Inventory Management NIC

Published on March 2017 | Categories: Documents | Downloads: 42 | Comments: 0 | Views: 191
of 104
Download PDF   Embed   Report

Comments

Content

PROJECT REPORT ON WEB BASED INVENTORY CONTROL SYSTEM (GENERAL STORE) FOR NIC , NEW DELHI
SUBMITTED IN PARTIAL FULFILLMENT FOR THE AWARD OF THE DEGREE OF B.TECH (ELEC & COMM.) OF I.A.S.E UNIVERSITY SESSION: 2006

UNDER THE GUIDANCE OF

Mr. A.K. LAL Sln. Grade Lecturer Department of Electronics, B.S.A.I.T.M. College New Delhi-110018

Mr.PAWAN TEJPAL SCIENTIST –‘C’ National Informatics Centre C.G.O. Complex

SUBMITTED BY
Kanwal Singh Roll No: 03138 7th Semester B.TECH(Electronics & Telecomunication)

DEPARTMENT OF ELECTRONICS B.S.A.I.T.M COLLEGE VIKASPURI, NEW DELHI-110018

GOVERNMENT OF INDIA
MINISTRY OF COMMUNICATIONS & INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY

National Informatics Centre
This is to certify that Mr. Kanwal singh Id.N0-9141 a student of B.tech(Elec & Comm) from IASE University has done/is doing his full-semester project training at Ministry of Communications & Information Technology,GENERAL STORE, NIC HQs, New Delhi, from 03.08.2006 to 31.01.2007. The project work entitled “Web Based Inventory Control

System(General Store)” embodies the original work done by his during his above full semester project training period.

Project Guide Head, Training Division

Head of department(HOD)

BABA SAHEB AMBEDKER INSTITUTE OF TECHNOLOGY & MANAGEMENT
DEPARTMENT OF ELECTRONICS & COMPUTER SCIENCE VIKAS PURI, DELHI-110018

CERTIFICATE
This is to certify that Mr. Kanwal singh, a student of 7 th semester,B.Tech(Elec.& Telecomm.),BSAITM Vikas puri,Delhi has carried out the project on “Inventory control system(General Store)” for the NIC- HQs,New Delhi. This project work has been prepared as a fulfillment of the requirement for the degree of B.Tech(Elec. & Telecomm.) to be awarded by I A S E Deemed University, Rajasthan .This work has not been presented earlier for any other academic activity. I wish him all success in life. (A.K.LAL) Professor In charge Department of Elect & Telecomm BSAITM,Vikaspuri,Delhi

Declarations

I do, hereby, declare that the dissertation entitled “Inventory Control System (General Store)” is an authentic work developed by me at Patent Division, National Informatics Centre , New Delhi , under the guidance of Mr. Pawan Tejpal (SSA) and Mr. A.K. LAL (Sln. Grade Lecturer , Vikas Puri , New Delhi) and submitted as a partial fulfillment of the degree of B .Tech (Elec & Comm.) of I.A.S.E University. I also declare that, any or all contents incorporated in this dissertation have not been submitted in any form for the award of any degree or diploma of any other institution or university.

Kanwal Singh 7 th semester , B.Tech (E & C) BSAITM Engineering College Vikas Puri , New Delhi-110018

Acknowledgement
I take this opportunity to express my profound sense of gratitude and respect to all those who helped me throughout the duration of this project. I express my sincere gratitude and thankfulness towards Mr. A.K. Lal , Department of Electronics, of BSAITM, Vikas Puri, Delhi for his valuable time and guidance throughout the B .Tech . I feel privileged to offer my sincere thanks and deep sense of gratitude to Mrs Rachna Srivastava (Technical Director), Training Division , NIC Headquarters and Mr.V. K. Bali (Senior Technical Director) and Mr. Pawan Tejpal (SSA) at Patent Division, C.G.O. Complex, New Delhi, for expressing their confidence in me by letting me work on a project of this magnitude and using latest technologies and providing their support, help & encouragement in completing this project. I am grateful for the co-operation & valuable suggestions rendered by all the staff members of the Patent Division, National Informatics Centre, C.G.O. Complex, New Delhi. I am grateful to all our friends for providing critical feedback & support whenever required. I regret any inadvertent omissions.

Kanwal Singh 7th semester, B.TECH B.S.A.I.T.M. Engineering College Vikas Puri, Delhi110018

Abstract
Project Title
National Informatics Center’s internal website developed in PHP.

: Inventory Control System (General Store) in

Abstract :
The project has been developed to fulfill the requirements of the General Store of National Informatics Center Headquarters. This system provide the online access to NIC’s employee by which they can apply for the issue of the briefcase and for their NOC (no objection certificate) and also this system help to generate the report of the month according to the data or the available balance of the items . This monthly report will update automatically. Every part has been done online. This system help NIC’s employee to know about their due date for the submission of online application. They can apply for the issue of the item according to their requirement one month before of the due date. General store processes all application on quarterly basis. Each application will be sent to their concerned authority and then it will sanctioned after checked the record of the employee. After getting sanctioned from authority the employee get their item from their concerned authority. Employees apply for the next item after a fixed time period. They can apply for the Briefcase (for man) and Ladies bag (for woman). Items are distributed in three categories according to the rank of the officers in NIC. Officer having rank from Programmer to SSA gets the type A item, from PSA to Sr.TD gets the type B and from DDG to DG gets type c of Briefcase/Ladies bag. As we know that our records information are traditionally paper based; they are maintained on paper. And because of that paper based record authority face lots of problem and if record will misplaced then humble of problem has been occurred. So this inventory control system will make the work of authorities bit easy. The current website is hosted at http:/techstore.nic.in as intranic content. Current website is suffering lack of advanced features and archetypes those are not available in the current hosted site. Those features are available in PHP. The work is developed with more

security and powerful advanced features. PHP is a powerful platform that helps in creating featured website and provides a database handling interface that is very easy to use.

An archetype is a framework for developing new content types in PHP. In this insertion of archetypes for the forms will be done. Forms will be generated and submitted into the website. Archetypes provides a simple, extensible framework that can ease both the development and maintenance of content types. Archetypes will include making references, creating new widgets and transforming contents. The Inventory Control System includes the primary data such as employee code and employee name to which the item is provided. The system requires only a few information about the user, which also can be easily submit by the employee and rest of the work is self generated by the system .The monthly updation of data is generated by control system through calculating the issued and received quantities.

Tools & Technologies used :
• • PHP Mysql

• • • •

HTML Apache2 Linux Microsoft Windows 2000

Keywords : PHP, Mysql, HTML, Apache2 and Linux. NIC Division : Patent Division.

.

.

Table of Contents
1. About NIC 2. About Ministry of Communication and Technology

3. Project Overview. 3.1 Introduction. 3.2 Problem Statement. 3.3 Project Description. 3.4 Component Assigned. 4. Technology Used 4.1 4.2 4.3 4.4 5 System Architecture. Hardware Software Software Description

System Study and Analysis 5.1 5.2 Existing System Proposed System 5.2.1 5.2.2 5.2.3 5.3 5.3.1 5.3.2 5.3.3 5.4 Objective of Proposed System Advantage of Proposed System Scope of Proposed System Economic Feasibility Technical Feasibility Behavioural Feasibility

Feasibility Study

SRS of the Component.

5.5

Design of the Component 5.5.1 5.5.2 Functional Decomposition Diagram (FDD). Data Flow Diagram (DFD).

6

System Design 6.1 Database Design

6.1.1 6.1.2

Table Design Data Dictionary

7 8

Physical File Description Implementation & Testing 8.1 8.2 System Testing System Implementation.

9

Conclusion

10 Annexure 10.1 Screenshots 10.2 Bibliography

1. About NIC :National Informatics Center (NIC) of the Department of Information Technology is providing network backbone and e-Governance support to Central Government, State Governments, UT Administrations, Districts and other Government bodies. It offers a wide range of ICT services including Nationwide Communication Network for decentralized planning, improvement in Government services and wider transparency of national and local Governments. NIC assists in implementing Information Technology Projects, in close collaboration with Central and State Governments, in the

areas of (a) Centrally sponsored schemes and Central sector schemes, (b) State sector and State sponsored projects, and (c) District Administration sponsored projects. NIC endeavors to ensure that the latest technology in all areas of IT is available to its users. NIC Headquarters is based in New Delhi. At NIC Headquarters, a large number of Application Divisions exist which provide total Informatics Support to the Ministries and Departments of the Central Government. NIC computer cells are located in almost all the Ministry Bhawans of the Central Government and Apex Offices including the Prime Minister’s Office, the Rashtrapati Bhawan and the Parliament House. Apart from this, NIC has various Resource Divisions at the Headquarters which specialize into different areas of IT and facilitate the Application Divisions as well as other NIC Centres in providing state-of-the-art services to the Govt. At the State level, NICs State/UTs Units provide informatics support to their respective State Government and at the District level lie the NIC District Informatics Offices. NIC has conceptualized, developed and implemented a very large number of projects for various Central and State Government Ministries, Departments and Organizations. Many of these projects are continuing projects being carried out by various divisions of NIC at New Delhi Headquarters and State/District centers throughout the country. Some of the most important note worthy projects, which offer a glimpse of the multifaceted, diverse activities of NIC, touching upon all spheres of e-governance and thereby influencing the lives of millions of citizens of India are given below : Agricultural Marketing Information Network (AGMARKNET)

Central Passport System Community Information Centers (CICs) Computerized Rural Information Systems Project (CRISP) Court Information System (COURTIS) Department of Agriculture Network (DACNET) Examination Results Portal India Image Land Records Information System (LRIS) National Hazardous Waste Information System (NHWIS) Public Grievance Redress and Monitoring System (PGRAMS) Spatial Data Infrastructure (SDI) Training Video Conferencing Web Site of NIC http://indiaimage.nic.in/

2. About Ministry of Communication and Information Technology :The Ministry of Communication and Information Technology,

through the mass communication media consisting of radio, television, films, the press, publications, advertising and traditional mode of dance and drama plays a significant part in helping the people to have access to free flow of information. It also caters to the dissemination of knowledge and entertainment to all sections of society, striking a careful balance between public interest and commercial needs, in its delivery of services. Ministry of Information & Broadcasting is the apex body for formulation and administration of the rules and regulations and laws relating to information, broadcasting, the press and films. This Ministry is responsible for international co-operation in the field of mass media, films and broadcasting and interacts with its foreign counterparts on behalf of Government of India.

3 Project Overview
3.1 Introduction to Inventory Control System
Inventory control system is the system for the NIC’s Headquarter. The Authority of the General store of the NIC Headquarter will be used this system for the better performance of the work. This system will provide the online facilities for the employees of the NIC and also for the Administrator. Features of the systems are:1. 2. 3. 4. 5. 6. Online request can form check for the issue date of for items the (briefcase/ladies bag) or for the NOC. Employees their due application. Issue of the items (briefcase/ladies bag) Generate the NOC for the employees. Employees can check their application(request) status. Monthly generation of the report.

3.2 Problem Statement
The problem definition for the system is to launching the online system for the inventory of General store of National Informatics Centre (NIC) at C.G.O. Complex, New Delhi. The objective of the project is to setting up of an on-line enquiry system about the status of the availability of the Briefcase(Men)/Ladies bag(Women) along with the facility to apply online and also to automate the issuing procedure.

3.3 Project Description
Managing all the applying request for the Briefcase(Men)/Ladies bag(Women) at the General store of National Informatics Centre (NIC) at C.G.O. Complex, New Delhi. The retrieval of the status of various request at various times is generally a cumbersome process and not very desirable. The user i.e. the employee who wants to apply the item to complete all the formalities which is a very time consuming process. Also maintaining all the records of the details on paper or traditional diaries is incompatible with this age of machines and computers. It is proposed that a software system "Inventory control system for General store(NIC)" may be developed to nurture the needs of an individual employee so that he can easily access to the system and check for availability of the items and also apply while sitting at his office. This software is also developed to nurture the needs of the management of the general store for managing the details of the request and the transaction occurs against the respective details .The concentration will be on highlighting the events starting from the Filing of the Application form by the employee (user), Approval of the application by the administrator, Providing the information about the status to the employee (user) so he/she can fulfill the necessary requirement for the item, resulting in a final issue of items. A major component of the online system is the searching of the available dates and submission of the application form for issue online over the Intranet. This will enable the individual or the employee to check for the available date and apply his request just by sitting at their sits at various times. This software system will help in automating all the processes required

for item issuing. These processes are like filling the application form and submitting it, Checking the application form by the administrator for it’s validity for approval, Retrieval of all the approved request to check if all the formalities are fulfilled for final process and also the process required for the report generation of the item issued. Any employee can obtain the information regarding the status through the query system made in the software.

This system help NIC’s employee to know about their due date for the submission of online application. They can apply for the issue of the item according to their requirement one month before of the due date. General store processes all application on quarterly basis. Each application will be sent to their concerned authority and then it will sanctioned after checked the record of the employee. After getting sanctioned from authority the employee get their item from their concerned authority. Employees apply for the next item after a fixed time period. They can apply for the Briefcase (for man) and Ladies bag (for woman). Items are distributed in three categories according to the rank of the officers in NIC. Officer having rank from Programmer to SSA gets the type A item, from PSA to Sr.TD gets the type B and from DDG to DG gets type c of Briefcase/Ladies bag As we know that our records information are traditionally paper based; they are maintained on paper. And because of that paper based record authority face lots of problem and if record will misplaced then humble of problem has been occurred. So this inventory control system will make the work of authorities bit easy. The current website is hosted at http:/techstore.nic.in as intranic content. Current website is suffering lack of advanced features and archetypes those are not available in the current hosted site. Those

features are available in PHP. The work is developed with more security and powerful advanced features. PHP is a powerful platform that helps in creating featured website and provides a database handling interface that is very easy to use.

An archetype is a framework for developing new content types in PHP. In this insertion of archetypes for the forms will be done. Forms will be generated and submitted into the website. Archetypes provides a simple, extensible framework that can ease both the development and maintenance of content types. Archetypes will include making references, creating new widgets and transforming contents. The Inventory Control System includes the primary data such as employee code and employee name to which the item is provided. The system requires only a few information about the user, which also can be easily submit by the employee and rest of the work is self generated by the system .The monthly updation of data is generated by control system through calculating the issued and received quantities

3.4 Component Assigned
The components assigned are the modules by which employee (user) can send their information to the database, and the administrator can retrieve it from the database. Main components assigned are: • • Searching of available dates of the items by the employee (user). Employee (user) application for the item (Briefcase/Ladies bag).

• • • • •

Checking of the application form by the administrator for approval. Applying for item by the administrator on behalf of the employee . Issue against approved application by the administrator. Generation of NOC for the Ladies bag. Report generation

Description of Components
Searching of available dates of the items
In this process the user has to provide the employee code and designation code for which the item is to be issued.

User application for the issue of item
In this process the user has to fill up the application form for the issue of the item (Briefcase/Ladies bag).All the data are kept in the database. After submitting application form the user will get massage regarding the request submitting in the database . The user can query about the status of their request using the intranic website.

Checking of the application form by the administrator for approval.
In this process the administrator will checks application forms from the list of newly arrived application list. After selecting the application from the list the administrator will get the details of the application. The

administrator then checks the details and after checking he will approve or reject the application according to the validity of the details.

Applying for issue by the administrator on behalf of the employee.
This process provides the facility of applying for the application like user to the administrator. The process of applying by the administrator is different from the user application as in this case the application form is already approved at the time of submitting the application.

Issue

against

approved

application

by

the

administrator
In this process the administrator will get the list of applications. Administrator then approved the application after check the record of the applicant(employee).Administrator check all the condition and dates of the respective applicant’s record. If the user has fulfilled all the necessary requirements then the administrator will issue the item(briefcase/laies bag) against the user request. This process changes the user request status from the approved request to the issued request in the database.

Generation of NOC Ladies bag
In this process the user have to fill the application form if user want to sent the application for the noc generation. User have to fill all the

desired field in the form along with the bill of purchase then after submission of the form Administrator got a request form in favour of the noc . Then administrator carfully check the records ,form of the user along with bill. If the user has fulfilled all the necessary requirements then the administrator will generate the NOC for ladies bag against the user request.

Report Generation
In this process the administrator provides the month and the category of the report generation. This category includes individual and combined report of the General store’s item(briefcase/ladies bag) availability for the selected month and also the receipt during the month and issue during the month along with balance of the items with respect to the code.

4 Technology Used
4.1 System Archietecture:
The system we have developed is mainly a web based system. The three-tier architecture is followed in the development of the system. A three tier architecture has three separate components: a client, an application server and a database server. In implementing a three tier architecture the number of choices is more than the traditional client server architecture. The communication protocol used to communicate between the client and the application server can be different from that used to communicate between the application server and the

database

server.

The

workload

distribution

among

the

three

components can vary widely across applications. Most web-enabled database relies on a three-tier model. Typically, an existing database server is made available for web-based access. To make the database available, the server must be accessible via an external network. To provide this network access, a second server is commonly used as a firewall, restricting the kinds of commands that can be passed to the database server. The application server can act as a firewall.

Request CLIENT Reply APPLICATION SERVER

Command DATABASE SERVER Result

The above figure shows one possible configuration for a web enabled system. The client is a computer with access to the Internet, running a browser. The client communicates with the application server via the Hypertext Transfer Protocol(HTTP). The application server in turn executes commands against the database, formats the result in Hypertext Markup Language(HTML), and return the result to the client. In this configuration, the application server provides authentication services (to make sure the client is allowed to initiate the request), database connection service, and application processing service. The client’s role is to initiate the request and display the result returned, while the database serves as the repository for the data

4.2 Hardware :Processor Main Memory Hard Disk Disk Space Floppy Disk Drive Keyboard Mouse Monitor CD ROM Drive : : : : : : : : : 1.70 GHz and Above 512 MB. 20 GB. 100 MB. 1.44 MB. ANY ANY ANY 52x Samsung CD ROM

4.3 Software :-

Operating System Software Data Base

:

Windows or LINUX

:

PHP , JAVASCRIPT , HTML

:

MYSQL

4.4 Software Description :PHP:Introduction
PHP is a server-side scripting language for creating dynamic Web pages. You create pages with PHP and HTML. When a visitor opens the page, the server processes the PHP commands and then sends the results to the visitor's browser, just as with ASP or ColdFusion. Unlike ASP or ColdFusion, however, PHP is Open Source and crossplatform. PHP runs on Windows NT and many Unix versions, and it can be built as an Apache module and as a binary that can run as a CGI. When built as an Apache module, PHP is especially lightweight and speedy. Without any process creation overhead, it can return results quickly, but it doesn't require the tuning of mod_perl to keep your server's memory image small. In addition to manipulating the content of your pages, PHP can also send HTTP headers. You can set cookies, manage authentication,

and redirect users. It offers excellent connectivity to many databases (and ODBC), and integration with various external libraries that let you do everything from generating PDF documents to parsing XML. PHP goes right into your Web pages, so there's no need for a special development environment or IDE. You start a block of PHP code with <?php and end it with ?>. (You can also configure PHP to use ASPstyle <% %> tags or even <SCRIPT LANGUAGE="php"></SCRIPT>.) The PHP engine processes everything between those tags. PHP's language syntax is similar to C's and Perl's. You don't have to declare variables before you use them, and it's easy to create arrays and hashes (associative arrays). PHP even has some rudimentary object-oriented features, providing a helpful way to organize and encapsulate your code. Although PHP runs fastest embedded in Apache, there are instructions on the PHP Web site for seamless setup with Microsoft IIS and Netscape Enterprise Server. If you don't already have a copy of PHP, you can download it at the official Web site. You'll also find a manual that documents all of PHP's functions and features.

Process Benefits
Manage our content from anywhere
We can access all our information from a normal web browser - PHP is viewable in all kinds of browsers, even mobile phone browsers.

This means that we can manage our intranet and public web site from a web browser anywhere in the worlds.

Live editing
The web site is updated from within the site itself - no specialized tools are needed, just a web browser. It even works with older browser, so even if our organization does not use the latest in web technology, PHP is still usable.

Designed by usability professionals
Because much care and thought has gone into the interface, employees will be able to utilize it with minimal training. PHP use the standard paradigms for working with and controlling content.

Limited use of graphics
A main goal is minimal use of graphics - adding to the content instead of detracting from it, focusing on the information - not irrelevant elements.

Facilities collaboration
When editing and publishing the content, we can assign other participants local roles within projects. PHP also supports versioning and staging of contents.

Easy management and configuration
The administration and configuration of PHP is done through the web, and no access to the files system is needed after the system is set up. This makes for a very secure system.

Single sign-on
PHP has a centralized sign-on mechanism, which prevents users from having to log on to each area separately. Security is controlled centrally. It is also easily integrated with the existing user authentication mechanisms in the company - be it LDAP, Active Directory, Novell, Windows, UNIX/Linux or other database-based authentication system.

Accessibility
Special care has been taken to let the web design adjust flexibly to users with impaired eyesight and/or motor skill challenges.

CREATE YOUR OWN COMMANDS
Because PHP scripts sit inside HTML documents, you don't need a special editor to create pages. You do need to be running on a server that supports PHP, however. If you run your own server, this is easy enough to do. If an ISP serves your pages, contact your ISP's support team and ask that they install PHP for you.

Powerful pluggable workflow system
PHP has built-in support for administrative workflow and approval mechanisms. It

supports both action-based and entity-based workflow paradigms and has a pluggable architecture to allow us to plug in our own workflow systems, if required.

Modular, components

easy

to

expand,

reusable

Both the programmatic logic and the user interface construction can be reused extensively in our custom projects, which means that we both get code reuse and a consistent look across different parts of the application.

SQL connectivity
we can connect PHP to any relational database. All the major database are supported - both commercial ( Oracle, MS SQL, SAP, Interbase, etc ) and open source ( PostgresSQL, MySQL, etc).

Easy to create new content types
By re purposing existing content types, we can easily generate our own custom content types without any programming skills, and if we want to write richer content types with advanced behaviors, we can do this with the Archetypes add-on.

Fully indexed, powerful search engine

All content in PHP is indexed and searchable. It also supports pluggable stemming and splitter options, which enables useful searching in languages like Japanese, Chinese and Korean.

Activation date and expiration dates
Every content item has attributes that control its lifespan, and ensures that the content is posted and retired on time.

Topics and Topic Map technologies
To enable efficient aggregation of content, we can use using hierarchical topic systems to help us grow the knowledge in the system while maintaining structure and control.

Javascript :Javascript Introduction
Javascript is a technique for manipulating HTML documents in the browser. This is often called client-side scripting. It allows the page author to incoporate facilities such as buttons that change in appearance when you move the mouse over them and menus that expand. It also provides facilities to manipulate the browser window in various interesting ways. It is used by incorporating programmes in parts of HTML pages known as scripts. Browsers must include Javascript interpreters. It should

be noted that Javascript has nothing whatsoever to do with the Java programming language.

History
Javascript was first implemented in version 2 of Netscape Navigator (as Netscape's browser is properly called) released in 1995. Micro$oft produced an implementation of its own called JScript that first appeared in version 3 of Internet Explorer. There have been a few attempts to make Javascript usable by servers as well as browsers, most notably by various Netscape servers, but server-side scripting is far more normally done using languages such as PHP, perl or Micro$oft's ASP/VB Script. MicroSoft have also introduced another client-side scripting language called VBScript which is a derivative of Visual Basic. It is rarely used client-side in practice although it is very widely used server-side and forms the basis of most ASP server-side scripting.

Basic Model
A browser that supports Javascript operates in five phases. 1. Obtain the page (document) from the Internet 2. Build an internal model of the document 3. Modify the model in response to detected local events 4. Extract the HTML from the model 5. Render the model

Local events are generated by the browser user moving the mouse, clicking in various places or using the keyboard. The document includes the complete browser window and Javascript can modify various window properties and can even create new windows. The document object model (DOM) is a hierarchical structure that contains object-like representations of the various elements within an HTML document, it also includes a number of objects such as "window" and "navigator" that relate to the general enviornment. The components of the DOM are often called nodes, where they correspond to HTML elements, their properties correspond to the attributes associated with the elements. Javascript (in more recent versions) provides facilities for accessing and changing the properties of almost all the nodes (or objects) in the DOM. As well as properties corresponding to the attributes of HTML elements the DOM also includes text nodes and these are also

alterable. It is also possible to insert and delete nodes into/from the DOM. An HTML element can be specifically identified (labelled) to the DOM and DOM aware software by the use of the id attribute. Certain elements (form, input, select, textarea, img, a and frame) can also be identified by the name attribute although this is discouraged in modern practice.

Debugging
Use of Javascript involves developing programmes. This is, inevitably, an error prone process and readers who have tried some of the exercises on server side scripting will have come to appreciate that debugging scripts can be tricky. A faulty Javascript programme often simply results in a WWW page in which hoped for effects simply and silently don't happen. Better browsers provide some assistance, under Mozilla Tools -> Web
Devlopment -> JavaScript Console

activates the Javascript console in a

separate window. This gives moderately helpful messages when something goes wrong. It is particularly useful for spotting mistyped method names. Mozilla also comes with a fully featured Javascript debugger. This is powerful but, like many debuggers, not the easiest of tools for the casual user. Another useful tool built in to Mozilla is the DOM inspector which allows the user to explore the DOM associated with a WWW page. This is available via Tools -> Web Development -> DOM Inspector. Oddly when you

launch it doesn't start with the current page, you have to enter a URL into the DOM inspector location bar.



JavaScript gives HTML designers a programming tool –

HTML authors are normally not programmers, but JavaScript is a scripting language with a very simple syntax! Almost anyone can put small "snippets" of code into their HTML pages .


JavaScript can put dynamic text into an HTML page –

A JavaScript statement like this: document.write("<h1>" + name + "</h1>") can write a variable text into an HTML page .


JavaScript can react to events –

A JavaScript can be set to execute when something happens, like when a page has finished loading or when a user clicks on an HTML element.


JavaScript can read and write HTML elements –

A JavaScript can read and change the content of an HTML element.


JavaScript can be used to validate data –
A JavaScript can be used to validate form data before it

is submitted to a server. This saves the server from extra processing


JavaScript can be used to detect the visitor's browser –
A JavaScript can be used to detect the visitor's browser, and - depending on the browser - load another page specifically designed for that browser



JavaScript can be used to create cookies –
A JavaScript can be used to store and retrieve information on the visitor's computer.

Usable Javascript :
The usability of a Web page is often determined by a good information architecture, clear and intuitive visual design and well designed functionality. One of the main arguments to enhance your markup using unobtrusive JavaScript is to improve the usability of a Web page by supporting these usability attributes. If you add JavaScript and don't enhance the usability of a Web page, you should rethink if you should apply it at all.

Easy applicable JavaScript :
Unobtrusive scripting bridges the gap between 'designers' and 'coders'. There is a big group of people in today's industry that does know how to write (X)HTML and CSS but doesn't feel very comfortable with the DOM and JavaScript. Unobtrusive behavior introduced a mechanism to easily apply small portable scripts to a Web page: "Just make sure your markup looks like A, include this script B, and as a result you have a page that can do C". Try to create small pieces of independent code. The disadvantages of a lot of existing JavaScript code libraries are that you often have to include a lot more code than you really need and that they are harder to understand and maintain if you didn't create them yourself. Because the functions in these libraries are often grouped and reused by other scripts, it often feels like they are spaghetti-coded. A library with small unobtrusive scripts has the advantage of being light-weight, easy to be understood and easy to be adjusted for more specific implementations. Create reusable code. If you find yourself duplicating code snippets, create functions. If you find yourself duplicating similar code snippets, try to abstract your code to the level that you can reuse it for multiple purposes. Document your code well. If you work together with other people, like to share your code with others, or still want to know why you did certain things one year from now, good documentation is key.

Benefits of JavaScript
Using JavaScript, you can accomplish a variety of tasks at the client side without interacting with a Web server. The following sections list a few tasks that you can accomplish with JavaScript.

Client-Side Data Validation
JavaScript is ideal for validating user input and making sure that data entered by users is valid. Prior to client-side scripting languages such as JavaScript, when a user filled in a form with information, it had to be sent to the server to be processed via a CGI script to validate user input. This process was time-consuming and a waste of network and Web server resources. A better way of handling this process would be to set up a JavaScript application to check user input before it is submitted to a Web server for processing.

Managing Browser Objects
You can easily manipulate various browser objects with JavaScript. When a user moves the mouse pointer over a hypertext link, for example, you can use JavaScript to display the URL's description on the status bar of the browser. Later in this chapter, you learn how easy it is to use JavaScript to display messages on the status bar of Web browsers.

Conserving Bandwidth
Although some people might argue that JavaScript-enhanced pages take up more bandwidth, this is not really the case if JavaScript is used intelligently to conserve bandwidth. Before invalid data in a form is sent to a Web server for processing, for example, JavaScript can validate the data.

Conserving Resources of the Web Server
JavaScript supports distributed processing by enabling various tasks to be performed on the client rather than on the server. Although you can perform various tasks using CGI programs, a client-side scripting

language such as JavaScript is ideal for performing simple operations that do not require access to information on a remote server.

HTML:-

Introduction to HTML
HTML, or Hyper Text Markup Language is designed to specify the logical organisation of a document, with important hypertext extensions. It is not designed to be the language of a WYSIWYG word processor such as Word or WordPerfect. This choice was made because the same HTML document may be viewed by many different "browsers", of very different abilities. Thus, for example, HTML allows you to mark selections of text as titles or paragraphs, and then leaves the interpretation of these marked elements up to the browser. For example one browser may indent the beginning of a paragraph, while another may only leave a blank line. HTML instructions divide the text of a document into blocks called elements. These can be divided into two broad categories -- those that define how the BODY of the document is to be displayed by the browser, and those that define information `about' the document, such as the title or relationships to other documents. The vocabulary of these elements and a description of the overall design of HTML documents is given in the rest of Section 2. The Last part of the section also describes standard naming schemes for HTML documents and related files.

The detailed rules for HTML (the names of the tags/elements, how they can be used) are defined using another language known as the standard generalized markup language, or SGML. SGML is wickedly difficult, and was designed for massive document collections, such as repair manuals for F-16 fighters, or maintenance plans for nuclear submarines. Fortunately, HTML is much simpler! However, SGML has useful features that HTML lacks. For this reason, markup language and software experts have developed a new language, called XML (the eXtensible markup language) which has most of the most useful features of HTML and SGML.

Benefits of HTML
The major benefit of HTML is that you can synchronize between a wide array of element types. Using HTML, you can create Web presentations with synchronized text, images, audio, video, and streaming media. Your presentations can be both timed and interactive. The timing capability is achieved by HTML’s ability to sequence events according to the programmed schedule. The interactivity capability stems from HTML's support of events and event handling. Another advantage of HTML is its ease of use. In order to add timing effects to your page, all you need to do is add HTML attributes to existing HTML elements. Without HTML specifications, every element appears immediately when the page loads, and remains displayed indefinitely. HTML attributes let you specify when an element appears, how long it stays, and how other elements are affected. In addition to the attributes, you can use the AUDIO or VIDEO element to specify when the media should start, stop, and how many times it should

repeat. These media elements have been enhanced to become XMLbased, supporting HTML methods and properties. You can apply HTML attributes to a group of HTML elements. In this way, you can manipulate multiple elements at once. You can instruct a group to appear at a certain time, stay for given period, and repeat itself for a specified number of times. You can even specify a relationship between members of a group. They can appear and disappear sequentially on the page, or they can do it independently of each other. You can take advantage of HTML with or without scripting knowledge. For those (few?) of you that like to avoid scripting, you can just add HTML attributes to your favorite HTML elements, thus making your pages more dynamic. However, HTML supports a complete object model that extends the existing DHTML Object Model. This model provides a complete set of properties, methods, and events to add even more interactive features to your Web site.

Disadvantage of HTML
HTML browsers are incapable of scaling (zooming or resizing) pages – except for the Opera browser, which is only one we know of capable of scaling pages. When using smaller monitors and lower resolution, one of the most important disadvantages of HTML will fully apply: browsers cannot scale HTML pages that means a zooming, a proportional changing of the presented size of a page is technically impossible. That means that a page can only be shown in one original format and that any change of the page size impossible. Here, browsers are clearly inferior to any word processing or DTP software. This is (not the only) important

disadvantage of HTML, of which most people are not even aware when using internet browser on the daily basis.

No vertical text possible in HTML
Unfortunately, HTML is incapable of presenting vertical text, which is not a problem for DTP programs nor for PDF. Therefore, Clickcathas to convert vertical text to bitmap graphics so that they can be properly used in HTML

Microsoft SQI Server 2000 Features of SQL Server 2000
Microsoft SQL Server 2000 features include:


Internet Integration.
The SQL Server 2000 database engine includes integrated XML support. It also has the scalability, availability, and security features required to operate as the data storage component of the largest Web sites. The SQL Server 2000 programming model is integrated with the Windows DNA architecture for developing Web applications, and SQL Server 2000 supports features such as English Query and the Microsoft Search Service to incorporate user-friendly queries and powerful search capabilities in Web applications.



Scalability and Availability.
The same database engine can be used across platforms ranging from laptop computers running Microsoft Windows® 98 through large, multiprocessor servers running Microsoft Windows 2000 Data Center Edition. SQL Server 2000 Enterprise Edition supports features such as federated servers, indexed views, and large memory support that allow it to scale to the performance levels required by the largest Web sites.



Enterprise-Level Database Features.
The SQL Server 2000 relational database engine supports the features required to support demanding data processing environments. The database engine protects data integrity while minimizing the overhead of managing thousands of users concurrently modifying the database. SQL Server 2000 distributed queries allow you to reference data from multiple sources as if it were a part of a SQL Server 2000 database, while at the same time, the distributed transaction support protects the integrity of any updates of the distributed data. Replication allows you to also maintain multiple copies of data, while ensuring that the separate copies remain synchronized. You can replicate a set of data to multiple, mobile, disconnected users, have them work autonomously, and then merge their modifications back to the publisher.



Ease of installation, deployment, and use.
SQL Server 2000 includes a set of administrative and development tools that improve upon the process of installing, deploying, managing, and using SQL Server across several sites.

SQL Server 2000 also supports a standards-based programming model integrated with the Windows DNA, making the use of SQL Server databases and data warehouses a seamless part of building powerful and scalable systems. These features allow you to rapidly deliver SQL Server applications that customers can implement with a minimum of installation and administrative overhead.


Data warehousing.
SQL Server 2000 includes tools for extracting and analyzing summary data for online analytical processing. SQL Server also includes tools for visually designing databases and analyzing data using English-based questions.

SQL Server Enterprise Manager
Microsoft Management Console (MMC) is a tool that presents a common interface for managing different server applications in a Microsoft Windows network. Server applications provide a component called an MMC snap-in that presents MMC users with a user interface for managing the server application. SQL Server Enterprise Manager is the Microsoft SQL Server™ MMC snap-in. SQL Server Enterprise Manager is the primary administrative tool for SQL Server and provides an MMC-compliant user interface that allows users to:
• • •

Define groups of SQL Server instances. Register individual servers in a group. Configure all SQL Server options for each registered server.



Create and administer all SQL Server databases, objects, logins, users, and permissions in each registered server.



Define and execute all SQL Server administrative tasks on each registered server.



Design and test SQL statements, batches, and scripts interactively by invoking SQL Query Analyzer.



Invoke the various wizards defined for SQL Server.

Overview of the SQL Server Tools
Microsoft SQL Server 2000 includes many graphical and command prompt utilities that allow users, programmers, and administrators to:
• • • • • •

Administer and configure SQL Server. Determine the catalog information in a copy of SQL Server. Design and test queries for retrieving data. Copy, import, export, and transform data. Provide diagnostic information. Start and stop SQL Server.

In addition to these utilities, SQL Server contains several wizards to walk administrators and programmers through the steps needed to perform more complex administrative tasks.

5. System Study and Analysis

5.1 Existing System:
The management of the Inventory control system of General store of NIC HQ’s is currently following a manual procedure. The user has to check the availability of the required item by querying to the management. The management has to check the availability from the register manually. After getting the availability status the user has to fill up the application form manually. The management then checks the validity of the application form and after checking it books the item against the respective request. The information about the item is kept in a temporary register. When the user submits all the necessary document , the administrator enters the details of the request in the main register of item details.

Drawbacks of the existing system
The whole process is carried out in a manual order. Since it’s a manual system it has the drawbacks such as time consumption, inefficient resource utilization. Some of the drawbacks of the current system are 1.The Emplyoyee has to collect the request form by hand from the General store. This consumes a valuable amount of time of the employee. 2.Every time a employee queries about the availability of the item the management check their register, which is also time consuming. 3.Some of the items, which are not issued by the General store can be purchase

by the employee from any other shops as per their requirements.This type of procedure requires the NOC from the General store of NIC .

5.2 Proposed System:
Proposed System
From earlier system the employees have to keep in touch with the General store’s management about the availability of the items .Now this system is the part of intranic website .The proposed system is a web based online system. The user can apply online from any place and also at any time. The main base of the proposed system is the database, which keeps all the information about the availability status of the items i.e. briefcase (men) and ladies bag(women). Based on this information the user can easily get the availability status at any time without coming to the General store. The software also allows user to fill up the application form and submit it online which will save a lot of user’s valuable time. Along with the availability status the database also keeps the information of the Issue details and the transaction details against the respective request .This database also keeps the information of user’s personal details, based on which the administrator can check the validity of the user and it’s request. Based on all the above information the administrator can efficiently respond all the user queries. The main activities will de performed by the system are. • • Online submission of the application form by the employees. Automation of the procedure performed by the administrator.



Report generation.

5.2.1 Objective of proposed system
The main objective of the proposed system is to overcome the drawbacks of the existing system. The prime benefits are To create a comprehensive database that provides the



information on the availability details and the issue details along with the transaction details related to item.  store.  To automate the entire range of activities or processes To put the information on Internet for easy access not that need to be performed by the administrator before a request.  only for the administrator but also for the employees from various places.  To make the system more user friendly and easy to use.  Utilize the IT to increase the efficiency/productivity. Development and implement of information retrieval system for the emloyees and the management of the General

5.2.2 Advantages of the proposed system
The proposed system is a computerized system. This system has lots of advantages over the existing system. Some of them are 1. The user can log onto the intranic website from anywhere to check the

availability status and issue the item. This saves a valuable amount of employee time. 2. All the data relevant to item information are stored in the database. So the management can get rid of the tedious job like manually searching for an available and issue date. 3. The database contains the cost information of the various items offered by the General store of NIC. So, the management can get help from the proposed system as most of the cost calculations are done in a computerized manner and the results are again in the database at it helps in the generation of bills.

5.2.3 Scope of the proposed system
The “Ineventory control system of General store” software is being developed as an accurate and efficient online software for the user such as the employees and also the administrator i.e. the management of the General store of NIC. In this system the record of the each request details are preserved along with their status and transaction related to them. The system is also made secured as all the updation of the item and transaction can be done by the authorized person i.e. the administrator only.

.

5.3 FEASIBILITY STUDY
The feasibility report of the project holds the advantages and flexibility of the project. This is divided into three sections:  Technical Feasibility  Economical Feasibility  Operational Feasibility

5.3.1 ECONOMIC FEASIBILITY
A systems financial benefit must exceed the cost of developing that system. i.e. a new system being developed should be a good investment for the organization. Economic feasibility considers the following i. The cost to conduct a full system investigation. ii. The cost of hardware and software for the class of application. iii. The benefits in the form of reduced cost or fewer costly errors. iv. The cost if nothing changes (i.e. The proposed system is not developed). The proposed “Invenory control system of General store of NIC Hqs” is economically feasible because i. The system requires very less time factors. ii. The system will provide fast and efficient automated environment instead of slow and error prone manual system, thus reducing both time and man power spent in running the system. iii. The system will have GUI interface and very less user-training is required to learn it. iv. The system will provide service to view various information for proper managerial decision making.

5.3.2 TECHNICAL FEASIBILITY

Technical feasibility centers around the existing computer system (H/W and S/W) whether it can support the addition of proposed system, if not, to what extent it can support and the organization’s capacity to acquire additional components. Our proposed system is technically feasible because – • The H/W and S/W required are easy to install and handle o The necessary H/W configuration and software platform is already there . • The system supports interactivity with the user through GUI

Technical feasibility centers around the existing computer system (hardware and software) whether it can support the addition of proposed system, if not to what extend it can support organization’s capacity to acquire required additional components. proposed system is technically feasible because of the following reasons:I. The site will be hosted by Intranic website of National Informatics Centre on behalf of General store of NIC HQs , where all the H/W and S/W tools are available that are needed to run the application. So it doesn’t require extra investment to run the proposed application. the

II. Expandability will be maintained in the new system. New modules can be added later on the application , if required in the future. III. The application will have User-friendly Forms and Screens, all validation checks. So the new system guarantees accuracy, reliability, ease of access and data security.

5.3.3 BEHAVIOURAL FEASIBILITY
Behavioral feasibility determines how much effort will go in the proposed information system, and in educating and training the employees on the new system, along with the new ways of conducting the business. Behavioral study strives on ensuring that the equilibrium of the organization and status quo in the organization are nor disturbed and changes are readily accepted by the users. The proposed system is behaviorally feasible because of the following: I. The employees of General store of National Informatics Centre will accept it because they are already acquainted with computers. This system is also meant for the general user i.e. employees of NIC HQs. Nowadays the Internet is almost familiar to everyone. So, it is not difficult for the user to use the system, in fact they feel comfortable in using this system. Most of the employees are familiar with the web browser and the process of booking the auditorium will be simplified for the employees. The organization is definitely ready to welcome the computerized system.

.

5.4 SRS of the component :Software Requirement Specification
1. Introduction:

1.1 Purpose
The main purpose of the “Inventory Control System” software is to keep all the information regarding the General store’s item (briefcase/ladies bag), NOC(no objection certificate) and the online submission of the application of NIC’s employee regarding the issue of the item. The employee will be more comfortable while apply for the item or for NOC. The Authority of the General store will be benefited by the software as it keeps all the information online (without paper work). System also help the authority to generate the monthly report after check the available balance of each item, receipt during the month and also the issue part.

1.2 Overall Description
The “Inventory Control System” software consists of two main modules. The administrator (authority) module and the user (employee) module. The user module consists of three sub modules. The user sub modules are checking the status, filling the application form and checking of the request status. The administrator module has four sub module. The administrator sub modules are checking the filled form, sanctioned the application on behalf of their requirement, issue the item or NOC, fill up the application form on behalf of the request and generate the monthly report The administrator module also has a sub module of changing the password through which the administrator can change it’s password. The system has following sub module:1.Online submission of form. 2.Issue of item(briefcase/ladies bag) 3.Generate the NOC

4.Generate the monthly report The first part is online submission of form. In this part employee have to give their user id and password then user have to fill a simple form and also submit it carefully. Issue part check the availability of the item, check the application form and issue the item. IIIrd part generate the NOC for the employee after check the previous record of the employee. IV part generate the Monthly report of the item according to their code after check the balance, receipt during month, issue during month. Report will be update automatically by the authorities

2.Goals of Implementation
The proposed system should be built in such a way that it should fulfill the following goals 1 The code should be easily manageable. 2 The code should be reusable. 3 The performance rate should be higher. It should be fast.

3. Functional Requirement
The functional requirements of the system are divided in to two main categories. They are the user requirements and the administrator requirements.

I. User requirements
R1 Applying for issue of item

Description: The user has to first check the availability of the item which he wants to issue from the General store. The system then shows all the available items. The user then has to fill up the application form. The inputs of the forms are the user personal details and the details of the item which user want to issue. The user is prompted to fill the required session if user forgot to fill. Then submit it. User’s request will be sent to concerned authority. But make sure that user have to submit the application before a certain time period. R1.1 Checking the availability status Input: Item name and code with their post in NIC and the date of submission. Output: The balance of the item /requested for NOC. R1.2 Fill application form Input: Item code, requisition no, issue date, emp. code Output: user prompted to enter if more sessions required. Processing: In filling up the application form if it is for briefcase the user has to mention if user will need any extra item then user have to mention in the form. In case of filling up the application form for ladies bag then have to mention in the form. R1.3 Submit the application form Input: Filled application. Output: requested.

R2 Applying for NOC (no objection certificate)
Description: The user have to give their user id and password and then user have to fill the application form which is very simple. User also fill the item name and code for which user want the NOC And then user have to submit it. It will be transferred to the concerned authority. The authority will issue the NOC to the user as per record. R2.1 Checking the availability status Input: Item name and code with their post in NIC and the date of submission. Output: The balance of the item /requested for NOC. R2.2 Fill application form Input: ecode, datea ,designation, due date, item code, received, type, id , posting, telephone, email , noc, noc date, bill no.,billdate, noc status, shop ,amount ,billsubon Output: user prompted to enter if more sessions required. Processing: In filling up the application form if it is for briefcase the user has to mention if user will need any extra item then user have to mention in the form. In case of filling up the application form for ladies bag then have to mention in the form. R2.3 Submit the application form Input: Filled application.

Output: requested.

R3 Checking the status of the application form
Description: This function allows the user to check his request status online. The user can check his request status by simply entering the id that is provided to him after filling up the application form. R3.1 Checking the status Input: requestid Output: status of the application form along with the application details.

II. Administrator requirements
R4. Administrator Login
Description: The administrator has to login to it’s own account by using a valid user name and the password to perform all the administrator related work. R4.1 Login Input: Administrator name & password. Output: Administrator menu.

Processing: If the provided user name and the password against it is correct then the administrator menu will appear; otherwise an error message will be displayed.

R5 Receiveing and adding of items of the Vendor
Description: The administrator have to fill up the application form for the receiveing of items. The administrator have to fill up the application form in the proper manner as the filled required. First they have to check the status of the received item and then add the incoming item into the receipt . R5.1 Checking the availability status Input: check the status of the item. Output: checked R5.2 Fill application form Input: User id, password, item code(kc),part no., supplier, bill date, bill no., po no., quantity, quantity type, rate , rate per quantity, vat , tax_descriptionamount, cost. Output: The above receipt item has been add and he balance is:-

R6 Checking of user id and password
Description: For the processing of the application administrator and also the user (if user want to see the procedure or performing the task) they have to enter the user id and password in the form . control

system check the id and password in the user table and then if id and password is ok system allow to authority and user to do the task if not then you are unauthorized .

R6.1 Checking the user id and password Input: User id , password Output: If id and password is ok then continue if not then u r not authorized

R7 Checking the existing bill or receipt of item
Description: For the processing of the application administrator have to enter the bill no. , bill date and the item code in the form . Control system check the bill no ,bill date and item code in the respective table and then if bill no and bill date with respective of the item code is new then system allow to authority to do the task if not then it show the bill already exist .

R7.1 Checking the existing bill Input: bill no ,item code,billdate Output: If bill no and bill date is new with respective of the item code then continue if not then it show bill already exist

R7 Issue of items
Description: First administrator check the application of the applicant for the issue of the items then check the previous record of the

applicant after checking the applicant side administrator have to check the available balance. Then authority will able to issue the item to the employee. After issue the items authority add the quantity in the account of employee and deduct from the total balance. R8.1 Issue of items Input: Desired field Output: Issued

R9 Generate Report
Description: This function is available to only administrator only. Once this function is selected the administrator is prompted to enter the month and the category on which the report is required. This category includes the individual and combined information of the items availability along with the receipt part and balance . R9.1 Select Report Input: “Report” option. Output: The administrator is prompted to enter the month and the category of the record required. R9.2 Display Report Input: Name of the month along with category Output: Report.

4 Non-functional Requirements:
1 Security Requirement:
The “Inventory Control System” is a secured system as no one can access the system and tamper the data without an authorized account. The authorized administrator handles all the data i.e. only the administrator can access the system. To maintain this security every administrator account is provided a password against their user name. The whole system is password protected.

2Maintainability Requirement:
A regular maintenance is needed for smooth and efficient performance of the software. To do this the software should be monitored at regular interval of time. If any fault will be noticed it should be reported immediately.

5.5Design of the Component
5.5.1 (FDD) Functional Decomposition Diagram

GENERAL STORE 1 Employee Function
1.1 Check availability 1.2 Apply for Issue

2 Administrator Function

1.3 Check Issue status

2.1 login

2.2 Application for Item

2.3 Cancel Application

2.4 Report generation

2.5 Change password

2.2.1 Approve application

2.2.2 Issue against application

2.2.3 Apply for Issue

2.4.1 Availability report

2.4.2 Issued application report

2.4.3 Cancelled application report

5.5.2 DFD

Context Diagram

USER

request

reference id

0 General store issue System

response

request

ADMINISTRATOR

Level 1 DFD

USER

request

1 Apply
customer details

reference id

for Items details request EMPLOYEE APPLICATIONN

ADMINISTRATOR
login info

request details

Employee details

ADMINISTRATOR
user name, password

2 Login

valid login

3 Issue request
update

update

ISSUE_STATUS ITEMS

valid login

update

valid login

4 Cancel Issue request

update

Issue status report

5 Report generati on

request details

APPLICATIONN
Employee details

EMPLOYEE

availability status

Items

Level 2 DFD

ITEMS
availability list request

1.1 Check availabilit y

new application

1.2 Fill the applicatio n form

filled application

APPLICATION
request details

1.3 Submit the applicatio n form

EMPLOYEE
Employee details

reference id

Level 2 DFD of Process No.1
valid login

online forms request details Employee details

3.1 Select form to approve APPLICATION

offline forms

request details

EMPLOYEE

3.2 Approve applicatio n form

Employee details

update

ITEMS
update update

3.4 Apply for Issue

TRANSACTION
update as approved update list of approved list

ISSUE_STATUS

3.3 Issue the approved applicatio n

update update

TRANSACTION
balance amount

Level 2 DFD of process 3

valid login

4.1 Get the reference id

EMPLOYEE
Employee details

APPLICATION
request details

ISSUE_STATUS 4.2 Get the details

reference id

update

ITEMS 4.3 Cancel the request
update

Level 2 DFD of Process 4

ITEMS
valid login

5.1 Select the category

availability list cataegory

EMPLOYEE
Employee details

5.2 Generate the report

request details

APPLICATION

ISSUE_STATUS
approved list, issued list

report

Level 2 DFD of Process 5

Level 3 DFD

APPLICATION
request details

EMPLOYEE
Employee details

3.2.1 Check the form 3.2.2 Check the NOC

NOC(Ladies bag)
NOC details

ITEMS
update

3.2.3 Approve the applicatio n

ISSUE_STATUS
update

update

TRANSACTION

Level 3 DFD of Process 3.2

Employee details

request details

APPLICATION

transaction details details

List of approved ISSUE_STATUS application

3.1 Get the details

EMPLOYEE TRANSACTION

ISSUE_STATUS 3.2.2 Check the clearance details
Checked application details update details

ISSUE_STATUS
update details

3.2.3 Issue against the request

Level 3 DFD of Process 3.2

6 System Design
6.1 Database Design 6.1.1 Table Design
1. user
This table holds the information about the administrator who authorized to do the desired task FIELD NAME adminname password FIELD TYPE VARCHAR(20) VARCHAR(20) REMARKS NOT NULL NOT NULL

2. empmaster
This table contains the all information about the employee of the NIC’s from the employee code to the status .

+----------+-------------+------+-----+---------+-------+ | Field | Type | Null | Key | Default | Extra | +----------+-------------+------+-----+---------+-------+ | ecode | int(1) | YES | MUL | NULL | | | ename | text | YES | | NULL | | | desigcd | int(1) | YES | | NULL | | | designm | text | YES | | NULL | | | divcd | varchar(10) | YES | | NULL | | | divnm | text | YES | | NULL | | | std_code | varchar(6) | YES | | NULL | | | phone1 | varchar(10) | YES | | NULL | | | phone2 | varchar(10) | YES | | NULL | | | extn | varchar(10) | YES | | NULL | | | email | text | YES | | NULL | | | state | char(2) | YES | | NULL | | | status | char(1) | YES | | A | | +----------+-------------+------+-----+---------+-------+

3. brief
This table contains the all information about the issue part for the NIC’s employee (issue detail). Filled application status will be add in this table.

+---------+---------+------+-----+---------+----------------+ | Field | Type | Null | Key | Default | Extra | +---------+---------+------+-----+---------+----------------+ | kc | char(8) | YES | | NULL | | | rno | char(6) | YES | | NULL | | | issuedt | date | YES | | NULL | | | ecode | int(4) | YES | MUL | NULL | | | id | int(4) | | PRI | NULL | auto_increment | +---------+---------+------+-----+---------+----------------+

4.receipt
This table contains the all information about the receiving quantity of the item. Also about the vendor and the bill. Filled application status will be add in this table

+----------+---------------+------+-----+---------+----------------+ | Field | Type | Null | Key | Default | Extra | +----------+---------------+------+-----+---------+----------------+ | kc | varchar(8) | YES | | NULL | | | part_no | text | YES | | NULL | | | supplier | text | YES | | NULL | | | billdt | date | YES | | NULL | | | billno | varchar(30) | YES | | NULL | | | pono | varchar(40) | YES | | NULL | | | qty | int(1) | YES | | 0 | | | qty_type | varchar(5) | YES | | Nos. | | | rate | decimal(10,2) | YES | | NULL | | | rate_per | text | YES | | NULL | | | vat | decimal(10,2) | YES | | NULL | | | tax_des | text | YES | | NULL | | | cost | decimal(10,2) | YES | | NULL | | | uid | int(1) | | PRI | NULL | auto_increment | +----------+---------------+------+-----+---------+----------------+

5.newbrief
This table contains the all information about the employee of the NIC who applied for the issue of the briefcase/ladies bag.
+-----------+----------+------+-----+---------+----------------+ | Field | Type | Null | Key | Default | Extra | +-----------+----------+------+-----+---------+----------------+ | ecode | int(4) | YES | MUL | NULL | | | datea | date | YES | | NULL | | | desig | int(4) | YES | | NULL | | | duedate | date | YES | | NULL | | | kc | char(8) | YES | | NULL | | | received | char(1) | YES | | N | | | type | int(1) | YES | | NULL | | | id | int(3) | | PRI | NULL | auto_increment | | posting | char(40) | YES | | NULL | | | telephone | char(8) | YES | | NULL | | | email | char(40) | YES | | NULL | | | noc | int(4) | YES | | NULL | | | nocdt | date | YES | | NULL | | +-----------+----------+------+-----+---------+----------------+

6.noc
This table contains the all information about the employee of the NIC who applied for the generation of the noc for the purchase of the briefcase/ladies bag. noc +-----------+----------+------+-----+---------+-------+ | Field | Type | Null | Key | Default | Extra |

+-----------+----------+------+-----+---------+-------+ | ecode | int(4) | YES | | NULL | | | datea | date | YES | | NULL | | | desig | int(4) | YES | | NULL | | | duedate | date | YES | | NULL | | | kc | char(8) | YES | | NULL | | | received | char(1) | YES | | N | | | type | int(1) | YES | | NULL | | | id | int(3) | | | 0 | | | posting | char(40) | YES | | NULL | | | telephone | char(8) | YES | | NULL | | | email | char(40) | YES | | NULL | | | noc | int(4) | YES | | NULL | | | nocdt | date | YES | | NULL | | | billno | char(20) | YES | | NULL | | | billdt | date | YES | | NULL | | | nocstatus | char(1) | YES | | N | | | shop | char(40) | YES | | NULL | | | amount | int(5) | YES | | NULL | | | billsubon | date | YES | | NULL | | +-----------+----------+------+-----+---------+-------+

7.balance
This table contains the all information about the description of the item(briefcase/ladies bag) ,code of the item(briefcase/ladies bag) and also he total available balance of the item( briefcase/ladies bag).

Balance
+---------+------------+------+-----+---------+-------+ | Field | Type | Null | Key | Default | Extra | +---------+------------+------+-----+---------+-------+ | kc | varchar(8) | YES | | NULL | | | descr | text | YES | | NULL | | | balance | int(1) | YES | | 0 | | +---------+------------+------+-----+---------+-------+

.

6.1.2 Data Dictionary
The data dictionary provide the following information about the data used in the database  By what name it is referenced in the system  Where it is used in the system

Element Name
userid password

Element Description

Element Source

The user id of the user. User/administrator The password through User/administrator which user/administrator the log

ecode ename desigcd designm

into the system. The employee code. User Name of the employee. User Designation code of the User employee. Designation name of the User

divcd

employee. Division code of the NIC User in which the is user(employee)

divnm Std_code phone1 phone2 extn email state status kc rno issuedt part_no supplier billdt billno pono qty qty_type rate rate_per VAT tax_des datea desig duedate received type

working. Name of the division of User the employee. State telephone code of the User employee. Personal phone no. Alternate phone no. Extension no of employee. Email address employee. State name employee User Item code . User Requisition no. User Date of issue. User Part number User Name of the vendor. User Date of the bill. User No. of the bill. User Purchase order no. User No. of items(quantity) User Quantity per piece or per User dozen Cost of the item Cost per piece/ dozen VAT as per rule Description of the tax Date of application Designation of the User User User User User User of of User User the User the User the User

employee This is the next due date User for the issue of the item Status User Briefcase/ladies bag which User

posting telephone noc nocstatus nocdt shop

one is want. The location

of

the User User User User User User

employees div. Phone no. No objection certificate Status of the noc Date of the noc Name of the shop from where user purchased the

amount billsubon descr balance

item Total amount for the item User Bill submit date User Description of the item User regarding the item code Total available balance User for bag) item(briefcase/ladies

.

7.Physical Design (Physical files and their descriptions)
The files used in the project can be described by their work. They are the files used for the user interface development for user interaction i.e. the .php files. The .php files used are

index.php empadd.php employee to list. Receipt_Add1.php quantities from

Home page . Administrator application form for add a new Administrator application form for receive vendor.

Issue.php noc.php generation for ladies bag

Administrator application form for issue. Administrator application form for noc only.

nocprn.php bill.php month_rep.php issued items . detail.php issue_query.php period_query.php time. brief_avail.php bagavail.php chgpass.php delete.php

Generates noc for ladies bag against puchase. form for item’s bill details in the database. Generates monthly reports against the Noc status for ladies bag. Details of issued item. Details of issued items after a fixed period of Briefcase updation (Eligible) details. Ladies bag updation(Eligible) details. Module for change in password. For deleting the records.

8. Testing and Implementation
Testing:
Overview: The aim of testing process is to identify all defects in a software product. Testing is any activity aimed at evaluating the software for quality results it produces and the quality of results it can handle. Testing is an operation to detect the differences between the expected (required) result and the actual result. Testing a program consists of subjecting the program to a test inputs or test cases and observing if the program behaves as expected. If the program fails to behave as expected, then the condition under which failures occurs are noted for later debugging and correction. There are many stages of testing depending on the complexity of the software.

Levels of Testing: The basic levels of testing are:1. Unit Testing. 2. Integration Testing. 3. System Testing 4. Acceptance Testing.

The levels of resting attempt to detect different types of faults. The relation of faults introduces in different phases and the different levels of testing are shown.

Employee Needs Acceptance Testing

Requirements System Testing Design Integration Testing Code Testing Unit

UNIT TESTING: Unit testing has been under taken when a module has been coded and successfully reviewed. Unit testing is the testing of different units or modules of system in isolation. It is programmer’s responsibility to think of the advantage of doing unit testing before integration testing is that it makes debugging easier. If an error is detected when a module is being tested along with several modules, it would be difficult to determine which module exactly has an error. In the current system “Inventory Control System”, unit testing has been exclusively done after finising every module. INTEGRATION TESTING: Once a program or module has been unit tested, the programmer can then work with integration it with other programs. The primary objective of integration testing is to test the module interfaces in order to ensure that there are no errors in the parameter passing, when one module involves another modules.

During integration testing, different, different modules of the system are integrated in a planned manner i.e. the order in which they are combined to realize the full system. The various approaches of integration testing are: 1. Big Bang Approach. 2. Top-Down Approach. 3. Bottom-Up Approach. 4. Mixed Approach. Out of the above four approaches Mixed Approach has been used for the proposed system. A mixed approach integration testing follows a combination of top down and bottom up testing approach. In the top-down approach, testing can start only after the top level modules have been coded and unit tested. Similarly, bottom up approach can start only after the bottom level modules are ready. The mixed approach overcomes these shortcomings of the top-down a bottom-up approaches. In the mixed testing approach, testing can start as a when modules become available. For the proposed we have also extensively used regression testing. Regression testing is the practice of running an old test suite after change to the system or after each bug fix ensure that no new bug has been introduced as a result of the change made or bug fixed. 8.1 SYSTEM TESTING:

System testing is actually a series of different test whose primary purpose is to exercise the computer based system, all work to verify

that system elements have been properly integrated and performed allocated function. Its focus is to prove that the completed system does what it should. This test is conducted in a formal manner. The testers use scenariobased system test scripts that have predicted outputs. The test results are recorded in structured test logs. The structured test logs and scripts drive the system testing process. System testing activities are intended to prove that the system meets its objectives. Testing proves that the system meets its requirements. This is not entirely true unless one considers acceptance testing as a type of a system testing because the purpose of acceptance testing is to demonstrate that the system meets the user requirement. Acceptance testing is validation process. System testing in the strictest sense is a verification process. Regardless of whether it represents verification or validation. System testing represents an external view of the system. This is true because requirements represents the eventual system user’s of the system (an external view). User do not understand nor do they care about how the system works as long as it is usable. System testing should be approached from this perspective. As far as the proposed “Inventory Control System” is concerned it meets this requirement.

PERFORMANCE TESTING: Some of the performance testing done for the proposed system are:-

1. Stress Testing:- Stress testing is done to evaluate system performance when it is stressed for short periods of tome. Providing a range of abnormal and even illegal input condition so as to stress the capability of the software. Input data volume, input data rate, processing time, utilization of memory etc are tested beyond the designed capacity. 2. Volume Testing:- This testing is done to check whether the data structures have been designed successfully for extraordinary situation.

Test Plan and Test Cases
The component which are developed are – 1. The online application submit. 2. Approvval of the Online application. 3. Issue against Approved applications. 4. Monthly Report Generation Since the whole project is not yet developed and only few component are developed yet so only unit testing and integration testing of the developed component are carried out. The unit testing was carried out by separately operating the component. The testing of online submission part was carried out by checking the all form validation and checking the database after the form submission. The approval part was carried out by testing with the data which are inserted in the database in the online submission part. The Issue and Report portion is also tested by the same data which were processed in the testing of approval of application portion.

Conclusion:

Testing is an essential stage of the software development life cycle. If is performed properly by following an organization’s standards the end result will be more robust programs going to the system integration testing and finally a system with low maintenance. Proper coding and unit testing are basic steps to ensure that the system being built will work once it is put together.

8.2 SYSTEM IMPLEMENTATION:
Once the system was tested, the implementation phase started. The term implementation has different meanings, ranging from the conversion of a basic application to a complete replacement of a computer system. Implementation is the process of converting a new or a revised system design into an operational one.

Implementation includes the activities that take place to convert the older system to the newer one. The new system may be totally new or replacing an existing system. In either case, proper implementation is essential to provide a reliable system to meet organizational requirements. System implementation describes how the different parts of the system are interacting with each other to give us a feasible software solution. The proposed system “Inventory Control System” is not fully

implemented as development of some modules are not completed. It will be implemented after the completion of other modules.

9.Conclusion
The web enabled system “Inventory Control System” on successful completion enables the employees of NIC Headquarters to view the status of the records. It will also provide the facility to the user so that they can send their request online. The Authority of the General Stores will be also benefited by the proposed system, as it will automate the whole issuing procedure, which will reduce the workload for the Authority. Since every system has some limitations, so the proposed system is also not untouchable in this regard. Although it includes many features but still it would not be sufficient as the user requirements are not always same. The change in the requirements will need some changes in the system to fulfill the requirements. The security of the system will be one of the prime concerns once it will be made online.

10.Annexure
10.1 Screenshots

Screen Design:

1.login page:

This is the login screen. Here the user (i.e. the authorized official) will login by using their right userID and Password.

2 Main page: This is the main screen, which will appear after login.
This screen will show all the functionalities in menus that the application can perform and the functions of my modules.

3.Add new employee: This page is for addition of new employee to the
database. As user click the submit button ,it submits the employee information to the database.

4.Breifcase: This page shows the receipts for briefcases.

5.Issue: This page shows the balance quantity of each individual
item.After submission of data the next page shows information about the item issued to the employee and the information that weather any item is due for the employee or not.

6. Issue Query: This page show the quantities issued against the
particular item for the required month as entered by the user.

7.Issue Query (Period): This page show the quantities issued against
the particular item for the required period as entered by the user.

8.NOC: This section generate the status for request wheather it is
submitted or not.

9.Reports: This section generate the monthly report for all the items.
After print command It will show u the report of the month.

10. Briefcase updation: This section show the status of the employee for
the updation.

11.Change Password: This part is for the change of the password for
the employee against the id.

12.New applicant combined: It show the list of the all new applicants.

13.New applicant seperate: It show the list of the all applicants
according to their designation.

14. Briefcase not collected: It show the list of the issued briefcase that
has not been collected by the employee.

10.2 Bibliography
1. www.php.net for complete reference of php. 2. The Complete Reference Java J2SE 5th Edition—Herbert Schildt (Tata McGraw Hill 2005). 3. HTML,DHTML,JAVASCRIPT,Perl CGI - IVAN BAYROSS. 4. Beginning Java Server Pages – Wiley Publicaton 5. Professional Java Server Programming J2EE 1.3 EditionApress 6. Java How To Program—Deitel & Deitel(PHI—2004). 7. Mastering SQL Server 2000—Mike Gunderly, Joseph L Jordan. 8. Fundamental of Software Engineering—Rajib Mall (PHI). 9. Database System Concepts— Silberschatz,Korth,Sudarshan (McGraw Hill—2002). 10. System Analysis and Design—Elias M. Awad (Galgotia Publications—2004).

Some urls used in the development of the project are
1. http://www.google.co.in 2. www.php.net 3. http://javascript.internet.com/

4. http://www.mysql.com/tutor.htm

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close