Uploaded by Hadil Ummer

PROJECT REPORT-Aswathi.k.s

advertisement
PROJECT REPORT
ON
HOSTEL MANAGEMENT SYSTEM
Submitted in partial fulfilment of the requirement for the award of degree in
MASTER OF COMPUTER APPLICATIONS
OF THE
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
Submitted by
ASWATHI K S
(LNCE18MCA017)
Under the guidance of
PRAMOD K
Senior Assistant Professor, MCA
DEPARTMENT OF MCA
NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE,
PAMPADI, THIRUVILWAMALA, THRISSUR-680 567
JUNE 2021
HOSTEL MANAGEMENT SYSTEM
PROJECT REPORT
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
CENTER: NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTER,
PAMBADI
MCA
2019-2021
NAME
: ASWATHI K S
REG NO
: LNCE18MCA017
SEMESTER
: SIX
NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE,
PAMPADI
CERTIFICATE
This is to certify that, the project work entitled “HOSTEL MANAGEMENT SYSTEM”
submitted in the partial fulfilment of the requirement for the award of degree of MASTER
OF COMPUTER APPLICATION in APJ ABDUL KALAM KERALA
TECHNOLOGICAL UNIVERSITY is a result of bonafide work carried out by
ASWATHI.K.S during the academic year (2019-2021) in the department of MCA under the
guidance of PRAMOD.K Senior Assistant Professor, Department of MCA, NEHRU
COLLEGE OF ENGINEERING AND RESEARCH CENTRE Pambadi under my
supervision and guidance.
Project Guide
Principal
Head of the Department
External Examiner
DECLARATION
I hereby declare that the project entitled “HOATEL MANAGEMENT SYSTEM”
submitted to APJ ABDUL KALAM KERALA TECHNOLOGICAL UNIVERSITY in
partial fulfilment of the requirement for the award degree in MASTER OF
COMPUTER APPLICATIONS is a record of the original work done by ASWATHI.K.S
under the guidance of PRAMOD K, Senior Assistant Professor, Department of MCA during
the period of study in NEHRU COLLEGE OF ENGINEERING AND RESEARCH
CENTER, PAMBADI.
PLACE: PAMBADY
DATE:
ASWATHI.K.S
“With sincere respect and love, we dedicated this project to our parents, teachers,
friends and our well- wishers for all the support and guidance showed to us in the
way of our project”.
ACKNOWLEDGEMENT
First and foremost, I thank the God Almighty for showering his blessings upon us
and for giving the auspicious and grace to make the right decision with dignity. I hereby
acknowledge the fact that the project entitled “HOSTEL MANAGEMENT SYSTEM”
would not have materialized without the guidance help we received from concerned
authorities. I express my sincere gratitude to all those who have spared contribution in this
effort. I owe my sincere thanks to the Management, and Prof, Dr. AMBIKADEVI
AMMA.T, Principal, NCERC for the immense support given during our course and
project.
I would like to express my gratitude to Dr. SUDHEER S.MARAR, HOD,
Department of MCA and my project guide PRAMOD.K, Senior Assistant Professor,
Department of MCA, whose support, stimulating suggestions and encouragement helped
us in all the time of doing project. Moreover, my sincere thanks go to my friends, teachers
and other staffs of Nehru College of Engineering and research centre who has given the
moral and technical support in all possible ways to complete this project. I especially
indebted to my parents for their love and support throughout my life.
ABSTRACT
For the past few years the number of educational institutions are increasing rapidly.
Thereby the number of hostels are also increasing for the accommodation of the students
studying in this institution.
The project “HOSTEL MANAGEMENT SYSTEM” is implemented to reduce the
manual work and enhances the accuracy of work in a hostel. And hence there is a lot of strain
on the person who are running the hostel and software’s are not usually used in this context.
This particular project deals with the problems on managing a hostel and avoids the problems
which occur when carried manually. Identification of the drawbacks of the existing system
leads to the designing of computerized system that will be compatible to the existing system
with the system which is more user friendly. We can improve the efficiency of the system,
thus overcome the drawbacks of the existing hostel management system. Less human error,
Strength and strain of manual labour can be reduced, High security, Data redundancy can be
avoided to some extent, Data consistency, Easy to handle, Easy data updating, Easy record
keeping, Backup data can be easily generated.
The purpose of Hostel Management System is to automate the existing manual system
by the help of computerized equipment and full-fledged computer software, fulfilling their
requirements, so that their valuable data/information can be stored for a longer period with
easy accessing and manipulation of the same. The required software and hardware are easily
available and easy to work with. Hostel Management System, as described above, can lead to
error free, secure, reliable and fast management system. It can assist the user to concentrate
on their other activities rather to concentrate on the record keeping. Thus it will help
organization in better utilization of resources. The organization can maintain computerized
records without redundant entries. That means that one need not be distracted by information
that is not relevant, while being able to reach the information.
CONTENTS
NO
TITLE
I.
INTRODUCTION
1.1 About the Project
II.
III.
IV.
PAGE NO
2
SYSTEM ANALYSIS
2.1 Existing system
4
2.2 Proposed system
4
2.4 Objectives
5
SYSTEM DESIGN AND DEVELOPMENT
3.1 Design process
7
3.2 Feasibility Study
8
3.3 System Requirements
11
3.4 Module description
12
3.5 About the Tools
13
3.6 Database Design
16
3.7 Dataflow diagram
16
3.8 Table design
21
SYSTEM TESTING AND IMPLEMENTATION
4.1 System implementation
25
4.1.1 Implementation methods
25
4.1.2 Implementation plan
25
4.2 System testing
V.
VI.
VII.
VIII.
IX.
X.
4.2.1 Preparation of Test Data
27
4.2.2 Testing Methods
28
4.2.3 Test plan
33
4.2.4 Implementation
33
VERSION CONTROL PROJECT MANAGEMENT
5.1 Github
37
5.2 Github login details
37
SYSTEM SECURITY
6.1 Checks and Controls
39
6.2 Data Security
40
6.3 User Security
40
POST IMPLEMENTATION
7.1 System Evaluation
42
7.2 Maintenance
42
FUTURE SCOPE
45
CONCLUSION
47
BIBLOGRAPHY
11.1 Website
XI.
27
49
ANNEXURE
12.1 Screen Shots
51
HMS
1. INTRODUCTION
KTU
1
MCA2021
HMS
1.1 About the project
HOSTEL MANAGEMENT SYSTEM is a web application. ” is implemented
to reduce the manual work and enhances the accuracy of work in a hostel. This system is
developed to provide service facility to the students. Hostels without a management system
are usually done manually. Registration forms verification to other data saving processes are
done manually and most at times, they are written on paper. Thus a lot of repetitions can be
avoided with an automated system. The drawbacks of existing systems lead to the design of
a computerised system that will help reduce a lot of manual inputs. With this system in place,
we can improve the efficiency of the system, thus overcome the drawbacks of the existing
manual system.
The "Hostel Management System" has been developed to override the problems
prevailing in the practicing manual system. This software is supported to eliminate and in
some cases reduce the hardships faced by this existing system. Moreover this system is
designed for the particular need of the company to carry out operations in a smooth and
effective manner. The application is reduced as much as possible to avoid errors while
entering the data. It also provides error message while entering invalid data. No formal
knowledge is needed for the user to use this system. Thus by this all it proves it is userfriendly. Hostel Management System, as described above, can lead to error free, secure,
reliable and fast management system. It can assist the user to concentrate on their other
activities rather to concentrate on the record keeping. Thus it will help organization in better
utilization of resources.
So, this web application will develop to help the hostel administrator to manage it.
And this project is to upgrade the manual system and make it easily to access and systematic.
This solution is developed on the plight of the hostel management team, through this they
cannot require so efficient person to handle and manage the affairs of the students in the
hostel, all you need to do is to login as administrator and you can see the information of all
the students who have obtained and registered their hostel form, click verify to ascertain their
eligibility and allocate them to the available hostel.
KTU
2
MCA2021
HMS
2. SYSTEM ANALYSIS
KTU
3
MCA2021
HMS
2.1 EXISTING SYSTEM
The existing system is manual based and need lot of efforts and consume enough time.
In the existing system we can apply for the hostels online but the allotment processes are done
manually. It may lead to corruptions in the allocation process as well as hostel fee calculation.
To manage the hostel facilities, a lot of data need to be maintained such as number of student
hostel can accommodate, hostel rules and regulation, hostel fee, hostel in and out of student,
guest and visitor record and so on. Data are stored into the file but not in the database which
is lead to data duplication, repetitive data, and isolation of data from one to another. It is also
worried of something happen to the file, then all the data will lost. In the current manual
system, it will very difficult to find the hostel record and other information of student
manually. Because it has been keep on the paper and it is easy to loss. It also consume time
to search the paper of student hostel record one by one. The manual system requires longer
time for allocation the student to respective hostel, dorm, and bed.
Disadvantages:

More human Power.

Low security

Data redundancy

Difficult to handle

Difficult to update data

Record keeping is difficult

Duplication of data entry.
2.2 PROPOSED SYSTEM
The proposed system “HOSTEL MANAGEMENT SYSTEM” implemented to
overcome the disadvantages of existing system. Hostel Management System (HMS) is
web-based system for managing various activities in the hostel thought online.
It helps in avoiding the problems which occur when carried out manually. It
improves the efficiency of the system. Ability to manage application, admission,
Allocatting room
KTU
4
MCA2021
HMS
Advantages:

Less human error

Strength and strain of manual labour can be reduced

High security

Data redundancy can be avoided to some extent

Data consistency

Easy to handle

Easy data updating

Easy record keeping

Backup data can be easily generated
2.3 OBJECTIVES
Primary Objectives:
The main objective of this project is to students can make the online application
submission for hostel rooms in digital and effective. Students would not have to wait for
rooms and any kind of booking services which will be eliminating delay in services.
Features:

To develop an integrated system for hostel management system.

To provide a feature rich for Digital service

To provide efficient management of 3 general categories as Student, Hostel Manager
and Admin
KTU

Providing online student application for student to apply the hostel.

Provide efficient staff.

Guest can book their time to visit the hostel
5
MCA2021
HMS
3. SYSTEM DESIGN AND DEVELOPMENT
KTU
6
MCA2021
HMS
System designing in terms of software engineering has its own value and importance
in the system development process as a whole. To mention it may though seem as simple as
anything or simply the design of systems, but in a broader sense it implies a systematic and
rigorous approach to design such a system which fulfills all the practical aspects including
flexibility, efficiency and security. Systems design is the process of defining the architecture,
components, modules, interfaces, and data for a system to satisfy specified requirements.
Systems design could be seen as the application of systems theory to product development.
System design takes the following inputs such as statement of work, requirement
determination plan, and current situation analysis, proposed system requirements including a
conceptual data model, modified DFDs, and metadata (data about data).
The important objective is that the phase of system designing is concerned with
creating the system which can work efficiently providing the required output and being
responsive to the time within a given time limit.
3.1 DESIGN PROCESS
The design phase focuses on the detailed implementation of the system recommended
in the feasibility study. The design phase is a transition from a user-oriented document to
document oriented to the programmers or database personnel. System design goes through to
phase of development:

Logical Design

Physical Design
Logical Design:
Logical design pertains to an abstract representation of the data flow, inputs, and
outputs of the system. It describes the inputs (sources), outputs (destination), databases (data
stores), procedures (data flows) all in a format that meets the user requirements. While
preparing the logical design of a system, the system analyst specifies the user needs at level
of detail that virtually determines the information flow into and out of the system and required
data sources. Data flow diagram, E-R diagram modelling are used.
KTU
7
MCA2021
HMS
Physical Design:
Physical design relates to the actual input and output processes of the system. It
focuses on how data is entered into a system, verified, processed, and displayed as output. It
produces the working system by defining the design specification that specifies exactly what
the candidate system does. It is concerned with user interface design, and data design. It
consist of the following steps such as specifying the input/output media, designing the
database, and specifying backup procedures, planning system implementation, updating costs,
benefits, conversion dates, and system constraints, devising a test and implementation plan ,
and specifying any new hardware and software .
3.2 FEASIBILITY STUDY
A feasibility study is an evaluation of a proposal designed to determine the difficulty
in carrying out a designated task. Generally, a feasibility study precedes technical
development and project implementation. Feasibility Study is performed to choose the system
that meets the performance requirements at least cost. The most difficult part of a Feasibility
Study is the identification of the candidate systems and the evaluation of their performances
and costs. The new system has no additional expense to implement the system. The new
system has advantages such as we can easily access files from any client, accurate output for
accurate input and this application is more user friendly. We can use this application not only
in this organization but also in other firms. So it is worth solving the problem.
The major considerations involved in the feasibility study are the following:

Economic Feasibility

Operational Feasibility

Technical Feasibility

Behavioural Feasibility
Economic Feasibility
It is commonly known as cost or benefit analysis. Economic Feasibility answers the
question whether the cost and timescales are right for the application and whether the potential
returns will justify the initial outlay. It is the most frequently used method for evaluating the
effectiveness of the candidate system.
KTU
8
MCA2021
HMS
Economic Feasibility includes an assessment of the one-time cost of hardware and
software and it also addresses the impact of the final system on the overall performance of the
business. The justification for the new system is it will increase the profit of the enterprise,
improve the quality of services or products, reduce expenditure or otherwise contribute
towards attaining goals of the enterprise.
The proposed system is a very cost effective one. The candidate system can be
developed at a reasonable cost with the available hardware and software. No need for extra
hardware and software for implementing the current project and the cost of other resources
needed for the development.
It saves lots of money when compared to the already existing system. As it is
developed for Academic project, the cost of the company is nil compared to professional
development.
Technical Feasibility
Technical Feasibility centres on the hardware and software of the candidate system
and to what extend it can support the proposed system. The assessment of technical feasibility
is based on system design ideas relating to what can be accomplished with existing
technology. This involves financial considerations to accommodate technical enhancements.
If the budget is a serious constraint, the project is judged not feasible.
This feasibility checks whether the technology is available to develop the system. It is
a study of function, performance, and constraints that may affect the ability to achieve an
existing system. So this project is technically feasible. We should be extremely careful in
selection of the software platform and the tools for development.
Technical Feasibility study is performed to check whether the proposed system is
technically feasible or not. Technical feasibility canters on the existing computer system
(hardware, software, etc.) and to what extent it can support the proposed addition. This
involves financial consideration to accommodate technical enhancement. This system is
technically feasible. All the data are stored in files. The input can be done through dialog
boxes which are both interactive and user friendly. Hard copies can be obtained for future use,
by diverting the documents to a printer. Windows serves as the platform for the new system.
KTU
9
MCA2021
HMS
Behavioural Feasibility
Behavioural Feasibility deals with how people accept the new system. People are
often resistant to changes and computers have known to make change. An estimate must be
made of how strong the reaction of the user is likely to have towards the development of a
computerized system. The assessment behavioural/social feasibility is assuming greater
importance now days. Because working in unacceptable environment, it makes the production
lesser and low in potential.
The system has a graphical user interface which makes it user friendly. Also the
development of the project is done with the requirements given for user’s convenience.
Reduces their paper works and other time consuming processes. User training can be done
easily and effectively. Behavioural feasibility is an evolution of the probability that the
company is sufficiently motivated to support the development of the implementation of the
application with the necessary use of participation resources learning etc.
The interest and support shown by the user organization during system study do not
seem to reflect any possible resistance in this regard. So from behavioural aspects the new
system is supposed to have efficient support from the company.
Operational feasibility
Operational Feasibility study is performed to check whether the system is
operationally feasible or not. It is a measure of how a proposed system solves the problems,
and takes the advantages of the opportunities identified during scope definition and how it
satisfies the requirements identified in the requirement analysis phase of system development.
Using command buttons throughout the application programs enhances operational
feasibility. So maintenance and modification is found to be easier. People are inherently
resistant to changes and need sufficient amount of training, which would result in lot of
expenditure, which is an additional expenditure for the organization. Here the proposed
system is beneficial because it can be turned into an information system that will meet the
organizations operating requirements.
Today there won’t be anyone who is not trained to use computer and Internet. The
proposed system is very user friendly. It does not impose much need of training the users. So,
the system can be judged as operationally feasible.
KTU
10
MCA2021
HMS
Resource Feasibility and Time Feasibility
This involves questions such as how much time is available to build the new system,
when it can be built, whether it interferes with normal business operations, type and amount
of resources required, dependencies, etc. Contingency and mitigation plans should also be
stated here. Time Feasibility involves determining whether a proposed project can be
implemented fully within stipulated time frame. If a project takes too much time it is likely to
be rejected. This system takes less time to display the output. So this project is said to be
technically feasible and time feasible.
3.3 SYSTEM SPECIFICATION
Software Requirements
The selection of hardware is very important in the existence and proper working of
any software. Then selection hardware, the size and capacity requirements are also important.
Language Used
: PHP, JAVASCRIPT
Database
: MySQL
IDE
: Visual Studio Code
Web Server
: Xampp
Supporting Tool
: Web browser (Chrome or Mozilla Firefox)
Hardware Requirements
The selection of the hardware is very important in the existence and proper functioning
of any software, when selecting hardware, the size and capacity requirements are also
important.
KTU

Processor
: Intel core i3

Hard Disk
: 906 GB

RAM
: 4 GB

Input Devices : keyboard , mouse
11
MCA2021
HMS
3.4 MODULES DESCRIPTION
Project contains 4 modules:
1. Home page
2. Hostel Manager
3. Admin
4. Student
Homepage
The home page will have public user interface which includes HOME, ABOUT US,
LOGIN, and APPLICATION FORM. This page will have an option for the student to login.
Student can login by using his/her username & contact number. The information about the
hostel will be displayed in the ABOUT section. Also containing a gallery section, which
includes the pictures of the hostel. APPLICATION FORM is used for the online booking the
room they want. In this form it contains Name, Address, Location, College, Year of study,
Contact no, Parent Contact no, Date, Gender, and Room type. Home page contain login
section for admin, hostel manager and student and it display the working time of hotel. The
visitors can make the RESERVATION for to visit the hostel. In this form contains Date, No.
of Peoples, and Time. And the last Footer section, contains the online social media links of
the hostel.
Hostel Manager
The staff should login by using their username and password. When the hostel
manager login, they have their own home page. This section include APPOINTMENT
REPORT, in this report hostel manager approve the application based on the payment,
PRODUCT REPORT, in this report hostel manager can view the new product that the admin
is added for the specified rooms. STUDENT REPORT, in this report hostel manager can view
the current students in the hostel. BOOKING REPORT, in this report hostel manager can
view if someone book for visit the hostel.
KTU
12
MCA2021
HMS
Admin
In admin section he is the total controller of the whole hostel. He can manage both the
Home page & Hostel manager section. In his system he get the total view of whole network
system. The main process that occurred in admin section is APPROVING APPLICATION of
student. The further process is done by the admin. And the admin section include Home of
admin, Add hostel manager, Add product, Add salary, Reports, and Logout. In report section
it display the reports of Applications, Product, Hostel manager, Students, Salary and Booking
Students
Students can login with their name and contact number and it will go Home page of
Student. It shows hearty welcome. In that page include HOME, PROFILE, in this section the
student can view the their details when they applying for the room, HOSTEL DETAILS in
this section the student can view all the hostel managers in the hostel and their details
including name phone number email id etc..and LOGOUT.
3.5 ABOUT THE TOOLS
PHP
PHP Three letters that together constitutes the name of one of the world’s most popular
programming languages for Web development, the PHP Hypertext Preprocessor PHP is
widely used in web development now a days. Dynamic websites can be easily developed by
PHP. But you must have the basic the knowledge of following technologies for web
development as well.
o
HTML
o
CSS
o
JavaScript
There are given many features of PHP.
o
Performance: Script written in PHP executes much faster than those scripts written
in other languages such as JSP & ASP.
KTU
13
MCA2021
HMS
o
Open Source Software: PHP source code is free available on the web, you can
developed all the version of PHP according to your requirement without paying any
cost.
o
Platform Independent: PHP are available for WINDOWS, MAC, LINUX & UNIX
operating system. A PHP application developed in one OS can be easily executed in
other OS also.
o
Compatibility: PHP is compatible with almost all local servers used today like
Apache, IIS etc.
o
Embedded: PHP code can be easily embedded within HTML tags and script.
HTML
The Hyper Text Markup Language (HTML) is a simple markup language used to
create hypertext documents that are portable from one platform to another. HTML documents
are SGML documents with generic semantic that are appropriate for representing information
from a wide range of applications.
This specification defines HTML version 3.2. HTML 3.2 aims to capture
recommended practice as of early ‘96 and as such to be used as a replacement for HTML
2.0(RF1866). A set of instructions embedded in a document is called Markup Language.
These instructions describe what the document text means and how it should look like in a
display. Hyper Text Markup Language (HTML) is the language used to encode World Wide
Web documents. It is a document layout and hyperlink specification language that defines the
syntax and placement of special embedded directions that are not displayed by a web browser,
but tells it how to display the contents of the documents including text, images and other
supported media.
CSS
CSS stands for Cascading Style Sheets.CSS describes how HTML elements are to be
displayed on screen, paper, or in other media. CSS saves a lot of work. It can control the
layout of multiple web pages all at once. External style sheets are stored in CSS files. CSS is
used to define styles for your web pages, including the design, layout and variations in display
for different devices and screen sizes.
KTU
14
MCA2021
HMS
JavaScript
JavaScript often abbreviated as JS, is a programming language that conforms to the
ECMA Script specification. JavaScript is high-level, often just-in-time compiled, and multiparadigm. It has curly-bracket syntax, dynamic typing, prototype-based object-orientation,
and first-class functions. Alongside HTML and CSS, JavaScript is one of the core
technologies of the Wide Web.
JavaScript enables interactive web pages and is an essential part of web applications.
The vast majority of websites use it for client-side page behaviour, and all major web browsers
have a dedicated JavaScript engine to execute it. As a multi-paradigm language, JavaScript
supports event-driven, functional, and imperative programming styles. It has application
programming interfaces (APIs) for working with text, dates, regular expressions, standard
data structures, and the Document Object Model (DOM). However, the language itself does
not include any input/output (I/O), such as networking, storage, or graphics facilities, as the
host environment (usually a web browser) provides those APIs.
MYSQL
MySQL is free and open-source software under the terms of the GNU General Public
License, and is also available under a variety of proprietary licenses. MySQL was owned and
sponsored by the Swedish company MySQL AB, which was bought by Sun Microsystems
(now Oracle Corporation). In 2010, when Oracle acquired Sun, Widenius forked the opensource MySQL project to create Maria DB.
MySQL is a component of the LAMP web application software stack (and others),
which is an acronym for Linux, Apache, MySQL, Perl/PHP/Python. MySQL is used by many
database-driven web applications, including Drupal, Joomla, phpBB, and Word Press.
MySQL is written in C and C++. Its SQL parser is written in yacc, but it uses a home-brewed
lexical analyser. MySQL works on many system platforms, including AIX, BSDi, FreeBSD,
HP-UX, eComStation, i5/OS, IRIX, Linux, macros, Microsoft Windows, NetBSD, Novell
NetWare, OpenBSD, Open Solaris, OS/2 Warp, QNX, Oracle Solaris, Symbian, SunOS, SCO
Open Server, SCO UnixWare, Sanos and Tru64. A port of MySQL to OpenVMS also exists.
KTU
15
MCA2021
HMS
3.6 DATABASE DESIGN
A database is a collection of interrelated data stored with a minimum of redundancy to
serve many applications. It minimizes the artificiality embedded in using separate files. The
organization of data in a database aims to achieve three major objectives. They are:

In a database information from several files are coordinated, accessed and operated
upon as though it is a single file.

In a database all data are stored in the place only and it allows each application to
access it. This approach results in more consistent information.

This objective seeks to allow changes in the content and organization of physical data
without reprogramming the application.

To structure the data so that any pertinent relationship between entities can be
represented.
3.7 DATAFLOW DIAGRAM
A Data flow diagram is a network which describes the flow of data and process that
transformed data through the system the points, which transform the data, are the nodes of
the network. The principle processes that take place at the nodes are combining, splitting
and modifying data streams. Unlike flow charts, dataflow nodes in the diagram might be
activated. Dataflow diagram can be expressed using information notation. Like other types
of the system flow charts, data flow diagrams can be expanded into successively lower
level details. Types of DFD are of 2:

Physical DFD:
Structured analysis states that the current system should be first understand
correctly. The physical DFD is the model of the current system and is used
to ensure that the current system has been clearly understood.

Logical DFD:
Logical DFD focuses on the business and how the business operates. It
describes the business event that takes place and the data required and
produced by each event.
KTU
16
MCA2021
HMS
Elements References
Symbols
Data flow process
Process
Data store
Source sink
LEVEL 0
USER
HMS
DATABASE
LEVEL 1
USER
HOSTEL
MANAGER
HMS
DATABASE
ADMIN
KTU
17
MCA2021
HMS
LEVEL 1.1
APPLY
LOGIN
USER
DATABASE
PROFILE
HOSTEL DETAILS
LOGOUT
KTU
18
MCA2021
HMS
LEVEL 1.2
LOGIN
APPROVE
Tb_Apply
APPLICATION
2.
HOSTEL
MANAGER
DATABASE
VIEW
STUDENT
S
Tb_Apply
VIEW
PRODUCTS
Tb_Product
LOGOUT
KTU
19
MCA2021
HMS
LEVEL 1.3
LOGIN
ADD HOSTEL
MANAGER
Tb_Staff
Tb_Product
ADD PRODUCT
Tb_Salary
ADD
SALARY
ADMIN
DATABASE
Tb_Apply
REPORTS
Tb_Staff
Tb_Product
Tb_Booking
Tb_Student
Tb_Salary
LOGOUT
KTU
20
MCA2021
HMS
3.8 TABLE DESIGN
A table contains a group of fields of related information that define a single category.
The table stores the data in fields. A set of fields that define one entry is called a record.
ADMIN
FIELD NAME
DATA TYPE
CONSTRAINTS
DESCRIPTION
Login_Id
Int(5)
Primay Key
Enter the login id
Password
Int(15)
Not Null
Enter the password
User_name
Varchar(20)
Not Null
Enter the username
FIELD NAME
DATA TYPE
CONSTRAINTS
Id
Int(5)
Primay Key
Name
Varchar(20)
Not Null
Enter the name
Address
Varchar(20)
Not Null
Enter the address
Location
Varchar(20)
Not Null
Enter the location
College
Varchar(20)
Not Null
Enter the college name
Yearofstudy
Varchar(20)
Not Null
Enter the year of study
Contact_No
Int(15)
Not Null
Enter the contact no
Pcontact_No
Int(15)
Not Null
Enter the parent contact
APPLY
DESCRIPTION
no
Date
date
Not Null
Select the date
Room_no
Int(5)
Not Null
Enter the room no
KTU
21
MCA2021
HMS
STAFF
FIELD NAME
DATA TYPE
CONSTRAINTS
DESCRIPTION
Int(5)
Primary Key
Enter the login id
name
Varchar(10)
Not Null
Enter the name
Contact_no
Int(5)
Not Null
Enter the contact no
Username
Varchar(10)
Not Null
Enter the username
Password
Int(15)
Not Null
Enter the password
Addr
Varchar(10)
Not Null
Enter the address
Age
Int(5)
Not Null
Enter the age
Pwork
Int(5)
Not Null
Enter the previous
id
work
Email
Varchar(10)
Not Null
Enter the email
Icontact
Int(5)
Not Null
Enter the immediate
contact
Date
date
Not Null
Enter the date
Salary
Int(5)
Not Null
Enter the salary
BOOKING
FIELD NAME
DATA TYPE
CONSTRAINTS
DESCRIPTION
Int(5)
Primary Key
Enter the login id
Date
date
Not Null
Enter the date
Nopeople
Int(20)
Not Null
no. of peoples
Time
time
Not Null
Enter the visiting time
id
KTU
22
MCA2021
HMS
PRODUCT
FILED NAME
DATA TYPE
CONSTRAINTS
DESCRIPTION
Id
Int(5)
Primary Key
Enter the id
Name
Varchar(20
Not Null
Enter the name
Contact_no
Int(5)
Not Null
Enter the contact no
Description
Varchar(20
Not Null
Enter the description
Quantity
Int(5)
Not Null
Enter the quantity
Roomno
Int(5)
Not Null
Enter the room no
SALARY
FILED NAME
DATA TYPE
CONSTRAINTS
DESCRIPTION
Id
Int(5)
Primary Key
Enter the id
Name
Varchar(20
Not Null
Enter the name
Salary
Int(5)
Not Null
Enter the salary
insent
Int(5)
Not Null
Enter the insentives
Total
Int(5)
Not Null
Enter the total
Date
Date
Not Null
Select the date
KTU
23
MCA2021
HMS
4. SYSTEM TESTING AND IMPLEMENTATION
KTU
24
MCA2021
HMS
4.1 SYSTEM IMPLEMENTATION
Implementation is a stage where theoretical design is turned to the working system.
The implementation phase is used to test the developed package with sample data, correcting
the error identified, appearing the user of the various special facilities and features of the
computerized system. It also involves user training for minimizing resistance to change and
giving the new system a change to prove its worth. The successful implementation of the new
system depends upon the involvement of the user.
4.1.1 Implementation Methods
There are several methods for handling the implementation and consists for changing
from the old to the new computerized system. The most secure method for conversion from
the old system is to run the old and new system in parallel .In this approach; a person may
operate in the manual processing system as well as start operating the new computerized
system.
Another commonly used method is a direct cut over the existing manual system to the
computerized system. The change may be within a week or a day. This strategy requires
planning. A working version of the system can also be implemented in one part of the
organization and the changes can be made as and when required, but this method is less
preference due to the loss of entire system. After the system is Implementation, a review
should be conducted to determine whether the system is meeting expecting where
improvements are needed.
4.1.2 Implementation Plan
Implementation plan includes a description of all activities that must occur to
implement the new system and to put into operation. It defines the personal responsible for
the activities and prepares a time chart for Implementation the system. The Implementation
plan should anticipate possible problems and must be able to deal with them. The usual
problem may be missing documents, missed data formats between current and new files,
errors in data translation, missing data etc.
Documentation
The documentation involves collecting, organizing, and maintaining complete record
of programs. The documentation deal with the system department with maximum clarity.
KTU
25
MCA2021
HMS
Each and every process is explained in detail. The various table used by the system with field
details are provided. The system uses various kinds of forms to produce well-structured screen
formats. These forms are also documented .the output generated by the system constitutes
another part.
Documentation of the software provides the following:
Comments:
Comments are very useful in documenting a program. It is used to explain logic of the
program. It should be used to improve the quality and understand ability of the program. It
should not be redundant, incorrect or incomplete.
System Manuals:
A good software system must contain standard system manuals. In this the statement
is clearly defined, specifies description, detailed flowcharts, and specimen of all input forms
and printed outputs.
Operation Manual:
A good software package is supported with a good operation manual to ensure the
smooth running of the program.
The operation manual must contain the following information:

Setup and operational details of each program.

Loading and unloading procedures.

Starting, running, and terminating procedures.

List of error conditions with explanations.
4.2 SYSTEM TESTING
System testing is the stage of implementation, which is aimed at ensuring that the
system works accurately and efficiently before live operation commences. For any software
that is newly developed, primary importance is given to testing the system .It is the last
opportunity for the developer over to the customers.
Testing is the process by which a developer will generate a set of test data, which gives
maximum probability of finding all types of errors that can occur in the software. The
KTU
26
MCA2021
HMS
candidate system is subject to a variety of tests: online response, volume, stress, recovery &
security and usability tests. A series of testing are performed for the proposed system before
the system is ready for user acceptance testing.
It is the process of exercising or evaluating a system by manual or automatic means to
verify that it satisfies the specified requirements or to identify the difference between expected
and actual results. The testing activities are aimed at convincing the customer through
demonstration and actual use that the software is a solution to the original problem and that
both the product and the process that created it are of high quality. It is also used to find and
eliminate any residual errors from previous stages and the operational reliability of the system.
4.2.1 PREPARATION OF TEST DATA
Software testing is a crucial element of software quality assurance and represents the
ultimate review of specification, design and coding. Testing represents an interesting anomaly
for the software. During earlier definition and development phases, it was attempted to build
software from abstract concepts to tangible implementation. The testing responsible for
ensure that the product that has built performs the way that the detailed design documentation
specifies.
Goals and objectives
The main purpose of testing an information system is to find the errors and correct
them. The scope of system testing should include both manual and computerized operations.
System testing is comprehensive evaluation of the programs, manual procedures, computer
operations and controls. System testing is the process of checking whether the developed
system is working according to the objective and requirement. All testing is to be conducted
in accordance to the test conditions specified earlier. This will ensure that the test coverage
meets the requirements and that testing is done in a systematic manner.
Testing Objectives:
Testing is a process of executing a program with the intent of finding many errors as
possible. So, the main objective is to design tests that systematically uncover different classes
of errors using minimum time and effort. Successful testing uncovers errors in software. It
also shows that the software functions are working according to specifications. Also, the data
collected during testing provides an indication of software reliability and software quality.
KTU
27
MCA2021
HMS
Statement of scope
The strategy for system testing integrates system test cases and design techniques into
a well-planned series of steps that result in the successful construction of software. The testing
must co-operate with test planning, test case design, test execution and the resultant data
collection and evaluation. A strategy for software testing must accommodate low level test
and that are necessary to verify that a small code segment has correctly implemented as well
as high level test that validate major system functions against user requirements.
Software testing is a critical element of software quality assurance and represents the ultimate
review of specification design and coding. A series of testing is performed for the proposed
system before the system is ready for acceptance testing.
4.2.2 TESTING METHODS
Testing is the process of finding bugs in a program. It helps to improve the quality of
the software. It has to be done thoroughly and with the help of specialist testers. System testing
is a process of checking whether the developed system is working according to the original
objectives and requirements. The system should be tested experimentally with test data so as
to ensure that the system works according to the required specification.
Testing principles are:

Tests are traceable to customer requirements.

80% of errors will likely be traceable to 20% of program modules.

Testing should begin ‘in-small’ and progress towards testing ‘in large’.
There are many approaches to software testing but effective testing of complex products is
essentially a process of investigation, not merely a matter of creating and following wrote
procedure.
One definition of testing is "the process of questioning a product in order to evaluate
it", where the "questions" are things the tester tries to do with the product, and the product
answers with its behaviour in reaction to the probing of the tester. The code testing strategy
checks for the correctness of every statement in the program. To follow this testing strategy,
there should be test cases that result in execution of every instruction in the program or
module; that is every path in the program is tested. The test cases should be guarantee that
independent paths within a module are executed at least one. Exercise all logical decision on
their true or false sides. Execute all loops at their boundaries and within their operational
KTU
28
MCA2021
HMS
bounds. This testing strategy, on the face of it, sounds exhaustive. If every statement in the
program is checked for its validity, there doesn’t seem to be much scope for error.
The testing steps are:

Unit Testing

Integration Testing

Validation Testing

System Testing

Output Testing

Acceptance testing
Unit Testing
It is the process of taking each program module and run it in isolation from the rest of
the modules, by using prepared inputs and comparing the actual results with the results
predicated by the specifications and design of modules. This enables the tester to detect errors
in coding and logic that are contained within that module alone. The software units in a system
are modules and routines that are assembled and integrated to perform a specific function
.Unit testing focuses first on modules, Independently of one another, to locate errors. This
enables, to detect errors in coding and logic that are contained within each module. This
testing includes entering data and ascertaining if the value matches to the type and size
supported by java.
The various controls are tested to ensure that each performs its action as required. This
is known as “Module testing”. This testing is carried out during programming stage. Project
aspect: Front-end design consists of various forms.
They are tested for data acceptance. Similar the back-end that is database was also
tested for successful acceptance and retrieval of data. It first checks the design module, to
conform all the graphical animated images are working properly. Then it checks the dictionary
module to conform all the phrases or words available. Speech module checks the texted data
are pronounced correctly. It also check still images and turnoff are working properly
Integration Testing
It is the schematic technique for constructing the program structure while at the same
time conducting tests to see uncovered errors associated with interfacing .It also tests to find
KTU
29
MCA2021
HMS
discrepancies between the system and its original objective, current specifications and
systems documentation. The primary concern is the compatibility of individual modules.
Data can be lost across any interface, one module can have an adverse effect on
another, and sub-functions when combined may not produce the desired major functions.
Integration testing is a systematic testing to discover errors associated within the interface.
The objective is to take unit tested modules and build a program structure. All the modules
are combined and tested as a whole.
We followed bottom-up integration testing. Bottom up integration testing as its name
implies begins construction and testing with atomic modules. Because components are
integrated from the bottom up, processing required for components subordinate to a given
level is always available and the need for stubs is eliminated. The bottom up integration testing
is done from the fault and fault free module is integrated with work stealing module. Here
we check from the design phase and integrate it with the sign language and then it integrates
with dictionary formation. Finally integrates with speech module and tested.
Validation Testing
Validation testing can be defined in many ways, but a simple definition is that
validation succeeds when the software functions in manner that is reasonably expected by the
customer. Software validation is achieved through a series of black box tests that demonstrate
conformity with requirement.
After validation test has been conducted, one of two conditions exists.

The function or performance characteristics confirm to specifications and are
accepted.

A validation from specification is uncovered and a deficiency created.
Deviation or errors discovered at this step in this project is corrected prior to completion of
the project with the help of the user by negotiating to establish a method for resolving
deficiencies. Thus the proposed system under consideration has been tested by using
validation testing and found to be working satisfactorily.
KTU
30
MCA2021
HMS
System Testing
System testing of software or hardware is testing conducted on a complete, integrated
system to evaluate the system's compliance with its specified requirements. System testing
falls within the scope of black box testing, and as such, should require no knowledge of the
inner design of the code or logic.
Black Box Testing
Black box testing takes an external perspective of the test object to derive test cases.
These tests can be functional or non-functional, though usually functional. The test designer
selects valid and invalid inputs and determines the correct output. There is no knowledge of
the test object's internal structure.
his method of test design is applicable to all levels of software testing. The higher the
level, and hence the bigger and more complex the box, the more one is forced to use black
box testing to simplify. Black box testing also called behavioural testing, focuses on the
functional requirements of the software. That is, black box testing enables the software
engineer to derive sets of input conditions that will fully exercise all functional requirements
for a program. Black _ box testing attempts to find errors in the following categories:

Incorrect or missing functions.

Interface errors.

Errors in data structure or external database access.

Behaviour or performance errors.

Initialization and error termination.
White Box Testing
White box testing (clear box testing, glass box testing, transparent box testing, and
translucent box testing or structural testing) uses an internal perspective of the system to
design test cases based on internal structure. It requires programming skills to identify all
paths through the software. The tester chooses test case inputs to exercise paths through the
code and determines the appropriate outputs.
While white box testing is applicable at the unit, integration and system levels of the
software testing process, it is typically applied to the unit. While it normally tests paths within
KTU
31
MCA2021
HMS
a unit, it can also test paths between units during integration, and between subsystems during
a system level test.
Typical white box test design techniques include:

Control flow testing

Data flow testing

Branch Testing
Output Testing
After performing the validation testing, the next step is output testing of the proposed
system since no system could be useful if it does not produce the required output in the
specific format.
The asking the user about the format required by them tests the outputs generated or displayed
by the system under considered in to one ways is on screen. The acceptance format on the
screen is found to be correct as format was designed in the system design phase according to
the user needs. Hence output testing does not results in any correction in the system.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.

Input screen testing

Output screen testing
Preparation of testing data plays a vital role in the system testing. After preparing the test
data the system under study is tested using the test data.
While testing the system, errors are again uncovered and corrected by using the above
testing steps. Also, it is ideal to note the corrections for future use. The proposed system is
tested and finds better results in all the above system tests.
4.2.3 TEST PLAN
A test plan documents the strategy that will be used to verify and ensure that a
product or system meets its design specifications and other requirements. A test plan is
usually prepared by or with significant input from test engineers. Depending on the product
KTU
32
MCA2021
HMS
and the responsibility of the organization to which the test plan applies, a test plan may
include a strategy for one or more of the following:
• Design Verification or Compliance test - to be performed during the development or
approval stages of the product, typically on a small sample of units.
• Manufacturing or Production test - to be performed during preparation or assembly of
the product in an ongoing manner for purposes of performance verification and quality
control.
•Acceptance or Commissioning test - to be performed at the time of delivery or
installation of the product.
• Service and Repair test - to be performed as required over the service life of the product.
• Regression test - to be performed on an existing operational product, to verify that
existing functionality didn't get broken when other aspects of the environment are changed
(e.g., upgrading the platform on which an existing application runs).
A complex system may have a high level test plan to address the overall requirements and
supporting test plans to address the design details of subsystems and components .Test plan
document formats can be as varied as the products and organizations to which they apply.
There are three major elements that should be described in the test plan: Test Coverage,
Test Methods, and Test Responsibilities. These are also used in a formal test strategy.
4.2.4 IMPLEMENTATION
A crucial phase in the system life cycle is the successful implementation of the new
system design. Implementation simply means converting a new system design into
operation.
This
involves
creating
computer
compatible
files,
training,
and
telecommunication network before the system is up and running. A crucial factor in
conversion is not disrupting the functioning of organization.
Actual data were input into the program and the working of the system was closely
monitored. It is a process of converting a new or revised system into an operational one. It
is the essential stage in achieving a successful new system because usually it involves a lot
of upheaval in the user. It must therefore be carefully planned and controlled to avoid
problems.
KTU
33
MCA2021
HMS
The implementation phase involves the following tasks:
1. Careful planning.
2. Investigation
3. Design of methods
4. Training of the staff in the changeover phase.
5. Evaluation of changeover.
Training
The preparation of implementation of documentation process is often viewed as
total sum of the software documentation process. In a well-defined software development
environment, however the presentation of implementation documents is essentially an
interactive process that synthesis and recognizes document items that were produced
during the analysis and design phase for the presentation to user. The following are the
three types of implementation documents.
• Conversion Guide
• User Guide
• Operation Guide
Conversion Guide
The Conversion Guide phase of the implementation, process the tasks that are
required to place the system into an operation mode. They amplify the conversion lane that
was defined during the internal design phase and defines file conversion, file creation and
data entry requirements.
User Guide
The system application and operation functions describe the overall performance
capabilities of the system and define procedures the user must follow to operate the system.
In the realm of information system, the content of a user guide must be developed to
coincide with a criterion that defines the characteristics of one of the following methods of
data processing.
• Off-line processing
• Direct access processing
KTU
34
MCA2021
HMS
Operation Guide
The function of an operation is to define the control requirements of a system and
provide instruction for initializing, running and terminating the system. The items
contained in an operation guide may be grouped as follows.
• General information
• System overviews
• Run description.
KTU
35
MCA2021
HMS
5. VERSION CONTROL AND PROJECT MANAGEMENT
KTU
36
MCA2021
HMS
5.1 GITHUB
Git is a free and open source distributed version control system designed to handle
everything from small to very large projects with speed and efficiency. It is a distributed
revision control system with an emphasis on speed, data integrity, and support for distributed,
non-linear workflows.
GitHub is a Web-based Git version control repository hosting service. It is mostly used
for Computer Code it offers all of the distributed version control and source code management
(SCM) functionality of Git as well as adding its own features. It provides access control and
several collaboration features such as bug tracking, feature request, task management and
wikis for every project. GitHub offers both plans for private and free repositories on the same
account which are commonly used to host open-sources software projects. As of April 2017,
GitHub reports having almost 20 million users and 57 million repositories, making it the
largest host of source code in the world.
5.2 GITHUB UPLOADED DETAILS
Fig 1. Github details
KTU
37
MCA2021
HMS
6. SYSTEM SECURITY
KTU
38
MCA2021
HMS
System security is a branch of technology known as information security as applied to
computers and networks. The objective of system security includes protection of information
and property from theft, corruption, or natural disaster, while allowing the information and
property to remain accessible and productive to its intended users. The terms system security,
means the collective processes and mechanisms by which sensitive and valuable information
and services are protected from publication, tampering or collapse by unauthorized activities
or untrustworthy individuals and unplanned events respectively.
6.1 CHECKS AND CONTROLS
This is the process to determine that an Information System protects data and
maintains functionality as intended. The six basic security concepts are:
Confidentiality:
A security measure which protects against the disclosure of information to parties
other than the intended users that is by no means the only way of ensuring.
Integrity:
A measure intended to allow the receiver to determine that the information which it
receives has not been altered in transit or by other than the originator of the information.
Authentication:
A measure designed to establish the validity of a transmission, message, or originator.
Allows a receiver to have confidence that information it receives originated from a specific
known source.
Authorization:
This is the process of determining that a requester is allowed to receive a service or
perform an operation. Access control is an example of authorization.
Availability:
Assuring information and communications services will be ready for use when
expected. Information must be kept available to authorized persons when they need it.
Non-répudiation :
A measure intended to prevent the later denial that an action happened, or a
communication that took place etc.
KTU
39
MCA2021
HMS
6.2 DATA SECURITY
The focus behind data security is to ensure privacy while protecting personal or
corporate data. Data is the raw form of information stored as columns and rows in our
databases, network servers and personal computers. This may be a wide range of information
from personal files and intellectual property to market analytics and details intended to top
secret. Encryption has become a critical security feature for thriving networks and active
home users alike. This security mechanism uses mathematical schemes and algorithms to
scramble data into unreadable text. It can only by decode or decrypted by the party that
possesses the associated key.
Data security wouldn't be complete without a solution to back up your critical
information. Though it may appear secure while confined away in a machine, there is always
a chance that your data can be compromised. You could suddenly be hit with a malware
infection where a virus destroys all of your files. Someone could enter your computer and
thieve data by sliding through a security hole in the operating system. Perhaps it was an inside
job that caused your business to lose those sensitive reports. If all else fails, a reliable backup
solution will allow you to restore your data instead of starting completely from scratch.
6.3 USER SECURITY
User security lets your application use security rules to determine what it displays. It
has two elements:
Authentication
Ensures that a valid user is logged-in, based on an ID and password provided by the
user. ColdFusion (or, in some cases if you use web server authentication, the web server)
maintains the user ID information while the user is logged-in.
Authorization
Ensures that the logged-in user is allowed to use a page or perform an operation.
Authorization is typically based on one or more roles (sometimes called groups) to which the
user belongs. For example, in an employee database, all users could be members of either the
employee role or the contractor role. They could also be members of roles that identify their
department, position in the corporate hierarchy, or job description. For example, someone
could be a member of some or all of the following roles such as Employees, Human
Resources, Benefits, and Managers. You can also use the user ID for authorization.
KTU
40
MCA2021
HMS
7. POST IMPLEMENTATION
KTU
41
MCA2021
HMS
A Post-Implementation Review (PIR) is an assessment and review of the completed
working solution. It will be performed after a period of live running; some time after the
project is completed. There are three purposes for a Post-Implementation Review:

To ascertain the degree of success from the project, in particular, the extent to which
it met its objectives, delivered planned levels of benefit, and addressed the specific
requirements as originally defined.

To examine the efficiency of all elements of the working business solution to see if
further improvements can be made to optimize the benefit delivered.

To learn lessons from this project, lessons which can be used by the team members
and by the organization to improve future project work and solutions.
7.1 SYSTEM EVALUATION
The system evaluation involves the hardware and software as a unit. The hardware
selection is based on performance categories. The evaluation phase ranks vendor proposal and
determines the one suited to the user’s needs. It looks in to items such as price, availability
and technical support.
In the operation phase, the system performance must be monitored not only to
determine whether or not they perform as planned, but also to determine if they should be
modified to meet changes in the information needs of the business. In the evaluation phase,
the first step adopted was to look at the criteria listed earlier and rank them in the order of
importance. Three sources of information are used in evaluating hardware and software. They
are benchmark program, experience of other users and product reference manuals.
7.2 MAINTENANCE
Software maintenance is the modification of a software product after delivery to
correct faults, to improve performance or other attributes, or to adapt the product to a modified
environment. Maintenance covers a wide range of activities, including correcting, coding and
design errors, updating documentation and test data and upgrading user support. Maintenance
means restoring something to its original condition.
After the installation phase is completed and the user staff is adjusted to the changes created
by the candidate system, evaluation and maintenance begin.
KTU
42
MCA2021
HMS
The maintenance phase of the software cycle is the time in which a software product
performs the useful work. If the new information is inconsistence with the design
specification, then changes have to be made. The importance of maintenance is to continue to
bring the new system to standards. The system should be maintained and upgraded according
to the technological advancements. It ensures the data integrity, data control and security. The
system must be protected from fire and other natural calamities. The backup copies of data
must be maintained daily so that we can prevent the loss of data due to various reasons.
Types of changes that can be encountered during the maintenance phase:
Corrective maintenance:
Even with the best quality assurance activities, it is likely that the customer will
uncover defects in the software. Corrective maintenance changes the software to correct the
defects.
Adaptive maintenance:
Over time, the original environment (CPU, Operating System, Business Rules,
External Product Characteristics) for which the software was developed is likely to change.
Adaptive maintenance results in modification to the software to accommodate changes to its
external environment.
Enhancement maintenance:
As software is used, the user will recognize additional functions that will provide the
benefit. Perfect maintenance extends the software beyond its original functional requirements.
Preventive maintenance:
Computer software deteriorates due to change, and because of this preventive
maintenance often called software re-engineering, must be conducted to enable the software
to serve the needs of its end users. Preventive maintenance makes changes to computer
programs so that they can be more easily corrected, adapted and enhanced.
KTU
43
MCA2021
HMS
8. FUTURE SCOPE
KTU
44
MCA2021
HMS
The expanded functionality of today’s software requires an appropriate approach
towards software development. This hostel management software is designed for people who
want to manage various activities in the hostel. For the past few years the number of
educational institutions are increasing rapidly. Thereby the number of hostels are also
increasing for the accommodation of the students studying in this institution. And hence there
is a lot of strain on the person who are running the hostel and software’s are not usually used
in this context. This particular project deals with the problems on managing a hostel and
avoids the problems which occur when carried manually identification of the drawbacks of
the existing system leads to the designing of computerized system that will be compatible to
the existing system with the system which is more user friendly and more GUI oriented
The idea of the advance e-restaurant can also be extended for future using GPRS
modules. GPRS modules can be used to monitor and request of the menu order from table
will be directly sent to the predefined web link for process of even billing the items purchased.
KTU

Allow to save payment details for future use.

Allow to find and choose a nearby hostels.

Travel facilities.

Tourist’s packages and guide system.

Meeting and conference facility.
45
MCA2021
HMS
9. CONCLUSION
KTU
46
MCA2021
HMS
To conclude the description about the project: The project, developed using PHP and
MySQL is based on the requirement specification of the hostel and the analysis of the existing
system, with flexibility for future enhancement. The developed system is advantages over the
existing system. This project is a web application which helps to applying for rooms and
visitor reservation. After doing the feasibility study, we knew that this kind of this concept is
totally feasible and even welcomed by hostel. This system attracts students and also adds the
efficiency of maintaining the hostel room application. Hence it is the modern way of grow up
the existing system of hostel using e-commerce.
The system is implemented with high degree of accuracy and user friendliness. The
processing of a system is very simple. Since this is a user friendly web application, any user
who does not have any idea about this system can handle the software very easily.
KTU
47
MCA2021
HMS
10. BIBLLOGRAPHY
KTU
48
MCA2021
HMS

HTML 4.0 IN SIMPLE STEPS, Author: Kogent Solutions Publishers: Wiley.

HTML 4 FOR DUMMIES, Author: ED TITTEL & MARY BURMEISTER
Publishers: Wiley.

Beginning PHP, D W Mercer, a Kent, S D Nowicki Publishers: Wrox.

PHP & MYSQL FOR DUMMIES, 3rd, Author: JANET VALADE Publishers: Wiley.

Java
JDBC.Java
SE
Technologies
-
Database.
Accessed
on
3
May,
2010.http://java.sun.com/javase/technologies/database/.[9] Pa
10.1 WEBSITE
KTU

http://www.acsu.buffalo.edu/~suchismi/iRec.pdf , [ 26-3-2021, 10 AM ]

http://www.w3school.com/css , , [28-3-2021, 10.30 AM ]

http://www.w3school.com/html , , [28-3-2021, 10:30 AM ]

http://www.w3school.com/php , , [30-3-2021, 7:00 PM ]

http://www.w3school.com/sql , , [01-4-2021, 10.30 AM ]

http://www.deploid.com/tablet/ipad , , [03-4-2021, 10.30 AM ]

http://aptito.com/Why-Aptito , , [10-4-2021, 09.30 AM ]

http://www.touchbistro.com/features , , [18-3-2021, 10.30 AM ]
49
MCA2021
HMS
11. ANNEXURE
KTU
50
MCA2021
HMS
11.1 SCREENSHOT
1) Home
2) About
KTU
51
MCA2021
HMS
3) Apply
KTU
52
MCA2021
HMS
4) Reservation
KTU
53
MCA2021
HMS
5) Admin
Home
Add Hostel Manager
KTU
54
MCA2021
HMS
Add Product
Add Salary
Reports
KTU
55
MCA2021
HMS
6) Hostel Manager
Product
Student
KTU
56
MCA2021
HMS
Salary
Booking
KTU
57
MCA2021
HMS
6) Hostel Manager
Home
Appointment
KTU
58
MCA2021
HMS
Student
Product
KTU
59
MCA2021
HMS
7) Student
Home
KTU
60
MCA2021
HMS
Profile
Hostel Details
KTU
61
MCA2021
Download