Pavithra M (63) - Project

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 74

A EMPLOYEE TASK MAINTENANCE USING ATTRACTIVE SESSION SECURITY

PROJECT WORK SUBMITTED TO PSGR KRISHNAMMAL COLLEGE FOR WOMEN


IN PARTIAL FULFILMENT OF THE REQUIREMENT

FOR

THE AWARD OF THE

DEGREE OF

BACHELOR OF INFORMATION TECHNOLOGY

SUBMITTED

BY

PAVITHRA.M (19BIT063)

SUSMITA SREE.R. K (19BIT103)

GUIDED

BY

Mrs. B. SIVARANJANI M.Sc., M.Phil.,

Assistant Professor, Department of Information

Technology, PSGR Krishnammal College for Women,

Coimbatore-641004

MAY - 2022
CERTIFICATE

This is to certify that this project work entitled “EMPLOYEE TASK MAINTENANCE
USING ATTRACTIVE SESSION SECURITY” submitted to PSGR Krishnammal College for
Women, Coimbatore, in partial fulfilment of the requirement for the award of the Bachelor of
Information Technology, is a record of the original work done by PAVITHRA.M (19BIT063)
during her period of the study in Department of Information Technology, PSGR Krishnammal
College for Women, Coimbatore under my supervision and guidance and her project work has
not formed the basis for the award of any Degree/Diploma/Associate/Fellowship or similar title
to any candidate of any University.

Forwarded by

Mrs. B. SIVARANJANI M.Sc., M.Phil., Dr. G. SOPHIA REENA MCA., M.Phil.,


Ph.D.,

Assistant Professor Head of the Department


DECLARATION

I hereby declare that the project work entitled “EMPLOYEE TASK MAINTENANCE
USING ATTRACTIVE SESSION SECURITY” submitted to Bharathiar University,
Coimbatore for the award of the Degree of Bachelor of Information Technology, is a record of
original work done by PAVITHRA.M (19BIT063) under the supervision and guidance of Mrs.
B.SIVARANJANI M.Sc., M.Phil., Assistant Professor, Department of Information Technology,
PSGR Krishnammal College for Women, Coimbatore and that this project work has not formed
the basis for the award of any degree/Diploma/Associate Fellowship or similar title to any
candidate of any University.

PAVITHRA.M

(19BIT063)

Endorsed by

Place: Coimbatore Faculty guide

Date: Mrs. B. SIVARANJANI M.Sc., M.Phil.,


TABLE OF CONTENT

CHAPTER NO. TITLE PAGE NO.

ACKNOWLEDGEMENT I
ABSTRACT Ii
1 INTRODUCTION 1
1.1 Organization profile 1
1.2 Modules 2
1.3 System configuration 4
1.4 System description 5
2 SYSTEM STUDY AND ANALYSIS
2.1 Existing system 21
2.2 Proposed system 22
3 LOGICAL DEVELOPMENT
3.1 Data flow diagram 23
3.2 ER diagram 28
4 SYSTEM DESIGN
4.1 Table design 30
4.2 Input design 32
4.3 Output design 33
5 SYSTEM TESTING AND IMPLEMENTATION
5.1 System testing 36
5.2 System implementation 37
6 CONCLUTION 39
REFERANCE 40
SOURECE CODE 41
ACKNOWLEDGEMENT
I take this opportunity with great pleasure, deep satisfaction and gratitude, the
contribution of many individuals in the successful completion of the system study.

I express my hearty gratitude to Dr. R. NANDINI, Chairperson, PSGR Krishnammal


College for Women, and Coimbatore for having given us the opportunity to undertake this
project.

I express my hearty gratitude to Dr. N. YESODHA DEVI, M.Com., Ph.D., Secretary


PSGR Krishnammal College for Women, and Coimbatore for having given us the opportunity to
undertake this project.

I express my gratitude to Dr. S. NIRMALA, M.B.A., M.Phil., Ph.D., Principal, PSGR


Krishnammal College for Women, Coimbatore for her support and all resources provided.

I am extremely grateful to Dr. G. SOPHIA REENA, MCA, M.Phil., Ph.D., Head,


Department of Information Technology, PSGR Krishnammal College for Women, Coimbatore
for her sustained interest and advice for the completion of this project.

I also express my heartfelt thanks to Mrs. B. SIVARANJANI M.Sc., M.Phil., Assistant


professor, Department of Information Technology, PSGR Krishnammal College for Women,
Coimbatore as a guide for their kind and patient guidance for completing this project.

I also express my special thanks to Mrs. MAYUKHA, Maylancer Techios, Coimbatore


for providing us an opportunity to undertake this project in their esteemed organization and their
continuous support to complete the project successfully.

I also wish to convey my heartfelt gratitude to my teachers, parents and my family


members for their support and words of encouragement and I also extend my gratitude to my
team mate Ms. Susmita sree.R. K for her constant support throughout the project.

I
ABSTRACT
Security of Information Systems (IS) is a major concern for organizations nowadays as
security related risks may affect the organization's information assets badly. This security is used
to monitor the employee working time and misuse time detection. This action used to minimize
the task using Session timeout is an expired time limit for a logged in Life ray user which has
been inactive for a period of time. Security systems in organizations can benefit a great deal from
knowledge and experiences of security experts, practitioners and professionals if this knowledge
is acquired, encoded into an employee work management system and distilled appropriately to
help decision making in IS security management. This project proposes to enhance security of
information systems through the development of an architecture sustaining knowledge of IT
security within an organization. The architecture uses a username and password set of security
processes, policies and solutions to protect the organization's business on session level. The
proposed architecture is used to capture the misuse time and related employee id in order to
change password and logout the user login form. This action is used to time misuse employee
definitely meet the admin to get new password and punishment.
1.INTRODUCTION

Employee Task Management System is a web-based technology which allows admin to add
new employee after a proper authentication. Admin can also add department and assign task to
employees. Database should store all the personal information of employees. This web
application provides a way to effectively control record & track the task. Employee Task
Management System effectively manages and handles all the functioning of a company. The
software system can store the data of employees who works in an organization and also give the
task to employees. The system needs an administrator to input the detail of employees,
department and work task. This project is based on PHP language with MYSQL database which
manages employee’s information and manage task which is assign by administrator.
1.1 ORGANIZATION PROFILE

Smart way Industrial Automation is an emerging leader in engineering design and services
to innovate and virtualized intellectual ideas who are experienced to help your company to
triumphantly achieve its business goals . We help Industrial company to shift towards existing
new global technologies and inventions. Our commitment to quality is our foremost virtue
extending not only to dealing with our clients, but even to the candidates we present. Smart way
Industrial Automation is one of the fastest growing Engineering development companies in
Coimbatore as well. The mixtures of dynamic professionals have made Smart way Industrial
Automation standout from the competition. We have a team dedicated to share and infuse
knowledge into Brains. With subject ideas and experts concentrating on their areas of
experience, we are transforming in a unique way.

1
1.2 MODULE

 Admin Module

 Employee register and Login Module

 Password Generation Module

 Session Tracking Module

 Session Time out Module

MODULE DESCRIPTION

Admin Module:

Administrators assume these responsibilities as volunteers who go through a community


review process. They are not acting as employees. They are never required to use their tools,
almost never use them to gain an advantage in a dispute whose need the access for their database
in secured way of organization. Administrators should not be confused incoming employee
registration time and login time.

Employee register and Login Module

Generally speaking, any person can become a registered user by providing some
credentials, usually in the form of a username and password. After that, one can access
information and privileges unavailable to non-registered users, usually referred to simply as
guests. The action of providing the proper credentials for a website is called signing in.
Registration is effectively a backhanded way to allow cookies, something most users try to
avoid. In many cases, it even mimics third-party cookies. Once one has registered for a site, it
can effectively store the browsing history on its own server where the user cannot delete it, and it
can also share it with other commercial databases.

Password Generation Module

2
A random number generator (RNG) is a computational or physical device designed to
generate a sequence of numbers or symbols that lack any pattern, i.e. appear random. There are
two principal methods used to generate random numbers. The first method measures some
physical phenomenon that is expected to be random and then compensates for possible biases in
the measurement process. Example sources include measuring atmospheric noise, thermal noise,
and other external electromagnetic and quantum phenomena. For example, cosmic background
radiation or radioactive decay as measured over short timescales represent sources of natural
entropy. The speed at which entropy can be harvested from natural sources is dependent on the
underlying physical phenomena being measured. Thus, sources of naturally occurring 'true'
entropy are said to be blocking i.e. rate-limited until enough entropy is harvested to meet
demand. On some Unix-like systems, including Linux, the pseudo device file /dev/random will
block until sufficient entropy is harvested from the environment. Due to this blocking behavior
large bulk reads from /dev/random, such as filling a hard disk with random bits, can often be
slow.

The second method uses computational algorithms that can produce long sequences of
apparently random results, which are in fact completely determined by a shorter initial value,
known as a seed or key. The latter type is often called pseudorandom number generators. These
types of generators do not typically rely on sources of naturally occurring entropy, though they
may be periodically seeded by natural sources, they are non-blocking i.e. not rate-limited by an
external event.

Session Tracking Module

A session when browsing a website, it that every time you are looking/viewing a website.
Everyone will have a different session when viewing a site, so for instance when a site wants to
store sessions cookies, they use data on the Browser, Location and Time. A session is a
conversational state with the web server that's providing you with the content. It's your closed
session when you close the browser or log out your account.
Session Time out Module

This module used to timeout the session and clear your current password reason is to
prevent irritating employee action. All process is controlled for admin or organization manager.

3
1.3 SOFTWARE CONFIGURATION

HARDWARE REQUIREMENTS

RAM : 512MB

MONITOR : 15” COLOR

HARD DISK : 40 GB

FLOPPY DRIVE : 1.44 MB

CDDRIVE : LG 52X

KEYBOARD : Multimedia Keyboard

MOUSE : Optical Button

SOFTWARE REQUIREMENTS

OPERATING SYSTEM : Windows

FRONT END : J2EE

BACK END : MYSQL SERVER

4
1.4 SOFTWARE DESCRIPTION

About The Java

Java is a small, simple, safe, object oriented, interpreted or dynamically optimized, byte
coded, architectural, garbage collected, multithreaded programming language with a strongly
typed exception-handling for writing distributed and dynamically extensible programs.

Java is an object oriented programming language. Java is a high-level, third generation


language like C, FORTRAN, Small talk, Pearl and many others. You can use java to write
computer applications that crunch numbers, process words, play games, store data or do any of
the thousands of other things computer software can do.

Special programs called applets that can be downloaded from the internet and played
safely within a web browser. Java a supports this application and the follow features make it one
of the best programming languages.

 It is simple and object oriented


 It helps to create user friendly interfaces.
 It is very dynamic.
 It supports multithreading.
 It is platform independent
 It is highly secure and robust.
 It supports internet programming

Java is a programming language originally developed by Sun Microsystems and released


in 1995 as a core component of Sun's Java platform. The language derives much of its syntax
from C and C++ but has a simpler object model and fewer low-level facilities. Java applications
are typically compiled to byte code which can run on any Java virtual machine (JVM) regardless
of computer architecture.

5
The original and reference implementation Java compilers, virtual machines, and class
libraries were developed by Sun from 1995. As of May 2007, in compliance with the
specifications of the Java Community Process, Sun made available most of their Java
technologies as free software under the GNU General Public License. Others have also
developed alternative implementations of these Sun technologies, such as the GNU Compiler for
Java and GNU Class path.

The Java language was created by James Gosling in June 1991 for use in a set top box
project. The language was initially called Oak, after an oak tree that stood outside Gosling's
office
- and also went by the name Green - and ended up later being renamed to Java, from a list of
random words. Gosling's goals were to implement a virtual machine and a language that had a
familiar C/C++ style of notation.

Java Virtual Machine

The heart of the Java Platform is the concept of a "virtual machine" that executes Java
byte code programs. This byte code is the same no matter what hardware or operating system the
program is running under. There is a JIT compiler within the Java Virtual Machine, or JVM. The
JIT compiler translates the Java byte code into native processor instructions at run-time and
caches the native code in memory during execution.

The use of byte code as an intermediate language permits Java programs to run on any
platform that has a virtual machine available. The use of a JIT compiler means that Java
applications, after a short delay during loading and once they have "warmed up" by being all or
mostly JIT-compiled, tend to run about as fast as native programs. Since JRE version 1.2, Sun's
JVM implementation has included a just-in-time compiler instead of an interpreter.

Although Java programs are Platform Independent, the code of the Java Virtual Machine
(JVM) that execute these programs are not. Every Operating System has its own JVM.

Class libraries

In most modern operating systems, a large body of reusable code is provided to simplify

6
the programmer's job. This code is typically provided as a set of dynamically loadable libraries

7
that applications can call at runtime. Because the Java Platform is not dependent on any specific
operating system, applications cannot rely on any of the existing libraries. Instead, the Java
Platform provides a comprehensive set of standard class libraries, containing much of the same
reusable functions commonly found in modern operating systems.

The Java class libraries serve three purposes within the Java Platform. Like other
standard code libraries, they provide the programmer a well-known set of functions to perform
common tasks, such as maintaining lists of items or performing complex string parsing. In
addition, the class libraries provide an abstract interface to tasks that would normally depend
heavily on the hardware and operating system. Tasks such as network access and file access are
often heavily dependent on the native capabilities of the platform. The Java java.net and java.io
libraries implement the required native code internally, and then provide a standard interface for
the Java applications to perform those tasks. Finally, when some underlying platform does not
support all of the features a Java application expects, the class libraries can either emulate those
features using whatever is available, or at least provide a consistent way to check for the
presence of a specific feature.

Platform independent

One characteristic, platform independence, means that programs written in the Java
language must run similarly on any supported hardware/operating-system platform. One should
be able to write a program once, compile it once, and run it anywhere.

This is achieved by most Java compilers by compiling the Java language code halfway
(to Java byte code) – simplified machine instructions specific to the Java platform. The code is
then run on a virtual machine (VM), a program written in native code on the host hardware that
interprets and executes generic Java byte code. (In some JVM versions, byte code can also be
compiled to native code, either before or during program execution, resulting in faster
execution.) Further, standardized libraries are provided to allow access to features of the host
machines (such as graphics, threading and networking) in unified ways. Note that, although there
is an explicit compiling stage, at some point, the Java bytecode is interpreted or converted to
native machine code by the JIT compiler.

8
The first implementations of the language used an interpreted virtual machine to achieve
portability. These implementations produced programs that ran more slowly than programs
compiled to native executables, for instance written in C or C++, so the language suffered a
reputation for poor performance. More recent JVM implementations produce programs that run
significantly faster than before, using multiple techniques.

One technique, known as just-in-time compilation (JIT), translates the Java bytecode into
native code at the time that the program is run, which results in a program that executes faster
than interpreted code but also incurs compilation overhead during execution. More sophisticated
VMs use dynamic recompilation, in which the VM can analyze the behavior of the running
program and selectively recompile and optimize critical parts of the program. Dynamic
recompilation can achieve optimizations superior to static compilation because the dynamic
compiler can base optimizations on knowledge about the runtime environment and the set of
loaded classes, and can identify the hot spots (parts of the program, often inner loops, that take
up the most execution time). JIT compilation and dynamic recompilation allow Java programs to
take advantage of the speed of native code without losing portability.

Another technique, commonly known as static compilation, is to compile directly into


native code like a more traditional compiler. Static Java compilers, such as GCJ, translate the
Java language code to native object code, removing the intermediate bytecode stage. This
achieves good performance compared to interpretation, but at the expense of portability; the
output of these compilers can only be run on a single architecture. Some see avoiding the VM in
this manner as defeating the point of developing in Java; however it can be useful to provide
both a generic byte code version, as well as an optimized native code version of an application.

Automatic memory management

One of the ideas behind Java's automatic memory management model is that
programmers be spared the burden of having to perform manual memory management. In some
languages the programmer allocates memory for the creation of objects stored on the heap and
the responsibility of later deal locating that memory also resides with the programmer. If the
programmer forgets to reallocated memory or writes code that fails to do so, a memory leak
occurs and the program can
9
consume an arbitrarily large amount of memory. Additionally, if the program attempts to
reallocate the region of memory more than once, the result is undefined and the program may
become unstable and may crash. Finally, in non garbage collected environments, there is a
certain degree of overhead and complexity of user-code to track and finalize allocations. Often
developers may box themselves into certain designs to provide reasonable assurances that
memory leaks will not occur.

In Java, this potential problem is avoided by automatic garbage collection. The


programmer determines when objects are created, and the Java runtime is responsible for
managing the object's lifecycle. The program or other objects can reference an object by holding
a reference to it (which, from a low-level point of view, is its address on the heap). When no
references to an object remain, the Java garbage collector automatically deletes the unreachable
object, freeing memory and preventing a memory leak. Memory leaks may still occur if a
programmer's code holds a reference to an object that is no longer needed—in other words, they
can still occur but at higher conceptual levels.

The use of garbage collection in a language can also affect programming paradigms. If,
for example, the developer assumes that the cost of memory allocation/recollection is low, they
may choose to more freely construct objects instead of pre-initializing, holding and reusing them.
With the small cost of potential performance penalties (inner-loop construction of large/complex
objects), this facilitates thread-isolation (no need to synchronize as different threads work on
different object instances) and data-hiding. The use of transient immutable value-objects
minimizes side-effect programming.

Comparing Java and C++, it is possible in C++ to implement similar functionality (for
example, a memory management model for specific classes can be designed in C++ to improve
speed and lower memory fragmentation considerably), with the possible cost of adding
comparable runtime overhead to that of Java's garbage collector, and of added development time
and application complexity if one favors manual implementation over using an existing third-
party library. In Java, garbage collection is built-in and virtually invisible to the developer. That
is, developers may have no notion of when garbage collection will take place as it may not
necessarily correlate with any actions being explicitly performed by the code they write.
Depending on
10
intended application, this can be beneficial or disadvantageous: the programmer is freed from
performing low-level tasks, but at the same time loses the option of writing lower level code.
Additionally, the garbage collection capability demands some attention to tuning the JVM, as
large heaps will cause apparently random stalls in performance.

Java does not support pointer arithmetic as is supported in, for example, C++. This is
because the garbage collector may relocate referenced objects, invalidating such pointers.
Another reason that Java forbids this is that type safety and security can no longer be guaranteed
if arbitrary manipulation of pointers is allowed.

Performance

Java's performance has improved substantially since the early versions, and performance
of JIT compilers relative to native compilers has in some tests been shown to be quite similar.
The performance of the compilers does not necessarily indicate the performance of the compiled
code; only careful testing can reveal the true performance issues in any system.

Java Runtime Environment


The Java Runtime Environment, or JRE, is the software required to run any application
deployed on the Java Platform. End-users commonly use a JRE in software packages and Web
browser plug-in. Sun also distributes a superset of the JRE called the Java 2 SDK (more
commonly known as the JDK), which includes development tools such as the Java compiler,
Javadoc, Jar and debugger.

One of the unique advantages of the concept of a runtime engine is that errors
(exceptions) should not 'crash' the system. Moreover, in runtime engine environments such as
Java there exist tools that attach to the runtime engine and every time that an exception of
interest occurs they record debugging information that existed in memory at the time the
exception was thrown (stack and heap values). These Automated Exception Handling tools
provide 'root-cause' information for exceptions in Java programs that run in production, testing
or development environments.

11
FEATURES OF MYSQL
MYSQL is a relational database system. If you can believe many diehard MYSQL fans,
MYSQL is faster, more reliable, and cheaper -- or, simply put, better -- than any other database
system (including commercial systems such as Oracle and DB2). Many MYSQL opponents
continue to challenge this viewpoint, going even so far as to assert that MYSQL is not even a
relational database system. We can safely say that there is a large bandwidth of opinion.
 The fact is that there is an ever increasing number of MYSQL users, and the
overwhelming majority of them are quite satisfied with MYSQL. Thus for these users we
may say that MYSQL is good enough.
 It is also the fact, however, that MYSQL still lacks a number of features that are taken for
granted with other database systems. If you require such features, then MYSQL is (at
least for the present) not the database system for you. MYSQL is not a panacea.

The following list shows the most important properties of MYSQL. This section is
directed to the reader who already has some knowledge of relational databases. We will
use some terminology from the relational database world without defining our terms exactly. On
the other hand, the explanations should make it possible for database novices to understand to
some extent what we are talking about.

Relational Database System: Like almost all other database systems on the market, MYSQL is
a relational database system.
Client/Server Architecture: MYSQL is a client/server system. There is a database server
(MYSQL) and arbitrarily many clients (application programs), which communicate with the
server; that is, they query data, save changes, etc. The clients can run on the same computer as
the server or on another computer (communication via a local network or the Internet).

Almost all of the familiar large database systems (Oracle, Microsoft SQL Server, etc.) are
client/server systems. These are in contrast to the file-server systems, which include Microsoft
Access, dBase and FoxPro. The decisive drawback to file-server systems is that when run over a
network, they become extremely inefficient as the number of users grows.

12
MySQL server overview

The MySQL server provides a database management system with querying and
connectivity capabilities, as well as the ability to have excellent data structure and integration
with many different platforms. It can handle large databases reliably and quickly in high-
demanding production environments. The MySQL server also provides rich function such as its
connectivity, speed, and security that make it suitable for accessing databases.

The MySQL server works in a client and server system. This system includes a multiple-
threaded SQL server that supports varied backend, different client programs and libraries,
administrative tools, and many application programming interfaces (API)s.

To get started, you must do the following:

1. Download MySQL Version 5.0.27.


2. Build and load the MySQL server.
3. Initialize the MySQLdatabase.
4. Start the MySQL server.

MySQL directory structure

On the z/TPF system, the MySQL server uses the directory tree setup when you enter
ZMSQL BOOTSTRAP PATH-/pathname, where /pathname specifies the base directory in
which MySQL is installed. This means that all MySQL files can be found in this directory
(/pathname). When you are configuring MySQL, ensure that the MySQL files reside in a file
system that is thread-safe, such as a pool file system (PFS), memory file system (MFS), or fixed
file system (FFS).

MySQL uses the following directories by default, assuming /pathname is specified for the PATH
parameter:

/pathname/mysql/data

13
The MySQL data directory, which is the default directory where log files are saved.
Subdirectories in the MySQL data directory correspond to databases in MySQL. Files in the
subdirectories correspond to tables in those databases.

/pathname/mysql/data/mysql

The MySQL database directory. This is a special database that contains the administrative
databases for MySQL.

/pathname/share/mysql/charset

This directory contains the character set support files.

/pathname/share/mysql/english/

This directory contains the English language error messages.

/pathname/share/mysql/

This directory contains other language support.

Database administration

Database administration is the process of establishing computerized databases and


preparing for the environmental aspects of a database. In general, these include database setup,
database backup, and database logging. Additionally, database administration involves
monitoring the performance of databases and enforcing standards for database use and security.

Database setup: MySQL supports several types of databases and storage engines.

Database backup and restore

In information technology, backup refers to the copying of data so that the additional
copies may be restored after a data loss. Backups are useful for restoring a computer to an
operational state following a disaster (disaster recovery) and to restore small numbers of files
after they have been accidentally deleted or corrupted. Backups differ from archives in the sense
that archives are the primary copy of data and backups are a secondary copy of data.

14
Stored procedures

A stored procedure is a set of SQL statements that can be stored on the MySQL server.
By using stored procedures, it is not necessary for client applications to continually issue
individual SQL statements because they can refer to the stored procedure instead.

Stored procedures are useful in these situations:

 When multiple client applications are written in different programming languages or


operate on different platforms, but must perform the same database operations
 When security is important. Banks, for example, use stored procedures and functions for
all common operations. Doing so provides a consistent and secure environment, and
routines can ensure that each operation is logged properly. With such a setup, client
applications and users cannot access the database tables directly, but do have the ability
to process specific stored routines.

Stored procedures can provide improved performance because less information needs to
be sent between the MySQL server and the client application, but they can also increase the load
on the database server because more of the work is performed on the server side and less work is
performed on the client application side.

Error and crash recovery from data corruption

Crash recovery is the recovery of a database and the ability to automatically correct a
hardware, software, or line failure through a set of concepts, procedures, and strategies that
protect databases against data loss due to media failure or user errors. Ordinarily you can protect
against most common system failures, including power outages and hardware and software
problems. However, there are times when the portion of the system that is running on an
individual computer may crash, and then be restarted by a crash recovery procedure. This may
result in the loss of some information that was present just before the crash. The loss of the
information may lead to an inconsistent state for the information permanently stored in the
system.

15
JVM

JVM (Java Virtual Machine) is an abstract machine. It is a specification that provides runtime
environment in which java bytecode can be executed.

JVMs are available for many hardware and software platforms. JVM, JRE and JDK are
platform dependent because configuration of each OS differs. But, Java is platform independent.

The JVM performs following main tasks:

 Loads code
 Verifies code
 Executes code
 Provides runtime environment

JDK Environment:

Java Developer Kit(JDK) contains tools needed to develop the Java programs, and JRE to
run the programs. The tools include compiler (javac.exe), Java application launcher (java.exe),
Applet viewer etc. Compiler converts java code into byte code. Java application launcher opens a
JRE, loads the class, and invokes its main method. You need JDK, if at all you want to write
your own programs, and to compile them. For running java programs, JRE is sufficient. JRE is
targeted for execution of Java files. i.e. JRE = JVM + Java Packages Classes (like util, math,
Lang, awt, swingetc)+runtime libraries. JDK is mainly targeted for java development.

JRE Environment

Feature of Java

Object Oriented:
In Java, everything is an Object. Java can be easily extended since it is based on the Object model.

16
Platform independent:
Unlike many other programming languages including C and C++, when Java is compiled,
it is not compiled into platform specific machine, rather into platform independent byte code.
This byte code is distributed over the web and interpreted by virtual Machine (JVM) on
whichever platform it is being run.
Simple:
Java is designed to be easy to learn. If you understand the basic concept of OOP Java would
be easy to master.
Secure:
With Java's secure feature it enables to develop virus-free, tamper-free systems. Authentication
techniques are based on public-key encryption.
Portable:
Being architectural-neutral and having no implementation dependent aspects of the
specification makes Java portable. Compiler in Java is written in ANSI C with a clean portability
boundary which is a POSIX subset.
Robust:
Java makes an effort to eliminate error prone situations by emphasizing mainly on compile
time error checking and runtime checking.
Servlet Environment
Servlet technology is used to create web application (resides at server side and generates
dynamic web page). Servet technology is robust and scalable as it uses the java language. Before
Servlet, CGI (Common Gateway Interface) scripting language was used as a server-side
programming language. But there were many disadvantages of this technology. We have
discussed these disadvantages below.

There are many interfaces and classes in the servlet API such as Servlet, GenericServlet,
HttpServlet, ServletRequest, ServletResponse etc.

Servlet can be described in many ways, depending on the context.

 Servlet is a technology i.e. used to create web application.


 Servlet is an API that provides many interfaces and classes including documentations.

17
 Servlet is an interface that must be implemented for creating any servlet.
 Servlet is a class that extend the capabilities of the servers and respond to the incoming
request. It can respond to any type of requests.
 Servlet is a web component that is deployed on the server to create dynamic web page.

There are many advantages of Servlet over CGI. The web container creates threads for handling
the multiple requests to the servlet. Threads have a lot of benefits over the Processes such as they
share a common memory area, lighweight, cost of communication between the threads are low.
The basic benefits of servlet are as follows:

better performance: because it creates a thread for each request not process.

Portability: because it uses java language.

Robust: Servlets are managed by JVM so no need to worry about momory leak, garbage
collection etc.

Secure: because it uses java language.

17
JSP -Java Server Page

JSP technology is used to create web application just like Servlet technology. It can be
thought of as an extension to servlet because it provides more functionality than servlet such as
expression language, jstl etc.

A JSP page consists of HTML tags and JSP tags. The jsp pages are easier to maintain than
servlet because we can separate designing and development. It provides some additional features
such as Expression Language, Custom Tag etc.

Advantage of JSP over Servlet

There are many advantages of JSP over servlet. They are as follows:

1) Extension to Servlet

JSP technology is the extension to servlet technology. We can use all the features of servlet
in JSP. In addition to, we can use implicit objects, predefined tags, expression language and
Custom tags in JSP, that makes JSP development easy.

2) Easy to maintain

JSP can be easily managed because we can easily separate our business logic with
presentation logic. In servlet technology, we mix our business logic with the presentation logic.

3) Fast Development: No need to recompile and redeploy

If JSP page is modified, we don't need to recompile and redeploy the project. The servlet
code needs to be updated and recompiled if we have to change the look and feel of the
application.

4) Less code than Servlet

In JSP, we can use a lot of tags such as action tags, jstl, custom tags etc. that reduces the code.
Moreover, we can use EL, implicit objects etc.

18
Life cycle of a JSP Page

The JSP pages follow these phases:

 Translation of JSP Page


 Compilation of JSP Page
 Class loading (class file is loaded by the class loader)
 Instantiation (Object of the Generated Servlet is created).
 Initialization ( jspInit() method is invoked by the container).
 Request processing ( _jspService() method is invoked by the container).
 Destroy (jspDestroy() method is invoked by the container).

Directory structure of JSP

The directory structure of JSP page is same as servlet. We contain the jsp page outside
the WEB-INF folder or in any directory.

19
As depicted in the above diagram, JSP page is translated into servlet by the help of JSP
translator. The JSP translator is a part of webserver that is responsible to translate the JSP page
into servlet. After that Servlet page is compiled by the compiler and gets converted into the class
file. Moreover, all the processes that happens in servlet is performed on JSP later like
initialization, committing response to the browser and destroy.

20
2. SYSTEM STUDY AND ANALSIS

2.1 EXISTING SYSTEM

Software development cycle consists of Designing, Testing, Tracking and reporting.


Every cycle will have different tasks to be complete as individual or group of members for
sharing information and updating latest modifications and complete task in a procedure-oriented
manner. Task management is the process of managing all these tasks as combine, in order to
manage these tasks, we use task management software. This software plays important part in
project management. This system has some drawbacks some employee has irrelevant activity so
working is reduced each employee our self but proposed system we are develop login-based task
scheduling System

DISADVANTAGES

 Manual monitoring of information


 Less Security
 Administration suffered a lot by manual work
 Lot of Time-Consuming Work

2.2 PROPOSED SYSTEM

We are looking to develop auto password generation term in order to session time out
time. In computer science, in particular networking, a session is a semi-permanent interactive
information interchange, also known as a dialogue, a conversation or a meeting, between two or
more communicating devices, or between a computer and user (see Login session). A session is
set up or established at a certain point in time; this process is called sessionization, and torn
down at a later point in time. An established communication session may involve more than one
message in each direction. A session is typically, but not always, crateful, meaning that at least
one of the communicating parts needs to save information about the session history in order to be
able to communicate, as opposed to stateless communication, where the communication consists
of independent requests with responses. This response time is auto logout system is used to

21
close

22
session time out user all session value cleared and change him password automatically in order
to admin control.

ADVANTAGES

 Easy to handle

 Scheduling process

 Automatic Monitoring System

 Auto Password Generation Method Used Provide Security

 Automatic Computerized System

23
3.LOGICAL DEVELOPMENT

3.1 DATA FLOW DIAGRAM

A data flow diagram should be the first tool used by system analyst to model system
components. These components are the system processes; the data used by these processes and
external entities that interact with the system and the information flows in the system.

Process

Process show what system does. Each process has one or more data inputs and produce
one or more data output, Circles in a data flow diagram represent process. Each process has
unique name and number. This name and number appear inside the circle that represents the
processes in a data flow diagram.

This process is represented as circle

Data Stores:

File or data store is depositary of data. They contain data that is retained in the system.
Processes can enter the data into a data store or retrieve data from the data store. Each data store
is represented by thin line in the data flow diagram and each data store has a unique name.

The data store is represented in form of a line

24
External Entities:

External entities are outside the system but they either supply input data into the system or
use the system output, they are entities which the designer has no control. Square or rectangle
may represent external entities that supply data into a system or sometimes called sources.
External entities that use the system data are sometimes called sinks.

Data Flows:

Dataflow model the passage of data in the system and are represented lines joining system
components. An arrow indicates the direction of the flow and the line labelled by the name of the
data flow.

25
Data flow diagram

Fig.3.1.1

26
Level 1:

Employee
Login

View the Task


Assign

Task Report

Database

Post Your Daily


Attendance

View Company
Report and your
Password Changed

Fig.3.1.2

27
Level 2:

Director

Database

Post
Organization

Post the
Announcement

Fig.3.1.3

28
3.2 ER DIAGRAM

 The relation upon the system is structure through a conceptual ER-Diagram, which not only
specifics the existential entities but also the standard relations through which the system
exists and the cardinalities that are necessary for the system state to continue.

 The entity Relationship Diagram (ERD) depicts the relationship between the data objects.
The ERD is the notation that is used to conduct the date modeling activity the attributes of
each data object noted is the ERD can be described resign a data object descriptions.

 The set of primary components that are identified by the ERD are

 Data object Relationships

 Attributes Various types of indicators.

The primary purpose of the ERD is to represent data objects and their relationships.

29
RELEATIONSHIP DIAGRAM

Key
Date Passw
Value Status Mail
Task Name ord id

Manager
Role Employee
Organizat
ion

Address
Phone
Address
Gender
Attendance Mail

Director

Org name

time
Employee 29
name details
Type

Fig.3.2.1

4. SYSTEM DESIGN

4.1 TABLE DESIGN

Employee Register

Fig.4.1.1

This table stores the employee register and personal Details.

Employee Task

Fig.4.1.2

30
This table stores the employee task

Organization Report

Fig.4.1.3

This table stores the employee report

Task Report

31
Fig.4.1.4

This table stores status detail of task which is updated by employees.

4.2 INPUT DESIGN

The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to put
transaction data in to a usable form for processing can be achieved by inspecting the computer to
read data from a written or printed document or it can occur by having people keying the data
directly into the system. The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The
input is designed in such a way so that it provides security and ease of use with retaining the
privacy. Input Design considered the following things:

 What data should be given as input?


 How the data should be arranged or coded?
 The dialog to guide the operating personnel in providing input.
 Methods for preparing input validations and steps to follow when error occur.
Input Design

32
Fig.4.2.1

This image shows the login page

Fig.4.2.2

33
This image shows the registration form page

4.3 OUTPUT DESIGN

A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users and to
other system through outputs. In output design it is determined how the information is to be
displaced for immediate need and also the hard copy output. It is the most important and direct
source information to the user. Efficient and intelligent output design improves the system’s
relationship to help user decision-making.

1. Designing computer output should proceed in an organized, well thought out manner; the right
output must be developed while ensuring that each output element is designed so that people will
find the system can use easily and effectively. When analysis design computer output, they
should Identify the specific output that is needed to meet the requirements.

2.Select methods for presenting information.

3.Create document, report, or other formats that contain information produced by the system.

The output form of an information system should accomplish one or more of the following
objectives.

 Convey information about past activities, current status or projections of the


 Future.
 Signal important events, opportunities, problems, or warnings.
 Trigger an action.
 Confirm an action.

34
Fig.4.3.1

This image shows the home page of the employee login

Fig.4.3.2

35
This image shows the employee’s assigned task page

Fig.4.3.3

This image shows the Company report

5. SYSTEM TESTING AND IMPLEMENTATION

5.1 SYSTEM TESTING

Unit Testing

The procedure level testing is made first. By giving improper inputs, the errors occurred are
noted and eliminated. Then the web form level testing is made. For example, storage of data to
the table in the correct manner. The dates are entered in wrong manner and checked. Wrong
email-id and web site URL (Universal Resource Locator) is given and checked.

Integration Testing

Testing is done for each module. After testing all the modules, the modules are integrated
and testing of the final system is done with the test data, specially designed to show that the
system

36
will operate successfully in all its aspects conditions. Thus, the system testing is a confirmation
that all is correct and an opportunity to show the user that the system works.

Function Testing
Function testing is used to ensure that the integrated system performs all the functions
defined in the specifications. The same test data used for module tests should be processed to
make sure that the complete systems function properly. All screens, files, processing options and
reports should be used. Documentation and user interfaces should be tested using new users who
have not worked with the system. When those tests are complete, it is assured that the system is
capable of doing all the things that have been specified.
System Testing
This test is done to ensure that the system can perform all of its functions in a realistic
operating environment. Checks are made to ensure that the system is capable of handling all
transactions during periods of peak load without failure or unreasonable delays.
Peak Load occurs during busy seasons such as lunch breaks. The system should be able to
recover from failures caused due to power failures, hardware problems.

Validation Testing

The final step involves Validation testing, which determines whether the software function
as the user expected. The end-user rather than the system developer conducts these tests most
software developers as a process called “Alpha and Beta Testing” to uncover that only the end
user seems able to find. The compilation of the entire project is based on the full satisfaction of
the end users. In the project, validation testing is made in various forms. In registration form
Email id, phone number and also mandatory fields for the user is verified.

Verification Testing

Verification is a fundamental concept in software design. This is the bridge between


customer requirements and an implementation that satisfies those requirements. This is verifiable
if it can be demonstrated that the testing will result in an implementation that satisfies the
37
customer

38
requirements. Inadequate testing or non-testing leads to errors that may appear few months later.
This will create two problems

 Time delay between the cause and appearance of the problem.


 The effect of the system errors on files and records within the system.

5.2 SYSTEM IMPLEMENTATION


Implementation is the stage of the project when the theoretical design is turned out into a
working system. Thus, it can be considered to be the most critical stage in achieving a successful
new system and in giving the user, confidence that the new system will work and be effective.

The implementation stage involves careful planning, investigation of the existing system
and it’s constraints on implementation, designing of methods to achieve change over and
evaluation of change over methods.

Employee task management methodology and documentation proposed was validated by


the focus group and approved by the senior management. All stakeholders have undergone a
two- day Employee task management seminar four pilot strategic projects were selected. Project
managers hired. Employee task management department with the assistance of the IT department
has created an “Employee task Management” section on company Intranet. This process of
implementation in “a role of organization employers’ task management using attractive session
security” this project proposed using as a session is set up or established at a certain point in
time; this process is called sessionization, and torn down at a later point in time. An established
communication session may involve more than one message in each direction. A session is
typically, but not always, crateful, meaning that at least one of the communicating parts needs to
save information about the session history in order to be able to communicate, as opposed to
stateless communication, where the communication consists of independent requests with
responses. This response time is auto logout system is used to close session time out user all
session value cleared and change him password automatically in order to admin control.

39
6. CONCLUSION
After researching this project, I strongly believe that any organization would benefit from
this project. A visible role of organization employer’s task management using attractive session
with support mechanisms in place will greatly assist us in retaining our most valued resource, our
employees. If we are able to assist all employees in meeting their needs, then both the employees
and department will benefit in the long run.
In order to properly assess "why" employees leave, it is necessary that our department
conduct timely exit interviews on every misuse time on every employee. This would enable the
department to further evaluate the success of our project. A proposed policy and procedure for a
Career Development Program has been developed fully concentrated on session tracking system,
along with a form to be used by supervisors/managers in a career counseling session. It has been

40
my desire since the inception of my research paper to choose a topic that benefits many
organizations.

REFERANCE

For the documentation and programming references the following have been extensively
referred:
Books
1. “Software Engineering Concepts” - Richard Fairley, Tata McGraw Hill
Ltd, Fourth Edition.
2. “Java Complete Reference” - Herbert Scheldt, Tata McGraw Hill Ltd, Fourth Edition.
3. “JSP. The Complete Reference” – Patric, Tata McGraw Hill Ltd, Second Edition.
4. “The Complete Reference JEE” - Herbert Schildt, Tata McGraw Hill Ltd, Fifth Edition.

41
Web References

 www.jspin.com
 www.javaworld.com
 www.sun.java.com
 www.wrox.com

SOURCE CODE

Session controller

importjava.io.IOException;
importjavax.servlet.ServletException;
importjavax.servlet.http.HttpServlet;
importjavax.servlet.http.HttpServletRequest;
importjavax.servlet.http.HttpServletResponse;

42
importjavax.servlet.http.HttpSession;

public class Manage extends HttpServlet {


private static final long serialVersionUID = 1L;

public Manage() {
super();
}

protected void doGet(HttpServletRequest request, HttpServletResponse response)


throws ServletException, IOException {
HttpSession session=request.getSession();
if(session.getAttribute("id")==null){
response.sendRedirect("sessionout.jsp");
}else
{

response.sendRedirect("accesssession.jsp?scc=success");
}
}
}
importjava.io.IOException;
importjavax.servlet.ServletException;
importjavax.servlet.http.HttpServlet;
importjavax.servlet.http.HttpServletRequest;
importjavax.servlet.http.HttpServletResponse;
importjavax.servlet.http.HttpSession;

public class Response extends HttpServlet {


private static final long serialVersionUID = 1L;

public Response() {

43
super();
}

protected void doGet(HttpServletRequest request, HttpServletResponse response)


throws ServletException, IOException {
HttpSession session=request.getSession();
session.setMaxInactiveInterval(1000000);
session.setAttribute("id", "samplevalue");
response.sendRedirect("accesssession.jsp?scc=success");
}

Time controller

<jsp:useBeanid="user1"class="databasecon.bean"scope="session"></jsp:useBean>
<jsp:setPropertyproperty="*"name="user1"/>

<%@pagelanguage="java"contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@pagelanguage="java"import="java.sql.*"errorPage=""%>
%@pageimport="java.sql.*"%
<%@pageimport="java.io.*"%>
<%@pageimport="java.util.*"%>
<%@pageimport="javax.servlet.*"%>
<%@pageimport="javax.swing.*"%>
<%@pageimport="databasecon.*"%>
<%
int day, month, year,cmonth;
int second, minute, hour;
GregorianCalendar date = newGregorianCalendar();

44
day = date.get(Calendar.DAY_OF_MONTH);
month = date.get(Calendar.MONTH);
cmonth=month+1;
year = date.get(Calendar.YEAR);
HttpSessionhs=request.getSession();
Connection con=null;
ResultSetrs=null;
Statement st=null;
get_conngc=newget_conn();
intsecretKey =(int)(Math.random() * 105445);
con=gc.createcon();
st=con.createStatement();
String query="update tbl_reg SET pass='pass"+secretKey+"' where mail='"+user1.getUname()
+"' and type='employee'";
st.executeUpdate(query);
String pass="insert into tbl_alert(pass,mailid,status,ondate)
values('pass"+secretKey+"','"+user1.getUname()+"','Irritator','"+day +":"+cmonth+":"+year+"')";
st.executeUpdate(pass);
hs.invalidate();
JOptionPane.showMessageDialog(null,"Password Changed");
response.sendRedirect("index.html");
%>
<!DOCTYPEhtmlPUBLIC"-//W3C//DTD HTML 4.01
Transitional//EN""http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
<metahttp-equiv="Content-Type"content="text/html; charset=ISO-8859-1">
<title>Insert title here</title>
</head>
<body>

45
<%//out.println(user1.getUname()); %>

</body>
</html>
packagedatabasecon;

publicclass bean {
String uname;
public String getUname() {
returnuname;
}
publicvoidsetUname(String uname) {
this.uname = uname;
}
public String getUpass() {
returnupass;
}
publicvoidsetUpass(String upass) {
this.upass = upass;
}
String upass;
public String getType() {
returntype;
}
publicvoidsetType(String type) {
this.type = type;
}
String type;

}
packagedatabasecon;

46
importjava.sql.Connection;

importjava.sql.DriverManager;

importjava.sql.SQLException;

public class get_conn {

static Connection con=null;

public Connection createcon()

try {

Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");

con=DriverManager.getConnection("jdbc:odbc:orgsession");

} catch (ClassNotFoundException e) {

// TODO Auto-generated catch block

e.printStackTrace();

} catch (SQLException e) {

// TODO Auto-generated catch block

e.printStackTrace();

47
}

return con;

Login check

<jsp:useBeanid="user1"class="databasecon.bean"scope="session"></jsp:useBean>
<jsp:setPropertyproperty="*"name="user1"/>
<%@pagelanguage="java"contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@pagelanguage="java"errorPage=""%>
<%@pageimport="java.sql.*"%>
<%@pageimport="java.io.*"%>
<%@pageimport="databasecon.*"%>
<%@pageimport="javax.servlet.*"%>
<%@pageimport="javax.swing.*"%>

<html>
<head>
<metahttp-equiv="Content-Type"content="text/html; charset=ISO-8859-1">
<title>Slicing Event</title>
</head>
<body>
<%

48
HttpSessionhs=request.getSession();
hs.setMaxInactiveInterval(3600);
hs.setAttribute("id",user1.getUname());
String action =request.getParameter("item");
String uname=user1.getUname();
String upass=user1.getUpass();
String utype=user1.getType();
String dname="xcxc";
String dpass="xcxxc";
String dtype="dssdsdfdsf";
String query="select * from tbl_reg where mail='"+uname+"'";
get_conngc=newget_conn();
Connection con=gc.createcon();
Statement st=con.createStatement();
ResultSetrs=st.executeQuery(query);
String employee="employee";
String manager="manager";
String director="director";
while(rs.next())
{
dname=rs.getString(4);
dpass=rs.getString(3);
dtype=rs.getString(8);
}
if(dtype.equals("employee"))
{

if(uname.equals(dname)&&upass.equals(dpass)&&utype.equals(dtype))
{
response.sendRedirect("usermain.jsp?scc=success");
}else

49
{
out.println("please check user name and password");
}
}
elseif(dtype.equals("manager"))
{
if(uname.equals(dname)&&upass.equals(dpass)&&utype.equals(dtype))
{
response.sendRedirect("manmain.jsp");
}else
{
out.println("please check user name and password");
}

}
elseif(dtype.equals("director"))
{
if(uname.equals(dname)&&upass.equals(dpass)&&utype.equals(dtype))
{
response.sendRedirect("dirmain.jsp");
}else
{
out.println("please check user name and password");
}

}
else
{
out.println("please check user name and password");

50
}

%>
</body>
</html>

<!DOCTYPEhtmlPUBLIC"-//W3C//DTD XHTML 1.0


Transitional//EN""http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<jsp:useBeanid="user1"class="databasecon.bean"scope="session"></jsp:useBean>
<jsp:setPropertyproperty="*"name="user1"/>
<%@pagelanguage="java"import="java.sql.*"errorPage=""%>
<%@pageimport="java.sql.*"%>
<%@pageimport="java.io.*"%>
<%@pageimport="java.util.*"%>
<%@pageimport="javax.servlet.*"%>
<%@pageimport="javax.swing.*"%>
<%@pageimport="databasecon.*"%>
<%

int day, month, year;


int second, minute, hour;
GregorianCalendar date = newGregorianCalendar();

day = date.get(Calendar.DAY_OF_MONTH);
month = date.get(Calendar.MONTH);
year = date.get(Calendar.YEAR);

second = date.get(Calendar.SECOND);
minute = date.get(Calendar.MINUTE);

51
hour = date.get(Calendar.HOUR);
Connection con=null;
ResultSetrs=null;
Statement st=null;
get_conngc=newget_conn();
con=gc.createcon();
st=con.createStatement();
String way="select * from tbl_alert where status='Punish' and
ondate='"+day+":"+month+":"+year+"'";
rs=st.executeQuery(way);
%>

<htmlxmlns="http://www.w3.org/1999/xhtml">
<head>
<metahttp-equiv="Content-Type"content="text/html; charset=utf-8"/>
<title>Slicing Event</title>
<linktype="text/css"rel="stylesheet"href="style.css"/>
</head>
<body>
<divclass="wrapper">
<divclass="header">
</div>
<divclass="middle">
<tablealign="right"style="margin-top:5px;">
<tr><td>Welcome to &nbsp;&nbsp;&nbsp;<%=user1.getType()
%>&nbsp;&nbsp;&nbsp;<%=user1.getUname()
%>&nbsp;&nbsp;<ahref="index.html">Logout</a></td></tr>
</table>
</div>
<divclass="menu">
<ul>

52
<li><ahref="dirmain.jsp">Home</a></li>
<li><ahref="attview.jsp">Present Report</a></li>
<li><ahref="manreportview.jsp">Manager Report</a></li>
<li><ahref="mandetailview.jsp">Manager Details</a></li>
<li><ahref="companyreport.jsp">Company Report</a></li>
<li><ahref="dashadd.jsp">Dash Board</a></li>
<%
String rname=request.getParameter("user");
//String img1=request.getParameter("img");

%>

</ul>
</div>
<divclass="container"style="min-height: 500px;">
<h3>Anonymous Location-Based Efficient Routing Protocol</h3><hrstyle="color: gray;"/>

<formaction="manaddreport1.jsp"method="post">
<tablealign="center"border="1">
<tr>
<td>Employee Name</td>
<td>Mail Id</td>
<td>Type</td>
<td>On Date</td>
<td>attendance</td>
<td>On Time</td>
<td>Accept</td>
</tr>
<%
while(rs.next())
{

53
%>
<tr>
<td><%=rs.getString(2) %></td>
<td><%=rs.getString(3) %></td>
<td><%=rs.getString(4)%></td>
<td><%=rs.getString(5) %></td>
<td><%=rs.getString(6) %></td>
<td><%=rs.getString(7) %></td>
<td><%=rs.getString(8) %></td>
<td><inputtype="checkbox"name="check"value="<%=rs.getInt(1) %>"></input></td>
<td><inputtype="submit"name="sub"value="Pay"></input></td>
<td><inputtype="submit"name="sub"value="Loss Of Pay"></input></td>
</tr>
<%} %>
</table>
</form>

</div>

<divclass="footer">
</div>
</div>
</body>
</html>

<%@pagelanguage="java"contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@pagelanguage="java"import="java.sql.*"errorPage=""%>
<%@pageimport="java.sql.*"%>
<%@pageimport="java.io.*"%>

54
<%@pageimport="javax.servlet.*"%>
<%@pageimport="javax.swing.*"%>
<%@pageimport="databasecon.*"%>

<%!
Connection con;
%>
<%
get_conngc=newget_conn();
String org=request.getParameter("org");
String orgaddr=request.getParameter("orgaddr");
String ondate=request.getParameter("ondate");
String empname=request.getParameter("empname");
String design=request.getParameter("design");
String phone=request.getParameter("phone");
String orgtype=request.getParameter("orgtype");

String empno=request.getParameter("empno");
String turnover=request.getParameter("turnover");
String feedback=request.getParameter("feedback");

String sql ="insert into


tbl_orgreport(org,orgaddr,ondate,empname,design,phone,orgtype,empno,turnover,feedback)
values('"+org+"','"+orgaddr+"','"+ondate+"','"+empname+"','"+design+"','"+phone+"','"+orgtype
+"','"+empno+"','"+turnover+"','"+feedback+"')";

con=gc.createcon();
Statement st=con.createStatement();
int x=st.executeUpdate(sql); if(x!
=0)
{

55
JOptionPane.showMessageDialog(null,"Company Report Successfully");
response.sendRedirect("companyreport.jsp");
}
else

{
JOptionPane.showMessageDialog(null,"Company Report Successfully");
response.sendRedirect("companyreport.jsp");
}

%>

<%@pagelanguage="java"contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@pagelanguage="java"import="java.sql.*"errorPage=""%>
<%@pageimport="java.sql.*"%>
<%@pageimport="java.io.*"%>
<%@pageimport="javax.servlet.*"%>
<%@pageimport="javax.swing.*"%>
%@pageimport="databasecon.*"%
<%!
Connection con;
%>
<%
get_conngc=newget_conn();
String ondate=request.getParameter("ondate");
String msg=request.getParameter("msg");

String sql ="insert into tbl_dash(ondate,msg) values('"+ondate+"','"+msg+"')";

56
con=gc.createcon();
Statement st=con.createStatement();
int x=st.executeUpdate(sql); if(x!
=0)
{
JOptionPane.showMessageDialog(null,"Dash Information Successfully");
response.sendRedirect("companyreport.jsp");
}
else

{
JOptionPane.showMessageDialog(null,"Dash Information Successfully");
response.sendRedirect("companyreport.jsp");
}

%>

<%@pagelanguage="java"contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
%@pagelanguage="java"import="java.sql.*"errorPage=""%
<%@pageimport="java.sql.*"%>
<%@pageimport="java.io.*"%>
<%@pageimport="javax.servlet.*"%>
<%@pageimport="javax.swing.*"%>
<%@pageimport="databasecon.*"%>
<%
Connection con=null;
ResultSetrs=null;
Statement st=null;
get_conngc=newget_conn();

57
int did=Integer.parseInt(request.getParameter("did"));

con=gc.createcon();
st=con.createStatement();
String query="delete from tbl_dash where ID="+did;
st.executeUpdate(query);
JOptionPane.showMessageDialog(null,"Deleted Required Information");
response.sendRedirect("mandash.jsp");
%>
<%

%>

<%@pagelanguage="java"contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@pagelanguage="java"import="java.sql.*"errorPage=""%>
<%@pageimport="java.sql.*"%>
<%@pageimport="java.io.*"%>
<%@pageimport="javax.servlet.*"%>
<%@pageimport="javax.swing.*"%>
<%@pageimport="databasecon.*"%>
<%
Connection con=null;
ResultSetrs=null;
Statement st=null;
get_conngc=newget_conn();
int did=Integer.parseInt(request.getParameter("did"));

con=gc.createcon();

58
st=con.createStatement();
String query="delete from tbl_dash where ID="+did;
st.executeUpdate(query);
JOptionPane.showMessageDialog(null,"Deleted Required Information");
response.sendRedirect("mandash.jsp");
%>
<%
%>

<%@pagelanguage="java"contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@pagelanguage="java"import="java.sql.*"errorPage=""%>
<%@pageimport="java.sql.*"%>
<%@pageimport="java.io.*"%>
<%@pageimport="javax.servlet.*"%>
<%@pageimport="javax.swing.*"%>
%@pageimport="databasecon.*"%

<%!
Connection con;
%>
<%
get_conngc=newget_conn();
String ename=request.getParameter("ename");
String mailid=request.getParameter("mailid");
String type=request.getParameter("type");
String adate=request.getParameter("adate");
String check=request.getParameter("check");
String ontime=request.getParameter("ontime");

String sql ="insert into tbl_att(ename,mailid,type,adate,check,ontime,accept)


values('"+ename+"','"+mailid+"','"+type+"','"+adate+"','"+check+"','"+ontime+"','Sallary')";

59
con=gc.createcon();
Statement st=con.createStatement();
int x=st.executeUpdate(sql); if(x!
=0)
{
JOptionPane.showMessageDialog(null,"Attendance Updated");
response.sendRedirect("empatt.jsp");
}
else

{
JOptionPane.showMessageDialog(null,"Attendance Not Updated");
response.sendRedirect("empatt.jsp");
}

%>

<%@pagelanguage="java"contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@pagelanguage="java"import="java.sql.*"errorPage=""%>
%@pageimport="java.sql.*"%
<%@pageimport="java.io.*"%>
<%@pageimport="javax.servlet.*"%>
<%@pageimport="javax.swing.*"%>
<%@pageimport="databasecon.*"%>

<%!
Connection con;
%>
<%

60
get_conngc=newget_conn();
String sub=request.getParameter("sub");
int id=Integer.parseInt(request.getParameter("check"));

String sql ="update tbl_alert SET status='"+sub+"' where ID="+id;


String del="delete fromtbl_alert where ID="+id;

con=gc.createcon();
Statement st=con.createStatement();
if(sub.equals("Punish"))
{
int x=st.executeUpdate(sql);
if(x!=0)
{
JOptionPane.showMessageDialog(null,"Employee Punished");
response.sendRedirect("manfeed.jsp");
}
else

{
JOptionPane.showMessageDialog(null,"Employee not Punished");
response.sendRedirect("manfeed.jsp");
}
}
elseif(sub.equals("Delete"))
{
int x=st.executeUpdate(sql);
if(x!=0)
{
JOptionPane.showMessageDialog(null,"Deleted");

61
response.sendRedirect("manfeed.jsp");
}
else

{
JOptionPane.showMessageDialog(null,"not Deleted");
response.sendRedirect("manfeed.jsp");
}
}

%>

<%@pagelanguage="java"contentType="text/html; charset=ISO-8859-1"
pageEncoding="ISO-8859-1"%>
<%@pagelanguage="java"import="java.sql.*"errorPage=""%>
<%@pageimport="java.sql.*"%>
<%@pageimport="java.io.*"%>
<%@pageimport="javax.servlet.*"%>
<%@pageimport="javax.swing.*"%>
%@pageimport="databasecon.*"%
<%!
Connection con;
%>
<%
get_conngc=newget_conn();
String rname=request.getParameter("rname");
String rpass=request.getParameter("rpass");
String rmail=request.getParameter("rmail");
String rphone=request.getParameter("rphone");
String rgender=request.getParameter("rgender");
String raddress=request.getParameter("raddress");
String type=request.getParameter("type");

62
String sql ="insert into tbl_reg(name,pass,mail,phone,gender,address,type)
values('"+rname+"','"+rpass+"','"+rmail+"','"+rphone+"','"+rgender+"','"+raddress+"','"+type+"')"
;

con=gc.createcon();
Statement st=con.createStatement();
int x=st.executeUpdate(sql); if(x!
=0)
{
JOptionPane.showMessageDialog(null,"Registered Successfully, Please Login Here");
response.sendRedirect("index.html");
}
else

{
JOptionPane.showMessageDialog(null,"Registered Not Successfully");
response.sendRedirect("register.jsp");
}

%>

63
64
65

You might also like