Search
Search
Search
Download
Save
Related
Info
Search
Uploaded by rohit47474
1. INTRODUCTION
The college transport pass comprises of manual work for both transportation division andfurthermore
for students by remaining over a line for a considerable length of timeclose counters to complete their
pass where the transportation office group, enter the points of interest of the students physically. By
proceeding with this manual procedure it requires parcel of investment to see and favor the verifications
given byeach candidate productively. The span is more between applying for the pass andrecovery of
pass. For applying of pass the students ought to again visit adjacentcounters.
$ou can%t find all the bus pass related information in transportdepartment.
This online bus pass software system will help users get bus passes online and eliminate the need of
standing in queues for passes and wasting their time.
2.'iteratre #rve$
2.1 Intro(ction
This project is developed in &ava under 'indows platform. #n this modern world of computers, every
noun of our vocabulary represents a class of objects sharing some set of characteristics and functional
traits. &ava leads itself naturally in embodying these areas intoits own application domain.
2.1.1 )tml
(T), an acronym of (yper Text arkup )anguage, is the predominant markuplanguage for web pages. #t
provides a means to describe the structure of text*basedinformation in a document by denoting certain
text as links, headings, paragraphs, lists, andso on and to supplement that text with interactive forms,
embedded images, and other objects.(T) is written in the form of tags, surrounded by angle brackets.
(T) can also describe, to some degree, the appearance and semantics of adocument, and can include
embedded scripting language code +such as &avacript- which canaffect the behavior of 'eb browsers
and other (T) processors. 'eb pages are built withthe help of this (T) which are called the 'eb
"ocuments.
Collection
+sometimes called a /ontainer- is a group of data that is manipulated as a singleobject. This corresponds
to a
bag
- is to insulate client programs from common implementations like an array, linkedlist, hash table,
balanced binary tree, etc.The /ollection Framework is very similar to the tandard Template )ibrary +T)-
found in /11. /ollections can contain only 2bject reference types +no primitives-. The
programmer can make a container class thread safe +concurrent access- as well as making
itnot*modifiable.
/ollections Framework takes the issue of 3holding your objects3 and divides it intotwo distinct concepts4
Collection!
and
Ma!
. The key distinction between the two types of containers is the number of items that each holds in an
individual location. /ollection holdsone element while a ap holds two.
Collection
group of individual elements, often with some rule applied to them. )ist must hold theelements in a
particular order +or sequence-, while a et cannot have any duplicate elements.
Ma
group of 3key5value3 object pairs. lthough this looks like a 3/ollection of pairs3, tryingto implement it
in this way would prove very difficult. ap can be thought of as a minidatabase. flavor of a ap is a
(ashap. s a 6erl programmer, the idea of a ap may look familiar. #t is basically an 3ssociative rray3.
+#n short, your keys are not integers like that
of an array, they are trings-. 7se the put+- method 8passing the key and value9 to add anelement to a
ap.
,rra$,rra$! are ver$ !imle to imlement in +ava bt a! !everal (ra*bac0!
ust know in advance how many items will need to be stored since rrays arefixed in si:e.
For rrays that store built*in types, the data is store directly in the rray.
For rrays that store objects, only the object 3reference3 is actually stored inthe rray. ;eep in mind that
all normal rules of reference variables and castingapply.
For all rrays declared as 2bject89, then object references of <$ type can bestored in it without casting,
though a valid cast is required to take an 2bjectreference out and use it as its original type.
"efine an array using either of the following4 int89 a=> 5 2? 5 int a=89>Both declarations produce the
same result. The later actually conforms toexpectations from / and /11 programmers. The former,
however, is probably
a more sensible syntax, since it seems to directly say4 3an int array3. This is thestyle used by most &ava
6rogrammers.
@asy to return an array +the method simply returns a reference to the rray-, but with &ava you don0t
have to worry about memory leaks
binar$#earc45 !ort4
/omparison4
e6al!4
(many overloaded)
#nstantiation4
fill4
/onversion4
a!'i!t4Iterator
Iterator
interface is to provide a way to select each element in acollection.
2.1.3 +!
The un icrosystems%s java server pages technology allows you to rapidly develop andeasily maintain
rich, dynamic web pages. s a part of java family &6 enables developmentof web based applications
that are platform independent. The web applications build using &6 technology works with a wide
variety of webservers, application servers, browsers and development tools. The logic that generates
thecontent is encapsulated in tags and &avaBeans components and tied together in scriptlets, allof
which are executed on the server side. #f the core logic is encapsulated in tags and Beansthen other
individuals, such as web masters and page designers, can edit and work with &6 pages without
affecting the generation of the content. Thus the &6 technology separates the user interface from the
content generation.
&6 page is simply an (T) web page, which contain additional bits of code that generatesdynamic
content of the page. &6 technology is a part of java family. #t uses a java programming language based
scripting language and &6 are compiledinto java servlets the first time they are invoked. &6 pages may
call &avaBeans, @&Bcomponents, ?# objects, "B/ objects to perform processing on the server.
@xample &6 page may contain (T) that display static text and graphics, as well as a method call to&"B/
object that access database, when the page is displayed in a user%s browser.
/eatre! Of +!
&6 technology follows the write once run anywhere rule which is the basic of the java language.
&6 uses pure java and takes the advantage of its object oriented nature
&6 uses a combination of tags and scripting to create dynamic web pages.
The &6 page uses the components like @&B, &avaBeans which are reusable. Thisgives the &6
reusability capabilities.
pplications made using &6 technology are easier to maintain.
+ava #crit
"etecting the user0s browser and 2. The ability to detect the user0s browser and 2allows your script to
perform platform*dependent operations, if necessary.
alidating the user0s input. <ote that &avacript helps the browser perform input validation without
wasting the user0stime by the 'eb server access. #f the user makes a mistake in the input, the user will
get anerror message immediatelyC 2n the other hand, if the input information is validated only onthe
server, then the user would have to wait for the server response.
&ava cripts are used as (T) tags alone will not be sufficient in developing anapplication interactively.
alert+DstringE- 4This message is known as confirmation message. By this we candisplay an alert window.
onsubmit+- 4#t is invoked as soon as the user press the submit button on the web page
Databa!e Mo(el
ccessing the database through applets and &"B/ 6# via an intermediate server resulted ina new type
of database model which is different from the client*server model. Based onnumber of intermediate
server through which the request should go is classified as single tier,two tier and multi tier architecture.
a4#in"le Tier
#n a single tier the server and client are the same in sense that a client program thatneeds information
+client- and source of this type of architecture is also possible in java, in case flat files are used to store
the data. (owever this is useful only in case of small applications. The advantage with this is the simplicity
and portability of theapplication developed.
#n two tier architecture the database resides in one machine in the network. #n thistype of architecture
a database management takes control of database and providesaccess to clients in a network. This
software bundle is also called as server. oftwarein different machines, requesting for information are
called as client*server.
ServerClient
Database
#n the three tier architecture , any number of servers can access the database thatresides on server
which in turn serve clients in a network. For example, you want toaccess the database using java applets,
the applet running in some other machine, cansend request only to the server from which it is
downloaded. For this reason we willneed to have an intermediate server which will accept the requests
from applets andthen to the actual database server. This intermediate server acts as a two*way
communication channel also. Thisis the information or data from the database is passed on to the applet
that isrequesting it. This can be extended to make n tiers of servers, each server carrying tospecific type
of request from clients. (owever in practice only tier architecture is popular.
The &"B/ drivers that we are aware of at this time fit into one of four categories.
This type of driver converts &"B/ calls into calls on the client 6# for oracle ybase,#nformix, "bG, or
other "B. <ote that, like the bridge driver, this style of driver requires that some binary code be loaded
on each client machine.
This driver translates &"B/ calls into a "B independent net protocol, which isthen translated to a "B
protocol by a server. This net server middle*ware is able toconnect its all java clients to many different
databases. The specific protocol useddepends on the vendor. #n general, this is most flexible &"B/
alternative.
Client
#t is likely that all vendors of this solution will provide products suitable for intranet use. #n order for
these products to also support #nternet access, they musthandle the additional requirements for
security, access through firewall, etc that theweb imposes. everal vendors are adding &"B/ drivers to
their existing databasemiddleware products.
This kind of driver converts &"B/ calls into network protocol used by "Bdirectory. This allows a direct
call from the client machine to the "B server that is practical solution for intranet access. ince many
of these protocols are proprietary,the database vendors themselves will be the primary source. everal
database vendorshave these in progress. @ventually, we expect that driver categories and H will be the
preferred wayto access database from &"B/. "river categories = and G are interim solutions wheredirect
all java drivers are not yet available. /ategory H is in some sense the ideal.(owever, here are many cases
where category may be preferable. @xample* where athin "B* independent client is desired, or if a
"B I independent protocol isstandardi:ed and implemented directly by many "B vendor.
There is a high demand for the students that they need to communicate with each other from any place
to any place to synchroni:e their bus information.
To change the bus routes again application form must be filled. nd long process of changing the route
fees according to the distance.
The software system allows the users to get bus passes online and eliminate the need of standing
inqueues for passes.2nline bus pass software system allows the users to4
erification of the student can be done in online using student roll no and photo proofs. 2nceall the
details are verified the system request the user to mention the route they want to travel provided by
college by paying amount through online.
#t also shows appropriate schemes for quarterly, one sem and yearly passes.
The admin should maintain a record of the pproved passes and "isapproved passes of theapplicants for
to avoid further violations.
10
3. ,N,':#I#
3.1 Intro(ction
?equirement analysis in system engineering and software engineering encompasses thosetasks that go
into determining the needs or conditions to meet for a new or alerted product, taking account of the
possibly conflicting requirements of the variousstakeholders, such as beneficiaries or users.
#nput design is a part of overall system design. The main objective during the input design is as given
below4
INPUT #T,89#
"ata recording
"ata transcription
"ata conversion
"ata verification
"ata control
"ata transmission
"ata validation
"ata correction
INPUT T:P9#
#t is necessary to determine the various types of inputs. #nputs can be categori:ed as follows4
11
Cancel Anytime
Share this document
Sharing Options
Share On Facebook, Opens A New WindowShare On Twitter, Opens A New WindowShare On LinkedIn,
Opens A New WindowShare With Email, Opens Mail ClientCopy Text
Related Interests
Carousel Next
UPLOADED BY
Pratik Modak
UPLOADED BY
Aesha_BA
Aesha_BA
UPLOADED BY
sri_anji01
maleek brown
UPLOADED BY
Wasim Khan
UPLOADED BY
faizan52
software engineering
software engineering
UPLOADED BY
UPLOADED BY
Akash Shah
Technos_Inc
UPLOADED BY
FreeProjectz.com
UPLOADED BY
rahulsogani123
5.System Planning
5.System Planning
UPLOADED BY
SandyShreegadi
UPLOADED BY
jimmygehloach
Ch 1 Introduction
Ch 1 Introduction
UPLOADED BY
MuhammedYeshaw
UPLOADED BY
jay20074u
Out
Out
UPLOADED BY
ridwansurono
Software Engineering
Software Engineering
UPLOADED BY
Bhavesh Pipaliya
synop
synop
UPLOADED BY
ravindersingh588
CSSE201
CSSE201
UPLOADED BY
api-3843988
310-083d
310-083d
UPLOADED BY
Oindrila Ghosh
Project Mgmt
Project Mgmt
UPLOADED BY
Nikhil Khobragade
UPLOADED BY
Pritam Das
Nandan Pasupuleti
sad(session-2)
sad(session-2)
UPLOADED BY
amity_acel
UPLOADED BY
HHS
Interview Questions
Interview Questions
UPLOADED BY
Shravan Kumar
IEEE730-2002 OutlineTemplate
IEEE730-2002 OutlineTemplate
UPLOADED BY
manfredm6435
SOPCS
SOPCS
UPLOADED BY
KalpanaShanmugham
SDLC tpes
SDLC tpes
UPLOADED BY
Pavithra Shivan
Carousel Next
UPLOADED BY
Hugo Ribeiro
UPLOADED BY
rohit47474
UPLOADED BY
rohit47474
Low Power Digital CMOS VLSI
UPLOADED BY
rohit47474
Carousel Next
UPLOADED BY
govindbirajdar
UPLOADED BY
Cache Line
MY S-Function prest.ppt
MY S-Function prest.ppt
UPLOADED BY
infodotz
UPLOADED BY
Karthikeyan
VBSCript
VBSCript
UPLOADED BY
Shiv Shankar
SCM Introduction
SCM Introduction
UPLOADED BY
Srinivasu Gadde
UPLOADED BY
Lamija Cemalovic
UML2.5
UML2.5
UPLOADED BY
g007adam759
UPLOADED BY
Janko Schmidt
UPLOADED BY
مهرمون
RegexKitLite-4.0
RegexKitLite-4.0
UPLOADED BY
johne
UPLOADED BY
UPLOADED BY
Nishanth Thomas
UPLOADED BY
pavani21
pre pspm 2
pre pspm 2
UPLOADED BY
lancaugila
UPLOADED BY
samyuktha39
C++Assignment-4
C++Assignment-4
UPLOADED BY
Ani Vin
UPLOADED BY
gmorriso
OOAD
OOAD
UPLOADED BY
hasmukh_mali
Aop
Aop
UPLOADED BY
api-3706733
UPLOADED BY
Espe Wiesse
gbhgchhg
gbhgchhg
UPLOADED BY
Ismail Msw
UPLOADED BY
javedsajid
UPLOADED BY
bodi16
applet
applet
UPLOADED BY
dharma.chahar
D39717-plsql
D39717-plsql
UPLOADED BY
thulasiramaswamy
ch01
ch01
UPLOADED BY
api-3779640
UPLOADED BY
Abdul GA
UPLOADED BY
Satish Babu
Stack Exchange
Stack Exchange
UPLOADED BY
Rajesh Manna
ABOUT
About Scribd
Press
Our blog
Contact Us
Join today
Invite Friends
Gifts
SUPPORT
Help / FAQ
Accessibility
Purchase help
AdChoices
Publishers
LEGAL
Terms
Privacy
Copyright
Social Media
Site Language:
English
Change Language