e governance doc
TRANSCRIPT
-
8/2/2019 e Governance Doc..
1/50
1
CHAPTER 1
INTRODUCTION
The use of Information Technology for Government services facilitates an efficient, speedy and
transparent process for disseminating Information to the public and other agencies and performing
government administrations activities. The emphasis has been an providing better services to citizen and
in improving internal productivity.
This has redefined the fundamentals and has the potential to change the institutions as well as the
mechanisms of delivery of services forever. It is in this context that the issues of Smart Governance -
Electronic Governance needs to be analyzed. Quite obviously, therefore, the objective of achieving
Electronic Governance (EG) goes far beyond mere computerization of standalone back office operations.
It means to fundamentally change as to how the Government operates and this implies a new set of
responsibilities for the executive, legislature and the citizenry. The effort should aim to bring about a
social catharsis, which needs to be orchestrated in a comprehensive, concerted and planned fashion.
Electronic Governance is the application of Information Technology to the processes of Government
functioning to bring about
Simple
Moral
Accountable
Responsive and
Transparent Governance.
-
8/2/2019 e Governance Doc..
2/50
2
E-Governance demands standards in all areas. Some of the key areas are:
Identification of Govt. Departments with maximum citizen interface Government departments which
have maximum interaction with the public must be identified for the use of IT. Listed below are a few
such departments that can be considered:
Public Grievances:
Electricity, Water, Telephone, Ration Card, Sanitation, Public Rural Services:
Land Records, Below Poverty Line (BPL) /EWS Families
Social Services:
Registration of Licenses and Certificates Ration Cards, Birth Certificates, Income Certificate.
E-Governance:
I use the phrase "Representative E-Government" to describe the e-democracy activities of government
institutions. Others call this "e-governance ".
In our project we choose some of the public sectors where there is more need of the Govt. activities such
as electricity bill payments, issue of cast & birth certificates, telephone bill payments and we are also
doing online chatting so the user can interact directly to the Govt. and can provide his /her suggestions for
better governance. By using our project a person can pay his/her utility bills very easily, without the need
of going to the particular offices and waiting for a long time.
-
8/2/2019 e Governance Doc..
3/50
-
8/2/2019 e Governance Doc..
4/50
4
2.2. PROPOSED SYSTEM
The use of Information Technology for Government services facilitates an efficient, speedy and
transparent process for disseminating Information to the public and other agencies and performing
government administrations activities. The emphasis has been providing a better service to citizens and in
improving internal productivity. This has redefined the fundamentals and has the potential to change the
institutions as well as the mechanisms of delivery of services forever. It is in context that the issues of
Smart Governance - Electronic Governance needs to be analyzed.
Advantages:
A fast and more efficient service to all customers. As there are thousands of customer records;Searching process is an easy task.
Saving in staff time in entering and manipulating data. Easy input, deletion and manipulation of lot of customer details. Capable of printing both full and selected information. Simple correction of input errors and we can assess the calculation accurately
2.3. FEASIBILITY STUDY
All projects are feasible given unlimited resources and infinite time! Unfortunately, the development of
computer-based system or product is more Likely plagued by a scarcity of resources and difficult delivery
dates, it is both Necessary and prudent to evaluate the feasibility of a project at the earliest Possible time.
Months or years of effort, thousands or millions of dollars, and Untold professional embarrassment can be
averted if an ill-conceived system Is recognized early in the definition phase. The feasibility of proposed
Online Leave Management System of RSR Engineering college of computer sciences could be evaluated
as follows. There are three types of feasibility which are equally important. They are
o Economical feasibilityo Technical feasibilityo Operational feasibility
-
8/2/2019 e Governance Doc..
5/50
5
2.3.1. Economic Feasibility
Economic analysis is the most frequently used method for equating the effectiveness of a candidate
system. More commonly known as cost / benefit analysis. The procedure is to determine the benefits and
savings that are accepted from a candidate system and compare them with cost . The bottom line set up
cost elements for introducing intranet services newly into an organization include
Cost of set up, including hardware and software Cost of inventing information for use on your intranet Cost of creating new information Cost of designing and programming for intranet applications Cost of training
2.3.2. Technical feasibility
Technical feasibility centers on the existing system (hardware, s/w etc) and to what extent it can support
the proposed addition. If the current computer is operating at 80% of capacity, then running another
application could overload the system or require additional h\w. This involves financial considerations to
accommodate technical enhancements. If the budget is a serious constraint, then the project is judged not
feasible.The proposed system is planned to run on windows platform starting from 98-second version with
Internet feasibility.
2.3.3Operational Feasibility
It refers to the feasibility of the product to be operational. Some products may work very well at design
and implementation but may fail in the real time environment. It includes the study of additional human
resource required and their technical expertise.
-
8/2/2019 e Governance Doc..
6/50
6
CHAPTER 3
MODULE DESCRIPTION
The Electronic Governance Services project has been divided into two modules.
They are:
USER ADMINISTRATOR
Module-One: User
User sends a request to agent then the agent will send response to user. This module deals with the
management of the user information such as the personal details, applications, birth certificates, income
certificates, telephone bills, electricity bill, login id, password, etc., He fill his details if they are correct
then the user gets registered and he can buy the products there. If the information he gave is not correct
then he will be not registered. In the login authentication form name, address, contact number, email id all
other things have to be entered. After filling these details the user entered into online by getting registered
Module-Two: Administrator
This module deals with the management of the user information such as the payment criteria etc. Other
responsibilities might include planning for future expansion and creating data base and table spaces,
adding users and maintain security. The administrator is the monitoring authority of the system.
-
8/2/2019 e Governance Doc..
7/50
7
CHAPTER 4
SYSTEM REQUIREMENTS
System Requirements
The software requirement analysis is produced at the culmination of the function and performance
allocated to software as part of system engineered refined by establishing a complete information
description, a detailed constraint, appropriate validation criteria, and other data related to requirements.
4.1. Software Requirements:
The following are the software specifications used for the development of this project.
Operating system : Windows XP [NT based OS]
Web Server : Java Web Server
Server side scripting : Java server pages
Client side scripting : Java Script
Back-end Database : MS-ACCESS
4.2. Hardware Requirements:
The following are the hardware specifications used for development of the project
Processor : Pentium IV
RAM : 512 MB
Hard disk : 80 GB
-
8/2/2019 e Governance Doc..
8/50
8
CHAPTER 5
LITERATURE SURVEY
A programming tool or software tool is a program or application that software developers use to create,
debug, maintain, or otherwise support other programs and applications. The term usually refers to
relatively simple programs that can be combined together to accomplish a task. The Chapter describes
about the software tool that is used in our project.
5.1. JAVA TECHNOLOGY
Initially the language was called as oak but it was renamed as Java in 1995. The primary motivation
of this language was the need for a platform-independent (i.e., architecture neutral) language that could be
used to create software to be embedded in various consumer electronic devices.
Java is a programmers language. Java is cohesive and consistent. Except for those constraints imposed by the Internet environment, Java gives the programmer,
full control.
Finally, Java is to Internet programming where C was to system programming.
Importance of java to internet?
Java has had a profound effect on the Internet. This is because; Java expands the Universe of objects that
can move about freely in Cyberspace. In a network, two categories of objects are transmitted between the
Server and the Personal computer. They are: Passive information and Dynamic active programs. The
Dynamic, Self-executing programs cause serious problems in the areas of Security and probability.
-
8/2/2019 e Governance Doc..
9/50
9
5.2. FEATURES OF JAVA
SECURITY:
Every time you that you download a normal program, you are risking a viral infection. Prior to Java,
most users did not download executable programs frequently, and those who did scan them for viruses
prior to execution. Most users still worried about the possibility of infecting their systems with a virus. In
addition, another type of malicious program exists that must be guarded against. This type of program can
gather private information, such as credit card numbers, bank account balances, and passwords. Java
answers both these concerns by providing a firewall between a network application and your computer.
PORTABILITY:
For programs to be dynamically downloaded to all the various types of platforms connected to the
Internet, some means of generating portable executable code is needed .As you will see, the same
mechanism that helps ensure security also helps create portability. Indeed, Javas solution to these two
problems is both elegant and efficient.
JAVA ARCHITECTUER:
Java architecture provides a portable, robust, high performing environment for development. Java
provides portability by compiling the byte codes for the Java Virtual Machine, which is then interpreted
on each platform by the run-time environment. Java is a dynamic system, able to load code when needed
from a machine in the same room or across the planet
OBJECT-ORIENTED:
Java was not designed to be source-code compatible with any other language. This allowed the Java team
the freedom to design with a blank slate. One outcome of this was a clean usable, pragmatic approach to
objects. The object model in Java is simple and easy to extend, while simple types, such as integers, are
kept as high-performance non-objects.
-
8/2/2019 e Governance Doc..
10/50
10
ROBUST
The multi-platform environment of the Web places extraordinary demands on a program, because the
program must execute reliably in a variety of systems. The ability to create robust programs was given a
high priority in the design of Java. Java is strictly typed language; it checks your code at compile time and
run time. Java virtually eliminates the problems of memory management and de-allocation, which is
completely automatic.
5.3. AN OVERVIEW OF JSP
Introduction to JSP:
Java server pages (JSP) is a technology used to create dynamic content on the web. With the spread of the
Internet and increasing number of users registering with web sites, the static pages developed using
HTML have become obsolete.
A web site displays a welcome message along with the name to the reregistered user when the user logs
on. Imagine that a static HTML page is developed for the each user. In this scenarios, when a user logs
on, the server looks for the HTML pave of the user and sends the page back to the client.
You can use JSP to create dynamic Web pages. Essentially, a JSP page is an HTML document with
Embedded java code .A JSP file must be saved with the .jsp extension .A web application consists of both
presentation and Business logic .Presentation represents the elements used to design the structure of a
Web page in terms of page layout, color, and text. Business logic involves application of financial and
business calculations. JSP technology segregates presentation from the business logic .For example; a web
designer can design html pages.
5.4. LIFE CYCLE OF JSP:
When a client browser sends a request to the server, the server recognizes the request for JSP files by the
file extension. The server compiles and converts JSP page into a servlet class. The server calls the process
calls page compile to convert the JSP page into a servlet. The process creates the servlet class and builds a
service () method by extracting contents of the JSP file. All the HTML tags in the JSP page are wrapped
in the print method or the output methods. The elements of the JSP file and HTML java code are appear in
the servlet in the same order as they are in the JSP file. The servlet is then compiled and run. The servlet
creates an HTTP response, which is send to the client. The subsequent request will not go through the
translation phase. Instead the subsequent requests to the server will call the compiled .class file.
Therefore, the overhead of the page compilation usually happens at the first call to the server.
-
8/2/2019 e Governance Doc..
11/50
11
The request and response cycle of JSP
You are familiar with the request and response cycle of the interaction between a server and clients. The
steps involved in the request and response cycle are listed here.
1. The client sends an HTTP request for a JSP page to the server. The request can be sent by usingeither a GET method or a POST method.
2. The browser identifies the JSP file and compiles and loads the corresponding servlet class if theservlet class is not already present in the JVM. The server calls the service () method. The default
service () method often passes the request and response to the doGet () method or doPost ()
method. The servlet processes the input from the request and prepares an HTML page as a
response.
3. The response is sent back to the client browser .JSP can be used in different application mode.
The JSP Application Models
The JSP application model defines how JSPs can interact with each other. The JSP1.1 specification
defines many models that describe how JSPs can interact.
Some of these applications are listed here:
o The simple modelo The n-tier modelo The loosely coupled Modelo The including Request Modelo The Forwarding Requests Model
5.5. INTRODUCTION TO JDBC
5.5.1. WHAT IS JDBC AND WHY JDBC?
JDBC is a front end tool that enables databases access from programs written in java language and it
uses the ODBC for the connectivity, JDBC is essentially a low level application-programming interface. It
is called a low-level API since any data manipulations, storage and retrievals have to be done by the
program itself. The next question that needs to be answered is why we need JDBC, once we have ODBC
on hand. ODBC on hand. We can use the same ODBC as proven technology. Problem for doing this is
ODBC gives C language API, which uses pointers extensively.
-
8/2/2019 e Governance Doc..
12/50
12
5.5.2. JDBC DRIVER TYPES:
There are four types of JDBC drivers each having its own functionality. They are classified based on how
they access data from the databases.
NATIVE JDBC DRIVER: A JDBC driver, which is partially written in java and most of it, is
implemented using native methods to access the databases. This is useful in case of a java application that
can run only on some specific platforms.
ALL-JAVA JDBC NET DRIVERS:
A JDBC net driver, which uses a common network protocol to connect an inner intermediate server,
which in turn employs native calls to connect to the databases. This approach is suited for swings where
the request must go to through the intermediate server.
JDBCODBC NET DRIVERS:
A bridge driver provider with JDBC can connect to any type of database that is ODBC complaint. This
approach is recommended since using ODBC Drivers. Which are industry standard now, would make an
application truly portable across databases.
NATIVE PROTOCOL ALLJAVA DRIVERS:
This type of JDBC driver is written completely in java, and can access the database by making use of
native protocols of the databases. This method of data access is suitable in case of intranets, whereeverything can run as an application, instead of a swing.
5.5.3. JDBC ARCHITECTURE:
Data Base Management:
Database provides Storing and managing the data. It reduces the time of accessing. DBMS (Data Base
Management System) used to retrieve data in the form of reports. MS-ACCESS stores data in the .mdb
file format where as Ms-SQL stores data in the .dot file format. Java is one of the commonly used web-
based GUI programming languages. Sun micro Systems has included JDBC-API as a part of JDK to
enable java applications to communicate with a database.
JDBC API:
Java program can't directly communicate with an ODBC Driver. The ODBC API is written in the 'C'
programming language .It uses pointers and other constructs that are not supported in java. JDBC
provides a set of API's that can be used by java programs to connect to and manage the database only
jdbc-odbc bridge+odbc driver. This type of jdbc driver provides DBMS or RDBMS can only understand
SQL statements and not java language statements. There are four types of JDBC Drivers
-
8/2/2019 e Governance Doc..
13/50
13
1. JDBC-ODBC bridge + ODBC Driver
2. Native API, partly java driver
3. JDBC-Net, pure java driver
4. Native protocol, pure java driver.
We are using database access using the odbc driver.
Fig: 5.5.3.1. JDBC Architecture
JDBC DRIVER MANAGER:
Function of the driver manager is to find out available drivers in the system and connect the application to
the appropriate database whenever a connection is requested. However to help the driver manager identify
different types of drivers, each should be registered with the driver manager.
JDBC DRIVER:
Function of the JDBC driver is to accept the SQL calls from the application and convert them into native
calls to the database. However, in this process it may take help from other drivers or even servers, which
depend on the type of JDBC driver we are using. Also it is possible that the total functionality of the
database server could be built into server itself. Sun soft provider a special JDBC Driver called JDBC-
ODBC Bridge driver, which can be used to connect any existing database that is ODBC complaint
JAVA APPLICATIONS
JDBC API
JDBC DRIVER MANAGER
JDBC
DRIVER
JDBC/
ODBC
DRIVER
JDBC
NET
DRIVER
ODBCMIDDLE
WARE
DB
DB DB
-
8/2/2019 e Governance Doc..
14/50
14
JDBC-ODBC BRIDGE:
If possible, use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This completely
eliminates the client configuration required by ODBC. It also eliminates the potential that the Java VM
could be corrupted by an error in the native code brought in by the Bridge (that is, the Bridge native
library, the ODBC driver manager library, the ODBC driver library, and the database client library.
What Is the JDBC- ODBC Bridge?
The JDBC-ODBC Bridge is a JDBC driver, which implements JDBC operations by translating
them into ODBC operations. To ODBC it appears as a normal application program. The Bridge
implements JDBC for any database for which an ODBC driver is available. The Bridge is
implemented as the
JDBC connectivity:
Sun.jdbc.odbc Java package and contains a native library used to access ODBC. The Bridge is a joint
development of Innersole and Java Soft. The JDBC provides database-independent connectivity between
the J2EE platform and a wide range of tabular data sources. JDBC technology allows an Application
Component Provider to:
Perform connection and authentication to a database server Manager transactions Move SQL statements to a database engine for preprocessing and execution Execute stored procedures Inspect and modify the results from Select statement
Application:
Application is a java program that needs the information to be modified in some database or wants to
retrieve information.
-
8/2/2019 e Governance Doc..
15/50
15
CHAPTER 6
SYSTEM DESIGN
Introduction:
Design is the first step in the development phase for any engineering product (or) system. It may be
defined as the process of applying various techniques and principles for the purpose of defining a device,
a process, or a system insufficient detail to permit its physical realization.
Software design is an iterative process through which requirements are translated into a Blue print for
constructing the software. The design is represented at a high level of abstraction. A level that can be
directly translated to specific data, functional and behavioral requirements.
Preliminary design is concerned with the transformation of requirements into a data and software
architecture. Detail design focuses on refinements to the architectural representation. That leads to
detailed Data structure and algorithmic representation for software.
In the design step, the element of the analysis model gets converted into a data design, and architectural
design, an interface design and a procedural design.
The data design transforms the information domain model created during analysis into the datastructures that will be required to implement software.
The architectural design defines the relationship among major structural elements of the program. The
interface design describes how the software communicates within itself, to systems that interoperate with
it, and with humans who use it. An interface implies a flow of information (e.g., data and /pr control).
Therefore, the data and control flow diagrams provide the information required for interface design.
-
8/2/2019 e Governance Doc..
16/50
16
6.1. Design Process
Design process is in between the analysis and implementation process. The following design diagrams
(data flow diagrams and E-R diagrams) make it easy to understand and implement.
The design process of software system has two levels.
1. Systems Design or Top Level Design.
2. Detailed Design or Logical Design.
1. System Design or Top Level Design:
In the system design the focus is on deciding which modules are needed for the system, the
specification of these modules and how these modules should be interconnected.
2. Design or Detailed Logical Design:
In detailed design the interconnection of the modules or how the specifications of the modules can be
satisfied is decided . Some properties for a software system design are
Verifiability. Completeness. Consistency. Trace ability. Simplicity/understandability.
Design principles:
Basic design principles that enable the software engineer to navigate the design process are.
The design process should not suffer from Tunnel vision. The design should be traceable to the analysis model. The design should not reinvent the wheel. The design should minimize the intellectual distance between the Software and the problem, as
it exists in the real would.
The design should exhibit uniformity and integrity. The design should be structured to accommodate changes.
-
8/2/2019 e Governance Doc..
17/50
17
6.1.1Uml diagrams:
Use case Diagram:
Use case is a description of a set of sequence of actions that a system performs that yields an observable
result of value to a particular thing in a model. Graphically, use case is rendered as an ellipse with dashed
lines, usually including only its name as shows below
Fig: 6.1.1.1.Use case Diagrams
Use of use case diagram:
It is used for testing executable systems and also for understanding the executable systems. It is widely used in modeling the context of a system These diagrams are also recognized in modeling requirement of a system.
enter hsc no
receive bill
pay bill
User
request birth certificate
generate e-bill
enter credit card details
Admin
login
-
8/2/2019 e Governance Doc..
18/50
18
Sequence Diagrams:
A sequence diagram is an interaction diagram that emphasizes the time ordering of the messages.
Graphically, a sequence diagram is a table that shows objects arranged along the X-axis and messages,
ordered in increasing time, along the Y-axis.
Administrator Sequence Diagram
Figure: 6.1.1.2.Sequence diagram for Administrator
:Login :Electricity bill :Credit card:Admin
1.enter login details
2.check
3.success
4.generate electricity bill
5.update the user credit card details
-
8/2/2019 e Governance Doc..
19/50
19
User sequence diagram:
Figure: 6.1.1.3.Sequence diagram for birth certificate
:User :HSC :Electricity bill :Birth certificate
1.enter hsc number2.check
3.pay the bill
4.fill the details for birth certificate
-
8/2/2019 e Governance Doc..
20/50
20
6.2 .Database design
The goal of Database Design is to generate a set of relation schemes that allow us to store
information without unnecessary redundancy and allows us to retrieve information easily. We can
achieve optimization, ease of use in maintenance by designing the database using relational model
between or among the tables.
To reduce redundancy. To arrive at loss-less join. To reduce the time as compared to the present system. To reduce the number of errors
6.2.1.Data Flow Diagrams:
This Diagram server two purpose. Provides an indication of how date is transformed as it moves through the system.
Disputes the functions and sub functions that transforms the dataflow.
The Data flow diagram provides additional information that is used during the analysis of theinformation domain, and server as a basis for the modeling of functions.
The description of each function presented in the DFD is contained is a process specificationscalled as PSPE
-
8/2/2019 e Governance Doc..
21/50
21
Notations:
NAME DESCRIPTION SYMBOLS
DATAFLOW
PROCESS
SOURCE
DATA STORE
Data move in a specific direction
from an origin to a destination
People, procedures, or devices that
Use or produce (Transform) Data.
The physicalComponent is not
Identified.
External sources or destination of
data, which may be People,programs, organizations or other
entities.
Here data are stored or referenced bya process in theSystem.
Table: 6.2.1.a. Data Flow notations
Context-level DFD (Level 0)
A level 0 DFD also called a fundamental system model or a context model... Represent the entire
software element as a single bubble with input and output data indicated by incoming and outgoing arrows
respectively. Additional process and information flow paths are represented as level 0 DFD is partitioned
to reveal more details.
Figure: 6.2.1.1. Dataflow diagram for Context level 0
USER E-GOV
DATA
BASE
-
8/2/2019 e Governance Doc..
22/50
22
LEVEL1DFD
User store
Birth
e-bill
Figure: 6.2.1.2Dataflow diagram for level1
USER
Print
Pay Bill
Change
User
Fill in
Accounting
Period Data
Admin
Registration
Login
Birth
Certificate
Electricity
Bill
-
8/2/2019 e Governance Doc..
23/50
23
6.2.2 Data base tables
A data dictionary is a cataloga repositoryof the elements in the system. As the name suggests, these
elements center on data and the way they are structured to meet user requirements and organization needs.
A data dictionary is a collection of data about data. The basic idea is to provide information on the
definition, structure and the user of the element an organization uses.
In this project we create two tables using MS-ACCESS queries
Table Name: credit
NAME TYPE DESCRIPTION
HSC
CRDNO
AMOUNT
BANK
NUMBER
NUMBER
NUMBER
TEXT
CONSUMER NUMBER
CREDIT CARD NO
BALANCE AMOUNT
NAME OF THE BANK
Table 6.2.2.1. User credit table
TABLE NAME: e-bill
NAME TYPE DESCRIPTION
HSCNO
NAME
ADDRESS
PRV
PRS
AMOUNT
LASTDATE
NUMBER
TEXT
TEXT
NUMBER
NUMBER
NUMBER
DATE
PHONE NUMBER
NAME OF THE USER
PRESENT ADDRESS
NO OF LOCAL CALLS
NO OF STD CALLS
AMOUNT TO PAY
LAST DATE TO PAY
Table 6.2.2.2User e-bill table
-
8/2/2019 e Governance Doc..
24/50
24
TABLE NAME: birth
Table 6.2.2.3.User birth table
TABLE NAME: new user
Table: 6.2.2.4.New user Table
NAME TYPE DESCRIPTION
APLN
SEX
DOB
FNAME
MNAME
COMTY
FCOMTY
MCOMTY
TEXT
TEXT
DATE&TIME
TEXT
TEXT
TEXT
TEXT
TEXT
NAME OF APLN
SEX OF APLN
DATE OF BIRTH
FATHERS NAME
MOTHERS NAME
COMMTY OF THE USER
FATHERS COMMTY
MOTHERS COMMTY
NAME TYPE DESCRIPTIONNAME
ADDRESS
PHNO
DESG
TEXT
TEXT
NUMBER
TEXT
NAME OF THE USER
ADRS TO WHICH CONN IS REQ
PHONE NUMBER FOR VERF-N
DESIGNATION OF USER
-
8/2/2019 e Governance Doc..
25/50
25
TABLE NAME: vid
Table 6.2.2.5.User vid table
TABLE NAME: admin login
Table:6.2.2.7.User admin login table
NAME TYPE DESCRIPTION
VID
NAME
ADDRESS
TEXT
TEXT
TEXT
VOTER ID
NAME OF THE USER
ADDRESS OF THE USER
NAME TYPE DESCRIPTION
USERID
PASSWORD
TEXT
TEXT
USER ID
USER PASSWORD
-
8/2/2019 e Governance Doc..
26/50
-
8/2/2019 e Governance Doc..
27/50
27
CHAPTER 8
SCREEN SHOTS
Configuring the server
Here we are configuring the Apache Tomcat server
Whenever the server starts we have to deploy the server in click on deployment icon and select project
under Add, in that select server(tomcat6) click
Figure:8.1. Deployingtomcat server
After completion redeploying it we have to open the web browser
-
8/2/2019 e Governance Doc..
28/50
28
In this select our project name then it will automatically displays the login page of our project..
Figure: 8.2.home screen of tomcat server
-
8/2/2019 e Governance Doc..
29/50
29
INTRODUCTION
Fig: 8.3.Introduction page
-
8/2/2019 e Governance Doc..
30/50
30
ADMIN LOGIN
Fig: 8.4.Admin Login page
-
8/2/2019 e Governance Doc..
31/50
31
ADMIN PAGE
Fig: 8.5.Admin home page
-
8/2/2019 e Governance Doc..
32/50
-
8/2/2019 e Governance Doc..
33/50
33
USER ADD SUCCESSFULLY
Fig: 8.7.User added database
-
8/2/2019 e Governance Doc..
34/50
34
CREDIT DETAILS
Fig: 8.8. User Credit Details
-
8/2/2019 e Governance Doc..
35/50
35
ADD CREDIT USER
Fig: 8.9.Added credit details in database
-
8/2/2019 e Governance Doc..
36/50
36
ELECTRCITY BILLING FORM
Fig: 8.10.Electricity bill form
-
8/2/2019 e Governance Doc..
37/50
37
BILL DETAILS
Fig:8.11. Check the bill details
-
8/2/2019 e Governance Doc..
38/50
38
PAY THE ELECTRICITY BILL
Fig: 8.12.Pay the electricity bill
-
8/2/2019 e Governance Doc..
39/50
39
Fig: 8.13.User paid the electricity bill
-
8/2/2019 e Governance Doc..
40/50
40
Fig: 8.13.1.Total Amount Details
-
8/2/2019 e Governance Doc..
41/50
41
SENDING MESSAGE
Fig: 8.14. Sending message
-
8/2/2019 e Governance Doc..
42/50
42
SUCCESSFULLY SEND A MAIL
Fig: 8.15.Successfully send a mail
-
8/2/2019 e Governance Doc..
43/50
43
USER REGISTRATION PAGE
Fig: 8.16.User Birth certificate registration form
-
8/2/2019 e Governance Doc..
44/50
44
USER APPLICATION FORM
Fig:8.17.User Application form
-
8/2/2019 e Governance Doc..
45/50
45
FILL THE APPLICATION DETAILS
Fig: 8.18.Fill the application details
-
8/2/2019 e Governance Doc..
46/50
46
USER DATA IS REGISTERED
Fig: 8.19.User data is registered
-
8/2/2019 e Governance Doc..
47/50
47
CHAPTER 9
TESTING
Introduction
System testing is a critical element of software quality assurance and represents the ultimate review of
specification, design and coding. Software testing fundamentals define the overriding objectives for
software testing. Testing is one of the steps in the software engineering process that could be viewed
(psychologically, at least) as destructive rather than constructive.
This will create two problems.
Time delay between the cause and appearance of the problem.The effect of the system errors on files and records within the system.
The purpose of the system testing is to consider all the likely variations to which it will be
suggested and push the system to its limits. The testing process focuses on logical intervals of the
software ensuring that all the statements have been tested and on the function intervals (i.e.,) conducting
tests to uncover errors and ensure that defined inputs will produce actual results that agree with the
required results.
White-Box Testing (GLASS-BOX TESTING)
White-box tests focus on the program control structures. Test cases are derived to ensure that all statement
in the program has been executed at least once during testing and that all logical conditions have been
exercised. Knowing the internal working of a product, tests can be conducted to ensure that all gears
mesh, that is the internal operation performs according to specification and all internal components
have been adequately exercised. White box testing is a test case design methods that uses the controlstructure of the procedural design to design to derive test cases.
Guarantee that all independent paths within a module have been exercised at least . Exercise all logical decision on their and false sides Execute all loops at their boundaries and within their operational bounds. Exercise internal data structures to ensure their validity.
-
8/2/2019 e Governance Doc..
48/50
48
Black-Box Testing:
Black-Box testing focuses on the functional requirements of the software .it is not an alternative to white-
box techniques. Rather, it is a complementary approach that is likely to uncover a different class of errors
than white-box methods.
Black- box testing attempts to find the following types of Errors
o Incorrect or missing functions.o Interface errors.o Errors in data structures or external database access.o Performance errors ando Initialization and termination errors.
Unit Testing
Unit testing focuses verification effort on the smallest unit of software design. Using the procedural
design description, important control paths are tested to uncover errors within the boundary of the module.
The unit test is normally the constrained scope established for unit testing. The unit test is normally white
box oriented, and the step can be conducted in parallel for multiple Modules.
Integration Testing
Integration testing is a systematic technique for constructing the program structure while conducting
tests to uncover errors associate with interfacing. The objective is to take unit tested modules and build a
program structure that has been dictated by design. There is often a tendency to attempt non-incremental
integration to construct the program using big bang approach. Incremental integration is the anti thesis of
big bang approach.
Verification and Validation:
Validation is a process of finding out if the product being built is right? I.e. whatever the software product
is being developed; it should do what the user expects it to do. The software product should functionally
do what it is supposed to, it should satisfy all the functional requirements set by the user. Validation is
done during or at the end of the development process in order to determine whether the product satisfies
specified requirements.
-
8/2/2019 e Governance Doc..
49/50
49
CHAPTER 10
CONCLUSION
This project is able to successfully incorporate all the requirements as specified by the public. Our
state govt... Proposed this system. There is no complexity to the public & private sectors. It maintains
efficiently and effectively all the governmental activities. Appropriate changes have been taken during
the database design to maintain database integrity and to avoid redundancy data. Validations are
done instantaneously to avoid inconsistency of the data. The user provided a friendly interface by hiding
all technical complexities.
With the help of this application compared to the old existing system which is done manually the
time is reduced very much and is very useful and applicable for the users. Our application
consists about Tender Extractions ,All Certificates related to govt like Birth certificates, income
certificates and using this we can pay the electricity bills, telephone bills etc.
-
8/2/2019 e Governance Doc..
50/50
CHAPTER 11
BIBLIOGRAPHY
1. Software Engineering - Practitioners Approach byRoger S. Pressman, McGraw Hill InternationalEdition.
2. An Introduction to Database System by C. J. Date.
3. Java Complete References by Patrik Norton.
4. CORE Servlets & JSP from sun micro systems by MARTHALL
5. UML in 24 Hours - SAMS outline by JOSEPH SCHMULLER.
6. Thinking in Java by Bruce Eckel.
7. Java2 Complete Reference by Herbert Scheldt.
WEBSITES REFERRED
The following links were searched and exploited extensively for the project development and
implementation.
1. www.microsoft.com/iis2. www.oracle.com3. www.Jsp.com4. www.javascript.com5. www.sun.com6. www.Jsp-help.com7. www.egov.mit.gov.in8. www.undp.org.in9 www digitalgovernance org
http://www.microsoft.com/iishttp://www.microsoft.com/iishttp://www.oracle.com/http://www.oracle.com/http://www.asp.com/http://www.asp.com/http://www.javascript.com/http://www.javascript.com/http://www.sun.com/http://www.sun.com/http://www.asp-help.com/http://www.asp-help.com/http://www.egov.mit.gov.in/http://www.egov.mit.gov.in/http://www.undp.org.in/http://www.undp.org.in/http://www.digitalgovernance.org/http://www.digitalgovernance.org/http://www.digitalgovernance.org/http://www.undp.org.in/http://www.egov.mit.gov.in/http://www.asp-help.com/http://www.sun.com/http://www.javascript.com/http://www.asp.com/http://www.oracle.com/http://www.microsoft.com/iis