TECHNOLOGIES
Performance
The design should be done in a way the information stored in the database can retrieved
quickly whenever necessary. The general theme behind a database is to handle information as an
interfered whole. A database is a collection of interrelated data stored with minimum redundancy
to serve users quickly and efficiently. Database design runs parallel without application design. As
we collect information about what is to be done, we will obviously collect information about data
need to entered, stored messages and printed reports. The designing of database is done outmost
care and security during the designing phase of the system. Special care was taken to develop
minimum number of database for the maximum efficiency of the system.
DATA INTEGRITY AND CONSTRAINTS
In this project data security, data validation checking methods are applied using a password
authentication Generally the access to the whole system can be provided only if given user id and
password as authorized otherwise, an error message box is displayed once user gives correct
password he is authenticated and hence permitted to get in to the master form. Data integrity refers
to the process of ensuring that a database remains an accurate reflection of the universe of discourse
it is modeling or representing in In other words there is a close correspondence between the facts
stored in the database and the real world it models data integrity is normally enforced in a database
system by a series of integrity constraints or rules. Three types of integrity constraints are an
inherent part of the relational data model, entity integrity, referential integrity and domain
integrity. Entity integrity the concept of a primary key. Entity integrity is integrity rule which
status that every table must have a primary key and that the column or columns chosen to be the
primary key should be unique and not null. Referential integrity concerns the concept of a foreign
key.
The referential integrity rules states that any foreign key value can only be in one of two
states Domain integrity specifies that all columns in relational database must be declared upon a
defined domain.
A constraint is a property assigned to a column or the set of columns in a table that prevents
certain type of inconsistent data values from being placed in the column Constraints are used to
enforce the data integrity. This ensures the accuracy and reliability of the data in the database.
DEPT.COMPUTER SCIENCE
35
RISS TECHNOLOGIES
A PRIMARY KEY constraint is a unique identifier for a row within database. Every a
table should have a constraint to uniquely identify each row and only one primary key constraint
can be created for each table. A UNIQUE constraint enforces the uniqueness of the value in a set
of columns, so no duplicate values are entered. The unique key constraints are used to enforce
entity integrity as the primary key constraint.
A FOREIGN KEY constraint prevents any action that would destroy link between tables
with the corresponding data values. A CHECK constraint is used to limit the values that can be
placed in a column. The check constraint are used to enforce domain integrity A NOT NULL
constraint enforces that column will not accept null value. The not null constraint are used to
enforce domain integrity, as the check constraints
NORMALIZATION
The process of normalization is concerned with the transformation of the conceptual
scheme to a computer represent able form. Normalization reduces the redundancies and anomalies
The First Normal Form
First normal form does not allow multivalued and composite valued attributes. It states
that the domain of an attribute must include only atomic values and that value of any attribute in a
tuple must be single value from the domain of that attribute
The second Normal Form
In second normal form, for relation where primary key contains multiple attributes, nonkey attributes should be functionally dependent on a part of the primary key.
Third Normal Form
In third normal form, relation should not have a non-key attribute functionally determined
by another non-key attribute. That is there should be no transitive dependency of a non-key
attribute on the primary key. DE design is required to manage large bodies of information. The
management involves both the definition of the structure of storage of information and provisions
of mechanism for the manipulation of information.
DEPT.COMPUTER SCIENCE
36
RISS TECHNOLOGIES
Fields
datatype
Userid
int
Uname
Varchar(30)
Password
Varchar(30)
usertype
Varchar(30)
DEPT.COMPUTER SCIENCE
37
RISS TECHNOLOGIES
Fields
Staffid
Datatype
Int
Fname
Varchar(30)
Lname
Varchar(30)
House
Varchar(30)
Place
Varchar(30)
District
Varchar(30)
Pincode
Varchar(30)
Dob
Varchar(30)
Designation
Varchar(30)
Dept
Varchar(30)
Qualification
Varchar(30)
Doj
Varchar(30)
Varchar(30)
Phone
Varchar(30)
DEPT.COMPUTER SCIENCE
38
RISS TECHNOLOGIES
Datatype
Int
Name
Varchar(30)
Datatype
Int
Dname
Varchar(30)
Catgid
Varchar(30)
Datatype
Int
title
Varchar(30)
Author
Varchar(30)
Publish_date
Varchar(30)
Category
Varchar(30)
Prize
Varchar(30)
Status
Varchar(30)
DEPT.COMPUTER SCIENCE
39
RISS TECHNOLOGIES
Datatype
Int
Name
Varchar(30)
Price
Varchar(30)
Did
Varchar(30)
staffid
Varchar(30)
Datatype
Int
Name
Varchar(30)
Block
Varchar(30)
Datatype
Int
Name
Varchar(30)
Category
Varchar(30)
DEPT.COMPUTER SCIENCE
40
RISS TECHNOLOGIES
Datatype
Int
Sub_name
Varchar(40)
Datatype
Int
Itemid
Int
Staffid
Int
Description
Varchar(500)
Status
Varchar(30)
Catgid
Varchar(30)
Type
Varchar(30)
Qty
Varchar(30)
Date
Varchar(30)
DEPT.COMPUTER SCIENCE
41
RISS TECHNOLOGIES
Datatype
Int
Storied
Varchar(20)
Catgid
Varchar(20)
Did
Varchar(20)
Itemid
Varchar(20)
Qty
Varchar(20)
datatype
int
Shelf_id
Int
Book_id
int
DEPT.COMPUTER SCIENCE
42
RISS TECHNOLOGIES
Datatype
int
Notification
Varchar(30)
Date
Varchar(30)
Datatype
Int
Complaint
Varchar(500)
Stafftype
Varchar(30)
Staffid
Varchar(30)
Date
Varchar(30)
Reply
Varchar(500)
DEPT.COMPUTER SCIENCE
43
RISS TECHNOLOGIES
The name of the data stores, sources and destination are written in uppercase
DEPT.COMPUTER SCIENCE
44
RISS TECHNOLOGIES
that are duplicated, and that the data stores, if implemented as set of database tables, would
constitute an un-normalized relational database. In contrast, a logical DFD attempts to capture the
dataflow aspects of a system in a form that has neither redundancy nor duplication
DEPT.COMPUTER SCIENCE
45
RISS TECHNOLOGIES
Level-0
DEPT.COMPUTER SCIENCE
46
RISS TECHNOLOGIES
Level-1 Admin
DEPT.COMPUTER SCIENCE
47
RISS TECHNOLOGIES
Level-1.1
DEPT.COMPUTER SCIENCE
48
RISS TECHNOLOGIES
Level-1.2
DEPT.COMPUTER SCIENCE
49
RISS TECHNOLOGIES
Level-1.3
DEPT.COMPUTER SCIENCE
50
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
51
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
52
RISS TECHNOLOGIES
SYSTEM TESTING
DEPT.COMPUTER SCIENCE
53
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
54
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
55
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
56
RISS TECHNOLOGIES
SYSTEM TESTING
DEPT.COMPUTER SCIENCE
57
RISS TECHNOLOGIES
7. SYSTEM TESTING
7.1 INTRODUCTION
Testing is a process of executing a program with intend of finding an error. Software testing
is critical element of software quality assurance and represents the ultimate review or specification,
design and coding. Testing includes verification of the basic logic of each program and verification
that the entire system works properly. Testing demonstrates that software function appear to be
working according to specification. In addition, data collected as testing is conducted provided a
good indication of software quality as while. The debugging process is the most unpredictable part
of testing process.
Testing begins at the module level and works towards the integration of the entire computer
based system testing and debugging are different activities, but any testing includes debugging
strategy for software testing must accommodate low level tests that are necessary to verify that a
small source code segment has been currently implemented as well as high level tests that validate
major system function, against customer requirements. No testing is complete without verification
and validation part.
The goals of verification and validation activities are to access and improve the quality of
work products generated during the development and modification of the software. There are two
types of verification: life cycle verification and formal verification. Life cycle verification is the
process of determining the degree to which the products of the given phase of the development
cycle fulfil the specification established during the prior process. Formal verification is the
rigorous mathematical demonstration that source code confirms to its specification. Validation is
a process of evaluating software at the end of its specification and the software development
process to determine compilation with the requirements.
Software testing is a critical element of software quality assurance and represents the
ultimate review of specification, design and code generation. The primary objectives, when we
test the software are the following.
Testing is a process of exceeding with intend of finding an error.
DEPT.COMPUTER SCIENCE
58
RISS TECHNOLOGIES
A good test case is one that has a high probability of finding an undiscovered error.
A successful test is one that uncovers undiscovered error
Software testing determines the correctness, completeness, and quality of software being
developed. Validation refers to the process of checking that the developed software meets the
requirements specified by the user. The activities involved in the testing phase basically evaluate
the capability of that system meets its requirements. The main objective of software testing is to
detect errors in the software. Errors occur if some part of the developed system is found to be
incorrect, incomplete or inconsistent. Test techniques include, but are not limited to, the process
of executing a program or application with the intent of finding software bugs (errors or other
defects).It involves the execution of a software component or system to evaluate one or more
properties of interest. In general, these properties indicate the extent to which the component or
system under test:
is sufficiently usable,
DEPT.COMPUTER SCIENCE
59
RISS TECHNOLOGIES
all software testing uses some strategy to select tests that are feasible for the available time and
resources. As a result, software testing typically (but not exclusively) attempts to execute a
program or application with the intent of finding software bugs (errors or other defects).Software
testing can provide objective, independent information about the quality of software and risk of its
failure to users and/or sponsors. Software testing can be conducted as soon as executable software
(even if partially complete) exists. The overall approach to software development often determines
when and how testing is conducted. For example, in a phased process, most testing occurs after
system requirements have been defined and then implemented in testable programs. In contrast,
under an Agile approach, requirements, programming, and testing are often done concurrently.
Thus, testing plays a very critical role in determining the reliability and efficiency of the
software and hence is very important stage in software development. There are to be conducted on
the software evaluate its performance under a number of conditions. Ideally, it should so at the
level of each module and also when all of them are integrated to form the completed system
used
to
design
test
cases.
White-box
testing
can
be
applied
at
the unit, integration and system levels of the software testing process. Although traditional testers
DEPT.COMPUTER SCIENCE
60
RISS TECHNOLOGIES
tended to think of white-box testing as being done at the unit level, it is used for integration and
system testing more frequently today. It can test paths within a unit, paths between units during
integration, and between subsystems during a systemlevel test. Though this method of test design
can uncover many errors or problems, it has the potential to miss unimplemented parts of the
specification or missing requirements. The details entered by the administrator are saved and
stored in the database, and testing is done to verify whether the control of each form or action is
working in the exact way.
Using white-box testing methods, the software engineer can derive the test cases that
Guarantee that all independent paths within a module have been exercised at least once.
Execute all loops at their boundaries and within their operational bounds.
DEPT.COMPUTER SCIENCE
61
RISS TECHNOLOGIES
Interface errors.
DEPT.COMPUTER SCIENCE
62
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
63
RISS TECHNOLOGIES
SYSTEM MAINTANANCE
DEPT.COMPUTER SCIENCE
64
RISS TECHNOLOGIES
8. SYSTEM MAINTANANCE
8.1 SYSTEM MAINTANANCE
A process of modifying a software system or component after delivery to correct faults, to
improve performance is known as software maintenance. A common perception of maintenance
is that it merely involves fixing defects. However, one study indicated that the majority, over 80%,
of the maintenance effort is used for non-corrective actions. Software maintenance is a very broad
activity that includes error correction, enhancements of capabilities, deletion of obsolete
capabilities, and optimization. Because change is inevitable, mechanisms must be developed for
evaluation, controlling and making modifications. So any work done to change the software after
it is in operation is considered to be maintenance work. The purpose is to preserve the value of
software over the time. The value can be enhanced by expanding the customer base, meeting
additional requirements, becoming easier to use, more efficient and employing newer technology.
Maintenance may span for 20 years, whereas development may be 1-2 years.
Corrective maintenance is done to repair the faults or defects found in day to day system
functions, that is software design, logic and coding errors. Adaptive maintenance is the
implementation of changes in a part of the system which has been affected by changes that
occurred in some other part of the system. The objective of perspective maintenance should be to
prevent failures and optimize the software. Minor adaptive changes should be handled by normal
maintenance process. Major adaptive changes should be carried out as a separate development
project.
DEPT.COMPUTER SCIENCE
65
RISS TECHNOLOGIES
SYSTEM SECURITY
DEPT.COMPUTER SCIENCE
66
RISS TECHNOLOGIES
9. SYSTEM SECURITY
9.1 SYSTEM SECURITY
System security is a branch of technology known as information security as applied to
computers and networks. The objective of system security includes protection of information and
property from theft, corruption, or natural disaster, while allowing the information and property to
remain accessible and productive to its intended users. The terms system security, means the
collective processes and mechanisms by which sensitive and valuable information and services are
protected from publication, tampering or collapse by unauthorized activities or untrustworthy
individuals and unplanned events respectively. The technologies of system security are based on
logic. As security is not necessarily the primary goal of most computer applications, designing a
program with security in mind often imposes restrictions on that program's behaviour. Internet is
a part of everyday life, web applications are an essential component of every business activity.
Customers and trading partners expect fast, accurate and secure applications with robust
functionality. Companies want sites that are easy to maintain and update, yet cost effective.
Auditors and security officers want to ensure that the web applications are controlled and that there
is strong data integrity. All of these requirements need to be blended to ensure that each web
application meets the companys goals, satisfies the customers
Any system developed should be secured and protected against possible hazards. Security
measures are provided to prevent unauthorized access of various levels. An uninterrupted supply
should be provided, so that the power failure or voltage fluctuations will not erase the data in the
files or database. Data security is the practice of keeping data protected from corruption and
unauthorized access. The focus behind data security is to ensure privacy while protecting personal
or corporate data. Data is the raw form of information stored as columns and rows in our database,
network servers and personal computers. Authorization ensures that the logged-in user is allowed
to use a page or perform an operation. Authorization is typically based on one or more roles
(sometimes called groups) to which the user belongs. Password protection and simple procedure
to hide their personal data are provided to the users as a part of the security objectives. The system
allows the users to use the app only after signing in using their username and password provided
during registration.
DEPT.COMPUTER SCIENCE
67
RISS TECHNOLOGIES
The admin is well protected by a password and username since all services are controlled
by the admin, any intrusion in to the admin can cause damage or a failure in the system. The user
can only access the service but cant modify any. Each user is treated individually and cant
interrupt to the details of another user account and make changes or modifications hence the
activity of each single user is well protected and secured
DEPT.COMPUTER SCIENCE
68
RISS TECHNOLOGIES
SYSTEM IMPLEMENTATION
DEPT.COMPUTER SCIENCE
69
RISS TECHNOLOGIES
careful planning
DEPT.COMPUTER SCIENCE
70
RISS TECHNOLOGIES
CONCLUSION
DEPT.COMPUTER SCIENCE
71
RISS TECHNOLOGIES
CONCLUSION
The various process of the construction of proposed system has all been completed. With
the different aspects of a system falling in place one by one, the final threshold of the system has
been crossed. The entire process was not meant to be a simple solution to the problem that was
proposed.
There is no doubt in ones mind that there is room for improvement. Many other reports
can be produced and new variations can be drawn up .This is also meant to be the foundation stone
for something that scales the largest pinnacles of excellence.
DEPT.COMPUTER SCIENCE
72
RISS TECHNOLOGIES
BIBILOGRAPHY
DEPT.COMPUTER SCIENCE
73
RISS TECHNOLOGIES
BIBILIOGRAPHY
Books
(1) Rohit Khuranna , Software Engineering Principles and practices
(2) Ivan Sommerville, Software Engineering, Pearson, 3rd Edition, 2006.
(3) Herbert Schildt, Java The Complete Reference, 7th Edition, McGraw Hill.
(4) Rob Vieira,Professional Microsoft SQL Server 2008 Programming
Publications.
Websites
(1) Wikipedia
(2) http://www.java2s.com/tutorial/java/MakeDatabaseconnection
DEPT.COMPUTER SCIENCE
74
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
75
RISS TECHNOLOGIES
Staff Registration
<%
if(request.getParameter("button")!=null)
{
String fname=request.getParameter("fname");
String lname=request.getParameter("lname");
String hname=request.getParameter("hname");
String place=request.getParameter("place");
String dist=request.getParameter("dist");
String pin=request.getParameter("pin");
String dob=request.getParameter("dob");
String desg=request.getParameter("des");
String dep=request.getParameter("dep");
String qual=request.getParameter("qual");
String yj=request.getParameter("yearj");
String email=request.getParameter("email");
String phnum=request.getParameter("phnum");
RandomPassword r=new RandomPassword();
String pwd=r.randomAlphaNumeric(6);
sendmail sm=new sendmail();
String msg="Your Password is '"+pwd+"'";
sm.send(email, msg, "Password");
DEPT.COMPUTER SCIENCE
76
RISS TECHNOLOGIES
String str2="select userid from login order by userid desc limit 1";
ResultSet rs=st.executeQuery(str2);
String id="";
while(rs.next())
{
id=rs.getString(1);
}
String str="insert into
staff(staffid,fname,lname,house,place,district,pincode,dob,designation,dept,qualification,doj,email,pho
ne) values
('"+id+"','"+fname+"','"+lname+"','"+hname+"','"+place+"','"+dist+"','"+pin+"','"+dob+"','"+desg+"','"+dep
+"','"+qual+"','"+yj+"','"+email+"','"+phnum+"')";
int i=st.executeUpdate(str);
if(i>0)
{
%>
<script>
alert("Success!!!");
window.location("staffRegistration.jsp");
</script>
<%
}
}
%>
DEPT.COMPUTER SCIENCE
77
RISS TECHNOLOGIES
Staff Details
<%
Dbcon d=new Dbcon();
Connection con =d.getc();
Statement st=con.createStatement();
String str="select staff.*,dept.dname from staff,dept where staff.dept=dept.did order by fname ";
ResultSet rs=st.executeQuery(str);
int i=1;
while(rs.next())
{
String f=rs.getString("fname");
String l=rs.getString("lname");
String name=f+" "+l;
%>
<tr>
<td><%=i%></td>
<td><%=name%></td>
<td><%=rs.getString("house")%></td>
<td><%=rs.getString("place")%></td>
<td><%=rs.getString("district")%></td>
<td><%=rs.getString("pincode")%></td>
<td><%=rs.getString("dob")%></td>
<td><%=rs.getString("designation")%></td>
<td><%=rs.getString("dname")%></td>
<td><%=rs.getString("qualification")%></td>
DEPT.COMPUTER SCIENCE
78
RISS TECHNOLOGIES
<td><%=rs.getString("doj")%></td>
<td><%=rs.getString("email")%></td>
<td><%=rs.getString("phone")%></td>
<td><a href="updateStaff.jsp?id=<%=rs.getInt("staffid")%>">Edit</a></td>
<td><a href="deleteStaff.jsp?id=<%=rs.getInt("staffid")%>" onclick="return window.confirm('Do you
want to delete?')">Delete</a></td>
</tr><%i++;
}%>
</table>
Staff Registration
<%
if(request.getParameter("button")!=null)
{
String fname=request.getParameter("fname");
String lname=request.getParameter("lname");
String hname=request.getParameter("hname");
String place=request.getParameter("place");
String dist=request.getParameter("dist");
String pin=request.getParameter("pin");
String dob=request.getParameter("dob");
String desg=request.getParameter("des");
String dep=request.getParameter("dep");
String qual=request.getParameter("qual");
String yj=request.getParameter("yearj");
String email=request.getParameter("email");
DEPT.COMPUTER SCIENCE
79
RISS TECHNOLOGIES
String phnum=request.getParameter("phnum");
RandomPassword r=new RandomPassword();
String pwd=r.randomAlphaNumeric(6);
sendmail sm=new sendmail();
String msg="Your Password is '"+pwd+"'";
sm.send(email, msg, "Password");
DEPT.COMPUTER SCIENCE
80
RISS TECHNOLOGIES
window.location("staffRegistration.jsp");
</script>
<%
}
}
%>
Staff Details
<%
Dbcon d=new Dbcon();
Connection con =d.getc();
Statement st=con.createStatement();
String str="select staff.*,dept.dname from staff,dept where staff.dept=dept.did order by fname ";
ResultSet rs=st.executeQuery(str);
int i=1;
while(rs.next())
{
String f=rs.getString("fname");
String l=rs.getString("lname");
String name=f+" "+l;
%>
<tr>
<td><%=i%></td>
<td><%=name%></td>
<td><%=rs.getString("house")%></td>
DEPT.COMPUTER SCIENCE
81
RISS TECHNOLOGIES
<td><%=rs.getString("place")%></td>
<td><%=rs.getString("district")%></td>
<td><%=rs.getString("pincode")%></td>
<td><%=rs.getString("dob")%></td>
<td><%=rs.getString("designation")%></td>
<td><%=rs.getString("dname")%></td>
<td><%=rs.getString("qualification")%></td>
<td><%=rs.getString("doj")%></td>
<td><%=rs.getString("email")%></td>
<td><%=rs.getString("phone")%></td>
<td><a href="updateStaff.jsp?id=<%=rs.getInt("staffid")%>">Edit</a></td>
<td><a href="deleteStaff.jsp?id=<%=rs.getInt("staffid")%>" onclick="return window.confirm('Do you
want to delete?')">Delete</a></td>
</tr><%i++;
}%>
</table>
Library Request
<%
if(request.getParameter("Submit")!=null)
{
String bkid=request.getParameter("title");
String desc=request.getParameter("textarea");
String qty=request.getParameter("qty");
String str="insert into request(itemid,staffid,description,status,catgid,type,qty,date)
values('"+bkid+"','"+id+"','"+desc+"','Waiting','2','"+dep+"','"+qty+"',curdate())";
DEPT.COMPUTER SCIENCE
82
RISS TECHNOLOGIES
int i=st.executeUpdate(str);
if(i>0)
{
%>
<script>
alert("Send!!!");
window.location("requestLibrary.jsp");
</script>
<%
}
}
%>
Lab Request
<%
if(request.getParameter("button")!=null)
{
String item=request.getParameter("item");
String desc=request.getParameter("textarea");
String qty=request.getParameter("qty");
String str1="insert into request(itemid,staffid,description,status,catgid,type,qty,date)
values('"+item+"','"+id+"','"+desc+"','Waiting','1','"+dep+"','"+qty+"',curdate())";
int i=st.executeUpdate(str1);
if(i>0)
{
DEPT.COMPUTER SCIENCE
83
RISS TECHNOLOGIES
%>
<script>
alert("Send!!!");
window.location("request.jsp");
</script>
<%
}
}
%>
View Request
<%
Dbcon d=new Dbcon();
Connection con=d.getc();
Statement st =con.createStatement();
Statement st1=con.createStatement();
String str="select distinct catgid from request";
String type="";
String f="";
String l="";
String n="";
int i=1;
ResultSet rs=st.executeQuery(str);
while(rs.next())
{
DEPT.COMPUTER SCIENCE
84
RISS TECHNOLOGIES
type=rs.getString("catgid");
if((type.equals("1")))
{
String str1="select request.requestid,
request.date,staff.fname,staff.lname,dept.dname,item.name,request.description,request.qty from
request,staff,dept,item where request.itemid=item.itemid and request.status='Waiting' and
request.staffid=staff.staffid and request.catgid='1' and request.type=dept.did";
ResultSet rs1=st1.executeQuery(str1);
while(rs1.next())
{
f=rs1.getString("fname");
l=rs1.getString("lname");
n=f+" "+l;
%>
<tr>
<td height="34"><%=i%></td>
<td><%=rs1.getString("date")%></td>
<td><%=n%></td>
<td><%=rs1.getString("dname")%></td>
<td><%=rs1.getString(6)%></td>
<td><%=rs1.getString("description")%></td>
<td><%=rs1.getString("qty")%></td>
<td><a href="reqForward.jsp?id=<%=rs1.getString("requestid")%>">Click here to forward</a></td>
</tr><%
i++;
DEPT.COMPUTER SCIENCE
85
RISS TECHNOLOGIES
}}
if(type.equals("2"))
{
String str2="select request.requestid,
request.date,staff.fname,staff.lname,dept.dname,book_entry.title,request.description,request.qty from
request,staff,dept,book_entry where request.itemid=book_entry.bookid and request.status='Waiting'
and request.staffid=staff.staffid and request.catgid='2' and request.type=dept.did";
ResultSet rs2=st1.executeQuery(str2);
while(rs2.next())
{
f=rs2.getString("fname");
l=rs2.getString("lname");
n=f+" "+l;
%>
<tr>
<td height="34"><%=i%></td>
<td><%=rs2.getString("date")%></td>
<td><%=n%></td>
<td><%=rs2.getString("dname")%></td>
<td><%=rs2.getString(6)%></td>
<td><%=rs2.getString("description")%></td>
<td><%=rs2.getString("qty")%></td>
<td><a href="reqForward.jsp?id=<%=rs2.getString("requestid")%>">Click here to forward</a></td>
</tr><%
i++;
}}}%>
</table>
DEPT.COMPUTER SCIENCE
86
RISS TECHNOLOGIES
Update Stock
<%
if(request.getParameter("button")!=null)
{
String sid=request.getParameter("store");
String did=request.getParameter("hide1");
String iid=request.getParameter("hide2");
String qty=request.getParameter("qty");
String s="insert into stock (storeid,catgid,did,itemid,qty)
values('"+sid+"','"+t+"','"+did+"','"+iid+"','"+qty+"')";
String s1="update request set status='Stock Updated' where requestid='"+rid+"' ";
int i=st.executeUpdate(s);
st.executeUpdate(s1);
if(did.equals("4"))
{
String s2="update book_entry set status='Available' where bookid='"+iid+"' ";
st.executeUpdate(s2);
}
if(i>0)
{
response.sendRedirect("requestUpdate.jsp");
}
}
%>
DEPT.COMPUTER SCIENCE
87
RISS TECHNOLOGIES
Store Details
<%
Dbcon d=new Dbcon();
Connection con =d.getc();
Statement st=con.createStatement();
String str="select * from store";
ResultSet rs=st.executeQuery(str);
int i=1;
while(rs.next())
{
%>
<tr>
<td height="34"><%=i%></td>
<td><%=rs.getString("name")%></td>
<td><%=rs.getString("block")%></td>
<td><a href="updateStore.jsp?id=<%=rs.getInt("storeid")%>">edit</a></td>
<td><a href="deleteStore.jsp?id=<%=rs.getInt("storeid")%>" onclick="return window.confirm('Do
you want to delete ?')">delete</a></td>
</tr><%i++; }%>
</table>
Complaint
<%
if(request.getParameter("button")!=null)
{
String id=session.getAttribute("lid").toString();
DEPT.COMPUTER SCIENCE
88
RISS TECHNOLOGIES
String comp=request.getParameter("textarea");
String str="select * from staff where staffid='"+id+"' ";
String desg="";
int sid=0;
ResultSet rs=st.executeQuery(str);
if(rs.next())
{
desg=rs.getString("designation");
sid=rs.getInt("staffid");
}
String str1="insert into complaint(complaint,stafftype,staffid,date,reply)
values('"+comp+"','"+desg+"','"+sid+"',curdate(),'Pending')";
int i=st.executeUpdate(str1);
if(i>0)
{
response.sendRedirect("addComplaint.jsp");
}
}
%>
Request of Lab assistant
<%
if(request.getParameter("Submit")!=null)
{
String bkid=request.getParameter("title");
String desc=request.getParameter("textarea");
String qty=request.getParameter("qty");
DEPT.COMPUTER SCIENCE
89
RISS TECHNOLOGIES
}
%>
DEPT.COMPUTER SCIENCE
90
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
91
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
92
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
93
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
94
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
95
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
96
RISS TECHNOLOGIES
DEPT.COMPUTER SCIENCE
97
RISS TECHNOLOGIES