Documentos de Académico
Documentos de Profesional
Documentos de Cultura
REPORT ON
“Employee Leave Management System”
Roll No:
2
PREFACE
I did my grand on the topic “” in order to make the date manner. Where ever
possible, tables and figures have been incorporated, recommendations have
been made on the basis of finding herein.
Vickey Singh
Course: BCA
Roll No:
Registration No:
Date:
Place:
BCA Department
3
CERTIFICATE OF ORIGINALITY FROM THE
GUIDE
The matter embodied in this is a genuine work done by the student and has not
been submitted either to this University or to any other University/Institute for the
fulfillment of the requirement of any course of study.
External Examiner
Karabi Choudhury
BCA Department
Dispur College
Date:
Place:
4
ACKNOWLEDGEMENT
I take this opportunity to thank all those persons, whose constant guidance,
support and help have appreciated me to see the face of the completion of
this . Preparing a is a tedious task and was fortunate enough to get support
from a large number of persons to whom, I shall always remain grateful.
I also express my sincere thanks and gratitude to Dr. Amar Saikia, Principal
of Dispur College, for giving me the chance to complete my BCA under . I
am also thankful to Mrs. Bijoyata Saha and Mrs. Karabi Choudhury, Assistant
Professors of Dispur College, for their kind cooperation and help to
successfully complete my . At last I also express my thanks to all of my
friends who gave me the constant inspiration for fulfillment of my .
Vickey Singh
Course: BCA
Roll No:
5
SELF DECLARATION
I also declare that, any or all contents incorporated in this dissertation, has not
been submitted in any form for the award of any other degree to any Institute or
University.
Vickey Singh
Course: BCA
Roll No:
6
TO WHOM IT MAY CONCERN
This is to certify that the entitled “” is bonfire work done by Vickey Singh of
th
BCA 6 Semester having
Roll No: and Registration No: of 2017-18.
In partial fulfillment of the requirement for the award of BCA and have been
carried out my direct supervision and guidance. This report or a similar report
on the topic have not been submitted for any other examination and does not
form part of any course undergone by the candidate.
Internal Guide
Karabi Choudhury
BCA Department
Dispur College
7
Contents
INTRODUCTION TO
SYSTEM ARCHITECTURE
TECHNICAL FEASIBILITY
OPERATIONAL FEASIBILITY
FUNCTIONAL REQUIREMENTS
SOFTWARE REQUIREMENTS
HARDWARE REQUIREMENTS
INTROUDCTION TO PHP
INTRODUCTION TO MYSQL
INTRODUCTION
E-R DIAGRAMS
OUTPUT SCREENS
SYSTEM SECURITY
INTRODUCTION
SECURITY IN SOFTWARE
BIBLIOGRAPHY
8
9
INTERDUCTION
This is aimed at developing a web based Leave Management Tool, which is of importance to
either an organization or a college.
The is an Intranet based application that can be accessed throughout the organization or a
specified group/Dept. This system can be used to automate the workflow of leave
applications and their approvals. The periodic crediting of leave is also automated. There are
features like notifications, cancellation of leave, automatic approval of leave, report
generators etc in this Tool.
This is aimed at developing a web based Leave Management Tool, which is of importance to
either an organization or a college.
The Easy Leave is an Intranet based application that can be accessed throughout the
organization or a specified group/Dept. This system can be used to automate the workflow of
leave applications and their approvals. The periodic crediting of leave is also automated.
There are features like notifications, cancellation of leave, automatic approval of leave, report
generators etc in this Tool.
There are registered people in the system. Some are approvers. An approver can also be a
requestor. In an organization, the hierarchy could be Engineers/Managers/Business
Managers/Managing Director etc. In a college, it could be Lecturer/Professor/Head of the
Department/Dean/Principal etc.
see his/her eligibility details (like how many days of leave he/she is eligible for etc)
10
query the leave balance
see his/her leave history since the time he/she joined the company/college
apply for leave, specifying the from and to dates, reason for taking leave, address for
communication while on leave and his/her superior‟s email id
see his/her current leave applications and the leave applications that are submitted to
him/her for approval or cancellation
withdraw his/her leave application (which has not been approved yet)
Cancel his/her leave (which has been already approved). This will need to be
approved by his/her Superior
get help about the leave system on how to use the different features of the system
The number of days of leave (as per the assumed leave policy) should be automatically
credited to everybody and a notification regarding the same be sent to them automatically
An automatic leave-approval facility for leave applications which are older than 2 weeks
should be there. Notification about the automatic leave approval should be sent to the person
as well as his superior
11
No proper coordination between different Applications and Users.
The development of the new system contains the following activities, which try to automate
the entire process keeping in view of the database integration approach.
The system makes the overall management much easier and flexible.
Readily upload the latest updates, allows user to download the alerts by clicking the
URL.
There is no risk of data mismanagement at any level while the development is under
process.
12
SYSTEM ANLAYSIS
To provide flexibility to the users, the interfaces have been developed that are accessible
through a browser. The GUI‟S at the top level have been categorized as
The „operational or generic user interface‟ helps the end users of the system in transactions
through the existing data and required services. The operational user interface also helps the
ordinary users in managing their own information in a customized manner as per the included
flexibilities
Input design is a part of overall system design. The main objective during the input design is
as given below:
INPUT STAGES:
Data recording
Data transcription
Data conversion
13
Data verification
Data control
Data transmission
Data validation
Data correction
INPUT TYPES:
It is necessary to determine the various types of inputs. Inputs can be categorized as follows:
INPUT MEDIA:
At this stage choice has to be made about the input media. To conclude about the input media
consideration has to be given to;
Type of input
Flexibility of format
Speed
Accuracy
Verification methods
Rejection rates
Ease of correction
Storage and handling requirements
Security
Easy to use
Portability
Keeping in view the above description of the input types and input media, it can be said that
most of the inputs are of the form of internal and interactive. As
14
Input data is to be the directly keyed in by the user, the keyboard can be considered to be the
most suitable input device.
OUTPUT DESIGN:
In general are:
OUTPUT DEFINITION
For Example
15
OUTPUT MEDIA:
In the next stage it is to be decided that which medium is the most appropriate for the output.
The main considerations when deciding about the output media are:
Keeping in view the above description the is to have outputs mainly coming under the
category of internal outputs. The main outputs desired according to the requirement
specification are:
The outputs were needed to be generated as a hard copy and as well as queries to be viewed
on the screen. Keeping in view these outputs, the format for the output is taken from the
outputs, which are currently being obtained after manual processing. The standard printer is
to be used as output media for hard copies.
16
2.4 SYSTEM ARCHITECTURE
Architecture flow:
Below architecture diagram represents mainly flow of requests from users to database
through servers. In this scenario overall system is designed in three tires separately using
three layers called presentation layer, business logic layer and data link layer. This was
developed using 3-tire architecture.
17
FEASIBILITY STUDY
Preliminary investigation examines feasibility; the likelihood the system will be useful
to the organization. The main objective of the feasibility study is to test the Technical,
Operational and Economical feasibility for adding new modules and debugging old running
system. All systems are feasible if they are given unlimited resources and infinite time. There
are aspects in the feasibility study portion of the preliminary investigation:
Technical Feasibility
Operation Feasibility
Economical Feasibility
The technical issue usually raised during the feasibility stage of the investigation
includes the following:
User-friendly
Customer will use the forms for their various transactions i.e. for adding new routes,
viewing the routes details. Also the Customer wants the reports to view the various
18
transactions based on the constraints. Theses forms and reports are generated as user-
friendly to the Client.
Reliability
The package wills pick-up current transactions on line. Regarding the old transactions,
User will enter them in to the system.
Security
The web server and database server should be protected from hacking, virus etc
Portability
The application will be developed using standard open source software (Except Oracle)
like Java, tomcat web server, Internet Explorer Browser etc these software will work both
on Windows and Linux o/s. Hence portability problems will not arise.
Availability
Maintainability
The system called the ewheelz uses the 2-tier architecture. The 1st tier is the GUI, which
is said to be front-end and the 2nd tier is the database, which uses My-Sql, which is the
back-end.
The front-end can be run on different systems (clients). The database will be running at
the server. Users access these forms by using the user-ids and the passwords.
The computerized system takes care of the present existing system‟s data flow and
procedures completely and should generate all the reports of the manual system besides a
host of other management reports.
It should be built as a web based application with separate web server and database
server. This is required as the activities are spread through out the organization customer
19
wants a centralized database. Further some of the linked transactions take place in
different locations.
Open source software like TOMCAT, JAVA, Mysql and Linux is used to minimize
the cost for the Customer.
20
REQUIREMENTS SPECIFICATIONS
MODULES
Administration
Employee
Search
Report
Authentication
In this module the Administrator has the privileges to add all the Employees and
register them in the organization and check the information of the Employee and check the
status of the leave when they have taken and what type of leave they have taken and search is
done based on the employee and report is generated based on employee.
Search:-
This module contain complete search like Leave search, Type of Leave, Employee
based on the leave and starting and ending day of leave.
Employee:-
In this module employee has the privileges to use his username and password for
login and he can see the request given by the customer and he can pass the process to the
Business Manager and maintain the record of the customers.
Reports:-
This module contains all the information about the reports generated by the Employees based
on the Performance and by the leave status.
20
Authentication:-
This module contains all the information about the authenticated user. User without his
username and password can‟t enter into the login if he is only the authenticated user then he
can enter to his login.
The requirement specification for any system can be broadly stated as given below:
One of the most difficult tasks is that, the selection of the software, once system requirement
is known is determining whether a particular software package fits the requirements. After
initial selection further security is needed to determine the desirability of particular software
compared with other candidates. This section first summarizes the application requirement
question and then suggests more detailed comparisons.
21
Operating System-------- Windows 95/98/NT/2000
Browser-------- IE
The selection of hardware is very important in the existence and proper working of any
software. In the selection of hardware, the size and the capacity requirements are also
important.
The Web Based Manufacturing System can be efficiently run on Pentium system with at least
128 MB RAM and Hard disk drive having 20 GB. Floppy disk drive of 1.44 MB and 14 inch
Samsung color monitor suits the information system operation.(A Printer is required for hard
copy output).
22
INTRODUCTION TO PHP
PHP
PHP: Hypertext Preprocessor, is a widely used, general-purpose scripting language that was
originally designed for web development, to produce dynamic web pages. It can be
embedded into HTML and generally runs on a web server, which needs to be configured to
process PHP code and create web page content from it. It can be deployed on most web
servers and on almost every operating system and platform free of charge.
PHP was originally created by Rasmus Lerdorf in 1995 and has been in continuous
development ever since. The main implementation of PHP is now produced by The PHP
Group and serves as the de facto standard for PHP as there is no formal specification.PHP is
free software released under the PHP License, which is incompatible with the GNU General
Public License (GPL) because of restrictions on the use of the term PHP
PHP has evolved to include a command line interface capability and can also be used in
standalone graphical applications.
About HTML
HTML, which stands for Hyper Text Markup Language, is the predominant markup language
for web pages. It provides a means to create structured documents by denoting structural
semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and
other items. It allows images and objects to be embedded and can be used to create
interactive forms. It is written in the form of HTML elements consisting of "tags" surrounded
by angle brackets within the web page content. It can include or can load scripts in languages
such as JavaScript which affect the behavior of HTML processors like Web browsers; and
Cascading Style Sheets (CSS) to define the appearance and layout of text and other material.
The W3C, maintainer of both HTML and CSS standards, encourages the use of CSS over
explicit presentational markup.
Hyper Text Markup Language(HTML) is the encoding scheme used to create and format a
web document. A user need not be an expert programmer to make use of HTML for creating
hypertext documents that can be put on the internet.
Most graphical e-mail clients allow the use of a subset of HTML (often ill-defined) to provide
formatting and semantic markup not available with plain text. This may include typographic
information like coloured headings, emphasized and quoted text, inline images
23
and diagrams. Many such clients include both a GUI editor for composing HTML e-mail
messages and a rendering engine for displaying them. Use of HTML in e-mail is controversial
because of compatibility issues, because it can help disguise phishing attacks, because it can
confuse spam filters and because the message size is larger than plain text.
NAMING CONVENTIONS
The most common filename extension for files containing HTML is .html. A common
abbreviation of this is .htm, which originated because some early operating systems and file
systems, such as DOS and FAT, limited file extensions to three letters.
HTML APPLICATION
An HTML Application is a Microsoft Windows application that uses HTML and Dynamic
HTML in a browser to provide the application's graphical interface. A regular HTML file is
confined to the security model of the web browser, communicating only to web servers and
manipulating only webpage objects and site cookies. An HTA runs as a fully trusted
application and therefore has more privileges, like creation/editing/removal of files and
Windows Registry entries. Because they operate outside the browser's security model, HTAs
cannot be executed via HTTP, but must be downloaded (just like an EXE file) and executed
from local file system
ABOUT JAVASCRIPT
24
What is MySQL?
MySQL, the most popular Open Source SQL database management system, is
developed, distributed, and supported by Oracle Corporation.
Data Types
Many data types: signed/unsigned integers 1, 2, 3, 4, and 8 bytes long, FLOAT,
DOUBLE, CHAR, VARCHAR, BINARY,VARBINARY, TEXT, B LOB, DATE,
TIME, DATETIME, TIMESTAMP, YEAR, SET, ENUM.
Full support for SQL GROUP BY and ORDER BY clauses. Support for
group functions(COUNT(), AVG(), STD(),SUM(), MAX(), MIN(), and
GROUP_CONCAT()).
Support for LEFT OUTER JOIN and RIGHT OUTER JOIN with both standard
SQL and ODBC syntax.
Support for DELETE, INSERT, REPLACE, and UPDATE to return the number of
rows that were changed (affected), or to return the number of rows matched instead
by setting a flag when connecting to the server.
25
An EXPLAIN statement to show how the optimizer resolves a query.
Independence of function names from table or column names. For example, ABS is
a valid column name. The only restriction is that for a function call, no spaces are
permitted between the function name and the “(” that follows it.
You can refer to tables from different databases in the same statement.
Security
A privilege and password system that is very flexible and secure, and that enables
host-based verification.
Connectivity
Clients can connect to MySQL Server using several protocols:
On Windows systems in the NT family (NT, 2000, XP, 2003, or Vista), clients can
connect using named pipes if the server is started with the --enable-named-pipe
option. In MySQL 4.1 and higher, Windows servers also support shared-memory
connections if started with the --shared-memory option. Clients can connect through
shared memory by using the --protocol=memory option.
On Unix systems, clients can connect using Unix domain socket files.
MySQL client programs can be written in many languages. A client library written
in C is available for clients written in C or C++, or for any language that provides C
bindings.
APIs for C, C++, Eiffel, Java, Perl, PHP, Python, Ruby, and Tcl are available,
enabling MySQL clients to be written in many languages.
26
Windows or Unix. Connector/ODBC source is available. All ODBC 2.5 functions
are supported, as are many others.
The Connector/J interface provides MySQL support for Java client programs that
use JDBC connections. Clients can be run on Windows or Unix. Connector/J source
is available.
27
\SYSTEM DESIGN
components, modules, interfaces, and data for a system to satisfy specified requirements. One
could see it as the application of systems theory to product development. There is some
overlap and synergy with the disciplines of systems analysis, systems architecture and
systems engineering.
DFD 0 Level
Administrator Employee
Receive Report
Emp_id
Easy-Leave
Report
Details
Search
Details
Report
_id
Report
Search
_id
Search
Authenticati
on
28
DFD 1 Level
29
ER Diagram
30
5.4 NORMALIZATION
Normalization
31
Third Normal Form:
Data Dictionary
admin
tbldepartments
32
DepartmentCode varchar(50)YES (NULL)
tblemployees
33
Dob varchar(100) NO (NULL)
tblleaves
34
LeaveType varchar(110) NO (NULL)
tblleavetype
35
Field Type Null Key Default
36
OUTPUT SCREENS
37
Employee Profile PAGE
38
Apply Leave PAGE.
39
Admin Login PAGE
40
MANAGE EMPLOYEES PAGE
41
LEAVE HISTORY PAGE
42
ADD LEAVES PAGE
43
MANAGE DEPARTMENT PAGE
44
DASHBOARD PAGE
45
SYSTEM SECURITY
Introduction:
To configure authentication for a Web Application, use the <login-config> element of the
web.xml deployment descriptor. In this element you define the security realm containing the
user credentials, the method of authentication, and the location of resources for
authentication.
1. Open the web.xml deployment descriptor in a text editor or use the Administration
Console. Specify the authentication method using the <auth-method> element. The
available options are:
BASIC
Basic authentication uses the Web Browser to display a username/password dialog box. This
username and password is authenticated against the realm.
FORM
Form-based authentication requires that you return an HTML form containing the username
and password. The fields returned from the form elements must be: j_username and
j_password, and the action attribute must be j_security_check. Here is an example of the
HTML coding for using FORM authentication:
46
</form>
The resource used to generate the HTML form may be an HTML page, a JSP, or a servlet.
You define this resource with the <form-login-page> element.
The HTTP session object is created when the login page is served. Therefore, the
session.isNew() method returns FALSE when called from pages served after successful
authentication.
47
9. BIBLIOGRAPHY
BIBLIOGRAPHY
Websites
http://www.w3schools.com
http://www.quibids.com
http://www.ubid.com
http://www.i-bidder.com
http://www.redbid.com
www.google.com.
www.wikipedia.com
www.w3schools.com
www.wikipedia.com
www.apache.org
www.management.com
www.code.com
48