Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 65

SIX MONTH INDUSTRIAL PROJECT REPORT

ON

FUN O SPHERE

COMPLETED AT

Next Education

By

Seerat

(2019)

19BTD5050286

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


VAISHNO COLLEGE OF ENGINEERING, THAPKOUR
JAN –JUNE 2019
SIX MONTH INDUSTRIAL TRAINING REPORT

ON

FUN O SPHERE

COMPLETED AT

NEXT INSTITUTE
SUBMITTED IN PARTIAL FULFILLMENT FOR AWARD OF DEGREE OF

BACHELOR OF TECHNOLOGY

IN
COMPUTER SCIENCE AND ENGG(CSE)
By
SEERAT

(19BTD5050286)

DEPARTMENT OF COMPUTER SCIENCE AND ENGG.VAISHNO


COLLEGE OF ENGINEERING , THAPKOUR
JAN-JUNE 2019
Acknowledgement

It is great pleasure to present this report on the project named “FUN O SPHERE” undertaken by

me as part of my B. Tech (CSE) curriculum.

I am thankful to VAISHNO COLLEGE for offering me such a wonderful challenging

opportunity and I express my deepest thanks to all coordinators, of VAISHNO COLLEGE for

providing all the possible help and assistance and their constant encouragement.

First and foremost I would like to express my gratitude towards our training guide Mr. Varinder

Chugh for placing complete faith and confidence in my ability to carry out this project and for

providing me his time, inspiration, encouragement, help, valuable guidance, constructive

criticism and constant interest. He took personal interest in spite of numerous commitments and

busy schedule to help me complete this project. Without the sincere and honest guidance of my

respected project guide i would have not been to reach the present stage.
Abstract
This is a project report on “FUN O SPHERE”. During the making/developing of this project i

explored new ideas and functionality behind the working of a notepad and various IDE

(Integrated Development Environment) such as NETbeans IDE, Ecclipse IDE

This project is the output of our planning, schedule, programming skill and the hard work, and

this report reflects our steps taken at various levels of programming skill, planning and schedule.

I have learnt a lot during this project and liked the improvement in our testing skills and deep

concept related to these kinds of projects.

Our project is“ FUN O SPHERE” .This is a web based application which helps people to buy

online ticket for enjoying his week days and check the offers on a park for a particular time

period with different functionalities on internet. It is useful in the way that it makes an easier way

to buy ticket online and knows regarding various rides on an individual parks.

In this application we have basically 2 modules. The first module includes the customer module

and admin module

1. Customer Module:-The customer have to register for any enquiry related to Parks. The

unregistered person can’t access this application. The registered customer can view

details of parks and he can buy the Ticket of his choice and need. He has to pay the price

of Ticket.

2. The admin module:-contains the access of admin on the application. The admin can

change everything in the application. He have the ability to add, delete,update any

information regarding the parks.


Chapter 1

INTRODUCTION

1.1 Introduction to my project

A funOsphere (sometimes referred to as a funfair) or theme fair is a group

of entertainment attractions, rides, and other events in a location for the enjoyment of large

numbers of people. They have a fixed location, as opposed to travelling funfairs and traveling

carnivals, and are more elaborate than simple city parks or playgrounds, usually providing

attractions meant to cater specifically to certain age groups, as well as some that are aimed

towards all ages.

Theme parks, a specific type of amusement park, are usually much more intricately themed to a

certain subject or group of subjects than other amusement parks.

Amusement parks evolved from European fairs and pleasure gardens, which were created for

people's recreation. World's fairs and expositions were another influence on the development of

the amusement park industry.

In common language, the terms theme park and amusement park are often synonymous.

However, a theme park can be regarded as a distinct style of amusement park.

A theme park has landscaping, buildings, and attractions that are based on one or more specific

themes or stories.Despite many older parks adding themed rides and areas, qualifying the park as

a theme park,
The first Amusement park built with the original intention of promoting a specific theme, Santa

Claus Land, in Santa Claus, Indiana, did not open until 1946.

Disneyland, located in Anaheim, California, built around the concept of encapsulating multiple

theme parks into a single amusement park, is often mistakenly cited as the first themed

amusement park, but is instead the park that made the idea popular.

Despite many older parks adding themed rides and areas, qualifying the park as a theme park, the

first park built with the original intention of promoting a specific theme, Santa Claus Land

located in Santa Claus, Indiana, did not open until 1946.

1.1.2 Types of parks

1) Educational theme parks

Fig1.1:- Spaceship Earth the icon of Epcot

Some parks use rides and attractions for educational purposes. Disney was the first to

successfully open a large-scale theme park built around education. Named Epcot it opened in
1982 as the second park in the Walt Disney World Resort. There are also Holy Land USA and

the Holy Land Experience which are theme parks built to inspire Christian piety. Dinosaur

World entertains families with dinosaurs in natural settings, while the SeaWorld and Busch

Gardens parks also offer educational experiences, with each of the parks housing several

thousand animals, fish and other sea life in dozens of attractions and exhibits focusing on animal

education.

2) Family-owned theme parks

Fig1.2:-America's 1st Theme Park, California's Best Theme Park

Some theme parks did evolve from more traditional amusement park enterprises, such as Knott's

Berry Farm In the 1920s, Walter Knott and his family sold berries from a roadside stand, which

grew to include a restaurant serving fried chicken dinners. Within a few years, lines outside the

restaurant were often several hours long. To entertain the waiting crowds, Walter Knott built a

Ghost Town in 1940, using buildings relocated from real old west towns such as the Calico,

California ghost town and Prescott, Arizona. In 1968, the Knott family fenced the farm, charged

admission for the first time, and Knott's Berry Farm officially became an amusement

park. Because of its long history, Knott's Berry Farm currently claims to be "America's First
Theme Park." Knott's Berry Farm is now owned by Cedar Fair Entertainment Company. Lake

Compounce in Bristol, Connecticut may be the true oldest continuously operating amusement

park

3) Regional parks

Fig1.3:-Main park entrance to Six Flags Over

The first regional amusement park, as well as the first Six Flags park, Six Flags over Texas was

officially opened in 1961 in Arlington, Texas The first Six Flags amusement park was the vision

of Angus Wynne, Jr. and helped create the modern, competitive amusement park industry. In the

late 1950s, Wynne visited Disneyland and was inspired to create an affordable, closer, and larger

amusement park that would be filled with fantasy. He followed in the steps of Disney and had

subdivisions within the park that reflected different lands. The subdivisions included the Old

South and other sections that referenced Wynne's background. By 1968, the second Six

Flags park, Six Flags Over Georgia opened, and in 1971, Six Flags Over Mid-America (now Six

Flags St. Louis) opened near St. Louis, Missouri Also in 1971 was the opening of the Walt
Disney World resort complex in Florida with the Magic Kingdom (1971), Epcot (1982), Disney's

Hollywood Studios(1989) and Disney's Animal Kingdom (1998).

1.2 Importance

Everyone is fascinated by amusement parks no matter what the age of a person is. People visit

amusement park to have fun and spend time with family and friends. Amusement centers provide

attractions more elaborate than simple city park or playground. They are equipped

with amusement center equipment specifically designed to match their chosen theme.

Amusement parks are built to attract not just the locals living within the park’s vicinity but also

those from other countries. Their aim is to be a tourist destination which is why a wide variety of

attractions are presented. They offer various forms of entertainment such as arcade centers

carousels, merry-go-round, Ferris wheel, roller coasters, as well as food, drink, and souvenirs.

The success of an amusement park would not be possible without the amusement center

equipment. If the park has a unique ride, there is a big chance that it will be talked about a lot.

The spread of story can serve as the park’s publicity and the curiosity among people will

continue attracting more visitors.


Amusement parks are different from funfairs and carnivals. Funfairs and carnivals are seasonal

and are set-up temporarily on vacant lots while amusement parks have permanent location.

Typically, the latter charge an admission fee unlike funfairs and carnival.

Nowadays, amusement parks are collaborated with beach resorts to provide total pleasure to its

visitors. Since they are becoming tourist destinations, the visitors tend to spend several days to

experience more of what the park can offer. An example of this is the Resorts World Sentosa that

includes Universal Studios, the most famous theme park in Singapore.

1.3 Objective of the project

1.3.1 Following are the main objectives of the amusement theme park:

1. To be independent by starting our own business.

2. To avail the market opportunity in the sense of entertainment provider.

3 To utilize our interpersonal skills managing the amusement park.

4. To help the local society by providing various jobs in our theme park.

5. To be the leading entertainment provider in the country.

6. To be the leading share holder in the coming five years in the entertainment sector.

7. To attract various investors and to develop the concept of entrepreneur.

8 To attract the foreign and local tourist and to provide them better environment
9. To be socially responsible towards the environment and natural habitat.

10. To improve the livings of the theme-park partners and shareholders

1.4 About Organisation

Advantage # NEXT

 NEXT students are offered International Certifications at highly subsidized cost, which is

not possible in any other institute in India.

 NEXT is the key organization to train IT and Cyber Security professionals in India.

Forthcoming IT Security projects in India eye NEXT for need of manpower.

 NEXT students exclusively enjoy Original courseware, Discount vouchers, Access codes

to global tools and course materials.

 Employable skills are integrated as a essential training module along with the core

curriculum.

Mission

 Contribute to Nation Building, Youth empowerment and Develop employability skills

beyound Excellence.

 Plav a vital role with Govt. to train IT/Cyber Security professionals, Safeguard Nation,

Develop Opportunities and eradicate unemployment from Country.

 Make NEXTians the first choice for Recruiters and Companies across the Globe.
Chapter 2

Literature survey related with Training

The title ‘funOsphere’ contains of two words- ‘Fun’ and ‘Sphere’.

Fun defines enjoyment and sphere defines a piece of land where the parks are constructed.

Growth and Development of Indian Amusement Park

 There is a huge untapped potential in this segment for Indian market. There are handfuls

of amusements parks in the country and seeing the success of such properties, industry

analysts have revealed that in the coming years there would be around 200 more

amusement parks coming up.

 By 2020, the industry will grow by almost 100 per cent. As of now the total industry is

worth Rs 4,000 crore which is expected to grow by Rs 15-20,000 crore by 2020. Only

when user see that there is free of cost site by which everyone from everywhere can book

ticket online which makes the industry more attractive.

 The amusement park industry in India is worth Rs. 7,000 crore and has been growing

exponentially in the last few years. The associated and participatory entertainment in the
amusement industry is one of the major reasons behind the rapid growth of amusement

parks. Hence, the industry has a bright future in the coming years.

 Indian amusement industry is expected to grow more in near future. More and more

investment in the industry can be expected. The entertainment industry is ready to invest

in India as its considered as a very potential region in terms of business.

 Global Industry Analysts announces the release of a comprehensive global report on

Theme Parks markets. World market for Theme Parks is projected to reach US$31.8

billion by the year 2017.

 Growth will be primarily driven by increased consumer per capita spending on

entertainment and leisure platforms, and growing base of middle class households,

increasing disposable incomes, urbanization in developing countries, and waxing

popularity of mass entertainment.


Chapter 3

TRAINING WORK MODULE

3.1 Project Description

In today’s busy world, people don’t have time for their personal needs. And the technology is

so fast that anyone can do anything by just sitting in a room. The internet is the way that helps a

person in all aspects. If someone wish to buy and view things, he can buy online with the help of

internet.

Today there are very least organizations which are manual. Everything is going to be

computerized and online whether it is banking, advertising or shopping. We are trying to help

people to make their life easier by proving online clothes shopping.

In this we have introduced many modules like admin module and customer module. The

customer have to register for any enquiry related to parks, online booking of tickets etc. The

unregistered person can’t access this application. The registered customer can view details of

parks and he can buy ticket . He has to pay the price of ticket of a particular park

The admin module contains the access of admin on the application. The admin can change

everything in the application. He has the ability to add, delete, update any information regarding

the parks

The project’s home page includes the registration link. The registered users can login to their

account for their queries or buy ticket by choosing particular park by own. And the unregistered

users have first to register. The registration can be done by following the sign up link .
3.1.1 RIDES IN FUN-O-SPHERE INDUSTRY:
1) KIDDIE’S RIDES:-These are off two types
a) Bike
b) Horse
Specification:
SIZE: - 4 X 2 FEET
CAPACITY: - 1 PERSONS
PRICE: - Rs. 200 per person
2) VIDEO GAMES:-These are off three types
a) Video Race Bike
b) Speed Champ Car
c) Monaco Gp Video Car
Specification:
SIZE: - 5 X 3 FEET
CAPACITY: - 1 PERSON
PRICE: - Rs. 500 Per person
3) SKILL GAMES:-These are off-two types
a) Air Hockey

Specification:
SIZE: - 102”X60”X72”H
CAPACITY: - 2 PERSON
PRICE: - Rs. 100 per person
b) Basket ball
Specification:
SIZE: - 84”X42”X84”H
CAPACITY: - 2 PLAYERS
PRICE: - Rs.100 per person
4) GIFT GAMES:-it is only off 1 type
a) Boxing
Specification:
SIZE: - 5 X 5
CAPACITY: - 1 PERSON
PRICE: - Rs. 1000 per person
5) FAMILY THRILL RIDES:
a) Flume Coster

Specification:
SIZE: - 30 X 80
CAPACITY: - 6 PERSON AT A TIME
PRICE: - Rs. 35 per person
b) Tora Tora
Specification:
SIZE: - 30 Ft. Dia
CAPACITY: - 36 PERSONS AT A TIME
PRICE: - Rs. 200 per person
c) Striking Car
Specification:
SIZE: - 2, 000 SQ. FT
CAPACITY: - 1 PERSON IN 1 CAR
PRICE: - Rs.400-500
6) WALKING ANIMALS AND CARS:
Specification:
CAPACITY: - 1 CHILD
PRICE: - Rs. 50 PER PIECE
7) PLAY PORT:
Specification:
PRICE:40 per Student
3.2 Components of the project

 How to Login

In this module, the user will enter his username and password to view and buy latest

products. There will be 2 types of users Administrator/Customer

 How to be a member of this application

In this site, the candidate can join this application , if he is not a member yet by pressing

sign up link .User should provide some details that are asked to join.

 How to view the Park details

Any park can be searched by selecting the given park which the user wish to view or buy

a ticket for a particular park

 How to purchase ticket

First the user has to login,and then he will visit and view all kinds of parks and select a

park of his choice where user wants to go. Then after selection he will be able to buy

ticket and the rate of a given park and also discounts offered will show to the user.

 How to pay money

The user can pay through debit or credit cards.


3.3 Module Description of Project

From an end-user perspective, the Online Amusement Park Project consists of various functional

Elements:

1) Online Ticketing Module:

2) Reservation System Module:

3) Payment Counter Module:

4) Stock Management Module:

5) Online Sales & Booking Module:

6) Time Clock & Scheduling Module:

1) Online Ticketing Module:

Ticketing System is designed to handle various type of identification technology such as bar

code paper tickets,magnetic paper tickets ,RFID tags,Biometry and also virtual electronic

ticket which can be issued by E-Mail or MMS.Tickets can be used for entry charges ,but also for

further identification inside the facility utilizing and additional customer services.It also provide

single payment and ticketing system for all services regardless which ticketing system is used.

Such a way visitor can pay entry fee by auto pay parking station and use parking ticket for entry

to the facility.

2) Reservation System Module:

Ticket reservation, service or product reservation and many others can be processed by

integrated reservation system. Reservation system can be used via phone (call center), e-mail,
web or by on-line terminals distributed among facility. Payment and reservation terminals can

utilize same hardware equipment. Typical usage is booking of sport facilities, seats in

restaurants, spa treatment, personal trainers and many others.

3) Payment Counters Module:

System provide complete support for manually operated payment counters or fully automated

payment station. .Payment can be done by cash, credit cards, vouchr or by mobile phones.

Payment counter can be also fully virtual and work as part of electronic reservation system or E-

SHOP via web interface. All credit card payments and internet payments must always follow the

regulations and banking standards in each country. Payment counters can also use third party

discount cards or membership redemption cards.

4) Stock Management Module:

Theme parks has typically two possible scenarios of stock management utilization.

First case has to handle all equipment, which is borrowed to visitors (including registration,

maintenance, returns, deposits etc.) and second is handling standard stock of goods or food for

shops, restaurants and catering facilities. EPOS 3000 is able automatically generate demand on

groceries and drinks based on sold food portions to visitors.

This system also highly limit possible fraud of goods by employees. Similar concept can be used

for all merchants in the facility if required not limited only on food.

5) Online Sales & Booking Module:

a) Sell barcoded tickets for validation at Point of Sale, mobile devices, or turnstiles
b) Integrates directly with your local applications, eliminating the need for additional manual

processes

c) Changes to your inventory items, such as price or description, will synchronize directly to

your web store

d) Operate an online retail store with inventory control integrated to your POS

e) All online sales appear on your local reports almost immediately

f) We manage the web server for you, so you don’t need to worry about server security or up-

time

6) Time Clock & Scheduling Module:

a) Track labor costs by work department

b) Optionally supports biometric fingerprint identification

c) Restrict when employees can clock in based upon their schedules

d) Projected labor budgets as you are building schedules help to control labor costs

e) Employees can view and print their schedule from any computer operating the CenterEdge

Advantage software

3.4 Introduction to Java Programming Language

3.4.1 What is Java

Java is a programming language and a platform.

Java is a high level, robust, secured and object-oriented programming language.


Platform: Any hardware or software environment in which a program runs, is known as a

platform. Since Java has its own runtime environment (JRE) and API, it is called platform.

Java Example:

class test

public static void main(String[] args)

System.out.println(“My first program in java”);

Where it is used?

According to Sun, 3 billion devices run java. There are many devices where java is currently

used. Some of them are as follows:

1. Desktop Applications such as acrobat reader, media player, antivirus etc.

2. Web Applications such as irctc.co.in, javatpoint.com etc.

3. Enterprise Applications such as banking applications.

4. Mobile

5. Embedded System

6. Smart Card

7. Robotics

8. Games etc.
3.4.2 Types of Java Applications

There are mainly 4 type of applications that can be created using java programming:

1) Standalone Application

It is also known as desktop application or window-based application. An application that we

need to install on every machine such as media player, antivirus etc. AWT and Swing are used in

java for creating standalone applications.

2) Web Application

An application that runs on the server side and creates dynamic page, is called web application.

Currently, servlet, jsp, struts, jsf etc. technologies are used for creating web applications in java.

3) Enterprise Application

An application that is distributed in nature, such as banking applications etc. It has the advantage

of high level security, load balancing and clustering. In java, EJB is used for creating enterprise

applications.

4) Mobile Application

An application that is created for mobile devices. Currently Android and Java ME are used for

creating mobile applications.

3.4.3 Advantages of JAVA application development

1) Learning JAVA is Easy


Though the statement is subject to raise many contradictions, but this remains a fact. Even if one

has no programming background and has never learnt introductory programming languages like

C++, learning the concepts of JAVA wouldn’t be a barrier. Without the necessity to use and

understand magic characters like Generics Angle Brackets etc., JAVA promotes English syntax

and commands instead. Once the initial lessons are caught hold, the rest often becomes easier.

2) Uses OOPS Concept

Applications that are developed using the OOPS (Object Oriented Programming) concept of

JAVA are more competent as they are extensible, scalable and flexible. It has a rich library of

default design patterns and other best practices. Open sources like Spring etc. use the concepts of

Object Oriented Programing making it all the more adaptable for application developments on

Java.

3) Platform Independent

Since the time JAVA has gained popularity, i.e. from 1990s, its Platform Independent nature has

made it a highly demanded technology. This feature has made it complement the tagline “Write

Once Run Anywhere” in true sense as it has opened doors to many new developments. Till

today, this continues to be the reason why many Java applications are built on Windows and run

on UNIX.

4) JAVA community and Support

JAVA’s community support has been bliss to all programmers. Bundles of forums to post

queries, Stackoverflows and other user groups has always extended support and help on all

topics. Giving and taking advice on Java application developments from experts for free has

aided in networking one of this biggest and richest community.


3.4.4 Disadvantage of JAVA Application

1) Memory and Speed

Since JAVA requires high storage capacity and uses more memory, it becomes slower in

performance compared to other languages.

2) Security Concerns

Being platform independent, JAVA developments are at a risk of facing security breaches.

3.4.5 Five key Elements of JAVA

1) Variables

2) Method

3) Constructor

4) Instance Block

5) Static Block

For ex:- Class Test

Variable

Method

Constructor

Instance Block

Static Block

}
1) Variables

Variables are used to store values by using these values we are able to execute that values

These are off-3 Types

a) local variable

b) Instance variable

c) Static Variable

a) Local Variable:-The variable which is declared inside the method,constructor or blocks

For ex:-Class Test

Void m1()

Int a=10;

System.out.println(a

Public static void main(String[] args)

Test t=new Test();

t.m1();

}
}

b) Instance Variable:-are those variable which is declare inside the class but outside the

methods,constructor or block.

For ex:- Class Test

int a=10;

int b=20;

void m1(){// NO IMLEMENTATION}

public static void main(String[] args);

Test t=new Test();

System.out.println(t.a);

System.out.println(t.b);

c) Static Variable:-The variable which is declared inside the class but outside the

method,constructor or block by using static modifier.

For ex:- Class Test

{
static int a=100;

static int b=200;

static void m1()

static int c=a+b;

System.out.println(c);

public static void main(String[] args);

System.out.println(Test.a);

System.out.println(Test.b);

2) Method

Inside the class directly writing the business logics are not allowed .Methods are used to write

Logics application

These are off-2 Types

a) Instance method

b) Static method
a) Instance method:-Method are used to write logics of the application and memory is allocated

at the time of object creation

For ex:- Class Test

void m1() // Instance method

System.out.println(“This is m1 method”);

Void m2()

System.out.println(“this is m2 method”)

public static void main(String[] args);

Test t=new Test();

t.m1();

t.m2();

b) Static method:-are used to write the buisness logics of the application by using static

modifier

and memory is allocated while .class file loading


For ex:- Class Test

static void m1() // static method

System.out.println(“This is m1 method”);

static Void m2()

System.out.println(“this is m2 method”)

public static void main(String[] args);

Test.m1();

Test.m2();

3) Constructor

Constructor in java is a special type of method that is used to initialize the object. Java

constructor is invoked at the time of object creation. It constructs the values i.e. provides data for

the object that is why it is known as constructor.


Rules for creating java constructor

There are basically two rules defined for the constructor.

1) Constructor name must be same as its class name

2) Constructor must have no explicit return type

Types of java constructors

There are two types of constructors:

a) Default constructor (no-arg constructor)

b) Parameterized constructor

a) Default Constructor:

A constructor that have no parameter is known as default constructor.

For ex:-

Class Test

{
Test()

System.out.println(“This is default const.”);

Public static void main(String args[])

Test t=new Test();

b) Parameterized constructor:

A constructor that have parameters is known as parameterized constructor.

For ex:

class Student4{

int id;

String name;

Student4(int i,String n){

id = i;

name = n;

}
void display(){System.out.println(id+" "+name);}

public static void main(String args[]){

Student4 s1 = new Student4(111,"Karan");

Student4 s2 = new Student4(222,"Aryan");

s1.display();

s2.display();

3.5 Software/Hardware Requirements of Project

3.5.1 About Java Development Kit(JDK) :

The Java Development Kit (JDK) :-is a Sun Microsystems product aimed at Java developers.

Since the introduction of Java, it has been by far the most widely used Java SDK. On 17

November 2006, Sun announced that it would be released under the GNU General Public

License (GPL), thus making it free software. This happened in large part on 8 May 2007 and the

source code was contributed to the Open JDK.

The primary components of the JDK are a selection of programming tools, including:

 JAVA – The loader for Java applications. This tool is an interpreter and can interpret the

class files generated by the javac compiler. Now a single launcher is used for both
development and deployment. The old deployment launcher, jre, is no longer provided with

Sun JDK.

 JAVAC – The compiler, which converts source code into Java bytecode

 JAR – The archiver, which packages related class libraries into a single JAR file. This tool

also helps manage JAR files.

 JAVADOC – The documentation generator, which automatically generates documentation

from source code comments

 JDB – The debugger

 JAVAP – The class file disassembler

 APPLETVIEWER – This tool can be used to run and debug Java applets without a web

browser.

 JAVAH – The C header and stub generator, used to write native methods

 EXTCHECK – This utility can detect JAR-file conflicts.

 APT – The annotation processing tool

 JHAT – (Experimental) Java heap analysis tool

 JSTACK – (Experimental) This utility prints Java stack traces of Java threads.

 JSTAT – (Experimental) Java Virtual Machine statistics monitoring tool

 JSTATD – (Experimental) jstat daemon

 JINFO – (Experimental) This utility gets configuration information from a running Java

process or crash dump.

 JMAP – (Experimental) This utility outputs the memory map for Java and can print shared

object memory maps or heap memory details of a given process or core dump.
 IDLJ – The IDL-to-Java compiler. This utility generates Java bindings from a given IDL

file.

 POLICY TOOL – The policy creation and management tool, which can determine policy

for a Java runtime, specifying which permissions are available for code from various

sources

 VISUALVM – visual tool integrating several command line JDK tools and lightweight

performance and memory profiling capabilities

The JDK also comes with a complete Java Runtime Environment, usually called a private

runtime. It consists of a Java Virtual Machine and all of the class libraries that will be present in

the production environment, as well as additional libraries only useful to developers, such as the

internationalization libraries and the IDL libraries.

Also included are a wide selection of example programs demonstrating the use of almost all

portions of the Java API.

3.5.2 About JAVA Virtual Machine (JVM):

Java virtual Machine (JVM):-is a virtual Machine that provides runtime environment to

execute java byte code. The JVM doesn't understand Java typo, that's why you compile

your *.java files to obtain *.class files that contain the byte codes understandable by the JVM.

JVM control execution of every Java program. It enables features such as automated exception

handling, Garbage-collected heap.


JVM Architecture

Fig3.1:-Architecture of JVM

Class Loader : Class loader loads the Class for execution.

Method area : Stores pre-class structure as constant pool.

Heap : Heap is in which objects are allocated.


Stack : Local variables and partial results are store here. Each thread has a private JVM stack

created when the thread is created.

Program register : Program register holds the address of JVM instruction currently being

executed.

Native method stack : It contains all native used in application.

Executive Engine : Execution engine controls the execute of instructions contained in the

methods of the classes.

Native Method Interface : Native method interface gives an interface between java code and

native code during execution.

Native Method Libraries : Native Libraries consist of files required for the execution of native

code.

3.5.3 About Integrated development Environment(IDE):

Integrated development environment(IDE):-An integrated development environment (IDE) is

a software suite that consolidates the basic tools developers need to write and test software.

Typically, an IDE contains a code editor, a compiler or interpreter and a debugger that the

developer accesses through a single graphical user interface (GUI). An IDE may be a standalone

application, or it may be included as part of one or more existing and compatible applications.

For ex:

My Eclipse

NetBeans
3.5.4 Front End:

JSP, JDBC, Javascript, HTML,CSS,Sevlet

1) About Java Server Pages(JSP):

Java Server Pages (JSP) :-is a server-side programming technology that enables the creation of

dynamic, platform-independent method for building Web-based applications. JSP have access to

the entire family of Java APIs, including the JDBC API to access enterprise databases.

2) About servlet:

Servlet:is a technology is used to create web application (resides at server side and generates

dynamic web page).

Servlet technology is robust and scalable because of java language. Before Servlet, CGI

(Common Gateway Interface) scripting language was popular as a server-side programming

language. But there was many disadvantages of this technology. We have discussed these

disadvantages below.

There are many interfaces and classes in the servlet API such as Servlet, GenericServlet,

HttpServlet, ServletRequest, ServletResponse etc.

3) About Java Database Connectivity(JDBC):

Java Database Connectivity (JDBC):- is an application programming interface (API) for the

programming language Java, which defines how a client may access a database. It is part of the

Java Standard Edition platform, from Oracle Corporation.


4) About JavaScript:

JavaScript(often shortened to JS):- is a lightweight, interpreted, object-oriented language

with first-class functions, and is best known as the scripting language for Web pages, but

it's used in many non-browser environments as well. It is a prototype-based, multi-paradigm

scripting language that is dynamic, and supports object-oriented, imperative, and functional

programming styles.

JavaScript runs on the client side of the web, which can be used to design / program how the web

pages behave on the occurrence of an event. JavaScript is an easy to learn and also powerful

scripting language, widely used for controlling web page behaviour.

5) About Hyper Text Markup Language(HTML):

HTML (Hypertext Markup Language):- is the set of markup symbols or codes inserted in a

file intended for display on a World Wide Web browser page. The markup tells the Web browser

how to display a Web page's words and images for the user. Each individual markup code is

referred to as an element (but many people also refer to it as a tag). Some elements come in pairs

that indicate when some display effect is to begin and when it is to end.

6) About Cascading Style Sheet (CSS)

A cascading style sheet (CSS) :-is a Web page derived from multiple sources with a defined

order of precedence where the definitions of any style element conflict. The Cascading Style

Sheet, level 1 (CSS1) recommendation from the World Wide Web Consortium (W3C), which is

implemented in the latest versions of the Netscape and Microsoft Web browsers, specifies the

possible style sheets or statements that may determine how a given element is presented in a

Web page.
3.5.5 Back End

1) About mysql

MySQL is the world's most popular open source database. With its proven performance,

reliability and ease-of-use, MySQL has become the leading database choice for web-based

applications, used by high profile web properties including Facebook, Twitter, YouTube, Yahoo!

and many more.

Oracle drives MySQL innovation, delivering new capabilities to power next generation web,

cloud, mobile and embedded applications.

MySQL is an open source relational database management system (RDBMS) based on

Structured Query Language (SQL).

MySQL runs on virtually all platforms, including Linux, UNIX, and Windows. Although it can

be used in a wide range of applications, MySQL is most often associated with web-based

applications and online publishing and is an important component of an open source enterprise

stack called LAMP. LAMP is a Web development platform that uses Linux as the operating

system, Apache as the Web server, MySQL as the relational database management system
Chapter 4

EVALUATION OF TRAINING

4.1 SYSTEM DEVELPOMENT LIFE CYCLE (SDLC)

The Systems Development Life Cycle (SDLC) is a conceptual model used in project

management that describes the stages involved in an information system development project

from an initial feasibility study through maintenance of the completed application. Various

SDLC methodologies have been developed to guide the processes involved including the

waterfall model (the original SDLC method). Documentation is crucial regardless of the type of

model chosen or devised for any application, and is usually done in parallel with the

development process. Some methods work better for specific types of projects, but in the final

analysis, the most important factor for the success of a project may be how closely particular
plan was followed.

4.1.1 PROBLEM ANALYSIS

Applications

The main applications of the FUN-O-SPHERE is the ability of the website to properly show

enroll the users and manage information about them. The administrator has the ability to change

,modify, view and delete the various details regarding the users and arts. The users have the

ability to log in and post their queries and download arts.

Challenges

The challenges mainly lie in detecting attacks like viruses, hacking and also in the

implementation of firewall. A virus can enter the system and can disrupt the working of the

website. Hacking can be done by some people who want to access some restricted sections of the

website (e.g. administrator’s area) and to modify or taper some aspects of the website.

Scanning attacks may yield:

1) The method used by viruses to enter the system.


2) The types of database allowed through a firewall

3) The paths or ways used by hackers to enter the system

4) The loopholes remaining in the system (or website) which are used by attackers.

5) The server from where the viruses or hackers are gaining access to the system.

6) The types of viruses able to affect the website.

4.1.2 REQUIREMENT ANALYSIS

Goal of Thesis

The goal of our thesis is to develop a website that can be used as an enrollment website with the

features of interaction and problem solving. The whole project will be based on JAVA with

MYSQL as the database with certain security constraints added to it. the Administrator part in to

the project so that the server or administrator himself can view, add, delete and modify.

Administrator

He has to see whether the website is working properly and whether the details available in the

system are relevant and correct. He can view, add, modify, delete details.

Database

The database keeps all the records of all the users i.e. name, course, phone no., dob, city,

country,etc. For creating such records it takes the help of tables which is created in the MYSQL.

The tables can have infinite entries of all the registered users as well as administrators.

Clients

Our aim will also to provide efficient way by which client can enter to see the offers available for

parks and also buy online ticket easily without wasting a time.
Security Constraints

There need to be certain constraints which have to be implemented on the database as well as on

the administrator in order to work properly the whole system, such as declaring the primary key,

or such constraints in order to keep the database work properly.

Some of such constraints are as follows:

 Each user has a field called username which can be used to differentiate between

different users.

 The administrator has his own password known to no one else to access a unique page.

 Only the administrator has the right to delete, modify users and questions.

 Administrator has to first login to get access to myaccount part and modify some data

available in the website.

 A new user cannot have same username and password as of some already registered user.

 When user or administrator click on logout the session of the user ends and he has to

again login using his/her username and password to access the same functionality.

4.1.3 FEASIBILTY STUDY

From the inception of ideas for software system, until it is implemented and delivered to

customer and even after that the system undergoes gradual developments and evaluations.

The software is said to have life cycle composed of several phases.

At the feasibility stage, it is desirable that two or three different configuration will be pursed that

satisfy the key technical requirement but which represent different level of ambition and cost.
Feasibility is the determination of whether or not a project is worth doing. A feasibility study is

carried out select a best system that mate performance requirements.

The data collected during primary investigation examines system feasibilities that is likelihood

that the system will be beneficial to the organization.

Four tests for feasibility study are as follows:-

 Technical Feasibility :-This is concerned with specifying equipment and software that
will successfully satisfy the use considerably, but might include

o The feasibility to produce output in a given time because system is fast enough to

handle multiple users.

o Response time under certain circumstances and ability to process a certain volume

of transaction of a particular speed.

o Feasibility to communicate data to distant location.

 Economical Feasibility :- Economic analysis is the most frequently used technique used

for evaluating the effectiveness of a proposed system. More commonly known as

cost/benefit analysis the procedure is to determine the benefits and savings that are

expected from a proposed system and compared them with cost. Though the cost of

installing the system may appear high, it is one time investment. The resulting benefits is

that automation results in turnaround time. The resulting cost/benefit ratio is favorable.

 Operational Feasibility: It is mainly related to human organizational as social aspects.


The points to be considered are - The system interface is standard, user friendly and

provides extensive help. Hence no special training is not required.


 Social Feasibility: Social feasibility is determination of whether a proposed project will

be acceptable to people or not, So this project is totally Social and Feasible

 diagram indicates how the system behaves as a consequence of external events.

4.1.4 DESIGN PHASE

The design phase involves converting the informational, functional, and network requirements

identified during the initiation and planning phases into unified design specifications that

developers use to script programs during the development phase. Program designs are

constructed in various ways. Using a top-down approach, designers first identify and link major

program components and interfaces, then expand design layouts as they identify and link smaller

subsystems and connections. Using a bottom-up approach, designers first identify and link minor

program components and interfaces, then expand design layouts as they identify and link systems

and connections.

Contemporary design techniques often use prototyping tools that build mock-up designs of

items such as application screens, database layouts, and system architectures. End users,

designers, developers, database managers, and network administrators should review and refine

the prototyped designs in an iterative process until they agree on an acceptable design.

Designers should carefully document completed designs. Detailed documentation enhances a

programmer’s ability to develop programs and modify them after they are placed in production.

The documentation also helps management ensure final programs are consistent with original

goals and specifications. Organizations should create initial testing, conversion, implementation,
and training plans during the design phase. Additionally, they should draft user, operator, and

maintenance manuals.

DATA FLOW DIAGRAM

A DFD also known as ‘bubble chart’, has the purpose of clarifying system requirements and

identifying major transformations. It shows the flow of data through a system. It is a graphical

tool because it presents a picture. The DFD may be partitioned into levels that represent

increasing information flow and functional detail. Four simple notations are used to complete a

DFD. These notations are given below:-

DATA FLOW:-The data flow is used to describe the movement of information from one part of

the system to another part.Data flow is represented by an arrow.

PROCESS:-A circle or bubble represents a process that transforms incoming data to outgoing

data. Process shows a part of the system that transform inputs to outputs.

EXTERNAL ENTITY:-A square defines a source or destination of system data. External

entities represent any entity that supplies or receive information from the system but is not a part

of the system.

DATA FLOW DIAGRAM OF


DATA STORE:- The data store represents a logical file. A logical file can represent either a

data store symbol which can represent either a data structure or a physical file on disk. The data

store is used to collect data at rest or a temporary repository of data. It is represented by open

rectangle.

OUTPUT:-The output symbol is used when a hard copy is produced and the user of the copies

cannot be clearly specified or there are several users of the Output

LEVEL ‘0’ DFD FOR ONLINE AMUSEMENT PARK SYSTEM

Request Request
Online Amusement
Park Park
user
Company
Response Response

Admin

Fig4.1:Level 0 DFD
SCREEN SHOTS

1) HOME PAGE
2) LOGIN PAGE

3) LOGIN PAGE WITH PROPER VALIDATION


4) REGISTRATION PAGE

5) USER ACCOUNT

7) DIFFERENT KINDS OF RIDES IN AMUSEMEMT PARK


8) DISCOUNT ON PARKS

7) BOOKING DETAILS FOR USER


9) PAYMENT OPTIONS
10) BOOKING IS SUCCESSFUL

4.1.5 TESTING PHASE

1) Software testing

Software testing is the process used to measure the quality of developed computer software.

Usually, quality is constrained to such topics as correctness, completeness, security, but can also

include more technical requirements as described under the ISO standard ISO 9126, such as

capability, reliability, efficiency, portability, maintainability, compatibility, and usability.

Testing is a process of technical investigation, performed on behalf of stakeholders, that is

intended to reveal quality-related information about the product with respect to the context in

which it is intended to operate .


Fig4.2:-Phases of Development

2) White box, black box, and grey box testing

White box and black box testing are terms used to describe the point of view that a test engineer

takes when designing test cases.

Black box testing treats the software as a black-box without any understanding as to how the

internals behave. Thus, the tester inputs data and only sees the output from the test object. This

level of testing usually requires thorough test cases to be provided to the tester who then can

simply verify that for a given input, the output value (or behavior), is the same as the expected

value specified in the test case.


White box testing, however, is when the tester has access to the internal data structures, code,

and algorithms. For this reason, unit testing and debugging can be classified as white-box testing

and it usually requires writing code, or at a minimum, stepping through it, and thus requires more

skill than the black-box tester. If the software in test is an interface or API of any sort, white-box

testing is almost always required.

In recent years the term grey box testing has come into common usage. This involves having

access to internal data structures and algorithms for purposes of designing the test cases, but

testing at the user, or black-box level. Manipulating input data and formatting output do not

qualify as grey-box because the input and output are clearly outside of the black-box we are

calling the software under test. This is particularly important when conducting integration testing

between two modules of code written by two different developers, where only the interfaces are

exposed for test.

Grey box testing could be used in the context of testing a client-server environment when the

tester has control over the input, inspects the value in a SQL database, and the output value, and
then compares all three (the input, sql value, and output), to determine if the data got corrupt on

the database insertion or retrieval.

Fig 4.3 Testing Process

Verification and Validation

Software testing is used in association with verification and validation (V&V). Verification is the

checking of or testing of items, including software, for conformance and consistency with an

associated specification. Software testing is just one kind of verification, which also uses

techniques such as reviews, inspections, and walkthroughs. Validation is the process of checking

what has been specified is what the user actually wanted.

 Verification: Have we built the software right? (i.e. does it match the specification).

 Validation: Have we built the right software? (i.e. Is this what the customer wants?)

Level of testing

Unit testing tests the minimal software component, or module. Each unit (basic component) of

the software is tested to verify that the detailed design for the unit has been correctly

implemented. In an Object-oriented environment, this is usually at the class level, and the

minimal unit tests include the constructors and destructors.

Integration testing exposes defects in the interfaces and interaction between integrated

components (modules). Progressively larger groups of tested software components


corresponding to elements of the architectural design are integrated and tested until the software

works as a system.

Functional testing tests at any level (class, module, interface, or system) for proper functionality

as defined in the specification.

System testing tests a completely integrated system to verify that it meets its requirements.

System integration testing verifies that a system is integrated to any external or third party

systems defined in the system requirements.

Acceptance testing can be conducted by the end-user, customer, or client to validate whether or

not to accept the product. Acceptance testing may be performed as part of the hand-off process

between any two phases of development.

 Alpha testing is simulated or actual operational testing by potential users/customers or an

independent test team at the developers' site. Alpha testing is often employed for off-the-

shelf software as a form of internal acceptance testing, before the software goes to beta

testing.

 Beta testing comes after alpha testing. Versions of the software, known as beta versions,

are released to a limited audience outside of the company. The software is released to

groups of people so that further testing can ensure the product has few faults or bugs.

Sometimes, beta versions are made available to the open public to increase the feedback

field to a maximal number of future users.


It should be noted that although both Alpha and Beta are referred to as testing it is in fact use

immersion. The rigors that are applied are often unsystematic and many of the basic tenets of

testing process are not used. The Alpha and Beta period provides insight into environmental and

utilization conditions that can impact the software.

After modifying software, either for a change in functionality or to fix defects, a regression test

re-runs previously passing tests on the modified software to ensure that the modifications haven't

unintentionally caused a regression of previous functionality. Regression testing can be

performed at any or all of the above test levels. These regression tests are often automated.

4.1.6 IMPLEMENTATION PHASE

The implementation phase involves installing approved applications into production

environments. Primary tasks include announcing the implementation schedule, training end

users, and installing the product. Additionally, organizations should input and verify data,

configure and test system and security parameters, and conduct post-implementation reviews.

Management should circulate implementation schedules to all affected parties and should notify

users of any implementation responsibilities.

After organizations install a product, pre-existing data is manually input or electronically

transferred to a new system. Verifying the accuracy of the input data and security configurations

is a critical part of the implementation process. Organizations often run a new system in parallel

with an old system until they verify the accuracy and reliability of the new system. Employees

should document any programming, procedural, or configuration changes made during the

verification process.
4.1.7 TEST PLAN

The testing phase requires organizations to complete various tests to ensure the accuracy of

programmed code, the inclusion of expected functionality, and the interoperability of

applications and other network components. Thorough testing is critical to ensuring systems

meet

Bottom-up tests often begin with functional (requirements based) testing. Functional tests should

ensure that expected functional, security, and internal control features are present and operating

properly. Testers then complete integration and end-to-end testing to ensure application and

system components interact properly. Users then conduct acceptance tests to ensure systems

meet defined acceptance criteria. Organizations should review and complete user, operator, and

maintenance manuals during the testing phase. Additionally, they should finalize conversion,

implementation, and training plans.

4.1.8 MAINTENANCE:The maintenance phase involves making changes to hardware,

software, and documentation to support its operational effectiveness. It includes making changes

to improve a system’s performance, correct problems, enhance security, or address user

requirements. To ensure modifications do not disrupt operations or degrade a system’s

performance or security, organizations should establish appropriate change management

standards and procedures.

Routine changes are not as complex as major modifications and can usually be implemented in

the normal course of business. Routine change controls should include procedures for requesting,

evaluating, approving, testing, installing, and documenting software modifications.Maintaining

accurate, up-to-date hardware and software inventories is a critical part of all change
management processes. Management should carefully document all modifications to ensure

accurate system inventories. Management should coordinate all technology related changes

through an oversight committee and assign an appropriate party responsibility for administering

software patch management programs. Quality assurance, security, audit, regulatory compliance,

network, and end-user personnel should be appropriately included in change management

processes. Risk and security review should be done whenever a system modification is

implemented to ensure controls remain in place.

Chapter 5

CONCLUSION AND FUTURE SCOPE OF TRAINING

5.1 Conclusion and objective achieved

We have successfully implemented the site ‘Fun O Sphere. With the help of various links and
tools, we have been able to provide a site which is live and running on the web. We have been
successful in our attempt to take care of the needs of both the customers as well as the
administrator. Finally we hope that this will go a long way in popularizing the organization and
making it’s work of enrollment, keeping track of Records of items, problem solving, etc much
more efficient.

In our experiment the "integration phase", while not mechanised, was so simple that it could
have been mechanised. Even in the few cases where errors did occur, the system had been
structured in such a way that diagnostic messages automatically indicated the module making the
error. We had no need for anyone who had a thorough knowledge of the whole system.

Objective Achieved during the Project

a) To be independent by starting our own business.


b) To avail the market opportunity in the sense of entertainment provider
c) To utilize our interpersonal skills managing the amusement park.
d) To help the local society by providing various jobs in our theme park.
e) To be the leading entertainment provider in the country.
f) To be the leading share holder in the coming five years in the entertainment sector.
g) To attract various investors and to develop the concept of entrepreneur.

5.2 Future Scope

We can implement easily this application. Reusability is possible as and when we require in this
application. We can update it next version. We can add new features as and when we require.
There is flexibility in all the modules. Scope of this document is to put down the requirements,
clearly identifying the information needed by the user, the source of the information and outputs
expected from the system.

The following section discusses the work that will be implemented with future releases of the
software.
1. Detailed categories: Future work could involve adding more categories which are more
detailed and have additional items.

2. Watch/Wish List: Work can add a watch list or wish list so that users can add an rides to a
list to watch for item prices to go down or to see when there is a discount on any of those items.

3. Enhanced User Interface: Work on enhancing the user interface by adding more user-
interactive features.

4. Recommended Items: Add a bar that would display the most-recommended parks which
would depend on the number of times an ticket has been purchased by any users.

5. Payment Options: Add different payment options, such as Visa, MasterCard, PayPal, etc.,
where a user can also save the card information for later checkouts.

BIBLIOGRAPHY

 For Java installation


 https://www.java.com/en/download/
 For Oracle DataBase installation
 http://www.oracle.com/index.html
 Reference websites
 www.javatpoint.com
 www.w3schools.com
 http://www.tutorialspoint.com/java/index.htm
 Reference Books
 Thinking in java
 OCJP Certified Programmer for Java
 Learn Java in Easy Steps
 Complete reference Java

You might also like