Académique Documents
Professionnel Documents
Culture Documents
CIMS
Objectives
Primary objective of the project titled CIMS is to have an efficient
system in place to help the computer institution in job handling. The system should help
management and all staff in their working and reduce overhead.
Like other offices a computer institution management also constitute several
related and different sub process. Main Processes happening at a computer institute
starts with enquiry. Next is admission, keep track of course progress and fee payment,
conducting examinations, distributing certificates and maintaining a relationship with
them for future benefit. These all are a chained process and related to each other. Other
Processes like keeping list of collaborating agents, course details, income expense
management, and resource management, report preparations etc., are not sequential and
can be related.
Computer institution management software must computerize all these
processes and make management simple.
Project Synopsis
CIMS
Microsoft Windows XP
Hardware requirement
Processor
Memory size
Storage
Display
Screen Resolutions
Key Board
Mouse
:
:
:
:
:
:
:
Printer
: HP
Software requirement
Operating System
Language
Database
:
:
:
Microsoft Windows XP
C#.Net
SQL Server 2008
Windows XP
Windows XP features friendly new screens, simplified menus, and a whole lot
more. Discover the fresh, streamlined design of Windows XP. Get acquainted with key
tasks and basic commands.
Safe and Easy Personal Computing: Windows XP makes personal computing
easy and enjoyable! Power, performance, a bright new look, and plenty of help when
you need it. Windows XP has it all, along with unmatched dependability and security.
Unlock the World of Digital Media: Unlock the exciting world of digital
media at home, at work, and on the Internet. Enjoy photography, music, videos,
computer games, and more.
The Connected Home and Office: Share files, photos, music, even a printer
and Internet connectionall on a network that is private and secure.
Best for Business: With Windows XP, you get the proven dependability of
Microsoft Windows 2000, enhanced for high-speed performance and even greater
reliability.
Project Synopsis
CIMS
Project Synopsis
5.1
CIMS
PROBLEM DEFINITION
5.2
REQUIREMENT SPECIFICATIONS
When problems are identified, it is usually toward the end of the projectin system testing or even conversion. The people who are most active during system
development are programmers. This was one reason a great deal of attention has been
given to improving the maintainability of programming. Actually, however, the problem
typically begins during the initial stages of the project. So there is a need for
establishing an overall framework that will lead to a successful implementation. There
are several steps in establishing a project.
1. Understand the problem: Each project should be studied to evaluate the degree of
change, the scope of the project, and the cost of late completion. Projects that involve a
high degree of change and require a close working relationship with the user staff
normally require only a written objective, a target data and responsible person. How
much management is needed in either project is a decision that involves a delicate
balance between risk and cost.
2. Specify project responsibility. The user executive should sponsor the project and be
responsible for the right amount of user involvement.
Requirements of CIMS
Our aim is to develop a system which assists a computer institution staff
to do their day to day works. Main requirements are agency details and course details
management, enquiry and admission details management, Fee collection, Salary
payment and income expense details management etc.
Project Synopsis
CIMS
Functional Requirements
When user open the software Login form must be displayed. Login form must
allow user to Register or allow registered user to Login with their username and
password.
System should allow adding, editing or deleting Collaborating agency details.
Collaborating agency details insertion and editing should be possible only with
administrator privilege.
System should have options to add, edit, delete and print different course
details.
System should allow handling enquiry details, admission details and not joined
details.
System must have options to monitor follow up details. And it should provide
proper details for calling students.
Enquiry follow up should contain only those enquiries that are not joined yet
and it must filter enquiries.
System should have options to monitor fee collection and keep track of course
progress, attendance, and fee remittance.
System must provide various reports of enquiry, admission, not joined enquiry,
fee collection, salary payment, income and expense, attendance, and
examination on daily, weekly and monthly basis as per need.
Nonfunctional Requirements
Easy to use
Data Entry should be as minimum as possible
High Data Security
Simple forms
Proper Tool tips
Error detection and correction
Avoid duplicates
Fast and Efficient searches
Proper validation
Minimum memory requirement
Project Synopsis
5.3
CIMS
Cost estimation
One task in project planning is estimation. Only a rough estimation of each time
and effort can be calculated at the early stage. As the project progresses, further
estimation can be done. Following is a process-based estimation of the activities
involved in the project.
Activity
Duration in weeks
%effort
Requirements Gathering
18%
Analysis Modeling
27%
System Design
24%
Coding
18%
Testing
13%
Total
22
100%
Development includes all the stages from the initial investigation to the
successful handover of the final system to the user.
The major cost elements considered in the cost estimation of the project under
consideration are:
Equipment Cost:
Equipment costs result from acquiring or using all the devices associated
with the work. In some cases it will be treated as an operating cost.
Operating Cost
Operating costs, the expenses incurred to run the system are variable depending
on the amount of use required for a system component. The coding is done in the Visual
Studio.Net. Thus the operating systems used here are costly and require large memory.
Project Synopsis
CIMS
Rs.5,000
150 hours
Project cost
Rs. 20,000
5.3.2
PROJECT SCHEDULING
Design
3
Coding
6
7
Testing
Investigation
Data Collection
5
GANTT CHART
Gantt charts are planning technique that provide definition to tasks to be
performed and when they are to start and finish. This method uses black color to
indicate amount of time spent on each task. The activities are mentioned in the
estimation table. The duration in weeks is specified in the black color which shows
activities. The tasks are listed from top to bottom in the order they are undertaken.
Task
Requirement
Gathering
System
Analysis
System
Design
October
Nov
Dec
Jan
Feb
March
Coding
Testing
Build
Project Synopsis
6.
CIMS
In todays life every thing is automated. Now Paper documents and forms are
not part of our life. So we require a computer system and digitized documents
everywhere. Here is our CIMSs importance as software for computer institution
management. My project has a big scope to do. Our system can manage all activities of
a computer institution in simple and efficient manner. CIMS is management software,
which enables an institution management to:
Project Synopsis
CIMS
7. ANALYSIS
7.1 DATA FLOW DIAGRAM
Level-0
Level-1
Project Synopsis
CIMS
10
Project Synopsis
CIMS
11
Project Synopsis
CIMS
12
Project Synopsis
CIMS
1.2
1.3
2. Activity Module:
Activity module is the main module of CIMS as it handles all main activities of
a Computer institution. Activity module contains 7 sub modules which are important in
the system. They are: - Course Module, Enquiry Module, Admission Module, Enquiry
follow-up module, Scheduling Module and Examination Module.
2.1
2.2
2.3
2.4
2.5
2.6
13
Project Synopsis
CIMS
3.2
Fee Info Module: This sub module handles Monthly fee collection and
identifies students who not pay fee correctly.
3.3
Income Expense Module: This sub module deals with all income
expense details.
4. Report Module:
4.1
4.2
4.3
Modularization Chart
14
Project Synopsis
CIMS
8.2 Tables
A database can be thought of as a set of logically related files organized to
facilitate access by one or more applications programs and to minimize data
redundancy. It is a stored collection of data, organized on the basis of relationships in
the data rather than the convenience of storage structures.
The database structure consists of following tables:
Si No
:
Table Name :
Field Name
AgencyId
DateCreat
RegId
HeadId
Si No
Table Name
:
:
1
agency_table
Data Type Size
Varchar
5
datetime
8
int
4
int
4
Constraint
Description
Primary Key Agent Id
NotNull
Date of entry of agency details
Foreign Key Regional Office Id
Foreign Key Head Office Id
2
ContactPerson_tab
Size
4
30
30
50
30
Constraint
Primary Key
Not Null
Not Null
Not Null
Not Null
Description
Contact Person Id
Designation of Contact
Personof Contact Person
Name
Contact Numbers
of
Contact
Email IdPerson
of Contact Person
Si No
:
Table Name :
Field Name
Id
Name
PrintName
Address
PhoneNo
Fax
EmailId
CPId
Emblem
3
Office_Tab
Data Type Size
Int
4
Varchar
10
Varchar
30
Varchar
250
Varchar
15
Varchar
15
Varchar
30
Int
4
Varchar
50
Constraint
Primary Key
Not Null
Not Null
Not Null
Not Null
Not Null
Not Null
Not Null
Not Null
Description
Office Id
Office Name
Full Name
Address of office
Contact number
Fax number
Email Id
Contact Person ID
Path of emblem file
Si No
:
Table Name :
Field Name
Studid
Date
P_A
4
Attend_Table
Data Type Size
Int
4
int
4
int
4
Constraint
Primary key
Primary key
Not Null
Description
Student Id
Date
Present or Absent or holyday
Field Name
CPId
Designatio
n
Name
Contactno
Emailid
Data Type
Int
Varchar
Varchar
Varchar
Varchar
15
Project Synopsis
CIMS
Si No
:
Table Name :
Field Name
StaffId
Name
Address
Cpid
Dob
qualificaio
n
salary
5
Staff_Table
Data Type Size
Int
4
Varchar
25
Varchar
150
Int
4
Datetime
8
Varchar
25
float
8
Constraint
Primary key
Not null
Not null
Foreign key
Not null
Not null
Not null
Description
Staff Id
Staff name
Staff address
Contact Person Id
Date of birth
Qualification of staff
Salary of staff
Si No
:
Table name :
Field Name
Code
coursenam
name
printname
6
course_table
Data Type Size
Int
4
varchar
10
Varchar
30
Constraint
Primary Key
Not Null
Not Null
Description
Course Code
Course Name
Full Name of Course
duration
MinQua
syllabus
CsFee
STax
Disct
RegFee
InsAmt
Varchar
Varchar
Varchar
float
Float
Float
Float
float
15
10
25
8
8
8
8
8
Not Null
Not Null
Not Null
Not Null
Not Null
Not Null
Not Null
Not Null
Si No
:
Table Name :
Field Name
Stud_id
Name
Address
Cpid
Dob
Religion
cast
qualificaion
7
Student_Table
Data Type Size
Int
4
Varchar
25
Varchar
150
Int
4
Datetime
8
Varchar
25
Varchar
25
Varchar
25
Si No
:
Table Name :
Field Name
StaffId
Date
Amount
Remarks
8
Salary_Payment
Data Type Size Constraint
Foreign key
Int
4
Foreign key
datetime
8
Not null
float
8
Not null
varchar
50
Constraint
Primary key
Not null
Not null
Foreign key
Not null
Not null
Not null
Not null
Duration of Course
Minimum qualification required
Course Syllabus
Course Fee
Service tax if any or 0
Discount if any or 0
RegFee if any or 0
Amount per Installment
Description
Student Id
Student name
Student address
Contact Person Id
Date of birth
Religion of student
Cast of student
Qualification of student
Description
Staff Id
Date of payment
Amount paid
Remarks if any
16
Project Synopsis
CIMS
Si No
:
Table Name :
Field Name
EnqId
EnqDate
Stud_Id
CourseCode
advRef
Remarks
Counsellor
9
Enquiry_Table
Data Type Size
Int
4
datetime
8
Int
4
Varchar
30
Varchar
15
Varchar
100
Int
4
Si No
:
Table Name :
Field Name
AdmID
Date
Enqid
Remarks
coursecode
10
Admission_Table
Data Type Size Constraint
Primary key
Int
4
Datetim
Not null
8
e
Foreign key
Int
4
Not null
Varchar
100
varchar
30
Not null
Description
Admission ID
Admission Date
Enquiry Id
Remarks if any or 0
Course Code of Course Joined
Si No
:
Table Name :
Field Name
Fid
Enqid
11
FollowUp
Data Type Size
Int
4
int
4
Description
Call Id
Enquiry ID
Si No
:
Table Name :
Field Name
StudId
Date
RecNo
Amt
Remarks
Si No
Table Name
12
Fee_Payment
Data Type Size
Int
4
int
4
int
4
int
4
int
4
:
:
Field Name
Constraint
Primary key
Not null
Foreign key
Not null
Not null
Not null
Not null
Constraint
Primary key
Primary key
Constraint
Foreign
key null
Not
Primary
key null
Not
Not null
Description
Enquiry Id
Enquiry Date
Student ID
Course Code
Advertisement Reference
Remarks if any or 0
Counsellor id
Description
Staff Id
Date of payment
Receipt Number
Amount paid
Remarks if any
13
BatchTable
Data Type Size
Constraint
Description
Batch ID
Start Time
End Time
Specify
Batch
TypeRegular, Sunday, Saturday
or other
Total Number of students
allowed
BatchId
Starttime
Endtime
Int
Varchar
Datetim
Varchar
4
8
50
Primary key
Not null
Not null
Days
Varchar
Not null
Total_stud
int
Not null
17
Project Synopsis
CIMS
Si No
:
Table Name :
Field Name
Fid
ClDt
Reason
NclDt
14
CallTable
Data Type Size
Int
4
Datetime 8
Varchar
50
Datetime 8
Constraint
Primary Key
Not null
Not null
Not null
Description
Call Id
Call Date
Reason
Next Call Date if any or 0
Si No
:
Table Name :
Field Name
BatchId
Studid
Staffid
15
ScheduleTable
Data Type Size
Int
4
int
4
int
4
Constraint
Primary key
Foreign key
Foreign key
Description
Batch Id
Student Id
Staff Id
Si No
:
16
Table Name: IncExp_tab
Field Name DateType
Date
DateTime
Type
Varchar
category
Varchar
Amt
Varchar
desc
Varchar
Size
8
7
20
5
100
Constraint
Not Null
Not Null
Not Null
Not Null
Not Null
Description
Date
Income/expense
Category
Amount
Description
Si No
:
17
Table Name :
ExamTable
Field
Data Type
Size
Name
ExamId
Int
4
Ename
Int
4
edate
Datetime
8
Starttime Varchar
10
Maxtime Varchar
10
Constraint
Primary
key
Foreign
key null
Not
Not null
Not Null
Description
Exam Id
Papercode
Exam Date
SExam Time
Duration of exam
Si No
Table Name
Field
Name
ExamId
Studid
mark
Constraint
Primary
key
Foreign
key null
Not
Description
Exam Id
Student Id
Mark obtained
:
:
18
ExamRegister
Data Type
Size
Int
4
int
4
int
4
18
Project Synopsis
CIMS
8.3
PROCESS LOGIC
Register User
Add Privileges
19
Project Synopsis
CIMS
Enquiry Process
Admission Process
20
Project Synopsis
CIMS
Enquiry Follow up
21
Project Synopsis
8.4
CIMS
Implementation methodology
The implementation is the final stage and its an important phase. One major
task of preparing for implementation is education of users, which should really have
been taken place much earlier in the project when they were being involved in the
investigation and design work.
During the implementation phase system actually takes physical shape. In
order to develop a system actually takes physical shape. In order to develop a system
implemented, planning is very essential. The implementation phase of the software
development is concerned with translating design specifications in to source code the
user test the developed system and changes are made according to their needs. Before
implementation several tests have been conducted to ensure that no errors are
encountered during the operation. The implementation phase ends with an evaluation
of the system after placing it into operation for a period of time. Implementation is the
third phase of the system process.
In order to achieve the objectives and the expected performance the system
has been developed in a highly interactive and user-friendly manner.
There are three types of implementation
22
Project Synopsis
CIMS
Enquiry Report
Admission Report
Not Joined Report
Weekly Fee Collection Report
Weekly Income Expense Report
Monthly Reports
1. Enquiry summary
2. Admission Summary
3. Not Joined Summary
4. Monthly Fee Collection Report
5. Income Expense Report
6. Salary Report
7. Time Schedule
8. Attendance Report
9. Leave Report
10. Examination Conducted Report
11. Examination Result Report
12. Certificate Issue Report
23
Project Synopsis
CIMS
Login authentication
Permission validation on user database.
SQL server authenticates the user before the user can access any data in the
database. In SQL Server each user is given a separate account known as User log
account. Every user interacts with SQL server using this account. Authentication
identifies the user who is using a login account and gives the permission to connect to
SQL Server. If authentication is unsuccessful, the user cannot connect to SQL Server.
The security features considered while developing the system so as to avoid
the errors and omissions that may lead to serious problems .The system may have to
face the unwanted events called threats .Computer system is secure against a particular
threat if counter measures have been taken to reduce an acceptability low-level
amount of loss that the threat may be expected to cause over a given period of time.
A computer should be protected from the following three problems:
Loss of availability
Loss of integrity
Loss of confidentiality
In this project data security, data validation checking methods are applied
using a password authentication. All the data, which is entered by the employee and
the administrator, will be validated. Users should enter their Username and password
for the requesting access.
Access Rights
Admin
Staff
Allocated Privileges
24
Project Synopsis
CIMS
25
Project Synopsis
CIMS
11. BIBLIOGRAPHY
1. Software Engineering
Ian Somerville.
John Stebbe
Hoffman
Jones
Gayle Coffmany
Silberschatze
26