5. System flow (UI wise)
•Browse organization information portal
•Apply for MIS
I •FAQ, App demos and other documentation
•Browse Applications / use them
•Generate and maintain logs
•Guardian / incharge / self notifications
II •Applications management and parameter setting
•SMS operations
•Notification management
III
8. KLOC analysis
Total number of code is approximately 4.15
Efforts:
E=3.2*(KLOC)^1.02
E=3.2*(4.15)^1.02
E=14 persons/month
Development Time(in months):
D=E/N
D=14/4
D=3.5 months
Development time for the project:
Requirement analysis requires 2.1 months
Implementation and testing requires 3.5 months
D = 5.6 months
9. Milestones
M1: Requirement Gathering & Validation
M2: system design
M3: partial report completion
M4: Attendance- generating time tables, resource
allocation strategies, periodic logs, guardian
notification statements.
M5: Public transit to manage public transit profile via
dynamic and static commuters to consumer’s model
M6: GKUL drive- implementing SNS sharable platform for
digital media.
M7: testing of the system.
M8: release of final system with complete
documentation.
15. Web access
Module Web access
CMS Tasks GUI Database Admin
Events,
Information , CMS
CSS , JS Brochures Interface
to edit
Description details
Customize Whatever
looks that promotes Editor
institute…
16. SMS Operations
Module SMS
Operations Send Receive
It is an interface
This receives
Description that implements
customization
notification from
from apps
each module
17. L.M.S.
CASE I Resource Available
CASE II Resource not Available
18. Experts Blog
Recommendation generator
a) Accept MIS ID, Class, Branch, Subject list related to
member.
b) Search all blogs with this fields as their tags.
c) Group them as per their subject names.
a) Compare all blogs within a subject group that has a
maximum of sum for
d) View + Rate + Followers and subtract no. of flags for it,
the equation thus becomes,
e) View + Rate + followers – Flags = Recommendation Rank
a) Copy first two to recommendation array
f) Repeat above procedure for all groups
g) Display recommendations
19. Experts Blog
Experts Blog – Block resolver
a) Accept author MIS ID
b) Accept flag count, followers,view,
ratings. And blocked=TRUE
c) Accept cleanCheatCount.
d) Compute
a) blockAccount = flagCount-(1/followers)-
(1/views)-(1/ratings)
e) IfcleanCheat<blockAccount
f) fblocked=FALSE
21. Campus money
Campus Money- Two way authentication[5]
Accept order with client MIS Id.
Update order to the system.
Check for valid MIS ID
Check for valid transaction
Create Session
Generate transaction ID
Notify to Client
Accept transaction ID
Update to system.
Update session
Check user pic
Deliver order
Destroy session
25. Risk Management
GURUKUL - Educational
Organization management
system
26. Risk management [ I ]
Technical feasibility
Failure of technology on which the system rely on.
This can’t be avoided, only solution is developing
entire system on any-other parallel technology. Thus,
we can stay updated with discussion forums related
to technology . And we should at-least have another
technology support to notify users of the system
about system status.
Failure at utilizing SPM up to its defined degree.
Change or addition of requirements after
communication phase may cause system a lot.
27. Risk management [ II ]
Cost feasibility
Any better system more efficient, stable & user friendly. This is the only risk
of our system. An efficient, stable & user friendly system should be
developed.
User may or may not be technically sound, so requirements should be in
a proper format (normal, expected & excited). We should try avoiding
direct documenting requirements as specified by customers and follow
proper requirements analysis, verification & validation. Also the risks
should be managed as per the requirements.
Change or addition of requirements after communication phase may
cause system a lot. We should try deep analysis & make proper user
agreement.
Failure at utilizing SPM up to its defined degree.
Risk of making development tools available which are upto the mark.
28. Conclusion
This project aims at reducing overheads
from members of education organization
and atomizing all repetitive tasks or the task
which can be formulated and generated
on the basis of existing computation.
We also aim to serve the human quench for
information about environment surrounding
them.
29. References
1. Omer Rashid, Paul Coulton, Reuben Edwards, Andrew Fisher, Robert
Thompson,”Mobile Information Systems Providing Estimated Time of Arrival for Public
Transport Users” Department of Communication Systems Lancaster University
Lancaster UK
2. Jalal Kawash, Christo El Morr, WissamCharaf, and HamzaTaha, “building mobile
virtual communities for public transport awareness” Department of Computer
Science American University of Sharjah P.O. Box 2666, Sharjah, UAE
3. S.BermanV.Katoma “An e learning framework based on semantic weblogs”,
Computer Science Department University of Cape Town Cape Town, South Africa
4. Mohammed AlZomaiAudunJøsang Adrian McCullagh, “Strengthening SMS-Based
Authentication through Usability”, Queensland University of Technology Brisbane,
Australia alzomaim@isi.qut.edu.au and fa.mccullagh, e.foog@qut.edu.au
5. FadiAloul, Syed Zahidi “Two Factor Authentication Using Mobile Phones”,
Department of Computer Science & Engineering American University of Sharjah, UAE
{faloul, b00017408}@aus.edu
6. Zhang Guoli “The Applied Research of Cloud Computing Platform Architecture In
the E-Learning Area”, School of Electronic Information Engineering Liaoning
Technical University Hu Ludao, Liaoning e-mail: zgl_lesli@126.com
7. Ramesh Jain “Micro-blogging Sentiment Detection by Collaborative Online
Learning”, School of Information and Computer Sciences University of California
Irvine CA 92697 jain@ics.uci.edu
8. ZHANG Jia-Gui “Research Online college learning platform based on cloud
computing”, Jinhua Vocation and Technology College Jinhua China
Zhangjg@jhc.cn