2. SYSTEM ANALYSIS
2.1 EXISITING SYSTEM
2.2 PROPOSED SYSTEM
2.3 FEASIBILITY STUDY
2.4 SYSTEM REQUIREMENTS
2.5 DATAFLOW DIAGRAM
2.5.1 CONTEX DIAGRAM
2.5.2 TOP LEVEL DFD
2.6 ER DIAGRAM
3. SYSTEM DESIGN
3.1 DATA BASE DESIGN
3.1.1 TABLE LIST
3.1.2 TABLE DESIGN
3.2 INPUT DESIGN
3.3 OUTPUT DESIGN
3.4 MODULE DESCRIPTION
4. SYSTEM CODING
4.1 PROGRAM LIST
4.2 SOURCE CODE
5. SCREEN SHOTS
6. SOFTWARE TESTING
7. IMPLEMENTATION AND MAINTENANCE
8. FURTHER ENHANCEMENT
Public voice concerns all activities with regard to producing a schedule that
must be subjective to different constraints. Public voice can be defined as the
optimization of given activities, actions or events to a set of objects in space-time
matrix to satisfy a set of desirable constraints.
Public voice is a temporal arrangement of a set of proposals in which related
to current constraints with a mission to improve public services and neighborhoods
through user engagement.
By automating this process through community engagement, individual user
engagement and community intervention, collecting the combined voice of citizens,
gathering decisions and comments ultimately bring about a positive change, now and
Hence we have developed practical approach for building Public voice system,
which can be customized to empowered to influence decisions. This project
introduces a practical Public voice system capable of taking care of both strong and
weak constraints effectively, used in an automated public voice system. So that each
user can view proposals and its likes and dislikes. This software is developed in PHP
as front end and MySQL as back end.
Advantages of this System:
• This software will reduce manual work and maintain updates in database from
time to time.
• It is easy to handle works related to Public voice system.
3. 2.SYSTEM ANALYSIS
The major activities in the system study are studying the ways an organization
currently retrieving and processing data to produce information. It involves the study
of various operation performed by the system and their relationship with in and
outside the system. The system study is usually done on the basic approach of
understanding the problem or user requirements. To understand the user requirements
the analyst communicates with the user or customer and studies the basic
requirements of the customer. The study of the present system was necessary to carry
out the preliminary investigation.
2.1 EXISTING SYSTEM
Public voice system concerns all activities with regard to producing a schedule
that must be subjective to different constraints. Public voice system can be defined as
the optimization of given activities, actions or events to a set of objects in space-time
matrix to satisfy a set of desirable constraints.
A key factor in running for piblic is need for a well-planned, well-throughout
and clash-free. Back in the days when technology was not in wide use, user’s has their
own decisions in each and every subjects that occurring day to day in our society but
they couldn’t open their mind because of fear. It requires many books keeping effort.
The possibility of the occurrence of problems is very high.
The Public voice system is an online process in which the users and
administrator have separate login.Mainly two modules in the system such as
admin,user. Public voice is a temporal arrangement of a set of proposals in which
related to current constraints with a mission to improve public services and
neighborhoods through user engagement.
4. By automating this process provide more confidence to society to open their
mind and protest against with their words through community engagement, individual
user engagement and community intervention, collecting the combined voice of
citizens, gathering decisions and comments ultimately bring about a positive change,
now and in future.
The proposed computerization is developed using PHP as front end and
MySQL as back end. The main purpose of the proposed system is to overcome the
drawbacks of the existing system. Speed and accuracy are the main benefits of the
proposed system over the existing system. There are data entries screens, which are
user friendly. Errors in data entry are minimized through validity checks and
messages are displayed whenever necessary. The proposed system will have a high
security system to protect all the confidential information stored in the database.
• Easier entry of data through forms
• Easier modification of data entered
• User friendly interface
• Quick set rival of information
• provides greater efficiency.
• Provide data security.
5. 2.3 FEASIBILITY STUDY
The main objective of feasibility study is to test the technical,social and
economical feasibility of developing a system.This is done before developing a
system . It is derived as follows:
Here the system is checked whether it is technically feasible or not. The
System “Public voice System ” is technically feasible because it consume less CPU
utilization and also it work with advanced operating systems such as
windows7,windows8 etc. So it is technically feasible.
The economic feasibility is the analysis of the system whether it satisfies the
criteria for it economic angle. The System “Public voice System” is less economic
than previous system. The development cost is less. So it is economically feasible.
An economic feasibility test focuses on returns and costs of a proposed plan in both
the short and long-term. The cost for development of the system has been evaluated
and it is found that project is economically feasible.
An estimate should be made to determine how much effort and care will go
into the developing of the system including the training to be given to the user.
Usually, people are reluctant to changes that come in their progression. The System
Fault “Public voice System” is user friendly and the user have the ability to operate
this system have less knowledge about it. So the system is technically, economically
and operationally feasible is developed to be user friendly. It needs less training and
improve working environment.
6. 2.4 SYSTEM REQUIREMENTS
CPU : Pentium IV or above
RAM : 1 GB or above
Hard disk : 250 GB
Keyboard : Any
Mouse : Any optical mouse
Printer : Any
Operating system : Windows 7
Front end : PHP
Back end : MySQL
IDE : NetBeansIDE7.4
7. ABOUT FRONT END
The technology selected for e-gramasabha is PHP/MYSQL. Apache is used
as the HTTP server. The development was done in a „windows environment using‟
adobe dream weaver CS5.
PHP is a general-purpose scripting language that is especially suited to server-
side web development where PHP generally runs on a web server.PHP code is
embedded into the HTML source document. Any PHP code in a requested file is
executed by the PHP runtime, usually to create dynamic web page content. It can also
be used for command- line scripting and client-side GUI applications. PHP can be
deployed on many web servers and operating systems, and can be used with many
relational database management systems (RDBMS). It is available free of charge, and
the PHP Group provides the complete source code for users to build, customize and
extend for their own use.
MySQL is a relational database management system (RDBMS) that runs as
a server providing multi-user access to a number of databases. MySQL is a popular
choice of database for use in web applications and is an open source product. The
process of setting up a MySQL database varies from host to host, however we will
end up with a database name, a user name and a password. Before using our database,
we must create a table. A table is a section of the database for storing related
information. In a table we will set up the different fields which will be used in that
table. Creating a table in phpMyAdmin is simple; we just type the name, select the
number of fields and click the „go button. we will then be taken to a setup screen‟
where you must create the fields for the database. Another way of creating databases
and tables in phpMyAdmin is by executing simple SQL statements. We have used this
method in order to create our database and tables.
8. 2.5 DATA FLOW DIAGRAM
Data Flow Diagram (DFD) is an important tool used by system analyst. DFD
provide an overview of what data a system would process, What transformation of
data are done, what files are used and where the results flow. The graphical
representation of the system makes it a good communication tool between the user
and the analyst.
Analysis model help us to understand the relationship between different
components in the design. Analysis model shows the user clearly how a system will
function. This is the first technical representation of the system.
The analysis modeling must achieve three primary objectives.
• To establish a basis for creation of software design.
• To describe what the user requires.
• To define set of requirements that can be validated once the software
A data flow diagram is a graphical technique tat depicts information flow and
transforms that are applied as data move from input to output. The DFD is used to
represent increasing information flow and functional details. A level 0 DFD also
called fundamental system model represents the entire software elements as single
bubble with input and output indicated by incoming and outgoing arrow respectively.
Data Flow Notations
13. 3 SYSTEM DESIGN
The most creative and challenging phase of the system development is system
design it is a solution, a “how to approach” to the creation of the proposed system. It
refers to the technical specifications that will be applied. IT provides the
understanding and procedural details necessary for implementing the system
recommended in the feasibility study. Design goes through the logical and physical
stages of development.
At an early stage in designing in new system, the system analyst must have a
clear understanding of the objectives, which the design is aiming to fulfill. The first
step is to determine how the output is to be produced and in what format. Second
input data and master files (database) have to be designed to meet the requirements of
the proposed output. The operational (processing) phases are handled through
program construction and testing. Finally details related to justification of the system
and an estimate of the impact of the candidate system on the user and the organization
are documented and evaluated by management.
The final report prior to the implementation phase includes procedural flow
charts, records and report layout and a workable plan for implementation the
14. 3.1 DATA BASE DESIGN
The most important aspects of building an application is the design of tables or
database schema. The data stored in the table must be organized in some manner,
which is meaningful. The overall objectives in the process of the table design have
been to treat data as organizational resources and as integrated whole. The
organization of the data in a database aims to achieve Five major objectives are given
Privacy and security
Several degrees of normalization have to be applied during the process of table
design. The major aim of the process of the normalization is to reduce data
redundancy and prevent losing data integrity. Redundancy refers to unwanted and un
necessary repetition of data. Data integrity has to be converted at all levels. Poor
normalization can cause problem related to storage and retrieval of data. During the
process of normalization which identified cause serious problems, during deletion and
updation. Normalization also helps in simplifying the structure of the table. The
theme behind a database is to handle information as an integrated whole that make
access to information easy, quick inexpensive and flexible for users. The entire
package depends on how the data are maintained in the system. Each table has been
designed with a perfect vision.
The process of refining the data model and creating with a database is called
normalization. Database designers can implement several levels of normalization.
Each level builds on previous levels by reducing the amount of redundancy between
tables. This typically increases performance and avoids problems with data
First normal form
First normal form is the most basic level of database normalization. The keys
to creating tables in the 1NF:
• Eliminate repeating groups in individual tables.
• Create a separate table for each set of related data.
• Identify each set of related data with a primary key.
Second normal form
The first normal form is not a good database design, but it is a start.the keys to
creating tables in the 2NF:
• Create separate tables for sets of values that apply to multiple records.
• Relate these tables with a foreign key.
16. 3.1.1 Table list
SL NO TABLE
1 Login To store login details.
2 proposal To store proposal details.
3 User_details To store user details.
4 like To store user likes & dislikes.
5 feedback To store feedback details.
6 comment To store comment details.
17. 3.1.2Table Design
Field name Data Type constraints Description
login_id int(11) Primary key Login id
username varchar(100) Not null username
password varchar(100) Not null password
role varchar(100) Not null Role of the person
Field Name Data Type constraints Description
cid int(20) Primary key comment id
pid int(20) Foreign Key Proposal id
user varchar(20) Not null User details
comments varchar(20) Not null User comments
18. Table name:feedback
Field Name Data Type Constraints Description
fid int(20) Primary key Feedback id
title varchar(20) Not null Title of feedback
emai varchar(20) Not null User email id
varchar(20) Not null feedback
Field Name Data Type Constraints Description
lid int(11) Primary key Like id
pid int(11) Foreign Key Proposal id
type int(11) Not null type
Not null User details
19. Table name:proposal
Field Name Data Type Constraints Description
pid int(11) Primary key Proposal id
tilte varchar(100) Foreign Key title
des varchar(1000) Not null description
date date Not null Proposal date
image varchar(100) Not null Proposal image
Field Name Data Type Constraints Description
uid int(20) Primary key User id
id int(20) Foreign Key Login id
name varchar(20) Not null User name
address varchar(20) Not null User address
gender varchar(20) Not null User gender
dob date Not null Date of birth
phone bigint(20) Not null Contact no
20. 3.2 INPUT DESIGN
The input design is the link between the information system and the user. It
comprises the developing specification and procedures for data preparation and those
steps are necessary to put transaction data in to a usable form for processing can be
achieved by inspection the computer to read data from a written or printed documents
or it can occur by having people keying the data directly into the system. The design
of input focuses on controlling the input required, controlling the errors, avoiding
delay, avoiding extra steps and keeping the process simple. The input is designed in
such a way so that it provides security and ease of use with retaining the privacy.
Input design considered the following things:
What data should be given as input?
How the data should be arranged or coded?
The dialog to guide the operating personnel in providing input.
Method for preparing input validations and steps to follow when error occur.
21. 3.3 OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and
presents the information clearly. In any system results of processing are
communicated to the users and to other system through outputs. In outputs design it is
determined how the information is to be displaced for immediate need and also the
hard copy output. It is the most important and direct source information to the user.
Efficient and intelligent output design improves the system’s relationship to help user
decision-making. Designing computer output should proceed in an organized, well
thought out manner; the right output must be developed while ensuring that each
output element is designed so that people will find the system can easily and
effectively. When analysis design computer output, they should
Identify the specified output that is needed to meet the requirements.
Select methods for presenting information.
Create documents, report, or other formats that contain information
produced by the system.
The output form of an information system should accomplish one or more
of the following objectives.
Convey information about past activities, current status or projections of
Signal important events, opportunities, problems, or warnings.
Trigger an action.
Confirm an action.
22. 3.4 MODULE DESCRIPTION
The main aim of the proposed system is manage public voice system .The
admin module contain different level of access they are view user, add proposals,
change password, view proposal status, view user feedback.
User can be access their functions like edit profile, view proposals, add likes
& dislikes, add coments, change password etc
Public can be view the public voice system and add their feedbacks to admin.
23. 4.SYSTEM CODING
4.1 Program List
Program name Purpose
1 Connect For database connection
2 Loginform For login to homepage
3 Add proposals For add new proposals
4 Changepassword For change the current password
5 User reg For add a user
6 Log out For Log out
33. 6 SOFTWARE TESTING
The common view of testing held by users is that it is performed to prove that
there are no errors in a program. However, as indicated earlier, this is virtually
impossible, since analyst cannot prove that software is free and clear of errors. The
tester, who may be the program fail. A successful test, then, is one that finds an error.
Analysts know that an effective testing program does not guarantee system reliability.
Therefore, reliability must be Fdatabase designed into the system.
In unit testing, we have to test the programs making up the system. The
software units in a system are the modules and routines that are assembled and
integrated to perform a specific function. Unit testing focuses on the module
independent of one another, in order locate errors. This enables, to detect errors in
coding and logic that are contained within that module alone.
Integration testing is a systematic testing for conducting tests to uncover errors
associated within the interface. The objective is to take unit tested modules and build
a program structure. Here, correction is difficult because the vast expenses of the
entire program complicate the isolation of causes.
In this phase, the entire software system was tested. After integration testing, the
entire software system was tested against various clients. The software has been
tested for its functionality as well as limitation. The various interfaces developed were
thoroughly debugged and were found to be working correctly.
34. Time Table management system
SL.No Test Case Excepted Result Test Result
1 Enter valid username and password
& click on login button
Software should display
2 Enter invalid Software should not display
35. 7. IMPLEMENTATION AND MAINTENANCE
Implementation is the stage of the project when the theoretical
design is turned into a working system. If the implementation stages is not carefully
planned and controlled, it can cause problems. Thus it can be considered to be
SL. No Test Case Excepted Result Test Result
1 Admin add user details Then go to user table Successful
2 All the fields are not fill Then print error message Successful
3 Add proposals Then go to proposal
4 All the fields are not fill Then print error message Successful
36. the most crucial stage in achieving a successful new system and in giving the
users the confidence that the new system will work and effective.
The implementation stage is a system in its own right. It involves
careful planning, investigation of the current system and its constraints in
implementation, design of methods to achieve the change over procedures, training
of staff in the change over methods.
TASK OF IMPLEMENTATION
The first task is implementation planning. Once the planning
has been completed, the computer department is to ensure that the programs in
the system are working properly. At the same time, the user department must
concentrate on training user staffs planning, training and testing are the preparatory
activities of implementation.
The implementation phase ends with an evaluation of the system
after placing it into operation for a period of time. Implementation is the third phase
of the system process. In order to achieve the objectives and the expected
performance the system has been developed in a highly interactive and user-friendly
The tem maintenance is used to describe the software engineering activities
that occur following the delivery of a software product to the customer. The
maintenance phase of the software lifecycle is the time period in which software
performs useful work. We may define maintenance by describing four activities that
are undertaken after a program is released for use. During the use of any large
program, errors will occur and be reported to the developer. The process that includes
the diagnosis and correction of one or more error is called corrective maintenance.
Thus problem correction involves modification and revalidation of software to
corrective maintenance. The second activity that contributes to a definition of
maintenance occurs because of the rapid change that is encountered in every aspect of
An activity that modifies software to properly interface with a changing
environment is adaptive maintenance. The third activity occurs when a software
37. package is successful. As software is used recommendations for new capabilities,
modifications to existing function and general enhancements are received from users.
To satisfy request in this category, perfective maintenance is performed. The fourth
and last maintenance activity occurs when software is changed to improve future
maintainability or reliability or to provide activities including correcting, coding and
design, updating, documentation and test data and upgrading user support.
Maintenance means restoring something to its original conditions. In contrast,
enhancements mean adding or modifying or re execution.
38. Enhancement means adding, modifying, or developing the code to
support the changes in the specification. It is the process of adding new capabilities
such as reports, new interfaces with other systems and new feature such as better
screen or report layout
The proposed system is developed and tested with some amount of
sample data, which satisfy all the requirements. It has high degree of accuracy, user
friendliness efficiency. The system is flexible and changes, if any can be made with
out much difficulty. Further improvements and extensions can be made in the system
to make overall work easier.
Further modifications and extensions in the system can made to make
overall work easier like the library make online. Those options are not in the software
can be included to improve the efficiency of the software.
39. o PHP book by Vasvani (TMH publications).
o Beginning PHP5 by WROX.
o Informatics practices by Sumita Arora.
o Head First PHP & MySQL by Lynn Beighley and Michael