Sei sulla pagina 1di 97

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

INTRODUCTION

DEPT.COMPUTER SCIENCE

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

1. INTRODUCTION
1.1 INTRODUCTION
The Project entitled Live Stock Management System deals with the automation of various
processes that are held within a college. This system helps us to make the work simpler. Live Stock
Management System software has the perspective of attaining attraction of those colleges which
dont have one good performing software for keeping their information secure and make
their management easier. This Live Stock Management System software provides one attractive
environment where you can manipulate and handle data and information about Staff, Lab
apparatus of each Labs, Books in the library, request for new stocks, etc. So we can say the Core
purpose of designing Live Stock Management System is to manage the task related to the stock
details of labs and library to reduce the time for managing it.
This system includes adding of staffs, store details, stock updates, item details,
notifications, sending/getting requests and handling those request, etc.

1.2 PROJECT CATEGORY


Web-Based Software
The wide spread evolution of global infrastructure, especially based on Internet and the
immense popularity of web technology among people have added to the Number of consumers as
well as disseminators of information. Until date, plenty of Search engine are being developed,
however researcher are trying to build more efficient search engines. Web site developers and web
mining researchers are trying to address the problem of average users in what they are looking for
from the vast and ever-increasing global information network.
Due to the technology nowadays, the web based is important for those involved in
information and communication technology

DEPT.COMPUTER SCIENCE

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

DEVELOPING TOOLS

DEPT.COMPUTER SCIENCE

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

2. DEVELOPING TOOLS
2.1 FRONT END
JAVA:
Initially the language was called as oak but it was renamed as java in 1995.The primary
motivation of this language was the need for a platform-independent (i.e. architecture neutral)
language that could be used to create software to be embedded in various consumer electronic
devices.
Java is a programmers language
Java is cohesive and consistent
Except for those constraint imposed by the Internet environment. Java gives the
programmer, full control

Importance of Java to the Internet


Java has had a profound effect on the Internet. This is because; java expands the Universe
of objects that can move about freely in Cyberspace. In a network, two categories of objects are
transmitted between the server and the personal computer. They are passive information and
Dynamic active programs in the areas of security and probability. But Java addresses these
concerns and by doing so, has opened the door to an exciting new form of program called the
Applet.
Java Architecture
Java architecture provides a portable, robust, high performing environment for
development. Java provides portability by compiling the byte codes for the Java Virtual Machine,
which is then interpreted on each platform by the run-time environment. Java is a dynamic system,
able to load code when needed from a machine in the same room or across the planet.
Compilation of code
When you compile the code, the Java compiler creates machine code (called byte code) for
a hypothetical machine called Java Virtual Machine (JVM). The JVM is supposed to execute the
DEPT.COMPUTER SCIENCE

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

byte code. The JVM is created for the overcoming the issue of probability. The code is written and
compiled for one machine and interpreted on all machines .This machine is called Java Virtual
Machine.
Compiling and interpreting java source code.
During run-time the Java interpreter tricks the byte code file into thinking that it is running
on a Java Virtual Machine. In reality this could be an Intel Pentium windows 95 or sun
SPARCstation running Solaris or Apple Macintosh running system and all could receive code from
any computer through internet and run the Applets.

Features of java
1) Compiled and Interpreter:- has both Compiled and Interpreter Feature Program of java is First
Compiled and Then it is must to Interpret it .First of all The Program of java is Compiled then after
Compilation it creates Bytes Codes rather than Machine Language Then After Bytes Codes are
Converted into the Machine Language is Converted into the Machine Language with the help of
the Interpreter So For Executing the java Program First of all it is necessary to Compile it then it
must be Interpreter
2) Platform Independent:- Java Language is Platform Independent means program of java is
Easily transferable because after Compilation of java program bytes code will be created then we
have to just transfer the Code of Byte Code to another computer .This is not necessary for
computer s having same Operating System in which the code of the java is Created and Executed
DEPT.COMPUTER SCIENCE

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

After Compilation of the Java Program We easily Convert the Program of the java top the another
Computer for Execution
3) Object-Oriented:- We Know that is purely OOP Language that is all the Code of the java
Language is Written into the classes and Objects So For This feature java is Most Popular
Language because it also Supports Code Reusability, Maintainability etc.
4) Robust and Secure:- The Code of java is Robust and Meansot first checks the reliability of the
code before Execution When We trying to Convert the Higher data type into the Lower Then it
Checks the Demotion of the Code the It Will Warns a User to Not to do this So it is called as
Robust
5) Secure : When We convert the Code from One Machine to Another the First Check the Code
either it is Effected by the Virus or not or it Checks the Safety of the Code if code contains the
Virus then it will never Executed that code on to the Machine
6) Distributed:- Java is Distributed Language Means because the program of java is compiled
onto one machine can be easily transferred to machine and Executes them on another machine
because facility of Bytes Codes So java is Specially designed For Internet Users which uses the
Remote Computers For Executing their Programs on local machine after transferring the Programs
from Remote Computers or either from the internet.
7) Simple Small and Familiar:- is a simple Language Because it contains many features of other
Languages like c and C++ and Java Removes Complexity because it doesnt use pointers, Storage
Classes and Go to Statements and java Doesnt support Multiple Inheritance
8) Multithreaded and Interactive:- Java uses Multithreaded Techniques For Execution Means
Like in other in Structure Languages Code is Divided into the Small Parts Like These Code of java
is divided into the Smaller parts those are Executed by java in Sequence and Timing Manner this
is Called as Multithreaded In this Program of java is divided into the Small parts those are Executed
by Compiler of java itself Java is Called as Interactive because Code of java Supports Also CUI
and Also GUI Programs

DEPT.COMPUTER SCIENCE

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

9) Dynamic and Extensible Code:- Java has Dynamic and Extensible Code Means With the Help
of OOPS java Provides Inheritance and With the Help of Inheritance we Reuse the Code that is
Pre-defined and Also uses all the built in Functions of java and Classes
10) Distributed:- Java is a distributed language which means that the program can be design to
run on computer networks. Java provides an extensive library of classes for communicating, using
TCP/IP protocols such as HTTP and FTP. This makes creating network connections much easier
than in C/C++. You can read and write objects on the remote sites via URL with the same ease
that programmers are used to when read and write data from and to a file. This helps the
programmers at remote locations to work together on the same project.
11) Secure: Java was designed with security in mind. As Java is intended to be used in
networked/distributor environments so it implements several security mechanisms to protect you
against malicious code that might try to invade your file system.
For example: The absence of pointers in Java makes it impossible for applications to gain
access to memory locations without proper authorization as memory allocation and referencing
model is completely opaque to the programmer and controlled entirely by the underlying run-time
platform .
12) Architectural Neutral: One of the key feature of Java that makes it different from other
programming languages is architectural neutral (or platform independent). This means that the
programs written on one platform can run on any other platform without having to rewrite or
recompile them. In other words, it follows 'Write-once-run-anywhere' approach. Java programs
are compiled into byte-code format which does not depend on any machine architecture but can
be easily translated into a specific machine by a Java Virtual Machine (JVM) for that machine.
This is a significant advantage when developing applets or applications that are downloaded from
the Internet and are needed to run on different systems.
13) Portable: The portability actually comes from architecture-neutrality. In C/C++, source code
may run slightly differently on different hardware platforms because of how these platforms
implement arithmetic operations. In Java, it has been simplified.

DEPT.COMPUTER SCIENCE

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Unlike C/C++, in Java the size of the primitive data types are machine independent. For example,
an int in Java is always a 32-bit integer, and float is always a 32-bit IEEE 754 floating point
number. These consistencies make Java programs portable among different platforms such as
Windows, UNIX and Mac.
14) Interpreted: Unlike most of the programming languages which are either complied or
interpreted, Java is both complied and interpreted The Java compiler translates a java source file
to byte codes and the Java interpreter executes the translated byte codes directly on the system that
implements the Java Virtual Machine. These two steps of compilation and interpretation allow
extensive code checking and improved security.
15) High performance: Java programs are compiled to portable intermediate form known as byte
codes, rather than to native machine level instructions and JVM executes Java byte code on any
machine on which it is installed. This architecture means that Java programs are faster than
program or scripts written in purely interpreted languages but slower than C and C++ programs
that compiled to native machine languages.
Although in the early releases of Java, the interpretation of by byte code resulted in slow
performance but the advance version of JVM uses the adaptive and just in time (JIT) compilation
technique that improves performance by converting Java byte codes to native machine instructions
on the fly.

Java Server Pages (JSP):


Java Server Pages (JSP) is a technology that helps software developers create dynamically
generated web pages based on HTML, XML, or other document types. Released in 1999 by Sun
Microsystems, JSP is similar to PHP and ASP, but it uses the Java programming language. To
deploy and run Java Server Pages, a compatible web server with a servlet container, such
as Apache Tomcat or Jetty, is required.
Architecturally, JSP may be viewed as a high-level abstraction of Java servlets. JSPs are
translated into servlets at runtime, each JSP servlet is cached and re-used until the original JSP is
modified. JSP can be used independently or as the view component of a server-side modelview

DEPT.COMPUTER SCIENCE

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

controller design, normally with JavaBeans as the model and Java servlets (or a framework such
as Apache Struts) as the controller. This is a type of Model 2 architecture.
JSP allows Java code and certain pre-defined actions to be interleaved with static web
markup content, such as HTML, with the resulting page being compiled and executed on the server
to deliver a document. The compiled pages, as well as any dependent Java libraries, contain Java
bytecode rather than machine code. Like any other Java program, they must be executed within
a Java virtual machine (JVM) that interacts with the server's host operating system to provide an
abstract, platform-neutral environment.
JSPs are usually used to deliver HTML and XML documents, but through the use of
OutputStream, they can deliver other types of data as well. The Web container creates JSP implicit
objects like request, response, session, application, config, page, pageContext, out and exception.
JSP Engine creates these objects during translation phase.
JSP pages use several delimiters for scripting functions. The most basic is <% ... %>,
which encloses a JSP scriptlet. A scriptlet is a fragment of Java code that is run when the user
requests the page. Other common delimiters include <%= ... %> for expressions, where the
scriptlet and delimiters are replaced with the result of evaluating the expression, and directives,
denoted with <%@ ... %>. Java code is not required to be complete or self-contained within a
single scriptlet block. It can straddle markup content, provided that the page as a whole is
syntactically correct. For example, any Java if/for/while blocks opened in one scriptlet must be
correctly closed in a later scriptlet for the page to successfully compile.
Content which falls inside a split block of Java code (spanning multiple scriptlets) is subject
to that code. Content inside an if block will only appear in the output when the if condition
evaluates to true. Likewise, content inside a loop construct may appear multiple times in the output,
depending upon how many times the loop body runs.

2.2 BACK END


MySQL:
MySQL, the most popular Open Source SQL database management system, is developed,
distributed, and supported by Oracle Corporation.

DEPT.COMPUTER SCIENCE

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

MySQL is a database management system.


A database is a structured collection of data. It may be anything from a simple shopping

list to a picture gallery or the vast amounts of information in a corporate network. To add, access,
and process data stored in a computer database, you need a database management system such as
MySQL Server. Since computers are very good at handling large amounts of data, database
management systems play a central role in computing, as standalone utilities, or as parts of other
applications.

MySQL databases are relational.


A relational database stores data in separate tables rather than putting all the data in one

big storeroom. The database structures are organized into physical files optimized for speed. The
logical model, with objects such as databases, tables, views, rows, and columns, offers a flexible
programming environment. You set up rules governing the relationships between different data
fields, such as one-to-one, one-to-many, unique, required or optional, and pointers between
different tables. The database enforces these rules, so that with a well-designed database, your
application never sees inconsistent, duplicate, orphan, out-of-date, or missing data.
The SQL part of MySQL stands for Structured Query Language. SQL is the most
common standardized language used to access databases. Depending on your programming
environment, you might enter SQL directly (for example, to generate reports), embed SQL
statements into code written in another language, or use a language-specific API that hides the
SQL syntax. SQL is defined by the ANSI/ISO SQL Standard. The SQL standard has been
evolving since 1986 and several versions exist

MySQL software is Open Source.

Open Source means that it is possible for anyone to use and modify the software. Anybody
can download the MySQL software from the Internet and use it without paying anything. If you
wish, you may study the source code and change it to suit your needs. The MySQL software uses
the GPL (GNU General Public License), to define what you may and may not do with the software
in different situations.

DEPT.COMPUTER SCIENCE

10

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

The MySQL Database Server is very fast, reliable, scalable, and easy to use.

MySQL Server can run comfortably on a desktop or laptop, alongside your other
applications, web servers, and so on, requiring little or no attention. If you dedicate an entire
machine to MySQL, you can adjust the settings to take advantage of all the memory, CPU power,
and I/O capacity available. MySQL can also scale up to clusters of machines, network together.

SQLyog:
SQLyog provides you with powerful means to manage your MySQL databases.

Runs on all Windows version from Win XP to Win 8.x (desktop systems) as well as

"Windows Server" systems of same generations (Windows Server 2003 and higher).

MySQL 5.x compatible

Create/Drop/Alter Tables, Stored Procedures, Functions, Views, Triggers and Events.

HTTP and SSH Tunneling - smartly manage your MySQL server even if the MySQL port

is blocked or remote access to MySQL is disallowed!

Protect your data with SSL encryption.

Smart AutoComplete.

Formats SQL statements.

Proactive Query Profiler.

Favorite Manager to neatly organize your favorite SQL statements.

Very fast retrieval of data.

Advanced GUI Query Builder. Supports JOINs, aggregate as well as 'common' functions,

sorting (ORDER BY) and filtering (WHERE and HAVING) and ALIAS.

SQLyog Import External Data wizard - use the GUI or specify a query.

Schema and Data synchronization tools.

DEPT.COMPUTER SCIENCE

11

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Powerful compressed Scheduled Backup with email notification.

Schedule various jobs.

SQL Commends
SQL commands are instructions, coded into SQL statements, which are used to
communicate with the database to perform specific tasks, work, functions and queries with data.
SQL commands can be used not only for searching the database but also to perform various
other functions like, for example, you can create tables, add data to tables, or modify data, drop
the table, set permissions for users. SQL commands are grouped into four major categories
depending on their functionality:

Data Definition Language (DDL)


These SQL commands are used for creating, modifying, and dropping the structure of

database objects. The commands are CREATE, ALTER, DROP, RENAME, and
TRUNCATE.

Data Manipulation Language (DML)


These SQL commands are used for storing, retrieving, modifying, and deleting data.

These Data Manipulation Language commands are: SELECT, INSERT, UPDATE,


and DELETE.

Transaction Control Language (TCL)


These SQL commands are used for managing changes affecting the data. These

commands are COMMIT, ROLLBACK, and SAVEPOINT.

Data Control Language (DCL)


These SQL commands are used for providing security to database objects. These

commands are GRANT and REVOKE.

DEPT.COMPUTER SCIENCE

12

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Apache Tomcat:
Apache Tomcat is a web server that is an open source software implementation of the Java
Servlet and Java Server Pages technologies. The Java Servlet and Java Server Pages specifications
are developed under the Java Community Process. Apache Tomcat is developed in an open and
participatory environment. Apache Tomcat is intended to be a collaboration of the best-of-breed
developers from around the world. Apache Tomcat powers numerous large-scale, mission-critical
web applications across a diverse range of industries and organizations
Apache Tomcat is an open source software implementation of the Java Servlet and Java
Server Pages technologies. The Java Servlet and Java Server Pages specifications are developed
under the Java Community process. Apache Tomcat, Tomcat, Apache, the Apache feather, and the
Apache Tomcat project logo are trademarks of the Apache Software Foundation.

2.3 IDE
NetBeans IDE:
In computer programming, NetBeans is a multi-language software development
environment NetBeans is an open-source integrated development environment (IDE) for
developing with Java, PHP, C++, and other programming languages. NetBeans is also referred to
as a platform of modular components used for developing Java desktop applications. NetBeans is
coded in Java and runs on most operating systems with a Java Virtual Machine (JVM), including
Solaris, Mac OS, and Linux.
NetBeans manages the following platform features and components:

User settings

Windows (placement, appearance, etc.)

NetBeans Visual Library

Storage

Integrated development tools

Framework wizard

DEPT.COMPUTER SCIENCE

13

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

NetBeans uses components, also known as modules, to enable software development.


NetBeans dynamically installs modules and allows users to download updated features and
digitally authenticated upgrades. NetBeans IDE modules include NetBeans Profiler, a Graphical
User Interface (GUI) design tool, and NetBeans JavaScript Editor. NetBeans framework
reusability simplifies Java Swing desktop application development as well as Java web application
development, which provides platform extension capabilities to third-party developers.

DEPT.COMPUTER SCIENCE

14

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

OPERATING SYSTEM
Windows 7
Windows is an operating system has evolved from a basic Graphical User Interface (GUI)
like Windows 3.1 to an advanced graphical user interface (GUI) like Windows NT. Both Windows
7 provide a common goal-ease of use and manageability by users. While Windows 7 is focused on
making computing easier for anyone using a wide range personal and business applications on the
desktop and portable computers.
Window 7 provides a good user friendlier environment to work with GUI. It also includes
improved network, application and web services. It provides increased reliability and scalability,
lowers your coast of computing with powerful, flexible management services, and provides the
best foundation for running business applications. It provides network data security by protecting
data on the wire or at the network interface.
Window 7 has emerged as a powerful desktop operating system for catering to complex
business needs. Application programmers for developing scientific and financial applications also
use it. The OS provides a high level reliability, protection and security.

DEPT.COMPUTER SCIENCE

15

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

SYSTEM ANALYSIS

DEPT.COMPUTER SCIENCE

16

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

3. SYSTEM ANALYSIS
3.1 INTRODUCTION
The system analysis involves detailed study of the system, which enables to know about
the functions and operations performed within the system and also their relationship of the outside
the system. It mainly emphasize on the drawbacks of the existing system and the need of the
proposed system. It is the process of gathering and interpreting facts, diagnosing problem and
using the information to recommend improvements on the system. System analysis is a solving
activity that requires intensive communication between the system users and system developers.
It also involves studying the way an organization currently retrieves the process with a view make
it work together. Thus, system analysis is the process of investing a system, identifying problem,
and using the information to recommend improvement to the system.
Once the developers have determined the required software, it is time to analysis the type
of software that could answer the problem encountered system analysis will take a look at possible
software. The goal of the system analysis is to know the properties and function of software that
would answer the concern solicited from intended user.
System analysis would lead in determining the requirements needed in software. These
requirements in software should be implemented otherwise the software may not answer the
concern or may lack in its usage. The stage will somehow determine how the software should
function.
It is study of the system and it is specify its requirements by building a working model of
it. The model is a common language: it is readily understudy by the users who are providing
information about the system. Using working models, users and analyst work together to reach an
identical understanding of the requirements. Once the model is agreed, the system is implemented
by building a real world version of the model.
The study of an activity or procedure to determine the end and the most efficient method
of obtaining this end.

DEPT.COMPUTER SCIENCE

17

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

3.2 EXISTING SYSTEM


In the library and in the labs of colleges are kept the details of books, apparatus and lab
items as manual records. So it is very difficult to maintain the data and information, a number of
registers are needed for it and there is a chance of loss of data. At the same time it does not provide
security of data. If we want to get the details of a particular book or lab items we have to search in
the entire records. Stock details of books/lab items, stock updates, category details, item details,
etc. are stored separately in different registers, so if a person wants to know the details, he has to
refer a number of registers sometimes there is a chance of data inconsistency, and data redundancy.
Computerization reduces the communication gap because anything is programmed as per schedule
and omission of information is not possible at all.

3.2.1 DISADVANTAGES OF EXISTING SYSTEM

Time consuming
Presently the details of books, lab apparatus and lab items are stored in different

registers. If we want to add new stocks or to retrieve the details of current stocks and details
of items, this will be more time consuming.

Redundancy
Details or data of books or lab apparatus are filed and kept in different registers. There

are chances the same book or lab apparatus can be repeated in different files. Duplicate
copy of the same book or lab apparatus is thus created. Hence data redundancy occurs.

Insecure data
Data kept in files and records can be deleted by any one staff in the Colleges. Hence

there is no security of data storing

DEPT.COMPUTER SCIENCE

18

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Inconsistent data
Redundancy of data always causes data inconsistency. When duplication occurs the

entered data become inconsistent. The data might be either damaged or cannot be useful
for any future use.

Maintenance
Maintenance of separate registers is very difficult since it consumes a lot of space.

The works carried out in the existing system, makes the activities slow, tedious and
inefficient. The overall study of the existing system leads to the development of new
system.

3.3 PROPOSED SYSTEM


The Proposed system aims in the automation all the drawbacks in the existing system
aiming at decreasing the manual errors on various records and creating an interactive interface
admins and stock managers.
Main aim in developing this system is to provide an easy way not only to automate all
functionalities of stock details library and labs in a college, but also to provide full functional
reports to top management of college with the finest details about any aspect of stocks and items
in the college.
This software has the perspective of attaining attraction of those colleges which dont
have one good performing software for keeping their information secure and make their
management easier. Live Stock Management System provides one attractive environment where
you can manipulate and handle data and information about staffs, books and lab items easily. So
we can say the Core purpose of designing Stock Management System is to manage the task
related to the college staffs, library details and lab apparatus and to reduce time to manage it.
The Proposed system mainly consist of 4 modules, say,

Administrator

Stock manager

Lab assistant

Librarian

DEPT.COMPUTER SCIENCE

19

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

3.3.1 ADVANATAGES OF PROPOSED SYSTEM

Data security
Since data is stored in computers and handled safely. Files may be lost or degrade

depending on time. But the data in the computer are not lost until an unexpected failure in
the operating system or hardware occurs. The data can be only handled by the admin of the
system. Any changes made to the data are done by the authorized users. Hence data is always
secure.

Speed and time efficiency


The major highlight of this system is its speed and time efficiency.

Reliability
The system is reliable to the users, as it has a backup for the future use and provides

security. The data is not damaged during a sudden power failure and has the ability to recover
from unexpected errors and faults

Maintainability
It is easy to maintain software than to keep the records in ledger books. Books might be

lost, or the page can be torn off accidently. But software is efficient to use on any computer
system without any wear and tear

3.3.2 FUNTIONS

Adding staffs.

Maintaining store details.

Sending/view of requests and handling it.

Sending/view of complaints.

View of stock updates, Etc.

DEPT.COMPUTER SCIENCE

20

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

3.4 USER REQUIREMENTS


After deciding to carry on with the development of the new system, the preliminary
investigation was conducted by examining the current system in detail by asking for a more
complete description of their needs, in an effort to understand the full details and implications of
the request. The purpose was to get an idea operations and interactions of the existing system, its
drawbacks and to identify further requirements.
The tools used for data collection were:

1. Review of written document:


All documentation on data carriers-forms, records, reports, manuals etc. was reviewed,
organized and evaluated. The registers of staff, books in library, category of books, stock updates,
stock requests, complaints, etc. are there. The method of recording each and every details to
registers were studied and noted.

2. On-site observation:
Here the operation and physical layout of the current system were studied by direct
observation of the operations/physical layout. This method is directed toward describing and
understanding events and behavior as they occur. Recording of information and other relevant
operations were observed and studied directly from some colleges and schools.

3. Interviews and questionnaires:


People usually provide the best source of information and hence personal interviews with
principals of some colleges and schools. Also selected staffs were conducted with the list of
questions well formulated before the interviews could focus on collecting pertinent answers.

DEPT.COMPUTER SCIENCE

21

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

SYSTEM STUDY

DEPT.COMPUTER SCIENCE

22

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

4. SYSTEM STUDY PHASE


4.1 INITIAL INVESTIGATION
Selection of an information system project proposal triggers an initial investigation of the
project proposal to assess its scope. The purpose of the initial investigation is two-fold. First it
answers the question, Is this project worth looking at? To answer this question, the initial
investigation must define the scope of the project and the perceived problems, opportunities and
directives that triggered the project. Second, assuming the project is worth looking at, the initial
investigation phase must also establish the project plan in terms of scope, development strategy,
schedule, resource requirements, and budget.

4.2 ABOUT THE SYSTEM


Live Stock Management System deals with the automation of various processes that are
held within a college. This system helps us to make the work simpler. Live Stock Management
System software has the perspective of attaining attraction of those colleges which dont have one
good performing software for keeping their information secure and make their management
easier. This Live Stock Management System software provides one attractive environment where
you can manipulate and handle data and information about Staff, Lab apparatus of each Labs,
Books in the library, request for new stocks, etc. So we can say the Core purpose of designing
Live Stock Management System is to manage the task related to the stock details of labs and
library to reduce the time for managing it.

4.3 MODULE DESCRIPTION


The Proposed system mainly consist of 4 modules,
1. ADMINISTRATOR
2. STOCK MANAGER
3. LAB ASSISTANT
4. LIBRARIAN

DEPT.COMPUTER SCIENCE

23

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Module Admistrator
This module will have the provision to do the following after the login process:

Staff Registration

Add/delete/update/view of store details

View requests and update status

View Stock updates

Category details

View item details

View/send notifications

Reports

Module Stock Manager


This module will have the provision to do the following after the login process:

Password change

View profile

View/update stock details

Material request and allocation

Request forwarding to admin

Send complaint

View reply

View Notification

Add items

Report

DEPT.COMPUTER SCIENCE

24

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Module Lab Assistant


This module will have the provision to do the following after the login process:

Change password

View profile

View stock

View reports

Send request and view status

View Notifications

Send complaint

View reply

Module Librarian
This module will have the provision to do the following after the login process:

Change password

View profile

View stock

View report

Book entry

Shelf creation

Book allocation

Send request and view status

View notification

Send complaint

View reply

DEPT.COMPUTER SCIENCE

25

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

4.4 BENEFITS OF COLLEGE STOCK MANAGEMENT SYSTEM


4.4.1 Benefits to Management:

Zero redundancy in managing the institutions records

Establishes effective communication between Administrator, staff, librarian and lab


assistant

Centrally stored information with zero redundancy

Best possible resource optimization

4.4.2 Benefits to Stock manager:

Computerized management of stock details

Easiness in material request and allocation

Easiest way to forward request to administrator for approval

Efficient and effective way complaint register and solving problem

4.4.3 Benefits to Lab Assistant:

Computerized stock details

Easiest way for sending request and view for notifications

Efficient and effective way for complaint register and solving problem

4.4.4 Benefits to Librarian:

Computerized stock details

Easiest way for sending request and view for notifications

Easiest way to keep details of shelf creation and book allocation

Efficient and effective way for complaint register and solving problem

DEPT.COMPUTER SCIENCE

26

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

4.5 FEASIBILITY STUDY


Feasibility study is a test of system proposal, according to its workability, impact on the
organization, ability to meet the user needs and effective use of resources. Thus when a new
application is proposed, it normally goes through a feasibility study before it goes for development.
The main objective of feasibility study is not solving the problem but not to acquire a sense of its
scope. During the study, the problem definition is crystallized and aspects of the problem to be
included in the system are determined. Every project is feasible, given unlimited resources and
infinite time. It is both necessary and prudent to evaluate the project at the earliest possible time.
So a detailed study is carried out to check the workability of the system.
The result of feasibility is a formal proposal. This is simply a document detailing the nature
and scope of the proposed solution. The proposal summarizes what is known and what is going to
be done.
The three important test for feasibility are

Operational feasibility

Technical feasibility

Economic feasibility

4.5.1 Operational Feasibility


Proposed projects are beneficial only if they can be turned into Management system that
will meet the operating requirements of the organization. This test of feasibility asks if the system
will work when it is developed and installed. Some of the important questions that are useful to
test the operational feasibility of a project can be given below:

Is there sufficient support for the project from the management? From users? If the
present system is well liked and used to extent that the persons will not able to see
reasons for a change, there may be resistance.

DEPT.COMPUTER SCIENCE

27

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Are current business methods acceptable to the users? If they are not? Users may
welcome a change that will bring about a more operational and useful system.

Are the users been involved in the planning and development of the project? If they are
involved at the earlier stage of the project developed, the changes of resistance can be
possibly reduced.

Issues that appear to be quite minor at the earlier stage can grow into major problems
after implementation. Therefore, it is always advisable to consider operational aspects
carefully.

4.5.2 Economical Feasibility


Economical analysis system is the most frequently used method for evaluating the
effectiveness of the candidate system. It is commonly known as cost/benefit and saving that is
expected from the candidate system and compares them with costs. It benefits outweigh costs, the
decision is made to design and implement the system. Otherwise, further justification or alteration
in the proposed system will have to be made if it is having a chance of being approved.

4.5.3 Technical Feasibility


This software users use ASP.net, SQL server, Windows XP or higher OS. Thus the system
is technically feasible
The assessment of technical feasibility must be based on outline design of system
requirements of input, outputs, files, programs, procedures and staff. This can be quantified in
terms of volumes of data , trends, frequency of updating , etc. having identified an outline system
, the investigator must go on to suggest the type of equipment required , methods of developing
the system, and methods of running the system.
With regard to the processing facilities, the feasibility study will need to consider the
possibility of using a bureau or, if in-house equipment is available the nature of the hardware to

DEPT.COMPUTER SCIENCE

28

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

be used for data collection, storage output and processing. On this system development side, the
feasibility study must consider the various ways of acquiring the system.
These include the purchase of the package the use of consultancy organization or software
house to design the system and write the programs. There are a number of technical issues, which
are generally raised during the feasibility stage of the investigation .they, are as follows:

Does the necessary technology exists to do what is suggested (and can it be acquired)?

Does the proposed equipment have the technical capacity to hold the data required to
use the new system?

Can the system be upgraded if develop

DEPT.COMPUTER SCIENCE

29

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

SYSTEM SPECIFICATION

DEPT.COMPUTER SCIENCE

30

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

5. SYSTEM ANALYSIS
5.1 HARDWARE SPECIFICATION

Processor

1.5 GHz or greater

Hard disk & RAM

40GB HD, 512 MB RAM

Input devices

Mouse, Keyboard

Output devices

Monitor

1.2. SOFTWARE SPECIFICATION


The Software specification means the operating system and all other applications or tools
used for the development of the proposed system. It include the operating system, and the software
which we are going to use.

Operating system

Windows 7

Frond End

Java

Back End

MySQL

Code Behind

JSP

Platform used

Windows

DEPT.COMPUTER SCIENCE

31

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

SYSTEM DESIGN

DEPT.COMPUTER SCIENCE

32

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6. SYSTEM DESIGN
6.1 INTRODUCTION
System design provides an understanding of the procedural details, necessary for
implementing the system recommended in the feasibility study. Basically it is all about the creation
of a new system. This is a critical phase since it decides the quality of the system and as a major
impact on the testing and implementation phases.
System design consist of three major steps
Drawing of the expanded system data flow charts to identify all the processing
functions required.
The allocation of the equipment and the software to be used.
The identification of the test requirements for the system.

Characteristics of Design
A design should exhibit a hierarchical organization that makes intelligent use of control
among components of the software.

A design should be modular that is, the software should be logical.


A design should contain distinct and separable representation of the data and procedure.
A design should lead to interface that reduce the complexity of the connections
between modules and with the external environment.

6.2. INPUT DESIGN


Input design is the primary step in the system design, to design the input with in predefined
guidelines. The objective of the input layout is that easy to follow and does not include operator
errors.
Input design is the process of converting user-oriented input into the computer based
output. Input data are collected and organized into groups of similar data. The goal of designing
input data is to make data entry easy, logical and free from errors as possible.

DEPT.COMPUTER SCIENCE

33

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

In input design the administrator checks that the entered data is valid or not. If the data is
valid, administrator adds data into the database otherwise rejects the data. When a registered user
login into the system, the system checks that whether the user is registered or not and if registered,
then it permits to edit his profile.

6.3. OUTPUT DESIGN


The output design has been an ongoing activity. Computer output is the most important
and direct source of information to the user. Efficient, intelligible output design should improve
the systems relationship with the user and helps in decision making. Designing output requires
understanding users output requirements. The system produces an output which varying
according to user requirements.
Here user interface are shown as graph in screen, printed reports are based on data. In this
similar output in the manual process, this will solve the users problem and will be the ultimate
result of the application. The outline of the output design is detected by users requirements.

6.4. DATABASE DESIGN


A database is a collection of logically related records. The main objective of database
design is to provide effective auxiliary storage without any applications and to contribute to the
overall efficiency of the computer program components of the whole system.
The organization of data in the database aims to achieve the following objectives.
Controlled redundancy
Ease of learning in use
Data independence
More information in low cost
Accuracy and integrity
Recovery from failures
Privacy and security

DEPT.COMPUTER SCIENCE

34

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Performance
The design should be done in a way the information stored in the database can retrieved
quickly whenever necessary. The general theme behind a database is to handle information as an
interfered whole. A database is a collection of interrelated data stored with minimum redundancy
to serve users quickly and efficiently. Database design runs parallel without application design. As
we collect information about what is to be done, we will obviously collect information about data
need to entered, stored messages and printed reports. The designing of database is done outmost
care and security during the designing phase of the system. Special care was taken to develop
minimum number of database for the maximum efficiency of the system.
DATA INTEGRITY AND CONSTRAINTS
In this project data security, data validation checking methods are applied using a password
authentication Generally the access to the whole system can be provided only if given user id and
password as authorized otherwise, an error message box is displayed once user gives correct
password he is authenticated and hence permitted to get in to the master form. Data integrity refers
to the process of ensuring that a database remains an accurate reflection of the universe of discourse
it is modeling or representing in In other words there is a close correspondence between the facts
stored in the database and the real world it models data integrity is normally enforced in a database
system by a series of integrity constraints or rules. Three types of integrity constraints are an
inherent part of the relational data model, entity integrity, referential integrity and domain
integrity. Entity integrity the concept of a primary key. Entity integrity is integrity rule which
status that every table must have a primary key and that the column or columns chosen to be the
primary key should be unique and not null. Referential integrity concerns the concept of a foreign
key.
The referential integrity rules states that any foreign key value can only be in one of two
states Domain integrity specifies that all columns in relational database must be declared upon a
defined domain.
A constraint is a property assigned to a column or the set of columns in a table that prevents
certain type of inconsistent data values from being placed in the column Constraints are used to
enforce the data integrity. This ensures the accuracy and reliability of the data in the database.

DEPT.COMPUTER SCIENCE

35

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

A PRIMARY KEY constraint is a unique identifier for a row within database. Every a
table should have a constraint to uniquely identify each row and only one primary key constraint
can be created for each table. A UNIQUE constraint enforces the uniqueness of the value in a set
of columns, so no duplicate values are entered. The unique key constraints are used to enforce
entity integrity as the primary key constraint.
A FOREIGN KEY constraint prevents any action that would destroy link between tables
with the corresponding data values. A CHECK constraint is used to limit the values that can be
placed in a column. The check constraint are used to enforce domain integrity A NOT NULL
constraint enforces that column will not accept null value. The not null constraint are used to
enforce domain integrity, as the check constraints
NORMALIZATION
The process of normalization is concerned with the transformation of the conceptual
scheme to a computer represent able form. Normalization reduces the redundancies and anomalies
The First Normal Form
First normal form does not allow multivalued and composite valued attributes. It states
that the domain of an attribute must include only atomic values and that value of any attribute in a
tuple must be single value from the domain of that attribute
The second Normal Form
In second normal form, for relation where primary key contains multiple attributes, nonkey attributes should be functionally dependent on a part of the primary key.
Third Normal Form
In third normal form, relation should not have a non-key attribute functionally determined
by another non-key attribute. That is there should be no transitive dependency of a non-key
attribute on the primary key. DE design is required to manage large bodies of information. The
management involves both the definition of the structure of storage of information and provisions
of mechanism for the manipulation of information.

DEPT.COMPUTER SCIENCE

36

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6.4.1 Table Name: Login

Fields

datatype

Userid

int

Uname

Varchar(30)

Password

Varchar(30)

usertype

Varchar(30)

DEPT.COMPUTER SCIENCE

37

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6.4.2 Table Name: Staff details

Fields
Staffid

Datatype
Int

Fname

Varchar(30)

Lname

Varchar(30)

House

Varchar(30)

Place

Varchar(30)

District

Varchar(30)

Pincode

Varchar(30)

Dob

Varchar(30)

Designation

Varchar(30)

Dept

Varchar(30)

Qualification

Varchar(30)

Doj

Varchar(30)

Email

Varchar(30)

Phone

Varchar(30)

DEPT.COMPUTER SCIENCE

38

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6.4.3 Table Name: Category


Fields
Catgid

Datatype
Int

Name

Varchar(30)

6.4.4 Table Name: Dept


Fields
Did

Datatype
Int

Dname

Varchar(30)

Catgid

Varchar(30)

6.4.5 Table Name: Book entry


Fields
Book_id

Datatype
Int

title

Varchar(30)

Author

Varchar(30)

Publish_date

Varchar(30)

Category

Varchar(30)

Prize

Varchar(30)

Status

Varchar(30)

DEPT.COMPUTER SCIENCE

39

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6.4.6 Table Name: Item


Fields
Itemid

Datatype
Int

Name

Varchar(30)

Price

Varchar(30)

Did

Varchar(30)

staffid

Varchar(30)

6.4.7 Table Name: Store


Fields
Storeid

Datatype
Int

Name

Varchar(30)

Block

Varchar(30)

6.4.8 Table Name: Shelf


Fields
Shelfid

Datatype
Int

Name

Varchar(30)

Category

Varchar(30)

DEPT.COMPUTER SCIENCE

40

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6.4.9 Table Name: Subjects


Fields
Sub_id

Datatype
Int

Sub_name

Varchar(40)

6.4.10 Table Name: Request


Fields
Requested

Datatype
Int

Itemid

Int

Staffid

Int

Description

Varchar(500)

Status

Varchar(30)

Catgid

Varchar(30)

Type

Varchar(30)

Qty

Varchar(30)

Date

Varchar(30)

DEPT.COMPUTER SCIENCE

41

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6.4.11 Table Name: Stock


Fields
Stockid

Datatype
Int

Storied

Varchar(20)

Catgid

Varchar(20)

Did

Varchar(20)

Itemid

Varchar(20)

Qty

Varchar(20)

6.4.12 Table Name: Book allocation


Fields
Alloc_id

datatype
int

Shelf_id

Int

Book_id

int

DEPT.COMPUTER SCIENCE

42

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6.4.13 Table Name: Notification


Fields
Notid

Datatype
int

Notification

Varchar(30)

Date

Varchar(30)

6.4.14 Table Name: Complaint


Fields
Complaint_id

Datatype
Int

Complaint

Varchar(500)

Stafftype

Varchar(30)

Staffid

Varchar(30)

Date

Varchar(30)

Reply

Varchar(500)

DEPT.COMPUTER SCIENCE

43

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6.5 DATA FLOW DIAGRAM


Data Flow Diagram (DFD) is a diagrammatic representation of the data flow of the data
flow in the system. In the system development environment a system analyst will interview a client
for the entire project specification. If the diagram is as requirements and fulfills all needs of clients,
then the creation of database and table will follow.
Data flow diagrams represent one of the most ingenious tools used for structured analysis.
DFD has the purpose of clarifying system requirements and identifying major transformations that
will become progressive in system design. It is the major starting point in the design phase that
functionally decomposes the requirement specifications down to the lowest level of detail.
The DFD, also known as bubble chart and it has purpose of clarifying system requirements
and identifying transformations, which is the primary purpose of software development. A DFD
consists of series of bubbled joined by lines. The bubbles represents data transformations and the
lines represents data flow in the system.

Rules Used In Constructing DFD

Process should be named and numbered

The direction flow is from top to bottom and left to right

After exploding lower level details of process are to be numbered

The name of the data stores, sources and destination are written in uppercase

6.5.1 Physical DFD


A physical DFD shows how the system is actually implemented, either at the moment
(current physical DFD), or how the designer intends it to be in the future (Required physical DFD).
Thus a physical DFD may be used to describe the set of data items that appear on each piece of
paper that move around an office, and the fact that a particular set of pieces of paper are stored
together in a filing cabinet. It is quite possible that a physical DFD will include reference to data

DEPT.COMPUTER SCIENCE

44

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

that are duplicated, and that the data stores, if implemented as set of database tables, would
constitute an un-normalized relational database. In contrast, a logical DFD attempts to capture the
dataflow aspects of a system in a form that has neither redundancy nor duplication

6.5.2 Basic Symbols

An arrow identifies the dataflow in motion. It is a pipeline through which


information is flown like the rectangle in the flowchart. A circle stands for process that
converts data into information. An open-ended box represents a data store, data at rest or a
temporary repository of data. A square defines a source or destination of system data.
The merit of DFD is that it can provide an overview of what data a system would
process, what transformation of data are done, what files are used and where the result flow

DEPT.COMPUTER SCIENCE

45

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Level-0

DEPT.COMPUTER SCIENCE

46

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Level-1 Admin

DEPT.COMPUTER SCIENCE

47

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Level-1.1

DEPT.COMPUTER SCIENCE

48

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Level-1.2

DEPT.COMPUTER SCIENCE

49

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Level-1.3

DEPT.COMPUTER SCIENCE

50

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6.6 E-R DIAGRAM


In software engineering an EntityRelationship model (ER model) is data model for
describing the data or information aspects of a business domain or its process requirements, in an
abstract way that lends itself to ultimately being implemented in a databases such as relational
databases. The main components of ER models are entities (things) and the relationships that can
exist among them.
Entityrelationship modeling was developed by Peter Chen and published in a 1976 paper.
However, variants of the idea existed previously, and have been devised subsequently such as
supertype and subtype data entities and commonality relationships.

DEPT.COMPUTER SCIENCE

51

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

DEPT.COMPUTER SCIENCE

PROJECT REPORT 2016

52

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

6.7 USECASE DIAGRAM


A usecase diagram at its simplest is a representation of a user's interaction with the system
that shows the relationship between the user and the different use cases in which the user is
involved. A use case diagram can identify the different types of users of a system and the different
use cases and will often be accompanied by other types of diagrams as well.
Usecase diagram of Admin

SYSTEM TESTING

DEPT.COMPUTER SCIENCE

53

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Usecase diagram of Stock manager

DEPT.COMPUTER SCIENCE

54

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Usecase diagram of Lab assistant

DEPT.COMPUTER SCIENCE

55

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Usecase diagram of Librarian

DEPT.COMPUTER SCIENCE

56

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

SYSTEM TESTING

DEPT.COMPUTER SCIENCE

57

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

7. SYSTEM TESTING
7.1 INTRODUCTION
Testing is a process of executing a program with intend of finding an error. Software testing
is critical element of software quality assurance and represents the ultimate review or specification,
design and coding. Testing includes verification of the basic logic of each program and verification
that the entire system works properly. Testing demonstrates that software function appear to be
working according to specification. In addition, data collected as testing is conducted provided a
good indication of software quality as while. The debugging process is the most unpredictable part
of testing process.
Testing begins at the module level and works towards the integration of the entire computer
based system testing and debugging are different activities, but any testing includes debugging
strategy for software testing must accommodate low level tests that are necessary to verify that a
small source code segment has been currently implemented as well as high level tests that validate
major system function, against customer requirements. No testing is complete without verification
and validation part.
The goals of verification and validation activities are to access and improve the quality of
work products generated during the development and modification of the software. There are two
types of verification: life cycle verification and formal verification. Life cycle verification is the
process of determining the degree to which the products of the given phase of the development
cycle fulfil the specification established during the prior process. Formal verification is the
rigorous mathematical demonstration that source code confirms to its specification. Validation is
a process of evaluating software at the end of its specification and the software development
process to determine compilation with the requirements.
Software testing is a critical element of software quality assurance and represents the
ultimate review of specification, design and code generation. The primary objectives, when we
test the software are the following.
Testing is a process of exceeding with intend of finding an error.

DEPT.COMPUTER SCIENCE

58

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

A good test case is one that has a high probability of finding an undiscovered error.
A successful test is one that uncovers undiscovered error

Software testing determines the correctness, completeness, and quality of software being
developed. Validation refers to the process of checking that the developed software meets the
requirements specified by the user. The activities involved in the testing phase basically evaluate
the capability of that system meets its requirements. The main objective of software testing is to
detect errors in the software. Errors occur if some part of the developed system is found to be
incorrect, incomplete or inconsistent. Test techniques include, but are not limited to, the process
of executing a program or application with the intent of finding software bugs (errors or other
defects).It involves the execution of a software component or system to evaluate one or more
properties of interest. In general, these properties indicate the extent to which the component or
system under test:

meets the requirements that guided its design and development,

responds correctly to all kinds of inputs,

performs its functions within an acceptable time,

is sufficiently usable,

can be installed and run in its intended environments, and

DEPT.COMPUTER SCIENCE

59

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Achieves the general result its stakeholders desire.


As the number of possible tests for even simple software components is practically infinite,

all software testing uses some strategy to select tests that are feasible for the available time and
resources. As a result, software testing typically (but not exclusively) attempts to execute a
program or application with the intent of finding software bugs (errors or other defects).Software
testing can provide objective, independent information about the quality of software and risk of its
failure to users and/or sponsors. Software testing can be conducted as soon as executable software
(even if partially complete) exists. The overall approach to software development often determines
when and how testing is conducted. For example, in a phased process, most testing occurs after
system requirements have been defined and then implemented in testable programs. In contrast,
under an Agile approach, requirements, programming, and testing are often done concurrently.
Thus, testing plays a very critical role in determining the reliability and efficiency of the
software and hence is very important stage in software development. There are to be conducted on
the software evaluate its performance under a number of conditions. Ideally, it should so at the
level of each module and also when all of them are integrated to form the completed system

7.2 TESTING TECHNIQUES


The various testing techniques are,

7.2.1 White box Testing


Tests are performed to ensure that all internal operations of the software are performed
according to the specifications of the client. This is called White box testing.
White-box testing (also known as clear box testing, glass box testing, transparent box
testing, and structural testing) is a method of testing software that tests internal structures or
workings of an application, as opposed to its functionality (i.e. black-box testing).
In white-box testing an internal perspective of the system, as well as programming skills,
are

used

to

design

test

cases.

White-box

testing

can

be

applied

at

the unit, integration and system levels of the software testing process. Although traditional testers

DEPT.COMPUTER SCIENCE

60

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

tended to think of white-box testing as being done at the unit level, it is used for integration and
system testing more frequently today. It can test paths within a unit, paths between units during
integration, and between subsystems during a systemlevel test. Though this method of test design
can uncover many errors or problems, it has the potential to miss unimplemented parts of the
specification or missing requirements. The details entered by the administrator are saved and
stored in the database, and testing is done to verify whether the control of each form or action is
working in the exact way.
Using white-box testing methods, the software engineer can derive the test cases that

Guarantee that all independent paths within a module have been exercised at least once.

Exercise all logical decision on their true and false sides.

Execute all loops at their boundaries and within their operational bounds.

Exercise internal data structure to ensure their validity.

7.2.2 Black box Testing


Tests are performed to ensure that each function is working properly. This is referred to as
Black box testing. Black-box testing is a method of software testing that examines the functionality
of an application (e.g. what the software does) without peering into its internal structures or
workings. This method of test can be applied to virtually every level of software testing: unit,
integration, system and acceptance. It typically comprises most if not all higher level testing, but
can also dominate unit testing as well. Test cases are built around specifications and requirements,
i.e., what the application is supposed to do. Test cases are generally derived from external
descriptions of the software, including specifications, requirements and design parameters.
Although the tests used are primarily functional in nature, non-functional tests may also be used.
The test designer selects both valid and invalid inputs and determines the correct output without
any knowledge of the test object's internal structure. Testing is conducted in the system so that the
functions namely Login, sending requests, searching the nearest donor, getting routes to the nearest
blood banks etc... Are done properly.

DEPT.COMPUTER SCIENCE

61

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Black box testing attempts to find errors in the following categories,

Incorrect or missing files.

Interface errors.

Errors on data structure or external database access.

Behaviour or performance errors.

Initialisation and termination errors

7.3 TESTING STRATEGY

7.3.1 Condition Testing


Test cases are derived to determine whether the logic conditions and decision statements
are free from errors. Condition testing strategy is used to check if the operators used are correct
and to verify conditions such as if an error message is displayed if a non-registered user is signed
in to the app, or a user is registered without providing his body mass index value.

7.3.2 Loop Testing


This testing is used to check the variety of loops present in programming. The working of
the loops such as while, for and do while are checked for its proper execution. The statements
inside the loop body are executed line by line for every condition that satisfies the loop.

7.3.3 Unit Testing


This testing is performed to test the individual units in the system. Each module in the
system is tested individually and executed line by line for accurate functioning of the system. The
admin module has be tested for its proper functioning, since all services are provide and data is
stored and controlled by this module.

DEPT.COMPUTER SCIENCE

62

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

7.3.4 Integration Testing


The objective of integration testing is to take all tested individual modules, integrate them,
test them again and develop the system. The Mobile application module, the blood bank module
as well as the admin should be integrated together for the proper functioning of the whole system.
Testing is conducted at this stage to check whether the requested services are reaching to the admin
through the mobile device and when requested by the user for the nearest blood bank, its been
available to the user appropriately.

7.3.4 Acceptance Testing


This testing is performed to ensure that the functional, behavioural, and performance
requirements of the system is met. It may involve chemical tests, physical tests, or performance
tests. The acceptance test suite is run against the supplied input data or using an acceptance test
script to direct the testers. Then the results obtained are compared with the expected results. If
there is a correct match for every case, the test suite is said to pass. If not, the system may either
be rejected or accepted on conditions previously agreed between the sponsor and the manufacturer.
The objective is to provide confidence that the delivered system meets the business requirements
of both sponsors and users. The acceptance phase may also act as the final quality gateway, where
any quality defects not previously detected may be uncovered. The system is implemented after
all these checks and validations.

7.3.5 Output Testing


Output testing of the proposed system is important since no system could be useful if it
does not produce the required output. The output format on the screen is found to be correct. as
the format was designed in the system design phase according to the user needs. For the hard copy
also the output comes out as the specified requirements by the user. Hence output testing doesnt
result in any correction on the system

DEPT.COMPUTER SCIENCE

63

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

SYSTEM MAINTANANCE

DEPT.COMPUTER SCIENCE

64

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

8. SYSTEM MAINTANANCE
8.1 SYSTEM MAINTANANCE
A process of modifying a software system or component after delivery to correct faults, to
improve performance is known as software maintenance. A common perception of maintenance
is that it merely involves fixing defects. However, one study indicated that the majority, over 80%,
of the maintenance effort is used for non-corrective actions. Software maintenance is a very broad
activity that includes error correction, enhancements of capabilities, deletion of obsolete
capabilities, and optimization. Because change is inevitable, mechanisms must be developed for
evaluation, controlling and making modifications. So any work done to change the software after
it is in operation is considered to be maintenance work. The purpose is to preserve the value of
software over the time. The value can be enhanced by expanding the customer base, meeting
additional requirements, becoming easier to use, more efficient and employing newer technology.
Maintenance may span for 20 years, whereas development may be 1-2 years.
Corrective maintenance is done to repair the faults or defects found in day to day system
functions, that is software design, logic and coding errors. Adaptive maintenance is the
implementation of changes in a part of the system which has been affected by changes that
occurred in some other part of the system. The objective of perspective maintenance should be to
prevent failures and optimize the software. Minor adaptive changes should be handled by normal
maintenance process. Major adaptive changes should be carried out as a separate development
project.

DEPT.COMPUTER SCIENCE

65

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

SYSTEM SECURITY

DEPT.COMPUTER SCIENCE

66

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

9. SYSTEM SECURITY
9.1 SYSTEM SECURITY
System security is a branch of technology known as information security as applied to
computers and networks. The objective of system security includes protection of information and
property from theft, corruption, or natural disaster, while allowing the information and property to
remain accessible and productive to its intended users. The terms system security, means the
collective processes and mechanisms by which sensitive and valuable information and services are
protected from publication, tampering or collapse by unauthorized activities or untrustworthy
individuals and unplanned events respectively. The technologies of system security are based on
logic. As security is not necessarily the primary goal of most computer applications, designing a
program with security in mind often imposes restrictions on that program's behaviour. Internet is
a part of everyday life, web applications are an essential component of every business activity.
Customers and trading partners expect fast, accurate and secure applications with robust
functionality. Companies want sites that are easy to maintain and update, yet cost effective.
Auditors and security officers want to ensure that the web applications are controlled and that there
is strong data integrity. All of these requirements need to be blended to ensure that each web
application meets the companys goals, satisfies the customers
Any system developed should be secured and protected against possible hazards. Security
measures are provided to prevent unauthorized access of various levels. An uninterrupted supply
should be provided, so that the power failure or voltage fluctuations will not erase the data in the
files or database. Data security is the practice of keeping data protected from corruption and
unauthorized access. The focus behind data security is to ensure privacy while protecting personal
or corporate data. Data is the raw form of information stored as columns and rows in our database,
network servers and personal computers. Authorization ensures that the logged-in user is allowed
to use a page or perform an operation. Authorization is typically based on one or more roles
(sometimes called groups) to which the user belongs. Password protection and simple procedure
to hide their personal data are provided to the users as a part of the security objectives. The system
allows the users to use the app only after signing in using their username and password provided
during registration.

DEPT.COMPUTER SCIENCE

67

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

The admin is well protected by a password and username since all services are controlled
by the admin, any intrusion in to the admin can cause damage or a failure in the system. The user
can only access the service but cant modify any. Each user is treated individually and cant
interrupt to the details of another user account and make changes or modifications hence the
activity of each single user is well protected and secured

DEPT.COMPUTER SCIENCE

68

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

SYSTEM IMPLEMENTATION

DEPT.COMPUTER SCIENCE

69

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

10. SYSTEM IMPLEMENTATION


System implementation is the final stage of software development life cycle. For the
successful implementation and cooperation of new systems users must be selected, educated and
trained. Unless the users are not trained, the system will become complex and it will feel as a
burden for them. A product software implementation method is a systematically structured
approach to effectively integrate software based service or component into the workflow of an
organizational structure or an individual end-user. A product software implementation method is
a blueprint to get users and/or organizations running with a specific software product. The method
is a set of rules and views to cope with the most common issues that occur when implementing a
software product: business alignment from the organizational view and acceptance from human
view. It is stated that the implementation of (product) software consumes up to 1/3 of the budget
of a software purchase. The complexity of implementing product software differs on several issues.
Examples are: the number of end users that will use the product software, the effects that the
implementation has on changes of tasks and responsibilities for the end user, the culture and the
integrity of the organization where the software is going to be used and the budget available for
acquiring product software.
The implementation stage of the system begins by preparing a plan for implementation of
the system. According to this plan, activities are to be carried out, discussions are made regarding
the equipment to be required and resources and additional facilities required to implement the
system. The most critical stage in achieving a successful system is by giving users confidence that
the system will work based on their requirements and be effective. This method also offers the
greatest securities since the old system can take over if the errors are found or inability to handle
certain type of transactions while using the new system.
The implementation involves the following formalities:

careful planning

investigation of the systems and constraints

design the methods to achieve the changes

training the staffs in the changed phase

DEPT.COMPUTER SCIENCE

70

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

CONCLUSION

DEPT.COMPUTER SCIENCE

71

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

CONCLUSION
The various process of the construction of proposed system has all been completed. With
the different aspects of a system falling in place one by one, the final threshold of the system has
been crossed. The entire process was not meant to be a simple solution to the problem that was
proposed.
There is no doubt in ones mind that there is room for improvement. Many other reports
can be produced and new variations can be drawn up .This is also meant to be the foundation stone
for something that scales the largest pinnacles of excellence.

DEPT.COMPUTER SCIENCE

72

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

BIBILOGRAPHY

DEPT.COMPUTER SCIENCE

73

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

BIBILIOGRAPHY

Books
(1) Rohit Khuranna , Software Engineering Principles and practices
(2) Ivan Sommerville, Software Engineering, Pearson, 3rd Edition, 2006.
(3) Herbert Schildt, Java The Complete Reference, 7th Edition, McGraw Hill.
(4) Rob Vieira,Professional Microsoft SQL Server 2008 Programming
Publications.

Websites
(1) Wikipedia
(2) http://www.java2s.com/tutorial/java/MakeDatabaseconnection

DEPT.COMPUTER SCIENCE

74

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

CODE & SCREEN LAYOUTS

DEPT.COMPUTER SCIENCE

75

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Staff Registration
<%
if(request.getParameter("button")!=null)
{
String fname=request.getParameter("fname");
String lname=request.getParameter("lname");
String hname=request.getParameter("hname");
String place=request.getParameter("place");
String dist=request.getParameter("dist");
String pin=request.getParameter("pin");
String dob=request.getParameter("dob");
String desg=request.getParameter("des");
String dep=request.getParameter("dep");
String qual=request.getParameter("qual");
String yj=request.getParameter("yearj");
String email=request.getParameter("email");
String phnum=request.getParameter("phnum");
RandomPassword r=new RandomPassword();
String pwd=r.randomAlphaNumeric(6);
sendmail sm=new sendmail();
String msg="Your Password is '"+pwd+"'";
sm.send(email, msg, "Password");

String str1="insert into login (uname,password,usertype) values('"+email+"','"+pwd+"','"+desg+"')";


st.executeUpdate(str1);

DEPT.COMPUTER SCIENCE

76

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

String str2="select userid from login order by userid desc limit 1";
ResultSet rs=st.executeQuery(str2);
String id="";
while(rs.next())
{
id=rs.getString(1);
}
String str="insert into
staff(staffid,fname,lname,house,place,district,pincode,dob,designation,dept,qualification,doj,email,pho
ne) values
('"+id+"','"+fname+"','"+lname+"','"+hname+"','"+place+"','"+dist+"','"+pin+"','"+dob+"','"+desg+"','"+dep
+"','"+qual+"','"+yj+"','"+email+"','"+phnum+"')";
int i=st.executeUpdate(str);
if(i>0)
{
%>
<script>
alert("Success!!!");
window.location("staffRegistration.jsp");
</script>
<%
}
}
%>

DEPT.COMPUTER SCIENCE

77

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Staff Details
<%
Dbcon d=new Dbcon();
Connection con =d.getc();
Statement st=con.createStatement();
String str="select staff.*,dept.dname from staff,dept where staff.dept=dept.did order by fname ";
ResultSet rs=st.executeQuery(str);
int i=1;
while(rs.next())
{
String f=rs.getString("fname");
String l=rs.getString("lname");
String name=f+" "+l;
%>
<tr>
<td><%=i%></td>
<td><%=name%></td>
<td><%=rs.getString("house")%></td>
<td><%=rs.getString("place")%></td>
<td><%=rs.getString("district")%></td>
<td><%=rs.getString("pincode")%></td>
<td><%=rs.getString("dob")%></td>
<td><%=rs.getString("designation")%></td>
<td><%=rs.getString("dname")%></td>
<td><%=rs.getString("qualification")%></td>

DEPT.COMPUTER SCIENCE

78

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

<td><%=rs.getString("doj")%></td>
<td><%=rs.getString("email")%></td>
<td><%=rs.getString("phone")%></td>
<td><a href="updateStaff.jsp?id=<%=rs.getInt("staffid")%>">Edit</a></td>
<td><a href="deleteStaff.jsp?id=<%=rs.getInt("staffid")%>" onclick="return window.confirm('Do you
want to delete?')">Delete</a></td>
</tr><%i++;
}%>
</table>

Staff Registration
<%
if(request.getParameter("button")!=null)
{
String fname=request.getParameter("fname");
String lname=request.getParameter("lname");
String hname=request.getParameter("hname");
String place=request.getParameter("place");
String dist=request.getParameter("dist");
String pin=request.getParameter("pin");
String dob=request.getParameter("dob");
String desg=request.getParameter("des");
String dep=request.getParameter("dep");
String qual=request.getParameter("qual");
String yj=request.getParameter("yearj");
String email=request.getParameter("email");

DEPT.COMPUTER SCIENCE

79

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

String phnum=request.getParameter("phnum");
RandomPassword r=new RandomPassword();
String pwd=r.randomAlphaNumeric(6);
sendmail sm=new sendmail();
String msg="Your Password is '"+pwd+"'";
sm.send(email, msg, "Password");

String str1="insert into login (uname,password,usertype) values('"+email+"','"+pwd+"','"+desg+"')";


st.executeUpdate(str1);
String str2="select userid from login order by userid desc limit 1";
ResultSet rs=st.executeQuery(str2);
String id="";
while(rs.next())
{
id=rs.getString(1);
}
String str="insert into
staff(staffid,fname,lname,house,place,district,pincode,dob,designation,dept,qualification,doj,email,pho
ne) values
('"+id+"','"+fname+"','"+lname+"','"+hname+"','"+place+"','"+dist+"','"+pin+"','"+dob+"','"+desg+"','"+dep
+"','"+qual+"','"+yj+"','"+email+"','"+phnum+"')";
int i=st.executeUpdate(str);
if(i>0)
{
%>
<script>
alert("Success!!!");

DEPT.COMPUTER SCIENCE

80

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

window.location("staffRegistration.jsp");
</script>
<%
}
}
%>

Staff Details
<%
Dbcon d=new Dbcon();
Connection con =d.getc();
Statement st=con.createStatement();
String str="select staff.*,dept.dname from staff,dept where staff.dept=dept.did order by fname ";
ResultSet rs=st.executeQuery(str);
int i=1;
while(rs.next())
{
String f=rs.getString("fname");
String l=rs.getString("lname");
String name=f+" "+l;
%>
<tr>
<td><%=i%></td>
<td><%=name%></td>
<td><%=rs.getString("house")%></td>

DEPT.COMPUTER SCIENCE

81

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

<td><%=rs.getString("place")%></td>
<td><%=rs.getString("district")%></td>
<td><%=rs.getString("pincode")%></td>
<td><%=rs.getString("dob")%></td>
<td><%=rs.getString("designation")%></td>
<td><%=rs.getString("dname")%></td>
<td><%=rs.getString("qualification")%></td>
<td><%=rs.getString("doj")%></td>
<td><%=rs.getString("email")%></td>
<td><%=rs.getString("phone")%></td>
<td><a href="updateStaff.jsp?id=<%=rs.getInt("staffid")%>">Edit</a></td>
<td><a href="deleteStaff.jsp?id=<%=rs.getInt("staffid")%>" onclick="return window.confirm('Do you
want to delete?')">Delete</a></td>
</tr><%i++;
}%>
</table>

Library Request
<%
if(request.getParameter("Submit")!=null)
{
String bkid=request.getParameter("title");
String desc=request.getParameter("textarea");
String qty=request.getParameter("qty");
String str="insert into request(itemid,staffid,description,status,catgid,type,qty,date)
values('"+bkid+"','"+id+"','"+desc+"','Waiting','2','"+dep+"','"+qty+"',curdate())";

DEPT.COMPUTER SCIENCE

82

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

int i=st.executeUpdate(str);
if(i>0)
{
%>
<script>
alert("Send!!!");
window.location("requestLibrary.jsp");
</script>
<%
}

}
%>

Lab Request
<%
if(request.getParameter("button")!=null)
{
String item=request.getParameter("item");
String desc=request.getParameter("textarea");
String qty=request.getParameter("qty");
String str1="insert into request(itemid,staffid,description,status,catgid,type,qty,date)
values('"+item+"','"+id+"','"+desc+"','Waiting','1','"+dep+"','"+qty+"',curdate())";
int i=st.executeUpdate(str1);
if(i>0)
{

DEPT.COMPUTER SCIENCE

83

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

%>
<script>
alert("Send!!!");
window.location("request.jsp");
</script>
<%
}
}
%>

View Request
<%
Dbcon d=new Dbcon();
Connection con=d.getc();
Statement st =con.createStatement();
Statement st1=con.createStatement();
String str="select distinct catgid from request";
String type="";
String f="";
String l="";
String n="";
int i=1;
ResultSet rs=st.executeQuery(str);
while(rs.next())
{

DEPT.COMPUTER SCIENCE

84

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

type=rs.getString("catgid");

if((type.equals("1")))
{
String str1="select request.requestid,
request.date,staff.fname,staff.lname,dept.dname,item.name,request.description,request.qty from
request,staff,dept,item where request.itemid=item.itemid and request.status='Waiting' and
request.staffid=staff.staffid and request.catgid='1' and request.type=dept.did";
ResultSet rs1=st1.executeQuery(str1);
while(rs1.next())
{
f=rs1.getString("fname");
l=rs1.getString("lname");
n=f+" "+l;

%>
<tr>
<td height="34"><%=i%></td>
<td><%=rs1.getString("date")%></td>
<td><%=n%></td>
<td><%=rs1.getString("dname")%></td>
<td><%=rs1.getString(6)%></td>
<td><%=rs1.getString("description")%></td>
<td><%=rs1.getString("qty")%></td>
<td><a href="reqForward.jsp?id=<%=rs1.getString("requestid")%>">Click here to forward</a></td>
</tr><%
i++;

DEPT.COMPUTER SCIENCE

85

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

}}
if(type.equals("2"))
{
String str2="select request.requestid,
request.date,staff.fname,staff.lname,dept.dname,book_entry.title,request.description,request.qty from
request,staff,dept,book_entry where request.itemid=book_entry.bookid and request.status='Waiting'
and request.staffid=staff.staffid and request.catgid='2' and request.type=dept.did";
ResultSet rs2=st1.executeQuery(str2);
while(rs2.next())
{
f=rs2.getString("fname");
l=rs2.getString("lname");
n=f+" "+l;
%>
<tr>
<td height="34"><%=i%></td>
<td><%=rs2.getString("date")%></td>
<td><%=n%></td>
<td><%=rs2.getString("dname")%></td>
<td><%=rs2.getString(6)%></td>
<td><%=rs2.getString("description")%></td>
<td><%=rs2.getString("qty")%></td>
<td><a href="reqForward.jsp?id=<%=rs2.getString("requestid")%>">Click here to forward</a></td>
</tr><%
i++;
}}}%>
</table>

DEPT.COMPUTER SCIENCE

86

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Update Stock
<%
if(request.getParameter("button")!=null)
{
String sid=request.getParameter("store");
String did=request.getParameter("hide1");
String iid=request.getParameter("hide2");
String qty=request.getParameter("qty");
String s="insert into stock (storeid,catgid,did,itemid,qty)
values('"+sid+"','"+t+"','"+did+"','"+iid+"','"+qty+"')";
String s1="update request set status='Stock Updated' where requestid='"+rid+"' ";
int i=st.executeUpdate(s);
st.executeUpdate(s1);
if(did.equals("4"))
{
String s2="update book_entry set status='Available' where bookid='"+iid+"' ";
st.executeUpdate(s2);
}
if(i>0)
{
response.sendRedirect("requestUpdate.jsp");
}
}
%>

DEPT.COMPUTER SCIENCE

87

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

Store Details
<%
Dbcon d=new Dbcon();
Connection con =d.getc();
Statement st=con.createStatement();
String str="select * from store";
ResultSet rs=st.executeQuery(str);
int i=1;
while(rs.next())
{
%>
<tr>
<td height="34"><%=i%></td>
<td><%=rs.getString("name")%></td>
<td><%=rs.getString("block")%></td>
<td><a href="updateStore.jsp?id=<%=rs.getInt("storeid")%>">edit</a></td>
<td><a href="deleteStore.jsp?id=<%=rs.getInt("storeid")%>" onclick="return window.confirm('Do
you want to delete ?')">delete</a></td>
</tr><%i++; }%>
</table>

Complaint
<%
if(request.getParameter("button")!=null)
{
String id=session.getAttribute("lid").toString();

DEPT.COMPUTER SCIENCE

88

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

String comp=request.getParameter("textarea");
String str="select * from staff where staffid='"+id+"' ";
String desg="";
int sid=0;
ResultSet rs=st.executeQuery(str);
if(rs.next())
{
desg=rs.getString("designation");
sid=rs.getInt("staffid");
}
String str1="insert into complaint(complaint,stafftype,staffid,date,reply)
values('"+comp+"','"+desg+"','"+sid+"',curdate(),'Pending')";
int i=st.executeUpdate(str1);
if(i>0)
{
response.sendRedirect("addComplaint.jsp");
}
}
%>
Request of Lab assistant
<%
if(request.getParameter("Submit")!=null)
{
String bkid=request.getParameter("title");
String desc=request.getParameter("textarea");
String qty=request.getParameter("qty");

DEPT.COMPUTER SCIENCE

89

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

PROJECT REPORT 2016

String str="insert into request(itemid,staffid,description,status,catgid,type,qty,date)


values('"+bkid+"','"+id+"','"+desc+"','Waiting','2','"+dep+"','"+qty+"',curdate())";
int i=st.executeUpdate(str);
if(i>0)
{
%>
<script>
alert("Send!!!");
window.location("requestLibrary.jsp");
</script>
<%
}

}
%>

DEPT.COMPUTER SCIENCE

90

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

DEPT.COMPUTER SCIENCE

PROJECT REPORT 2016

91

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

DEPT.COMPUTER SCIENCE

PROJECT REPORT 2016

92

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

DEPT.COMPUTER SCIENCE

PROJECT REPORT 2016

93

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

DEPT.COMPUTER SCIENCE

PROJECT REPORT 2016

94

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

DEPT.COMPUTER SCIENCE

PROJECT REPORT 2016

95

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

DEPT.COMPUTER SCIENCE

PROJECT REPORT 2016

96

RISS TECHNOLOGIES

LIVE STOCK MANAGEMENT SYSTEM

DEPT.COMPUTER SCIENCE

PROJECT REPORT 2016

97

RISS TECHNOLOGIES