SlideShare a Scribd company logo
1 of 39
CONTENTS
1. INTROUCTION
2. SYSTEM ANALYSIS
2.1 EXISITING SYSTEM
2.2 PROPOSED SYSTEM
2.3 FEASIBILITY STUDY
2.4 SYSTEM REQUIREMENTS
2.5 DATAFLOW DIAGRAM
2.5.1 CONTEX DIAGRAM
2.5.2 TOP LEVEL DFD
2.6 ER DIAGRAM
3. SYSTEM DESIGN
3.1 DATA BASE DESIGN
3.1.1 TABLE LIST
3.1.2 TABLE DESIGN
3.2 INPUT DESIGN
3.3 OUTPUT DESIGN
3.4 MODULE DESCRIPTION
4. SYSTEM CODING
4.1 PROGRAM LIST
4.2 SOURCE CODE
5. SCREEN SHOTS
6. SOFTWARE TESTING
7. IMPLEMENTATION AND MAINTENANCE
8. FURTHER ENHANCEMENT
9. BIBLIOGRAPHY
1
1.INTRODUCTION
Public voice concerns all activities with regard to producing a schedule that
must be subjective to different constraints. Public voice can be defined as the
optimization of given activities, actions or events to a set of objects in space-time
matrix to satisfy a set of desirable constraints.
Public voice is a temporal arrangement of a set of proposals in which related
to current constraints with a mission to improve public services and neighborhoods
through user engagement.
By automating this process through community engagement, individual user
engagement and community intervention, collecting the combined voice of citizens,
gathering decisions and comments ultimately bring about a positive change, now and
in future.
Hence we have developed practical approach for building Public voice system,
which can be customized to empowered to influence decisions. This project
introduces a practical Public voice system capable of taking care of both strong and
weak constraints effectively, used in an automated public voice system. So that each
user can view proposals and its likes and dislikes. This software is developed in PHP
as front end and MySQL as back end.
Advantages of this System:
• This software will reduce manual work and maintain updates in database from
time to time.
• It is easy to handle works related to Public voice system.
2
2.SYSTEM ANALYSIS
The major activities in the system study are studying the ways an organization
currently retrieving and processing data to produce information. It involves the study
of various operation performed by the system and their relationship with in and
outside the system. The system study is usually done on the basic approach of
understanding the problem or user requirements. To understand the user requirements
the analyst communicates with the user or customer and studies the basic
requirements of the customer. The study of the present system was necessary to carry
out the preliminary investigation.
2.1 EXISTING SYSTEM
Public voice system concerns all activities with regard to producing a schedule
that must be subjective to different constraints. Public voice system can be defined as
the optimization of given activities, actions or events to a set of objects in space-time
matrix to satisfy a set of desirable constraints.
A key factor in running for piblic is need for a well-planned, well-throughout
and clash-free. Back in the days when technology was not in wide use, user’s has their
own decisions in each and every subjects that occurring day to day in our society but
they couldn’t open their mind because of fear. It requires many books keeping effort.
The possibility of the occurrence of problems is very high.
2.2.PROPOSED SYSTEM
The Public voice system is an online process in which the users and
administrator have separate login.Mainly two modules in the system such as
admin,user. Public voice is a temporal arrangement of a set of proposals in which
related to current constraints with a mission to improve public services and
neighborhoods through user engagement.
3
By automating this process provide more confidence to society to open their
mind and protest against with their words through community engagement, individual
user engagement and community intervention, collecting the combined voice of
citizens, gathering decisions and comments ultimately bring about a positive change,
now and in future.
The proposed computerization is developed using PHP as front end and
MySQL as back end. The main purpose of the proposed system is to overcome the
drawbacks of the existing system. Speed and accuracy are the main benefits of the
proposed system over the existing system. There are data entries screens, which are
user friendly. Errors in data entry are minimized through validity checks and
messages are displayed whenever necessary. The proposed system will have a high
security system to protect all the confidential information stored in the database.
Advantages
• Easier entry of data through forms
• Easier modification of data entered
• User friendly interface
• Quick set rival of information
• provides greater efficiency.
• Provide data security.
4
2.3 FEASIBILITY STUDY
The main objective of feasibility study is to test the technical,social and
economical feasibility of developing a system.This is done before developing a
system . It is derived as follows:
Technical Feasibility
Here the system is checked whether it is technically feasible or not. The
System “Public voice System ” is technically feasible because it consume less CPU
utilization and also it work with advanced operating systems such as
windows7,windows8 etc. So it is technically feasible.
Economical Feasibility
The economic feasibility is the analysis of the system whether it satisfies the
criteria for it economic angle. The System “Public voice System” is less economic
than previous system. The development cost is less. So it is economically feasible.
An economic feasibility test focuses on returns and costs of a proposed plan in both
the short and long-term. The cost for development of the system has been evaluated
and it is found that project is economically feasible.
Operational Fesibility
An estimate should be made to determine how much effort and care will go
into the developing of the system including the training to be given to the user.
Usually, people are reluctant to changes that come in their progression. The System
Fault “Public voice System” is user friendly and the user have the ability to operate
this system have less knowledge about it. So the system is technically, economically
and operationally feasible is developed to be user friendly. It needs less training and
improve working environment.
5
2.4 SYSTEM REQUIREMENTS
Hardware Specification
CPU : Pentium IV or above
RAM : 1 GB or above
Hard disk : 250 GB
Keyboard : Any
Mouse : Any optical mouse
Printer : Any
Software Requirements
Operating system : Windows 7
Front end : PHP
Back end : MySQL
IDE : NetBeansIDE7.4
6
ABOUT FRONT END
The technology selected for e-gramasabha is PHP/MYSQL. Apache is used
as the HTTP server. The development was done in a „windows environment using‟
adobe dream weaver CS5.
PHP
PHP is a general-purpose scripting language that is especially suited to server-
side web development where PHP generally runs on a web server.PHP code is
embedded into the HTML source document. Any PHP code in a requested file is
executed by the PHP runtime, usually to create dynamic web page content. It can also
be used for command- line scripting and client-side GUI applications. PHP can be
deployed on many web servers and operating systems, and can be used with many
relational database management systems (RDBMS). It is available free of charge, and
the PHP Group provides the complete source code for users to build, customize and
extend for their own use.
MySQL
MySQL is a relational database management system (RDBMS)[1] that runs as
a server providing multi-user access to a number of databases. MySQL is a popular
choice of database for use in web applications and is an open source product. The
process of setting up a MySQL database varies from host to host, however we will
end up with a database name, a user name and a password. Before using our database,
we must create a table. A table is a section of the database for storing related
information. In a table we will set up the different fields which will be used in that
table. Creating a table in phpMyAdmin is simple; we just type the name, select the
number of fields and click the „go button. we will then be taken to a setup screen‟
where you must create the fields for the database. Another way of creating databases
and tables in phpMyAdmin is by executing simple SQL statements. We have used this
method in order to create our database and tables.
7
2.5 DATA FLOW DIAGRAM
Data Flow Diagram (DFD) is an important tool used by system analyst. DFD
provide an overview of what data a system would process, What transformation of
data are done, what files are used and where the results flow. The graphical
representation of the system makes it a good communication tool between the user
and the analyst.
Analysis model help us to understand the relationship between different
components in the design. Analysis model shows the user clearly how a system will
function. This is the first technical representation of the system.
The analysis modeling must achieve three primary objectives.
• To establish a basis for creation of software design.
• To describe what the user requires.
• To define set of requirements that can be validated once the software
us build.
A data flow diagram is a graphical technique tat depicts information flow and
transforms that are applied as data move from input to output. The DFD is used to
represent increasing information flow and functional details. A level 0 DFD also
called fundamental system model represents the entire software elements as single
bubble with input and output indicated by incoming and outgoing arrow respectively.
Data Flow Notations
8
Function
File/Database
Input/Output
Flow
Level 0
Context level
9
Admin
Public voice
System
User
Request Request
Request
Response
Response
Public
Response
Admin Level 1 DFD
10
admin
pid
View user
View
proposal
status
Add
proposals
uid
login
login
Login
Login_id
User_details
like
proposal
Change
password
View user
feedback
lid
pid
feedback
fid
Login_id
User level 1 DFD
cid
11
User
Edit
profile
Change
password
View
proposal
uid
login
Login
Login_id
User_details
login
proposal
Login_id
Add likes
& dislikes
like
lid
Add
comments
comment
2.6 ER DIAGRAM
12
feedback
cid title
add
like
lid
pid
proposal comment
pid
cid
pid
set
addUser_details
login
uid
id
Login_i
d
3 SYSTEM DESIGN
The most creative and challenging phase of the system development is system
design it is a solution, a “how to approach” to the creation of the proposed system. It
refers to the technical specifications that will be applied. IT provides the
understanding and procedural details necessary for implementing the system
recommended in the feasibility study. Design goes through the logical and physical
stages of development.
At an early stage in designing in new system, the system analyst must have a
clear understanding of the objectives, which the design is aiming to fulfill. The first
step is to determine how the output is to be produced and in what format. Second
input data and master files (database) have to be designed to meet the requirements of
the proposed output. The operational (processing) phases are handled through
program construction and testing. Finally details related to justification of the system
and an estimate of the impact of the candidate system on the user and the organization
are documented and evaluated by management.
The final report prior to the implementation phase includes procedural flow
charts, records and report layout and a workable plan for implementation the
candidate system.
13
3.1 DATA BASE DESIGN
The most important aspects of building an application is the design of tables or
database schema. The data stored in the table must be organized in some manner,
which is meaningful. The overall objectives in the process of the table design have
been to treat data as organizational resources and as integrated whole. The
organization of the data in a database aims to achieve Five major objectives are given
below,
 Data integrity
 Data independency
 Controlled Redundancy
 Privacy and security
 Performance
Several degrees of normalization have to be applied during the process of table
design. The major aim of the process of the normalization is to reduce data
redundancy and prevent losing data integrity. Redundancy refers to unwanted and un
necessary repetition of data. Data integrity has to be converted at all levels. Poor
normalization can cause problem related to storage and retrieval of data. During the
process of normalization which identified cause serious problems, during deletion and
updation. Normalization also helps in simplifying the structure of the table. The
theme behind a database is to handle information as an integrated whole that make
access to information easy, quick inexpensive and flexible for users. The entire
package depends on how the data are maintained in the system. Each table has been
designed with a perfect vision.
14
NORMALIZATION
The process of refining the data model and creating with a database is called
normalization. Database designers can implement several levels of normalization.
Each level builds on previous levels by reducing the amount of redundancy between
tables. This typically increases performance and avoids problems with data
consistency.
 First normal form
First normal form is the most basic level of database normalization. The keys
to creating tables in the 1NF:
• Eliminate repeating groups in individual tables.
• Create a separate table for each set of related data.
• Identify each set of related data with a primary key.
 Second normal form
The first normal form is not a good database design, but it is a start.the keys to
creating tables in the 2NF:
• Create separate tables for sets of values that apply to multiple records.
• Relate these tables with a foreign key.
15
3.1.1 Table list
SL NO TABLE
NAME
DESCRIPTION
1 Login To store login details.
2 proposal To store proposal details.
3 User_details To store user details.
4 like To store user likes & dislikes.
5 feedback To store feedback details.
6 comment To store comment details.
16
3.1.2Table Design
Table name:login
Primary key-login_id
Field name Data Type constraints Description
login_id int(11) Primary key Login id
username varchar(100) Not null username
password varchar(100) Not null password
role varchar(100) Not null Role of the person
Table name:comment
Primary key-course_id
Field Name Data Type constraints Description
cid int(20) Primary key comment id
pid int(20) Foreign Key Proposal id
user varchar(20) Not null User details
comments varchar(20) Not null User comments
17
Table name:feedback
Primary key-fid
Field Name Data Type Constraints Description
fid int(20) Primary key Feedback id
title varchar(20) Not null Title of feedback
emai varchar(20) Not null User email id
feedback
varchar(20) Not null feedback
Table name:like
Primary key-lid
Field Name Data Type Constraints Description
lid int(11) Primary key Like id
pid int(11) Foreign Key Proposal id
type int(11) Not null type
user
varchar(100)
Not null User details
18
Table name:proposal
Primary key-pid
Field Name Data Type Constraints Description
pid int(11) Primary key Proposal id
tilte varchar(100) Foreign Key title
des varchar(1000) Not null description
date date Not null Proposal date
image varchar(100) Not null Proposal image
Table name:user_details
Primary key-uid
Field Name Data Type Constraints Description
uid int(20) Primary key User id
id int(20) Foreign Key Login id
name varchar(20) Not null User name
address varchar(20) Not null User address
gender varchar(20) Not null User gender
dob date Not null Date of birth
phone bigint(20) Not null Contact no
19
3.2 INPUT DESIGN
The input design is the link between the information system and the user. It
comprises the developing specification and procedures for data preparation and those
steps are necessary to put transaction data in to a usable form for processing can be
achieved by inspection the computer to read data from a written or printed documents
or it can occur by having people keying the data directly into the system. The design
of input focuses on controlling the input required, controlling the errors, avoiding
delay, avoiding extra steps and keeping the process simple. The input is designed in
such a way so that it provides security and ease of use with retaining the privacy.
Input design considered the following things:
 What data should be given as input?
 How the data should be arranged or coded?
 The dialog to guide the operating personnel in providing input.
 Method for preparing input validations and steps to follow when error occur.
20
3.3 OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and
presents the information clearly. In any system results of processing are
communicated to the users and to other system through outputs. In outputs design it is
determined how the information is to be displaced for immediate need and also the
hard copy output. It is the most important and direct source information to the user.
Efficient and intelligent output design improves the system’s relationship to help user
decision-making. Designing computer output should proceed in an organized, well
thought out manner; the right output must be developed while ensuring that each
output element is designed so that people will find the system can easily and
effectively. When analysis design computer output, they should
 Identify the specified output that is needed to meet the requirements.
 Select methods for presenting information.
 Create documents, report, or other formats that contain information
produced by the system.
 The output form of an information system should accomplish one or more
of the following objectives.
 Convey information about past activities, current status or projections of
the future.
 Signal important events, opportunities, problems, or warnings.
 Trigger an action.
 Confirm an action.
21
3.4 MODULE DESCRIPTION
Adminstrator Module
The main aim of the proposed system is manage public voice system .The
admin module contain different level of access they are view user, add proposals,
change password, view proposal status, view user feedback.
.
User Module
User can be access their functions like edit profile, view proposals, add likes
& dislikes, add coments, change password etc
Public Module
Public can be view the public voice system and add their feedbacks to admin.
22
4.SYSTEM CODING
4.1 Program List
Serial
No:
Program name Purpose
1 Connect For database connection
2 Loginform For login to homepage
3 Add proposals For add new proposals
4 Changepassword For change the current password
5 User reg For add a user
6 Log out For Log out
23
5.2 Source code
Connection code
<?php
$con=mysql_connect("localhost","root","",);
if(!$con){
echo "Error in connection".mysqli_error();
}
else{
$db=mysql_select_db('PUBLICVOICE');
if(!$db){
echo "Error in selecting db".mysqli_error();
}
}
?>
Login
<?php
ob_start();
session_start();
require_once('db.php');
if(isset($_POST['signin'])){
$user=$_POST['username'];
$pass=$_POST['password'];
$query="select * from LOGIN where username='$user' and password='$pass'";
$sel=mysql_query($query);
if(!$sel){
echo "error in query".mysql_error();
}
else{
$count=mysql_num_rows($sel);
if($count == 1){
$log=mysql_fetch_array($sel);
$_SESSION['id']=$log['login_id'];
$_SESSION['username']=$log['username'];
$_SESSION['role']=$log['role'];
$_SESSION['login_status']=true;
if($_SESSION['role'] == 'user'){
header('location:user_homepage.php?msg=Successfully logged in');
}
else{
24
header('location:admin_homepage.php?msg=authentication failed..');
}
}
else{
header('location:index.php?msg=Incorrect username/password
combination');
}
}
}
?>
Add proposal
<?php
require('db.php');
if(isset($_POST['sub']))
{
$t1=$_POST['t1'];
$t2=$_POST['t2'];
$x=$_FILES['t']['name'] ;
$y=$_FILES['t']['tmp_name'];
$pt="photo/".$x;
copy($y, $pt);
mysql_query("insert into proposal value(0,'$t1','$t2',now(),'$pt')");
echo "saved";
}
?>
Change password
<?php
if(isset($_POST['sub'])){
$pass=$_POST['password'];
$newpass=$_POST['newpass'];
$configpass=$_POST['configpass'];
$login_id=$_SESSION['id'];
$query="select password from LOGIN where login_id='$login_id'";
$q=mysql_query($query);
$res=mysql_fetch_array($q);
if($pass == $res['password']){
$quer="update LOGIN set password='$newpass' where
login_id='$login_id'";
$ins=mysql_query($quer);
if(!$ins){
echo "query error".mysql_error();
}
25
else{
header('location:user_homepage.php?msg=password successfully
edited');
}
}
else{
$error="*Current password is wrong!!";
}
}
?>
User registration
<?php
if(isset($_REQUEST['sub'])){
$name=$_REQUEST['name'];
$address=$_REQUEST['address'];
$gender=$_REQUEST['gender'];
$dob=$_REQUEST['dob'];
$mail=$_REQUEST['mail'];
$phone=$_REQUEST['phone'];
$password=$_REQUEST['password'];
$login=mysql_query("insert into Login (login_id,username,password,role)
values('','$mail','$password','user') ");
if(!$login){
echo "error in query".mysql_error();
}
$last_id=mysql_insert_id();
$insert="insert into user_details
values('','$last_id','$name','$address','$gender','$dob','$phone')";
$ins=mysql_query($insert);
if(!$ins){
echo "error in insert query".mysql_query();
}
26
else{
header('location:user_login.php?msg=Registered successfully.Please
Login');
}
}
?>
Logout
<?php
ob_start();
session_start();
session_destroy();
?><script type="text/javascript">
alert("succesfully logout!!!");
location="../index.php";
</script>?>
5.SCREENSHOTS
27
Home page
Login
Admin home
28
View user
Add proposal
29
Change password
30
Add proposal
View feedback
31
User home
32
6 SOFTWARE TESTING
The common view of testing held by users is that it is performed to prove that
there are no errors in a program. However, as indicated earlier, this is virtually
impossible, since analyst cannot prove that software is free and clear of errors. The
tester, who may be the program fail. A successful test, then, is one that finds an error.
Analysts know that an effective testing program does not guarantee system reliability.
Therefore, reliability must be Fdatabase designed into the system.
Unit Testing
In unit testing, we have to test the programs making up the system. The
software units in a system are the modules and routines that are assembled and
integrated to perform a specific function. Unit testing focuses on the module
independent of one another, in order locate errors. This enables, to detect errors in
coding and logic that are contained within that module alone.
Integration Testing
Integration testing is a systematic testing for conducting tests to uncover errors
associated within the interface. The objective is to take unit tested modules and build
a program structure. Here, correction is difficult because the vast expenses of the
entire program complicate the isolation of causes.
System Testing
In this phase, the entire software system was tested. After integration testing, the
entire software system was tested against various clients. The software has been
tested for its functionality as well as limitation. The various interfaces developed were
thoroughly debugged and were found to be working correctly.
33
Time Table management system
LOGIN FORM:
SL.No Test Case Excepted Result Test Result
1 Enter valid username and password
& click on login button
Software should display
main window
Successful
2 Enter invalid Software should not display
main window
successful
34
7. IMPLEMENTATION AND MAINTENANCE
Implementation is the stage of the project when the theoretical
design is turned into a working system. If the implementation stages is not carefully
planned and controlled, it can cause problems. Thus it can be considered to be
SL. No Test Case Excepted Result Test Result
1 Admin add user details Then go to user table Successful
2 All the fields are not fill Then print error message Successful
3 Add proposals Then go to proposal
table.
Successful
4 All the fields are not fill Then print error message Successful
35
the most crucial stage in achieving a successful new system and in giving the
users the confidence that the new system will work and effective.
The implementation stage is a system in its own right. It involves
careful planning, investigation of the current system and its constraints in
implementation, design of methods to achieve the change over procedures, training
of staff in the change over methods.
TASK OF IMPLEMENTATION
The first task is implementation planning. Once the planning
has been completed, the computer department is to ensure that the programs in
the system are working properly. At the same time, the user department must
concentrate on training user staffs planning, training and testing are the preparatory
activities of implementation.
The implementation phase ends with an evaluation of the system
after placing it into operation for a period of time. Implementation is the third phase
of the system process. In order to achieve the objectives and the expected
performance the system has been developed in a highly interactive and user-friendly
manner.
The tem maintenance is used to describe the software engineering activities
that occur following the delivery of a software product to the customer. The
maintenance phase of the software lifecycle is the time period in which software
performs useful work. We may define maintenance by describing four activities that
are undertaken after a program is released for use. During the use of any large
program, errors will occur and be reported to the developer. The process that includes
the diagnosis and correction of one or more error is called corrective maintenance.
Thus problem correction involves modification and revalidation of software to
corrective maintenance. The second activity that contributes to a definition of
maintenance occurs because of the rapid change that is encountered in every aspect of
computing.
An activity that modifies software to properly interface with a changing
environment is adaptive maintenance. The third activity occurs when a software
36
package is successful. As software is used recommendations for new capabilities,
modifications to existing function and general enhancements are received from users.
To satisfy request in this category, perfective maintenance is performed. The fourth
and last maintenance activity occurs when software is changed to improve future
maintainability or reliability or to provide activities including correcting, coding and
design, updating, documentation and test data and upgrading user support.
Maintenance means restoring something to its original conditions. In contrast,
enhancements mean adding or modifying or re execution.
8.FURTHER ENHANCEMENT
37
Enhancement means adding, modifying, or developing the code to
support the changes in the specification. It is the process of adding new capabilities
such as reports, new interfaces with other systems and new feature such as better
screen or report layout
The proposed system is developed and tested with some amount of
sample data, which satisfy all the requirements. It has high degree of accuracy, user
friendliness efficiency. The system is flexible and changes, if any can be made with
out much difficulty. Further improvements and extensions can be made in the system
to make overall work easier.
Further modifications and extensions in the system can made to make
overall work easier like the library make online. Those options are not in the software
can be included to improve the efficiency of the software.
9.BIBLIOGRAPHY
38
o PHP book by Vasvani (TMH publications).
o Beginning PHP5 by WROX.
o www.google.com.
o www.wikipedia.com
o www.w3schools.com
o Informatics practices by Sumita Arora.
o Head First PHP & MySQL by Lynn Beighley and Michael
Morrison(O Reilly)‟
39

More Related Content

What's hot

Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
Elements of systems design
Elements of systems designElements of systems design
Elements of systems designChandan Arora
 
Improved Strategy for Distributed Processing and Network Application Developm...
Improved Strategy for Distributed Processing and Network Application Developm...Improved Strategy for Distributed Processing and Network Application Developm...
Improved Strategy for Distributed Processing and Network Application Developm...Editor IJCATR
 
Socio Technical Systems in Software Engineering SE2
Socio Technical Systems in Software Engineering SE2Socio Technical Systems in Software Engineering SE2
Socio Technical Systems in Software Engineering SE2koolkampus
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignAkshaya Parida
 
JAVA INTRODUCTION
JAVA INTRODUCTIONJAVA INTRODUCTION
JAVA INTRODUCTIONProf Ansari
 
online multiplex ticket booking using ASP.NET C#(glosyn)
online multiplex ticket booking using ASP.NET C#(glosyn)online multiplex ticket booking using ASP.NET C#(glosyn)
online multiplex ticket booking using ASP.NET C#(glosyn)Md Imran
 
10. Software testing overview
10. Software testing overview10. Software testing overview
10. Software testing overviewghayour abbas
 
SAD Reviewer
SAD ReviewerSAD Reviewer
SAD Reviewerermell61
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9Ian Sommerville
 
Luis Perez ITS written report
Luis Perez ITS written reportLuis Perez ITS written report
Luis Perez ITS written reportLuis Perez
 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9Ian Sommerville
 
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...IJNSA Journal
 
CSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating SystemCSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating Systemghayour abbas
 
Design and implementation of a computerized goods transportation system
Design and implementation of a computerized goods transportation systemDesign and implementation of a computerized goods transportation system
Design and implementation of a computerized goods transportation systemOvercomer Michael
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9Ian Sommerville
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringAmr E. Mohamed
 

What's hot (20)

Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
Elements of systems design
Elements of systems designElements of systems design
Elements of systems design
 
Improved Strategy for Distributed Processing and Network Application Developm...
Improved Strategy for Distributed Processing and Network Application Developm...Improved Strategy for Distributed Processing and Network Application Developm...
Improved Strategy for Distributed Processing and Network Application Developm...
 
Socio Technical Systems in Software Engineering SE2
Socio Technical Systems in Software Engineering SE2Socio Technical Systems in Software Engineering SE2
Socio Technical Systems in Software Engineering SE2
 
Understanding Basics of OS
Understanding Basics of OSUnderstanding Basics of OS
Understanding Basics of OS
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
JAVA INTRODUCTION
JAVA INTRODUCTIONJAVA INTRODUCTION
JAVA INTRODUCTION
 
online multiplex ticket booking using ASP.NET C#(glosyn)
online multiplex ticket booking using ASP.NET C#(glosyn)online multiplex ticket booking using ASP.NET C#(glosyn)
online multiplex ticket booking using ASP.NET C#(glosyn)
 
10. Software testing overview
10. Software testing overview10. Software testing overview
10. Software testing overview
 
SAD Reviewer
SAD ReviewerSAD Reviewer
SAD Reviewer
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Ch2-Software Engineering 9
Ch2-Software Engineering 9Ch2-Software Engineering 9
Ch2-Software Engineering 9
 
System Analysis and design Class 1
System Analysis and design Class 1System Analysis and design Class 1
System Analysis and design Class 1
 
Luis Perez ITS written report
Luis Perez ITS written reportLuis Perez ITS written report
Luis Perez ITS written report
 
Ch6-Software Engineering 9
Ch6-Software Engineering 9Ch6-Software Engineering 9
Ch6-Software Engineering 9
 
Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...Metric for Evaluating Availability of an Information System : A Quantitative ...
Metric for Evaluating Availability of an Information System : A Quantitative ...
 
CSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating SystemCSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating System
 
Design and implementation of a computerized goods transportation system
Design and implementation of a computerized goods transportation systemDesign and implementation of a computerized goods transportation system
Design and implementation of a computerized goods transportation system
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software Engineering
 

Similar to Public voice

44478167 hospital-management-system
44478167 hospital-management-system44478167 hospital-management-system
44478167 hospital-management-systemAkshay Iliger
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking SystemBharat Kalia
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentationanuj_rakheja
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology RaviKalola786
 
Library Management System using oracle database
Library Management System using oracle databaseLibrary Management System using oracle database
Library Management System using oracle databaseSaikot Roy
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing systemAkshita Pillai
 
departmental store
departmental storedepartmental store
departmental storeFreelancer
 
Library mangement system project srs documentation
Library mangement system project srs documentationLibrary mangement system project srs documentation
Library mangement system project srs documentationSuchit Moon
 
Issue Management System
Issue Management SystemIssue Management System
Issue Management SystemPratik Vipul
 
CHAPTER FOUR buugii 2023.docx
CHAPTER FOUR buugii 2023.docxCHAPTER FOUR buugii 2023.docx
CHAPTER FOUR buugii 2023.docxRUKIAHASSAN4
 
Library mangement system project srs documentation.doc
Library mangement system project srs documentation.docLibrary mangement system project srs documentation.doc
Library mangement system project srs documentation.docjimmykhan
 
BUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptxBUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptxZEESHANMEHMOOD43
 
12th CBSE Computer Science Project
12th CBSE Computer Science Project12th CBSE Computer Science Project
12th CBSE Computer Science ProjectAshwin Francis
 

Similar to Public voice (20)

44478167 hospital-management-system
44478167 hospital-management-system44478167 hospital-management-system
44478167 hospital-management-system
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking System
 
PRESS MANAGEMENT Documentation
PRESS MANAGEMENT DocumentationPRESS MANAGEMENT Documentation
PRESS MANAGEMENT Documentation
 
Ems
EmsEms
Ems
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology
 
Library Management System using oracle database
Library Management System using oracle databaseLibrary Management System using oracle database
Library Management System using oracle database
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
departmental store
departmental storedepartmental store
departmental store
 
Brilient login system
Brilient login systemBrilient login system
Brilient login system
 
Fulltext01
Fulltext01Fulltext01
Fulltext01
 
Sdlc1
Sdlc1Sdlc1
Sdlc1
 
Library mangement system project srs documentation
Library mangement system project srs documentationLibrary mangement system project srs documentation
Library mangement system project srs documentation
 
Issue Management System
Issue Management SystemIssue Management System
Issue Management System
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
CHAPTER FOUR buugii 2023.docx
CHAPTER FOUR buugii 2023.docxCHAPTER FOUR buugii 2023.docx
CHAPTER FOUR buugii 2023.docx
 
Job portal
Job portalJob portal
Job portal
 
Library mangement system project srs documentation.doc
Library mangement system project srs documentation.docLibrary mangement system project srs documentation.doc
Library mangement system project srs documentation.doc
 
Documentation
DocumentationDocumentation
Documentation
 
BUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptxBUILDING INFORMATION SYSYTEMS.pptx
BUILDING INFORMATION SYSYTEMS.pptx
 
12th CBSE Computer Science Project
12th CBSE Computer Science Project12th CBSE Computer Science Project
12th CBSE Computer Science Project
 

More from Emmanuel college

More from Emmanuel college (6)

Divide and conquer
Divide and conquerDivide and conquer
Divide and conquer
 
Inventory Management System
Inventory Management SystemInventory Management System
Inventory Management System
 
Pillcam
PillcamPillcam
Pillcam
 
High performance computing with accelarators
High performance computing with accelaratorsHigh performance computing with accelarators
High performance computing with accelarators
 
Mycasestudy
MycasestudyMycasestudy
Mycasestudy
 
Pill camera ppt
Pill camera pptPill camera ppt
Pill camera ppt
 

Recently uploaded

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 

Recently uploaded (20)

Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 

Public voice

  • 1. CONTENTS 1. INTROUCTION 2. SYSTEM ANALYSIS 2.1 EXISITING SYSTEM 2.2 PROPOSED SYSTEM 2.3 FEASIBILITY STUDY 2.4 SYSTEM REQUIREMENTS 2.5 DATAFLOW DIAGRAM 2.5.1 CONTEX DIAGRAM 2.5.2 TOP LEVEL DFD 2.6 ER DIAGRAM 3. SYSTEM DESIGN 3.1 DATA BASE DESIGN 3.1.1 TABLE LIST 3.1.2 TABLE DESIGN 3.2 INPUT DESIGN 3.3 OUTPUT DESIGN 3.4 MODULE DESCRIPTION 4. SYSTEM CODING 4.1 PROGRAM LIST 4.2 SOURCE CODE 5. SCREEN SHOTS 6. SOFTWARE TESTING 7. IMPLEMENTATION AND MAINTENANCE 8. FURTHER ENHANCEMENT 9. BIBLIOGRAPHY 1
  • 2. 1.INTRODUCTION Public voice concerns all activities with regard to producing a schedule that must be subjective to different constraints. Public voice can be defined as the optimization of given activities, actions or events to a set of objects in space-time matrix to satisfy a set of desirable constraints. Public voice is a temporal arrangement of a set of proposals in which related to current constraints with a mission to improve public services and neighborhoods through user engagement. By automating this process through community engagement, individual user engagement and community intervention, collecting the combined voice of citizens, gathering decisions and comments ultimately bring about a positive change, now and in future. Hence we have developed practical approach for building Public voice system, which can be customized to empowered to influence decisions. This project introduces a practical Public voice system capable of taking care of both strong and weak constraints effectively, used in an automated public voice system. So that each user can view proposals and its likes and dislikes. This software is developed in PHP as front end and MySQL as back end. Advantages of this System: • This software will reduce manual work and maintain updates in database from time to time. • It is easy to handle works related to Public voice system. 2
  • 3. 2.SYSTEM ANALYSIS The major activities in the system study are studying the ways an organization currently retrieving and processing data to produce information. It involves the study of various operation performed by the system and their relationship with in and outside the system. The system study is usually done on the basic approach of understanding the problem or user requirements. To understand the user requirements the analyst communicates with the user or customer and studies the basic requirements of the customer. The study of the present system was necessary to carry out the preliminary investigation. 2.1 EXISTING SYSTEM Public voice system concerns all activities with regard to producing a schedule that must be subjective to different constraints. Public voice system can be defined as the optimization of given activities, actions or events to a set of objects in space-time matrix to satisfy a set of desirable constraints. A key factor in running for piblic is need for a well-planned, well-throughout and clash-free. Back in the days when technology was not in wide use, user’s has their own decisions in each and every subjects that occurring day to day in our society but they couldn’t open their mind because of fear. It requires many books keeping effort. The possibility of the occurrence of problems is very high. 2.2.PROPOSED SYSTEM The Public voice system is an online process in which the users and administrator have separate login.Mainly two modules in the system such as admin,user. Public voice is a temporal arrangement of a set of proposals in which related to current constraints with a mission to improve public services and neighborhoods through user engagement. 3
  • 4. By automating this process provide more confidence to society to open their mind and protest against with their words through community engagement, individual user engagement and community intervention, collecting the combined voice of citizens, gathering decisions and comments ultimately bring about a positive change, now and in future. The proposed computerization is developed using PHP as front end and MySQL as back end. The main purpose of the proposed system is to overcome the drawbacks of the existing system. Speed and accuracy are the main benefits of the proposed system over the existing system. There are data entries screens, which are user friendly. Errors in data entry are minimized through validity checks and messages are displayed whenever necessary. The proposed system will have a high security system to protect all the confidential information stored in the database. Advantages • Easier entry of data through forms • Easier modification of data entered • User friendly interface • Quick set rival of information • provides greater efficiency. • Provide data security. 4
  • 5. 2.3 FEASIBILITY STUDY The main objective of feasibility study is to test the technical,social and economical feasibility of developing a system.This is done before developing a system . It is derived as follows: Technical Feasibility Here the system is checked whether it is technically feasible or not. The System “Public voice System ” is technically feasible because it consume less CPU utilization and also it work with advanced operating systems such as windows7,windows8 etc. So it is technically feasible. Economical Feasibility The economic feasibility is the analysis of the system whether it satisfies the criteria for it economic angle. The System “Public voice System” is less economic than previous system. The development cost is less. So it is economically feasible. An economic feasibility test focuses on returns and costs of a proposed plan in both the short and long-term. The cost for development of the system has been evaluated and it is found that project is economically feasible. Operational Fesibility An estimate should be made to determine how much effort and care will go into the developing of the system including the training to be given to the user. Usually, people are reluctant to changes that come in their progression. The System Fault “Public voice System” is user friendly and the user have the ability to operate this system have less knowledge about it. So the system is technically, economically and operationally feasible is developed to be user friendly. It needs less training and improve working environment. 5
  • 6. 2.4 SYSTEM REQUIREMENTS Hardware Specification CPU : Pentium IV or above RAM : 1 GB or above Hard disk : 250 GB Keyboard : Any Mouse : Any optical mouse Printer : Any Software Requirements Operating system : Windows 7 Front end : PHP Back end : MySQL IDE : NetBeansIDE7.4 6
  • 7. ABOUT FRONT END The technology selected for e-gramasabha is PHP/MYSQL. Apache is used as the HTTP server. The development was done in a „windows environment using‟ adobe dream weaver CS5. PHP PHP is a general-purpose scripting language that is especially suited to server- side web development where PHP generally runs on a web server.PHP code is embedded into the HTML source document. Any PHP code in a requested file is executed by the PHP runtime, usually to create dynamic web page content. It can also be used for command- line scripting and client-side GUI applications. PHP can be deployed on many web servers and operating systems, and can be used with many relational database management systems (RDBMS). It is available free of charge, and the PHP Group provides the complete source code for users to build, customize and extend for their own use. MySQL MySQL is a relational database management system (RDBMS)[1] that runs as a server providing multi-user access to a number of databases. MySQL is a popular choice of database for use in web applications and is an open source product. The process of setting up a MySQL database varies from host to host, however we will end up with a database name, a user name and a password. Before using our database, we must create a table. A table is a section of the database for storing related information. In a table we will set up the different fields which will be used in that table. Creating a table in phpMyAdmin is simple; we just type the name, select the number of fields and click the „go button. we will then be taken to a setup screen‟ where you must create the fields for the database. Another way of creating databases and tables in phpMyAdmin is by executing simple SQL statements. We have used this method in order to create our database and tables. 7
  • 8. 2.5 DATA FLOW DIAGRAM Data Flow Diagram (DFD) is an important tool used by system analyst. DFD provide an overview of what data a system would process, What transformation of data are done, what files are used and where the results flow. The graphical representation of the system makes it a good communication tool between the user and the analyst. Analysis model help us to understand the relationship between different components in the design. Analysis model shows the user clearly how a system will function. This is the first technical representation of the system. The analysis modeling must achieve three primary objectives. • To establish a basis for creation of software design. • To describe what the user requires. • To define set of requirements that can be validated once the software us build. A data flow diagram is a graphical technique tat depicts information flow and transforms that are applied as data move from input to output. The DFD is used to represent increasing information flow and functional details. A level 0 DFD also called fundamental system model represents the entire software elements as single bubble with input and output indicated by incoming and outgoing arrow respectively. Data Flow Notations 8 Function File/Database Input/Output Flow
  • 9. Level 0 Context level 9 Admin Public voice System User Request Request Request Response Response Public Response
  • 10. Admin Level 1 DFD 10 admin pid View user View proposal status Add proposals uid login login Login Login_id User_details like proposal Change password View user feedback lid pid feedback fid Login_id
  • 11. User level 1 DFD cid 11 User Edit profile Change password View proposal uid login Login Login_id User_details login proposal Login_id Add likes & dislikes like lid Add comments comment
  • 12. 2.6 ER DIAGRAM 12 feedback cid title add like lid pid proposal comment pid cid pid set addUser_details login uid id Login_i d
  • 13. 3 SYSTEM DESIGN The most creative and challenging phase of the system development is system design it is a solution, a “how to approach” to the creation of the proposed system. It refers to the technical specifications that will be applied. IT provides the understanding and procedural details necessary for implementing the system recommended in the feasibility study. Design goes through the logical and physical stages of development. At an early stage in designing in new system, the system analyst must have a clear understanding of the objectives, which the design is aiming to fulfill. The first step is to determine how the output is to be produced and in what format. Second input data and master files (database) have to be designed to meet the requirements of the proposed output. The operational (processing) phases are handled through program construction and testing. Finally details related to justification of the system and an estimate of the impact of the candidate system on the user and the organization are documented and evaluated by management. The final report prior to the implementation phase includes procedural flow charts, records and report layout and a workable plan for implementation the candidate system. 13
  • 14. 3.1 DATA BASE DESIGN The most important aspects of building an application is the design of tables or database schema. The data stored in the table must be organized in some manner, which is meaningful. The overall objectives in the process of the table design have been to treat data as organizational resources and as integrated whole. The organization of the data in a database aims to achieve Five major objectives are given below,  Data integrity  Data independency  Controlled Redundancy  Privacy and security  Performance Several degrees of normalization have to be applied during the process of table design. The major aim of the process of the normalization is to reduce data redundancy and prevent losing data integrity. Redundancy refers to unwanted and un necessary repetition of data. Data integrity has to be converted at all levels. Poor normalization can cause problem related to storage and retrieval of data. During the process of normalization which identified cause serious problems, during deletion and updation. Normalization also helps in simplifying the structure of the table. The theme behind a database is to handle information as an integrated whole that make access to information easy, quick inexpensive and flexible for users. The entire package depends on how the data are maintained in the system. Each table has been designed with a perfect vision. 14
  • 15. NORMALIZATION The process of refining the data model and creating with a database is called normalization. Database designers can implement several levels of normalization. Each level builds on previous levels by reducing the amount of redundancy between tables. This typically increases performance and avoids problems with data consistency.  First normal form First normal form is the most basic level of database normalization. The keys to creating tables in the 1NF: • Eliminate repeating groups in individual tables. • Create a separate table for each set of related data. • Identify each set of related data with a primary key.  Second normal form The first normal form is not a good database design, but it is a start.the keys to creating tables in the 2NF: • Create separate tables for sets of values that apply to multiple records. • Relate these tables with a foreign key. 15
  • 16. 3.1.1 Table list SL NO TABLE NAME DESCRIPTION 1 Login To store login details. 2 proposal To store proposal details. 3 User_details To store user details. 4 like To store user likes & dislikes. 5 feedback To store feedback details. 6 comment To store comment details. 16
  • 17. 3.1.2Table Design Table name:login Primary key-login_id Field name Data Type constraints Description login_id int(11) Primary key Login id username varchar(100) Not null username password varchar(100) Not null password role varchar(100) Not null Role of the person Table name:comment Primary key-course_id Field Name Data Type constraints Description cid int(20) Primary key comment id pid int(20) Foreign Key Proposal id user varchar(20) Not null User details comments varchar(20) Not null User comments 17
  • 18. Table name:feedback Primary key-fid Field Name Data Type Constraints Description fid int(20) Primary key Feedback id title varchar(20) Not null Title of feedback emai varchar(20) Not null User email id feedback varchar(20) Not null feedback Table name:like Primary key-lid Field Name Data Type Constraints Description lid int(11) Primary key Like id pid int(11) Foreign Key Proposal id type int(11) Not null type user varchar(100) Not null User details 18
  • 19. Table name:proposal Primary key-pid Field Name Data Type Constraints Description pid int(11) Primary key Proposal id tilte varchar(100) Foreign Key title des varchar(1000) Not null description date date Not null Proposal date image varchar(100) Not null Proposal image Table name:user_details Primary key-uid Field Name Data Type Constraints Description uid int(20) Primary key User id id int(20) Foreign Key Login id name varchar(20) Not null User name address varchar(20) Not null User address gender varchar(20) Not null User gender dob date Not null Date of birth phone bigint(20) Not null Contact no 19
  • 20. 3.2 INPUT DESIGN The input design is the link between the information system and the user. It comprises the developing specification and procedures for data preparation and those steps are necessary to put transaction data in to a usable form for processing can be achieved by inspection the computer to read data from a written or printed documents or it can occur by having people keying the data directly into the system. The design of input focuses on controlling the input required, controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The input is designed in such a way so that it provides security and ease of use with retaining the privacy. Input design considered the following things:  What data should be given as input?  How the data should be arranged or coded?  The dialog to guide the operating personnel in providing input.  Method for preparing input validations and steps to follow when error occur. 20
  • 21. 3.3 OUTPUT DESIGN A quality output is one, which meets the requirements of the end user and presents the information clearly. In any system results of processing are communicated to the users and to other system through outputs. In outputs design it is determined how the information is to be displaced for immediate need and also the hard copy output. It is the most important and direct source information to the user. Efficient and intelligent output design improves the system’s relationship to help user decision-making. Designing computer output should proceed in an organized, well thought out manner; the right output must be developed while ensuring that each output element is designed so that people will find the system can easily and effectively. When analysis design computer output, they should  Identify the specified output that is needed to meet the requirements.  Select methods for presenting information.  Create documents, report, or other formats that contain information produced by the system.  The output form of an information system should accomplish one or more of the following objectives.  Convey information about past activities, current status or projections of the future.  Signal important events, opportunities, problems, or warnings.  Trigger an action.  Confirm an action. 21
  • 22. 3.4 MODULE DESCRIPTION Adminstrator Module The main aim of the proposed system is manage public voice system .The admin module contain different level of access they are view user, add proposals, change password, view proposal status, view user feedback. . User Module User can be access their functions like edit profile, view proposals, add likes & dislikes, add coments, change password etc Public Module Public can be view the public voice system and add their feedbacks to admin. 22
  • 23. 4.SYSTEM CODING 4.1 Program List Serial No: Program name Purpose 1 Connect For database connection 2 Loginform For login to homepage 3 Add proposals For add new proposals 4 Changepassword For change the current password 5 User reg For add a user 6 Log out For Log out 23
  • 24. 5.2 Source code Connection code <?php $con=mysql_connect("localhost","root","",); if(!$con){ echo "Error in connection".mysqli_error(); } else{ $db=mysql_select_db('PUBLICVOICE'); if(!$db){ echo "Error in selecting db".mysqli_error(); } } ?> Login <?php ob_start(); session_start(); require_once('db.php'); if(isset($_POST['signin'])){ $user=$_POST['username']; $pass=$_POST['password']; $query="select * from LOGIN where username='$user' and password='$pass'"; $sel=mysql_query($query); if(!$sel){ echo "error in query".mysql_error(); } else{ $count=mysql_num_rows($sel); if($count == 1){ $log=mysql_fetch_array($sel); $_SESSION['id']=$log['login_id']; $_SESSION['username']=$log['username']; $_SESSION['role']=$log['role']; $_SESSION['login_status']=true; if($_SESSION['role'] == 'user'){ header('location:user_homepage.php?msg=Successfully logged in'); } else{ 24
  • 25. header('location:admin_homepage.php?msg=authentication failed..'); } } else{ header('location:index.php?msg=Incorrect username/password combination'); } } } ?> Add proposal <?php require('db.php'); if(isset($_POST['sub'])) { $t1=$_POST['t1']; $t2=$_POST['t2']; $x=$_FILES['t']['name'] ; $y=$_FILES['t']['tmp_name']; $pt="photo/".$x; copy($y, $pt); mysql_query("insert into proposal value(0,'$t1','$t2',now(),'$pt')"); echo "saved"; } ?> Change password <?php if(isset($_POST['sub'])){ $pass=$_POST['password']; $newpass=$_POST['newpass']; $configpass=$_POST['configpass']; $login_id=$_SESSION['id']; $query="select password from LOGIN where login_id='$login_id'"; $q=mysql_query($query); $res=mysql_fetch_array($q); if($pass == $res['password']){ $quer="update LOGIN set password='$newpass' where login_id='$login_id'"; $ins=mysql_query($quer); if(!$ins){ echo "query error".mysql_error(); } 25
  • 26. else{ header('location:user_homepage.php?msg=password successfully edited'); } } else{ $error="*Current password is wrong!!"; } } ?> User registration <?php if(isset($_REQUEST['sub'])){ $name=$_REQUEST['name']; $address=$_REQUEST['address']; $gender=$_REQUEST['gender']; $dob=$_REQUEST['dob']; $mail=$_REQUEST['mail']; $phone=$_REQUEST['phone']; $password=$_REQUEST['password']; $login=mysql_query("insert into Login (login_id,username,password,role) values('','$mail','$password','user') "); if(!$login){ echo "error in query".mysql_error(); } $last_id=mysql_insert_id(); $insert="insert into user_details values('','$last_id','$name','$address','$gender','$dob','$phone')"; $ins=mysql_query($insert); if(!$ins){ echo "error in insert query".mysql_query(); } 26
  • 33. 6 SOFTWARE TESTING The common view of testing held by users is that it is performed to prove that there are no errors in a program. However, as indicated earlier, this is virtually impossible, since analyst cannot prove that software is free and clear of errors. The tester, who may be the program fail. A successful test, then, is one that finds an error. Analysts know that an effective testing program does not guarantee system reliability. Therefore, reliability must be Fdatabase designed into the system. Unit Testing In unit testing, we have to test the programs making up the system. The software units in a system are the modules and routines that are assembled and integrated to perform a specific function. Unit testing focuses on the module independent of one another, in order locate errors. This enables, to detect errors in coding and logic that are contained within that module alone. Integration Testing Integration testing is a systematic testing for conducting tests to uncover errors associated within the interface. The objective is to take unit tested modules and build a program structure. Here, correction is difficult because the vast expenses of the entire program complicate the isolation of causes. System Testing In this phase, the entire software system was tested. After integration testing, the entire software system was tested against various clients. The software has been tested for its functionality as well as limitation. The various interfaces developed were thoroughly debugged and were found to be working correctly. 33
  • 34. Time Table management system LOGIN FORM: SL.No Test Case Excepted Result Test Result 1 Enter valid username and password & click on login button Software should display main window Successful 2 Enter invalid Software should not display main window successful 34
  • 35. 7. IMPLEMENTATION AND MAINTENANCE Implementation is the stage of the project when the theoretical design is turned into a working system. If the implementation stages is not carefully planned and controlled, it can cause problems. Thus it can be considered to be SL. No Test Case Excepted Result Test Result 1 Admin add user details Then go to user table Successful 2 All the fields are not fill Then print error message Successful 3 Add proposals Then go to proposal table. Successful 4 All the fields are not fill Then print error message Successful 35
  • 36. the most crucial stage in achieving a successful new system and in giving the users the confidence that the new system will work and effective. The implementation stage is a system in its own right. It involves careful planning, investigation of the current system and its constraints in implementation, design of methods to achieve the change over procedures, training of staff in the change over methods. TASK OF IMPLEMENTATION The first task is implementation planning. Once the planning has been completed, the computer department is to ensure that the programs in the system are working properly. At the same time, the user department must concentrate on training user staffs planning, training and testing are the preparatory activities of implementation. The implementation phase ends with an evaluation of the system after placing it into operation for a period of time. Implementation is the third phase of the system process. In order to achieve the objectives and the expected performance the system has been developed in a highly interactive and user-friendly manner. The tem maintenance is used to describe the software engineering activities that occur following the delivery of a software product to the customer. The maintenance phase of the software lifecycle is the time period in which software performs useful work. We may define maintenance by describing four activities that are undertaken after a program is released for use. During the use of any large program, errors will occur and be reported to the developer. The process that includes the diagnosis and correction of one or more error is called corrective maintenance. Thus problem correction involves modification and revalidation of software to corrective maintenance. The second activity that contributes to a definition of maintenance occurs because of the rapid change that is encountered in every aspect of computing. An activity that modifies software to properly interface with a changing environment is adaptive maintenance. The third activity occurs when a software 36
  • 37. package is successful. As software is used recommendations for new capabilities, modifications to existing function and general enhancements are received from users. To satisfy request in this category, perfective maintenance is performed. The fourth and last maintenance activity occurs when software is changed to improve future maintainability or reliability or to provide activities including correcting, coding and design, updating, documentation and test data and upgrading user support. Maintenance means restoring something to its original conditions. In contrast, enhancements mean adding or modifying or re execution. 8.FURTHER ENHANCEMENT 37
  • 38. Enhancement means adding, modifying, or developing the code to support the changes in the specification. It is the process of adding new capabilities such as reports, new interfaces with other systems and new feature such as better screen or report layout The proposed system is developed and tested with some amount of sample data, which satisfy all the requirements. It has high degree of accuracy, user friendliness efficiency. The system is flexible and changes, if any can be made with out much difficulty. Further improvements and extensions can be made in the system to make overall work easier. Further modifications and extensions in the system can made to make overall work easier like the library make online. Those options are not in the software can be included to improve the efficiency of the software. 9.BIBLIOGRAPHY 38
  • 39. o PHP book by Vasvani (TMH publications). o Beginning PHP5 by WROX. o www.google.com. o www.wikipedia.com o www.w3schools.com o Informatics practices by Sumita Arora. o Head First PHP & MySQL by Lynn Beighley and Michael Morrison(O Reilly)‟ 39