E-Vaccination System: Submitted by
E-Vaccination System: Submitted by
NAJEEMA N 32018801018
SREENANDAN S L 32018801027
PROJECT REPORT
External Examiner
ACKNOWLEDGEMENT
Let us take this opportunity to all those, who directly or indirectly helped for the successful
completion of this work.
First, we are grateful to God Almighty, for helping to select this topic , without whose
blessing, we would not be able to complete this project.
We express our sincere thanks to the Principal Prof. (Dr). L. THULASEEDHARAN , M.A,
M. Phil, Ph. D, C.H.M.M College for Advanced Studies, Chavarcode, for his permission
to do this project.
We express our sincere thanks to Mr. Irshad. A, Head of the Department of Computer
Science, C.H.M.M College, Chavarcode for his timely support, encouragement, valuable
comments, extra guidance, suggestions and many innovative ideas, which helped us in this
project.
We profoundly express our heartfelt thanks to Mrs. Rusina.R , Mrs. Shafina.F.R , Mrs.
Ajeena A and our internal guide Mrs. Ajeena A for the expert guidance and the valuable
advice that helped us for the successful completion of the project.
We would also like to thank Mr. Samraj.L, Lab Assistant, Mrs. Olga Rajan , Librarian of
C.H.M.M College for Advanced Studies for their valuable support.
We express our gratitude to all the teaching and non-teaching staffs of C.H.M.M College for
Advanced Studies, Chavarcode for their help and encouragement. Last but not the least we
express our thanks to beloved parents and classmates for their kind co-operation.
With Gratitude
ATHULYA SUNIL
NAJEEMA N
SREENANDAN S L
DECLARATION
We hereby declare that the work presented in the project title “E-VAC” is based on
the original work done by under the guidance of Mrs.AJEENA A assistant professor,
Department of Computer Science, C.H.M.M College For Advanced Studies, Chavarcode
and this has not been included in any other project submitted for the award of any degree.
Date:
ABSTRACT
A vaccine activates our immune system without making us sick. Many dangerous
infectious diseases can be prevented in this simple and effective way. A vaccine activates our
immune system without making us sick. Young children are at increased risk for infectious
diseases because their immune systems have not yet built up the necessary defenses to fight
serious infections and diseases. As a result, diseases like whooping cough or pneumococcal
disease can be very serious and even deadly for infants and young children. Vaccinations start
early in life to protect children before they are exposed to these diseases. From birth, we are
constantly exposed to many different viruses, bacteria and other microbes. Most are not
harmful, many are beneficial but some can cause disease. The body’s immune system helps
protect us against infections. When we are exposed to infection, the immune system triggers a
series of responses to neutralize the microbes and limit their harmful effects. Exposure to an
infectious disease often gives lifelong protection (immunity) so we do not contract the same
disease again. Our immune system “remembers” the microbe. To prevent this we use
vaccination which protect us from such harmful diseases. The proposed system of E-
Vaccination system provide proper schedule of children vaccine time interval for the parents
and other vaccination availability for elders. Users can search nearby vaccination center and
make a schedule. Not only infants in some cases the elder people also affected with those
diseases , therefore they have same priority to take vaccine. From a long period we are
suffering from covid-19 , thus we all have to get vaccinated as soon as possible.. for that this
app is much helpful... Here we provide information about the vaccination to the user through
notices , and the details of the children and older are collected with the help of Asha Worker.
And also this system is implemented as an android app.
TABLE OF CONTENT
Pages
1.INTRODUCTION 1
1.1 ABOUT THE PROJECT 2
1.2 STATEMENT OF PROBLEM 3
2.SYSTEM ANALYSIS 4
2.1 INTRODUCTION 5
2.2 EXISTING SYSTEM 5
2.3 LIMITATION OF EXISTING SYSTEM 5
2.4 PROPOSED SYSTEM 6
2.5 ADVANTAGES AND FEATURES OF PROPOSED SYSTEM 6
2.6 FEASIBILITY STUDY 6
2.7 SYSTEM REQUIREMENT SPECIFICATION 8
3.SYSTEM DESIGN 9
3.1 INTRODUCTION 10
3.2 MENU CHART 12
3.3 DATA FLOW DIAGRAM 14
3.4 ER-DIAGRAM 20
3.5 SYSTEM FLOW DIAGRAM 23
3.6 STRUCTURED CHART 27
3.7 DATABASE DESIGN 28
3.8 NORMALIZATION 31
3.9 USE CASE DIAGRAM 33
4.CODING AND IMPLEMENTATION 35
4.1 INTRODUCTION TO CODING 36
4.2 FEATURES OF LANGUAGE 36
4.3 IMPLEMENTATION OF PROPOSED SYSTEM 38
4.4 SYSTEM INSTALLATION PROCEDURE 39
5.TESTING 44
5.1 INTRODUCTION TO TESTING 45
5.2 LEVELS OF TESTING 45
6.MAINTENANCE 47
7.SECURITY, BACKUP AND RECOVERY MECHANISMS 49
8.ONLINE HELP AND USER MANUAL 51
9.CONCLUSION 53
10.FUTURE ENHANCEMENT AND UPGRADEBILITY POSSIBILITIES 55
11.APPENDIX 57
12.SCREENSHOTS 58
13.FORTNIGHTLY PROGRESS REPORT 65
14.TEAM MEETING MINUTES 68
15.BIBLIOGRAPHY 79
16.GANTT CHART 81
INTRODUCTION
E-VAC 2
A vaccine activates our immune system without making us sick. Many dangerous
infectious diseases can be prevented in this simple and effective way. A vaccine activates our
immune system without making us sick.
Young children are at increased risk for infectious diseases because their immune
systems have not yet built up the necessary defences to fight serious infections and diseases.
As a result, diseases like whooping cough or pneumococcal disease can be very serious and
even deadly for infants and young children. Vaccinations start early in life to protect children
before they are exposed to these diseases. From birth, we are constantly exposed to many
different viruses, bacteria and other microbes. Most are not harmful, many are beneficial but
some can cause disease.
The body’s immune system helps protect us against infections. When we are
exposed to infection, the immune system triggers a series of responses to neutralise the
microbes and limit their harmful effects. Exposure to an infectious disease often gives lifelong
protection (immunity) so we do not contract the same disease again. Our immune system
“remembers” the microbe. To prevent this we use vaccination, which protect us from such
harmful diseases.
From a long period we are suffering from covid-19, thus we all have to get
vaccinated as soon as possible. For that this app is much helpful... Here we provide
information about the vaccination to the user through notices, and the details of the children
and elder are collected with the help of Asha Worker. And also this system is implemented as
an android app.
Module description
1. Administrator
Admin can Add/Remove the Vaccination team members-Can add the date and time of
vaccination to be given-Can generate the reports of vaccination per monthly/yearly-Will
receive the request of vaccine from Infant/parents/customers-Will verify the request and
provides vaccination as per the provided schemes- Add Hospital-Manage all Hospital -View
Booking of hospital.
2. Users
Can login into the site and request for vaccination provided per monthly/half-yearly
schedules-Can get notified through message and Dashboard of their respective accounts about
upcoming vaccinations-Can get the report status of previous vaccination of their respective
Users-Can also take Covid-19 vaccinations.
3. E-Vaccination Center
Will receive the request of vaccine from Infant/parents/customers-Will verify the request and
provides vaccination as per the provided schemes.
Various types of reports will be generated by the system. Such as list of Infants who has
availed vaccination-List of Vaccination availed/UN availed-Monthly/Yearly Infants list of
availed vaccination etc.
2.1 INTRODUCTION
Analysis is the first phase in the creation of a computer based information system.
During the study phase a preliminary analysis is carried out in a sufficient depth to permit a
technical and economic evaluation of the proposed system. Analysis stage is concerned with
two activities, firstly the collection of information about the operation of the existing system
and identification of problems with the specification of the requirement which the newly
designed system will have to fulfill. Analyst will conduct and initial investigation to clarify
the problems and define it in detail. This begins with meeting the members of the
requirements, to determine what is needed in the target product. System Analyst must contact
individuals in the user’s organization and in other organization that may be affected by the
system.
In the existing system, Vaccines are provided for infants and children under teenage by
various aspects such as by attending school manually and there is a chance that some of the
children’s and infants may miss the opportunity of getting vaccinated due to some mandatory
reasons. Which leads to loss of life or gets affected by various diseases such as polio…etc?
This is a time delay process to wait for each and every one all over the places. Also the elder
suffer with less immune power may not get vaccinated on time. And vaccinations are not
provided every day and thus they may not know about the vaccination provided on time.
Manpower is needed
Time consuming
More expensive
High Energy is needed
We can change this manual system into e-vaccination system by collecting the info of user,
registered under website so that those who didn’t took vaccination can avail one more
opportunity to save the life of their children . By this system a lot of man-hours can be saved
and it is efficient too. Not only for infant vaccine, but we can also use it for other vaccines
such as covid vaccine, poliyo etc..
The Feasibility Study uses techniques that helps evaluate a project and or compare it with
other projects. Factors such as interest rates, operating costs and depreciation are generally
considered. The aim of feasibility study is to identify the best solution under the
circumstances by identifying the effects of this solution on the organization.
Technical feasibility
Operational feasibility
Economical feasibility
Behavioral feasibility
In technical feasibility the management determines whether the current level of technology
can support the proposed system. Considering all the advantages of the proposed system time
consumption for accessing a website and retrieval of information has been reduced.
Platform independent
Technical requirement for the system is economic
Even though it needs the computerized system in hospitals and some software
installation it is technically feasible as compared to existing system
Economically, this project doesn’t raise any issue, as the project itself is planned
as the website. The resource required for this project is minimal. This system doesn’t demand
any additional equipment.
The resource required for our project is minimum and the system doesn’t demand any
additional equipment so our project is economically feasible.
The system is economic with the hospital’s point of view.
It is cost effective as it eliminates the paper works.
The behavioral feasibility depends upon whether the system performed in the expected way or
not. Feasibility study is the test of system proposal according to it workability, impact on
organization, ability to meet the users need and effective use of resources. However, a
feasibility study provides a useful starting point for full analysis. Our system is behaviorally
feasible because this system provides an efficient way for post feedback and comments. The
main problem faced during development of a new system is getting acceptance from the user.
People are inherently resistant to change, and computers have been known to facilitate
changes. It is mainly related to human organizational and political aspects.
System Design develops the architectural details required to build system or product. The
system design process encompasses the following activities:
System design provides understanding of the procedural details, necessary for implementing
the system recommended in the feasibility study. Basically it is all about the creation of a new
system. This critical phase since it decides the quality of the system has a major impact on the
testing and implementation phases.
System design is the most creative and challenging phases of the system life cycle. The term
design describes the final system and the process by which it is to be developed. During the
system design phase the designers must design how to produce an efficient and effective
system. There are two levels of system design:
Logical design
Physical design.
Logical Design
Logical design aims at establishing the requirements of the users, which the new
system must satisfy. In the stage, the system analyst has to identify the relationship
between the various items of the data and the grouping if items of data together into
records. This is known as logical data structure, which is required to produce outputs,
which users require. Once this is agreed, the logical design can be turned into a physical
system with more detailed design.
Input design
Output design
Database design
Physical Design
Physical design takes the logical design blue print and produces the program
specification. Physical design and user interface for a selected hardware and software.
Input design
Input design is a part of overall system is design, which requires very careful
attention. If data going into the system is incorrect , then processing and output will
magnify these errors. Thus the designer has a number of clear in the objectives in the
different stages of input design.
Output design
Database Design
of data involves both the definition of structure for the storage of information and
provision of mechanism for manipulation of information. The database system must
provide safety for the information stored; despite system crashes or attempts of
unauthorized access the database used in this project is My SQL server.
Menu chart shows how variable pass between variables modules in a computer.
Each task can be associated with structured chart representation. For large system several
levels of structured will be need to reflect the number and complexity of the module in
system respective of whether multiprocessing or multitasking is in use. The relationship
between modules are shown between modules are shown by call, the existence and
direction of the call indicate that a module has means to call other module and that at run
time the module may call other module zero or more times. Typically the structured
contain a hierarchy of modules which is used to show how one module will call another.
As module call normally involves the passage and return of parameters, the structured and
chart these with couples of data and control which are provided that indicate the passage of
return of item of data and or some value that control the operation of the recipient module.
E-VACCINATION
View
Booking
Fig.1
Rectangle:
Circle:
DataFlow:
Data Store:
The source and destination is represented by a rectangle. The external entities are
essentially those physical entities external to the software system, which interact with the
system by inputting data to the system or by consuming data produced by the system.
A data store represents a logical file. A logical file can represent either a data store symbol
which can represent either a data structure or a physical file on disk.
Admin
Request Response
Response Request
E-Vaccination E-Vaccination
Users
Center
0.0
Request
Response
Response Request
Asha
Worker
Fig.2
Level 1 DFD
log_info
log_info
asha_details
admin_details
admin_id log_info
log_info admin_id
User
E-Vaccination Center user_info
0.4
0.2
center_info
user_details
vacc_details
Fig.3
log_info
notice_details
notice_tbl
vac_center_info asha_worker_info
vaccination_center_tb asha_worker_tbl
vaccination_info user_info
vaccine_tbl user_reg_tbl
Fig.4
log_info log_info
appoinment_info vaccine_info
vaccination_time Vaccine_tbl
vactime_id vac_id
log_info
Fig.5
log_info
user_reg_tbl
log_info
uid
Add availability of vaccine & notice
0.3.2
notice_details
notice_tb
Fig.6
log_info log_info
Add Users
Profile Mgmt
0.4.2
0.4.1
user_
info
user_reg_tbl
log_info
uid
nid
Appoinment
Request
apppoinment_inf
o
notice_tb
vaccination_tim
aw_id vc_id
asha_worker_tbl vaccination_center_tbl
Fig.7
3.4 ER DIAGRAM
Classifying Relationships
Relationships are classified by their degree, connectivity, cardinality, direction, type and
existence.
Degree of a relationship
The degree of a relationship is the number of entities associated with relationship. The n-
ary relationship is the general form for degree n. Special cases are binary, ternary, where the
degree is 2 and 3 respectively.
Entity :
Attributes :
Relationship :
Lines :
userid password
User
Is a
uid
Admin
id name
Status Vaccine
Add
Asha id
Manage Vaccine
Worker
Vaccine name
id Id proof
Vaccine_center
name
Fig.8
A system flow chart, or data flow chart, is used to describe the flow of data through a
complete data-processing system. Different graphics symbols represent the operations
involved and the different inputs, storage and output equipment required. Although the flow
chart may indicate the specific programs used, no details are of how the programs process the
data. A program flow chart is used to describe the flow of data through a particular computer
program, showing the exact sequence of operations performed by that program in order to
process the data. Different graphic symbol are used to represent the data input and output,
decisions, branches and subroutines.
1. The flow chart is a means of visually presenting the flow of data through an
information processing systems, the operation performed within the system and the sequence
in which they are performed.
2. A flow chart is a diagrammatic representation that illustrates the sequence of
operation to be performed to get the solution of a problem. Flow charts are generally drawn in
the early stages of formulating computer solutions. Flowcharts facilitate communication
between programmers and business people.
Symbols
A typical flow chart may have the following kinds of basic symbols.
Start and end symbols, represented as ovals or rounded rectangles, usually containing the
word Start or End, or another phrases signalling the start and end of a process.
2. Arrows:
Arrows, showing what is called flow control in computer science. An arrow coming from one
symbol and ending at another symbol represents that control passes to the symbols the arrow
point to.
3. Processing steps:
4. Conditional or decision:
5. Parallelogram:
Denotes either an input operation or an out operation. This shape is used for process that has
already defined else where.
Flow charts are usually drawn using some standard symbols; however, some special symbols
can also be developed when required.
1. In, drawing a proper flow chart, all necessary requirements should be listed out in logical
order.
2. The flow chart should be clear, neat and easy to follow. There should not be any room for
ambiguity in understanding the flow chart.
3. The used direction of the flow of a procedure or system is from left to right or top to
bottom.
4. Only one flow lone should come out from a process.
5. Only one flow line should enter a decision symbol, but two or three flow lines, one for
each possible answer, should leave the decision symbol.
6. Write within standard symbols briefly. As necessary, you can use the annotation symbol it
describe data or computational steps more clearly.
7. If the flow chart becomes complex ,it is better to use connector symbols to reduce the
number of flow lines. Avoid the intersection of flow lines if you want to make it more
effective and better way of communication.
1. Communication
2. Effective analysis
3. Proper documentation
4. Efficient coding
5. Proper debugging
6. Efficient program maintenance
Start
Login Process
No Error
If Valid
message
Yes
Yes No
If
Admin
No
If Users
Yes
Manage
Vaccination Registration
Center Yes If No
View Vaccination
Manage Asha Center
Centers
Worker
Add Notice
Stop
Fig.9
ADMIN ASHA
WORKER
Vaccination
Request
USERS Add Notice for
Apponiment
time request Vaccination
Fig.10
1. Controlled redundancy:-A unique aspects of database is storing data only once, which
controls redundancy and improve system performance.
2. Ease of learning and use:-Database should be modified without interfacing with
established ways of using data.
3. Data independence:- It refers to the availability to add new data without interfacing with
established ways of using data.
4. More information at low cost:- Using storing and modifying more information at low
cost is important.
5. Accurate and integrity:-The accuracy of database ensures that data quality and contents
remain constant. Integrity control detects data inaccuracies when they occur.
6. Recovery from failure:-With multi-user access to database, the system must recover after
it is down with no loss of transaction.
7. Privacy and security:-Database should be prevented from unauthorized access. Users
must be positively identified and their actions monitored.
8. Performance:-This emphasize on the response time to enquire suitable to the use of the
data
Keys
1. Primary key: Primary key is the column used to uniquely identify a particular row in a
table. Every database table should have one or more columns designated as the primary key.
The value this key holds should be unique for each record in the database.
2. Candidate key: Candidate key is the combination to one or more columns, the values of
which uniquely identify each row of a table.
3. Foreign key: A candidate key is one or more columns whose values are based on the
primary or candidate key of another table. These keys are used to create relationships between
tables. Natural relationships exist between tables in most database structures.
4. Super key: A super key is a combination of attributes that can be uniquely used to identify
record. A table might have super keys. Candidate keys are a special subset of super keys that
do not have any extraneous information on it.
Table 1 : admin_login
Table 2 : vaccination_center
Table 3 : asha_worker
Table 4: parent
Table 5 : vaccination_report
Table 6 : Vaccination_Appointment_time_Request
3.8 NORMALIZATION
A bad database design may lead to certain undesirable situations such as,
1. Repetition of information.
2. Inability to represent certain information.
3. Loss of information.
A relation is the first normal form, if and onlt if all its attributes are based on a single
domain. The objective of normalizing a table is to remove its repeating groups and ensure that
all entries of the resulting table have at most single value.
A table is said to be second normal form, when it is in 1NF and every attribute in the
record is functionally dependent upon the whole key, and not just a part of the key.
The database used in the system is called campus. There are five tables used in this
system. The tables consist of atomic values, does not have any partial dependencies and non-
key dependencies.
Benefits of normalization
A use case is a description of a system’s behaviour from user’s point of view. For system
developers, it is a valuable tool. It is a graph of different kind of actors and a set of use case
enclosed by a system boundary.
Actor
Use case
A use case is a set of scenarios that describing an interaction between the user and system. A
use case diagram displays the relationship among the actors and the use case. The two main
components of a use case diagram are use case and actors. A use case represents a user or
another system that will interact with the systems you are modelling. A use case is an external
view of the system that represents action the user might perform in order to complete a task.
View Parent
Vaccination Request
Admin
View Booking
Registration
Fig.11
Android SDK
The android platform is made available fewer than one of the most progressive,
developer-friendly open-source licenses, which gives mobile operators and device
manufactures significant freedom and flexibility to design products. Android holds the
promise of unprecedented benefits for consumers, developers and manufacturers of
mobile services and devices. Handset manufacturers and wireless operators will be
free to customize android in order to bring to market innovative new products faster
and at a much lower cost. Developers will have complete access to handset
capabilities and tools that will enable them to build more compelling and user-friendly
services, bringing the internet developer model to the mobile space. And consumers
worldwide will have access to less expensive mobile devices that feature more
compelling services, rich internet applications and easier to use interfaces ultimately
creating a superior mobile experience.
Eclipse
Eclipse is an integrated development environment (ide) used in computer
programming, and is the most widely used java ide. It contains a base workspace and
an extensible plug-in system for customizing the environment. Eclipse is written
mostly in java and its primary use is for developing java applications, but it may also
be used to develop applications in other programming languages.
Apache tomcat
The apache tomcat software is an open source implementation of the java servlet,
Java Server pages, java expression language and java web socket technologies. The
java servlet, java server pages, java expression language and java Web Socket
specifications are developed under the java community process. The apache tomcat
software is developed in an open and participatory environment and released under the
apache license version 2. The apache tomcat project is intended to be a collaboration
of the best-of-breed developers from around the world.
MySQL
Jquery
Jquery is a concise and fast Javascript library that can be used to simplify event
handling, html document traversing, Ajax interactions and animation for speedy
website development. Jquery simplifies the html's client-side scripting, thus
simplifying web 2.0 applications development.
Html
CSS
Cascading Style Sheets (CSS) is a style sheet language used for describing the
presentation of a document written in a markup language like HTML. CSS is designed
to enable the separation of presentation and content, including layout, colors, and
fonts. This separation can improve content accessibility, provide more flexibility and
control in the specification of presentation characteristics, enable multiple web pages
to share formatting by specifying the relevant CSS in a separate .css file, and reduce
complexity and repetition in the structural content. Separation of formatting and
content also makes it feasible to present the same markup page in different styles for
different rendering methods, such as on-screen, in print, by voice (via speech-based
browser or screen reader), and on Braille-based tactile devices. CSS also has rules for
alternate formatting if the content is accessed on a mobile device.
JavaScript
JAVA
Java is a highly portable language which can be used on any hardware or operating
system platform. Java comes into four flavours J2SE, J2EE, J2ME, and Java Card.
These specification have its own purpose and uses.
For implementing the project the different software must be installed for its fast and better
execution. To install the system, the primary need is android based environments without
which the system will not have a proper utilization. To install the system, it is must to setup a
centralized server which can hold social networking web system including the user’s
information database. The database is accessed through app using android at the client phone.
In order to have the server setup for the “E-VAC”, the following components are needed at
the server end.
Android Java J2EE and MySQL
Apache web server
Operating system like windows, Linux etc.
SOURCE CODE
Vaccination Center add action page
<%@page import="evac.Mailer"%>
<%@page import="evac.GetConnection"%>
<%@page import="java.text.SimpleDateFormat"%>
<%@page import="java.util.Date"%>
<%@page import="java.util.Calendar"%>
<%@page import="java.util.GregorianCalendar"%>
<%@page import="evac.FilePath"%>
<%@page import="java.util.Iterator"%>
<%@page import="org.apache.commons.fileupload.FileItem"%>
<%@page import="java.util.Iterator"%>
<%@page import="org.apache.commons.fileupload.FileUploadException"%>
<%@page import="java.util.List"%>
<%@page import="org.apache.commons.fileupload.disk.DiskFileItemFactory"%>
<%@page import="org.apache.commons.fileupload.FileItemFactory"%>
<%@page import="org.apache.commons.fileupload.servlet.ServletFileUpload"%>
<%@ page language="java" contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1" import="java.sql.*,java.io.*"
import="org.json.simple.JSONArray,org.json.simple.JSONObject"%>
<%
try
{
//System.out.println("insssssssssssssssssssssssssssssssssssssssssssssssss");
String filepath;
String outputstring;
String type, extension;
int imageNum = 0;
String imgname = "";
FileItem item = null;
File uploadedFile = null;
String fname = null;
String fileName;
String dbpath;
String id1 = "0";
int setflag;
String imgfilename = "";
//System.out.println("Item="+item);
if (!item.isFormField()) {
fileName = item.getName();
String root =
getServletContext().getRealPath("/");
File path = new File(
"E:/CHMM-J2EE-
WORKSPACE_2021/EVAC/WebContent/vlicencecopy");
if (!path.exists()) {
System.out.println("the path "+path);
boolean status = path.mkdirs();
}
GregorianCalendar ob = new
GregorianCalendar();
ob.setTime(new Date());
ob.add(Calendar.DAY_OF_MONTH, 0);
Date d1 = ob.getTime();
SimpleDateFormat df1 = new
SimpleDateFormat(
"dd-MMM-yyyyhma");
String formattedDate1 = df1.format(d1);
if (!uploadedFile.exists()) {
imageNum++;
uploadedFile = new File(path + "/"
+ imgfilename);
}
filepath = uploadedFile.getAbsolutePath();
extension = filepath.substring(filepath
.lastIndexOf("."));
item.write(uploadedFile);
} else {
if (item.getFieldName().equals("cname")) {
cname = item.getString();
}
if (item.getFieldName().equals("email")) {
email = item.getString();
}
if (item.getFieldName().equals("phone")) {
phone = item.getString();
}
if (item.getFieldName().equals("add")) {
address = item.getString();
}
if (item.getFieldName().equals("uname")) {
username = item.getString();
}
if (item.getFieldName().equals("pass")) {
password = item.getString();
}
if(item.getFieldName().equals("ward"))
{
ward = item.getString();
}
}
}
}
int id = 0;
dbpath = "vlicencecopy/" + imgfilename;
fname = uploadedFile.getName();
imageNum++;
try {
{
%>
<script>
alert("Already A User...!!");
window.location.href="vac-center.jsp";
</script>
<%
}
else
{
st1.executeUpdate("insert into
vaccination_center_tbl(center_name,email,phone,address,username,password,licence_co
py,flag,ward_number) values('"
+ cname
+ "','"
+ email
+ "','"
+ phone
+ "','"
+ address +
"','"+username+"','"+password+"','"+fname+"','0','"+ward+"')");
Mailer.send(email, "E-VAC", "Your Password is
"+password, "[email protected]", "Sans_123");
%>
<script>
alert("Success...!!");
window.location.href="vac-center.jsp";
</script>
<%
}
/* response.sendRedirect("vac-center.jsp"); */
} catch (Exception e) {
e.printStackTrace();
}
}
catch (Exception e) {
System.out.println(e);
}
%>
MAINTENANCE
Authentication :
This is the process of determining a user’s identity and forcing users to prove they are who
they claim to be, usually this involves entering credential ( username and password) in some
sort of login or windows.
Authorization :
Once the user is authenticated, authorization is the process of determining where that user has
sufficient permission to perform a given action, such as viewing a page or retrieving
information from database.
Backup facility is used in this software for backing up of data. If any error occurs in
the database due to any database error or software error or if the database is detected in any
fault operation, you can copy the backup file to solve this problem. For protecting the system
from any kind of loss or damage, backup facility is offered. The entire program that is
associated with the database can be saved into CD or DVD or floppy disc for the purpose of
future use. If the program is lost due to some kind of system failure, the backup copy of
program on any of the above disc can be used. The data or those discs will not be lost due to
any usual failure.
“E-VAC” is a user friendly system. This site provides online to the users of the
system. Walk with us site is topic oriented, procedural or reference information delivered
through computer software. It is a form of user assistance. Most online is designed to give
assistance in the user of software or opening system, but can also be to represent information
on the broad range of subjects.
The user manual provides the detailed description regarding the usage of the
software.
CONCLUSION
E-Vac is our commitment to bring professionalism, good service, and trust to the child and
elder vaccination and healthy vaccine management. This is a system that is designed as a
social service to the people around us. It is a social service idea as well as a service to society
and for new parents. As we know it’s not easy to interconnect the vaccination centers with the
users. So in this society, it will have its own stable place. Good implementation and good
service may take E-Vac in high of successes.
Index Page
Admin login
Admin Home
Ashaworker Login
BIBLIOGRAPHY
Textual References :
"PowerTutor - Android Apps on Google Play", PowerTutor - Android Apps on
GooglePlay, Mar. 2016.
Fundamentals of Software Engineering – Rajib Mall (Page No: 167-201,248-279)
Websites :
https://developer.android.com/
https://www.javatpoint.com/
https://ieeexplore.ieee.org/
https://stackoverflow.com/
https://www.sanfoundry.com/
GANTT CHART
Gantt chart shows time relationship between events of the production program has regarded as
revolutionary in management. Gantt chart recognize the total program goals and it should be
regarded as a series of inter-related supporting plan (or events), that people can comprehend
and follow.
The following figure is the Gantt chart of E-VACCINATION SYSTEM. The plan explains
the task versus the time will take to complete.
Task Durati
19/12/2020
04/01/2021
05/01/2021
20/01/2021
21/01/2021
18/02/2021
19/02/2021
29/02/2021
01/03/2021
21/03/2021
ID on (In
Task Name Start Date End Date
Days)
to
to
to
to
to
T01 System 19/12/2020 04/01/2021 16
analysis