DLF IPL
for
Department of Computer
Applications, CUSAT
A
Project Report
Submitted for partial
fulfillment of the degree of
Master of Computer Applications
By
CERTIFICATE
Head of Department
Official Address
ACKNOWLEDGEMENT
SYNOPSIS
Title : DLF IPL
Duration : 3 months
Application Software
CONTENTS
Page No.
1. Introduction
2. System Study
2.1 Existing System
2.2 Drawbacks in the Existing System
3. System Analysis
3.1 Proposed System
3.2 Scope
3.3 Need for the Proposed System
3.4 Feasibility Study
3.4.1 Technical Feasibility
3.4.2 Financial Feasibility
3.4.3 Operational Feasibility
4. Requirement Analysis
4.1 User Class and Characteristics
4.2 Functional Requirements
4.3 Performance Requirements
4.4 Non Functional Requirements
4.5 External Interfaces Requirements
4.6 General Constraints, Assumptions, Dependencies, Guidelines
9. Conclusion
10. Scope for further development
11. Bibliography
11. Appendices
1. INTRODUCTION
6 Deepak Kumar Singh , Department of Computer Applications, CUSAT
DLF INDIAN PREMIER LEAGUE
2.SYSTEM STUDY
Especially users those have keen interest in cricket will be in the
center of this project. This system can be used and enjoyed by the
variety of users. Since it provides all the information and statistics that
a user would like to see in his/her website.
1. They does not have good Interface i.e. a lots of color is used
which is not friendly at all.
2. SYSTEM ANALYSIS
3.1 Purpose:
As we know that cricket is too much popular in our country and there are lack
of certain good web portals which can give them so much knowledge about
these type of tournaments.
So by using this web portal user can get all the important knowledge about
the IPL T-20 tournament .
Proposed web portal is designed for giving information about the Indian
premium league
3.2 Scope:
So by using this web portal user can get all the important knowledge about
the IPL T-20 tournament .
Proposed web portal is designed for giving information about the Indian
premium league
Many feasibility studies are disillusioning for both users and analysts. First,
the study often presupposes that when the feasibility document is being prepared,
the analyst is in a position to evaluate solutions. Second, most studies tend to
overlook the confusion inherent in system development- the constraints and the
assumed attitudes. If the feasibility study is to serve as a decision document, it
must answer three key questions :
1. Is there a new and better way to do the job that will benefit the user ?
2. What are the costs and savings of the alternative(s)?
3. What is recommended?
The most successful system projects are not necessarily the biggest or most
visible in a business but rather those that truly meet user expectations. More
projects fail because of inflated expectations than for any other reason.
2. Technical Feasibility
This is concerned with specifying equipment and software that will successfully
satisfy the user requirement. The technical needs of the system may vary
considerably, but might include:
3. Operational Feasibility
It is mainly related to human organizational and political aspects. The points to be
considered are:
what new skills will be required? Do the existing staff members have these skills?
For operational feasibility study we appointed a small group of people who are
familiar with information system techniques, who understand the parts of the
business that are relevant to the project and are skilled in system analysis and
design process.
4. Social feasibility
5. Management feasibility
It is a determination of whether a proposed project will be acceptable to
management. If management does not accept a project or gives a negligible support
to it, the analyst will tend to view the project as a non-feasible one.
6.Legal feasibility
A. General Public.
B. Administrator.
1. Security
2. Reliability
3. Maintainability
4. Portability
5. Extensibility
6. Reusability
7. Application Affinity/Compatibility
8. Resource Utilization
SOFTWARE REQUIREMENTS:-
OPERATING SYSTEM:- MS WINDOWS 2000, Window-XP..
FRONTEND PLATFORM :- HTML, Java-Script, CSS.
WEB BROWSER:- Internet explorer , Google chrome.
HARDWARE REQUIREMENTS:-
MICROPROCESSOR :- Pentium IV (1.4 GHZ)
RAM :- 256 MB
MOTHERBOARD :- INTEL 810E
(VGA/SVGA/UVGA)
These are symbols that represent data flows, data sources, data
transformations and data storage. The points at which data are
transformed are represented by enclosed figures, usually circles,
which are called nodes. The principle processes that take place at
nodes are:
REQUEST
GEN PUB.
REQUEST
DATA
BASE
ADM.
SERVER
Table Name:person --
This table stores the details of a person which are Booked ticket for IPL.
Login Validat
e
Perform
next task
Informatio
n
Logout
User2
6. TESTING
Software Testing is an empirical investigation conducted
to provide stakeholders with information about the quality of the
product or service under test, with respect to the context in which
it is intended to operate. Software Testing also provides an
objective, independent view of the software to allow the business
to appreciate and understand the risks at implementation of the
software. Test techniques include, but are not limited to, the process
of executing a program or application with the intent of finding
software bugs. It can also be stated as the process of validating
and verifying that a software program/application/product meets
the business and technical requirements that guided its design
and development, so that it works as expected and can be implemented
with the same characteristics.
written and run by software developers to ensure that code meets its
design and behaves as intended. Its implementation can vary from being
very manual (pencil and paper) to being formalized as part of build
automation.
The IEEE Standards for the Software Quality Assurance Plans states that the plan
should contain the following sections:
1. Purpose
2. Reference documents
3. Management
4. Documentation
5. Standards, practices and conventions
6. Reviews and Audits
7. Configuration Management
8. Problem reporting and corrective action
9. Tools, techniques and methodologies
10.Code Control
11.Media Control
12.Supplier Control
36 Deepak Kumar Singh , Department of Computer Applications, CUSAT
DLF INDIAN PREMIER LEAGUE
The goal of the SQA program is to verify that all software and documentation to be
delivered meet all technical requirements.
2. Reference documents:
3. Management:
An IEEE standard lays down three aspects that should be covered in the
Software Quality Assurance Plan:
Figure below shows the SQA organization with relation to the project
organization:
Program
Management/
Line Management
(Sponsor)
IV &V SEPO
SQA
Project
Management
SCM
The following describes the functional groups that influence and control
software quality.
Carry out planned internal audits of the project to assess compliance with
quality objectives.
Agree on corrective action with the project manager for any discrepancies,
non-conformities found and ensure that corrective action is taken.
Evaluate defect trends and take appropriate action.
4. Documentation:
The basic purpose of the documentation section of the Software Quality Assurance
Plan is to describe the documentation to be produced and how it is to be reviewed.
The documentation section normally includes the following:
The review and audits sections of Software Quality Assurance Plan will state
which technical and managerial reviews will be undertaken and how they will be
carried out. The ANSI standard suggests that the following would be a minimum
set of reviews:
7. Configuration Management:
Tools - SQA software tools include, but are not limited to, operating
system utilities, debugging aids, documentation aids, checklists, structuring
preprocessors, file comparators, structure analyzers, code analyzers, standards
auditors, simulators, execution analyzers, performance monitors, statistical analysis
packages, software development folder/files, software traceability matrices, test
drivers, test case generators, static or dynamic test tools, and information
engineering CASE tools.
Techniques - techniques include review of the use of standards,
software inspections, requirements tracing, requirements and design verification,
reliability measurements and assessments, and rigorous or formal logic analysis.
Methodologies - methodologies are an integrated set of the above
tools and techniques. The methodologies should be well documented for
accomplishing the task or activity and provide a description of the process to be
used.
Fire Damage
Water Damage
Energy Variations
Structural Damage
Pollution
Unauthorized Intrusion
Viruses and Worms
Misuse of Software, Data and Services.
12.Supplier Control:
8. SCREEN SHOTS
(Main page screen)
9. CONCLUSION
This is to conclude that the project that I
undertook was worked upon with a sincere effort. Most of the
requirements have been fulfilled up to the mark and
the requirements which have been remaining, can be completed with a
short extension.
Since Cricket Makes the Indian Crazy, The DLF-IPL site provides
a Single Platform to get All Information about Cricket & Fulfill Your Desire
to Entertained Completely.
12. BIBLIOGRAPHY
THANKS