Download - pyrol system
-
7/30/2019 pyrol system
1/67
CRYPTOGRAPHY 2013
BANSAL INSTITUTE OF SCIENCE & TECHNOLOGY
BHOPAL (M.P.)
CERTIFICATE
This is to certify that the work embodied in this project work entitled
CRYPTOGRAPHY has been satisfactorily completed by ABHAY
KUMAR (0112CS091004), YOGESH PANDAGRE (0112CS081120),
YOGESH KHARE (0112CS081119) ,PANKAJ GUPTA (0112CS091068) . It
is a bonafide piece of work, carried out under the guidance of Department of
Computer science & Engineering, Bansal Institute of Science &
Technology, Bhopal for the partial fulfillment of the Bachelor of Engineering
during the academic year 2012-13.
Prof. Niket Bhargava Prof. Vijay Lokhande Prof. A. M.
Jain
(Project Guide) (H.O.D) (Principal)
1
-
7/30/2019 pyrol system
2/67
CRYPTOGRAPHY 2013
C.S.E. Dept. C.S.E. Dept. BIST BHOPAL
CRYPTOGRAPHY
A Minor Project ReportSubmitted in Partial fulfillment for the award of
Bachelor of Engineering (B.E.) DegreeIn Computer Science & Engineering
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA
BHOPAL (M.P.)
MINOR PROJECT REPORT
S ubmitted by
1) ABHAY KUMAR
2) PANKAJ GUPTA
3) YOGESH KHARE
3) YOGESH PANDAGRE
Under the Guidance of
2
-
7/30/2019 pyrol system
3/67
CRYPTOGRAPHY 2013
Prof. Niket Bhargava
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
BANSAL INSTITUTE OF SCIENCE & TECHNOLOGY
BHOPAL (M.P.)
MAY- 2013
3
-
7/30/2019 pyrol system
4/67
CRYPTOGRAPHY 2013
ACKNOWLEDGEMENT
Words shall never be able to pierce through the Gamuts of emotions that
are suddenly exposed during the routine of our life. They shall never be able
neither to describe the spirit with which we worked together nor shall they ever
be able to express the feelings we felt towards our guides.
This project was a struggle that was made much more difficult due to
numerous reasons; some of error correction was beyond our control.
Sometimes we were like rudderless boat without knowing what to do next. It
was then the timely guidance that has seen us through all these odds. We would
be very grateful to them for their inspiration, encouragement and guidance in
all phases of the discretion.
It is our pleasure to have the guidance of Prof. Niket Bhargava, and
co guidance ofProf. Ashish Goswami. We thank them and our HOD Prof.
Vijay Lokhande sir and principal Prof. A.M Jain sir for their constant
encouragement and valuable advice during the course of our project.
Submitted by:-
ABHAY KUMAR (0112CS091004)
4
-
7/30/2019 pyrol system
5/67
CRYPTOGRAPHY 2013
ABSTRACT
The bank management system is an application for
maintaining a persons account in a bank. The system provides
the access to the customer to create an account,
deposit/withdraw the cash from his account, also to view
reports of all accounts present. The following presentation
provides the specification for the system.. Traditional methodsinclude doing this by maintaining registers .
PAYROLL MANAGEMENT basically allows an organization to be
able to keep every detail about its employees . This is great
because company can be comfortable and have peace of mind
knowing that it can keep track of all its employees in just few
minutes and without any maintainance of papers.It can also
be used calculate the net salary after the reductions involving
p.f, hra, loan and provide the salary slip easily .
The aim of this project is to develop a easier detailed system
with the objectives as to create the employee database in
lesser time span and also allows modification of data in justone click.
The scope of this project is limited to the activities of the
operations unit of the Employee Details system which include
opening of Employee details and viewing all the details related
to the employee like seeing their salary,loan details.
5
-
7/30/2019 pyrol system
6/67
CRYPTOGRAPHY 2013
This project employs the object oriented approach of software
engineering using appropriate (UML TOOLS) an object oriented
approach. Some of the steps taken are Feasibility study under
which understanding and identifying of existing system and
associated study is conducted, proper analysis and suggested
solution to tackle such problem, designing the new system
through an object oriented software tools (UML) and Coding
which is implemented C++ i.e Object Oriented Technology
INDEX
CHAPTER-1 INTRODUCTION:
1.1 SOFTWARE PROCESS MODEL
8
1.2 FEASIBILITY9
1.3 HARDWARE AND SOFTWARE REQUIREMENT15
1.4 FRONTEND16
CHAPTER-2 ANALYSIS:
2.1 STRUCTURE ANALYSIS
2.1.1 SRS
6
-
7/30/2019 pyrol system
7/67
CRYPTOGRAPHY 2013
23
2.1.2 DATA DICTIONARY29
2.1.3 E-R DAIGRAM31
2.1.4 DATA FLOW DIAGRAM33
2.1.5 STATE TRANSITION DIAGRAM36
2.2 OBJECTORIENTED ANALYSIS
2.2.1 USE CASE DIAGRAM
37
2.2.2 CRCINDEX CARD 38
2.2.3STATE MACHINE DIAGRAM 38
2.2.4 FUNCTIONAL DIAGRAM38
CHAPTER-3 DESIGN:
3.1 STRUCTURE DESIGN
3.1.1 DATA STRUCTURE DESIGN39
3.2 OBJECT ORIENTED DESIGN
3.2.1 CLASS OBJECT DIAGRAM41
7
-
7/30/2019 pyrol system
8/67
CRYPTOGRAPHY 2013
CHAPTER-4 TESTING:
4.1 TEST PLAN42
4.2 TEST STRATEGY
43
4.3 TEST HARNESS
44
4.4 TEST FIXER 45
4.5 TEST CASE
47
CHAPTER-5 DEPLOYMENT:
5.1 USER MANUAL
48
5.2 SCREEN LAYOUTS
50
CHAPTER-6 FUTURE ENHANMENT AND CONCLUSION62
CHAPTER-7 REFERENCES & BIBLIOGRAPY63
8
-
7/30/2019 pyrol system
9/67
CRYPTOGRAPHY 2013
CHAPTER -1
INTRODUCTION:We are engineering the software product PAYROLL MANAGEMENT.
It works as an application to store employees details.
This project is made with a view to give all the details of an employee. It
helps the firm to maintain these records in a proper way.
This project is made with a view to give all the details of an employee.
1.It tells about the joining date of an employee.
2.It tells about the basic salary of an employee
3. It keeps the record of the address, name and telephone number of the
employee.
4. It keeps the track of the designation of an employee such as, whether
an employee is a manager or a superintendent.
5. It records whether an employee taken any kind of loan from the
company.
9
-
7/30/2019 pyrol system
10/67
CRYPTOGRAPHY 2013
SOFTWARE PROCESS MODEL:
This application is based on the WATERFALL Software Model. It is developed and implemented
according to the requirement. This is the rigorous sequential process which is provided by the
WATERFALL Software Model.
WATERFALL MODEL
The waterfall model is a sequentialdesign process, often used in software development
processes, in which progress is seen as flowing steadily downwards (like a waterfall)
through the phases of Conception, Initiation, Analysis, Design,
Construction, Testing and Maintenance.This project is to be developed step by step using modelAGILE the time division for various stages is as follows.
a) REQUIREMENT
b) DESIGN
c) IMPLEMENTATION
d) VERIFICATION
E)MAINTAINENCE
Requirement Analysis : This phase is focused on possible requirements of the system for
the development are captured. Requirements are gathered subsequent to the end user
consultation.
System Software Design: Prior to beginning the actual coding, it is inevitable to understand
what actions are to be taken and what they should like. The requirement specifications are
studied in detail in this phase and the design of the system is prepared. The design
specifications are the base for the implementation and unit testing model phase.
Implementation : Subsequent to receiving the system design documents, the work is shared
into various modules and the real coding is commenced. The system is developed into small
coding units. These units are later integrated in the subsequent phase. Every unit is tested for
its functionality.
System Testing: The modules that are divided into units are integrated into a completesystem and tested for proper coordination among modules and system behaves as per the
10
http://www.wikipedia.org/wiki/Sequencehttp://www.wikipedia.org/wiki/Designhttp://www.wikipedia.org/wiki/Software_development_processhttp://www.wikipedia.org/wiki/Software_development_processhttp://www.wikipedia.org/wiki/Waterfallhttp://www.wikipedia.org/wiki/Analysishttp://www.wikipedia.org/wiki/Software_designhttp://www.wikipedia.org/wiki/Software_testinghttp://www.wikipedia.org/wiki/Software_maintenancehttp://www.wikipedia.org/wiki/Sequencehttp://www.wikipedia.org/wiki/Designhttp://www.wikipedia.org/wiki/Software_development_processhttp://www.wikipedia.org/wiki/Software_development_processhttp://www.wikipedia.org/wiki/Waterfallhttp://www.wikipedia.org/wiki/Analysishttp://www.wikipedia.org/wiki/Software_designhttp://www.wikipedia.org/wiki/Software_testinghttp://www.wikipedia.org/wiki/Software_maintenance -
7/30/2019 pyrol system
11/67
CRYPTOGRAPHY 2013
specifications. Once the testing is completed, the software product is delivered to the
customer.
Maintenance: It is a never ending phase. Once the system is running in productionenvironment, problems come up. The issues that are related to the system are solved only
after deployment of the system. The problems arise from time to time and need to be solved;
hence this phase is referred as maintenance.
In Royce's original waterfall model, the following phases are followed in order:
The waterfall modelproceeds from one phase to the next in a sequential manner. For
example, one first completes requirements specification, which after sign-off are considered
"set in stone." When requirements are completed, one proceeds to design. The software in
question is designed and a blueprint is drawn for implementers (coders) to followthis
design should be a plan for implementing the requirements given. When the design is
complete, an implementation of that design is made by coders. Towards the later stages of
this implementation phase, separate software components produced are combined to
introduce new functionality and reduced risk through the removal of errors.
Thus the waterfall model maintains that one should move to a phase only when its preceding
phase is completed and perfected. However, there are various modified waterfallmodels
(including Royce's final model) that may include slight or major variations upon this
process.
The process of WATERFALL Model can be understood by following diagram:
11
http://www.wikipedia.org/wiki/Waterfall_model#Modified_modelshttp://www.wikipedia.org/wiki/Waterfall_model#Modified_modelshttp://www.wikipedia.org/wiki/Waterfall_model#Modified_modelshttp://www.wikipedia.org/wiki/Waterfall_model#Modified_models -
7/30/2019 pyrol system
12/67
CRYPTOGRAPHY 2013
FIG. 1.1 WATERFALL
MODEL
1.2 FEASIBILITY STUDY:
After request clarification, analyst proposes some solutions. After that for
each solution it is checked whether it is practical to implement that solution.
This is done through feasibility study. In this various aspects like whether it istechnically or economically feasible or not. So depending upon the aspect on
which feasibility is being done it can be categorized into four classes:
Technical
Economical
Legal
Operational
12
-
7/30/2019 pyrol system
13/67
CRYPTOGRAPHY 2013
The outcome of feasibility study should be very clear. It should answer the
following issue:
Is there an alternate way to do the job in a better way?
What is recommended?
It consists of following:
This includes the user demonstrable needs and how does a candidate
system meet them?
The result of feasibility customer is a formal proposal. This is simply a
report a formal document detailing the nature and scope of the proposalsolution. The proposal summarizes what is known and what is going to be
done.
1.2.1 Technical Feasibility:
In technical feasibility following issues are taken into consideration:
The required technology C++ is available. Also the resources are available to
work on this technology.
We also have to study about the investment required to develop the software.
The technical issues are raised during the feasibility stage of investigation are:
13
-
7/30/2019 pyrol system
14/67
-
7/30/2019 pyrol system
15/67
CRYPTOGRAPHY 2013
It involves estimating benefits and costs. These benefits and costs may be
tangible or intangible. We are not doing the brief analysis of cost benefit. But
when we go through the rough study we found that manual work in existing
system is very high than proposed system. Proposed system requires lessinvestment, time and manpower as compare to existing manual system. It
concludes that proposed system is technical as well as economically feasible.
The proposed System will save lots of paper work and Facilitate
magnetic record keeping thereby reducing the costs incurred on above heads.
This reduction in cost prompts the company to go for such computer-based
system.
The proposed System will save cost while create new page for the next
organization. It reduce man hour while made the change in the organizations
software. The suggested proposed system will suit the existing software and
hardware . Almost, it reduces cost for implementation. The system is developed
for long consideration so cost will be less when compares to develop the
application for each and every organization.
One time cost:- The system requires one time investment as follows:
Computer Intel 300 MHz: Rs. 23000/-
Inkjet Printer : Rs.
3200/-
UPS & Stabilizer : Rs. 4000/-
Soft wares (Turbo c++, Windows-XP, ): Rs.
45000/-
15
-
7/30/2019 pyrol system
16/67
CRYPTOGRAPHY 2013
Total : (approx.) Rs. 75200/-
Recurring cost ( per month )
Printer cartridge : Rs. 1000/-
Electricity Consumption : Rs. 200/-
Stationary Cost : Rs. 500/-
Total : (approx.) Rs. 1700/-
1.2.3 Operational Feasibility:
Any developed system is operational feasible if
The user is not happy with current system and able to adopt the proposed
system.
In my case the user is really frustrated with the existing system because itcontains lots of manual work & requires more efforts.
16
-
7/30/2019 pyrol system
17/67
CRYPTOGRAPHY 2013
In proposed system time required for overall operation becomes low.
1.2.3 BEHAVIORAL FEASIBILITY
This system helps the user to find in the best usage of resources keeping in
track of all the information about employees thereby reducing the time while
searching the desired details. The available resource can be handling with the
data relation method in order to avoid the redundancy data and give the bettersolution for particular result or data. The proposed system gives the better
performance in the sense of both time and resource.
1.3 HARDWARE AND SOFTWARE REQUIREMENT FOR
RUNNING THE PROJECT:
Hardware Requirement
17
-
7/30/2019 pyrol system
18/67
CRYPTOGRAPHY 2013
The selection of hardware is very important in the existence and
proper working of any software. When selecting hardware, the size and
requirement are also important.
PROCESSOR: P3or Higher
RAM: 512MB
DISK SPACE: 20GB (For Data Storage)
MONITER: (For Displaying Data)
KEYBOARD (For Entering Data)
Software Requirement
The selection of software is very important in the existence and proper working
of
any system.
-Turbo C++ Version 3.0
-Windows XP or higher versions.
1.4 FRONT END :
18
-
7/30/2019 pyrol system
19/67
CRYPTOGRAPHY 2013
FRONT END: C++
Object oriented programming is an approach that provides a way of
modularizing programs by creating partitioned memory area for both
data and functions that can be used for as templates for creating copies
of such modules on demand.
The main reason for inventing OOP was to remove the flaws encountered
in procedural programming.
Object oriented programming treats the data as a critical element in the
program development and does not allow it to flow freely around thesystem. It ties the data more closely to the functions that operate on it
and protects it from accidental modifications from outside functions.
OOP allows decomposition of problem into a number of entities called
objects and builds the data and functions around these objects. How ever
functions of one object can handle other objects.
Some features of object-oriented programming are:
Emphasis is on data rather than the procedure.
For time and higher productivity, programs are divided into objects.
Data structures are designed to characterize the objects.
19
-
7/30/2019 pyrol system
20/67
CRYPTOGRAPHY 2013
* Functions that operate on the data of an object are tied together in
the data structure.
Data is hidden and cannot be accessed by external functions.
Objects may communicate with each other through functions.
New data and functions can be easily added as and when required.
It follows bottom -up approach in program design.
Benefits of OOPS
Oops offers several benefits to both the program designer and the user.
Object orientation contributes to the solution of many problems
associated with the development and quality of software products. The
new technology promises greater programmer productivity, better quality
of software and lesser maintenance costs. The principle advantages are:
Through inheritance, we can eliminate redundant code andextend the use of existing classes.
We can build programs from the standard working modules thatcommunicate with each other. This leads to saving ofdevelopment time and higher productivity.
The principle of data hiding helps the programmer to buildsecure programs that cannot be invaded by code from otherparts of the program.
Its possible to have multiple instances of an object to co-existwithout any interference
Its possible to map objects in the problem domain to those inthe program.
Its easy to partition the work in a project based on objects.
20
-
7/30/2019 pyrol system
21/67
CRYPTOGRAPHY 2013
The data centered design approach enables us to capture moredetails of a model in implement able form.
Object oriented systems can be easily upgraded from small tolarge systems.
Message passing techniques for communication between objectsmakes the interface description with external systems muchsimpler.
Software complexity can be easily managed.
OOP can be regarded as the ultimate paradigm for the modeling of
information. The Object oriented programming approach is based on
certain concepts that include:
1. Objects
2. Classes
3. Data abstraction
4. Data encapsulation
5. Modularity
6. Inheritance
7. Polymorphism
Objects
Objects are the basic run time entities in an object-oriented system. They
may represent a system, a place, and a table of data or any item that a
program has to handle. Programming problem is analyzed in terms of
21
-
7/30/2019 pyrol system
22/67
CRYPTOGRAPHY 2013
objects and the terms of communication between them. Program objects
must be chosen in such a way that they match closely with the real world
objects take up space in the memory and have an address. When a
program is executed objects interact by sending messages to each other.
Classes
As said earlier objects contain data and code to manipulate data. The
entire set of data of and code of an object can be made user defined data
type with the help of a class.
In fact, objects are variables of the type class. Once a class has been
defined we can create any number of objects belonging to that class.
Each object is associated with the data of type class with which they are
created. A class is thus a collection of objects of similar type.
Data abstraction
Abstraction is the concept of simplifying the real world problems into its
essential elements.Data abstraction refers to the act of representing
essential features without including the background details or
explanations. Classes use the concept of data these attributes. They
encapsulate all the essential properties on the objects that are to be
created. The attributes are some times called data members because
22
-
7/30/2019 pyrol system
23/67
CRYPTOGRAPHY 2013
they hold information. The functions that operate on these attributes are
called member functions.
Since these functions use the concept of data abstraction they are known asabstract data types.
Data encapsulation
The wrapping up of data and the functions into a single unit is known as
encapsulation.
Encapsulation is the most fundamental concept of OOP and an important
feature of class. The data is not accessible to the outside world and only
to those functions that are wrapped inside the class. These functions
provide the interface and the objects data and the program. This
insulation of data from the direct access of the program is called data
hiding.
Modularity
The act of partitioning a program into individual components is calledmodularity. The justification for partitioning a program is that:
23
-
7/30/2019 pyrol system
24/67
CRYPTOGRAPHY 2013
1. It reduces its complexity to some degree
2. It creates a number of well-defined documented boundaries within
the program
A module is a separate unit in it self. Many modules work hand in hand to
achieve programs goal.
Inheritance
Inheritance is the process by which one class inherits the properties of
objects another class. In object oriented programming the concept of
inheritance provides the idea of reusability. We can use additional
features to an existing class without modifying the original class. This is
possible by deriving a new class from the existing one.
Role of inheritance in Object oriented programming can be given as
follows:
24
-
7/30/2019 pyrol system
25/67
CRYPTOGRAPHY 2013
1. The capability of inheritance to express the inheritance
relationship that ensures the closeness with the real world
models.
2. The second one is the idea of reusability, which allows the
addition of new features to an existing class without modifying
it.
3. The third is the transitive nature.
If a class A inherits the properties of another class B, then all the subclasses
of a will automatically inherit all the properties of B.
This is called the transitive nature of inheritance.
Polymorphism
25
-
7/30/2019 pyrol system
26/67
CRYPTOGRAPHY 2013
Polymorphism is the ability of a message to be processed in more than
one form. Its the concept that supports the capability of an object of a
class to behave differently in response to a message or an action.
Polymorphism is thus the property by which the same message can be
sent to objects of several different classes.
Polymorphism plays an important role in allowing objects having different
internal structures to share the same external internal interface. This
means that a general class of operations may be accessed in the same
manner even though specific actions associated with each operation may
differ. Polymorphism is extensively used to implement inheritance.
Applications of C++
C++ is a versatile language for handling very large programs. It issuitable for virtually any programming task including development of
editors, compilers, databases, communication systems and any real life
application systems.
Since C++ allows us to create hierarchy related objects, we can build
special object oriented libraries, which can be used later by many
programmers.
While C++ is able to map the real world problem properly, the c part of
C++ gives the language the ability to get close to machine level details.
26
-
7/30/2019 pyrol system
27/67
CRYPTOGRAPHY 2013
C++ programs are easily maintainable and expandable.
CHAPTER -2
ANALYSIS:
27
-
7/30/2019 pyrol system
28/67
CRYPTOGRAPHY 2013
2.1 STRUCTURAL ANALYSIS:
2.1.1 SOFTWARE REQUIREMENT SPECIFICATION:
Objective:
Considering the stress and time taken to maintain employee details on papersand to view their details . The development of a well structure Payroll
Management system will allow organization to perform objectives like, creating
a management system that is easily accessible by the company easily, and will
easily provide all information regarding their employees without wasting paper
and time. Promote efficient and effective management for the companies by
focusing on those services that still require physical presence in organization.
Keep a detailed log of employees salary with the reductions . Generate the
salary slip of employees .
1.Introduction:
28
-
7/30/2019 pyrol system
29/67
CRYPTOGRAPHY 2013
Purpose: - Payroll Management system is an service provided for the employees and their
company. It is an interactive service for information seekers of company. It is easy to access.
1.1) Goals and Objective:
It is easy for adding new employees new users .
It maintains a central base of information.
It allows easy modification of details.
List of employees will be displayed.
1.2) System statement of scope:
Major inputs include all the particulars like customers name,Address,contact no.,userid etc.for all the employees of the company. Inputs include details of customer . Outputs include
information about net salary, basic salary, loan and employees profile .
1.3) System Context:
Creating software for payroll and implementing it on computer is really a
great idea both for the information seekers as well as for employees. It
greatly helps the company as information about employees is available
at any time . It increases the ease both for managers.
1.4) Administrator:
Administrator is the central user of the payroll system. He is the only
person who can add, delete and update the whole database present on
the system. He can control various operations to be used by employee .
All the moves could be viewed by administrator at any instance.
29
-
7/30/2019 pyrol system
30/67
CRYPTOGRAPHY 2013
1.5)Module functioning:
1.5.1) New employee
Administrator can add the new employees; .
He can also add the employees details such as name,address ,phone no.
This module contains the profile details of an employee.
1.5.2) Display employee
It can be used to view the employee details saved already.
It can viewed using his/her employee id.
1.5.3) List of employees
This module consist list of all the employees whose data has been saved
already.
30
-
7/30/2019 pyrol system
31/67
CRYPTOGRAPHY 2013
1.5.4) Salary slip:
This module provides the salary details of an employee.
Given the basic salary it calculates hra,p.f,d.a .
It also calculates the net salary using above parameters.
1.5.5) Edit:
This module is used to modify the existing user details.
It is use to delete a data entry of employee already saved.
1.5.6)Exit:
This module gets the user to the main menu.
Informal Document:
SYSTEM-Payroll management
R1:EMPLOYEE
enter details of Employee:
R1.1: name
R1.2: address
R1.3: phone no
R1.4: day of joining
31
-
7/30/2019 pyrol system
32/67
CRYPTOGRAPHY 2013
R1.5: loan
R2: Edit services
R2.1: delete information
R2.1.1: delete employee
R2.2: update information
R2.2.1: delete employees record.
32
-
7/30/2019 pyrol system
33/67
CRYPTOGRAPHY 2013
2.1.2 DATA DICTIONARY:
EMPLOYEE BASIC DETAILS - SCHEMA
SNO NAME DATA TYPE
1 EMP ID INT
2 DESIGNATION CHAR[16]
3 ADDRESS CHAR[31]
4 PHONE NO INT
5 NAME CHAR[26]
LOAN DETAILS
33
-
7/30/2019 pyrol system
34/67
CRYPTOGRAPHY 2013
SNO NAME DATA TYPE
1 EMP ID INT
2 LOAN INT
GRADATION DETAILS SCHEMA
SNO NAME DATATYPE
1 EMP ID INT
2 DESIGNATION CHAR[20]
34
-
7/30/2019 pyrol system
35/67
CRYPTOGRAPHY 2013
ER DIAGRAM FOR PAYROLL MANAGEMENT
35
EMPLOYEE
empna
designatio
n
phone
empid
adrress
take
s
loan
empid amount
Work
in
company
empid
tn_durati
on
-
7/30/2019 pyrol system
36/67
CRYPTOGRAPHY 2013
36
giv
en
Prom
ot-ed
salary
basichra
gradation
empid
giv
en
Promot-ed
salary
basichra
Ca,da
empid
pf
gradation
empid designation
-
7/30/2019 pyrol system
37/67
CRYPTOGRAPHY 2013
2.1.4. DATA FLOW DIAGRAMS:
A data flow diagram (DFD) is a graphical representation of the "flow" of data
through an information system, modeling its process aspects. Often they are a
preliminary step used to create an overview of the system which can later be
elaborated. DFDs can also be used for the visualization ofdata
processing (structured design).
A DFD shows what kinds of information will be input to and output from the
system, where the data will come from and go to, and where the data will be
stored. It does not show information about the timing of processes, or
information about whether processes will operate in sequence or in parallel.
37
Profile
Details of
employee
Admin of
company
http://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Data_visualizationhttp://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Data_visualizationhttp://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/Data_processing -
7/30/2019 pyrol system
38/67
CRYPTOGRAPHY 2013
Fig. 2.2 0th Level DFD of payroll management
38
-
7/30/2019 pyrol system
39/67
CRYPTOGRAPHY 2013
Fig. 2.3 1st Level DFD of My Account
39
-
7/30/2019 pyrol system
40/67
CRYPTOGRAPHY 2013
PAYROLL MANAGEMENT
Fig. 2.4 2nd Level DFD of My Account
2.1.5 STATE TRANSITION DIAGRAM:
40
ADMI
N
SYSTE
M
EMP.D
New
emp.
List of
employees
MODIFICATI
ON
DELETE
RECORD
-
7/30/2019 pyrol system
41/67
CRYPTOGRAPHY 2013
2.2 OBJECT ORIENTED ANALYSIS:
2.2.1 USECASE DIAGRAMS:
A use case diagram at its simplest is a representation of a user's
interaction with the system and depicting the specifications of a use case.
A use case diagram can portray the different types of users of a system
and the various ways that they interact with the system. This type of
diagram is typically used in conjunction with the textual use case and will
often be accompanied by other types of diagrams as well.
Due to their simplistic nature, use case diagrams can be a good
communication tool for stakeholders. The drawings attempt to mimic the
real world and provide a view for the stakeholder to understand how the
system is going to be designed. Siau and Lee conducted research to
determine if there was a valid situation for use case diagrams at all or if
they were unnecessary. What was found was that the use case diagrams
conveyed the intent of the system in a more simplified manner
to stakeholders and that they were "interpreted more completely thanclass diagrams". The purpose of the use case diagrams is simply to
41
VIEWSALARY
SLIP
SLIP
-
7/30/2019 pyrol system
42/67
CRYPTOGRAPHY 2013
provide the high level view of the system and convey the requirements in
layman's terms for the stakeholders. Additional diagrams and
documentation can be used to provide a complete functional and
technical view of the system.
admin
42
PAYROLL
SYSTEM
Maintains emp
details
Calculates emp
salary
-
7/30/2019 pyrol system
43/67
CRYPTOGRAPHY 2013
Admin
Fig 2.7: Use Case level
CHAPTER -3
DESIGN:
3.1 STRUCTURE DESIGN:
3.1.1 DATA STRUCTURE DESIGN:
43
Modifies emp
details
View emp
details
-
7/30/2019 pyrol system
44/67
CRYPTOGRAPHY 2013
Database design is the process of producing a detailed data model of a database. This
logical data model contains all the needed logical and physical design choices and physical
storage parameters needed to generate a design in a Data Definition Language, which can
then be used to create a database. A fully attributed data model contains detailed attributes
for each entity.
The term database design can be used to describe many different parts of the design of an
overall database system. Principally, and most correctly, it can be thought of as the logical
design of the base data structures used to store the data. In the relational model these are the
tables and views. In an object database the entities and relationships map directly to object
classes and named relationships. However, the term database design could also be used to
apply to the overall process of designing, not just the base data structures, but also the forms
and queries used as part of the overall database application within the database managementsystem (DBMS).
The process of doing database design generally consists of a number of steps which will be
carried out by the database designer. Usually, the designer must:
Determine the relationships between the different data elements.
Superimpose a logical structure upon the data on the basis of these
relationships
3.1 TABLE FOR NEW EMPLOYEE:
ATTRIBUTE DOMAIN
EMP ID Integer
44
-
7/30/2019 pyrol system
45/67
CRYPTOGRAPHY 2013
ADDRESS Char
JOIN _date DATE
BASIC SALARY FLOAT
LOAN FLOAT
NAME CHAR
GRADE CHAR
3.2 TABLE FOR SALARY SLIP :
ATTRIBUTE DOMAIN
NET SALARY FLOAT
HRA FLOAT
P.F FLOAT
D.A FLOAT
3.1.4. CLASS OBJECT DESIGN:
45
EMPLOYEE DETAILS
*EMP DETAILS
*EMP DATE OF JOIN
*EMP ADDRESS
*EMP PHONE NO
*DESIGNATION
*EMP ID
-
7/30/2019 pyrol system
46/67
CRYPTOGRAPHY 2013
Service provider
CHAPTER 4
TESTING:
Software testing is an investigation conducted to provide stakeholders with information
about the quality of the product or service under test. Software testing can also provide an
objective, independent view of the software to allow the business to appreciate and
understand the risks of software implementation. Test techniques include, but are not limited
to, the process of executing a program or application with the intent of finding software bugs
(errors or other defects).
46
ADMINISTRATOR
*CALCULATE EMPS NET PAY()
*RETRIEVE EMP DETAILS()
-
7/30/2019 pyrol system
47/67
CRYPTOGRAPHY 2013
Software testing can be stated as the process of validating and verifying that a computer
program/application/product:
meets the requirements that guided its design and development,
works as expected,
can be implemented with the same characteristics,
and satisfies the needs of stakeholders.
Software testing, depending on the testing method employed, can be implemented at any
time in the development process. Traditionally most of the test effort occurs after the
requirements have been defined and the coding process has been completed, but in the Agile
approaches most of the test effort is on-going. As such, the methodology of the test isgoverned by the chosen software development methodology.
Different software development models will focus the test effort at different points in the
development process. Newer development models, such as Agile, often employ test-driven
development and place an increased portion of the testing in the hands of the developer,
before it reaches a formal team of testers. In a more traditional model, most of the test
execution occurs after the requirements have been defined and the coding process has been
complete
4.1 TEST PLAN:-
The Software Test Plan (STP) is designed to prescribe the scope,approach, resources, and schedule of all testing activities. The plan mustidentify the items to be tested, the features to be tested, the types of
testing to be performed, the personnel responsible for testing, the
47
-
7/30/2019 pyrol system
48/67
CRYPTOGRAPHY 2013
resources and schedule required to complete testing, and the risksassociated with the plan.
Scope of the test plan
Approach of the test plan
Schedule of the test plan
Items to be tested
Features to be tested
Type of testing to be perform.
1.Scope of the test plan:-Scope of the test plan is to cover allmodules and our software to be tested completely. So that we will knowhow much our project is efficient.
2.Approach of the test plan:-We will apply different types
of testing to test our project such as high level testing ,low leveltesting,alphatesting,beta testing etc.
3.Schedule of the test plan:- Schedule of all testingactivities will be in that manner so that the testing will be easy n in flowand it will start from a small level to higher level.
4.Items to be tested:-All items which will be shown to user haveto be tested.
48
-
7/30/2019 pyrol system
49/67
CRYPTOGRAPHY 2013
4.2 TEST STRATEGY:
Development
Process
Type of
Testing
Description White
box/Black
box
Client Needs Acceptance
Testing
Testing conducted
by a customer to
verify the system
meets the
acceptancecriteria of the
requested
application.
Black Box
Requirements System Testing Verify that the
entire software
system satisfies
the requirements.
Black Box
Design Integration
Testing
Tests the
interaction of
small modules of a
software
application.
White or
Black Box
Code Unit Testing Tests a small unit
(i.e. class) of a
software
application,
separate from
other units of the
application.
White Box
49
-
7/30/2019 pyrol system
50/67
CRYPTOGRAPHY 2013
4.2.1. System Test:
The System tests will focus on the behavior of the management system.
User scenarios will be executed against the system as well as screen
mapping and error message testing. Overall, the system tests will test
the integrated system and verify that it meets the requirements defined
in the requirements document.
4.2.2. Performance Test
Performance test will be conducted to ensure that the salary calculation
expectations and does not exceed the specified performance criteria.
During these tests, calculated result will be measured under heavy stress
and/or volume.
4.2.3. Documentation Test:
Tests will be conducted to check the accuracy of the user documentation.
These tests will ensure that no features are missing, and the contents can
be easily understood.
4.2.4. Beta Test:
College will beta tests the new salary calculation system and will report
any defects they find. This will subject the system to tests that could not
be performed in our test environment.
4.2.6. User Acceptance Test:
Once the system is ready for implementation, the company will perform
User Acceptance Testing. The purpose of these tests is to confirm that
50
-
7/30/2019 pyrol system
51/67
CRYPTOGRAPHY 2013
the system is developed according to the specified user requirements and
is ready for operational use.
4.3TEST HARNESS:
A test harness or automated test framework is a collection ofsoftware and test data
configured to test a program unit by running it under varying conditions and monitoring its
behavior and outputs. It has two main parts: the test execution engine and the test script
repository.
Test harnesses allow for the automation of tests. They can call functions withsupplied parameters and print out and compare the results to the desired value. The test
harness is a hook to the developed code, which can be tested using an automation
framework.
A test harness should allow specific tests to run (this helps in optimizing), orchestrate
a runtime environment, and provide a capability to analyses results.
The typical objectives of a test harness are to:
Automate the testing process.
Execute test suites of test cases.
Generate associated test reports.
A test harness may provide some of the following benefits:
Increased productivity due to automation of the testing process.
Increased probability that regression testing will occur.
Increased quality of software components and application.
Ensure that subsequent test runs are exact duplicates of previous ones.
Testing can occur at times that the office is not staffed (e.g. at night)
A test script may include conditions and/or uses that are otherwise difficult tosimulate (load, for example)
An alternative definition of a test harness is software constructed to facilitate integration
testing. Where test stubs are typically components of the application under development and
are replaced by working component as the application is developed (top-down design), test
harnesses are external to the application being tested and simulate services or functionality
not available in a test environment.
For example, if you're building an application that needs to interface with an application
on a mainframe computer but none is available during development, a test harness maybe
built to use as a substitute. A test harness may be part of a project deliverable. Its kept
51
http://wiki/Softwarehttp://wiki/Test_execution_enginehttp://w/index.php%3Ftitle=Test_script_repository&action=edit&redlink=1http://w/index.php%3Ftitle=Test_script_repository&action=edit&redlink=1http://wiki/Test_automationhttp://wiki/Test_Automation_Frameworkhttp://wiki/Test_Automation_Frameworkhttp://wiki/Regression_testinghttp://wiki/Softwarehttp://wiki/Test_execution_enginehttp://w/index.php%3Ftitle=Test_script_repository&action=edit&redlink=1http://w/index.php%3Ftitle=Test_script_repository&action=edit&redlink=1http://wiki/Test_automationhttp://wiki/Test_Automation_Frameworkhttp://wiki/Test_Automation_Frameworkhttp://wiki/Regression_testing -
7/30/2019 pyrol system
52/67
CRYPTOGRAPHY 2013
outside of the application source code and may be reused on multiple projects. Because a test
harness simulates application functionality - it has no knowledge of test suites, test cases or
test reports. Those things are provided by a testing framework and associated automated
testing tools.
4.4TEST FIXTURE:
Test fixture refers to the fixed state used as a baseline for running tests in software testing.
The purpose of a test fixture is to ensure that there is a well known and fixed environment inwhich tests are run so that results are repeatable. Some people call this the test context.
Examples of fixtures:
Loading a database with a specific, known set of data
Erasing a hard disk and installing a known clean operating system installation
Copying a specific known set of files
Four phases of a test:
Set up -- Setting up the test fixture.
Exercise -- Interact with the system under test.
Verify -- Determine whether the expected outcome has been obtained.
Tear down -- Tear down the test fixture to return to the original state.
Use of fixtures
Some advantages of fixtures include separation of the test initialization (and
destruction) from the testing, reusing a known state for more than one test, and specialassumption by the testing framework that the fixture set up works.
52
http://wiki/Software_testinghttp://wiki/Software_testing -
7/30/2019 pyrol system
53/67
CRYPTOGRAPHY 2013
CHAPTER 5
DEPLOYMENT:
5.1 USER MANUAL:
User manual define the work of each menu in our system.
At main menu, you have 6 choices namely:
1.New employee. - helps to add new record.
2.Display employee.- helps to view record which already exist.
3.List of employee. gives the list of all employees which already exist.
4.Salary of employee. calculates the net salary.
5.Edit.
53
-
7/30/2019 pyrol system
54/67
CRYPTOGRAPHY 2013
0.Quit
Enter your choice:
*If you choose option 1,It is To write the Record of an Employee.
*If you choose option 2, It displays all the information of an employee.
*If you choose option 3, It shows the list of an employee.
*If you choose option 4,It gives us the basic salary of an employee.
*If you choose option 5, It takes the user to edit menu . It gives us twooptions
a)Modify-Choose 1 to modify the employee record.
b)Delete-Choose 2 to delete the employee record.
*If you choose option 0,It exits.and leaves the current menu.
54
-
7/30/2019 pyrol system
55/67
CRYPTOGRAPHY 2013
5.2 SCREEN LAYOUT:
55
-
7/30/2019 pyrol system
56/67
CRYPTOGRAPHY 2013
Registration Form:
56
-
7/30/2019 pyrol system
57/67
CRYPTOGRAPHY 2013
Home Page:
57
-
7/30/2019 pyrol system
58/67
CRYPTOGRAPHY 2013
Expenses Category:
58
-
7/30/2019 pyrol system
59/67
CRYPTOGRAPHY 2013
Income Category:
59
-
7/30/2019 pyrol system
60/67
CRYPTOGRAPHY 2013
Expenses:
60
-
7/30/2019 pyrol system
61/67
CRYPTOGRAPHY 2013
Income:
61
-
7/30/2019 pyrol system
62/67
CRYPTOGRAPHY 2013
Cash Book:
62
-
7/30/2019 pyrol system
63/67
CRYPTOGRAPHY 2013
Bank Book:
63
-
7/30/2019 pyrol system
64/67
CRYPTOGRAPHY 2013
Profile:
64
-
7/30/2019 pyrol system
65/67
CRYPTOGRAPHY 2013
CHAPTER 6
FUTURE ENHANCEMENT AND
CONCLUSION:
Every project whether big or small always has some or the
other aspect in which it could be expanded, some more feature
can be joined to make that project even more valuable . Our
project also has such aspects.This is now working on
elementary level, it could also be made to work at higher levelWith little enhancements.
* IVRS can be implemented in this project.
65
-
7/30/2019 pyrol system
66/67
CRYPTOGRAPHY 2013
* Enhancement related to management activities can be
made.
CHAPTER 7
REFERENCES AND BIBLIOGRAPHY:
1. Software Engineering: A practitioners approach
Roger.S.Pressman.
2. An object oriented approach
E.Balagurusuamy
66
-
7/30/2019 pyrol system
67/67
CRYPTOGRAPHY 2013