rehman final doc
TRANSCRIPT
CHAPTER-1
1. INTRODUCTION
1.1 INTRODUCTION & OBJECTIVE
The objective of the project is to develop a system that retrieves information and
documents very efficiently and which limits the number of returned documents by performing an
intelligent search procedure. The purpose is to design a system that displays only relevant
information to the user, by suppressing unnecessary and irrelevant information.
Suppose there is a store of documents and a person (user of the store) formulates a question
(request or query) to which the answer is a set of documents satisfying the information need
expressed by his question.
Solution: User can read all the documents in the store retain the relevant documents and discard
all the others – Perfect Retrieval.
The problem of IR:
Document and query indexing
How to best represent their contents?
Query evaluation (or retrieval process)
1Restrained Netting 08M21AO5B5
To what extent does a document correspond to a query?
System evaluation
How good is a system?
Are the retrieved documents relevant? (precision)
Are all the relevant documents retrieved? (recall)
Input: The main problem here is to obtain a Representation of each Document and Query
suitable for a computer to use.
Most Computer-Based Retrieval Systems store only a representation of the Document (or
Query)
Implies actual text is lost, an artificial language used instead.
User needs to be taught to express his information need in the language.
The main problem here is to obtain a Representation of each Document and Query
suitable for a computer to use.
Most Computer-Based Retrieval Systems store only a representation of the Document (or
Query)
Implies actual text is lost, an artificial language used instead.
User needs to be taught to express his information need in the language.
The document representative consists of a list of class names, each name representing a
class of words occurring in the total input text.
A document will be indexed by a name if one of its significant words occurs as a member
of that class.
Text Processing System:
Such system will consist of three parts:
Removal of high frequency words
Suffix stripping
Detecting equivalent stems
Removal of High Freq words:
One way of implementing Luhn’s upper cut-off.
Maintain list of ‘stop list’; compare and remove
2Restrained Netting 08M21AO5B5
Document size reduces by 30 to 50 %
Suffix stripping – more involved
Complete list of suffixes; match and remove the longest possible one.
Context free removal leads to Error : Removing ‘UAL’ from FACTUAL and
EQUAL
Solution : Have some rules
Equivalent Stems:
Map to same morphological form on removal of suffixes.
Other kinds, which do not match on mere removal of suffixes. (ABSORB- and
ABSORPT-)
For these, a list of equivalent stem-endings is maintained. (For e.g. ‘B’ and ‘PT’
are equivalent stem ending)
The final output from a conflation algorithm is a set of classes, one for each stem detected.
A class name is assigned to a document if and only if one of its members occurs as a significant
word in the text of the document.
A document representative then becomes a list of class names. These are often referred to as the
documents index terms or keywords.
Queries: Queries are handled in the same way.
1.2. EXISTING SYSTEM
Traditional Restrained Netting consult databases of the most frequently used words in
documents, such as words drawn from documents title and first few sentences, hence they won't
retrieve documents in which the keywords for which one is searching are buried somewhere
within document. They are useful only for searching specific information in World Wide Web
(WWW). Many page authors send Confined Web Spider numerous web pages containing
various tricks like irrelevant title tag or repeating certain words in first few levels that are
irrelevant to actual contents of the page, to boost the ratings. It might lead to situation where in
not even one of the top ten sites listed would be of subject you would expect. Anyone can put up
a webpage .Results can return academic results or internet gossip. HTML doesn't provide any
standard method to identify contents of documents; it is extremely difficult for Confined Web
3Restrained Netting 08M21AO5B5
Spider to identify contents of web page to index them. As World Wide Web seems to be ever
expanding, with increasing threat to quality of information available on the web
1.3. PROPOSED SYSTEM
XML (extended Markup Language) is a simplified language of the mother of all
document defining language, SGML (Standardized General Markup Language ) though
XML is not as powerful as SGML but much easier to use . Developing web pages using
XML is much similar to HTML but provides author with ability to invent their own tags, the
tag names and what they mean are left to author to define depending on subject matter. The
most important thing about XML is it allows more details to be included in document,
searching for specific topics should become more accurate avoiding many mismatches. This
application automates the process of sending queries to these websites using advanced
technology and presents the search result from all the sites to the user. It is a Confined Web
Spider developed for easy search. This Confined Web Spider software is developed using
state of art, high calibrated. It is very much operational with current technologies and
practices. In addition, the user interface provided in this application will make user /
administrator more comfortable with all the complex tools at his/her easy disposal.
Implementation of the Confined Web Spider software tool in any organization website is
very much practical as it doesn’t demand any other external resources or components.
4Restrained Netting 08M21AO5B5
CHAPTER-2
2. SYSTEM SPECIFICATION
2.1 FUNCTIONAL REQUIREMENTS :
This application consists following modules.
1. Administrator Module
2. User module
3. Products module
4. Jobs module
5. Yellow pages module
6. Resume module
2.1.1 Administrator Module:
This module is about an Administrator who maintains this application. This module allows
Administrator to add all objects to this application. The entire application is under control of an
Administrator. The administrator has authority to add details of data which is presented in the
database.
2.1.2 User Module:
This module is about user. Through this module the user can view all the functionalities
of an application and one can search for required products, and jobs etc. Users can post his /her
resumes by registering in this application.
5Restrained Netting 08M21AO5B5
2.1.3 Products Module:
This module is about product. User can search products here .The products that are
added by the administrator are displayed. Through this module the user can view the
functionalities of product with respect to the price of the product.
2.1.4 Jobs Module:
This module is about jobs. Through this module the user can view all the jobs application
desired by the. Users can post his /her resumes by registering in this application .The user can
search jobs based on the selected criteria such as experience, location, part time, full time etc.
2.1.5 Yellow Pages Module:
This module is about yellow pages. Through this module the user can view all the details of
an applicant and one can search the details of applicants, and also other details of applicants etc.
This module maintains details of companies and organizations who provide services of various
types and sectors.
2.1.6 Resume Module:
This module is about resume. Through this module the administrator can view the resumes
of applicants. Applicants can post his /her resumes by registering in this application This module
provides resume services. Through this module the registered applicants can post their resumes.
6Restrained Netting 08M21AO5B5
2.2 HARDWARE REQUIREMENTS :
Pentium processor : 233 MHZ
RAM Capacity : 28M
Hard Disk : 20GB
CD-ROM Drive : 32 HZ
Keyboard : 108 Standard
Mouse : Optical
Monitor : 15’’ Color Monitor
2.3 SOFTWARE REQUIREMENTS
Operating System : Windows
Technology : Java/J2EE
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
7Restrained Netting 08M21AO5B5
Web Server : Tomcat
Database : XML
Java Version : J2SDK1.5.
CHAPTER-3
3. LANGUAGE SPECIFICATIONS
3.1. INTRODUCTION TO JAVA
About Java :
Initially the language was called as “oak” but it was renamed as “java” in 1995.The primary
motivation of this language was the need for a platform-independent(i.e. architecture
neutral)language that could be used to create software to be embedded in various consumer
electronic devices.
Java is a programmer’s language
Java is cohesive and consistent
Except for those constraint imposed by the Internet environment. Java gives the programmer, full
control
Finally Java is to Internet Programming where c was to System Programming.
3.1.1 Importance of Java to the Internet
Java has had a profound effect on the Internet. This is because; java expands the Universe of
objects that can move about freely in Cyberspace. In a network, two categories of objects are
8Restrained Netting 08M21AO5B5
transmitted between the server and the personal computer. They are passive information and
Dynamic active programs. in the areas of Security and probability. But Java addresses these
concerns and by doing so, has opened the door to an exciting new form of program called the
Applet.
3.1.2 Applications and applets
An application is a program that runs on our Computer under the operating system of that
computer. It is more or less like one creating using C or C++ .Java’s ability to create Applets
makes it important. An Applet I san application, designed to be transmitted over the Internet and
executed by a Java-compatible web browser. An applet I actually a tiny Java program,
dynamically downloaded across the network, just like an image. But the difference is, it is an
intelligent program, not just a media file. It can be react to the applicant input and dynamically
change.
3.1.3 Java Architecture
Java architecture provides a portable, robust, high performing environment for
development. Java provides portability by compiling the byte codes for the Java Virtual
Machine, which is then interpreted on each platform by the run-time environment. Java is a
dynamic system, able to load code when needed from a machine in the same room or across the
planet.
9Restrained Netting 08M21AO5B5
Source code
Pc compiler
Macintosh compiler
SPARC Compiler
Java Byte code
Platform independ
ent
Java interpreter
Java interpreterm
acintosh
)))
Java interpreter(
SPARC)
3.1.4 Compilation of code
When you compile the code, the Java compiler creates machine code (called byte code)for a
hypothetical machine called Java Virtual Machine(JVM). The JVM is supposed t executed the
byte code. The JVM is created for the overcoming the issue of probability. The code is written
and compiled for one machine and interpreted on all machines .This machine is called Java
Virtual Machine.
3.1.5 Compiling and interpreting java source code
During run-time the Java interpreter tricks the byte code file into thinking that it is
running on a Java Virtual Machine. In reality this could be an Intel Pentium windows 95 or sun
SPARCstation running Solaris or Apple Macintosh running system and all could receive code
from any computer through internet and run the Applets.
10Restrained Netting 08M21AO5B5
3.2 Servlets/JSP
INTRODUCTION
A Servlet is a generic server extension. a Java class that can be loaded Dynamically to
expand the functionality of a server. Servlets are commonly used with web servers. Where they
can take the place CGI scripts.
A servlet is similar to proprietary server extension, except that it runs inside a Java Virtual
Machine (JVM) on the server, so it is safe and portable
Servlets operate solely within the domain of the server.
Unlike CGI and Fast CGI, which use multiple processes to handle separate program or separate
requests, separate threads within web server process handle all servlets. This means that servlets
are all efficient and scalable.
Servlets are portable; both across operating systems and also across web servers. Java Servlets
offer the best possible platform for web application development.
Servlets are used as replacement for CGI scripts on a web server, they can extend any sort of
server such as a mail server that allows servelts t extend its functionality perhaps by performing a
virus scan on all attached documents or handling mail filtering tasks.
Servlets provide a Java-based solution used to address the problems currently associated with
doing server-side programming including inextensible scripting solutions platform-specific
API’s and incomplete interface.
They’re faster and cleaner then CGI scripts
They use a standard API( the servlet API)
They provide all the advantages of Java (run on a variety of servers without needing to be
rewritten)
3.2.1 Advantages of the servlet API
11Restrained Netting 08M21AO5B5
One of the great advantages of the servlet API is protocol independent. It assumes nothing
about:
The protocol being used to transmit on the net
How it is loaded
The server environment it will be running in
These quantities are important, because it allows the Servlet API to be embedded in many
different kinds of servers. There are other advantages to the servelt API as well These include:
It’s extensible-you can inherit all your functionality from the base classes made available to you
3.2.2 Features of Servlets
Servlets are persistent .Servlet are loaded only by the web server and can maintain services
between requests.
Servlets are fast. Since servlets only need to be l\loaded once, they offer much better
performance over their CGI counterparts.
Servlets are platform independent.
Servlets are extensible Java is a robust, object-oriented programming language, which easily can
be extended to suit your needs.
Servlets are secure
Servlets are used with a variety of client.
Servlets are classes and interfaces from tow packages,javax .servlet and javax.servlet.http.The
java.servlet package contains classes t support generic, protocol-independent servlets.The classes
in the javax.servelt.http package To and HTTP specific functionality extend these classes
3.2.3 Loading Servlets
12Restrained Netting 08M21AO5B5
Servlets can be loaded from their places. From a directory that is on the CLASSPATH. The
CLASSPATH of the Java Web Server includes service root/classes/, which is where the system
classes reside
From the <SERVICE_ROOT/servlets/directory.This is not in the server’s classpath. A class
loader is used to create servlets form this directory.New servlets can be added-existing servlets
can be recompiled and the server will notice these changes. From a remote location.For this a
code base like http://nine.eng/classes/foo/ is required in addition to the servlet’s class name.Refer
to the admin Gui docs on servlet section to see how to set this up.
Loading Remote Servlets
Remote servlets can be loaded by:
Configuring the admin Tool to setup automatic loading of remote servlets.
Selecting up server side include tags in .html files
3.2.4 Invoking Servlets
A servlet invoker is a servlet that invokes the “server” method on a named servlet. If the
servlet is not loaded in the server, then the invoker first loads the servlet(either form local disk or
from the network) and the then invokes the “service” method. Also like applets,local servlets in
the server can be identified by just the class name.In other words, if a servlet name is not
absolute.it is treated as local.
A Client can Invoke Servlets in the Following Ways:
The client can ask for a document that is served by the servlet.
The client(browser) can invoke the servlet directly using a URL, once it has been mapped using
the SERVLET ALIASES Section of the admin GUI
The servlet can be invoked through server side include tags.
The servlet can be invoked by placing it in the servlets/directory
The servlet can be invoked by using it in a filter chain
3.2.5 The Servlet Life Cycle
13Restrained Netting 08M21AO5B5
The Servlet life cycle is one of the most exciting features of Servlets. This life cycle is a
powerful hybrid of the life cycles used in CGI programming and lower-level NSAPI and ISAPI
programming.
The servlet life cycle allows servlet engines to address both the performance and resource
problems of CGI and the security concents of low level server API programming.
Servlet life cycle is highly flexible Servers have significant leeway in how they choose to
support servlets .The only hard and fast rule is that a servlet engine must conform to the
following life cycle contact:
Create and initialize the servlets
Handle zero or more service from clients
Destroy the servlet and then garbage Collects it.
It’s perfectly legal for a servlet be loaded, created an initialized in its own JVM, only to be
destroyed an garbage collected without handling any client request or after handling just one
request
The most common and most sensible life cycle implementations for HTTP servelts are:
Single java virtual machine and astatine persistence.
3.2.6 APPLICANT AUTHORIZATION
One way to perform session tracking is to leverage the information that comes with
Applicant authorization. When a web server restricts access to some of its resources to only those
clients that log in using a recognized applicant tname and password. After the client logs in, the
applicant name is available to a servlet through getRemoteApplicant()
Mean use the applicant name to track the session. Once a applicant has logged in, the browser
remembers her applicant tname and resends the name and password as the applicant views new
pages on the site. A servlet can identify the applicant through her applicantname and they’re by
Track her session.
14Restrained Netting 08M21AO5B5
The biggest advantage of using applicant authorization to perform session tracking is that it’s
easy to implement. Simply tell the protect a set of pages, and use getRemoteApplicant() to
identify each client.Another advantage is that the technique works even when the applicant
accesses your site form or exists her browser before coming back.
The biggest disadvantage of applicant authorization is that it requires each applicant to register
for an account and then log in each time the starts visiting your site. Most applicants will tolerate
registering and lagging in as a necessary evil when they are accessing sensitive information, but
its all overkill for simple session tracking .Other problem with applicant authorization is that a
applicant cannot simultaneously maintain more than one session at the same site.
3.3 JDBC
3 .3.1 What is JDBC?
Any relational database. One can write a single program using the JDBC API, and the JDBC
is a Java API for executing SQL ,Statements(As a point of interest JDBC is trademarked name
and is not an acronym; nevertheless, Jdbc is often thought of as standing for Java Database
Connectivity. It consists of a set of classes and interfaces written in the Java Programming
language .JDBC provides a standard API for tool/database developers and makes it possible to
write database applications using a pure Java API
Using JDBC, it is easy to send SQL statements to virtually program will be able to send SQL
.statements to the appropriate database. The Combination of Java and JDBC lets a programmer
writes it once and run it anywhere.
3.3.2 What Does JDBC Do?
Simply put,JDBC makes it possible to do three things
15Restrained Netting 08M21AO5B5
o Establish a connection with a database
o Send SQL statements
o Process the results
o JDBC Driver Types
o The JDBC drivers that we are aware of this time fit into one of four categories
o JDBC-ODBC Bridge plus ODBC driver
o Native-API party-java driver
o JDBC-Net pure java driver
o Native-protocol pure Java driver
An individual database system is accessed via a specific JDBC driver that implements the
java.sql. Driver interface. Drivers exist for nearly all-popular RDBMS systems, through few are
available for free. Sun bundles a free JDBC-ODBC bridge driver with the JDK to allow access to
a standard ODBC, data sources, such as a Microsoft Access database, Sun advises against using
the bridge driver for anything other than development and very limited development.
JDBC drivers are available for most database platforms, from a number of vendors and in a
number of different flavors.
3.3.3 JDBC-ODBC Bridge
If possible use a Pure Java JDBC driver instead of the Bridge and an ODBC driver. This
completely eliminates the client configuration required by ODBC. It also eliminates the potential
that the Java VM could be corrupted by an error in the native code brought in by the Bridge(that
is, the Bridge native library, the ODBC driver manager library, library, the ODBC driver library,
and the database client library)
3.3.4 What Is The JDBC-ODBE Bridge ?
The JDBC-ODBC Bridge is a Jdbc driver, which implements JDBC operations by
translating them into ODBC operations. To ODBC it appears as a normal application program.
16Restrained Netting 08M21AO5B5
The Bridge is implemented as the sun.jdbc.odbc Java package and contains a native library used
to access ODBC.The Bridge is joint development of Inter solve and Java Soft
3.4 XML
How Can XML be Used?
XML is used in many aspects of web development, often to simplify data storage and sharing
3.4.1 XML Separates Data from HTML
If you need to display dynamic data in your HTML document, it will take a lot of work to
edit the HTML each time the data changes.
With XML, data can be stored in separate XML files. This way you can concentrate on using
HTML for layout and display, and be sure that changes in the underlying data will not require
any changes to the HTML.
With a few lines of JavaScript code, you can read an external XML file and update the data
content of your web page.
3.4.2 XML Simplifies Data Sharing
In the real world, computer systems and databases contain data in incompatible
formats.XML data is stored in plain text format.
This provides a software- and hardware-independent way of storing data. This makes it much
easier to create data that can be shared by different applications
3.4.3 XML Simplifies Data Transport
One of the most time-consuming challenges for developers is to exchange data between
incompatible systems over the Internet.
17Restrained Netting 08M21AO5B5
Exchanging data as XML greatly reduces this complexity, since the data can be read by different
incompatible applications
3.4.4 XML Simplifies Platform Changes
Upgrading to new systems (hardware or software platforms), is always time consuming.
Large amounts of data must be converted and incompatible data is often lost.
XML data is stored in text format. This makes it easier to expand or upgrade to new operating
systems, new applications, or new browsers, without losing data.
3.4.5 XML is Used to Create New Internet Languages
A lot of new Internet languages are created with XML
XHTML
WSDL for describing available web services
WAP and WML as markup languages for handheld devices
RSS languages for news feeds
RDF and OWL for describing resources and ontology
SMIL for describing multimedia for the web
The first line is the XML declaration. It defines the XML version (1.0) and the encoding used
(ISO-8859-1 = Latin-1/West European character set).
The next line describes the root element of the document (like saying: "this document is a note"):
And finally the last line defines the end of the root element:
3.5 HTML
18Restrained Netting 08M21AO5B5
Hypertext Markup Language(HTML), the languages of the world wide web(WWW),
allows applicants to produces web pages that included text, graphics and pointer to other web
pages (Hyperlinks).
HTML is not a programming language but it is an application of ISO Standard
8879,SGML(Standard Generalized Markup Language),but
Specialized to hypertext and adapted to the Web. The idea behind Hypertext one point to another
point. We can navigate through the information based on out interest and preference. A markup
language is simply a series of items enclosed within the elements should be displayed.
Hyperlinks are underlined or emphasized works that load to other documents or some portions of
the same document.
Html can be used to display any type of document on the host computer, which can be
geographically at a different location. It is a versatile language and can be used on any platform
or desktop
HTML provides tags(special codes) to make the document look attractive.
HTML provides are not case-sensitive. Using graphics, fonts, different sizes, color, etc.. can
enhance the presentation of the document. Anything
That is not a tag is part of the document itself.
3.5.2 ADVANTAGES
A HTML document is small and hence easy to send over the net.It is small because it does not
include formatted information.
HTML is platform independent
HTML tags are not case-sensitive.
3.6 JAVA SCRIPT
19Restrained Netting 08M21AO5B5
JavaScript is a compact, object-based scripting language for developing client and server
internet applications. Netscape Navigator 2.0 interprets JavaScript statements embedded directly
in an HTML page. and Livewire enables you to create server-based applications similar to
common gateway interface programs.
In a client application for Navigator, JavaScript statements embedded in an HTML Page can
recognize and respond to applicant events such as mouse clicks form Input, and page navigation.
For example, you can write a JavaScript function to verify that applicants enter valid information
into a form requesting a telephone number or zip code . Without any network transmission, an
Html page with embedded Java Script can interpret the entered text and alert the applicant with a
message dialog if the input is invalid or you can use JavaScript to perform an action (such as
play an audio file, execute an applet, or communicate with a plug-in) in response to the applicant
opening or exiting a page.
CHAPTER -4
4. SYSTEM DESIGN
4.1.1 INTRODUCTION
System design is the process or art of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. One could see it as the application of systems theory to product development. There is some overlap and synergy with the disciplines of systems analysis, systems architecture and systems engineering.
Systems design is the process of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. One could see it as the application of systems theory to product development. There is some overlap with the disciplines of systems analysis, systems architecture and systems engineering. If the broader topic of product development "blends the perspective of marketing, design, and manufacturing into a single approach to product development," then design is the act of taking the marketing information and creating the design of the product to be manufactured.
Systems design is therefore the process of defining and developing systems to satisfy specified requirements of the applicant. Until the 1990s systems design had a crucial and
20Restrained Netting 08M21AO5B5
End User
Confined Web Spider
SEARCHRESULT
End UserRestrained Netting
SEARCHRESULT
respected role in the data processing industry. In the 1990s standardization of hardware and software resulted in the ability to build modular systems. The increasing importance of software running on generic platforms has enhanced the discipline of software engineering.
Object-oriented analysis and design methods are becoming the most widely used methods for computer systems design. The UML has become the standard language in object-oriented analysis and design. It is widely used for modeling software systems and is increasingly used for high designing non-software systems and organizations.
4.1.2 Logical design
The logical design of a system pertains to an abstract representation of the data flows, inputs and outputs of the system. This is often conducted via modelling, using an over-abstract (and sometimes graphical) model of the actual system. In the context of systems design are included.
4.1.3Physical design
The physical design relates to the actual input and output processes of the system. This is laid down in terms of how data is input into a system, how it is verified/authenticated, how it is processed, and how it is displayed as output.
Physical design, in this context, does not refer to the tangible physical design of an information system. To use an analogy, a personal computer's physical design involves input via a keyboard, processing within the CPU, and output via a monitor, printer, etc. It would not concern the actual layout of the tangible hardware, which for a PC would be a monitor, CPU, motherboard, hard drive, modems, video/graphics cards, USB slots, etc. it involve detail design of applicant and a product database structure processing and control processor .The H/S personal specification a develop for the proposed system .
4.2 DATA FLOW DIAGRAMS
4.2.1 Context Diagram:
Context Diagram:
21Restrained Netting 08M21AO5B5
websites database
4.2.2 Top Level Diagram:
Password info
Keyword
Validation
22Restrained Netting 08M21AO5B5
User
Administrator
System
Admin Options
Search Process
Search Result
Password info websites Database
4.2.3 Low Level Diagram-Applicant
Websites database
Keyword
23Restrained Netting 08M21AO5B5
User Search process
Search Result
4.2.4 Low Level Diagram-Administrator
24Restrained Netting 08M21AO5B5
Administrator
Password Info
Valid
Invalid Applicant
Password info Websites database
4.3 UML DIAGRAMS
Unified Modeling Language
The Unified Modeling Language allows the software engineer to express an analysis
model using the modeling notation that is governed by a set of syntactic semantic and pragmatic
rules.
A UML system is represented using five different views that describe the system from distinctly
different perspective. Each view is defined by a set of diagram, which is as follows.
Applicant Model View
25Restrained Netting 08M21AO5B5
Validation
Password
modification
Website db
New/modify/delete
Login
i. This view represents the system from the applicants perspective.
ii. The analysis representation describes a usage scenario from the end-applicants perspective.
Structural model view
i. In this model the data and functionality are arrived from inside the system.
ii. This model view models the static structures.
Behavioral Model View
It represents the dynamic of behavioral as parts of the system, depicting the interactions of
collection between various structural elements described in the applicant model and structural
model view.
Implementation Model View
In this the structural and behavioral as parts of the system are represented as they are to be built.
Environmental Model View
In this the structural and behavioral aspects of the environment in which the system is to be
implemented are represented.
UML is specifically constructed through two different domains they are:
UML Analysis modeling, this focuses on the applicant model and structural model views of the
system.
UML design modeling, which focuses on the behavioral modeling, implementation of modeling.
UML DIAGRAMS
4.3.1 Use Case Diagrams For Administrator
26Restrained Netting 08M21AO5B5
In this diagram one actor that is admin and fourteen use cases that are login, address, product, job, yellow pages, resumes, logout, adding address, deleting address, add product, modify product, delete product, add jobs and delete jobs. Admin has association relationship with all the usecases
4.3.2 Use Case Diagrams For User
27Restrained Netting 08M21AO5B5
In this diagram one actor that is admin and thirteen use cases that are registrations, login, change password, advance searching , select topic, search, mailing, banking, component, careers, product, website url, search keyword . Admin has association relationship with all the usecases.
4.3.3Class Diagram :
28Restrained Netting 08M21AO5B5
In this class diagram we have twenty four classes that are GUI component, menu, input screen, option screen, report, data store, url’s information, global info, administrator information, add reports, user information, keyword information, address, data manipulation, registration, change pwd, option , product , yellow pages, login, validation, address, products, jobs , and resumes.
GUI has association relationship with input screen, optional screen and reports. GUI has dependency relationship with data manipulation. Data store has dependency relationship with data manipulation.
4.3.4 Activity Diagram
29Restrained Netting 08M21AO5B5
In this activity diagram, initial state and final state are used between which action states are used that are register, login, customer options, options, post resumes, view jobs, view product, advanced searching, topic wise search, yellow pages, view jobs and a rhombus is used which indicates whether the customer is valid or not. If he is valid following operations take place, if not it will not be validated.
4.3.5 Sequence Diagram
30Restrained Netting 08M21AO5B5
In this sequence diagram, eight objects are used that are login, menu, address, products, jobs, yellow pages, resume, sign out, Administrator has login with user name and performed the operations like invalidation, adding url’s, adding new product info, adding new category job, back to menu, adding new address of city, back home, verifying resumes and add in application, returning to home page
4.3.6 Collaboration Diagram
31Restrained Netting 08M21AO5B5
In this collaboration diagram, eight objects are used that are login, menu, address, products, jobs, yellow pages, resume, sign out, Administrator has login with user name and performed the operations like invalidation, adding url’s, adding new product info, adding new category job, back to menu, adding new address of city, back home, verifying resumes and add in application, returning to home page
4.3.7 State Diagram for Administrator:
32Restrained Netting 08M21AO5B5
In this diagram, three actions states that are state unauthentication, validation, authentication. It explains the flow of events between the action states that are user id , password, if the process is valid then it proceeds else it goes for validation again.
33Restrained Netting 08M21AO5B5
CHAPTER-5
5. SYSTEM TESTING
5.1 INTRODUCTION TO TESTING
Testing is a process, which reveals errors in the program. It is the major quality
measure employed during software development. During software development. During testing,
the program is executed with a set of test cases and the output of the program for the test cases is
evaluated to determine if the program is performing as it is expected to perform.
5.2 TESTING IN STRATEGIES
In order to make sure that the system does not have errors, the different levels of testing
strategies that are applied at differing phases of software development are:
5.2.1Unit Testing
Unit Testing is done on individual modules as they are completed and become executable. It
is confined only to the designer's requirements.
Each module can be tested using the following two Strategies:
5.2.2Black Box Testing
In this strategy some test cases are generated as input conditions that fully execute all
functional requirements for the program. This testing has been uses to find errors in the
following categories:
Incorrect or missing functions
Interface errors
Errors in data structure or external database access
Performance errors
34Restrained Netting 08M21AO5B5
Initialization and termination errors.
In this testing only the output is checked for correctness.
The logical flow of the data is not checked.
5.2.3White Box testing
In this the test cases are generated on the logic of each module by drawing flow graphs of
that module and logical decisions are tested on all the cases. It has been uses to generate the test
cases in the following cases:
Guarantee that all independent paths have been Executed.
Execute all logical decisions on their true and false Sides.
Execute all loops at their boundaries and within their operational bounds
Execute internal data structures to ensure their validity.
5.2.4 Integrating Testing
Integration testing ensures that software and subsystems work together a whole. It tests
the interface of all the modules to make sure that the modules behave properly when integrated
together.
5.2. 5 System Testing
Involves in-house testing of the entire system before delivery to the applicant. It's aim is
to satisfy the applicant the system meets all requirements of the client's specifications.
5.2.6 Acceptance Testing
It is a pre-delivery testing in which entire system is tested at client's site on real world
data to find errors. Test Approach :
35Restrained Netting 08M21AO5B5
5.2.7 Testing can be done in two ways:
Bottom up approach
Top down approach
5.2.8 Bottom up Approach
Testing can be performed starting from smallest and lowest level modules and proceeding
one at a time. For each module in bottom up testing a short program executes the module and
provides the needed data so that the module is asked to perform the way it will when embedded
with in the larger system. When bottom level modules are tested attention turns to those on the
next level that use the lower level ones they are tested individually and then linked with the
previously examined lower level modules.
5.2.9 Top down approach:
This type of testing starts from upper level modules. Since the detailed activities usually
performed in the lower level routines are not provided stubs are written. A stub is a module shell
called by upper level module and that when reached properly will return a message to the calling
module indicating that proper interaction occurred. No attempt is made to verify the correctness
of the lower level module.
5.2.10 Validation
The system has been tested and implemented successfully and thus ensured that all the
requirements as listed in the software requirements specification are completely fulfilled. In case
of erroneous input corresponding error messages are displayed
36Restrained Netting 08M21AO5B5
CHAPTER-6
6.RESULTS
SCREENS:
Introduction page
37Restrained Netting 08M21AO5B5
Advanced panel
38Restrained Netting 08M21AO5B5
0
Product panel
39Restrained Netting 08M21AO5B5
Registration form for product panel
40Restrained Netting 08M21AO5B5
Job panel
41Restrained Netting 08M21AO5B5
Registration form for job panel
42Restrained Netting 08M21AO5B5
Database for job panel
43Restrained Netting 08M21AO5B5
Yellow pages
44Restrained Netting 08M21AO5B5
Registration form for yellow pages
45Restrained Netting 08M21AO5B5
Placement panel
46Restrained Netting 08M21AO5B5
Post Resume
47Restrained Netting 08M21AO5B5
Login of applicant
48Restrained Netting 08M21AO5B5
Registration of new applicant
49Restrained Netting 08M21AO5B5
Registration completed
50Restrained Netting 08M21AO5B5
Administrator login
51Restrained Netting 08M21AO5B5
Retrieve password
52Restrained Netting 08M21AO5B5
Attaching Resume
53Restrained Netting 08M21AO5B5
Post of Resume
54Restrained Netting 08M21AO5B5
Adding up of new URLS
55Restrained Netting 08M21AO5B5
Adding up of categories
56Restrained Netting 08M21AO5B5
Adding of job details
57Restrained Netting 08M21AO5B5
Adding of yellow pages
58Restrained Netting 08M21AO5B5
Adding of Resumes
59Restrained Netting 08M21AO5B5
CHAPTER 7
7. CONCLUSION AND FUTURE WORK
It has been a great pleasure for me to work on this exciting and challenging
project. This project proved good for me as it provided practical knowledge to develop a
system that retrieves information and documents very efficiently and which limits the
number of returned documents by performing an intelligent search procedure. The
purpose is to design a system that displays only relevant information to the applicant, by
suppressing unnecessary and irrelevant information. It also provides knowledge about the
latest technology used in developing web enabled application and client server
technology that will be great demand in future. This will provide better opportunities and
guidance in future in developing projects independently.
BENEFITS:
The project is identified by the merits of the system offered to the applicant. The merits of
this project are as follows: -
It’s a web-enabled project.
This project offers applicant to enter the data through simple and interactive forms. This is
very helpful for the client to enter the desired information through so much simplicity.
The applicant is mainly more concerned about the validity of the data, whatever he is
entering. There are checks on every stages of any new creation, data entry or updation so that
the applicant cannot enter the invalid data, which can create problems at later date.
Decision making process would be greatly enhanced because of faster processing of
information since data collection from information available on computer takes much less
time than manual system.
60Restrained Netting 08M21AO5B5
CHAPTER -8
8.BIBLIOGRAPHY
References fo r the Pro jec t Deve lopment were Taken From the
fo l lowing Books and Web S i t e s .
[1] JAVA Technologies: By Doug Tidwell
[2] JAVA Complete Reference: By Herbert Shildt
[3] Java Script Programming : By Yehuda Shiran
[4] JAVA2 Networking : By Pistoria
[5] JAVA Security : By Scotl oaks
[6] J2EE : J2EE Professional by Shadab siddiqui
[7] JAVA server pages : By Larne Pekowsley
[8] HTML : The Complete Reference by Thomas A. Powell
[9] JDBC : Java Database Programming with JDBC by Patel moss.
[10] Software Engineering : By Roger Pressman
61Restrained Netting 08M21AO5B5