CHAPTER 1 INTRODUCTION OF THE PROJECT 1.1 SYSTEM OVERVIEW So what is tender management? In today’s competitive business world, many potential projects and services are put out to tender. That is numerous potential companies are provided with the opportunity to bid for the work. In their bids, they will describe how their company will solve a business problem, provide the service required or supply the goods requested. They will also need to provide a competitive price for this work. The process of designing and writing these proposals or tenders, complete with the competitive pricing, is called tender management, proposal management or bid management. 1.2PURPOSE:A tender management system, either manual or electronic, is required to ensure an effective and efficient process for: a) the buyer wishing to source products or services and b) the seller wishing to bid to supply a company. Managing tenders is very time consuming exercise and a lot of paper work is involved. Manual systems have some merit but are prone to errors and cannot deal with growing volumes of tenders to be managed by both buyers and sellers. 1.3SCOPE & OBJECTIVE OF THE PROJECT:The tender starts when an appropriate Invitation To Tender (ITT) has been identified. The ITT is a formal document that is published by a purchasing company in order to notify other companies that bids for a piece of work, project or service is required. There is always a fixed deadline that the tenders must be returned by and this makes bid management very time dependent. It all adds to the stress of the entire process. What does tender management include? Analyzing the requirements within the ITT. Designing a solution that meets these requirements. Managing the staff that will write the tender. Developing a compelling proposal that will meet the requirements and stand out from other bids. 1 Producing a pricing structure that will win the bid as well as produce a profit by the end of the project. Minimizing risk and maximizing the impact of the tender. Sticking to tight deadlines. Tenders Are Not that Standardised There are standard bid management processes available to manage these activities and one published bid methodology. There are also some computerized systems that will manage the workflow of a tender management process but bid management is nowhere as formalized as project management. This makes experience proposal writers with a history of winning highly sought after. A tender or bid writer manages risk very well and is always organized and able to manage staff within a very highly charged environment. Framework Tender Agreements Such is the popularity of tendering that framework agreement tenders are now being offered. This is where a company tenders to receive a framework agreement that then provides them with the opportunity to tender for future work with the organization. These framework agreements are particularly popular with government tenders and large companies and are often found in information technology and staffing. Tenders can be low level such as a cleaning service or they can be highly prized, such as a bid for a multi-million dollar new computer system but they all have the same structure and processes. They start with the ITT request for bids and end up with a negotiated contract. A good bid manager knows how to manage the process, whilst juggling staff, information overload, searching for missing information and managing time frames. 1.4DEFINING MANAGEMENT:As a company is competing against many other companies that may have the same or better qualities and lower prices, the art of tender management or writing a winning tender is highly skilled. A good tender writer who really knows how to write a bid and who will make the tender stand out from the competitors is highly sought after. 1.5 SYSTEM DEVELOPMENT LIFE CYCLE:- 2 The first step in the Software Development Life Cycle (SDLC) is the preliminary investigation to determine the feasibility of the system. The purpose of the preliminary investigation is to evaluate project requests. It is not a design study nor does it include the collection of details to describe the business system in all aspect. Rather it is the collection of the information that helps committee members to evaluate the merits of the project request and make an informed judgment about the feasibility of the proposed project. The preliminary investigation should accomplish the following objectives. 1. Clarify and understand the project request 2.Determine the size of the project. 3.Assess costs and benefits of alternative approaches. 4.Determine the technical and operational feasibility of alternative approaches 5.Report the findings to management; with recommendations outlining the acceptance or rejection of the proposal. CHAPTER2 PROJECT OVERVIEW 2.1 PROBLEM DEFINATION:An internet based process wherein the complete tendering process; from advertising to receiving and submitting tender-related information are done online. This enables firms to be more efficient as paper-based transactions are reduced or eliminated, facilitating for a more speedy exchange of information. 3 2.2 CURRENT SYSTEM AND OVERVIEW:Presently, in organizations, fee entries are managed manually, wherein a daily report is generated and then it is managed daily, weekly or monthly accordingly, which leads to both time loss and resource loss. Thus, organizations are really concerned about their future prospects and optimizing throughputs are switching from manual Online Tender Management Systems towards technologically more efficient systems. The current system is becoming obsolete and proving to be counter progressive due to its following flaws: Time- consuming. Cumbersome and inaccurate process. Forging. Manual entry problem. Daily report maintenance problem. Less secured Long queue problem. Impossible to know WHO did WHAT, WHERE and WHEN!!!! 2.3USER INTERFACE: The system will be having user privileges based menu. User will have to select the options form thegiven menu. The system will be entering the information into the database to generate The forms will be designed to enter the data. Buttons will be used to insert, retrieve or modify the data. Links will be provided to shift from one form to another. reports. 2.4 MEMORY CONSTRAINTS:No memory constraints are applicable. A normal memory configuration is more than sufficient. Memory required only for students and fee structure details. If data is more than allocated memory thenextra memory should be needed to allocate for the desired database. 4 2.5 PRODUCT FUNCTION:It is advisable to have weekly data backups. The system administrator will do the data recovery. 2.6CONSTRAINTS:2.6.1 GENERAL CONSTRAINTS: 1.This system will not take care of any virus problem, which might occur either on the client’s system. Avoiding the use of pirated software and ensuring that floppies and other removable media are scanned for viruses before use could minimize the possibility of viral infection. 2.Recovery of data after a system crash will be possible only if backups are taken at regular intervals. 3. Manual interfaces cannot be fully avoided. Documented proofs like dates etc. will have to be verified by the concerned staff before entering it into the computerized system. 2.6.2 HARDWARECONSTRAINTS: Constraints of the Internet & Intranet will not be applicable to the system. The performance of the system will be dependent on the database’s conditions like database application, size of data types etc. The primary memory (RAM) and the secondary memory (Hard Disk Space) requirement of the system at the client end will be the same as remains in the operating system. The space required to store the data would increase as more and more records are added to the system. 2.6.3 SECURITYCONSTRAINTS: User will be authenticated by the use of username and passwords. This Provides complete security and the system could not be hacked into as the project is not on the internet. Use of SSL prevents any unauthorized access as all communications are encrypted. Other securities can be added according to need as security is one of the most important issue for any programming language. 5 2.6.4 ASSUMPTION AND DEPENDENCIES: 1. It is assumed that the user is familiar with the basic computer fundamentals. 2. Timely backup of data should be taken to avoid data loss in case of system crash. 3. The use of pirated software should be avoided as it may lead to data loss and systemcrashes due to viral infections. 4. Floppies and other removable media should be scanned for viruses before use. 5. Proper configuration of the client and database server is necessary for the system to function as intended. 6. It is assumed that the maintenance of the database will be assigned to the authorized person only. 7. Only authorized persons will be allowed inside the server room. CHAPTER 3 DEVELOPMENT TOOLS AND LANGUAGES 3.1SPECIFIC REQUIREMENTS 3.1.1 SOFTWARE REQUIREMENT:1. Platform Win XP service pack 3and above 2. Browser Chrome, Firefox, etc 3. SQL Server MY SQL Server 5 Table 3.1:Software Contents 3.1.2 HARDWARE REQUIREMENT:1. Main Processor Core2 Duo 2. Hard-disk Capacity 60 GB 3. RAM 512 MB/1 GB 4. BACKUP MEDIA Hard disk, CD 6 Table 3.2: Hardware Contents Keywords Generic Technology keywords Databases, Programming Specific Technology Keywords MS-SQL server, Core, User Controls Project type keyword Analysis, Design, Implementation, Testing, User Interface 3.2 GENERAL CONSTRAINTS:1. This system will not take care of any virus problem, which might occur either on the client or the server system. Avoiding the use of pirated software and ensuring that floppies and other removable media are scanned for viruses before use could minimize the possibility of viral infection. 2. Recovery of data after a system crash will be possible only if backups are taken at regular intervals. 3. Manual interfaces cannot be fully avoided. Documented proofs like dates etc. will have to be verified by the concerned staff before entering it into the computerized system 3.3 PROJECT PLAN:At the beginning of the project, we scheduled meeting time for the group to discuss on the design and implementation of the software and what language to use in writing the software. We had several meetings to this effect. When then developed a time-line for the project–when we would be releasing the first version for scrutiny and the estimated time we thought we would use for refactoring. We also pondered on a suitable name to give the site. Wecame up with the name “Online Tender Management System”. The group was then divided into two pairs that would work on parts of the code. We kept in touch with each other and whenever we had difficulties, we asked each other questions. On some occasions, we had to pretend we were the student so as to try to figure out some of the things that user would desire, such as the friendliness of the user interface and ease of navigation through the software. 7 When we discovered that we were behind schedule, we met to create a new storage management. We were behind schedule mostly because of our different engagements in college work and other personal issues. Fortunately for the team, we were able to stick to the new storage management and the project was completed in due time. After the major part of the code was completed, we went ahead to lace the code, that is, adding exception handlers which will make the software more robust. We avoided this at the beginning because we did not want to get confused with too many lines of code. The version of the software that has been released can still be improved depending on user response. 3.4 CHOICEOF TOOLSAND TECHNOLOGIES:Technologies and tools are strongly related to the approach of software development. What the tools can or cannot do significantly impact what principles that can be used, as well as what objectives that can be fulfilled. While selection of a particular methodology may imply use of certain tools, the tools themselves often leave significant room for developers to choose how to use them. The selection has therefore been based mainly on the objectives of the project, while the methodologies were selected after the tools were selected, due to the fact that technologies and tools poses certain restrictions of how development can be done. 3.4.1 PHP: PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML. Instead of lots of commands to output HTML (as seen in C or Perl), PHP pages contain HTML with embedded code that does "something" (in this case, output "Hi, I'm a PHP script!"). The PHP code is enclosed in special start and end processing instructions <?php and ?> that allow you to jump into and out of "PHP mode." What distinguishes PHP from something like client-side JavaScript is that the code is executed on the server, generating HTML which is then sent to the client. The client would receive the results of running that script, but would not know what the underlying code was. You can even configure your web server to process all your HTML files with PHP, and then there's really no way that users can tell what you have up your sleeve. 8 The best things in using PHP are that it is extremely simple for a newcomer, but offers many advanced features for a professional programmer. Don't be afraid reading the long list of PHP's features. You can jump in, in a short time, and start writing simple scripts in a few hours. Although PHP's development is focused on server-side scripting, you can do much more with it. Read on, and see more in the What can PHP do? section, or go right to the introductory tutorial if you are only interested in web programming. 3.4.3 MY SQL SERVER 5: MySQL, the most popular Open Source SQL database management system, is developed, distributed, and supported by Oracle Corporation. A database is a structured collection of data. It may be anything from a simple shopping list to a picture gallery or the vast amounts of information in a corporate network. To add, access, and process data stored in a computer database, you need a database management system such as MySQL Server. Since computers are very good at handling large amounts of data, database management systems play a central role in computing, as standalone utilities, or as parts of other applications.. 9 CHAPTER 4 FEASIBILITY A feasibility study is conducted to select the best system that meets performance requirement. This entails an identification description, an evaluation of candidate system and the selection of best system for job. The system required performance is defined by a statement of constraints,the identification of specific system objective and a description of outputs. The key considerations in feasibility analysis are: Economical feasibility Technical Feasibility Operational Feasibility 4.1 ECONOMICAL FEASIBILITY:In making recommendations a study of the economics of the proposed system should be made. The proposed system must be justifiable in terms of cost and benefit, to ensure that the investment in a new/changed system provide a reasonable return. Cost-benefit analysis of information is complicated by the fact that many of the systems cost elements are poorly defined and that benefit can often be highly qualitative and subjective in nature. In our proposed system various costs are evaluated. Even though finding out the costs of the proposed project is difficult we and assume and estimate the costs and benefits as follows. According to the computerized system we propose, the costs can be broken down to two categories. Costs associated with the development of the system. Costs associated with operating the system 4.2 TECHNICAL FEASIBILITY:Based on the outline design of system requirements in terms of inputs, outputs, files, procedures and staff, the technical issues raised during technical feasibility include: Does the necessary technology exist to do what is proposed? Does the proposed equipment have the technical capacity to hold the data required to use in the new system? Adequate responses provided by the proposed system? 10 Is the system flexible enough to facilitate expansion? Is there any technical guarantee of accuracy, reliability, ease of access and data security? The system developer’s task is to view needed capabilities in light of currently available technology. Since the existing system is semi-computerized it is clear to us that there is no efficiency in the use of technology within the organization. The solution is the implementing the new computerized system, which works hand in hand with high technology. A database has to be maintained in order to update and backup data whenever a transaction occurs. To create databases we use SQL server. After taking the above facts into consideration we can state that the new proposed system is technically feasible 4.3 OPERATIONAL FEASIBILITY:A proposed system is beneficial only if it can be turned into an information system that will meet the operational requirements of an organization. A system often fails if it does not fit within existing operations and if users resist the change. Important issues a systems developer must look into are: Will the new system be used if implemented in an organization? Are there major barriers to implementation or is proposed system accepted without destructive resistance? The whole purpose of computerizing the Tender System is to handle the work much more accurately and efficiently with less time consumption. There will be additional work to be completed, because now the contractors can submit their tenders online. Their database is maintained separately. Compared to the semi-computerized system the chances of avoiding errors in a computerized system is much higher because the user need not stress himself unnecessarily resulting in recklessness. Unlike the semi-computerized system there would be backup data for all the information concerning the daily transactions occurred within the organization. If we are considering the performance and response time for each task, it is very much faster since there is less paper work to be completed. When entering data into the system to relieve the user from additional work and typing incorrect data, the system provides options such as combo boxes, check boxes, option buttons and etc. if the users type in incorrect data they would be informed immediately about the error by the error detection control. 11 Another important fact to be regarded is the security control, which is handled by the system. Since data regarding each contractor and the company is confidential, security is a key issue. Information falling into the wrong hands could jeopardize the entire organization. Unlike in semi-computerized systems the proposed system offers adequate control to protect the organization against fraud and embezzlement and guarantees the accuracy and security of data and information. This is handled by the system providing each department and individuals with separate login names and passwords. The new system is more user-friendly, which enables the end-user to complete his/her work efficiently and accurately with interest. After taking the above fact into consideration we can state the operating of the proposed system within the organization is feasible. In this phase of the feasibility study the following two main topics Technical Performance Aspect Acceptance within the organization Technical performance aspect is explained in the technical feasibility report and there is no new information is needed in this to explain it again, but as for the acceptance within the organization the following points are important and those are explained according to the topics This system is developed according to the experience of the current employees and the management structure, so for this system to function within the current employee community. The employees do not need to have new skills other than the skills which are gained in the current system. Job restructuring and training For the new system to have an effect in the organization the employees should be give a proper training in operating the software and computer systems. If the employee does not have the minimal experience should be given the proper training If the organization is reluctant to give a full training to the employees who require the full knowledge organization can restructure the structure of the departments. 12 CHAPTER 5 PURPOSED ONLINE TENDER MANAGEMENT SYSTEM 5.1 INTRODUCTION:System design is the process of developing specifications for a candidate system that meet the criteria established in the system analysis. Major step in system design is the preparation of the input forms and the output reports in a form applicable to the user.The main objective of the system design is to make the system user friendly. System design involves various stages as: Data Entry Data Correction Data Deletion Processing Sorting and Indexing Report Generation System design is the creative act of invention, developing new inputs, a database, offline files, procedures and output for processing business to meet an organization objective. System design builds information gathered during the system analysis. 13 5.2 ARCHITECTURAL DIAGRAMS:- Fig:-5.1 DFD 14 CHAPTER 6 SNAPSHOTS 1. LOGIN FORM: This Form Authenticate the user by asking two information Username: username allocated at registration time Password: Password of the user. After Login,User authorized to perform operation according to the role. Only admin can modify/change this password. 15 2. HOME PAGE: This form contain four informations. Tender news list . Navigation bar. Login. Code: <?php include("header.php"); ?> <?php include("conection.php"); ?> <div class="col-xs-12 col-sm-9 col-md-8 col-lg-8"> <div class="panel panel-default"> <div id="carousel-example-generic" class="carousel slide" data-ride="carousel"> <ol class="carousel-indicators"> <li data-target="#carousel-example-generic" data-slide-to="0" class=""></li> <li data-target="#carousel-example-generic" data-slide-to="1" class=""></li> <li data-target="#carousel-example-generic" data-slide-to="2" class="active"></li> 16 </ol> <div class="carousel-inner"> <div class="item"> <img data-src="img/slide10.jpg" alt="First slide" src="img/slide10.jpg"> </div> <div class="item"> <img data-src="img/slide20.jpg" alt="First slide" src="img/slide20.jpg"> </div> <div class="item active"> <img data-src="img/slide30.jpg" alt="First slide" src="img/slide30.jpg"> </div> </div> <a class="left carousel-control" href="#carousel-example-generic" dataslide="prev"><span class="glyphicon glyphicon-chevron-left"></span></a> <a class="right carousel-control" href="#carousel-example-generic" dataslide="next"><span class="glyphicon glyphicon-chevron-right"></span></a> </div> </div> </div> <div class="col-xs-12 col-sm-3 col-md-4 col-lg-4 "> <div class="panel panel-default"> <div class="panel-heading"> <span class="glyphicon glyphicon-listalt"></span><b>&nbsp; &nbsp;Tenders</b></div> <div class="panel-body"> <div class="row"> <div class="col-xs-12"> <a href='userbiddingdetails.php'><p>Approved Tender List</p></a> <ul class="demo1"> 17 <?php $qsowtender="select * from tender_details where tender_status='1' && DATE(tender_closing_date)>=now() order by tender_closing_date asc"; $resshowtender=mysqli_query($con,$qsowtender); while($rowshowtender=mysqli_fetch_array($resshowtender)) { echo "<li class='news-item'> <table cellpadding='4'> <tr> <td>".$rowshowtender[1]."</td></tr><tr><td>Budget - Rs $rowshowtender[5]</td></tr><tr><td>Closing Date".date_format(date_create($rowshowtender[3]),"d-M-y")."...<a href='tender_details.php?snotender=$rowshowtender[0]'>Read more</a></td> </tr> </table> </li>"; } ?> </ul> </div> </div> </div> <div class="panel-footer"> </div> </div> </div> 18 <?php include("footer.php");?> 3. ScreenShot Of about us Page Code: <?php include("header.php");?> <div class="container"> <div class="col-xs-12 col-sm-12 col-md-12 col-lg-12"> <img src="img/collegehistory.jpg" alt="" class="img-responsive img-thumbnail centerblock"> <div class=" well well-lg"> <p>Engineering College Ajmer was established in the year 1997 under the aegis of Govt. of Rajasthan whose faculty members have had consummate experience in the fields of education, Industry, Engineering and Technology over the years. The College is affiliated to the Rajasthan University and is approved by the All India Council of Technical Education, New Delhi. The College is located at Badliya Chouraha N.H.8, Ajmer 5 Kilometers from Ajmer on the National Highway no 14, providing the right industrial ambience for the budding engineers. 19 No Stone is left unturned to maintain exalted standards in imparting academic and practical skills to the students, so that they become well-rounded engineers with professional expertise and personal integrity when they complete their courses.</p> </div> </div> </div> <br> <br> <br> <?php include ("footer.php");?> 4.ScreenShot Of Admin insert tander Code: 20 <?php include("header.php");?> <?php if(!empty($_SESSION['admin'])) { } else { header("location:index.php"); exit(); } ?> <?php if($_SERVER['REQUEST_METHOD']=="POST") { if(!empty($_POST['tenderinsert'])) { $tender_title=$_POST['tender_title']; $tender_opening_date=$_POST['tender_opening_date']; $tender_closing_date=$_POST['tender_closing_date']; $tender_details=$_POST['tender_details']; $tender_minimum_budget=$_POST['tender_minimum_budget']; if(!empty($_POST['sno'])) { 21 $sno=$_POST['sno']; $qinsertupdate="UPDATE tender_details SET tender_title='$tender_title',tender_opening_date='$tender_opening_date',tender_closing_ date='$tender_closing_date', tender_details='$tender_details',tender_minimum_budget='$tender_minimum_budget' WHERE sno='$sno'"; } else { $qinsertupdate="INSERT INTO tender_details(tender_title,tender_opening_date,tender_closing_date, tender_details,tender_minimum_budget,tender_status,final_rate) VALUES ('$tender_title','$tender_opening_date','$tender_closing_date','$tender_details','$tender_ minimum_budget','1','nill')"; } $res=mysqli_query($con,$qinsertupdate); $_SESSION['tender_saved']="Tender Information Saved Successfully..!"; header("location:insert_tender.php"); exit(); } } ?> <?php if(!empty($_GET['snoedit'])) { $sno=$_GET['snoedit']; 22 $qrow="select * from tender_details where sno='$sno'"; $resrow=mysqli_query($con,$qrow); $rowrow=mysqli_fetch_row($resrow); } ?> <script src="ckeditor/ckeditor.js"></script> <div class="containg"> <div class="col-xs-12 col-sm-8 col-sm-offset-2"> <div class="panel panel-info"> <div class="panel-heading"> <h3 class="panel-title">Tender Add </h3><label style="color:green"> <?php if(!empty($_SESSION['tender_saved'])) { echo $_SESSION['tender_saved']; unset($_SESSION['tender_saved']); } ?></label> </div> <div class="panel-body"> <form action="<?php $_SERVER['PHP_SELF']?>" method="POST" class="formhorizontal" role="form"> <span class="hide"> <?php if(!empty($_GET['snoedit'])) { echo "<input type='text' name='sno' value='$sno'/>"; 23 } ?></span> <div class="form-group"> <legend>Insert Tender details</legend> </div> <div class="form-group"> <div class="col-sm-4"> <label class="control-label">Tender name</label> <input type="text" class="form-control" placeholder="" value="<?php if(!empty($_GET['snoedit'])){echo $rowrow[1];}?>" name="tender_title"> </div> <div class="col-sm-4"> <label class="control-label">Opening date</label> <input type="date" class="form-control" placeholder="" value="<?php if(!empty($_GET['snoedit'])){echo $rowrow[2];}?>" name="tender_opening_date"> </div> <div class="col-sm-4"> <label class="control-label">Closing date</label> <input type="date" class="form-control" placeholder="" value="<?php if(!empty($_GET['snoedit'])){echo $rowrow[3];}?>" name="tender_closing_date"> </div> </div> <div class="col-sm-4"> <label class="control-label">Tender Budget</label> <input type="text" class="form-control" placeholder="" value="<?php if(!empty($_GET['snoedit'])){echo $rowrow[5];}?>" name="tender_minimum_budget"> </div> 24 <div class="form-group"> <div class="col-sm-12"> <label class="control-label">Details</label> <textarea class="form-control" placeholder="" id="tender_detail" name="tender_details"><?php if(!empty($_GET['snoedit'])){echo $rowrow[4];}?></textarea> </div> </div> <div class="form-group"> <div class="col-sm-10 "> <input type="submit" class="btn btn-primary" value="Submit" name="tenderinsert"/> </div> </div> </form> </div> </div> <div class="table-responsive"> <table class="table table-bordered table-hover"> <thead> <tr> <th>Tender name</th> <th>Opening date</th> <th>Closing Date</th> <th>Details</th> <th>Tender Budget</th> <th colspan="2">Action</th> 25 </tr> </thead> <tbody> <?php $qshowtender="select * from tender_details where tender_status='1' order by sno desc"; $resshoqtender=mysqli_query($con,$qshowtender); while($rowshowtender=mysqli_fetch_array($resshoqtender)) { echo "<tr>"; echo "<td>$rowshowtender[1]"; echo "<td>".date_format(date_create($rowshowtender[2]),"d-My"); echo "<td>".date_format(date_create($rowshowtender[3]),"d-My"); echo "<td>".htmlentities($rowshowtender[4]); echo "<td>$rowshowtender[5]"; echo "<td><a href='insert_tender.php?snoedit=$rowshowtender[0]'><input type='button' class='btn btninfo' value='Edit'/></a></td>"; echo "<td><a href='insert_tender.php?snodelete=$rowshowtender[0]'><input type='button' class='btn btn-danger' value='Delete'/></a></td>"; echo "<td>"; } ?> </tbody> </table> </div> 26 </div> </div> <?php include("footer.php");?> <script> CKEDITOR.replace( 'tender_detail', { filebrowserUploadUrl: "upload.php" }); </script> 5.ScreenShot Of Admin view Register user Page Code: <?php include("header.php"); ?> <?php if(!empty($_SESSION['admin'])) { 27 } else { header("location:index.php"); exit(); } ?> <div class="container-fluid"> <div class="col-xs-12 col-sm-12 col-md-12 col-lg-12"> <button class="btn btn-primary" role="button" data-toggle="collapse" href="#collapseExample" aria-expanded="false" aria-controls="collapseExample"> View Register </button> <a href='insert_tender.php'><button class="btn btn-primary" >Tender Add </button></a> <a href='adminbiddingdetails.php'><button class="btn btn-primary" >View Current Bid </button></a> <a href='adminbiddingdetailss.php'><button class="btn btn-primary" >View All Bid </button></a> </div> <section class=" margin-top" style="height:340px"> <div class="col-xs-12 col-sm-12 col-md-12 col-lg-12 collapse" id="collapseExample"> <div class="row margin-top"> <table class="table table-bordered table-hover "> 28 <thead> <tr class="bg-success "> <th>S.no</th> <th>Firm Name</th> <th>Name</th> <th>Contact</th> <th>Email</th> <th>View</th> </tr> </thead> <tbody> <tr> <?php $q="select * from userregister"; $res=mysqli_query($con,$q); while($row=mysqli_fetch_array($res)) { echo "<tr>"; echo "<td>$row[0]"; echo "<td>$row[1]"; echo "<td>$row[3]"; echo "<td>$row[6]"; echo "<td>$row[8]"; echo "<th><a href='view.php?sno=$row[0]'>View</a></th>"; echo "</tr>"; } 29 ?> </tbody> </table> </div> </div> </section> </div> <?php include("footer.php"); ?> 6.ScreenShot Of user view tender Page 30 Code: <?php include("header.php"); ?> <?php if(!empty($_SESSION['admin'])) { } else { header("location:index.php"); exit(); } ?> <div class="container-fluid"> <section class=" margin-top"> <div class="col-xs-12 col-sm-12 col-md-12 col-lg-12 "> <div class="row margin-top"> <table class="table table-bordered table-hover "> <thead> <tr class="bg-info text-info "> 31 <th>S.no</th> <th>Firm Name</th> <th>Name</th> <th>Father Name</th> <th>D.O.B</th> <th>Gender</th> <th>Contact</th> <th>Office Contact</th> <th>Email</th> <th>Address</th> </tr> </thead> <tbody> <tr> <td>1</td> <td>khanbro</td> <td>jamil</td> <td>khan</td> <td>11/2/1989</td> <td>male</td> <td>7737728674</td> <td>01452661333</td> <td>jaml@mdil.com</td> <td>khanpura</td> </tr> 32 </tbody> </table> </div> </div> </section> </div> <?php include("footer.php"); ?> 7.ScreenShot Of User bidding Page Code: <?php include("header.php");?> <?php if(!empty($_SESSION['admin'])) { 33 } else { header("location:index.php"); exit(); } ?> <section class=" margin-top" style="height:340px"> <div class="container"> <input type="button" value="Back" class="btn btn-success" onClick="backk()"> <label style="color:green"><?php if(!empty($_GET['msz'])){ echo $_GET['msz'];}?></label> <form action="<?php $_SERVER['PHP_SELF']?>" class="form-horizontal" method="post"/> <div class="form-group"> <div class="col-sm-4 col-sm-offset-3"> <label>Tender List</label> <select class="form-control" tabindex="3" name="tender_list" required > <option value="">Select</option> <?php $qsowtender="select * from tender_details where tender_status='1' && DATE(tender_closing_date)>=now() order by tender_closing_date asc"; $resshowtender=mysqli_query($con,$qsowtender); while($rowshowtender=mysqli_fetch_array($resshowtender)) { 34 echo "<option value='$rowshowtender[1]'>$rowshowtender[1]</option>"; } ?> </select> </div> <div class="col-sm-1"> <label>Action</label> <input type="submit" name="search_tender" id="login-submit" tabindex="4" class="form-control btn btn-info" value="Show"> </div> </div> </form> <br><br> <div class="col-xs-12 col-sm-10 col-sm-offset-1"> <div class="table-responsive"> <table class="table table-bordered table-hover"> <thead> <tr> <th>Tender Name</th> <th>Firm Name</th> <th>Name</th> <th>Contact</th> <th>Email ID</th> <th>Address</th> 35 <th>Bid Date</th> <th>Bid Price</th> <th></th> </tr> </thead> <tbody> <?php if(!empty($_POST['search_tender'])) { $tender_list=$_POST['tender_list']; $q="select * from bid_details,userregister where bid_details.user_email_id=userregister.email && tender_name='$tender_list'"; $res=mysqli_query($con,$q); echo "<form action='adminbiddingdetails.php' method='post'>"; while($row=mysqli_fetch_row($res)) { echo "<tr>"; echo "<td>$row[1]"; echo "<td>$row[7]"; echo "<td>$row[9]"; echo "<td>$row[12]"; echo "<td>$row[2]"; 36 echo "<td>$row[16]"; echo "<td>".date_format(date_create($row[4]),"d-M-y h:i:a"); echo "<td>Rs $row[3]"; echo "<td><span class='hide'><input type='text' value='$row[3]' name='tender_final'><input type='text' value='$row[0]' name='tender_sno'><input type='text' value='$row[1]' name='tender_name'></span><input type='submit' value='Accept' name='bid_accept' class='btn btn-success'>"; echo "</tr>"; } echo "</form>"; } else if (!empty($_POST['bid_accept'])) { $tender_sno=$_POST['tender_sno']; $tender_name=$_POST['tender_name']; $tender_final=$_POST['tender_final']; $qfirst="update bid_details set bid_status='0' where sno='$tender_sno'"; $resfirst=mysqli_query($con,$qfirst); $qfirst="update tender_details set tender_status='0',final_rate='$tender_final' where tender_title='$tender_name' and tender_status='1'"; $resfirst=mysqli_query($con,$qfirst); header("location:adminbiddingdetails.php?msz=Accept Successfully..!"); exit(); 37 } ?> </tbody> </table> </div> </div> </section> <?php include("footer.php");?><script> function backk() { window.history.back(); } </script> 8.ScreenShot Of Admin view bidding Page 38 Code: <?php include("header.php");?> <?php if(!empty($_GET['snotender'])) { $sno=$_GET['snotender']; $qtender="select * from tender_details where sno='$sno'"; $restender=mysqli_query($con,$qtender); $rowtender=mysqli_fetch_row($restender); $counttender=mysqli_num_rows($restender); } ?> <?php if($_SERVER['REQUEST_METHOD']=="POST") { if(!empty($_POST['bidsubmit'])) { $tender_name=$_POST['tender_name']; $email=$_POST['email']; 39 $user_bid=$_POST['user_bid']; $qinsert="INSERT INTO bid_details(tender_name,user_email_id,bidding_price,bidding_date_time, bid_status) VALUES ('$tender_name','$email','$user_bid',now(),'1')"; $resinsert=mysqli_query($con,$qinsert); echo "<script>alert('Bid Saved Successfully..!')</script>"; } } ?> <div class="containg"> <div class="col-xs-12 col-sm-5 col-sm-offset-4"> <div class="panel panel-info"> <div class="panel-heading"> <h3 class="panel-title">Bidding </h3> <label style="color:green"><?php if(!empty($_SESSION['bid_saved'])){echo $_SESSION['bid_saved'];unset($_SESSION['bid_saved']);}?></label> </div> <div class="panel-body"> <form action="<?php $_SERVER['PHP_SELF']?>" method="POST" class="formhorizontal" role="form"> <div class="form-group"> <div class="col-sm-12"> 40 <label class="control-label">Tender Name </label> <input type="text" class="form-control" value="<?php if($counttender>0){echo $rowtender[1];} ?>" name="tender_name" readonly/> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label class="control-label">Email Address </label> <input type="email" class="form-control" placeholder="Your Email" value="<?php echo $_SESSION['useremail'];?>" name="email" readonly> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label class="control-label">Tender Budget</label> <input type="text" class="form-control" placeholder="" value="<?php if($counttender>0){echo $rowtender[5];} ?>" name="tender_budget" readonly> </div> </div> <div class="form-group"> <div class="col-sm-12"> <label class="control-label">Price</label> <input type="text" class="form-control" placeholder="Your Bid" value="<?php if(!empty($_POST['bidsubmit'])) { echo $user_bid;}?>" name="user_bid"> </div> </div> 41 <div class="form-group"> <div class="col-sm-10 "> <input type="submit" class="btn btn-primary" value="Bid" name="bidsubmit"/> </div> </div> </form> <?php if(!empty($_POST['bidsubmit'])) { header("refresh:1,url=index.php"); exit(); } ?> </div> </div> </div> </div> <?php include("footer.php");?> 9.ScreenShot Of Admin view All bidding Page Code 42 <?php include("header.php"); ?> <?php if(!empty($_SESSION['admin'])) { } else { header("location:index.php"); exit(); } ?> <div class="container-fluid"> <section class=" margin-top" style="height:340px"> <div class="col-xs-12 col-sm-12 col-md-12 col-lg-12 "> <div class="row margin-top"> <table class="table table-bordered table-hover "> <thead> <tr class="bg-info text-info "> <th>S.no</th> 43 <th>Firm Name</th> <th>Name</th> <th>Father Name</th> <th>D.O.B</th> <th>Gender</th> <th>Contact</th> <th>Office Contact</th> <th>Email</th> <th>Address</th> </tr> </thead> <tbody> <?php if(!empty($_GET['sno'])) { $sno=$_GET['sno']; $q="select * from userregister where id='$sno'"; $res=mysqli_query($con,$q); $row=mysqli_fetch_row($res); echo " <tr> <td>$row[0]</td> <td>$row[1]</td> <td>$row[2]</td> <td>$row[3]</td> <td>$row[4]</td> 44 <td>$row[5]</td> <td>$row[6]</td> <td>$row[7]</td> <td>$row[8]</td> <td>$row[10]</td>"; echo "</tr>"; } ?> </tbody> </table> </div> </div> </section> </div> <?php include("footer.php"); ?> 10.ScreenShot Of Contact Us Page 45 Code: <?php include("header.php");?> <div class="containg"> <div class="col-xs-12 col-sm-12 col-md-12 col-lg-12"> <div class="well well-sm "> Contact Us </div> <div class="well well-lg "> <h3>Govt. Engineering College Ajmer</h3> <address>NH-8,Barliya Circle,Ajmer (Rajasthan) Pin code: 305002 </address> <span class="glyphicon glyphicon-phone-alt"></span> +91-0145-267 1801 <br> <span class="glyphicon glyphicon-phone-alt"></span> +91-0145-267 1805 <br> <span class="glyphicon glyphicon-phone-alt"></span> +91-0145-267 1776 <br> <span class="glyphicon glyphicon-phone-alt"></span> +91-0145-267 1773 <br> <span class="glyphicon glyphicon-phone-alt"></span> +91-0145-267 1801 <br> <span class="glyphicon glyphicon-print"></span> +91-0145-267 1801 <br> <span class="glyphicon glyphicon-envelope"></span> principal@ecajmer.ac.in 46 </div> </div> </div> <?php include("footer.php");?> CHAPTER 7 TESTING 7.1TESTING OBJECTIVE:Our objective of testing is to find errors and remove them. 7.2 TESTING PRINCIPLES: All tests should be traceable to both student and department requirements. Testing should be planned long before testing begins. The Pareto principle applied to the software testing. Testing should begin “in the small “ and progress towards testing “in the large” Exhaustive testing is not possible. To be most effective, testing should be conducted by an independent third party. 7.3 TESTING METHDOLOGY:Our strategy of software testing may be viewed in the conVarchar of spiral .We started with Unit Testing at the vertex of the spiral and concentrated on each unit (i.e. component) of the software as implemented in source code. In this testing we tested for following: Interfaces Local Data Structure Independent Paths Boundary Conditions Error Handling Paths We followed the WBT techniques for Unit Testing and we performed: 47 Condition Testing Loop Testing 7.4 REGRESSION TESTING:Each time a new module is added as part of integration testing, the software changes. New data flow paths are established, new I/O may occur and new control logic is invoked. These changes may cause problems with the functions that previously worked flawlessly. Regression testing is the re-execution of some subsets of tests that have already been conducted to ensure that changes have not propagated unintended side effects we also moved in the same way. Whenever we combined a unit-tested module with another module, we again tested both the modules to check them for correct functionality For example, after unit testing of Administration and Transaction modules when they combined we tested them again for their whole functionality. 7.5SYSTEM TESTING:Then system testing was conducted. Here the entire software system was tested. The reference document used for this process was requirement document and the goal was to see if the software meets its requirements. System testing includes the thorough testing of the product. System testing is actually a series of different tests whose primary purpose is to fully exercise the computer based system. The tests are recovery testing: this checks the recovery of the system when failure occurs. This is to ensure that there are recovery procedures for error occurrences. System testing involves unit testing, integration testing, acceptance testing. Careful planning and scheduling are required to ensure that modules will be available for integration into the evolving software product when needed. A test plan has the following steps: Prepare test plan Specify conditions for user acceptance testing Prepare test data for program testing Prepare test data for transaction path testing Plan user testing Compile/Assemble program 48 Prepare job performance aids Prepare operational documents . 7.6 INTEGRATION TESTING :Integration testing is a systematic technique for constructing the program structure while at the same time to uncover errors associated with the interfacing. The objective is to take the unit tested modules and build a program structure that has-been detected by designing. 7.7VALIDATION TESTING:Taking other turn outward on the spiral, we encounter a validation testing, where requirement established as part of software requirement analysis revalidated against the software that has been constructed. At the culmination of integration testing, software is completely assembled as a package, interfacing errors have been uncovered and corrected and final series of software tests –validation testing- may begin. Validation can be defined in many ways, but a simple definition is that validation succeeds when software functions in a manner that can be reasonably expected by the customer. 7.8 USABILITY TESTING:The key to usability testing is to study what a user actually does. An observer records the user’s actions and reactions to determine what types of problems the user encounters and how he overcomes them. The main steps of usability testing are Identify the websites’ purpose Identify the intended users Define tests and conduct the usability testing. Analyze the acquired information 7.9 ACCEPTANCE TESTING:It is sometimes performed with realistic data of the client to check whether the software is working properly. Testing here focuses on the external behavior of the system. The 49 internal logic of the system is not emphasized. The user enters the live data and reports are tested to their satisfaction. 7.10 NAVIGATION TESTING:Good testing is an essential part of our website, especially those that are complex and provide a lot of information. Assessing navigation is a major part of usability. Most users expect the following: Easy and quick access to the information they want. Logical hierarchy of pages Confirmation of where they are at any point. Facility to return to previous pages or home pages. Consistent look and layout of every page Uncluttered pages. Key issues with navigation testing include: Moving to and from pages Scrolling through pages Clicking on all the images and their thumbnails to ensure that they work Testing all the links for validity and correctness. Ensuring no broken links exist. Viewing table and forms to verify proper layout which can vary under different. Ensuring compatibility and consistent usage of buttons and mouse actions. 7.11LINK TESTING:As part of navigation testing, the tester must ensure that all links work as expected. This means: Following all links presented on a website, including hyperlinked Varchar, Linked graphics etc. Verifying that the pages retrieved are the ones that are expected. Ensuring that all errors are user friendly. 7.12 PAGE CONTENT TESTING:50 Each web page must be tested for correct content from the user perspective. These tests fall into two categories: Ensuring that each component functions correctly and ensuring that the content of each is correct. The testing category includes: Determining whether the new pages download the same as the prior pages. Checking whether the new pages rare identical with prior version. Checking whether vital information is same or different. Verifying whether links are still correct. 7.13 DATABASE TESTING:Database testing involves some in depth knowledge of the given application and requires a more defined plan of approach to test the data. The tester must have the ability to query the database consistently at Specified point in the workflow. Key issues in the database testing. Include: Data integrity Data validity (input into database in proper form ) Data manipulation and updates FEATURES A tender management system, either manual or electronic, is required to ensure an effective and efficient process for: a) the buyer wishing to source products or services and b) the seller wishing to bid to supply a company. Managing tenders is very time consuming exercise and a lot of paper work is involved. Manual systems have some merit but are prone to errors and cannot deal with growing volumes of tenders to be managed by both buyers and sellers. 51 CONCLUSION The system has been developed for the given condition and is found working effectively. The developed system is flexible and changes whenever can be made easy. Using the facilities and functionalities of .Net, the software has been developed in a neat and simple manner, thereby reducing the operators work. The speed and accuracy are maintained in proper way. The user friendly nature of this software developed in .Net framework is very easy to work with both for the higher management as well as other employees with little knowledge of computer. The results obtained were fully satisfactory from the user point of view. The system was verified with valid as well as invalid data in each manner. the system is run with an insight into the necessary modifications that may require in the future. Hence the system can be maintained successfully without much network. . REFERENCES & BIBLIOGRAPHY 52 BIBLIOGRAPHY 1. Database System Concepts:- By Abraham Silberscatz, Henry F. Henry & S. Sudarshan. 2. Software Engineering(6th Edition):- By Roger S. Presman. 3. Head First REFERENCES 1 www.java/web-forms/books 2. www.w3school.com/ 3. en.wikipedia.org/wiki/JAVA 4. http://msdn.microsoft.com/en-us/aa336522 53