OOSE
OOSE
Prepare the following documents and develop the software project startup, prototype model, using
software engineering methodology for at least two real time scenarios or for the sample experiments.
•Problem Analysis and Project Planning -Thorough study of the problem–Identify Project scope,
Objectives and Infrastructure.
•Software Requirement Analysis –Describe the individual Phases/modules of the project and Identify
deliverables. Identify functional and non-functional requirements.
•Data Modeling –Use work products –data dictionary.
•Software Designing -Develop use case diagrams and activity diagrams, build and test class diagrams,
sequence diagrams and add interface to class diagrams.
•Prototype model –Develop the prototype of the product.
The SRS and prototype model should be submitted for end semester examination.
There are registered people in the system. Some are approvers. An approver can also be
a requestor. In an organization, the hierarchy could be Engineers/Managers/Business
Managers/Managing Director etc. In a college, it could be Lecturer/Professor/Head of
the Department/Dean/Principal etc.
3.E-Bidding
Auctions are among the latest economic institutions in place. They have been used since antiquity
to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation,
we explore the efficiency of common auctions when values are interdependent-the value to a
particular bidder may depend on information available only to others-and asymmetric. In this
setting, it is well known that sealed-bid auctions do not achieve efficient allocations in general
since they do not allow the information held by different bidders to be shared.
Typically, in an auction, say of the kind used to sell art, the auctioneer sets a relatively low initial price.
This price is then increased until only one bidder is willing to buy the object, and the exact manner in which
this is done varies. In my model a bidder who drops out at some price can "reenter" at a higher price.
With the invention of E-commerce technologies over the Internet the opportunity to bid from the comfort
of one’s own home has seen a change like never seen before. Within the span of a few short years, what
may have begun as an experimental idea has grown to an immensely popular hobby, and in some cases, a
means of livelihood, the Auction Patrol gathers tremendous response every day, all day. With the point and
click of the mouse, one may bid on an item they may need or just want, and in moments they find that
either they are the top bidder or someone else wants it more, and you're outbid! The excitement of an
auction all from the comfort of home is a completely different experience.
Society cannot seem to escape the criminal element in the physical world, and so it is the same with
Auction Patrols. This is one area where in a question can be raised as to how safe Auction Patrols.
Proposed system
This project is mainly developed for the Account Division of a Banking sector to provide
better interface of the entire banking transactions. This system is aimed to give a better out
look to the user interfaces and to implement all the banking transactions like:
•Supply of Account Information
•New Account Creations
•Deposits
•Withdraws
•Cheese book issues
•Stop payments
•Transfer of accounts
•Report Generations.
Proposed System:
The development of the new system contains the following activities, which try to automate the entire
process keeping in view of the database integration approach.
•User friendliness is provided in the application with various controls.
•The system makes the overall project management much easier and flexible.
•Readily upload the latest updates, allows user to download the alerts by clicking the URL.
•There is no risk of data mismanagement at any level while the project development is under process.
• It provides high level of security with different level of authentication
REFERENCE BOOKS:
UML is a standard language for specifying, visualizing, constructing, and documenting the artifacts of
software systems.
GOALS OF UML
1. The picture is worth a thousand words; this absolutely fits while discussing about UML.
2. UML diagrams are not only made for developers but also for business users,
common people and anybody interested to understand the system.
3. The system can be a software or not a software. So it must be clear that.
A conceptual model can be defined as a model which is made of Concepts and their
relationships.
A conceptual model is the first step before drawing a UML diagram. It helps to
understand the entities in the real world and how they interact with each other.
Conceptual model of UML can be mastered by learning.
The following three major elements:
UML building blocks.
Object Oriented Analysis and Design
During object oriented analysis the most important purpose is to identify objects
and describing them in a proper way. If these objects are identified efficiently then the
next job of design is easy. The objects should be identified with responsibilities.
Responsibilities are the functions performed by the object. Each and every object has
some type of responsibilities to be performed. When these responsibilities are
collaborated the purpose of the system is fulfilled.
The second phase is object oriented design. During this phase emphasis is given upon the
requirements and their fulfillment. In this stage the objects are collaborated according to
their intended association. After the association is complete the design is also complete.
The third phase is object oriented implementation. In this phase the design is
implemented using object oriented languages like Java, C++ etc.
BUILDING BLOCKS
1. Things
2. Relationships
3. Diagrams
(1) Things
Things are the most important building blocks of UML. Things can be:
Structural
Behavioral
Grouping a
notational
Structural things
The Structural things define the static part of the model. They represent physical and
conceptual elements. Following are the brief descriptions of the structural things.
Class
Interface
Collaboration
Use case
Use case represents a set of actions performed by a system for a specific goal.
Component
Node
A behavioral thing consists of the dynamic parts of UML models. Following are the behavioral
things:
Interaction
State machine
State machine is useful when the state of an object in its life cycle is important. It defines the
sequence of states an object goes through in response to events. Events are external
factors responsible for state change.
Grouping things
Grouping things can be defined as a mechanism to group elements of a UML model together.
There is only one grouping thing available
SOFTWARE ENGINEERING LAB CSE
Package is the only one grouping thing available for gathering structural and behavioral
things
A notational thing
Note:
(2) Relationships
Relationships are another most important building block of UML. It shows how
elements are associated with each other and this association describes the functionality
of an application.
Dependency
Association
Generalization.
Realization
Dependency
Dependency is a relationship between two things in which change in one element also affects
the other one.
Association
Association is basically a set of links that connects elements of an UML model. It also describes
how many objects are taking part in that relationship.
Generalization
(3) Diagrams
Each UML diagram is designed to let developers and customers view a software system from a
different perspective and in varying degrees of abstraction. UML diagrams commonly created in
visual modeling tools include
Use Case Diagram displays the relationship among actors and use cases
Class Diagram models class structure and contents using design elements such as classes, packages
and objects. It also displays relationships such as containment, inheritance, associations and
others.
Interaction Diagrams
Sequence Diagram displays the time sequence of the objects participating in the interaction.
This consists of the vertical dimension (time) and horizontal dimension (different objects).
Collaboration Diagram displays an interaction organized around the objects and their links to
one another. Numbers are used to show the sequence of messages.
State Diagram displays the sequences of states that an object of an interaction goes through during its life in
response to received stimuli, together with its responses and actions.
Activity Diagram displays a special state diagram where most of the states are action states
and most of the transitions are triggered by completion of the actions in the source states. This
diagram focuses on flows driven by internal processing.
Physical Diagrams
Component Diagram displays the high level packaged structure of the code itself.
Dependencies among components are shown, including source code components, binary code
components, and executable components. Some components exist at compile time, at link time,
at run times well as at more than one time.
Deployment Diagram displays the configuration of run-time processing elements and the
software components, processes, and objects that live on them. Software component instances
represent run-time manifestations of code units.
A use case is a set of scenarios that describing an interaction between a user and a system. A
use case diagram displays the relationship among actors and use cases. The two main
components of a use case diagram are use cases and actors.
An actor is representing a user or another system that will interact with the system you are
modeling. A use case is an external view of the system that represents some action the user
might perform in order to complete a task.
1. Draw the lines around the system and actors lie outside the system.
2. Identify the actors which are interacting with the system.
3. Separate the generalized and specialized actors.
4. Identify the functionality the way of interacting actors with system and specify the
behavior of actor.
5. Functionality or behavior of actors is considered as use cases.
6. Specify the generalized and specialized use cases.
7. Se the relationship among the use cases and in between actor and use cases.
8. Adorn with constraints and notes.
9. If necessary, use collaborations to realize use cases.
Use cases are a relatively easy UML diagram to draw, but this is a very simplified example. This
example is only meant as an introduction to the UML and use cases. Start by listing a sequence
of steps a user might take in order to complete an action. For example, a user placing an order
with a sales company might follow these steps.
From this simple diagram the requirements of the ordering system can easily be derived. The
system will need to be able to perform actions for all of the use cases listed. As the project
progresses other use cases might appear. The customer might have a need to add an item to an
order that has already been placed. This diagram can easily be expanded until a complete
description of the ordering system is derived capturing all of the requirements that the system
will need to perform.
The <<extends>> Relationship
• <<Includes>> relationship represents behavior that is factored out of the use case.
• <<Includes>> behavior is factored out for reuse, not because it is an exception.
• The direction of a <<includes>> relationship i s to the using use case (unlike
<<extends>> relationships).
Class Diagrams
Class diagrams are widely used to describe the types of objects in a system and their
relationships. Class diagrams model class structure and contents using design elements such as
classes, packages and objects. Class diagrams describe three different perspectives when
designing a system, conceptual, specification, and implementation. These perspectives become
evident as the diagram is created and help solidify the design. This example is only meant as an
introduction to the UML and class diagrams. Classes are composed of three things: a name,
attributes, and operations.
The association relationship is the most common relationship in a class diagram. The
association shows the relationship between instances of classes. For example, the class Order is
associated with the class Customer. The multiplicity of the association denotes the number of
objects that can participate in the relationship. For example, an Order object can be associated
to only one customer, but a customer can be associated to many orders. Another common
relationship in
Class diagrams is a generalization. A generalization is used when two classes are similar, but
have some differences.
In this example the classes Corporate Customer and Personal Customer have some similarities
such as name and address, but each class has some of its own attributes and operations. The
class Customer is a general form of both the Corporate Customer and Personal Customer
classes. This allows the designers to just use the Customer class for modules and do not require
in-depth representation of each type of customer.
Class diagrams are used in nearly all Object Oriented software designs. Use them to describe
the Classes of the system and their relationships to each other.
Before drawing a class diagram consider the three different perspectives of the system the
diagram will present; conceptual, specification, and implementation. Try not to focus on one
perspective and try see how they all work together.
When designing classes consider what attributes and operations it will have. Then try to
determine how instances of the classes will interact with each other. These are the very first
steps of many in developing a class diagram. However, using just these basic techniques one
can develop a complete view of the software system.
Interaction Diagrams
Interaction diagrams model the behavior of use cases by describing the way groups of objects
interact to complete the task. The two kinds of interaction diagrams are sequence and
collaboration diagrams. This example is only meant as an introduction to the UML and
interaction diagrams.
Interaction diagrams are used when you want to model the behavior of several objects in a use case. They
demonstrate how the objects collaborate for the behavior. Interaction diagrams do not give an in depth
representation of the behavior. If you want to see what a specific object is doing for several use cases use
a state diagram. To see a particular behavior over many use cases or threads use an activity diagrams.
How to Draw: Interaction Diagrams
Sequence diagrams, collaboration diagrams, or both diagrams can be used to demonstrate the
interaction of objects in a use case. Sequence diagrams generally show the sequence of events
that occur. Collaboration diagrams demonstrate how objects are statically connected. Both
diagrams are relatively simple to draw and contain similar elements.
Sequence diagrams:
Sequence diagrams demonstrate the behavior of objects in a use case by describing the objects
and the messages they pass. the diagrams are read left to right and descending. The
example below shows an object of class 1 start the behavior by sending a message to an object
of class 2. Messages pass between the different objects until the object of class 1 receives the
final message
1. Set the context for the interactions, system, subsystem, classes, object or use cases.
2. Set the stages for the interactions by identifying objects which are placed as actions in
interaction diagrams.
3. Lay them out along the X-axis by placing the important object at the left side and others in
the next subsequent.
4. Set the lifelines for each and every object by sending create and destroy messages.
5. Start the message which is initiating interactions and place all other messages in the
increasing order of items.
6. Specify the time and space constraints.
7. Set the pre and post conditions.
Below is a slightly more complex example. The light blue vertical rectangles the objects activation while
the green vertical dashed lines represent the life of the object. The green vertical rectangles
represent when a particular object has control. The represents when the object is destroyed.
This diagrams also shows conditions for messages to be sent to other object. The condition is
listed between brackets next to the message. For example, a [condition] has to be met before
the object of class 2 can send a message () to the object of class 3.
The next diagram shows the beginning of a sequence diagram for placing an order. The object
an Order Entry Window is created and sends a message to an Order object to prepare the
order. Notice the the names of the objects are followed by a colon. The names of the classes
the objects belong to do not have to be listed. However the colon is required to denote that it is
the name of an object following the object Name :class Name naming system.
Next the Order object checks to see if the item is in stock and if the [InStock] condition is met it
sends a message to create an new Delivery Item object.
The next diagrams adds another conditional message to the Order object. If the item is [Out Of Stock] it
sends a message back to the Order Entry Window object stating that the object is out of stack.
This simple diagram shows the sequence that messages are passed between objects to
complete a use case for ordering an item.
Collaboration diagrams
Collaboration diagrams are also relatively easy to draw. They show the relationship between
objects and the order of messages passed between them. The objects are listed as icons and
arrows indicate the messages being passed between them. The numbers next to the messages
are called sequence numbers. As the name suggests, they show the sequence of the messages
as they are passed between the objects. There are many acceptable sequence numbering
schemes in UML. A simple 1, 2, 3... format can be used, as the example below shows, or for
more detailed and complex diagrams a 1, 1.1 ,1.2, 1.2.1... scheme can be used.
1. Set the context for interaction, whether it is system, subsystem, operation or class or one
scenario of use case or collaboration.
2. Identify the objects that play a role in the interaction. Lay them as vertices in graph, placing
important objects in center and neighboring objects to outside.
3. Set the initial properties of each of these objects. If the attributes or tagged values of an object
changes in significant ways over the interaction, place a duplicate object, update with these
new values and connect them by a message stereotyped as become or copy.
4. Specify the links among these objects. Lay the association links first represent structural
connection lay out other links and adorn with stereotypes.
5. Starting with the message that initiates this interaction, attach each subsequent message to
appropriate link, setting sequence number as appropriate.
The example below shows a simple collaboration diagram for the placing an order use case. This time
the names of the objects appear after the colon, such as: Order Entry Window following the
objectName:className naming convention. This time the class name is shown to demonstrate
that all of objects of that class will behave the same way.
State diagrams are used to describe the behavior of a system. State diagrams describe all of the
possible states of an object as events occur. Each diagram usually represents objects of a single
class and track the different states of its objects through the system.
1. Choose the context for state machine, whether it is a class ,a use case, or the system
as a whole.
2. Choose the initial & final states of the objects.
3. Decide on the stable states of the object by considering the conditions in which the
object may exist for some identifiable period of time. Start with the high level states
of the objects & only then consider its possible substrates.
4. Decide on the meaningful partial ordering of stable states over the lifetime of the
object.
5. Decide on the events that may trigger a transition from state to state. Model these
events as triggers to transitions that move from one legal ordering of states to
another.
6. Attach actions to these transitions and/or to these states.
7. Consider ways to simplify your machine by using substrates, branches, forks, joins
and history states.
8. Check that all states are reachable under some combination of events.
9. Check that no state is a dead from which no combination of events will transition the
object out of that state.
10. Trace through the state machine, either manually or by using tools, to check it against
expected sequence of events & their responses.
When to Use: State Diagrams
Use state diagrams to demonstrate the behavior of an object through many use cases of the system.
Only use state diagrams for classes where it is necessary to understand the behavior of the
object through the entire system. Not all classes will require a state diagram and state diagrams
are not useful for describing the collaboration of all objects in a use case. State diagrams are
other combined with other diagrams such as interaction diagrams and activity diagrams.
State diagrams have very few elements. The basic elements are rounded boxes representing the state
of the object and arrows indicting the transition to the next state. The activity section of the
state symbol depicts what activities the object will be doing while it is in that state.
All state diagrams being with an initial state of the object. This is the state of the object when it
is created. After the initial state the object begins changing states. Conditions based on the
activities can determine what the next state the object transitions to.
Below is an example of a state diagram might look like for an Order object. When the object
enters the Checking state it performs the activity "check items." After the activity is completed
the object transitions to the next state based on the conditions [all items available] or [an item
is not available]. If an item is not available the order is canceled. If all items are available then
the order is dispatched. When the object transitions to the Dispatching state the activity
"initiate delivery" is performed. After this activity is complete the object transitions again to the
Delivered state.
State diagrams can also show a super-state for the object. A super-state is used when many
transitions lead to the certain state. Instead of showing all of the transitions from each state to
the redundant state a super-state can be used to show that all of the states inside of the super-
state can transition to the redundant state. This helps make the state diagram easier to read.
The diagram below shows a super-state. Both the Checking and Dispatching states can
transition into the Canceled state, so a transition is shown from a super-state named Active to
the state Cancel. By contrast, the state Dispatching can only transition to the Delivered state, so
we show an arrow only from the Dispatching state to the Delivered state.
Activity Diagram
Activity diagrams describe the workflow behavior of a system. Activity diagrams are similar to
state diagrams because activities are the state of doing something. The diagrams describe
the
state of activities by showing the sequence of activities performed. Activity diagrams can show
activities that are conditional or parallel.
Activity diagrams should be used in conjunction with other modeling techniques such as
interaction diagrams and state diagrams. The main reason to use activity diagrams is to model
the workflow behind the system being designed. Activity Diagrams are also useful for analyzing
a use case by describing what actions need to take place and when they should occur;
describing a complicated sequential algorithm; and modeling applications with parallel
processes. However, activity diagrams should not take the place of interaction diagrams and
state diagrams. Activity diagrams do not give detail about how objects behave or how objects
collaborate.
Activity diagrams show the flow of activities through the system. Diagrams are read from top to
bottom and have branches and forks to describe conditions and parallel activities. A fork is used
when multiple activities are occurring at the same time. The diagram below shows a fork after
activity1. This indicates that both activity2 and activity3 are occurring at the same time. After
activity2 there is a branch. The branch describes what activities will take place based on a set of
conditions. All branches at some point are followed by a merge to indicate the end of the
conditional behavior started by that branch. After the merge all of the parallel activities must be
combined by a join before transitioning into the final activity state.
Below is a possible activity diagram for processing an order. The diagram shows the flow of
actions in the system's workflow. Once the order is received the activities split into two parallel
sets of activities. One side fills and sends the order while the other handles the billing. On the
Fill Order side, the method of delivery is decided conditionally. Depending on the condition
either the Overnight Delivery activity or the Regular Delivery activity is performed. Finally the
parallel activities combine to close the order.
Experiment 1: COURSE MANAGEMENT SYSTEM (CMS)
A course management system (CMS) is a collection of software tools providing an online environment for course
interactions. A CMStypically includes a variety of online tools and environments, such as:
An area for faculty posting of class materials such as course syllabus and handouts
An area for student posting of papers and other assignments
A grade book where faculty can record grades and each student can view his or her grades
An integrated email tool allowing participants to send announcement email messages to the entire class or
to a subset of the entire class
A chat tool allowing synchronous communication among class participants
A threaded discussion board allowing asynchronous communication among participants.
In addition, a CMS is typically integrated with other databases in the university so that students enrolled in a
particular course areautomatically registered in the CMS as participants in that course.
The Course Management System (CMS) is a web application for department personnel,
Academic Senate, and Registrar staff to view, enter, and manage course information formerly Submitted via paper.
Departments can use CMS to create new course proposals, submit changes for existing courses, and track the
progress of proposals as they move through the stages of online approval.
A course management system is a set of tools that enables an online environment for course interaction i.e. to create
online course contentand post it on the Web without having to handle HTML or other programming languages.
Course management system become an integral a part of the upper education system.
They create teaching and course management easier by providing a framework and set of tools for faculties and for
students. The executive aspects of such systems could include class rosters (a group of people or things) and
therefore the ability to record students’ grades. With relevance the teaching aspects, however, it might include
learning objects, class exercises, quizzes and tests. The CMS might also include tools for real-time chat, integrated
email tool allowing participants to send announcement email messages to entire class or to a subset of the entire
class. The CMS tool additionally focuses on all aspects of teaching, learning and teacher-student interaction.
(1.1)Administrator Module:
Admin can produce accounts for college students and faculties and make course programmed list
and add faculties andstudents to it course list.
Admin can produce course details exploitation course creation kind that consists in fact name, course id,
and choose student. Using Student creator kind student details are entered to information. User name,
adapt username, password, given name and name, ID. After accounts are produced supported every
students and instructors are divided and accessorial to list exploitation create missing students kind.
(1.2)Faculty Module:
It can check student’s papers, their assignments and assign grades for work. This module
accommodates preparation menu,choose student for grades.
(1.3)Students Module: Student can register with application or the proposed system and login with
user name and password.He will check and submit assignment and his/her grade. Every student can
have id.
periodicallyupload the latest registrar’s classes list to determine courses that offered in the current
semester. The system shall generate course for each class that registered and determine the current
set of students thatenrolled in that class.
(2.2.2) Throughput
a. In case of a system failure, redundant system shall resume operations within 30 sec.
b. Average repair time shall be less than 1 hour.
(2.2.4)Start-up/Shutdown Time
a. The system shall store in the database no more than one million transactions.
a. Firewall Protection: The course management software system shall run inside a firewall.
b. Support different roles: The system shall support different roles for users, such as Instructors, Students, and
administrative staff, the user logged in with given role should only be allowed access consistent with that role. For
example a student shall only be allowed to see he/she grades not to modify it.
(2.2.8) Reliability
a. Scaling the system to large number of users: large courses will have hundreds of students.
b. The system shall be able to handle the load for such courses, especially near assignment deadlines when
many students can beexpected to access the course management system.
The system will be operating within university environment. This environment has anther systems that will
interact with thissystem so we need interfaces between these systems.
(3.2)CourseDetails
(3.4)LoginDetails
Software Designing
UML
UML stands for Unified Modeling Language. This object-oriented system of notation has evolved from the
work of Grady Booch, James Rum Baugh, Ivar Jacobson, and the Rational Software Corporation. These
renowned computer scientists fused their respective technologies into a single, standardized model.
Today, UML is accepted by the Object Management Group (OMG) as the standard for modeling object
oriented programs.
UML Diagrams
UML defines nine types of diagrams: class (package), object, use case, sequence, collaboration, state
chart, activity, component, and deployment diagram.
Sequence Diagram
This interactive behavior is represented in UML by Sequence diagram. Sequence diagram emphasizes on time
sequence ofmessages that send and receive messages.
Following things are to be identified clearly before drawing the sequence diagram
The basic purposes of activity diagrams are to captures the dynamic behavior of the system. Activity is a particular operation
of the system. Activity diagrams are not only used for visualizing the dynamic nature of a system, but they are also
used to construct the executable system by using forward and reverse engineering techniques. The only missing thing
in the activity diagram is the message part.
The purpose of class diagram is to model the static view of an application. Class diagrams are the only diagrams which can
be directlymapped with object-oriented languages and thus widely used at the time of construction.
Prototype is a working model of software with some limited functionality. The prototype does not always hold
the exact logic used in the actual software application and is an extra effort to be considered under effort
estimation.
Prototyping is used to allow the users evaluate developer proposals and try them out before implementation. It
also helps understand the requirements which are user specific and may not have been considered by the
developer during product design.
To get course List
File exchange – enables learners to upload files from their local computers and share these files with
instructors or other students
Internal asynchronous messaging – mail that can be sent and read from within an online course
users select recipients, compose messages, attach files to messages and send to other users as shown in the
following picture
VIVA Questions:
There are registered people in the system. Some are approvers. An approver can also be a requestor. In an
organization, the hierarchy could be Engineers/Managers/Business Managers/Managing Director etc. In a college, it
could be Lecturer/Professor/Head of the Department/Dean/Principal etc.
In the existing Leave Record Management System, every College/Department follows manual procedure in which
faculty enters information in a record book. At the end of each month/session, Administration Department calculates
leave/s of every member which is a time taking process and there are chances of losing data or errors in the records.
This module is a single leave management system that is critical for HR tasks and keeps the record of vital
information regarding working hours and leaves. It intelligently adapts to HR policy of the management and allows
employees and their line managers to manage leaves and replacements (if required).
In this module, Head of Department (HOD) will have permissions to look after data of every faculty member of their
department.HOD can approve leave through this application and can view leave information of every individual.
This application can be used in a collegeto reduce processing work load. This project’s main idea is to develop an
online centralized application connected to database which will maintain faculty leaves, notices information and their
replacements (if needed). Leave management application will reduce paperwork and maintain record in a more
efficient & systematic way. This module will also help to calculate the number of leaves taken monthly/annually and
help gather data with respect to number of hours’ worked, thereby helping in calculating the work hours by the HR.
In the existing paper work related to leave management, leaves are maintained using the attendance register
for staff. The staff needs to submit their leaves manually to their respective authorities. This increases the paperwork
& maintaining the records becomes tedious. Maintaining notices in the records also increases the paperwork. The
main objective of the proposed system is to decrease the paperwork and help in easier record maintenance by having
a particular centralized Database System, where Leaves and Notices are maintained. Theproposed system automates
the existing system. It decreases the paperwork and enables easier record maintenance. It also reduces chances of
Data loss. This module intelligently adapts to HR policy of the management &allows employees and their line
managers to manage leaves and replacements for better scheduling of workload. The application basically contains
the given modules:
Module:
Objective:
Functional Requirements:
Non-Functional Requirements:
Security
a. Firewall Protection: The Easy leave software system shall run inside a firewall.
b. Support different roles: The system shall support different roles for users, such as
Lecturer/Professor/Head of theDepartment/Dean/Principal, the user logged in with given role should only be
allowed access consistent with that role.
Scalability
a. Scaling the system to large number of users: As faculties are going to use easy leave server every time
to apply leaves.
b. The system should able to operate properly when the web application is accessed by many users at a
single time.
Utilization of Resources
a. The system shall store in the database no more than one million transactions.
b. If the database grows over this limit, old transaction shall be backed up and deleted from the
operational database.
Data Modeling
TotalCL Number
usedCL Number
BalanceCL Number
TotalCCL Number
usedCCL Number
Name Varchar2
Email Varchar2
DOJ Date
2.1 LeavesDetails
FromDate Date
ToDate Date
HODStat us char
Principal char
Status
AdminSta tus char
FIELD TYPE CONSTRAI
NAME NTS
StaffId Number Foreign key
2.2 Adjustments
Class Varchar2
Status char
2.3 DeptCode
DeptName Varchar2
2.5 PrincipalDetails
Auctions are among the latest economic institutions in place. They have been used since antiquity to sell a wide
variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of
common auctions when values are interdependent-the value to a particular bidder may depend on information
available only to others-and asymmetric. In this setting, it is well known that sealed-bid auctions do not achieve
efficient allocations in general since they do not allow the information held by different bidders to be shared.
Typically, in an auction, say of the kind used to sell art, the auctioneer sets a relatively low initial price. This price is
then increased until only one bidder is willing to buy the object, and the exact manner in which this is done varies. In
my model a bidder who drops out at some price can "reenter" at a higher price.
With the invention of E-commerce technologies over the Internet the opportunity to bid from the comfort of one’s
own home has seen a change like never seen before. Within the span of a few short years, what may have began as
an experimental idea has grown to an immensely popular hobby, and in some cases, a means of livelihood, the
Auction Patrol gathers tremendous response every day, all day. With the point and click of the mouse, one may bid
on an item they may need or just want, and in moments they find that either they are the top bidder or someone else
wants it more, and you're outbid! The excitement of an auction all from the comfort of home is a completely different
experience. Society cannot seem to escape the criminal element in the physical world, and so it is the same with
Auction Patrols. This is one area where in a question can be raised as to how safe Auction Patrols.
Proposed system
An Auction is Latin work which means augment. Auction is a bid, a process of selling; buying and services offered
take place. There are several different types of auctions and certain rules exist for each auction. There are variations
for an auction which may include minimum price limit, maximum price limit and time limitations etc. Depending
upon the auction method bidder can participate remotely or in person. Remote auction include participating through
telephone, mail, and internet. Shopping online has widely grown; online auction system is increasing rapidly. Online
auction is becoming more and more popular in electronic commerce and hence it should system must increase its
quality and security.
The online auction system is a model where we participate in a bid for products and service. This auction is made
easier by using online software which can regulate processes involved. There are several different auction methods
or types and one of the most popular methods is English auction system. This system has been designed to be highly-
scalable and capable of supporting large numbers of bidders in an active auction. Online Auctioning System has
several other names such as e-Auctions, electronic auction etc. The requirement for online auction or online bidding
can be more accurately specified by the client. It should be healthy and will be a good practice when it is made more
transparent as a matter of fact.
Online Bidding has become more wide spread in all sorts of industrial usage. It not only includes the product or
goods to be sold, it also has services which can be provided. Due to their low cost this expansion made the system to
grow. Online bidding has become a standard method for procurement process. Bidders can be maintained in a single
database according to the preference, and they can be monitored. User’s data can be maintained in a confidential way
for validity and integrity of contractual documentation. Neat reporting reduces paperwork, postage, photocopying
and time beneficial. Multiple bidders can be communicated with a great ease. This system allows multiple bids by
single users. Online bidding is based upon lowest or the highest price which is initiated but not the best value for the
product. Although there is a chance to fix the criteria against the fact expected to have desired value by the seller.
1.1 OVERVIEW
The Objective is to develop a user-friendly auctioning site where any kind of product can be auctioned and provide
value-added servicesto the bidders and the sellers. The products will be authenticated and the site provides a safe
environment for online users:
Secure registration of all users including a personal profile Administrators would authorize the product to auction, set
auction dates andMinimum auction amount for that product.
Prior to each bid, the user’s bank or credit account must be authenticated for available balance required for the bid.
Complete Search/Site Map of the entire site for easy access.
Discussion forums for users to interact with other users to know about the product’s value and originality.Online
Legal Documentation to avoid disputes. Guidance to the users about the same must be available. Rare articles may be
withheld by owner on the advice of the administrator to be thrown open in special auctions held by the site so as to
increase the bid-values.
Software Requirement AnalysisModules:
1. Login:
Login Module includes various utilities like User Registration, Authentication, Change
Password and Forgot Password.
2. Category Management:
This module provides all facilities to admin for managing the Category.
3. Package Management:
This module provides all facilities to admin for managing the Package.
4. Search:
Search Module Provides Category wise Search of items.
5. Auction:
In This Module Seller can Upload their Products for Auction, Bidders can bid for the
Products finally Admin decides the Winner basedon Highest Bidding Price.
6. Report:
Report Generation Module can generate reports of past Auctions, Sellers and Bidders.
Users:
1. Admin
2. Seller
3. Bidder
1. Admin
Admin can manage user and product.Admin can manage category.
Admin can send the update to the seller and
bidder.Admin can manage biding. Admin can manage
package.
Admin can generate the whole system work report.
2. Seller
Seller can upload auction product.
Seller can set the starting prize of the item.
Seller can view the bid information for there items.Seller can bid for product.
3. Bidder
Bidder can also search the items. Bidder can buy package for auction.
Bidder can view detail of product. Bidder can bid on particular product. Bidder can also modify the bidding prize.
Functional Requirements:
Each user type admin or user needs to register him or her as a user or an admin for accessing the user’s necessary
information. Theyalso have email, username and password. They can login into the system from the web using their
email and password.
Admin needs to login to the system to operate the system. Admin has an individual or unique login email, password
and a user level.
Through this email and password admin can login into the system.
Admin can update all product pages. An admin can insert a new product with details andcan update the product
information through edit option.
Admin can delete user from user panel. It can have the full access of user’s bid list.Admin can have access in the bid
page.
Users can look for a product from a selected category.
User can add a product to the site with full details of that product. They can see their products and bided list through
their account page.Users can edit their profiles.
Non-Functional Requirements:
1 ) Performance Requirements
1.1 Performance
The system must be interactive and the delays involved must be less .So in every action-response of the system, there
are no immediate delays. In case of opening windows forms, of popping error messages and saving the settings or
sessions there is delay much below 2 seconds, In case of opening databases, sorting questions and evaluation there
are no delays and the operation is performed in less than 2 seconds for opening ,sorting, computing, posting > 95%
of the files. Also when connecting to the server the delay is based editing on the distance of the 2 systems and the
configuration between them so there is high probability that there will be or not a successful connection in less than
20 seconds for sake of good communication.
1.2 Safety
Information transmission should be securely transmitted to server without any changes in information
1.3 Reliability
As the system provides the right tools for discussion, problem solving it must be made sure that the system is
reliable in its operations andfor securing the sensitive details.
2 ) Software Quality Attributes
2.1 Availability
If the internet service gets disrupted while sending information to the server, the information can be sending again for verification.
2.2 Security
The main security concern is for users account hence proper login mechanism should be used to avoid hacking. The tablet id regi s
is way to spam check for increasing the security. Hence, security is provided from unwanted use of recognition software.
2.3 Usability
As the system is easy to handle and navigates in the most expected way with no delays. In that case the system program
accordingly and transverses quickly between its states.
Data Modeling
(2.1) UserInformation
Gender Varchar
Mobile Varchar
password Varchar
level int
Field Type Constraint
Name
First_name Varchar
Last_name Varchar
User_name Varchar
Title Varchar
Category Varchar
Brand Varchar
Description Text
Inti_price Float
Time Date
Image Text
status varchar
(2.3) BIddingInformation
Bid_init Float
Bid_price Float
Software Designing
3. Search Item:
This page for user can search Items.
4. Bid On Item:
This page for user can Bid On the Particular Item then package notavailable so error will be occur.
5. Contact us :
This page for user have Any Query to Contact to the Company.
Experiment 4: Electronic Cash counter
This project is mainly developed for the Account Division of a Banking sector to provide better interface of
the entire bankingtransactions. This system is aimed to give a better out look to the user interfaces and to implement
all the banking transactions like:
•Supply of Account Information
•New Account Creations
•Deposits
•Withdraws
. Cheque book issues
•Stop payments
•Transfer of accounts
•Report Generations
.
Proposed System:
The development of the new system contains the following activities, which try to automate the entire process
keeping in view of thedatabase integration approach.
•User friendliness is provided in the application with various controls.
•The system makes the overall project management much easier and flexible.
•Readily upload the latest updates, allows user to download the alerts by clicking the URL.
•There is no risk of data mismanagement at any level while the project development is under process.
• It provides high level of security with different level of authentication.
Problem Analysis and Project Planning(1)Project Scope:
Internet Banking System refers to systems that enable bank customers to Access accounts and general
Information on bankproducts and services through a personal computer or other intelligent device.
The chances and threats that the internet symbolizes is no longer news to the present day banking
sector. No traditional bank would dare face investment analysts without an Internet strategy. The main
intention behind the commencement of electronicbanking services is to provide the customers with an
alternative that is more responsive and with less expensive options. Withoptions just a click away,
customers have more control than ever. Their expectations are usability and real-time answers. Theyalso
want personal attention and highly customized products and services. Internet banking identifies a
particular set of technological solutions for the development and the distribution of financial services,
which rely upon the open architecture ofthe Internet. With the implementation of internet banking
system, it maintain a direct relationship with the end users via theweb and are able to provide a personal
characterization to the interface, by offering additional customized services. (2)Objectives:
The objective of this project is limited to the activities of the operations unit of the banking system
which includes opening ofAccount, Deposit and withdraw of funds, Electronic funds transfer, Cheque
balance and Monthly statement.
Software Requirement Analysis(1)Module Description:
The Electronic cash counter Application project will be divided into 2 modules namely:
1. Bank Account
2. Bank Account Administrator
Bank Account
In this module the customer is allowed to logon to the website and can access his/her account by getting user name
and password which will be verified with the server and the database. Once he/she gets verified then they are
allowed to view their personal account and perform operations such as change of address, paying bills online,
viewing transactions and transferring money into other accounts. Once the customer finishes the task the update
information instantly gets stored into the database. The customer is then allowed to sign out from his/her account.
Bank Account Administrator
In this module the administrator is allowed to log on to the website and can access his/her administrative account by
using the user name and password which will then be verified with the database. Once he/she gets verified the
administrative interface will be displayed, where the administrator can perform operations for both new customers
and existing customers. Administrator will help a new customer in opening their account by taking complete
information from them. Administrator provides services like withdrawal, deposit, transfer and deleting customer
during the time of closing the account. In this module administrator provides great customer service to the customers
who want to do phone banking or teller banking. The interface for administrator will be both very users friendly and
efficient. The data gets stored in the database instantly when the administrator hits the submit button.
(2) Functional Requirements:
Customer can request details of the last ‘n’ number of transactions he has performed on any account.
Customer can make a funds transfer to another account in the same bank.
Customer can request for cheque book
Customer can view his monthly statement. She/he can also take print out of the same.
Customer can make Electronic Fund Transfer’s to accounts at their and other banks.
The system is providing balance enquiry facility
(3) Non-Functional Requirements:
Those requirements which are not the functionalities of a system but are the characteristics of a system
are called the non-functionalities.
Data Modeling
Customer_i INTEGER
d (FK)
NOT NULL
Password VARCHAR
2(30)
Username VARCHAR
2(30)
City VARCHAR2( 2
0)
State VARCHAR2( 2
0)
Zip VARCHAR2( 2
0)
Phone NUMBER(10
Number )
Email id VARCHAR2( 2
0)
Name VARCHAR2( 3
0)
Profession VARCHAR2( 3
0)
Annual INTEGER
Income
Address VARCHAR2( 3
0)
City VARCHAR2( 3
0)
Telephone VARCHA
Number R2(30)
Account table
Min_Balance NUMBER(8)
Current_ NUMBER(8)
balance
Recommend VARCHAR2( 2
ed_ by 0)
Nominee VARCHAR2( 2
0)
Type_of_acc VARCHAR2( 2
ount 0)
Date_of_ope VARCHAR2( 2
ning 0)
Date_of_acc VARCHAR2( 2
ess 0)
Name VARCHA
R2(20)
Working_ VARCHA
from R2(20)
Age NUMBER
(10)
Transaction(transfer-funds) table
Acc_no NUMBE
R(10)
Account NUMBE
_to R(10)
Amount NUMBE
R(10)
Transact VARCH
ion_date AR2(20)
Trans_n INTEGE
o R
descripti VARCH
on AR2(30)
Transaction type table
1) Class diagram:
3)Activity Diagram (3.1)Customer Activity Diagram
Prototype model
Prototype is a working model of software with some limited functionality. The prototype does not
always hold the exact logic used in the actual software application and is an extra effort to be
considered under effort estimation.