Sucharitha Project
Sucharitha Project
Sucharitha Project
Submitted by:
ULLI SUCHARITHA
(22091F0052)
(ESTD – 1995)
CERTIFICATE
This is to certify that ULLI SUCHARITHA (22091F0052), of MCA III- semester, has carried
out the mini-project work entitled “INSURANCE MANAGEMENT SYSTEM” under the
supervision and guidance of Dr.P.PRATHAPNAIDU,Associate.Professor,CSE Department, in
partial fulfillment of the requirements for the award of Degree of Master of Computer
Applications from Rajeev Gandhi Memorial College of Engineering & Technology
(Autonomous), Nandyal is a bonafied record of the work done by her during 2023-2024.
Place: Nandyal
Date:
External Examiner
ACKNOWLEDGEMENT
I express my gratitude to Dr. K. Subba Reddy garu, Head of the Department of Computer
Science Engineering & MCA departments, all teaching and non-teaching staff of the Computer
Science Engineering department of Rajeev Gandhi memorial College of Engineering and
Technology for providing continuous encouragement and cooperation at various steps of my
project.
At the outset I thank to honorable Chairman Dr. M. SanthiRamudu garu, for providing us
with exceptional faculty and moral support throughout the course.
Finally, I extend my sincere thanks to all the Staff Members of MCA & CSE
Departments who have co-operated and encouraged us in making my project successful.
Whatever one does, whatever one achieves, the first credit goes to the Parents be it not for
their love and affection, nothing would have been responsible. I have seen every good that happens
to us their love and blessings.
BY
ULLI SUCHARITHA (22091F0052)
CONTENTS
CHAPTERS PAGE NO
1. INTRODUCTION 1
2. LITERATURE REVIEW 4
3. SYSTEM ANALYSIS 6
3.4 Modules 13
4. IMPLEMENTATION 24
4.3 HTML 32
5. TESTING 34
7. FUTURE ENHANCEMENT 38
8.CONCLUSION 39
9. PROJECT SCREENSHOTS 40
10. REFERENCE 48
LIST OF FIGURES
Fig:12 Servlet 26
1. INTRODUCTION
1.2.PROJECT DESCRIPTION
Online Insurance Management is a web application to be developed for insurance
companies to process their entire business activities with insurance agents and customers
through a web portal. The current manually system which described in the given chart
having many drawbacks.
Explains the
Customer policy details
Physically
Waits for response
visits
Dispatches the
Information
With the
Continues on the one
or two follow-ups
Insurance
company
Details the
information
related to the
reminders through
port
the portal addresses
As the above diagrams depict, it is a very tedious process for the Agent to keep track
through the system, related to what is happening and the required information that generically
may be needed at all stages. In the customer base increases the manual search process is too
tedious and time consuming which can frustrate the Agent as well as the customer many
times.
This system can be used by various organizations whether Government or Private
insurance companies.
2.LITERATURE REVIEW
2.1 EXISTED SYSTEM
The current system takes time in retrieving a single record from the database.
The proposed system is developing an Internet web based application for Insurance
companies. The entire project will be developed using the concept of distributed client server
computing technologies. The software application has been developed to out as bridge
between the agents and the companies, companies and the customers and the agents and
customers. The normal latency that exists in the system is eliminated and also the job
scheduling standards becomes very faster within the system.
The proposed system gives a fast Internet communication between persons involved.
The system gives a channel to Insurance Company, Insurance Agents and Customers and the
entire process between users will be online.
2.2.1 Features of the proposed system
Maintains and manages the information of all the insurance companies that exists in the
industry.
Maintains and manages the list of agents who are designated upon the system for executing
the business along with applicable avocation of company that belongs to.
Maintains and manages the list of all insurance policies exist in the industry, along with the
association of the company that executes the specific policy.
Maintains and manages the list of all customers who have availed the policies and the
associated nominees and dependents.
Maintains and manages the information of the customers premium payment standards and the
claims if any executed by the policyholders.
Specifically maintains the list of agents, who are associated with policy.
The Agent at any time can view the required information whether it is policies, or customers
at the click of a mouse and instance of a second.
If planned in an organized manner the customers can be provided an online terminal where
they can access the information at their own hands with out the basic intervention manually.
The customers or policyholder’s reminders can be generated at lightening speed just
by query for the specific customers.
The information while it is collected can referentially be segregated into their
respective databases from single window, saving the time of multiple data entries.
The customers policy premium payment status can be viewed in a systematized
manner by the Agents and cross verify the defaulters.
The claim status raised by a specific policyholder can be tracked very clearly in a
transparent manner, and checked until the claim is settled.
Above all the overall system can at any time provide consistent and reliable
information authenticated upon its operations.
3.SYSTEM ANALYSIS
System Analysis is first stage according to System Development Life Cycle model.
This system Analysis is a process that starts with the analyst. Analysis is a detailed study of
the various operations performed by a system and their relationships within and outside the
system. One aspect of analysis is defining the boundaries of the system and determining
whether or not a candidate should consider other related systems. During analysis, data is
collected from the available files, decision points, and transactions handled by the present
system. Logical system models and tools are used in analysis. Training, experience, and
common sense are required for collection of the information needed to do the analysis.
3.1. Software Development Life Cycle
Software Development Life Cycle (SDLC) is a process used by the software industry
to design, develop and test high quality software’s. The SDLC aims to produce a high-
quality software that meets or exceeds customer expectations, reaches completion within
times and cost estimates.
What is SDLC?
SDLC is a process followed for a software project, within a software organization. It
consists of a detailed plan describing how to develop, maintain, replace and alter or enhance
specific software. The life cycle defines a methodology for improving the quality of
software and the overall development process.
The following figure is a graphical representation of the various stages of a typical SDLC.
Planning for the quality assurance requirements and identification of the risks
associated withthe project is also done in the planning stage. The outcome of the technical
feasibility study is to define the various technical approaches that can be followed to
implement the project successfully with minimum risks.
This DDS is reviewed by all the important stakeholders and based on various
parameters as risk assessment, product robustness, design modularity, budget and time
constraints, the best design approach is selected for the product.
A design approach clearly defines all the architectural modules of the product along
with its communication and data flow representation with the external and third-party
modules (if any). The internal design of all the modules of the proposed architecture should
be clearly defined with the minutest of the details in DDS.
In this stage of SDLC the actual development starts and the product is built. The
programming code is generated as per DDS during this stage. If the design is performed in a
detailed and organized manner, code generation can be accomplished without much hassle.
Developers must follow the coding guidelines defined by their organization and
programming tools like compilers, interpreters, debuggers, etc. are used to generate the code.
Different high level programming languages such as C, C++, Pascal, Java and PHP are used
for coding. The programming language is chosen with respect to the type of software being
developed.
Then based on the feedback, the product may be released as it is or with suggested
enhancements in the targeting market segment. After the product is released in the market,
its maintenance is done for the existing customer base.
There are different software development life cycle models to specify and design, which are
followed during the software development phase. These models are also called "Software
Development Process Models". Each process model follows a series of phase unique to its
type to ensure success in the step of software development.
Waterfall Model
RAD Model
Spiral Model
Incremental Model
Iterative Model
Among all these models Spiral Model is the one of the best model Spiral Model.
This SDLC model helps the group to adopt elements of one of more process models
like a waterfall, incremental. The spiral technique is a combination of rapid prototyping and
concurrency in design and development activities. Each cycle in the spiral begins with the
identification of objective for that cycle.Among all the models spiral model is the one of the
best model which provides support for Risk Handling. In its diagrammatic representation, it
looks like a spiral with many loops. The exact number of loops of the spiral is unknown and
can vary from project to project. Each loop of the spiral is called a Phase of the software
development process.
The Spiral Model is a Software Development Life Cycle (SDLC) model that provides
a systematic and iterative approach to software development. It is based on the idea of a spiral,
with each iteration of the spiral representing a complete software development cycle, from
requirements gathering and analysis to design, implementation, testing, and maintenance.
All projects are feasible – given unlimited resources and infinite time! Unfortunately,
the development of computer-based system or product is more likely plagued by a scarcity of
resources and difficult delivery dates. It is both necessary and prudent to evaluate the
feasibility of a project at the earliest possible time. Months or years of effort, thousands or
millions of dollars, and untold professional embarrassment can be averted if an ill-conceived
system is recognized early in the definition phase.
Feasibility and risk analysis are related in many ways. If project risk is great the
feasibility of producing quality software is reduced. During product engineering, however,
we concentrate our attention on four primary areas of interest:
All projects are feasible – given unlimited resources and infinite time! Unfortunately,
the development of computer-based system or product is more likely plagued by a scarcity of
resources and difficult delivery dates. It is both necessary and prudent to evaluate the
feasibility of a project at the earliest possible time. Months or years of effort, thousands or
millions of dollars, and untold professional embarrassment can be averted if an ill-conceived
system is recognized early in the definition phase.
Feasibility and risk analysis are related in many ways. If project risk is great the
feasibility of producing quality software is reduced. During product engineering, however, we
concentrate our attention on four primary areas of interest.
3.2.1. TECHNICAL FEASIBILITY:
This application in going to be used in an Internet environment called www (World
Wide Web). So, it is necessary to use a technology that is capable of providing the networking
facility to the application. This application as also able to work on distributed environment.
Application on developed with J2EE (Java 2 Enterprise Edition platform) Technology. One
major advantage in application is platform neutral. We can deploy and used it in any
operating system.
GUI is developed using HTML.to capture the information from the customer. HTML
is used to display the content on the browser. It uses TCP/IP protocol. It is an interpreted
language. It is very easy to develop a page/document using HTML some RAD(Rapid
Application Development) tools are provided to quickly design/develop our application. So
many objects such as button, text fields, and text area etc are provide to capture the
information from the customer.
We can use this application in any OS. They can have their own security and
transactional advantages. But are the responsible for selecting suitable and secured OS, which
is suitable to our application.
The back-end Oracle 8i and front-end application are platform independent. So we can
port this enterprise application in any environment. Both are having their individual
configuration to get better performance and backup issues.
The main processing is done on the server side using apache tomcat and the
programming environment java is used, for backend database oracle.
The major function that product executes are divided into three categories.
Administrative Functions.
Agents Functions
Policy Holder Functions
3.4.1. ADMINISTRATOR FUNCTIONS
The functions take care of the actual date interpretation standards at the level of the
administrative officer area. All these transactions that need consistency function the system
existence. All the master table transaction with respect to then data insertion, deletion and
updations are totally managed by the system administrators. The generic information
maintained by the administrations is:
Companies information management
Agents information management
Customer information management
Policies information management
The general functions that are taken care of at the user level are the customer can view
their respective policy information at any time. The customers can also view their premium
payment standards and the claims duration strategy.
View Companies information
View list of new policies and their details
View Agents information
View Installments Details
View Premium Details
View Customers Details
Claim for policy
Checkout the details whether claim is approved or rejected.
Agent
This actor acts as a bridge between the companies’ policies and the policyholders who have
taken the policies.
Login
Companies’
information
Policies
Information
Agent
Customer
policies
Policy types
information
Login
Policies
information
Policies
Registration
Policy Holder
Nominees
information
Policy payments
Policy claims
Activity diagrams are a loosely defined diagram technique for showing workflows of
stepwise activities and actions, with support for choice, iteration and concurrency. In the
Unified Modelling Language, activity diagrams can be used to describe the business and
operational step-by-step workflows of components in a system. An activity diagram shows
the overall flow of control.
Fig.10.Activity diagram
3.7. SYSTEM REQUIRMENTS
The project is web-based application. When we talk about hardware and software, we have
to mention requirements on both the Client and Server part.
(Intel compatible)
4.IMPLEMENTATION
Java Technology
The Internet helped catapult Java to the forefront of programming and Java in turn has
had a profound effect on the Internet. The reason is simple: Java expands the universe of
objects that can move about freely in cyberspace. In a network, there are two broad categories
of objects transmitted between the Server and your Personal Computer: passive information
and dynamic, active programs like an object that can be transmitted to your computer, which
is a dynamic, self-executing program. Such a program would be an active agent ton the client
computer, yet the server would initiate it. As desirable as dynamic, networked programs are,
they also present serious problems in the areas of security and portability. Prior to Java
cyberspace was effectively closed to half the entities that now live there. Java addresses these
concerns and doing so, has opened the door to an exiting a new form of program.
The rise of server-side Java applications is one of the latest and most exciting trends
in Java programming. It was first hyped as a language for developing elaborate client-side
web content in the form of applets. Now, Java is coming into its own as a language ideally
suited for server-side development. Businesses in particular have been quick to recognize
Java’s potential on the server-Java is inherently suited for large client/server applications.
The cross platform nature of Java is extremely useful for organizations that have a
heterogeneous collection of servers running various flavors of the Unix of Windows
operating systems. Java’s modern, object-oriented, memory-protected design allows
developers to cut development cycles and increase reliability. In addition, Java’s built-in
support for networking and enterprise API provides access to legacy data, easing the
transition from older client/server systems.
Java Servlets are a key component of server-side java development. A Servlets is a
small, plug gable extension to a server that enhances the server’s functionality. Servlets allow
developers to extend and customize and Java enabled server a web server, a mail server, an
application server, or any custom server with a hitherto unknown degree of portability,
flexibility and ease.
The Java Server Pages file has a .jsp extension to identify it to the server as a Java
Server Pages file. Before the page is served, the Java Server Pages syntax is parsed and
processed into a servlet on the server side. The servlet that is generated, outputs real content
in straight HTML for responding to the customer. Because it is standard HTML, the
dynamically generated response looks no different to the customer browser than a static
response.
ACCESS MODELS:
A Java Server Pages file may be accessed in at least two different ways: A client
request comes directly into a Java Server Page.
In this scenario, suppose the page accessed reusable Java Bean components that perform
particular well-defined computations like accessing a database. The result of the Bean’s
computations, called result sets is stored within the Bean as properties. The page uses such
Beans to generate dynamic content and present it back to the client. A request comes through
a Servlets.
Fig.12.servlet
The servlet generates the dynamic content. To handle the response to the client, the
servlet creates a Bean and stores the dynamic content (sometimes called the result set) in the
Bean. The servlet then invokes a Java Server Page that will present the content along with the
Bean containing the generated from the servlet.
There are two APIs to support this model of request processing using Java Server
Pages. One API facilitates passing context between the invoking servlet and the Java Server
Page. The other API lets the invoking servlet specify which Java Server Page to use.
In both of the above cases, the page could also contain any valid Java code. The Java
Server Pages architecture separation of content from presentation- -it does not mandate it.
JDBC requires that the SQL statements be passed as Strings to Java methods. For
example, our application might present a menu of database tasks from which to choose. After
a task is selected, the application presents prompts and blanks for filling information needed
to carry out the selected task. With the requested input typed in, the application then
automatically invokes the necessary commands.
In this project we have implemented three-tier model, commands are sent to a
“middle tier” of services, which then send SQL statements to the database. The database
process the SQL statements and sends the results back to the middle tier, which then sends
them to the user. JDBC is important to allow database access from a Java middle tier.
4.2 What Is JDBCTM?
JDBCTM is a JavaTM API for executing SQL statements. (As a point of interest, JDBC
is a trademarked name and is not an acronym; nevertheless, JDBC is often thought of as
standing for "Java Database Connectivity".) It consists of a set of classes and interfaces
written in the Java programming language. JDBC provides a standard API for tool/database
developers and makes it possible to write database applications using a pure Java API.
Using JDBC, it is easy to send SQL statements to virtually any relational database. In
other words, with the JDBC API, it isn't necessary to write one program to access a Sybase
database, another program to access an Oracle database, another program to access an
Informix database, and so on. One can write a single program using the JDBC API, and the
program will be able to send SQL statements to the appropriate database. And, with an
application written in the Java programming language, one also doesn't have to worry about
writing different applications to run on different platforms. The combination of Java and
JDBC lets a programmer write it once and run it anywhere.
Java being robust, secure, easy to use, easy to understand, and automatically
downloadable on a network, is an excellent language basis for database applications. What is
needed is a way for Java applications to talk to a variety of different databases. JDBC is the
mechanism for doing this.
JDBC extends what can be done in Java. For example, with Java and the JDBC API,
it is possible to publish a web page containing an applet that uses information obtained from a
remote database. Or an enterprise can use JDBC to connect all its employees (even if they are
using a conglomeration of Windows, Macintosh, and UNIX machines) to one or more
internal databases via an intranet. With more and more programmers using the Java
programming language, the need for easy database access from Java is continuing to grow.
MIS managers like the combination of Java and JDBC because it makes
disseminating information easy and economical. Businesses can continue to use their
installed databases and access information easily even if it is stored on different database
management systems. Development time for new applications is short. Installation and
version control are greatly simplified. A programmer can write an application or an update
once, put it on the server, and everybody has access to the latest version. And for businesses
selling information services, Java and JDBC offer a better way of getting out information
updates to external customers.
CONNECTION:
A connection object represents a connection with a database. A connection session
includes the SQL statements that are executed and the results that are returned over the
connection. A single application can have one or more connections with a single database, or
it can have connections with many different databases.
OPENING A CONNECTION:
The standard way to establish a connection with a database is to call the method
DriverManager.getConnection. This method takes a string containing a URL. The Driver
Manager class, referred to a the JDBC management layer, attempts to locate a driver than can
connect to the database represented Driver classes, and when the method get Connection is
called, it checks with each driver in the list until it finds one that can connect uses this URL to
actually establish the connection.
<Sub protocol>-usually the driver or the database connectivity mechanism, which may be
supported by one or more drivers. A prominent example of a sub protocol name is “oracle”,
which has been reserved for URLs that specify “thin”-style data source names.
4.3 HTML:
Hypertext Markup Language (HTML), the languages of the World Wide Web
(WWW), allows users to produces Web pages that include text, graphics and pointer to other
Web pages (Hyperlinks).
HTML is not a programming language but it is an application of ISO Standard 8879,
SGML (Standard Generalized Markup Language), but specialized to hypertext and adapted to
the Web. The idea behind Hypertext is that instead of reading text in rigid linear structure, we
can easily jump from one point to another point. We can navigate through the information
based on our interest and preference. A markup language is simply a series of elements, each
delimited with special characters, that define how text or other items enclosed within the
elements should be displayed. Hyperlinks are underlined or emphasized works that load to
other documents or some portions of the same document.
HTML can be used to display any type of document on the host computer, which can
be geographically at a different location. It is a versatile language and can be used on any
platform or desktop.
HTML provides tags (special codes) to make the document look attractive. HTML
tags are not case-sensitive. Using graphics, fonts, different sizes, color, etc., can enhance the
presentation of the document. Anything that is not a tag is part of the document itself.
Basic HTML Tags :
<!-- --> Specifies comments
<A>……….</A> Creates hypertext links
<B>……….</B> Formats text as bold
<BIG>……….</BIG> Formats text in large font.
<BODY>…</BODY> Contains all tags and text in the HTML document
<CENTER>...</CENTER> Creates text
<DD>…</DD> Definition of a term
<DL>...</DL> Creates definition list
<FONT>…</FONT> Formats text with a particular font
<FORM>...</FORM> Encloses a fill-out form
<FRAME>...</FRAME> Defines a particular frame in a set of frames
<H#>…</H#> Creates headings of different levels
<HEAD>...</HEAD> Contains tags that specify information about a document
<HR>...</HR> Creates a horizontal rule
5.TESTING
5.1 SOFTWARE TESTING TECHNIQUES:
Software testing is a critical element of software quality assurance and represents the
ultimate review of specification, designing and coding.
5.1.1 TESTING OBJECTIVES:
1. Testing is process of executing a program with the intent of finding an error.
2. A good test case design is one that has a probability of finding an as yet undiscovered
error.
3. A successful test is one that uncovers an as yet undiscovered error.
5.1.2 TEST CASE DESIGN:
Any engineering product can be tested in one of two ways:
5.1.2.1. White Box Testing:
This testing is also called as glass box testing. In this testing, by knowing the specified
function that a product has been designed to perform test can be conducted that demonstrates
each function is fully operation at the same time searching for errors in each function. It is a
test case design method that uses the control structure of the procedural design to derive test
cases. Basis path testing is a white box testing.
Basis Path Testing:
Flow graph notation
Cyclomatic Complexity
Deriving test cases
Graph matrices
Control Structure Testing:
Condition testing
Data flow testing
Loop testing
5.1.2.2 Black Box Testing:
In this testing by knowing the internal operation of a product, tests can be
conducted to ensure that “ all gears mesh”, that is the internal operation performs
according to specification and all internal components have been adequately exercised.
It fundamentally focuses on the functional requirements of the software.
The steps involved in black box test case design are:
7. FUTURE ENHANCEMENT
8. CONCLUSION
It should helpful for the agents and customers to look over their policy details, commision
reports etc.
9.REFERENCES
www.java2s.com
www.javacode.com
www.jsptut.com
www.htmlref.com