Uploaded by chirayusingodia

tander management

advertisement
CHAPTER 1
INTRODUCTION OF THE PROJECT
1.1 SYSTEM OVERVIEW
So what is tender management? In today’s competitive business world, many
potential projects and services are put out to tender. That is numerous potential
companies are provided with the opportunity to bid for the work.
In their bids, they will describe how their company will solve a business problem,
provide the service required or supply the goods requested. They will also need to
provide a competitive price for this work.
The process of designing and writing these proposals or tenders, complete with the
competitive pricing, is called tender management, proposal management or bid
management.
1.2PURPOSE:A tender management system, either manual or electronic, is required to ensure an
effective and efficient process for:
a) the buyer wishing to source products or services and
b) the seller wishing to bid to supply a company.
Managing tenders is very time consuming exercise and a lot of paper work is
involved. Manual systems have some merit but are prone to errors and cannot deal
with growing volumes of tenders to be managed by both buyers and sellers.
1.3SCOPE & OBJECTIVE OF THE PROJECT:The tender starts when an appropriate Invitation To Tender (ITT) has been identified.
The ITT is a formal document that is published by a purchasing company in order to
notify other companies that bids for a piece of work, project or service is required.
There is always a fixed deadline that the tenders must be returned by and this makes
bid management very time dependent. It all adds to the stress of the entire process.
What does tender management include?

Analyzing the requirements within the ITT.

Designing a solution that meets these requirements.

Managing the staff that will write the tender.

Developing a compelling proposal that will meet the requirements and stand out
from other bids.
1

Producing a pricing structure that will win the bid as well as produce a profit by the
end of the project.

Minimizing risk and maximizing the impact of the tender.

Sticking to tight deadlines.
Tenders Are Not that Standardised
There are standard bid management processes available to manage these activities and
one published bid methodology. There are also some computerized systems that will
manage the workflow of a tender management process but bid management is
nowhere as formalized as project management.
This makes experience proposal writers with a history of winning highly sought after.
A tender or bid writer manages risk very well and is always organized and able to
manage staff within a very highly charged environment.
Framework Tender Agreements
Such is the popularity of tendering that framework agreement tenders are now being
offered. This is where a company tenders to receive a framework agreement that then
provides them with the opportunity to tender for future work with the organization.
These framework agreements are particularly popular with government tenders and
large companies and are often found in information technology and staffing.
Tenders can be low level such as a cleaning service or they can be highly prized, such
as a bid for a multi-million dollar new computer system but they all have the same
structure and processes.
They start with the ITT request for bids and end up with a negotiated contract. A good
bid manager knows how to manage the process, whilst juggling staff, information
overload, searching for missing information and managing time frames.
1.4DEFINING MANAGEMENT:As a company is competing against many other companies that may have the same or
better qualities and lower prices, the art of tender management or writing a winning
tender is highly skilled.
A good tender writer who really knows how to write a bid and who will make the
tender stand out from the competitors is highly sought after.
1.5 SYSTEM DEVELOPMENT LIFE CYCLE:-
2
The first step in the Software Development Life Cycle (SDLC) is the
preliminary investigation to determine the feasibility of the system. The purpose
of the preliminary investigation is to evaluate project requests. It is not a design
study nor does it include the collection of details to describe the business system
in all aspect. Rather it is the collection of the information that helps committee
members to evaluate the merits of the project request and make an informed
judgment about the feasibility of the proposed project.
The
preliminary
investigation
should
accomplish
the
following
objectives.
1. Clarify and understand the project request
2.Determine the size of the project.
3.Assess costs and benefits of alternative approaches.
4.Determine the technical and operational feasibility of alternative approaches
5.Report the findings to management; with recommendations outlining the
acceptance or rejection of the proposal.
CHAPTER2
PROJECT OVERVIEW
2.1 PROBLEM DEFINATION:An internet based process wherein the complete tendering process;
from advertising to receiving and submitting tender-related information are
done online. This enables firms to be more efficient as paper-based transactions are
reduced or eliminated, facilitating for a more speedy exchange of information.
3
2.2 CURRENT SYSTEM AND OVERVIEW:Presently, in organizations, fee entries are managed manually, wherein a daily report is
generated and then it is managed daily, weekly or monthly accordingly, which leads to
both time loss and resource loss. Thus, organizations are really concerned about their
future prospects and optimizing throughputs are switching from manual Online Tender
Management Systems towards technologically more efficient systems. The current
system is becoming obsolete and proving to be counter progressive due to its following
flaws:
Time- consuming.

Cumbersome and inaccurate process.

Forging.

Manual entry problem.

Daily report maintenance problem.

Less secured

Long queue problem.

Impossible to know WHO did WHAT, WHERE and WHEN!!!!
2.3USER INTERFACE:
The system will be having user privileges based menu.

User will have to select the options form thegiven menu.

The system will be entering the information into the database to generate

The forms will be designed to enter the data.

Buttons will be used to insert, retrieve or modify the data.

Links will be provided to shift from one form to another.
reports.
2.4 MEMORY CONSTRAINTS:No memory constraints are applicable. A normal memory configuration is more than
sufficient. Memory required only for students and fee structure details. If data is more
than allocated memory thenextra memory should be needed to allocate for the desired
database.
4
2.5 PRODUCT FUNCTION:It is advisable to have weekly data backups. The system administrator will do the data
recovery.
2.6CONSTRAINTS:2.6.1 GENERAL CONSTRAINTS:
1.This system will not take care of any virus problem, which might occur either on the
client’s system. Avoiding the use of pirated software and ensuring that floppies and
other removable media are scanned for viruses before use could minimize the
possibility of viral infection.
2.Recovery of data after a system crash will be possible only if backups are taken at
regular intervals.
3. Manual interfaces cannot be fully avoided. Documented proofs like dates etc. will
have to be verified by the concerned staff before entering it into the computerized
system.
2.6.2 HARDWARECONSTRAINTS:
Constraints of the Internet & Intranet will not be applicable to the system. The
performance of the system will be dependent on the database’s conditions like database
application, size of data types etc. The primary memory (RAM) and the secondary
memory (Hard Disk Space) requirement of the system at the client end will be the same
as remains in the operating system. The space required to store the data would increase
as more and more records are added to the system.
2.6.3 SECURITYCONSTRAINTS:
User will be authenticated by the use of username and passwords. This Provides
complete security and the system could not be hacked into as the project is not on the
internet. Use of SSL prevents any unauthorized access as all communications are
encrypted. Other securities can be added according to need as security is one of the
most important issue for any programming language.
5
2.6.4 ASSUMPTION AND DEPENDENCIES:
1. It is assumed that the user is familiar with the basic computer fundamentals.
2. Timely backup of data should be taken to avoid data loss in case of system crash.
3. The use of pirated software should be avoided as it may lead to data loss and
systemcrashes due to viral infections.
4. Floppies and other removable media should be scanned for viruses before use.
5. Proper configuration of the client and database server is necessary for the system to
function as intended.
6. It is assumed that the maintenance of the database will be assigned to the authorized
person only.
7. Only authorized persons will be allowed inside the server room.
CHAPTER 3
DEVELOPMENT TOOLS AND LANGUAGES
3.1SPECIFIC REQUIREMENTS
3.1.1 SOFTWARE REQUIREMENT:1.
Platform
Win XP service pack 3and above
2.
Browser
Chrome, Firefox, etc
3.
SQL Server
MY SQL Server 5
Table 3.1:Software Contents
3.1.2 HARDWARE REQUIREMENT:1.
Main Processor
Core2 Duo
2.
Hard-disk Capacity
60 GB
3.
RAM
512 MB/1 GB
4.
BACKUP MEDIA
Hard disk, CD
6
Table 3.2: Hardware Contents

Keywords
Generic Technology keywords
Databases, Programming
Specific Technology Keywords
MS-SQL server, Core, User Controls
Project type keyword
Analysis, Design, Implementation, Testing, User Interface
3.2 GENERAL CONSTRAINTS:1. This system will not take care of any virus problem, which might occur either on
the client or the server system. Avoiding the use of pirated software and ensuring
that floppies and other removable media are scanned for viruses before use could
minimize the possibility of viral infection.
2. Recovery of data after a system crash will be possible only if backups are taken at regular
intervals.
3. Manual interfaces cannot be fully avoided. Documented proofs like dates etc. will have to
be verified by the concerned staff before entering it into the computerized system
3.3 PROJECT PLAN:At the beginning of the project, we scheduled meeting time for the group to discuss on
the design and implementation of the software and what language to use in writing the
software. We had several meetings to this effect. When then developed a time-line for
the project–when we would be releasing the first version for scrutiny and the
estimated time we thought we would use for refactoring. We also pondered on a
suitable name to give the site. Wecame up with the name “Online Tender
Management System”.
The group was then divided into two pairs that would work on parts of the code. We
kept in touch with each other and whenever we had difficulties, we asked each other
questions. On some occasions, we had to pretend we were the student so as to try to
figure out some of the things that user would desire, such as the friendliness of the
user interface and ease of navigation through the software.
7
When we discovered that we were behind schedule, we met to create a new storage
management. We were behind schedule mostly because of our different engagements
in college work and other personal issues. Fortunately for the team, we were able to
stick to the new storage management and the project was completed in due time.
After the major part of the code was completed, we went ahead to lace the code, that
is, adding exception handlers which will make the software more robust. We avoided
this at the beginning because we did not want to get confused with too many lines of
code.
The version of the software that has been released can still be improved depending on
user response.
3.4 CHOICEOF TOOLSAND TECHNOLOGIES:Technologies and tools are strongly related to the approach of software development.
What the tools can or cannot do significantly impact what principles that can be used,
as well as what objectives that can be fulfilled. While selection of a particular
methodology may imply use of certain tools, the tools themselves often leave
significant room for developers to choose how to use them. The selection has therefore
been based mainly on the objectives of the project, while the methodologies were
selected after the tools were selected, due to the fact that technologies and tools poses
certain restrictions of how development can be done.
3.4.1 PHP:
PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open
source general-purpose scripting language that is especially suited for web development
and can be embedded into HTML.
Instead of lots of commands to output HTML (as seen in C or Perl), PHP pages contain
HTML with embedded code that does "something" (in this case, output "Hi, I'm a PHP
script!"). The PHP code is enclosed in special start and end processing
instructions <?php and ?> that allow you to jump into and out of "PHP mode."
What distinguishes PHP from something like client-side JavaScript is that the code is
executed on the server, generating HTML which is then sent to the client. The client
would receive the results of running that script, but would not know what the underlying
code was. You can even configure your web server to process all your HTML files with
PHP, and then there's really no way that users can tell what you have up your sleeve.
8
The best things in using PHP are that it is extremely simple for a newcomer, but offers
many advanced features for a professional programmer. Don't be afraid reading the long
list of PHP's features. You can jump in, in a short time, and start writing simple scripts
in a few hours.
Although PHP's development is focused on server-side scripting, you can do much
more with it. Read on, and see more in the What can PHP do? section, or go right to
the introductory tutorial if you are only interested in web programming.
3.4.3 MY SQL SERVER 5:
MySQL, the most popular Open Source SQL database management system, is
developed, distributed, and supported by Oracle Corporation.
A database is a structured collection of data. It may be anything from a simple shopping
list to a picture gallery or the vast amounts of information in a corporate network. To
add, access, and process data stored in a computer database, you need a database
management system such as MySQL Server. Since computers are very good at handling
large amounts of data, database management systems play a central role in computing,
as standalone utilities, or as parts of other applications..
9
CHAPTER 4
FEASIBILITY
A feasibility study is conducted to select the best system that meets performance
requirement. This entails an identification description, an evaluation of candidate
system and the selection of best system for job. The system required performance is
defined by a statement of constraints,the identification of specific system objective and
a description of outputs.
The key considerations in feasibility analysis are:
Economical feasibility
Technical Feasibility
Operational Feasibility
4.1 ECONOMICAL FEASIBILITY:In making recommendations a study of the economics of the proposed system should
be made. The proposed system must be justifiable in terms of cost and benefit, to ensure
that the investment in a new/changed system provide a reasonable return.
Cost-benefit analysis of information is complicated by the fact that many of the systems
cost elements are poorly defined and that benefit can often be highly qualitative and
subjective in nature.
In our proposed system various costs are evaluated. Even though finding out the costs
of the proposed project is difficult we and assume and estimate the costs and benefits
as follows.
According to the computerized system we propose, the costs can be broken down to
two categories.
Costs associated with the development of the system.
Costs associated with operating the system
4.2 TECHNICAL FEASIBILITY:Based on the outline design of system requirements in terms of inputs, outputs, files,
procedures and staff, the technical issues raised during technical feasibility include:
Does the necessary technology exist to do what is proposed?
Does the proposed equipment have the technical capacity to hold the data required to
use in the new system?
Adequate responses provided by the proposed system?
10
Is the system flexible enough to facilitate expansion?
Is there any technical guarantee of accuracy, reliability, ease of access and data
security?
The system developer’s task is to view needed capabilities in light of currently available
technology. Since the existing system is semi-computerized it is clear to us that there is
no efficiency in the use of technology within the organization. The solution is the
implementing the new computerized system, which works hand in hand with high
technology.
A database has to be maintained in order to update and backup data whenever a
transaction occurs. To create databases we use SQL server.
After taking the above facts into consideration we can state that the new proposed
system is technically feasible
4.3 OPERATIONAL FEASIBILITY:A proposed system is beneficial only if it can be turned into an information system that
will meet the operational requirements of an organization. A system often fails if it does
not fit within existing operations and if users resist the change.
Important issues a systems developer must look into are:
Will the new system be used if implemented in an organization?
Are there major barriers to implementation or is proposed system accepted without
destructive resistance?
The whole purpose of computerizing the Tender System is to handle the work much
more accurately and efficiently with less time consumption. There will be additional
work to be completed, because now the contractors can submit their tenders online.
Their database is maintained separately.
Compared to the semi-computerized system the chances of avoiding errors in a
computerized system is much higher because the user need not stress himself
unnecessarily resulting in recklessness. Unlike the semi-computerized system there
would be backup data for all the information concerning the daily transactions occurred
within the organization.
If we are considering the performance and response time for each task, it is very much
faster since there is less paper work to be completed. When entering data into the system
to relieve the user from additional work and typing incorrect data, the system provides
options such as combo boxes, check boxes, option buttons and etc. if the users type in
incorrect data they would be informed immediately about the error by the error
detection control.
11
Another important fact to be regarded is the security control, which is handled by the
system. Since data regarding each contractor and the company is confidential, security
is a key issue. Information falling into the wrong hands could jeopardize the entire
organization. Unlike in semi-computerized systems the proposed system offers
adequate control to protect the organization against fraud and embezzlement and
guarantees the accuracy and security of data and information. This is handled by the
system providing each department and individuals with separate login names and
passwords.
The new system is more user-friendly, which enables the end-user to complete his/her
work efficiently and accurately with interest. After taking the above fact into
consideration we can state the operating of the proposed system within the organization
is feasible.
In this phase of the feasibility study the following two main topics
Technical Performance Aspect
Acceptance within the organization
Technical performance aspect is explained in the technical feasibility report and there
is no new information is needed in this to explain it again, but as for the acceptance
within the organization the following points are important and those are explained
according to the topics
This system is developed according to the experience of the current employees and the
management structure, so for this system to function within the current employee
community. The employees do not need to have new skills other than the skills which
are gained in the current system.
Job restructuring and training
For the new system to have an effect in the organization the employees should be give
a proper training in operating the software and computer systems. If the employee does
not have the minimal experience should be given the proper training
If the organization is reluctant to give a full training to the employees who require the
full knowledge organization can restructure the structure of the departments.
12
CHAPTER 5
PURPOSED ONLINE TENDER MANAGEMENT SYSTEM
5.1 INTRODUCTION:System design is the process of developing specifications for a candidate system that
meet the criteria established in the system analysis. Major step in system design is the
preparation of the input forms and the output reports in a form applicable to the
user.The main objective of the system design is to make the system user friendly.
System design involves various stages as:
Data Entry
Data Correction
Data Deletion
Processing
Sorting and Indexing
Report Generation
System design is the creative act of invention, developing new inputs, a database,
offline files, procedures and output for processing business to meet an organization
objective. System design builds information gathered during the system analysis.
13
5.2 ARCHITECTURAL DIAGRAMS:-
Fig:-5.1 DFD
14
CHAPTER 6
SNAPSHOTS
1. LOGIN FORM:

This Form Authenticate the user by asking two information

Username: username allocated at registration time

Password: Password of the user.

After Login,User authorized to perform operation according to the role.

Only admin can modify/change this password.
15
2. HOME PAGE:

This form contain four informations.

Tender news list .

Navigation bar.

Login.
Code:
<?php include("header.php");
?>
<?php include("conection.php");
?>
<div class="col-xs-12 col-sm-9 col-md-8 col-lg-8">
<div class="panel panel-default">
<div id="carousel-example-generic" class="carousel slide" data-ride="carousel">
<ol class="carousel-indicators">
<li data-target="#carousel-example-generic" data-slide-to="0" class=""></li>
<li data-target="#carousel-example-generic" data-slide-to="1" class=""></li>
<li data-target="#carousel-example-generic" data-slide-to="2" class="active"></li>
16
</ol>
<div class="carousel-inner">
<div class="item">
<img data-src="img/slide10.jpg" alt="First slide" src="img/slide10.jpg">
</div>
<div class="item">
<img data-src="img/slide20.jpg" alt="First slide" src="img/slide20.jpg">
</div>
<div class="item active">
<img data-src="img/slide30.jpg" alt="First slide" src="img/slide30.jpg">
</div>
</div>
<a class="left carousel-control" href="#carousel-example-generic" dataslide="prev"><span class="glyphicon glyphicon-chevron-left"></span></a>
<a class="right carousel-control" href="#carousel-example-generic" dataslide="next"><span class="glyphicon glyphicon-chevron-right"></span></a>
</div>
</div>
</div>
<div class="col-xs-12 col-sm-3 col-md-4 col-lg-4 ">
<div class="panel panel-default">
<div class="panel-heading"> <span class="glyphicon glyphicon-listalt"></span><b>   Tenders</b></div>
<div class="panel-body">
<div class="row">
<div class="col-xs-12">
<a href='userbiddingdetails.php'><p>Approved Tender List</p></a>
<ul class="demo1">
17
<?php
$qsowtender="select * from tender_details where tender_status='1' &&
DATE(tender_closing_date)>=now() order by tender_closing_date asc";
$resshowtender=mysqli_query($con,$qsowtender);
while($rowshowtender=mysqli_fetch_array($resshowtender))
{
echo "<li class='news-item'>
<table cellpadding='4'>
<tr>
<td>".$rowshowtender[1]."</td></tr><tr><td>Budget - Rs
$rowshowtender[5]</td></tr><tr><td>Closing Date".date_format(date_create($rowshowtender[3]),"d-M-y")."...<a
href='tender_details.php?snotender=$rowshowtender[0]'>Read more</a></td>
</tr>
</table>
</li>";
}
?>
</ul>
</div>
</div>
</div>
<div class="panel-footer"> </div>
</div>
</div>
18
<?php include("footer.php");?>
3. ScreenShot Of about us Page
Code:
<?php include("header.php");?>
<div class="container">
<div class="col-xs-12 col-sm-12 col-md-12 col-lg-12">
<img src="img/collegehistory.jpg" alt="" class="img-responsive img-thumbnail centerblock">
<div class=" well well-lg">
<p>Engineering College Ajmer was established in the year 1997 under the aegis of Govt.
of Rajasthan whose faculty members have had consummate experience in the fields of
education, Industry, Engineering and Technology over the years. The College is affiliated to
the Rajasthan University and is approved by the All India Council of Technical Education,
New Delhi.
The College is located at Badliya Chouraha N.H.8, Ajmer 5 Kilometers from Ajmer on the
National Highway no 14, providing the right industrial ambience for the budding engineers.
19
No Stone is left unturned to maintain exalted standards in imparting academic and practical
skills to the students, so that they become well-rounded engineers with professional
expertise and personal integrity when they complete their courses.</p>
</div>
</div>
</div>
<br>
<br>
<br>
<?php include ("footer.php");?>
4.ScreenShot Of Admin insert tander
Code:
20
<?php include("header.php");?>
<?php
if(!empty($_SESSION['admin']))
{
}
else
{
header("location:index.php");
exit();
}
?>
<?php
if($_SERVER['REQUEST_METHOD']=="POST")
{
if(!empty($_POST['tenderinsert']))
{
$tender_title=$_POST['tender_title'];
$tender_opening_date=$_POST['tender_opening_date'];
$tender_closing_date=$_POST['tender_closing_date'];
$tender_details=$_POST['tender_details'];
$tender_minimum_budget=$_POST['tender_minimum_budget'];
if(!empty($_POST['sno']))
{
21
$sno=$_POST['sno'];
$qinsertupdate="UPDATE tender_details SET
tender_title='$tender_title',tender_opening_date='$tender_opening_date',tender_closing_
date='$tender_closing_date',
tender_details='$tender_details',tender_minimum_budget='$tender_minimum_budget'
WHERE sno='$sno'";
}
else
{
$qinsertupdate="INSERT INTO
tender_details(tender_title,tender_opening_date,tender_closing_date,
tender_details,tender_minimum_budget,tender_status,final_rate) VALUES
('$tender_title','$tender_opening_date','$tender_closing_date','$tender_details','$tender_
minimum_budget','1','nill')";
}
$res=mysqli_query($con,$qinsertupdate);
$_SESSION['tender_saved']="Tender Information Saved Successfully..!";
header("location:insert_tender.php");
exit();
}
}
?>
<?php
if(!empty($_GET['snoedit']))
{
$sno=$_GET['snoedit'];
22
$qrow="select * from tender_details where sno='$sno'";
$resrow=mysqli_query($con,$qrow);
$rowrow=mysqli_fetch_row($resrow);
}
?>
<script src="ckeditor/ckeditor.js"></script>
<div class="containg">
<div class="col-xs-12 col-sm-8 col-sm-offset-2">
<div class="panel panel-info">
<div class="panel-heading">
<h3 class="panel-title">Tender Add </h3><label style="color:green">
<?php
if(!empty($_SESSION['tender_saved']))
{
echo $_SESSION['tender_saved'];
unset($_SESSION['tender_saved']);
}
?></label>
</div>
<div class="panel-body">
<form action="<?php $_SERVER['PHP_SELF']?>" method="POST" class="formhorizontal" role="form">
<span class="hide"> <?php
if(!empty($_GET['snoedit']))
{
echo "<input type='text' name='sno' value='$sno'/>";
23
}
?></span>
<div class="form-group">
<legend>Insert Tender details</legend>
</div>
<div class="form-group">
<div class="col-sm-4">
<label class="control-label">Tender name</label>
<input type="text" class="form-control" placeholder=""
value="<?php if(!empty($_GET['snoedit'])){echo $rowrow[1];}?>"
name="tender_title">
</div>
<div class="col-sm-4">
<label class="control-label">Opening date</label>
<input type="date" class="form-control" placeholder="" value="<?php
if(!empty($_GET['snoedit'])){echo $rowrow[2];}?>" name="tender_opening_date">
</div>
<div class="col-sm-4">
<label class="control-label">Closing date</label>
<input type="date" class="form-control" placeholder="" value="<?php
if(!empty($_GET['snoedit'])){echo $rowrow[3];}?>" name="tender_closing_date">
</div>
</div>
<div class="col-sm-4">
<label class="control-label">Tender Budget</label>
<input type="text" class="form-control" placeholder="" value="<?php
if(!empty($_GET['snoedit'])){echo $rowrow[5];}?>" name="tender_minimum_budget">
</div>
24
<div class="form-group">
<div class="col-sm-12">
<label class="control-label">Details</label>
<textarea class="form-control" placeholder="" id="tender_detail"
name="tender_details"><?php if(!empty($_GET['snoedit'])){echo
$rowrow[4];}?></textarea>
</div>
</div>
<div class="form-group">
<div class="col-sm-10 ">
<input type="submit" class="btn btn-primary" value="Submit"
name="tenderinsert"/>
</div>
</div>
</form>
</div>
</div>
<div class="table-responsive">
<table class="table table-bordered table-hover">
<thead>
<tr>
<th>Tender name</th>
<th>Opening date</th>
<th>Closing Date</th>
<th>Details</th>
<th>Tender Budget</th>
<th colspan="2">Action</th>
25
</tr>
</thead>
<tbody>
<?php
$qshowtender="select * from tender_details where tender_status='1'
order by sno desc";
$resshoqtender=mysqli_query($con,$qshowtender);
while($rowshowtender=mysqli_fetch_array($resshoqtender))
{
echo "<tr>";
echo "<td>$rowshowtender[1]";
echo "<td>".date_format(date_create($rowshowtender[2]),"d-My");
echo "<td>".date_format(date_create($rowshowtender[3]),"d-My");
echo "<td>".htmlentities($rowshowtender[4]);
echo "<td>$rowshowtender[5]";
echo "<td><a
href='insert_tender.php?snoedit=$rowshowtender[0]'><input type='button' class='btn btninfo' value='Edit'/></a></td>";
echo "<td><a
href='insert_tender.php?snodelete=$rowshowtender[0]'><input type='button' class='btn
btn-danger' value='Delete'/></a></td>";
echo "<td>";
}
?>
</tbody>
</table>
</div>
26
</div>
</div>
<?php include("footer.php");?>
<script>
CKEDITOR.replace( 'tender_detail', {
filebrowserUploadUrl: "upload.php"
});
</script>
5.ScreenShot Of Admin view Register user Page
Code:
<?php include("header.php");
?>
<?php
if(!empty($_SESSION['admin']))
{
27
}
else
{
header("location:index.php");
exit();
}
?>
<div class="container-fluid">
<div class="col-xs-12 col-sm-12 col-md-12 col-lg-12">
<button class="btn btn-primary" role="button" data-toggle="collapse"
href="#collapseExample" aria-expanded="false" aria-controls="collapseExample">
View Register
</button>
<a href='insert_tender.php'><button class="btn btn-primary" >Tender Add </button></a>
<a href='adminbiddingdetails.php'><button class="btn btn-primary" >View Current Bid
</button></a>
<a href='adminbiddingdetailss.php'><button class="btn btn-primary" >View All Bid
</button></a>
</div>
<section class=" margin-top" style="height:340px">
<div class="col-xs-12 col-sm-12 col-md-12 col-lg-12 collapse" id="collapseExample">
<div class="row margin-top">
<table class="table table-bordered table-hover ">
28
<thead>
<tr class="bg-success ">
<th>S.no</th>
<th>Firm Name</th>
<th>Name</th>
<th>Contact</th>
<th>Email</th>
<th>View</th>
</tr>
</thead>
<tbody>
<tr>
<?php
$q="select * from userregister";
$res=mysqli_query($con,$q);
while($row=mysqli_fetch_array($res))
{
echo "<tr>";
echo "<td>$row[0]";
echo "<td>$row[1]";
echo "<td>$row[3]";
echo "<td>$row[6]";
echo "<td>$row[8]";
echo "<th><a
href='view.php?sno=$row[0]'>View</a></th>";
echo "</tr>";
}
29
?>
</tbody>
</table>
</div>
</div>
</section>
</div>
<?php include("footer.php");
?>
6.ScreenShot Of user view tender Page
30
Code:
<?php include("header.php");
?>
<?php
if(!empty($_SESSION['admin']))
{
}
else
{
header("location:index.php");
exit();
}
?>
<div class="container-fluid">
<section class=" margin-top">
<div class="col-xs-12 col-sm-12 col-md-12 col-lg-12 ">
<div class="row margin-top">
<table class="table table-bordered table-hover ">
<thead>
<tr class="bg-info text-info ">
31
<th>S.no</th>
<th>Firm Name</th>
<th>Name</th>
<th>Father Name</th>
<th>D.O.B</th>
<th>Gender</th>
<th>Contact</th>
<th>Office Contact</th>
<th>Email</th>
<th>Address</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>khanbro</td>
<td>jamil</td>
<td>khan</td>
<td>11/2/1989</td>
<td>male</td>
<td>7737728674</td>
<td>01452661333</td>
<td>jaml@mdil.com</td>
<td>khanpura</td>
</tr>
32
</tbody>
</table>
</div>
</div>
</section>
</div>
<?php include("footer.php");
?>
7.ScreenShot Of User bidding Page
Code:
<?php include("header.php");?>
<?php
if(!empty($_SESSION['admin']))
{
33
}
else
{
header("location:index.php");
exit();
}
?>
<section class=" margin-top" style="height:340px">
<div class="container">
<input type="button" value="Back" class="btn btn-success" onClick="backk()">
<label style="color:green"><?php if(!empty($_GET['msz'])){ echo $_GET['msz'];}?></label>
<form action="<?php $_SERVER['PHP_SELF']?>" class="form-horizontal" method="post"/>
<div class="form-group">
<div class="col-sm-4 col-sm-offset-3">
<label>Tender List</label>
<select class="form-control" tabindex="3" name="tender_list" required >
<option value="">Select</option>
<?php
$qsowtender="select * from tender_details where tender_status='1' &&
DATE(tender_closing_date)>=now() order by tender_closing_date asc";
$resshowtender=mysqli_query($con,$qsowtender);
while($rowshowtender=mysqli_fetch_array($resshowtender))
{
34
echo "<option
value='$rowshowtender[1]'>$rowshowtender[1]</option>";
}
?>
</select>
</div>
<div class="col-sm-1">
<label>Action</label>
<input type="submit" name="search_tender" id="login-submit" tabindex="4"
class="form-control btn btn-info" value="Show">
</div>
</div>
</form>
<br><br>
<div class="col-xs-12 col-sm-10 col-sm-offset-1">
<div class="table-responsive">
<table class="table table-bordered table-hover">
<thead>
<tr>
<th>Tender Name</th>
<th>Firm Name</th>
<th>Name</th>
<th>Contact</th>
<th>Email ID</th>
<th>Address</th>
35
<th>Bid Date</th>
<th>Bid Price</th>
<th></th>
</tr>
</thead>
<tbody>
<?php
if(!empty($_POST['search_tender']))
{
$tender_list=$_POST['tender_list'];
$q="select * from bid_details,userregister where
bid_details.user_email_id=userregister.email && tender_name='$tender_list'";
$res=mysqli_query($con,$q);
echo "<form action='adminbiddingdetails.php' method='post'>";
while($row=mysqli_fetch_row($res))
{
echo "<tr>";
echo "<td>$row[1]";
echo "<td>$row[7]";
echo "<td>$row[9]";
echo "<td>$row[12]";
echo "<td>$row[2]";
36
echo "<td>$row[16]";
echo "<td>".date_format(date_create($row[4]),"d-M-y
h:i:a");
echo "<td>Rs $row[3]";
echo "<td><span class='hide'><input type='text'
value='$row[3]' name='tender_final'><input type='text' value='$row[0]'
name='tender_sno'><input type='text' value='$row[1]' name='tender_name'></span><input
type='submit' value='Accept' name='bid_accept' class='btn btn-success'>";
echo "</tr>";
}
echo "</form>";
}
else if (!empty($_POST['bid_accept']))
{
$tender_sno=$_POST['tender_sno'];
$tender_name=$_POST['tender_name'];
$tender_final=$_POST['tender_final'];
$qfirst="update bid_details set bid_status='0' where
sno='$tender_sno'";
$resfirst=mysqli_query($con,$qfirst);
$qfirst="update tender_details set
tender_status='0',final_rate='$tender_final' where tender_title='$tender_name' and
tender_status='1'";
$resfirst=mysqli_query($con,$qfirst);
header("location:adminbiddingdetails.php?msz=Accept
Successfully..!");
exit();
37
}
?>
</tbody>
</table>
</div>
</div>
</section>
<?php include("footer.php");?><script>
function backk()
{
window.history.back();
}
</script>
8.ScreenShot Of Admin view bidding Page
38
Code:
<?php include("header.php");?>
<?php
if(!empty($_GET['snotender']))
{
$sno=$_GET['snotender'];
$qtender="select * from tender_details where sno='$sno'";
$restender=mysqli_query($con,$qtender);
$rowtender=mysqli_fetch_row($restender);
$counttender=mysqli_num_rows($restender);
}
?>
<?php
if($_SERVER['REQUEST_METHOD']=="POST")
{
if(!empty($_POST['bidsubmit']))
{
$tender_name=$_POST['tender_name'];
$email=$_POST['email'];
39
$user_bid=$_POST['user_bid'];
$qinsert="INSERT INTO
bid_details(tender_name,user_email_id,bidding_price,bidding_date_time, bid_status)
VALUES ('$tender_name','$email','$user_bid',now(),'1')";
$resinsert=mysqli_query($con,$qinsert);
echo "<script>alert('Bid Saved Successfully..!')</script>";
}
}
?>
<div class="containg">
<div class="col-xs-12 col-sm-5 col-sm-offset-4">
<div class="panel panel-info">
<div class="panel-heading">
<h3 class="panel-title">Bidding </h3>
<label style="color:green"><?php if(!empty($_SESSION['bid_saved'])){echo
$_SESSION['bid_saved'];unset($_SESSION['bid_saved']);}?></label>
</div>
<div class="panel-body">
<form action="<?php $_SERVER['PHP_SELF']?>" method="POST" class="formhorizontal" role="form">
<div class="form-group">
<div class="col-sm-12">
40
<label class="control-label">Tender Name </label>
<input type="text" class="form-control" value="<?php if($counttender>0){echo
$rowtender[1];} ?>"
name="tender_name" readonly/>
</div>
</div>
<div class="form-group">
<div class="col-sm-12">
<label class="control-label">Email Address </label>
<input type="email" class="form-control" placeholder="Your Email"
value="<?php echo $_SESSION['useremail'];?>" name="email" readonly>
</div>
</div>
<div class="form-group">
<div class="col-sm-12">
<label class="control-label">Tender Budget</label>
<input type="text" class="form-control" placeholder=""
value="<?php if($counttender>0){echo $rowtender[5];} ?>"
name="tender_budget" readonly>
</div>
</div>
<div class="form-group">
<div class="col-sm-12">
<label class="control-label">Price</label>
<input type="text" class="form-control" placeholder="Your Bid" value="<?php
if(!empty($_POST['bidsubmit']))
{ echo $user_bid;}?>" name="user_bid">
</div>
</div>
41
<div class="form-group">
<div class="col-sm-10 ">
<input type="submit" class="btn btn-primary" value="Bid" name="bidsubmit"/>
</div>
</div>
</form>
<?php if(!empty($_POST['bidsubmit']))
{
header("refresh:1,url=index.php");
exit();
}
?>
</div>
</div>
</div>
</div>
<?php include("footer.php");?>
9.ScreenShot Of Admin view All bidding Page
Code
42
<?php include("header.php");
?>
<?php
if(!empty($_SESSION['admin']))
{
}
else
{
header("location:index.php");
exit();
}
?>
<div class="container-fluid">
<section class=" margin-top" style="height:340px">
<div class="col-xs-12 col-sm-12 col-md-12 col-lg-12 ">
<div class="row margin-top">
<table class="table table-bordered table-hover ">
<thead>
<tr class="bg-info text-info ">
<th>S.no</th>
43
<th>Firm Name</th>
<th>Name</th>
<th>Father Name</th>
<th>D.O.B</th>
<th>Gender</th>
<th>Contact</th>
<th>Office Contact</th>
<th>Email</th>
<th>Address</th>
</tr>
</thead>
<tbody>
<?php
if(!empty($_GET['sno']))
{
$sno=$_GET['sno'];
$q="select * from userregister where id='$sno'";
$res=mysqli_query($con,$q);
$row=mysqli_fetch_row($res);
echo " <tr>
<td>$row[0]</td>
<td>$row[1]</td>
<td>$row[2]</td>
<td>$row[3]</td>
<td>$row[4]</td>
44
<td>$row[5]</td>
<td>$row[6]</td>
<td>$row[7]</td>
<td>$row[8]</td>
<td>$row[10]</td>";
echo "</tr>";
}
?>
</tbody>
</table>
</div>
</div>
</section>
</div>
<?php include("footer.php");
?>
10.ScreenShot Of Contact Us Page
45
Code:
<?php include("header.php");?>
<div class="containg">
<div class="col-xs-12 col-sm-12 col-md-12 col-lg-12">
<div class="well well-sm ">
Contact Us
</div>
<div class="well well-lg ">
<h3>Govt. Engineering College Ajmer</h3>
<address>NH-8,Barliya Circle,Ajmer (Rajasthan) Pin code: 305002 </address>
<span class="glyphicon glyphicon-phone-alt"></span> +91-0145-267 1801
<br>
<span class="glyphicon glyphicon-phone-alt"></span> +91-0145-267 1805 <br>
<span class="glyphicon glyphicon-phone-alt"></span> +91-0145-267 1776 <br>
<span class="glyphicon glyphicon-phone-alt"></span> +91-0145-267 1773 <br>
<span class="glyphicon glyphicon-phone-alt"></span> +91-0145-267 1801 <br>
<span class="glyphicon glyphicon-print"></span> +91-0145-267 1801 <br>
<span class="glyphicon glyphicon-envelope"></span> principal@ecajmer.ac.in
46
</div>
</div>
</div>
<?php include("footer.php");?>
CHAPTER 7
TESTING
7.1TESTING OBJECTIVE:Our objective of testing is to find errors and remove them.
7.2 TESTING PRINCIPLES:
All tests should be traceable to both student and department requirements.

Testing should be planned long before testing begins.

The Pareto principle applied to the software testing.

Testing should begin “in the small “ and progress towards testing “in the large”

Exhaustive testing is not possible.

To be most effective, testing should be conducted by an independent third party.
7.3 TESTING METHDOLOGY:Our strategy of software testing may be viewed in the conVarchar of spiral .We started
with Unit Testing at the vertex of the spiral and concentrated on each unit (i.e.
component) of the software as implemented in source code. In this testing we tested for
following:

Interfaces

Local Data Structure

Independent Paths

Boundary Conditions

Error Handling Paths
We followed the WBT techniques for Unit Testing and we performed:
47

Condition Testing

Loop Testing
7.4 REGRESSION TESTING:Each time a new module is added as part of integration testing, the software changes.
New data flow paths are established, new I/O may occur and new control logic is
invoked. These changes may cause problems with the functions that previously worked
flawlessly. Regression testing is the re-execution of some subsets of tests that have
already been conducted to ensure that changes have not propagated unintended side
effects we also moved in the same way. Whenever we combined a unit-tested module
with another module, we again tested both the modules to check them for correct
functionality For example, after unit testing of Administration and Transaction modules
when they combined we tested them again for their whole functionality.
7.5SYSTEM TESTING:Then system testing was conducted. Here the entire software system was tested.
The reference document used for this process was requirement document and the goal
was to see if the software meets its requirements.
System testing includes the thorough testing of the product. System testing is actually
a series of different tests whose primary purpose is to fully exercise the computer based
system. The tests are recovery testing: this checks the recovery of the system when
failure occurs. This is to ensure that there are recovery procedures for error occurrences.
System testing involves unit testing, integration testing, acceptance testing. Careful
planning and scheduling are required to ensure that modules will be available for
integration into the evolving software product when needed. A test plan has the
following steps:
Prepare test plan
Specify conditions for user acceptance testing
Prepare test data for program testing
Prepare test data for transaction path testing
Plan user testing
Compile/Assemble program
48
Prepare job performance aids
Prepare operational documents
.
7.6 INTEGRATION TESTING :Integration testing is a systematic technique for constructing the program structure
while at the same time to uncover errors associated with the interfacing. The objective
is to take the unit tested modules and build a program structure that has-been detected
by designing.
7.7VALIDATION TESTING:Taking other turn outward on the spiral, we encounter a validation testing, where
requirement established as part of software requirement analysis revalidated against the
software that has been constructed. At the culmination of integration testing, software
is completely assembled as a package, interfacing errors have been uncovered and
corrected and final series of software tests –validation testing- may begin. Validation
can be defined in many ways, but a simple definition is that validation succeeds when
software functions in a manner that can be reasonably expected by the customer.
7.8 USABILITY TESTING:The key to usability testing is to study what a user actually does. An observer records
the user’s actions and reactions to determine what types of problems the user encounters
and how he overcomes them. The main steps of usability testing are Identify the
websites’ purpose

Identify the intended users

Define tests and conduct the usability testing.

Analyze the acquired information
7.9 ACCEPTANCE TESTING:It is sometimes performed with realistic data of the client to check whether the software
is working properly. Testing here focuses on the external behavior of the system. The
49
internal logic of the system is not emphasized. The user enters the live data and reports
are tested to their satisfaction.
7.10 NAVIGATION TESTING:Good testing is an essential part of our website, especially those that are complex and
provide a lot of information. Assessing navigation is a major part of usability. Most
users expect the following:

Easy and quick access to the information they want.

Logical hierarchy of pages

Confirmation of where they are at any point.

Facility to return to previous pages or home pages.

Consistent look and layout of every page

Uncluttered pages.
Key issues with navigation testing include:
Moving to and from pages

Scrolling through pages

Clicking on all the images and their thumbnails to ensure that they work

Testing all the links for validity and correctness.

Ensuring no broken links exist.

Viewing table and forms to verify proper layout which can vary under different.

Ensuring compatibility and consistent usage of buttons and mouse actions.
7.11LINK TESTING:As part of navigation testing, the tester must ensure that all links work as expected. This
means:

Following all links presented on a website, including hyperlinked Varchar, Linked
graphics etc.

Verifying that the pages retrieved are the ones that are expected.

Ensuring that all errors are user friendly.
7.12 PAGE CONTENT TESTING:50
Each web page must be tested for correct content from the user perspective. These tests
fall into two categories: Ensuring that each component functions correctly and ensuring
that the content of each is correct.
The testing category includes:
Determining whether the new pages download the same as the prior pages.

Checking whether the new pages rare identical with prior version.

Checking whether vital information is same or different.

Verifying whether links are still correct.
7.13 DATABASE TESTING:Database testing involves some in depth knowledge of the given application and
requires a more defined plan of approach to test the data. The tester must have the ability
to query the database consistently at Specified point in the workflow. Key issues in the
database testing.
Include: 
Data integrity

Data validity (input into database in proper form )

Data manipulation and updates
FEATURES
A tender management system, either manual or electronic, is required to ensure an
effective and efficient process for:
a) the buyer wishing to source products or services and
b) the seller wishing to bid to supply a company.
Managing tenders is very time consuming exercise and a lot of paper work is
involved. Manual systems have some merit but are prone to errors and cannot deal
with growing volumes of tenders to be managed by both buyers and sellers.
51
CONCLUSION
The system has been developed for the given condition and is found working
effectively. The developed system is flexible and changes whenever can be made easy.
Using the facilities and functionalities of .Net, the software has been developed in a
neat and simple manner, thereby reducing the operators work.
The speed and accuracy are maintained in proper way. The user friendly nature of this
software developed in .Net framework is very easy to work with both for the higher
management as well as other employees with little knowledge of computer. The results
obtained were fully satisfactory from the user point of view.
The system was verified with valid as well as invalid data in each manner. the system
is run with an insight into the necessary modifications that may require in the future.
Hence the system can be maintained successfully without much network.
.
REFERENCES & BIBLIOGRAPHY
52
BIBLIOGRAPHY
1. Database System Concepts:- By Abraham Silberscatz, Henry F. Henry & S.
Sudarshan.
2. Software Engineering(6th Edition):- By Roger S. Presman.
3. Head First
REFERENCES
1
www.java/web-forms/books
2. www.w3school.com/
3. en.wikipedia.org/wiki/JAVA
4. http://msdn.microsoft.com/en-us/aa336522
53
Download