0% found this document useful (0 votes)
20 views42 pages

Sequrity Guard Hiring - Removed

The document is a project report on the 'Online Security Guard Hiring System' submitted for the M.Sc (Information Technology) degree. It details the system's design, functionality, advantages, and feasibility, emphasizing its web-based technology for managing security guard details and bookings. The report includes acknowledgments, a certificate of approval, and outlines the software and hardware requirements, system design, testing strategies, and user and admin modules.

Uploaded by

Vaibhav Bhamare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views42 pages

Sequrity Guard Hiring - Removed

The document is a project report on the 'Online Security Guard Hiring System' submitted for the M.Sc (Information Technology) degree. It details the system's design, functionality, advantages, and feasibility, emphasizing its web-based technology for managing security guard details and bookings. The report includes acknowledgments, a certificate of approval, and outlines the software and hardware requirements, system design, testing strategies, and user and admin modules.

Uploaded by

Vaibhav Bhamare
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Project Report

On

ONLINE SECURITY GUARD HIRING SYSTEM


Submitted in partial fulfillment of the requirements for the award of degree of

M.Sc (INFORMATION TECHNOLOGY)


TO

SHANTI DEVI ARYA MAHILA COLLEGE

DINANAGAR

Submitted By:
Submitted To:­
Isha Sabharwal
Ms. Neha Saini
(20862127601)
Assistant Professor
Jagriti Sharma
Post Graduate Deptt. Of Computer Science & IT
(20862127624)

POST GRADUATE DEPARTMENT OF COMPUTER Sc. & IT


GURU NANAK DEV UNIVERSITY, AMRITSAR
ACKNOWLEDGEMENT

With deep sense of gratitude, We express our sincere thanks and obligation to our esteemed guide
Ms. Neha Saini (Assistant Professor). It is because of her able and mature guidance and co­
operation without which it would not have been possible for us to complete our project.
We would also like to thank Dr. Deepak Jyoti, HOD, Post Graduate Deptt. of Comp Sc. & IT,
Shanti Devi Arya Mahila College, Dinanagar for providing the institute with an environment where
one can use her intellect and creativity to develop something fruitful and also for allowing us the
opportunity to experience dynamic professional environment during our Training. This environment
facilitated us in pursuing this project.
It is our pleasant duty to thank all the staff members of the Computer Department for their time
to time suggestions.
Finally, We would like to thank the almighty and our parents for their moral support and our
friends with whom we shared our day-to-day experience and received lots of suggestions that
improved our quality of work.

Isha Sabharwal Jagriti Sharma

20862127601 20862127624
CERTIFICATE OF APPROVAL

This is certify that the project report entitled


ONLINE SECURITY GUARD HIRING SYSTEM submitted to Shanti Devi
Arya Mahila College, Dinanagar in partial fulfillment of the requirement
for the award of degree of M.Sc (Information Technology) is an authentic and
original work carried out by Isha Sabharwal (20862127601) and Jagriti
Sharma (20862127624) under my guidance and supervision. The Post
Graduate Deptt. of Comp Sc. & IT has accepted the report as the
fulfillment of the requirements for the degree of Master of Science
(Information Technology). No part of this report has been submitted to any
other College/University for the reward of any Degree to the best of my knowledge.

Ms. Neha Saini Dr. Deepak Jyoti


Assistant Professor (Comp Sc.) Head, PG Department of Computer Sc. & IT
(Project Supervisor) Shanti Devi Arya Mahila College
Shanti Devi Arya Mahila College Dinanagar
Dinanagar
DECLARATION

We hereby declare that this project report on "OnlineSecurity Guard hiring


System" which is being submitted in partial fulfillment of the Training Programme of M.Sc
(Information Technology) to Shanti Devi Arya Mahila College,Dinanagar, is the result of the
work carried out by us, under the guidance of Ms. Neha Saini (Assistant Professor), Shanti
Devi Arya Mahila College, Dinanagar

Isha Sabharwal Jagriti Sharma

20862127601 20862127624
Abstract
This project manages the details of security guards and provide job to them it is
also beneficial for those who search security guards online.

Introduction
“Online Security Guard Hiring System” is a web-based technology which manages
security guards details. In this project it is easy to get security guards for any farm
or individual only by filling one form and get response quickly by admin. When
user fill the security guard required form they get booking number by which they
search what is status of their security booking. This web application provides a
way to effectively control record & track the booking application and security
guard details.

An “Online Security Guard Hiring System” effectively manages and handles all
the functioning of a security hiring farms. The software system can store the data
of security guard and booking application.

Online Security Guards Hiring System is developed using PHP with MySQLi
extension. It’s a web-based application used to hire security guards.

Advantages:
• It helps the security farms to handle and manage guard details and booking
details of guards.
• Reduce time consumption.
• Reduce error scope.
• All system managements are automated.
• Centralized database management.
• Easy operations for operator of the system.
• No paper work requirement.

Disadvantages:
• The system can only handle Single security farms.

Applications:

• To be used in security farms.


Feasibility study

Whenever we design a new system, normally the management will ask for a
feasibility report of the new system. The management wants to know the
technicalities and cost involved in creation of new system.

- Technical feasibility
- Economic feasibility
- Physical feasibility

Technical feasibility:

Technical feasibility involves study to establish the technical capability of the


system being created to accomplish all requirements to the user. The system
should be capable of handling the proposed volume of data and provide users
and operating environment to increase their efficiency.
For example, system should be capable of handling the proposed volume of data
and provide users.

Economic feasibility:

Economic feasibility involves study to establish the cost benefit analysis. Money
spent on the system must be recorded in the form of benefit from the system.
The benefits are of two types:

Tangible benefits:
- Saving man labor to do tedious tasks saves time.
-
Intangible benefits:
- Improves the quality of organization.

Physical feasibility:

It involves study to establish the time responses of the new system being
created. For e.g., if the new system takes more than one day to prepare crucial
finance statement for the management, wherever it was required in an hour, the
system fails to provide the same.

It should be clearly establish that the new system requirements in the form of
time responses would be completely met with. It may call for increase in cost. If
the required cost is sacrificed then the purpose of the new system may not be
achieved even if it was found to be technically feasible.
Scope of the Project

The proposed system will affect or interface with the security guards and user
who search security guards.

The system works and fulfills all the functionalities as per the proposed system.

It will provide reduced response time against the queries made by different
users.

This project is based on PHP language with MYSQL database manages the details
of security guards and provide job to them it is also beneficial for those who
search security guards online.

All possible features such as verification, validation, security, user friendliness etc
have been considered.

This project has two modules i.e. admin and user.


User Module
Hiring Form: In this section, users can fill out the form to fire the guards.
Request Status: In this section, users can check the status of guard requests.
Admin Module
Secure Admin Login
Admin Setting: In this section, Admin can update the profile details, and change
their password.
Dashboard: In this section, Admin briefly views the listed security guards, Total
hiring requests, New requests, Accepted requests, and Rejected requests.
Security Guards: In this Section, Admin can Add security guards, edit the added
guard info, and also delete the guard record.
Hiring Booking Requests: In this Section, Admin can view all, new, rejected, and
accepted requests and take the appropriate action.
Hiring Report: In this section, the admin can view the hiring request in a
particular period.
Search Request: In this section, Admin can search the request by booking no,
name, and mobile number also.
Admin can also recover their password.
Software & Hardware requirements

✓ Any Version of browser after Mozilla Firefox 4.0, Internet Explorer


6.0,chrome

Hardware requirements:

✓ Any processor after Pentium 4.


✓ Any version of Windows XP or later.
✓ Processor speed: 2.0 GHz
✓ RAM : 1GB
✓ Hard disk: 40GB to 80 GB

Software requirements:
✓ Database : MySQL
✓ Server : Apache
✓ Frontend : HTML
✓ Scripting Language : JavaScript
✓ IDE : Sublime
✓ Technology : PHP
System Design
Design is the first step in the development phase for any techniques and
principles for the purpose of defining a device, a process or system in sufficient
detail to permit its physical realization.

Once the software requirements have been analyzed and specified the software
design involves three technical activities - design, coding, implementation and
testing that are required to build and verify the software.

The design activities are of main importance in this phase, because in this
activity, decisions ultimately affecting the success of the software
implementation and its ease of maintenance are made. These decisions have the
final bearing upon reliability and maintainability of the system. Design is the only
way to accurately translate the customer’s requirements into finished software
or a system.

Design is the place where quality is fostered in development. Software design is a


process through which requirements are translated into a representation of
software. Software design is conducted in two steps. Preliminary design is
concerned with the transformation of requirements into data
Unified Modelling Language Diagrams (UML):

• The unified modelling language allows the software engineer to express an


analysis model using the modelling notation that is governed by a set of
syntactic semantic and pragmatic rules.

• A UML system is represented using five different views that describe the
system from distinctly different perspective. Each view is defined by a set of
diagram, which is as follows.

User Model View

i. This view represents the system from the users perspective.

ii. The analysis representation describes a usage scenario from the end-users
perspective.
Structural model view

◆ In this model the data and functionality are arrived from inside the
system.

◆ This model view models the static structures.

Behavioural Model View

◆ It represents the dynamic of behavioural as parts of the system,


depicting the interactions of collection between various structural
elements described in the user model and structural model view.

Implementation Model View


◆ In this the structural and behavioural as parts of the system are
represented as they are to be built.

Environmental Model View

In this the structural and behavioural aspects of the environment in which the
system is to be implemented are represented.

UML is specifically constructed through two different domains they are

◆ UML Analysis modelling, which focuses on the user model and


structural model views of the system?

◆ UML design modelling, which focuses on the behavioural modelling,


implementation modelling and environmental model views.
Sign in
Use Case Diagrams Admin

Dashboard

Add Security guard

Manage Security guard

Manage Booking

Generate Booking

Search

Update Profile

Change Password

Password Recovery
Use Case Diagrams User

Visit Website

Fill Hiring Form

Search Booking
Status
ENTITY-RELATIONSHIP Diagrams

E-R (Entity-Relationship) Diagram is used to represents the relationship between


entities in the table.

The symbols used in E-R diagrams are:


SYMBOL PURPOSE

Represents Entity sets.

Represent attributes.

Represent Relationship Sets.

Line represents flow

Structured analysis is a set of tools and techniques that the analyst.

To develop a new kind of a system:

The traditional approach focuses on the cost benefit and feasibility analysis,
Project management, and hardware and software selection a personal
considerations.
Data Flow Diagrams

A Data Flow Diagram (DFD) is a traditional visual representation of the


information flows within a system. A neat and clear DFD can depict the right
amount of the system requirement graphically. It can be manual, automated, or a
combination of both.

It shows how data enters and leaves the system, what changes the information,
and where data is stored.

The objective of a DFD is to show the scope and boundaries of a system as a


whole. It may be used as a communication tool between a system analyst and
any person who plays a part in the order that acts as a starting point for
redesigning a system. The DFD is also called as a data flow graph or bubble chart.

The following observations about DFDs are essential:

1. All names should be unique. This makes it easier to refer to elements in the
DFD.
2. Remember that DFD is not a flow chart. Arrows is a flow chart that
represents the order of events; arrows in DFD represents flowing data. A
DFD does not involve any order of events.
3. Suppress logical decisions. If we ever have the urge to draw a diamond-
shaped box in a DFD, suppress that urge! A diamond-shaped box is used in
flow charts to represents decision points with multiple exists paths of which
the only one is taken. This implies an ordering of events, which makes no
sense in a DFD.
4. Do not become bogged down with details. Defer error conditions and error
handling until the end of the analysis.

Standard symbols for DFDs are derived from the electric circuit diagram analysis
and are shown in fig:
Circle: A circle (bubble) shows a process that transforms data inputs into data
outputs.

Data Flow: A curved line shows the flow of data into or out of a process or data
store.

Data Store: A set of parallel lines shows a place for the collection of data items. A
data store indicates that the data is stored which can be used at a later stage or
by the other processes in a different order. The data store can have an element
or group of elements.
Source or Sink: Source or Sink is an external entity and acts as a source of system
inputs or sink of system outputs.

Zero Level DFD


First Level DFD
Second Level DFD
Database Design

The data in the system has to be stored and retrieved from database. Designing

the database is part of system design. Data elements and data structures to be

stored have been identified at analysis stage. They are structured and put

together to design the data storage and retrieval system.

A database is a collection of interrelated data stored with minimum redundancy

to serve many users quickly and efficiently. The general objective is to make

database access easy, quick, inexpensive and flexible for the user. Relationships

are established between the data items and unnecessary data items are removed.

Normalization is done to get an internal consistency of data and to have minimum

redundancy and maximum stability. This ensures minimizing data storage

required, minimizing chances of data inconsistencies and optimizing for updates.

The MS Access database has been chosen for developing the relevant databases.

“Online Security Guard Hiring System” (OSGHS) contains three MySQL tables :

tbladmin table Structure : This table store the admin login and personal Details.
tblguard table Structure : This table store ticket detail of security guard.

tblhiring table Structure : This table store security guard booking detail.
Class Diagram:

The class diagram shows a set of classes, interfaces, collaborations and their
relationships.
System Testing

SOFTWARE TESTING TECHNIQUES:

Software testing is a critical element of software quality assurance and

represents the ultimate review of specification, designing and coding.

TESTING OBJECTIVES:
1. Testing is process of executing a program with the intent of finding an
error.

2. A good test case design is one that has a probability of finding an as yet

undiscovered error.

3. A successful test is one that uncovers an as yet undiscovered error.

These above objectives imply a dramatic change in view port.


Testing cannot show the absence of defects, it can only show that software

errors are present.

There are three types of testing strategies

1. Unit test
2. Integration test
3. Performance test
Unit Testing:

Unit testing focuses verification efforts on the smallest unit of software design
module. The unit test is always white box oriented. The tests that occur as part of
unit testing are testing the module interface, examining the local data structures,
testing the boundary conditions, execution all the independent paths and testing
error-handling paths.

Integration Testing:

Integration testing is a systematic technique or construction the program


structure while at the same time conducting tests to uncover errors associated
with interfacing. Scope of testing summarizes the specific functional,
performance, and internal design characteristics that are to be tested. It employs
top-down testing and bottom-up testing methods for this case.

Performance Testing:

Timing for both read and update transactions should be gathered to determine
whether system functions are being performed in an acceptable timeframe.
Output Screen of Project

Hiring Form
Search Hiring Request Status
Admin Login

Forgot Password
Dashboard

Admin Profile
Change Password

Add Security Guard


Manage Security Guard

Update Security Guard


All Booking Request

View All Booking Request


New Booking Request

View New booking Request


Accepted Booking Request

View accepted booking details


Rejected Booking Requests

View rejected booking


Between dates report

View between dates report


Search Request
Conclusion

The project titled as “Online Security Guard Hiring System” was deeply studied

and analyzed to design the code and implement. It was done under the guidance

of the experienced project guide. All the current requirements and possibilities

have been taken care during the project time.

“Online Security Guard Hiring System” is a web based application which

manages and handles guards details and guard hiring details.


Bibliography

For PHP

➢ https://www.w3schools.com/php/default.asp
➢ https://www.sitepoint.com/php/
➢ https://www.php.net/

For MySQL

➢ https://www.mysql.com/
➢ http://www.mysqltutorial.org

For XAMPP

➢ https://www.apachefriends.org/download.html

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy