Www.pksstatecommittee.org



1. INTRODUCTIONThis project is aimed to have a clear vision to create a knowledge society by using information technology with all aspects of development and governance in view from an administration. Portals are fast becoming a standard way of offering centralized repository of information and other services. With a single user-id and password, public can access services cutting across departments and information sources. We deal with public interfaces and government service delivery mechanism in the context of e-Governance.??????The intention of this project is to support some public access systems such as payment of electricity bill through KSEB, telephone bill through BSNL, water charges through Kerala Water Authority etc. Also public can register for new connections of electricity, telephone and water for their buildings. The input coming from this system can be taken through suitable interfaces and file can move through the government and later the government decisions could be informed back to the public through suitable web based interfaces.???? In this project, the core objective is to design, develop and deploy a portal based set of services. We call this as e-Citizen services. Complaints and suggestions can be field over the internet. This will help people reach their representatives in a convenient manner without the need to go to the districts or state headquarters. Pioneering efforts are being made to reach the benefits of information technology to the administration of urban and rural, rich and poor.Our project is developed using PHP with MySQL as database. PHP is a powerful tool for network programming and is the front end of this project with MySQL as back end. It is one of the most powerful database servers and it provides data integrity and consistency.OBJECTIVESThis project ‘E-GOVERNANCE” is to be developed in PHP and the backend as MySQL. Applications run faster and encounter large volumes of users without performance problems. MySQL can support more processes applications, and users in the single system. It allows more security to the data providing user name and password. Provides an efficient environment for users.Eliminates the drawbacks of Paper documents.Avoids the loss of data and time consuming.Reduces overall costs.Generates Managerial level report.2. SYSTEM ANALYSISSystem Analysis is the process of gathering and interpreting facts, diagnosing the problems and using the information to recommend improvements on the system. System analysis is a problem solving activity that requires intensive communication between system user and system developers. System analysis or study is an important phase of any system development process. The system is viewed on a whole and inputs to the system are identified. The output from the organization is travel through various phases of the processing of inputs. The system is viewed as a whole and inputs to the system are in defined the output from the system are traced through the various data are collected on available files.Description points and transaction held by the present system. Based on analysis, a cost or benefit analysis are considered, cost of the system is calculated on the basis of analysis made on the solution is given as a proposal. The proposal is then weighed with the existing system analytically and the best on is selected. The proposal is presented to the user request and suitable changes are made. This is a loop that ends as the user is satisfied with the proposal. After all, this proposal becomes a biometric passports are to speed up clearance through immigration and the prevention of identity fraud.A detailed study of these processes must be made by the various techniques like interviews, questionnaires, etc. The data collected by these sources must be scrutinized to arrive to a conclusion .The conclusion is an understanding of how the system functions. This system is called the existing system. Now, the existing system is subject to close study and the problem areas are identified. The designer now functions on a problem solver and tires to sort out the difficulties that weighed with the existing faces. The solutions a given on a proposal. The proposal is then weighed with the existing system analytically and the best one is selected. The proposal is presented to the user for any endorsement by the user. The proposal is reviewed on user request and suitable changes that made. This is a loop that ends as soon as the user in satisfied with the proposal.2.1 REQUIREMENT ANALYSISIn order to develop a new system, a detailed study of the existing system called the System Analysis, is necessary. Analysis is the first step in the system development life cycle. Identifying the need for a new information system and launching an investigation for the required system which best satisfy the extract requirements of the user is the first part of the development activities of a system.2.1.1 EXISTING SYSTEMIn the existing system all the process are done in manually. In this system we can pay water bill, electricity bill, telephone bill, and birth and death registration we have to visit the concerned office many times and this will be extremely difficult and tedious for busy persons. And also all the work is done in manual and it is very tedious task.Limitations of Existing SystemThe existing system has several limitations considering that may occur in future. Some of them are:Human errors. The existing system is prone to human errors such as entering wrong commands.Time-consuming Searching of previous records takes several steps thereby wasting timeData inconsistency Incorrect entry of data will lead to generation of inconsistent data and reports.Poor qualityThe reports produced are of poor quality.Doubts2.1.2 Proposed SystemThe intention of this project is to support some public access systems such as payment of electricity bill through KSEB, telephone bill through BSNL, water charges through Kerala Water Authority etc. Also public can register for new connections of electricity, telephone and water for their buildings. The input coming from this system can be taken through suitable interfaces and file can move through the government and later the government decisions could be informed back to the public through suitable web based interfaces.In this project, the core objective is to design, develop and deploy a portal based set of services. We call this as e-Citizen services. Complaints and suggestions can be field over the internet. This will help people reach their representatives in a convenient manner without the need to go to the districts or state headquarters. Pioneering efforts are being made to reach the benefits of information technology to the administration of urban and rural, rich and poor.Advantage Proposed SystemUser friendliness with improved efficiency for handling transactions.Performs computations, comparisons and verifications in an easiest way to reduce error risks.2.2 Feasibility StudyFeasibility study is done in my software development as a part of preliminary investigation. Specific method used by the analysis for collecting data about requirements are fact finding techniques. These include record review, observations, interview and questionnaires. When the request is made, the first system activity, the preliminary investigation begins. This activity has 3 steps among them feasibility study is important. Feasibility study is an important outcome of the preliminary investigation and is the determination that the system request is feasible. And my software E-GOVERNANCE satisfies the different types of the feasibility studies. They are listed below:2.2.1 Economic FeasibilityEconomical analysis is most frequently used method for evaluating the effectiveness of a candidate system. If benefits outweigh costs, then the decision is made to design and implement the system. Otherwise further justifications or alternatives in the proposed system will have to be made if it is to have a chance of being approved. Economic analysis is the most frequently used method for evaluating the effectiveness of the proposed system. Considering the benefits and savings that are expected from the proposed system, the administrators decided to design and implement a new system. By using the latest PHP technology the system can be developed at low cost and the cost of hardware is also less.2.2.2 Behavioral FeasibilityThe main problem faced during development of a new system is getting acceptance from the user. People are inherently resistant to changes and computers have been known to facilitate change. It is mainly related to human organizational and political aspects.The points to be considered are:What changes will be brought with the system?What new skills will be required? Do the existing staff members have these skills? If not, can they be trained due course of time?Generally, project will not be rejected simply because of operational feasibility but such considerations are likely to critically affect the nature and scope of the eventual recommendations. This feasibility study is carried out by a small group of people who are familiar with information system techniques, who understand the parts of the business that are relevant to the project and are skilled in skilled analysis and design process.2.2.3 Operational FeasibilityProposed systems are beneficial only if they can be turned into information systems. That is it will meet the organizations operating requirements and also checks that whether the system will work when it is developed and installed. The software E-GOVERNANCE software supports the operational feasibility to a great extends. The performance of this software is more accurate, more user friendly, effective, error free.2.2.4 Technical feasibilityThis is related to the technicality of the project. This evaluation determines whether the technology needed for the proposed system is available or not. It deals with hardware as well as software requirements. That is, type of hardware, software and the methods required for running the systems are analyzed. This involves financial consideration to accommodate technical enhancement. If the budget is a serious constraint, then the project is judged not feasible.The software E-GOVERNANCE software supports the technical feasibility to a great extends. That is, this software can be operated with the minimum technical support. It uses PHP as front end, MYSQL as database at windows platform and Mozilla Firefox and Google Chrome as browser. And also it provides accuracy, reliability, ease of access and data security.3. SOFTWARE ENGINEERING ENVIRONMENT3.1 SOFTWARE REQUIREMENT SPECIFICATIONKey information for programming, testing and implementing the project. The major document produced by the system analysis at the end of the system study stage. It provides complete details of the analyst’s proposed solution to the problem outlined in terms of references. This is the description of the proposed new computer system in great detail, it specified how the system would do it, and the machinery needed the costs and benefits expected for the project. The system specification describes the hardware and software specification used to develop the software.Characteristics of a good SRSA good SRS document has certain characteristics that must be present. The characteristics are:Correctness: An SRS is correct if every requirement included in the SRS represents something required in the final pleteness: An SRS is complete when it is documented after:Unambiguous: An SRS is unambiguous if and only if every requirement stated has one and only one interpretation. Requirements are often written in a natural language.Verifiable: An SRS is verifiable if and only if their exists some cost-effective process that can check whether the final product meets the requirements.Modifiable: An SRS is modifiable if its structure and style are such that any necessary change can be made easily while preserving completeness and inconsistency.Traceable: An SRS is traceable if the original of each of the requirements is clear and if it facilitates and referencing of each requirements in future development or enhancement documentation.Consistency: Consistency in the SRS is essential to achieve correct results across the documentation.Testability: An SRS should be written in such way that is possible to create attest plan to confirm whether specification can be met and requirements can be met and requirements can be delivered.Clarity: An SRS is clear when it has a single interpretation for the author (analysis), the user, the end user, the stakeholder, the developer, the tester and the customer.Feasibility: RDD-SRS needs to be confirmed on the technical and operational feasibility.3.2 HARDWARE SPECIFICATIONHardware RequirementProcessor:Pentium IVRAM:128 MBHard Disk:40 GBKeyboard:Standard 101/102 keyMouse:Optical mouseMonitor:Plug and Play monitorPrinter:Ink jetSoftware SpecificationOperating System: Windows 7Front End: PHP Back End: MySQL The Application Requirements.Client Tier : HTML, JavaScriptBackend : MySQL Web server : ApacheOS : Windows 73.3 Software SpcificationThe original release of PHP was designed and created by Rasmus Lerdorf back in the middle of the 90s as a way of making various common web tasks easier and less repetitive. Back then, the main goal was to have the minimum amount of logic as was possible in order to achieve results, and this led to PHP being HTML-centric - that is, PHP code was embedded inside HTML. The first popular version of PHP was called PHP/FI 2.0, for Personal Home Page / Form Interpreter, and, despite its parsing inconsistencies, managed to attract a fair few converts, including myself. The main issue with this version was that the PHP/FI parser was largely hand-written, and so users often encountered scripting errors that were not technically errors - they were just the PHP/FI parser screwing up. Furthermore, the parser was absolutely tied to the Apache web server, and was hardly renowned for its speed. Some of these issues were resolved in version 3, when Zeev Suraski and Andi Gutmans re-wrote PHP from the ground up using standard "compiler compiler" tools like Flex and Bison. This made the parser itself all but bulletproof, which in turn gave sanity back to many PHP users! PHP 3 also finally made the language extensible - something that was seriously lacking from prior versions. Particularly keen developers were able to write their own modules for the language, adding functionality at the core level. The parser itself, though, was still tied to Apache, and, although speed was improved a great deal from PHP/FI, it still was not anything to shout about. The only downside to upgrading to PHP 3 was that the language was a lot stricter - some code that worked on PHP/FI would no longer work after upgrading. The language was still young, though, so not many were affected. The all-round improvement brought about by the PHP/FI to PHP 3 upgrade brought in many new users eager to jump from the Perl ship to a system that was easier to use. At the time, there was no doubt at all that Perl was faster to execute, except perhaps among PHP zealots, however PHP still kept its lead in speed of development, and that was the key selling point. With PHP 3, the language had gained limited object-oriented support, and this only added extra fuel to the fire of PHP's growth. By the time PHP 3 was replaced in the middle of 2000, it was installed on over 2,500,000 web-site domains, as compared to 250,000 just 18 months before. In the middle of 2000, PHP 4 was released to the world, containing major differences to PHP 3 in all aspects. Extensive work had been done to ensure that backwards compatibility with older PHP scripts would remain - upgrading from PHP 3 to PHP 4 was much smoother than the PHP/FI to PHP 3 upgrade. Perhaps the most important change made for PHP 4 was the switch to what is called the Zend Engine. The Zend Engine, created by Zend, a company founded by Zeev Suraski and Andi Gutmans (the name Zend is a contraction of ZEev and aNDi) to promote PHP in the corporate environment, allowed much more flexibility than had ever been seen before in PHP. The engine took over the core of PHP and introduced reference counting, whereby all resources used in scripts (database connections, files, etc) are tracked automatically by the engine, and freed when no longer used to minimize memory usage and ensure there were no memory leaks. Also introduced with PHP 4 was complete web server abstraction, meaning that PHP now runs on Apache 1.3.x, Apache 2, Microsoft's IIS, Zeus, AOL Server, and more. This opened use of the language up to the 40% of the world who do not use Apache for their web server. Performance took a gigantic leap forward due to two main factors. Firstly, PHP the execution paradigm was changed from prior versions. PHP 3 and before used an "execute while interpreting" paradigm which meant that PHP read a line of source code, interpreted it, executed it, read another, interpreted it, executed it, read another, etc. This meant that code was often re-read and re-interpreted twice or more, entirely unnecessarily. PHP 4, with its new "compile first, execute later" paradigm read your entire script in and compiled it to byte code before execution, which produced a large speed increase - the average speed increase was about 100%, with some benchmarks showing up to a fifty-fold increase in speed when PHP 4 was pushed to its limits. Furthermore, because PHP 4 compiled the entire script before executing it, it became possible to optimize and cache the compiled code before execution. We will be looking at how this works later on in the book. Secondly, PHP 4 introduced multi-threading, which essentially allows particularly lengthy, but non-critical functions to be run independently from the main script process, further streamlining execution. Since the release, PHP has continued its advance unabated - at the time of writing, the current version of PHP 4 is 4.3.9, and PHP is installed on 9,500,000 web servers around the world. PHP is the most popular Apache module available, surpassing even mod_perl, and continues to grow in popularity. HTML RelationshipWhen used to output HTML content, PHP is embedded inside HTML in code islands, as opposed to in Perl, where HTML code is embedded inside the Perl script. The most common way to open and close PHP code blocks is by <?php and ?>. Here is an example of a simple page, shown in Perl first then in PHP - don't worry about what the code means for now: #s!/usr/bin/perlprint "<HTML>\n";print "<BODY>\n";print "<P>Welcome, $Name</P>\n";print "</BODY>\n";print "</HTML>\n"; And now in PHP: <HTML><BODY><P>Welcome, <?php print $Name; ?></P></BODY></HTML> As you can see, the PHP version is only a line shorter, but infinitely much easier to read because the majority of the page is just HTML. Some modules for Perl (particularly CGI.pm) help, but PHP continues to have a big lead in terms of readability. If you really wanted to, you could write your PHP script like the Perl script: switch to PHP mode and print everything out from there. However, it tends to get messy - as you can see! Apart from editing legibility, another advantage to having most of the page in straight HTML is that it makes editing with commercial IDEs possible, whereas products like Dreamweaver and FrontPage trash Perl's print statements. One key advantage to using PHP as opposed to some other solutions is that PHP code is all executed at the server, with the client only receiving the results of the script. What this means is that users never see your PHP source code because they are never sent it - they only see what you want them to see. PHP uses a blend of interpretation and compilation in order to provide the best mix of performance and flexibility to programmers. Behind the scenes, PHP compiles your script down to a series of instructions (called opcodes) whenever it is accessed. These instructions are then executed one by one until the script terminates. This is different from conventional compiled languages such as C++ where the code is compiled down to native executable code then that executable is run from then on. Instead, PHP re-compiles your script each time it is requested. This constant recompilation may seem a waste of processor time, but it is actually not all that bad because you no longer need to worry about hand recompiling your scripts when you make any changes. On the flip side, many scripts take longer to compile than they do to execute! Furthermore, it provides very quick feedback during development. If you have an error somewhere in your file, PHP will refuse to compile the page until you have fixed the problem, and you are able to step through execution of your code line by line until you find the problem. The speed hit of regular compilation is nullified entirely by the use of PHP accelerators. One major advantage to having interpreted code is that all memory used by the script is managed by PHP, and the language automatically cleans up after every script has finished. This means that you do not need to worry about closing database links, freeing memory assigned to images, and so on, because PHP will do it for you. That is not to say you should be lazy and make PHP do all the work - good programmers clean up themselves, and let PHP work as backup in case something is missed. PHP offers a great deal of flexibility as to how you want to output your content. In general use, PHP is embedded inside HTML in code islands started with <?php and ended with ?>. You can reverse this by writing your whole script as one big PHP code island and printing HTML as necessary. Going back to the example shown previously, we can make our PHP code look almost identical to the Perl code by printing the HTML from inside our PHP code: <?php????print "<HTML>\n";????print "<BODY>\n";????print "<P>Welcome, $Name</P>\n";????print "</BODY>\n";????print "</HTML>\n";?> "Print" is a simple function that outputs a chunk of text, enclosed in quotation marks, to the client. "\n" means "start new lines in the source code", and it serves to lay the source code out nicely. For the longest time, a debate raged on message boards and mailing lists as to whether it was faster to drop out of "PHP mode" to output large amounts of HTML, or whether it was just as fast to stay in PHP mode. The truth is that it is horses for courses - you will find little or no speed difference either way. PHP also has great output buffering features that further increase your control over the flow of output. An output buffer can be thought of as a storage hole where you can queue up content for outputting. Once you start a buffer, any output you create is automatically put into that buffer, and is not seen unless the buffer is closed and flushed - that is, sent to your visitor. The advantage to this output queuing is two-fold. First, it allows you to clean the buffer if you decide not to output the current output queue in the buffer. When a buffer is cleaned, all the output stored in there is deleted as if it were never there, and output for that buffer is started from scratch. Secondly, output buffering allows you to break the traditional ordering of web pages - that of headers first and content later. Owing to the fact that you queue up all your output, you can send content first, then headers, then more content, then finally flush the buffer. PHP internally rearranges the buffer so that headers come before content. Output buffering is covered in much more depth later. The base of the PHP language is very simple, having just enough to set and retrieve variables, work with loops, and check whether a statement is true or not. The real power behind PHP comes with its extensions - add-ons to the base language that give it more flexibility. There are hundreds of extensions to PHP, and they can be broken down into five distinct types: core, bundled, PECL, third party, and DIY. Core extensions are extensions that are bundled with PHP itself, and enabled by default. For all intents and purposes they are part of the base language, because, unless you explicitly disable them (few people do, and sometimes you cannot), they are available inside PHP. For example, the mechanism to handle reading and saving files in PHP is actually handled by an extension that is automatically compiled into PHP. Bundled extensions are extensions that are bundled with PHP, but not enabled by default. These are commonly used, which is why they are bundled, but they are not available to you unless you specifically enable them. For example, the mechanism to handle graphics creation and editing is handled by an extension that is bundled with PHP, but not enabled by default. PECL stands for "PHP Extension Code Library", and is as a subset of the PHP Extension and Application Repository, PEAR. PECL (pronounced "pickle") was originally created as a place where rarely used or dormant bundled extensions could be moved if they were no longer considered relevant. PECL has grown a lot since its founding, and is now the home of many interesting and experimental extensions that are not quite important enough to be bundled directly with PHP. Third-party extensions are written by programmers like you who wanted to solve a particular problem that was unsolvable without them creating a new extension. There is a variety of third-party extensions available out there, with the sole difference between a third-party extension and a PECL extension is that there are various rules about having code being submitted to PECL. Third-party extensions are frequently unstable, and often just downright crazy. That is not to say they are bad - give them a shot and see what you can do. Finally, Do-It-Yourself (DIY) extensions are simply extensions you created yourself. PHP has a remarkably rich extension creation system that makes it quite simple to add your own code as long as you know C. Later on we'll be going through the task of creating your first extension from start to finish. Note that creating your own extension requires that you have the ability to compile PHP - this is not a problem if you use Unix, but is very difficult for Windows users without the correct software. PHP would not be where it is today without the help and effort of thousands of people. A particular few deserve special mention and thanks - if you see them around at a conference, buy them a drink! PHP was originally created by Rasmus Lerdorf, and he oversaw production of the first release and PHP/FI 2.0. PHP 3 was rewritten from the ground up by Zeev Suraski and Andi Gutmans, and the three of them are the "language architects" behind PHP. In the PHP group, the developers who primarily work on development of the language core, there are: Thies C. Arntzen, Stig Bakken, Shane Caraveo, Andi Gutmans, Rasmus Lerdorf, Sam Ruby, Sascha Schumann, Zeev Suraski, Jim Winstead, and Andrei Zmievski. Each of them has worked exceptionally hard, along with the help of many others, to put PHP where it is today. Two other groups of people deserve special mention: Jouni Ahto, Alexander Aulbach, Stig Bakken, Rasmus Lerdorf, Egon Schmid, Lars Torben Wilson, and Jim Winstead collectively make up the PHP Documentation Team, who have done such an excellent job with the PHP manual. In addition, Ilia Alshanetsky, Stefan Esser, Moriyoshi Koizumi, Sebastian Nohn, Derick Rethans, Melvyn Sopacua, and Jani Taskinen run the Quality Assurance for PHP, making sure each release comes out as bug-free as possible. If you have a little time on your hands, visit and read the full credits online yourself - you will see that PHP really is a community effort built by the collective desire to build the best language possible. About MySQLMySQL is the world's most popular open source database software, with over 100 million copies of its software downloaded or distributed throughout its history. With its superior speed, reliability, and ease of use, MySQL has become the preferred choice for Web, Web 2.0, SaaS, ISV, Telecom companies and forward-thinking corporate IT Managers because it eliminates the major problems associated with downtime, maintenance and administration for modern, online applications.Many of the world's largest and fastest-growing organizations use MySQL to save time and money powering their high-volume Web sites, critical business systems, and packaged software — including industry leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia, YouTube, Wikipedia, and .The flagship MySQL offering is MySQL Enterprise, a comprehensive set of production-tested software, proactive monitoring tools, and premium support services available in an affordable annual subscription.MySQL is a key part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python), the fast-growing open source enterprise software stack. More and more companies are using LAMP as an alternative to expensive proprietary software stacks because of its lower cost and freedom from platform lock-in.The MySQL database is owned, developed and supported by Sun Microsystems, one of the world's largest contributors to open source software. MySQL was originally founded and developed in Sweden by two Swedes and a Finn: David Axmark, Allan Larsson and Michael "Monty" Widenius, who had worked together since the 1980's. More historical information on MySQL is available on Wikipedia The best and the most-used database in the world for online applications Available and affordable for all Easy to use Continuously improved while remaining fast, secure and reliable Fun to use and improve Free from bugs About Operating SystemAn Operating System may be viewed as an organized collection of software extensions of hardware, consisting of control routines for operating a computer and for providing an environment for execution of programs. Programs rely on facilities provided by the operating system to gain access to computer-system resources such as files and input/output devices. I.e. the operating system acts as interface between users and the hardware of a computer system.By definition, a great PC experience means seamless operation across all of your hardware, software, and devices. We want to make sure you have a broad choice for the programs and devices you use with your PCs. Today, the Windows Vista Compatibility Center lists more than 10,500 applications and 9,500 devices with a compatible download or driver version. In most cases, the same software and hardware that works on Windows Vista will also work on Windows 7. Furthermore, we were careful to design Windows 7 so that the investments that our partners and our enterprise customers have made in Windows Vista will continue to deliver great value as they upgrade to Windows 7. We’ve worked closely with our partners from the earliest planning phase. Before writing code, we talked to original equipment manufacturers, the companies that make PCs. Before defining application programming interfaces, we talked to developers. And before adding support for new devices, we worked with device manufacturers to understand how next-generation hardware could create new scenarios.Windows 7 Starter makes small notebook PCs and other PCs with limited hardware easier to use because it puts less between you and what you want to do—less waiting, less clicking, and less hassle connecting to networks. Windows 7 Starter is designed to meet basic needs and combines the latest in reliability and responsiveness with the familiarity of Windows. Key features that you will find in the Starter edition include the following:: ? Broad application and device compatibility ? Safety, reliability, and responsiveness ? Ability to join a homegroupWindows 7 Home Basic is an entry-level edition that will be offered in a number of emerging markets to customers with value priced PCs. Windows 7 Home Basic makes it faster and easier to get to the programs and documents you use most often, so you can spend less time looking and more time doing the things you want to do. In addition to the benefits found in Windows 7 Starter, Home Basic includes the following: ? Live thumbnail previews ? Advanced networking support (ad hoc wireless networks and Internet connection sharing) ? Ability to extend your screen across multiple monitorsThe best edition for consumers, Windows 7 Home Premium provides the best entertainment experience on your PC. You’ll find easy ways to connect to other PCs and devices, all in a visually rich environment that makes everyday use simpler and more engaging. With Home Premium you can create a homegroup to share all of your favorite photos, videos, and music with other networked PCs running Windows 7. And you’ll be able to watch shows for free when and where you want with Internet TV on Windows Media? Center.* In addition to the features in Windows 7 Starter and Home Basic.Windows 7 Professional has all the features you need for business, along with all the great media and entertainment features of Windows 7 Home Premium. You’ll be able to run many Windows XP productivity programs natively in Windows 7 or by using Windows XP Mode*, and recover your data easily with automatic backups to your home or business network. You’ll also be able to connect to company networks easily and more securely. In addition to the features in Windows 7 Home Premium3.4 ANALYSIS TOOL3.4.1 DATAFLOW DIAGRAMA DFD, also known as a “bubble chart” has the purpose of clarifying system requirements and identifying major transformations that will become programs in system design. A DFD consists of a series of bubbles joined by lines. The bubbles represent data transformations and the lines represent data flow in the system. A data flow diagram may be used to represent a system or software at any level of abstraction. DFD’s can be partitioned into levels that represent increasing information flow and functional details. A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the processes that change or transform data throughout a system. It is a structured analysis and design tool that can be used for flowcharting in place of, or in association with, information oriented and process oriented system flowcharts. When analysts prepare the DFD, they specify the user needs at a level of detail that virtually determines the information flow into and out of the system and the required data resources. This network is constructed by using a set of symbols that do not imply a physical implementation. The DFD reviews the current physical system, prepares input and output specification, specifies the implementation plan etc.Basic data flow diagram symbols are:? - A “Rectangle” defines a source (originator) or destination of a system data.? - - An “Arrow” identifies data flow. It is a pipeline through which information flows.? - A “Circle” represents a process that transforms incoming data flow(s) into outgoing data flow(s).? - An “Open Rectangle” is a data store.Steps to Construct Data Flow Diagrams: Three steps are commonly used to construct a DFDProcess should be named and numbered for easy reference. Each name should be representative of the process.The direction of flow is from top to bottom and from left to right.When a process is exploded in to lower level details they are numbered. Context level (Level 0) operationsE governance0.0BSNL Admin0.3KSEB Admin0.2User0.1Kerala Water Authority Admin0.4RequestResponse RequestResponse RequestResponse RequestResponse Context level DFDComplaint registration0.1.5tbcomplaintApply for BSNL0.1.2Apply for KSEB0.1.1Apply for KWA0.1.3view status and pay online0.1.4egondbtbapplicationksebkappidtb_application_bsnlidwappidtb_application_wateridunameloginUser0.1invalidloginFLevel 1: Userview status and pay online0.1.5view and pay KSEB bil0.1.5.1view and pay BSNL bill0.1.5.2view and pay KWA bill0.1.5.3tbpaymentsTb_bill_bsnltbpaymentsBill_noBill detailsBill_noBill_noBill detailsBill detailsLevel 2: User Approve Consumer0.2.1Meter reading0.2.2Tariff details0.2.3Bill preparation0.2.4Change password0.2.5unameloginKSEB admin 0.2invalidlogintbapplicationksebtbmrksebtbtarriftbmrkseblogintbbillksebkappidkmidtarrifidtarrifidkmidconsumernounameKSEB Admin Change password0.3.5tbapplicationbsnlcallratecalldetailscallratetbbillbsnlloginApprove Consumer0.3.1Call rate details0.3.2View call details0.3.4Generate bill0.3.3unameloginBSNL admin 0.3invalidloginidrateidcallidcallidrateidbillnounameBSNL Admin tbapplicationwaterunameApprove Consumer0.3.1Meter reading0.3.2Tariff details0.3.4Generate bill0.3.3Change password0.3.5tbmrwaterkwatarriftbmwatertbbillloginunameloginKWA admin 0.4invalidloginwappidwmidtidtidwmidbillno KWAAdmin 3.4.2 E-R DIAGRAMAn entity-relationship(ER) diagram is specialized graphic that illustrates the interrelationship between entities in a database. Boxes are commonly used to represent entity. Diamonds are normally used to represent relationships and ovals are used to represent attributes. An entity is piece of data is shared between entities.Classifying RelationshipsRelationships are classifieds by their degree, connectivity, cardinality, direction, type and existence.Degree of RelationshipsThe degree of a relationship is the number of entities associated with the relationship. The n-array relationship is there general from for degree n. Special cases are binary, ternary where the degree is 2 and 3 respectively. Connectivity and CardinalityThe connectivity of a relationship describes the mapping of associated entity instances in the relationship. The values of connectivity are “one” or “many”. The cardinality of a relationship is the actual number of related occurrences for each of the two entities. The basic types of connectivity of relations are: One-to-one, one-to-many, many-to-many.A one-to-one(1:1) is when at most one instance of an entity A is associated with one instance of entity B. O-to-many (1: N) is when for an instance of a entity A, there are zero, one or many instances of entity B, but for instance of the entity B, there is only one instance of the entity A.A many-to-many(M: N) relationship, sometimes called non-specific, is when for one instance of entity A, there are zero, one or more instances of entity B and for one instance of entity B there are zero, one or many instances of entity The symbols used ER Diagram isEntityAttributesRelationshipsLinesER Diagram4. SYSTEM DESIGN4.1 Database DesignA relational database is a collection of data items organized as a set of formally – described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables. The relational database was invented by E. F. Codd at IBM in 1970.A relational database management system (RDBMS) is a program that lets you create, update, and administer a relational database. Most commercial RDBMS’s use the Structured Query Language (SQL) to access the database, although SQL was invented after the development of the relational model and is not necessary for its use.A database is an organized mechanism that has the capability of storing information through which a user can retrieve stored information in an effective and efficient manner. The data is the purpose of any database and must be protected.The database design is a two level process. In the first step user requirements are gathered together and a database is designed which will meet these requirements as cleanly as possible. This step is called Information Level Design and it is taken independent of any individual DBMS.In the second step this information level design is transferred in to a design for the specific DBMS that will be used to implement the system in question. This step is called Physical Level Design, concerned with the characteristics of the specific DBMS that will be used. A database design runs parallel with the system design.The organization of the data in the database is aimed to achieve the following two major objectives.Data IntegrityData Independence4.1.1 NORMALIZATION Designing a data base is a complex task and the normalization theory is a useful and in this design process. A bad database design may lead to certain undesirable situations such as;Repetition of information Inability to represent certain informationLoss of information To minimize the anomalies, normalization may be used. In construction and system, here there is only one database named result. There are tables in this database.First normal form (1 NF)A relation is in first normal form (1NF), if and only if all its attributes are based on a single domain. The objective of normalizing a table is to remove its repeating groups and ensure that all entries of the resulting table have at most single value. The objective of 1NF is to divide the database into logical units called tables. When each table has been designed, primary key is assigned to most or all tables.Second Normalization Form (1 NF)A table is said to be in second normal form (2 NF), when it is in 1NF and it satisfies functional dependency. Functional dependency means that every non-primary attributes is fully dependent on a key. The objective of 2NF is to take data that is partially dependent on the primary key, enter the data another table.Now consider the database of this system. In this there are a total of table and all tables are in second normal form. That is all of this tables satisfies second normal form. No repeated information is stored in any table. All of the tables have a separate primary key some of all are auto numbers. Third Normal Form (3 NF)A table is said to be in 3NF, when it is 2NF and every non-key attribute is functionally dependent only on the primary key. The objective of 3NF is to remove data in a table that is not dependent on the primary key. All our tables are in normalization form Benefits of normalization To permit simple retrieval of data in response to query and report requests. Helps to simplify the structure of tables.To structure the data so that there is no repetition of data, that helps in saving space.To simplify the maintenance of data through updates, insertions and deletions. To reduce the need to restructure data when new applications requirements arise.Data consistency within the data base.Much more flexible database design.A better handle on data base security. Index searching is often faster, since indexes tend to be narrower and shorter.More tables allow better use of segments to control physical placement of data.Fewer null values and less redundant data, making your database more compact.Triggers execute more quickly if you are not maintaining redundant data Primary Key is assigned for this purpose. The primary key fields in almost all the tables help to ease the search and improve efficiency. The proposed system is using second normal form as it is found most suitable. In second normal form each row must contain associated field that describes an attribute of the entry that the table describes.4.1.2. TABLESField NameData TypeConstraintsDescriptionNamevarchar(25)Not nullnameDobDateNot nullDate of BithGendervarchar(7)Not nullgenderEmailvarchar(20)Not nullEmail IDPlacevarchar(25)Not nullplacePhonevarchar(16)Not nullphoneUnamevarchar(19)Primary keyUser NameDateDateNot nullRegistration dateTable 1: RegistrationField NameData TypeConstraintsDescriptionUnamevarchar(20)Primary keyUser Namepasswordvarchar(15)Not nullPasswordRolevarchar(15)Not nullRoleTable 2:LoginFieldData TypeConstraintsDescriptionKappidIntPrimary keyApplication idNameVarchar(20)Not nullConsumers nameConsumer novarcharUniqueConsumers numberSection nameVarchar(20)Not nullSection nameEmailVarchar(20)Not nullEmail idPermanent addressVarchar(20)Not nullPermanents addressCommunication addressVarchar(20)Not nullCommunication addressConnection typeVarchar(20)Not nullConnection typeAdd_of premisesVarchar(20)Not nullAddress of premisesBlock noNumeric(18,0)Not nullBlock numberSurvey nameVarchar(20)Not nullSurvey numberVillageVarchar(20)Not nullvillageBuilding noBigint Not nullBuilding numberLocal bodyVarchar(20)Not nullLocal bodyNearest electrical post noIntNot nullNearest electrical post noPurposeVarchar(20)Not nullpurposeNo of phasesIntNot nullNumber of phasesTotal connected loadIntNot nullTotal connected loadUnameVarcharFKUsernameTable 3: TbapplicationksebFieldData TypeConstraintsDescriptionKmidIntPrimary keyMeter idConsumer noIntForeign keyConsumer numberDateDate Not nullDateMeter readingBigint Not nullMeter readingTarrifBigint Not nulltarifBilling frequencyVarchar(20)Not null Billing frequencyLoadInt Not null Load in wattTable 4: tbmrkseb FieldData TypeConstraintsDescriptionTariff idInt Primary key Tariff idCategoryVarchar(20)Not nullcategoryFixed charge/monthBigint Not nullTarrifcharge/monthTypeVarchar(20)Not nullType of connection single/3phaseMeter_rentBigint Not nullMeter rentTable 5: Tbtariff FieldData TypeConstraintsDescriptionRatio idInt Primary key Tariff ratio idTarrif_idInt Foreign key Tariff idUnit _rangeInt Not null Tariff per unit RateInt Not nullTariff rate Table 6: tbtarrif ratioFieldData TypeConstraintsDescriptionBillnoInt Primary key Bill number kmidInt Foreign Key MeterreadingidDateDate Not null Date AmountBigint Not nullAmount lastdatedate Not nullLast date for payment Table 7: TbbillksebFieldData TypeConstraintsDescriptionKpidInt Primary key Payment id BillnoBigint Not nullBill number Payed_amountBig int Not null Amount payedPayment dateDate Not null Date of paymentPayment modeVarchar(20) Not nullMode of paymentTable 8: TbpaymentsFieldData TypeConstraintsDescriptionWappidInt Primary key Application id NameVarchar(20)Not nullName AddressVarchar(50)Not nulladdressTelephone noNumeric(18,0)Not nullTelephone numberplot_areaVarchar(20)Not nullPlot areaPurposeVarchar(20)Not nullPurpose of connectionSize of connectionVarchar(20)Not nullSize of connectionSewer connectionVarchar(20)Not nullSewer connectionCategoryVarchar(20)Not nullCategoryUnameVarcharForeign Key UsernameTable 9: TblapplicationwaterFieldData TypeConstraintsDescriptionWmidIntPrimary keyMeter idConsumer noIntForeign keyConsumer numberDateDate Not nullDateMeter readingBigint Not nullMeter readingTarrifBigint Foreign Key tarifConsumptionrateVarchar(20)Not null Consumption rateTable 10: TbwrwaterFieldData TypeConstraintsDescriptionTariff idInt Primary key Tariff idCategoryVarchar(20)Not nullcategoryFixed charge/monthBigint Not nullTarrifcharge/monthTypeVarchar(20)Not nullType of connection Meter_rentBigint Not nullMeter rentTable 11: TbtariffwaterFieldData TypeConstraintsDescriptionConsumer_noInt Foreign Key Consumer number BillnoInt Primary keyBill number DateDate Not null Date Tariff idInt Foreign Key Thariff IdAmountBigint Not nullAmount Table 12: TbbillwaterFieldData TypeConstraintsDescriptionWpidInt Primary key Payment id BillnoBigint Foreign Key Bill number Payed_amountBig int Not null Amount payedPayment dateDate Not null Date of paymentPayment modeVarchar(20) Not nullMode of paymentTable 13: WtpaymentFieldData TypeConstraintsDescriptionIdIntPrimary key idSelect circleVarchar(20)Not null Circle areaNameVarchar(20)Not nullCustomer name MobilenoNumeric(18,0)Not nullMobile number Landline noNumeric(18,0)UNIQUE?Landline number Nearst bsnl landline noNumeric(18,0)Not nullNearest landline number EmailVarchar(20)Not nullEmail id Types of serviceVarchar(20)Not nullService type Plan idVarchar(20)Foreign keyBsnl planAddressVarchar(50)Not nulladdressDistrictVarchar(20)Not nullDistrictPanchayathVarchar(20)Not nullpanchayathVillageVarchar(20)Not nullVillage PincodeNumeric(18,0)Not nullPincode Convenient dayVarchar(20)Not nullCustomer’s convenient day to take connectionUnameVarcharForeign Key UsernameTable 14: blappilicationbsnlFieldData TypeConstraintsDescriptionPlan IdInt Primary key Plan id Plan_descriptonVarchar(20)Not nullPlan descriptionRateNumeric(18,0)Not nullPlan rateTable 15: tblbsnlplanFieldData TypeConstraintsDescriptionBill noInt Primary keyBill NumberPhnoNumeric(18,0)Foreign Key Phone number TotalamountBigintNot nullTotal no. of callsBilldateDateNot nullBill dateTable 16: TblbillbsnlFieldData TypeConstraintsDescriptionCalledIntPrimary keyCall idRateidIntForeign keyRate idNopBigintNot nullNumber of pulseCalldateDateNot nullDates of callsTotal amountBigintNot nullAmountsPhnoNumeric(18,0)Foreign Key Phone number Table 17: CalldetailsFieldData TypeConstraintsDescriptionRateidIntPrimary keyRate idPlanidVarchar(20)Foreign keyPlan idPulserateBigintNot nullTotal pulse rateAmountBigintNot nullTotal amountTable 18: CallrateFieldData TypeConstraintsDescriptionBpidInt Primary key Payment id BillnoBigint Foreign Key Bill number Payed_amountBig int Not null Amount payedPayment dateDate Not null Date of paymentPayment modeVarchar(20) Not nullMode of paymentTable 19: PaymentFieldnameData typeConstraintsDescriptionAccountnobigint(11)Not NullAccount numbercardnovarchar(16)Primary KeyCard numbercvvvarchar(3)Not NullCvv numberexmonthvarchar(2)Not NullExpiry monthexyearyear(4)Not NullExpiry yearCardtypevarchar(10)Not NullCard typeholdernamevarchar(30)Not NullHolder nameBanknamevarchar(25)Not NullBank namebalancedouble(10,2)Not NullbalanceTable 20: bankField NameData TypeConstraintsDescriptionrootidint(11)Primary KeyRoot Idrootnamevarchar(50)Not Null Root NameTable 21:root4.2 INTERFACE DESIGNIn this phase the goals and intensions of each user was established. The object and actions were isolated to create a list of objects and actions. The source objects, the target object and the impact of each action were identified. Then the screen layout was performed. The designs of web pages were carried out in the screen layout process.The interface prototype is made from initial interface design. Once the interface prototype is established this is evaluated by the user and designer. Further modifications are made based on the suggestions.4.3 INPUT DESIGNControlling Amount of Input: Whenever user input is required, giving possible input values as default in the area reduces the amount of user keystrokes. Thus the user can pass on the next data without much typing. This makes the data entry much fast and error free. When the user to give the input in the same format.Avoiding Delay:A processing delay resulting from data operations or data entry operations is called a bottleneck. Such bottlenecks are made obsolete in this project by breaking up the amount of data to be entered in each form into different smaller and simpler forms.Avoiding errors in data: The rate at which errors occur depends on the quantity of data. As told in the above objective these errors are reduced by making the number of data to be entered in each form is reduced.Avoid extra steps: To fulfill any operation the user hance no need to do complex steps, instead operation can be done simple easy to do steps.Keeping the process simple:This implies that that system has all measure to keep the errors out even if the user is giving wrong data. It handles the situation with grace and does not create much type about the situation to the user.4.4 OUTPUT DESIGNOutputdesign is the most important to the user. Efficient, intelligible output design improves the system relationship with the user and helps the decision making. Computer outputs are the most important and direct source to the user. An efficient output system improves the interaction of the system with the user and it provides his/her required information. The output can be displayed on the screen or copied. In our system, hard copies are preferred because a document for further references. Careful considerations have been given while developing the output reports as if helps in decision making. Other than the remote system desktops visuals, received messages from other systems etc. are also outputted.Output ObjectivesThe output form information system should accomplish the following objectives:Convey information about past activities, current status or projection of the future,Signal important events, opportunities, problems or warning,Trigger an actionConfirm an actionOutput design of the project is made with objectives in mind.External outputs, whose destination is within the organizations and is the main image of the organization,Internal outputs, whose destination is within the organization and which require careful design because it is user’s main interface with the computer,Operational outputs, whose use is purely within the computer departments,Interactive outputs, which the user in communicating directly with the computer.5. SYSTEM DEVELOPMENT5.1 Modular DescriptionKSEB moduleRegister web serviceKSEB upload the data to web service which is accessible by e-governance web site.Approve customer detailsHere approve all registered customers. Meter readingHere collect the details of meter reading from specified customer. Tariff detailsHere upload the tariff details correspond to the consumption of the electricity.Bill preparationAccording to the meter reading and tariff information prepare the bill.View bill paymentHere view all the specified customer payment detailsWater authority moduleRegister web serviceWater authority uploads the data to web service which is accessible by e-governance web site.Approve customer detailsHere approve all registered customers. Meter readingHere collect water consumption details of specified customer. Tariff detailsHere upload the tariff details correspond to the consumption of the waterBill preparationAccording to the meter reading and tariff information prepare the bill.View bill paymentHere view all the specified customer payment detailsBSNLRegister web serviceWater authority uploads the data to web service which is accessible by e-governance web site.Approve applicationHere approve all registered customers. Call rate detailsHere upload the call rate corresponds to varies plans.View call detailsView call details of specified customers using phone number.Generate billGenerate the bill using the call details and call rate.View payment detailsView specified customer payment detailsUserUser can apply electricity connection, water authority connection, telephone connection etc. through online and also pay the bill.SYSTEM TESTING6.1 TestingTesting is vital to success of the system. System testing makes logical assumption that if all parts of the system are correct, the goal will be successfully achieved. Another reason for system testing is its utility as a user- oriented vehicle before implementation. System testing is aimed at ensuring that system works accurately and efficiently before live operation commences. Testing is vital to success of the system.A series of tests are performed for the proposed system before the system is ready for user acceptance testing. VariousTesting MethodsA Software Test Plan is a document describing the testing scope and activities. It is the basis for formally testing any software/product in a project. A test is a set of data that the system will process as normal input. However, the data are created with the express intent of determining whether the system will process them correctly. There are two general strategies for testing software. Code Testing have to test cases that result in executing every instruction in the program or a module; but is every path through the program is tested.6.2 Unit Testing In computer programming unit testing is a software verification and validation method in which a programmer tests if individual unit of source code are fit for use. A smallest testable part of an application in procedural programming in a unit may be an individual functions or procedure. Unit testing focus on the smallest unit of software design, the module. This is also known as “Module Testing”. The modules are tested separately. This testing is carried out during the programming stage itself. In this step each modules found to be working satisfactorily. The forms in this project are tested one by one and errors are corrected.6.3 Integration Testing Data can be lost across an interface. One module can have an adverse effect on others. Sub-functions when combined may not produce the desired major functions. The objective is to take unit tested modules and to combine them and test it as a whole. In this step all errors encountered are corrected for next testing.6.4 User Acceptance TestingUser acceptance of a system is the key factor for the success of any system. The system under consideration is tested for user acceptance. Since the user interface of the system is very much user friendly the acceptance of the users were gained very easily.6.5 Output TestingAfter performing the validation testing, the next step is output testing of the proposed system since no system could be useful if it does not produce the required output in specific format. Asking the users about the format required by them tests the outputs generated or displayed by the system under consideration.The output format of the screen is found to be correct as the format was designed in the system design phase according to the user needs. For the hard copy also, output comes out as the specified requirements by the user. Hence output testing does not result in any correction in the system. Various reports are generated in graphical output format and being pictorial representation it is found more convenient to understand by the users of the system.6.6 Validation TestingIn validation testing, the requirements established as a part of software requirements analysis are validate against the software that has been constructed. Validation testing provides final assurance that the software meets all functional, behavioral and performance requirements. After each validation test case has been done, one of the two possible conditions exists:The function or performance characteristics conform to specifications and are accepted.A deviation from specification is uncovered and a deficiency list is created.6.7 Test Cases Project Title : E-GovernanceSoftware Tool: PHPTest Case NoTest DataDB TableName(s)InfluencedForm(s)/Report(s)InvolvedExpected ResultActual ResultRemarks1.uname:ksebadminpassword:kseb8login_infoLogin.phpLoginSuccessfulLogged SuccessfullyPassed2 uname:ksebadmin Password: 123login_infoLogin.phpLoginfailureInvalid userFailedIncorrect password3uname:kwadminpassword:kwa8login_infoLogin.phpLoginSuccessfulLogged SuccessfullyPassed4 uname:kwadmin Password: 123login_infoLogin.phpLoginfailureInvalid userFailedIncorrect password5uname:bsnladminpassword:bsnl8login_infoLogin.phpLoginSuccessfulLogged SuccessfullyPassed6 Uname:bsnladmin Password: 123login_infoLogin.phpLoginfailureInvalid userFailedIncorrect password7Register dataRegister _infoRegister.phpRegister data added successfully Register data added successfullyPassed 8uname:tinatpassword:tinatlogin_infoLogin.phpLoginSuccessfulLogged SuccessfullyPassed9 uname:tinat Password: 123login_infoLogin.phpLoginfailureInvalid userFailedIncorrect password10Kseb applicationKseb detailsKSEB ApplicationForm.phpKseb details added successfullyKseb details successfullyPassed 11Kwa applicationKwa detailsWaterAuthority_Application_Form.phpKwa details added successfullyKw successfully a details Passed 12BSNL applicationBSNL detailsKSEBApplicationForm.phpKseb details added successfullyKseb successfully details Passed 12Payment dataPayment _infoPayment.phpPayment data added/edited/deleted successfully Payment data added/edited/deleted successfullyPassed 14Account dataaccount _infoaccount.phpaccount data added successfully account data added successfullyPassed 15complaint datacomplaintcomplaint.phpcomplaint added successfully complaint added successfullyPassed 7. SYSTEM IMPLEMENTATIONThe implementation is the final and important phase. It involves user training, system testing in order to ensure successful running of the proposed system. Once the system design phase is over, the next stage is to implement and monitors the operation of the system to ensure that it continues the work effectively and efficiently.The three main phases in implementation take place in series. These are the initial installation, the test of the system as a whole and evaluation maintenance and control of the system. The implementation plan and action to implement should be bound closely together. The implementation plan is a function of line management at least as far as key decision or alternative plans are concerned.The implementation plan was to convert the existing clerical files to the computer. The implementation plan listed all sub tasks so that individuals in the organization may be assigned specific responsibilities.The installation of the new system that is bound to replace the current one may require a major revision of computer facilities as well as completely new after space. Space planning took into account the space occupied by the people, space by equipment and the movement of people and equipment in the working investment. After conduction the initial testing the system is loaded on the client office’s computer. Some of the user employees in this case are selected. These users are trained first and they run the system. A detailed documentation is prepared to this set of employees. There may be slight modifications to meet the organization.After all modifications specified by the users in the documentation are made, the computer system is run along with manual system. Even though this kind of parallel run make extra burden to the employees and management, the system is run in parallel for the sake of checking reliability and efficiency. After this document, which compares the result of the manual system with those of the computerized is prepared. If there is any modifications are made as needed.A procedure is developed for delivering instructions and forms to supervisors for coordination and integrating the proposal with other parts of the organization, and for working out of problems with people involved. This procedure also helped for evaluation of hardware and software. A program was developed to emphasis the nature and goals of the new system on the management and the support personnel and train operation personnel in their new tasks.In the case of management many of whom participated in the development of the system short seminars were given. Particular attention was paid to the training of end users. The training sessions were aimed at giving the user staff the specific skills required in their new jobs. They were given practical training to have a thorough understanding of what the new system is like and how it behaves.Education involved creating the right atmosphere and motivation of user staff. It explained the need for changes and helped to overcome the resentment caused by the feeling that computers took away the responsibility from individual departments.Various measures have been taken by department officials in order to find suitable solutions by the following issues:About the skill to be acquired.Reduction of man power in departmentAbout the new form having all required option.8. SYSTEM MAINTENANCEMaintenance is the enigma of system development. It holds the software industry captive, trying up programming resources. Analysts and programmers spend far more time maintaining resources. As important as it is, many programmers and analysts are reluctant to perform or identify themselves with the maintenance effort. There is psychological, personality, and professional reasons for this.Whereas the cost of hardware has steadily declined, the cost of producing programs has skyrocketed. That is software maintenance is expensive. One way to reduce maintenance costs is through maintenance management and software modification audits. Software modification consists of program rewrites system level updates, and re-audits of low-ranking programs to verify and correct the soft spots. The outcome should be more reliable software, a reduced maintenance backlog, and higher satisfaction and morale among the maintenance staff. After the installation phase is completed and the user staff is adjusted to the changes created by the candidate system evaluation and maintenance. Like any system, there is an aging process that requires periodic maintenance of hardware & software for customer evaluation, tasks required to obtain customer feedback based on evaluation of the software representations created during the engineering stage and implemented during the installation stage.TYPES OF SYSTEM MAINTANANCECORRECTIVECorrective maintenance of a system becomes necessary to rectify the bugs while the system is in use.ADAPTIVEA system might need maintenance when the customers need the product to run on new platforms, on new operating systems, or when they need the product to be interfaced with new hardware and software.PERFECTIVEA system needs maintenance to support the new features that users want it to support ,to change different functionalities of the system according of customer demands, or to enhance the performance of the system.9 FUTURE SCOPEScope means adding, modifying, or developing the code to support the changes in the specification. It is the process of adding new capabilities such as reports, new interfaces with other systems and new feature such as better screen or report layoutThe proposed system is developed and tested with some amount of sample data, which satisfy all the requirements. It has high degree of accuracy, user friendliness efficiency. The system is flexible and changes, if any can be made with out much difficulty. Further improvements and extensions can be made in the system to make overall work easier.Further modifications and extensions in the system can made to make overall work easier like the library make online. Those options are not in the software can be included to improve the efficiency of the software. The major enhancements are Online facilityMore report preparationAdding more option for searching10 CONCLUSIONThis page is meant for the technology conclusions of the project report. In the former pages, all details about the development of software have been explained.E-governance is developed as web application using PHP as front end and MYSQL as back end. Every effort has been made to make the system as user friendly as possible. All the activities provide a feeling like an easy walk over to the user who is interacting with the system. Trial run of the system has been made and gave good results.The new system has overcome most of the limitations of the existing system and works according to the design specification given. The developed systems dispense the problem and meet the needs of by providing reliable and comprehensive information. All the requirements projected by the user have been met by the system.All the modules are tested separately and put together to from the main system.E-Governance is designed in an attractive fashion to generate user interest. Thus the project was successfully completed in the allotted span of time with satisfactory performance.The key features of the system are:User friendlyResource requirement is lessEase in handling and implementationAdaptable to future enhancements11 GANTT CHARTGantt chart shows time relationship between ‘events’ of the production program has regarded as revolutionary in management. Gantt chart recognize the total program goals and it should be regarded as a series of inter-related supporting plan (or events), that people can comprehend and follow The following figure is the Gantt Chart of Revenue Management System. The plan explain the task verses the time they will take to complete.10-11-201720-11-201702-12-201714-12-201722-12-201701-02-201820-02-201817-03-201809-01-201815-01-201823-01-201827-03-2018 Project PlanSystem AnalysisDesignCoding &Unit TestingSystem TestingProject implementationProject Reporting and DocumentationAPPENDIX A12 SCREEN SHOTHomeUser RegistrationAPPLICATION FOR KSEBBsnl applicationKwa applicationAccount detailsKseb admin homeKseb meter readingKwa homeKwa meter readingBsnl homeBsnl bill13 SOURCE CODEconnection<?php$sel=mysql_connect('localhost','root','');$con=mysql_select_db('e_gov',$sel);?>User register<?phpif(isset($_REQUEST['b1'])){//echo "asds";$name=$_POST['name'];$dob=$_POST['dob'];$gender=$_POST['gender'];$email=$_POST['email'];$place=$_POST['place'];$ph=$_POST['ph'];$username=$_POST['username'];$password=$_POST['password'];$curdate=$_POST['curdate'];$sql="insert into registration values('$name','$dob','$gender','$email','$place','$ph','$username',curdate())";$ex=mysql_query($sql);mysql_query("insert into login values('$username','$password','user')");if($ex>0){echo "<script>alert('Sucess.........');location.href='index.php';<script>";}else{//echo "Sorry Try Again...";echo die(mysql_error());}}?>Login<?phpif(isset($_REQUEST['button'])){echo "sdfsfd";$user = $_REQUEST['t1'];$pass = $_REQUEST['t2'];$sql = mysql_query("select * from login where Uname='$user' and Password='$pass'");if(mysql_num_rows($sql)>0){$role = mysql_fetch_array($sql);if($role['role']== "user"){$_SESSION['user'] = $user;header("location:userhome.php");}else if($role['role']== "bsnlhome"){$_SESSION['bsnl'] = $user;header("location:BSNLhome.php");}else if($role['role']== "ksebhome"){$_SESSION['kseb'] = $user;header("location:KSEBhome.php");}else if($role['role']== "waterhome"){$_SESSION['water'] = $user;header("location:WATERHome.php");}?>Bsnl application<?phpob_start();session_start();$user = $_SESSION['user'];include "connect.php";if(isset($_REQUEST['b'])){$selectcircle=$_POST['t2'];$name=$_POST['t3'];$mobno=$_POST['mn'];$landlineno=$_POST['t6'];$email=$_POST['t7'];$typesofservice=$_POST['t8'];$planid=$_POST['t9'];$address=$_POST['t10'];$district=$_POST['t11'];$panchayat=$_POST['t12'];$village=$_POST['t13'];$pincode=$_POST['t14'];$convenientday=$_POST['t15'];$sql="insert into tb_application_bsnl values('','$selectcircle','$name','$mobno','',$landlineno,'$email','$typesofservice','$planid','$address','$district','$panchayat','$village',$pincode,'$convenientday','$user')";$ex=mysql_query($sql);if($ex>0){$msg = "Sucessfully Applied......... Waiting for Sanction";header("location:userhome.php?msg=$msg");}else{echo die(mysql_error());}?>Kseb application<?phpif(isset($_REQUEST['b1'])){$name=$_POST['t2'];$sectionname=$_POST['t4'];$emailid=$_POST['t5'];$permanentaddress=$_POST['t6'];$communicationaddress=$_POST['t7'];$connectiontype=$_POST['s1'];$addresspremises=$_POST['t9'];$blockno=$_POST['t10'];$surveyname=$_POST['t11'];$village=$_POST['t12'];$buildingno=$_POST['t13'];$localbody=$_POST['t14'];$nearelecpost=$_POST['t15'];$purpose=$_POST['sl3'];$noofphases=$_POST['r'];$totalconnected=$_POST['t18'];$sql="insert into tbapplicationkseb values('','$name','','$sectionname','$emailid','$permanentaddress','$communicationaddress','$connectiontype','$addresspremises',$blockno,'$surveyname','$village',$buildingno,'$localbody','$nearelecpost','$purpose','$noofphases',$totalconnected,'$user')";$ex=mysql_query($sql);if($ex){$msg = "Sucessfully Applied and Waiting For Approval......";header("location:userhome.php?msg=$msg");}else{echo die(mysql_error());}?>Kwa application<?phpif(isset($_REQUEST['b'])){$name=$_POST['t2'];$address=$_POST['t3'];$telephoneno=$_POST['t4'];$plotarea=$_POST['t5'];$purpose=$_POST['t6'];$sizeofconnection=$_POST['t7'];$sewerconnection=$_POST['t8'];$category=$_POST['t9'];$sql="insert into tb_application_water values('','$name','$address',$telephoneno,'$plotarea','$purpose','$sizeofconnection','$sewerconnection','$category','','$user')";$ex=mysql_query($sql);if($ex>0){ $msg = "Sucessfully Applied.....<p>Waiting for sanction...!"; header("location:userhome.php?msg=$msg");}else{echo "Sorry Try Again";}?>Add account<?phpob_start();session_start();$id=$_SESSION['user'];include 'connect.php';/*$select = mysqli_query($conn,"select * from registration where id=$id");if(mysqli_num_rows($select)>0){$getdata = mysqli_fetch_array($select);$cname = $getdata['username'];} */$sql1="select * from bank where holdername='$id'";$ex1=mysql_query($sql1);if($ex1){$n1=mysql_num_rows($ex1);if($n1>0){$c=mysql_fetch_array($ex1);}}if(isset($_REQUEST["button"])){$ano=$_REQUEST["accno"];$cno=$_REQUEST["cardno"];$cv=$_REQUEST["cvv"];$exm=$_REQUEST["exmonth"];$exy=$_REQUEST["exyear"];$ctype=$_REQUEST["cardtype"];$hname=$_REQUEST["holdername"];$bnk=$_REQUEST["bank"];$bal=$_REQUEST["balance"];$check = mysql_query("select * from bank where Accountno='$ano' and holdername='$hname'");$sql="insert into bank (Accountno,cardno,cvv,exmonth,exyear,Cardtype,holdername,Bankname,balance) values ('$ano','$cno','$cv','$exm','$exy','$ctype','$hname','$bnk',$bal)";$exe=mysql_query($sql);if($exe){echo "<script language='javascript'>alert('Successfully Inserted');location.href='userhome.php?pg=acc';</script>";}else {echo die(mysql_error());}}?>14 REFERENCEText booksPHP complete reference-Steven HolznerPHP and MySQL Bible-Tim Converse, Joy SparkPHP Essentials-Julice MeloneySoftware Engineering-PressmanWebsites ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download

To fulfill the demand for quickly locating and searching documents.

It is intelligent file search solution for home and business.

Literature Lottery

Related searches