0% found this document useful (0 votes)
84 views57 pages

Sports Management System

Uploaded by

dk srn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views57 pages

Sports Management System

Uploaded by

dk srn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

SPORTS MANAGEMENT SYSTEM

MINI PROJECT – I

Submitted by

SELVAGANAPATHY K

19MSS041

Under the Guidance of

Prof. Jerlin Adaikala Sundari J MCA MPhil

Assistant Professor

Department of Software Systems

In partial fulfillment of the requirements for the award of the degree of

MASTER OF SCIENCE IN SOFTWARE SYSTEMS

(Five years Integrated Course)

of Bharathiar University

DEPARTMENT OF SOFTWARE SYSTEMS

PSG COLLEGE OF ARTS & SCIENCE


An Autonomous college - Affiliated to Bharathiar University
Accredited with ‘A’grade by NAAC (3 rd Cycle)
College with Potential for Excellence
(Status Awarded by the UGC)
Star College Status Awarded by DBT - MST
An ISO 9001:2015 Certified Institution
Coimbatore - 641 014

1|Page
(December 2020)

DEPARTMENT OF SOFTWARE SYSTEMS


PSG COLLEGE OF ARTS & SCIENCE
An Autonomous college - Affiliated to Bharathiar University
Accredited with ‘A’grade by NAAC (3 rd Cycle)
College with Potential for Excellence
(Status Awarded by the UGC)
Star College Status Awarded by DBT - MST
An ISO 9001:2015 Certified Institution
Coimbatore - 641 014

CERTIFICATE

This is to certify that this project work entitled “SPORTS MANAGEMENT


SYSTEM” is a bonafide record of work done by SELVAGNAPATHY
K(19MSS041) in partial fulfillment of the requirements for the award of Degree of Master of
Science in Software Systems (Five years Integrated Course) of Bharathiar University.

Faculty Guide Head of the Department

Submitted for Viva-Voce Examination held on ____________________

2|Page
Internal Examiner External Examiner

DECLARATION

I, SELVAGANAPATHY K(19MSS041), hereby declare that this project work


entitled

“SPORTS MANAGEMENT SYSTEM” is submitted to PSG College of Arts &Science,


Coimbatore in partial fulfillment of the requirements for the award of the degree of Master of
Science in Software Systems, is a record of original work done by me under the supervision and
guidance of Ms Jerlin Adaikala Sundari J MCA MPhil , Assistant Professor,
Department of Software Systems, PSG College of Arts &Science, Coimbatore.
This report has not been submitted by me for the award of any other Degree/ Diploma/
Associate ship/ Fellowship or any other similar degree to any other university.

Place: Coimbatore (SELVAGANAPATHY K)

Date: (18MSS011)

3|Page
ACKNOWLEDGEMENT

My venture stands imperfect without dedicating my gratitude to a few people who


have contributed a lot towards the victorious completion for my project work.
I would like to thank Thiru L. Gopalakrishnan, Managing Trustee, PSG & Sons
Charities, for providing me a prospect and surroundings that made the work possible.
I take this opportunity to express my deep sense of gratitude to Dr. T. Kannaian,
Secretary, PSG College of Arts & Science, Coimbatore for permitting and doing the needful
towards the successful completion of this project.
I express my deep sense of gratitude and sincere thanks to Dr. D. Brindha M.Sc., M.Phil.,
Ph.D., MA (Yoga)., Principal, PSG College of Arts &Science, Coimbatore for her valuable advice
and concern on students.
I am very much thankful to Dr. A. Anguraj, M.Sc., M.Phil., Ph.D., Vice Principal
(Academics), Dr.Jayanthi M M.Com., MBA., M.Phil., Ph.D.,Vice Principal (Student Affairs),
Prof. M Umarani, MBA, M.Phil., Faculty-In-Charge (Student Affairs), for their support
towards my project.
I sincerely thank Dr. K.V.Rukmani., M.C.A., M.E, Ph.D., Head, Department of Software
Systems for her whole hearted help to complete this project successfully by giving valuable
suggestions.
I convey my heartiest and passionate sense of thankfulness to my project guide Ms Jerlin
Adaikala Sundari J MCA MPhil , Assistant Professor, Department of Software Systems, for
her/his timely suggestion which had enable me in completing the project successfully.
I am grateful to ________, external guide, __________________ , for giving me an
expert’s insight into the project and for sparing time in his/her hectic agenda, for planning and
giving me invaluable guidance and suggestions.
This note of acknowledgement will be incomplete without paying my heartful devotion to
my parents, my friends and other people, for their blessings, encouragement, financial support and
the patience, without which it would have been impossible for me to complete the job.

4|Page
(SYNOPSIS)

The Sports Management System project deals with registering new members, plans,
payments, routine and managing the members for the. The project has complete
access for the crud operations that are to create, read, update, and delete the database
entries. At first you need to login as this system is totally controlled by the
admin/owner and then register the members for and check their health status and
view the total income per month. Now you can assign different routine to different
members and check the health status which can be viewed and edited too and finally
check the payments according to the plan they have chosen.

It has a database administration that has access to the entire database, in regards with
viewing, updating, and deleting the information.

TABLE OF CONTENTS

5|Page
S.No CONTENTS PAGE NO
1 INTRODUCTION……………………………………………………..

1.1 Company Profile……………………………………………………

1.2 Project Overview……………………………………………………


1.3 Module Description…………………………………………………
2 SYSTEM ANALYSIS…………………………………………………
2.1 Existing System…………………………………………………….

2.2 Proposed System……………………………………………………

3 SYSTEM CONFIGURATION……………………………………….
3.1 Hardware Specification……………………………………………

3.2 Software Specification……………………………………………..


4 SOFTWARE DESCRIPTION………………………………………..
4.1 Front End……………………………………………………………
4.2 Back End……………………………………………………………
5 SYSTEM DESIGN…………………………………………………….

5.1 Data Flow Diagram ………………………………………………...

5.2 Entity Relationship Diagram ………………………………………

5.3 Table Design……..…………………………………………………


5.4 Input Design………………………………………………………...
5.5 Output Design………………………………………………………
6 SYSTEM IMPLEMENTATION & TESTING……………………...
7 CONCLUSION ………………………………………………………..
8 SCOPE FOR FUTURE ENHANCEMENT………………………….
9 BIBLIOGRAPHY……………………………………………………..
10 APPENDIX……………………………………………………………..
A. Screenshot……………………………………………………………
B. Sample Coding……………………………………………………….

6|Page
1.INTRODUCTION

The Sports Management System project deals with registering new members, plans,
payments, routine and managing the members for the. The project has complete
access for the crud operations that are to create, read, update, and delete the database
entries. At first you need to login as this system is totally controlled by the
admin/owner and then register the members for the and check their health status and
view the total income per month. Now you can assign different routine to different
members and check the health status which can be viewed and edited too and finally
check the payments according to the plan they have chosen.

It has a database administration that has access to the entire database, in regards with
viewing, updating, and deleting the information.

1.1 PROJECT OBJECTIVE

The Sports Management software is very user friendly and appealing. The Human
objective of the system is to maintain and retrieve information about the members
and the
sports they will play on which day of the week and at what time in the sports. The
system is simple in design and implementation.
The main objectives of this system can be summarized as follows:
 Design of a GUI portal for managing the Sports for the main admin/owner.
 Insertion of member’s data plans and managing of payment and health status.
 Monthly Payment for monthly plan and yearly payment of yearly plan.
 Computerized manipulation and management of member data and id.
Easy management of databases of various sections covering key aspects

1.2 PROJECT OVERVIEW


Now a days the usage of internet is growing up rapidly. This project aims to
develop the planning and maintenance of sports-based academies to improve next

7|Page
level. Sports management system allows you to store the details of the players and
their physical health condition. This project maintain daily routine for each and
every persons for their respective sports.

1.3 MODULES

 ADMIN MODULE
 PLAN MODULE
 ROUTINE MODULE

1.3.1 MODULES DESCRIPTION

i) ADMIN MODULE

In this module admin check after all details about sports players and the player
list.

ii)PLAN MODULE

In this module, various sports plans are installed and showed in for players to
enrol.

iii)ROUTINE MODULE

In this Module, the daily routine for all sports is installed.

2. SYSTEM ANALYSIS

8|Page
System study is classified into two types

 Existing system and


 Proposed system

2.1 EXISTING SYSTEM

Here the existing system is nothing but a manual system in which the admin must
fill the member’s Sports Club details in an excel sheet and send it to their supervisor,
then the supervisor must merge all the member information details and arrange them
in to a single sheet. Maintaining a clean record of all the members is a tedious job in
this process.
DISADVANTAGES

 Paperback records are hard to maintain.


 Searching for a member’s information can be gruesome task.
 Doesn’t provide Security.
 Difficulty in updating the records.
 More manual hours is needed to maintain the records.
 Updating the member on deadline for payment is difficult.

One way to overcome all these difficulties is so store all the information in database.
The computerization helps mitigate a lot of drawbacks and streamlines the process.

2.2 PROPOSED SYSTEM

9|Page
Performance Management System is to replace the existing manual system
with a software solution. It allows all the employees in different sections of the club
to work together and manage a single record.
Different areas of the Sports Club can be managed in different tabs by different
people.

ADVANTAGES

 Faster processing
 Centralized database helps in avoiding conflicts.
 Easy to use GUI that does not require specific training.

3.SYSTEM CONFIGURATION

3.1 HARDWARE SPECIFICATION

 Processor : x86 compatible processor with 1.7 GHz Clock Speed


 Hard disk : 20 GB or greater
 Ram : 512 MB or greater
 Keyboard : 104 Standard keys
 Mouse : 2/3 button. Optical/ Mechanical.

3.2 SOFTWARE SPECIFICATION

 Operating Systems : Windows 2000/XP/Vista


 Front End Software : HTML, CSS & BOOTSTRAP
 Back End Database : MySQL 8.0
 Server-Side Script : XAMPP 7.3.25
 IDE : Visual Studio Code 1.56

10 | P a g e
4.SOFTWARE DESCRIPTION

FILE DESIGN

This chapter is about the Software languages and the tools used in the development of the
project. The Primary Languages are PHP and MYSQL.

FEATURES OF PHP

PHP is a server scripting language, and a powerful tool for making dynamic and interactive
Web pages. PHP is a widely-used, free, and efficient alternative to competitors such as Microsoft's
ASP.PHP is an interpreted scripting language that is embedded within an HTML web page in order
to add dynamic processing to that page.

PHP is supported by a wide range of commercial and open-source web servers, including
Red Hat Linux, and can also be installed as an Apache module. Its widespread availability and its
relative simplicity mean that it is an excellent way to introduce dynamic features into your web
pages. As it is an open, non-proprietary standard, PHP developers are not restricted by the
limitations imposed by some commercial suppliers of server-side scripting software, neither do
they have to purchase expensive licenses in order to use it.

You may already be familiar with 'client-side' scripting languages such as JavaScript. If
you include JavaScript in your page, then the JavaScript code is downloaded to the client's browser
and executed there. PHP is different in that it is strictly a 'server-side' scripting language - this
means that the PHP is always processed by the web server before the requested page is served to
the browser. The PHP tags in the page are replaced by generated HTML strings and the client's
browser then displays the HTML without any knowledge of the underlying PHP code at all.

The syntax of the language is similar to C, so anyone who is familiar with the C
programming language, (or Perl or Java, for that matter) should be able to master PHP scripting
quickly and without too much difficulty. Object Orientated Programming extensions have been
introduced with the latest release of PHP which allow you to use objects within a PHP script.

11 | P a g e
PHP can be used to do anything that any CGI program can do, such as:

 Collect and process form data


 Generate dynamic page content
 Send and receive cookies

One of PHP's biggest strengths is its ability to interface with databases. PHP supports a
wide range of databases, including proprietary (such as Sybase and Oracle) and open-source (such
as MySQL and PostgreSQL). The complete list is growing all the time. PHP can also communicate
with other processes using a variety of standard protocols.

The main disadvantage of PHP is that it is an interpreted language and therefore there is
inevitably a overhead in processing a page of PHP script. However, no PHP code is ever
downloaded to the client's browser so there is never any question of a user 'stealing' your PHP code
and adapting it for his own purposes.

PHP is a very powerful program that can access files, execute commands and open network
connections on the server. These features would make anything being run on the server insecure
by default. Because PHP is specifically designed to operate on web servers then it is intrinsically
more secure that 'general purpose' languages such as C or Perl. PHP has a number of different
configuration options which give the web server manager the ability to set precisely the level of
security that is needed for the situation.

UNIQUE FEATURES OF PHP

PHP language has support features of other languages like c, Perl and etc. It also has some
unique features of its own. Some of them are listed below in this article.

1. In PHP there is no need to specify data type for variable declaration. Rather, it can be
determined at the time of execution depends on the value of the variable. So that, PHP is
called as loosely typed language.

12 | P a g e
2. PHP provides cross platform compatibility, unlike some other server side scripting
language.
3. PHP has set of pre-defined variables called superglobals which will be start by _. Some of
the examples are, $_GET, $_POST, $_COOKIE, $_SESSION, $_SERVER and etc. So,
any variable except superglobals, that are start with _ will cause error.
4. PHP programming structure includes variable variables; that is, the name of the variable
can be change dynamically.
5. This language contains access monitoring capability to create logs as the summary of recent
accesses.
6. And then, it includes several magic methods that begins with __ character which will be
defined and called at appropriate instance. For example, __clone() will be called, when the
clone keyword is used.
7. Predefined error reporting constants are available to generate a warning or error notice. For
example, when E_STRICT is enabled, a warning about deprecated methods will be
generated.
8. PHP supports extended regular expression that leads extensive pattern matching with
remarkable speed.
9. And then, properties like, nowdocs and heredocs are used to delimit some block of context
which should not be sent for parsing.
10. Since PHP is a single inheritance language, the parent class methods can be derived by
only one directly inherited sub class. But, the implementation of traits concept, reduce the
gap over this limitation and allow to reuse required method in several classes.

13 | P a g e
DATABASE MANAGEMENT SYSTEM

Following the technology progress in the areas of processors, computer


memory, computer storage, and computer networks, the sizes, capabilities, and performance
of databases and their respective DBMSs have grown in orders of magnitude. The
development of database technology can be divided into three eras based on data model or
structure: navigational, SQL/relational, and post-relational. The two main early navigational
data models were the hierarchical model, epitomized by IBM's IMS system, and
the CODASYL model (network model), implemented in a number of products such as IDMS.
The relational model employs sets of ledger-style tables, each used for a different type of
entity. Only in the mid-1980s did computing hardware become powerful enough to allow the
wide deployment of relational systems (DBMSs plus applications). By the early 1990s,
however, relational systems dominated in all large-scale data processing applications, and as
of 2015 they remain dominant: IBM DB2, Oracle, MySQL, and Microsoft SQL Server are
the top DBMS. The dominant database language, standardized SQL for the relational model,
has influenced database languages for other data models.

14 | P a g e
MySQL

MySQL is an open-source relational database Management System (RDBMS).


MySQL is written in C and C++. Its SQL parser is written in yacc, but it uses a homebrewed
lexical analyzer. MySQL works on many system platforms,
including Linux, macOS, Microsoft Windows, NetBSD. MySQL is offered under two
different editions: the open-source MySQL Community Server and the proprietary Enterprise
Server. MySQL Enterprise Server is differentiated by a series of proprietary extensions which
install as server plugins, but otherwise shares the version numbering system and is built from
the same code base.
Major features that are available in MySQL are a broad subset of ANSI SQL 99, as well as
extensions, Cross-platform support, Stored procedures, using a procedural language that
closely adheres to SQL/PSM, Triggers, Cursors, Updatable views, Online DDL when using
the InnoDB Storage Engine. Many programming languages with languages specific
APIs include libraries for accessing MySQL databases. These include MySQL
Connector/Net for integration with Microsoft's Visual Studio and the JDBC driver for Java.
In addition, an ODBC interface called MySQL Connector/ODBC allows additional
programming languages that support the ODBC interface to communicate with a MySQL
database, such as ASP or ColdFusion.

XAMMP

XAMPP is a free and open-source cross-platform web server solution stack package
developed by Apache Friends, consisting mainly of the Apache HTTP
Server, MariaDB database, and interpreters for scripts written in
the PHP and Perl programming languages. Since most actual web server deployments use the
same components as XAMPP, it makes transitioning from a local test server to a live server
possible.
XAMPP's ease of deployment means a XAMPP stack can be installed quickly and simply on
an operating system by a developer, with the advantage a number of common add-in
applications such as WordPress and Joomla! can also be installed with similar ease
using Bitnami.

15 | P a g e
5.SYSTEM DESIGN

5.1 DATA FLOW DIAGRAM

A data flow diagram is graphical tool used to describe and analyse movement of data
through a system. These are the central tool and the basis from which the other components are
developed. The transformation of data from input to output, through processed, may be described
logically and independently of physical components associated with the system. These are known
as the logical data flow diagrams. The physical data flow diagrams show the actual implements
and movement of data between people, departments and workstations. A full description of a
system actually consists of a set of data flow diagrams. Using two familiar notations Yourdon,
Gane and Sarson notation develops the data flow diagrams. Each component in a DFD is labeled
with a descriptive name. Process is further identified with a number that will be used for
identification purpose. The development of DFD’S is done in several levels. Each process in
lower level diagrams can be broken down into a more detailed DFD in the next level. The lop-
level diagram is often called context diagram. It consists a single process bit, which plays vital role
in studying the current system. The process in the context level diagram is exploded into other
process at the first level DFD.

The idea behind the explosion of a process into more process is that understanding at one
level of detail is exploded into greater detail at the next level. This is done until further explosion
is necessary and an adequate amount of detail is described for analyst to understand the process.

Larry Constantine first developed the DFD as a way of expressing system requirements in
a graphical from, this lead to the modular design.

A DFD is also known as a “bubble Chart” has the purpose of clarifying system
requirements and identifying major transformations that will become programs in system design.
So it is the starting point of the design to the lowest level of detail. A DFD consists of a series of
bubbles joined by data flows in the system.

16 | P a g e
DFD SYMBOLS:

In the DFD, there are four symbols

1. A square defines a source(originator) or destination of system data

2. An arrow identifies data flow. It is the pipeline through which the information flows

3. A circle or a bubble represents a process that transforms incoming data flow into outgoing
data flows.

4. An open rectangle is a data store, data at rest or a temporary repository of data

Process that transforms data flow.

Source or Destination of data

Data flow

17 | P a g e
A. DATA FLOW DIAGRAM

LEVEL – 0 DFD DIAGRAM FOR GANZ SPORTS MANAGEMENT


SYSTEM

18 | P a g e
LEVEL – 1 DFD DIAGRAM FOR GANZ SPORTS MANAGEMENT SYSTEM

LEVEL – 2 DFD DIAGRAM FOR GANZ SPORTS MANAGEMENT SYSTEM

19 | P a g e
5.2 ER DIAGRAM

20 | P a g e
5.3.TABLE DESIGN

i)User:

Description : This table is to Store the Login details of the User.

21 | P a g e
ii) Address:

Description : This table is to Store the Location details of the User.

iii) Plan:

Description : This table is used to store the Sports plan available

22 | P a g e
iv) admin:

Description : This table is used to store admin login details

V) Log users:

Description : This table is used to store login details of users

23 | P a g e
VI) health status:

Description : This table is used to store the health status of players

VII) Sports Timetable:

Description : This table is used to store Sports routine

24 | P a g e
VIII) Enrolls to:

Description : This table is used to store login details of new registering


players

25 | P a g e
5.4 INPUT DESIGN

The input design is the link that ties the Information system into the world of its users. It is
a process of converting user-originated inputs to a computer based format. Input data are collected
and organized into a group of similar data. Once identified, appropriate input media are selected
for processing.

The goal of designing input data is to make entry easy, logical and free form errors. In input
data design, we design source document that capture the data and then select the media used to
enter them into the computer. The input forms are developed in a user-friendly way so that a
layman also can easily understand everything. Menus are provided to users and different icons are
designed so the proposed system design looks decorative.

Input design is the part of the overall system design. Source documents initiate a processing
cycle as soon as they are entered into the system through the keyboard. A source should be logical
and easy to understand.

Objectives of input Design:

• To achieve the highest possible level of accuracy.

• To ensure that the input is acceptable and understood by the user.

26 | P a g e
5.4.1. DATABASE DESIGN

If you do not know, a database is a place to store information used by software applications.
For example, you could have a web page with a list of companies and all their locations with
contact information for each location. Or a banking application on your computer to sort and
manage your check book. In both cases, it makes sense to store the data in one piece of software
called a database. The database has a structure and rules about how to add, edit, delete, and read
data stored in the database.

Databases also reside in many different places. Some databases exist on only your computer. Other
databases have their data shared and divided across hundreds or thousands of databases located in
many data centres all over the world.

NoSQL database systems are today an effective solution to manage large data sets
distributed over many servers. A primary driver of interest in NoSQL systems is their support for
next-generation web applications, for which relational DBMSs are not well suited. These are
OLTP applications for which data have a structure that does not fit well in the rigid structure of
relational tables, access to data is based on simple read write operations, scalability and
performance re important quality requirements, and a certain level of consistency is also desirable.
NoSQL technology is characterized by a high heterogeneity, which is problematic to application
developers. Currently, database design for NoSQL systems is usually based on best practices and
guidelines.

For example, a NoSQL database works best for applications with massive amounts of data
where most activity involves reading data from the database with some writing of data to the
database. Reading is less intensive than writing because writing data to a database requires tracking
when a database table is open. NoSQL databases tend to be on multiple machines and, in some
cases, machines in multiple data centres. Keeping data in sync is comparatively easier and less
complex with NoSQL databases. Even in cases where large data sets are not involved, some
developers prefer the easier interactions between their code and a NoSQL database.

27 | P a g e
DATA MODELS

The first step in any database design is the creation of a data model. The model distils all
the functionality requirements for an application into data collections, for example, products,
customers, and suppliers for an ecommerce site, as well as properties and relationships between
these collections of data

There are several risks data models help limit or avoid:

Business processes sometimes can be duplicated in the database structure, creating problems if a
process changes. A good data model provides flexibility independent from any process.

Needless duplicated table in multiple locations within the same database. This is a big issu e in
relational databases.

Data models for related applications differ for no reason. Ideally, a data model takes into account
other applications used by the business or individual.

Data might be difficult to extract or share with other software applications. If data sharing is
important, a data model should ensure data can be extracted easily.

Database and data models typically are represented as graphs. Early stages of development,
however, use business requirements and functional specifications to clarify the system a data
model must represent and support. In some cases, for example, health care or finance, there may
be examples of data models used widely which are adopted or adapted.

The data model also is one of several factors in the decision about what database management
system (DBMS) to use, relational or NoSQL.

28 | P a g e
NOSQL DATABASE DESIGN

Key-value pairs are the main feature of these databases. Keys are names or unique ID
numbers and values range from simple data to documents to columns of data to structured lists
(arrays) of key-value data. Each row in a NoSQL table includes the key and its value. The design
of NoSQL databases depends on the type of database, called stores:

Document Stores pair each key identifier with a document which can be a document, key-value
pairs, or key-value arrays.

Graph Stores are designed to hold data best represented by graphs, interconnected data with an
unknown number of relations between the data, for example, social networks or road maps.

Key-Value Stores are the simplest type with with every bit of data stored with a name (as key) and
its data (value).

Wide Column Stores are optimized for queries across large data sets.

There are other ways to describe the range of NoSQL databases available but these are the simplest
and most comprehensive categories. And within each type of NoSQL database, functionality
differs which can impact database design. For example, Mongo DB was evolved from the MySQL
project, changing the data model from relational to NoSQL, yet retains most of the indexing,
dynamic queries, and other useful features of relational databases.

Perhaps the key design difference between NoSQL and relational databases is the structure of data
in each database. Relational databases require data be organized ahead of time. NoSQL databases
can have their structure modified on the fly with little impact because they use key-value pairs;
updating a data structure in NoSQL can involve adding additional data to the value of one or more
keys while leaving other key-value pairs in the database untouched.

Design strategies for NoSQL databases depend on the type of database and the virtues (or
negatives) of different data model techniques. Where relational databases have a user-centered

29 | P a g e
approach, asking “What answers can I get from the database?”, NoSQL databases have an
application-centered approach, asking “What questions do I have?”

This is a critical difference both in data structures as well as approaches to designing a database.

Configuring a database to provide specific answers entails lots of design and structure up front
which limits future flexibility and makes future changes likely to be complicated. Configuring a
database to handle many possible questions, in contrast, results in a more flexible database design.
Typically data is duplicated in many different places in a database to help answer questions with
less effort. NoSQL database design uses a set of rules called BASE (basically available, soft-state,
eventually consistent) to guide their design

NoSQL database data model techniques include:

 DE normalization puts all data needed to answer a query in one place, typically a single
database table, instead of splitting the data into multiple tables.
 Aggregates use light or no validation of data types, for example, strings or integers.
 Joins are done at the application level, not as part of a database query. This requires more
planning to match one type or set of data with another, for example, all examples of a
product type (jeans) sorted by manufacturer in an online store.
 Indexes and key tables to identify and sort data quickly for retrieval.
 Tree structures can be modelled as a single data entity, for example, a comment with all its
responses.

5.5. OUTPUT DESIGN

Output forms are also designed in a specific manner as per the user requirement. Results
are formatted to enhance clarity. Depending on the user the system would generate appropriate
output. The output forms are designed in such a way that the entire user required data is presented.

While designing an output, the system analyst must accomplish the following.

• Determine what information to present.

30 | P a g e
• Decide whether to display, print or speak information and select the output medium.

• Arrange the presentation of information in an acceptable form.

• Decide how to distribute the output to intended users

6.SYSTEM TESTING & IMPLEMENTATION

6.1.SYSTEM IMPLEMENTATION

The user may execute some or all Test Cases based on your mobile testing requirements. Test
Cases are organized based on Mobile Testing Types.

 Functional Testing
 Performance Testing
 Security Testing
 Usability Testing
 Compatibility Testing

6.1.1. FUNCTIONAL TESTING

The functional testing of Mobiles normally consists in the areas of testing user interactions
as well as testing the transactions. The various factors which are relevant in functional testing are

Type of application based upon the business functionality usages (banking, gaming, social or
business)Target audience type (consumer, enterprise, education) Distribution channel which is
used to spread the application (e.g. Apple App Store, Google play, direct distribution) The most
fundamental test scenarios in the functional testing can be considered as:

To validate whether all the required mandatory fields are working as required. To validate that the
mandatory fields are displayed in the screen in a distinctive way than the non-mandatory fields.
To validate whether the application works as per as requirement whenever the application
starts/stops. To validate whether the application goes into minimized mode whenever there is an
incoming phone call. In order to validate the same we need to use a second phone, to call the

31 | P a g e
device. To validate whether the phone is able to store, process and receive SMS whenever the app
is running. In order to validate the same we need to use a second phone to send sms to the device
which is being tested and where the application under test is currently running. To validate that
the device is able to perform required multitasking requirements whenever it is necessary to do so.
To validate that the application allows necessary social network options such as sharing, posting
and navigation etc. To validate that the application supports any payment gateway transaction such
as Visa, MasterCard, PayPal etc. as required by the application. To validate that the page scrolling
scenarios are being enabled in the application as necessary. To validate that the navigation between
relevant modules in the application are as per the requirement. To validate that the truncation errors
are absolutely to an affordable limit. To validate that the user receives an appropriate error message
like “Network error. Please try after some time” whenever there is any network error. To validate
that the installed application enables other applications to perform satisfactorily, and it does not
eat into the memory of the other applications. To validate that the application resumes at the last
operation in case of a hard reboot or system crash. To validate whether the installation of the
application can be done smoothly provided the user has the necessary resources and it does not
lead to any significant errors. To validate that the application performs auto start facility according
to the requirements. To validate whether the application performs according to the requirement in
all versions of Mobile that is 2g, 3g and 4g. To perform Regression Testing to uncover new
software bugs in existing areas of a system after changes have been made to them. Also rerun
previously performed tests to determine that the program behaviour has not changed due to the
changes. To validate whether the application provides an available user guide for those who are
not familiar to the app

6.1.2 PERFORMANCE TESTING

This type of testing’s fundamental objective is to ensure that the application performs acceptably
under certain performance requirements such as access by a huge number of users or the removal
of a key infrastructure part like a database server.

The general test scenarios for Performance Testing in a Mobile application are:

32 | P a g e
To determine whether the application performs as per the requirement under different load
conditions. To determine whether the current network coverage is able to support the application
at peak, average and minimum user levels. To determine whether the existing client-server
configuration setup provides the required optimum performance level. To identify the various
application and infrastructure bottlenecks which prevent the application to perform at the required
acceptability levels. To validate whether the response time of the application is as per as the
requirements. To evaluate product and/or hardware to determine if it can handle projected load
volumes. To evaluate whether the battery life can support the application to perform under
projected load volumes. To validate application performance when network is changed to WIFI
from 2G/3G or vice versa. To validate each of the required the CPU cycle is optimization. To
validate that the battery consumption, memory leaks, resources like GPS, Camera performance is
well within required guidelines. To validate the application longevity whenever the user load is
rigorous. To validate the network performance while moving around with the device. To validate
the application performance when only intermittent phases of connectivity is required.

6.1.3 SECURITY TESTING

The fundamental objective of security testing is to ensure that the application’s data and
networking security requirements are met as per guidelines.

The following are the most crucial areas for checking the security of Mobile applications.

To validate that the application is able to withstand any brute force attack which is an automated
process of trial and error used to guess a person’s username, password or credit-card number. To
validate whether an application is not permitting an attacker to access sensitive content or
functionality without proper authentication. To validate that the application has a strong password
protection system and it does not permit an attacker to obtain, change or recover another user’s
password. To validate that the application does not suffer from insufficient session expiration. To
identify the dynamic dependencies and take measures to prevent any attacker for accessing these
vulnerabilities. To prevent from SQL injection related attacks. To identify and recover from any
unmanaged code scenarios. To ensure whether the certificates are validated, does the application

33 | P a g e
implement Certificate Pinning or not. To protect the application and the network from the denial
of service attacks. To analyse the data storage and data validation requirements. To enable the
session management for preventing unauthorized users to access unsolicited information. To check
if any cryptography code is broken and ensure that it is repaired. To validate whether the business
logic implementation is secured and not vulnerable to any attack from outside. To analyse file
system interactions, determine any vulnerability and correct these problems. To validate the
protocol handlers for example trying to reconfigure the default landing page for the application
using a malicious frame. To protect against malicious client side injections. To protect against
malicious runtime injections. To investigate file caching and prevent any malicious possibilities
from the same. To prevent from insecure data storage in the keyboard cache of the applications.
To investigate cookies and preventing any malicious deeds from the cookies. To provide regular
audits for data protection analysis. Investigate custom created files and preventing any malicious
deeds from the custom created files. To prevent from buffer overflows and memory corruption
cases. To analyse different data streams and preventing any vulnerabilities from these.

6.1.4 USABILITY TESTING

The usability testing process of the Mobile application is performed to have a quick and easy
step application with less functionality than a slow and difficult application with many features.
The main objective is to ensure that we end up having an easy-to-use, intuitive and similar to
industry-accepted interfaces which are widely used.

To ensure that the buttons should have the required size and be suitable to big fingers. To ensure
that the buttons are placed in the same section of the screen to avoid confusion to the end users.
To ensure that the icons are natural and consistent with the application. To ensure that the buttons,
which have the same function should also have the same colour. To ensure that the validation for
the tapping zoom-in and zoom-out facilities should be enabled. To ensure that the keyboard input
can be minimized in an appropriate manner. To ensure that the application provides a method for
going back or undoing an action, on touching the wrong item, within an acceptable duration. To
ensure that the contextual menus are not overloaded because it has to be used quickly. To ensure
that the text is kept simple and clear to be visible to the users. To ensure that the short sentences

34 | P a g e
and paragraphs are readable to the end users. To ensure that the font size is big enough to be
readable and not too big or too small. To validate the application prompts the user whenever the
user starts downloading a large amount of data which may be not conducive for the application
performance. To validate that the closing of the application is performed from different states and
verify if it re-opens in the same state. To ensure that all strings are converted into appropriate
languages whenever a language translation facility is available .To ensure that the application
items are always synchronized according to the user actions. To ensure that the end user is provided
with a user manual which helps the end user to understand and operate the application who may
be not familiar with the application’s proceeding. Usability testing is normally performed by
manual users since only human beings can understand the sensibility and comfort ability of the
other users.

6.1.5 COMPATIBILITY TESTING

Compatibility testing on mobile devices is performed to ensure that since mobile devices
have different size, resolution, screen, version and hardware so the application should be tested
across all the devices to ensure that the application works as desired.

The following are the most prominent areas for compatibility testing.

To validate that the user Interface of the application is as per the screen size of the device, no
text/control is partially invisible or inaccessible. To ensure that the text is readable for all users for
the application. To ensure that the call/alarm functionality is enabled whenever the application is
running. The application is minimized or suspended on the event of a call and then whenever the
call stops the application is resumed.

6.2.SYSTEM IMPLEMENTATION
Implementation is the stage in the project where the theoretical design is turned into a working
system. The most crucial stage is achieving a successful new system and giving a user confidence

35 | P a g e
in that the new system will work efficiently and effectively in the implementation stage. The stage
consists of

 Testing a developed program with sample data


 Detection and correction of error
 Creating whether the system meets a user requirements
 Making necessary changes as desired by users
 Training user personal

The purpose of system implementation can be summarized as follows: making the new system
available to a prepared set of users (the deployment), and positioning on-going support and
maintenance of the system within the performing Organization (the transition).at a finer level of
detail, deploying the system consists of executing all steps necessary to educate the consumers on
the use of the new system, placing the newly developed system into production, confirming that
all data required at the start of operation is available and accurate, and validating that business
function that interact with the system are functioning properly. Transitioning the system support
responsibility involves changing from a system development to a system support and maintenance
mode of operation, with ownership of the new system moving from the project team to the
performing organization

A key difference between system implementation and all other phases of the lifecycle is that all
project activities up to this point have been performed in safe, protected, and secure environments,
where project issues that arise have little or no impact on day-to-day business operations. Once the
system goes live, however, this is no longer the case. Any miscues at this point will almost certainly
translate into direct operational and/or financial impacts on the performing Organization. It is
through the careful planning, executions, and management of system implementation activities
that the project team can minimize the like hood of these occurrences, and determine appropriate
contingency plans in the event of a problem.

36 | P a g e
6.2.1 IMPLEMENTATION PROCEDURES
The implementation phase is less creative than system design. A system design may be
dropped at any time prior to implementation, although it becomes more difficult when it goes to
the design phase. The final report of the implementation phase includes procedural flowcharts,
records layouts and a workable plan for implementing the candidate system design into an
operational design

6.2.2 LIST OF PROCESS


This phase consists of the following processes:

Prepare for System Implementation, where all steps needed in advance of actually deploying
the application are performed, including preparation of both the production environment and the
consumer communities

Deploy System, where the full deployment plan, initially developed during System Design and
evolved throughout subsequent lifecycle phases, is executed and validation

Transition to Performing Organization, where responsibility for and ownership of the


application are transitioned from the project Team to the unit in the performing Orga nization that
will provide system support and maintenance.

6.2.3 SYSTEM MAINTENENCE


The maintenance Manual provide maintenance personal with the information necessary to
maintain the system effectively. The manual provide the definition of the software support
environment, the roles and responsibilities of maintenance personnel, and the regular activities
essential to the support and maintenance of program modules, job streams, and database structures.

37 | P a g e
In addition to the items identified for inclusion in the Maintenance Manual, additional information
may he provided to facilitate the maintenance and modification of the system. Appendices to
document various maintenance procedures standards, or other essential information may he added
to this document as needed.

7. CONCLUSION

Planned approach toward working: The maintenance of Sports Club will be


well planned and organized. The data will be stored efficiency with optimal disk
space consumption in data stores which will help in retrieval of information as well
as its storage under resource constraints.
Accuracy: The level of accuracy in the proposed system will be higher. All
operations would conform to integrity constraints and correctness and it will be
ensured that whatever information is received at or sent from the centre is accurate.
Reliability: The reliability of the proposed system will be high due to the above
mentioned reasons. This comes from the fact that only the data which conforms
accuracy clause would be allowed to commit back to the disk. Other properties like
transaction management and rollback during system or power failure etc get
automatically taken care of by the SQL systems, which is undoubtedly an excellent
choice of the DBMS system. Properties of atomicity, consistency, isolation and
data security are intrinsically maintained.

38 | P a g e
8.SCOPE FOR FUTURE ENHANCEMENT
No redundancy: In the proposed system it will be ensured that no repetition of information occurs;
neither on a physical storage nor on a logical implementation level. This economizes on resource
utilization in terms of storage space. Also, even in case of concurrent access no anomalies occur,
and consistency is maintained. In addition to all this, principles of normalization have been
endeavored to be followed.

Immediate retrieval of information: The main objective of the proposed system is to provide a
quick and efficient platform for retrieval of information. queries allowed by the database.

9.BIBLIOGRAPHY

[1] Oracle Database MySQL PL/SQL 101- Christopher Allen(Oracle press)


[2] Fundamentals of Database Systems, seventh edition, Elamasri Navathe.
[3] https://stackoverflow.com/questions/26236028/xampp-connect-to-SQL-server
[4] https://www.tutorialspoint.com
[5] www.youtube.com
[6] www.geeksforgeeks.com

39 | P a g e
10. APPENDIX

A.SCREENSHOT

The following figures refers to the website of the GANZ Sports management System

40 | P a g e
41 | P a g e
The below figure refers to the initial bootup page of the application.

Login Page

42 | P a g e
The below figure refers to Dashboard page if the login username and password is correct and
you get logged in the system.

The below figure refers to the member registration

43 | P a g e
The below figure refers to the Member viewing

The figure below refers to the Payments of membership

44 | P a g e
The below figure refers to the Health Status entry for the member

The below figure refers to the different sports plans available and can be added and edited

45 | P a g e
The below figure refers to Sports Routine which is followed every day

46 | P a g e
The below figure refers to the Admin login detailed Profile

47 | P a g e
B.SAMPLE CODING
LOGIN PAGE
<?xml version="1.0" encoding="utf-8"?>
<LinearLayout xmlns:android="http://schemas.android.com/apk/res/android"

xmlns:app="http://schemas.android.com/apk/res-auto"

xmlns:tools="http://schemas.android.com/tools"

android:layout_width="match_parent"

android:layout_height="match_parent"

tools:context=".LoginPage"

android:background="@drawable/gradient"
android:orientation="vertical">

<ImageView

android:layout_width="120dp"

android:layout_height="80dp"

android:layout_marginLeft="110dp"

android:layout_marginTop="50dp"

/>

<EditText

android:layout_width="match_parent"

android:layout_height="wrap_content"

android:id="@+id/Uname"

android:hint="Enter Your Username"


android:drawableLeft="@drawable/ic_action_user"

android:layout_marginTop="50px"

android:textColor="#fff"

48 | P a g e
/>

<EditText

android:layout_width="match_parent"

android:layout_height="wrap_content"

android:id="@+id/passw"

android:layout_marginTop="80px"

android:drawableLeft="@drawable/ic_action_name"
android:inputType="textPassword"

android:textColor="#fff"
android:hint="Enter yout Password"/>

<Button

android:layout_width="match_parent"
android:layout_height="wrap_content"

android:id="@+id/logbtn"

android:text="Login"

android:layout_marginTop="50px"

/>

<TextView

android:layout_width="wrap_content"

android:layout_height="wrap_content"

android:text="New User ! Register Here."

android:layout_marginLeft="100dp"

android:layout_marginTop="50px"

android:layout_marginBottom="6dp"

android:textColor="#fff"

android:id="@+id/Newuser"

49 | P a g e
android:background="@null"

/>

</LinearLayout>

package com.example.user.medical;

import android.content.Intent;

import android.support.annotation.NonNull;
import android.support.v7.app.AppCompatActivity;

import android.os.Bundle;
import android.text.Html;

import android.view.View;
import android.widget.Button;

import android.widget.EditText;

import android.widget.TextView;

import android.widget.Toast;

import com.google.firebase.database.DataSnapshot;

import com.google.firebase.database.DatabaseError;

import com.google.firebase.database.DatabaseReference;

import com.google.firebase.database.FirebaseDatabase;

import com.google.firebase.database.ValueEventListener;

public class LoginPage extends AppCompatActivity {

TextView tv1;

EditText ed1,ed2;

Button login,pass,newuser;

String uname,passed,dbedname,dbedpass;

50 | P a g e
@Override

protected void onCreate(Bundle savedInstanceState) {

super.onCreate(savedInstanceState);

setContentView(R.layout.activity_login_page);

final FirebaseDatabase database = FirebaseDatabase.getInstance();

ed1=(EditText)findViewById(R.id.Uname);
ed2=(EditText)findViewById(R.id.passw);

tv1=(TextView)findViewById(R.id.Newuser);

findViewById(R.id.logbtn).setOnClickListener(new View.OnClickListener() {
@Override

public void onClick(View v) {

uname=ed1.getText().toString();

passed=ed2.getText().toString();

DatabaseReference myRef = database.getReference("Users/");

myRef.child(uname).addListenerForSingleValueEvent(new ValueEventListener() {

@Override

public void onDataChange(@NonNull DataSnapshot dataSnapshot) {

Users user = dataSnapshot.getValue(Users.class);

dbedname=user.dbusername;

dbedpass=user.dbuserpassword;

Bundle b1=new Bundle();

b1.putString("name",dbedname);

// Toast.makeText(MainActivity.this,"login Sucess",Toast.LENGTH_LONG).show();

51 | P a g e
if(uname.equalsIgnoreCase(dbedname) && passed.equalsIgnoreCase(dbedpass))

Intent i1=new Intent(LoginPage.this,UserHomepage.class);

i1.putExtras(b1);

startActivity(i1);

}
else

{
Toast.makeText(LoginPage.this,"Invalid Credentials",Toast.LENGTH_LONG).show();

}
}

@Override

public void onCancelled(@NonNull DatabaseError databaseError) {

});

});

tv1.setOnClickListener(new View.OnClickListener() {

@Override

public void onClick(View v) {

Intent i2=new Intent(LoginPage.this,MainActivity.class);

startActivity(i2);

52 | P a g e
});

PHP :

<!DOCTYPE html>

<html lang="en">

<head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">

<title>Login</title>

<meta name="viewport" content="width=device-width, initial-scale=1">

<!--
=====================================================================================
==========-->

<link rel="icon" type="image/png" href="images/icons/favicon.ico"/>


<!--
=====================================================================================
==========-->
<link rel="stylesheet" type="text/css" href="vendor/bootstrap/css/bootstrap.min.css">

<!--
=====================================================================================
==========-->

<link rel="stylesheet" type="text/css" href="fonts/font-awesome-4.7.0/css/font-


awesome.min.css">

<!--
=====================================================================================
==========-->
<link rel="stylesheet" type="text/css" href="fonts/iconic/css/material-design-iconic-
font.min.css">

<!--
=====================================================================================
==========-->

<link rel="stylesheet" type="text/css" href="vendor/animate/animate.css">

<!--
=====================================================================================
==========-->

53 | P a g e
<link rel="stylesheet" type="text/css" href="vendor/css-hamburgers/hamburgers.min.css">

<!--
=====================================================================================
==========-->

<link rel="stylesheet" type="text/css" href="vendor/animsition/css/animsition.min.css">

<!--
=====================================================================================
==========-->

<link rel="stylesheet" type="text/css" href="vendor/select2/select2.min.css">

<!--
=====================================================================================
==========-->

<link rel="stylesheet" type="text/css" href="vendor/daterangepicker/daterangepicker.css">

<!--
=====================================================================================
==========-->

<link rel="stylesheet" type="text/css" href="css/util.css">

<link rel="stylesheet" type="text/css" href="css/main.css">

<!--
=====================================================================================
==========-->

</head>

<body>

<div class="limiter">

<div class="container-login100">
<div class="wrap-login100">

<form action="login.php" method="post" class="login100-form validate-


form">

<img style="height:100px; width:100px;margin-


left:150px;"src="images/aa.jpg">

</span><BR/><BR/>

<center>VR THERE TO CARE FOR U</center>

54 | P a g e
<span class="login100-form-title p-b-34 p-t-27">

Log in

</span>

<div class="wrap-input100 validate-input" data-validate =


"Enter username">

<input class="input100" type="text" name="username"


placeholder="Username">
<span class="focus-input100" data-
placeholder="&#xf207;"></span>
</div>

<div class="wrap-input100 validate-input" data-validate="Enter


password">

<input class="input100" type="password"


name="password" placeholder="Password">
<span class="focus-input100" data-
placeholder="&#xf191;"></span>

</div>

<div class="contact100-form-checkbox">

<input class="input-checkbox100" id="ckb1"


type="checkbox" name="remember-me">

<label class="label-checkbox100" for="ckb1">

Remember me

</label>

</div>

<div class="container-login100-form-btn">

<button class="login100-form-btn">

55 | P a g e
Login

</button>

</form>

</div>

<div class="reg">
<a class="txt1" href="reg.php">

New User Signup


</a>

</div>

<div class="text-center p-t-90">


<a class="txt1" href="#">

Forgot Password?

</a>

</div>

</div>

</div>

</div>

<div id="dropDownSelect1"></div>

<!--
=====================================================================================
==========-->

<script src="vendor/jquery/jquery-3.2.1.min.js"></script>

56 | P a g e
<!--
=====================================================================================
==========-->

<script src="vendor/animsition/js/animsition.min.js"></script>

<!--
=====================================================================================
==========-->

<script src="vendor/bootstrap/js/popper.js"></script>

<script src="vendor/bootstrap/js/bootstrap.min.js"></script>

<!--
=====================================================================================
==========-->

<script src="vendor/select2/select2.min.js"></script>

<!--
=====================================================================================
==========-->

<script src="vendor/daterangepicker/moment.min.js"></script>

<script src="vendor/daterangepicker/daterangepicker.js"></script>

<!--
=====================================================================================
==========-->

<script src="vendor/countdowntime/countdowntime.js"></script>

<!--
=====================================================================================
==========-->

<script src="js/main.js"></script>

</body>

</html>

57 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy