Wednesday, July 17, 2019

Conference Management

Abstract This scheme aims to bring on a common plan for organizing activities of comp each. The gathering precaution corpse exit carry on the abstracts and look for cover give inted by scholars, inspectioning them, and accepting or rejecting them. This move on greatly reduce the costs and efforts of the gathering managers and seeds where they plenty nowadays interact through nedeucerk. Currently there is a need for much(prenominal) a collection direction remains, where seek group discussions relating to diametrical fields shtup be managed by single cover. This per influenceance potty force all number of multitudes and large number of publisher bed be deviateted.The environment take a shitd would enhance the usability of concourses thereby facilitating the exploreers to shoot their opuss neat and fashioning organisers to manage the look fors by forwarding it to the jury and taking their fannyvass. This would reduce a diffuse of effor t. It would excessively clear the need to name expertness on employing slew for managing all such(prenominal) activities. It would smooth the progress of congregation focus and all the activities testament take browse in well up-defined manner. elude of Contents pageboy No. RecommendationI Dissertation Approval Sheet II Candidate Declaration tercetAcknowlight-emitting diodegementIV AbstractV Chapter 1 Introduction 1. 1 Over linear perspective and issues convolute01 1. 2 trouble definition 01 1. 3Problem Solution 01 Chapter-2 Literature glance 2. 1 Methodology 03 2. 2 Technologies and barbs 04 Chapter-3 Requirements gathering 3. 1 Softw be destinys 08 3. 2 Hardw ar essentials 98 3. 3 usage case model 10 Chapter-4 abstract 4. 1 place plots 18 4. 2 use draws 22 Chapter-5 Design 5. 1 engineering picking 25 5. 2 Database take 28 5. 3 Implementation detail Chapter-6 exam 6. 1Test case and purport30 6. 2Testing manners and strategies31Conclusion 37 Bibliograp hy38 Chapter-1 Introduction This comp each precaution tool aims at improving the comp all management practices and reduces the burden on the decompose of organizers, and departs the technical solution for the seek stem submission and palingenesiss. 1. 1 Overview and Issues Involved in that respect ar large numbers of assemblys being taking em effect at different locations all over the human beings, we clear seen exploreers and eminent educationist submit their interrogation document at these conferences, they e realdayly remove to send the research publisher through post and it takes a skunk of season.This project is foc employ towards developing a management strategy that volition cater to the ask of the conference organizers. 1. 2 Problem Definition In the drink scenario, the conference organizers face a lot of problems in coordinating heterogeneous activities that are associated with conference. This increases a lot of effort and needs a lot of expert ise and large numbers of people are essential to manage all the summons. This definitely is non an flourishing task. There is a lot of trouble involved in submitting a research subject to a conference and so sending it to a jury, for review and their comments.To speed up this process of conference management was our main focus in this project. 1. 3 Problem Solution This project will be a fine demonstration of efficient use of engine room and engineering in the entanglement- industry developing field. This will cut down the organizing and alimentation cost of conferences and will to a fault reduce the efforts of causation to send their research text file through post. This is make through creation of a conference management application that would assist the organizers to tramp their conference effectively.Our parcel product conference management dodge is designed and essential to lead the rigid solution for the handling of conferences. We have designed an port w ine that will provide the platform for the researchers and educationist to submit their research written document online and it will be forwarded to jury for their review and comments. The schema will help the users to make water peeled conference by providing the instruction of the conference and the request will be forwarded to the executive director for effectualation.The executive quarter accept or reject the conference request and he will have to ascendency to delete the germ if he is found doing guilty activity on the administration. The contribute of the conference will land on the schedule commissioning atoms to review the bracingspaper publishers submitted in that conference. The mince earth-closet check the lucubrate of the paper submitted in the conference installed by him. The course committee member will be reviewing the conference for which he is ap catameniaed by the mince to review the conference. The computer course of study committee ba sin download the research paper for reading it so it can be reviewed in a better manner. . 1 Methodology To manoeuvre this parcel product in a surmount do sufficient way, the user should have virtually knowledge of accessing internet and navigating the internet through any(prenominal)(prenominal) browser. He should be aware of how conferences are forceed and the working of musical arrangement that soldierys the conference i. e. from submitting of paper, forwarding it to the jury, and indeed finalizing selected research papers. 1 body port wines As our strategy is completely an self-directed system in itself thus it does not require any external API or any interface for interaction with any early(a) system.It just interacts with the decision maker and authors, but not with any former(a) packet comp sensationnt. 2 Interfaces Our system will interact with the user only through the well defined graphical user interface. node innkeeper architecture will be requir ed for load-bearing(a) the application. Client innkeeper Architecture A waiter is anything that has some re computer address that can be shared. There are Com mystifyer master of ceremoniess, which provide compute force print hordes, which manage a collection of printers phonograph recording servers, which provide networked saucer space and network servers, which fund weathervane pages.A knob is simply any other entity that wants to gain access to a particular server. The interaction amid client and server is just analogous the interaction between a lamp and an electrical socket. The power grid of the house is the server, and the lamp is a power client. The server is a permanently open re book of facts, while the client is free to unplug after it is has been served. pic frame 2. 1 Client-Server Architecture 2. 2 Technologies and Tools NetBeans NetBeans refer to both a platform framework for java desktop applications,and an combine development environment(IDE).The N etBeans IDE is written in burnt umber and can run anywhere a compatible JVM is installed, including windows, mackintosh OS, Linux, etc. The NetBeans platform allows application to be veritable from a set of modular parcel product components called modules. The NetBeans broadcast is a reusable framework for simplifying the development of coffee bean Swing desktop applications. Among the features of the platform are drug user interface management (e. g. menus, toolbars) User settings management depot management (saving and loading any kind of data) Window management Wizard framework ( gets step-by-step dialogs) NetBeans ocular Library Integrated development Tools adobe brick Dreamweaver Adobe Dreamweaver is the industry-leading web authoring and editing software that provides both optic and label-level capabilities for creating trites- ground websites and designs for the desktop, smart phones, tablets, and other devices. It is a site create and publishing tool appro priate for intermediate to modern users that allows you to create graphical interface and built-in pass on design and coding features.It enables use of basic javaScript with bug out any coding knowledge. Integrating features of Adobe Dreamweaver are abominable it integrates with Adobes Spry Ajax framework and that makes an palmy access to dynamically-generated content and interfaces. Adobe Dreamweaver is in like manner corporate with Adobe Flash Professional, Fireworks, Photoshop Extended this lessens the amount of stages for devising projects. Adobe Dreamweaver supports leading web development technologies such as HTML, XHTML, CSS, XML, coffee treeScript, Ajax, PHP, Adobe ColdFusion software, which make designing and development really magical.Powerful CSS tools do not need crock up utilities, and reduce the need to manually edit CSS order in designing and developing websites. Adobe Dreamweaver is the best application for extension developers and web designers who design and put up websites. MySQL Mysql is a relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. The SQL phrase stands for Structured Query Language. Free-software- incon brassrate extraction projects that require a full-featured database management system oft use MySQL.For commercial use, several(prenominal) paid editions are obtainable, and offer excess in operation(p)ity. Uses MySQL is a popular choice of database for use in web applications, and is a inter careen component of the astray use LAMP web application software stackLAMP is an acronym for Linux, Apache, MySQL and Perl/PHP/Python. MySQL is apply in some of the most frequently visited web sites on the Internet, including Flickr. com, Nokia. com, YouTube and as previously mentioned, Wikipedia, Google and Facebook. Glass Fish Server Glassfish is an open source application server project led by sunniness Microsystems for the coffee bean EE platform.The branded version is called Sun GlassFish Enterprise Server. Glassfish is free software. The latest version of GlassFish released is v3. 1. Other chocolate EE application servers JBoss AS WebSphere AS WebLogic Server Apache Geronimo MODULE-2 JDBC/ODBC ODBC(Open Database Connectivity) is a commonplace software interface for accessing database management systems (DBMS). The designers of ODBC aimed to make it in hooklike ofbroadcastming languages, database systems, and operational systems. thusly, any application can use ODBC to query data from a database, heedless of the platform it is on or DBMS it uses.ODBC accomplishes platform and language independence by development anODBC number one woodas a translation layer between the application and the DBMS. The application thus only needs to know ODBC syntax, and the driver can and so pass the query to the DBMS in its indwelling format, returning(a) the data in a format the application can netherstand. java DataBase Connecti vity, commonly referred to asJDBC, is anAPIfor the deep brown computer political programmeming languagethat defines how a client whitethorn access adatabase. It provides methods for querying and update data in a database. JDBC is oriented towards relational databases.A JDBC-to-ODBCbridge enables connections to any ODBC-accessible data source in theJVMhost environment. JDBC allows eightfold implementations to exist and be used by the same application. The API provides a mechanism for dynamically loading the invent deep brown packages and registering them with the JDBC Driver Manager. The Driver Manager is used as a connection factory for creating JDBC connections. JDBC connections support creating and executing statements. These may be update statements such asSQLs CREATE, INSERT, UPDATE and DELETE, or they may be query statements such as SELECT. MySql tom Server.Rational Rose Model Rational rose is an disapprove oriented Unified part model Language (UML) software design tool intended for visual simulate and component body structure of imageprise level software applications. Rose facilitates reject-oriented analysis design, better known for OOAD. In fact, Rose is an acronym for Rational Object Oriented parcel Engineering. The great things about Rose is that it allows analysts, engineers, printrs and project managers to create, view, fudge modeling elements in a Unified Modeling Language (UML) across the entire enterprise, employ one tool and one language.The tools accredited value is that it exposes software development problems early on in the development life cycle, helping you manage everything from straight forward projects to more complex software solutions. Basically, Rose supports use-case driven prey modeling. Chapter-3 Requirement gather 3. 1 parcel Requirements Functional Requirements SRS 001 Add bracing author This system shall be able to add new users with legal email-id. SRS 002 Install group group management system sha ll provide users to add new conferences. SRS 003 Submit a paper Authors can submit their papers in already existing clear conferences. SRS 004 throng logicalation by administrator all told the conferences are supportd by administrators so as to avoid any unauthorized researches. SRS 005 Program committee selection by Chair Eminent program committee is selected by chair so as to provide best expertise and best research papers are selected. SRS 006 constitution selection by Program committee The program committee can select the papers which he wants to review. SRS 007 Upload review The program committee member can upload his review for selected papers. SRS 008 Mail to Authors and PC member The chair can send mail from time to time to program committee member and author. SRS 009 report card download The program committee can download the paper for further reading. SRS 009 Review form download The program committee can download the review form for making reviews. SRS 0 11 User feedback Users worthy feedback provides us a constant motivation of improvement. Table 3. 1 Showing Functional Requirements Non- operational Requirements SRS012 Access permit The conference management system shall have several symbols of access permissions. For instance, the administrator is shall be able to authorize conference requests and delete the author.At the same time, authors shall have limit access to already submitted research papers. SRS013 Maintainability The system shall provide the capability to backup the database and it is very easy to bear and work on. SRS014 Reliability The system shall be getable all the time, only a internet connectivity is required. SRS015 tractability The conference management system shall be ductile and adaptable due to future plans of expanding the system. Table 3. 2 Showing Non-Functional Requirements Development End Operating System (Windows, Mac OS, Linux) umber Development kit (JDK) 5 or above HTML e ditor (Macromedia Dreamweaver 8) Client End Internet connection. A java enabled browser. 3. 2 Hardware Requirements Development End 500Mhz Intel Pentium-III or gameyer(prenominal) processor An Internet connection 512 MB break up 600 MB of free hard-drive space, for each platform downloaded into the SDK, an additional 100MB is call for. Client End 500 MHz Pentium III processor above. 2 GB hard disk and 256 MB of RAM. An internet enabled device. Web Browser installed operating system. 3. 3 Use Case Model In this project, the analysis and design is used as a technique to conduct a research into conference management system. Design is completely based on definition of problem and the knowledge based construct. The use-case diagram which clearly depicts how this system behaves is constructed. End users can easily circumspect the operations carried out.Also the relationship between various elements is visible and the constraints are easily identified. pic bod 1. 1 Use case for Author. pic Fig 1. 2 Use case diagram for Program committee member. pic Fig 1. 3 Use case diagram for editor in chief pic Fig 1. 4 Use case diagram for Administrator Use Case commentary 3. 3. 1 UC01 Login 3. 3. 1. 1 descriptionThe user logs in the web site. 3. 3. 1. 2 hang of eventsUser opens the login page enter his id and news, and clicks on login button. 3. 3. 1. 2. 1 substitute Flows N. A. 3. 3. 1. 3 special requirementsN. A. 3. 3. 1. Pre physiquesThe user moldinessiness have registered him before with the web site and should check up on a valid tarradiddle. 3. 3. 1. 5 impart contours The user gets access to the site. 3. 3. 1. 6 extension phone come outN. A. 3. 3. 2 UC02 Sign Up 3. 3. 2. 1 DescriptionThe user registers him by entering his dilate. An account is made where his compose selective information is maintained. 3. 3. 2. 2 Flow of events Entering all the fields and then clicking on submit button. 3. 3. 2. 2. 1 utility(a) Flows N. A. 3. 3. 2. 3 supern umerary requirements N. A. 3. 3. 2. 4 Preconditions The user should have a valid email account.The mandatory fields should not be left empty. 3. 3. 2. 5 carry conditionsThe user has a valid account on the website. 3. 3. 2. 6 appendix promontoryN. A. 3. 3. 3 UC03 Install a Conference 3. 3. 3. 1 Description The author can create a new conference. 3. 3. 3. 2 Flow of events Users logs in, and then go to chooses create conference option and enters the conference details and submits his request. 3. 3. 3. 2. 1 Alternative Flows N. A. 3. 3. 3. 3 supererogatory requirementsN. A. 3. 3. 3. 4 Preconditions The user moldiness have a valid account on the web site. 3. 3. 3. charge conditions The request for a new conference is submitted. 3. 3. 3. 6 Extension point N. A. 3. 3. 4 UC04 Submit Paper 3. 3. 4. 1 Description The author can submit his research paper on the existing conferences. 3. 3. 4. 2 Flow of events Author logs in, and then goes to chooses submit conference option and enters the research paper details and submits his paper. 3. 3. 4. 2. 1 Alternative Flows N. A. 3. 3. 4. 3 modified requirementsThe author must have a valid research paper. 3. 3. 4. 4 Preconditions The author must have a valid account on the web site. . 3. 4. 5 Post conditions The authors research paper is submitted and will be forwarded to jury for review. 3. 3. 4. 6 Extension point N. A. 3. 3. 5 UC05 Edit Profile 3. 3. 5. 1 DescriptionThe user can access his own profile information. He can either view or edit the profile. 3. 3. 5. 2 Flow of events Users logs in, and then goes to My-Account division to view and edit his profile information. 3. 3. 5. 2. 1 Alternative Flows N. A. 3. 3. 5. 3 supererogatory requirements 3. 3. 5. 4 Preconditions The user must have a valid account on the website. 3. 3. . 5 Post conditions The profile information is updated. 3. 3. 5. 6 Extension pointN. A. 3. 3. 6 UC06 Validate Conference 3. 3. 6. 1 Description The administrator can validate the conference requ ests. 3. 3. 6. 2 Flow of events The administrator logs in and then goes to selects the validate conference option, then selects the conference requests which is to be validated. 3. 3. 6. 2. 1 Alternative Flows N. A. 3. 3. 6. 3 Special requirements N. A. 3. 3. 6. 4 PreconditionsThe administrator must hold a valid account and must be decently logged in. . 3. 6. 5 Post condition The selected conferences are validated. 3. 3. 6. 6 Extension pointN. A. 3. 3. 7 UC07 Add PC member 3. 3. 7. 1 Description The chair has the effective to invite the PC member to review the paper for a particular conference. 3. 3. 7. 2 Flow of events The author has to convert his voice from author to chair, then select the conference for which he wants to invite the PC member. 3. 3. 7. 2. 1 Alternative Flows N. A. 3. 3. 7. 3 Special requirements The author has to change his design from author to chair to be able to add 3. 3. . 4 PreconditionsThe author is properly logged in and changes his economic consumpt ion from author to editor. 3. 3. 7. 5 Post condition The PC member is invited to review the paper for a particular conference. 3. 3. 7. 6 Extension pointN. A. 3. 3. 8 UC08 Review the paper 3. 3. 8. 1 Description The PC member can review the paper for which chair has invited him. 3. 3. 8. 2 Flow of events The author will have to starting time change his role to PC member, then select the conference which he wants to review and then select the research paper for which he wants to bring through review.The PC member posts his review for that paper. 3. 3. 8. 2. 1 Alternative Flows N. A. 3. 3. 8. 3 Special requirements The author must be added by chair as a PC member for that conference. 3. 3. 8. 4 PreconditionsThe PC member should be added by program chair to review that conference, and he should have changed his role from author to PC member. 3. 3. 8. 5 Post condition The author posts the review of the paper. 3. 3. 8. 6 Extension pointN. A. 3. 3. 9 UC09 Download Paper 3. 3. 9. 1 Descr iption The PC member can download the research paper. 3. 3. 9. Flow of events The author changes his role from author to PC member, selects the conference and particular research paper, then downloads the paper. 3. 3. 9. 2. 1 Alternative Flows N. A. 3. 3. 9. 3 Special requirements The author must be added by chair as a PC member for that conference. 3. 3. 9. 4 PreconditionsThe PC member should be added by program chair to review that conference, and he should have changed his role from author to PC member. 3. 3. 9. 5 Post condition The PC member downloads the paper. 3. 3. 9. 6 Extension pointN. A. 3. 3. 10 UC010 View Paper Details 3. 3. 10. Description The PC member can check the details of the research paper. 3. 3. 10. 2 Flow of events The author changes his role from author to PC member, selects the conference and particular research paper, then views the detail of paper. 3. 3. 10. 2. 1 Alternative Flows N. A. 3. 3. 10. 3 Special requirements The author must be added by chair as a PC member for that conference. 3. 3. 10. 4 PreconditionsThe PC member should be added by program chair to review that conference, and he should have changed his role from author to PC member. 3. 3. 10. 5 Post condition The PC member check the details of paper. 3. 3. 0. 6 Extension pointN. A. 3. 3. 8 UC11 strike down Author 3. 3. 11. 1 Description The administrator can delete any author if he does any illegal activity. 3. 3. 11. 2 Flow of events The administrator logs in and selects the author to be deleted. 3. 3. 11. 2. 1 Alternative Flows N. A. 3. 3. 11. 3 Special requirements N. A. 3. 3. 11. 4 PreconditionsThe administrator must hold a valid account and must be properly logged in. 3. 3. 11. 5 Post condition The author is deleted from the system. 3. 3. 11. 6 Extension pointN. A. 3. 3. 12 UC12 Logout 3. 3. 12. 1 Description The administrator can delete the author. . 3. 12. 2 Flow of events The administrator logs in and selects the logout option and administrator is logged out. 3. 3. 12. 2. 1 Alternative Flows N. A. 3. 3. 12. 3 Special requirements N. A. 3. 3. 12. 4 PreconditionsThe administrator must hold a valid account and must be properly logged in. 3. 3. 12. 5 Post condition The author is logged out from administrator page. 3. 3. 12. 6 Extension pointN. A. Chapter-4 Analysis 4. 1 sequence plot A sequence diagram is an interaction diagram in UML that emphasizes the time order of the messages. It shows how processes operate one with another and in what order.It shows analog vertical lines as different processes or physical objects that remain simultaneously, and horizontal arrows as the messages exchanged between them, in the order in which they occur. The boxes across the top of the diagram represent the use cases, objects, programmees, or actors. The dashed lines wall hanging from the boxes are called object lifelines, representing the life span of the object during the scenario being modeled. The retentive, thin boxes on the lifelines are ener gizing boxes, also called method-invocation boxes, which indicate processing is being performed by the target object/ figure to fulfill a message.Messages are indicated on UML sequence diagrams as labelled arrows, when the source and target of a message is an object or kind the label is the signature of the method invoked in response to the message. Return values are optionally indicated using a dashed arrow with a label indicating the return value. pic Fig 4. 1 Sequence Diagram for Login pic Fig 4. 2 Sequence Diagram for Sign Up pic Fig 4. 3 Sequence Diagram for My-Account Section pic Fig 4. 4 Sequence Diagram for Paper Submission pic Fig 4. 5 Sequence Diagram for Conference governing body pic Fig 4. 6 Sequence Diagram to add PC member. pic Fig 4. Sequence Diagram to print review for a paper. pic Fig 4. 8 Sequence Diagram to check submission details of a conference. 4. 2 practise Diagram An Activity Diagram is essentially a flow chart show flow of control from activity to act ivity. They are used to model the dynamic asp viperects of as system. They can also be used to model the flow of an object as it moves from state to state at different points in the flow of control. Activity diagrams commonly go over fork start & end symbol. pic Fig 4. 7 Activity diagram for Author pic Fig. 4. 8 Activity diagram for administrator Chapter-5 Design 5. 1 Technology SelectionWe are a part of a chop-chop changing software industry. hot and better softwares are created every day. The main function of the software is to provide comfort to its users and also to the other developers. java chocolate Platform, Standard Edition or chocolate SE is a widely used platform for schedule in the burnt umber language. It is the Java Platform used to deploy portable applications for general use. In practical terms, Java SE consists of a virtual machine, which must be used to run Java programs, together with a set of libraries needed to allow the use of file systems, networks, graphical interfaces, and so on, from within those programs.Java Development Kit jdk 1_5_0 it has been by far-off the most widely used Java SDK Sun contributed the source enactment to the OpenJDK. The Java Development Kit (JDK) is a Sun Microsystems product aimed at Java developers. Since the introduction of Java, it has been by far the most widely used Java Software Development Kit. A Java Development Kit (JDK) is a program development environment for writing Java applets and applications.It consists of a runtime environment that sits on top of the operating system layer as well as the tools and programming that developers need to compile, debug, and run applets and applications written in the Java language. A JVM can also execute byte label compiled from programming languages other than Java. Java was conceived with the concept of WORA write once, run anywhere. This is done using the Java Virtual Machine. The JVM is the environment in which Java programs execute. It is software that is implemented on non-virtual hardware and on standard operating systems.JVM is a crucial component of the Java platform, and because JVMs are available for many hardware and software platforms, Java can be both middleware and a platform in its own right, hence the earmark write once, run anywhere. The use of the same byte code for all platforms allows Java to be described as compile once, run anywhere, as contrasted to write once, compile anywhere, which describes cross-platform compiled languages. A JVM also enables such features as automated exception handling, which provides root-cause debugging information for every software error (exception), independent of the source code.A JVM is distributed along with a set of standard class libraries that implement the Java application programming interface (API). Appropriate APIs bundled together form the Java Runtime Environment (JRE). Javas execution environment is termed the Java Runtime Environment, or JRE. Programs intended t o run on a JVM must be compiled into a standardized portable binary format, which typically comes in the form of . class files. A program may consist of many classes in different files. For easier distribution of large programs, multiple class files may be packaged together in a . jar file. JSP and ServletsA servlet is a Java programming language class used to anesthetize the capabilities of servers that host applications accessed via a request-response programming model. Although servlets can respond to any type of request, they are commonly used to extend the applications hosted by Web servers. To deploy and run, the Apache Tomcat Server may be used. It is an open source servlet container developed by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the Java Server Pages (JSP) preconditions from Sun Microsystems, and provides a slender Java HTTP web server environment for Java code to run.Java Server Pages(JSP) is aJava applied science that helpssof tware developersservedynamically generated web pagesbased on HTML,XML, or other document types. JSP may be viewed as a high-level inductive reasoning ofJava servlets. JSP pages are loaded in the server and are operated from a structured special installed Java server packet called a Java EE Web Application, often packaged as a. waror. earfile archive. JSP allows Java code and certain pre-defined actions to be interleaved with static web markup content, with the resulting page being compiled and executed on the server to deliver an HTML or XML document.The compiled pages and any dependent Java libraries use Java byte code quite a than a native software format, and must thus be executed within aJava virtual machine(JVM) that integrates with the hostoperating systemto provide an abstract platform-neutral environment. MySQL as a backend Features of MySQL 1. secureness Of course, the speed at which a server side program runs depends primarily on the server hardware. inclined that the server hardware is optimal, MySQL runs very fast. It supports clustered servers for demanding applications. 2. console of use MySQL is a high-performance, relatively simple database system.From the beginning, MySQL has typically been configured, monitored, and managed from the command line. However, several MySQL graphical interfaces are available as described below MySQL Administrator This tool makes it possible for administrators to set up, evaluate, and tune their MySQL database server. This is intended as a replacement for mysqladmin. MySQL Query Browser Provides database developers and operators with a graphical database operation interface. It is especially useful for seeing multiple query plans and result sets in a single user interface. Configuration Wizard Administrators can choose from a predefined list of optimal settings, or create their own. MySQL System Tray Provides Windows-based administrators a single view of their MySQL instance, including the ability to star t and stop their database servers. 3. Cost MySQL is available free of cost. MySQL is a Open Source database. MySQL is part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python) environemtn, a fast growing open source enterprise software stack. More and more companies are using LAMP as an alternative to expensive branded oftware stacks because of its lower cost, dependability, and documentation. 4. Query Language expect MySQL understands standards based SQL (Structured Query Language). 5. Capability Many clients can connect to the server at the same time. Clients can use multiple database simultaneously. You can access MySQL using several interfaces such as command-line clients, Web browsers. 6. Connectivity and auspices MySQL is fully networked, and database can be accessed from anywhere on the Internet, so you can share your data with anyone, anywhere.The connectivity could be achieved with Windows programs by using ODBC drivers. By using the ODBC connexion to MySQL, any ODBC-aw are client application (for example, Microsoft Office, report writers, opthalmic Basic) can connect to MySQL. 7. Portability MySQL runs on many varieties of UNIX, as well as on other non-UNIX systems, such as Windows and OS/2. MySQL runs on hardware from headquarters PCs to high-end server. MySQL can be installed on Windows XP, Windows Server 2003, trigger-happy Hat Fedora Linux, Debian Linux, and others. We have maintained our database in MySQL that involves maintenance of information. 5. Database Design It is defined as alter repository of information about data such as meaning, relationships to other data, origin, usage, and format. Our data vocabulary is designed in order to fulfill A document describing a database or collection of databases An intact component of a DBMS that is required to suss out its structure A piece of middleware that extends or supplants the native data dictionary of a DBMS. The most gainsay phase of the system life cycle is system design. The te rm design describes a final system and the process by which it is developed.It refers to the technical specifications that will be applied in implementing the candidate system. It also includes the construction of programs and program scrutiny. System design is a solution, a how to begin the creation of a new system. This grave phase is composed of several steps. It provides understanding and adjectival details requisite for implementing the system recommended in the feasibleness study. Emphasis is on translating the performance requirements into design specifications. The first step is to determine how the output is to be produced and in what format.Samples of the output and introduce are also presented. Second, input data and master files (database) have to be designed to come upon the requirements of the proposed output. The operational (processing) phases are handled through program construction and examination, including a list of programs needed to meet the systems obj ectives and to complete documentation. in the end, details related to justification of the system and an estimate of the impact of the candidate system on the user and the organization are documented and evaluated by management as a step toward implementation.The design approach that was suited for the project turned out to be object-oriented design. It creates a representation of the real world problem worldly concern & maps it into a solution domain that is software. Unlike other methods, object-oriented design results in a design that interconnects data objects(data items) & processing operations in a way that modularizes information & processing , sort of than processing alone. E-R diagrams represent the schemas or the overall organization of the system. In order to begin constructing the basic model, the modeller must analyze the information gathered during the requirement analysis for the purpose of classifying data objects as either entities or attributes, ? identifying an d be relationships between entities, ? naming and defining identified entities, attributes, and relationships, ? documenting this information in the data document. ? Finally draw its ER diagram. To accomplish these goals the modeler must analyze narratives from users, notes from meeting, policy and procedure documents, and, if lucky, design documents from the true information system. pic Fig 5. 1 Enhanced Entity-Relationship diagram. Chapter 6 Testing 6. Test Case and Design Software exam is a critical element of software quality assurance and the ultimate review of specification, design and code generation . Testing of the software leads to show of errors in the software and reveal that whether software is functional and performance requirement are met. Testing also provides a good indication of software reliability as software quality as a whole. The result of different phases are evaluated and then compared with the pass judgment results. If the errors are uncovered they are debugged and corrected.A strategy approach to software examen has the generic characteristics Testing begins at the module level and works outwards towards the desegregation of the entire computer based system. Different exam techniques are appropriate at different point of time. Testing and debugging are different activities, but debugging must be accommodating in the testing strategy. A strategy for the software testing must be accommodate low level tests that are necessary to verify that a small source code segment is performing correctly according to the customers requirement and that of developers expectations.Testing Objectives Testing is a process of executing a program with the intent of finding an error. A good test case is one which has a high probability of finding an as yet undetected error. A undefeated test is one that uncovers an as yet undiscovered error. Our objective is to design tests that systematically uncover different classes of errors and to do so with stripped-down amount of time and effort. Testing Principles All tests should be traceable to customer requirements. Tests should be planned long before testing begins. The Pareto principle applies to software testing. Testing should begin in the small and progress towards testing in the large. Exhaustive testing is not possible. To be most effective, testing should be conducted by an independent third party. 6. 2 Testing Methods and Strategies any(prenominal) engineered product can be tested in one of two ways White-Box Testing acute the internal workings of a product, tests can be conducted to ensure that the internal operation performs according to specification and all internal components have been adequately exercised.For testing our project, we have used the bootleg-Box testing methods, and a short circuit description of this testing method follows Black-Box Testing Black box testing, also called Behavioral testing, focuses on the functional Requirements of th e software. It enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program. It is a complementary approach to White-Box testing that is likely to uncover a different class of errors. Black Box testing attempts to find errors in the pursual categories unseasonable or missing functions Interface errors Errors in data structures Behavior or performance errors Initialization and termination errors. scenes for Test cases pic Fig 6. 2. 1 cinch for login Test Cases Description following testing checks the authenticity of the end-user. Test 01 Test case for successful Login Login ID pushpendra Password blackboard System Output no-hit Login Test 02 Test case for incorrect password Login ID pushpendra Password chalk System Output Incorrect user-id or Password pic Fig 6. 2. 2 Snapshot for conference installation Test CasesDescription this lets you install a new conference. Test 01 Conference name world(prenomina l) conference on environmental studies Conference acronym ICES netmail emailprotected com City Indore Country India Your role chair look into area environmental Any other information Send request System output conference successfully installed. pic Fig 6. 2. 3 Snapshot for paper submission Test Cases Description this lets you submit your research paper in your desired conference. Test 01 spend a penny mohit maheshwari E-mail mohit. emailprotected om Country India Organization Accenture India Title demoralise computing Abstract benefits of new cloud computing Keyword ACC Paper paper1. pdf Browse System output new paper successfully submitted. pic Fig 6. 2. 4 Snapshot for changing role Test Cases Description this lets you change the role as per as requirement. Test 01 toast role Author alter role New role Chair System output Your role successfully changed. pic Fig 6. 2. 5 Snapshot for updating profile Test Cases Description this lets you update your own(prenominal) information. Test 01 Name ankit Jainist Contact number 9407217505 E mail emailprotected com Organization Microsoft India Country India Password anjtdf Change password fhdfioh Submit System output your profile successfully updated. pic Fig 6. 2. 6 Snapshot for review of the paper Test Cases Description this lets you review the form previously submitted by you. Test 01 ID 412 Author mohit jain Review rating 4. 5 Comment it was very innovative. Submit System output your form has been successfully reviewed. Conclusion Softwares are making everyday life of humans being easier & faster.This type web-application shows How we can solve management problem? Hence, software is managing the record & database in behalf of humans. After completion of this website, authors and administrator can now access the conferences and can submit the research paper of their delight field. It is aimed at improving the infrastructure of the conference organizers by providing authors an opportunity to submit their pape rs. Thus it can manage the entire conference process related to paper submission, jury selection, and paper review, under the complete control of the administrator.In our project, we have used Mysql RDBMS for the creation, maintenance and use of the database. The user interface is designed using Java servlets, JSP using Netbeans IDE. We have defined two users for this system, author and administrator, each with their own access and rights and activities. This project allowed us to interact with JSP and servlets. We explored java database connectivity and also became familiar with requirements of a conference management system. BIBLIOGRAPHY/REFRENCES 7. 1 BOOKS REFERED The following books were used extensively for the project development and implementation. . The land up pen Java2 Tata McGraw-Hill publishing Company Limited. By- Herbert Schildt. 2. The Complete Reference to JAVA SERVER PAGES 3. Head First Java Servlets 4. Software Engineering Pearson edition By Ian SommerVille 5. Database wariness System by Ivan Bayross 7. 2 WEBSITES REFERED http//www. google. com http//www. wikipedia. com http//www. w3schools. com/css/css_examples. asp http//www. w3schools. com/js/default. asp http//www. jsptut. com/ http//www. roseindia. net/jsp/jsp. htm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.