0% found this document useful (0 votes)
9 views

Synopsis (1)

The document outlines the development of a Hotel Guest Registration and Verification System for Jammu & Kashmir Police, detailing its objectives, phases, and methodologies. It covers the system's design, programming, testing, and the technologies used, emphasizing the incremental model for software development. The project aims to facilitate real-time guest registration and improve criminal detection through a centralized web-based application.

Uploaded by

keshavsharma3111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Synopsis (1)

The document outlines the development of a Hotel Guest Registration and Verification System for Jammu & Kashmir Police, detailing its objectives, phases, and methodologies. It covers the system's design, programming, testing, and the technologies used, emphasizing the incremental model for software development. The project aims to facilitate real-time guest registration and improve criminal detection through a centralized web-based application.

Uploaded by

keshavsharma3111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 177

TABLE OF CONTENTS

PART :1.
PROJECT DESCRIPTION
➢ Title
➢ Introduction to the project
➢ GOAL
➢ Purpose
➢ Project objectives
➢ Scope
➢ Proposed system and its benefits
➢ Project features
➢ Tools/platform used

PART :2.
PROJECT MODULES
➢ Consolidated view of the system
➢ Project module
➢ Forms and Tab forms

PART :3.
SYSTEM DEVELOPMENT LIFE CYCLE
➢ Introduction

PART :4.

Guest Registration and Verification System 1


System Analysis
➢ Definition of the problem
➢ Defects of existing system
➢ System to be developed
➢ Significance of system to be developed
➢ Software requirement analysis
➢ Feasibility study

PART :5.
SYSTEM DESIGN
➢ Concepts
➢ Objectives
➢ Modules
➢ System design
➢ ER diagram
➢ Data flow diagram

PART :6.

SYSTEM PROGRAMMING
➢ Introduction
➢ Visual interfaces
➢ Database design
➢ Snap shots
➢ Crystal reports

PART :7.

Guest Registration and Verification System 2


➢ CODING SECTION

PART :8.

SYSTEM TESTING
➢ Introduction
➢ Testing procedure
➢ Unit testing
➢ Module testing
➢ Integration testing
➢ System testing
➢ User acceptance testing
➢ Stress testing
➢ Output testing

PART :9.
TECHNOLOGY USED
➢ Selection of technology used
➢ Introduction to .net framework
➢ Introduction to VB.Net
➢ Introduction to ADO.Net
➢ Introduction to SQL Server

PART :10.

BIBLIOGRAPHY

Guest Registration and Verification System 3


Guest Registration and Verification System 4
1. INTRODUCTION

Information is key to survival in today’s e-world. Internet has

become a pervasive force today. Computers have completely revolutionized the way business

is being done. Everything is being routed through the Internet. Web has become an ocean of

knowledge. A person can collect any sort of information by sitting on a chair.

We intent to develop a Hotel Guest Registration System App for Jammu & Kashmir Police

which will have allow Realtime registration of guests on a centralized system along with

multiple reporting options.

Guest Registration and Verification System 5


1.1 Objective of the System

• This Software allows registered hotels and guest houses to


submit their guest records in real-time.
• This allows registered hotels and guest houses to submit the
guest record in real-time from an internet connected computer
instead of written reports.
• This allows easy detection of Criminals.

Guest Registration and Verification System 6


1.3 PROJECT CATEGORY

Information has to be place in the form of web pages, so the category of the project has to be

Internet/LAN. INTERNET/WAN is the category of this project. Project was basically

information based and every part of the information has to be drafted in the form of web pages.

Category of the project has to be Internet/WAN. One of the module of the system is connected

with the database. The database has to be loaded on the server. So it is basically concept of

client server technology.

Guest Registration and Verification System 7


1.4 Project Phasing

The project will be developed in two phases i.e. the development phase and
deployment phase.
Development phase
It consists of following phases:

1. Database design
2. Template design
3. Dynamic web pages

Deployment phase

The system will be uploaded and configured on the space bought on the server.
The space may be subject to increase as more and more information and data are
loaded online.

Detailed design exhibited by table drawn below.

Database Designing and creating database


Design tables and view with all required
fields, types, relations required for
the operation of the portal.
Template Designing of the basic template for
Design the website. The template will be
used to carry the same theme to all
the pages throughout the site.
Dynamic Web Development of highly interactive
pages web applications with database
connectivity, verification, validation
and other user interactive functions
such as logon, logoff, etc. The
processing behind the static pages
will be completed in this phase

Guest Registration and Verification System 8


Domain name The domain name will be registered
registration on a web server on the internet.
Web Hosting The portal will be uploaded and
Deployment
and space configured on the space bought on
Phase
the server. Initially for information
site of this nature needs 1GB of web
space.

Guest Registration and Verification System 9


1.5 Software Engineering process

The attribute of web based system and application have a


profound influence on the web engineering process that is chosen. If immediacy
and continuous evolution are primary attribute of web engineering, a web
engineering team might choose an agile process model that produces web
applications releases in the rapid fire sequence. On the other hand, if the web
application is to be developed over a long time period) e.g., a major (e-commerce
application), an incremental process model can be chosen.

The network intensive nature of the application in this domain suggests a


population of the user that is diverse (thereby making special demands on
requirements elicitation and modeling) and an application architecture that can be
highly specialized. Because web applications are often content-driven with an
emphasis on aesthetic, it is likely that parallel development activities will be
scheduled within the web applications process and involve a team of both
technical and non technical people (e.g., copywriter, graphic designer).

a) Defining the framework


To be effective, any engineering process must be adaptive. That is, the
organization of the project team, the modes of communication among team
members, the engineering activities and tasks to be performed, the information
that is collected and created, and the methods used to produce a high quality
product must all be adapted tom the people doing the work, the project time line
and constraint, and the problem to be solved. Before we define a process
framework for web engineering, we must recognize that:

1. Webapps are often delivered incrementally. That is, frame work activities
will occur repeatedly as each increment is engineered and delivered.
Guest Registration and Verification System 10
2. Changes will occur frequently. These changes may occur as a result of the
evaluation of a delivered increment or as a consequence of changing
business conditions.
3. Timelines are short. This militates against the creation and review of
voluminous engineering documentation, but it does not preclude the simple
reality that critical analysis, design, and testing must be recorded in some
manner.

Customer communication .Within the web application process, the


customer communication is characterized by two major tasks: business analysis
and formulation. Business analysis defines the business/organizational context
for the web application. In addition, stake holders are identified, potential
changes in the business environment or requirement are predicted, and
integration between the web application and other business applications, data
bases, and functions is defined. Formulation is a requirements gathering activity
involving all stake holders. The intent is to describe the problem that the web
application is to solve using the best information available. In addition, the
attempt is made to identify areas of uncertainty and where potential changes will
occur.

Planning. The project plan for the web application increments is created. The
plan consists of a task definition and a time line schedule for a time period
projected for a development of the web applications increments.

Modeling. Conventional software engineering analysis and design tasks are


adapted to web applications development, merged, and then melded into the web
engineering modeling activity. The intent is to develop “rapid” analysis and

Guest Registration and Verification System 11


design models that define requirements and the same time represents web
applications that will satisfy them.

Construction. Web engineering tools and technology are applied to construct


the web application that has been modeled. Once the web application increment
has been constructed, a series of rapid tests are conducted to ensure that errors in
design (i.e., content, architecture, interface, navigation) are uncovered.
Additional testing addresses other web applications characteristics.

Deployment The web application is configured for its operational


environment, delivered to end users, and then an evaluation period commences.
Evaluation feedback is presented to the web engineering team, and the increment
is modified as required.

b) Refining the framework

We have already noted that the web engineering process model must be
adaptable. That is, a definition of the engineering tasks required to refine each
framework activity is left to the discretion of the web engineering team. In some
cases, a framework activity is conducted informally. In others, a series of distinct
tasks will be defined and conducted by team members. In every case, the team
has responsibility for producing a high-quality web application increment within
the time period allocated.
It is important to emphasize that associated with web engineering
framework activities may be modified, eliminated, or extended based on the
characteristics of the problem by the people on the web engineering team.

Guest Registration and Verification System 12


The five web application framework activities are applied using an
incremental process flow as shown below

Acceptance Test
Customer use
Customer
Software evalvation Coding
increment Delivery & Component
Feedback test

Refactoring
Construct-
Customer Business ion
Communica Analysis
tion Formulation

Planning Modeling
Design model
Iteration Content
plan Architecture
Analysis Navigation
model Interface
Content
Iteration
Function
Configuratio
n

1.6 Software Model of the Project

Guest Registration and Verification System 13


The software model used in our Project is the Incremental Model. We used
incremental model because the project was done in increments or parts and
these parts were tested individually. For example, like the user registration
and front page was developed first and tested thoroughly, then other part
representing module was developed and tested individually.

Incremental model combines elements of the linear sequential model with the
iterative philosophy of prototyping. The incremental model applies linear
sequences in a staggered fashion as time progresses. Each linear sequence
produces a deliverable increment of the software. For example, word
processing software may deliver basic file management, editing and
document production functions in the first increment. More sophisticated
editing and document production in the second increment, spelling and
grammar checking in the third increment, advanced page layout in the fourth
increment and so on. The process flow for any increment can incorporate the
prototyping model.

When an incremental model is used, the first increment is often a core


product. Hence, basic requirements are met, but supplementary features
remain undelivered. The client uses the core product. As a result of his
evaluation, a plan is developed for the next increment. The plan addresses
improvement of the core features and addition of supplementary features.
This process is repeated following delivery of each increment, until the
complete product is produced. As opposed to prototyping, incremental
models focus on the delivery of an operational product after every iteration.

Advantages

Guest Registration and Verification System 14


1. Particularly useful when staffing is inadequate for a complete
implementation by the business deadline.

2. Early increments can be implemented with fewer people. If the core


product is well received, additional staff can be added to implement the next
increment.

3. Increments can be planned to manage technical risks. It may be possible to


plan early increments without the use of this hardware, thus enabling partial
functionality and avoiding unnecessary delay.

System / information Increment 1


engineering

Anal- Desig- Code Test Delivery of


ysis n 1st
increment

Increment 2 Anal- Desig- Code Test Delivery of


ysis n 2nd
increment

Increment 3 Anal- Design Code Test Delivery of


ysis 3rd
increment

Increment 4 Anal- Design Code Test Delivery of


ysis 4th
increment

Calendar
time
Guest Registration and Verification System 15
The incremental model
1.7 Scope of the Project

A request to receive assistance from Skill Evaluation systems can be made for many

reasons. In most of the organizations an employee, or a system specialist-initiates the

request. And in my case the decision was from college and they planned the system

and initiated the request.

When request is made, the first system activity, the preliminary investigation, begins. I

had gone through various schools, software companies and other I.T Journals and

had collected the concept of online doctor. The response from these professionals

were very good. I had talked to various people like my H.O.D, Coordinator, project

guide and they really supported me and encouraged for this project.

Methodology is basically the procedure, which shows the route towards the objective.

It depends upon the type of project and field related to that project. And to meet the

above objectives a complete requirements analysis of doctors and medicines was

necessary. It is necessary that the final prototype should meet the objectives set by

my project guide and me. And complete knowledge of software engineering is

necessary.

Guest Registration and Verification System 16


1.6 Project Resources

The project involves development of a Data base driven web application. The
project aims at implementing all the modules of a client requirement
successfully. The website will be developed using latest technology from
Microsoft called .net. The website will be developed in ASP.NET with
VB.NET as code behind i.e. the code will be written in vb.net.

The Software & Developmental Requirements of the project are:

• .Net Framework: It provides the runtime and compile time support to


ASP.NET Applications
• Visual Studio.net: It is the Integrated Development Environment for
developing ASP.NET Web Applications.
• Adobe PhotoShop: Used for development of Graphics.
• Windows Operating Platform: Windows operating System like
Windows 10/11
• Internet Information Server: IIS is required to run the ASP.net
applications on the server.

The Runtime Requirements of the Project are:

• Since the project is a web based application it needs to be hosted on a


Web server.
• It also requires registering a domain name which will be the address of
the Website on Internet.
• The domain will be redirected to the Web server where the website is
hosted.

Guest Registration and Verification System 17


Hardware Requirements

FOR ACCESSING WEBSITE


a) Any Intel series processor.
b) 2 GB RAM.
c) Keyboard.
d) Mouse and other peripherals.
e) Modem or network card.

FOR DEVELOPING WEBSITE

Any Intel series processor.


a) 4 GB RAM.
b) Keyboard.
c) Mouse and other peripherals.
d) Modem or network card.

Guest Registration and Verification System 18


2. ANALYSIS PHASE AND TASKS

The process of establishing services, that the developed system must provide
and the constraints under which it must operate is called requirement capturing
and analysis. The result of this analysis is a specification, which often
constitutes the first formal document produced in the software process. The
specifications are produced at different levels of abstraction with a careful
correlation made between these levels. .

Requirement definition
This is a statement in natural language of what the user expects from the system
to be developed and the constraints under which the system should operate. The
client, the developer and the management should write this so that it is
understandable.

Requirement specification
This is a structured document which sets out the system services in a more
detailed manner for the understanding of the technical staff, both at the user and
developer ends. Functional requirements – These are the system services
expected by the user. Non-functional requirements – These set out the
constraints under which the system must operate and the standards which must
be met by the delivered system.

Software specification
This is an abstract description of the software, which is the basis for its design
and implementation. The readers here are the software engineers, not the users
or the management.

Guest Registration and Verification System 19


2.1 Problem Analysis

MEETING AND DISCUSSIONS

Before deciding the system design and the outputs desired, I had met with the

professional people like my project guide and various people who are involved in

making of this system. Every time I went with new concepts in mind and new

designs in mind, the model that is designed finally was after 10-15 meetings on

the same design.

REVIEWING EXAM PAPERS AND SYSTEMS

Before starting on the development of new system I had to look for the manual

examination system and books. I had also gone through various websites, who are

providing with these kind of information, which had enabled me to build a platform

for Online Skill Evaluation & Resource centre.

Guest Registration and Verification System 20


EXISTING SYSTEM AND PROPOSED SYSTEM

As such there was not any source who were providing information of the

website. The only source for the information about this system was by giving

online exam or by the manual exam system. So the existing system is somehow

manual as well as technology driven.

Limitations of the Existing System

1. Existing system doesn’t provide information about user’s weak area of the various
subjects.
2. Existing system takes a lot of time giving results to the user.
3. Existing system does not provide exam for programming subjects.
4. Existing systems only provide exams with limited features but not the study
materials and the information about the related books, previous papers,etc.

PERFORMANCE REQUIREMENTS

The following performance characteristics were taken care of in developing the systems:

• User Friendliness

The system is easy to learn and understand. A naïve user can also use the system
effectively, without any difficulty.

• User Satisfaction

The system is such that it stands up to the users expectations.

• Response Time

The response time of all the operations is very low. This has been made possible
by careful programming.

Guest Registration and Verification System 21


• Error Handling

Response to User Errors and undesired situations have been taken care of to
ensure that the system operates without halting in case of such situation and
proper error messages are given to user.

• Safety

The system is able to avoid catastrophic behaviour.

• Robustness

The system recovers from undesired events without human intervention.

• Security

The system provides protection of information through the mechanism of password


incorporated in it. Therefore, only authorized people can access the databases.

• Accuracy

The system is accurate. Thus, its utility is very high.

• Portability

The system can be moved to a new hardware / operating system after making
minor modification to it.

Guest Registration and Verification System 22


PROPOSED SYSTEM

Proposed system activity is an important aspect of the system development life cycle.

It is only this activity which enables to enable the developers to built new system

effectively and as per the objectives set during the development of the system. In this

case proposed system came into the form of a web-based system, which will provide

Features of the system

• Easy to Use

• No special hardware required, even can be used from a Ordinary Smart Phone

• No extra manpower required. Can be operated by any Person having basic knowledge

on Smart Phone

• Data Security: No Other Hotel can access Data of any Other Hotel

• No Need to send separate Report to Police Station hence cost effective.(Saving Cost of

Photocopies, Paper, Stationary and travel cost)

• Owner can monitor Registration of Rooms/Guests even from home.

• Low cost data storage and management.

Customer data can be easily searched and retrieved since day of inception.

The proposed system will be build by using ASP.NET at the front end and MS SQL

Server as Backend.

Guest Registration and Verification System 23


CRITERIA FOR THE PROPOSED SYSTEM

The following acceptance criteria were established for the evaluation of the new
system

1. The system developed should be accurate and hence reliable i.e. the error rate
should be minimized and the outputs should be consistent and correct.

2. The developed software should provide all the required functions. Further, both
the execution time and the response time should negligibly low. It should also
satisfy the criteria specified in functional and performance requirements.

3. The system should be efficient i.e. the resource utilization should be optional.

4. The system should have scope to for see modifications and enhancements i.e.
it should be able to cope with business changes.

5. The system must satisfy the standards of a good software:

5.1 User Friendliness : The system should meet user needs and should be
easy to use.

5.2 Modularity : The system should have relative independent and single-
function parts that can be put together to make the complete system.

5.3 Maintainability: The system should be such that future maintenance


and enhancement times and efforts are reduced.

6) COMPUTER BASED SYSTEM

Guest Registration and Verification System 24


The elements of a computer based System often include the following:

. Software
Computer programs and related documentation that serve to affect the logical method;

procedure or control are required.

. Hardware
Electronic devices (CPU etc.) that provide computing capability and scanners etc., that

provides external world function.

. People
Users and operators of the Hardware and Software.

. Database
A large, organizes collection of information that is accessed by the software

and is an integral part of the system function .


. Documentation
Manuals, forms and other descriptive information that portrays the use and/or
operation of the system.

Guest Registration and Verification System 25


CONCEPT OF A SYSTEM

Before going to design a system one should know what system means. Basically system is an

integrated collection of components, which satisfy functions necessary to achieve the system’s

goals and which have relationships to one another that give cohesion to the system and define

its structure. Basically systems consists of three processes

▪ Input

▪ Processing

▪ Output

All these processes are done by programmer, where I had collected the input requirements

from the user, I had designed the input structure, and for obtaining output, user don’t know the

type of process which had gone through in the software. Conversion of input into output is

called as processing.

A system concept is obtained as per the need of the user. The system concept comes

in business information concept or simply information concept for the user.

Guest Registration and Verification System 26


APPROACH TOWARDS DEVELOPMENT

To approach towards the development of information system, knowledge of software

engineering is necessary.

With the advent of software with such a force it has, become necessary for me to become

acquainted with the rules and regulations laid down during the making of a project. In other

words it has become essential for me to know the concepts of software engineering.

Hence before I go on to describe my project – ‘Guest Registration System for J&K

Police ’, I will briefly describe the steps of making a good project.

The steps of software engineering will be dealt with as per the following categories:

▪ Characteristics of software

▪ Problems faced by software developers

▪ Project process management

▪ Estimation

▪ Risk analysis

Software Importance

During the time when computer was introduced the main point of focus was the
hardware. There was a need to develop computers with fast processing speed.

But reduced cost as the advancements kept taking place in the field of hardware;
there was a need to develop better.

Guest Registration and Verification System 27


Software became more important due to following reasons:

a. Hardware sophistication has outpaced to build software to tap hardware


potential.
b. Our ability to build new programs cannot keep pace with the demand for new
programs.
c. Our ability to maintain existing programs is threatened by poor design and
inadequate resource.

Software characteristics

To efficiently develop a good project it is important to be aware of software


characteristics:

1. Software is developed or engineered, and not manufactured i.e. they don’t


introduce quality problems that are present in hardware.

2. Software doesn’t wear out i.e. it always exists but might deteriorate.

3. Most software is custom built, rather then being assembled from existing
components.

Problems faced by software developers.

1. Schedule and time cost estimates are gross.

2. The software productivity has not kept up with its demands

3. The quality of software is sometimes not adequate.

Guest Registration and Verification System 28


SYSTEM DESIGN

The design of an information system produces the details that state our system will

meet the requirements identified during system analyses.

System design is the process of planning a new business system or one to replace or

complement an existing system. For the information system, which is going to be

designed, considers following factors of system design:

The design of an information system produces the details that state how a system will

meet the requirements identified during system analysis. System specialists often

refer to this state as logical design, in contrast to the process of developing program

software, which is referred to as physical design.

System analysis begin process by identifying reports and other output that the system

will produce. Then the specific data on each are pinpointed. Usually, designers sketch

the form or display as they expect it to appear when the system is complete. This may

be done on paper or on a computer display, using one of the automated system tools

available.

The system design also describes the data to be input, calculated, or stored. Individual data

items and calculation procedures are written in detail. The procedure tell how to process the

data and produce the output.

Designers are responsible for providing programmers with complete and clearly

outlined software specifications. As programming starts, designers are available to

answer questions, clarify fuzzy areas, and handle problems that confront the

programmers when using the design specifications.

Guest Registration and Verification System 29


As the software is to be designed in ASP and HTML with the concept of the database

is must for quality designing. It will include designing of the database, designing of

forms, designing of reports, designing of data loader.

Guest Registration and Verification System 30


INPUT AND OUTPUT DESIGN

1) DESIGN OF OUTPUT

The output generally refers to the result and information that are generated by the system. One

of the most important features of an information system from the users point of view is the

output it produces. If the output is of poor quality, the whole system is in peril because the

users will then avoid using it. Hence, the design of output assumes greater importance. In any

system the output is largely dependent on input. However, no system can be designed properly

without knowing the output structure of the existing system.

Output as we generally know refers to the results and information that are provided or

generated by the system. Design of the output is the different from the input; the

difference will be output mostly comes in the form of information or the reports.

However some information are done systematically one after another. Output of the

website can be save the data, can create new entry; can be used in other calculations.

2) DESIGN OF INPUT

Inputs are basically the web-based forms where the user enters the data. Forms are

very important means of communication. In any websites the forms are used for both

input and output purposes. The user read from forms, write on forms and spent

sufficient amount of time in handling and filing forms. As the time taken for filing up

these forms are large, I must design it carefully. In this website there are different

types of forms in the form of web pages. Normally the data is transformed through

various forms and information is obtained through these forms. Hence I can say that

Guest Registration and Verification System 31


form is a physically carrier of data as well as information. Form can be defined as a

document having constant printed information which are having a space to add

variable information (Data). Hence form design is an important aspect of improving the

efficiency of the software.

Guest Registration and Verification System 32


2.2 Overview of Microsoft.Net Approach

Microsoft.net is a set of software technologies for connecting information,


people, system, and devices. This new generation of technology is based on web
services small building-block applications that can connect to each other as well
as to other, large applications over the internet. .net id the Microsoft solution for
web services, the next generation of software that connects our world of
information, devices, and people in a unified, personalized way.
.NET technology enables the creation and use of xml-based
applications, processes, and website as services that share and combine
information and functionality with each other by design, on any platform. .net is
a comprehensive family of products, built on industry and internet standards, that
provide for each aspect of developing (tools), managing (servers), using (building
block services and smart clients) and experiencing (rich user experiences) web
services. .net will become part of the Microsoft applications, tools, and servers
you already use today-as well as new products that extend web service
capabilities to all of your business needs.
Microsoft.net is a set of Microsoft software technologies for connecting
information, people, systems, and devices. It enables a high level of software
integration through the use of web services small, discrete, building block
applications that connect to each other as well as to other and larger applications
over the internet.
The pc revolution launched in a world where every computer, whether a pc or a
mainframe, was an isolated island of information. Then, the commoditization of
pc hardware brought about the advent of networked computers. This shift
enabled some sharing of data within an organization, essentially increasing the
size of the islands but doing little to connect them to each other.
Information exchanges in this new computing environment occur along many
different avenues and go on many different directions to provide the user with the
Guest Registration and Verification System 33
information required, regardless of its location or what kind of hardware it
resides on.
The integration of systems is the guiding principle – not an afterthought of
distributed computing. Integration delivers compelling benefits including faster,
easier exchange of data within and between organizations, and more
opportunities for businesses to connect with consumers.

Origin of .Net Technology


1. Ole Technology
Object linking and embedding technology was developed by
Microsoft in the early 1990 to enable easy interprocess communications. To
embed documents from one application into another application. This enabled
users to develop applications which required inter- operability between various
products such as MS Word and MS Excel.

2. Com Technology
Microsoft introduced component-based model for developing soft
wares programs. In the components –based approaching a program is broken
into a number of independent components where each one offers a particular
service. It reduces the overall complexity of software. Enables distributed
developments across multiple organization or departments and Enhances
software maintainability

3. Dot Net Technology


.NET technology is a third-generation component
model. This provides a new level of inter-operability compared to COM
technology. COM provides a standard binary mechanism for inter-module
communication .this mechanism is replaced by an intermediate language called
Microsoft Intermediate language (MSIL) or simply IL.
Guest Registration and Verification System 34
The .Net Framework
The .NET framework is the foundation for .NET development technologies. It is
a Multilanguage development and execution environment that makes it easy to
build, deploy and run Web services, standard Web applications. Framework
enables the integration of existing IT investments with new applications and
services, and gives developers and organizations the ability to solve the
challenges of deploying and operating Internet-scale applications

Various components of the visual studio .net

Guest Registration and Verification System 35


Dot Net Architecture

There are around 27 different languages, which can be the probable inputs to the
.NET framework at the common language specification layer. Once the
specifications are complied, the process of further delegation comes to light.

The object built and written, pass through the stage of the services
layer. This enables the same language to arm their objects with the
services.
The next step is to move further to collect the data and request the class
libraries for execution from the dependency layer.
Guest Registration and Verification System 36
The final launch of the program is done with the help of base layer
comprising common language runtime.
This the output is Visual Studio.NET

Compilation and Execution of a .Net Application

Guest Registration and Verification System 37


The two major components of the .net framework include:

1. The common language runtime, which is the execution engine for .net
framework-based applications. Its functions include code management
(loading and executing code). Managing memory for applications and
objects, enforcing security rules regarding what resources may be accessed
by the code, and interoperation between .net framework-based code and
pre-existing com objects.

2. Class libraries, which provides functionality for task such as user


interface design, threading, security management, network
communications, and so on. The three most significant groups of classes
are ado.net for data manipulation, asp.net for building web services, and
windows forms for building windows-based smart client applications.
These components of the .net framework were designed from
inception to facilitate the inclusion of a broad, highly flexible range of
security options that can be implemented y developers, administrators,
and users. At a high level, the security features of the .net framework
include:

WEB SERVICES
This interactive animation explains how Web services can help companies
connect standalone system and share information between various applications. It
also looks at how Microsoft .NET-connected software can be the foundation of
Web service solutions.

Guest Registration and Verification System 38


Benefits of Web services

Open the door to new business opportunities by making it easy to


connect with partners.
Deliver dramatically more personal, integrated experiences to users via
the new breed of smart deices-including PCs.
Save time and money by cutting development time.
Increase revenue streams by easily making your own Web services
available to others.

.Net Means For Developers


Through the use of Microsoft Visual Studio .NET and the Microsoft
.NET framework, Microsoft provides developers with a full set of development
tools to quickly and easily create state-of-the-art applications and Web services.

Microsoft .NET, through Visual Studio and the .NET Framework, will
enable more rapid development of software applications and services.
The .NET framework and Visual Studio .NET will provide greater
reliability for applications and Web services.
The use of Web services will allow applications and services created
with Microsoft .NET-connected software to integrate more easily and
efficiently.

Faster Development
Through the use of the common language runtime, a part of the .NET
Framework, developers can create Web services using any modern programming
language, greatly increasing the pool of available developer resources as well as
allowing developers the freedom to use the programming language most suited to
solve the problem at hand.
Guest Registration and Verification System 39
Visual studio .NET largely automates the transformation of an
application in to a Web service, decreasing the time and effort
necessary to quickly create and deploy solutions.
.NET building block services, provides core capabilities needed by
many applications—without requiring additional coding.

Greater Reliability

The common language runtime provides for a managed execution


environment eliminating memory leaks, access violation, and
versioning problems.
The .NET Framework enforces type safety, explicit code sharing, and
application isolation, guaranteeing that no Web service can affect or
illegally call another.

Means for Business


With .NET –connected software and services, businesses can realize
improvements in the time and cost associated with developing and maintaining
their business applications, as well as benefiting from empowering employees
with the ability to act on vital information anywhere, from any smart device.

.NET will deliver best of breed integration for businesses.


Exposing Web services increases potential reach and exposure, creating
new business opportunities.
.NET promises substantial savings in development costs, as well as creating new
revenue streams, through the use of Web services

Rapid development
Microsoft Visual Studio .NET and the .NET Framework empower
developers to quickly and easily create cutting-edge Web services and
Guest Registration and Verification System 40
applications, building on their existing skills sets. Through Multilanguage
support, developers are freed to use the appropriate language in building Web
services.

Benefits of the Dot Net Approach

1. Simple and faster systems development.


2. Rich object model enhanced built in functionality.
3. Many different ways to communicate with the outside world.
4. Integration of different languages into one platform.
5. Easy deployment and execution.
6. Wide range of scalability.
7. Interoperability with existing applications.
8. Simple and easy to build sophisticated development tools.
9. Fewer bugs.
10. Potentially better performance.

Guest Registration and Verification System 41


2.3 Technology Used: ASP.NET

The Project is developed using ASP.NET. The latest Web


Application Development Technology from Microsoft.

What are Web Applications?


These applications provide content from a server to client machines over the
Internet. Users view the Web application through a Web browser.

How Web Applications Works?


Web applications use client/server architecture. The Web application resides
on a server and responds to requests from multiple clients over the Internet,
as shown in Figure.

ASP.NET Web application architecture

On the client side, the Web application is hosted by a browser. The


application’s user interface takes the form of Hypertext Markup Language
(HTML) pages that are interpreted and displayed by the client’s browser.
Guest Registration and Verification System 42
On the server side, the Web application runs under Microsoft Internet
Information Services (IIS). IIS manages the application, passes requests from
clients to the application, and returns the application’s responses to the client.
These requests and responses are passed across the Internet using Hypertext
Transport Protocol (HTTP). A protocol is a set of rules that describe how two
or more items communicate over a medium, such as the Internet.

Client/server interaction in a Web application

The executable portion of the Web application enables us to do many things


that you can’t do with a static Web site, such as:

• Collect information from the user and store that information on the
server
• Perform tasks for the user such as placing an order for a product,
performing complex calculations, or retrieving information from a
database
• Identify a specific user and present an interface that is customized for
that user
• Present content that is highly volatile, such as inventory, pending
order, and shipment information

Guest Registration and Verification System 43


This is only a partial list. Basically, you can do anything with a Web
application that you can imagine doing with any client/server application.
What makes a Web application special is that the client/server interaction
takes place over the Internet.

What ASP.NET Provides

ASP.NET is the platform that we use to create Web applications and Web
services that run under IIS. ASP.NET is not the only way to create a Web
application. Other technologies, notably the CGI, also enable you to create
Web applications. What makes ASP.NET special is how tightly it is
integrated with the Microsoft server, programming, data access, and security
tools.ASP.NET provides a high level of consistency across Web application
development.

1. Visual Studio .NET Web development tools.

These include visual tools for designing Web pages and application
templates, project management, and deployment tools for Web applications.

2. The System Web namespaces.

These are part of the .NET Framework and include the programming classes
that deal with Web-specific items such as HTTP requests and responses,
browsers, and e-mail.

3. Server and HTML controls.

These are the user-interface components that you use to gather information
from and provide responses to users.

Guest Registration and Verification System 44


In addition to the preceding components, ASP.NET also uses the
following, more general programming components and Windows tools.
These items aren’t part of ASP.NET. However, they are key to
ASP.NET programming.

• Microsoft Internet Information Services (IIS).

As mentioned in the previous section, IIS hosts Web applications on


the Windows server.

• The Microsoft Visual Basic .NET, Microsoft Visual C#, and Microsoft
Visual J# programming languages.

These three languages have integrated support in Visual Studio .NET


for creating Web applications.

• The .NET Framework.

This is the complete set of Windows programming classes, including


the ASP.NET classes as well as classes for other programming tasks
such as file access, data type conversion, array and string manipulation,
and so on.

• Microsoft ADO.NET database classes and tools.

These components provide access to Microsoft SQL Server and ODBC


databases. Data access is often a key component of Web applications.

• Microsoft Application Center Test (ACT).

This Visual Studio .NET component provides an automated way to


stress-test Web applications.

Guest Registration and Verification System 45


ASP.NET is the most complete platform for developing Web applications
that run under IIS. However, it is important to remember that ASP.NET is not
platform-independent. Because it is hosted under IIS, ASP.NET must run on
Windows servers. To create Web applications that run on non-Windows/IIS
servers, such as Linux/Apache, you must use other tools—generally CGI.

Features of an Asp.net
1. Compiled code- code written in asp.net is compiled and not interpreted .this
makes asp.net applications faster to execute than other server side scripts that are
interpreted, such as scripts written in a previous version of asp.
2. Enriched tool support: the ASP dot net framework is provided with a rich
toolbox and designer inVS.NET IDE.
3. Power and flexibility: asp.net applications are based on common language
runtime therefore the power and flexibility of the .net platform is available to
ASP .net application developers. Asp.net applications enable you to ensure that
the class library, messaging and data access solutions are seamlessly accessible
over the web. Asp. Net is also language independent therefore, you can choose
any. Net language to develop your application.
4. Simplicity-ASP. Net enables you to build user interfaces that
Separate application logic from presentation content in addition, CLR simplifies
application development by using managed code services such as automatic
reference counting and garbage collection therefore ASP dot net makes it easy to
perform common tasks ranging from form submission and client authentication
to site configuration and deployment.
5. Manageability- ASP dot net enables you to manage web application by
storing the configuration information in an xml file. You can open the xml file in
the visual studio .net.
6. Scalability- ASP dot net has been designed with scalability in mind. It has
features that help improve performance in multiprocessor environment.
Guest Registration and Verification System 46
7. Security- ASP dot net provides a number of options for implementing security
and restricting user access to a web application. All these options are configured
within the configuration file.

ASP.NET delivers the following other advantages to Web application


developers:

• Executable portions of a Web application compiled so they execute


more quickly than interpreted scripts
• On-the-fly updates of deployed Web applications without restarting the
server
• Access to the .NET Framework, which simplifies many aspects of
Windows programming
• Use of the widely known Visual Basic programming language, which
has been enhanced to fully support object-oriented programming
• Introduction of the new Visual C# programming language, which
provides a type-safe, object-oriented version of the C programming
language
• Automatic state management for controls on a Web page (called server
controls) so that they behave much more like Windows controls
• The ability to create new, customized server controls from existing
controls

Programming model in ASP dot net

1. Web forms enable you to create user interface for web applications, you. You
use server controls to design the user interfaces of web applications and then
write code, which will be executed at the server-side, to handle events triggered
by these controls.

Guest Registration and Verification System 47


2. Web services enable you to remotely access certain functionality at the server
side. These services enable the exchange of data in a client-to-server or a server-
to server environment over the web by using simple object Access Protocol.
3. In ASP.NET, web forms consist of a user interface and application logic that is
applied to the components of user interfaces.
4. A user interface consists of static HTML or XML elements; and ASP.NET
server controls. When you create a web application, HTML or XML elements
and server controls are saved in a file with an .aspx extension. This file is called a
page file.
5. Application logic consists of code that is applied to the user interface elements
of a web Form page. We can use any of the .NET programming language, such
as Visual Basic .NET or C#, to write the logic for a web page.

Web Form Components

Web forms can contain several different types of components, as summarized


in Table .we can use the server and HTML controls to create the user
interface on a Web form. The data controls and system components appear on
the Web form only at design time to provide a visual way for you to set their
properties and handle their events. At run-time, data controls and system
components do not have a visual representation.

Components on a Web Form


Component Examples Description
These controls respond to user
events by running event procedures
on the server. Server controls have
TextBox,Label,Button,
Server built-in features for saving data that
ListBox,DropDownList,
controls the user enters between page
DataGrid
displays. You use server controls to
define the user interface of a Web
form.

Guest Registration and Verification System 48


Components on a Web Form
Component Examples Description
These represent the standard visual
elements provided in HTML. HTML
HTML Text Area, Table, Image,
controls are useful when the more
controls Submit Button, Reset Button
complete feature set provided by
server controls is not needed.
SqlConnection, Data controls provide a way to
Data SqlCommand, connect to, perform commands on,
controls OleDbConnection, and retrieve data from SQL and OLE
OleDbCommand, Dataset databases and XML data files.

These components provide access


System FileSystemWatcher, Event
to various system-level events that
components Log, MessageQueue
occur on the server.

. Parts of an ASP.NET Web Application

Part Types of files Description


Content files determine the appearance of a
Web forms,
Web application. They can contain static text
HTML, images,
Content and images as well as elements that are
audio, video, other
composed on the fly by the program logic (as
data
in the case of a database query).
The program logic determines how the
application responds to user actions.
Program Executable files, ASP.NET Web applications have a dynamic-
logic scripts link library (DLL) file that runs on the server,
and they can also include scripts that run on
the client machine.
The configuration files and settings
Web configuration
determine how the application runs on the
Configuration file, style sheets,
server, who has access, how errors are
IIS settings
handled, and other details.

Guest Registration and Verification System 49


2.4 Risk projection

Risk projection, also called risk estimation, attempts to rate each risk in two
ways - the likelihood or probability that the risk is real and the consequences of
the problem associated with the risk. The project planner, along with other
managers and technical staff, performs risk projection activities:

i) Establish a scale that reflects the perceived probability of a


risk
ii) Delineate the consequences of the risk
iii) Estimate the impact of the risk on the project and the product
Note the overall accuracy of the risk projection so that there
will be no misunderstandings
Risk components are defined in the following manner:

1. Performance risk - The degree of uncertainty that the product will meet its
requirement and be fit for its intended use.
2. Cost risk - The degree of uncertainty that the project budget will be
maintained
3. Support risk - The degree of uncertainty that the resultant software will be
easy to correct, adapt and enhance.
4. Schedule risk - The degree of uncertainty that the project schedule will be
maintained and the product will be delivered on time.
The impact of each risk driver on the risk component is divided into one of four
impact categories – negligible, marginal, critical or catastrophic.

One method to identify risks is to create a risk item checklist. The checklist can
be used for risk identification and focuses on some subset of known and
predictable risks in the following general categories:

Guest Registration and Verification System 50


1. Product size: Risks associated with the overall size of the software to be built
or modified.
2. Business impact: Risks associated with constraints imposed by the
management or the market.
3. Customer characteristics: Risks associated with the sophistication of the
customer and the developer’s ability to communicate with the customer in a
timely manner.
4. Process definition: Risks associated with the degree to which the software
process has been defined.

Development environment: Risks associated with the availability and the


quality of the tools used to build the product.
1. Technology: Risks associated with the complexity of the system to be
built and the newness of the technology that is packaged by the system.
2. Staff size and experience: Risks associated with the overall technical and
project experience of the software engineers who will do the work.

The risk item checklist can be organized in different ways. Questions relevant to
each of the topics can be answered for each software project. The answers to
these questions allow the planner to estimate the impact of risk. A different risk
item checklist format simply lists characteristics that are relevant to each general
subcategory. Finally, a set of risk components and drivers are listed along with
their probability of occurrence. Impact values:

1 – Catastrophic

2 – Critical

3 – marginal

4 – Negligible
Guest Registration and Verification System 51
Risks Category Probability Impact

Size estimate may be significantly low PS 0.6 2

Larger number of users than planned PS 0.3 3

Lesser users than planned PS 0.7 2

End-users resist the system BU 0.4 3

Delivery deadline will be tightened BU 0.5 2

Funding will be lost CU 0.4 1

Customer will change requirements PS 0.8 2

Technology will meet expectations TE 0.3 1

Lack of training on tools DE 0.8 3

Staff inexperienced ST 0.3 2

Staff turnover will be high ST 0.6 2

Sample risk table

Guest Registration and Verification System 52


Risk mitigation, monitoring and management (RMMM)

All the risk analysis activities presented to this point have a single goal - to assist
the project team in developing a strategy for dealing with the risk. An effective
strategy must consider three issues:
• Risk avoidance
• Risk monitoring
• Risk management and contingency planning
If a software team adopts a proactive approach to risk, avoidance is always the
best strategy. This is achieved by developing a plan for risk mitigation. For
example, assume that high staff turnover is noted as a project risk.
Based on past history and management intuition, the likelihood, i i, of high
turnover is estimated to be 0.7 (70%, rather high) and the impact, x i, is projected
at level 2. That is, high turnover will have a critical impact on project cost and
schedule.
To mitigate this risk, project management must develop a strategy for reducing
turnover. Among the possible steps to be taken are:
i) Meet with current staff to determine causes for turnover. (E.g.
poor working conditions, low pay, competitive job market,
etc.)
ii) Mitigate those causes that are under our control before the
project starts.
iii) Once the project commences, assume turnover will occur and
develop techniques to ensure continuity when people leave.
iv) Organize project teams so that information about each
development activity is widely dispersed.
v) Define documentation standards and establish mechanisms to
be sure that documents are developed in a timely manner.

Guest Registration and Verification System 53


vi) Conduct peer reviews of all work so that more than one
person is up to speed.
vii) Assign a backup staff member for every critical technologist.

As the project proceeds, risk-monitoring activities commence. It is important to


note that RMMM steps incur additional project cost. For example, spending time
to backup every critical technologist costs money. Part of risk management,
therefore, is to evaluate when the benefits accrued by the RMMM steps are
outweighed by the costs associated with implementing them. Once RMMM has
been documented and the project has begun, risk mitigation and monitoring steps
commence. Risk mitigation is a problem avoidance activity. Risk monitoring is a
project tracking activity with three primary objectives:
i) To assess whether predicted risk actually occur
ii) To ensure that risk aversion steps are being properly applied
iii) To collect information that can be traced to more than one risk

Guest Registration and Verification System 54


2.5 Feasibility study

In all industrialized countries computer systems are economically critical. More


and more fields such as education, health care and administration are dependant
on computer systems. Many feasibility studies is disillusioning for both users and
analysis. First, the study often presupposes that when the feasibility document is
being prepared, the analyst is in a position to evaluate solution. Second most
studies tend to overlook the confusion inherent in system development- the
constraint and the assumed attitudes. If the feasibility study is to serve as a
decision document, it must answer three key questions
Is there a new and better way to do the job that will benefit the user?
What are the costs and savings of the alternatives?
What is recommended?

Feasibility study involves 5 Steps in feasibility analysis


1. Form a project team and appoint a project leader.
2. prepare a system flow changes
3. enumerate the potential features of the portal system
4. Describe and identify characteristics of portal system.
5. weigh the performance of portal system

Feasibility considerations

Key considerations are involved in the feasibility analysis are economic,


technical, operational and behavioral. The most successful system projects are
not necessarily the biggest or most valuable in a business but rather those that
truly meet user exceptions. More projects fail because of inflated exceptions than
for any other reason.

Guest Registration and Verification System 55


Economic feasibility
Economic analysis is the most frequently used
method for evaluating the effectiveness of a system. More commonly known as
cost /benefit analysis, the procedure is to determine the benefits out weight costs,
and then the decision is made to design and implement the system. Otherwise,
further justifications or alternatives in the proposed system will have to be made
if it is to have a chance of being approved. This is an ongoing effort that
improves in accuracy at each phase of the systems life cycle.

Technical feasibility

Technical feasibility centers on the existing computer


system (hardware, software, etc.) and to what extent it can support the proposed
addition. For example, if the current computer is operating at 80 percent
capacity-an arbitrary ceiling-then running another application could overload the
system or require the additional hardware. This involves financial consideration
to accommodate technical enhancements. If the budget is a serious constraint,
then the project is judged not feasible.

Behavioral feasibility

People are inherently resistant to change, and a


computer has been known to facilitate change. An estimate should be made of
how strong a reaction of the customer towards the advertisement displayed in the
classified services which registered users will be able to view. This will allow
users to bypass middle men and directly come in contact with prospective sellers
and buyers. The registered users can also list their products and services for
selling directly to the buyers, who can then view and buy them online.

Guest Registration and Verification System 56


Operational feasibility
It covers 2 aspects one is the technical
performance and other is the acceptance within the organization. Technical
performance includes such as determining whether the system can provide the
right information for the organizational personnel and whether the system can be
organized so that it always delivers the information at the right place and in the
right time. Acceptance revolves around the current system and its personnel.
Determine the general attitude and skill of existing personnel and whether any
such restructuring of jobs will be acceptable to the current users.

Guest Registration and Verification System 57


2.6 Software Estimation

The objective of software planning is to provide a framework that enables the


manager to make reasonable estimates of resources, cost and schedule. These
estimates are made within a limited time frame at the beginning of a software
project and should be updated regularly as the project progresses. The first
activity in software project planning is the determination of the scope. Function
and performance should be assessed to establish a project scope that is
unambiguous and understandable at management and technical levels.

Once scope is established, it is necessary to determine if the cost is feasible or


not. The feasibility of the project must be determined keeping in mind four major
aspects:
i) Technology
ii) Finance
iii) Time
iv) Resources (other than financial)

The next task is the estimation of resources required to accomplish the software
development effort. At the beginning, software and hardware tools must exist to
support the development effort. At a higher level, the primary resource i.e.
manpower, must exist. Each resource is specified with four characteristics:
i) Description of the resource
ii) Statement of availability
iii) Time at which the resource will be required
iv) Duration of time the resource will be applied
Before an estimate can be made, the project planner must estimate the general
size of the software. Size refers to the quantifiable outcome of the software
project and can be measured in LOC or is represented as FP.

Guest Registration and Verification System 58


Cost estimation
Software cost estimation is a continuing activity, which starts at the proposal
stage and continues through the lifetime of the project. There are several different
techniques of software cost estimation. They are:

1. Algorithmic Cost modeling


A model is developed using historical cost information, which relates some
software metric to the project cost. An estimate is made of that metric and the
model predicts the effort required.
2. Expert judgment
One or more experts on the software development techniques to be used, and on
the application domain, are consulted. They each estimate a project cost and the
final cost is arrived at by consensus.
3. Estimation by analogy
This technique is applicable when other projects in the same application domain
have been completed. The cost of a new project is estimated by analogy with
these completed projects.

Effort estimation
This is the most common technique for costing any engineering project. A
number of person-days, months or years is applied to the solution of each project
task. A dollar cost is associated with each unit of effort and an estimated cost is
derived. Like the LOC or FP techniques, effort estimation begins with a
definition of software functions obtained from the project scope. A series of tasks
- requirements analysis, design, code and test - must be performed for each
function.

Guest Registration and Verification System 59


3. DESIGN PHASE

Design issues
A set of fundamental design concepts is discussed in the following sub-sections

Abstraction
Each step in the software process is a refinement in the level of abstraction of the
software solution. The lowest level of abstraction is achieved when the source
code is generated. There are several different types of abstraction:
• Procedural abstraction – This is a named sequence of
instructions that have a specific and limited function.
• Data abstraction – This is a named collection of data that
describes a data object.
• Control abstraction – This implies a program control
mechanism without specifying internal details.
Refinement
Step-wise refinement is an early top-down design strategy. In each step of
refinement, one or several instructions of the program are decomposed into more
detailed instructions. This successive decomposition or refinement of
specifications terminates when all instructions are expressed in terms of any
underlying computer or programming language.

Modularity
Software architecture embodies modularity; i.e. software is divided into
separately named and addressable components called modules that are integrated
to satisfy problem requirements. Modularity is the single attribute of the software

Guest Registration and Verification System 60


that allows the program to be intellectually manageable. The size of the module
should be dictated by its function and its application.
Control hierarchy
Control hierarchy, also called program structure represents the organization of
program components and implies a hierarchy of control. It does not represent
procedural aspects of software such as sequence of processes, order of decisions
or repetition of operations. Many different notations are used to represent control
hierarchy.

Information hiding
Modules should be specified and designed so that information contained within a
module is inaccessible to other modules that have no need for this information.
Hiding implies that effective modularity can be achieved by defining a set of
independent modules that communicate with one another using only that
formation which is necessary to achieve the software function. Hiding defines
and enforces access constraints to both procedural detail within a module and any
local data structure used by the module.

Guest Registration and Verification System 61


3.1 Database Design

The database for the application has been designed in Microsoft Access. The
Access file is name as amway1.mdb and it is kept in parent folder of the
website.
We choose MS Access because for a Web Based Application MS Access is
the best database as it works best on web server with ASP.NET, plus being a
file based Database, the whole database structure and its data can be easily
transferred from our machine where the development was done to the Actual
Web Server. Also it is very easy to take the back up of an Access File than a
database in MS SQL Server. Also if we don’t have MS Access installed on
our Web server, still our project will work only with the Access File. But we
need MS SQL Server or Oracle installed on the Server to run our Project,
which adds to the cost, as the license fee for MS SQL Server and Oracle is
very high.
The database is so designed as to minimize redundancy and is designed after

performing various forms of normalization on the preliminary designed tables.

• Identifying the entities : All the entities related to the module were identified,

checked and consolidated.

• Identifying the relationships : The relationships between entities, within and

outside the system were identified.

• Attributes definition : The pertaining to the entities were identified and their field

characteristics were specified.

Guest Registration and Verification System 62


• Normalisation : The entities were normalised. After first and second

normalisation, third normalisation was achieved for all the entities of system.

• Interface : Interfacing with other systems was done and attributes related to

external entities were identified.

• Fast Path Table Mapping


Tables were created for the system using fast path table mapping. This has provision to map

the entities and attributes into tables. The name of the entity is taken as the table name.

Guest Registration and Verification System 63


Default Database Design

This utility creates column and constraint definitions from the entity model and the table/entity

mapping entered in CASE* Dictionary. This database design can be refined according to your

application regarding using the tables, columns and key constraint definition screens to make

amendments.

The steps involved here were :

• Generation of table (DDL) script.

• Check constraints.

• Primary keys

• Unique keys

• Foreign keys

• Program Specifications

The program specifications were written for the masters, transactions, reports and queries. The

logic for each field, block and form were written so that anyone who doesn’t know the system

will be able to code the logic. Field Validations and user-friendly error messages were written

as a part of the program specifications.

This is done mainly for two reasons:

1. Saving the development time


As the procedure will be common to many programs, the development time will
be saved substantially.

2. Testing becomes easier


As the procedure become an independent entity, it can be easily tested.

Guest Registration and Verification System 64


DATABASE SUPPORT

Security- we can use database with an ASP.NET web application to ensure


greater security in an ASP.NET web application. For example, you can forward
the user name and the password that a user enters into the site login page to a
database for validation. The database can check the log on values and determine
if the user has the required rights to access all pages of the web site.

Consistency- In addition to security a database can consistency to a web


application. For example, if you have developed an online bookstore site, you
need to keep track of the daily transactions made on the site. You can use
facilities, such as trigger, referential integrity, and transaction of a database for
maintaining data consistency.

Personalization- Personalization is the practice of providing contents and other


facilities .Such as the background color of the web form, to user based on their
preferences. A web site can store user information in the database that describes
the preferences of a user .if a database is used to store user preferences, a web
site can quickly search for individual user preferences and provide contents and
information pertaining to the preferences of the user.

Using a database for state management in an ASP.NET application can be


disadvantageous because of the following reasons:
1. Database support in state management involves complex hardware and
software configurations.

Guest Registration and Verification System 65


2. The performances of a web site may go down due to poor construction of
the relational data model is used to support session state in a web
application.

ER-Diagram of Project

Guest Registration and Verification System 66


Table Design

a. Police Station Table

Guest Registration and Verification System 67


b. Hotels Table

Guest Registration and Verification System 68


c. Guest Table

Guest Registration and Verification System 69


d. Guest Docs Table

Guest Registration and Verification System 70


3.2 Architecture design

Data design is one of the first design activities conducted during software
engineering. The impact of data structure on program structure and procedural
complexity causes data design to have a profound influence on software quality.
The primary objective of architectural design is to
develop a modular program structure and represent the control relationship
between modules. In addition, architectural design melds program structure and
data structure, defining interfaces that enable data to flow throughout the
program. The software that is built for computer-based systems exhibits one of
many architectural styles.
Each style describes a system category that includes:
1. A set of components (database, computational models, etc.)
2. A set of connectors among components
3. Constraints that define how components can be integrated to form the system.
4. Semantic models that enable the designer to understand the overall properties
of a system by analyzing the known properties of its constituent parts.

The different architectural styles include:


Data-centered architecture
A data store resides at the center of this architecture and is
accessed frequently by other components that add, update, delete or modify data
in the store. This kind of architecture promotes Integrating ability. Existing
components can be changed and new ones can be added without affecting the
others. Components also independently execute the processes.

Data-flow architecture

Guest Registration and Verification System 71


This architecture is applied when input data are to be transformed
through a series of computational or manipulative components into output data.
Given below is a set of principles that may be used to design architecture.

1. Representations of data flow and content should be developed and reviewed,


data objects should be identified, alternative data organizations should be
considered, and the impact of data modeling on software should be evaluated.
2. All data structures and the operations to be performed on each should be
identified.
3. A data dictionary should be established and used to define both data and
program design.
4. Low-level data decisions should be deferred until late in the design process.
This way major structural attributes are designed and evaluated first, so that the
architecture of the data may be established.

Client Client
software software

Data store
Client (Repository or
Client
software blackboard) software

Client Client
software software

Data-centered architecture
Guest Registration and Verification System 72
Software Model of the Project

The software model used in our Project is the Increment Model.

We used incremental model because the project was done in

increments or parts and these parts were tested individually. For ex.

Like the Candidate Registration and music uploading Page was

developed first and tested thoroughly, then other part the registration

module was developed and tested individually.

Incremental model combines elements of the linear sequential

model with the iterative philosophy of prototyping. The incremental

model applies linear sequences in a staggered fashion as time

progresses. Each linear sequence produces a deliverable increment of

the software. For example, word processing software may deliver basic

file management, editing and document production functions in the

first increment. More sophisticated editing and document production in

the second increment, spelling and grammar checking in the third

increment, advanced page layout in the fourth increment and so on.

The process flow for any increment can incorporate the prototyping

model.

Guest Registration and Verification System 73


When an incremental model is used, the first increment is often a

core product. Hence, basic requirements are met, but supplementary

features remain undelivered. The client uses the core product. As a

result of his evaluation, a plan is developed for the next increment. The

plan addresses improvement of the core features and addition of

supplementary features. This process is repeated following delivery of

each increment, until the complete product is produced.

As opposed to prototyping, incremental models focus on the delivery of an

operational product after every iteration.

Advantages:

• Particularly useful when staffing is inadequate for a


complete implementation by the business deadline.
• Early increments can be implemented with fewer people.
If the core product is well received.

• additional staff can be added to implement the next


increment.
• Increments can be planned to manage technical risks. For example,
the system may require availability of some hardware that is under development. It
may be possible to plan early increments without the use of this hardware, thus
enabling partial functionality and avoiding unnecessary delay.

Guest Registration and Verification System 74


Guest Registration and Verification System 75
Guest Registration and Verification System 76
Time Scheduling

Scheduling of a software project does not differ greatly from

scheduling of any multitask development effort. Therefore, generalized

project scheduling tools and techniques can be applied to software with

little modification.

The program evaluation and review technique (PERT) and the

critical path method (CPM) are two project scheduling methods that

can be applied to software development. Both techniques a task

network description of a project, that is, a pictorial or tabular

representation of tasks that must be accomplished from beginning to

end of project. The network is defined by developing a list of all tasks,

sometimes called the project work breakdown structure (WBS),

associated with a specific project and list of orderings (sometimes

called a restriction list) that indicates in what order tasks must be

accomplished.

Both PERT and CPM provide quantitative tools that allow the

software planner to:

i) Determine the critical path- the chain of tasks that

determines the duration of the project

Guest Registration and Verification System 77


ii) Establish most likely time estimates for individual tasks

by applying statistical models

iii) Calculate boundary times that define a time “window” for

a particular task.

Boundary time calculations can be very useful in software

project scheduling. Riggs describes important boundary times that may

be discerned from a PERT or CPM networks.

• Earliest time that a task can begin when all preceding

tasks are completed in the shortest possible time

• The latest time for task initiation before the minimum

project completion time is delayed

• The earliest finish-the sum of the earliest start-and the task

duration

• The latest finish-the latest start time added to task duration

• The total float-the amount of surplus time or leeway

allowed in scheduling tasks to that so that the network critical path is

maintained on schedule. Boundary time calculations lead to a

determination of critical path and provide the manger with a

quantitative method for evaluating progress as tasks are completed.

The planner must recognize that effort expended on software does not

Guest Registration and Verification System 78


terminate at the end of development. Maintenance effort, although not

easy to schedule at this stage, will ultimately become the largest cost

factor. A primary goal of software engineering is to help reduce this

cost.

Time-scheduling for Our Project will be like this:

• Project Analysis: Two Weeks


• GUI Designing: Three Weeks
• Core Coding and Algorithm: Four Weeks
• Testing and Debugging: Two Weeks

Guest Registration and Verification System 79


Coding

GUI Coding

<%@ Page Language="VB" AutoEventWireup="false"


CodeFile="Default.aspx.vb" Inherits="adminpanel_Default"
%>

<html lang="en">
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible"
content="IE=edge">
<meta name="viewport" content="width=device-width,
initial-scale=1, shrink-to-fit=no">
<meta name="description" content="">
<meta name="author" content="">

<title>Guest Registration</title>

<!-- Custom fonts for this template-->


<link href="vendor/fontawesome-free/css/all.min.css"
rel="stylesheet" type="text/css">
<link
href="https://fonts.googleapis.com/css?family=Nunito:200,
200i,300,300i,400,400i,600,600i,700,700i,800,800i,900,90
0i" rel="stylesheet">

<!-- Custom styles for this template-->


<link href="css/admin.min.css" rel="stylesheet">

</head>

<body class="bg-gradient-primary">

Guest Registration and Verification System 80


<div class="container">

<!-- Outer Row -->


<div class="row justify-content-center">

<div class="col-xl-5 col-lg-5 col-md-6">

<div class="card o-hidden border-0 shadow-lg my-


5">
<div class="card-body p-0">
<!-- Nested Row within Card Body -->
<div class="row">
<div class="col-lg-12">
<div class="p-3">
<div class="text-center">
<img src="img/logo.jpg" width="100" />
<h1 class="h4 text-gray-900 mb-4">
Guest
Registration Admin Panel </h1>
</div>
<form class="user" runat="server" id="f1">
<center>
<asp:Label ID="lblmsg" runat="server"
Text="" ForeColor="Red"></asp:Label></center>
<div class="form-group">
<label>Login As <asp:RequiredFieldValidator
ID="RequiredFieldValidator3" runat="server"
ControlToValidate="DropDownList1" InitialValue="Select"
ErrorMessage="Select Login As"
CssClass="msg">*</asp:RequiredFieldValidator></label>
<asp:DropDownList ID="DropDownList1"
runat="server" CssClass="form-control form-control-
user">

<asp:ListItem>Select</asp:ListItem>

<asp:ListItem>Admin</asp:ListItem>
Guest Registration and Verification System 81
<asp:ListItem>SubAdmin</asp:ListItem>

<asp:ListItem>Viewer</asp:ListItem>
</asp:DropDownList>
</div>
<div class="form-group">
<label>Username
<asp:RequiredFieldValidator
ID="RequiredFieldValidator1" runat="server"
ControlToValidate="TextBox1"
ErrorMessage="Username
Required"
CssClass="msg">*</asp:RequiredFieldValidator></label>
<asp:TextBox ID="TextBox1" runat="server"
CssClass="form-control form-control-user"
required></asp:TextBox>
</div>
<div class="form-group">
<label>
Password<asp:RequiredFieldValidator
ID="RequiredFieldValidator2" runat="server"
ControlToValidate="TextBox2" ErrorMessage="Password
Required">*</asp:RequiredFieldValidator></label>
<asp:TextBox ID="TextBox2"
runat="server" TextMode="Password" CssClass="form-
control form-control-user" required></asp:TextBox>
</div>
<asp:Button ID="Button1" runat="server"
Text="Login" cssclass="btn btn-primary btn-user btn-block"
/>

<hr>

</form>

Guest Registration and Verification System 82


</div>
</div>
</div>
</div>
</div>

</div>

</div>

</div>

<!-- Bootstrap core JavaScript-->


<script src="vendor/jquery/jquery.min.js"></script>
<script
src="vendor/bootstrap/js/bootstrap.bundle.min.js"></script
>

<!-- Core plugin JavaScript-->


<script src="vendor/jquery-
easing/jquery.easing.min.js"></script>

<!-- Custom scripts for all pages-->


<script src="js/admin.min.js"></script>

</body>

</html>

<%@ Page Title="" Language="VB"


MasterPageFile="~/adminpanel/MasterPage.master"
AutoEventWireup="false" CodeFile="hotelsreport.aspx.vb"
Inherits="viewnakasummary" %>

<asp:Content ID="Content1" ContentPlaceHolderID="head"


Runat="Server">
Guest Registration and Verification System 83
<link href="date/css/smoothness/jquery-ui-
1.10.1.custom.css" rel="stylesheet">
<%-- <script src="date/js/jquery-1.9.1.js"
type="text/javascript"></script>--%>
<script src="date/js/jquery-ui-1.10.1.custom.js"
type="text/javascript"></script>
</asp:Content>

<asp:Content ID="Content2"
ContentPlaceHolderID="ContentPlaceHolder1"
Runat="Server">
<div class="d-sm-flex align-items-center justify-content-
between mb-4">
<h1 class="h3 mb-0 text-gray-800">Hotels' Guest
Summary</h1>

</div>

<!-- Content Row -->

<!-- Content Row -->

<div class="row">

<div class="col-lg-12">

<!-- Custom Text Color Utilities -->


<div class="card shadow mb-4">
<div class="card-header py-3">
<%-- <h6 class="m-0 font-weight-bold text-
primary">Filter</h6>--%>
<div class="form-group row">

<div class="col-md-3">
Guest Registration and Verification System 84
<label>Date From </label>
<script>

$(function () {
$("#<%= f_date1.ClientID
%>").datepicker({
changeMonth: true,
changeYear: true
});
});
</script>

<asp:TextBox ID="f_date1" runat="server"


AutoComplete="Off" CssClass="form-control" />
</div>
<div class="col-md-3">
<label>Date To </label>
<script>
$(function () {
$("#<%= f_date2.ClientID
%>").datepicker({
changeMonth: true,
changeYear: true
});
});
</script>

<asp:TextBox ID="f_date2" runat="server"


AutoComplete="Off" CssClass="form-control" />
</div>
</div>
<div class="form-group row ">
&nbsp; &nbsp; <asp:Button ID="btnshow"
runat="server" Text="Show" CssClass="btn btn-primary
btn-sm" /> &nbsp; &nbsp; <asp:Button ID="btnreset"
runat="server" Text="Reset" CssClass="btn btn-success
btn-sm" />
Guest Registration and Verification System 85
&nbsp;&nbsp;
<asp:Button ID="btnemail"
runat="server"
Text="Send Report On Email"
CssClass="btn btn-danger btn-sm"
Visible="false" />
</div>
</div>
</div>
<div class="card-body">
<asp:Label ID="lblmsg" runat="server" Text=""
CssClass="msg"></asp:Label><asp:Label ID="lblmsg0"
runat="server" Text="" CssClass="msg"></asp:Label>
<div class="form-group row">
<div class="col-md-12">

<center><h4>Hotelwise Report</h4></center>
<asp:Literal ID="Label1" runat="server"
Visible="false"></asp:Literal>
<asp:GridView ID="GridView1"
runat="server"
AllowSorting="True"
AutoGenerateColumns="False" AllowPaging="false"

CellPadding="4"
Font-Size="14px"
Font-Names="Arial"
OnSorting="sortgrid" PageSize="20"
Width="98%"
ForeColor="#333333"
GridLines="None">

<RowStyle BackColor="#EFF3FB" />


<AlternatingRowStyle
BackColor="White" />
<Columns>

Guest Registration and Verification System 86


<%--<asp:BoundField DataField="Id"
HeaderText="Id" ReadOnly="True" SortExpression="id"
Visible="false" />--%>
<asp:TemplateField
HeaderText="Hotel">
<ItemTemplate>
<a href="viewguests.aspx?hid=<%#
DataBinder.Eval(Container,"DataItem.hid")%>"
class="links"> <%#Container.DataItem("title")%> </a>
</ItemTemplate>
</asp:TemplateField>
<asp:TemplateField
HeaderText="Total">
<ItemTemplate>
<%#Container.DataItem("tot")%>
</ItemTemplate>
</asp:TemplateField>

</Columns>
<EditRowStyle BackColor="#2461BF"
/>
<FooterStyle BackColor="#507CD1"
ForeColor="White"
Font-Bold="True" />
<PagerStyle BackColor="#2461BF"
ForeColor="White"
HorizontalAlign="Center" />
<SelectedRowStyle BackColor="#D1DDF1"
Font-Bold="True"
ForeColor="#333333" />
<HeaderStyle BackColor="#08133f"
Font-Bold="True"
ForeColor="White"
Font-Names="Arial Narrow" />
<SortedAscendingCellStyle
BackColor="#F5F7FB" />

Guest Registration and Verification System 87


<SortedAscendingHeaderStyle
BackColor="#6D95E1" />
<SortedDescendingCellStyle
BackColor="#E9EBEF" />
<SortedDescendingHeaderStyle
BackColor="#4870BE" />
</asp:GridView>
</div>
<div class="col-md-6" style="display:none">
<center><h4>Districtwise
Report</h4></center>
<asp:Literal ID="Label2" runat="server"
Visible="false"></asp:Literal>
<asp:GridView ID="GridView2"
runat="server"
AllowSorting="True"
AutoGenerateColumns="False" AllowPaging="false"

CellPadding="4"
Font-Size="14px"
Font-Names="Arial"
OnSorting="sortgrid" PageSize="20"
Width="98%"
ForeColor="#333333"
GridLines="None">

<RowStyle BackColor="#EFF3FB" />


<AlternatingRowStyle
BackColor="White" />
<Columns>
<%--<asp:BoundField DataField="Id"
HeaderText="Id" ReadOnly="True" SortExpression="id"
Visible="false" />--%>
<asp:TemplateField
HeaderText="District">
<ItemTemplate>

Guest Registration and Verification System 88


<%#Container.DataItem("title")%>
</ItemTemplate>
</asp:TemplateField>
<asp:TemplateField
HeaderText="Total">
<ItemTemplate>
<%#Container.DataItem("tot")%>
</ItemTemplate>
</asp:TemplateField>

</Columns>
<EditRowStyle BackColor="#2461BF"
/>
<FooterStyle BackColor="#507CD1"
ForeColor="White"
Font-Bold="True" />
<PagerStyle BackColor="#2461BF"
ForeColor="White"
HorizontalAlign="Center" />
<SelectedRowStyle BackColor="#D1DDF1"
Font-Bold="True"
ForeColor="#333333" />
<HeaderStyle BackColor="#08133f"
Font-Bold="True"
ForeColor="White"
Font-Names="Arial Narrow" />
<SortedAscendingCellStyle
BackColor="#F5F7FB" />
<SortedAscendingHeaderStyle
BackColor="#6D95E1" />
<SortedDescendingCellStyle
BackColor="#E9EBEF" />
<SortedDescendingHeaderStyle
BackColor="#4870BE" />
</asp:GridView>
</div>
Guest Registration and Verification System 89
</div>

</div>
</div>

<!-- Custom Font Size Utilities -->

</div>

</asp:Content>

Guest Registration and Verification System 90


Login Page Coding

Imports System.Data.SqlClient
Partial Class login
Inherits System.Web.UI.Page
Function constr() As String
Dim y As New
IO.StreamReader(Server.MapPath("adminpanel/dataconfig/
dataval.config"))
Dim x As String = y.ReadToEnd
y.Close()
Return x
End Function
Protected Sub Page_Load(ByVal sender As Object, ByVal
e As System.EventArgs) Handles Me.Load
If Not Page.IsPostBack Then

End If
End Sub

Protected Sub Button1_Click(ByVal sender As Object,


ByVal e As System.EventArgs) Handles Button1.Click
If txtpassword.Text <> " " And txtusername.Text <>
"" Then
userlog()
End If
End Sub
Sub userlog()
Try
Dim uss As String = txtusername.Text.Trim, pass =
txtpassword.Text.Trim
Dim logtype As String = "", code = ""
Using con As New SqlConnection(constr())
con.Open()
Dim cmd As New SqlCommand("Select * from
sublogins where username= @a1", con)
cmd.Parameters.AddWithValue("@a1", uss)
Guest Registration and Verification System 91
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
While dr.Read
uss = dr("username").ToString
pass = dr("password").ToString
'' logtype = dr("code")
End While
If uss = txtusername.Text And pass =
txtpassword.Text Then
Dim token = Request.Form("token")
Session("log") = "Ok"
Session("logtype") = "Sublogin"
Session("user") = uss

Response.Redirect("dashboard.aspx?user=" & uss &


"&logtype=" & logtype, False)
Else
'' lblmsg.Text = "Invalid User"

ScriptManager.RegisterClientScriptBlock(Page,
Page.[GetType](), Guid.NewGuid().ToString(),
"alert('Invalid User.');", True)
End If
End If
con.Close()
End Using
Catch ex As Exception
End Try
End Sub

End Class

Imports System.Data.SqlClient
Partial Class adminpanel_Default
Inherits System.Web.UI.Page
Guest Registration and Verification System 92
Public uss, pass As String
Function constr() As String
Dim y As New
IO.StreamReader(Server.MapPath("dataconfig/dataval.confi
g"))
Dim x As String = y.ReadToEnd
y.Close()
Return x
End Function
Protected Sub Page_Load(ByVal sender As Object, ByVal
e As System.EventArgs) Handles Me.Load
If Not Page.IsPostBack Then
TextBox1.Focus()
End If
End Sub
Protected Sub Button1_Click(ByVal sender As Object,
ByVal e As System.EventArgs) Handles Button1.Click
Try
lblmsg.Text = ""
If DropDownList1.SelectedIndex = 0 Then
lblmsg.Text = "Select Login Type."
ElseIf DropDownList1.SelectedIndex = 1 Then
adminlog()
Else
userlog()
End If
Catch ex As Exception
End Try
End Sub
Sub adminlog()
Try

Using con As New SqlConnection(constr())


con.Open()
Dim cmd As New SqlCommand("Select * from
login where username= '" & TextBox1.Text & "'", con)
Guest Registration and Verification System 93
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
While dr.Read
uss = dr("username").ToString
pass = dr("password").ToString
End While
If uss = TextBox1.Text And pass =
TextBox2.Text Then
Session("log") = "Ok"
Session("logtype") = "Admin"
Session("user") = uss
Session("admin") = uss
Response.Redirect("hotelsreport.aspx",
False)
Else
lblmsg.Text = "Invalid User"
End If
End If
con.Close()
End Using
Catch ex As Exception

End Try
End Sub
Sub userlog()
Try
Dim uss As String = TextBox1.Text.Trim
Dim tp As String = ""
Using con As New SqlConnection(constr())
con.Open()
Dim cmd As New SqlCommand("Select * from
sublogins where username= @a1 and logintype='" &
DropDownList1.SelectedItem.Text & "'", con)
cmd.Parameters.AddWithValue("@a1", uss)
cmd.Parameters.AddWithValue("@a2",
DropDownList1.SelectedItem.Value)
Guest Registration and Verification System 94
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
While dr.Read
uss = dr("username").ToString
pass = dr("password").ToString

End While
If uss = TextBox1.Text And pass =
TextBox2.Text Then
Session("log") = "Ok"
Session("logtype") =
DropDownList1.SelectedItem.Text
Session("user") = uss
Response.Redirect("hotelsreport.aspx")
Else
lblmsg.Text = "Invalid User"
End If
End If
con.Close()
End Using
Catch ex As Exception

End Try
End Sub

End Class

Guest Registration and Verification System 95


New Hotel Page Coding

Imports System.Data.SqlClient
Imports System.Data
Partial Class newhotel
Inherits System.Web.UI.Page
Function constr() As String
Dim y As New
IO.StreamReader(Server.MapPath("dataconfig/dataval.confi
g"))
Dim x As String = y.ReadToEnd
y.Close()
Return x
End Function
Protected Sub Page_Load(ByVal sender As Object, ByVal
e As System.EventArgs) Handles Me.Load
If Not Page.IsPostBack Then
If Session("logtype") = "" Then
Response.Redirect("default.aspx", False)
Exit Sub
End If
Session("user") = Session("user")
Session("logtype") = Session("logtype")
lbluser.Text = Session("user")
lbllogtype.Text = Session("logtype")
Dim cls As New Class1
cls.filldistricts(dddistrict)
cls.fillps(ddps, dddistrict.SelectedItem.Text)
fillps()
bindgridcontrol()
End If
End Sub
Sub fillps()
Try

Using cn As New SqlConnection(constr())

Guest Registration and Verification System 96


Dim cmd As New SqlCommand("Select * from
ps_master order by ps asc", cn)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
ddps.Items.Clear()
ddps.Items.Add("Select")
If dr.HasRows Then
While dr.Read
ddps.Items.Add(dr("ps"))
End While
End If
cn.Close()
End Using
Catch ex As Exception

End Try
End Sub
Protected Sub Button1_Click(ByVal sender As Object,
ByVal e As System.EventArgs) Handles Button1.Click
lblmsg.Text = ""
lblmsg0.Text = ""
If ddps.SelectedItem.Text = "Select" Then
Response.Write("<script>alert('Select Police
Station');</script>")
Exit Sub
End If
If chk() = 1 Then
lblmsg.Text = "Entered Username Alreadu Exists."
Exit Sub
Else
save()
End If
End Sub
Function chk() As Integer
Try
Using cn As New SqlConnection(constr())
Guest Registration and Verification System 97
Dim cmd As New SqlCommand("Select * from
hotels where username=@username", cn)
cmd.Parameters.AddWithValue("@username",
txtmobile.Text.Trim)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
Return 1
Else
Return 0
End If
cn.Close()
End Using
Catch ex As Exception

End Try
End Function
Function save() As Integer
Try
Dim uploadby = lbluser.Text
Dim uploaddate = Now.Date.ToString()
Dim uploaddt = DateTime.Now()
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand("Insert into
hotels(district,psid,ps,title,addr,owner,phone,ownerphone,e
mail,lat1,long1,username,password,uploadby,uploaddate,up
loaddt,updateby,updatedate,updatedt,st)
values(@district,@psid,@ps,@title,@addr,@owner,@phone,
@ownerphone,@email,@lat1,@long1,@username,@passwor
d,@uploadby,@uploaddate,@uploaddt,@updateby,@update
date,@updatedt,@st)", cn)
cmd.Parameters.AddWithValue("@district",
dddistrict.SelectedItem.Text)
cmd.Parameters.AddWithValue("@psid",
ddps.SelectedItem.Value)

Guest Registration and Verification System 98


cmd.Parameters.AddWithValue("@ps",
ddps.SelectedItem.Text)
cmd.Parameters.AddWithValue("@title",
txtname.Text.Trim)
cmd.Parameters.AddWithValue("@addr",
txtaddr.Text.Trim)
cmd.Parameters.AddWithValue("@owner",
txtowner.Text.Trim)
cmd.Parameters.AddWithValue("@phone",
txtmobile.Text.Trim)
cmd.Parameters.AddWithValue("@ownerphone",
txtownmobile.Text.Trim)
cmd.Parameters.AddWithValue("@email",
txtemailid.Text.Trim)
cmd.Parameters.AddWithValue("@lat1",
txtlat1.Text.Trim)
cmd.Parameters.AddWithValue("@long1",
txtlong1.Text.Trim)
cmd.Parameters.AddWithValue("@username",
txtusername.Text.Trim)
cmd.Parameters.AddWithValue("@password",
txtpwd.Text.Trim)
cmd.Parameters.AddWithValue("@uploadby",
uploadby)
cmd.Parameters.AddWithValue("@uploaddate",
uploaddate)
cmd.Parameters.AddWithValue("@uploaddt",
uploaddt)
cmd.Parameters.AddWithValue("@updateby",
uploadby)
cmd.Parameters.AddWithValue("@updatedate",
uploaddate)
cmd.Parameters.AddWithValue("@updatedt",
uploaddt)
cmd.Parameters.AddWithValue("@st", "Active")
cn.Open()
cmd.ExecuteNonQuery()
Guest Registration and Verification System 99
cn.Close()
End Using

lblmsg.Text = "Record Saved!"


bindgridcontrol()
clear()
Catch ex As Exception

End Try
End Function
Sub clear()
txtname.Text = ""
txtaddr.Text = ""
txtmobile.Text = ""
txtusername.Text = ""
txtowner.Text = ""
txtmobile.Text = ""
txtownmobile.Text = ""
txtemailid.Text = ""
txtlong1.Text = ""
txtlat1.Text = ""
End Sub
Sub SortGrid(ByVal sender As Object, ByVal e As
GridViewSortEventArgs)
Try
ViewState("sortexpression") = e.SortExpression
If ViewState("sortdirection") Is Nothing Then
ViewState("sortdirection") = "asc"
Else
If ViewState("sortdirection").ToString = "asc"
Then
ViewState("sortdirection") = "desc"
Else
ViewState("sortdirection") = "asc"
End If
End If
bindgridcontrol()
Guest Registration and Verification System 100
Catch ex As Exception

End Try
End Sub
Sub bindgridcontrol()
Try
Dim qr As String = ""
qr = "select * from hotels where st='Active'"
If dddistrict.SelectedItem.Text <> "Select" Then
qr = qr & " and district='" &
dddistrict.SelectedItem.Text & "'"
End If
If ddps.SelectedItem.Text <> "Select" Then
qr = qr & " and ps='" & ddps.SelectedItem.Text
& "'"
End If
qr = qr & " order by id desc"
Using con As New SqlConnection(constr())
con.Open()
Dim cmd As New SqlCommand(qr, con)
Dim da As New SqlDataAdapter
Dim dset As New DataSet
da.SelectCommand = cmd
da.Fill(dset, "users")
Session("dset") = dset
If Not (ViewState("sortexpression") Is Nothing)
Then
dset.Tables(0).DefaultView.Sort =
ViewState("sortexpression").ToString + " " +
ViewState("sortdirection").ToString
End If
GridView1.DataSource =
dset.Tables(0).DefaultView
GridView1.DataBind()
con.Close()
End Using

Guest Registration and Verification System 101


Catch ex As Exception

End Try
End Sub

Protected Sub GridView1_PageIndexChanging(ByVal


sender As Object, ByVal e As
System.Web.UI.WebControls.GridViewPageEventArgs)
Handles GridView1.PageIndexChanging
Try
GridView1.PageIndex = e.NewPageIndex
bindgridcontrol()
GridView1.Focus()
Catch ex As Exception

End Try
End Sub

Protected Sub GridView1_RowDeleting(ByVal sender As


Object, ByVal e As
System.Web.UI.WebControls.GridViewDeleteEventArgs)
Handles GridView1.RowDeleting
Try
Dim row As GridViewRow =
GridView1.Rows(e.RowIndex)
Dim id As Integer =
GridView1.DataKeys(e.RowIndex)("Id")
Using con As New SqlConnection(constr())
con.Open()
Dim comdel As New SqlCommand("delete from
users where id=" & id, con)
comdel.ExecuteNonQuery()
con.Close()
End Using
GridView1.EditIndex = -1
bindgridcontrol()
Guest Registration and Verification System 102
GridView1.Focus()
' End If
Catch ex As Exception

End Try
End Sub

Sub clearmsg()
lblmsg.Text = ""
lblmsg0.Text = ""
End Sub

Protected Sub dddistrict_SelectedIndexChanged(sender


As Object, e As System.EventArgs) Handles
dddistrict.SelectedIndexChanged
Dim cls As New Class1
cls.fillps(ddps, dddistrict.SelectedItem.Text)
bindgridcontrol()
End Sub

Protected Sub ddps_SelectedIndexChanged(sender As


Object, e As System.EventArgs) Handles
ddps.SelectedIndexChanged
bindgridcontrol()
End Sub
End Class

Imports System.Data.SqlClient
Imports System.Data
Partial Class psmaster
Inherits System.Web.UI.Page
Function constr() As String
Dim y As New
IO.StreamReader(Server.MapPath("dataconfig/dataval.confi
g"))
Dim x As String = y.ReadToEnd
Guest Registration and Verification System 103
y.Close()
Return x
End Function
Protected Sub Page_Load(ByVal sender As Object, ByVal
e As System.EventArgs) Handles Me.Load
If Not Page.IsPostBack Then
If Session("logtype") = "" Then
Response.Redirect("default.aspx", False)
Exit Sub
End If
Session("user") = Session("user")
Session("logtype") = Session("logtype")
lbluser.Text = Session("user")
lbllogtype.Text = Session("logtype")
Dim cls As New Class1
cls.filldistricts(dddistrict)
bindgridcontrol()
End If
End Sub

Function chk() As Integer


Try
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand("Select * from
policestations where ps=@ps", cn)
cmd.Parameters.AddWithValue("@ps",
TextBox1.Text.Trim)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
Return 1
Else
Return 0
End If
cn.Close()
End Using
Guest Registration and Verification System 104
Catch ex As Exception

End Try
End Function
Protected Sub Button1_Click(ByVal sender As Object,
ByVal e As System.EventArgs) Handles Button1.Click
lblmsg.Text = ""
If TextBox1.Text = "" Then
lblmsg.Text = "Enter Police Station."
ElseIf dddistrict.SelectedItem.Text = "Select" Then
lblmsg.Text = "Enter District."
Else
save()
End If

End Sub
Function save() As Integer
Try
Dim uploadby = lbluser.Text
Dim uploaddate = Now.Date.ToString()
Dim uploaddt = DateTime.Now()
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand("Insert into
policestations(district,ps,uploadby,uploaddate,uploaddt,upd
ateby,updatedate,updatedt)
values(@district,@title,@uploadby,@uploaddate,@uploaddt,
@updateby,@updatedate,@updatedt)", cn)
cmd.Parameters.AddWithValue("@district",
dddistrict.SelectedItem.Value)
cmd.Parameters.AddWithValue("@title",
TextBox1.Text.Trim)
cmd.Parameters.AddWithValue("@uploadby",
uploadby)
cmd.Parameters.AddWithValue("@uploaddate",
uploaddate)
cmd.Parameters.AddWithValue("@uploaddt",
uploaddt)
Guest Registration and Verification System 105
cmd.Parameters.AddWithValue("@updateby",
uploadby)
cmd.Parameters.AddWithValue("@updatedate",
uploaddate)
cmd.Parameters.AddWithValue("@updatedt",
uploaddt)
cn.Open()
cmd.ExecuteNonQuery()
cn.Close()
End Using

bindgridcontrol()
TextBox1.Text = ""

Catch ex As Exception

End Try

End Function

Sub SortGrid(ByVal sender As Object, ByVal e As


GridViewSortEventArgs)
Try
ViewState("sortexpression") = e.SortExpression
If ViewState("sortdirection") Is Nothing Then
ViewState("sortdirection") = "asc"
Else
If ViewState("sortdirection").ToString = "asc"
Then
ViewState("sortdirection") = "desc"
Else
ViewState("sortdirection") = "asc"
End If
End If
bindgridcontrol()
Catch ex As Exception
Guest Registration and Verification System 106
End Try
End Sub
Sub bindgridcontrol()
Try
Dim qr As String = "select * from policestations
where district=@district order by id desc"
If dddistrict.SelectedItem.Text <> "Select" Then
qr = "select * from policestations where
district='" & dddistrict.SelectedItem.Text & "' order by id
desc"
End If
Using con As New SqlConnection(constr())
con.Open()
Dim cmd As New SqlCommand(qr, con)
Dim da As New SqlDataAdapter
Dim dset As New DataSet
da.SelectCommand = cmd
da.Fill(dset, "policestations")
Session("dset") = dset
If Not (ViewState("sortexpression") Is Nothing)
Then
dset.Tables(0).DefaultView.Sort =
ViewState("sortexpression").ToString + " " +
ViewState("sortdirection").ToString
End If
GridView1.DataSource =
dset.Tables(0).DefaultView
GridView1.DataBind()
con.Close()
End Using
GridView1.Focus()
Catch ex As Exception

End Try
End Sub

Guest Registration and Verification System 107


Protected Sub GridView1_PageIndexChanging(ByVal
sender As Object, ByVal e As
System.Web.UI.WebControls.GridViewPageEventArgs)
Handles GridView1.PageIndexChanging
Try
GridView1.PageIndex = e.NewPageIndex
bindgridcontrol()
GridView1.Focus()
Catch ex As Exception

End Try
End Sub

Protected Sub GridView1_RowDeleting(ByVal sender As


Object, ByVal e As
System.Web.UI.WebControls.GridViewDeleteEventArgs)
Handles GridView1.RowDeleting
Try
Dim row As GridViewRow =
GridView1.Rows(e.RowIndex)
Dim id As Integer =
GridView1.DataKeys(e.RowIndex)("Id")
Using con As New SqlConnection(constr())
con.Open()
Dim comdel As New SqlCommand("delete from
policestations where id=" & id, con)
comdel.ExecuteNonQuery()
con.Close()
End Using
GridView1.EditIndex = -1
bindgridcontrol()
GridView1.Focus()
' End If
Catch ex As Exception

End Try
Guest Registration and Verification System 108
End Sub
Protected Sub GridView1_RowCancelingEdit(ByVal sender
As Object, ByVal e As
System.Web.UI.WebControls.GridViewCancelEditEventArgs)
Handles GridView1.RowCancelingEdit
clearmsg()
GridView1.EditIndex = -1
bindgridcontrol()
GridView1.Focus()
End Sub

Protected Sub GridView1_RowEditing(ByVal sender As


Object, ByVal e As
System.Web.UI.WebControls.GridViewEditEventArgs)
Handles GridView1.RowEditing
clearmsg()
GridView1.EditIndex = e.NewEditIndex
bindgridcontrol()
GridView1.Focus()
End Sub

Protected Sub GridView1_RowUpdating(ByVal sender As


Object, ByVal e As
System.Web.UI.WebControls.GridViewUpdateEventArgs)
Handles GridView1.RowUpdating
Try
lblmsg.Text = ""

Dim row As GridViewRow


row = GridView1.Rows(e.RowIndex)
Dim id As Integer =
GridView1.DataKeys(e.RowIndex)("Id")
Dim title As String =
CType(row.FindControl("title"), TextBox).Text
If title = "" Then
lblmsg.Text = "Enter Value."
Exit Sub
Guest Registration and Verification System 109
End If
Dim uploadby = lbluser.Text
Dim uploaddate = Now.Date.ToString()
Dim uploaddt = DateTime.Now()
Using con As New SqlConnection(constr())
Dim cmdupdate As New SqlCommand("update
policestations set
ps=@title,updateby=@updateby,updatedate=@updatedate,
updatedt=@updatedt where id=" & id, con)
cmdupdate.Parameters.AddWithValue("@title",
title)

cmdupdate.Parameters.AddWithValue("@updateby",
uploadby)

cmdupdate.Parameters.AddWithValue("@updatedate",
uploaddate)

cmdupdate.Parameters.AddWithValue("@updatedt",
uploaddt)
con.Open()
cmdupdate.ExecuteNonQuery()
con.Close()
End Using
GridView1.EditIndex = -1
bindgridcontrol()
GridView1.Focus()
lblmsg.Text = "Record Updated!"
Catch ex As Exception

End Try
End Sub
Sub clearmsg()
lblmsg.Text = ""
lblmsg0.Text = ""
End Sub

Guest Registration and Verification System 110


Protected Sub dddistrict_SelectedIndexChanged(sender
As Object, e As System.EventArgs) Handles
dddistrict.SelectedIndexChanged
bindgridcontrol()
End Sub
End Class

Guest Registration and Verification System 111


Guest Registration Page Coding

Imports System.Data.SqlClient
Imports System.Data
Imports System.Drawing
Imports System.IO
Imports System.Drawing.Imaging
Partial Class newguest
Inherits System.Web.UI.Page
Function constr() As String
Dim y As New
IO.StreamReader(Server.MapPath("adminpanel/dataconfig/
dataval.config"))
Dim x As String = y.ReadToEnd
y.Close()
Return x
End Function
Protected Sub Page_Load(ByVal sender As Object, ByVal
e As System.EventArgs) Handles Me.Load
If Not Page.IsPostBack Then
Session("user") = Session("user")
Session("logtype") = Session("logtype")

If Session("user") = Nothing Then


Response.Redirect("index.html", False)
Exit Sub
End If
If Request.QueryString("user") = Nothing Then
Response.Redirect("index.html", False)
Exit Sub
End If
'' fillhr()
'' filltime()
fillcountry()
fillstate()
filldistrict()
fillnos()
Guest Registration and Verification System 112
Dim user = Request.QueryString("user")
Dim hid = Request.QueryString("hid")
Dim hname = Request.QueryString("hname")
lbltitle.Text = hname
lblcode.Text = user
lblhid.Text = hid
lblback.Text = " <a
href='hoteldashboard.aspx?user=" & user & "&hid=" & hid
& "&hname=" & hname & "'> <li class='active__list-item
text-white'>&larr; Dashboard</li></a>"
End If
End Sub
''Sub fillhr()
'' Dim i As Integer = 1
'' DropDownList5.Items.Clear()
'' DropDownList5.Items.Add("Select")
'' For i = 1 To 12
'' DropDownList5.Items.Add(i)
'' Next
''End Sub

''Sub filltime()
'' Dim i As Integer = 1
'' DropDownList6.Items.Clear()
'' DropDownList6.Items.Add("Select")
'' For i = 0 To 60
'' DropDownList6.Items.Add(i)
'' Next
''End Sub
Sub fillnos()
Try
ddchild.Items.Clear()
ddadult.Items.Clear()
Dim n As Integer = 0
For n = 0 To 15
ddchild.Items.Add(n)
ddadult.Items.Add(n)
Guest Registration and Verification System 113
Next
Catch ex As Exception
End Try
End Sub
Sub fillcountry()
Try
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand("Select * from
countries", cn)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
ddcountry.Items.Clear()
ddcountry.Items.Add("Select")
If dr.HasRows Then
While dr.Read
ddcountry.Items.Add(dr("country"))
End While
End If
cn.Close()
End Using
Catch ex As Exception
End Try
End Sub
Sub fillstate()
Try
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand("Select * from
states", cn)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
ddstate.Items.Clear()
ddstate.Items.Add("Select")
If dr.HasRows Then
While dr.Read
ddstate.Items.Add(dr("state"))
Guest Registration and Verification System 114
End While
End If
cn.Close()
End Using
Catch ex As Exception
End Try
End Sub
Sub filldistrict()
Try
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand("Select * from
districts where state=@a1", cn)
cmd.Parameters.AddWithValue("@a1",
ddstate.SelectedItem.Text)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
dddistrict.Items.Clear()
dddistrict.Items.Add("Select")
If dr.HasRows Then
While dr.Read
dddistrict.Items.Add(dr("district"))
End While
End If
cn.Close()
End Using
Catch ex As Exception

End Try
End Sub

Protected Sub Button1_Click(ByVal sender As Object,


ByVal e As System.EventArgs) Handles Button1.Click
lblmsg.Text = ""
save()
End Sub
Guest Registration and Verification System 115
Function save() As Integer
Try
Dim uploadby = lblcode.Text
Dim uploaddate = Now.Date.ToString()
Dim uploaddt = DateTime.Now()
Dim hid = lblhid.Text
Dim nm = txtname.Text.Trim
Dim parent = txtparent.Text.Trim
Dim occ = txtocc.Text.Trim
Dim foreigner As String = "No"
Dim country As String = "India"
Dim state As String = ""
Dim distt As String = ""
If CheckBox1.Checked = True Then
foreigner = "Yes"
country = ddcountry.SelectedItem.Text
Else
country = "India"
state = ddstate.SelectedItem.Text
distt = dddistrict.SelectedItem.Text
End If
Dim addr As String = txtaddr.Text.Trim
Dim town As String = txttown.Text.Trim
Dim emailid As String = txtemailid.Text.Trim
Dim contactno As String = txtmobile.Text.Trim
Dim idproof As String =
DropDownList3.SelectedItem.Text
Dim idproofno As String = txtidno.Text.Trim
Dim comefrom As String = txtfrom.Text.Trim
Dim checkin = txtchkin.Text.Trim
'' Dim checkintime As String =
DropDownList5.SelectedItem.Text & ":" &
DropDownList6.SelectedItem.Text & " " &
DropDownList7.SelectedItem.Text
Dim checkintime As String = txtchkintime.Text.Trim
Dim adult As String = ddadult.SelectedItem.Text
Dim child As String = ddchild.SelectedItem.Text
Guest Registration and Verification System 116
Dim guestdet As String = txtguestdet.Text.Trim
Dim filename As String = ""

'' '' ''If FileUpload1.PostedFile IsNot Nothing Then


'' '' '' Dim ext =
Mid(FileUpload1.PostedFile.FileName,
FileUpload1.PostedFile.FileName.LastIndexOf(".") +
1).ToLower()
'' '' '' If ext = ".pdf" Or ext = ".jpg" Or ext =
".jpeg" Then
'' '' '' filename = Now.Date.Month &
Now.Date.Year & Now.Date.Day & Now.Date.Hour &
Now.Second & Now.Millisecond & ext
'' '' ''
FileUpload1.PostedFile.SaveAs(Server.MapPath("adminpanel
/files/" & filename))
'' '' '' Else
'' '' '' Response.Write("File is not in proper
format.")
'' '' '' End If
'' '' ''End If

Dim s As String = txtimg.Text


If s <> "" Then
s = s.Replace("data:image/jpeg;base64,", "")
Dim imageBytes As Byte() =
Convert.FromBase64String(s)
Dim img As Image
Dim z = ".jpg"
Dim sm = "1_" & Now.Date.Month &
Now.Date.Year & Now.Date.Day & Now.Date.Hour &
Now.Date.Minute & Now.Second & Now.Millisecond &
Now.Second & Now.Day & Now.Minute & z
'Save the Byte Array as Image File.
'Dim filePath As String =
Server.MapPath("img/newimg.png")

Guest Registration and Verification System 117


Using image As Image =
image.FromStream(New MemoryStream(imageBytes))

image.Save(Server.MapPath("adminpanel/files/" & sm),


ImageFormat.Jpeg)
End Using
''LoadImage(s)
''----------------------------------------------------''
filename = sm
Else
ScriptManager.RegisterClientScriptBlock(Page,
Page.[GetType](), Guid.NewGuid().ToString(),
"alert('Browse ID Proof');", True)
End If

Dim pic2 = "", pic3 = ""


Dim s2 As String = txtimg2.Text
If s2 <> "" Then
s2 = s2.Replace("data:image/jpeg;base64,", "")
Dim imageBytes As Byte() =
Convert.FromBase64String(s2)
Dim img As Image
Dim z = ".jpg"
Dim sm = "2_" & Now.Date.Month &
Now.Date.Year & Now.Date.Day & Now.Date.Hour &
Now.Date.Minute & Now.Second & Now.Millisecond &
Now.Second & Now.Day & Now.Minute & z
Using image As Image =
image.FromStream(New MemoryStream(imageBytes))

image.Save(Server.MapPath("adminpanel/files/" & sm),


ImageFormat.Jpeg)
End Using
pic2 = sm
End If
Dim s3 As String = txtimg3.Text
If s3 <> "" Then
Guest Registration and Verification System 118
s3 = s3.Replace("data:image/jpeg;base64,", "")
Dim imageBytes As Byte() =
Convert.FromBase64String(s3)
Dim img As Image
Dim z = ".jpg"
Dim sm = "3_" & Now.Date.Month &
Now.Date.Year & Now.Date.Day & Now.Date.Hour &
Now.Date.Minute & Now.Second & Now.Millisecond &
Now.Second & Now.Day & Now.Minute & z
Using image As Image =
image.FromStream(New MemoryStream(imageBytes))

image.Save(Server.MapPath("adminpanel/files/" & sm),


ImageFormat.Jpeg)
End Using
pic3 = sm
End If
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand("Insert into
guests(hid,name,parentage,occupation,foreigner,country,st
ate,district,addr,town,emailid,contactno,idproof,idproofno,co
mefrom,checkin,checkintime,adult,child,guestdet,filename,u
ploadby,uploaddate,uploaddt,st,comment,file1,file2)
values(@hid,@name,@parentage,@occupation,@foreigner,
@country,@state,@district,@addr,@town,@emailid,@contac
tno,@idproof,@idproofno,@comefrom,@checkin,@checkinti
me,@adult,@child,@guestdet,@filename,@uploadby,@uplo
addate,@uploaddt,@st,@comment,@file1,@file2)", cn)
cmd.Parameters.AddWithValue("@hid", hid)
cmd.Parameters.AddWithValue("@name", nm)
cmd.Parameters.AddWithValue("@parentage",
parent)
cmd.Parameters.AddWithValue("@occupation",
occ)
cmd.Parameters.AddWithValue("@foreigner",
foreigner)

Guest Registration and Verification System 119


cmd.Parameters.AddWithValue("@country",
country)
cmd.Parameters.AddWithValue("@state", state)
cmd.Parameters.AddWithValue("@district", distt)
cmd.Parameters.AddWithValue("@addr", addr)
cmd.Parameters.AddWithValue("@town", town)
cmd.Parameters.AddWithValue("@emailid",
emailid)
cmd.Parameters.AddWithValue("@contactno",
contactno)
cmd.Parameters.AddWithValue("@idproof",
idproof)
cmd.Parameters.AddWithValue("@idproofno",
idproofno)
cmd.Parameters.AddWithValue("@comefrom",
comefrom)
cmd.Parameters.AddWithValue("@checkin",
checkin)
cmd.Parameters.AddWithValue("@checkintime",
checkintime)
cmd.Parameters.AddWithValue("@adult", adult)
cmd.Parameters.AddWithValue("@child", child)
cmd.Parameters.AddWithValue("@guestdet",
guestdet)
cmd.Parameters.AddWithValue("@filename",
filename)
cmd.Parameters.AddWithValue("@uploadby",
uploadby)
cmd.Parameters.AddWithValue("@uploaddate",
uploaddate)
cmd.Parameters.AddWithValue("@uploaddt",
uploaddt)
cmd.Parameters.AddWithValue("@st",
"CheckIn")
cmd.Parameters.AddWithValue("@comment", "")
cmd.Parameters.AddWithValue("@file1", pic2)
cmd.Parameters.AddWithValue("@file2", pic3)
Guest Registration and Verification System 120
cn.Open()
cmd.ExecuteNonQuery()
cn.Close()
End Using
'' '' '' ''Dim gid As Integer
'' '' '' ''Using cn As New SqlConnection(constr())
'' '' '' '' Dim cmd As New SqlCommand("Select
max(id) from guests", cn)
'' '' '' '' cn.Open()
'' '' '' '' Dim dr As SqlDataReader
'' '' '' '' dr = cmd.ExecuteReader
'' '' '' '' If dr.HasRows Then
'' '' '' '' While dr.Read
'' '' '' '' gid = dr(0)
'' '' '' '' End While
'' '' '' '' End If
'' '' '' '' cn.Close()
'' '' '' ''End Using

'' '' '' ''Dim uploadedFiles As HttpFileCollection =


Request.Files
'' '' '' ''Dim i As Integer = uploadedFiles.Count
'' '' '' ''If i > 0 Then
'' '' '' '' For j As Integer = 0 To i - 1
'' '' '' '' Dim hpf As HttpPostedFile =
uploadedFiles(j)
'' '' '' '' If hpf.ContentLength > 0 Then
'' '' '' '' Dim c As String = hpf.FileName
'' '' '' '' Dim l As Integer = c.Length
'' '' '' '' Dim z As String =
c.Substring(c.LastIndexOf(".")).ToLower()

'' '' '' '' Dim x As String =


Server.MapPath(".")
'' '' '' '' If z = ".jpg" Or z = ".gif" Or z =
".jpeg" Or z = ".png" Then
Guest Registration and Verification System 121
'' '' '' '' Dim cl = Now.Date.Month &
Now.Date.Year & Now.Date.Day & Now.Date.Hour &
Now.Second & Now.Millisecond & z
'' '' '' ''
hpf.SaveAs(Server.MapPath("adminpanel/files/" & cl))
'' '' '' '' Using cn As New
SqlConnection(constr())
'' '' '' '' Dim cmd As SqlCommand =
New SqlCommand("insert into guestsdoc(hid,gid,filename)
values(@a1,@a2,@a3)", cn)
'' '' '' ''
cmd.Parameters.AddWithValue("@a1", lblhid.Text)
'' '' '' ''
cmd.Parameters.AddWithValue("@a2", gid)
'' '' '' ''
cmd.Parameters.AddWithValue("@a3", cl)
'' '' '' '' cn.Open()
'' '' '' '' cmd.ExecuteNonQuery()
'' '' '' '' cn.Close()
'' '' '' '' End Using
'' '' '' '' End If
'' '' '' '' End If
'' '' '' '' Next
'' '' '' ''End If
''lblmsg.Text = "Record Saved!"
ScriptManager.RegisterClientScriptBlock(Page,
Page.[GetType](), Guid.NewGuid().ToString(),
"alert('Record Saved.');", True)
clear()
CheckBox1.Focus()
Catch ex As Exception

End Try
End Function

Sub savedocs(gid, filename)


Try
Guest Registration and Verification System 122
Using cn As New SqlConnection(constr())
Dim cmd As SqlCommand = New
SqlCommand("insert into guestsdoc(hid,gid,filename)
values(@a1,@a2,@a3)", cn)
cmd.Parameters.AddWithValue("@a1",
lblhid.Text)
cmd.Parameters.AddWithValue("@a2", gid)
cmd.Parameters.AddWithValue("@a3", filename)
cn.Open()
cmd.ExecuteNonQuery()
cn.Close()
End Using
Catch ex As Exception

End Try
End Sub
Sub clear()
ddadult.SelectedIndex = 0
ddchild.SelectedIndex = 0

DropDownList3.SelectedIndex = 0
''DropDownList5.SelectedIndex = 0
''DropDownList6.SelectedIndex = 0
''DropDownList7.SelectedIndex = 0
txtchkintime.Text = ""
txtaddr.Text = ""
txtchkin.Text = ""
txtemailid.Text = ""
txtfrom.Text = ""
txtguestdet.Text = ""
txtidno.Text = ""
txtmobile.Text = ""
txtname.Text = ""
txtparent.Text = ""
txtocc.Text = ""
txttown.Text = ""
fillcountry()
Guest Registration and Verification System 123
fillstate()
filldistrict()
End Sub

Protected Sub CheckBox1_CheckedChanged(sender As


Object, e As System.EventArgs) Handles
CheckBox1.CheckedChanged
If CheckBox1.Checked = True Then
Panel1.Visible = False
Panel2.Visible = True
dddistrict.Items.Clear()
ddstate.Items.Clear()
Else
Panel1.Visible = True
Panel2.Visible = False
filldistrict()
fillstate()
End If
End Sub

Protected Sub ddstate_SelectedIndexChanged(sender As


Object, e As System.EventArgs) Handles
ddstate.SelectedIndexChanged
filldistrict()
End Sub
End Class

Imports System.Data.SqlClient

Partial Class hoteldashboard


Inherits System.Web.UI.Page
Function constr() As String
Dim y As New
IO.StreamReader(Server.MapPath("adminpanel/dataconfig/
dataval.config"))
Guest Registration and Verification System 124
Dim x As String = y.ReadToEnd
y.Close()
Return x
End Function
Protected Sub Page_Load(ByVal sender As Object, ByVal
e As System.EventArgs) Handles Me.Load
If Not Page.IsPostBack Then
Session("user") = Session("user")
Session("logtype") = Session("logtype")

If Session("user") = Nothing Then


Response.Redirect("hotellogin.aspx", False)
Exit Sub
End If

Dim uss = Session("user")


Dim cls As New Class1
Dim user = Request.QueryString("user")
Dim hid As Integer, hname As String = ""
lblcode.Text = user
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand("Select * from
hotels where username='" & uss & "'", cn)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
While dr.Read
hname = dr("title")
hid = dr("id")
End While
End If
cn.Close()
End Using
Dim centre = cls.gethotelname(user)
lbltitle.Text = centre
getmenu(user, hid, hname)
Guest Registration and Verification System 125
End If
End Sub
Sub getmenu(user As String, hid As Integer, hname As
String)
Try
Dim dt = Now.Date.ToString("MM/dd/yyyy")
Dim str = ""
str = str & "<div class='col-lg-4 column-lg-4
column-td-4 column-md-6 mb-9'><div class='category-
item category-item-layout'> <a
href='newguest.aspx?user=" & user & "&hid=" & hid &
"&hname=" & hname & "'' class='cat-fig-box d-block pl-4
pr-4 pt-1 bg-green'><center> <img src='images/newuser-
icon.png' class='mt-lg-150'/></center><div class='cat-
content text-center'> <h4 class='cat__title mb-3 font-size-
28'>Register New Guest</h4> </div> </a> </div>
</div> "
str = str & " <div class='col-lg-4 column-lg-4
column-td-4 column-md-6 mb-9'> <div class='category-
item category-item-layout'> <a
href='viewguests.aspx?user=" & user & "&hid=" & hid &
"&hname=" & hname & "' class='cat-fig-box d-block pl-4 pr-
4 pt-1 bg-yellow'> <center> <img src='images/users-
icon.png' class='mt-lg-150'/></center> <div class='cat-
content text-center'> <h4 class='cat__title mb-3 font-size-
28'>Registered Guests</h4> </div> </a> </div>
</div> "
str = str & "<div class='col-lg-4 column-lg-4
column-td-4 column-md-6 mb-9'> <div class='category-
item category-item-layout'> <a href='cleartoken.aspx'
class='cat-fig-box d-block pl-4 pr-4 pt-1 bg-blue'>
<center> <img src='images/logout-icon.png' class='mt-lg-
150'/></center> <div class='cat-content text-center'>
<h4 class='cat__title mb-3 font-size-28'>Logout</h4>
</div> </a> </div> </div> "
lblmenu.Text = str
Catch ex As Exception
Guest Registration and Verification System 126
End Try
End Sub
Sub getmenu1(user As String, hid As Integer, hname As
String)
Try
Dim dt = Now.Date.ToString("MM/dd/yyyy")
Dim str As String = ""
str = str & "<div class='col-lg-12
mb15'><center><a href='newguest.aspx?user=" & user &
"&hid=" & hid & "&hname=" & hname & "'><span
class='btn btn-primary dash-btn'>Add New
Guest</span></a></center></div>"
str = str & "<div class='col-lg-12
mb15'><center><a href='viewguests.aspx?user=" & user &
"&hid=" & hid & "&hname=" & hname & "'><span
class='btn btn-primary dash-btn'>Search A
Guest</span></a></center></div>"
str = str & "<div class='col-lg-12
mb15'><center><a href='clearmob.aspx'><span
class='btn btn-primary dash-
btn'>LogOut</span></a></center></div>"
lblmenu.Text = str
Catch ex As Exception

End Try
End Sub
Function cntguest(st As String) As Integer
Try
Dim qr As String = "Select count(*) from guests "
If st <> "" Then
qr = "Select count(*) from guests where
st=@st"
End If
Dim n As Integer = 0
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand(qr, cn)
Guest Registration and Verification System 127
cmd.Parameters.AddWithValue("@st", st)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
While dr.Read
If Not IsDBNull(dr(0)) Then
n = dr(0)
End If
End While
End If
cn.Close()
End Using
Return n
Catch ex As Exception

End Try
End Function
End Class

Guest Registration and Verification System 128


Guest Detail Page Coding

Imports System.Data.SqlClient
Imports System.Data
Partial Class GuestDetail
Inherits System.Web.UI.Page
Function constr() As String
Dim y As New
IO.StreamReader(Server.MapPath("adminpanel/dataconfig/
dataval.config"))
Dim x As String = y.ReadToEnd
y.Close()
Return x
End Function
Protected Sub Page_Load(ByVal sender As Object, ByVal
e As System.EventArgs) Handles Me.Load
If Not Page.IsPostBack Then
Session("user") = Session("user")
Session("logtype") = Session("logtype")

If Session("user") = Nothing Then


Response.Redirect("index.html", False)
Exit Sub
End If
If Request.QueryString("user") = Nothing Then
Response.Redirect("index.html", False)
Exit Sub
End If
Dim user = Request.QueryString("user")
Dim hid = Request.QueryString("hid")
Dim hname = Request.QueryString("hname")
lbltitle.Text = hname
lblcode.Text = user
lblhid.Text = hid
lblback.Text = " <a href='viewguests.aspx?user="
& user & "&hid=" & hid & "&hname=" & hname & "'> <li
class='active__list-item text-white'>&larr; Search</li></a>
Guest Registration and Verification System 129
&nbsp; <a href='hoteldashboard.aspx?user=" & user &
"&hid=" & hid & "&hname=" & hname & "'> <li
class='active__list-item text-white'>&larr;
Dashboard</li></a>"
getdata()
End If
End Sub
Sub getdata()
Try
Dim cls As New Class1
Dim id As Integer =
cls.SafeSqlLiteral(Request.QueryString("id"), 2)
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand("Select * from
guests where id=@id", cn)
cmd.Parameters.AddWithValue("@id", id)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
While dr.Read
lblname.Text = dr("name")
lblparent.Text = dr("parentage")
lblocc.Text = dr("occupation")
lblforeign.Text = dr("foreigner")
Dim dt As Date = dr("checkin")
lblchkin.Text = dt.ToString("dd/MM/yyyy")
& " - " & dr("checkintime")
If dr("foreigner") = "Yes" Then
lblcountry.Text = "<br/>" &
dr("country")
Else
lbldistrict.Text = "<br/>" & dr("district")
lblstate.Text = " - " & dr("state")
End If
lbladdr.Text = Replace(dr("addr"), vbCrLf,
"<br/>")
Guest Registration and Verification System 130
lbltown.Text = dr("town")
lblmobile.Text = dr("contactno")
lblemailid.Text = dr("emailid")
lblfrom.Text = dr("comefrom")
lblidproof.Text = dr("idproof") & "(<b><a
href='adminpanel/files/" & dr("filename") & "'
target='_blank'>" & dr("idproofno") & "</a></b>)"
lbladults.Text = dr("adult")
lblchild.Text = dr("child")
lblguestdet.Text = Replace(dr("guestdet"),
vbCrLf, "<br/>")
If dr("st") = "CheckOut" Then
Dim dt1 As Date = dr("checkout")
lblchkout.Text =
dt1.ToString("dd/MM/yyyy") & " - " & dr("checkouttime")
End If
If dr("file1") <> "" Then
lbldocs.Text = "<a
href='adminpanel/files/" & dr("file1") & "'
target='_blank'><img src='adminpanel/files/" & dr("file1")
& "' width='120' /></a>"
End If
If dr("file2") <> "" Then
lbldocs.Text = lbldocs.Text &
"<br/><br/><a href='adminpanel/files/" & dr("file2") & "'
target='_blank'><img src='adminpanel/files/" & dr("file2")
& "' width='120'/></a>"
End If
'' getdocs(dr("id"))
End While
End If
cn.Close()
End Using
Catch ex As Exception
End Try
End Sub
Sub getdocs(gid As Integer)
Guest Registration and Verification System 131
Try
Dim str As String = "", i As Integer = 1
Using cn As New SqlConnection(constr())
Dim cmd As New SqlCommand("Select * from
guestsdoc where gid=@gid", cn)
cmd.Parameters.AddWithValue("@gid", gid)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
While dr.Read
'' str = str & "<a href='adminpanel/files/"
& dr("filename") & "' target='_blank'>Attachment " & i &
"</a><br/>"
str = str & "<a href='adminpanel/files/" &
dr("filename") & "' target='_blank'><img
src='adminpanel/files/" & dr("filename") & "'
width='100'/></a><br/>"

i=i+1
End While
End If
cn.Close()
End Using
lbldocs.Text = str
Catch ex As Exception

End Try
End Sub

End Class

Guest Registration and Verification System 132


View Hotel Based Summary Report

Imports System.Data.SqlClient
Imports System.Data
Partial Class viewsummary
Inherits System.Web.UI.Page
Function constr() As String
Dim y As New
IO.StreamReader(Server.MapPath("dataconfig/dataval.confi
g"))
Dim x As String = y.ReadToEnd
y.Close()
Return x
End Function
Protected Sub Page_Load(ByVal sender As Object, ByVal
e As System.EventArgs) Handles Me.Load
If Not Page.IsPostBack Then
If Session("logtype") = "" Then
Response.Redirect("default.aspx", False)
Exit Sub
End If

'f_date1.Text = Now.Date.ToString("MM/dd/yyyy")
'f_date2.Text = Now.Date.ToString("MM/dd/yyyy")
bindgridcontrol()
'' bindgridcontrol2()
End If
End Sub

Protected Sub Button1_Click(ByVal sender As Object,


ByVal e As System.EventArgs) Handles btnshow.Click
bindgridcontrol()
bindgridcontrol2()
End Sub
Sub SortGrid(ByVal sender As Object, ByVal e As
GridViewSortEventArgs)
Try
Guest Registration and Verification System 133
ViewState("sortexpression") = e.SortExpression
If ViewState("sortdirection") Is Nothing Then
ViewState("sortdirection") = "asc"
Else
If ViewState("sortdirection").ToString = "asc"
Then
ViewState("sortdirection") = "desc"
Else
ViewState("sortdirection") = "asc"
End If
End If
bindgridcontrol()
'' bindgridcontrol2()
Catch ex As Exception

End Try
End Sub
Sub bindgridcontrol()
Try
Dim qr As String = "", filter As String = "", i As
Integer = 1, cls As New Class1

If f_date1.Text.Trim <> "" Then


If i > 0 Then
filter = filter & " and "
End If
Dim dt As Date =
cls.SafeSqlLiteral(f_date1.Text.Trim, 2)
Dim dt1 As Date = dt
If f_date2.Text.Trim <> "" Then
dt1 = cls.SafeSqlLiteral(f_date2.Text.Trim, 2)
End If
filter = filter & " (checkin>='" & dt & "' and
checkin<='" & dt1 & "')"
i=i+1
End If
Guest Registration and Verification System 134
qr = "select hotels.id as hid,hotels.title,count(*) as
tot from guests,hotels where guests.hid=hotels.id " & filter
& " group by hotels.title,hotels.id"
Dim str As String = ""
Using cn As New SqlConnection(constr)
Dim cmd As New SqlCommand(qr, cn)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
str = "<table cellpadding='4' cellspaing='0'
style='text-align:center;color:#333333;font-
family:Arial;font-size:14px;width:98%;border-
collapse:collapse;' border='1'>"
str = str & "<thead><tr
style='color:White;background-color:#08133F;font-
family:Arial Narrow;font-weight:bold;'><td>Hotel</td>
<td>Total</td></tr></thead><tbody>"
While dr.Read
str = str & "<tr><td>" & dr(0) &
"</td><td>" & dr(1) & "</td></tr>"
End While
str = str & "</tbody></table>"
End If
cn.Close()
End Using
Label1.Text = str
Dim n As Integer = 0
Using con As New SqlConnection(constr())
con.Open()
Dim cmd As New SqlCommand(qr, con)
Dim da As New SqlDataAdapter
Dim dset As New DataSet
da.SelectCommand = cmd
da.Fill(dset, "hotels")
Session("dset") = dset

Guest Registration and Verification System 135


If Not (ViewState("sortexpression") Is Nothing)
Then
dset.Tables(0).DefaultView.Sort =
ViewState("sortexpression").ToString + " " +
ViewState("sortdirection").ToString
End If
GridView1.DataSource =
dset.Tables(0).DefaultView
GridView1.DataBind()
n = dset.Tables(0).Rows.Count()
con.Close()
End Using
GridView1.Focus()
If n > 0 Then
'' btnemail.Visible = True
Else
btnemail.Visible = False
End If
Catch ex As Exception
End Try
End Sub
Sub bindgridcontrol2()
Try
Dim qr As String = "", filter As String = "", i As
Integer = 1, cls As New Class1

''If dddistrict.SelectedItem.Text <> "Select" Then


'' If i > 0 Then
'' filter = filter & " and "
'' End If
'' filter = filter & " cctvfiles_tb.series like '%" &
dddistrict.SelectedItem.Value & "%'"
'' i = i + 1
''End If
If f_date1.Text.Trim <> "" Then
If i > 0 Then
filter = filter & " and "
Guest Registration and Verification System 136
End If
Dim dt As Date =
cls.SafeSqlLiteral(f_date1.Text.Trim, 2)
filter = filter & " checkin='" & dt & "'"
i=i+1
End If
qr = "select hotels.district,count(*) as tot from
guests,hotels where guests.hid=hotels.id " & filter & " group
by hotels.district"
'' Response.Write(qr)
Dim str As String = ""
Using cn As New SqlConnection(constr)
Dim cmd As New SqlCommand(qr, cn)
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
str = "<table cellpadding='4' cellspaing='0'
style='text-align:center;color:#333333;font-
family:Arial;font-size:14px;width:98%;border-
collapse:collapse;' border='1'>"
str = str & "<thead><tr
style='color:White;background-color:#08133F;font-
family:Arial Narrow;font-weight:bold;'><td >District</td>
<td>Total</td></tr></thead><tbody>"
While dr.Read
str = str & "<tr><td>" & dr(0) &
"</td><td>" & dr(1) & "</td></tr>"
End While
str = str & "</tbody></table>"
End If
cn.Close()
End Using
Label2.Text = str
Using con As New SqlConnection(constr())
con.Open()
Dim cmd As New SqlCommand(qr, con)
Guest Registration and Verification System 137
Dim da As New SqlDataAdapter
Dim dset As New DataSet
da.SelectCommand = cmd
da.Fill(dset, "hotels")
Session("dset") = dset
If Not (ViewState("sortexpression") Is Nothing)
Then
dset.Tables(0).DefaultView.Sort =
ViewState("sortexpression").ToString + " " +
ViewState("sortdirection").ToString
End If
GridView2.DataSource =
dset.Tables(0).DefaultView
GridView2.DataBind()
con.Close()
End Using
GridView2.Focus()
Catch ex As Exception

End Try
End Sub
Protected Sub GridView1_PageIndexChanging(ByVal
sender As Object, ByVal e As
System.Web.UI.WebControls.GridViewPageEventArgs)
Handles GridView1.PageIndexChanging
Try
GridView1.PageIndex = e.NewPageIndex
bindgridcontrol()
GridView1.Focus()
Catch ex As Exception
End Try
End Sub
Sub clearmsg()
lblmsg.Text = ""
lblmsg0.Text = ""
End Sub

Guest Registration and Verification System 138


Protected Sub Button2_Click(sender As Object, e As
System.EventArgs) Handles btnreset.Click
f_date1.Text = ""
f_date2.Text = ""
bindgridcontrol()
End Sub

Protected Sub btnemail_Click(sender As Object, e As


System.EventArgs) Handles btnemail.Click
sendemail()
End Sub
Sub sendemail()
Try
Dim dt As Date = Now.Date
If f_date1.Text <> "" Then
dt = f_date1.Text
End If
Dim subject As String = "Hotels Guests Registration
Report For " & dt.ToString("dd/MM/yyyy")
Dim content = "<table cellpadding='0'
cellspacing='0' width='350'><tr><td
align='center'><h3>Districtwise Report</h3></td></tr>"
content = content & " <tr><td align='center'>" &
Label2.Text & "</td></tr>"
content = content & " <tr><td
align='center'><hr/></td></tr>"
content = content & " <tr><td
align='center'><h3>Nakawise Report</h3></td></tr>"
content = content & " <tr><td align='center'>" &
Label1.Text & "</td></tr>"
content = content & "</table>"
Dim cls As New Class1, msg As String, i As Integer
= 0, n As Integer = 0
Using cn As New SqlConnection(constr)
Dim cmd As New SqlCommand("Select * from
email_master where status='Active'", cn)
Guest Registration and Verification System 139
cn.Open()
Dim dr As SqlDataReader
dr = cmd.ExecuteReader
If dr.HasRows Then
While dr.Read
Dim email As String = dr("email")
'' i = cls.maildetails(email, subject,
content)
If i > 0 Then
msg = email & ";"
n=n+1
End If
End While
End If
cn.Close()
End Using
lblmsg.Text = "Report send to " & msg
Catch ex As Exception

End Try
End Sub
End Class

Guest Registration and Verification System 140


View Guests Page Coding

Imports System.Data.SqlClient
Imports System.Data
Imports System.IO
Imports System.Drawing
Imports ClosedXML.Excel
Partial Class viewguests
Inherits System.Web.UI.Page
Function constr() As String
Dim y As New
IO.StreamReader(Server.MapPath("dataconfig/dataval.confi
g"))
Dim x As String = y.ReadToEnd
y.Close()
Return x
End Function
Protected Sub Page_Load(ByVal sender As Object, ByVal
e As System.EventArgs) Handles Me.Load
If Not Page.IsPostBack Then
If Session("logtype") = "" Then
Response.Redirect("default.aspx", False)
Exit Sub
End If
Session("user") = Session("user")
Session("logtype") = Session("logtype")
lbluser.Text = Session("user")
lbllogtype.Text = Session("logtype")
Dim cls As New Class1
cls.fillstates(ddstate)
cls.filldistricts(dddistrict)
cls.fillps(ddps, dddistrict.SelectedItem.Text)

bindgridcontrol()
End If
End Sub

Guest Registration and Verification System 141


Protected Sub Button1_Click(ByVal sender As Object,
ByVal e As System.EventArgs) Handles btnshow.Click
bindgridcontrol()
End Sub

Sub SortGrid(ByVal sender As Object, ByVal e As


GridViewSortEventArgs)
Try
ViewState("sortexpression") = e.SortExpression
If ViewState("sortdirection") Is Nothing Then
ViewState("sortdirection") = "asc"
Else
If ViewState("sortdirection").ToString = "asc"
Then
ViewState("sortdirection") = "desc"
Else
ViewState("sortdirection") = "asc"
End If
End If
bindgridcontrol()
Catch ex As Exception

End Try
End Sub
Sub bindgridcontrol()
Try
Dim qr As String = "", filter As String = "", i As
Integer = 1, n As Integer = 0, cls As New Class1
If CheckBox1.Checked = True Then
If dddistrict.SelectedItem.Text <> "Select" Then
If i > 0 Then
filter = filter & " and "
End If
filter = filter & " guests.district='" &
dddistrict.SelectedItem.Text & "'"
Guest Registration and Verification System 142
i=i+1
End If
End If
If CheckBox2.Checked = True Then
If ddps.SelectedItem.Text <> "Select" Then
If i > 0 Then
filter = filter & " and "
End If
filter = filter & " hotels.psid='" &
ddps.SelectedItem.Value & "'"
i=i+1
End If
End If
If CheckBox3.Checked = True Then
If TextBox1.Text.Trim <> "" Then
If i > 0 Then
filter = filter & " and "
End If
filter = filter & " hotel.name like '%" &
cls.SafeSqlLiteral(TextBox1.Text.Trim, 2) & "%'"
i=i+1
End If
End If
If CheckBox8.Checked = True Then
If TextBox2.Text.Trim <> "" Then
If i > 0 Then
filter = filter & " and "
End If
filter = filter & " guests.name like '%" &
cls.SafeSqlLiteral(TextBox2.Text.Trim, 2) & "%'"
i=i+1
End If
End If
If CheckBox4.Checked = True Then
If ddcountry.SelectedItem.Text <> "Select" Then
If i > 0 Then
filter = filter & " and "
Guest Registration and Verification System 143
End If
filter = filter & " guests.country='" &
ddcountry.SelectedItem.Text & "'"
i=i+1
End If
End If
If CheckBox5.Checked = True Then
If ddstate.SelectedItem.Text <> "Select" Then
If i > 0 Then
filter = filter & " and "
End If
filter = filter & " guests.state='" &
ddstate.SelectedItem.Text & "'"
i=i+1
End If
End If
If CheckBox6.Checked = True Then
If ddhotel.SelectedItem.Text <> "Select" Then
If i > 0 Then
filter = filter & " and "
End If
filter = filter & " guests.hid=" &
ddhotel.SelectedItem.Value & ""
i=i+1
End If
ElseIf Val(Request.QueryString("hid")) <> 0 Then
If i > 0 Then
filter = filter & " and "
End If
filter = filter & " guests.hid=" &
cls.SafeSqlLiteral(Request.QueryString("hid"), 2) & ""
i=i+1
End If
If CheckBox7.Checked = True Then
If ddforeign.SelectedItem.Text <> "Select" Then
If i > 0 Then
filter = filter & " and "
Guest Registration and Verification System 144
End If
filter = filter & " guests.foreigner=" &
ddforeign.SelectedItem.Value & ""
i=i+1
End If
End If
If CheckBox9.Checked = True And
f_date1.Text.Trim <> "" Then
If i > 0 Then
filter = filter & " and "
End If
Dim dt As Date =
cls.SafeSqlLiteral(f_date1.Text.Trim, 2)
Dim dt1 As Date = dt
If f_date2.Text.Trim <> "" Then
dt1 = cls.SafeSqlLiteral(f_date2.Text.Trim, 2)
End If
filter = filter & " (checkin>='" & dt & "' and
checkin<='" & dt1 & "')"
i=i+1

End If

qr = "Select guests.*,hotels.title as
hotel,policestations.ps from guests,hotels,policestations
where guests.hid=hotels.id and
hotels.psid=policestations.id " & filter & " order by id desc"
Using con As New SqlConnection(constr())

con.Open()
Dim cmd As New SqlCommand(qr, con)
Dim da As New SqlDataAdapter
Dim dset As New DataSet
da.SelectCommand = cmd
da.Fill(dset, "users")
Session("dset") = dset

Guest Registration and Verification System 145


If Not (ViewState("sortexpression") Is
Nothing) Then
dset.Tables(0).DefaultView.Sort =
ViewState("sortexpression").ToString + " " +
ViewState("sortdirection").ToString
End If
GridView1.DataSource =
dset.Tables(0).DefaultView
n = dset.Tables(0).Rows.Count
GridView1.DataBind()
con.Close()
End Using
lblcount.Text = n
If n > 0 Then
btnexp.Visible = True
GridView1.HeaderRow.TableSection =
TableRowSection.TableHeader
Else
btnexp.Visible = False
End If
Catch ex As Exception
MsgBox(ex.ToString)
End Try
End Sub

Protected Sub GridView1_PageIndexChanging(ByVal


sender As Object, ByVal e As
System.Web.UI.WebControls.GridViewPageEventArgs)
Handles GridView1.PageIndexChanging
Try
GridView1.PageIndex = e.NewPageIndex
bindgridcontrol()
GridView1.Focus()
Catch ex As Exception
End Try
End Sub
Sub clearmsg()
Guest Registration and Verification System 146
lblmsg.Text = ""
lblmsg0.Text = ""
End Sub

Protected Sub Button2_Click(sender As Object, e As


System.EventArgs) Handles btnreset.Click
ddps.SelectedIndex = 0
TextBox1.Text = ""
dddistrict.SelectedIndex = 0
CheckBox1.Checked = False
CheckBox2.Checked = False
CheckBox3.Checked = False
bindgridcontrol()
End Sub

Protected Sub dddistrict_SelectedIndexChanged(sender


As Object, e As System.EventArgs) Handles
dddistrict.SelectedIndexChanged
Dim cls As New Class1()
cls.fillps(ddps, dddistrict.SelectedItem.Text)

End Sub
Protected Sub ddcountry_SelectedIndexChanged(sender
As Object, e As System.EventArgs) Handles
ddcountry.SelectedIndexChanged
Dim cls As New Class1
cls.fillstates(ddstate)
cls.filldistricts(dddistrict, ddstate.SelectedItem.Text)

End Sub
Protected Sub ddstate_SelectedIndexChanged(sender As
Object, e As System.EventArgs) Handles
ddstate.SelectedIndexChanged
Dim cls As New Class1
cls.filldistricts(dddistrict, ddstate.SelectedItem.Text)
End Sub

Guest Registration and Verification System 147


Protected Sub btnexp_Click(sender As Object, e As
System.EventArgs) Handles btnexp.Click
exp()
End Sub
Sub exp()
Try
Dim fn = "GuestsReport" & DateTime.Now.Day & "-
" & DateTime.Now.Month & "-" & DateTime.Now.Year &
".xlsx"
Dim dt As New DataTable("GridView_Data")
For Each cell As TableCell In
GridView1.HeaderRow.Cells
dt.Columns.Add(cell.Text)
Next
Dim n = 1
For Each row As GridViewRow In GridView1.Rows
dt.Rows.Add()
For i As Integer = 0 To row.Cells.Count - 2
If i = 0 Then
dt.Rows(dt.Rows.Count - 1)(i) = n
Else
If row.Cells(i).Text = "&nbsp;" Then
dt.Rows(dt.Rows.Count - 1)(i) = ""
ElseIf row.Cells(i).Controls.Count > 0 Then
dt.Rows(dt.Rows.Count - 1)(i) =
(TryCast(row.Cells(i).Controls(1), Label)).Text
Else
dt.Rows(dt.Rows.Count - 1)(i) =
row.Cells(i).Text
End If
End If

Next
n=n+1
Next
Using wb As New XLWorkbook()
Guest Registration and Verification System 148
wb.Worksheets.Add(dt)
Response.Clear()
Response.Buffer = True
Response.Charset = ""
Response.ContentType =
"application/vnd.openxmlformats-
officedocument.spreadsheetml.sheet"
Response.AddHeader("content-disposition",
"attachment;filename=" & fn)
Using MyMemoryStream As New
MemoryStream()
wb.SaveAs(MyMemoryStream)

MyMemoryStream.WriteTo(Response.OutputStream)
Response.Flush()
Response.[End]()
End Using
End Using
Catch ex As Exception

End Try
End Sub
End Class

Guest Registration and Verification System 149


Input/Output Screens

Firstly open the admin page in the system, then put the user name and the password for the
admin. Then the main tab will open showing as under :-

The guest registration and police station registration panel will open . after this we can open
the police station registration workspace which is as under:-

The police station master panel will open then, select the district of the nearby area police
station. After the selection enter the name of the police station of that area.
By pressing the save button the given details will be saved . as per head we can save the nearby
area police stations of that district which we select, the resulting output panel will be:-

Guest Registration and Verification System 150


After pressing save the output will be:-

As we can see the Rajbagh police in the station has been registered in the saved details.
After police station registration we have hotel registrations,

In this we can give usernames with password to various hostels of the districts

The steps for creating usernames are as under :-

Step 1- Add the district name e.g. Srinagar.


Step2- select the nearby police station.
Step3- type the hotel name with owner’s name along with their contact name and alternate
number.
Step4- Add the adress of the hotel with email id of the owner and latitude and longitude of the
hotel.
Step5- Finally write a suitable username along with a strong password .
Step6- for the result press save then the username and the password for the hotel will be saved.

Guest Registration and Verification System 151


The provided details is saved in the below bar

Now install the app from the open source network, then the app will be installed after that add
username and password created in the admin panel .

After logging in we can easily add username and password


The opening panel shown in the application will be as under:-

Guest Registration and Verification System 152


The new panel will open after logging in as pride inn.
The panel consists of three sub-divisions:-
1:-Register new guest
2:-Registered guests
3:-logout

The panel is shown as under:-

Guest Registration and Verification System 153


On pressing the Register new guest option,we will get with a new panel which contains blocks
with required details of the guest ; check if foreigner,check in date,check in time,fullname,
parentage,occupation,full address,town,select state,select district,mobile number,email I’d,id
proof,I’d proof number,picture of the id,coming from,additional guests-no. Of children,guest
details,document copy.After filling all these details the registration of the guest will be done
and the details will be updated in the provided hotel application.

The opened panel is as under:-

Guest Registration and Verification System 154


Guest Registration and Verification System 155
On clicking on the second option, the given information will be shown on the under panel. On
that we just have to select state , district and the guests name. The guests lists will be shown
who stayed or staying in the given district and state.

The opening panel is shown as under:-

From this panel, we can easily checkout the guests from the registered hotels.

Guest Registration and Verification System 156


TESTING PROCESSES

All software intended for public consumption should receive some level of
testing. The more complex or widely distributed a piece of software is, the more
essential testing is to its success. Without testing, you have no assurance that
software will behave as expected. The results in a public environment can be
truly embarrassing.

For software, testing almost always means automated testing. Automated tests use a
programming language to replay recorded user actions or to simulate the internal
use of a component. Automated tests are reproducible (the same test can be run
again and again) and measurable (the test either succeeds or fails). These two
advantages are key to ensuring that software meets product requirements.

Developing a Test Plan

The first step in testing is developing a test plan based on the product
requirements. The test plan is usually a formal document that ensures that the
product meets the following standards:

• Is thoroughly tested. Untested code adds an unknown element to the


product and increases the risk of product failure.
• Meets product requirements. To meet customer needs, the product must
provide the features and behavior described in the product specification.
For this reason, product specifications should be clearly written and well
understood.
• Does not contain defects. Features must work within established quality
standards .Having a test plan helps you avoid ad hoc testing—the kind of
testing that relies on the uncoordinated efforts of developers or testers to
ensure that code works. The results of ad hoc testing are usually uneven
Guest Registration and Verification System 157
and always unpredictable. A good test plan answers the following
questions:

• How are tests written? Describe the languages and tools used for testing.
• Who is responsible for the testing? List the teams or individuals who write
and perform the tests.
• When are the tests performed? The testing schedule closely follows the
development schedule.
• Where are the tests and how are test results shared? Tests should be
organized so that they can be rerun on a regular basis.
• What is being tested? Measurable goals with concrete targets let you know
when you have achieved success.

Types of Tests

The test plan specifies the different types of tests that will be performed to ensure
that product meets customer requirements and does not contain defects.

Types of Tests
Test type Ensures that
Unit test Each independent piece of code works correctly.
Integration test All units work together without errors.
Newly added features do not introduce errors to
Regression test
other features that are already working.
Load test (also called The product continues to work under extreme
stress test) usage.
The product works on all of the target hardware
Platform test
and software platforms.

These test types build on each other, and the tests are usually performed in
the order shown

Guest Registration and Verification System 158


The testing cycle

5.1 Unit Testing

A product unit is the smallest piece of code that can be independently


tested. From an object-oriented programming perspective, classes, properties,
methods, and events are all individual units. A unit should pass its unit test before
it is checked into the project for integration.

Unit tests are commonly written by the developer who programmed the
unit and are either written in the same programming language as the product unit
being tested or in a similar scripting language, such as VBScript. The unit test
Guest Registration and Verification System 159
itself can be as simple as getting and setting a property value, or it can be more
complicated. For instance, a unit test might take sample data and calculate a
result and then compare that result against the expected result to check for
accuracy.

5.2 Integration Testing

The first integration test always answers the question, “Does the
application compile?” At this point, a compilation error in any of the components
can keep the integration testing from moving forward. Some projects use nightly
builds to ensure that the product will always compile. If the build fails, the
problem can be quickly resolved the next morning.

The most common build problem occurs when one component tries to use
another component that has not yet been written. This occurs with modular
design because the components are often created out of sequence. You solve this
problem by creating stubs. Stubs are nonfunctional components that provide the
class, property, or method definition used by the other component. Stubs are a
kind of outline of the code you will create later.

When all of the build problems are resolved, integration testing really
becomes just an extension of unit testing, although the focus is now whether the
units work together. At this point, it is possible to wind up with two components
that need to work together through a third component that has not been written
yet. To test these two components, you create a driver. Drivers are simply test
components that make sure two or more components work together. Later in the
project, testing performed by the driver can be performed by the actual
component.

Top-down integration testing is an incremental approach to construction of


program structure. Modules are integrated by moving downward through the
Guest Registration and Verification System 160
control hierarchy, beginning with the main control module. Modules subordinate
to the main module are incorporated into the structure in steps.

The integration process is performed in five steps:


1. The main control module is used as a test driver and stubs are substituted for
all components directly subordinate to the main module.
2. Depending on the integration approach selected, subordinate stubs are
replaced one at a time with actual components, in breadth-first or depth-first
order.
3. Tests are conducted as each component is integrated.
4. On completion of each set of tests, another stub is replaced by the real
component.
Regression testing may be conducted to ensure that new errors have not been
introduced. The top-down strategy verifies major control or decision points
early in the test process. In a well-factored program structure, decision-making
occurs at higher levels in the hierarchy and is thus encountered first.

Bottom-up testing
Bottom-up integration testing, as the name implies, begins construction and
testing with atomic modules (i.e. components at the lowest levels in the
program structure). Because components are integrated form the bottom-up,
processing required for components subordinate to a given level is always
available and the need for stubs is eliminated.
A bottom-up integration strategy may be implemented using the following
steps:
1. Low-level components are combined into clusters that perform a specific
sub-function.
2. .The cluster is tested. Drivers are removed and clusters are combined moving
upward in the program.
Guest Registration and Verification System 161
An overall plan for integration of the software and a description of specific
tests are documented in a test specification. This document contains a test plan
and a test procedure. It is a work product of the software process, and becomes
a part of the software configuration.

5.3 Load Testing

When you deploy a Web application, it might be used by one or two clients
at a time or it might get deluged by thousands of requests. To find out how well a
Web application will work in these varying conditions, you need to perform load
tests. Use the Microsoft ACT to create and run load tests on a Web application.
To use ACT, follow these steps:

1. Create a test by recording a user session with the Web application using
ACT.
2. Set the load level and duration properties for the test.
3. Run the test.

In general, load tests are not created as early in the development process or run as
frequently as unit, integration, or regression tests. The following sections
describe how to create and run load tests in more detail.

Recording a Load Test

To record a load test in ACT, follow these steps:

1. From the ACT Actions menu, choose New Test. ACT displays the New
Test Wizard.
2. Click Next. The wizard displays the Test Source page, as shown in Figure

Guest Registration and Verification System 162


Recording a new load test

3. Select Record a New Test, and click next. The wizard displays the Test
Type page, as shown in Figure

Selecting a language

4. Click Next. The wizard displays the Browser Record page

Guest Registration and Verification System 163


5. Click Start Recording. The wizard displays a browser window, as shown in

Performing actions to record

6. Perform the actions you want to record. For instance, you might walk
through all the pages in your Web application, performing tasks on each
page.

Guest Registration and Verification System 164


7. On the Browser Record page, click Stop Recording when you have
finished recording actions, and then click Next. The wizard displays the
Test Properties page, as shown

Naming the test

Enter a name for the test, and click Next. The wizard displays the Completing the
New Test Wizard page. Click Finish to close the wizard.

Setting Test Properties

8. After you record a test, it is displayed in the Tests list in ACT, as shown

Guest Registration and Verification System 165


The recorded test

ACT tests can be written in the VBScript or JScript languages, but ACT
records tests using VBScript only. After you record a test, set the load and
duration of the test by following these steps:

1. Right-click your test, and choose Properties on the shortcut menu. ACT
displays
2. Set the Test load level to increase the number of users accessing the Web
application at the same time. Set the Test duration to run the test for a
certain amount of time or for a certain number of requests. Click OK when
you’ve finished.

Guest Registration and Verification System 166


Test load and duration

Running Load Tests

To run a load test in ACT, select the test, and then choose Start Test from the
Actions menu. ACT displays the Test Status dialog box, as shown

Platform testing lab

Platform Testing

Guest Registration and Verification System 167


• For Web applications, platform testing usually means verifying four main
conditions: Web forms are displayed correctly on all supported browsers
and supported versions of those browsers.
• The Web application appropriately handles unsupported browser
versions—for example, by displaying instructions for downloading the
required version.
• The client is prompted to install any required components, such as
Microsoft ActiveX objects or plug-ins, if they are not already installed on
his or her computer.
• The Web application has acceptable performance over slower forms of
network connections, such as modems.

To run platform tests, you need to set up a platform lab that contains
Verifying that each Web form is displayed correctly requires some human
intervention. ASP.NET renders server controls differently on different browsers,
so you should visually inspect your Web application as part of the final testing
cycle.

Guest Registration and Verification System 168


PLATFORM TESTING

Guest Registration and Verification System 169


5.4 Validation testing
Software validation is achieved through a series of black box tests that
demonstrate conformity with requirements. A test plan outlines the classes of
tests to be conducted and a test procedure defines specific test cases that will be
used to demonstrate conformity with requirements.
After each validation test case has been conducted, one of two possible
conditions exists:
i) The function or performance characteristics conform to the
specifications and are accepted.
ii) A deviation form specifications is discovered and a
deficiency list is created.
An important element of validation testing is configuration review. The intent
of the review is to ensure that all elements of the software configuration have
been properly developed and are well documented. The configuration review is
sometimes called an audit.
If software is developed for the use of many customers, it is impractical to
perform formal acceptance tests with each one. Many software product builders
use a process called alpha and beta testing to uncover errors that only the end-
user is able to find.
1. The alpha test is conducted at the developer’s site by the customer. The
software is used in a natural setting with the developer recording errors and
usage problems. Alpha tests are performed in a controlled environment.

3. Beta tests are conducted at one or more customer sites by the end-users
of the software. Unlike alpha testing, the developer is generally not
present. The beta test is thus a live application of the software in an
environment that cannot be controlled by the developer. The customer
Guest Registration and Verification System 170
records all the errors and reports these to the developer at regular
intervals.
4.
5.5 system testing

System testing is actually a series of tests whose purpose is to fully exercise the
computer-based system. Although each test has a different purpose, all work to
verify that system elements have been properly integrated and perform
allocated functions.
Some types of common system tests are:

Recovery testing
Many computer-based systems must recover from faults and resume processing
within a pre-specified time. In some cases, a system must be fault-tolerant, i.e.
processing faults must not cause overall system function to cease. In other
cases, a system failure must be corrected within a specified period of time or
severe economic damage will occur. Recovery testing is a system test that
forces the software to fail in a variety of ways and verifies that recovery is
properly performed. If recovery is automatic, re-initialization, check-pointing
mechanisms, data recovery and restart are evaluated for correctness. If recovery
requires human intervention, the mean-time-to-repair (MTTR) is evaluated to
determine whether it is within acceptable limits.

Security testing
Any computer-based system that manages sensitive information or causes
actions that can harm individuals is a target for improper or illegal penetration.
Security testing attempts to verify that protection mechanisms built into a
system will, in fact, protect it from improper penetration. During security

Guest Registration and Verification System 171


testing, the tester plays the role of the hacker who desires to penetrate the
system. Given enough time and resources, good security testing will ultimately
penetrate a system. The role of the system designer is to make penetration cost
more than the value of the information that will be obtained.

Stress testing
During earlier testing steps, white box and black box techniques result in a
thorough evaluation of normal program functions and performance. Stress tests
are designed to confront programs with abnormal situations. Stress testing
executes a system in a manner that demands resources in abnormal quantity,
frequency or volume. Essentially, the tester attempts to break the program.
A variation of stress testing is a technique called sensitivity testing. In some
situations, a very small range of data contained within the bounds of valid data
for a program may cause extreme and even erroneous processing or
performance degradation. Sensitivity testing attempts to uncover data
combinations within valid input classes that may cause instability or improper
processing.

Performance testing
Software that performs the required functions but does not conform to
performance requirements is unacceptable. Performance testing is designed to
test run-time performance of software within the context of an integrated
system. Performance testing occurs through all the steps in the testing process.
However, it is not until all system elements are fully integrated that the true
performance of a system can be ascertained.

Guest Registration and Verification System 172


Guest Registration and Verification System 173
6. MAINTENANCE FEATURES

Not all jobs run successfully. Sometimes an unexpected boundary condition or an


overload causes an error. Sometimes the o/p fails to pass controls. Sometimes
program bugs may appear. No matter what the problem, a previously working
system that ceases to function, requires emergency maintenance. Isolating
operational problems is not always an easy task, particularly when combinations
of circumstances are responsible. The ease with which a problem can be
corrected is directly related to how well a system has been designed and
documented.
Changes in environment may lead to maintenance requirement. For example,
new reports may need to be generated, competitors may alter market conditions,
a new manager may have a different style of decision-making, organization
policies may change, etc. Information should be able to accommodate changing
needs. The design should be flexible to allow new features to be added with ease.
Although software does not wear out like hardware, integrity of the program, test
data and documentation degenerate as a result of modifications. Hence, the
system will need maintenance.

Maintenance covers a wide range of activities such as correcting code, design


errors, updating documentation and upgrading user support. Software
maintenance can be classified into four types:

6.1 Types of maintenance

Corrective maintenance
It means repairing processing or performance failures, or making changes
because of previously uncorrected problems or false assumptions. It involves
changing the software to correct defects.
1. Debugging and correcting errors or failures and emergency fixes.
2. Fixing errors due to incomplete specifications, which may result in erroneous
assumptions, such as assuming an employee code is 5 numeric digits instead of 5
characters.

Adaptive maintenance
Over time the environment for which the software was developed is likely to
change. Adaptive maintenance results in modifications to the software to
accommodate changes in the external environment.
For example:
1. Report formats may have been changed.
Guest Registration and Verification System 174
2. New hardware may have been installed (changing from 16-bit to 32-
bit environment)

Perfective maintenance (Enhancement)


This implies changing the performance or modifying the program to improve or
enhance the system. It extends the software beyond its original functional
requirements. This type of maintenance involves more time and money than both
corrective and adaptive maintenance.
For example:
1. Automatic generation of dates and invoice numbers.
2. Reports with graphical analysis such as pie charts, bar charts, etc.
3. Providing on-line help system

Preventive maintenance (Re-engineering)


Preventive maintenance is conducted to enable the software to serve the needs of
the end-user. It is done to prevent any more maintenance to the application
keeping future results in focus. Changes are made to the software so that it can be
corrected, adapted and enhanced more easily.
For example:
1. Application rebuilding from one platform to another.
2. Changing from a single-user to a multi-user environment.
In general software maintenance can be reduced by keeping the following points
in mind:
• A system should be planned keeping the future in mind.
• User specs should be accurate.
• The system design should be modular.
• Documentation should be complete.
• Proper steps must be followed during the development cycle.
• Testing should be thorough.

Guest Registration and Verification System 175


Gather change requirements

Analyze change requirements

Device code change strategies

Apply code change strategies

Update documents Integrate and test

Software maintenance has become an important area of work for many


companies. It is mostly being carried out as fire fighting operations, rather than as
systematic and planned activities.

Guest Registration and Verification System 176


BIBLIOGRAPHY

We referred some books which had provides us with much of guidance to develop the
code for the website. There are few good books and websites that we referred to
develop vb codes, database connectivity etc.
Apart from codes these books and websites had provides us with few good
techniques and methodologies to develop the website. There are a list of few books
and websites that we referred are:

BOOKS:
• ADO.Net By Wrox Publication

• VB.Net Black Book

• VB.Net By Wrox Publication

• SQL SERVER In Tec media,21 Days

WEBSITES FOR REFERENCE


• www.google.com
• www.educat.com
• www.aspcode.com
• www.codeguru.com
• www.funducode.com

Guest Registration and Verification System 177

You might also like