Professional Documents
Culture Documents
MCA Smruti (2 Files Merged)
MCA Smruti (2 Files Merged)
A Project Report on
1
Directorate of Distance Education
Swami Vivekanand Subharti University
Certificate
This is to Certify that AJIT KUMAR PANIGRAHI has carried out the
Project work presented in this entitled “RECENT REFORMS IN INDIAN
ECONOMY” under my supervision and merits the award of Master in Business
Administration from Swami Vivekanand Subharti University. The Project
embodies result of original work and studies carried out by Student himself/herself
and the contents of the Project do not form the basis for the award of any other
degree to the candidate or to anyone else.
2
Chapter 1
1.1 Abstract
1. System shall accept the mails from authorized users providing security. Submitted
messages will be delivered to appropriate person only. It provides the facility to review
messages from the respective folders. Effective Communication has become an integral part
of organizations today. The rapid development of mailing system (intranets) may provide
construction and design teams with an innovative tool for meeting these growing
communication challenges.
2. A project specific mailing system uses a database server to store mails information and the
organizational information such as user’s details including the personal information and
information requests. Teams members can be then access this information using the Mailing
System. As information changes, the server content can be easily updated with new or revised
data. This flexible approach allows geographically remote project teams to access timely,
consistent and accurate information without expensive typesetting, printing, distribution and
mailing charges.
1.2 Objective
Secure Mailing: - The objective of this project is to describe the basic features of e-
mailing system and identify the E-mails which consist of offensive, anti-social elements
through some special keywords i.e. managed by administrator and block them.
Detection of suspicious user: - It helps in identifying the suspicious user who sends
suspicious mail that contains harmful data like spam, virus or executable file.
2
Security: -It provides security to the organisation that adapts it. Members of the
organisation can securely communicate with each other and can send secure data (that
should not share to the outside world) to the other members of the organisation.
User friendly: -It provides user friendly environment. Members of organisation can
easily use it without knowing background details of it.
Maintains redundancy: -It maintains redundancy in the database and provides a unique
user id to the user.
Cost Effective: -It is cost effective because organisation do not have to pay for
interacting the employees. And user can mail any number of mails.
3
4
Chapter 2
INTRODUCTION
Electronic mail (also known as email or e-mail) is one of the most commonly used services
on the Internet, allowing people to send messages to one or more recipients. Email was
invented by Ray Tomlinson in 1972. Many people are now using various email services to
communicate with each other. But some emails have harmful content in it that can affect our
PC, Laptop,…etc. In this project, suspicious users who send harmful emails are identified by
determining the keywords used by him/her. The keywords such as bomb, RDX, are found in
the mails which are sent by the user. All these blocked mails are checked by the administrator
and identify the users who sent such mails. This is very useful in real-time scenario in which
you can resume the anti-social activities.
1) Login Module
2) Registration Module
3) Administration Module
4) Managing harmful keywords Module
5) User Module
6) Composing Mail Module
This module is used by administrator and users (who are authenticated) to login into the Java
Secure Mail. The login details of the specified person will be entered and hence can enter into
the Java Secure Mail. If a user is not authenticated then it notifies login details are not
correct.
5
2.1.2 Registration Module
This module is used by the unauthenticated users who are unregistered. The users must
register themselves by unique username such that they can login into the Java Secure Mail. If
a user of same username is already exists then it notifies user already exists. If password and
confirm password is not matched then it notifies password is not matched.
This module is used by the administrator to perform the functions like managing the
keywords, entering new keywords and to check out the block list of the discarded mails.
This module is used by the administrator to perform the functions like addition, deletion and
modification of the harmful keywords. The harmful keywords are sent to the database and
hence managed by the administrator. If keyword already exists then it tells to the
administrator.
This module is used by the users to do operations like composing mail, checking out the
mails in inbox and finally sending the mails to the authenticated users by attaching a message
or file.
This module is used by the users for composing mail. In this module, user specifies header
and body of the file and attaches a file. Header contains address of the recipient and subject
of mail. Body contains actual description of mail. We can attach any type of file in it. If a file
is .exe file then it will considers as harmful file. It notifies to the user that mail has sent or
not.
2.2 History
Email is much older than Arpanet or the Internet. It was never invented; it evolved from very
simple beginnings. Early email was just a small advance on what we know these days as a
6
file directory - it just put a message in another user's directory in a spot where they could see
it when they logged in. Simple as that. Just like leaving a note on someone's desk. Probably
the first email system of this type was MAILBOX, used at Massachusetts Institute of
Technology from 1965. Another early program to send messages on the same computer was
called SNDMSG. Ray Tomlinson is credited with inventing email in 1972. Like many of the
Internet inventors, Tomlinson worked for Bolt Beranek and Newman as an ARPANET
contractor. He picked the @ symbol from the computer keyboard to denote sending messages
from one computer to another. So then, for anyone using Internet standards, it was simply a
matter of nominating name-of-the-user@name-of-the-computer. Internet pioneer Jon Postel,
who we will hear more of later, was one of the first users of the new system, and is credited
with describing it as a "nice hack". It certainly was, and it has lasted to this day.
By 1974 there were hundreds of military users of email because ARPANET eventually
encouraged it. Email became the savior of Arpanet, and caused a radical shift in Arpa's
purpose. Things developed rapidly from there. Larry Roberts invented some email folders for
his boss so he could sort his mail, a big advance. In 1975 John Vital developed some software
to organize email. By 1976 email had really taken off, and commercial packages began to
appear. Within a couple of years, 75% of all ARPANET traffic was email.
Email took us from Arpanet to the Internet. Here was something that ordinary people all over
the world wanted to use.
One of the first new developments when personal computers came on the scene was "offline
readers". Offline readers allowed email users to store their email on their own personal
computers, and then read it and prepare replies without actually being connected to the
network - sort of like Microsoft Outlook can do today. The first important email standard was
called SMTP, or simple message transfer protocol. SMTP was very simple and is still in use -
however, as we will hear later in this series, SMTP was a fairly naïve protocol, and made no
attempt to find out whether the person claiming to send a message was the person they
purported to be. Forgery was (and still is) very easy in email addresses. These basic flaws in
the protocol were later to be exploited by viruses and worms, and by security frauds and
spammers forging identities. Some of these problems are still being addressed in 2004. But as
it developed email started to take on some pretty neat features. One of the first good
commercial systems was Eudora, developed by Steve Dorner in 1988. Not long after Pegasus
mail appeared.
7
When Internet standards for email began to mature the POP (or Post Office Protocol) servers
began to appear as a standard - before that each server was a little different. POP was an
important standard to allow users to develop mail systems that would work with each other.
These were the days of per-minute charges for email for individual dialup users. For most
people on the Internet in those days email and email discussion groups were the main uses.
These were many hundreds of these on a wide variety of topics, and as a body of newsgroups
they became known as USENET.
Despite what the World Wide Web offers, email remains the most important application of
the Internet and the most widely used facility it has. Now more than 600 million people
internationally use email. With the World Wide Web, email started to be made available with
friendly web interfaces by providers such as Yahoo and Hotmail. Usually this was without
charge. Now that email was affordable, everyone wanted at least one email address, and the
medium was adopted by not just millions, but hundreds of millions of people. Email remains
the No. 1 form of communication in North America and Europe, cited by 87% and 74%
respectively of those polled its use as a main communications channel in the Asia-Pacific
region is at just 58%, according to Epsilon’s “Global Consumer Email Study.”
8
9
Chapter 3
Problem Statement
A great deal of business communication and workflow is centered on email, but we question
whether email is the ultimate long term solution for communication and workflow processes.
While email is a good method for anyone in the world to contact
you, that's also email's biggest problem. Most communication, both business and personal,
does not come from just anyone; it comes from other members of your organization, partners,
or team. It comes from "important people".
10
Email is not real time
There is too much delay to have an active conversation, which is why more and more
people are turning to instant messaging solutions (which also have their own security
problems).
It lacks ubiquitous access
it is problematic for most users to access their email from all locations, such as at home
or while on the road. This is the primary reason why web-based email became popular.
If you consider email for managing workflow, it has a number of additional problems:
Email is adequate for communicating with the world-at-large, a general delivery mailbox, but
most business and organizational communications is oriented toward relatively small teams
of working relationships. Using email to drive internal business workflow is like running a
business based on receiving US postal mail as it arrives at the mailbox.
11
12
Chapter 4
SYSTEM STUDY
The system being developed is economic with respect to Organization's point of view. It is
cost effective in the sense that has eliminated the paper posting work completely. The system
is also time effective because the mailing system is very fast which sends Email quickly as
per the user or organization requirement. The Emailing through JSM (Java Secure Mail) is
secure, flexible and pretend to virus, spam or hacking attack by outside world. The system
also collects the information of employee of organization who registered on it.
1. Is there a new and better way to do the job that will benefit the user?
3. What is recommended?
Once the feasibility study is done and proposal is approved, we move to the requirement
analysis. A feasibility study is the test to proposal according to its viability impact on the
organization, ability to meet user needs, and effective use of the resources. The objective of
the feasibility is not to solve the problem but to acquire a sense of its viability scope.
13
There are three key consideration involve in the feasibility analysis. Once it has been
determined that a project is feasible, we can go ahead and prepare the project specification
which finalizes project requirements.
Generally, feasibility studies are undertaken within tight time constraints and normally
culminate in a written and oral feasibility report. The contents and recommendations of such
a study will be used as a sound basis for deciding whether to prove, postpone or cancel the
project. Thus, since the feasibility study may lead to the commitment of large resources, it
becomes necessary that it should be conducted competently and that no fundamental errors of
judgment are made. The most successful system projects are not necessarily the biggest or
most visible business but rather those that truly meet user expectations. More projects fail
because of inflated expectations than for any other reason.
1. Economic
2. Technical
3. Behavioural.
Let's briefly review each consideration and how it relates to the system efforts.
Depending on the results of the initial investigations, the survey is expanded to a more
detailed feasibility study. A feasibility study is a test of a system proposal according to its
workability, impact on the organization, ability to meet user needs, and effective use of
resources.
1. What are the user's demonstrable needs and how does a candidate system meet them?
2. What resources are available for given candidate systems? Is the problem worth solving?
3. What are the likely impacts of the candidate system on the organization? How well does it
fit within the organization's master MIS plan?
Each of these questions must be answered carefully. They revolve around investigation and
evaluation of the problem, identification and description of candidate systems, specification
14
of performance and the cost of each system, and final selection of the best system. The
objective of a feasibility study is not to solve the problem but to acquire a sense of its scope.
During the study, the problem definition is crystallized and aspects of the problem to be
included in the system are determined.
Consequently, costs and benefits are estimated with greater accuracy at this stage.
The result of the feasibility study is a formal proposal. This is simply a report-a formal
document detailing the nature and scope of the proposed solution. The proposal summarizes
what is known and what is going to be done.
1. Statement of the problem - a carefully worded statement of the problem that led to
analysis.
3. Details of findings - an outline of the methods and procedures under taken by the existing
system, followed by coverage of the objectives and procedures of the candidate system.
Included are also discussions of output reports, file structures, and costs and benefits of the
candidate system.
After the proposal is reviewed by management, it becomes a formal agreement that paves the
way for actual design and implementation. This is a crucial decision point in the life cycle.
Many projects die here, whereas the more promising ones continue through implementation.
Changes in the proposal are made in writing, depending on the complexity, size and cost of
the project. It is simply common sense to verify changes before committing the project to
design.
15
4.4 Steps in feasibility analysis
A system that can be developed technically and that will be used if installed must still be
profitable for the organization. The various financial and economic issues were raised during
the preliminary investigation. These issues were not of our concern in major and were studied
by the management. Since the system was developed for internal use of the organization. It
was ensured that after this system has been developed, it would save considerable time and
efforts of the concerned department.
The economic feasibility should demonstrate the net benefit of the proposed application in
light of the benefits and costs to the client. The large department have large amount of data,
information. Economic feasibility is send to different clients for approval and
acknowledgement before moving to next stage of system development process.
16
The following Economic Feasibility elements are expressed quantitatively in the analytical
worksheets and summarized in the business case.
The alternative dismissal/selection process depends on other things, such as, how well an
alternative meets the project purpose and need, and the totality of environmental impacts.
What if an alternative that cost 4 or 5 times more than other alternatives but in turn had 4 to 5
times less environmental impacts? Depending on the type of resources and impacts, you
might not be able to rule that alternative out on the basis of dollar cost alone.
Conversely, an alternative that was much cheaper than others but with unacceptable impacts
might be considered unacceptable depending on the resources, impacts and others values the
alternative brings with it.
The feasibility study is one of the most misunderstood aspects of developing a location-based
leisure facility. Yet, it is perhaps the most important step, as mistakes at this early stage can
permanently handicap the project’s performance, perhaps fatally. A good feasibility study is
more than just a set of financial projections. Done properly, it becomes the market-driven
strategic plan that is the road map for all subsequent decisions. As much as answering the
question “Is a project feasible?” a good study also addresses the question of what is most
feasible and what should all its attributes be to assure maximum success.
17
4.5.2 Technical Feasibility
This is concerned with specifying equipment and software that will successfully satisfy the
user requirement. The technical needs of the system may vary considerably, but might
include:
It is mainly related to human organizational and political aspects. The points to be considered
are:
Generally project will not be rejected simply because of operational infeasibility but such
considerations are likely to critically affect the nature and scope of the eventual
recommendations.
The system working is quite easy to use and learn due to its simple but attractive interface.
User requires no special training for operating the system. They can easily work and operate
this system.
18
4.5.4 Social Feasibility
4.6.1 Java
Initially the language was called as “oak” but it was renamed as “java” in 1995.The primary
motivation of this language was the need for a platform-independent (i.e. architecture neutral)
language that could be used to create software to be embedded in various consumer electronic
devices.
19
4.6.1.1 Importance of java to the internet
Java has had a profound effect on the Internet. This is because; java expands the Universe of
objects that can move about freely in Cyberspace. In a network, two categories of objects are
transmitted between the server and the personal computer. They are passive information and
Dynamic active programs. in the areas of Security and probability. But Java addresses these
concerns and by doing so, has opened the door to an exciting new form of program called the
Applet.
Java architecture provides a portable, robust, high performing environment for development.
Java provides portability by compiling the byte codes for the Java Virtual Machine, which is
then interpreted on each platform by the run-time environment. Java is a dynamic system,
able to load code when needed from a machine in the same room or across the planet.
When you compile the code, the Java compiler creates machine code (called byte code) for a
hypothetical machine called Java Virtual Machine (JVM). The JVM is supposed executed the
byte code. The JVM is created for the overcoming the issue of probability. The code is
written and compiled for one machine and interpreted on all machines .This machine is called
Java Virtual Machine.
20
Java
Pc Java Byte interpreter
compiler code
Macintosh Java
compiler interpreterm
Platform
Source independ acintosh
code ent
SPARC Java
Compiler interpreter(
SPARC)
During run-time the Java interpreter tricks the byte code file into thinking that it is running on
a Java Virtual Machine. In reality this could be an Intel Pentium windows 95 or sun
SPARCstation running Solaris or Apple Macintosh running system and all could receive code
from any computer through internet and run the Applets.
I. Simple
Java was designed to be easy for the Professional programmer to learn and to use effectively.
If you are an experienced C++ Programmer, Learning Java will oriented features of C++.
Most of the confusing concepts from C++ are either left out of Java or implemented in a
cleaner, more approachable manner. In Java there are a small number of clearly defined ways
to accomplish a given task.
III. Robust
The multi-platform environment of the web places extraordinary demands on a program,
because the program must execute reliably in a variety of systems. The ability to create robust
21
programs was given a high priority in the design of Java. Java is strictly typed language; it
checks your code at compile time and runtime.
Java virtually eliminates the problems of memory management and deal location, which is
completely automatic. In a well-written Java program, all run-time errors can and should be
managed by your program.
4.6.2 JSP
The first Java Server Pages specification was released in 1999. Originally JSP was modelled
after other server-side template technologies to provide a simple method of embedding
dynamic code with static mark-up. When a request is made for the content of a JSP, a
container interprets the JSP, executes any embedded code, and sends the results in a response.
At the time this type of functionality was nothing terribly new, but it was and still is a helpful
enhancement to Servlets.
JSP has been revised several times since the original release, each added functionality, and is
currently in version 2.0. The JSP specifications are developed alongside the Servlet
specifications and can be found on Sun Microsystems’
Java Server Pages product information page,http://java.sun.com/products/jsp. The
functionality defined by the JSP 2.0 specifications can be broken down as follows:
JSP
The JSP specifications define the basic syntax and semantics of a Java Server Page. A basic
Java Server Page consists of plain text and markup and can optionally take advantage of
embedded scripts and other functionality for creating dynamic content.
JavaBeans
JavaBeans are not defined by the JSP specifications, but JSP does provide support for easily
using and manipulating them. Often objects used on the server-side of a Web Application are
in the form of what is commonly called a JavaBean.
Custom Tags and JSP Fragments
JSP provides a mechanism for linking what would normally be static markup to custom Java
code. This mechanism is arguably one of the strong points of JSP and can be used in place of
or to complement embedded scripts of Java code.
Expression Language
22
JSP includes a mechanism for defining dynamic attributes for custom tags. Any scripting
language can be used for this purpose; usually Java is implemented, but the JSP specification
defines a custom expression language designed specifically for the task. Often the JSP EL is
a much simpler and more flexible solution, especially when combined with JSP design
patterns that do not use embedded scripts.
Discussing the basics of JSP is the focus of this chapter. JavaBeans, Custom Tags, and the
JSP Expression Language are all fully discussed in later chapters after a proper foundation of
JSP is established.
23
4.6.3 JDBC
4.6.3.1 What is JDBC?
One can write a single program using the JDBC API, and the JDBC is a Java API for
executing SQL, Statements(As a point of interest JDBC is trademarked name and is not an
acronym; nevertheless, JDBC is often thought of as standing for Java Database Connectivity.
It consists of a set of classes and interfaces written in the Java Programming language. JDBC
provides a standard API for tool/database developers and makes it possible to write database
applications using a pure Java API.
Using JDBC, it is easy to send SQL statements to virtually program will be able to send SQL
.statements to the appropriate database. The Combination of Java and JDBC lets a
programmer writes it once and run it anywhere.
24
I. Type 1-JDBC-ODBC Bridge driver
II. Type 2-Native-API Party Java driver
III. Type 3-Net Protocol All Java Driver
IV. Type 4 Native Protocol All Java Driver
25
A relation R is said to be in second normal form if and only if it is in first normal form and
every non-key attribute is fully dependent on the primary key.
Third Normal Form
A relation R is transitively depends on the primary key. said to be in third normal form if and
only if it is in second normal form and every non key attribute is non-transitively depend on
the primary key.
4.6.5 HTML
Hypertext Mark-up Language (HTML), the languages of the worldwide web (WWW), allows
users to produces web pages that included text, graphics and pointer to other web pages
(Hyperlinks).
HTML is not a programming language but it is an application of ISO Standard 8879, SGML
(Standard Generalized Mark-up Language), but Specialized to hypertext and adapted to the
Web. The idea behind hypertext is one point to another point. We can navigate through the
information based on out interest and preference. A mark-up language is simply a series of
items enclosed within the elements should be displayed.
Hyperlinks are underlined or emphasized works that load to other documents or some
portions of the same document.
HTML can be used to display any type of document on the host computer, which can be
geographically at a different location. It is a versatile language and can be used on any
platform or desktop
HTML provides tags (special codes) to make the document look attractive.
HTML provides are not case-sensitive. Using graphics, fonts, different sizes, color, etc can
enhance the presentation of the document. Anything that is not a tag is part of the document
itself.
4.6.5.1 Advantages
A HTML document is small and hence easy to send over the net.It is small because it
does not include formatted information.
HTML is platform independent
HTML tags are not case-sensitive.
4.6.5.2 Basic HTML Tags
<!-- --> Specific Comments.
26
<HTML>…..</HTML> Start tag
<Title>……..</Title> Creates title of the page
<A>………..</A> Creates Hypertext links.
<B>………...</B> Creates hypertext links.
<Big>………</Big> Formats text in large-font
<Body>…….</Body> Contains all tags and text in the Html-document
<Center>……</Center> Creates Text
<DD>……….</DD> Definition of a term.
<TABLE>…..</TABLE> Creates table
<Td>…………</Td> Indicates table data in a table.
<Tr>………..</Tr> Designates a table row
<Th>……….</Th> Creates a heading in a table.
27
28
Chapter 5
SYSTEM ANALYSIS
Assuming that a new system is to be developed, the next phase is system analysis. Analysis
involved a detailed study of the current system, leading to specifications of a new system.
Analysis is a detailed study of various operations performed by a system and their
relationships within and outside the system. During analysis, data are collected on the
available files, decision points and transactions handled by the present system. Interviews,
on-site observation and questionnaire are the tools used for system analysis. Using the
following steps it becomes easy to draw the exact boundary of the new system under
consideration:
All procedures, requirements must be analysed and documented in the form of detailed data
flow diagrams (DFDs), data dictionary, logical data structures and miniature specifications.
System Analysis also includes sub-dividing of complex process involving the entire system,
identification of data store and manual processes.
Specification of what the new system is to accomplish based on the user requirements.
Functional hierarchy shows the functions to be performed by the new system and their
relationship with each other.
Function network which are similar to function hierarchy but they highlight those
functions which are common to more than one procedure.
List of attributes of the entities - these are the data items which need to be held about
each entity (record).
The selection process should be viewed as a project and a project team should be formed with
the help of management. The selection process consists of several steps, which are discussed
below:
29
5.1 Requirements analysis
The first step in selection understands the user's requirements within the framework of the
organization’s objectives and the environment in which the system is being installed.
System specifications must be clearly defined. These specifications must reflect the actual
applications to be handled by the system and include system objectives, flowcharts, input-
output requirements, file structure and cost.
After the requirement analysis and system specifications have been defined, a request for
proposal is prepared and sent to selected vendors for bidding.
The evaluation phase ranks various vendor proposals and determines the one best suited to
the user's requirements. It looks into items such as price, availability and technical support.
System validation ensures that the vendor can, in fact, match his/her claims, especially
system performance.
30
31
Chapter 6
SYSTEM DESIGN
Based on the user requirements and the detailed analysis of a new system, the new system
must be designed. This is the phase of system designing. It is a most crucial phase in the
development of a system. Normally, the design proceeds in two stages:
Structure or Detailed design: In the detailed design stage, computer oriented work begins in
earnest. At this stage, the design of the system becomes more structured. Structure design is a
blue print of a computer system solution to a given problem having the same components and
inter-relationship among the same components as the original problem. Input, output and
processing specifications are drawn up in detail. In the design stage, the programming
language and the platform in which the new system will run are also decided.
Of course, is to deliver the requirements as specified in the feasibility report. In general, the
following design objectives should be kept in mind:
Practicality: The system must be stable and can be operated by the people with average
intellectual.
Cost: it is desirable to aim for a system with a minimum cost subject to the condition that
it must satisfy all the requirements.
32
Flexibility: The system should be modifiable depending on the changing needs of the
user. Such modifications should not entail extensive reconstructing or recreation of
software. It should also be portable to different computer systems.
Security: This is very important aspect of the design and should cover areas of hardware
reliability, fall back procedures, physical security of data and provision for detection of
fraud and abuse. System design involves first logical design and then physical
construction of the system. The logical design describes the structure and characteristics
of features, like the outputs, inputs, files, databases and procedures. The physical
construction, which follows the logical design, produces actual program software, files
and a working system.
Hardware: The existing hardware will obviously affect the system design.
Software: The available software (operating system, utilities, language etc.) in the market
will constrain the design.
Budget: The budget allocated for the project will affect the scope and depth of design.
Time-scale: The new system may be required by a particular time (e.g. the start of a
financial year). This may put a constraint on the designer to find the best design.
Interface with other systems: The new system may require some data from another
computerized system or may provide data to another system in which case the files must
be compatible in format and the system must operate with a certain processing cycle.
33
6.3 User Interface Design
Any project how so ever good it may be would become failure if the end user it is meant to
cater cannot use it. For the end user to reap full benefits of the project the project should have
a good interface. Interface is the way a project links with the end users; it accepts the inputs
from the user and gives output to the user. For a project to be successful it should have a
clean and understandable interface.
Below architecture diagram represents mainly flow of requests from users to database
through servers. In this scenario overall system is designed in three tires separately using
three layers called presentation layer, business logic layer and data link layer. This project
was developed using 3-tier architecture.
User
SERVER
Request Response
Data
Base
34
URL Pattern:
Presentation
Layer
Response sent URL Request
from the sent through the
servlet browser
SERVLETS
AT THE
SERVER
Reply from the SIDE Verifying or
database updating the
according to the database through a
statement statement
DATABASE
URL pattern represents how the requests are flowing through one layer to another layer and
how the responses are getting by other layers to presentation layer through server in
architecture diagram.
35
6.5 UML Diagrams
The Unified Modelling Language allows the software engineer to express an analysis model
using the modelling notation that is governed by a set of syntactic semantic and pragmatic
rules. A UML system is represented using five different views that describe the system from
distinctly different perspective. Each view is defined by a set of diagram, which is as follows.
In this the structural and behavioural as parts of the system are represented as they are to be
built.
In this the structural and behavioural aspects of the environment in which the system is to be
implemented are represented.
36
SYSTEM TESTING
10.1 Testing
During systems testing, the system is used experimentally to ensure that the software does not
fail. In other words, we can say that it will run according to its specifications and in the way
users expect. Special test data are input for processing, and the results examined. A limited
number of users may be allowed to use the system so that analyst can see whether they try to
use it in unforeseen ways. It is desirable to discover any surprises before the organization
implements the system and depends on it.
It should be clear in mind that the philosophy behind testing is to find errors. Test cases are
devised with this purpose in mind. A test case is a set of data that the system will process as
normal input. However, the data are created with the express intent of determining whether
the system will process them correctly. For example, test cases for inventory handling should
include situations in which this quantifies to be withdrawn from inventory exceed, equal and
are less than the actual quantities on hand. Each test case is designed with the intent of
finding errors in the way the system will process it. There are two general strategies for
testing software:
1. Testing- Error detection and error removal of newly developed program, so that it
produces specific output with correctness of live and artificial data.
Systems are not designed as entire systems nor are they tested as single systems. The analyst
must perform both unit and system testing.
1. Unit Testing
2. System Testing
In unit testing the analyst tests the programs making up a system. For this reason, unit testing
is sometimes called program testing. Unit testing gives stress on the modules independently
of one another, to find errors. This helps the tester in detecting errors in coding and logic that
are contained within that module alone. The errors resulting from the interaction between
modules are initially avoided. For example, a hotel information system consists of modules to
handle reservations; guest check-in and check-out; restaurant, room service and
miscellaneous charges; convention activities; and accounts receivable billing. For each, it
provides the ability to enter, modify or retrieve data and respond to different types of
inquiries or print reports. The test cases needed for unit testing should exercise each condition
and option.
Unit testing can be performed from the bottom-up, starting with smallest and lowest-level
modules and proceeding one at a time. For each module in bottom-up testing a short program
is used to execute the module and provides the needed data, so that the module is asked to
perform the way it will when embedded within the larger system.
Valid and invalid data are entered to generate possible error. For Example: - Numeric error or
Date error.
38
It focuses in any module but not integrated part. It does not consider any linking error.
39
6.6 Class Diagrams
6.6.1 Admin
Keywords
Manage Keywords
Add Keywords()
Display Keywords()
Update Keywords()
Admin
Keywords
Alert Mails
Informative
Block List
Enter keywords() Alert Mails
check mails() Informative Mails
check mails()
6.6.2 User
40
6.7 Sequence Diagram
6.7.1 Admin
Manage Keywords
6.7.2 USER
41
6.8 Object Diagram
6.8.1 Admin
6.8.2 User
42
43
Chapter 7
Graphical description of a system's data and how the processes transform the data is known
as Data Flow Diagram (or DFD).
Unlike detail flowcharts, DFD’s do not supply detailed descriptions of modules but
graphically describe a system's data and how the data interact with the system.
The following seven rules govern construction of data flow diagrams (DFD):
3. Decomposed data flows must be balanced (all data flows on the decomposed
diagram must reflect flows in the original diagram).
4. No two data flows, squares, or circles can have the same name.
6. Choose meaningful names for data flows, processes, and data stores. Use strong
verbs followed by nouns.
If too many events seem to be occurring at a given point, an analyst can decompose a data
conversion (circle). The new data conversions form a parent-child relationship with the
original data conversion: the child circle.
44
7.1 Context Level
1.0
Compose Check Email
Check data
User Email Admin
Response Scanning Suspicious
/Normal
45
7.2 Level 1 DFD
Sender
Compose Response
0.0
Compose
Mail
Check Suspicious/
Email Normal
Fetch Data
Admin Database
Information
Check
suspicious
mail Check
(.exe) file
1.0
1.1
Detect harmful
Detect
keywords
executable
File
Alert/Normal Alert/Normal
Email
Email
Receiver
46
47
Chapter 8
Additional tools
HTML Designing : Dream weaver Tool
Development Tool kit : NetBeans 6.9
50
51
Chapter 10
SYSTEM TESTING
10.1 Testing
During systems testing, the system is used experimentally to ensure that the software does not
fail. In other words, we can say that it will run according to its specifications and in the way
users expect. Special test data are input for processing, and the results examined. A limited
number of users may be allowed to use the system so that analyst can see whether they try to
use it in unforeseen ways. It is desirable to discover any surprises before the organization
implements the system and depends on it.
It should be clear in mind that the philosophy behind testing is to find errors. Test cases are
devised with this purpose in mind. A test case is a set of data that the system will process as
normal input. However, the data are created with the express intent of determining whether
the system will process them correctly. For example, test cases for inventory handling should
include situations in which this quantifies to be withdrawn from inventory exceed, equal and
are less than the actual quantities on hand. Each test case is designed with the intent of
finding errors in the way the system will process it. There are two general strategies for
testing software:
1. Testing- Error detection and error removal of newly developed program, so that it
produces specific output with correctness of live and artificial data.
52
2. Verification- It is also a kind of testing of system in simulated environment using
simulated data (alpha testing). It is done to detect and wait error regarding end user and
design specification we were specified in the earlier phase.
Systems are not designed as entire systems nor are they tested as single systems. The analyst
must perform both unit and system testing.
1. Unit Testing
2. System Testing
In unit testing the analyst tests the programs making up a system. For this reason, unit testing
is sometimes called program testing. Unit testing gives stress on the modules independently
of one another, to find errors. This helps the tester in detecting errors in coding and logic that
are contained within that module alone. The errors resulting from the interaction between
modules are initially avoided. For example, a hotel information system consists of modules to
handle reservations; guest check-in and check-out; restaurant, room service and
miscellaneous charges; convention activities; and accounts receivable billing. For each, it
provides the ability to enter, modify or retrieve data and respond to different types of
inquiries or print reports. The test cases needed for unit testing should exercise each condition
and option.
Unit testing can be performed from the bottom-up, starting with smallest and lowest-level
modules and proceeding one at a time. For each module in bottom-up testing a short program
is used to execute the module and provides the needed data, so that the module is asked to
perform the way it will when embedded within the larger system.
53
It is called program testing.
Valid and invalid data are entered to generate possible error. For Example: - Numeric error or
Date error.
It focuses in any module but not integrated part. It does not consider any linking error.
54
The result of the feasibility study is a formal proposal. This is simply a report-a formal
document detailing the nature and scope of the proposed solution. The proposal summarizes
what is known and what is going to be done.
1. Statement of the problem - a carefully worded statement of the problem that led to
analysis.
3. Details of findings - an outline of the methods and procedures under taken by the existing
system, followed by coverage of the objectives and procedures of the candidate system.
Included are also discussions of output reports, file structures, and costs and benefits of the
candidate system.
After the proposal is reviewed by management, it becomes a formal agreement that paves the
way for actual design and implementation. This is a crucial decision point in the life cycle.
Many projects die here, whereas the more promising ones continue through implementation.
Changes in the proposal are made in writing, depending on the complexity, size and cost of
the project. It is simply common sense to verify changes before committing the project to
design.
55
12. Define and identify characteristics of proposed system.
13. Determine and evaluate performance and cost effectiveness of each proposed system.
14. Weight system performance and cost data.
15. Select the best proposed system.
16. Prepare and report final project directive to management
A system that can be developed technically and that will be used if installed must still be
profitable for the organization. The various financial and economic issues were raised during
the preliminary investigation. These issues were not of our concern in major and were studied
by the management. Since the system was developed for internal use of the organization. It
was ensured that after this system has been developed, it would save considerable time and
efforts of the concerned department.
The economic feasibility should demonstrate the net benefit of the proposed application in
light of the benefits and costs to the client. The large department have large amount of data,
information. Economic feasibility is send to different clients for approval and
acknowledgement before moving to next stage of system development process.
The following Economic Feasibility elements are expressed quantitatively in the analytical
worksheets and summarized in the business case.
The alternative dismissal/selection process depends on other things, such as, how well an
alternative meets the project purpose and need, and the totality of environmental impacts.
What if an alternative that cost 4 or 5 times more than other alternatives but in turn had 4 to 5
times less environmental impacts? Depending on the type of resources and impacts, you
might not be able to rule that alternative out on the basis of dollar cost alone.
Conversely, an alternative that was much cheaper than others but with unacceptable impacts
might be considered unacceptable depending on the resources, impacts and others values the
alternative brings with it.
The feasibility study is one of the most misunderstood aspects of developing a location-based
leisure facility. Yet, it is perhaps the most important step, as mistakes at this early stage can
permanently handicap the project’s performance, perhaps fatally. A good feasibility study is
more than just a set of financial projections. Done properly, it becomes the market-driven
strategic plan that is the road map for all subsequent decisions. As much as answering the
question “Is a project feasible?” a good study also addresses the question of what is most
feasible and what should all its attributes be to assure maximum success.
This is concerned with specifying equipment and software that will successfully satisfy the
user requirement. The technical needs of the system may vary considerably, but might
include:
It is mainly related to human organizational and political aspects. The points to be considered
are:
Generally project will not be rejected simply because of operational infeasibility but such
considerations are likely to critically affect the nature and scope of the eventual
recommendations.
The system working is quite easy to use and learn due to its simple but attractive interface.
User requires no special training for operating the system. They can easily work and operate
this system.
58
4.6.6 Management Feasibility
4.6.1 Java
Initially the language was called as “oak” but it was renamed as “java” in 1995.The primary
motivation of this language was the need for a platform-independent (i.e. architecture neutral)
language that could be used to create software to be embedded in various consumer electronic
devices.
Java has had a profound effect on the Internet. This is because; java expands the Universe of
objects that can move about freely in Cyberspace. In a network, two categories of objects are
transmitted between the server and the personal computer. They are passive information and
Dynamic active programs. in the areas of Security and probability. But Java addresses these
concerns and by doing so, has opened the door to an exciting new form of program called the
Applet.
59
4.6.1.2 Java architecture
Java architecture provides a portable, robust, high performing environment for development.
Java provides portability by compiling the byte codes for the Java Virtual Machine, which is
then interpreted on each platform by the run-time environment. Java is a dynamic system,
able to load code when needed from a machine in the same room or across the planet.
When you compile the code, the Java compiler creates machine code (called byte code) for a
hypothetical machine called Java Virtual Machine (JVM). The JVM is supposed executed the
byte code. The JVM is created for the overcoming the issue of probability. The code is
written and compiled for one machine and interpreted on all machines .This machine is called
Java Virtual Machine.
60
It has four links:
1. Managed Keyword
2. Display Keyword
1 Admin Main Page
3. Alert List
(Table 1)
61
Unit Test Case for user
5. Compose Mail
6. Inbox
Client Main Page
7. Sent Mail
62
logout or go to client main page from it.
(Table 2)
The important and essential part of the system development phase, after designing and
developing the software is system testing. We cannot say that every program or system
design is perfect and because of lack of communication between the user and the designer,
some error is there in the software development. The number and nature of errors in a newly
designed system depend on some usual factors like communication between the user and the
designer; the programmer's ability to generate a code that reflects exactly the systems
specifications and the time frame for the design.
Theoretically, a newly designed system should have all the parts or sub-systems are in
working order, but in reality, each sub-system works independently. This is the time to gather
all the subsystem into one pool and test the whole system to determine whether it meets the
user requirements. This is the last change to detect and correct errors before the system is
installed for user acceptance testing. The purpose of system testing is to consider all the likely
variations to which it will be subjected and then push the system to its limits.
Testing is an important function to the success of the system. System testing makes a logical
assumption that if all the parts of the system are correct, the goal will be successfully
activated. Another reason for system testing is its utility as a user-oriented vehicle before
implementation.
63
Testing of software after development all the modules are attached to make complete
program.
1. Program testing
2. String testing
3. User acceptance testing
64
10.2.2 Top down Approach
This type of testing starts from upper level modules. Since the detailed activities usually
performed in the lower level routines are not provided stubs are written. A stub is a module
shell called by upper level module and that when reached properly will return a message to
the calling module indicating that proper interaction occurred. No attempt is made to verify
the correctness of the lower level module.
10.3 Validation
The system has been tested and implemented successfully and thus ensured that all the
requirements as listed in the software requirements specification are completely fulfilled. In
case of erroneous input corresponding error messages are displayed
65
66
Chapter 11
SCREEN SHOTS
11.1 Home Page
Fig 11.1
It is the homepage where number of users’ login by entering their Email ID and passwords.
New user has to select the signup option to create a user account and then he can login.
11.2 Admin’s Login Page
Fig. 11.2
68
11.3 Admin’s Main Page
Fig 11.3
Here is admin home page where he/she has the ability to manage keywords, encrypt
keywords. Admin has a feature of viewing the blocked mails
69
11.4 Adding a Keyword
Fig 11.4
Here admin adds numerous or harmful keywords by clicking the add button.
70
11.5 Displaying the Keyword
Fig 11.5
Here admin displays all the words which he/she had entered into the list
71
11.6 User’s Registration
Fig. 11.6
This is the User page where he/she enters his/her personal details and gets registered to Java
Secure Mail page
72
11.7 User’s Main Page
Fig 11.7
Here is User’s main page, it consists of compose mail, inbox and sent mail. Here user can
send mails, check the received mails and also able to see the sent mails
73
11.8 Composing a Mail by User
Fig 11.8
Here is the mail box where users can compose their mails.
74
11.9 Alert List of Blocked Mails in Admin Page
Fig 11.9
Here are the mails which had been got blocked in admin’s page due to hazardous information
in the mail
75
11.10 Message in Inbox of Other User
Fig 7.4.10
This screen gives the message in inbox of other user. Here user can read the received mails
and can download attached file.
76
77
Chapter 12
CONCLUSION, LIMITATION AND FUTURE SCOPE
12.1 Conclusion
Email has been an efficient and popular communication mechanism as the number of Internet
user's increase. In many security informatics applications it is important to detect deceptive
communication in email. In this application the mails are classified as suspicious or normal
using the keywords or .exe file. The mails containing these keywords and encrypted
keywords are classified as suspicious mails and they can be blocked and verified by the
administrator. The proposed work will be helpful for identifying the suspicious email and
also assist the investigators to get the information in time to take effective actions to reduce
the criminal activities.
12.2 Limitations
1. The software does not use any back-up files for recovery of data when crashes of software
occur.
2. Administrator has to add suspicious keywords. Admin has to search the harmful keyword
and add into the database for better security. It increases effort of the admin.
3. This software does not use any sorting technique used for faster retrieval of access.
4. It supports SQL searching technique given by MySql.
5. The present application when implemented on internet requires a large database as the
backend.
6. It gathers everything in one location which is really good but if it is not prearranged then
you will spoil everything.
7. This software is not uploaded to the web server and running on PC only.
78
This application which is a web based is of standalone application. This can be implemented
on internet by buying the network space and by creating a website. The present application
when implemented on internet requires a large database as the backend; this can be done by
using the MySql database as the backend. As we use encrypted keyword in this application
we can implement many encrypted algorithms like RSA, DES/3DES, BLOWFISH, AES,
IDEA and many more.
79
80
BIBLIOGRAPHY
WEB REFERENCES
http://google.com
http://www.tutorialspoint.com
BOOKS REFERENCES
The Complete Reference JAVA2 by Herbert Schildt Tata Mc Graw Hill India.
JAVA Server Programming Black book Kogent Solutions Inc.
Software Engineering by Pressman Tata Mc Graw Hill India.
Data Base Management System by Korth
81