;

Friday, 13 April 2018

Tesis chapter intro


CHAPTER 1 
                                                                                                     INTRODUCTION
1.1 Introduction
This documentation describes the various functions of our project. The actual design of the various modules and components of Student Information System is described in this document which takes care of various functionalities that our project aims to achieve and for determining the operating characteristics of the system. web portal for students of MISAT a web-based application for students, faculty, academic staff and parents who want to get and retrieve student’s whole information instantly via internet. The major benefit of this web portal is to store the student’s information at one place (like SERVER) and it can be accessed via online interaction. The SIS web portal is to replace the old and traditional file (paper work) storing process. Instead of tedious paper work, students will be able to submit required information electronically, and the departments will be able to evaluate the submissions with a much quicker
turnaround.

1.2Overview
web portal for Students of MISAT is a web-based application that tracks current student’s academic information. It maintains academic information for ready access by office staff, students, theirfaculty advisors, and committee members.work manually
The web portal for Students of MISAT has been modularized into following modules
.

1.3 Login Module
The purpose of this module is to provide entry to the system or website. Based on the type of login, the user is provided with various facilities and functionalities. The main function of this module is to allow the user to use SIS. This module provides two types of login —Admin login and Student login.

1.4 Administrator Module
In this module when the administrator will enter his/her user name and password, then he/she will enter in to the administrator page and this page consists of two following sub modules.

Student Addition/ Updating / Deletion:
In SIS each Student is added, updated or deleted according to its branch.

Notice/Attendance/Assignment Generation:
In SIS information about notice, attendance and Internal result is generated.

1.5 Student Module
In this module when a user enters his student id and password, then he can visit all the following pages.

Profile View:
When the student clicks on this link he/she will get his/her information like student id, student name, password, father  name, date of birth, nationality, city, address, country, phone number, mobile number, email. If he/she wants then he/she can change the profile.

Notice View:
When the student clicks on this link, he can see latest notices released by the administrator.

Attendance View:
When the student clicks on this one, the student can get his overall attendance percentage (present and absent).

Internal Results View:
When the student clicks on this, he/she will get the internals result in all the subjects. How much grade point he/she secure out of 20 he/she can know.

Time Table View:
When the student clicks on this link then he/she get all the information that on which day and on which date.

The Student Helpdesk:

This helpdesk is staffed by faculty who are there to help you. You may contact on (faculty phone no.).



Function decomposition Thesis


Introduction
System design:
System design is process of defining the elements of the system such as the architecture,
Modules and components, the different interfaces of those components and the data that goes
Through that system. It is meant to satisfy specific needs and requirements of a business or organization
Through the Engineering of a coherent and well-running system.

3.2.  System Decomposition/Modularization:
In system design decomposition is the separate of system into simpler or basic sub-
Systems. As many experienced designers know, it is often difficult task to create an optimal
Decomposition of a system. It is often as much a people problem as a technical problem.

An optimal decomposition requires gathering all the necessary requirements from people
And then using those requirements do design the appropriate decomposition of system and sub-
Systems. It is also often difficult to know if you have all the requirements. And, give you actually have all the requirements; it is difficult to create an decomposition.

Modularization Is a technique to divide a software system into multiple discrete and
Independent modules, which are expected to be capable of carrying out task(s) independently.
These modules may work as basic construct for the entire software. Designers tend to design
Modules such that they can be executed and/or compiled separately independently.
Modular design unintentionally follows the rules of ‘divide and conquer’ problem-
Solving  strategy this is because they are many other benefits attached with the modular design
of software.


Advantage of Modularization;
·         Smaller components are easier to maintain
·         Program can be divided based on functional aspects
·         Desired level of abstraction can be brought in the program
·         Components with high cohesion can be re-used again
·         Concurrent execution can be made possible
·         desired from security aspect

Following is the design decomposition of our Projects











Fig 4 Functional Decomposition:


                                                         

 








3.3 Concurrency Control

All software’s are meant to be executed sequentially. By sequential execution we mean
That the coded instruction will be executed one after another implying only one portion of
Program being activated at any given time. Say, Software has multiple modules, and then only
One of all the modules can be   found active at any time of execution.

In system design , Concurrency is implemented by splitting the software into multiple
Independent units of execution, Like modules and executing them in parallel. In other words,
Concurrency provides capability to the software to execute more than one part of code in
Parallel to each other.
It is necessary for the programmers and designers to recognize those modules, which can be made parallel execution.
Example:
The spell check features in word processor is a module of software, which run
Alongside the word processor itself.
3.4 Hardware and Software Mapping
By mean of Hardware and software mapping we mean that what kinds of hardware and
Software we have  used to develop our project. Following are The details of Hardware and
Software we have used.



3.4.1 Hardware
Ø Windows
Ø RAM 2GB
Ø Processor 2.40 GHZ
Ø Hard Disk 500GB

Testing
5.1. Introduction
1. The process  of executing  a system with the intent of finding an error.
2. Testing is defined as the process in which defects are identified, isolated, subjected for
Rectification and ensured that the product is defect free in order to produce the quality product and
Hence costumer satisfaction.
3. Quality is defined as justification of the requirements.
4. defect is nothing but deviation from the requirements.
5. Defect is nothing but bug.
6. Testing --- The presence of bugs.
7. testing can demonstrate the presence of bugs, but not their absence.
8. Debugging and testing is not the same thing.
9. testing is a systematic attempt to break a program or theAUT.

5.2 Testing Methodologies;
·         Black box testing; is the testing process in which tester can perform testing on an
Application without having any internal structural knowledge of application.
Usually test Engineers are involved in the Black Box Testing.
 

·         White box Testing: is the testing process in which tester can perform testing on an
Application with having internal structural knowledge.
Usually the developer are involved in white box testing.

·         Gray Box Testing: is the process in which the combination of black box
White box tonics are used.


5.3 Software testing Life Cycle (STLC)
Software life cycle models describe phases of the software cycle and and the order in which whose
Phase are executed. Each phase produces deliverable required by the next phase in the Life
Cycle. Requirements are translated into design. Code is produced according to the design which
is Called development phase. After coding and development the testing verifies the deliverable of
the implementation phase against requirements.

There are following six phases in every software development life Cycle Model;
1.      Requirement gathering and analysis
2.      2. Design
3.      Implementation or coding
4.       Testing
5.      Deployment
6.      Maintenance

1)      Requirement gathering and analysis: Business requirements are gathered in this phase
This phase is the main focus of the project managers and stake holders. Meeting with managers
Stack holders and users are held in order to determine the requirements like; Who is going to use
The system? How will they use the system? What data should be input into the system? What
Data should be output by the system? These are general questions that get answered during  a
Requirement gathering phase. After Requirement gathering these requirements are analyzed.


5.4 Test planning:
·         Test plan is defined as a strategic document with describes the procedure how to
Perform various testing on the total application in the most efficient way.
·         This document involves the scope of testing.
·         Objective of testing.
·         Area that need to be tested.
·         Area that should not be tested.
·         Scheduling resources planning.
5.5 Types of testing:
Regression Testing: Is one of the best and important testing . regression testing is the
Process in which the functionality, Which is already tested before, is once again tested
Whenever some new change is added in order to check whether the existing functionality
Remains same.
Re Testing: is the process in which testing is performed on some functionality
Which is already tested before to make sure that the defects are reproducible and to rule out the
Environments issues if at all any defects are there.
Static Testing: Is the testing, which is performed on an application when it is not been
Executed ex: GUI, document Testing.
Dynamic Testing: Is the testing which is performed on an application when it is being
Executed ex: Functional Testing
Alpha Testing: it is a type of user acceptance testing, which is conducted on a
Application when it is just before released to the costumer.
Beta testing: It is a type of  UAT that is conducted on an application when it is released
To the costumer, when deployed into in real time environment and being accessed by the
Real time users.

Installation Testing: It is the process of testing which tester try to install or try to
Deploy the module into the corresponding environment by following the guidelines.
Produced in the deployment document and check whether the installation is successful or not
Their validity and the possibility of incorporating the requirements in the system to be development is also studied.

Finally a requirement  Specification Document is created which serves the purpose of guideline
For the next phase of  the model.

2)      Design: In this phase the system and software design is prepared from the requirement.
Specification which were studied in the first phase. System design helps in specifying hardware
And system requirements and also helps in defining overall system architecture. The System
Design Specifications serve as input for the next phase of the model.

In this phase the testers come up with the test strategy, Where they mention what to test, how
To test.

3)      Implementation/Coding: On receiving system design Documents, The work is divided in
A modules/units and actual coding is started. Since, In this phase the code is produced so it is the
Main focus for the developer. This is the longest phase of the software development life cycle
.
4)      Testing: After the code is developed it is tested against the  requirements to make sure that
The product is actually solving the needs addressed and gathered during the requirement phase.
During this phase all types of functional testing like unit testing, integration testing, system
Testing, acceptance testing are done as well as non functional testing are also done.


5)      Deployment: After successful testing the product is delivered/ deployed to the costumer for
Their use. As soon as the product is given to the costumers they will first to do beta testing. If
Any changes required or if any bugs are caught, then they will report it to the engineering
Team. Once those changes are made or the bugs are fixed then the final deployment will happen.

6)      Maintenance: Once when the costumer starts using the developed system then the actual
Problems comes up and needs to be solved from time to time. This process where the care is taken
For the developed product is known as Maintenance.


Thursday, 23 April 2015

Ploymorphism

Ploymorphism
the word Ploymorphism is a combination of two words poly and morphism. poly means
many and morphism means form. In object oriented programming Ploymorphism is the ability
of objects of different types of respond to functions of the same name. The user does not have to know the exact type of the object in advance. The behavior of the object
can be implemented by using virtual functions. A pointer can also refer to an object of a class. The member of an object can be accessed through pointers by using the symbols. The symbols
is known as member access operator. An array can store same types of data and an array of pointer is
also can be stored memory addresses of the object of same clases user to . It allows the user to
create a large number of objects in memory .

Pointers and inheritance
Pointers have very important capability of storing the addresses of different objects
A pointer can be store the address of object whose type is same as the type of pointer
. It can be be also store the address of any object that belongs to any child class of the class of pointer. Suppose there are three classes A,B and also C.The class A is a parent class wheres B and C
are child classes. A pointer of class A can store the addresses all objects of A as well as B and C.

The Type of pointer does not change when a pointer of parent class refers to an object
of child class. That is why, the pointer always execute the member functions of parent class
even if refers to a child object in the memory.

Virtual Functions
It means existing effects but not in realty. A type of function is that appears to exist in some part
of a program but does not exist really is called Virtual function. It Also used to important
functions.

Early Binding
 The assignment of types to variables and expression at compilition time is known as
Early binding. It is also called static binding. The early binding occurs
when everything required to call a function is known at compile time. Early binding enables the computer know exactly witch function will be called when a certain statement is executed.

When a program is compiled, the compiler checks the functions calls and decides which function is
to be executed. This process takes place during compilation process in normal programs with functions.




Arrays

Arrays
An array is a group of consecutive memory locations with same name and type. Simple
variable is a single memory location with a unique name and a type. But an array is a collection of different adjacent memory locations. all these memory locations have one collective
name and type. the memory locations in the array are known as elements of array. The total number
of elements in the array is called its length.
Each elements in the array is accessed with references to its positions of location in the array. This
positions is called index or subscript.Each elements in the array has a unique index. The index
of first element is  0 and the index of last is element length is -1. The Value
the index written in brackets along with the name of array.
Arrays are used to store a large amount of similar kind of data. Suppose the user wants
to store the marks of 100 students and declares 100 variables. It is time consuming process to
use the these variables individually. This process can be simplified by using array. An array is
of 100 elements can be declared to store these values instead of 100 individual variables.

Array initializations
The process of assigning values to array elements at the time of array declaration is called
array initialization. This process provides a list of initial values of array elements. The value
are separated with commas and enclosed within braces. there must be at least one initial
value between braces. A syntax errors occurs if the value in braces are more than length of array
. So if the number of initial values is less than the array sizes the remaining array elements
are initialized to zero.

Declaring one dimensional arrays
A type of array in which all elements are arranged in the form of list is known as
on dimensional array. It is also called single dimensional array or linear list. It consists
of one column or one row. The process of specifying array name length and data type is called
array declaration.

Loops

A type of control structure that repeats a statements is known as looping structure. It is also known as iterative or repetitive structure. In sequential structure all statements are executed once.on the other hand Conditional structure may execute or skip a statement on the basis of some given condition.In some situations it is required to repeat s statement or number of statements For a Special number
of Times. Looping Structures are used for this purpose. There are different types of loops available in
C++.

Counter Controlled Loops 
This type of loop depends on the value of a variable known as counter variable. The value
of counter variable is incremented or decremented each time the body of the loop is executed
. So This Loop terminates when the value of counter variable reaches a particular value. The
Number of iterations of counter controlled loop is in advance.The iteration of this loop depends on the terminating condition,increment or decrement value.

Sentinel Controlled Loops
This type of loop depends on special value known as sentinel value. The Loop terminates
when the sentinel value is encountered. These Types of loops are also known as conditional
loops. A Loop may execute while the value of a variable is not here. The Number of iteration
of sentinel controlled loop is unknown. It depends on the input from the users. Suppose the
 sentinel value to terminates a loop is 1 if the users enter 1 in first iteration,the loop will
execute only once. But if the user enter after entering many other values,the number of iterations
will very accordingly. A sentinel value is commonly used with while and Do-while loop.

While Loop
This is the simplest loop of C++ language. This Loop executes one or more statements while the
given condition remains true. It is useful when the number of iterations is  not known in advance.First of All the condition is evaluated. If it is true,the control enters the body of the loop and executes
all statements in the body. After executing the statements it again moves to the start of the loop
and evaluates the condition again. This process continues as long as the condition remains true.
When the condition becomes false/the conditions remains true,the loop never ends. A loop that
has not end points is known as an infinite loop.

Saturday, 24 January 2015

Mapping

Mapping is a process of converting one level to another level. In this process,the data
at one level is related to the data and another level.

The conceptual/internal mapping defines the correspondence between the conceptual view and
stored database. It specifies how conceptual records and fields are represented at the internal level
if the structure of stored database is changed, then the conceptual mapping must be changed
accordingly so that the conceptual schema can remain consistent. It is the responsibility
of DBA to manage such change.

Logical , Internal Or Physical level

Logical or conceptual Level
This is the middle level view in three level architecture. The logical or conceptual
level describes the data stored in database. It contains the definition of the data to be stored 
in the database. It also contains the rules and information about the structure and type of 
data. It is the complete description of data stored in database. That is why it is also known as a community view of the database.This level contains the logical structure of entire database as seen. It hides the details of physical storage instruction physical Storage  structure

The conceptual level supports each external view. It means that any data require by
any user must be available from conceptual view. The conceptual model is comparatively 
constant. Dba designs a conceptual mode to fulfill the present and future requirements of
the organization. If there is any charge in external model, The conceptual model should 
be able to accomodate that change. It is important because any changes in the conceptual 
models requires a lot of effort. It also effects other views or levels of the database. the conceptual level is described in conceptual schema. There is only one schema for one database.

Internal Or Physical level

Internal level is responsible to store data on storage media. It describe the physical 
representation of database on computer. It describes how the data is stored in database . It 
covers the data structures and file organization used to store data on storage devices.
Internal and physical levels are normally considered to be same. But there is a slight method 
is implemented by operating systems. DBMS partially decides the way data is stored on the Disk. The binary storage This decisions is based in the specifications of DBA. Additionally 
DBMS adds information to the data to be stored For example it selects a specific files 
organization for storing data on the disk. It also applies different data encryption
algorithms to implement security on the data.

It performs a storage space utilization to consume minimum space for storing data 
The data compressions can be performed for this purpose. It also applies 
different data encryption algorithms to implement security on the data.

The records at internal level are presented according to the format of schema difinition
but the data is not in the record format at physical level. It is in character format. The rules 
specified by the schema of record are not enforced at physical level. Data is managed 
by operating system at physical level.