0% found this document useful (0 votes)
403 views61 pages

Final Report

The document describes a web-based system called ANGANWADI that was developed to automate the work handled in anganwadis. It discusses the introduction, objectives, modules and system specification of the ANGANWADI system. The system aims to computerize processes like maintaining student details, managing timetables, sending notifications, and more. It has modules for administration, users, contacts and events. The system specification outlines the required hardware of at least 4GB RAM and 1TB storage and software including Windows 10, PHP, MySQL and XAMPP.

Uploaded by

ALBY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
403 views61 pages

Final Report

The document describes a web-based system called ANGANWADI that was developed to automate the work handled in anganwadis. It discusses the introduction, objectives, modules and system specification of the ANGANWADI system. The system aims to computerize processes like maintaining student details, managing timetables, sending notifications, and more. It has modules for administration, users, contacts and events. The system specification outlines the required hardware of at least 4GB RAM and 1TB storage and software including Windows 10, PHP, MySQL and XAMPP.

Uploaded by

ALBY
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 61

ANGANWADI BSc COMPUTER SCIENCE

INTRODUCTION

CALICUT UNIVERSITY
ANGANWADI BSc COMPUTER SCIENCE

1.INTRODUCTION

1.1 ABOUT THE PROJECT

The project entitled ANGANWADI is a web-based system developed to automate the


entire works handled in an Anganwadi. The work include registering and maintaining
student details, Managing Timetable details, Event notification generation, Providing
notifications regarding Food supplement, Polio and other medicine to users etc. The
system computerizes the administration work. To manage all these they require fully
fledged software which will take care all these.

1.2 PROJECT OVERVIEW

ANGANWADI is a web-based system to maintain day to day working details in an


Anganwadi. This system helps to maintain the user details, immunization details,
supplementary nutrition, pre-school non-formal education, nutrition & health education
etc.The system ANGANWADI also helps to maintain a notification system which helps
to utilize the services provided from anganwadi centers efficiently.

1.3 OBJECTIVE
The main objective of this software is to computerise the processes that take place an
Anganwadi and thereby generate an efficient system which utilizes the services provided
by the ICDS scheme and thus reduces the corruption and malnutrition rates . They have to
maintain many records manually. By using the system ANGANWADI, the operations
such as searching, updating and notifying data should be faster so they can find required
details instantly. The computerization is done so that the storage of all the details regarding
services will be stored in the system which makes system centralized and the chance of
duplication of any data is minimized. While by doing automation to the system will reduce the
time for storing any data in the system. Other objectives of the project includes:

CALICUT UNIVERSITY 1
ANGANWADI BSc COMPUTER SCIENCE

● To secure the data of records in every efficient way


● To allow the access of data and application to only the people who
are authenticated
● Improved processing speed
● Enhance capacity to process a greater amount of activity
● Greater accuracy and consistency
● Faster retrieval of information
● Reducing paperwork

1.4 MODULES
The project ANGANWADI have the following 4 modules:

 Admin Module
 User Module
 Contact Module
 Event Module
ADMIN MODULE

Administrator Module includes the following features:

 Login/Logout - The administrator login using the administrator user id and


password. Once they login they can view all the details of kids, view contacts,
time table details, nutrition supplement details and immunization details
 Add/Delete Event -The administrator can add ,view and delete the details
regarding events.
 Add/Delete Timetable -The administrator can add ,view and delete the time table.
 Add/Delete Nutrition Supplement -The administrator can add ,view and delete the
Nutrition Supplement details.
 View Contact : Administrator can view the contact details

USER MODULE

User Module includes the following features:

CALICUT UNIVERSITY 2
ANGANWADI BSc COMPUTER SCIENCE

 Register: New user can register by providing the details.


 Login/Logout - The registered user can login using the id and password. Once
they login they can view the notifications generated by the admin.

CONTACT MODULE
 Contact module is responsible for maintaining the communication details .
EVENT MODULE
 The Events are generated by the administrator and user can view these events as
notifications. Event module handles these features.

CALICUT UNIVERSITY 3
ANGANWADI BSc COMPUTER SCIENCE

SYSTEM SPECIFICATION

CALICUT UNIVERSITY 4
ANGANWADI BSc COMPUTER SCIENCE

2.SYSTEM SPECIFICATION

System configuration specifies the hardware and software configuration new


system regardless of how the requirement phase proceeds. it ultimately ends with the
software requirements specification of a good software. Requirements specification
should establish the basis for agreement between the teachers and students on what the
software specifies in the SRS will assist users to determine if the software specified meets
their needs or how the software must be modifies to meet their needs and managed by
admin.

2.1 HARDWARE CONFIGURATION

Processor : Quad Core


Speed : Above 500MHz
RAM capacity : 4GB
Hard Disk drive : 1TB
Key Board : Genius Scroll Mouse
Mouse : optical

2.2 SOFTWARE CONFIGURATION

Operating system : windows 10


Front End : HTML,CSS
Back End : PHP, MySQL Server
Software Tools : XAMP

CALICUT UNIVERSITY 5
ANGANWADI BSc COMPUTER SCIENCE

2.3 SOFTWARE SELECTION


2.3.1 OVERVIEW OF FRONTEND

HTML
HTML stands for Hypertext Markup Language. It is used to design the front-end
portion of web pages using a markup language. HTML is the combination of Hypertext
and Markup language. Hypertext defines the link between web pages. The markup
language is used to define the text documentation within the tag which defines the
structure of web pages. Markup languages are different from programming languages in
that they do not perform any logic. Instead, HTML is designed to create a structured
document using elements such as images, forms, lists, etc. It’s up to the browser to then
interpret this document to create the web pages that you end up viewing.

HTML is one of the biggest reasons the internet has become what it is today. You can
use HTML to build websites, and the ease and simplicity of HTML enable many to
develop and build websites. However, it has allowed its users to share web documents
seamlessly ever since its inception. These days, Web Developers use it to create excellent
web applications while coupling it with JavaScript and a Backend. HTML is something
one cannot live without if one works on a computer.

HTML has so many features that it took multiple RFCs (Request for Comments) to
describe every part. It would be almost impossible to go through all the features in this
article. However, we will go through the most popular ones that come in handy in a
developer’s life.

 User Friendly & SimpleYou can write HTML using annotations called tags. Tags
give HTML a structure and make it easy for humans and browsers to read the
document efficiently. They also enable a browser to apply CSS (Cascaded
StyleSheets) to the digital document, making it a powerful visual combination.
While HTML comes with 100s of tags inbuilt, only a handful of them that a
developer needs to learn for everyday use. Of course, all tags hold value; most of
them don’t find usage in normal development.

CALICUT UNIVERSITY 6
ANGANWADI BSc COMPUTER SCIENCE

 Semantic: StructureHTML5 defines unique tags to annotate different elements for


their specific purposes. The <article> tag, for example, is used to annotate content
on a page. The <aside> tag represents some content that is indirectly related to the
document’s primary content. Other noteworthy elements are <header>, <footer>,
<div>, the paragraph tag <p>, and the one most used for navigation between
pages, the <a> tag.
 SEO – Search Engine Optimisation:SEO is by far the biggest USP (Unique
Selling Point) of HTML5. With the advent of search engines like Google, Yahoo!,
DuckDuckGo etc., you have so much information literally at your fingertips.
These search engines accumulate information on the World Wide Web using
computer programs that crawl the internet (also called web crawlers) and map
keywords with respective documents in which they find it. These web crawlers
can assimilate this data only because HTML is well structured, and you can
optimise your web pages for searchability.
To highlight SEO, let me bring to your attention that this page is also SEO
optimised and should appear for the search query “Top features of HTML”. You
can even make use of the semantic structure of HTML for Search Engines using
tags like <title>, <meta> with description, <header> etc., to let the web crawler
know about the critical keywords in the document.
 Offline Capabilities (PWA) with Cache API & Service Workers
Imagine if you could build a web application that works even when the user’s
internet is down. Well, you don’t have to imagine because, with the advent of
Service Workers, IndexedDB and Cache API, you could very well make this a
reality. Your web application could offer a native-like experience to your users.
Many applications like Flipkart already do this, and it’s called a PWA
(Progressive Web Application).
Service Workers act as a proxy between the user’s machine and the internet. They
can store files locally and fetch them when needed via the Cache API and can also
bring information from the IndexedDB to provide the application with data. So,
when there’s no internet on a user’s device, the Service Worker intercepts these
requests and serves them from the locally stored data. You can configure your
service worker to update these files periodically or on-demand.

CALICUT UNIVERSITY 7
ANGANWADI BSc COMPUTER SCIENCE

 Canvas for Game Development


You can use HTML5 to build some simple games; however, if you’re looking to
make a good video game, you can utilise the <canvas> element along with CSS
and JavaScript. Canvas enables you to build 2D and 3D games. You can make
these games as interactive as you’d like.
 Platform Independent
HTML runs on a browser, and you can find a browser on almost any device with a
simple Operating System. If you had used mobile phones before smartphones
were a thing, you would know that even old Nokia phones that ran Symbian OS
could open HTML pages.
 Media Support
HTML can display images, video and audio; therefore, it enjoys excellent media-
running capabilities. HTML5 came up with <video> and <audio> tags making
this a lot easier than before. Of course, with HTML5, you can go beyond just
playing media; you can specify controls, images for buttons and even control the
playback programmatically.The <figure> tag also deserves a special mention
because it has revolutionised rendering images on a browser. You can also
represent captions using the <figcaption> tag along with the <figure> tag.

CSS
 CSS stands for Cascading Style Sheet. It gives an additional style to
the HTML document. A cascading style sheet is a language that is designed to
define the document formatting and look written in a markup language. Generally,
CSS is applied with HTML documents to change various styles of user interfaces
and web pages.
 CSS was introduced on 10th October 1994 by Hakon Wium Lie.
 CSS is an easy language to understand and learn, but it gives robust control on the
presentation of HTML documents
 It specifies how the various HTML elements or tags to be presented on the screen.
 It has various advantages, such as save time, offline browsing, fast page load, and
many others.
 CSS3 is the current version of the cascading style sheet.

CALICUT UNIVERSITY 8
ANGANWADI BSc COMPUTER SCIENCE

 It can be also applied with any document of XML, including XUL, SVG, and
plain XML.

Uses of CSS

 We can add unique styles to our old documents of HTML.


 We can change the overall look and feel of our website by following some
changes in the CSS code.
 A cascading style sheet can be used with JavaScript and HTML in most of the
websites to develop user interfaces for a lot of mobile applications and user
interfaces for various web applications.
Features of CSS

 Opportunity in Web designing: If anyone wants to begin a career in web


designing professionally, it is essential to have knowledge of CSS and HTML.
 Website Design: With the use of CSS, we can control various styles, such as the
text color, the font style, the spacing among paragraphs, column size and layout,
background color and images, design of the layout, display variations for distinct
screens and device sizes, and many other effects as well.
 Web Control: CSS has controlling power on the documents of HTML, so it is
easy to learn. It is integrated with the HTML and the XHTML markup languages.
 Other Languages: Once we have knowledge of some basics of CSS and HTML,
other associated technologies like Angular, PHP, and JavaScript are become
clearer to understand.

CSS Applications

 Some critical applications of CSS are discussed and listed below:


 Fast Page Loading: We don’t need to mention the attributes of the HTML
element every time if we use CSS. We need to specify one rule of CSS for an
element and use it for every occurrence of that element. So, short code means
high-speed download times.
 Easy Maintenance: To create a global alteration we need to alter the style. Every
element will get automatically updated within all web pages.

CALICUT UNIVERSITY 9
ANGANWADI BSc COMPUTER SCIENCE

 Superior HTML Styles: HTML contains few extended attribute’s array than
CSS, thus we can provide a much better view to our HTML page as compared to
HTML attributes.
 Save Time: We can specify CSS once and reuse the same sheet within various
HTML pages. We can describe a style for every HTML tag and apply this style to
as a lot of web pages as we want.
 Compatibility: The cascading style sheet permits content to be upgraded for one
or more device types. Distinct versions of the website could be granted for various
handheld devices like cell phones and PDAs, and for printing.
 Global Standards: Now, the attributes of HTML are being recommended to
apply CSS, and they are being deprecated. Thus it is better to begin the use of CSS
in every HTML page for making them compatible for future browsers.

2.3.2 OVERVIEW OF BACKEND

PHP

PHP is the language of choice for developers across the world today, as it offers a wide
range of powerful features. This versatile language has a plethora of applications,
including static and dynamic websites and web applications.

It also offers various usability advantages for developers and reduces their coding efforts.
PHP development requires a feature-rich backend for developers to get the intended
application development outcomes. Choosing the best backend service for your PHP
application can prove to be quite advantageous

PHP is a widely used server-side scripting language for developing web apps, static
websites, and dynamic websites. The term PHP used to be an acronym for Personal Home
Pages but now stands for Hypertext Pre-processor. This scripting language is embedded in
HTML, and it can also be utilized in combination with web frameworks, web content
management systems, and web template systems. Client computers access PHP scripts
through a web browser. PHP files have PHP tags and have a .php extension.

CALICUT UNIVERSITY 10
ANGANWADI BSc COMPUTER SCIENCE

PHP can be utilized for the management of session tracking, dynamic content, databases,
and the creation of e-commerce websites. This language is integrated with several widely-
used databases, including Microsoft SQL Server, PostgreSQL, MySQL, Informix, Sybase,
and Oracle.

PHP Benefits

 Easy to learn – PHP is widely regarded as one of the most natural server-side
scripting languages to learn. Developers do not need to put in as much effort as
with other web languages. PHP syntax is organized and logical.

 Compatibility and effortless integration – PHP enjoys compatibility with a large


number of operating systems. It is also supported by various platforms, including
Solaris, Linux, and UNIX. With PHP, developers are not required to redevelop
existing software due to its integration with Java and other technologies. Using
PHP helps developers conserve time and expenses.

 Optimal Flexibility – PHP offers a high amount of flexibility to make


development and code management convenient. The level of flexibility it provides
can help modify functionality anytime without causing any issues. Developers can
quickly implement changes anytime after a project has started, leading to
considerable time savings. Identifying and using the best backend service for
your PHP application can help to maximize its flexibility.

 Cost-effective – PHP is a free and open-source development language. Developers


can instantly start using it without having to pay any software or licensing
expenses. It functions effectively with various databases, including Apache,
PostgreSQL, and MySQL. As a result, the cost of developing websites with PHP is
quite low.

 Performance efficiency – Optimal development approaches can help


programmers get a high level of performance from PHP. The language offers
substantial scalability if utilized for writing code. It can also be utilized for the
development of a wide range of applications. Many developers prefer the efficient
performance of PHP for creating multi-page websites
CALICUT UNIVERSITY 11
ANGANWADI BSc COMPUTER SCIENCE

MYSQL

MYSQL is primarily an RDBMS and therefore ships with no GUI tools to administer
MYSQL databases or manage data combined within. users may use the included
command-line tools or download MYSQL front ends from various parties that have
developed desktop software and web applications to manage MYSQL databases, build
database structure, and work with data records.

The official MYSQL workbench is a free integrated environment developed by MYSQL


AB, that enables users to graphically administer MYSQL database and visually design
structure, MYSQL workbench replaces the previous package of software, MYSQL GUI
tools.

SQL (Structured Query Language) is a database computer language designed for


managing data in the relational database management systems (RDBMS), and originally
based upon relational algebra.

DEPLOYMENT

MYSQL can be built and installed manually from source code. On most Linux
distributions the packages management system can be downloading and install MYSQL
with minimal effort. MYSQL began as a low end alternative to more powerful proprietary
database, it has gradually evolved to support higher scale needs as well.

Much of MYSQL’s appeal originates in its relative simplicity and ease of use. In the
medium range, MYSQL can be scaled by developing it on more powerful hardware, such
as a multi-processor server with gigabytes of memory.

The multi server MYSQL deployment are required to provide improved performance and
reliability. A typical high-end configuration can include a powerful master database
which handles data write operations and is replicated to multiple slaves that handles all
read operations. The master server synchronizes continually with its slaves so in the event
of failure a slave can be promoted to become the new master, minimizing downtime.

QUERIES

CALICUT UNIVERSITY 12
ANGANWADI BSc COMPUTER SCIENCE

The most common operations in SQL is the query , which is performed with the
declarative SELECT statement. SELECT retrieves data from one or more tables, or
expressions. Standard SELECT statement have no persistent effect on the databases.
Some non-standard implementations of SELECT can have persistent effect such as the
SELECT INTO syntax that exists in some database.

Queries allow the user to describe desired data, leaving the database management system
(DBMS) responsible for planning, optimizing, and performing the physical operations
necessary to produce that result as it chooses. A query includes a list of columns to be
included in the final result immediately following the SELECT keyword. An asterisk
(“*”) can also be used to specify that the query should return all columns of the queried
tables.

SELECT is the most complex statement in SQL, with optimal keywords and clauses that
include:

● The FROM clause which indicates the table (s) from which the data is to be
retrieved. The FROM clause can include optional JOIN subclasses to specify the
rules for joining tables.
● The WHERE clause includes a comparison predicate, which restricts the rows
returned by the query. The WHERE clause eliminates all rows from the result set
for which the comparison predicate doesn't evaluate to true.
● The GROUP BY clause is used to project rows having common values into a
smaller set of rows. GROUP BY is often used in conjunction with SQL
aggregation functions or to eliminate duplicate rows from a result set. The
WHERE clause is applied before the GROUP BY clause.
● The ORDER BY clause identifies which columns are used to sort the resulting
data, and in which direction they should be sorted. Without an ORDER BY
clause, the order of rows returned by an SQL query is undefined.

CALICUT UNIVERSITY 13
ANGANWADI BSc COMPUTER SCIENCE

SYSTEM STUDY

CALICUT UNIVERSITY 14
ANGANWADI BSc COMPUTER SCIENCE

3. SYSTEM STUDY

System study is a detailed study of the various operations performed by the


system and their relationships within and outside the system. It is the phase in which the
problem identified, alternate solution is evaluated and the most feasible solution is
recommended. The identification of a problem or need is a users request to a change,
improve or enhance an existing system. The initial investigation is in a way of handling
this. The objective is to determine whether the request is valid and feasible system or
build a new one.System analysis specifies what system should do. A system is a set of
components that interact to accomplish some purpose like:

 Identifying the drawback of existing system.


 Identify the need of new system.
 Perform the feasibility study.
 Identify the hardware, software and database requirements.
 Create a system definition that forms the foundation for subsequent work.

3.1 EXISTING SYSTEM


At present all the processes that take place in an Anganwadi centre is handled manually.
All the records regarding the kids details, immunization details, and nutrition supplement
are documented in paper. The existing system involves a lot of human effort and it is
difficult to maintain all the records manually through paper.

3.1.1 DRAWBACKS OF EXISTING SYSTEM:


The existing manual system has got following disadvantages:
 It is time consuming job.
 It is difficult to maintain the order detail.
 Preparation of reports is not an easy work.
 Maintaining information and retrieving information according to our needs are
limited.
 Retrieving information regarding a particular service is a time consuming
process and it may not be accurate.

CALICUT UNIVERSITY 15
ANGANWADI BSc COMPUTER SCIENCE

 Manually maintaining the data’s is tedious and sometimes information maybe


lost or overloaded by human.

3.2 PROPOSED SYSTEM

The proposed system ANGANWADI is designed to Computerise the processes


take place in an Anganwadi. The main user of the system is administrator. This system
was developed with the concept of to decrease the work load of the administrator. The
administrator given unlimited access to all the functionalities of a software like add a new
event, view events, delete and update existing events. Admin can Add, View and delete
the details regarding students, immunization, nutrition supplement. Admin can also view
the contact details separately. The proposed system eliminates the manual operation of
going through a heap of file and records whenever required to enter a new record , to
update existing record, to delete an existing record. The users of the system can have the
previlage to view the notifications which is generated by the Admin.The system
eliminates the chance of errors while retrieving records using this proposed systems. The
system is a user friendly software which is developed using HTML and CSS as frontend
and PHP: MySQL as backend

3.2.1 ADVANTAGES:

Proposed system has the following advantages:


 Computerization gives the high degree of maintenance.
 Computerization provides a better and easy record facility.
 Computerization will reduced the manual work problem.
 It helps to maintain the services regarding the immunization and nutrition
supplement effectively and accurately.
 Notification generation will helps to inform the users about the services provided
It is proposed to make the new system extremely user friendly with will-designed screens
and limited inputs and required amount of outputs.

CALICUT UNIVERSITY 16
ANGANWADI BSc COMPUTER SCIENCE

SYSTEM ANALYSIS

CALICUT UNIVERSITY 17
ANGANWADI BSc COMPUTER SCIENCE

4. SYSTEM ANALYSIS

4.1 FEASIBLITY STUDY

All project are feasible when given unlimited resources and infinite time. It is both
necessary and prudent to evaluate the feasibility of a project at the earliest possible time.
A feasible study is not warranted for system in which economic justification is observed,
technical risk is low, few legal problems are expected and no reasonable alternative
exists. An estimate is made of whether the identified user needs may be satisfied using
our recent software and hardware technologies. The study will decide if the proposed
system will be cost effective, form the business point of view and it can be developed in
the existing budgetary. The feasibility study should be relatively sharp and quick. The
gesture should inform the decision of whether to go ahead with a more detailed analysis.

Feasibility study may be documented as a separate report to higher officials of the


top level management and can be included as appendices to the system specification.
Feasibility and risk analysis is detailed in many worries. If there is project risk then the
feasibility of producing the quality software is reduced.

The study is done in three phases.

 Economic feasibility
 Technical feasibility
 Behavioral feasibility
 Operational feasibility

4.1.1 ECONOMIC FEASIBILITY


Economic analysis is the most frequently used method for evaluating effectiveness
of a candidate system. More commonly known as cost /benefit analysis, the procedure is
to determine the benefit and saving that are expected from a candidate system and

CALICUT UNIVERSITY 18
ANGANWADI BSc COMPUTER SCIENCE

compare them with cost. It requires determination of capital costs (cost of purchase of
equipment), setup cost (the cost of system development) and running cost (daily operation
cost).since the existing is already automated ,it is quite affordable .
A cost evaluation is weighted against ultimate income or benefit derived from. The
developed
Economic justification is generally the “Bottom Line” consideration the included cost
benefit analysis, long term corporation income strategies, impact on other profile centers
or products ; cost of resources needed for development and potential market growth.
When compare to the advantage obtained from implementing the system its costs is
affordable. Also the system is designed to meet the modification require in the future.
Therefore most of the modification can be done without much rework. In the stage
following issues are considered:

4.1.2 TECHNICAL FEASIBILITY


Technical feasibility centres around the existing computer system (hardware,
software etc. ) and to what extent it can support the proposed addition. The function
requirement like storage must be confidential and vital. The propose system is technically
feasible since the function requirement can be achieved and easily maintained by
developing the system with PHP:MySQL as back end where the database can easily
storage in the form of tables, retrieved and finally maintained along with back up facility.
The front end is developed using HTML/CSS ,which provides the state of art user
interface support.

The technical feasibility studies is a study of function, performances and constraints and
improve the ability to create an acceptable system. Technical feasibility is frequently the
most difficult are to achieve at the stage of product engineering process. Considering that
are normally associated with the technical feasibility include

● Development risk
● Resource availability
● Technology

The development risk considered the factors like whether the system can
implement using assistance technology and the design of the system can run on the real
environment.

CALICUT UNIVERSITY 19
ANGANWADI BSc COMPUTER SCIENCE

The resource availability checks the availability of resource like times, human, hardware
etc..

The technology using to implement the system is selected according to the


technical feasibility study .The technical feasibility study on the technology found that it
can implement all the functional requirements of the proposed system .The technology
selected according to accept the system globally and the development of the system
according to the universal standards.

4.1.3 BEHAVIOURAL FEASIBILITY

People are inherently resistant to change in computer have been known to


facilitate change .An estimate should be made of how strong a reaction the user staff is
likely to have towards the development of a computerized system. It is common
knowledge that computer installation have something to do with turnover, transfers,
retaining and changes in employee job status. Therefore, it is understandable that the
introduction of a candidate system require special effort educate, sell, and trail the staff on
new days of conducting business.

4.1.4 OPERATIONAL FEASIBILITY

Operational feasibility involves the detail study of extensive use of system if it is


developed and implemented. Operational feasibility studies the handling of system by the
end users, and gives feedback about the benefits that comes out of it by the
implementation of system. The proposed system uses HTML and CSS as the front end,
which are the most powerful integrated development environment and PHP,MYSQL as
the back end, which enforces security specification and data integrity specification.

CALICUT UNIVERSITY 20
ANGANWADI BSc COMPUTER SCIENCE

SYSTEM DESIGN
&
DEVELOPMENT

CALICUT UNIVERSITY 21
ANGANWADI BSc COMPUTER SCIENCE

5.SYSTEM DESIGN & DEVELOPMENT

5.1 SYSTEM DESIGN

System design is the solution to the creation of a new system. This phase is
composed of several systems. This phase focuses on the detailed implementation of the
feasible system. It emphasis on translating design specifications to performance
specification. System design has two phases of development logical and physical design.

During logical design phase the analyst describes inputs (sources), out puts
(destinations), databases (data sores) and procedures (data flows) all in a format that
meats the uses requirements. The analyst also specifies the user needs and at a level that
virtually determines the information flow into and out of the system and the data
resources. Here the logical design is done through data flow diagrams and database
design.

The physical design is followed by physical design or coding. Physical design


produces the working system by defining the design specifications, which tell the
programmers exactly what the candidate system must do. The programmers write the
necessary programs that accept input from the user, perform necessary processing on
accepted data through call and produce the required report on a hard copy or display it on
the screen.

5.2 INPUT DESIGN

The input design is the link between the information system and the user. It
comprises the developing specification and procedures for data preparation and those
steps are necessary to put transaction data into a usable form for processing data entry.
The activity of putting data into the computer for processing can be achieved by
inspecting the computer to

CALICUT UNIVERSITY 22
ANGANWADI BSc COMPUTER SCIENCE

read data from a written or printed document or it can occur by having people keying the
data directly into the system.

The system needs the data regarding the asset items, depreciation rates, asset
transfer, physical verification for various validation, checking, calculation and report
generation.. The error raising method is also included in the software, which helps to raise
error message while wrong entry of input is done. So in input design the following things
are considered.
What data should be given as input?

● How the data should be arranged or coded


● The dialogue to guide the operating personnel in providing input.
● Methods for preparing input validations and steps to follow when error occur
● The samples of screen layout are given in the appendix.

5.3 OUTPUT DESIGN

Computer output is the most important and direct information source to the user.
Output design is a process that involves designing necessary outputs in the form of
reports that should be given to the users according to the requirements. Efficient,
intelligible output design should improve the system's relationship with the user and help
in decision making. Since the reports are directing referred by the management for taking
decisions and to draw conclusions they must be designed with almost care and the details
in the reports must be simple, descriptive and clear to the user.so while designing output
the following things are to be considered.

● Determine what information to present


● Arrange the presentation of information in an acceptable format
● Decide how to distribute the output to intended receipts

Depending on the nature and future use of output required, they can be displayed
on the monitor for immediate need and for obtaining the hardcopy. The options for the
output reports are given in the appendix.

CALICUT UNIVERSITY 23
ANGANWADI BSc COMPUTER SCIENCE

5.4 DATAFLOW DIAGRAM


Introduction to DFD

A Data flow diagram (DFD) is a diagram that describes the flow of data and the
processes that change or transform data throughout a system. Four basic symbols that
represent data sources, data flows, data transformation, and data storage.

Basic data flow symbols are:

⮚ A “square” defines a sources (originator) or destination of a system data.


⮚ An “arrow” identifies data flow. It is a pipe line through which information flows.
⮚ A “circle” represents a process that transforms incoming data flow(s) into
outgoing data flow(s).
⮚ An “open rectangle” is data storage.

Data flow diagram symbols:-

- Source or Destination of data

- Data Flow

- Process

- Storage

CALICUT UNIVERSITY 24
ANGANWADI BSc COMPUTER SCIENCE

Four steps are commonly used to construct a DFD:

⮚ Process should be named and numbered for easy reference. Each name should be
representative of the process.
⮚ The destination of flow is from top to bottom and from left to right.
⮚ When a process is exploded in to lower level details they are numbered.
⮚ The names of data stores, sources and destinations are written in capital letters.

Rules for constructing a Data Flow Diagram

⮚ Arrows should not cross each other.


⮚ Squares, circles and files must bear names.
⮚ Decomposed data flow squares and circles can have same names.
⮚ Draw all data flow around the outside of the diagram.

CONTEXT LEVEL DFD ( LEVEL 0)

CALICUT UNIVERSITY 25
ANGANWADI BSc COMPUTER SCIENCE

FIRST LEVEL DFD : ADMIN MODULE

CALICUT UNIVERSITY 26
ANGANWADI BSc COMPUTER SCIENCE

FIRST LEVEL DFD OF USER MODULE(1.1)

CALICUT UNIVERSITY 27
ANGANWADI BSc COMPUTER SCIENCE

5.5 DATABASE DESIGN


The overall objective in the development of database technology has been to treat
data as an organizational resource and as an integrated whole. DBMS allow data to be
protected and organized separately from other resources. Database is an integrated
collection of data. The most significant form of data as seen by the programmers is data
as stored on the direct access storage devices. This is the difference between logical and
physical data.

Database files are the key source of information into the system. It is the process
of designing database files, which are the key source of information to the system. The
files should be properly designed and planned for collection, accumulation, editing and
retrieving the required information.
The organization of data in database aims to achieve three major objectives: -

● Data integration.
● Data integrity.
● Data independence.

The proposed system stores the information relevant for processing in the
MYSQL SERVER database. This database contains tables, where each table corresponds
to one particular type of information. Each piece of information in table is called a field
or column. A table also contains records, which is a set of fields. All records in a table
have the same set of fields with different information. There are primary key fields that
uniquely identify a record in a table. There are also fields that contain primary key from
another table called foreign keys.

NORMALIZATION OF DATABASE

Database Normalization is a technique of organizing the data in the database.


Normalization is a systematic approach of decomposing tables to eliminate data
redundancy and undesirable characteristics like Insertion, Update and Deletion
Anomalies. It is a multi-step process that puts data into tabular form by removing
duplicated data from the relation tables.

CALICUT UNIVERSITY 28
ANGANWADI BSc COMPUTER SCIENCE

Normalization is used for mainly two purposes,

 Eliminating redundant (useless) data.


 Ensuring data dependencies make sense i.e., data is logically stored.

Normalization rule

Normalization rule are divided into following normal form.

 First Normal Form


 Second Normal Form
 Third Normal Form

First Normal Form(1NF)

 As per First Normal Form, no two Rows of data must contain repeating group of
information i.e. each set of column must have a unique value, such that multiple
columns cannot be used to fetch the same row. Each table should be organized
into rows, and each row should have a primary key that distinguishes it as unique.
 The Primary key is usually a single column, but sometimes more than one column
can be combined to create a single primary key. For example, consider a table
which is not in First normal form.

Second Normal Form (2NF)

 As per the Second Normal Form there must not be any partial dependency of any
column on primary key. It means that for a table that has concatenated primary
key, each column in the table that is not part of the primary key must depend upon
the entire concatenated key for its existence. If any column depends only on one
part of the concatenated key, then the table fails Second normal form.

Third Normal Form (3NF)

 Third Normal form applies that every non-prime attribute of table must be
dependent on primary key, or we can say that, there should not be the case that a
non-prime attribute is determined by another non-prime attribute. So, this
transitive functional dependency should be removed from the table and also the
table must be in Second Normal form. For example, consider a table with
following fields

CALICUT UNIVERSITY 29
ANGANWADI BSc COMPUTER SCIENCE

5.6 TABLE DESIGN

Admin
Table Key: username(primary Key)

Field Name Data type Size


username varchar 50
password varchar 50

Register
Table Key: username(primary Key)
Field Name Data type Size
childname varchar 100
date date 0
gardian varchar 200
address varchar 300
phone varchar 100
angacode varchar 100
emailid varchar 200
password varchar 200

timetable
Field Name Data type Size
day varchar 100
time date 0
Act1 varchar 200
Break1 varchar 300
Act2 varchar 100
Break2 varchar 100
Act3 varchar 200

CALICUT UNIVERSITY 30
ANGANWADI BSc COMPUTER SCIENCE

Contact
Table Key: email(primary Key)
Field Name Data type Size
email varchar 100
Phone varchar 100
subject varchar 200
message varchar 500

Event

Field Name Data type Size


date date 0
eventname varchar 100
eventvenue varchar 200
eventdetail varchar 500

Nutri

Field Name Data type Size


date date 0
nutriname varchar 100
age varchar 200

CALICUT UNIVERSITY 31
ANGANWADI BSc COMPUTER SCIENCE

5.7 ER DIAGRAM

CALICUT UNIVERSITY 32
ANGANWADI BSc COMPUTER SCIENCE

SYSTEM TESTING

CALICUT UNIVERSITY 33
ANGANWADI BSc COMPUTER SCIENCE

6.SYSTEM TESTING

Testing is the process of detecting errors. Testing performs a very critical role for
quantity assurance time for ensuring the reliability of software. The results of testing used
later on during maintenance also.
The main testing is often to demonstrate that a program works by showing that it has no
errors. The basic purpose of testing phase is to detect the errors that may be present in the
program. Hence one should not start testing with the intent of showing that a program
works, but the intent should be to show that a program doesn't works. Testing is the
process of executing a program with the intent of finding errors.

TESTING OBJECTS

The main objective of testing is to uncover a host of errors, systematically and


with minimum effort and time. Starting formally, we can say,

● Testing is a process of executing program with the intent of finding errors.


● A successful test is one that uncovers an a yet undiscovered error.
● A good case is one that has a high probability of finding errors, if it exists.
● The tests are inadequate to detect possibly present errors.

6.1 UNIT TESTING

Unit testing focuses on the verification efforts in the module. The unit testing is always a
white box oriented one and this step can be conducted in parallel for modules.

The module interface is tested to ensure that information flows in and out
appropriately. The local data structures are examined to ensure that data stored
temporarily. Boundary conditions are tested to ensure that the module is operating
properly at the boundaries established. All independent paths through the control
structures in a module are executed at least once.

CALICUT UNIVERSITY 34
ANGANWADI BSc COMPUTER SCIENCE

6.2 INTEGRATION TESTING

The integration is the next important concept that highlights in the testing
scenario. Integration testing can be performed in different strategies. One of them is the
Big Bang testing in which one could first test all of a system’s modules separately and
then whole systems at once. But here we proceed abruptly from the module testing and
the integration testing disappears. Another alternative is the Incremental testing. We can
start the integration as soon as reasonable subsets of modules have been developed. It is
easier to localize errors incrementally.

6.3 VALIDATION TESTING

After the termination of integration testing, software is completely assembled as a


package. Interfacing errors are uncovered corrected in a final series of software test
validation begins. Software validation is achieved through a series of black drops a test
that demonstrates conformity with requirements. After validation test has been conducted
one of the two best conditions exists.

6.4 ACCEPTANCE TESTING

Acceptance testing involves planning and execution of functional tests,


performance test, and stress tests to verify that the implemented system satisfies its
requirements. Acceptance tests are typically performed by quality assurance and/or
customer organizations. Functional and performance tests are performed to determine the
limitations of the system. Typically, acceptance test will incorporate test cases developed
during unit testing and integration testing. Addition test cases are added to achieve
desired level of functional, performance and stress testing of the entire system.

CALICUT UNIVERSITY 35
ANGANWADI BSc COMPUTER SCIENCE

SYSTEM IMPLEMENTATION

CALICUT UNIVERSITY 36
ANGANWADI BSc COMPUTER SCIENCE

7.SYSTEM IMPLEMENTATION
Implementation is the stage where theoretical design has been turned into a
working system. The main aim of this implementation phase is to see whether the output
created and inputs given are according the user’s requirements and specifications.
Implementation is the final and important phase. This method also offers security since
the old system can take over the errors are found while using the new system.

The stage consists of:

● Testing the developed deprograms with sample data.


● Detection and correction of errors.
● Testing whether the system meets user requirements.
● Creating files of the system with the actual data.
● Making necessary changes are desired by the user.
● Training user personnel.
● An implementation design of method is to achieve the changes over method.

Implementation plan
Implementation includes all those activities that take place to convert from old
system to new. At this stage the theoretical design is turned into working system. The
crucial stage in achieving a successful new system and giving confidence on the system
for the users that will work efficiently and effectively.

The implementation involved careful planning, investigation, of the current


system and it’s constraints on implementation, design of methods to achieve the
changeover. Training of staff in the overall procedures, and evaluation of changeover.
The more complex this system being implemented, the more involved will be system
analysis and design effort required just for implementation.

CALICUT UNIVERSITY 37
ANGANWADI BSc COMPUTER SCIENCE

Methods of implementation:
The common implementation approaches are:

1. Parallel Conversion: In parallel conversion the existing system and new system operate
simultaneously it is confirmed that new system is working properly. The outputs from the
old system continue to be distributed until the new system has proved satisfactorily. This
is a costly method since the amount of duplication is involved.

2. Direct Conversion: Here old system is discontinued altogether and the new system
becomes operational immediately. The greater risk is associated with direct conversion is,
no backup in the case of system fails.

3. Pilot Conversion: This involves the change over the part of the system either in
parallel or direct. Use of the variation of the two main methods is possible when
part of the system can be treated as a separate entity.

4. User Training: After the system is implanted successfully, training of the user is one of
the most important sub task of the developer. Here user manuals are prepared and is
given to the user. Both the hardware and software securities are made to run the
developed system successfully in future. At last it is confirmed that the system is
implemented up to user’s need and expectation.

CALICUT UNIVERSITY 38
ANGANWADI BSc COMPUTER SCIENCE

SYSTEM MAINTENANCE

CALICUT UNIVERSITY 39
ANGANWADI BSc COMPUTER SCIENCE

8. SYSTEM MAINTENANCE
Maintenance is any work done to change the system after it is delivered. The term
maintenance is used to describe activities that occur following the delivery of the product
to the user. The maintenance phase of the software life cycle is the time period in which a
software product performs useful wok. The four maintenance activities are: corrective
maintenance ,adaptive maintenance, perfect maintenance or enhancements preventive re-
engineering.

It involves a wide range of activities involving correcting and design errors


updating documentation and test data and upgrading user support. Maintenance is done
after the successful implementation. It is continued till the process is reengineered or
deployed to another platform. It is also done based on fixing the problems reported,
changing the interface with other software or hardware enhancing the software. The
present system developed assures that it will be flexible to perform maintenance to add
additional features to suit the changing requirements.

CALICUT UNIVERSITY 40
ANGANWADI BSc COMPUTER SCIENCE

SCOPE FOR FUTURE ENHANCEMENT

CALICUT UNIVERSITY 41
ANGANWADI BSc COMPUTER SCIENCE

9. SCOPE FOR FUTURE ENHANCEMENT


Enhancements mean modifying, adding or redeveloping the code to support changes in
the specifications. This website is developed in PHP with MYSQL as back end and there
for in corporate all aimed features of the software. As the future enhancement, we plan to
implement some additional messaging modules which enables to send notifications
directly to user’s contact numbers or email id, and more user-friendly interface and
dynamic web pages. The package can be extended with respect to the changes in future
requirements.

CALICUT UNIVERSITY 42
ANGANWADI BSc COMPUTER SCIENCE

CONCLUSION

CALICUT UNIVERSITY 43
ANGANWADI BSc COMPUTER SCIENCE

10. CONCLUSION

Any system, which has been in use for a number of years, gradually, decay and
become less effective because of the change in environment to which one has to adapt.
For a time it is possible to overcome problems by amendments and minor modification to
acknowledge the need of fundamental change. Computerization was proposed as a
solution to the problem of been outdated with the fast present technologies. In this project
our aim is to provide methods for feedback entry.

We have successfully completed our project ANGANWADI in the time span


allotted and put together to form the main system. The modules were tested separately.
Testing of the whole system has been done with sample data and output obtained
according to the requirements.

The project meets all the requirements as described in the proposed system and
satisfies user requirements to a great extent. The software thus developed is easy to
maintain is quite user friendly.

CALICUT UNIVERSITY 44
ANGANWADI BSc COMPUTER SCIENCE

BIBLIOGRAPHY

CALICUT UNIVERSITY 45
ANGANWADI BSc COMPUTER SCIENCE

11. BIBLIOGRAPHY

1. https://www.w3schools.com/php
2. https://www.codester.com
3. https://www.guru99.com
4. https://www.geeksforgeeks.org
5. https://www.sourcecodester.com

CALICUT UNIVERSITY 46
ANGANWADI BSc COMPUTER SCIENCE

APPENDIX

CALICUT UNIVERSITY 47
ANGANWADI BSc COMPUTER SCIENCE

12.APPENDIX
12.1 UI DESIGNS

HOME PAGE

CALICUT UNIVERSITY 48
ANGANWADI BSc COMPUTER SCIENCE

ADMIN LOGIN

ADMIN PANEL

CALICUT UNIVERSITY 49
ANGANWADI BSc COMPUTER SCIENCE

LOGIN PAGE

REGISTERATION

CALICUT UNIVERSITY 50
ANGANWADI BSc COMPUTER SCIENCE

USER PANEL

CALICUT UNIVERSITY 51
ANGANWADI BSc COMPUTER SCIENCE

12.2 SAMPLE CODE


Login.html

<!DOCTYPE html>

<html lang="en">

<head>

<meta charset="UTF-8">

<meta name="viewport" content="width=device-width, initial-scale=1.0">

<meta http-equiv="X-UA-Compatible" content="ie=edge">

<title>login</title>

<!-- Font Icon -->

<link rel="stylesheet" href="fonts/material-icon/css/material-design-iconic-


font.min.css">

<!-- Main css -->

<link rel="stylesheet" href="css/style.css">

</head>

<body>

<div >

<section class="sign-in">

<div class="container">

<div class="signin-content">

<div class="signin-image">

<figure><img src="images/loginimg.png" alt="sing up image"></figure>

CALICUT UNIVERSITY 52
ANGANWADI BSc COMPUTER SCIENCE

<a href="register.html" class="signup-image-link">Create an account</a>

</div>

<div class="signin-form">

<h2 class="form-title">Sign up</h2>

<form method="POST" class="register-form" id="login-form"


action="login.php">

<div class="form-group">

<label for="your_name"><i class="zmdi zmdi-account material-


icons-name"></i></label>

<input type="text" name="em" id="your_name" placeholder="Your


Name"/>

</div>

<div class="form-group">

<label for="your_pass"><i class="zmdi zmdi-lock"></i></label>

<input type="password" name="pw" id="your_pass"


placeholder="Password"/>

</div>

<!-- <div class="form-group">

<input type="checkbox" name="remember-me" id="remember-me"


class="agree-term" />

<label for="remember-me" class="label-agree-


term"><span><span></span></span>Remember me</label>

</div> -->

<div class="form-group form-button">

<input type="submit" name="buttons" id="signin" class="form-


submit" value="Log in"/>

</div>

</form>

<!-- <div class="social-login">

CALICUT UNIVERSITY 53
ANGANWADI BSc COMPUTER SCIENCE

<span class="social-label">Or login with</span>

<ul class="socials">

<li><a href="#"><i class="display-flex-center zmdi zmdi-


facebook"></i></a></li>

<li><a href="#"><i class="display-flex-center zmdi zmdi-


twitter"></i></a></li>

<li><a href="#"><i class="display-flex-center zmdi zmdi-


google"></i></a></li>

</ul>

</div> -->

</div>

</div>

</div>

</section>

</div>

<!-- JS -->

<script src="vendor/jquery/jquery.min.js"></script>

<script src="js/main.js"></script>

</body><!-- This templates was made by Colorlib (https://colorlib.com) -->

</html>

Login.php

<?php

session_start();

$con=mysqli_connect("localhost","root","","anganwadi");

//mysqli_select_db("anganwadi");

CALICUT UNIVERSITY 54
ANGANWADI BSc COMPUTER SCIENCE

if(isset($_POST['buttons']))

$em=$_POST['em'];

$pwd=$_POST['pw'];

$sql="SELECT * FROM register WHERE emailid='$em' and password='$pwd'";

//echo $sql;

$query=mysqli_query($con,$sql);

$count=mysqli_num_rows($query);

if($count==1)

$_SESSION['email'] ="$em"; // Initializing Session

header('location:../user pannel/index.php');

else

echo ("<script LANGUAGE='JavaScript'>

window.alert('Invalid email or password');

window.location.href='login.html';

</script>");

CALICUT UNIVERSITY 55
ANGANWADI BSc COMPUTER SCIENCE

mysqli_close($con);

?>

Eventtable.php

<div class="col-lg-12 stretch-card">

<div class="card">

<div class="card-body">

<h4 class="card-title">Time table</h4>

<div class="table-responsive pt-3">

<table class="table table-bordered">

<thead>

<tr>

<th>

Day

</th>

<th>

Timings

CALICUT UNIVERSITY 56
ANGANWADI BSc COMPUTER SCIENCE

</th>

<th>

Activity1

</th>

<th>

Snack Break

</th>

<th>

Activity2

</th>

<th>

Lunch Break

</th>

<th>

Activity3

</th>

</tr>

</thead>

<tbody>

<tr class="table-info">

<?php

// Create connection

$conn = new mysqli("localhost","root","","anganwadi");

// Check connection

CALICUT UNIVERSITY 57
ANGANWADI BSc COMPUTER SCIENCE

$sql = "SELECT * from timetable";

$result = $conn->query($sql);

while($row = $result->fetch_assoc())

$rid = $row['day'];

echo"<tr>";

echo"<td width='80'>".$row["day"]."</td>";

echo"<td width='80'>".$row["time"]."</td>";

echo"<td width='80'>".$row["act1"]."</td>";

echo"<td width='80'>".$row["break1"]."</td>";

echo"<td width='80'>".$row["act2"]."</td>";

echo"<td width='80'>".$row["break2"]."</td>";

echo"<td width='80'>".$row["act3"]."</td>";

?>

<?php

CALICUT UNIVERSITY 58
ANGANWADI BSc COMPUTER SCIENCE

$conn->close();

?>

</tbody>

Addevent.php

<?php

$da=$_POST["dat"];

$ename=$_POST["eventname"];

$evenu=$_POST["eventvenu"];

$edet=$_POST["eventdet"];

$con=new mysqli("localhost","root","","anganwadi");

$sql="insert into event(date,eventname,eventvenu,eventdetail)


values('$da','$ename','$evenu','$edet')";

if($con->query($sql)==true)

echo ("<script LANGUAGE='JavaScript'>

window.alert('Succesfully added');

window.location.href='addevent.html';

CALICUT UNIVERSITY 59
ANGANWADI BSc COMPUTER SCIENCE

</script>");

else

echo ("<script LANGUAGE='JavaScript'>

window.alert('Not Registerd');

window.location.href='register.html';

</script>");

mysqli_close($con);

?>

CALICUT UNIVERSITY 60

You might also like