rehman final doc

74
CHAPTER-1 1. INTRODUCTION 1.1 INTRODUCTION & OBJECTIVE The objective of the project is to develop a system that retrieves information and documents very efficiently and which limits the number of returned documents by performing an intelligent search procedure. The purpose is to design a system that displays only relevant information to the user, by suppressing unnecessary and irrelevant information. Suppose there is a store of documents and a person (user of the store) formulates a question (request or query) to which the answer is a set of documents satisfying the information need expressed by his question. Solution: User can read all the documents in the store retain the relevant documents and discard all the others – Perfect Retrieval. The problem of IR: 1 Restrained Netting 08M21AO5B5

Upload: siraj-ahmed

Post on 03-Dec-2014

150 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Rehman Final Doc

CHAPTER-1

1. INTRODUCTION

1.1 INTRODUCTION & OBJECTIVE

The objective of the project is to develop a system that retrieves information and

documents very efficiently and which limits the number of returned documents by performing an

intelligent search procedure. The purpose is to design a system that displays only relevant

information to the user, by suppressing unnecessary and irrelevant information.

Suppose there is a store of documents and a person (user of the store) formulates a question

(request or query) to which the answer is a set of documents satisfying the information need

expressed by his question.

Solution: User can read all the documents in the store retain the relevant documents and discard

all the others – Perfect Retrieval.

The problem of IR:

Document and query indexing

How to best represent their contents?

Query evaluation (or retrieval process)

1Restrained Netting 08M21AO5B5

Page 2: Rehman Final Doc

To what extent does a document correspond to a query?

System evaluation

How good is a system?

Are the retrieved documents relevant? (precision)

Are all the relevant documents retrieved? (recall)

Input: The main problem here is to obtain a Representation of each Document and Query

suitable for a computer to use.

Most Computer-Based Retrieval Systems store only a representation of the Document (or

Query)

Implies actual text is lost, an artificial language used instead.

User needs to be taught to express his information need in the language.

The main problem here is to obtain a Representation of each Document and Query

suitable for a computer to use.

Most Computer-Based Retrieval Systems store only a representation of the Document (or

Query)

Implies actual text is lost, an artificial language used instead.

User needs to be taught to express his information need in the language.

The document representative consists of a list of class names, each name representing a

class of words occurring in the total input text.

A document will be indexed by a name if one of its significant words occurs as a member

of that class.

Text Processing System:

Such system will consist of three parts:

Removal of high frequency words

Suffix stripping

Detecting equivalent stems

Removal of High Freq words:

One way of implementing Luhn’s upper cut-off.

Maintain list of ‘stop list’; compare and remove

2Restrained Netting 08M21AO5B5

Page 3: Rehman Final Doc

Document size reduces by 30 to 50 %

Suffix stripping – more involved

Complete list of suffixes; match and remove the longest possible one.

Context free removal leads to Error : Removing ‘UAL’ from FACTUAL and

EQUAL

Solution : Have some rules

Equivalent Stems:

Map to same morphological form on removal of suffixes.

Other kinds, which do not match on mere removal of suffixes. (ABSORB- and

ABSORPT-)

For these, a list of equivalent stem-endings is maintained. (For e.g. ‘B’ and ‘PT’

are equivalent stem ending)

The final output from a conflation algorithm is a set of classes, one for each stem detected.

A class name is assigned to a document if and only if one of its members occurs as a significant

word in the text of the document.

A document representative then becomes a list of class names. These are often referred to as the

documents index terms or keywords.

Queries: Queries are handled in the same way.

1.2. EXISTING SYSTEM

Traditional Restrained Netting consult databases of the most frequently used words in

documents, such as words drawn from documents title and first few sentences, hence they won't

retrieve documents in which the keywords for which one is searching are buried somewhere

within document. They are useful only for searching specific information in World Wide Web

(WWW). Many page authors send Confined Web Spider numerous web pages containing

various tricks like irrelevant title tag or repeating certain words in first few levels that are

irrelevant to actual contents of the page, to boost the ratings. It might lead to situation where in

not even one of the top ten sites listed would be of subject you would expect. Anyone can put up

a webpage .Results can return academic results or internet gossip. HTML doesn't provide any

standard method to identify contents of documents; it is extremely difficult for Confined Web

3Restrained Netting 08M21AO5B5

Page 4: Rehman Final Doc

Spider to identify contents of web page to index them. As World Wide Web seems to be ever

expanding, with increasing threat to quality of information available on the web

1.3. PROPOSED SYSTEM

XML (extended Markup Language) is a simplified language of the mother of all

document defining language, SGML (Standardized General Markup Language ) though

XML is not as powerful as SGML but much easier to use . Developing web pages using

XML is much similar to HTML but provides author with ability to invent their own tags, the

tag names and what they mean are left to author to define depending on subject matter. The

most important thing about XML is it allows more details to be included in document,

searching for specific topics should become more accurate avoiding many mismatches. This

application automates the process of sending queries to these websites using advanced

technology and presents the search result from all the sites to the user. It is a Confined Web

Spider developed for easy search. This Confined Web Spider software is developed using

state of art, high calibrated. It is very much operational with current technologies and

practices. In addition, the user interface provided in this application will make user /

administrator more comfortable with all the complex tools at his/her easy disposal.

Implementation of the Confined Web Spider software tool in any organization website is

very much practical as it doesn’t demand any other external resources or components.

4Restrained Netting 08M21AO5B5

Page 5: Rehman Final Doc

CHAPTER-2

2. SYSTEM SPECIFICATION

2.1 FUNCTIONAL REQUIREMENTS :

This application consists following modules.

1. Administrator Module

2. User module

3. Products module

4. Jobs module

5. Yellow pages module

6. Resume module

2.1.1 Administrator Module:

This module is about an Administrator who maintains this application. This module allows

Administrator to add all objects to this application. The entire application is under control of an

Administrator. The administrator has authority to add details of data which is presented in the

database.

2.1.2 User Module:

This module is about user. Through this module the user can view all the functionalities

of an application and one can search for required products, and jobs etc. Users can post his /her

resumes by registering in this application.

5Restrained Netting 08M21AO5B5

Page 6: Rehman Final Doc

2.1.3 Products Module:

This module is about product. User can search products here .The products that are

added by the administrator are displayed. Through this module the user can view the

functionalities of product with respect to the price of the product.

2.1.4 Jobs Module:

This module is about jobs. Through this module the user can view all the jobs application

desired by the. Users can post his /her resumes by registering in this application .The user can

search jobs based on the selected criteria such as experience, location, part time, full time etc.

2.1.5 Yellow Pages Module:

This module is about yellow pages. Through this module the user can view all the details of

an applicant and one can search the details of applicants, and also other details of applicants etc.

This module maintains details of companies and organizations who provide services of various

types and sectors.

2.1.6 Resume Module:

This module is about resume. Through this module the administrator can view the resumes

of applicants. Applicants can post his /her resumes by registering in this application This module

provides resume services. Through this module the registered applicants can post their resumes.

6Restrained Netting 08M21AO5B5

Page 7: Rehman Final Doc

2.2 HARDWARE REQUIREMENTS :

Pentium processor : 233 MHZ

RAM Capacity : 28M

Hard Disk : 20GB

CD-ROM Drive : 32 HZ

Keyboard : 108 Standard

Mouse : Optical

Monitor : 15’’ Color Monitor

2.3 SOFTWARE REQUIREMENTS

Operating System : Windows

Technology : Java/J2EE

Web Technologies : Html, JavaScript, CSS

IDE : My Eclipse

7Restrained Netting 08M21AO5B5

Page 8: Rehman Final Doc

Web Server : Tomcat

Database : XML

Java Version : J2SDK1.5.

CHAPTER-3

3. LANGUAGE SPECIFICATIONS

3.1. INTRODUCTION TO JAVA

About Java :

Initially the language was called as “oak” but it was renamed as “java” in 1995.The primary

motivation of this language was the need for a platform-independent(i.e. architecture

neutral)language that could be used to create software to be embedded in various consumer

electronic devices.

Java is a programmer’s language

Java is cohesive and consistent

Except for those constraint imposed by the Internet environment. Java gives the programmer, full

control

Finally Java is to Internet Programming where c was to System Programming.

3.1.1 Importance of Java to the Internet

Java has had a profound effect on the Internet. This is because; java expands the Universe of

objects that can move about freely in Cyberspace. In a network, two categories of objects are

8Restrained Netting 08M21AO5B5

Page 9: Rehman Final Doc

transmitted between the server and the personal computer. They are passive information and

Dynamic active programs. in the areas of Security and probability. But Java addresses these

concerns and by doing so, has opened the door to an exciting new form of program called the

Applet.

3.1.2 Applications and applets

An application is a program that runs on our Computer under the operating system of that

computer. It is more or less like one creating using C or C++ .Java’s ability to create Applets

makes it important. An Applet I san application, designed to be transmitted over the Internet and

executed by a Java-compatible web browser. An applet I actually a tiny Java program,

dynamically downloaded across the network, just like an image. But the difference is, it is an

intelligent program, not just a media file. It can be react to the applicant input and dynamically

change.

3.1.3 Java Architecture

Java architecture provides a portable, robust, high performing environment for

development. Java provides portability by compiling the byte codes for the Java Virtual

Machine, which is then interpreted on each platform by the run-time environment. Java is a

dynamic system, able to load code when needed from a machine in the same room or across the

planet.

9Restrained Netting 08M21AO5B5

Page 10: Rehman Final Doc

Source code

Pc compiler

Macintosh compiler

SPARC Compiler

Java Byte code

Platform independ

ent

Java interpreter

Java interpreterm

acintosh

)))

Java interpreter(

SPARC)

3.1.4 Compilation of code

When you compile the code, the Java compiler creates machine code (called byte code)for a

hypothetical machine called Java Virtual Machine(JVM). The JVM is supposed t executed the

byte code. The JVM is created for the overcoming the issue of probability. The code is written

and compiled for one machine and interpreted on all machines .This machine is called Java

Virtual Machine.

3.1.5 Compiling and interpreting java source code

During run-time the Java interpreter tricks the byte code file into thinking that it is

running on a Java Virtual Machine. In reality this could be an Intel Pentium windows 95 or sun

SPARCstation running Solaris or Apple Macintosh running system and all could receive code

from any computer through internet and run the Applets.

10Restrained Netting 08M21AO5B5

Page 11: Rehman Final Doc

3.2 Servlets/JSP

INTRODUCTION

A Servlet is a generic server extension. a Java class that can be loaded Dynamically to

expand the functionality of a server. Servlets are commonly used with web servers. Where they

can take the place CGI scripts.

A servlet is similar to proprietary server extension, except that it runs inside a Java Virtual

Machine (JVM) on the server, so it is safe and portable

Servlets operate solely within the domain of the server.

Unlike CGI and Fast CGI, which use multiple processes to handle separate program or separate

requests, separate threads within web server process handle all servlets. This means that servlets

are all efficient and scalable.

Servlets are portable; both across operating systems and also across web servers. Java Servlets

offer the best possible platform for web application development.

Servlets are used as replacement for CGI scripts on a web server, they can extend any sort of

server such as a mail server that allows servelts t extend its functionality perhaps by performing a

virus scan on all attached documents or handling mail filtering tasks.

Servlets provide a Java-based solution used to address the problems currently associated with

doing server-side programming including inextensible scripting solutions platform-specific

API’s and incomplete interface.

They’re faster and cleaner then CGI scripts

They use a standard API( the servlet API)

They provide all the advantages of Java (run on a variety of servers without needing to be

rewritten)

3.2.1 Advantages of the servlet API

11Restrained Netting 08M21AO5B5

Page 12: Rehman Final Doc

One of the great advantages of the servlet API is protocol independent. It assumes nothing

about:

The protocol being used to transmit on the net

How it is loaded

The server environment it will be running in

These quantities are important, because it allows the Servlet API to be embedded in many

different kinds of servers. There are other advantages to the servelt API as well These include:

It’s extensible-you can inherit all your functionality from the base classes made available to you

3.2.2 Features of Servlets

Servlets are persistent .Servlet are loaded only by the web server and can maintain services

between requests.

Servlets are fast. Since servlets only need to be l\loaded once, they offer much better

performance over their CGI counterparts.

Servlets are platform independent.

Servlets are extensible Java is a robust, object-oriented programming language, which easily can

be extended to suit your needs.

Servlets are secure

Servlets are used with a variety of client.

Servlets are classes and interfaces from tow packages,javax .servlet and javax.servlet.http.The

java.servlet package contains classes t support generic, protocol-independent servlets.The classes

in the javax.servelt.http package To and HTTP specific functionality extend these classes

3.2.3 Loading Servlets

12Restrained Netting 08M21AO5B5

Page 13: Rehman Final Doc

Servlets can be loaded from their places. From a directory that is on the CLASSPATH. The

CLASSPATH of the Java Web Server includes service root/classes/, which is where the system

classes reside

From the <SERVICE_ROOT/servlets/directory.This is not in the server’s classpath. A class

loader is used to create servlets form this directory.New servlets can be added-existing servlets

can be recompiled and the server will notice these changes. From a remote location.For this a

code base like http://nine.eng/classes/foo/ is required in addition to the servlet’s class name.Refer

to the admin Gui docs on servlet section to see how to set this up.

Loading Remote Servlets

Remote servlets can be loaded by:

Configuring the admin Tool to setup automatic loading of remote servlets.

Selecting up server side include tags in .html files

3.2.4 Invoking Servlets

A servlet invoker is a servlet that invokes the “server” method on a named servlet. If the

servlet is not loaded in the server, then the invoker first loads the servlet(either form local disk or

from the network) and the then invokes the “service” method. Also like applets,local servlets in

the server can be identified by just the class name.In other words, if a servlet name is not

absolute.it is treated as local.

A Client can Invoke Servlets in the Following Ways:

The client can ask for a document that is served by the servlet.

The client(browser) can invoke the servlet directly using a URL, once it has been mapped using

the SERVLET ALIASES Section of the admin GUI

The servlet can be invoked through server side include tags.

The servlet can be invoked by placing it in the servlets/directory

The servlet can be invoked by using it in a filter chain

3.2.5 The Servlet Life Cycle

13Restrained Netting 08M21AO5B5

Page 14: Rehman Final Doc

The Servlet life cycle is one of the most exciting features of Servlets. This life cycle is a

powerful hybrid of the life cycles used in CGI programming and lower-level NSAPI and ISAPI

programming.

The servlet life cycle allows servlet engines to address both the performance and resource

problems of CGI and the security concents of low level server API programming.

Servlet life cycle is highly flexible Servers have significant leeway in how they choose to

support servlets .The only hard and fast rule is that a servlet engine must conform to the

following life cycle contact:

Create and initialize the servlets

Handle zero or more service from clients

Destroy the servlet and then garbage Collects it.

It’s perfectly legal for a servlet be loaded, created an initialized in its own JVM, only to be

destroyed an garbage collected without handling any client request or after handling just one

request

The most common and most sensible life cycle implementations for HTTP servelts are:

Single java virtual machine and astatine persistence.

3.2.6 APPLICANT AUTHORIZATION

One way to perform session tracking is to leverage the information that comes with

Applicant authorization. When a web server restricts access to some of its resources to only those

clients that log in using a recognized applicant tname and password. After the client logs in, the

applicant name is available to a servlet through getRemoteApplicant()

Mean use the applicant name to track the session. Once a applicant has logged in, the browser

remembers her applicant tname and resends the name and password as the applicant views new

pages on the site. A servlet can identify the applicant through her applicantname and they’re by

Track her session.

14Restrained Netting 08M21AO5B5

Page 15: Rehman Final Doc

The biggest advantage of using applicant authorization to perform session tracking is that it’s

easy to implement. Simply tell the protect a set of pages, and use getRemoteApplicant() to

identify each client.Another advantage is that the technique works even when the applicant

accesses your site form or exists her browser before coming back.

The biggest disadvantage of applicant authorization is that it requires each applicant to register

for an account and then log in each time the starts visiting your site. Most applicants will tolerate

registering and lagging in as a necessary evil when they are accessing sensitive information, but

its all overkill for simple session tracking .Other problem with applicant authorization is that a

applicant cannot simultaneously maintain more than one session at the same site.

3.3 JDBC

3 .3.1 What is JDBC?

Any relational database. One can write a single program using the JDBC API, and the JDBC

is a Java API for executing SQL ,Statements(As a point of interest JDBC is trademarked name

and is not an acronym; nevertheless, Jdbc is often thought of as standing for Java Database

Connectivity. It consists of a set of classes and interfaces written in the Java Programming

language .JDBC provides a standard API for tool/database developers and makes it possible to

write database applications using a pure Java API

Using JDBC, it is easy to send SQL statements to virtually program will be able to send SQL

.statements to the appropriate database. The Combination of Java and JDBC lets a programmer

writes it once and run it anywhere.

3.3.2 What Does JDBC Do?

Simply put,JDBC makes it possible to do three things

15Restrained Netting 08M21AO5B5

Page 16: Rehman Final Doc

o Establish a connection with a database

o Send SQL statements

o Process the results

o JDBC Driver Types

o The JDBC drivers that we are aware of this time fit into one of four categories

o JDBC-ODBC Bridge plus ODBC driver

o Native-API party-java driver

o JDBC-Net pure java driver

o Native-protocol pure Java driver

An individual database system is accessed via a specific JDBC driver that implements the

java.sql. Driver interface. Drivers exist for nearly all-popular RDBMS systems, through few are

available for free. Sun bundles a free JDBC-ODBC bridge driver with the JDK to allow access to

a standard ODBC, data sources, such as a Microsoft Access database, Sun advises against using

the bridge driver for anything other than development and very limited development.

JDBC drivers are available for most database platforms, from a number of vendors and in a

number of different flavors.

3.3.3 JDBC-ODBC Bridge

If possible use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This

completely eliminates the client configuration required by ODBC. It also eliminates the potential

that the Java VM could be corrupted by an error in the native code brought in by the Bridge(that

is, the Bridge native library, the ODBC driver manager library, library, the ODBC driver library,

and the database client library)

3.3.4 What Is The JDBC-ODBE Bridge ?

The JDBC-ODBC Bridge is a Jdbc driver, which implements JDBC operations by

translating them into ODBC operations. To ODBC it appears as a normal application program.

16Restrained Netting 08M21AO5B5

Page 17: Rehman Final Doc

The Bridge is implemented as the sun.jdbc.odbc Java package and contains a native library used

to access ODBC.The Bridge is joint development of Inter solve and Java Soft

3.4 XML

How Can XML be Used?

XML is used in many aspects of web development, often to simplify data storage and sharing

3.4.1 XML Separates Data from HTML

If you need to display dynamic data in your HTML document, it will take a lot of work to

edit the HTML each time the data changes.

With XML, data can be stored in separate XML files. This way you can concentrate on using

HTML for layout and display, and be sure that changes in the underlying data will not require

any changes to the HTML.

With a few lines of JavaScript code, you can read an external XML file and update the data

content of your web page.

3.4.2 XML Simplifies Data Sharing

In the real world, computer systems and databases contain data in incompatible

formats.XML data is stored in plain text format.

This provides a software- and hardware-independent way of storing data. This makes it much

easier to create data that can be shared by different applications

3.4.3 XML Simplifies Data Transport

One of the most time-consuming challenges for developers is to exchange data between

incompatible systems over the Internet.

17Restrained Netting 08M21AO5B5

Page 18: Rehman Final Doc

Exchanging data as XML greatly reduces this complexity, since the data can be read by different

incompatible applications

3.4.4 XML Simplifies Platform Changes

Upgrading to new systems (hardware or software platforms), is always time consuming.

Large amounts of data must be converted and incompatible data is often lost.

XML data is stored in text format. This makes it easier to expand or upgrade to new operating

systems, new applications, or new browsers, without losing data.

3.4.5 XML is Used to Create New Internet Languages

A lot of new Internet languages are created with XML

XHTML 

WSDL for describing available web services

WAP and WML as markup languages for handheld devices

RSS languages for news feeds

RDF and OWL for describing resources and ontology

SMIL for describing multimedia for the web 

The first line is the XML declaration. It defines the XML version (1.0) and the encoding used

(ISO-8859-1 = Latin-1/West European character set).

The next line describes the root element of the document (like saying: "this document is a note"):

And finally the last line defines the end of the root element:

3.5 HTML

18Restrained Netting 08M21AO5B5

Page 19: Rehman Final Doc

Hypertext Markup Language(HTML), the languages of the world wide web(WWW),

allows applicants to produces web pages that included text, graphics and pointer to other web

pages (Hyperlinks).

HTML is not a programming language but it is an application of ISO Standard

8879,SGML(Standard Generalized Markup Language),but

Specialized to hypertext and adapted to the Web. The idea behind Hypertext one point to another

point. We can navigate through the information based on out interest and preference. A markup

language is simply a series of items enclosed within the elements should be displayed.

Hyperlinks are underlined or emphasized works that load to other documents or some portions of

the same document.

Html can be used to display any type of document on the host computer, which can be

geographically at a different location. It is a versatile language and can be used on any platform

or desktop

HTML provides tags(special codes) to make the document look attractive.

HTML provides are not case-sensitive. Using graphics, fonts, different sizes, color, etc.. can

enhance the presentation of the document. Anything

That is not a tag is part of the document itself.

3.5.2 ADVANTAGES

A HTML document is small and hence easy to send over the net.It is small because it does not

include formatted information.

HTML is platform independent

HTML tags are not case-sensitive.

3.6 JAVA SCRIPT

19Restrained Netting 08M21AO5B5

Page 20: Rehman Final Doc

JavaScript is a compact, object-based scripting language for developing client and server

internet applications. Netscape Navigator 2.0 interprets JavaScript statements embedded directly

in an HTML page. and Livewire enables you to create server-based applications similar to

common gateway interface programs.

In a client application for Navigator, JavaScript statements embedded in an HTML Page can

recognize and respond to applicant events such as mouse clicks form Input, and page navigation.

For example, you can write a JavaScript function to verify that applicants enter valid information

into a form requesting a telephone number or zip code . Without any network transmission, an

Html page with embedded Java Script can interpret the entered text and alert the applicant with a

message dialog if the input is invalid or you can use JavaScript to perform an action (such as

play an audio file, execute an applet, or communicate with a plug-in) in response to the applicant

opening or exiting a page.

CHAPTER -4

4. SYSTEM DESIGN

4.1.1 INTRODUCTION

System design is the process or art of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. One could see it as the application of systems theory to product development. There is some overlap and synergy with the disciplines of systems analysis, systems architecture and systems engineering.

Systems design is the process of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. One could see it as the application of systems theory to product development. There is some overlap with the disciplines of systems analysis, systems architecture and systems engineering. If the broader topic of product development "blends the perspective of marketing, design, and manufacturing into a single approach to product development," then design is the act of taking the marketing information and creating the design of the product to be manufactured.

Systems design is therefore the process of defining and developing systems to satisfy specified requirements of the applicant. Until the 1990s systems design had a crucial and

20Restrained Netting 08M21AO5B5

Page 21: Rehman Final Doc

End User

Confined Web Spider

SEARCHRESULT

End UserRestrained Netting

SEARCHRESULT

respected role in the data processing industry. In the 1990s standardization of hardware and software resulted in the ability to build modular systems. The increasing importance of software running on generic platforms has enhanced the discipline of software engineering.

Object-oriented analysis and design methods are becoming the most widely used methods for computer systems design. The UML has become the standard language in object-oriented analysis and design. It is widely used for modeling software systems and is increasingly used for high designing non-software systems and organizations.

4.1.2 Logical design

The logical design of a system pertains to an abstract representation of the data flows, inputs and outputs of the system. This is often conducted via modelling, using an over-abstract (and sometimes graphical) model of the actual system. In the context of systems design are included.

4.1.3Physical design

The physical design relates to the actual input and output processes of the system. This is laid down in terms of how data is input into a system, how it is verified/authenticated, how it is processed, and how it is displayed as output.

Physical design, in this context, does not refer to the tangible physical design of an information system. To use an analogy, a personal computer's physical design involves input via a keyboard, processing within the CPU, and output via a monitor, printer, etc. It would not concern the actual layout of the tangible hardware, which for a PC would be a monitor, CPU, motherboard, hard drive, modems, video/graphics cards, USB slots, etc. it involve detail design of applicant and a product database structure processing and control processor .The H/S personal specification a develop for the proposed system .

4.2 DATA FLOW DIAGRAMS

4.2.1 Context Diagram:

Context Diagram:

21Restrained Netting 08M21AO5B5

Page 22: Rehman Final Doc

websites database

4.2.2 Top Level Diagram:

Password info

Keyword

Validation

22Restrained Netting 08M21AO5B5

User

Administrator

System

Admin Options

Search Process

Page 23: Rehman Final Doc

Search Result

Password info websites Database

4.2.3 Low Level Diagram-Applicant

Websites database

Keyword

23Restrained Netting 08M21AO5B5

User Search process

Search Result

Page 24: Rehman Final Doc

4.2.4 Low Level Diagram-Administrator

24Restrained Netting 08M21AO5B5

Administrator

Page 25: Rehman Final Doc

Password Info

Valid

Invalid Applicant

Password info Websites database

4.3 UML DIAGRAMS

Unified Modeling Language

The Unified Modeling Language allows the software engineer to express an analysis

model using the modeling notation that is governed by a set of syntactic semantic and pragmatic

rules.

A UML system is represented using five different views that describe the system from distinctly

different perspective. Each view is defined by a set of diagram, which is as follows.

Applicant Model View

25Restrained Netting 08M21AO5B5

Validation

Password

modification

Website db

New/modify/delete

Login

Page 26: Rehman Final Doc

i. This view represents the system from the applicants perspective.

ii. The analysis representation describes a usage scenario from the end-applicants perspective.

Structural model view

i. In this model the data and functionality are arrived from inside the system.

ii. This model view models the static structures.

Behavioral Model View

It represents the dynamic of behavioral as parts of the system, depicting the interactions of

collection between various structural elements described in the applicant model and structural

model view.

Implementation Model View

In this the structural and behavioral as parts of the system are represented as they are to be built.

Environmental Model View

In this the structural and behavioral aspects of the environment in which the system is to be

implemented are represented.

UML is specifically constructed through two different domains they are:

UML Analysis modeling, this focuses on the applicant model and structural model views of the

system.

UML design modeling, which focuses on the behavioral modeling, implementation of modeling.

UML DIAGRAMS

4.3.1 Use Case Diagrams For Administrator

26Restrained Netting 08M21AO5B5

Page 27: Rehman Final Doc

In this diagram one actor that is admin and fourteen use cases that are login, address, product, job, yellow pages, resumes, logout, adding address, deleting address, add product, modify product, delete product, add jobs and delete jobs. Admin has association relationship with all the usecases

4.3.2 Use Case Diagrams For User

27Restrained Netting 08M21AO5B5

Page 28: Rehman Final Doc

In this diagram one actor that is admin and thirteen use cases that are registrations, login, change password, advance searching , select topic, search, mailing, banking, component, careers, product, website url, search keyword . Admin has association relationship with all the usecases.

4.3.3Class Diagram :

28Restrained Netting 08M21AO5B5

Page 29: Rehman Final Doc

In this class diagram we have twenty four classes that are GUI component, menu, input screen, option screen, report, data store, url’s information, global info, administrator information, add reports, user information, keyword information, address, data manipulation, registration, change pwd, option , product , yellow pages, login, validation, address, products, jobs , and resumes.

GUI has association relationship with input screen, optional screen and reports. GUI has dependency relationship with data manipulation. Data store has dependency relationship with data manipulation.

4.3.4 Activity Diagram

29Restrained Netting 08M21AO5B5

Page 30: Rehman Final Doc

In this activity diagram, initial state and final state are used between which action states are used that are register, login, customer options, options, post resumes, view jobs, view product, advanced searching, topic wise search, yellow pages, view jobs and a rhombus is used which indicates whether the customer is valid or not. If he is valid following operations take place, if not it will not be validated.

4.3.5 Sequence Diagram

30Restrained Netting 08M21AO5B5

Page 31: Rehman Final Doc

In this sequence diagram, eight objects are used that are login, menu, address, products, jobs, yellow pages, resume, sign out, Administrator has login with user name and performed the operations like invalidation, adding url’s, adding new product info, adding new category job, back to menu, adding new address of city, back home, verifying resumes and add in application, returning to home page

4.3.6 Collaboration Diagram

31Restrained Netting 08M21AO5B5

Page 32: Rehman Final Doc

In this collaboration diagram, eight objects are used that are login, menu, address, products, jobs, yellow pages, resume, sign out, Administrator has login with user name and performed the operations like invalidation, adding url’s, adding new product info, adding new category job, back to menu, adding new address of city, back home, verifying resumes and add in application, returning to home page

4.3.7 State Diagram for Administrator:

32Restrained Netting 08M21AO5B5

Page 33: Rehman Final Doc

In this diagram, three actions states that are state unauthentication, validation, authentication. It explains the flow of events between the action states that are user id , password, if the process is valid then it proceeds else it goes for validation again.

33Restrained Netting 08M21AO5B5

Page 34: Rehman Final Doc

CHAPTER-5

5. SYSTEM TESTING

5.1 INTRODUCTION TO TESTING

Testing is a process, which reveals errors in the program. It is the major quality

measure employed during software development. During software development. During testing,

the program is executed with a set of test cases and the output of the program for the test cases is

evaluated to determine if the program is performing as it is expected to perform.

5.2 TESTING IN STRATEGIES

In order to make sure that the system does not have errors, the different levels of testing

strategies that are applied at differing phases of software development are:

5.2.1Unit Testing

Unit Testing is done on individual modules as they are completed and become executable. It

is confined only to the designer's requirements.

Each module can be tested using the following two Strategies:

5.2.2Black Box Testing

In this strategy some test cases are generated as input conditions that fully execute all

functional requirements for the program. This testing has been uses to find errors in the

following categories:

Incorrect or missing functions

Interface errors

Errors in data structure or external database access

Performance errors

34Restrained Netting 08M21AO5B5

Page 35: Rehman Final Doc

Initialization and termination errors.

In this testing only the output is checked for correctness.

The logical flow of the data is not checked.

5.2.3White Box testing

In this the test cases are generated on the logic of each module by drawing flow graphs of

that module and logical decisions are tested on all the cases. It has been uses to generate the test

cases in the following cases:

Guarantee that all independent paths have been Executed.

Execute all logical decisions on their true and false Sides.

Execute all loops at their boundaries and within their operational bounds

Execute internal data structures to ensure their validity.

5.2.4 Integrating Testing

Integration testing ensures that software and subsystems work together a whole. It tests

the interface of all the modules to make sure that the modules behave properly when integrated

together.

5.2. 5 System Testing

Involves in-house testing of the entire system before delivery to the applicant. It's aim is

to satisfy the applicant the system meets all requirements of the client's specifications.

5.2.6 Acceptance Testing

It is a pre-delivery testing in which entire system is tested at client's site on real world

data to find errors. Test Approach :

35Restrained Netting 08M21AO5B5

Page 36: Rehman Final Doc

5.2.7 Testing can be done in two ways:

Bottom up approach

Top down approach

5.2.8 Bottom up Approach

Testing can be performed starting from smallest and lowest level modules and proceeding

one at a time. For each module in bottom up testing a short program executes the module and

provides the needed data so that the module is asked to perform the way it will when embedded

with in the larger system. When bottom level modules are tested attention turns to those on the

next level that use the lower level ones they are tested individually and then linked with the

previously examined lower level modules.

5.2.9 Top down approach:

This type of testing starts from upper level modules. Since the detailed activities usually

performed in the lower level routines are not provided stubs are written. A stub is a module shell

called by upper level module and that when reached properly will return a message to the calling

module indicating that proper interaction occurred. No attempt is made to verify the correctness

of the lower level module.

5.2.10 Validation

The system has been tested and implemented successfully and thus ensured that all the

requirements as listed in the software requirements specification are completely fulfilled. In case

of erroneous input corresponding error messages are displayed

36Restrained Netting 08M21AO5B5

Page 37: Rehman Final Doc

CHAPTER-6

6.RESULTS

SCREENS:

Introduction page

37Restrained Netting 08M21AO5B5

Page 38: Rehman Final Doc

Advanced panel

38Restrained Netting 08M21AO5B5

Page 39: Rehman Final Doc

0

Product panel

39Restrained Netting 08M21AO5B5

Page 40: Rehman Final Doc

Registration form for product panel

40Restrained Netting 08M21AO5B5

Page 41: Rehman Final Doc

Job panel

41Restrained Netting 08M21AO5B5

Page 42: Rehman Final Doc

Registration form for job panel

42Restrained Netting 08M21AO5B5

Page 43: Rehman Final Doc

Database for job panel

43Restrained Netting 08M21AO5B5

Page 44: Rehman Final Doc

Yellow pages

44Restrained Netting 08M21AO5B5

Page 45: Rehman Final Doc

Registration form for yellow pages

45Restrained Netting 08M21AO5B5

Page 46: Rehman Final Doc

Placement panel

46Restrained Netting 08M21AO5B5

Page 47: Rehman Final Doc

Post Resume

47Restrained Netting 08M21AO5B5

Page 48: Rehman Final Doc

Login of applicant

48Restrained Netting 08M21AO5B5

Page 49: Rehman Final Doc

Registration of new applicant

49Restrained Netting 08M21AO5B5

Page 50: Rehman Final Doc

Registration completed

50Restrained Netting 08M21AO5B5

Page 51: Rehman Final Doc

Administrator login

51Restrained Netting 08M21AO5B5

Page 52: Rehman Final Doc

Retrieve password

52Restrained Netting 08M21AO5B5

Page 53: Rehman Final Doc

Attaching Resume

53Restrained Netting 08M21AO5B5

Page 54: Rehman Final Doc

Post of Resume

54Restrained Netting 08M21AO5B5

Page 55: Rehman Final Doc

Adding up of new URLS

55Restrained Netting 08M21AO5B5

Page 56: Rehman Final Doc

Adding up of categories

56Restrained Netting 08M21AO5B5

Page 57: Rehman Final Doc

Adding of job details

57Restrained Netting 08M21AO5B5

Page 58: Rehman Final Doc

Adding of yellow pages

58Restrained Netting 08M21AO5B5

Page 59: Rehman Final Doc

Adding of Resumes

59Restrained Netting 08M21AO5B5

Page 60: Rehman Final Doc

CHAPTER 7

7. CONCLUSION AND FUTURE WORK

It has been a great pleasure for me to work on this exciting and challenging

project. This project proved good for me as it provided practical knowledge to develop a

system that retrieves information and documents very efficiently and which limits the

number of returned documents by performing an intelligent search procedure. The

purpose is to design a system that displays only relevant information to the applicant, by

suppressing unnecessary and irrelevant information. It also provides knowledge about the

latest technology used in developing web enabled application and client server

technology that will be great demand in future. This will provide better opportunities and

guidance in future in developing projects independently.

BENEFITS:

The project is identified by the merits of the system offered to the applicant. The merits of

this project are as follows: -

It’s a web-enabled project.

This project offers applicant to enter the data through simple and interactive forms. This is

very helpful for the client to enter the desired information through so much simplicity.

The applicant is mainly more concerned about the validity of the data, whatever he is

entering. There are checks on every stages of any new creation, data entry or updation so that

the applicant cannot enter the invalid data, which can create problems at later date.

Decision making process would be greatly enhanced because of faster processing of

information since data collection from information available on computer takes much less

time than manual system.

60Restrained Netting 08M21AO5B5

Page 61: Rehman Final Doc

CHAPTER -8

8.BIBLIOGRAPHY

References fo r the Pro jec t Deve lopment were Taken From the

fo l lowing Books and Web S i t e s .

[1] JAVA Technologies: By Doug Tidwell

[2] JAVA Complete Reference: By Herbert Shildt

[3] Java Script Programming : By Yehuda Shiran

[4] JAVA2 Networking : By Pistoria

[5] JAVA Security : By Scotl oaks

[6] J2EE : J2EE Professional by Shadab siddiqui

[7] JAVA server pages : By Larne Pekowsley

[8] HTML : The Complete Reference by Thomas A. Powell

[9] JDBC : Java Database Programming with JDBC by Patel moss.

[10] Software Engineering : By Roger Pressman

61Restrained Netting 08M21AO5B5