Professional Documents
Culture Documents
Nettippattam
Nettippattam
Nettippattam
2019-2020
Project Report
on
NETTIPPATTAM
BASELIOS POULOSE II CATHOLICOS COLLEGE
Accredited with ‘A’ Grade by NAAC
PIRAVOM
2019-2020
Project Report
on
NETTIPPATTAM
Submitted in partial fulfilment of the
Requirements for the award of the degree of
BACHELOR OF COMPUTER APPLICATION
Guided by: Dr. Shaju Varhgese Submitted by:
(Dept. of Computer Applications) Bibin Sajeevan
(170021093014)
Alex George
(170021092991)
BASELIOS POULOSE II CATHOLICOS COLLEGE
PIRAVOM
Examiners
Department Seal
College seal
DECLARATION
Last but not the least, we also express our gratitude to all other members of the faculty
and well-wishers who assisted us in various occasions during the project work.
:-Bibin Sajeevan
:-Alex George
ABSTRACT
ABSTRACT
Project 'Nettippattam' is an online platform for a variety of users who are related with
the Elephants of Kerala. This project is the first of its kind and a new breakthrough in
online booking, surveillance and assessment of Kerala elephants .It is a knowledge
repository for users to check and gather information about the elephants of Kerala all
in all at their fingertips.
OBJECTIVE:
This site is developed on the notion that elephants are to be handled properly by the
owners and the users in various jobs they are involved in. For executive administers,
DFO, they can make use of this web repository to gather information about their
concerned elephants at ease.
TABLE OF CONTENTS
PAGE NO
1. SYSTEM STUDY.............................................................................. 1
1.1.1 DRAWBACKS……………………..……………………………………3
2. SYSTEM SPECIFICATION………………………………………11
4. SYSTEM DESCRIPTION……………………….………………...36
6. CONCLUSION……………………..……………………...……….44
7. BIBLIOGRAPHY………………...………………..…………….....46
8. APPENDIX……………………..…………………………….......... 48
1
1. SYSTEM STUDY
Harassment of the elephants can take place at any time. People are not taking
measures to avoid those situations .The complain about this harassment has to deals
with many legal issues and lots of time. No easy way is still available to report it
directly to higher officials.
Even if the people are aware about the elephants in Kerala, they are not provided with
enough information about them .People who wish to know about all the registered
elephants in Kerala has to go through many sources to acquire enough information.
An updated knowledge repository about the elephants in Kerala is still not available.
The facts and information about the elephants has to be acquired through the books
written about the elephants.
Temples those are hiring elephants has to cost a lot in it. A huge amount of money
has to be insured on the elephants along with the cost of hiring them. People can help
them by sponsoring the elephants during the festival occasions. But at the present
situation this has to be carried out manually.
2
Temples in need of help in money for hiring elephants has to now approach people
individually for gathering funds. No easy way to implement this process is available.
Owners are of in need of updating the medical certificate of the elephants after a given
period of time and to be approved it by DFO manually. Owners has to manually get
approved by DFO.
DFOs are responsible for surveillance and protection of elephants in their provisioned
region. They have to manually perform these actions. Even if the harassment of
elephants is taking place the reporting of this is not always happening.
As in the current situation people related with elephants have to perform lots of man
work and cost to perform various actions.
3
4. Inefficient information gathering:-Gathering of information about elephants
will take lot of work since it is not available at a single source. It is therefore
not easy to collect information about elephants.
5. Cost:-Elephants are costly and to keep or to use them a large sum of money has
to be spend. More money has to be spent on dealers to actually book elephants
and actually cost is not always revealed to the users.
6. Manual work:-The approval of government procedures takes up a lot of
manual work. Gathering funds for elephants is also done manually. No
digitalized form of booking elephants is available now.
7. Malpractices and harassment towards elephants:-Even though strict laws are
implemented for protection of elephants, harassment of elephants is taking
place. The manual records on the protection can be manipulated and the
elephants are sometimes used for more period than they are allowed.
The work that was being carried out with the help of the manual system has to be
transferred to that of an advanced one for a variety of reasons,
1. The manual system is slowly being phased out and all the activities that are
being carried out by the manual system could easily and efficiently been alone
by our proposed system.
2. There are many functions that demanded computerization, but were not being
covered by the manual system.
4
3. The throughout time is high for processing
The system also needs easy access with a computer system we can easily access any
records in it. But when it is in manual systems it is difficult to find it using its serial
numbers or something like that. So now a day the need of the automated system is
important.
5
For requirement elicitation purpose we have visited the Kodanad Elephant Training
Centre. Situated on the south bank of periyar river is a perfect spot in Ernakulum
district to train elephants. Many famous elephants like Chandrashekaran and all were
trained in this centre. When we visited the training centre there were a total of 6
elephants including 3 male elephants and 3 female elephants.2 of the male elephants
were baby elephants. The centre has large cages for the elephants training built on
wood. We interviewed the famous trainee Radhakrishnan who has written many
famous books on elephants. He taught us about the various ways elephants were
caught before the banning in Kerala and the current status of using elephants in
Kerala. He has conducted many classes in schools about elephants.
The office of the research range officer Kodanad is also located inside Kodanad
training centre. The officer Madhavan Nair informed us about the various formalities
and papers required to own an elephant and to use elephants in festivals. We got the
information about the government procedures associated with elephant keeping. We
also visited some elephant lovers to know about the features that are to be included
for general users in our site
The project Nettippattam is a knowledge repository for all kinds of users. This
platform provides all the necessary details required by the users to implement their
6
operations. A user friendly all in all knowledge site about elephants is far easier and
useful for users to gather information about users.
Booking of elephants can be done directly between the users and the owners without
the need for any dealers in between them through online payment. Online payment is
cost effective and affordable way for booking elephants. The dates of the elephants
can be also verified and availability of elephants in the required period can be also
checked.
In this digitalized era the updating of medical license can be done by the owner
according to periods of updating without the need to manually get certified by the
DFO. This make ease of formalities involved in this matter. DFO can accept the
owners according to the proofs and license submitted to them by the owners.
DFOs can monitor and view the booking details of each elephants. DFO can also
approve owners based on their license and proof submitted. He can also reject owners
easily according to the proofs submitted and expired medical certificate of elephants.
DFO can also view and verify the complaints reported through the online submission.
7
Thus the proposed system eases the way in which elephants are handled by the users.
This recordical methodology ensures the safety of the elephants.
1. Economic feasibility
2. Technical feasibility
3. Behavioural feasibility
Economic Feasibility
Economic analysis is the most frequently used method for evaluating the effectiveness
of the proposed system. It is more commonly known as cost benefit analysis, the
procedure is to determine the benefit and saving that are expected from the proposed
system and compare them with the cost of the existing system. If the benefits
outweigh cost then a decision is made to design and implement the system. Otherwise
make alterations in the proposed system.
The system can be developed technically and if installed would still be good for the
society. The cost is found to be lesser as compared to the benefits of the proposed
9
system. The work load of the user will decrease to half of the current work load. Hence
the proposed system is found to be economically feasible.
Technical Feasibility
Technical study is a study of hardware and software requirements. Technical
feasibility concentrates on the organization to what extend it and support the proposed
system. The question to be answered is whether the organization is technically
capable to operate the system
Hardware Requirements:
Pentium IV
256MB RAM
500MB HDD
Software Requirements:
Behavioural Feasibility
The developed system is completely driven and user friendly. Also the system is
developed using HTML, CSS and JavaScript as front end, which is user interface.
There is no need of skill for new user to open this Website and use it.
10
SYSTEM SPECIFICATION
11
2. SYSTEM SPECIFICATION
HTML
HTML is a computer language devised to allow Website creation. These Websites
can then be viewed by anyone else connected to the Internet. It is relatively easy to
learn, with the basics being accessible to most people in one sitting; and quite
powerful in what it allows you to create. It is constantly undergoing revision and
evolution to meet the demands and requirements of the growing Internet audience
under the direction of the W3C, the organization charged with designing and
maintaining the language.
HTML consists of a series of short codes typed into a text-file by the site author —
these are the tags. The text is then saved as an html file, and viewed through a browser,
like Internet Explorer or Netscape Navigator. This browser reads the file and
translates the text into a visible form, hopefully rendering the page as the author had
intended. Writing your own HTML entails using tags correctly to create your vision.
You can use anything from a rudimentary text-editor to a powerful graphical editor
to create HTML pages.
CSS
Stands for "Cascading Style Sheet." Cascading style sheets are used to format the
layout of Web pages. They can be used to define text styles, table sizes, and other
aspects of Web pages that previously could only be defined in a page's HTML.
12
CSS helps Web developers create a uniform look across several pages of a Web site.
Instead of defining the style of each table and each block of text within a page's
HTML, commonly used styles need to be defined only once in a CSS document. Once
the style is defined in cascading style sheet, it can be used by any page that references
the CSS file. Plus, CSS makes it easy to change styles across several pages at once.
For example, a Web developer may want to increase the default text size from 10pt
to 12pt for fifty pages of a Web site. If the pages all reference the same style sheet,
the text size only needs to be changed on the style sheet and all the pages will show
the larger text.
While CSS is great for creating text styles, it is helpful for formatting other aspects of
Web page layout as well. For example, CSS can be used to define the cell padding of
table cells, the style, thickness, and colour of a table's border, and the padding around
images or other objects. CSS gives Web developers more exact control over how Web
pages will look than HTML does. This is why most Web pages today incorporate
cascading style sheets.
JavaScript
JavaScript is a dynamic computer programming language. It is lightweight and most
commonly used as a part of Web pages, whose implementations allow client-side
script to interact with the user and make dynamic pages. It is an interpreted
programming language with object-oriented capabilities.
JavaScript was first known as LiveScript, but Netscape changed its name to
JavaScript, possibly because of the excitement being generated by Java. JavaScript
made its first appearance in Netscape 2.0 in 1995 with the name LiveScript. The
general-purpose core of the language has been embedded in Netscape, Internet
Explorer, and other Web browsers.
13
2.2 ABOUT THE BACK END
The system is created with PHP and MySQL as backend.
PHP
PHP started out as a small open source project that evolved as more and more people
found out how useful it was. Rasmus Lerdorf unleashed the first version of PHP way
back in 1994.
PHP is a MUST for students and working professionals to become a great Software
Engineer especially when they are working in Web Development Domain. The key
advantages of learning PHP are:
14
MYSQL
MySQL is free and open-source software under the terms of the GNU General Public
License, and is also available under a variety of proprietary licenses. MySQL was
owned and sponsored by the Swedish company MySQL AB, which was bought
by Sun Microsystems (now Oracle Corporation). In 2010, when Oracle acquired Sun,
Widenius forked the open-source MySQL project to create Maria DB.
WINDOWS OS
Windows 10 is a series of personal computer operating systems produced by
Microsoft as part of its Windows NT family of operating systems. It is the successor
to Windows 8.1, and was released to manufacturing on July 15, 2015, and broadly
released for retail sale on July 29, 2015. Windows 10 receives new builds on an
ongoing basis, which are available at no additional cost to users, in addition to
additional test builds of Windows 10 which are available to Windows Insiders. The
latest stable build of Windows 10 is Version 1909 (November 2019-20 Update).
Devices in enterprise environments can receive these updates at a slower pace, or use
long-term support milestones that only receive critical updates, such as security
patches, over their ten-year lifespan of extended support.
15
2.4 HARDWARE SPECIFICATION
Memory Minimum: 1 GB RAM for 32-bit system, 2 GB RAM for 64-bit systems
Recommended: 40 GB or greater
16
SYSTEM ANALYSIS
AND
DESIGN
17
3. SYSTEM ANALYSIS AND DESIGN
System design’s main aim is to identify the modules that should be in the system, and
the specifications of these modules and how they interact with each other to produce
the desired results. At the end of the system design all the major data structures, file
formats and the major modules in the system and their specification are decided.
Data Flow
Data store
18
Level 0 (Context Diagram)
Level 1 Users
19
Level 2 Admin
20
Level 2 User
21
Level 2 Owner
22
Level 2 DFO
23
Level 2 Temple
24
3.2 TABLE DESIGN
The aim of database design is to improve the existing system situation. A number of
database files were designed to hold the data requirements for running their systems.
25
3. TABLE NAME: tbl_complaint
PRIMARY KEY: complaint_id
DESCRIPTION: COMPLIANT BOX
26
18 sanswer2 varchar 500 NOT NULL Security Question
Answer 2
27
7. TABLE NAME: tbl_elephantdesign
PRIMARY KEY: elephantdesign_id
DESCRIPTION: ELEPHANT DESIGNATION
28
10. TABLE NAME: tbl_festival
PRIMARY KEY: festival_id
DESCRIPTION: DETAILS OF FESTIVAL
29
13. TABLE NAME: tbl_gallery
PRIMARY KEY: elephantgallery_id
DESCRIPTION: ELEPHANT GALLERY
30
15. TABLE NAME: tbl_place
PRIMARY KEY: place_id
DESCRIPTION: PLACE DETAILS
31
11 place_id int 11 NOT NULL Temple place id
12 photo varchar 500 NOT NULL Temple photo
13 squetion1 int 11 NOT NULL Security Question 1
14 squetion2 int 11 NOT NULL Security Question 2
15 sanswer1 varchar 500 NOT NULL Security Question
Answer 1
16 sanswer2 varchar 500 NOT NULL Security Question
Answer 2
32
19. TABLE NAME: tbl_squestion
PRIMARY KEY: squestion_id
DESCRIPTION: SECURITY QUESTIONS
33
3.3 INPUT DESIGN
Input is the process of converting user inputs computer based format. The project
requires a set of information from the user to prepare a report. In the order, when
organized input data are needed.
In the system design phase, the expanded DFD identifies logical data flow, data stores
and destination. Input data is collected and organized into groups of similar data. The
goal behind designing input data is to make the data entry easy and make it free from
logical error .So the input screens in the system should be really flexible and faster to
use. The input entry to all type of clients is the Username and password. If they are
valid the User is allowed to enter into the software. The input design determines
whether the user can interact directly with the computer.
Objectives
To produce a cost-effective method of input
34
3.4 OUTPUT DESIGN
Outputs are the most important direct source of information to the user and to the
management. Efficient and eligible output design should improve the system’s
relationship with the user and help in decision making. The system mainly consists of
outputting the posts and messages. For example like the admin home page shown
below.
35
SYSTEM DESCRIPTION
36
4. SYSTEM DESCRIPTION
37
Register Elephants:-Elephant accounts are created by the owners after
submitting proper certificates digitally.
Add festival details:-Temples can add festival details so that the users can get
to know about the festivals that are about to take place in their locality.
Surveillance of elephants:-The DFO can check every booking details of the
elephants so that he can make sure that elephants are not over used by the
owner.
38
SYSTEM TESTING
AND
IMPLEMENTATION
39
5. SYSTEM TESTING AND IMPLEMENTATION
Software testing is a critical element of system quality assurance and represents the
ultimate reviews of specification, design and coding. Testing presents an interesting
anomaly for the software. Testing is vital to the success of the system. Errors can be
injected at any stage during development. System testing makes a logical assumption
that if all the parts of the system are correct, the goal will be successfully achieved.
During testing, the program to be tested is executed with set of test data and output of
the program for the test data is evaluated to determine if the program is performing as
expected. A series of testing are performed for the proposed system before the system
is ready for the user acceptance testing.
TYPES OF TESTING
* Unit Testing
* Integration Testing
* Validation Testing
* Output Testing
Using the details description as a guide, important control paths are tested to uncover
errors within the boundary of the modules. This testing was carried out during
programming stage itself. In this testing step each module is found to be working
40
satisfactorily as regards to the expected output from the module. In our system, we
want to check the information like whether the inputs are saved to back end correctly.
So every form includes this testing because we want to maintain our database because
information like document to be saved, the personal information, security features are
so sensitive and should check it perfectly by each module from the beginning. These
are checked in the programming step itself.
The objective is to take unit tested modules and built a program structure that has
been dictated by design. All modules are combined in this testing step. The entire
program is tested as a whole. Correction is difficult at this stage because the isolation
of causes is complicated by the vast expense of the program. Thus in the integration
testing step all the errors uncover are corrected for the next testing step. Primarily we
have met with several errors like data save and table linking. These are corrected well.
41
• The function or performance characteristics confirm to specifications and are
accepted.
• A validation from specification is uncovered and a deficiency created .Deviation
or error discovered at this step in this project is corrected prior to completion of the
project with the help of the user. Thus the proposed system under consideration has
been tested by using validation testing and found to be working satisfactorily.
In the first test, we saw that our services are disordered and not interactive. We made
it in this step. The output format on the screen is found to be correct as the format
designed according to the user needs. For the hard copy also, the output comes out as
specified by the user. Hence output testing doesn’t result in any connection in the
system.
42
Implementation is the final and important phase. The most critical stage in achieving
a successful new system and in giving the users confidence that the new system will
work and be effective. The system can be implemented only after through testing is
done and if it found to working according to the specification. This method also offers
the greatest security since the old system can take over if the errors are found or
inability to handle certain type of transactions while using the new system.
same computer.
43
CONCLUSION
44
6. CONCLUSION
All modules are tested separately and put together to form the main system. Finally
the system is tested with the real data and everything worked successfully. Thus the
system has fulfilled the entire objective identified. The system required least hardware
requirement to work on. So we can state, we have developed such a good environment
for communication, to connect with more people. And it provides a number of
advantages too as we described in the previous sections.
To conclude this, we thank all people who help us to complete this project work
successfully.
45
BIBLIOGRAPHY
46
7. BIBLIOGRAPHY
Korth, Sudarshan,
Fourth Edition.
Jeeva Jose
Kalyani publications
Steven Holzner
Dreamtech Press
47
APPENDIX
48
8. APPENDIX
LAUNCHING PAGE
USER HOMEPAGE
49
8.1 INPUT FORMS DESIGN
FORM 1 - LOGIN PAGE
50
FORM 3 -CHANGE PASSWORD
51
FORM 5 -COMPLAINT
52
8.2. OUTPUT FORMS DESIGN
53
FORM 3 –TEMPLE DETAILS
54
FORM 5 –COMPLAINTS
55