Final
Final
Project done by
S. JANARTHANAN ( Reg.No.21CS0519)
V. NAVEEN ( Reg.No.21CS0528)
K. SUGUMAR ( Reg.No.21CS0550)
Under The Guidance
of
Mr. SHANMUGAM, MCA.,
Assistant Professor
Department of Computer Science
Project report submitted in partial fulfilment of the requirements for the Degree
of
BACHELOR OF SCIENCE
Of
Pondicherry University
1
BONAFIDE CERTIFICATE
This work has been submitted elsewhere for the award of Similar for any other Degree to the
best out knowledge.
Submitted for the University Examination held on. ......................................at Rajiv Gandhi
Arts and Science College, Thavalakuppam, Pondicherry.
2
ACKNOWLEDGEMENT
First and foremost, I would like to thank the Almighty for showering his blessings and
helping me to pursue and complete this project “GYM MANAGEMENT SYSTEM”
successfully.
The successful completion of any task would be incomplete without mentioning the
people who it possible. We thank this privilege to express a few words of gratitude and respect
to all those who helped us in completion of this project.
With profound gratitude, I thank Dr. J. HANNAH MONISHA, M.Sc., M.Phil., Ph.D.,
Principal of Rajiv Gandhi Arts and Science College, Thavalakuppam, Puducherry, who
has always been a constant source of inspiration not only during the project period, but also in
academic activities.
It’s my duty to thank my parents and my family members for their rich source of
inspiration and advice.
Last but not least I wish to thank all my friends for their constant source of
encouragement and motivation to carry out this project and for their timely help at critical
situation.
3
ABSTRACT
4
LIST OF TABLE
TABLE 1 USER 35
TABLE 2 EQUIPMENT 36
TABLE 3 MEMBER 37
TABLE 4 SCHEDULE 38
TABLE 5 FEES 39
TABLE 6 ATTENDANCE 40
5
LIST OF FIGURES
6
TABLE OF CONTENT
ACKNOWLEDGMEN
ABSTRACT
LIST OF TABLES AND FIGURES
1
INTRODUCTION
11
ABOUT THE PROJECT
PLAN OF THE PROJECT
2 EXISTINGSYSTEM 13
PROPOSED SYSTEM
FEASIBILITY ANALYSIS
1. Economic Feasibility
2.Technical Feasibility
3. Social Feasibility
7
SYSTEM REQUIREMENTS SPECIFICATION
INTRODUCTION
REQUIREMENT ANALYSIS
3 HARDWARE REQUIREMENT
SOFTWARE REQUIREMENT
17
FUNCTIONAL REQUIREMENT
TECHNICAL ISSUES
OTHER REQUIREMENTS
SOFTWARE ENVIRONMENTS
SYSTEMDESIGN –PRELIMINARY
INTRODUCTION
BASIC DESIGN APPROACH
USER INTERFACE DESIGN
4 DATABASE DESIGN 32
Table: USER
Table: FEES
Table: MEMBER
Table: EQUIPMENT
Table: ATTENDANCE
Table: SCHEDULE
8
SYSTEM DESIGN- DETAILS
INTRODUCTION
MODULE
5 41
MODULE DESCRIPTION
USECASE DIAGRAM
DATAFLOW DIAGRAM
7 50
SCREENSHOTS
8 57
CONCLUSTION AND FUTURE ENHANCEMENTS
REFERENCES
9 59
9
INTRODUCTION
10
CHAPTER – I
INTRODUCTION
The title of the project is “GYM MANAGEMENT SYSTEM”. The aim of creating this
project is to bring every manual activity of the gym to the systematic. This helps making work
more easy for the gym admin and trainers as well as for user which is little bit complex because
doing it in manual manner.
Also helps to register the new gym member and also view the details of member and
their fee respectively.
Throughout the project the focus has been on presenting information and view details in
an easy and intelligible manner. The project is very useful for those who want to know about
“Gym Management System”.
To provide a view on the project, the report as been organize according to the develop
stages. It brings out all that was accomplished to implement the project.
11
PROBLEM DEFINITION AND FEASIBILITY
ANALYSIS
12
CHAPTER – II
2.1 INTRODUCTION
This chapter deals with the problem definition and feasibility analysis, which is an
important phase in the development of the project. Problem identification influences the whole
project and must be processed perfectly. The software requirement specification is produced at
the culmination of the analysis tasks. The function and performance allocated to software as a
part of system engineering are refined by establishing a complete information description,
detailed functional description, and design constraints, appropriate validation criteria and other
information pertinent to requirements. The proposed system handles all the essential activities
in the existing system. It is designed to speed up the existing process and provide the ability to
the user access the system on the move and ensures better user friendliness
The process of system analysis involves gathering of fact and figures about the
organization for which the new application is being developed. The process of system analysis
includes existing system along with the gathering of ideas that lead to the formation of the new
system. Analysis is the process of discovery, refinement, modeling and specification. The
information domain of the problem must be understood during analysis. The function and
behavior is to be defined. The analysis process should move form essential information toward
implement detail.
The primary goal of our project is to replace the existing manual system. By a project it
is ensured that all necessary data are, available at all times. The existing manual system is time-
consuming process and laborious task. This finally result in large volume of data. The purpose
of our project in general is to reduce lot of paper work.
Economic expenditure, recovering nature and to provide quick and timely services are
considered as primary object of our project. The objective also extends to develop User -
friendly environment. This is to admin and user efficiently by giving accurate and up to data
information regarding all the factors existing related to our project.
13
2.2.1 EXISITING SYSTEM
In the present scenario, people have to physically visit the gym to know the detail about the
Equipment in a venues ..
In this method they have to do the work manually and they need to maintain the Gym
member data securely.
In this method, It require more time for admin of the Gym venue.
Also, the storing and retrieving an information is a difficult task, it also requires much
amount of unnecessary worker to do the task.
Generally, there is delay in the admission process, this is due to number of admission they
receive each day.
Member can view themselves directly on the view user type option on application
through the their own id in desktop application
Admin will maintain the record by using the proper table to save records so that no
one can access it and make the data safe.
Member can check new information related to gym and health through the
application which will motivate them and all things would be uploaded from the admin's end.
The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system analysis the
feasibility study of the proposed system is to be carried out. This is to ensure that the proposed
system is not a burden to the company. For feasibility analysis, some understanding of the
major requirements for the system is essential.
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
14
2.3.1 Economical Feasibility
This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and development
of the system is limited. The expenditures must be justified. Thus the developed system as well
within the budget and this was achieved because most of the technologies used are freely
available. Only the customized products had to be purchased.
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the
available technical resources. This will lead to high demands on the available technical
resources. This will lead to high demands being placed on the client. The developed system
must have a modest requirement, as only minimal or null changes are required for
implementing this system.
The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must not feel
threatened by the system, instead must accept it as a necessity. The level of acceptance by the
users solely depends on the methods that are employed to educate the user about the system
and to make him familiar with it. His level of confidence must be raised so that he is also able
to make some constructive criticism, which is welcomed, as he is the final user of the system.
15
SYSTEM REQUIRMENTS SPECIFICATION
16
CHAPTER – III
SOFTWARE REQUIRMENTS SPECIFICATION
3.1 INTRODUCTION
Requirement specification involves studying the current business system to find out how
it works and where improvements should be made. The requirement is the feature that must be
included in a new system. The analysis of requirements should study and collecting the details
of existing system. Software requirements specification (SRS) is the technical way of
expressing the requirements for software product. It is treated as the first task of development
Process. The proposed system handles additional activities in the existing system.
The requirement analysis can build to generate the development of the project
requirements and the purpose of the document may involve maintain the details in performance
of the requirement specification .
3.2.1 Purpose
This project is aimed to develop the “Gym Management system ” for reducing the manual
evaluating the performance of the admin and give the accurate result for the gym member up
to date data performance.
3.2.2 Scope
Developing a desktop application for gym management presents a wide scope for
addressing various needs within the fitness industry. Here are several areas where such an
application could be valuable. By addressing these aspects comprehensively, a gym
17
management desktop application can streamline operations, enhance member experience, and
contribute to the overall success of fitness businesses.
3.2.3 Overview
The SRS document for the system covers the following two sections.
General description, this section provides overall description of the system, which
includes an overview of the .net components, functions and features. It describes user’s
characteristics, general constraints, and all assumption and dependencies.
Specific requirements, this section describes both functional and non- functional
requirements of the system. The functional requirement of the system. The functional
requirements section defines the system’s requirement specifications form functionalities point
of view. The non- function requirements section defines the system’s external interface, general
requirements, performance requirements, design constrains, etc. Which are dealt in
corresponding sub-sections.
The general description specify the software functionally and constraints on its defined
operation. The project construction shall be designed to run on a deployment or comparable
processor. The host computer shall have at least 2GB of installed STORAGE is preferable. The
host computer shall run Microsoft Windows.
This sub-section of the SRS provides a summary of the functions that the individual
modules should perform. The functional requirement may include technical status of the
project, risk analysis and economical issues.
It checks whether the proposed system can be by built with the existing technologies. It
includes the study of functions, performance and constraints that may after the ability to
achieve and acceptable system.
18
3.2.5.2 Risk Analysis
Risk analysis and management are a series of steps that helps us understand and manage
uncertainly. We should identify assets, manage and monitor the risk that are involved in our
project. The basic risk that was encountered by our team is to deliver the software product
within the stipulated time.
The relationship between Input and Output to the system is determined by the functional
requirement of the Software Requirement Specifications. The system should provide how the
system should react to particular inputs and how the system should behave in particular
situations. Functional requirements may be calculations, technical details, data manipulation
and processing and other specific functionality that define what a system is supposed to
accomplish.
Behavioral requirements explain what has to be done by identifying the necessary behavior
of a system. Behavioral requirements used to tell about both the functional and non-functional
requirements of the system.
19
3.6 TECHNICAL ISSUES
The front end with .NET is platform dependent and its user friendly. The login detail of
the user is used for authentication. So, Server is used as the back end. It acts as the back end
with security of the Data. This has the filename and secret key as its set of datasets. Each new
set of user has the datasets of filename and secret key details.
The prime requirement is that no error condition causes a project to exit abruptly.
All the system generated errors is directed to a separate page through proper ‘try
and catch’ block. The response to any sort of query is fairly fast.
Any error occurred in any process should return an error messages about the
nature of the error that is clear to the user.
This is used to estimate the effort required to identify and document the interfaces to
other systems and external entities within the project scope. The effort to identify and document
the external interface requirements includes defining business elements for each external
interface.
20
3.7.3 Design Constraints
When designing and creating constraints, it is a good idea to use a naming convention that
properly identifies the different types constraints. This is particularly important for diagnosing
errors that might occur.
Network Applications are available via network access, it is difficult, if not impossible,
to limit the population of end-users who may access the application. In order to protect sensitive
content and provide secure modes of data transmission, strong security measures must be
implemented. Security has to be enforced at two levels. At first level, no one other than the
person, who knows the user name and password, can be able to logon to the system. At the next
level, measures have to be taken so that any normal person does not exercise any of the
administrator rights.
The term software maintenance is commonly used to refer to the modifications that are
made to a software system in its initial release. This system is developed with ease of
maintenance in mind. The modules in this project are clearly documented and have power over
the least degree of coupling so that they can be modified independently.
Since the system is placed on for network users, any type users can use the system. The
system provides GUI interface for the users. The system provides in for to the users according
to their accessibility level.
21
3.7.8 Efficiency Requirements
This system is highly efficient in providing the required functionalities through efficient
coding that utilizes less time and storage. Quick time and time services are also provided.
The CLR is described as the “execution engine” of .NET. It provides the environment within
which programs run. The most important features are
Loading and executing programs, with version control and other such
features.
The following features of the .NET framework are also worth description.
Managed code
The code that targets .NET and which contains certain extra information - “metadata” to
describe itself. While both managed and unmanaged code can run in the runtime, only managed
code contains the information that allows the CLR to guarantee, for instance, safe execution
and interoperability.
Managed Data
With Managed Code comes Managed Data. CLR provides memory allocation and Deal
location facilities, and garbage collection. Some .NET languages use Managed Data by default,
such as C#, Visual Basic.NET and Jscript.NET, whereas others, namely C++, do not.
22
Targeting CLR can, depending on the language you’re using, impose certain constraints on the
features available. As with managed and unmanaged code, one can have both managed and
unmanaged data in .NET application – data that doesn’t get garbage collected but instead is
looked after by unmanaged code.
The CLR uses something called the Common Type System (CTS) to strictly enforce
type-safety. This ensures that all classes are compatible with each other, by describing types in
a common way. CTS define how types work within the runtime, which enables types in one
language to interoperate with types in another language, including cross-language exception
handling. As well as ensuring that types are only used appropriate ways, the runtime also
ensures that code doesn’t attempt to access memory that has not been allocated to it.
The CLR provides built-in support for language interoperability. To ensure that you can
develop managed code that can be fully used by developers using any programming language,
set of language features and rules for using them called the Common Language Specification
(CLs) has been defined. Components that follow these rules and expose only CLS features are
considered CLS-compliant.
.NET provides a single-rooted hierarchy of classes, containing over 7000 types. The root
of the namespace is called System; this contains basic types like Byte, Double, Boolean, and
String, as well as Object. All objects derive from system. Object. As well as objects, there are
value types. Value types can be allocated on the stack, which can provide useful flexibility.
There are also efficient means of conversion value types to object types if and when
necessary. The set of classes is pretty comprehensive, providing collections, file, screen, and
network I/O, threading, and so on, as well as XML and database connectivity. The class library
is subdivided into a number of sets (or namespaces), each providing distinct areas of
functionality, with dependencies between the namespaces kept to a minimum.
23
Languages Supported By .NET
The multi-language capability of the .NET Framework and Visual Studio.NET enables
developers to use their existing programming skills to built all types of application and XML
Web services. The .NET framework supports new versions of Microsoft’s old favorites Visual
Basic and C++ (as VB.NET and Managed C++), but there are also a number of new additions
to the family.
Visual Basic .NET has been updated to include many new and improved language
features that make it a powerful object-oriented programming language. These features include
inheritance, interfaces, and overloading, among others. Visual Basic also now supports
structured exception handling, custom attributes and also supports mult-threading.
Visual Basic.NET is also CLS compliant, which means that any CLS- compliant
language can use the classes, objects, and components you create in Visual Basic.NET.
Managed Extensions for C++ and attribute programming are just some of the
enhancements made to the C++ language. Managed Extensions simplify the task of migrating
existing C++ applications to the new .NET Framework.
Microsoft Visual J#.NET provides the easiest transition for Java- language developers
into the world of XML Web Services and dramatically improves the interoperability of Java
language programs with existing software written in a variety of other programming languages.
24
C#.NET is also compliant with CLS(Common Language Specification) and supports structured
exception handling. CLS is set of rules and constructs that are supported by the CLR (Common
Language Runtime). CLR is the runtime environment provided by the .NET Framework it
manages the execution of the code and also makes the development process easier by providing
services.
Constructions are used to initialize objects, whereas destructions are used to destroy
them. In other words, destructions are used to release the resources allocated to the object. In
C#.NET the sub finalize procedure is available. The sub finalize procedure is used to complete
the tasks that must be performed when an object is destroyed. The sub finalize procedure can
be called only from the class it belongs to or from derived classes.
Garbage collection is another new feature in C#.NET. The .NET Framework monitors
allocated resources, such as objects and variables. In addition, the .NET Framework
automatically releases memory for reuse by destroying objects that are no longer in use.
3.8.6 OVERLOADING
3.8.7 MULTITHREADING
C#.NET supports structured handling, which enables us to detect and remove errors ata
runtime. In C#.NET, we need to use Try…Catch…Finally statements to create exception
handlers. Using Try…Catch…Finally statements. We can create robust and effective exception
handlers to improve the performance of our application.
25
3.8.9 THE .NET FRAMEWORK
There are different types of application, such as Windows-based applications and Web-based
application.
A Windows Forms application in Visual Basic (VB) refers to a type of application built
using the Windows Forms framework within the Visual Basic programming language. Here's
a breakdown of its definition and explanation:
26
interface that users interact with to perform tasks or access features provided by the application.
Form Designer: Visual Studio, the integrated development environment (IDE) for
Visual Basic, provides a Form Designer tool that allows developers to visually design forms
by dragging and dropping controls onto a design surface. Developers can then customize the
appearance and behavior of these controls using properties and event handlers.
Code-behind: Behind the visual design of forms lies the code-behind file, typically
written in Visual Basic. This file contains the logic and functionality of the application,
including event handlers for user interactions, data processing, and integration with other
components or services.
Controls: Controls are user interface elements such as buttons, textboxes, checkboxes,
listboxes, and more, which are placed on forms to provide functionality and interactivity.
Developers can customize the properties and behavior of these controls to suit the requirements
of the application.
Data Access and Manipulation: Windows Forms applications often interact with data,
such as retrieving information from databases, processing user input, and displaying results.
Visual Basic provides libraries and tools for data access and manipulation, allowing developers
to integrate data-driven functionality into their applications.
27
Desktop applications offer several benefits that make them a preferred
choice for certain use cases:
1. Performance: Desktop applications typically run directly on the user's computer, leveraging
its resources fully. This can result in faster performance compared to web applications,
especially for tasks that require intensive processing or access to local hardware.
3. Rich User Interface: Desktop applications can provide a more immersive and
feature-rich user interface compared to web applications. They can leverage native operating
system controls and graphics libraries to create visually appealing and highly interactive
interfaces.
4. Access to Local Resources: Desktop applications have access to the full range of
local resources on the user's computer, including files, hardware devices (such as printers and
scanners), and peripherals. This allows them to integrate more seamlessly with the user's
environment and perform tasks that web applications cannot, such as accessing USB devices
or interacting with system settings.
5. Security: Desktop applications can offer greater security and data privacy compared
to web applications. Since they run locally on the user's computer, sensitive data may be less
vulnerable to attacks such as cross-site scripting or SQL injection.
7. Better Control: Users have more control over desktop applications, including
installation, updates, and configuration. This can be advantageous for businesses that require
strict control over their software environment or need to comply with regulatory requirements.
28
8. Performance Stability: Since desktop applications are not dependent on external
factors such as internet speed or server availability, their performance tends to be more stable
and predictable.
10. Offline Data Storage: Desktop applications can store data locally on the user's
computer, allowing for faster access and reducing reliance on external servers. This can be
particularly useful for applications that handle large volumes of data or require frequent access
to stored information.
Overall, desktop applications offer a range of benefits that make them well-suited for
certain use cases, particularly those that require high performance, offline access, access to
local resources, and a rich user interface.
2. Installed Locally: Desktop applications are installed directly on the user's computer
and run locally, utilizing the resources of the user's device. This allows for faster performance
and access to local hardware.
29
5. Access to Local Resources: Desktop applications have access to the full range of
local resources on the user's computer, including files, hardware devices (such as printers and
scanners), and peripherals. This allows them to interact with the user's environment and
integrate with other software installed on the system.
7. Security: Desktop applications can offer greater security and data privacy
compared to web applications. Since they run locally on the user's computer, sensitive data may
be less vulnerable to attacks such as cross-site scripting or SQL injection.
These characteristics make desktop applications well-suited for a wide range of use
cases, including productivity tools, multimedia applications, games, and business software.
They provide a rich user experience, high performance, and access to local resources, making
them a popular choice for both developers and users alike.
30
SYSTEM DESIGN – PRELIMINARY
31
CHAPTER - IV
4.1 INTRODUCTION
This document describes the requirement of the system. It is meant for use by the
developers and will be on the basis for validating the final delivered system of the design. This
gives an overall developed plan for the process structure to be developed.
Any changes made to the requirements in the future will have to go through a formal
change approval process. The developer is responsible for asking for clarification. Wherever it
is necessary, and will not make any alteration without the permission of the client.
The water fall model follows the “Top-Down approach” to developing the software.
The Top-Down approach starts with a more general conceptualization of the system and then
elaborated the design in a more detailed manner.
32
It consists of various models. Each model has its own specific steps for software
development. A suitable development model is selected by considering several factors like
requirement, application type, and application software to be used for development etc.
In waterfall model, I proceed from one phase to the next in a sequential manner.
Requirement Analysis, Design, Implementation, Testing, Deployment and Maintenance are the
different sequential phases. The objective of testing is to uncover errors. Thus the waterfall
model insists that proceed to the next phase only after completing previous phase perfectly.
Waterfall model is also known as classic life cycle model. Iterative water fall model The
Iterative water fall model approach overcomes the problems associated with the waterfall
model approach. If any difficulty or problem encounter in any phase may require going back
to the previous phase and performing the required modifications and proceeds sequentially.
Iterative water fall model approach overcomes the problems associated with the
waterfall model approach. If any difficulty or problem encounter in any phase may require
going back to the previous phase and performing the required modifications and proceeds
sequentially.
Prototyping model
After the requirement analysis a quick design is done. That is a working model of the
intended software is constructed. This focuses on a representation of the software that will be
visible to the user. This working model of the software is termed as a prototype. This prototype
is evaluated by the customer to ensure that all the requirements are incorporated.
The prototype will be modified according to the customer's suggestions. This process will be
repeated until I get a fully functional working model that satisfies all user requirements. Ideally
prototyping is a mechanism for identifying user requirements.
The format of the all interfaces was designed as possible as easy understanding and user
friendly. Pages were connected to each other in a consistent way. Operations that are done with
the system were repeatable. The design of the pages allows the users to use this easily.
33
4.3.1 Modularity
The concept of modularity in software has been espoused for almost 5 decades.
Software architecture embodies modularity ie, software is divided into separately name and
addressable, often called modules, which are integrated to satisfy problem requirements.
Modularity is the single attribute of software that allows a program to be intellectually
manageable.
4.3.2 Coupling
4.3.3 Cohesion
34
4.4.1 TABLE DESIGN
LOGIN ACCOUNT
2 PASSWORD1 TEXT 20 NOT NULL
PASSWORD
ADMIN OR
3 USERTYPE TEXT 20 NOT NULL
USERTYPE
35
Table name: EQUIPEMENT
36
Table name: MEMBER (register)
USER ID OF REGISRTER
1 RID TEXT 30 PRIMARY KEY
PERSON
CONTECT FOR
6 CON TEXT 30 NOT NULL
REGISTER MEMBER
37
Table name: FEES (register)
USER ID OF
1 FID TEXT 30 PRIMARY KEY
REGISRTER PERSON
NAME OF THE
2 NAME1 TEXT 30 NOT NULL
MEMBER
38
Table name: Schedule (register)
USER ID OF REGISRTER
1 TID TEXT 30 PRIMARY KEY
PERSON
WORKOUT DATE OF
3 DT2 INT 30 NOT NULL
MEMBR
39
Table name: ATN (register)
USER ID OF
1 TID TEXT 30 PRIMARY KEY
REGISRTER PERSON
NAME OF THE
2 NAME3 TEXT 30 NOT NULL
MEMBER
WORKOUT DATE OF
3 DATE3 INT 30 NOT NULL
MEMBR
40
SYSTEM DESIGN DETAILS
CHAPTER – V
41
SYSTEM DESIGN DETAILS
5.1 INTRODUCTION
This project consists of three modules namely,
1. Login Module
2. Admin Module
3. Register Module
4. User attendance Module
Login Module:
In this module, the administrator can add the account details like as the
admin name , contact person , address . The module also enable the admin to add
the user type account . The login module to save in data base to authentication of
user name, password , and user type to login move to verified the admin or user
type and show the form of admin form or user form.
Admin Module
In this module enable the admin to register the new member and created
the data in database connection.
• Register
• Fees register
• Equipment
• Time and schedule
• View details
42
User type Module
This module enable the user type login to show the view form . It contains
with the view details and attendance register of the member in gym academy. And
also see the data to search and see from with data base
• Attendance
• View details
USECASE DIAGRAM:
43
DATA FLOW DIAGRAM
Admin Activity:
44
USER ACTIVITY:
45
TESTING AND IMPLEMENTATION
46
CHAPTER – VI
TESTING AND IMPLEMENTATION
6.1 INTRODUCTION
Coding is the process of converting the design specifications in to source code.
Implementing the design properly makes the system complete. Although the time spent in
coding is small when total sequence of software development, cost is considered. The cost of
testing and maintenance are highly dependent on coding phase.
Coding Standards:
The first few lines are used for comments that describe the purpose of the form.
Description names are used for all variables, function names and constants.
All the functions and subroutines names begin with a lowercase letter
6.2 TESTING
The performance of any system reflects the amount of testing done on it. In every project
a crucial part is testing the activities, which help to access and improve the quality of product
that generates during the expansion and modification of the software. Quality attributes include
correctness, reliability efficiency and performance of standards and overall cost effectiveness.
Software testing is a critical element of software quality assurance and signifies the final review
of specification, design and coding. The testing objectives are
47
To finding an error while executing a program in the process of testing.
Unit testing comprises the set of test cases performed by an individual programmer prior
to combination of the unit into a large system. All four categories of test involving the unit
testing were performed. Applying the code with small input values for which the expected
results were known performed functional tests.
Performance tests were conducted to determine the program throughout and response
time stress and structural tests were also conducted to intentionally break the system and to
check the execution parts of the system respectively.
Test Cases
If a module is data coupled with another module, the unit testing was performed with dummy
values. For all modules, confirmation to consistent user interface was mainly checked.
Validations are done at each and every stage. Checks have been made in each and every unit
by giving invalid data and the system is found to found to function successfully in all units.
Thus unit-wise testing uncovers most of the errors.
Integration testing was performed in a regressive way. As and when a module was developed
and tested, it was integrated with the remaining modules. Bottom-up testing strategy was
followed in each case. Modules were integrated moving upward the control hierarchy. In
“GYM Management System” all the modules were tested individually first with testing in all
cases. Then they were integrated with the next higher level module. Within a module, the
subsystem was focused on those modules, which were tightly coupled. After a full-fledged
integration of all the modules to the main form, the application was tested for interface errors;
a correction error etc., and was corrected to work
successfully.
48
6.5 VALIDATION TESTING
Validation testing plays an important role. The application was developed especially for the
company and so it is necessary to confirm, whether the right details have been entered? Each
and sub-module was tested, whether it is provided the required functionalities? Each input field
was tested with the validation rules specified.
The main purpose of a system testing is to fully exercise the computer- based system. The
following are the types of system tests that are performed in this application.
The system was forced to fall in a variety of ways and verified whether recovery was properly
performed.
Performance testing is designed to test the run-time performance of the software within the
environment of an integrated system. Performance testing determines the amount of execution
time spent in various parts of the program throughout and response times.
Implementation
Implementation is the final stage of the project when theoretical design is turned into a working
system. It involves careful planning, investigation of current system and its constraints on
implementation, design of methods to achieve the changeover, training of staff in the
changeover procedures and evaluation of changeover methods. The programs, which are
developed earlier, are linked properly and put into operation with test data. The phase concludes
with the maintenance of the resources necessary, both hardware and software. The project was
implemented after completion of the coding and testing in the developer’s workplace and
proved to satisfy the user requirements.
49
SCREEN SHORT
50
Figure 1: LOGIN Page
51
Figure 3: NEW MEMBER REGISTER Page
52
Figure 5: HEALTH AND TIME UPDATE Page
53
Figure 7 : USER ACCESS Page
54
Figure 9 : EQUIPMENT Page
55
CONCLUSION
56
CHAPTER – VII
57
REFERENCES
58
CHAPTER VIII
BIBLIOGRAPHY
REFERENCES
Books:
1. Robert J. Oberg, Introduction to vb.net using .NET ,PHI,2002.
2. Andrew Troelsen, C# and .NET Platform , A press, 1st edition,2001.
3. Ben Albahari, Peter Drayton and Brad Merrill, C# Essentials
,SPD,2001.
4. Microsoft C# Language Specifications, WP Publishers and
Distributors Pvt.Ltd.,2001
5. RogerS. Pressman, Software Engineering: A practitioner’s
Approach, McGraw-Hill Components Inc., 2001.
6. Richard E. Fairley, Software Engineering Concepts, Tata McGraw-
Hill
Publishing Company Limited, New Delhi, 1997
Websites:
http://www.w3schools.com
http://www.researchgate.net/publication/2862568_Temporal_Constraint_Reasoning_With_Pr
eferences
http://sherpa.hepforge.org/theses/diss_schaelicke.pdf
http://homepages.ius.edu/rwisman/C455/html/notes/Chapter22/TopSor
t.htm
http://www.personal.kent.edu/~rmuhamma/Algorithms/MyAlgorithms/GraphAlgor/topoSort.
htm
59