new hub.docx

Upload: upenderreddydhmf

Post on 26-Feb-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/25/2019 new hub.docx

    1/64

    1. INTRODUCTION

    Knowledge Management (KM) refers to a range of practices used by

    organizations to identify, create, represent, and distribute knowledge for

    reuse, awareness and learning across the organization.

    .

    1.1 PURPOSE

    Knowledge Management programs are typically tied to organizational

    objectives and are intended to lead to the achievement of specic

    outcomes such as shared intelligence, improved performance, competitive

    advantage, or higher levels of innovation. !ere we are looking at

    developing an online intranet knowledge management system that is of

    importance to either an organization or an educational institute. "he

    system (KM#) is an $ntranet based application that can be accessed

    throughout the institute or a specied group or department. "his system

    can be used as a knowledge%information management system for the

    institute. #tudents%#ta& logging in should be able to upload any kind of

    educational information. #tudents%sta& logging in may also access%search

    any information put up by others.KM# should facilitate knowledge sharing

    from the root level like project teams to departments to the entire college.

    1.2 SCOPE

    Knowledge hub is used to share knowledge improves interaction among different

    domains ,it is used for more detailed analysis of a subject ,In future there will be

    transfer of knowledge through knowledge hub ,It improves student and mentor

    introduction

    1.3OVERVIEW

    More concept oriented analysis ill !e i"pro#ed trans$er o$

    in$or"ation ta%es place so t&at ne inno#ati#e t&in%in' "ay !e

    possi!le

    Knowledge Hub

  • 7/25/2019 new hub.docx

    2/64

    1

  • 7/25/2019 new hub.docx

    3/64

    (. TEC)NO*O+IES USED

    (.1 ,-V-

    Initially the language was called as oak but it was renamed as ava in !""#. $heprimary motivation of this language was the need for a platform%independent &i.e.,

    architecture neutral' language that could be used to create software to be embedded in

    various consumer electronic devices.

    (.1.1 I"portance o$ ,a#a to t&e Internet

    ava has had a profound effect on the Internet. $his is because( ava e)pands the

    *niverse of objects that can move about freely in +yberspace. In a network, two

    categories of objects are transmitted between the erver and the -ersonal computer.$hey are -assive information and /ynamic active programs. $he /ynamic, elf%

    e)ecuting programs cause serious problems in the areas of ecurity and probability.

    0ut, ava addresses those concerns and by doing so, has opened the door to an

    e)citing new form of program.

    (.1.( eat/res o$ ,a#a Sec/rity

    -rior to ava, most users did not download e)ecutable programs fre1uently, and those

    who did scan them for viruses prior to e)ecution. 2ost users still worried about thepossibility of infecting their systems with a virus. In addition, another type of

    malicious program e)ists that must be guarded against. . $his type of program can

    gather private information, such as credit card numbers, bank account balances, and

    passwords. ava answers both these concerns by providing a firewall between a

    network application and your computer.

    (.1.(.1 Porta!ility

    3or programs to be dynamically downloaded to all the various types of platforms

    connected to the Internet, some means of generating portable e)ecutable code is

    needed .4s you will see, the same mechanism that helps ensure security also helps

    create portability. Indeed, ava5s.

    Knowledge Hub'

  • 7/25/2019 new hub.docx

    4/64

    (.1.(.( T&e 0yte Code

    $he key that allows the ava to solve the security and portability problems is that the

    output of ava compiler is 0yte code. 0yte code is a highly optimi6ed set of

    instructions designed to be e)ecuted by the ava run%time system, which is called theava 7irtual 2achine &72'. $hat is, in its standard form, the 72 is an interpreter

    for byte code. $ranslating a ava program into byte code helps makes it much easier to

    run a program in a wide variety of environments.

    ,a#a Can 0e Used To Create To Types O$ Pro'ra"s

    -pplications and -pplets

    4n application is a program that runs on our +omputer under the operating system ofthat computer. It is more or less like one creating using + or +88. ava5s ability to

    create 4pplets makes it important. 4n 4pplet is an application designed to be

    transmitted over the Internet and e)ecuted by a ava 9compatible web browser. 4n

    applet is actually a tiny ava program, dynamically downloaded across the network,

    just like an image. 0ut the difference is, it is an intelligent program, not just a media

    file. It can react to the user input and dynamically change.

    (.( ,-V- VIRTU-* M-C)INE 2,VM

    0eyond the language, there is the ava virtual machine. $he ava virtual machine is an

    important element of the ava technology. $he virtual machine can be embedded

    within a web browser or an operating system. :nce a piece of ava code is loaded

    onto a machine, it is verified. 4s part of the loading process, a class loader is invoked

    and does byte code verification makes sure that the code that5s has been generated by

    the compiler will not corrupt the machine that it5s loaded on.

    OVER-** DESCRIPTION

    .ava .lass

    3igure ;.! /evelopment -rocess of 474 -rogram

    Knowledge Hub*

  • 7/25/2019 new hub.docx

    5/64

    ava programming uses to produce byte codes and e)ecutes them. $he first bo)

    indicates that the ava source code is located in a. ava file that is processed with a

    ava compiler called javac. $he ava compiler produces a file called a. class file,

    which contains the byte code. $he +lass file is then loaded across the network or

    loaded locally on your machine into the e)ecution environment is the ava virtual

    machine, which interprets and e)ecutes the byte code.

    (.3 ,-V- -RC)ITECTURE

    ava architecture provides a portable, robust, high performing environment for

    development. ava provides portability by compiling the byte codes for the ava

    7irtual 2achine, which is then interpreted on each platform by the run%time

    environment. ava is a dynamic system, able to load code when needed from a

    machine in the same room or across the planet.

    (.3.1 Co"pilation o$ Code

  • 7/25/2019 new hub.docx

    6/64

    (.3.3 eat/res o$ ,a#a

    ava was designed to be easy for the -rofessional programmer to learn and to use

    effectively. If you are an e)perienced +88 programmer, learning ava will be even

    easier. 0ecause ava inherits the +=+88 synta) and many of the object oriented

    features of +88. 2ost of the confusing concepts from +88 are either left out of ava

    or implemented in a cleaner, more approachable manner. In ava there are a small

    number of clearly defined ways to accomplish a given task.

    (.3.3.1. O!4ect Oriented

    ava was not designed to be source%code compatible with any other language. $his

    allowed the ava team the freedom to design with a blank slate. :ne outcome of this

    was a clean usable, pragmatic approach to objects. $he object model in ava is simpleand easy to e)tend, while simple types, such as integers, are kept as high%performance

    non%objects.

    (.3.3.(. Ro!/st

    $he multi%platform environment of the anguage &H$2>', the languages of the

  • 7/25/2019 new hub.docx

    7/64

    0asic H$2> $ags

    BC %% %%D specifies comments

    B4DEEE. B=4D +reates hyperte)t links

    B0DEEE. B=0D 3ormats te)t as bold

    B0IADEEE. B=0IAD 3ormats te)t in large font.

    B0:/FDEB=0:/FD +ontains all tags and te)t in the H$2> document

    B+G$GD...B=+G$GD +reates te)t

    B//DEB=//D /efinition of a term

    B/>D...B=/>D +reates definition list

    B3:$DEB=3:$D 3ormats te)t with a particular font

    B3:2D...B=3:2D Gncloses a fill%out form

    B342GD...B=342GD /efines a particular frame in a set of frames

    BHJDEB=HJD +reates headings of different levels

    BHG4/D...B=HG4/D +ontains tags that specify information

    BHD...B=HD +reates a hori6ontal rule

    BH$2>DEB=H$2>D +ontains all other H$2> tags

    B2G$4D...B=2G$4D -rovides meta%information about a document

    (.9 ,D0C

    ava /atabase +onnectivity or in short /0+ is a technology that enables the

    java program to manipulate data stored into the database. Here is the complete tutorial

    on /0+ technology.

    (.9.1 W&at is ,D0C:

    /0+ is ava application programming interface that allows the ava

    programmers to access database management system from ava code. It was

    developed by ava oft, a subsidiary of un 2icrosystems.

    /0+ has four +omponents

    1. $he /0+ 4-I.

    (. $he /0+ /river 2anager.

    3. $he /0+ $est uite.

    5. $he /0+%:/0+ 0ridge.

    Knowledge Hub-

  • 7/25/2019 new hub.docx

    8/64

    1. T&e ,D0C -PI

    $he /0+ application programming interface provides the facility for accessing the

    relational database from the ava programming language. $he 4-I technology

    provides the industrial standard for independently connecting ava programming

    language and a wide range of databases. $he user not only e)ecute the >

    statements, retrieve results, and update the data but can also access it anywhere within

    a network because of its L

  • 7/25/2019 new hub.docx

    9/64

    $his first two component of /0+, the /0+ 4-I and the /0+ /river 2anager

    manages to connect to the database and then build a java program that utili6es >

    commands to communicate with any /02. :n the other hand, the last two

    components are used to communicate with :/0+ or to test web application in the

    speciali6ed environment.

    (.9.( ,D0C -rc&itect/re

    !. /atabase connections

    ;. > statements

    N. esult et

    O. /atabase metadata

    P. -repared statements 0inary >arge :bjects &0>:0s'

    @. +haracter >arge :bjects &+>:0s'

    ?. +allable statements

    ". /atabase drivers

    !Q. /river manager

    $he /0+ 4-I uses a /river 2anager and database%specific drivers to provide

    transparent connectivity to heterogeneous databases. $he /0+ driver manager

    ensures that the correct driver is used to access each data source. $he location of the

    driver manager with respect to the /0+ drivers and the servlet is shown in 3igure.

    3igure ;.N /0+ 4rchitecture

    Knowledge Hub/

  • 7/25/2019 new hub.docx

    10/64

    4 /0+ driver translates standard /0+ calls into a network or database protocol or

    into a database library 4-I call that facilitates communication with the database. $his

    translation layer provides /0+ applications with database independence. If the back%

    end database changes, only the /0+ driver need be replaced with few code

    modifications re1uired. $here are four distinct types of /0+ drivers.

    (.9.3 ,d!c Dri#er and Its Types

    $here are four different types of jdbc driver. $here are

    Type 1 ,D0C;OD0C 0rid'e

    $ype ! drivers act as a LbridgeL between /0+ and another database connectivity

    mechanism such as :/0+. $he /0+% :/0+ 0ridge provides /0+ access using

    most standard :/0+ drivers. $his driver is included in the ava ; /K within the

    sun.jdbc.odbc package. In this driver the java statements are converted to jdbc

    statements. 4 /0+ statement calls the :/0+ by using the /0+%:/0+ 0ridge.

    3igure ;.O $ype! /0+ 4rchitecture

    Type ( ,a#a to Nati#e -PI

    $ype ; drivers use the ,a#a Nati#e Inter$ace 2,NIto make calls to a local database

    library 4-I. $his driver converts the /0+ calls into a database specific call for

    databases such as >, :4+>G etc. $his driver communicates directly with the

    database server. It re1uires some native code to connect to the database. $ype ;

    drivers are usually faster than $ype ! drivers. >ike $ype ! drivers, $ype ; drivers

    re1uire native database client libraries to be installed and configured on the client

    machine.

    Knowledge Hub0

  • 7/25/2019 new hub.docx

    11/64

    3igure ;.# $ype ; /0+ 4rchitecture

    Type 3 ,a#a to Netor% Protocol or -ll; ,a#a Dri#er

    $ype N drivers are pure ava drivers that use a proprietary network protocol to

    communicate with /0+ middleware on the server. $he middleware then translates

    the network protocol to database%specific function calls. $ype N drivers are the most

    fle)ible /0+ solution because they do not re1uire native database libraries on the

    client and can connect to many different databases on the back end. $ype N drivers can

    be deployed over the Internet without client installation.

    3igure ;.P $ype N /0+ 4rchitecture

    Knowledge Hub12

  • 7/25/2019 new hub.docx

    12/64

    Type 5 ,a#a to Data!ase Protocol

    $ype O drivers are pure ava drivers that implement a proprietary database protocol

    &like :racleMs >Ret' to communicate directly with the database. >ike $ype N

    drivers, they do not re1uire native database libraries and can be deployed over theInternet without client installation. :ne drawback to $ype O drivers is that they are

    database specific. *nlike $ype N drivers, if your back%end database changes, you may

    save to purchase and deploy a new $ype O driver &some $ype O drivers are available

    free of charge from the database manufacturer'. However, because $ype drivers

    communicate directly with the database engine rather than through middleware or a

    native library, they are usually the fastest /0+ drivers available. $his driver directly

    converts the java statements to > statements.

    3igure ;.@ $ype O /0+ 4rchitecture

    o, you may be asking yourself, L

  • 7/25/2019 new hub.docx

    13/64

    (.

  • 7/25/2019 new hub.docx

    14/64

    N. - engine is program which can understand the tags of the jsp and then it

    converts those tags into a ervlet program and it is stored at the server side.

    $his ervlet is loaded in the memory and then it is e)ecuted and the result isgiven back to the ava

  • 7/25/2019 new hub.docx

    15/64

    3.1 S6STEM -N-*6SIS

    3.1 E7ISTIN+ S6STEM

    $n 34isting #ystem, 5nly share the knowledge through the social service

    sites. $f any user have 6uery, then they are post the 6uery through social

    service site. 7nd those sites cannot intimates about who had shared

    his%her knowledge. #ometimes unrelated answers are shared by

    unauthorized persons.

    3.1.1 DIS-DV-NT-+ES

    In G)isting ystem, :nly share the knowledge through the social service sites.

    $he sites are not only designed to share the knowledge, those are designed to perform

    different functionality. o, those are not providing efficient way to share the

    information or 1ueries of its user.$he sites are not providing any access permissions to

    the users.

    3.2 PROBLEM STATEMENT

    $he sites are not only designed to share the knowledge, those are designed to perform

    different functionality. o, those are not providing efficient way to share the

    information or 1ueries of its user.

    3.3 PROPOSED S6STEM

    !ere we are looking at developing an online intranet knowledge

    management system that is of importance to either an organization or an

    educational institute. . Knowledge Management programs are typically

    tied to organizational objectives and are intended to lead to the

    achievement of specic outcomes such as shared intelligence, improved

    performance, competitive advantage, or higher levels of innovation "he

    system (KM#) is an $ntranet based application that can be accessed

    throughout the institute or a specied group or department. "his system

    can be used as a knowledge%information management system for theinstitute.

    Knowledge Hub

  • 7/25/2019 new hub.docx

    16/64

    !O

  • 7/25/2019 new hub.docx

    17/64

    3.3.1 -DV-NT-+ESIt providing the two different kinds of features those are used to share the information

    to all user in Knowledge Hub and share the user 1uery to all another users in

    Knowledge Hub

    3.5 E-SI0I*IT6 STUD6

    $his can be allows the authori6ed users only, 2eans it will providing the access

    permission to the end users.

  • 7/25/2019 new hub.docx

    18/64

    H :perations 2anager1

  • 7/25/2019 new hub.docx

    19/64

    5. S6STEM RE?UIREMENTS SPECIIC-TION

    e1uirement pecification plays an important role to create 1uality software solution(

    e1uirements are refined and analy6ed to assess the clarity.

    e1uirements are represented in a manner that ultimately leads to successful software

    implementation. Gach re1uirement must be consistent with the overall objective. $he

    development of this project deals with the following re1uirements.

    5.1 UNCTION-* RE?UIREMENTS

    >ogin 4uthentication

    upports $racking of Individual Gmployee

    4ssigning tasks to the 2anager

    4ssociation between hr and Gmployees

    Knowing status of the interview result whether the interview is completed or in

    process

    5.( NON;UNCTION-* RE?UIREMENTS

    ecure access of confidential data &user5s details' should be provided.

    ;O U @ availability of the application

    4pplication should be accessible over Internet.

    0etter component design to get better performance at peak time.

    3le)ible service based architecture will be highly desirable for future e)tension.

    5.3 )-RDW-RE RE?UIREMENTS

    $he selection of hardware is very important in the e)istence and proper working of

    any software. In the selection of hardware, the si6e and the capacity re1uirements are

    also important.

    Knowledge Hub1-

  • 7/25/2019 new hub.docx

    20/64

    $able O.! Hardware e1uirements

    -entium processor ;NN 2HV or above

    42 +apacity !;?20

    Hard /isk ;Q A0

    3loppy /isk !.OO 20

    +/%:2 /I7G N; HV

    5.5 SOTW-RE RE?UIREMENTS

    $he software re1uirements specification is produces at the culmination of the analysis

    tasks. :ne of the most difficult tasks is that, the selection of the software, once system

    re1uirement is known by determining whether a particular software package fits the

    re1uirements.

    $able O.; oftware e1uirements

    +lient 9 side cripting avacript

    -rogramming >anguage ava

  • 7/25/2019 new hub.docx

    21/64

    9. S6STEM DESI+N

    oftware design sits at the technical kernel of the software engineering process and is

    applied regardless of the development paradigm and area of application. /esign is the

    first step in the development phase for any engineered product or system. $he

    designer5s goal is to produce a model or representation of an entity that will later be

    built. 0eginning, once system re1uirement have been specified and analy6ed, system

    design is the first of the three technical activities%designs, code and test that is

    re1uired to build and verify software.

    9.1 S6STEM COMPONENTS

    USER

    *ser need to register in Knowledge Hub to share his=her knowledge and to

    get the related answers from other users *ser can login to it and access

    information *ser can identify, epresent and also distribute the knowledge

    *ser can also share the information at the root level

    8NOW*ED+E

    "he application is provides e8cient services to share the knowledge

    to another, and if the user want get the information (knowledge) is shared

    by the other users in knowledge hub. 9or this service it providing to

    options those is: share knowledge and search knowledge.

    ?UESTION

    $f user has any 6uery, this is providing the service to share his%her 6ueries

    to other users in Knowledge !ub. 7nd the related 6uery info is available at

    any user, and then he%she has an option to post the answer for the 6uery.

    Knowledge Hub1/

  • 7/25/2019 new hub.docx

    22/64

    9.( UM* DI-+R-MS

    Class Dia'ra"

    $his class diagram represents a flow chart where attributes and functions of each

    entity are represented in their fields. $hey are maintaining the association relationship

    between the entities, the admin class is in aggregation with the other class entities.

    3ig #.! +lass /iagram

    Knowledge Hub

    !"

  • 7/25/2019 new hub.docx

    23/64

  • 7/25/2019 new hub.docx

    24/64

    $his use case diagram is a graphic depiction of the interactions among the elements of

    a system i.e. 4dmin first logins and he will register all the members as mentioned

    below in the diagram.

    3ig #.; *se case diagram

    Knowledge Hub

    ;Q

  • 7/25/2019 new hub.docx

    25/64

  • 7/25/2019 new hub.docx

    26/64

    $he actor in the current use case diagram is the team leader, performing the operations

    assigned by the H by maintaining dependency relation ship.

    Login

    Collect Work From HR

    Work Assign to Interviewer

    Teamleader

    Collect Interview results

    Send interview to HR

    Logout

    3ig #.O use case diagram for $eam >eader

    H :perations 2anager''

  • 7/25/2019 new hub.docx

    27/64

    $he actor in the current use case diagram is the interviewer, performing the operations

    assigned by the team leader by maintaining dependency relationship.

    Login

    Collect Work From Teamleader

    conduct intreview

    Interviewer

    send Interview resultsto teamleader

    Logout

    3ig #.# *se case diagram for Interviewer

    H :perations 2anager'*

  • 7/25/2019 new hub.docx

    28/64

    4pplicant is the actor in the above use case diagram who communicates with the H

    by forwarding the resume and participates in the interview process by using the login

    id. Its maintains the dependency relationship.

    Login

    Send Resume to HR

    View Interview Date

    Applicant

    Attend Interview

    View Interview Results

    Logout

    3ig #.P *se case diagram for 4pplicant

    H :perations 2anager'+

  • 7/25/2019 new hub.docx

    29/64

    Se@/ence Dia'ra"

    4 e1uence diagram is an interaction diagram that shows how processes operate with

    one another and in what order. 4 e1uence diagram is two%dimensional in nature. :n

    the hori6ontal a)is, it shows the life of the object that it represents, while on the

    vertical a)is, it shows the se1uence of the creation or invocation of these objects. i.e,

    the below figure shows admin operations.

    Admin Login Register HR Register Team Register View All mplo!ee "odi#! An! Logout

    Leader Interviewer $ro #i les mplo!ee $ro#ile

    Login

    Login Fail

    Register HR Wit% Details

    RegisterTeamLeder Wit% Details

    Register Interviewer wit% Details

    View All emplo!ee $ro#iles

    "odi#! An! mplo!ee Details

    logout

    3ig #.@ e1uence diagram for 4dmin

    H :perations 2anager'

  • 7/25/2019 new hub.docx

    30/64

    $his is the se1uence diagram for hr, he can view applicant resumes, he can assign

    work to team leader, and perform many operations as mentioned in the below figure.

    HR Login View Applicant Work Assign T C ol le ct In terv ie S en d Int erv iew Rus lt i ew In te rv ie we r Logout

    sResumes o TeamLeader w results s to Applicants "ails

    login

    Login Fail

    iew Applicants Resumes

    Work Assign to TeamLeader

    A#ter complete t%e work collect Results

    Send Interview Results to Applicant

    View Interviewer "ails

    Logout

    3ig #.? e1uence diagram for H

    H :perations 2anager'-

  • 7/25/2019 new hub.docx

    31/64

    $his is the se1uence diagram for team leader, he can collect work from hr, he can

    assign work to interviewer, and perform many operations as mentioned in the below

    figure.

    TeamLeader Login Collect Work Work Assign T Collect Intervie Send Interview Logout

    From HR o Interviewer w Results Results to HR

    Login

    Login Fail

    Collect Work From HR

    Work Assign To Interviewer

    Collect Interview Results

    Send Interview Results to HR

    Logout

    3ig #." e1uence diagram for $eam >eader

    H :perations 2anager'

  • 7/25/2019 new hub.docx

    32/64

    $his is the se1uence diagram for team leader, he can collect work from hr, he can

    assign work to interviewer, and perform many operations as mentioned in the below

    figure.

    Interviewer Login Collect Work Fro Conduct Send interview result Logout

    m Temleader Interview s to Teamleader

    Login

    Login Fail

    Collect Work From TeamLeader

    Conduct Interview

    Send Interview Results to Teamleader

    Logout

    3ig #.!Q e1uence diagram for Interviewer

    H :perations 2anager'/

  • 7/25/2019 new hub.docx

    33/64

    $his is the se1uence diagram for 4pplicant, he can send resumes to hr, view interview

    date, attend interview and view interview results, after successful login.

    Applicant Login Send Resume t View Inter Date Attend Interview View Interview Logout

    o HR Results

    login

    Login Fail

    Send Resume to HR

    View Interview Date

    Attend Interview

    View Interview Results

    logout

    3ig #.!! se1uence diagram for 4pplicant

    H :perations 2anager'0

  • 7/25/2019 new hub.docx

    34/64

    9.3 D-T- DICTION-R6

    $able #.! /atabase for 4dmin Inbo)

    $able #.; /atabase for 4pplicant egistration

    H :perations 2anager*2

  • 7/25/2019 new hub.docx

    35/64

    $able #.N /atabase for Gmployee egistration

    $able #.O /atabase for Inbo) 4dmin

    H :perations 2anager*1

  • 7/25/2019 new hub.docx

    36/64

    $able #.# /atabase for Inbo) 4pplicant

    $able #.P /atabase for Inbo) H

    H :perations 2anager*'

  • 7/25/2019 new hub.docx

    37/64

    $able #.@ /atabase for Inbo) Interviewer

    $able #.? /atabase for Inbo) 2anager

    H :perations 2anager**

  • 7/25/2019 new hub.docx

    38/64

    $able #." /atabase for >ogin

    $able #.!Q /atabase for *ser 0ehavior

    H :perations 2anager*+

  • 7/25/2019 new hub.docx

    39/64

    $able #.!! /atabase for 7iew 3iles

    H :perations 2anager*

  • 7/25/2019 new hub.docx

    40/64

  • 7/25/2019 new hub.docx

    41/64

    >ogin.jsp

    BhtmlD

    BheadD

    Blink relTLstylesheetL hrefTLstyle.cssLD

    Bscript languageTLjavascriptLD

    function validate&formobj'

    W

    if&formobj.uname.value.lengthTTQ'

    W alert&Lplease enter *sernameL'(

    formobj.uname.focus&'(

    return false(X

    if&formobj.pwd.value.lengthTTQ'W

    alert&Lplease enter -asswordL'(

    formobj.pwd.focus&'(

    return false(

    X

    if&formobj.utype.valueTTLselectL'W alert&Lplease enter *ser$ypeL'(

    formobj.utype.focus&'(

    return false(

    X

    function changeHash:n>oad&'

    W window.location.href 8T LJL(

    set$imeout&LchangeHash4gain&'L, L#QL'(

    X

    function changeHash4gain&' W

    window.location.href 8T L!L(

    X

    var storedHash T window.location.hash(

    window.setInterval&function &' W

    if &window.location.hash CT storedHash'

    W window.location.hash T storedHash(XX, #Q'(

    H :perations 2anager*

  • 7/25/2019 new hub.docx

    42/64

    B=scriptD

    B=headD

    BbodyD

    BdivD

    Bdiv classTLmenuLD

    BulD

    BliDBa hrefTLhome.jspLDBfont si6eTLOL colorTLblueLDHomeB=fontDB=aDB=liD

    BliDBa hrefTLlogin.jspLDBfont si6eTLOL colorTLblueLD>oginB=fontDB=aDB=liD

    BliDBa hrefTLservices.jspLDBfont si6eTLOL colorTLblueLDervicesB=fontDB=aDB=liD

    BliDBa hrefTLews.jspLDBfont si6eTLOL colorTLblueLD+areersB=fontDB=aDB=liD

    BliDBa hrefTLcontactus.jspLDBfont si6eTLOL colorTLblueLD+ontact

    *sB=fontDB=aDB=liD

    B=ulD

    B=divD

    Bdiv classTLdiv!LD

    BY if&re1uest.get-arameter&LlogintatusL'CTnull'

    W

    YD

    BdivD *ser id and password are invalid B=divD

    BYXYD

    BbrDBbrDBbrD

    BcenterD>oginB=centerD

    Bform nameTLform!L actionTL.=>oginervletL methodTLpostL

    onubmitTLreturn validate&this'LD

    BcenterDBtableD

    BtrDBtdD*sernameB=tdDBtdDBinput typeTLte)tL nameTLunameLDB=tdDB=trD

    BtrDBtdD-asswordB=tdDBtdDBinput typeTLpasswordL nameTLpwdLDB=tdDB=trD

    BtrDBtdD

    Bselect nameTLutypeLD

    BoptionD4dminB=optionD

    BoptionDHr HeadB=optionD

    BoptionD2anagerB=optionD

    BoptionDInterviewerB=optionD

    BoptionD4pplicantB=optionD

    H :perations 2anager*/

  • 7/25/2019 new hub.docx

    43/64

    B=selectDB=tdDB=trDBtrDBtdDB=tdDBtdDBinput typeTLsubmitL

    valueTLsubmitLDB=tdDB=trD

    B=tableD

    B=formD

    BpDIf you are a new 4pplicant Ba hrefTLegister.jspLD+lick hereB=aD to

    egisterB=pDB=centerD

    B=divD

    Bdiv classTLdiv;LD

    BbrD Bimg srcTLimages=log!.jpgLDB=imgD

    B=divD

    B=divD

    B=bodyD

    ;%htmlogoutB=aDB=liD

    B=ulD

    B=divD

    Bdiv classTLdiv!L D

    BpD

  • 7/25/2019 new hub.docx

    44/64

    B=divD

    Bdiv classTLdiv;LD

    BbrD

    Bimg srcTLimages=adpic.jpgLDB=imgDB=divD

    B=divD

    B=bodyD

    B=htmlD

    Hr.jsp

    BYZpage importTLcom.security.util./0+onnL YD

    BhtmlD

    BheadD

    Blink relTLstylesheetL hrefTLstyle.cssLD

    Bscript languageTLjavascriptLD

    function validate&formobj'

    W

    if&formobj.sub.value.lengthTTQ'W

    alert&Lplease enter ubjectL'(

    formobj.sub.focus&'(

    return false(

    X

    if&formobj.msg.value.lengthTTQ'

    W alert&Lplease enter 2essageL'(

    formobj.msg.focus&'(

    return false(

    X

    X

    function changeHash:n>oad&'

    W window.location.href 8T LJL(

    set$imeout&LchangeHash4gain&'L, L#QL'(

    X

    function changeHash4gain&' W

    window.location.href 8T L!L(

    H :perations 2anager+2

  • 7/25/2019 new hub.docx

    45/64

    X

    var storedHash T window.location.hash(

    window.setInterval&function &' W

    if &window.location.hash CT storedHash'W window.location.hash T storedHash(XX,

    #Q'( B=scriptD

    B=headD

    BbodyD

    BdivD

    BdivD

    Bdiv classTLmenuLD

    BulD

    BliD

    BliDBa hrefTLHrGmp.jspLDGmployeesB=aDB=liD BliD

    Ba hrefTLHrInbo).jspLDInbo)B=aDB=liD BliDBa

    hrefTLHr+ompose.jspLD+omposeB=aDB=liD

    BliDBa hrefTLviewfile.jspLDesume /ownloadB=aDB=liD

    BliDBa hrefTLhrsearch.jspLDearch an GmployeeB=aDB=liD

    BliDBa hrefTLhome.jspLD>ogoutB=aDB=liD

    B=ulD

    B=divD

    Bdiv classTLdiv!L left%margin!Qp)D

    B0DB3:$ IVGTLL +:>:TLredLD

  • 7/25/2019 new hub.docx

    46/64

    esultet rsTst.e)ecuteuery&Lselect uname from login where utype TM2anagerM or

    utypeTM4pplicantM L'(

    while&rs.ne)t&''

    W

    tring userTrs.gettring&!'(YD

    Boption valueTMBYTuserYDMDBYTuserYDB=optionDBYout.println&user'(

    X

    X

    catch&G)ception e'

    W

    ystem.out.println&e'(

    X YD

    B=selectDB=tdDB=trD

    BtrDBtdDubjectB=tdD

    BtdDBinput typeTLte)tL nameTLsubL =DB=tdDB=trD

    BtrDBtdD2essageB=tdDBtdD

    Bte)tarea rowsTLOL colsTL#QL nameTLmsgLDB=te)tareaD

    B=tdDB=trD

    BtrDBtd colspanT;DBbr=DB=tdDB=trD

    BtrDBtd colspanT; alignTLcenterLDBinput typeTLsubmitL valueTLend

    2ailL styleTLfont%variant small%caps(font%family Aeorgia(font%si6e !#(left

    !QQp)(position absolute(L DB=tdDB=trD

    B=tableD

    B=formD

    BpDB3:$ IVGTLL +:>:TLgreenLDB0D2ail ent

    uccessfully...........B=0DB=3:$DB=pD

    B=bodyD

    B=divD

    Bdiv classTLdiv;LD

    BbrD

    Bimg srcTLimages=cpu;.jpgLDB=imgD

    B=divD

    B=bodyDB=htmlD

    H :perations 2anager+'

  • 7/25/2019 new hub.docx

    47/64

    >. S6STEM TESTIN+

    $esting is one of the most important phases in the software development activity. In

    software development life cycle &/>+', the main aim of testing process is the

    1uality( the developed software is tested against attaining the re1uired functionality

    and performance.

    /uring the testing process the software is worked with some particular test cases and

    the output of the test cases are analy6ed whether the software is working according to

    the e)pectations or not.

    $he success of the testing process in determining the errors is mostly depends uponthe test case criteria, for testing any software we need to have a description of the

    e)pected behavior of the system and method of determining whether the observed

    behavior confirmed to the e)pected behavior.

    >.1 T6PES O TESTIN+

    ince the errors in the software can be injured at any stage. o, we have to carry out

    the testing process at different levels during the development. $he basic levels of

    testing are *nit, Integration, ystem and 4cceptance $esting.

    $he *nit $esting is carried out on coding. Here different modules are tested against

    the specifications produced during design for the modules. In case of integration

    testing different tested modules are combined into sub systems and tested in case of

    the system testing the full software is tested and in the ne)t level of testing the system

    is tested with user re1uirement document prepared during .

    $here are two basic approaches for testing. $hey are

    /nctional Testin'

    In 3unctional $esting test cases are decided solely on the basis of re1uirements of the

    program or module and the internals of the program or modules are not considered for

    selection of test cases. $his is also called 0lack 0o) $esting

    H :perations 2anager+*

  • 7/25/2019 new hub.docx

    48/64

    Str/ct/ral Testin'

    In tructural $esting test cases are generated on actual code of the program or module

    to be tested. $his is called .1.1 Testin' Process

    4 number of activities must be performed for testing software. $esting starts with test

    plan. $est plan identifies all testing related activities that need to be performed along

    with the schedule and guide lines for testing. $he plan also specifies the levels of

    testing that need to be done, by identifying the different testing units. 3or each unit

    specified in the plan first the test cases and reports are produced. $hese reports are

    analy6ed.

    TEST P*-N

    $est plan is a general document for entire project, which defines the scope, approach

    to be taken and the personal responsible for different activities of testing.

    Test Case Speci$ication

    4lthough there is one test plan for entire project test cases have to be specified

    separately for each test case. $est case specification gives for each item to be tested.

    4ll test cases and outputs e)pected for those test cases.

    TEST C-SE E7ECUTION -ND -N-*6SIS

    $he steps to be performed for e)ecuting the test cases are specified in separate

    document called test procedure specification. $his document specify any specify

    re1uirements that e)ist for setting the test environment and describes the methods and

    formats for reporting the results of testing.

    Unit Testin'

    *nit testing mainly focused first in the smallest and low level modules, proceeding

    one at a time. 0ottom%up testing was performed on each module. 4s developing a

    driver program, that tests modules by developed or used. 0ut for the purpose of

    testing, modules themselves were used as stubs, to print verification of the actions

    performed. 4fter the lower level modules were tested, the modules that in the ne)t

    higher level those make use of the lower modules were tested.

    H :perations 2anager++

  • 7/25/2019 new hub.docx

    49/64

    Inte'ratin' Testin'

    Integration testing is a systematic techni1ue for constructing the program structure,

    while at the same time conducting tests to uncover errors associated with interfacing.

    4s the system consists of the number of modules the interfaces to be tested were

    between the edges of the two modules

    Syste" Testin'

    ystem testing is a series of different tests whose primary purpose is to fully e)ercise

    the computer%based system. It also tests to find discrepancies between the system and

    its original objective, current specifications.

    >.( TEST C-SES

    $able @.! $est case for login

    $est +aseJ! -riority&H,>'High

    $est :bjective +orrect login details

    $est /escription *sername and password are checked

    e1uirements 7erified *sername and password are checked in the database

    $est Gnvironments Aoogle +hrome

    $est setup. *ser initiates and control mechanism like submit

    4ctions G)pected results 4ctual results

    Incorrect login $he fields get cleared and Invalid user

    allow user to enter correct

    login details.

    +orrect login+orrect login details enter

    Gnter into the home pageinto the home page

    /epending upon the useraccording to the user type type

    -ass Fes +onditional -ass 3ail

    H :perations 2anager+

  • 7/25/2019 new hub.docx

    50/64

    $able @.; $est case for *ser 7alidation

    $est +aseJ! -riority&H,>'High

    $est :bjective +orrect login details

    $est /escription 7alidation of the user

    e1uirements 7erified :4ll the fields should be entered correctly

    $est Gnvironments Aoogle +hrome

    $est setup. *ser initiates and control mechanism like submit

    4ctions G)pected results 4ctual results

    Incorrect login $he fields get cleared and Invalid mobile no, email id

    allow user to enter correct

    login details.

    +orrect login +orrect login details enter Gnter into the view page ofinto the home page the usersaccording to the user type

    -ass Fes +onditional -ass 3ail

    +-

  • 7/25/2019 new hub.docx

    51/64

    +

  • 7/25/2019 new hub.docx

    52/64

    3ig @.O 4dmin -age

    $his is the 4dmin page of H operations 2anager

    $he 4dmin can perform different operations

    H :perations 2anager+/

  • 7/25/2019 new hub.docx

    53/64

    3ig @.# egistration -age

    $his page is used for registration.

    $he registration is done only by the admin by entering the user personaldetails.

    H :perations 2anager+0

  • 7/25/2019 new hub.docx

    54/64

    3ig @.P 4dmin view

    $his page shows all the details of different users that are already registered foradmin and hr.

    3or a H, $eam leader it will show only his details.

    H :perations 2anager2

  • 7/25/2019 new hub.docx

    55/64

    3ig @.@ *pdate -age

    $his page shows admin update page.

    Here admin can update the user details.

    H :perations 2anager1

  • 7/25/2019 new hub.docx

    56/64

    3ig @.? *pdated -age

    $his page shows the employee updated page.

    Here we can find more information about employee.

    H :perations 2anager'

  • 7/25/2019 new hub.docx

    57/64

    3ig @." H Home -age

    $his is H Home -age.

    $he upper menu differs from one user to other depending on the user%type.

    H :perations 2anager*

  • 7/25/2019 new hub.docx

    58/64

    3ig @.!Q H 7iew

    $he page shows all the details of the manager.

    He can inbo) to manager.

    H :perations 2anager+

  • 7/25/2019 new hub.docx

    59/64

    3ig @.!! 4pplicant egistration

    $his is applicant registration page.

    Here applicant will fill all the details and he will register.

    H :perations 2anager

  • 7/25/2019 new hub.docx

    60/64

    3ig @.!; otification -age

    $his is notification page.

    $he page shows all the job details.

    H :perations 2anager-

  • 7/25/2019 new hub.docx

    61/64

    3ig @.!N +ontact us

    $his is contact us page.

    Here we can communicate with them.

    H :perations 2anager

  • 7/25/2019 new hub.docx

    62/64

    A. CONC*USION -ND UTURE EN)-NCEMENT

    A.1 CONC*USION

    It has been a great pleasure for me to work on this e)citing and challenging project.

    $his project proved good for me as it provided practical knowledge of not only

    programming in 474 and G7G>G$ web based application and no some e)tent

  • 7/25/2019 new hub.docx

    63/64

    . REERENCES

    F. Koren, .+. orth, and +. 7olinsky, 2easuring and G)tracting -ro)imity

    in etworks, -roc. !;th

    4+2 IAK// Int5l +onf. Knowledge /iscovery and /ata

    2ining, pp. ;O#%;##, ;QQP.

    2. Ito, K. akayama, $. Hara, and . ishio, 4ssociation $hesaurus

    +onstruction 2ethods 0ased on >ink +o%:ccurrence 4nalysis for

    . 2agnanti, and .0. :rlin, etwork 3lows $heory, 4lgoroithms, and

    4pplications. -rentice Hall, !""N.

  • 7/25/2019 new hub.docx

    64/64

    H :perations 2anager0