Professional Documents
Culture Documents
CHAPTER 1
INTRODUCTION
Information technology touches every aspect of our daily lives and it has various
applications in our society. To survive this combination hungry world we need rapid and timely
access to information. IT is the dominant partner in households, business, education, science and
technology and entertainments. The computerized system presents a wide array of attractive
features by increasing the reliability, accuracy and the speed of data retrieval. It lets the
beneficiaries get hold of speedy information in a world in which every second count.
Low rank and sparse representation based methods, which make few specific
assumptions about the background, have recently attracted wide attention in background
modeling. With these methods, moving objects in the scene are modeled as pixel-wised sparse
outliers. However, in many practical scenarios, the distributions of these moving parts are not
truly pixel-wised sparse but structurally sparse. Meanwhile a robust analysis mechanism is
required to handle background regions or foreground movements with varying scales. Based on
these two observations, we first introduce a class of structured sparsity inducing norms to model
moving objects in videos. In our approach, we regard the observed sequence as being constituted
of two terms, a low-rank matrix (background) and a structured sparse outlier matrix
(foreground). Next, in virtue of adaptive parameters for dynamic videos, we propose a saliency
measurement to dynamically estimate the support of the foreground. Experiments on challenging
well known data-sets demonstrate that the proposed approach outperforms the state-of-the-art
methods and works effectively on a wide range of complex videos.
1.2. OBJECTIVES
CHAPTER 2
SYSTEM ANALYSIS
System is a combination of resources working together to produce use for output. Process
is moved through a series of phases to produce output. System analysis is the first phase in the
creation of computer based system. First existing system is studied. The problems are identified
and alternative solutions are made. The initial investigation was conducted to identify the real
problem of existing system. The purpose initial investigation is to determine whether an
alternative solution is possible. A feasibility analysis is conducted to select the best system that
needs the performance requirements. The basic requirements for the system were analyzed and
the following facilities are essential for developing the system, because the dependability of the
system depends on the underlying operating system support. An efficient language is necessary
so that coding can be done more easily and more flexibly.
In the existing system we can see the details of the student body of the college and can
be edited if necessary.
2.1.1. Drawbacks
To avoid all these limitations and make the working more accurately the system needs
to be computerized.
The aim of proposed system is to develop a system of improved facilities. The proposed
system can overcome all the limitations of the existing system. The system provides proper
security and reduces the manual work. The existing system has several disadvantages and many
more difficulties to work well. The proposed system tries to eliminate or reduce these
difficulties up to some extent. The proposed system will help the user to reduce the workload
and mental conflict. The proposed system helps the user to work user friendly and he can easily
do his jobs without time lagging.
The system is very simple in design and to implement. The system requires very low
system resources and the system will work in almost all configurations. It has got following
features.
2.2.1. Advantages
Feasibility study is a test of a system proposal, according to its workability, impact on the
organization, ability to meet the user needs and effective use of resources. Thus when a new
application is proposed, it normally goes through a feasibility study before it goes for
development. The main objective of feasibility study is not solving the problem but to acquire a
sense of its scope. During the study, the problem definition is crystallized and aspects of the
problem to be included in the system are determined. Every project is feasible, given unlimited
resources and infinite time. It is both necessary and prudent to evaluate the project at the earliest
possible time. So a detailed study is carried out to check the workability of the system.
The result of feasibility is a formal proposal. This is simply a document detailing the nature
and scope of the proposed solution. The proposal summarizes what is known and what is going
to be done.
Operational feasibility
Technical feasibility
Economic feasibility
Economical analysis system is the most frequently used method for evaluating the
effectiveness of the candidate system. It is more commonly known as cost/benefit and saving
that are expected from the candidate system and compare them with costs. It benefits outweigh
costs; the decision is made to design and implement the system. Otherwise, further justification
or alteration in the proposed system will have to be made if it is having a chance of being
approved.
Proposed projects are beneficial only if they can be turned into information system that
will meet the operating requirements of the organization. This test of feasibility asks if the
system will work when it is developed and installed. Some of the important questions that are
useful to test the operational feasibility of a project can be given below:
Is there sufficient support for the project from the management? From users? If the
present system is well liked and used to extent that the persons will not able to see
reasons for a change, there may be resistance.
Are current business methods acceptable to the users? If they are not? Users may
welcome a change that will bring about a more operational and useful system.
Are the users been involved in the planning and development of the project? If they
are involved at the earlier stage of the project developed, the changes of resistance
can be possibly reduced.
Issues that appear to be quite minor at the earlier stage can grow into major problems
after implementation. Therefore, it is always advisable to consider operational aspects
carefully.
With regard to the processing facilities, the feasibility study will need to consider the
possibility of using a bureau or, if in-house equipment is available the nature of the hardware to
be used for data collection, storage output and processing. On this system development side, the
feasibility study must consider the various ways of acquiring the system.
These include the purchase of the package the use of consultancy organization or software
house to design the system and write the programs. There are a number of technical
issues, which are generally raised during the feasibility stage of the investigation .they are as
follows:
CHAPTER 3
SYSTEM SPECIFICATION
Hardware and software requirements for the installation and smooth functioning of this
product could be configured based on the requirements needed by the component of the
operating environment that works as front-end system here we suggest minimum configuration
for the both hardware and software components.
Hardware Requirements
Software Requirements
Hard disk : 2 GB
CHAPTER 4
SOFTWARE DESCRIPTION
PHP started out as a small open source project that evolved as more and more
people found out how useful it was. Rasmus Lerdorf unleashed the first version of PHP
way back in 1994.
PHP is a recursive acronym for "PHP: Hypertext Preprocessor".
PHP is a server side scripting language that is embedded in HTML. It is used to manage
dynamic content, databases, session tracking, even build entire e-commerce sites.
It is integrated with a number of popular databases, including MySQL, PostgreSQL,
Oracle, Sybase, Informix, and Microsoft SQL Server.
PHP is pleasingly zippy in its execution, especially when compiled as an Apache module
on the Unix side. The MySQL server, once started, executes even very complex queries
with huge result sets in record-setting time.
PHP supports a large number of major protocols such as POP3, IMAP, and LDAP. PHP4
added support for Java and distributed object architectures (COM and CORBA), making
n-tier development a possibility for the first time.
PHP is forgiving: PHP language tries to be as forgiving as possible.
PHP Syntax is C-Like.
Common uses of PHP:
PHP performs system functions, i.e. from files on a system it can create, open, read,
write, and close them.
PHP can handle forms, i.e. gather data from files, save data to a file, thru email you can
send data, return data to the user.
You add, delete, modify elements within your database thru PHP.
Access cookies variables and set cookies.
Using PHP, you can restrict users to access some pages of your website.
It can encrypt data.
Characteristics of PHP
Five important characteristics make PHP's practical nature possible:
Simplicity
Efficiency
Security
Flexibility
Familiarity
PHP Variable Types
The main way to store information in the middle of a PHP program is by using a variable.
Here are the most important things to know about variables in PHP.
All variables in PHP are denoted with a leading dollar sign ($).
The value of a variable is the value of its most recent assignment.
Variables are assigned with the = operator, with the variable on the left-hand side and the
expression to be evaluated on the right.
Variables can, but do not need, to be declared before assignment.
Variables in PHP do not have intrinsic types - a variable does not know in advance
whether it will be used to store a number or a string of characters.
Variables used before they are assigned have default values.
PHP does a good job of automatically converting types from one to another when
necessary.
PHP variables are Perl-like.
PHP has a total of eight data types which we use to construct our variables:
Integers: are whole numbers, without a decimal point, like 4195.
Doubles: are floating-point numbers, like 3.14159 or 49.1.
Booleans: have only two possible values either true or false.
NULL: is a special type that only has one value: NULL.
Strings: are sequences of characters, like 'PHP supports string operations.'
Arrays: are named and indexed collections of other values.
Objects: are instances of programmer-defined classes, which can package up both other
kinds of values and functions that are specific to the class.
Resources: are special variables that hold references to resources external to PHP (such
as database connections).
SQL is a powerful manipulation language used by Visual Basic and the micro soft access
jet data base engine as the primary method for accessing the data in databases. SQL statements
fall into two broad categories:
DML statements are used to select, sort, summarize, and calculate the
Information stored in the data tables. DDL statements enable us to define data tables,
indexes and database relationships.
WHAT IS SQL?
SQL stand for Structured Query Language. It was developed in the 1970’s at IBM as a
way to provide computer users with a standardized method for selecting data from various data
bases format The intent was to build a language that was not based on any existing programming
language but could be used with any existing programming language as a way to update and
query information in databases. SQL statements are just those statements, each statement can
perform operation on one or more database objects (tables, columns indexes and so on). Most
SQL statements returns in the form of a set of data records commonly referred to as a view. SQL
is particularly friendly language. Many programs that use SQL statements hide these statements
behind point-and-click dialogs, Query-by-example; rids. And other user friendly interfaces .in
fact even when one accesses data stored in a relational database
SQL Statements
The SELECT FROM statement is used to pick records from one or more tables in a
database. The results of the SELECT-FROM statement are returned as a view. This view is a
subset of source data. In visual basic, the view can be returned as a record set, table, dynast, or
snap shot. In the simplest form a SELECT-FROM statement consist two parts:
To return all the columns from a table, List each select statement. This works if there are
few columns in the tables. If there are many column it can become quiet tedious. There is a short
cut. To automatically list all columns in the table in the result set instead of typing column names
type an asterisk (*). The asterisk tells SQL to return all columns in the requested tables.
By using select from statement the records returned in the result set are returned in the
order in which they are found in the under lying table to display the result of the SELECT
FROM statements in a specialized sorted order use the ORDER BY clause. Placing ASC or
DESC after each field in the ORDER BY clause indicate the order, in which the column is
sorted, ascending or descending. If no order is applied, SQL assumes ascending order.
One of the most powerful aspects of the SELECT-FROM statement is its capability to
control the content of the result set using WHERE clause. There are two ways to use the
WHERE clause to control the content of the result set:
Using WHERE to Limit the result set: the WHERE clause can enable one
To perform comparison on data in any column in the data table . In the simplest form the
WHERE clause consists the following: WHERE column=value. In this line, column represents
the name of the column in requested data tables; the value represents literal value such as NY or
Smith. The WHERE clause always proceeded by a SELECT FROM statement. Visual Basic
SQL also supports the use of BETWEEN AND, IN and LIKE comparisons. The following SQL
statement illustrate the use of BETWEEN AND in a WHERE clause.
CHAPTER 5
PROJECT DESCRIPTION
Student registration & fee management is for college which provides facility for
registering new admissions and dealing with their fee information. Currently all the works are
done manually and there may occur problem data insecurity and need more manpower, by
computerizing all the activities inside a college can be managed easily and effectively.
The project aims to develop software for fee management. What we have done
here is the computerization of the student registration with the objectives to handle the
information quickly and provide a better information environment for the student or staff who
approaches the system with their requirements. This software provides high security by
preventing unauthorized accessing of data by providing login option.
This system deals with only one module called the ADMIN MODULE
The admin here indicates the administrator for our application. The admin has control
over the entire activity. The Administrator has the power to register and cancel student. He can
view all the activities. The admin has the provision to verify overall functionalities of Student
registration & fee details system. The major functions of admin are:
Registering student
Fee management
Addition of new department
Updation of fee structure
A data flow diagram should be the first tool used by the system analyst to model system
components. These components are the system process, data used by this process, any external
entities that interact with the system and the information flows in the system. DFD is used as a
way of expressing system requirements in a graphical form. The DFD is one the most important
tool used by the system modular design. Creation of DFD is a starting point of design phase that
functionally decompose the requirement specification down to lowest level of details.
DFD’s are used to describe how the system transforms information. They define how
information is processed and stored and identify how the information flows through the
processes.
Process
Data flow
Source
Database
CHAPTER 6
SYSTEM TESTING
Test Plan
The Software Test Plan describes plans for qualification testing of Computer Software
configuration Items and software systems. It describes the Software test environment to be used
for the testing, identifies the test to performed, and provides schedules for test activities.
Testing strategy
The overall strategy for Software testing is described in the following section. We will use
four different methods to test our software.
In unit testing, the analyst tests the programs making up a system. This is also called program
testing. The software units that make up the system are modules and the routines, which are
assembled and integrated to perform a specific function in a large system. Many modules at
different levels are needed. Unit testing, independent of one another, focuses on modules to
locate error. This enables the tester to detect error in coding and logic that are contained within
that module alone. Those resulting from the interaction between modules are initially avoided.
Unit Test comprises the test of performed prior to integration of the unit into the entire project.
Four categories of test are performed on each unit.
Functional Test
The code is exercised with nominal input values for which the expected results are shown, as
well as boundary values (Minimum values, Maximum values) and values on and just outside the
functional boundaries and special values such as logically related inputs.
Performance Test
Performance test is done to determine the amount of execution time spent in various parts
of the unit, program throughput, and response time and device utilization by the program unit.
Some time is taken initially to link to the SQL.
Stress Test
CE Vadakara Page 25 Department of CSE
Mini Project Report 2015 Student Registration & Fee Management
Stress Test has been done to intentionally break the unit. This helps in the learning about
the strength and limitations of the program by examining the manner in which a program unit
breaks.
Structure Test
Structure test are done to test the internal logic of a program and traversing particular
exercise, deriving test data to exercise those paths, determining the test coverage criteria to be
used.
After the developers complete the system testing successfully acceptance testing is done at
the customer end. It is the customer or the end user who knows designs the test cases. In this type
of testing emphasis is on the usability of the product. Acceptance testing is supported through
alpha and beta testing. Alpha testing is done when the software is made operational for the first
time to be tested by the users at developer’s site. Hence it is possible that it will involve making
lot of changes to program code. Beta testing follows alpha testing but now the testing is done at
the customer’s site that validates the product after using it for few days. At this stage few
changes as compared to alpha testing would make to the product.
The evaluation of test cases is done through test case review. And for any review, a formal
document or work product is needed. This is the primary reason for having the test case
specification in the form of document. The test case specification document is reviewed, using a
formal review process, to make sure that the test cases are consistent with the policy specified in
the plan, satisfies the chosen criteria, and in general cover the various aspect of the unit to be
tested.
For this process, the reason for selecting the test case and the expected output are also
given in the test case specification document. By looking at the conditions being tested by the
test cases, the reviewer can check if all the important conditions are being tested. As conditions
can also be based on the output, by considering the expected output of the test cases it can also
be determined the production of all the different types of output the unit is supposed to produce
are being tested.
CHAPTER 7
SYSTEM IMPLEMENTATION
The implementation phase of a project covers the period from the acceptance of the tested
design to its satisfactory operations supported by the appropriate user and operations manual. It
is a major operation across the whole organizational structure and requires a great deal of
planning. The implementation plan involves the following:
CHAPTER 8
8.1. CONCLUSION
The following conclusion can be deduced from the development of the project.
Our project consist of only one user-administrator. Once a user register to the system, he or she
become registered user.
.A registered user can access any facility of the system. Also they can view needed
information. Newly implemented fee structure are also visible.
We are very much confident that the Software “Student Registration & Fee
Management” which we are going to develop will be a efficient and effective one. The package
was designed in such a way that future modifications can be done easily. It will also provide a
friendly graphical user interface. This project will provide much security. The simplicity and
friendliness are the advantages of this project. The Software will be user friendly to the
maximum so that registered admin can run the software with a login password. Updating of
information’s become so easier .System security; data security and reliability are the striking
features .The system has adequate scope for modification in future if it is necessary.
Nothing can be ended in a single step. It is the fact that nothing is permanent in
this world. So this project also has some future enhancements in the evergreen and booming IT
industry. Change is inevitable. In future we are look forward to working with the college
authority in implementing the recommendations and seeing and improvement in the
effectiveness of the college. It hopes that the recommendations are made in this report will
assist in changing the culture around partnership.
APPENDIX
CE Vadakara Page 29 Department of CSE
Mini Project Report 2015 Student Registration & Fee Management
SCREENSHOTS
FORM1: LOGIN PAGE
CODING
<?php
session_start();
include('connect.php');
include('loginHeader.php');
if(isset($_POST['login']))
{
$userName=$_POST['userName'];
$password=$_POST['password'];
$_SESSION['userName']=$row1['userName'];
header('location:home.php');
}
else
{
echo "<span style='color:red'>Incorrect User Name and
Password</span>";
}
?>
<script>
function valid()
{
flag=false;
userName=document.getElementById('userName').value; ///for first name
if(userName=="")
{
document.getElementById('u').innerHTML="You can't leave this empty.";
flag=true;
}
function clearbox(Element_id)
{
document.getElementById(Element_id).innerHTML="";
}
</script>
<tr>
<td>User Name</td>
<td><input type="text" name="userName" id="userName"
onfocus="clearbox('u')">
<div id="u" style="height:20px; width:200px;color:#FF0000;"></div></td>
</tr>
<tr>
<td>Password</td>
<td><input type="password" name="password" id="password"
onfocus="clearbox('p')"/>
<div id="p" style="height:20px; width:200px;color:#FF0000;"></div></td>
</tr>
<tr>
<td><input type="submit" name="login" id="login" value="Login" /></td>
</tr>
</table>
</form>
<?php
include('footer.php');
?>
<?php
$con=mysql_connect("localhost","root","");
$db=mysql_select_db("feemanagement");
?>
DEPARTMENT
<?php
include('connect.php');
include('header.php');
if(isset($_GET['delete']))
$deleteId=$_GET['delete'];
if($delete1)
else
if(isset($_POST['save']))
$deptName=$_POST['deptName'];
$flag=0;
while($row3=mysql_fetch_array($select3))
if($row3['deptName']==$deptName)
$flag=1;
break;
if($flag==0)
if($insert1)
else
?>
<script>
function editType()
return edit;
function deleteType()
return delet;
</script>
<script>
function valid()
flag=false;
if(deptName=="")
flag=true;
if(flag==true)
return false;
function clearbox(Element_id)
document.getElementById(Element_id).innerHTML="";
</script>
<div id="leftDiv">
<table align="center">
<tr>
</tr>
<tr>
<td>Department Name</td>
</tr>
<tr>
</td>
</tr>
</table>
</div>
<div id="rightDiv">
<tr>
<td>SlNo.</td>
<td>Department Name</td>
<td>Edit</td>
<td>Delete</td>
</tr>
<?php
$i=1;
while($row=mysql_fetch_array($select))
$id=$row['ID'];
?>
<tr>
</tr>
<?php } ?>
</table>
</div>
</form>
<?php
include('footer.php');
?>
HEADER
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Fee Management</title>
<meta name="keywords" content="Green Black, Free CSS Templates, Web Design" />
<meta name="description" content="Green Black - Download free CSS templates from templatemo.com"
/>
function clearText(field)
</script>
</head>
<body>
<div id="templatemo_container_wrapper">
<div id="templatemo_container">
<div id="templatemo_banner">
<div id="site_title">
</div>
<nav id="primary_nav_wrap">
<ul>
<li><a href="#">Registration</a>
<ul>
<li><a href="student.php">Student</a></li>
<li><a href="department.php">Department</a></li>
<li><a href="scheme.php">Scheme</a></li>
</ul>
</li>
<li><a href="#">Report</a>
<ul>
</ul>
</li>
<li><a href="#">Settings</a>
<ul>
<li><a href="changePassword.php">Change
Password</a></li>
</ul>
</li>
</ul>
<tr>
<td>Tution Fee:</td>
</tr>
<tr>
<td>Admission Fee:</td>
</tr>
<tr>
<td>Special Fee:</td>
</tr>
<tr>
<td>Deposit:</td>
</tr>
<tr>
</tr>
<tr>
<td>Other(library,lab,exam):</td>
</tr>
<tr>
<td>Reservation:</td>
</tr>
<tr>
<td>
<div id="semWise"></div>
</td>
</tr>
<tr>
</tr>
<tr>
</tr>
<tr>
<td>Fee:</td>
</tr>
<tr>
<td>First Installment:</td>
</tr>
<tr>
<td>Second Installment:</td>
</tr>
<tr>
</tr>
<tr>
<td>Hostal Fee:</td>
</tr>
<tr>
<td>Caution Deposit:</td>
</tr>
<tr>
<td>Establishment Fee:</td>
</tr>
<tr>
<td>Total:</td>
</tr>
<tr>
</tr>
</table>
</div>
<div id="rightDiv">
<tr>
<td>SlNo.</td>
<td>Admn no</td>
<td>Name</td>
<td>Semester</td>
<td>Department</td>
<td>Edit</td>
<td>Delete</td>
</tr>
REFERENCES