Web application proposal pdf




















Net frame work 4. NET Xml Web service. These can also be constraints or restrictions on the design of the system, they can also be considered as design constraints. Below mentioned are a set of system requirements that usually do not represent functional requirements or are functional but are shared by the use cases. The application is also ensured that users and client application can only access data and services for which they have been properly authorized.

So in every action- response of the system, there are no immediate delays. Load balancers will be used to increase capacity concurrent users and reliability of applications.

To scale horizontally or scale out means to add more nodes to a system, to increase the ability of proposed system, network and to handle the growing amount of work in a capable manner.

A stand-by database is a database replica created from a backup of a primary database. By applying archived redo logs from the primary database to the stand-by database, you can keep the two databases synchronized. Read replicas makes it easy to elastically scale out beyond the capacity constraints of a single DB Instance for read-heavy database workloads.

You can create one or more replicas of a given source DB Instance. No Component Web 1. Programming language. No Component Technology 1. Programming Framework. Changes leading to fresh development shall be charged as per the requirement. The following are a list of activities that would be carried out as a part of support and maintenance: 1. Ensuring there is no impact on applications due to operating system and other patches installed.

If required, changes will be done to support new OS version of supported platform. Conducting the testing on UAT before implementing patch in Production. And also checking the impact in production post release. Publishing periodic reports on service requests, time spent on service requests, with a view of adherence to SLAs.

Monthly reports on service requests and support, issue fixes to be presented for review. Update is sent at fixed agreed intervals.

Publishing Escalation matrix to all users and partners in case of issues on a specific functionality Performing application Monitoring and resolving encountered issues. It focuses on scope flexibility, adaptive planning and delivering potentially shippable product at the end of each iteration. The process has been adapted from the best practices of agile methodologies such as Scrum and Extreme Programming specifically tailored for Kellton.

During this phase, the business analyst will interact closely with various stake holders of NPCI and gather the requirements for the development. Some user stories will be written to ensure that the key usage scenarios are considered. Verification would be done to ensure that the non-functional requirements like scalability, concurrent users, expected response times, internationalization, and cross-browser portability have been captured.

The effort estimate is compared with the expected timeframes for a successfully delivery. Everything that we do at present is intentional. With UX, intentions complement user goals and psychology, has a defined pattern and come together to produce beautiful results. We increase our customer base; can generate more leads and a meaningful ROI. UX is how a person feels when interacting with a product. And moreover, they need to enjoy that interaction.

This stage varies based on complexity of the product, timing, resources, level of existing knowledge, and many other factors. If you have an existing product, reviewing analytics, heuristics, content, product context, and user tests are also quite helpful.

At this point, the product definition, product priorities, and product plan has been defined and are ready for more formal design deliverables. Sketches and diagrams are also likely constantly being generated throughout this time. Common documentation includes sketches, wireframes, prototypes, task-flow diagrams, and design specifications.

For example, competitive analysis and personas created during research and analysis feed into the mockups, concept maps, and scenarios. In turn, these pieces influence intermediate and advanced deliverables such as wireframes, storyboards, and detailed mockups. Some companies treat the Research, Analysis, and Design phase as one large process.

With the offering in production mode, data should be continually generated and monitored in the form of analytics and reports to ensure continued success.

Keeping in mind the Five Pillars of Interaction design, we strive to deliver a goal-driven design, enhance usability, reduce the learning curve of the users, and give appropriate responses and feedback to the users. The UI and UX conventions of different operating systems are different, and touch points and menus work in different ways. A modular approach to the detailed design will be taken in the design process to allow development tasks for those approved components to commence while design on the remaining components is completed.

Project Manager verifies that the architecture supports all documented use cases functional requirements and non-functional requirements. Final architecture document is reviewed to ensure its completeness for the implementation. Detailed architecture consisting of services, components and the interfaces between them is created.

The Project Manager, Developers will be involved in this phase for a period as mentioned in project plan. All the developers working on the web application design and development will be experienced on our best practices in Coding, Version Control, Unit testing and bug fixes.

Testing Phase Before delivery the application will be tested for following compliancy — This phase starts with the specification of the test plans. These plans are prepared as soon as the analysis phase is complete.

After the completion of the development phase, the quality analyst determines if the software constructed meets the objectives. This includes the business functionality, cross browser testing and other technical requirements for performance. Our quality team is also equipped with development expertise to develop custom tools for automated testing. The output of this phase is a test plan document, quality certification document, executed test cases and a staged deployment of the application.

Once the final product is deployed, Kellton Tech does one final round of testing, do all the configurations required. Each sprint will contain one complete auto build process for sprint release. Doing UAT and providing feedback within the Development of website and backend time mentioned and agree in the final project plan from a milestone release.

Maintain source code versions, Manage and perform all releases. Help during deployment on live server. Support and Maintenance during and post Deployment. The tentative project plan is as follows: Months 1 1. Also the price tag varies based on the size of the tag and exact cost to be incurred will be arrived at in system study phase.

For example, if the number places where assets will be registered and taken into the books, are more than two, then the number desktop readers required will vary. Applicable Taxes would be extra. After detailed requirement gathering, the effort and project timeline could vary. Any significant Scope changes or Change requests will be estimated and billed separately. Quality Analyst 2 Note: 1. Contract will be in effect for a minimum period of two months except for the reasons of performance.

Company needs to provide 2 week notice to stop any resource and 2 week notice to cancel the contract at any point of time after this minimum period of 2 months. Any new resource added will be billed as per the rate proposed. This Proposal will be valid for 12 months. Furthermore, the extension of period, if required, shall be on terms mutually agreed. The team is deployed within days from the date of project closure.

However the same can be negotiated on requirement basis. Web Development Sr. Governmental Taxes: Client will be responsible for bearing the service tax as applicable. The first invoice will be raised in advance which shall be payable immediately and will be adjusted against the last invoice. The remaining invoices will be raised on month end which shall be payable in net 15 days. Per Diem will be applicable for any client visit. The developer shall work at-least 8 hours every day for all official working days in a month.

So the actual work hours per month can vary depending on the number of days in a month and also on number of official working days in a month. Typically each month comprise of to hrs. Billing rate remains same per month per resource irrespective of the number of official working days in a month.

A developer is allowed to take up to 1 paid leave a month. However if developer takes more than 1 leave in a month the billing is reduced by per day basis of leave taken beyond the 1st day of leave.

Any required onsite support will incur cost. To achieve this, Kellton Tech believes that communication plays an important role and the work processes of Kellton Tech are structured in a way to facilitate smooth and open communication. The table below illustrates major events anticipated in this project and how the communication is handled in such events. The M.

This database will be timely updated by the police station for efficiency. Burdick, 2. Currently in Uganda police the web based system is not used so they use the manual system of tracking vehicles but from the information we got from the officer in charge of Kabalagala police station they need to get a web based system for tracking property in custody in order to ease their work.

These are usually used in aero surveillance Uganda. First information report. This is the written document prepared by the police when they receive information the commission of a cognizable offence. Complaint registration. This is where the police registers and puts in record a complaint. Criminal records. This is where the police record the criminal history of a person.

Custody records. This is a record kept by the custody officer at a detention facility of anything under arrest for example motor vehicles. In the beginning of in the United States the American Public transportation association were using global positioning system based vehicle tracking system estimated that all transit buses.

Web Based Management Information Systems have structure blocks namely; data and information. Data are row facts about the organization and its transactions; nonetheless these have less meaning to the organization if unprocessed.

Information refers to details that have been polished and prearranged by processing data. These systems classified as passive and active. Passive devices store global Positioning System location, speed and Active devices collect the same information but usually transit the data in near real time via cellular or satellite network to computer evaluation. Such as Surveillance systems that a place on vehicle to monitor premises of public transportation terminals to detect crimes or disturbances using close Circuit Television Monitors and notifies authorities by telephone of need for collective action.

Saves time and money. Easily managed and monitored. Due to the fact that the system has got administrators who are able to keep surveillance, check, track and observe the performance of the entire system. Eases the work in that when using a system on a computer it is simple and ease to create, review, edit and delete data compared to use of paperwork.

Cost cutting and real time tracking retrieved on 2nd June 2. From what was gathered, it was clear that most of the problems with the old manual system originated from; 1. Inefficiency in record tracking due to over reliance on paper work.

Wastage of office space due to complication of manual boxes, files. Poor storage, retrieval and manipulation of data when required. A lot of time was normally wasted while trying to carry out all these and hence was need for a new system that would solve problems of data redundancy, time wasting, reduce search time and allow easy data manipulation, with the ability to sort information, put out reports among others.

The Web has very rapidly become central to many applications in diverse areas. Bandwidth cost. High prices of data and internet to access services of the system. Non-uniform bandwidth. There is a change of range of network generations depending on the areas that have weak and strong network range. Increase in Network distances. Areas far from network perimeters tend to have poor quality signals while areas tend to have improved quality signals that are near network perimeters.

Heidelberg, This process will allow the super administrators, supervisors and police staff to verify the identity of someone who connects to the network. Email services. This will enable users to send, receive and review e-mails from the web browsers. Record management. This will help in the supervision and administration of the digital records.

Online file transfer. This will help to transfer files from one station to another through the file transfer protocols. File management. Through the databases of the web servers where the details are to be recorded and kept and will manage the data files. The property and evidence function is an integral and essential part of every law Enforcement agency.

Every day, police officers come into custody of lost or stolen property, contraband, and any manner of evidence. The law enforcement agency is charged with establishing a system for the secure and efficient classification, inventory, retrieval, and disposition of these items.

To accomplish this goal, the law enforcement agency must specifically: 1. Establish a system of documentation to track property from its receipt to its eventual disposition. Establish a secure and orderly storage facility to meet the needs of the particular agency. Establish a property officer to be responsible for the department's property and evidence function. Provide for periodic and special audits of the contents of the property storage facility to insure continuing accuracy.

Provide for the proper and timely disposition of property and evidence. Provide policy, training and adequate supplies for the consistent marking and packaging of property. Establish a written uniform policy and procedure to be followed by police officers in all aspects of property handling 2. Prototyping and Design Implementation, this is to make sure that the best solution for the client needs is provided and meet his or her goals.

The process of web-based application starts with a web design audit whereby the researchers sit down with the client to determine his or her needs and how it will make the organization meet its goals. Collecting the necessary information about the client and the project plan. It involves the development of the actual web-based application: high levels of creativity are required here.

Thus the stage encompasses the coding process and pulling together the application frames, style tiles and the written content as well as the graphics and icons. It takes the longest time to develop than other stages. This is made possible by our able team of talented and professional web developers and designers. The maintenance of an orderly, accurate and contemporary record system is essential to the overall property function.

The property record system should include a centralized filing system and a system of property reports and receipts to record the details of each property transaction. These records serve several purposes: why do we need a record? Although anything that documents an event or action is a record, to be useful as evidence, we must be able to rely upon it and it must be in an accessible and useable form. Good records must therefore possess the following characteristics: authenticity, integrity, accuracy, completeness and accessibility.

Integrity Integrity means that the record has been protected from unauthorized access and tampering throughout its lifespan, and can be proved to be complete and unaltered. A record with integrity is also sometimes described as inviolate.

Accuracy An accurate record is one that can be relied upon as an accurate account of the discussion or event that it documents. Note that a record can be both authentic and inviolate, but still be inaccurate due to faulty recollection.

Accuracy can be maximized by creating records at the time of the event or as soon as possible afterwards, while memories are still fresh, and by checking all participants agree that it is an accurate depiction of events. Completeness For a record to be useful, it must contain enough information to give a complete picture of events and the surrounding context.

This can be done by ensuring that the whole document is captured along with metadata e. Accessibility An accessible record is one that can be readily located, retrieved and understood by people who were not directly involved in the events documented. It must be stored in a readily accessible format and be free of jargon and acronyms. It must be stored in a system that makes it readily accessible to everyone who requires access to the information, along with descriptive metadata to make it easy to find.

Fundamentals of the v-model, 2. Information systems are of vital importance to many organizations across a wide range of sectors of the economy. In many cases information systems are the core players in doing the business. Typically, these information systems are taking care of some specific part of the business. Access for entering data should be limited to the designated property officer. However, other officers must often track or locate property in the absence of the property officer, and therefore must be able to review the centralized record.

The system should contain the following information for all property in police custody. Waema et al. Components of web based management information system. Hardware are the physical parts or components of a computer.

It comprises the theoretical analysis of the body of methods and principle associated with a branch of knowledge. It encompasses concepts such as paradigm, theoretical model, phases and quantitative techniques. This chapter discusses the Research design, methods and approaches which are to be used to gather information. The methodology describes the procedures, tools, techniques. It enabled the researchers to acquire information that would be useful in the developing the web-based information system.

The V model is a variation of the waterfall model that makes explicit the dependency between development activities and verification activities. The difference between the waterfall model and the V model is that the latter makes explicit the notion of level of abstraction. All activities from requirements to implementation focus on building more and more detailed representation of the system, whereas all activities from implementation to operation focus on validating the system.

V- model is a Verification and Validation model. Each phase must be completed before the next phase begins. Testing of the product is planned in parallel with the corresponding phase of development. This model is best suited for the development of the system due to the following reasons: 1. Testing activities like planning happens before coding saving a lot of time. Simple and easy to use. Works well for small projects 4.

Defects can be found at an early stage. Avoids the downward flow of defects. The Coding Phase joins the two sides of the V-Model. Requirements have to be very clear before the project starts, because it is usually expensive to go back and make changes. This model is used in the medical development field, as it is strictly a disciplined domain. The following pointers are some of the most suitable scenarios to use the V-Model application; 1. Requirements are well defined, clearly documented and fixed.

Product definition is stable. Technology is not dynamic and is well understood by the project team. There are no ambiguous or undefined requirements. The project is short. It can also be abstracted and used in other project types such as engineering, construction or business process reengineering.

V-Model - Design Under the V-Model, the corresponding testing phase of the development phase is planned in parallel. The death of the v-model, V-Model - Verification Phases There are several Verification phases in the V-Model, each of these are explained in detail below. This phase involves detailed communication with the customer to understand his expectations and exact requirement. This is a very important activity and needs to be managed well, as most of the customers are not sure about what exactly they need.

The acceptance test design planning is done at this stage as business requirements can be used as an input for acceptance testing. The system design will have the understanding and detailing the complete hardware and communication setup for the product under development.

The system test plan is developed based on the system design. Doing this at an earlier stage leaves more time for the actual test execution later. The death of the v- model, Architectural Design Architectural specifications are understood and designed in this phase.

Usually more than one technical approach is proposed and based on the technical and financial feasibility the final decision is taken. The system design is broken down further into modules taking up different functionality. The data transfer and communication between the internal modules and with the outside world other systems is clearly understood and defined in this stage. With this information, integration tests can be designed and documented during this stage. It is important that the design is compatible with the other modules in the system architecture and the other external systems.

The unit tests are an essential part of any development process and helps eliminate the maximum faults and errors at a very early stage. These unit tests can be designed at this stage based on the internal module designs. The death of the v-model, Coding Phase The actual coding of the system modules designed in the design phase is taken up in the Coding phase.

The best suitable programming language is decided based on the system and architectural requirements. The coding is performed based on the coding guidelines and standards. The code goes through numerous code reviews and is optimized for best performance before the final build is checked into the repository. Unit testing is the testing at code level and helps eliminate bugs at an early stage, though all defects cannot be uncovered by unit testing. The death of the v-model, Integration Testing Integration testing is associated with the architectural design phase.

Integration tests are performed to test the coexistence and communication of the internal modules within the system. The death of the v-model, System Testing System testing is directly associated with the system design phase. System tests check the entire system functionality and the communication of the system under development with external systems. Most of the software and hardware compatibility issues can be uncovered during this system test execution. The death of the v-model, Acceptance Testing Acceptance testing is associated with the business requirement analysis phase and involves testing the product in user environment.

Acceptance tests uncover the compatibility issues with the other systems available in the user environment. It also discovers the non-functional issues such as load and performance defects in the actual user environment.

New Models for Test Development. The death of the v- model, 3. We were to reach and make surveys on numerous police stations in the Central region and found that truly motor vehicles are being kept at the police station but due to the fact of limited space to keep all properties hence are being relocated to other specific large garzeted area at Kira road for the Central police station.

Kabalagala police station from the officer in command. Researchers observe and interview people. We shall take observation of people or events and analyze it through qualitative methods. However, we encouraged the participant to give full description of their experience, including their thoughts, feelings, images, sensations, memories about our research problem. Marieveee, 3. This involves questions that can be best answered in numbers in order to get the statistics, research often conducted experiments or give surveys.

They then analyze the number with statistical models to see what the data tells. Marieveee, It covers the following information: This helped us to clearly identify our research problem that is to say Kabalagala police station stores and uses manual document record keeping system that results in a lot of undesired outputs.

It takes a very long time to search a particular record with the current system, lots of paper and ink are wasted too hence making the system inefficient so this made us to come up with the idea of a web based system to track the motor vehicles in police custody.

This information is to be mainly collected from people. A number of fact finding methods are to be used and of which they will include the following; interviews, questionnaires, observations and written document analysis.



0コメント

  • 1000 / 1000