Sports Management System
Sports Management System
MINI PROJECT – I
Submitted by
SELVAGANAPATHY K
19MSS041
Assistant Professor
of Bharathiar University
1|Page
(December 2020)
CERTIFICATE
2|Page
Internal Examiner External Examiner
DECLARATION
Date: (18MSS011)
3|Page
ACKNOWLEDGEMENT
4|Page
(SYNOPSIS)
The Sports Management System project deals with registering new members, plans,
payments, routine and managing the members for the. The project has complete
access for the crud operations that are to create, read, update, and delete the database
entries. At first you need to login as this system is totally controlled by the
admin/owner and then register the members for and check their health status and
view the total income per month. Now you can assign different routine to different
members and check the health status which can be viewed and edited too and finally
check the payments according to the plan they have chosen.
It has a database administration that has access to the entire database, in regards with
viewing, updating, and deleting the information.
TABLE OF CONTENTS
5|Page
S.No CONTENTS PAGE NO
1 INTRODUCTION……………………………………………………..
3 SYSTEM CONFIGURATION……………………………………….
3.1 Hardware Specification……………………………………………
6|Page
1.INTRODUCTION
The Sports Management System project deals with registering new members, plans,
payments, routine and managing the members for the. The project has complete
access for the crud operations that are to create, read, update, and delete the database
entries. At first you need to login as this system is totally controlled by the
admin/owner and then register the members for the and check their health status and
view the total income per month. Now you can assign different routine to different
members and check the health status which can be viewed and edited too and finally
check the payments according to the plan they have chosen.
It has a database administration that has access to the entire database, in regards with
viewing, updating, and deleting the information.
The Sports Management software is very user friendly and appealing. The Human
objective of the system is to maintain and retrieve information about the members
and the
sports they will play on which day of the week and at what time in the sports. The
system is simple in design and implementation.
The main objectives of this system can be summarized as follows:
Design of a GUI portal for managing the Sports for the main admin/owner.
Insertion of member’s data plans and managing of payment and health status.
Monthly Payment for monthly plan and yearly payment of yearly plan.
Computerized manipulation and management of member data and id.
Easy management of databases of various sections covering key aspects
7|Page
level. Sports management system allows you to store the details of the players and
their physical health condition. This project maintain daily routine for each and
every persons for their respective sports.
1.3 MODULES
ADMIN MODULE
PLAN MODULE
ROUTINE MODULE
i) ADMIN MODULE
In this module admin check after all details about sports players and the player
list.
ii)PLAN MODULE
In this module, various sports plans are installed and showed in for players to
enrol.
iii)ROUTINE MODULE
2. SYSTEM ANALYSIS
8|Page
System study is classified into two types
Here the existing system is nothing but a manual system in which the admin must
fill the member’s Sports Club details in an excel sheet and send it to their supervisor,
then the supervisor must merge all the member information details and arrange them
in to a single sheet. Maintaining a clean record of all the members is a tedious job in
this process.
DISADVANTAGES
One way to overcome all these difficulties is so store all the information in database.
The computerization helps mitigate a lot of drawbacks and streamlines the process.
9|Page
Performance Management System is to replace the existing manual system
with a software solution. It allows all the employees in different sections of the club
to work together and manage a single record.
Different areas of the Sports Club can be managed in different tabs by different
people.
ADVANTAGES
Faster processing
Centralized database helps in avoiding conflicts.
Easy to use GUI that does not require specific training.
3.SYSTEM CONFIGURATION
10 | P a g e
4.SOFTWARE DESCRIPTION
FILE DESIGN
This chapter is about the Software languages and the tools used in the development of the
project. The Primary Languages are PHP and MYSQL.
FEATURES OF PHP
PHP is a server scripting language, and a powerful tool for making dynamic and interactive
Web pages. PHP is a widely-used, free, and efficient alternative to competitors such as Microsoft's
ASP.PHP is an interpreted scripting language that is embedded within an HTML web page in order
to add dynamic processing to that page.
PHP is supported by a wide range of commercial and open-source web servers, including
Red Hat Linux, and can also be installed as an Apache module. Its widespread availability and its
relative simplicity mean that it is an excellent way to introduce dynamic features into your web
pages. As it is an open, non-proprietary standard, PHP developers are not restricted by the
limitations imposed by some commercial suppliers of server-side scripting software, neither do
they have to purchase expensive licenses in order to use it.
You may already be familiar with 'client-side' scripting languages such as JavaScript. If
you include JavaScript in your page, then the JavaScript code is downloaded to the client's browser
and executed there. PHP is different in that it is strictly a 'server-side' scripting language - this
means that the PHP is always processed by the web server before the requested page is served to
the browser. The PHP tags in the page are replaced by generated HTML strings and the client's
browser then displays the HTML without any knowledge of the underlying PHP code at all.
The syntax of the language is similar to C, so anyone who is familiar with the C
programming language, (or Perl or Java, for that matter) should be able to master PHP scripting
quickly and without too much difficulty. Object Orientated Programming extensions have been
introduced with the latest release of PHP which allow you to use objects within a PHP script.
11 | P a g e
PHP can be used to do anything that any CGI program can do, such as:
One of PHP's biggest strengths is its ability to interface with databases. PHP supports a
wide range of databases, including proprietary (such as Sybase and Oracle) and open-source (such
as MySQL and PostgreSQL). The complete list is growing all the time. PHP can also communicate
with other processes using a variety of standard protocols.
The main disadvantage of PHP is that it is an interpreted language and therefore there is
inevitably a overhead in processing a page of PHP script. However, no PHP code is ever
downloaded to the client's browser so there is never any question of a user 'stealing' your PHP code
and adapting it for his own purposes.
PHP is a very powerful program that can access files, execute commands and open network
connections on the server. These features would make anything being run on the server insecure
by default. Because PHP is specifically designed to operate on web servers then it is intrinsically
more secure that 'general purpose' languages such as C or Perl. PHP has a number of different
configuration options which give the web server manager the ability to set precisely the level of
security that is needed for the situation.
PHP language has support features of other languages like c, Perl and etc. It also has some
unique features of its own. Some of them are listed below in this article.
1. In PHP there is no need to specify data type for variable declaration. Rather, it can be
determined at the time of execution depends on the value of the variable. So that, PHP is
called as loosely typed language.
12 | P a g e
2. PHP provides cross platform compatibility, unlike some other server side scripting
language.
3. PHP has set of pre-defined variables called superglobals which will be start by _. Some of
the examples are, $_GET, $_POST, $_COOKIE, $_SESSION, $_SERVER and etc. So,
any variable except superglobals, that are start with _ will cause error.
4. PHP programming structure includes variable variables; that is, the name of the variable
can be change dynamically.
5. This language contains access monitoring capability to create logs as the summary of recent
accesses.
6. And then, it includes several magic methods that begins with __ character which will be
defined and called at appropriate instance. For example, __clone() will be called, when the
clone keyword is used.
7. Predefined error reporting constants are available to generate a warning or error notice. For
example, when E_STRICT is enabled, a warning about deprecated methods will be
generated.
8. PHP supports extended regular expression that leads extensive pattern matching with
remarkable speed.
9. And then, properties like, nowdocs and heredocs are used to delimit some block of context
which should not be sent for parsing.
10. Since PHP is a single inheritance language, the parent class methods can be derived by
only one directly inherited sub class. But, the implementation of traits concept, reduce the
gap over this limitation and allow to reuse required method in several classes.
13 | P a g e
DATABASE MANAGEMENT SYSTEM
14 | P a g e
MySQL
XAMMP
XAMPP is a free and open-source cross-platform web server solution stack package
developed by Apache Friends, consisting mainly of the Apache HTTP
Server, MariaDB database, and interpreters for scripts written in
the PHP and Perl programming languages. Since most actual web server deployments use the
same components as XAMPP, it makes transitioning from a local test server to a live server
possible.
XAMPP's ease of deployment means a XAMPP stack can be installed quickly and simply on
an operating system by a developer, with the advantage a number of common add-in
applications such as WordPress and Joomla! can also be installed with similar ease
using Bitnami.
15 | P a g e
5.SYSTEM DESIGN
A data flow diagram is graphical tool used to describe and analyse movement of data
through a system. These are the central tool and the basis from which the other components are
developed. The transformation of data from input to output, through processed, may be described
logically and independently of physical components associated with the system. These are known
as the logical data flow diagrams. The physical data flow diagrams show the actual implements
and movement of data between people, departments and workstations. A full description of a
system actually consists of a set of data flow diagrams. Using two familiar notations Yourdon,
Gane and Sarson notation develops the data flow diagrams. Each component in a DFD is labeled
with a descriptive name. Process is further identified with a number that will be used for
identification purpose. The development of DFD’S is done in several levels. Each process in
lower level diagrams can be broken down into a more detailed DFD in the next level. The lop-
level diagram is often called context diagram. It consists a single process bit, which plays vital role
in studying the current system. The process in the context level diagram is exploded into other
process at the first level DFD.
The idea behind the explosion of a process into more process is that understanding at one
level of detail is exploded into greater detail at the next level. This is done until further explosion
is necessary and an adequate amount of detail is described for analyst to understand the process.
Larry Constantine first developed the DFD as a way of expressing system requirements in
a graphical from, this lead to the modular design.
A DFD is also known as a “bubble Chart” has the purpose of clarifying system
requirements and identifying major transformations that will become programs in system design.
So it is the starting point of the design to the lowest level of detail. A DFD consists of a series of
bubbles joined by data flows in the system.
16 | P a g e
DFD SYMBOLS:
2. An arrow identifies data flow. It is the pipeline through which the information flows
3. A circle or a bubble represents a process that transforms incoming data flow into outgoing
data flows.
Data flow
17 | P a g e
A. DATA FLOW DIAGRAM
18 | P a g e
LEVEL – 1 DFD DIAGRAM FOR GANZ SPORTS MANAGEMENT SYSTEM
19 | P a g e
5.2 ER DIAGRAM
20 | P a g e
5.3.TABLE DESIGN
i)User:
21 | P a g e
ii) Address:
iii) Plan:
22 | P a g e
iv) admin:
V) Log users:
23 | P a g e
VI) health status:
24 | P a g e
VIII) Enrolls to:
25 | P a g e
5.4 INPUT DESIGN
The input design is the link that ties the Information system into the world of its users. It is
a process of converting user-originated inputs to a computer based format. Input data are collected
and organized into a group of similar data. Once identified, appropriate input media are selected
for processing.
The goal of designing input data is to make entry easy, logical and free form errors. In input
data design, we design source document that capture the data and then select the media used to
enter them into the computer. The input forms are developed in a user-friendly way so that a
layman also can easily understand everything. Menus are provided to users and different icons are
designed so the proposed system design looks decorative.
Input design is the part of the overall system design. Source documents initiate a processing
cycle as soon as they are entered into the system through the keyboard. A source should be logical
and easy to understand.
26 | P a g e
5.4.1. DATABASE DESIGN
If you do not know, a database is a place to store information used by software applications.
For example, you could have a web page with a list of companies and all their locations with
contact information for each location. Or a banking application on your computer to sort and
manage your check book. In both cases, it makes sense to store the data in one piece of software
called a database. The database has a structure and rules about how to add, edit, delete, and read
data stored in the database.
Databases also reside in many different places. Some databases exist on only your computer. Other
databases have their data shared and divided across hundreds or thousands of databases located in
many data centres all over the world.
NoSQL database systems are today an effective solution to manage large data sets
distributed over many servers. A primary driver of interest in NoSQL systems is their support for
next-generation web applications, for which relational DBMSs are not well suited. These are
OLTP applications for which data have a structure that does not fit well in the rigid structure of
relational tables, access to data is based on simple read write operations, scalability and
performance re important quality requirements, and a certain level of consistency is also desirable.
NoSQL technology is characterized by a high heterogeneity, which is problematic to application
developers. Currently, database design for NoSQL systems is usually based on best practices and
guidelines.
For example, a NoSQL database works best for applications with massive amounts of data
where most activity involves reading data from the database with some writing of data to the
database. Reading is less intensive than writing because writing data to a database requires tracking
when a database table is open. NoSQL databases tend to be on multiple machines and, in some
cases, machines in multiple data centres. Keeping data in sync is comparatively easier and less
complex with NoSQL databases. Even in cases where large data sets are not involved, some
developers prefer the easier interactions between their code and a NoSQL database.
27 | P a g e
DATA MODELS
The first step in any database design is the creation of a data model. The model distils all
the functionality requirements for an application into data collections, for example, products,
customers, and suppliers for an ecommerce site, as well as properties and relationships between
these collections of data
Business processes sometimes can be duplicated in the database structure, creating problems if a
process changes. A good data model provides flexibility independent from any process.
Needless duplicated table in multiple locations within the same database. This is a big issu e in
relational databases.
Data models for related applications differ for no reason. Ideally, a data model takes into account
other applications used by the business or individual.
Data might be difficult to extract or share with other software applications. If data sharing is
important, a data model should ensure data can be extracted easily.
Database and data models typically are represented as graphs. Early stages of development,
however, use business requirements and functional specifications to clarify the system a data
model must represent and support. In some cases, for example, health care or finance, there may
be examples of data models used widely which are adopted or adapted.
The data model also is one of several factors in the decision about what database management
system (DBMS) to use, relational or NoSQL.
28 | P a g e
NOSQL DATABASE DESIGN
Key-value pairs are the main feature of these databases. Keys are names or unique ID
numbers and values range from simple data to documents to columns of data to structured lists
(arrays) of key-value data. Each row in a NoSQL table includes the key and its value. The design
of NoSQL databases depends on the type of database, called stores:
Document Stores pair each key identifier with a document which can be a document, key-value
pairs, or key-value arrays.
Graph Stores are designed to hold data best represented by graphs, interconnected data with an
unknown number of relations between the data, for example, social networks or road maps.
Key-Value Stores are the simplest type with with every bit of data stored with a name (as key) and
its data (value).
Wide Column Stores are optimized for queries across large data sets.
There are other ways to describe the range of NoSQL databases available but these are the simplest
and most comprehensive categories. And within each type of NoSQL database, functionality
differs which can impact database design. For example, Mongo DB was evolved from the MySQL
project, changing the data model from relational to NoSQL, yet retains most of the indexing,
dynamic queries, and other useful features of relational databases.
Perhaps the key design difference between NoSQL and relational databases is the structure of data
in each database. Relational databases require data be organized ahead of time. NoSQL databases
can have their structure modified on the fly with little impact because they use key-value pairs;
updating a data structure in NoSQL can involve adding additional data to the value of one or more
keys while leaving other key-value pairs in the database untouched.
Design strategies for NoSQL databases depend on the type of database and the virtues (or
negatives) of different data model techniques. Where relational databases have a user-centered
29 | P a g e
approach, asking “What answers can I get from the database?”, NoSQL databases have an
application-centered approach, asking “What questions do I have?”
This is a critical difference both in data structures as well as approaches to designing a database.
Configuring a database to provide specific answers entails lots of design and structure up front
which limits future flexibility and makes future changes likely to be complicated. Configuring a
database to handle many possible questions, in contrast, results in a more flexible database design.
Typically data is duplicated in many different places in a database to help answer questions with
less effort. NoSQL database design uses a set of rules called BASE (basically available, soft-state,
eventually consistent) to guide their design
DE normalization puts all data needed to answer a query in one place, typically a single
database table, instead of splitting the data into multiple tables.
Aggregates use light or no validation of data types, for example, strings or integers.
Joins are done at the application level, not as part of a database query. This requires more
planning to match one type or set of data with another, for example, all examples of a
product type (jeans) sorted by manufacturer in an online store.
Indexes and key tables to identify and sort data quickly for retrieval.
Tree structures can be modelled as a single data entity, for example, a comment with all its
responses.
Output forms are also designed in a specific manner as per the user requirement. Results
are formatted to enhance clarity. Depending on the user the system would generate appropriate
output. The output forms are designed in such a way that the entire user required data is presented.
While designing an output, the system analyst must accomplish the following.
30 | P a g e
• Decide whether to display, print or speak information and select the output medium.
6.1.SYSTEM IMPLEMENTATION
The user may execute some or all Test Cases based on your mobile testing requirements. Test
Cases are organized based on Mobile Testing Types.
Functional Testing
Performance Testing
Security Testing
Usability Testing
Compatibility Testing
The functional testing of Mobiles normally consists in the areas of testing user interactions
as well as testing the transactions. The various factors which are relevant in functional testing are
Type of application based upon the business functionality usages (banking, gaming, social or
business)Target audience type (consumer, enterprise, education) Distribution channel which is
used to spread the application (e.g. Apple App Store, Google play, direct distribution) The most
fundamental test scenarios in the functional testing can be considered as:
To validate whether all the required mandatory fields are working as required. To validate that the
mandatory fields are displayed in the screen in a distinctive way than the non-mandatory fields.
To validate whether the application works as per as requirement whenever the application
starts/stops. To validate whether the application goes into minimized mode whenever there is an
incoming phone call. In order to validate the same we need to use a second phone, to call the
31 | P a g e
device. To validate whether the phone is able to store, process and receive SMS whenever the app
is running. In order to validate the same we need to use a second phone to send sms to the device
which is being tested and where the application under test is currently running. To validate that
the device is able to perform required multitasking requirements whenever it is necessary to do so.
To validate that the application allows necessary social network options such as sharing, posting
and navigation etc. To validate that the application supports any payment gateway transaction such
as Visa, MasterCard, PayPal etc. as required by the application. To validate that the page scrolling
scenarios are being enabled in the application as necessary. To validate that the navigation between
relevant modules in the application are as per the requirement. To validate that the truncation errors
are absolutely to an affordable limit. To validate that the user receives an appropriate error message
like “Network error. Please try after some time” whenever there is any network error. To validate
that the installed application enables other applications to perform satisfactorily, and it does not
eat into the memory of the other applications. To validate that the application resumes at the last
operation in case of a hard reboot or system crash. To validate whether the installation of the
application can be done smoothly provided the user has the necessary resources and it does not
lead to any significant errors. To validate that the application performs auto start facility according
to the requirements. To validate whether the application performs according to the requirement in
all versions of Mobile that is 2g, 3g and 4g. To perform Regression Testing to uncover new
software bugs in existing areas of a system after changes have been made to them. Also rerun
previously performed tests to determine that the program behaviour has not changed due to the
changes. To validate whether the application provides an available user guide for those who are
not familiar to the app
This type of testing’s fundamental objective is to ensure that the application performs acceptably
under certain performance requirements such as access by a huge number of users or the removal
of a key infrastructure part like a database server.
The general test scenarios for Performance Testing in a Mobile application are:
32 | P a g e
To determine whether the application performs as per the requirement under different load
conditions. To determine whether the current network coverage is able to support the application
at peak, average and minimum user levels. To determine whether the existing client-server
configuration setup provides the required optimum performance level. To identify the various
application and infrastructure bottlenecks which prevent the application to perform at the required
acceptability levels. To validate whether the response time of the application is as per as the
requirements. To evaluate product and/or hardware to determine if it can handle projected load
volumes. To evaluate whether the battery life can support the application to perform under
projected load volumes. To validate application performance when network is changed to WIFI
from 2G/3G or vice versa. To validate each of the required the CPU cycle is optimization. To
validate that the battery consumption, memory leaks, resources like GPS, Camera performance is
well within required guidelines. To validate the application longevity whenever the user load is
rigorous. To validate the network performance while moving around with the device. To validate
the application performance when only intermittent phases of connectivity is required.
The fundamental objective of security testing is to ensure that the application’s data and
networking security requirements are met as per guidelines.
The following are the most crucial areas for checking the security of Mobile applications.
To validate that the application is able to withstand any brute force attack which is an automated
process of trial and error used to guess a person’s username, password or credit-card number. To
validate whether an application is not permitting an attacker to access sensitive content or
functionality without proper authentication. To validate that the application has a strong password
protection system and it does not permit an attacker to obtain, change or recover another user’s
password. To validate that the application does not suffer from insufficient session expiration. To
identify the dynamic dependencies and take measures to prevent any attacker for accessing these
vulnerabilities. To prevent from SQL injection related attacks. To identify and recover from any
unmanaged code scenarios. To ensure whether the certificates are validated, does the application
33 | P a g e
implement Certificate Pinning or not. To protect the application and the network from the denial
of service attacks. To analyse the data storage and data validation requirements. To enable the
session management for preventing unauthorized users to access unsolicited information. To check
if any cryptography code is broken and ensure that it is repaired. To validate whether the business
logic implementation is secured and not vulnerable to any attack from outside. To analyse file
system interactions, determine any vulnerability and correct these problems. To validate the
protocol handlers for example trying to reconfigure the default landing page for the application
using a malicious frame. To protect against malicious client side injections. To protect against
malicious runtime injections. To investigate file caching and prevent any malicious possibilities
from the same. To prevent from insecure data storage in the keyboard cache of the applications.
To investigate cookies and preventing any malicious deeds from the cookies. To provide regular
audits for data protection analysis. Investigate custom created files and preventing any malicious
deeds from the custom created files. To prevent from buffer overflows and memory corruption
cases. To analyse different data streams and preventing any vulnerabilities from these.
The usability testing process of the Mobile application is performed to have a quick and easy
step application with less functionality than a slow and difficult application with many features.
The main objective is to ensure that we end up having an easy-to-use, intuitive and similar to
industry-accepted interfaces which are widely used.
To ensure that the buttons should have the required size and be suitable to big fingers. To ensure
that the buttons are placed in the same section of the screen to avoid confusion to the end users.
To ensure that the icons are natural and consistent with the application. To ensure that the buttons,
which have the same function should also have the same colour. To ensure that the validation for
the tapping zoom-in and zoom-out facilities should be enabled. To ensure that the keyboard input
can be minimized in an appropriate manner. To ensure that the application provides a method for
going back or undoing an action, on touching the wrong item, within an acceptable duration. To
ensure that the contextual menus are not overloaded because it has to be used quickly. To ensure
that the text is kept simple and clear to be visible to the users. To ensure that the short sentences
34 | P a g e
and paragraphs are readable to the end users. To ensure that the font size is big enough to be
readable and not too big or too small. To validate the application prompts the user whenever the
user starts downloading a large amount of data which may be not conducive for the application
performance. To validate that the closing of the application is performed from different states and
verify if it re-opens in the same state. To ensure that all strings are converted into appropriate
languages whenever a language translation facility is available .To ensure that the application
items are always synchronized according to the user actions. To ensure that the end user is provided
with a user manual which helps the end user to understand and operate the application who may
be not familiar with the application’s proceeding. Usability testing is normally performed by
manual users since only human beings can understand the sensibility and comfort ability of the
other users.
Compatibility testing on mobile devices is performed to ensure that since mobile devices
have different size, resolution, screen, version and hardware so the application should be tested
across all the devices to ensure that the application works as desired.
The following are the most prominent areas for compatibility testing.
To validate that the user Interface of the application is as per the screen size of the device, no
text/control is partially invisible or inaccessible. To ensure that the text is readable for all users for
the application. To ensure that the call/alarm functionality is enabled whenever the application is
running. The application is minimized or suspended on the event of a call and then whenever the
call stops the application is resumed.
6.2.SYSTEM IMPLEMENTATION
Implementation is the stage in the project where the theoretical design is turned into a working
system. The most crucial stage is achieving a successful new system and giving a user confidence
35 | P a g e
in that the new system will work efficiently and effectively in the implementation stage. The stage
consists of
The purpose of system implementation can be summarized as follows: making the new system
available to a prepared set of users (the deployment), and positioning on-going support and
maintenance of the system within the performing Organization (the transition).at a finer level of
detail, deploying the system consists of executing all steps necessary to educate the consumers on
the use of the new system, placing the newly developed system into production, confirming that
all data required at the start of operation is available and accurate, and validating that business
function that interact with the system are functioning properly. Transitioning the system support
responsibility involves changing from a system development to a system support and maintenance
mode of operation, with ownership of the new system moving from the project team to the
performing organization
A key difference between system implementation and all other phases of the lifecycle is that all
project activities up to this point have been performed in safe, protected, and secure environments,
where project issues that arise have little or no impact on day-to-day business operations. Once the
system goes live, however, this is no longer the case. Any miscues at this point will almost certainly
translate into direct operational and/or financial impacts on the performing Organization. It is
through the careful planning, executions, and management of system implementation activities
that the project team can minimize the like hood of these occurrences, and determine appropriate
contingency plans in the event of a problem.
36 | P a g e
6.2.1 IMPLEMENTATION PROCEDURES
The implementation phase is less creative than system design. A system design may be
dropped at any time prior to implementation, although it becomes more difficult when it goes to
the design phase. The final report of the implementation phase includes procedural flowcharts,
records layouts and a workable plan for implementing the candidate system design into an
operational design
Prepare for System Implementation, where all steps needed in advance of actually deploying
the application are performed, including preparation of both the production environment and the
consumer communities
Deploy System, where the full deployment plan, initially developed during System Design and
evolved throughout subsequent lifecycle phases, is executed and validation
37 | P a g e
In addition to the items identified for inclusion in the Maintenance Manual, additional information
may he provided to facilitate the maintenance and modification of the system. Appendices to
document various maintenance procedures standards, or other essential information may he added
to this document as needed.
7. CONCLUSION
38 | P a g e
8.SCOPE FOR FUTURE ENHANCEMENT
No redundancy: In the proposed system it will be ensured that no repetition of information occurs;
neither on a physical storage nor on a logical implementation level. This economizes on resource
utilization in terms of storage space. Also, even in case of concurrent access no anomalies occur,
and consistency is maintained. In addition to all this, principles of normalization have been
endeavored to be followed.
Immediate retrieval of information: The main objective of the proposed system is to provide a
quick and efficient platform for retrieval of information. queries allowed by the database.
9.BIBLIOGRAPHY
39 | P a g e
10. APPENDIX
A.SCREENSHOT
The following figures refers to the website of the GANZ Sports management System
40 | P a g e
41 | P a g e
The below figure refers to the initial bootup page of the application.
Login Page
42 | P a g e
The below figure refers to Dashboard page if the login username and password is correct and
you get logged in the system.
43 | P a g e
The below figure refers to the Member viewing
44 | P a g e
The below figure refers to the Health Status entry for the member
The below figure refers to the different sports plans available and can be added and edited
45 | P a g e
The below figure refers to Sports Routine which is followed every day
46 | P a g e
The below figure refers to the Admin login detailed Profile
47 | P a g e
B.SAMPLE CODING
LOGIN PAGE
<?xml version="1.0" encoding="utf-8"?>
<LinearLayout xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:app="http://schemas.android.com/apk/res-auto"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
tools:context=".LoginPage"
android:background="@drawable/gradient"
android:orientation="vertical">
<ImageView
android:layout_width="120dp"
android:layout_height="80dp"
android:layout_marginLeft="110dp"
android:layout_marginTop="50dp"
/>
<EditText
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:id="@+id/Uname"
android:layout_marginTop="50px"
android:textColor="#fff"
48 | P a g e
/>
<EditText
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:id="@+id/passw"
android:layout_marginTop="80px"
android:drawableLeft="@drawable/ic_action_name"
android:inputType="textPassword"
android:textColor="#fff"
android:hint="Enter yout Password"/>
<Button
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:id="@+id/logbtn"
android:text="Login"
android:layout_marginTop="50px"
/>
<TextView
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:layout_marginLeft="100dp"
android:layout_marginTop="50px"
android:layout_marginBottom="6dp"
android:textColor="#fff"
android:id="@+id/Newuser"
49 | P a g e
android:background="@null"
/>
</LinearLayout>
package com.example.user.medical;
import android.content.Intent;
import android.support.annotation.NonNull;
import android.support.v7.app.AppCompatActivity;
import android.os.Bundle;
import android.text.Html;
import android.view.View;
import android.widget.Button;
import android.widget.EditText;
import android.widget.TextView;
import android.widget.Toast;
import com.google.firebase.database.DataSnapshot;
import com.google.firebase.database.DatabaseError;
import com.google.firebase.database.DatabaseReference;
import com.google.firebase.database.FirebaseDatabase;
import com.google.firebase.database.ValueEventListener;
TextView tv1;
EditText ed1,ed2;
Button login,pass,newuser;
String uname,passed,dbedname,dbedpass;
50 | P a g e
@Override
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_login_page);
ed1=(EditText)findViewById(R.id.Uname);
ed2=(EditText)findViewById(R.id.passw);
tv1=(TextView)findViewById(R.id.Newuser);
findViewById(R.id.logbtn).setOnClickListener(new View.OnClickListener() {
@Override
uname=ed1.getText().toString();
passed=ed2.getText().toString();
myRef.child(uname).addListenerForSingleValueEvent(new ValueEventListener() {
@Override
dbedname=user.dbusername;
dbedpass=user.dbuserpassword;
b1.putString("name",dbedname);
// Toast.makeText(MainActivity.this,"login Sucess",Toast.LENGTH_LONG).show();
51 | P a g e
if(uname.equalsIgnoreCase(dbedname) && passed.equalsIgnoreCase(dbedpass))
i1.putExtras(b1);
startActivity(i1);
}
else
{
Toast.makeText(LoginPage.this,"Invalid Credentials",Toast.LENGTH_LONG).show();
}
}
@Override
});
});
tv1.setOnClickListener(new View.OnClickListener() {
@Override
startActivity(i2);
52 | P a g e
});
PHP :
<!DOCTYPE html>
<html lang="en">
<title>Login</title>
<!--
=====================================================================================
==========-->
<!--
=====================================================================================
==========-->
<!--
=====================================================================================
==========-->
<link rel="stylesheet" type="text/css" href="fonts/iconic/css/material-design-iconic-
font.min.css">
<!--
=====================================================================================
==========-->
<!--
=====================================================================================
==========-->
53 | P a g e
<link rel="stylesheet" type="text/css" href="vendor/css-hamburgers/hamburgers.min.css">
<!--
=====================================================================================
==========-->
<!--
=====================================================================================
==========-->
<!--
=====================================================================================
==========-->
<!--
=====================================================================================
==========-->
<!--
=====================================================================================
==========-->
</head>
<body>
<div class="limiter">
<div class="container-login100">
<div class="wrap-login100">
</span><BR/><BR/>
54 | P a g e
<span class="login100-form-title p-b-34 p-t-27">
Log in
</span>
</div>
<div class="contact100-form-checkbox">
Remember me
</label>
</div>
<div class="container-login100-form-btn">
<button class="login100-form-btn">
55 | P a g e
Login
</button>
</form>
</div>
<div class="reg">
<a class="txt1" href="reg.php">
</div>
Forgot Password?
</a>
</div>
</div>
</div>
</div>
<div id="dropDownSelect1"></div>
<!--
=====================================================================================
==========-->
<script src="vendor/jquery/jquery-3.2.1.min.js"></script>
56 | P a g e
<!--
=====================================================================================
==========-->
<script src="vendor/animsition/js/animsition.min.js"></script>
<!--
=====================================================================================
==========-->
<script src="vendor/bootstrap/js/popper.js"></script>
<script src="vendor/bootstrap/js/bootstrap.min.js"></script>
<!--
=====================================================================================
==========-->
<script src="vendor/select2/select2.min.js"></script>
<!--
=====================================================================================
==========-->
<script src="vendor/daterangepicker/moment.min.js"></script>
<script src="vendor/daterangepicker/daterangepicker.js"></script>
<!--
=====================================================================================
==========-->
<script src="vendor/countdowntime/countdowntime.js"></script>
<!--
=====================================================================================
==========-->
<script src="js/main.js"></script>
</body>
</html>
57 | P a g e