SlideShare a Scribd company logo
Employee travel authorization form
       The goal of this project is to create an employee travel authorization form for our

computer science department web site in order to properly account for official travel of the

employees. The main aim of this project is to automate the submission of travel authorization

process and avoid the existing method of e-mail submission. This will probably save employees

time and e-mail space.

       The project aims at creating a database for the travel forms and connecting it to the

employee travel authorization form. We are going to connect the database design to the

employee travel authorization form through java object/relational mapping; transaction

management and connection management of the database through hibernate. The measurable

outcome of this project is the creation of database and making sure that the data that the user

enters in the form is properly updated in the database. The user authentication is pretty

important module as we are going to use the university database of users to access the

database that we are creating. The access level of the database and the user access restriction

should be properly maintained.

       In order to properly account for official travel, employees should make sure that the

online Travel Authorization Form is completed and approved before travel is taken, even if no

WKU reimbursement is involved. This approval must be obtained through the Dean of the

College and, if travel outside the Continental U.S. (OCONUS), by the Office of the Provost and so

we must make sure that they have their restriction in accessing their respective forms.
The technologies that we use are JavaScript for the purpose of designing the Travel

Authorization Form, MySQL for database design and java for object mapping through hibernate.

The university user authentication will be provided by LDAP which contains more descriptive,

attribute based data.

       The major milestones of the project are the Travel Authorization Form design and the

creation of the database. Once these two processes are completed, the next milestone would

be integrating the database to the forms; by using java object/relational mapping through

hibernate which also facilitates storage and retrieval of java domain objects.

Why we are using hibernate?

       We are using hibernate to provide the database and configuration data to persistence

 services (and persistent objects) to the application. To use Hibernate, it is required to create

 Java classes that represents the table in the database and then map the instance variable in

 the class with the columns in the database. Then Hibernate can be used to perform

 operations on the database like select, insert, update and delete the records in the table.

 Hibernate automatically creates the query to perform these operations.

More Related Content

What's hot

Build application with adf framework
Build application with adf frameworkBuild application with adf framework
Build application with adf framework
bispsolutions
 
Prabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-ExpPrabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-Exp
Prabhu S
 
Software Engineer_Ravi
Software Engineer_RaviSoftware Engineer_Ravi
Software Engineer_Raviravi vemula
 
Ambuj Tailang CV
Ambuj Tailang CVAmbuj Tailang CV
Ambuj Tailang CV
Ambuj Tailang
 

What's hot (6)

Php portfolio
Php portfolioPhp portfolio
Php portfolio
 
srinu_java
srinu_javasrinu_java
srinu_java
 
Build application with adf framework
Build application with adf frameworkBuild application with adf framework
Build application with adf framework
 
Prabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-ExpPrabhu-Software-Engineer-3+-Year-Exp
Prabhu-Software-Engineer-3+-Year-Exp
 
Software Engineer_Ravi
Software Engineer_RaviSoftware Engineer_Ravi
Software Engineer_Ravi
 
Ambuj Tailang CV
Ambuj Tailang CVAmbuj Tailang CV
Ambuj Tailang CV
 

Similar to Project description

Resume 05212017
Resume 05212017Resume 05212017
Resume 05212017
Suraj Mishra
 
VedicSystems_SowmyaAlampally - J2EE (2 Years)
VedicSystems_SowmyaAlampally - J2EE (2 Years)VedicSystems_SowmyaAlampally - J2EE (2 Years)
VedicSystems_SowmyaAlampally - J2EE (2 Years)sowmya alampally
 
Krishna_chaitanya Java Developer
Krishna_chaitanya Java DeveloperKrishna_chaitanya Java Developer
Krishna_chaitanya Java DeveloperKRISHNA CHAITANYA S
 
Projects Handled_TCS
Projects Handled_TCSProjects Handled_TCS
Projects Handled_TCSSambit Behera
 
Java Developer 2.2 years experiernce
Java Developer 2.2 years experiernceJava Developer 2.2 years experiernce
Java Developer 2.2 years experiernceMukund Jadhav
 
Java Developer 2.2 years experiernce
Java Developer 2.2 years experiernceJava Developer 2.2 years experiernce
Java Developer 2.2 years experiernceMukund Jadhav
 
Prasant_nayak_NthDimenzion _4Yr_Exp
Prasant_nayak_NthDimenzion _4Yr_ExpPrasant_nayak_NthDimenzion _4Yr_Exp
Prasant_nayak_NthDimenzion _4Yr_ExpPrasant Kumar Nayak
 
New resume
New resumeNew resume
New resume
Rahul Kumar
 
Suresh Resume
Suresh ResumeSuresh Resume
Suresh Resume
Suresh K N V
 
Vijay kumar hadoop cv
Vijay kumar hadoop cvVijay kumar hadoop cv
Vijay kumar hadoop cv
Vijay Kumar
 

Similar to Project description (20)

Resume 05212017
Resume 05212017Resume 05212017
Resume 05212017
 
Jagadish Java Profile
Jagadish  Java ProfileJagadish  Java Profile
Jagadish Java Profile
 
Rahul Bhardwaj Resume
Rahul Bhardwaj ResumeRahul Bhardwaj Resume
Rahul Bhardwaj Resume
 
Murugan
MuruganMurugan
Murugan
 
Venkataraman Raghunathan
Venkataraman RaghunathanVenkataraman Raghunathan
Venkataraman Raghunathan
 
VedicSystems_SowmyaAlampally - J2EE (2 Years)
VedicSystems_SowmyaAlampally - J2EE (2 Years)VedicSystems_SowmyaAlampally - J2EE (2 Years)
VedicSystems_SowmyaAlampally - J2EE (2 Years)
 
kamal.docx
kamal.docxkamal.docx
kamal.docx
 
Krishna_chaitanya Java Developer
Krishna_chaitanya Java DeveloperKrishna_chaitanya Java Developer
Krishna_chaitanya Java Developer
 
VenkateshVG
VenkateshVGVenkateshVG
VenkateshVG
 
Projects Handled_TCS
Projects Handled_TCSProjects Handled_TCS
Projects Handled_TCS
 
Java Developer 2.2 years experiernce
Java Developer 2.2 years experiernceJava Developer 2.2 years experiernce
Java Developer 2.2 years experiernce
 
Java Developer 2.2 years experiernce
Java Developer 2.2 years experiernceJava Developer 2.2 years experiernce
Java Developer 2.2 years experiernce
 
Dinesh CV
Dinesh CVDinesh CV
Dinesh CV
 
Sathiyasainathan Fulltime JD
Sathiyasainathan Fulltime JDSathiyasainathan Fulltime JD
Sathiyasainathan Fulltime JD
 
Pallavi_Jindal_resume
Pallavi_Jindal_resumePallavi_Jindal_resume
Pallavi_Jindal_resume
 
Prasant_nayak_NthDimenzion _4Yr_Exp
Prasant_nayak_NthDimenzion _4Yr_ExpPrasant_nayak_NthDimenzion _4Yr_Exp
Prasant_nayak_NthDimenzion _4Yr_Exp
 
New resume
New resumeNew resume
New resume
 
Suresh Resume
Suresh ResumeSuresh Resume
Suresh Resume
 
B.Karthik
B.KarthikB.Karthik
B.Karthik
 
Vijay kumar hadoop cv
Vijay kumar hadoop cvVijay kumar hadoop cv
Vijay kumar hadoop cv
 

More from Vijayeandra Parthepan

Olat design
Olat designOlat design
Presentation
PresentationPresentation
Presentation
Vijayeandra Parthepan
 
Sr sof orp
Sr sof orpSr sof orp
Desing document orp2
Desing document orp2Desing document orp2
Desing document orp2
Vijayeandra Parthepan
 
Olat report
Olat reportOlat report
Dm project report
Dm project reportDm project report
Dm project report
Vijayeandra Parthepan
 
Jasa
JasaJasa
Dbms project.ppt
Dbms project.pptDbms project.ppt
Dbms project.ppt
Vijayeandra Parthepan
 
Design document travel_forms
Design document travel_formsDesign document travel_forms
Design document travel_forms
Vijayeandra Parthepan
 

More from Vijayeandra Parthepan (12)

Olat design
Olat designOlat design
Olat design
 
Faculty travel forms
Faculty travel formsFaculty travel forms
Faculty travel forms
 
Presentation
PresentationPresentation
Presentation
 
Orp project
Orp projectOrp project
Orp project
 
Sr sof orp
Sr sof orpSr sof orp
Sr sof orp
 
Desing document orp2
Desing document orp2Desing document orp2
Desing document orp2
 
Olat report
Olat reportOlat report
Olat report
 
Dm project report
Dm project reportDm project report
Dm project report
 
Jasa
JasaJasa
Jasa
 
Report
ReportReport
Report
 
Dbms project.ppt
Dbms project.pptDbms project.ppt
Dbms project.ppt
 
Design document travel_forms
Design document travel_formsDesign document travel_forms
Design document travel_forms
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Project description

  • 1. Employee travel authorization form The goal of this project is to create an employee travel authorization form for our computer science department web site in order to properly account for official travel of the employees. The main aim of this project is to automate the submission of travel authorization process and avoid the existing method of e-mail submission. This will probably save employees time and e-mail space. The project aims at creating a database for the travel forms and connecting it to the employee travel authorization form. We are going to connect the database design to the employee travel authorization form through java object/relational mapping; transaction management and connection management of the database through hibernate. The measurable outcome of this project is the creation of database and making sure that the data that the user enters in the form is properly updated in the database. The user authentication is pretty important module as we are going to use the university database of users to access the database that we are creating. The access level of the database and the user access restriction should be properly maintained. In order to properly account for official travel, employees should make sure that the online Travel Authorization Form is completed and approved before travel is taken, even if no WKU reimbursement is involved. This approval must be obtained through the Dean of the College and, if travel outside the Continental U.S. (OCONUS), by the Office of the Provost and so we must make sure that they have their restriction in accessing their respective forms.
  • 2. The technologies that we use are JavaScript for the purpose of designing the Travel Authorization Form, MySQL for database design and java for object mapping through hibernate. The university user authentication will be provided by LDAP which contains more descriptive, attribute based data. The major milestones of the project are the Travel Authorization Form design and the creation of the database. Once these two processes are completed, the next milestone would be integrating the database to the forms; by using java object/relational mapping through hibernate which also facilitates storage and retrieval of java domain objects. Why we are using hibernate? We are using hibernate to provide the database and configuration data to persistence services (and persistent objects) to the application. To use Hibernate, it is required to create Java classes that represents the table in the database and then map the instance variable in the class with the columns in the database. Then Hibernate can be used to perform operations on the database like select, insert, update and delete the records in the table. Hibernate automatically creates the query to perform these operations.