College Event Management System
College Event Management System
INTRODUCTION
College event Management Management System is being developed to
fulfill all the needs and requirements at management level. It is integrated with the
all management daily operations including activities, feedback, event. It is a web
based system that facilitates the running of college event, events or activities,
feedback of each event and displaying the achievements of management. The user
will login in the system with login id and password. Users are individuals who
interact with the system. All user interaction is performed through the user's web
browser. Users are provided with an online registration form before event user
should fill online form and submit details these details are compared with details in
database and if they match then user is provided with username and password
using this information user can login and event. If conditions are not correct entry
will be cancelled. It contains two level of user’s administrator level and voter level
where each level has different functionality. Management System software
manages complete management working system. It will have all the basic modules
and also it makes have all the basic modules and also it makes working fully
computerized which is very fast and efficient. College event Management
Management System is a software application which maintains records of the
students, Candidates, Users. This software is planned for event purpose which
saves lot of time and money, the event creation to take feedback from students for
any event happen in the management. It is a complete online project, for a firm to
run it successfully. It is compulsory to take feedback from clients. The front-end
will be HTML pages. Java code will be used for validation and processing of user
input and database it will act as a middle layer. Third layer of database will be
interacted with these layers, which would be MYSQL database. The web server
would be Apache Tomcat.
Abstract
Literature Survey:
[1] Developing an Information Management Strategy for Monash University
Author: A. Treloar
Abstract: This paper discusses the development of an information management
strategy for Monash University, focusing on aligning information management
practices with the institution's strategic goals. The study emphasizes the
importance of creating a coherent strategy to manage information effectively,
enhancing decision-making processes and operational efficiency within the
university context.
Existing System
Although there are many education based managements, there are less
computerized management systems to manage such managements in Sri Lanka
especially in northern part. Considering the fact that there are around fifty
managements in Sri Lankan universities and University Grant Commission is the
main organization which has the right to co-ordinate the functions in these
managements. At present, most of the managements organizing and managing
activities have been done manually. According to the situation of current analysis
managements faces difficulties when they managing the routine works that has
been done by them.
Disadvantage
Proposed System
The main objective is to develop a project which is an important step
towards streamlining this effort is to develop a framework and identify necessary
properties that a secure and trusted online management working system must
satisfy to reduce discovery redundancy. Such a framework will allow us to
evaluate as well as compare the merits of existing and future candidate in
management. System should support multi-user environment. System should be
fully automated. System should provide concrete security features like admin
creating users (students) and assigning privileges to them. System should be
capable to keep track of all the detailed descriptions of the activities and the whole
details of services offered by the admin. College management system can help to
get all or a particular student attendance information. Also it can help to maintain
the fees and accounting reports of college in proper way. This system also helps to
generate mark sheets of current year.
Advantage
● The benefits of college management system for the employee are they can
create any kind of certificate easily using this system.
● They can easily retrieve all information related to student and employee.
Admin has all the Collective records of students of all the branches.
● Admin can check all the records of employees of all managements anytime.
● This system gives easy approach to find the detail information for any
student/employee.
● Using this college management system it is very easy to handle all
functionality of college.
● This system is beneficial for both students and employees as they can get all
previous or current information when they need.
● This system is also helpful to maintain the student’s record like admission
record, fees record, exam result records.
Software Requirement:
Hardware Requirement:
1. 1 GB RAM
2. 80 GB Hard Disk
3. Above 2GHz Processor
4. Android Mobile With GPRS
Level 0:
Level 1:
Level 2:
UML Diagram
Use Case Diagram:
Class Diagram:
Sequence Diagram:
Activity Diagram:
Java (programming language)
History
The JAVA language was created by James Gosling in June 1991 for use in a
set top box project. The language was initially called Oak, after an oak tree that
stood outside Gosling's office - and also went by the name Green - and ended up
later being renamed to Java, from a list of random words. Gosling's goals were to
implement a virtual machine and a language that had a familiar C/C++ style of
notation. The first public implementation was Java 1.0 in 1995. It promised "Write
Once, Run Anywhere” (WORA), providing no-cost runtimes on popular platforms.
It was fairly secure and its security was configurable, allowing network and file
access to be restricted. Major web browsers soon incorporated the ability to run
secure Java applets within web pages. Java quickly became popular. With the
advent of Java 2, new versions had multiple configurations built for different types
of platforms. For example, J2EE was for enterprise applications and the greatly
stripped down version J2ME was for mobile applications. J2SE was the
designation for the Standard Edition. In 2006, for marketing purposes, new J2
versions were renamed Java EE, Java ME, and Java SE, respectively.
Primary goals
There were five primary goals in the creation of the Java language:
● Simple
● Architecture neutral
● Object oriented
● Portable
● Distributed
● High performance
In the Java programming language, all source code is first written in plain
text files ending with the .java extension. Those source files are then compiled
into .class files by the javac compiler.
A .class file does not contain code that is native to your processor; it
instead contains byte codes — the machine language of the Java Virtual Machine 1
(Java VM). The java launcher tool then runs your application with an instance of
the Java Virtual Machine.
You've already been introduced to the Java Virtual Machine; it's the base for
the Java platform and is ported onto various hardware-based platforms.
The API and Java Virtual Machine insulate the program from
the underlying hardware.
The Java Runtime Environment, or JRE, is the software required to run any
application deployed on the Java Platform. End-users commonly use a JRE in
software packages and Web browser plug-in. Sun also distributes a superset of the
JRE called the Java 2 SDK(more commonly known as the JDK), which includes
development tools such as the Javacompiler,Javadoc, Jarand debugger.
Uses OF JAVA
JSP :
The JSP syntax adds additional XML-like tags, called JSP actions, to be
used to invoke built-in functionality. Additionally, the technology allows for the
creation of JSP tag libraries that act as extensions to the standard HTML or XML
tags. Tag libraries provide a platform independent way of extending the
capabilities of a Web server.
JSPs are compiled into Java Servlet by a JSP compiler. A JSP compiler may
generate a servlet in Java code that is then compiled by the Java compiler, or it
may generate byte code for the servlet directly. JSPs can also be interpreted on-the-
fly reducing the time taken to reload changes
With the exception of cookies, HTTP and form submission data is not
available to JavaScript. And, since it runs on the client, JavaScript can't access
server-side resources like databases, catalogs, pricing information, and the like.
Static HTML. Regular HTML, of course, cannot contain dynamic information. JSP
is so easy and convenient that it is quite feasible to augment HTML pages that only
benefit marginally by the insertion of small amounts of dynamic data. Previously,
the cost of using dynamic data would preclude its use in all but the most valuable
instances.
ARCHITECTURE OF JSP
● The browser sends a request to a JSP page.
● The JSP page communicates with a Java bean.
● The Java bean is connected to a database.
● The JSP page responds to the browser.
The Java Servlet API allows a software developer to add dynamic content to
a Web server using the Java platform. The generated content is commonly HTML,
but may be other data such as XML. Servlet are the Java counterpart to non-Java
dynamic Web content technologies such as PHP, CGI and ASP.NET. Servlet can
maintain state across many server transactions by using HTTP cookies, session
variables or URL rewriting.
The Servlet API, contained in the Java package hierarchy javax. Servlet,
defines the expected interactions of a Web container and a Servlet. A Web
container is essentially the component of a Web server that interacts with the
Servlet. The Web container is responsible for managing the lifecycle of Servlet,
mapping a URL to a particular Servlet and ensuring that the URL requester has the
correct access rights.
The Web page is based on data submitted by the user. For example the
results pages from search engines are generated this way, and programs that
process orders for e-commerce sites do this as well. The data changes frequently.
For example, a weather-report or news headlines page might build the page
dynamically, perhaps returning a previously built page if it is still up to date. The
Web page uses information from corporate databases or other such sources. For
example, you would use this for making a Web page at an on-line store that lists
current prices and number of items in stock.
Some Web servers, such as Sun's Java Web Server (JWS), W3C's Jigsaw
and Gefion Software's Lite Web Server (LWS) are implemented in Java and have a
built-in Servlet engine. Other Web servers, such as Netscape's Enterprise Server,
Microsoft's Internet Information Server (IIS) and the Apache Group's Apache,
require a Servlet engine add-on module. The add-on intercepts all requests for
Servlet, executes them and returns the response through the Web server to the
client. Examples of Servlet engine add-ons are Gefion Software's WAI Cool
Runner, IBM's Web Sphere, Live Software's JRun and New Atlanta's Servlet Exec.
All Servlet API classes and a simple Servlet-enabled Web server are
combined into the Java Servlet Development Kit (JSDK), available for download
at Sun's official Servlet site .To get started with Servlet I recommend that you
download the JSDK and play around with the sample Servlet.
Each request is serviced in its own separate thread. The container calls the
service() method of the Servlet for every request.
The service() method determines the kind of request being made and
dispatches it to an appropriate method to handle the request. The developer of the
Servlet must provide an implementation for these methods. If a request for a
method that is not implemented by the Servlet is made, the method of the parent
class is called, typically resulting in an error being returned to the requester.
Finally, the container calls the destroy() method which takes the Servlet out of
service. The destroy() method like init() is called only once in the lifecycle of a
Servlet.
Instead of writing the response to stdout as you do with CGI, you get an
OutputStream or a PrintWriter from the HttpServletResponse. The OuputStream is
intended for binary data, such as a GIF or JPEG image, and the PrintWriter for text
output. You can also set all response headers and the status code, without having to
rely on special Web server CGI configurations such as Non Parsed Headers (NPH).
This makes your Servlet easier to install.
There is only one Servlet Context in every application. This object can be
used by all the Servlet to obtain application level information or container details.
Every Servlet, on the other hand, gets its own ServletConfig object. This object
provides initialization parameters for a servlet. A developer can obtain the
reference to Servlet Context using either the ServletConfig object or Servlet
Request object.
All servlets belong to one servlet context. In implementations of the 1.0 and
2.0 versions of the Servlet API all servlets on one host belongs to the same context,
but with the 2.1 version of the API the context becomes more powerful and can be
seen as the humble beginnings of an Application concept. Future versions of the
API will make this even more pronounced.
Many servlet engines implementing the Servlet 2.1 API let you group a set
of servlets into one context and support more than one context on the same host.
The Servlet Context in the 2.1 API is responsible for the state of its servlets and
knows about resources and attributes available to the servlets in the context. Here
we will only look at how Servlet Context attributes can be used to share
information among a group of servlets.
There are three Servlet Context methods dealing with context attributes: get
Attribute, set Attribute and remove Attribute. In addition the servlet engine may
provide ways to configure a servlet context with initial attribute values. This serves
as a welcome addition to the servlet initialization arguments for configuration
information used by a group of servlets, for instance the database identifier we
talked about above, a style sheet URL for an application, the name of a mail server,
etc.
JDBC
A database that another program links to is called a data source. Many data
sources, including products produced by Microsoft and Oracle, already use a
standard called Open Database Connectivity (ODBC). Many legacy C and Perl
programs use ODBC to connect to data sources. ODBC consolidated much of the
commonality between database management systems. JDBC builds on this feature,
and increases the level of abstraction. JDBC-ODBC bridges have been created to
allow Java programs to connect to ODBC-enabled database software.
JDBC Architecture
The JDBC API supports both two-tier and three-tier processing models for
database access.
In the two-tier model, a Java applet or application talks directly to the data
source. This requires a JDBC driver that can communicate with the particular data
source being accessed. A user's commands are delivered to the database or other
data source, and the results of those statements are sent back to the user. The data
source may be located on another machine to which the user is connected via a
network. This is referred to as a client/server configuration, with the user's machine
as the client, and the machine housing the data source as the server. The network
can be an intranet, which, for example, connects employees within a corporation,
or it can be the Internet.
Until recently, the middle tier has often been written in languages such as C
or C++, which offer fast performance. However, with the introduction of
optimizing compilers that translate Java byte code into efficient machine-specific
code and technologies such as Enterprise JavaBeans™, the Java platform is fast
becoming the standard platform for middle-tier development. This is a big plus,
making it possible to take advantage of Java's robustness, multithreading, and
security features.
Testing
Levels
1. Unit testing. White-box testing is done during unit testing to ensure that the
code is working as intended, before any integration happens with previously
tested code. White-box testing during unit testing catches any defects early
on and aids in any defects that happen later on after the code is integrated
with the rest of the application and therefore prevents any type of errors
later on.
2. Integration testing. White-box testing at this level are written to test the
interactions of each interface with each other. The Unit level testing made
sure that each code was tested and working accordingly in an isolated
environment and integration examines the correctness of the behaviour in an
open environment through the use of white-box testing for any interactions
of interfaces that are known to the programmer.
3. Regression testing. White-box testing during regression testing is the use of
recycled white-box test cases at the unit and integration testing levels.
Test procedures
Specific knowledge of the application's code/internal structure and
programming knowledge in general is not required. The tester is aware of what the
software is supposed to do but is not aware of how it does it. For instance, the
tester is aware that a particular input returns a certain, invariable output but is not
aware of how the software produces the output in the first place.
Test cases
Test cases are built around specifications and requirements, i.e., what the
application is supposed to do. Test cases are generally derived from external
descriptions of the software, including specifications, requirements and design
parameters. Although the tests used are primarily functional in nature, non-
functional tests may also be used. The test designer selects both valid and invalid
inputs and determines the correct output without any knowledge of the test object's
internal structure.
Ideally, each test case is independent from the others. Substitutes such
as method stubs, mock objects, fakes, and test harnesses can be used to assist
testing a module in isolation. Unit tests are typically written and run by software
developers to ensure that code meets its design and behaves as intended. Its
implementation can vary from being very manual (pencil and paper)to being
formalized as part of build automation.
Testing will not catch every error in the program, since it cannot evaluate
every execution path in any but the most trivial programs. The same is true for unit
testing. Additionally, unit testing by definition only tests the functionality of the
units themselves. Therefore, it will not catch integration errors or broader system-
level errors (such as functions performed across multiple units, or non-functional
test areas such as performance).
This obviously takes time and its investment may not be worth the effort.
There are also many problems that cannot easily be tested at all – for example
those that are nondeterministic or involve multiple threads. In addition, code for a
unit test is likely to be at least as buggy as the code it is testing. Fred Brooks in The
Mythical Man-Month quotes: never take two chronometers to sea. Always take one
or three. Meaning, if two chronometers contradict, how do you know which one is
correct?
Another challenge related to writing the unit tests is the difficulty of setting
up realistic and useful tests. It is necessary to create relevant initial conditions so
the part of the application being tested behaves like part of the complete system. If
these initial conditions are not set correctly, the test will not be exercising the code
in a realistic context, which diminishes the value and accuracy of unit test results.
Functional testing
Functional testing differs from system testing in that functional testing "verifies a
program by checking it against ... design document(s) or specification(s)", while
system testing "validate a program by checking it against the published user or
system requirements" (Kane, Falk, Nguyen 1999, p. 52).
Performance testing
Testing types
Load testing
Stress testing
Soak testing
Spike testing
Configuration testing
Rather than testing for performance from the perspective of load, tests are
created to determine the effects of configuration changes to the system's
components on the system's performance and behaviour. A common example
would be experimenting with different methods of load-balancing.
Isolation testing
Integration testing
Integration testing (sometimes called integration and testing,
abbreviated I&T) is the phase in software testing in which individual software
modules are combined and tested as a group. It occurs after unit testing and
before validation testing. Integration testing takes as its input modules that have
been unit tested, groups them in larger aggregates, applies tests defined in an
integration test plan to those aggregates, and delivers as its output the integrated
system ready for system testing.
Purpose
Test cases are constructed to test whether all the components within
assemblages interact correctly, for example across procedure calls or process
activations, and this is done after testing individual modules, i.e. unit testing. The
overall idea is a "building block" approach, in which verified assemblages are
added to a verified base which is then used to support the integration testing of
further assemblages.
Some different types of integration testing are big bang, top-down, and
bottom-up. Other Integration Patterns are: Collaboration Integration, Backbone
Integration, Layer Integration, Client/Server Integration, Distributed Services
Integration and High-frequency Integration.
Big Bang
In this approach, all or most of the developed modules are coupled together
to form a complete software system or major part of the system and then used for
integration testing. The Big Bang method is very effective for saving time in the
integration testing process. However, if the test cases and their results are not
recorded properly, the entire integration process will be more complicated and may
prevent the testing team from achieving the goal of integration testing.
A type of Big Bang Integration testing is called Usage Model testing. Usage
Model Testing can be used in both software and hardware integration testing. The
basis behind this type of integration testing is to run user-like workloads in
integrated user-like environments. In doing the testing in this manner, the
environment is proofed, while the individual components are proofed indirectly
through their use.
For integration testing, Usage Model testing can be more efficient and
provides better test coverage than traditional focused functional integration testing.
To be more efficient and accurate, care must be used in defining the user-like
workloads for creating realistic scenarios in exercising the environment. This gives
confidence that the integrated environment will work as expected for the target
customers.
Top-down and Bottom-up
The main advantage of the Bottom-Up approach is that bugs are more easily found.
With Top-Down, it is easier to find a missing branch link
It is sometimes said that validation can be expressed by the query "Are you
building the right thing?" and verification by "Are you building it right?"In
practice, the usage of these terms varies. Sometimes they are even used
interchangeably.
The PMBOK guide, an IEEE standard, defines them as follows in its 4th edition
● "Validation. The assurance that a product, service, or system meets the needs
of the customer and other identified stakeholders. It often involves acceptance
and suitability with external customers. Contrast with verification."
● "Verification. The evaluation of whether or not a product, service, or system
complies with a regulation, requirement, specification, or imposed condition. It
is often an internal process. Contrast with validation."
● It is sometimes said that validation can be expressed by the query "Are you
building the right thing?" and verification by "Are you building it
right?". "Building the right thing" refers back to the user's needs, while
"building it right" checks that the specifications are correctly implemented
by the system. In some contexts, it is required to have written requirements
for both as well as formal procedures or protocols for determining
compliance.
● It is entirely possible that a product passes when verified but fails when
validated. This can happen when, say, a product is built as per the
specifications but the specifications themselves fail to address the user’s
needs.
Activities
Torres and Hyman have discussed the suitability of non-genuine parts for
clinical use and provided guidelines for equipment users to select appropriate
substitutes which are capable to avoid adverse effects. In the case when genuine
parts/devices/software are demanded by some of regulatory requirements, then re-
qualification does not need to be conducted on the non-genuine assemblies.
Instead, the asset has to be recycled for non-regulatory purposes.
As a rule, system testing takes, as its input, all of the "integrated" software
components that have passed integration testing and also the software system itself
integrated with any applicable hardware system(s). The purpose of integration
testing is to detect any inconsistencies between the software units that are
integrated together (called assemblages) or between any of the assemblages and
the hardware. System testing is a more limited type of testing; it seeks to detect
defects both within the "inter-assemblages" and also within the system as a whole.
The following examples are different types of testing that should be considered
during System testing:
Structure Testing:
● Final Stage, before handling over to the customer which is usually carried
out by the customer where the test cases are executed with actual data.
● The system under consideration is tested for user acceptance and constantly
keeping touch with the prospective system user at the time of developing
and making changes whenever required.
● It involves planning and execution of various types of test in order to
demonstrate that the implemented software system satisfies the requirements
stated in the requirement document.
Two set of acceptance test to be run:
Feasibility Study
Objective:
Develop a College Event Management System to streamline the planning,
coordination, and execution of college events. The system will facilitate event
scheduling, registration, and management for students and faculty.
Scope:
Users: Students, Faculty, Event Organizers, Admins
Features: Event scheduling, registration, notifications, resource
management, feedback collection.
Technical Feasibility:
Technology Stack: Web technologies such as React for frontend, Node.js or
Python for backend, and relational databases like PostgreSQL or NoSQL
databases like MongoDB.
Integration: Ability to integrate with email systems, calendars, and social
media for notifications and updates.
Financial Feasibility:
Development Costs: Budget for software development, user interface
design, and initial deployment.
Maintenance Costs: Ongoing costs for server hosting, software updates,
and technical support.
Licensing Fees: Potential costs for third-party tools or libraries used in the
system.
Operational Feasibility:
Implementation: Ease of integration with existing college systems and
infrastructure.
Support: Adequate technical support and user assistance.
Training: Training for users and administrators to effectively use the
system.
Legal Feasibility:
Data Protection: Ensure compliance with data protection regulations like
GDPR or CCPA for handling user data.
Accessibility: Adhere to accessibility standards to make the system usable
by individuals with disabilities.
Feasibility Analysis
1. Technical Feasibility:
Technology Stack: Use React for frontend development, Node.js/Python for
backend, and PostgreSQL/MongoDB for the database.
Integration: Support for integration with email and calendar services.
Security: Implement user authentication and data encryption to secure
information.
2. Financial Feasibility:
Initial Costs: Expenses related to development, design, and deployment.
Ongoing Costs: Costs for hosting, maintenance, and support.
Budget Planning: Evaluate funding requirements and financial
sustainability.
3. Operational Feasibility:
Deployment: Assess the ease of deploying the system within the college's
IT infrastructure.
Support and Maintenance: Ensure ongoing support and regular
maintenance for the system.
User Training: Develop training materials and provide sessions for users
and admins.
4. Legal Feasibility:
Compliance: Adhere to relevant data protection laws and accessibility
standards.
Privacy: Ensure secure handling and storage of user information.
System Analysis
1. System Architecture:
Frontend: React-based interface for managing events, registrations, and
user interactions.
Backend: Node.js or Python server to handle business logic and data
management.
Database: PostgreSQL or MongoDB for storing event details, user data, and
registration information.
2. Components:
Event Management: Tools for creating, scheduling, and managing events.
Registration System: Allow users to register for events and track their
participation.
Resource Allocation: Manage and allocate resources such as venues,
equipment, and materials.
Notifications: Automated notifications and reminders for event updates and
deadlines.
Feedback Collection: Mechanisms for collecting and analyzing feedback
from event participants.
3. Data Flow:
User Actions: Event creation, registration, and feedback submission.
Backend Processing: Handling user requests, updating the database, and
sending notifications.
Notifications: Inform users about event details, registration status, and
feedback collection.
4. User Roles:
Students: Register for events, view event details, and provide feedback.
Faculty: Organize events, manage resources, and monitor registrations.
Event Organizers: Coordinate event logistics and manage event schedules.
Admins: Oversee system operations, manage users, and handle support
issues.
System Requirements
A. Functional Requirements:
Event Scheduling: Create and manage event schedules with details like
date, time, and location.
Registration Management: Allow users to register for events and manage
their registrations.
Resource Management: Allocate and manage resources needed for events.
Notification System: Send automated notifications and reminders about
events and registrations.
Feedback Collection: Collect and analyze feedback from event participants.
B. Non-Functional Requirements:
Performance: Ensure fast response times and efficient handling of user
requests.
Scalability: Support a growing number of events and users.
Security: Implement strong security measures for user data and system
access.
Usability: Provide an intuitive and user-friendly interface for all user roles.
Reliability: High uptime and consistent availability of the system.
Compliance: Adhere to data protection regulations and accessibility
standards.
CONCLUSION
The overall speedup is considerably higher than the manual work. The
management system enhances the functionalities of the routine works of the
management in a number of ways. The computerization helps the users a lot to
minimize the working time with ease. The management staffs get information in
desired manner. Data retrieval is also easy and fast. This also restricts the users to
enter invalid data and reduces the burden on the management. The data
maintaining has been made quite simple such as searching of records and records
maintenance. The error rate reduced dramatically with the use of management
management system.
FUTURE SCOPE
This portal is used by the admin so there is no data leakage and it can handled
securely. Delivering such software to the management it helps to take place task
with ease and that’s why it reduces time, money on manpower and efforts. we have
event module through which students to get the notices of upcoming events. And
students can provide feedback about happened events in the management. Students
can select GS, LR, CR in the voting module. It is a open source application so that
others can edit and transform this system application according to their needs can
be an future enhancement in project.
REFERENCES
[1] Treloar, A. (2005). Developing an Information Management Strategy for
Monash University'. Proceedings of Educause AustralAsia 2005.
[3] Haag, S., Cummings, M., & Dawkins, J. (1998). Management information
systems. Multimedia systems, 279, 280-297.
[6] McLeod Jr, R., & Schell, G. (2001). Management Information Systems
8/E.Chapter-17" Marketing Information System" published in.
[7] Reddy, G. S., Srinivasu, R., Rikkula, S. R., & Rao, V. S. (2009). Management
information system to help managers for providing decision making in an
organization. International Journal of Reviews in Computing, 1-6.
CODE-
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>Event Management</title>
<link href="https://fonts.googleapis.com/css?family=Poppins:400,700,900"
rel="stylesheet">
<!--[if lt IE 9]>
<script
src="https://oss.maxcdn.com/html5shiv/3.7.3/html5shiv.min.js"></script>
<script
src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script>
<![endif]-->
</head>
<body>
<div class="container">
<div class="navbar-header">
<div class="navbar-brand">
</a>
</div>
<button class="navbar-toggle">
</button>
</div>
<nav id="nav">
<li><a href="#home">Home</a></li>
<li><a href="#about">About</a></li>
<li><a href="#schedule">Schedule</a></li>
<li><a href="#contact">Contact</a></li>
<li><a href="admin.jsp">Admin</a></li>
<li><a href="eventPage.jsp">Event</a></li>
</ul>
</nav>
</div>
</header>
<div id="home">
<div class="home-wrapper">
<div class="container">
<div class="row">
<div class="home-content">
</div>
</div>
</div>
</div>
</div>
<div class="container">
<div class="row">
<div class="section-title">
</div>
<div class="col-md-8 col-md-offset-2 text-center">
<div class="about-content">
<p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod
tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam,
quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo
consequat. Duis aute irure
</div>
<!--<div id="numbers">
<div class="row">
<div class="number">
<p>Hours</p>
</div>
</div>
<div class="number">
<p>Venues</p>
</div>
</div>
<div class="number">
<p>Country</p>
</div>
</div>
<p>Speakers</p>
</div>
</div>
</div>
</div>-->
</div>
</div>
</div>
</div>
<div id="galery">
<div class="container">
<div class="row">
<div class="galery-item">
</div>
<div class="galery-item">
</div>
<div class="galery-item">
</div>
</div>
</div>
</div>
</div>
<div class="container">
<div class="row">
<div class="section-title">
</div>
<div class="events-wrapper">
<div class="event">
<div class="event-day">
<div>
<span class="day">15</span>
</div>
</div>
<div class="event-content">
<p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod
tempor incididunt ut labore et dolore magna aliqua.</p>
</div>
</div>
<div class="event">
<div class="event-hour"></div>
<div class="event-content">
<p class="event-time"><i class="fa fa-clock-o"></i> 8 : 00 AM - 11 : 00 AM</p>
<p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod
tempor incididunt ut labore et dolore magna aliqua.</p>
</div>
</div>
<div class="event">
<div class="event-hour"></div>
<div class="event-content">
<p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod
tempor incididunt ut labore et dolore magna aliqua.</p>
</div>
</div>
<div class="event">
<div class="event-day">
<div>
<span class="day">16</span>
</div>
</div>
<div class="event-content">
<p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod
tempor incididunt ut labore et dolore magna aliqua.</p>
</div>
</div>
<div class="event">
<div class="event-hour"></div>
<div class="event-content">
<p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod
tempor incididunt ut labore et dolore magna aliqua.</p>
</div>
</div>
<div class="event">
<div class="event-day">
<div>
<span class="day">17</span>
</div>
</div>
<div class="event-content">
<p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod
tempor incididunt ut labore et dolore magna aliqua.</p>
</div>
<div class="event">
<div class="event-hour"></div>
<div class="event-content">
<p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod
tempor incididunt ut labore et dolore magna aliqua.</p>
</div>
</div>
</div>
<div class="download-btn">
</div>
</div>
</div>
</div>
</div>
<div class="container">
<div class="row">
<div class="section-title">
</div>
<div class="speaker-img">
<div class="speaker-body">
<div class="speaker-social">
</div>
<div class="speaker-content">
<h2>John Doe</h2>
<span>Manager, CEO</span>
</div>
</div>
</div>
</div>
<div class="speaker-img">
</div>
<div class="speaker-body">
<div class="speaker-social">
</div>
<div class="speaker-content">
<h2>John Doe</h2>
<span>Manager, CEO</span>
</div>
</div>
</div>
</div>
<div class="speaker-img">
</div>
<div class="speaker-body">
<div class="speaker-social">
</div>
<div class="speaker-content">
<h2>John Doe</h2>
<span>Manager, CEO</span>
</div>
</div>
</div>
</div>
<div class="modal-dialog">
<div class="modal-content">
<div class="modal-body">
<div class="row">
<div class="col-md-5">
<div class="speaker-modal-img">
</div>
</div>
<div class="col-md-7">
<div class="speaker-modal-content">
<p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod
tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam,
quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo
consequat. Duis aute
irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla
pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui
officia deserunt mollit anim id est laborum.</p>
<div class="speaker-website">
<h4>Website</h4>
<a href="#">www.johndoe.com</a>
</div>
<div class="speaker-social">
<h4>Social Profile</h4>
</div>
<div class="speaker-events">
<h4>Sessions</h4>
<div class="speaker-event">
</div>
<div class="speaker-event">
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="container">
<div class="row">
<div class="section-title">
</div>
<div class="col-md-3 col-sm-4 col-xs-6">
</a>
</div>
</a>
</div>
</a>
</div>
</a>
</div>
</a>
</div>
</a>
</div>
</a>
</div>
</a>
</div>
</div>
</div>
</div>
<div class="container">
<div class="row">
<div class="section-title">
</div>
<div class="col-sm-4">
<div class="contact">
<h3>Address</h3>
<p>Pantech Solution<br>
T-nagar, chennai</p>
</div>
</div>
<div class="col-sm-4">
<div class="contact">
<h3>Phone</h3>
<p>9600066689</p>
</div>
</div>
<div class="col-sm-4">
<div class="contact">
<h3>Email</h3>
</div>
</div>
</div>
</div>
<div id="map"></div>
</div>
<footer id="footer">
<div class="container">
<div class="row">
<div class="footer-brand">
</a>
</div>
</div>
<div class="contact-social">
</div>
</div>
</div>
</div>
</footer>
<script src="js/jquery.min.js"></script>
<script src="js/bootstrap.min.js"></script>
<script src="js/jquery.waypoints.min.js"></script>
<script src="js/owl.carousel.min.js"></script>
<script src="js/jquery.stellar.min.js"></script>
<!--<script src="https://maps.googleapis.com/maps/api/js?
v=3.exp&sensor=false"></script>-->
<!--<script src="js/google-map.js"></script>-->
<script src="js/jquery.countTo.js"></script>
<script src="js/main.js"></script>
<script>
function gtag(){dataLayer.push(arguments);}
gtag('config', 'UA-23581568-13');
</script>
</body>
</html>
Admin-
<%--
Document : admin
Author : Prabu
--%>
<%@page contentType="text/html" pageEncoding="UTF-8"%>
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Event Management</title>
<link href="https://fonts.googleapis.com/css?family=Poppins:400,700,900"
rel="stylesheet">
</head>
<body>
<center>
<br><br><br>
<br><br><br>
<br><br><br>
<br><br><br>
<br><br><br>
</center>
<div class="section-bg"
style="background-image:url(./img/background03.jpg)" data-stellar-
background-ratio="0.5"></div>
</form>
</html>
<%--
Document : admin
Author : Prabu
--%>
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>Event Management</title>
<link href="https://fonts.googleapis.com/css?family=Poppins:400,700,900"
rel="stylesheet">
<title>ADMIN</title>
</head>
<body>
<center>
<br><br>
<br><br>
<br><br>
<a href="evntlist.jsp" class="main-btn" style="height: 70px;width:
300px">Participants Result Declaration</a>
<br><br>
<br><br>
</center>
<div class="section-bg"
style="background-image:url(./img/background03.jpg)" data-stellar-
background-ratio="0.5"></div>
</form>
</html>
Backend code-
/*
*/
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.*;
import java.sql.PreparedStatement;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
/**
* @author Prabu
*/
/**
*/
response.setContentType("text/html;charset=UTF-8");
/* TODO output your page here. You may use following sample code. */
out.println("<!DOCTYPE html>");
out.println("<html>");
out.println("<head>");
out.println("<title>Servlet AdminLog</title>");
out.println("</head>");
out.println("<body>");
out.println("</body>");
out.println("</html>");
/**
*/
@Override
processRequest(request, response);
/**
* Handles the HTTP <code>POST</code> method.
*/
@Override
String s1=request.getParameter("in1");
String s2=request.getParameter("in2");
Connection con=null;
Statement ps=null;
ResultSet rs=null;
try{
Class.forName("com.mysql.jdbc.Driver");
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/events"
,"root","password");
ps=con.createStatement();
if(rs.next())
response.sendRedirect("AdPg.jsp");
else{
response.sendRedirect("error.jsp");
System.out.println(e);
/**
*/
@Override
}// </editor-fold>
Comlog.java
/*
*/
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.DriverManager;
//import java.sql.PreparedStatement;
import java.sql.ResultSet;
import java.sql.*;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
/**
* @author Prabu
*/
/**
* methods.
*/
protected void processRequest(HttpServletRequest request,
HttpServletResponse response)
response.setContentType("text/html;charset=UTF-8");
/* TODO output your page here. You may use following sample code. */
out.println("<!DOCTYPE html>");
out.println("<html>");
out.println("<head>");
out.println("<title>Servlet ComLog</title>");
out.println("</head>");
out.println("<body>");
out.println("</body>");
out.println("</html>");
/**
*/
@Override
processRequest(request, response);
/**
*/
@Override
protected void doPost(HttpServletRequest request, HttpServletResponse
response)
String s1=request.getParameter("in1");
String s2=request.getParameter("in2");
String s3=request.getParameter("b1");
System.out.println(s3+"???");
Connection con=null;
Statement ps=null;
ResultSet rs=null;
try{
if(s3.equals("evn")){
Class.forName("com.mysql.jdbc.Driver");
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/events"
,"root","password");
ps=con.createStatement();
response.sendRedirect("eventact.jsp");
else{
response.sendRedirect("error.jsp");
if(s3.equals("hod")){
Class.forName("com.mysql.jdbc.Driver");
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/events"
,"root","password");
ps=con.createStatement();
if(rs.next())
{
response.sendRedirect("hodapr.jsp");
else{
response.sendRedirect("error.jsp");
if(s3.equals("prin")){
Class.forName("com.mysql.jdbc.Driver");
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/events"
,"root","password");
ps=con.createStatement();
if(rs.next())
response.sendRedirect("priapr.jsp");
}
else{
response.sendRedirect("error.jsp");
System.out.println(e);
/**
*/
@Override
}// </editor-fold>
/*
*/
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.ResultSet;
import java.sql.SQLException;
import java.sql.Statement;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
/**
* @author Prabu
*/
/**
* methods.
*/
response.setContentType("text/html;charset=UTF-8");
out.println("<!DOCTYPE html>");
out.println("<html>");
out.println("<head>");
out.println("<title>Servlet EventReg</title>");
out.println("</head>");
out.println("<body>");
out.println("</body>");
out.println("</html>");
/**
*/
@Override
processRequest(request, response);
/**
*/
@Override
HttpSession session1=request.getSession();
Connection con=null;
Statement st=null;
ResultSet rs1=null;
try
String s1=request.getParameter("in1");
String s2=request.getParameter("in2");
String s3=request.getParameter("in3");
String s4=request.getParameter("in4");
String s5=request.getParameter("in5");
String s6=request.getParameter("in6");
String s7=request.getParameter("event");
Class.forName("com.mysql.jdbc.Driver");
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/events",
"root","password");
st=con.createStatement();
if(rs>0)
{
response.sendRedirect("index.jsp");
System.out.println(e);
/**
*/
@Override
}// </editor-fold>
Eventreg.java
/*
*/
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.ResultSet;
import java.sql.SQLException;
import java.sql.Statement;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
/**
* @author Prabu
*/
/**
* methods.
*/
response.setContentType("text/html;charset=UTF-8");
/* TODO output your page here. You may use following sample code. */
out.println("<!DOCTYPE html>");
out.println("<html>");
out.println("<head>");
out.println("<title>Servlet EventReg</title>");
out.println("</head>");
out.println("<body>");
out.println("</body>");
out.println("</html>");
/**
*/
@Override
processRequest(request, response);
/**
*/
@Override
HttpSession session1=request.getSession();
Connection con=null;
Statement st=null;
ResultSet rs1=null;
try
{
String s1=request.getParameter("in1");
String s2=request.getParameter("in2");
String s3=request.getParameter("in3");
String s4=request.getParameter("in4");
String s5=request.getParameter("in5");
String s6=request.getParameter("in6");
String s7=request.getParameter("event");
Class.forName("com.mysql.jdbc.Driver");
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/events",
"root","password");
st=con.createStatement();
if(rs>0)
response.sendRedirect("index.jsp");
/**
*/
@Override
}// </editor-fold>
HOdreg.java
/*
*/
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.DriverManager;
import java.sql.ResultSet;
import java.sql.SQLException;
import java.sql.Statement;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
/**
* @author Prabu
*/
/**
* Processes requests for both HTTP <code>GET</code> and
<code>POST</code>
* methods.
*/
response.setContentType("text/html;charset=UTF-8");
/* TODO output your page here. You may use following sample code. */
out.println("<!DOCTYPE html>");
out.println("<html>");
out.println("<head>");
out.println("<title>Servlet HodReg</title>");
out.println("</head>");
out.println("<body>");
out.println("</html>");
/**
*/
@Override
processRequest(request, response);
}
/**
*/
@Override
HttpSession session1=request.getSession();
Connection con=null;
Statement st=null;
ResultSet rs1=null;
try
String s1=request.getParameter("in1");
String s2=request.getParameter("in2");
String s3=request.getParameter("in3");
String s4=request.getParameter("in4");
String s5=request.getParameter("in5");
String s6=request.getParameter("in6");
Class.forName("com.mysql.jdbc.Driver");
con=DriverManager.getConnection("jdbc:mysql://localhost:3306/events",
"root","password");
st=con.createStatement();
if(rs>0)
response.sendRedirect("index.jsp");
System.out.println(e);
}
/**
*/
@Override
}// </editor-fold>
Final.db
/*
*******************************************************************
**
*/
USE `events`;
insert into
`evntco`(`evname`,`evpass`,`evphno`,`evmail`,`evaddr`,`evdept`,`evnm`) values
('anbu','asdf','9876543212','[email protected]','chennai','ECE','Symposium');
insert into
`windecl`(`sno`,`stdnm`,`stdem`,`winrun`,`evnt`,`typen`,`hstatus`,`pstatus`,`filen
ame`,`time1`,`otp1`) values
(1,'std001','[email protected]','Winner','Symposium','PPT','Appro
ved','Approved','eventdb.sql','23:23','forvuh'),
(2,'std002',NULL,'Runner','Symposium','PPT','Approved','Approved','cer22.docx'
,NULL,NULL),
(3,'std003','','Winner','Symposium','PPT','Approved','Approved','evedb.sql',NUL
L,NULL),
(4,'std001','[email protected]','Runner','Symposium','PPT','Appro
ved','Approved','eventdb.sql','23:23','forvuh'),
(5,'std001','[email protected]','Winner','Symposium','Mock
Interview','Approved','Approved','eventdb.sql','23:23','forvuh'),
(6,'',NULL,'Runner','Symposium','Mock
Interview','pending','pending',NULL,NULL,NULL);