report

53
INTRODUCTION 1. INTRODUCTION 1.1Project Details: Broad specifications of the project work Project Definition In These Project we basically focus on all the world of people who want to find their life partner. Our site is made for connect the all these from all over the world. In this website we provide facilities for all age of member. What is Matrimonial Web Application? Matrimonial Web Application will allow a new user to register and after successfully registration. After completing registration users profile will be visible to other users. Matrimonial website which will provide platform to a lot of Bride/Groom for finding perfect match. There are different sectors like Registration, Partner, Search, etc. So the Bride/Groom can get their interest for find their partner. Bride/Groom can directly search Partner according to their required criteria. For This Application, we will provide following capabilities: (1) Admin Module 1 L.J. Institute of Engineering and Technology

Transcript of report

Page 1: report

INTRODUCTION

1. INTRODUCTION

1.1Project Details: Broad specifications of the project work

Project Definition In These Project we basically focus on all the world of people who want to

find their life partner. Our site is made for connect the all these from all over the world.

In this website we provide facilities for all age of member.

What is Matrimonial Web Application?

Matrimonial Web Application will allow a new user to register and after successfully

registration. After completing registration users profile will be visible to other users.

Matrimonial website which will provide platform to a lot of Bride/Groom for finding

perfect match. There are different sectors like Registration, Partner, Search, etc. So the

Bride/Groom can get their interest for find their partner. Bride/Groom can directly search

Partner according to their required criteria.

For This Application, we will provide following capabilities:

(1) Admin Module

(2) User Registration Module

(3) Image Uploading module

(4) Search Module

(5) Success story

(6) Feedback

Considering the security and privacy aspects, Matrimonial Web Application will use

HTTPS protocol (A version of the HTTP protocol that includes data encryption for

security.)

The application will have to be completed using Visual Studio 2008 and SQL Server

2005 with help of other office productivity tools such as Microsoft Visio 2003.

1L.J. Institute of Engineering and Technology

Page 2: report

INTRODUCTION

The application testing criteria and installation requirements will be part of the

detailed application architecture document.

1.2 PurposeThe purposes of the Matrimonial Web Application are:

The main purpose of this application is to facilitate matchmaking business by

applying the information in the field.

It helps the user by providing profiles of perspective “Bride” or “Groom” and other

information regarding them online.

User can get information regarding their dream life partner at his/her home at his/her

convenience.

This application also provides a search utility which helps those users who have a

certain criteria of qualities in mind to make online matrimonial easier.

1.3 Scope Matrimonial website which will provide platform to a lot of Bride/Groom for

finding perfect match.

There are different sectors like Registration, Search, etc. So the Bride/Groom can

get their interest for find their partner. Bride/Groom can directly search Partner

according to their required criteria.

1.4Technology and Literature Review1.4.1 The .net framework

A frame work is commonly thought of as a set of class libraries that aid in

the development of applications. The .net framework is more than just a set of

classes. The .net framework is targeted by compliers using a wide variety of

applications. Including everything from small components that run on handheld

devices to large Microsoft ASP.ET application that span web farms, where

multiple web serves act together to improve the performance fault tolerance of a

web site. The .NET framework is responsible for providing a basic platform that

2L.J. Institute of Engineering and Technology

Page 3: report

INTRODUCTION

these applications can share. This basic platform includes a runtimes set of

services that oversee the execution of applications. A key responsibility of the

runtime is to manage execution so that software written by different programming

languages uses classes and other types safely.

1.4.2 Microsoft .net framework architecture

Microsoft's .NET Framework is comprised of two main components - the

Common Language Runtime (CLR) and the .NET Framework class libraries. The

CLR is the real foundation of the .NET Framework. It is the execution engine for

all .NET applications. Every target computer requires the CLR to successfully run

a .NET application that uses the .NET Framework. The main features of CLR

include:

Automatic Memory Management

Thread Management

Code Compilation & Execution

Code Verification

High level of security

Remoting

Structured Exception Handling

Interoperability between Managed and Unmanaged code.

Integration with Microsoft Office System

1.4.3 Common Language Specification

To fully interact with other objects regardless of the language they were

implemented in, objects must expose to callers only those features that are common to all

the languages they must interoperate with. For this reason, the Common Language

Specification (CLS), which is a set of basic language features needed by many

applications, has been defined. The CLS rules define a subset of the Common Type

System; that is, all the rules that apply to the common type system apply to the CLS,

except where stricter rules are defined in the CLS. The CLS helps enhance and ensure

3L.J. Institute of Engineering and Technology

Page 4: report

INTRODUCTION

language interoperability by defining a set of features that developer can rely on to be

available in a wide variety of languages. The CLS also establishes requirements for CLS

compliance; these help you determine whether your managed code conforms to the CLS

and to what extent a given tool supports the development of managed code that uses CLS

features.

1.4.4 Common Language Runtime

The Common Language Runtime (CLR) is the virtual machine component of

Microsoft's .NET initiative. It is Microsoft's implementation of the Common Language

Infrastructure (CLI) standard, which defines an execution environment for program code.

The CLR runs a form of byte code called the Microsoft Intermediate Language (MSIL),

Microsoft's implementation of the Common Intermediate Language.

The virtual machine aspect of the CLR allows programmers to ignore many

details of the specific CPU that will execute the program. The CLR also provides other

important services, including the following:

• Memory management

• Thread management

• Exception handling

• Garbage collection

• Security

1.4.5 Introduction to ASP.NET

Microsoft, realizing that ASP does posses some significant shortcomings,

developed ASP.net. ASP.net is a set of components that provide developers with a

framework with which to implement complex functionality. Two of the major

improvements of ASP.net over traditional ASP are scalability and availability. ASP.net is

scalable in that it provides state services that can be utilized to manage session variables

across multiple web services in a server farm. Additionally, ASP.net possesses a high

4L.J. Institute of Engineering and Technology

Page 5: report

INTRODUCTION

performance process model that can detect application failures and recover from them.

We use the fundamentals of programming with VB using Visual Studio .NET and .NET

framework.

Features of ASP.NET:

(1) Component Infrastructure.

(2) Language Integration.

(3) Internet Interoperation.

(4) Simple Development.

(5) Simple Deployment.

(6) Reliability.

(7) Security

1.4.6 Introduction to Microsoft SQL Server

Microsoft SQL Server enhances the performance, reliability, and scalability

provided by earlier releases of SQL Server by making the processes of developing

applications, managing systems, and replicating data easier than ever.

SQL server also contains many of the front-end tools of PC databases that

traditionally haven’t been available as part of either mainframe or minicomputer

databases. In addition to using a dialect of Structured Query Language (SQL), GUI

applications can be used for the storage, retrieval, and administration of the database.

5L.J. Institute of Engineering and Technology

Page 6: report

INTRODUCTION

2. PROJECT MANAGEMENT

2.1 Feasibility Study Feasibility study is a process to check possibilities of system development. It is

a method to check various different requirements and availability of financial &

technical resources.

There are three different ways feasibility can be tested

1) Economical Feasibility

2) Technical Feasibility

3) Operational Feasibility.

2.1.1 Economical Feasibility:

In economical feasibility, analysis of the cost of the system is carried out. The

system should be only developed if it is going to give returned the current manual system

user can get the price only by purchasing the newspapers. In addition if he/she wants to

see archives of particular equity then he has to refer to all the old newspapers. For

research reports he has to buy another magazine. So Instead of buying no of magazines

user has to just go online and with a single click he can get whatever information he

wants. So our project of online share news passes the test of economical feasibility.

2.1.2 Technical Feasibility:

It is basically used to see existing computer, hardware and software etc,

weather it is sufficient or additional equipments are required? Minimum System

Requirement is such that it can be affordable by of the user who is having computer. All

the user requires is compatible browser and .net framework installed so our system is

fully technical feasible.

2.1.3 Operational Feasibility:

Once the system is designed there must be trained and expert operator. If there

are not trained they should given training according to the needs of the system.

6L.J. Institute of Engineering and Technology

Page 7: report

INTRODUCTION

From the user’s perspective our system fully operational feasible as it just

requires some knowledge of computer. Operators only need add daily prices of various

equities and there are enough validations available so operator does not require any

special technical knowledge. So our system also passes the test of operational feasibility.

2.2 Project Planning

2.2.1 Project Development Approach and Justification

Waterfall Model has been adopted as an approach for development of project. Most of the requirements of the project are fixed and already thought of very less functionality updation is expected in future. So Waterfall model is the right approach for our project.

Justification: As our application is a matrimonial website the requirements are much clear as we have number of reference matrimonial websites which can be used as reference so by looking that our requirements and functionalities that are to be implemented are clear.

As waterfall model is used for project whose requirements and functionalities are already known and as our project falls in this category we have chosen waterfall model as an approach to develop our project.

2.2.2 Project PlanProject was well planned. Project began with gathering user requirements, than diagrammatic representation of the functionalities was designed. Required Database was designed and normalized as required. Code was written in such a way that maximum functionality was coded with minimum possible lines of code.

2.2.3 Roles and ResponsibilitiesFollowing are our project members with their roles in the project and their responsibilities.

Analysis and design

Nirav Patel

Vishal Patel

Sulabh Gajjar

7L.J. Institute of Engineering and Technology

Page 8: report

INTRODUCTION

Coding

Nirav Patel

Vishal Patel

Sulabh Gajjar

Testing

Nirav Patel

Vishal Patel

Sulabh Gajjar

Table 2.1 Roles And Responsibilities.

2.3 Project SchedulingProject scheduling chart

Scheduling the project task is an important project planning activity .It involves deciding which tasks would be taken up when.

Based on the planned duration of required tests and collection of resources to

complete those tasks projected completion date is calculated. We have prepared timeline

Chart shown as below fig.

Fig.2.1 Scheduling.

8L.J. Institute of Engineering and Technology

Page 9: report

INTRODUCTION

3. SYSTEM REQUIREMENT STUDY

3.1 User Characteristics Our system will be used by two types of users they are as follows

Admin User: This type of user will be responsible to manage whole site & also content that will be published in site. This type of users will be given special training for doing this if required.

Registered User : This type of user will be able to visit our site and navigate to different pages to get information they will not be able to change any content on website .They will be able to give feedback for improvement of website.

3.2 Hardware and Software Requirements.Minimum software and hardware requirements to run our system are as follows.3.2.1 Hardware requirements:The system should have these hardware requirements:The processor should be at least Pentium 3 or aboveThe processor speed should be greater than 400 MHzThe video device should support graphics Ram should be or greater than 120 mb

3.2.2 Software requirements: Any operating System (windows XP sp2, Vista, etc.) Sql Server 2005 as dbms for managing databaseVisual studio 2008

3.3 Constraints 3.3.1 Hardware LimitationsThere must be a 64 MB on board memory3.3.2 Interfaces to Other ApplicationsNot applicable.3.3.3 Higher Order Language RequirementsASP 3.0 (Language C#)3.3.4 Reliability Requirements

9L.J. Institute of Engineering and Technology

Page 10: report

INTRODUCTION

Our system will require a reliable web server which has minimum downtime so that our website is up & running for maximum amount of time .There should be proper facilities available for regular backups.

3.3.5 Safety and Security Consideration Basic security mechanism which prevents any unauthorized access to the system must be implemented and a mechanism to trace any unauthorized access should be there also the log of users who visited our site must be maintained time to time.

3.4 Assumptions and DependenciesRegulatory policies: It is a mandatory that no text book must be left empty or contains insufficient data.Hardware limitations: There must be a 64 MB on board memoryControl functions: The software must be very user-friendly and display appropriate error messages.Interfaces to other applications: Not applicable.Parallel operations: It must support many users simultaneously.Reliability requirements: Data redundancy and use of special/blank characters must be avoided.Safety/security considerations: The application must be exited always normally.Higher order language requirements: ASP 3.0 (Language C#)

10L.J. Institute of Engineering and Technology

Page 11: report

INTRODUCTION

4. SYSTEM ANALYSIS

4.1 Study of Current System To update any content or any part of site it requires using FTP and changing the content manually.

4.2 Problem and Weaknesses of Current System The current system has following weaknesses.

1) User interface is not up to professional mark.

4.3 Requirements of New System4.3.1 User Requirements

User requirement are specifies requirement of the user of the system. The user requirements are:

User can register and make an account. For that user has to fill up the registration form and submit the information to the database.

User searches for other user profiles from the homepage without registering using simple search. User can also search after logging in to his account for more detailed information.

User can give feedback about the site using feedback option, which can be after read by the administrator.

4.3.2 System Requirements

Facility to delete profile after admin login. Easy to use for guest & admin users. Should work efficiently even on slow internet connections. Dynamic contents like success story etc are expected.

11L.J. Institute of Engineering and Technology

Page 12: report

INTRODUCTION

For Object Oriented Approach.

4.4 Class Diagram:

12L.J. Institute of Engineering and Technology

Page 13: report

INTRODUCTION

4.5 Use Case Diagram:

Fig.4.2 Use case Diagram

13L.J. Institute of Engineering and Technology

Page 14: report

INTRODUCTION

4.6 Sequence and Collaboration Diagram:

14L.J. Institute of Engineering and Technology

Page 15: report

INTRODUCTION

15L.J. Institute of Engineering and Technology

Page 16: report

INTRODUCTION

16L.J. Institute of Engineering and Technology

Page 17: report

INTRODUCTION

17L.J. Institute of Engineering and Technology

Page 18: report

INTRODUCTION

18L.J. Institute of Engineering and Technology

Page 19: report

INTRODUCTION

19L.J. Institute of Engineering and Technology

Page 20: report

INTRODUCTION

20L.J. Institute of Engineering and Technology

Page 21: report

INTRODUCTION

4.7 Data Flow Diagram

21L.J. Institute of Engineering and Technology

Page 22: report

INTRODUCTION

4.8 ER Diagram

22L.J. Institute of Engineering and Technology

Page 23: report

INTRODUCTION

4.9 Activity Diagram

Activity diagram for registration

23L.J. Institute of Engineering and Technology

Page 24: report

INTRODUCTION

Activity diagram for user login

4.10 Features of New System.The new system that is expected to replace this application is expected to have much more features and good design.

The user interface is expected to be of professional level, users shall be able to give their opinions in the Feedback consol and some dynamic contents are also expected to be added.

24L.J. Institute of Engineering and Technology

Page 25: report

INTRODUCTION

5. SYSTEM DESIGN

5.1 Database Design/Data Structure Design

5.1.1 Table and Relationship :

25L.J. Institute of Engineering and Technology

Page 26: report

INTRODUCTION

5.2 Input Output & Interface Design:5.1.2 Samples of Forms Reports & Interface

Home page:

Registration Form:

26L.J. Institute of Engineering and Technology

Page 27: report

INTRODUCTION

Contact us:

Feedback Form:

27L.J. Institute of Engineering and Technology

Page 28: report

INTRODUCTION

About us:

User profile:

28L.J. Institute of Engineering and Technology

Page 29: report

INTRODUCTION

Search:

29L.J. Institute of Engineering and Technology

Page 30: report

INTRODUCTION

5.3 State chart diagram

State chart diagram for registration

State chart diagram for user login

30L.J. Institute of Engineering and Technology

Page 31: report

INTRODUCTION

6. IMPLEMENTATION PLANNING

6.1 Implementation Environment (Single vs Multi user, GUI vs

Non GUI)As the application is stand-alone application so there is a no multi user for our application rather than a single user .User can do information entry whenever required and uses different utilities and for that, a better GUI application is needed.

6.2 Program/Modules Specification The main modules of the system are:

RegistrationIn this module user can register a new account.

LoginHere the user can log in to his/her account by inserting his/her user id and password and see his profile page.

Update ProfileUser uses this module to update previously inserted information in profile.

SearchIn this module a user can search another user profiles by inserting appropriate user keywords.

Give FeedbackUser can give feedback about the site in this module.

Delete ProfileThis module is for the administrator. Administrator can delete some specific users’ profiles which have been noticed as fake profiles.

View FeedbackIn this module administrator can read the feedbacks given by the users.

6.3 Security FeaturesWe have basically two types of user with different accessibility rights. They are at

are administrator and the Members. All have their own username and password and all users have different rights to use an application.

There is account lockout policy to protect user’s account. If maximum number of wrong password is made within a specified time window then the account will be locked and will be unlocked by administrator by request.

31L.J. Institute of Engineering and Technology

Page 32: report

INTRODUCTION

6.4 Coding StandardsClasses - Class names should always be a noun and, again, should be meaningful. Avoid verbs.class Search{ . . . }

Methods - Always use a verb-noun pair, unless the method operates on its containing class, in which case, use just a verb.public void GetPath();

Methods with return values - The name should reflect the return value.public int GetImageWidth(Bitmap image);

Variables - Do not abbreviate variable names. Variable names should again be descriptive and meaningful.int quantityCount = 0;int index = 0;string temp = "";Pascal Casing - Use PascalCasing for classes, types, methods and constants.public class Search{ public void BookName ();}

32L.J. Institute of Engineering and Technology

Page 33: report

INTRODUCTION

7. TESTING

7.1 Testing PlanSimilar to the project plan, due to confidentiality issues, we cannot provide details test

plan to the development team. We will still add the core components that make up our

test plan.

7.2 Testing StrategyA typical screen in asp.net is tested at four levels before it goes for production.

Level 1 is generally the work to be tested by other developers or other interns (this is

typical first level of testing where focus is not on requirement but end user testing) Ratio:

0% end user: 100% Technical

Level 2 is level where a senior programmer comes into the testing cycle of the screen that

was unit tested by the developer in this phase the onus is to test software for technical

requirements specified.

Ratio: 80% Technical: 20% end user

Level 3 is where a tester will come into picture. The tester will test the software for both

end user as well as technical point of view.

The ratio here is: 50% Technical: 50% end user

Level 4 is where we make the code at Release-Ready. Here screen is tested to the core

and each and every standard must be followed and verified.

Ratio here is: 80% User Testing – 20% Technical

This allows us to text a screen at four levels and at the end of four weeks when the screen

goes to production, it is generally bug free because more people have looked at this

screen from different viewpoints.

Unit Testing

Black box and white box testing. Module interfaces are tested for proper information flow. Local data are examined to ensure that integrity is maintained.

33L.J. Institute of Engineering and Technology

Page 34: report

INTRODUCTION

Boundary conditions are tested. Basis path testing should be used. All error handling paths should be tested. Drivers and/or stubs need to be developed to test incomplete software. 

Integration Testing

Top-down integration testing

Main control module used as a test driver and stubs are substitutes for components directly subordinate to it.

Subordinate stubs are replaced one at a time with real components (following the depth-first or breadth-first approach).

Tests are conducted as each component is integrated. On completion of each set of tests and other stub is replaced with a real

component. Regression testing may be used to ensure that new errors not introduced.

Bottom-up integration testing

Low level components are combined in clusters that perform a specific software function.

A driver (control program) is written to coordinate test case input and output. The cluster is tested. Drivers are removed and clusters are combined moving upward in the program

structure.

7.3 Testing MethodsTesting presents an interesting anomaly for the software engineering activities, the

engineer attempts to build software from an abstract concept to a tangible product. Now

comes testing. The engineer creates a series of test case that are initiated to "demolish"

the software that has been build.

Models of Testing:-

There are different Models of testing. On the basis of testing methods there are

two types of testing:

1. Black-box testing

2. White-box testing

34L.J. Institute of Engineering and Technology

Page 35: report

INTRODUCTION

White-box testing

There exist several popular white-box testing methodologies:

Statement coverage Branch coverage Path coverage Condition coverage Mutation testing Data flow-based testing

Statement coverage

Statement coverage methodology focuses on, designing test cases so that,

Every statement in a program is executed at least once. No statement in the program should remain unreachable.

Branch coverage

Test cases are designed such that, different branch conditions

Give true and false values in some execution. All branches are traversed.

Branch testing guarantees statement coverage. It is a stronger testing compared to the

statement coverage-based testing.

Path coverage

Design test cases such that, all linearly independent paths (LIP) in the program are

executed at least once. To understand the path coverage-based testing we need to learn

how to draw control flow graph of a program.

A control flow graph (CFG) describes,

The sequence in which different instructions or statements of a program get executed.

The way control flows through the program.

Condition coverage

Test cases are designed such that, each component of a composite conditional expression

It help us to,

Gives both true and false values.

To check for all combination of conditions.

35L.J. Institute of Engineering and Technology

Page 36: report

INTRODUCTION

Black Box Testing:

Equivalence Partitioning

Black-box technique that divides the input domain into classes of data from which test cases can be derived an ideal test case uncovers a class of errors that might require many arbitrary test cases to be executed before a general error is observed

Equivalence class guidelines: If input condition specifies a range, one valid and two invalid equivalence classes are

defined If an input condition requires a specific value, one valid and two invalid equivalence

classes are defined If an input condition specifies a member of a set, one valid and one invalid

equivalence class is defined If an input condition is Boolean, one valid and one invalid equivalence class is

defined 

Boundary Value Analysis

Black-box technique that focuses on the boundaries of the input domain rather than its

center

BVA guidelines: If input condition specifies a range bounded by values a and b, test cases should

include a and b, values just above and just below a and b If an input condition specifies and number of values, test cases should be exercise the

minimum and maximum numbers, as well as values just above and just below the minimum and maximum values

Apply guidelines 1 and 2 to output conditions, test cases should be designed to produce the minimum and maxim output reports If internal program data structures have boundaries (e.g. size limitations), be certain to test the boundaries

7.4 Test CasesCase 1. Admin Login

Condition Action

Correct user and correct Password Accepted

Correct user and incorrect Password Rejected

Incorrect user and incorrect Password Rejected

Incorrect user and correct Password Rejected

Table 7.1 Admin Login Test Case

36L.J. Institute of Engineering and Technology

Page 37: report

INTRODUCTION

Case 2. E-mail id Validation

Condition Action

Correct e-mail id Accepted

Correct email id & incorrect length Rejected

Incorrect email id & correct length Rejected

Table 7.2 E-mail id validation Test Case

 Case 3. User Validation

Condition ActionUnique username, password length more than 6 character and unique and valid Email Id.

Accepted

Conflicted username, password length more than 6 character and unique and valid Email Id.

Rejected

Unique Username, password length less than 6 character and unique and valid Email Id.

Rejected

Unique Username, password length more than 6 character and conflicted or invalid Email Id.

Rejected

Table 7.3 Create User Test Case

37L.J. Institute of Engineering and Technology

Page 38: report

INTRODUCTION

8. USER MANUAL Registration

In this module user can register a new account. For this user has to first select the registration option from the home page and then fill up the registration form. In the registration form there are some details about his/her personal information.

LoginHere the user can log in to his/her account by inserting his/her user id and password and see his profile page. Here the user can perform operations like update profile, print profile, etc.

Update ProfileUser uses this module to update previously inserted information in registration form or his/her profile data. Here user has to simply update the field he wants to change and press the update button.

SearchIn this module a user can search another user profiles by inserting appropriate user keywords. We have provided two types of search. User can use simple search to search profiles from the home page. In simple search user don’t need to login to his/her account. In other way the user can login to his/her account and use the search functionality provided into his/her profile.

Give FeedbackThis functionality allows the user to give feedback about the website, which can after be read by the administrator. User has to select give feedback option for that and then he/she has to enter his/her name, email and his feedback about the website. Then he has to simply submit the feedback.

Delete ProfileThis module is specifically designed for the administrator. Administrator can delete some specific users’ profiles which have been noticed as fake profiles. For this administrator has to login to administrator account. Here administrator can see all the details of users’ accounts. Administrator has to just click the delete option in left of the profile details.

View Feedback

38L.J. Institute of Engineering and Technology

Page 39: report

INTRODUCTION

This functionality is also designed for the administrator. Here administrator can see the feedback given by the users and he can make changes according to the requirements of the users.

Change Password

Using this function a user can change the password for his/her account. For that he has to select the change password option in the profile.

Forgot PasswordThis function is used when some user has forgotten his/her password and wants to retrieve the password. For this user has to select the forgot password option from the homepage. Here the page requests the security question of the user and corresponding answer to the question. Then this security question and answer are matched in the database. If it matches the password is displayed on the screen.

Change Photo

Using this function user can change the previously updated photo in the profile. For this user has to select the change photo option in the profile and then browse the photo from the his/her computer. User can also crop the photo and then upload the photo.

39L.J. Institute of Engineering and Technology

Page 40: report

INTRODUCTION

9. LIMITATION AND FUTURE ENHANCEMENT

Limitation:

Still this application has got its limitations like limited functionality and

somewhat week graphical front end; this is due to lack of time and experience with the

developers.

The current system cannot provide paid membership.

Future Enhancement:

It is possible to provide the web space to the users for creating his portal.

It is possible to create our own mail server.

It is possible to create chat server so that user can communicate with each other.

It is possible to provide facility like create video album.

40L.J. Institute of Engineering and Technology

Page 41: report

INTRODUCTION

10. CONCLUSION AND DISCUSSION

10.1 Self Analysis of Projects ViabilityEvery project work, does not matter software project or any other project, could

not be the result of sole effort; even though, developer team consists three member. We think success of any project doesn’t depend only on better software development skills, but also, zeal to listen and help the users. Only user interaction at development phase can give you an idea to fulfill their requirements. Because, software product is of developer’s up to the development or installation phase, but then after it is of user’s. We experienced that do make the software for users not for fame of being better programmer or software developer. Ultimately, users appraise your efforts not your peers.

10.2 Summary of Project WorkWe have completed our project work based on using software engineering and

system analysis and design approach. Work that we have done with preplanning scheduling related with time constrains and result oriented progress in project development.

Our project starts in second week of January and completed this project at the end of April. Initially, there were some problem regarding some phases but we have planned to resolve those problems. We have divided our work in different phases and solved problems and difficulties.

11. REFERENCES Books

41L.J. Institute of Engineering and Technology

Page 42: report

INTRODUCTION

ASP.NET(Black Book). Professional ASP.NET(Wrox Publication). ASP.NET Complete Reference. Software engineering Concepts By Roger S.Presman Fundamentals of Software Engineering By Rajib Mall SQL Server 2005 (Wrox Publication).

Web Sites www.bharatmatrimonial.com www.shaadi.com www.jeevansathi.com www.simplymarry.com

42L.J. Institute of Engineering and Technology