Sei sulla pagina 1di 57

By: Mukhtar Hussein Yusuf Page 1

1.Abbreviations
S/NO ABBREVIATIONS STANDS FOR
1 AMS Airport Management System
2 IT Information Technology
3 HDD Hard Disk Drive
4 EIA Egal International Airport
5 Ms-Access Microsoft Access
6 FDR Fast Data Reproduction
7 SDM Support decision Making
8 FAS Fully Automated System
9 CPP C++
10 XML Extensible Mark-up Language
11 IDE Integrated Development
Environment
12 ASP Attached Support Processor
13 VB.NET Visual Basic .Net
14 VB Visual Basic
15 VB6.0 Visual Basic 6.0
16 J#.Net Java#.Net
17 CLR Common Language Run-time
18 TCF Try Catch Finally
19 MHZ Megahertz
20 GHZ Gigahertz
21 GB Gigabyte
22 MB Mega Byte
23 MS-SQL Microsoft Structured Query
Languages
24 My-SQL My Structure Query Language
25 ODBC Oracle Database Connectivity
26 OLE Object Linking and Embedding
By: Mukhtar Hussein Yusuf Page 2
27 JET Joint Engine Technology
28 MSDE Microsoft SQL Server Desktop
Engine
29 VBA Visual Basic Applications
30 RDBMS Relational Database Management
System
31 ADP Administrative Data Processing
32 UDF-s Uniqueness Database Files
33 DFD Data Flow Diagram
34 ERD Entity Relationship Diagram
35 E-R Entity Relationship
36 SPQ Strict Priority Queuing

By: Mukhtar Hussein Yusuf Page 3


1.1. INTORODUCTION
Information is what the world pivots on today. For many

organization , computer organization systems are now at the heart of

daily activities and a major consideration in corporate decision

makings .Without computerized assistance organizations will grind to

a halt, for the sheer volume of activities would overwhelm workers

and manager .The development of information systems have played a

dominant role in the evolution of information economy.

We have selected VB.NET as a programming language

because it has grown to be a tool of choice for most of the

programmers when compared to any other programming language

and has been strategically placed by Microsoft to be the corner stone

of windows programming.

The main objective of our project is to make reliable and

efficient transaction management system e.g., a system which is user

friendly and at the same time powerful enough. It has the capability to

keep the entire information of a transaction and to reproduce it

whenever required.

1.2. EGAL. INTERNATIONAL AIRPORT PROFILE

By: Mukhtar Hussein Yusuf Page 4


This software package is about “Airport Management System” which

runs on a personal computer. This package gives all the information

regarding the transaction of airlines & other details. It also gives the

facility of adding, deleting, modifying, inquiry and searching of

transactions performed in various ways. This package also provides

facility for searching the details of a transaction of airlines on the basis

of code. Also information of an various things like mode of

transportation can be entered. Proper passenger codes & details are

also provided. This software can be very useful to the various

organization, departments and big establishments for managing their

routine activities of exchange.

1.3. Scope
This package gives all the information regarding the transaction of
airlines & other details. It also gives the facility of adding, deleting,
modifying, inquiry and searching of transactions performed in various ways.

1.4. Technologies Used


This Project will be a desktop application to be developed in VB .Net having Ms Access
as backend.

 Database Design (Ms Access)

 Form Design (VB.Net)

 Coding (VB.Net)

 Testing (VB.Net)

Reporting Tool (Crystal Report)

1.5. Purpose

By: Mukhtar Hussein Yusuf Page 5


The purpose of this project is to build an open source solution to
encourage more Airport Management System (AMS) to use computer
software systems to enhance their efficiency and accuracy in the clinic
operations. Such open source solution may also encourage more
Information Technology (IT) service or solution providers to provide
better support to these passengers that may expedite other clinics to
adopt the system.

By: Mukhtar Hussein Yusuf Page 6


2. Existing Systems

Findings of the current System

System that is using this area is manual system. They put all the
information about the customer such as billing recoding a new
customer and or the one who was there before the new one in
books

 Weaknesses of the existing system.

Weaknesses of this work is very many so the researcher


concluded in this following

1. First system is system not is a computerized

2. Data will lose after a time or many years

3. Problem of retrieving data of the customer

4. Difficult to understand the information

2.1. Proposed Systems

By: Mukhtar Hussein Yusuf Page 7


Our project “Airport Management System” is devised basically to
keep diminutive details of storing books and to retrieve them
whenever needed. The formalities are indeed complex.
2.2. PROJECT OBJECTIVE AND OUTLINES

Our project “Airport Management System” is devised basically to keep


diminutive details of passenger and to retrieve them whenever
needed. The formalities are indeed complex.

Keeping in view the requirements of the application, the basic


objectives are to devise a system which incorporates the following
features:

2.3.1. Storage of data:

It should be able to store data, both fixed and variable, at one


place in an efficient effective style. This enables the user to access
data easily.

2.3.2. Fast data reproduction:

The process involves frequent data verification, validation,


detection and correlation. Hence brisk and accurate data reproduction
is essential
2.3.3. User friendliness:

It should not be user dependent. The user interface should be


such that the system is as user friendly as possible. Helps should be
provided.

2.3.4. Support decision making:

By: Mukhtar Hussein Yusuf Page 8


It should be able to generate reports on various processes and
entities. The transaction and master record should be able to assist
the management to take relevant decisions. These points constitute
the basic framework under which our project had to develop.

3. PROBLEM DEFINITION
The definition of our problem consist of two of the following

 Manual system and

 Fully automated system

3.1Manual system: The system is very time consuming and lazy.


This system is more prone to errors and sometimes the approach to
various problems is unstructured.

3.2. Technical system : With the advent of latest technology if


we do not update our system then our business result in losses
gradually with time. The technical systems contain the tools of latest
trend i.e.

computers printers, fax, Internet etc. The systems with this technology
are very fast, accurate, user-friendly and reliable

By: Mukhtar Hussein Yusuf Page 9


3. System Analysis

This was the most important phase of my project life cycle .It had
connected my maximum time .The block diagram given bellow depict
various fact which were understood by one during the analysis phase

3.1. SOFTWARE DISCRIBTION


Microsoft has introduced the .NET technology to meet the computing
requirements of the day.

By: Mukhtar Hussein Yusuf Page 10


One of the fundamental components of this technology is the .NET
framework

The.net framework can be thought of as huge collection of functions


just about any programming task that can be thought of . it is a new
computing platform that simplified application development in the
highly distributed environment of the internet. Framework is designed
to fulfill the following objectives.

 To provide a consistent object-oriented programming


environment whether object code is stored and executed
locally , executed locally but internet distributed , or executed
remotely
 To provide a code executed environment that minimizes
software deployment and versioning conflicts
 To provide a code a code execution environment that eliminates
the performance problems of scripted or interpreted
environments
 To make the developer experience consistent across widely and
web-based applications
 To build all communication on industry standards to ensure that
code based on the .NET framework can integrated with any
other code

3.1.1. .NET FRAMEWORK


The .NET framework has two main components
 Common language and runtime
 .net framework class library
The common language runtime is the foundation og the .NET
framework you can think of the runtime as an agent that manages
code at execution time .
Providing core services such as memory management as memory
management , thread management ,thread management and remote
while also enforcing strict type safety and other forms of code
accuracy that ensure security and robustness . in fact the concept of
code management is is fundamental principle of the runtime . Code
that targets at runtime is known as unmanaged code. T he class
library, the other main component of the .NET framework. Is a
comprehensive ,object –oriented collection of reusable type that you
can use to develop applications ranging from traditional command –
line or graphic user inter face (GUI) application to applications

By: Mukhtar Hussein Yusuf Page 11


Based on the latest innovations provided by ASP.NET, such as web
forms and XML web services.

The .NET framework can be hosted by unmanaged components that


load the common language runtime into their processes and initiate
the execution of managed code,
Their by creating a software environmental that exploit both managed
and unmanaged features. NET framework not only provides several
runtime hosts but also supports development of third-part runtime
hosts

For example, ASP.NET hosts the runtime to provide a scalable, server-


side environment for managed code ASP.NET works directly with run
time to enable we forms application and XML web services both of
which are discussed later in this topic.
3.1.2. Advantages of Visual .Net
1. First of all, VB.NET provides managed code execution that runs
under the Common Language Run time (CLR), resulting in
robust, stable and secure applications. All features of the .NET
framework are readily available in VB.NET.

2. VB.NET is totally object oriented. This is a major addition that


VB6 and other earlier releases didn't have.

3. The .NET framework comes with ADO.NET, which follows the


disconnected paradigm, i.e. once the required records are
fetched the connection no longer exists. It also retrieves the
records that are expected to be accessed in the immediate
future. This enhances Scalability of the application to a great
extent.

4. VB.NET uses XML to transfer data between the various layers in


the DNA Architecture i.e. data are passed as simple text strings.

5. Error handling has changed in VB.NET. A new Try-Catch-Finally


block has been introduced to handle errors and exceptions as a
unit, allowing appropriate action to be taken at the place the
error occurred thus discouraging the use of ON ERROR GOTO
statement. This again credits to the maintainability of the code.

By: Mukhtar Hussein Yusuf Page 12


6. Another great feature added to VB.NET is free threading against
the VB single-threaded apartment feature. In many situations
developers need spawning of a new thread to run as a
background process and increase the usability of the
application. VB.NET allows developers to spawn threads
wherever they feel like, hence giving freedom and better control
on the application.

7. Security has become more robust in VB.NET. In addition to the


role-based security in VB6, VB.NET comes with a new security
model, Code Access security. This security controls on what the
code can access. For example you can set the security to a
component such that the component cannot access the
database. This type of security is important because it allows
building components that can be trusted to various degrees.

8. The CLR takes care of garbage collection i.e. the CLR releases
resources as soon as an object is no more in use. This relieves
the developer from thinking of ways to manage memory. CLR
does this for them.

3.2 Resources and requirements


Recommended
Intel centrino duo
RAM 1GB
Processor 1.73 GHZ, 1.73 GHZ
Minimum
Intel Pentium III
RAM 256MB
Processor1000GHZ

3.2.1. Performance Requirements


The system shall be able to support up to twenty people within a
typical 100Mbps Local Area Network with a response time under one
second. This, of course, depends on an adequately configured system
server with enough RAM for the multiprocessing environment, and fast
disk access facilities set up within the clinic. The performance of the
Internet connection cannot be guaranteed, but with a time-out
mechanism.

By: Mukhtar Hussein Yusuf Page 13


3.2.2. Security Requirements
At least secure all Internet Access or Data Exchange with the Secured
Socket Layer (SSL). For data protection & privacy issues, the system
shall not store Credit Card Numbers of a Patient. Furthermore, apply
128-bit Advanced Encryption Standard (AES), or equivalent,
With Hash function to encrypt the whole database for better security.
Because the software caters for multiple users, the main
cryptographic key for the database (DB) should be clinic-based,
possibly to be generated randomly on new system installation. There
should be a facility to backup this main key (e.g. on floppy disk) for
safekeeping and for re-use on e.g. system re-install. The main key
should be well protected within the software package to prevent
unauthorized decryption and reading of the DB, and can be encrypted
in turn by the administrator's/ users' login password.

3.2.3. Software Quality Attributes


The system shall be robust enough that an operational interrupt to the
system shall not corrupt the database easily. In case the database
corrupts for some reason, the data could be recovered easily from the
backup copy.

3.2.4. Other Requirements

Since passenger’ information is highly confidential, the system will be


developed with special attention in terms of system encryption, data
acquisition, data backup and recovery, as well as security.

3.3. Communication Interfaces


The system shall be accessible within a Local Area Network with
multiple PC workstations.

The system can also connect to the Internet with data security
features such as Virtual Private Network (VPN) for data exchange and
other communications.
The system can get access to the POP3 (for incoming) & SMTP (for
outgoing) functions of an Internet email server.
3.4. ABOUT OPERATING SYSTEM

Windows XP is a line of operating systems developed by Microsoft for


use on general
Purpose computer systems, including home and business desktops,
notebook computers and Media canters. The letters ‘XP’ stand for
experience. Windows XP is the successor to both Windows 2000 and
By: Mukhtar Hussein Yusuf Page 14
Windows Me and is first consumer oriented operating system
produced by Microsoft to be built on the Windows NT kernel and
architecture.

The most common editions of operating systems are Windows XP


home edition, which is targeted at home users, and Windows XP
professional, which has additional features such as, support for
Windows server domain and two physical processors and is targeted
at power users and business clients. Windows XP Tablet PC edition is
designed to run the
Tablet PC platform. Two separate 64 bit versions of Windows XP were
also released,

Windows XP 64 bit edition for IA-64(Itanium) processors and Windows


XP Professional x64 edition for x86-64 processors.
System works minimum and maximum capacity recommended

3.4.1. Features of Visual Basic:


1. Good User Interface.
2. OLE Features.
3. Windows API Features.
4. 32 bit Programming Languages.
5. Data Management
6. Online Help
7. Data Access
3.5. FEASIBILITY STUDY

Feasibility study is to check the viability of the project under


consideration. Theoretically various types of feasibilities are
conducted, but we have conducted four type of feasibilities explained
as under.

3.5.1. TECHNICAL FEASIBILITY

Technical feasible system is always accurate, reliable, and secure so


that this feasibility is a most required feature of a system. The
developed system is technically sound. It can work on simple personal
computer its hardware and software requirement and produce output
within a given limited time. It has ability to process small volume of
transaction at speed and provide a great friendly environment to user.

3.5.2. OPERATIONAL FEASIBILITY

The new solution is feasible in all sense but operationally it is not. The
new system demands the expulsion of at least 15 people from the
company. It creates an environment of joblessness and fear among
the employees. It can lead to an indefinite strike in the company also.

By: Mukhtar Hussein Yusuf Page 15


So the management must take corrective actions prior in advance in
order to start the further proceedings.

3.6. Special language Features

3.6.1. Front End

Microsoft Visual Basic.NET is the one I have chosen to be the front end
or the user interface of my this project cozen its quality, powerful,
Rapidness, and intelligent it is object oriented language that can build
high quality GUI with less time.

To moderate the project I should use amalgamation of forms, labels,


combo and list boxes, radio and check boxes, timers, tap controllers
and most important toolboxes

3.6.2. About back end

Microsoft Access 2003.

Microsoft Access is the default database of Microsoft Visual Basic.


Microsoft
Access 2003 provides many new features that make working with data
and designing a database even easier. Microsoft Access Database is a
collection of data and objects related to particular topic or purpose.
Microsoft Access Database may contain tables; queries, forms,
reports, macros modules and shortcuts top data access pages.

Microsoft Access is a Relational Database Management System. Using


Access we can organize our data according to subject and can store
information about how different subject are related. In general MS-
Access database can have several small tables.
Microsoft Office Access, previously known as Microsoft Access, is a
relational database management system from Microsoft that combines

By: Mukhtar Hussein Yusuf Page 16


the relational Microsoft Jet Database Engine with a graphical user
interface and software development tools. It is a member of the 2007
Microsoft Office system.

Access can use data stored in Access/Jet, Microsoft SQL Server, Oracle,
or any ODBC compliant data container (including MySQL and Postgre
SQL). Skilled software developers and data architects use it to develop
application software. Relatively unskilled programmers and non-
programmer "power users" can use it to build simple applications. It
supports some object-oriented techniques but falls short of being a
fully object-oriented development tool.

Access was also the name of a communications program from


Microsoft, meant to compete with ProComm and other programs. This
proved a failure and was dropped. Years later
Microsoft reused the name for its database software.
Access is used by small businesses, within departments of large
corporations, and by hobby programmers to create ad hoc customized
desktop systems for handling the creation and manipulation of data.
Access can be used as a database for basic web based applications
hosted on Microsoft's Internet Information Services and utilizing
Microsoft Active Server
However, only forms, reports, macros and modules are stored in the
ADP file (the other

Immigration Custom

Bank Passenger

Customer

By: Mukhtar Hussein Yusuf Page 17


4. System design

4.1. Introduction

By: Mukhtar Hussein Yusuf Page 18


I visited EGAL INTERNATIONAL AIRPORT records and we check their
system and get some input forms that is used for that system. We
found two types of manual forms:

First I try to get more information about their systems, or how they
record their own transaction ,then I recognize that they use manually
system and also we know that the airport has deferent departments
like
immigration,custom,bank,icio,nasha,security,finance,adminstratration
and etc .

Then I try to make a system part of departments of the airport like the
immigration, custom, bank, financial, head of stuff

 Passenger information
 Goods tax
 Airlines Parking
 Employee attendance
 Bank money exchange
The sample forms are attached with this report in addition to some
cassette covers and stickers.

By: Mukhtar Hussein Yusuf Page 19


4.1.2. E-R Diagrams

By: Mukhtar Hussein Yusuf Page 20


4.1.3. Data Flow Diagram

LEVEL 0 DATA FLOW DIAGRAM

REQUEST FOR INFORMATION PASSENGER/FARE/DISCOUNT

PASSENGER
INFORMATION

1.0

GENERAL

BOOKING IMMIGRATI
ON
ENQUIRY
NEW PNR INFORMATION 2.0

PASSENGER

IMMIGRA..

EXCHANGE REQUEST
3.0

BOOKING
TICKET CONFIRMATION &STATUS
BANK

DEPARTURE REQUEST

4.0

DEPARTURE
ACKNOWLEGMENT

By: Mukhtar Hussein Yusuf Page 21


LEVEL 1 DATA FLOW DIAGRAM OF GENERAL ENQUIRY

SYSTEM

PASSENGER

REQUEST FOR INFOR REQUIRED INFOR


MATION MATION

1.0

GENERAL
R
R
IMMIGRA..
E
I I
E I
R Q
N N
Q N
E U
F F
U F
Q E
O O
E O
U S
R R
S R
E T
M M
T M
S
A A
A
T 1.2 1.3
1.1 T T
T
EXCHANGE ARRIVAL
DEPARTURE I I
I
O O
O
N M
N
R R I R I
I

IMIG.. BANK.. IMIG..

LEVEL 1 DATA FLOW DIAGRAM OF PASSENGER

By: Mukhtar Hussein Yusuf Page 22


SECTION

PASSENGER

ENTRY OF NEW RECORD OR EXISTING


NEW PNR OR REQUIRED INFORMATION
PASSENGER IMMIGRATON

PASSENGER

R
R U I
PASSENGER E
E N N
Q
Q I F
U
U Q PASSENGER PASSPORT (ON THE SPOT)O
E
E U REQUEST ACKNOLEDGEMENT(STAND BY)

UPDATE PASSENGER S
S E
2.2 T
T NEW P
3.0 ACKNOWLEDGEMENT
PASSENGER
BOOKING N
PASSENGER
NOW IMMIG BOOKING
R IMIGRATION
COUNTER LATERUPDATE
R UNIQUE R INFORMATION

PNR
3.2
3.1
STAND BY
PASSENGER
ON THE PASSENGER
CHECKING
SPOT
MONEY ENTRY STAND BY DATE
EXCHANGE SET STATUS TO CONFIRM/WAITING
ACKNOLEDGE
STATUS BANK
IMMIGRAION
CHOOSE STATUS(PAID OR NOT)
MODE OF
PAYMENT DEVIT NUMBER
LEVEL 2 DFD OF DEPARTURE
DEVIT
PAY CASH 3.1.1
STATUS
EXCH

BANK CREDIT NUMBER


S
C-
S
By:TMukhtar Hussein
NO
Yusuf Page 23
CASH T CREDIT
A

T A
CHEQUE
U T
S U

PASSENGER

REQUEST FORCANCELLATION ACKNOWLEDGEMENT

UPDATE

4.0
IMMIGRATION
IMMIGRATION
ACKNOLEDGEMENT
SECTION

4.3
4.1
LEVEL 2 DFD OF IMMIGRATION DEPARTURE
IMMIG

PASSPORT
4.2
REQUES
A CHECK
CHEQUE
T C STATUS
VALID
FOR K
NEW A
IMMIG N
By: Mukhtar Hussein Yusuf
DATE C Page 24
O K

L
PASSENGER PASSENGER PASSENGER
E
D

Logical database design

By: Mukhtar Hussein Yusuf Page 25


4.2. TABLES

Data Dictionary

Log in

Table
Name
Filed Constrai Size Req
Name nts uire
d

Username Text[100] Yes

Log in Password Text[100] Yes

Immigration

By: Mukhtar Hussein Yusuf Page 26


Table
Name
Filed Name Constrain Size Require
ts d

ID Primary Number Yes


Key

full name Text[100] Yes

Given name Text[50] Yes

Place birth Text[100] yes

Immigrati Profusion Text[15] Yes

on Type visa Text[100] Yes

Coming from Text[100] Yes

Going to Text[100] Yes

Passport number Yes


number

Nationality Text[100] yes

Type of journey Text[100] Yes

Gender Text[100] Yes

Place of issue Text[50] Yes

Issued on Text[100] yes

D_O_B Date/time Yes

Street Text[100] Yes

City Text[100] Yes

Country Text[50] Yes

Custom

Table

By: Mukhtar Hussein Yusuf Page 27


Name Filed Name Constrain Size Requir
ts ed

ID Primary Number Yes


Key

full name Text[100] Yes

Company name Text[50] Yes

Designation Text[100] yes

Custom Amount tax Text[15] Yes

Cargo name Text[100] Yes

Cargo from Text[100] Yes

Bank

Table
Name
Filed Name constraint Size Required
s

First name Text[100] Yes

Mid name Text[100] Yes

Last name Text[50] Yes

passport number yes


number

bank Gender Text[15] Yes

Amount Text[100] Yes


exchange

Date time Date/time Yes

Rate Number Yes

Parking fee

Table
Name
Filed Name Constrain Size Requir

By: Mukhtar Hussein Yusuf Page 28


ts ed

ID Primary Number Yes


Key

airline name Text[100] Yes

Country Text[50] Yes

Owner Text[100] yes

Parking Base Text[15] Yes

fee Number of days number Yes

Amount per day number Yes

Parking fee Number Yes

Employee Attendance

Table
Name
Filed Name Contstra Size Required
ints

ID Primary Number Yes


Key

Title Text[100] Yes

First name Text[50] Yes

Mid name Text[100] Yes

attendan Last name Text[15] Yes

ce Attendance date Date/time Yes

Gender Text[15] Yes

Employee registration

Table
Name
Filed Name Constr Size Require
aints d

By: Mukhtar Hussein Yusuf Page 29


Emp_ID Primar Number Yes
y Key

First name Text[100] Yes

Midname Text[50] Yes

last name Text[100] yes

Employee Nationality Text[15] Yes

Address1 Text[100] Yes


registrati
on

Passenger

Table
Name
Filed Name Constrain Size Requir
ts ed

Passenger_ID Text[100] Yes

passenger Passenger name Text[100] Yes

Customer

Table
Name
Filed Name Constrain Size Required
ts

Customer_ID Primary Text[100] Yes


key
customer
Customer name Text[100] Yes

4.3. Normalization

What if we did not normalize the Database to Second Normal


Form?
 Repetition of Data – Description would appear every time we
had an order for the item

By: Mukhtar Hussein Yusuf Page 30


 Delete Anomalies – All information about inventory items is
stored in the Sales Order Detail table. Delete a sales order,
delete the item.
 Insert Anomalies – To insert an inventory item, must insert sales
order.
 Update Anomalies – To change the description, must change it
on every SO.

4.4. User Interface (UI)

Custom form UI

Parking fee UI form

By: Mukhtar Hussein Yusuf Page 31


By: Mukhtar Hussein Yusuf Page 32
By: Mukhtar Hussein Yusuf Page 33
5. Sample Source code
Private Sub frmlogin_Load(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles MyBase.Load
conn.Open()
cmd.Connection = conn
cmd.CommandType = CommandType.Text
cmd.CommandText = ("select * from login")
dr = cmd.ExecuteReader
conn.Close()
End Sub

Private Sub btnlogin_Click_1(ByVal sender As System.Object, ByVal e


As System.EventArgs) Handles btnlogin.Click
conn.Open()

dr.Close()
dr = cmd.ExecuteReader
While dr.Read

If Trim(dr.Item(0)) = Trim(txtusername.Text) Then


If Trim(dr.Item(1)) = Trim(txtpassword.Text) Then
flag = "fadlan ku soo dhawaw adigoo mahadsan"
Dim f As New frmmdi
f.Show()
Me.Visible = False
Exit While
Else
flag = "waa khalad ee ku noqo oo iska hubi"
txtpassword.Text = ""
txtpassword.Select()
End If
Else
flag = "magaca aad galisay waa khalad"
txtusername.Text = ""
txtpassword.Text = ""
txtusername.Select()
End If
End While
c = c + 1
If c > 3 Then
flag = "laguuma aqoonsana inaad gasho mashruucan"
GroupBox1.Enabled = False
End If
MsgBox(flag)
conn.Close()
End Sub
End Class

By: Mukhtar Hussein Yusuf Page 34


6. Implementation

By: Mukhtar Hussein Yusuf Page 35


Implementation: For the implementation of my project the mirror
H/W & S/W requirements as under

Steps implementation

HARDWARE SOFTWARE

Pentium III to IV Window-9x, 2000, 2000server

Attempt 200 MHz MS-Accesses

Ram –32 MB MS-Excel

H.D .space-4xGB MS-Word

FDD-

CD ROM DRIVE-52x
6.1. Steps of implementation are:

 First load VB in system


 Make a software .In this s/w The airlines Management system
is stored.
 First make all form.
 Make Main menu. Join every form with Main menu .
 Main menu open .It show all forms heading.
 Now choose what form will be open then click.
 If Reservation form is open then it show new pnr and ticket
number.
 After put various values we click save bottom.
 It automatically go to report.

By: Mukhtar Hussein Yusuf Page 36


6.2. Snapshots

Log form

The main reason of log in is for unauthorized people who will attempt to find out, or
crack, your password. Once they get your password, they can do awful things to any
information stored in The Airport Database. Even worse, they may be able to do awful
things to the accounts of other people on the system, or even break in to systems across
the world from ours. So the argument, "I don't need a good password, I don't have
anything in my account, anyway" doesn't work. System security is everyone's
responsibilityPasswords are the primary method Red Hat Enterprise Linux uses to verify
a users identity. This is why password security is enormously important for protection of
the user, the workstation, and the network.

So unless you are the authorized person you will not be allowed to access this AMS
Software.

By: Mukhtar Hussein Yusuf Page 37


Main form

By: Mukhtar Hussein Yusuf Page 38


Immigration form

This form can be obtained by clicking the “Immigration” of the


1st button “Immigration Registration” for passenger entry. The
following text boxes have been provided for entry of New
passenger

1. Full name
2. Birth date
3. Passport no
4. Gender and so many others

In addition to above different Save, Delete, Add, Load,


Update and Close command buttons have been provided in
the form.

By: Mukhtar Hussein Yusuf Page 39


Custom form

This form can be obtained by clicking the “Custom” of the 1st


button “Custom Registration” for Custom entry. The following
text boxes have been provided for entry of New Customer to
Custom information

1. ID
2. Full name
3. Company name
4. Cargo from and others

In addition to above different Save, Delete, Add, load,


upate and Close command buttons have been provided in
the form.

By: Mukhtar Hussein Yusuf Page 40


Employee attendance

This form can be obtained by clicking the “Employee” of the


1st button “Employee registration” for Custom entry. The
following text boxes have been provided for entry of New
employee information

1. ID
2. First name
3. title
4. gender and others

In addition to above different Save, Delete, Add, load,


update and Close command buttons have been provided in
the form.

By: Mukhtar Hussein Yusuf Page 41


Bank form

This form can be obtained by clicking the “Bank” of the 1st


button “Bank registration” for Custom entry. The following text
boxes have been provided for entry of New Bank information

1. ID
2. First name
3. Amount money exchanged
4. Passport Number and others

In addition to above different Save, Delete, Add, load,


update and Close command buttons have been provided in
the form.

By: Mukhtar Hussein Yusuf Page 42


Parking form

This form can be obtained by clicking the “Parking” of the 1st


button “Parking fee registration” for parking fee entry. The
following text boxes have been provided for entry of New
parking information

1. ID
2. Airline name
3. country
4. amount of money and others

In addition to above different Save, Delete, Add, load,


update and Close command buttons have been provided in
the form.

By: Mukhtar Hussein Yusuf Page 43


Passenger form

This form can be obtained by clicking the “Passenger” of the


1st button “Passenger registration” for passenger entry. The
following text boxes have been provided for entry of New
passenger information

1. passenger ID
2. passenger name

In addition to above different Save, Delete, Add, load,


update and Close command buttons have been provided in
the form.

By: Mukhtar Hussein Yusuf Page 44


Change password form

By: Mukhtar Hussein Yusuf Page 45


Search engine

This form can be obtained by clicking the “Search Engine”


under the 5th menu “Search Engine” for searching a particular
table, searching to user from the library along with the search.

By: Mukhtar Hussein Yusuf Page 46


5.1. 2.Crystal reports

Immigration report

By: Mukhtar Hussein Yusuf Page 47


Custom report

By: Mukhtar Hussein Yusuf Page 48


Bank report

By: Mukhtar Hussein Yusuf Page 49


Employee attendance report

By: Mukhtar Hussein Yusuf Page 50


Parking fee report

By: Mukhtar Hussein Yusuf Page 51


By: Mukhtar Hussein Yusuf Page 52
7. Testing objectives

This section introduces the concept of testing and how


important is, for the successful implementation of the project.
Different phases of testing are described along with the level of
testing incorporated in this particular project. Testing is vital to the
success of any system. System testing makes a logical assumption
that if all phases of the system are correct, the goals will be achieved
successfully. Inadequate testing at all leads to errors that may come
up after a long time when correction would be extremely difficult.

7.1. Types of testing

Black Box Testing

Also known as functional testing, this is a software testing technique


whereby the tester does not know the internal working of the item
being tested. Black-box test design treats the system as a “black-
box”, so it does not explicitly use knowledge of the internal structure.
Black-box test design is usually described as focusing on testing
functional requirements. Synonyms for black-box includes:
behavioral, functional, opaque-box and closed-box.

White Box Testing

White box test design allows one to peek inside the “box”, and it
focuses specifically on using internal knowledge of the software to
guide the selection of test data. Synonyms for white-box include:
structural, glass-box and clear-box.

Various Levels Of Testing


Before implementation the system is tested at two levels:

Level 1

Level 2

Level 1 Testing (Alpha Testing)

By: Mukhtar Hussein Yusuf Page 53


At this level a test data is prepared for testing. Project leaders test the
system on this test data keeping the following points into
consideration:

Level 2 Testing (Beta Testing)

Here the testing is done on the live database. If errors are detected
then it is sent back to LEVEL 1 for modification otherwise it is passed
on to LEVEL 3

By: Mukhtar Hussein Yusuf Page 54


8.1. Conclusion

Though the system still is containing lot of scope of improvement in it.


But its overall look and feel gives rough picture of on existing
automation system.

I have take MS-Access at backhand but it has a limitation of 1 GB


size .It over data size approaches this 1gb some other database the
SQL server ,oracle, can be used with OBBC to break this barrier.

By: Mukhtar Hussein Yusuf Page 55


By: Mukhtar Hussein Yusuf Page 56
9. BIBLIOGRAPHY

In order to obtain more information regarding the present study and to


substantiate it with theoretical proof, the following references were
made:-

 Library of College
 Insurance chronicle

Websites visited:

 www.google.com
 www.aivbcode.com
 www.alwardigroup.com
Books visited
 Step by step book
 Vb.net book

By: Mukhtar Hussein Yusuf Page 57

Potrebbero piacerti anche