e governance doc

Upload: pavani-reddy

Post on 06-Apr-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 e Governance Doc..

    1/50

    1

    CHAPTER 1

    INTRODUCTION

    The use of Information Technology for Government services facilitates an efficient, speedy and

    transparent process for disseminating Information to the public and other agencies and performing

    government administrations activities. The emphasis has been an providing better services to citizen and

    in improving internal productivity.

    This has redefined the fundamentals and has the potential to change the institutions as well as the

    mechanisms of delivery of services forever. It is in this context that the issues of Smart Governance -

    Electronic Governance needs to be analyzed. Quite obviously, therefore, the objective of achieving

    Electronic Governance (EG) goes far beyond mere computerization of standalone back office operations.

    It means to fundamentally change as to how the Government operates and this implies a new set of

    responsibilities for the executive, legislature and the citizenry. The effort should aim to bring about a

    social catharsis, which needs to be orchestrated in a comprehensive, concerted and planned fashion.

    Electronic Governance is the application of Information Technology to the processes of Government

    functioning to bring about

    Simple

    Moral

    Accountable

    Responsive and

    Transparent Governance.

  • 8/2/2019 e Governance Doc..

    2/50

    2

    E-Governance demands standards in all areas. Some of the key areas are:

    Identification of Govt. Departments with maximum citizen interface Government departments which

    have maximum interaction with the public must be identified for the use of IT. Listed below are a few

    such departments that can be considered:

    Public Grievances:

    Electricity, Water, Telephone, Ration Card, Sanitation, Public Rural Services:

    Land Records, Below Poverty Line (BPL) /EWS Families

    Social Services:

    Registration of Licenses and Certificates Ration Cards, Birth Certificates, Income Certificate.

    E-Governance:

    I use the phrase "Representative E-Government" to describe the e-democracy activities of government

    institutions. Others call this "e-governance ".

    In our project we choose some of the public sectors where there is more need of the Govt. activities such

    as electricity bill payments, issue of cast & birth certificates, telephone bill payments and we are also

    doing online chatting so the user can interact directly to the Govt. and can provide his /her suggestions for

    better governance. By using our project a person can pay his/her utility bills very easily, without the need

    of going to the particular offices and waiting for a long time.

  • 8/2/2019 e Governance Doc..

    3/50

  • 8/2/2019 e Governance Doc..

    4/50

    4

    2.2. PROPOSED SYSTEM

    The use of Information Technology for Government services facilitates an efficient, speedy and

    transparent process for disseminating Information to the public and other agencies and performing

    government administrations activities. The emphasis has been providing a better service to citizens and in

    improving internal productivity. This has redefined the fundamentals and has the potential to change the

    institutions as well as the mechanisms of delivery of services forever. It is in context that the issues of

    Smart Governance - Electronic Governance needs to be analyzed.

    Advantages:

    A fast and more efficient service to all customers. As there are thousands of customer records;Searching process is an easy task.

    Saving in staff time in entering and manipulating data. Easy input, deletion and manipulation of lot of customer details. Capable of printing both full and selected information. Simple correction of input errors and we can assess the calculation accurately

    2.3. FEASIBILITY STUDY

    All projects are feasible given unlimited resources and infinite time! Unfortunately, the development of

    computer-based system or product is more Likely plagued by a scarcity of resources and difficult delivery

    dates, it is both Necessary and prudent to evaluate the feasibility of a project at the earliest Possible time.

    Months or years of effort, thousands or millions of dollars, and Untold professional embarrassment can be

    averted if an ill-conceived system Is recognized early in the definition phase. The feasibility of proposed

    Online Leave Management System of RSR Engineering college of computer sciences could be evaluated

    as follows. There are three types of feasibility which are equally important. They are

    o Economical feasibilityo Technical feasibilityo Operational feasibility

  • 8/2/2019 e Governance Doc..

    5/50

    5

    2.3.1. Economic Feasibility

    Economic analysis is the most frequently used method for equating the effectiveness of a candidate

    system. More commonly known as cost / benefit analysis. The procedure is to determine the benefits and

    savings that are accepted from a candidate system and compare them with cost . The bottom line set up

    cost elements for introducing intranet services newly into an organization include

    Cost of set up, including hardware and software Cost of inventing information for use on your intranet Cost of creating new information Cost of designing and programming for intranet applications Cost of training

    2.3.2. Technical feasibility

    Technical feasibility centers on the existing system (hardware, s/w etc) and to what extent it can support

    the proposed addition. If the current computer is operating at 80% of capacity, then running another

    application could overload the system or require additional h\w. This involves financial considerations to

    accommodate technical enhancements. If the budget is a serious constraint, then the project is judged not

    feasible.The proposed system is planned to run on windows platform starting from 98-second version with

    Internet feasibility.

    2.3.3Operational Feasibility

    It refers to the feasibility of the product to be operational. Some products may work very well at design

    and implementation but may fail in the real time environment. It includes the study of additional human

    resource required and their technical expertise.

  • 8/2/2019 e Governance Doc..

    6/50

    6

    CHAPTER 3

    MODULE DESCRIPTION

    The Electronic Governance Services project has been divided into two modules.

    They are:

    USER ADMINISTRATOR

    Module-One: User

    User sends a request to agent then the agent will send response to user. This module deals with the

    management of the user information such as the personal details, applications, birth certificates, income

    certificates, telephone bills, electricity bill, login id, password, etc., He fill his details if they are correct

    then the user gets registered and he can buy the products there. If the information he gave is not correct

    then he will be not registered. In the login authentication form name, address, contact number, email id all

    other things have to be entered. After filling these details the user entered into online by getting registered

    Module-Two: Administrator

    This module deals with the management of the user information such as the payment criteria etc. Other

    responsibilities might include planning for future expansion and creating data base and table spaces,

    adding users and maintain security. The administrator is the monitoring authority of the system.

  • 8/2/2019 e Governance Doc..

    7/50

    7

    CHAPTER 4

    SYSTEM REQUIREMENTS

    System Requirements

    The software requirement analysis is produced at the culmination of the function and performance

    allocated to software as part of system engineered refined by establishing a complete information

    description, a detailed constraint, appropriate validation criteria, and other data related to requirements.

    4.1. Software Requirements:

    The following are the software specifications used for the development of this project.

    Operating system : Windows XP [NT based OS]

    Web Server : Java Web Server

    Server side scripting : Java server pages

    Client side scripting : Java Script

    Back-end Database : MS-ACCESS

    4.2. Hardware Requirements:

    The following are the hardware specifications used for development of the project

    Processor : Pentium IV

    RAM : 512 MB

    Hard disk : 80 GB

  • 8/2/2019 e Governance Doc..

    8/50

    8

    CHAPTER 5

    LITERATURE SURVEY

    A programming tool or software tool is a program or application that software developers use to create,

    debug, maintain, or otherwise support other programs and applications. The term usually refers to

    relatively simple programs that can be combined together to accomplish a task. The Chapter describes

    about the software tool that is used in our project.

    5.1. JAVA TECHNOLOGY

    Initially the language was called as oak but it was renamed as Java in 1995. The primary motivation

    of this language was the need for a platform-independent (i.e., architecture neutral) language that could be

    used to create software to be embedded in various consumer electronic devices.

    Java is a programmers language. Java is cohesive and consistent. Except for those constraints imposed by the Internet environment, Java gives the programmer,

    full control.

    Finally, Java is to Internet programming where C was to system programming.

    Importance of java to internet?

    Java has had a profound effect on the Internet. This is because; Java expands the Universe of objects that

    can move about freely in Cyberspace. In a network, two categories of objects are transmitted between the

    Server and the Personal computer. They are: Passive information and Dynamic active programs. The

    Dynamic, Self-executing programs cause serious problems in the areas of Security and probability.

  • 8/2/2019 e Governance Doc..

    9/50

    9

    5.2. FEATURES OF JAVA

    SECURITY:

    Every time you that you download a normal program, you are risking a viral infection. Prior to Java,

    most users did not download executable programs frequently, and those who did scan them for viruses

    prior to execution. Most users still worried about the possibility of infecting their systems with a virus. In

    addition, another type of malicious program exists that must be guarded against. This type of program can

    gather private information, such as credit card numbers, bank account balances, and passwords. Java

    answers both these concerns by providing a firewall between a network application and your computer.

    PORTABILITY:

    For programs to be dynamically downloaded to all the various types of platforms connected to the

    Internet, some means of generating portable executable code is needed .As you will see, the same

    mechanism that helps ensure security also helps create portability. Indeed, Javas solution to these two

    problems is both elegant and efficient.

    JAVA ARCHITECTUER:

    Java architecture provides a portable, robust, high performing environment for development. Java

    provides portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted

    on each platform by the run-time environment. Java is a dynamic system, able to load code when needed

    from a machine in the same room or across the planet

    OBJECT-ORIENTED:

    Java was not designed to be source-code compatible with any other language. This allowed the Java team

    the freedom to design with a blank slate. One outcome of this was a clean usable, pragmatic approach to

    objects. The object model in Java is simple and easy to extend, while simple types, such as integers, are

    kept as high-performance non-objects.

  • 8/2/2019 e Governance Doc..

    10/50

    10

    ROBUST

    The multi-platform environment of the Web places extraordinary demands on a program, because the

    program must execute reliably in a variety of systems. The ability to create robust programs was given a

    high priority in the design of Java. Java is strictly typed language; it checks your code at compile time and

    run time. Java virtually eliminates the problems of memory management and de-allocation, which is

    completely automatic.

    5.3. AN OVERVIEW OF JSP

    Introduction to JSP:

    Java server pages (JSP) is a technology used to create dynamic content on the web. With the spread of the

    Internet and increasing number of users registering with web sites, the static pages developed using

    HTML have become obsolete.

    A web site displays a welcome message along with the name to the reregistered user when the user logs

    on. Imagine that a static HTML page is developed for the each user. In this scenarios, when a user logs

    on, the server looks for the HTML pave of the user and sends the page back to the client.

    You can use JSP to create dynamic Web pages. Essentially, a JSP page is an HTML document with

    Embedded java code .A JSP file must be saved with the .jsp extension .A web application consists of both

    presentation and Business logic .Presentation represents the elements used to design the structure of a

    Web page in terms of page layout, color, and text. Business logic involves application of financial and

    business calculations. JSP technology segregates presentation from the business logic .For example; a web

    designer can design html pages.

    5.4. LIFE CYCLE OF JSP:

    When a client browser sends a request to the server, the server recognizes the request for JSP files by the

    file extension. The server compiles and converts JSP page into a servlet class. The server calls the process

    calls page compile to convert the JSP page into a servlet. The process creates the servlet class and builds a

    service () method by extracting contents of the JSP file. All the HTML tags in the JSP page are wrapped

    in the print method or the output methods. The elements of the JSP file and HTML java code are appear in

    the servlet in the same order as they are in the JSP file. The servlet is then compiled and run. The servlet

    creates an HTTP response, which is send to the client. The subsequent request will not go through the

    translation phase. Instead the subsequent requests to the server will call the compiled .class file.

    Therefore, the overhead of the page compilation usually happens at the first call to the server.

  • 8/2/2019 e Governance Doc..

    11/50

    11

    The request and response cycle of JSP

    You are familiar with the request and response cycle of the interaction between a server and clients. The

    steps involved in the request and response cycle are listed here.

    1. The client sends an HTTP request for a JSP page to the server. The request can be sent by usingeither a GET method or a POST method.

    2. The browser identifies the JSP file and compiles and loads the corresponding servlet class if theservlet class is not already present in the JVM. The server calls the service () method. The default

    service () method often passes the request and response to the doGet () method or doPost ()

    method. The servlet processes the input from the request and prepares an HTML page as a

    response.

    3. The response is sent back to the client browser .JSP can be used in different application mode.

    The JSP Application Models

    The JSP application model defines how JSPs can interact with each other. The JSP1.1 specification

    defines many models that describe how JSPs can interact.

    Some of these applications are listed here:

    o The simple modelo The n-tier modelo The loosely coupled Modelo The including Request Modelo The Forwarding Requests Model

    5.5. INTRODUCTION TO JDBC

    5.5.1. WHAT IS JDBC AND WHY JDBC?

    JDBC is a front end tool that enables databases access from programs written in java language and it

    uses the ODBC for the connectivity, JDBC is essentially a low level application-programming interface. It

    is called a low-level API since any data manipulations, storage and retrievals have to be done by the

    program itself. The next question that needs to be answered is why we need JDBC, once we have ODBC

    on hand. ODBC on hand. We can use the same ODBC as proven technology. Problem for doing this is

    ODBC gives C language API, which uses pointers extensively.

  • 8/2/2019 e Governance Doc..

    12/50

    12

    5.5.2. JDBC DRIVER TYPES:

    There are four types of JDBC drivers each having its own functionality. They are classified based on how

    they access data from the databases.

    NATIVE JDBC DRIVER: A JDBC driver, which is partially written in java and most of it, is

    implemented using native methods to access the databases. This is useful in case of a java application that

    can run only on some specific platforms.

    ALL-JAVA JDBC NET DRIVERS:

    A JDBC net driver, which uses a common network protocol to connect an inner intermediate server,

    which in turn employs native calls to connect to the databases. This approach is suited for swings where

    the request must go to through the intermediate server.

    JDBCODBC NET DRIVERS:

    A bridge driver provider with JDBC can connect to any type of database that is ODBC complaint. This

    approach is recommended since using ODBC Drivers. Which are industry standard now, would make an

    application truly portable across databases.

    NATIVE PROTOCOL ALLJAVA DRIVERS:

    This type of JDBC driver is written completely in java, and can access the database by making use of

    native protocols of the databases. This method of data access is suitable in case of intranets, whereeverything can run as an application, instead of a swing.

    5.5.3. JDBC ARCHITECTURE:

    Data Base Management:

    Database provides Storing and managing the data. It reduces the time of accessing. DBMS (Data Base

    Management System) used to retrieve data in the form of reports. MS-ACCESS stores data in the .mdb

    file format where as Ms-SQL stores data in the .dot file format. Java is one of the commonly used web-

    based GUI programming languages. Sun micro Systems has included JDBC-API as a part of JDK to

    enable java applications to communicate with a database.

    JDBC API:

    Java program can't directly communicate with an ODBC Driver. The ODBC API is written in the 'C'

    programming language .It uses pointers and other constructs that are not supported in java. JDBC

    provides a set of API's that can be used by java programs to connect to and manage the database only

    jdbc-odbc bridge+odbc driver. This type of jdbc driver provides DBMS or RDBMS can only understand

    SQL statements and not java language statements. There are four types of JDBC Drivers

  • 8/2/2019 e Governance Doc..

    13/50

    13

    1. JDBC-ODBC bridge + ODBC Driver

    2. Native API, partly java driver

    3. JDBC-Net, pure java driver

    4. Native protocol, pure java driver.

    We are using database access using the odbc driver.

    Fig: 5.5.3.1. JDBC Architecture

    JDBC DRIVER MANAGER:

    Function of the driver manager is to find out available drivers in the system and connect the application to

    the appropriate database whenever a connection is requested. However to help the driver manager identify

    different types of drivers, each should be registered with the driver manager.

    JDBC DRIVER:

    Function of the JDBC driver is to accept the SQL calls from the application and convert them into native

    calls to the database. However, in this process it may take help from other drivers or even servers, which

    depend on the type of JDBC driver we are using. Also it is possible that the total functionality of the

    database server could be built into server itself. Sun soft provider a special JDBC Driver called JDBC-

    ODBC Bridge driver, which can be used to connect any existing database that is ODBC complaint

    JAVA APPLICATIONS

    JDBC API

    JDBC DRIVER MANAGER

    JDBC

    DRIVER

    JDBC/

    ODBC

    DRIVER

    JDBC

    NET

    DRIVER

    ODBCMIDDLE

    WARE

    DB

    DB DB

  • 8/2/2019 e Governance Doc..

    14/50

    14

    JDBC-ODBC BRIDGE:

    If possible, use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This completely

    eliminates the client configuration required by ODBC. It also eliminates the potential that the Java VM

    could be corrupted by an error in the native code brought in by the Bridge (that is, the Bridge native

    library, the ODBC driver manager library, the ODBC driver library, and the database client library.

    What Is the JDBC- ODBC Bridge?

    The JDBC-ODBC Bridge is a JDBC driver, which implements JDBC operations by translating

    them into ODBC operations. To ODBC it appears as a normal application program. The Bridge

    implements JDBC for any database for which an ODBC driver is available. The Bridge is

    implemented as the

    JDBC connectivity:

    Sun.jdbc.odbc Java package and contains a native library used to access ODBC. The Bridge is a joint

    development of Innersole and Java Soft. The JDBC provides database-independent connectivity between

    the J2EE platform and a wide range of tabular data sources. JDBC technology allows an Application

    Component Provider to:

    Perform connection and authentication to a database server Manager transactions Move SQL statements to a database engine for preprocessing and execution Execute stored procedures Inspect and modify the results from Select statement

    Application:

    Application is a java program that needs the information to be modified in some database or wants to

    retrieve information.

  • 8/2/2019 e Governance Doc..

    15/50

    15

    CHAPTER 6

    SYSTEM DESIGN

    Introduction:

    Design is the first step in the development phase for any engineering product (or) system. It may be

    defined as the process of applying various techniques and principles for the purpose of defining a device,

    a process, or a system insufficient detail to permit its physical realization.

    Software design is an iterative process through which requirements are translated into a Blue print for

    constructing the software. The design is represented at a high level of abstraction. A level that can be

    directly translated to specific data, functional and behavioral requirements.

    Preliminary design is concerned with the transformation of requirements into a data and software

    architecture. Detail design focuses on refinements to the architectural representation. That leads to

    detailed Data structure and algorithmic representation for software.

    In the design step, the element of the analysis model gets converted into a data design, and architectural

    design, an interface design and a procedural design.

    The data design transforms the information domain model created during analysis into the datastructures that will be required to implement software.

    The architectural design defines the relationship among major structural elements of the program. The

    interface design describes how the software communicates within itself, to systems that interoperate with

    it, and with humans who use it. An interface implies a flow of information (e.g., data and /pr control).

    Therefore, the data and control flow diagrams provide the information required for interface design.

  • 8/2/2019 e Governance Doc..

    16/50

    16

    6.1. Design Process

    Design process is in between the analysis and implementation process. The following design diagrams

    (data flow diagrams and E-R diagrams) make it easy to understand and implement.

    The design process of software system has two levels.

    1. Systems Design or Top Level Design.

    2. Detailed Design or Logical Design.

    1. System Design or Top Level Design:

    In the system design the focus is on deciding which modules are needed for the system, the

    specification of these modules and how these modules should be interconnected.

    2. Design or Detailed Logical Design:

    In detailed design the interconnection of the modules or how the specifications of the modules can be

    satisfied is decided . Some properties for a software system design are

    Verifiability. Completeness. Consistency. Trace ability. Simplicity/understandability.

    Design principles:

    Basic design principles that enable the software engineer to navigate the design process are.

    The design process should not suffer from Tunnel vision. The design should be traceable to the analysis model. The design should not reinvent the wheel. The design should minimize the intellectual distance between the Software and the problem, as

    it exists in the real would.

    The design should exhibit uniformity and integrity. The design should be structured to accommodate changes.

  • 8/2/2019 e Governance Doc..

    17/50

    17

    6.1.1Uml diagrams:

    Use case Diagram:

    Use case is a description of a set of sequence of actions that a system performs that yields an observable

    result of value to a particular thing in a model. Graphically, use case is rendered as an ellipse with dashed

    lines, usually including only its name as shows below

    Fig: 6.1.1.1.Use case Diagrams

    Use of use case diagram:

    It is used for testing executable systems and also for understanding the executable systems. It is widely used in modeling the context of a system These diagrams are also recognized in modeling requirement of a system.

    enter hsc no

    receive bill

    pay bill

    User

    request birth certificate

    generate e-bill

    enter credit card details

    Admin

    login

  • 8/2/2019 e Governance Doc..

    18/50

    18

    Sequence Diagrams:

    A sequence diagram is an interaction diagram that emphasizes the time ordering of the messages.

    Graphically, a sequence diagram is a table that shows objects arranged along the X-axis and messages,

    ordered in increasing time, along the Y-axis.

    Administrator Sequence Diagram

    Figure: 6.1.1.2.Sequence diagram for Administrator

    :Login :Electricity bill :Credit card:Admin

    1.enter login details

    2.check

    3.success

    4.generate electricity bill

    5.update the user credit card details

  • 8/2/2019 e Governance Doc..

    19/50

    19

    User sequence diagram:

    Figure: 6.1.1.3.Sequence diagram for birth certificate

    :User :HSC :Electricity bill :Birth certificate

    1.enter hsc number2.check

    3.pay the bill

    4.fill the details for birth certificate

  • 8/2/2019 e Governance Doc..

    20/50

    20

    6.2 .Database design

    The goal of Database Design is to generate a set of relation schemes that allow us to store

    information without unnecessary redundancy and allows us to retrieve information easily. We can

    achieve optimization, ease of use in maintenance by designing the database using relational model

    between or among the tables.

    To reduce redundancy. To arrive at loss-less join. To reduce the time as compared to the present system. To reduce the number of errors

    6.2.1.Data Flow Diagrams:

    This Diagram server two purpose. Provides an indication of how date is transformed as it moves through the system.

    Disputes the functions and sub functions that transforms the dataflow.

    The Data flow diagram provides additional information that is used during the analysis of theinformation domain, and server as a basis for the modeling of functions.

    The description of each function presented in the DFD is contained is a process specificationscalled as PSPE

  • 8/2/2019 e Governance Doc..

    21/50

    21

    Notations:

    NAME DESCRIPTION SYMBOLS

    DATAFLOW

    PROCESS

    SOURCE

    DATA STORE

    Data move in a specific direction

    from an origin to a destination

    People, procedures, or devices that

    Use or produce (Transform) Data.

    The physicalComponent is not

    Identified.

    External sources or destination of

    data, which may be People,programs, organizations or other

    entities.

    Here data are stored or referenced bya process in theSystem.

    Table: 6.2.1.a. Data Flow notations

    Context-level DFD (Level 0)

    A level 0 DFD also called a fundamental system model or a context model... Represent the entire

    software element as a single bubble with input and output data indicated by incoming and outgoing arrows

    respectively. Additional process and information flow paths are represented as level 0 DFD is partitioned

    to reveal more details.

    Figure: 6.2.1.1. Dataflow diagram for Context level 0

    USER E-GOV

    DATA

    BASE

  • 8/2/2019 e Governance Doc..

    22/50

    22

    LEVEL1DFD

    User store

    Birth

    e-bill

    Figure: 6.2.1.2Dataflow diagram for level1

    USER

    Print

    Pay Bill

    Change

    User

    Fill in

    Accounting

    Period Data

    Admin

    Registration

    Login

    Birth

    Certificate

    Electricity

    Bill

  • 8/2/2019 e Governance Doc..

    23/50

    23

    6.2.2 Data base tables

    A data dictionary is a cataloga repositoryof the elements in the system. As the name suggests, these

    elements center on data and the way they are structured to meet user requirements and organization needs.

    A data dictionary is a collection of data about data. The basic idea is to provide information on the

    definition, structure and the user of the element an organization uses.

    In this project we create two tables using MS-ACCESS queries

    Table Name: credit

    NAME TYPE DESCRIPTION

    HSC

    CRDNO

    AMOUNT

    BANK

    NUMBER

    NUMBER

    NUMBER

    TEXT

    CONSUMER NUMBER

    CREDIT CARD NO

    BALANCE AMOUNT

    NAME OF THE BANK

    Table 6.2.2.1. User credit table

    TABLE NAME: e-bill

    NAME TYPE DESCRIPTION

    HSCNO

    NAME

    ADDRESS

    PRV

    PRS

    AMOUNT

    LASTDATE

    NUMBER

    TEXT

    TEXT

    NUMBER

    NUMBER

    NUMBER

    DATE

    PHONE NUMBER

    NAME OF THE USER

    PRESENT ADDRESS

    NO OF LOCAL CALLS

    NO OF STD CALLS

    AMOUNT TO PAY

    LAST DATE TO PAY

    Table 6.2.2.2User e-bill table

  • 8/2/2019 e Governance Doc..

    24/50

    24

    TABLE NAME: birth

    Table 6.2.2.3.User birth table

    TABLE NAME: new user

    Table: 6.2.2.4.New user Table

    NAME TYPE DESCRIPTION

    APLN

    SEX

    DOB

    FNAME

    MNAME

    COMTY

    FCOMTY

    MCOMTY

    TEXT

    TEXT

    DATE&TIME

    TEXT

    TEXT

    TEXT

    TEXT

    TEXT

    NAME OF APLN

    SEX OF APLN

    DATE OF BIRTH

    FATHERS NAME

    MOTHERS NAME

    COMMTY OF THE USER

    FATHERS COMMTY

    MOTHERS COMMTY

    NAME TYPE DESCRIPTIONNAME

    ADDRESS

    PHNO

    DESG

    TEXT

    TEXT

    NUMBER

    TEXT

    NAME OF THE USER

    ADRS TO WHICH CONN IS REQ

    PHONE NUMBER FOR VERF-N

    DESIGNATION OF USER

  • 8/2/2019 e Governance Doc..

    25/50

    25

    TABLE NAME: vid

    Table 6.2.2.5.User vid table

    TABLE NAME: admin login

    Table:6.2.2.7.User admin login table

    NAME TYPE DESCRIPTION

    VID

    NAME

    ADDRESS

    TEXT

    TEXT

    TEXT

    VOTER ID

    NAME OF THE USER

    ADDRESS OF THE USER

    NAME TYPE DESCRIPTION

    USERID

    PASSWORD

    TEXT

    TEXT

    USER ID

    USER PASSWORD

  • 8/2/2019 e Governance Doc..

    26/50

  • 8/2/2019 e Governance Doc..

    27/50

    27

    CHAPTER 8

    SCREEN SHOTS

    Configuring the server

    Here we are configuring the Apache Tomcat server

    Whenever the server starts we have to deploy the server in click on deployment icon and select project

    under Add, in that select server(tomcat6) click

    Figure:8.1. Deployingtomcat server

    After completion redeploying it we have to open the web browser

  • 8/2/2019 e Governance Doc..

    28/50

    28

    In this select our project name then it will automatically displays the login page of our project..

    Figure: 8.2.home screen of tomcat server

  • 8/2/2019 e Governance Doc..

    29/50

    29

    INTRODUCTION

    Fig: 8.3.Introduction page

  • 8/2/2019 e Governance Doc..

    30/50

    30

    ADMIN LOGIN

    Fig: 8.4.Admin Login page

  • 8/2/2019 e Governance Doc..

    31/50

    31

    ADMIN PAGE

    Fig: 8.5.Admin home page

  • 8/2/2019 e Governance Doc..

    32/50

  • 8/2/2019 e Governance Doc..

    33/50

    33

    USER ADD SUCCESSFULLY

    Fig: 8.7.User added database

  • 8/2/2019 e Governance Doc..

    34/50

    34

    CREDIT DETAILS

    Fig: 8.8. User Credit Details

  • 8/2/2019 e Governance Doc..

    35/50

    35

    ADD CREDIT USER

    Fig: 8.9.Added credit details in database

  • 8/2/2019 e Governance Doc..

    36/50

    36

    ELECTRCITY BILLING FORM

    Fig: 8.10.Electricity bill form

  • 8/2/2019 e Governance Doc..

    37/50

    37

    BILL DETAILS

    Fig:8.11. Check the bill details

  • 8/2/2019 e Governance Doc..

    38/50

    38

    PAY THE ELECTRICITY BILL

    Fig: 8.12.Pay the electricity bill

  • 8/2/2019 e Governance Doc..

    39/50

    39

    Fig: 8.13.User paid the electricity bill

  • 8/2/2019 e Governance Doc..

    40/50

    40

    Fig: 8.13.1.Total Amount Details

  • 8/2/2019 e Governance Doc..

    41/50

    41

    SENDING MESSAGE

    Fig: 8.14. Sending message

  • 8/2/2019 e Governance Doc..

    42/50

    42

    SUCCESSFULLY SEND A MAIL

    Fig: 8.15.Successfully send a mail

  • 8/2/2019 e Governance Doc..

    43/50

    43

    USER REGISTRATION PAGE

    Fig: 8.16.User Birth certificate registration form

  • 8/2/2019 e Governance Doc..

    44/50

    44

    USER APPLICATION FORM

    Fig:8.17.User Application form

  • 8/2/2019 e Governance Doc..

    45/50

    45

    FILL THE APPLICATION DETAILS

    Fig: 8.18.Fill the application details

  • 8/2/2019 e Governance Doc..

    46/50

    46

    USER DATA IS REGISTERED

    Fig: 8.19.User data is registered

  • 8/2/2019 e Governance Doc..

    47/50

    47

    CHAPTER 9

    TESTING

    Introduction

    System testing is a critical element of software quality assurance and represents the ultimate review of

    specification, design and coding. Software testing fundamentals define the overriding objectives for

    software testing. Testing is one of the steps in the software engineering process that could be viewed

    (psychologically, at least) as destructive rather than constructive.

    This will create two problems.

    Time delay between the cause and appearance of the problem.The effect of the system errors on files and records within the system.

    The purpose of the system testing is to consider all the likely variations to which it will be

    suggested and push the system to its limits. The testing process focuses on logical intervals of the

    software ensuring that all the statements have been tested and on the function intervals (i.e.,) conducting

    tests to uncover errors and ensure that defined inputs will produce actual results that agree with the

    required results.

    White-Box Testing (GLASS-BOX TESTING)

    White-box tests focus on the program control structures. Test cases are derived to ensure that all statement

    in the program has been executed at least once during testing and that all logical conditions have been

    exercised. Knowing the internal working of a product, tests can be conducted to ensure that all gears

    mesh, that is the internal operation performs according to specification and all internal components

    have been adequately exercised. White box testing is a test case design methods that uses the controlstructure of the procedural design to design to derive test cases.

    Guarantee that all independent paths within a module have been exercised at least . Exercise all logical decision on their and false sides Execute all loops at their boundaries and within their operational bounds. Exercise internal data structures to ensure their validity.

  • 8/2/2019 e Governance Doc..

    48/50

    48

    Black-Box Testing:

    Black-Box testing focuses on the functional requirements of the software .it is not an alternative to white-

    box techniques. Rather, it is a complementary approach that is likely to uncover a different class of errors

    than white-box methods.

    Black- box testing attempts to find the following types of Errors

    o Incorrect or missing functions.o Interface errors.o Errors in data structures or external database access.o Performance errors ando Initialization and termination errors.

    Unit Testing

    Unit testing focuses verification effort on the smallest unit of software design. Using the procedural

    design description, important control paths are tested to uncover errors within the boundary of the module.

    The unit test is normally the constrained scope established for unit testing. The unit test is normally white

    box oriented, and the step can be conducted in parallel for multiple Modules.

    Integration Testing

    Integration testing is a systematic technique for constructing the program structure while conducting

    tests to uncover errors associate with interfacing. The objective is to take unit tested modules and build a

    program structure that has been dictated by design. There is often a tendency to attempt non-incremental

    integration to construct the program using big bang approach. Incremental integration is the anti thesis of

    big bang approach.

    Verification and Validation:

    Validation is a process of finding out if the product being built is right? I.e. whatever the software product

    is being developed; it should do what the user expects it to do. The software product should functionally

    do what it is supposed to, it should satisfy all the functional requirements set by the user. Validation is

    done during or at the end of the development process in order to determine whether the product satisfies

    specified requirements.

  • 8/2/2019 e Governance Doc..

    49/50

    49

    CHAPTER 10

    CONCLUSION

    This project is able to successfully incorporate all the requirements as specified by the public. Our

    state govt... Proposed this system. There is no complexity to the public & private sectors. It maintains

    efficiently and effectively all the governmental activities. Appropriate changes have been taken during

    the database design to maintain database integrity and to avoid redundancy data. Validations are

    done instantaneously to avoid inconsistency of the data. The user provided a friendly interface by hiding

    all technical complexities.

    With the help of this application compared to the old existing system which is done manually the

    time is reduced very much and is very useful and applicable for the users. Our application

    consists about Tender Extractions ,All Certificates related to govt like Birth certificates, income

    certificates and using this we can pay the electricity bills, telephone bills etc.

  • 8/2/2019 e Governance Doc..

    50/50

    CHAPTER 11

    BIBLIOGRAPHY

    1. Software Engineering - Practitioners Approach byRoger S. Pressman, McGraw Hill InternationalEdition.

    2. An Introduction to Database System by C. J. Date.

    3. Java Complete References by Patrik Norton.

    4. CORE Servlets & JSP from sun micro systems by MARTHALL

    5. UML in 24 Hours - SAMS outline by JOSEPH SCHMULLER.

    6. Thinking in Java by Bruce Eckel.

    7. Java2 Complete Reference by Herbert Scheldt.

    WEBSITES REFERRED

    The following links were searched and exploited extensively for the project development and

    implementation.

    1. www.microsoft.com/iis2. www.oracle.com3. www.Jsp.com4. www.javascript.com5. www.sun.com6. www.Jsp-help.com7. www.egov.mit.gov.in8. www.undp.org.in9 www digitalgovernance org

    http://www.microsoft.com/iishttp://www.microsoft.com/iishttp://www.oracle.com/http://www.oracle.com/http://www.asp.com/http://www.asp.com/http://www.javascript.com/http://www.javascript.com/http://www.sun.com/http://www.sun.com/http://www.asp-help.com/http://www.asp-help.com/http://www.egov.mit.gov.in/http://www.egov.mit.gov.in/http://www.undp.org.in/http://www.undp.org.in/http://www.digitalgovernance.org/http://www.digitalgovernance.org/http://www.digitalgovernance.org/http://www.undp.org.in/http://www.egov.mit.gov.in/http://www.asp-help.com/http://www.sun.com/http://www.javascript.com/http://www.asp.com/http://www.oracle.com/http://www.microsoft.com/iis