Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
3 views76 pages

Blood Donor

BBDMS REPORT KERALA UNIVERSITY

Uploaded by

eddybrkvenm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views76 pages

Blood Donor

BBDMS REPORT KERALA UNIVERSITY

Uploaded by

eddybrkvenm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

1

BBDMS

1. INTRODUCTION

College Of Applied Science Perissery


2
BBDMS

1. INTRODUCTION
Blood Donor-Recipient Matching is a web-based application. The persons who like
to donate blood register in the Blood Bank application. The persons in need of blood
search for the persons having the same blood group and within the city. If he found
a donor in his city then he gets the total details of the donor, if he doesn’t find any
donor then he is given the contact numbers and addresses of the Life-Saving Contact
Persons for major cities.

1.1 OVERVIEW OF THE PROJECT

The Blood Donor-Recipient Matching is a web-based application that simplifies the


process of blood donation and access for those in need. Donors who wish to
contribute to this life-saving endeavor can easily register through the platform,
creating a network of potential donors. Meanwhile, individuals urgently seeking
specific blood types within their city can utilize the system to search for compatible
donors. If a suitable match is found, comprehensive donor information is provided.
In cases where a local donor isn't available, the system offers contact details for
designated Life-Saving Contact Persons in major cities, ensuring timely access to
crucial resources. This project not only encourages blood donation but also facilitates
seamless communication between donors and recipients, offering a dependable and
efficient solution during emergencies.

By combining the power of technology with the noble act of blood donation, the
Blood Donor-Recipient Matching creates a cohesive and efficient ecosystem. It
empowers both donors and those in need to connect effortlessly, potentially saving
countless lives. With a user-friendly interface and a commitment to ensuring blood
availability, this project serves as a vital resource for communities, strengthening the
bonds of solidarity and compassion among individuals dedicated to making a life-
saving difference.

College Of Applied Science Perissery


3
BBDMS

1.2 PROBLEM DEFINITION

The problem definition for the Blood Donor-Recipient Matching project can be
outlined as follows:

➢ Problem: In many regions, there is a persistent challenge when it comes to


ensuring a consistent and readily accessible supply of safe blood for medical
emergencies and ongoing healthcare needs. Several issues contribute to this
problem:
➢ Blood Shortages: Blood banks often struggle to maintain an adequate supply
of various blood types, leading to critical shortages, especially during
emergencies.
➢ Inefficient Communication: The lack of an efficient communication system
between potential blood donors and individuals in need of blood hampers the
timely and effective response to emergency situations.
➢ Lack of Awareness: Many potential blood donors are unaware of where and
how to donate blood, resulting in missed opportunities to contribute to this
life-saving endeavor.
➢ Urgent Blood Matching: During medical emergencies, finding a suitable
blood donor with a matching blood type can be a time-consuming and
challenging task, potentially leading to life-threatening delays.

1.2.1 EXISTING SYSTEM

In the existing system, while some online web portals for blood donation and
management do exist, they often come with their own set of limitations and
challenges. These online portals attempt to streamline certain aspects of blood
donation and access but may not fully address all the issues faced in the traditional
system. Here are some common characteristics of existing online web portals for
blood donation

➢ Limited Outreach: Online portals may still struggle to reach a wide audience,
particularly individuals who may not be active internet users or who lack
awareness of these platforms.

College Of Applied Science Perissery


4
BBDMS

➢ Partial Automation: While online registration for donors may be available,


other critical processes, such as efficient donor matching and real-time
communication, may still rely on manual or outdated methods.
➢ Variable Data Quality: Data management may vary in quality and
effectiveness across different portals, impacting the accuracy and availability
of donor and recipient information.
➢ Regional Variation: The effectiveness of online portals can vary significantly
by region, with some areas having well-established systems while others may
still face challenges in adoption and implementation.

In essence, while online web portals have introduced some degree of automation and
convenience to the blood donation and management process, they often operate
within the constraints of the existing system's challenges. The Blood Donor-
Recipient Matching project aims to build upon the advantages of online platforms
while addressing these limitations comprehensively to create a more efficient, user-
friendly, and responsive solution for blood donation and access.

1.2.2 PROPOSED SYSTEM

The proposed Blood Donor-Recipient Matching represents a transformative leap


forward in addressing the challenges and limitations of the existing blood donation
and management ecosystem. This web-based platform is designed to revolutionize
the way blood donation and access are managed by leveraging cutting-edge
technology and user-centric features.

Admin Module

➢ Dashboard: In this section, admin can view all the details in brief like total
blood group listed, registered donor list, and total enquiries received.

➢ Blood Group: In this section, admin can manage blood group(Add/ Delete).
➢ Donor List: In this section, admin can view a list of donors and have the right
to delete and hide the detail of donor.

College Of Applied Science Perissery


5
BBDMS

➢ Manage Contact us Query: In this section, admin can manage query which is
received by users.

➢ Manage Pages: In this section, admin can website pages.


➢ Update Contact info: In this section, admin can update the contact details of
the website.
➢ Request Received by Donor: In this section, admin can view the request of
blood that is received by the donor.

User Module

➢ Home: Its is welcome page for users and donor. If any users want to donate
the blood they must register with us.
➢ About Us: Users can view the about us page.
➢ Contact Us: Users can contact with admin the through contact us page.
➢ Donor List: Users can view and contact donors.
➢ Search Donor: Users can search the donor according to place and blood
group.
➢ Searching for blood donors by area is a crucial feature of a Blood Bank and
Donor Management System.
➢ User Input: Allow users to enter their desired search criteria, which can
include area . This information will be used to filter and identify potential
donors in the specified location.
➢ Displaying Results: Present the search results to the user in an organized
manner. Each donor profile should include essential details such as blood
type, contact information, and availability status.
➢ Real-Time Updates: Ensure that the donor database is updated in real-time to
reflect changes in donor availability or location.

1.3 FEASIBILITY STUDY

Feasibility study is made to see if the project on completion will serve the purpose of
the organization for the amount of work, effort and the time that spend on it.
Feasibility study lets the developer foresee the future of the project and the

College Of Applied Science Perissery


6
BBDMS

usefulness. Feasibility study is a test of system proposed regarding its workability,


impact on the organization, ability to meet the needs and effective use of resources.

Thus when a new project is proposed, it normally goes through a feasibility study
before it’s approved for development.

The document provide the feasibility of the project that is being designed and lists
various areas that were considered very carefully during the feasibility study of this
project such as operational, economical and technical feasibilities.

Investigating the existing system in the area under investigation does, to test the
operational, economical and technical feasibility of a system and generating ideas
about the new system. There are three aspects in the feasibility study portion of the
preliminary investigation.

1.3.1 OPERATIONAL FEASIBILITY

This feasibility studies whether software is operationally feasible or not this has been
developed in a very user friendly manner so that any person basic computer
knowledge can operate on this software. So project has the Operational Feasibility.

1.3.2 ECONOMICAL FEASIBILITY

The system is economically feasible since the savings and benefits of the system are
more when compared to the cost. The Supposed system reduces the human effects
and also reduces the drawbacks of the existing system .The proposed system is more
accurate, speedy and dependable. Thus the cost by benefit ratio is very small.

1.3.3 TECHNICAL FEASIBILITY

The "BBDMS" must be evaluated from the technical viewpoint. The assessment
feasibility must be based on an outline design of the system requirement in the terms
of input, output, programs, procedure and employee. Having identified an outline
system, the investigation must go to suggest the type of the equipment, required
method developing the system, method of running the system once it has been

College Of Applied Science Perissery


7
BBDMS

designed. The project should be developed such that the necessary functions and
performance are achieved within the constraints. Though the system may become
obsolete after some period of time, due to the fact that the newer version software

supports the older version, this system may still be used. There are a number of
technical issues, which are generally raised during the feasibility stage of the
investigation PAWSCARE. A study of function, performance and constraints that
may affect the ability to achieve an acceptable system. Technical feasibility deals
with hardware as well as software requirements. If the necessary requirements are
made available with the system, then the proposed system is said to be technically
feasible.

1.3.4. ECONOMIC FEASIBILITY

Economic feasibility is an important task of system analysis. A system that can be


developed technically and that will be used if installed must still be profitable for the
organization. Financial benefits must equal or exceed the costs. Criteria are to ensure
that effort taken on the project give the best return at the earliest. One of the factors,
which affect the development of a new system, is the cost it would require. Since the
system developed is part of a project work, there is no manual cost to spend for the
"PAWSCARE". Also, all the resources are already available, giving an indication
that the system is economically possible development. The analysis raises financial
and economic questions during the preliminary investigation to estimate the
following: 1. The cost to conduct a full systems investigation 2. The cost of hardware
and software for the class of application of the project being considered. 3. The
benefits in the form of reduced costs or fewer costly errors. To be judged feasible, a
proposal for the specific project must pass all these tests, otherwise it is not
considered as a feasible project.

College Of Applied Science Perissery


8
BBDMS

1.3.5 OPERATIONAL FEASIBILITY

Proposed projects are beneficial only if they can be turned into information systems that
will meet the operating requirements of the organization. This test of feasibility tasks if
the system will work when it is developed and installed. "BBDMS" satisfies all the
operational conditions. One of the main problems faced during development of a new

system is getting the acceptance from the user. They were doubtful about the degree of
security provided by our software. We have considered all the operational aspects. Thus,
the project is operationally feasible. People are inherently resistant to change, and
computers have been known to facilitate change. An estimate should be made about the
reaction of the user, employee towards the development of a computerized system.

College Of Applied Science Perissery


9
BBDMS

2. SYSTEM SPECIFICATION

College Of Applied Science Perissery


10
BBDMS

2.1 INTRODUCTION
Requirement analysis results in the specification of software’s operational
characteristics; indicates software’s interface with other system elements and
establishes constraints the software must meet. Requirement analysis allows
the software engineer to elaborate on basic requirements established during
earlier requirement engineering tasks and build models that depict user
scenarios, functional activities, problem classes and their relationships, system
and class behavior and flow of data as it is transformed. Requirement analysis
provides the software designer with representation of information, function
and behavior that can be translated to architectural, interface and component
level designs. Finally, the analysis model and the requirement specification
provide the development and the customs with the means to access quality
once the software is built. The main requirement of this project is to eliminate
the communication gap between a person who wants to build a home and the
people needed for the process.

2.2 HARDWARE REQUIREMENTS

Microprocessor Types : Intel i2 and above

Processor speed : 2.5 GHZ

Random Access Memory : 4 GB

Hard Disk Memory : 500 GB

Monitor : SVGA Color

Keyboard : Standard Keyboard

Mouse : Standard Scroll Mouse

College Of Applied Science Perissery


11
BBDMS

2.3 SOFTWARE REQUIREMENT

Operating System : Windows 7 or above

Front End : HTML, CSS JavaScript, Ajax

Back End : MYSQL

Server Side Scripting Language : PHP

Server : Xampp Server 7.0

2.4 FRONT END

HTML

HTML, which stands for Hyper Text Markup Language, is the standard markup
language used to create web pages. It provides a structured way to organize and
format content on the internet. HTML documents consist of elements, which are
represented by tags, and these elements define the structure and content of a web
page.

1. Elements and Tags


➢ HTML is built around elements, which are the building blocks of a web
page. Each element is enclosed within tags, which are made up of opening
and closing parts.
➢ Opening tags are enclosed in angle brackets (< >), and closing tags have a
forward slash before the tag name (e.g., </>).
➢ Elements can be nested, meaning one element can contain other elements.
The order of nesting is important and determines the structure of the
document.

College Of Applied Science Perissery


12
BBDMS

2. Document Structure
➢ An HTML document starts with the <!DOCTYPE html> declaration, which
specifies the document type and version.
➢ The entire document is enclosed within the <html> element, and it contains
two main sections: <head> and <body>.
➢ The <head> section contains meta-information about the document, such as
the document's title, character encoding, linked stylesheets, and scripts.
➢ The <body> section contains the visible content of the web page, including
text, images, links, and other media.

3. Head Section
➢ Inside the <head> section, you can include metadata using elements like
<meta>, <title>, and <link>.
➢ The <meta> element is used to specify character encoding, keywords, and
descriptions for search engines.
➢ The <title> element sets the title of the web page, which appears in the
browser's title bar or tab.
➢ The <link> element is used to link external resources like stylesheets and
icons.

4. Body Section
➢ The <body> section contains the content that is displayed in the browser.
➢ Common structural elements include headings (<h1>, <h2>, etc.),
paragraphs (<p>), lists (<ul>, <ol>, <li>), and divs (<div>) for layout and
organization.
➢ Text is typically enclosed within various inline elements like <span>,
<strong>, <em>, and <a> (for links).
➢ Images are inserted using the <img> element, and media content like videos
and audio can be included using specialized elements.

College Of Applied Science Perissery


13
BBDMS

5. Attributes
➢ Elements can have attributes that provide additional information about the
element or modify its behavior. Attributes are added within the opening tag.
➢ Common attributes include class, id, src, href, alt, and style, among others.

➢ Attributes can be used for styling with CSS or for JavaScript interactions.

6. Comments
➢ You can add comments within your HTML code to provide explanations or
notes. Comments are enclosed within <!-- and -->.

Structure of HTML Document

<!DOCTYPE html>
<html>
<head>
<title>Title Tag</title>
</head>
<body>
<h1>...</h1>
<p>...</p>
</body>
</html>

College Of Applied Science Perissery


14
BBDMS

Cascading Style Sheets (CSS)


CSS, which stands for Cascading Style Sheets, is a stylesheet language used to
describe the presentation and formatting of HTML (and XML) documents. It allows
web developers to control the layout, design, and appearance of web pages. CSS
works in conjunction with HTML, which defines the structure and content of a web
page.

1. Selector and Declaration


➢ In CSS, you select HTML elements to style using selectors. Selectors target
specific HTML elements based on their type, class, ID, attributes, or
relationship to other elements.
➢ Once you've selected an element, you apply styling rules in the form of
declarations.
➢ Declarations consist of a property and a value separated by a colon (:).
Multiple declarations are enclosed in curly braces ({ }).

➢ For example, to change the color of all paragraphs to blue, you might use
the selector p and the declaration color: blue;.

2. Styling Properties
➢ CSS provides a wide range of styling properties that control various aspects
of a web page's appearance, including:
➢ Typography: Properties like font-family, font-size, font-weight, and text-
align control text styling.
➢ Colors: Properties like color and background-color determine text and
background colors.
➢ Layout: Properties like width, height, margin, padding, and display control
the layout of elements.
➢ Borders and Box Model: Properties like border, border-radius, and box-
shadow affect element borders and spacing.

College Of Applied Science Perissery


15
BBDMS

➢ Positioning: Properties like position, top, left, and z-index control the
positioning of elements.
➢ Transitions and Animations: Properties like transition and animation enable
smooth transitions and animations.
➢ Flexbox and Grid: CSS includes advanced layout systems like Flexbox and
Grid for creating complex layouts.

3. Specificity and Inheritance


➢ CSS uses a system of specificity to determine which styles take precedence
when multiple conflicting styles are applied to the same element.
➢ Inline styles (styles applied directly to an HTML element) have the highest
specificity, followed by IDs, classes, and element selectors.
➢ CSS styles can also be inherited from parent elements to child elements, but
not all styles are inherited by default. Text-related styles are typically
inherited, while layout-related styles are not.

4. CSS Rules and Selectors


➢ CSS rules consist of a selector and a set of declarations enclosed in curly
braces. For example:

p{
color: blue;
font-size: 16px;
}
➢ Selectors can be simple, like element selectors (p, h1, etc.), or complex, like
combination selectors (#myID .myClass).
➢ It can group multiple selectors together to apply the same styles to different
elements, like h1, h2, h3 { font-family: Arial; }.

College Of Applied Science Perissery


16
BBDMS

5. External, Internal, and Inline CSS


➢ CSS can be applied to HTML documents in three ways:
➢ External CSS: Styles are defined in a separate .css file and linked to the
HTML document using the <link> element.
➢ Internal CSS: Styles are defined within the <style> element in the document's
<head> section.
➢ Inline CSS: Styles are applied directly to individual HTML elements using
the style attribute.

6. CSS Preprocessors
➢ CSS preprocessors like Sass and Less extend CSS's capabilities by adding
features like variables, functions, and nesting, making it easier to write and
maintain complex stylesheets.

7. Responsive Web Design


➢ CSS is crucial for creating responsive web designs that adapt to different
screen sizes and devices. Media queries and flexible layout techniques like
Flexbox and Grid are commonly used for this purpose.

8. Cross-Browser Compatibility
➢ Web developers often need to write CSS that works consistently across
different web browsers. This can require using vendor prefixes and
employing techniques to address browser-specific issues.

CSS plays a vital role in web development by separating content (HTML) from
presentation (CSS), which allows for consistent styling and easier maintenance of
web pages.

It gives web designers and developers precise control over the visual aspects of a
website, making it an essential technology for creating modern, appealing, and user-
friendly web experiences.

College Of Applied Science Perissery


17
BBDMS

JAVA SCRIPT (JS)

JavaScript is a versatile and widely-used programming language primarily used for


building interactive and dynamic web applications. It's an essential part of web
development alongside HTML and CSS.

1. Client-Side Scripting

JavaScript is primarily a client-side scripting language, which means it runs in the


user's web browser. It enables developers to create interactive and responsive web
pages by manipulating the Document Object Model (DOM) of the web page.

2. Core Features
➢ Variables and Data Types: JavaScript supports various data types, including
numbers, strings, booleans, objects, arrays, and functions. Variables are used
to store and manipulate data.
➢ Control Structures: Like other programming languages, JavaScript provides
control structures such as conditionals (if, else, switch), loops (for, while),
and error handling (try, catch) for making decisions and controlling program
flow.
➢ Functions: Functions in JavaScript are blocks of reusable code that can be
defined and invoked. They are a fundamental building block for organizing
and structuring code.
➢ Objects: JavaScript is an object-oriented language, and objects are a core
concept. Everything in JavaScript, including functions and arrays, is an
object. Objects can have properties and methods.
➢ Events: JavaScript allows you to handle various events, such as user
interactions (clicks, mouse movements), keyboard input, and timers. Event
handlers can be used to respond to these events.

College Of Applied Science Perissery


18
BBDMS

➢ Asynchronous Programming: JavaScript supports asynchronous


programming through callbacks, promises, and async/await, making it
suitable for handling tasks like fetching data from servers without blocking
the user interface.

3. DOM Manipulation

JavaScript can interact with and manipulate the DOM, which is a tree-like
representation of the HTML structure of a web page. This allows developers to

dynamically update content, handle user input, and create interactive web
applications.

4. Browser Compatibility
➢ JavaScript is supported by all major web browsers (e.g., Chrome, Firefox,
Safari, Edge), ensuring broad compatibility for web applications.

JavaScript is a powerful language that is central to modern web development. It


enables developers to create interactive, feature-rich web applications, and its
versatility extends to server-side development as well.

AJAX

AJAX, which stands for Asynchronous JavaScript and XML, is a set of web
development techniques used to create interactive and dynamic web applications.
AJAX allows you to update parts of a web page without requiring a full page reload,
providing a smoother and more responsive user experience.

1. Asynchronous Communication

The key feature of AJAX is its ability to send and receive data from a web server
asynchronously, which means the user can interact with a web page while data is
being loaded or sent in the background.

College Of Applied Science Perissery


19
BBDMS

2. Core Components
➢ JavaScript: AJAX relies heavily on JavaScript to make asynchronous
requests and manipulate the DOM to update the page dynamically.

➢ XMLHttpRequest (XHR) Object: Historically, AJAX used the XHR object


to send and receive data from the server. However, modern web development
often uses the fetch API, which is a more modern and versatile way to handle
HTTP requests.
➢ Server-Side Scripting: On the server side, AJAX typically interacts with
server-side scripting languages like PHP, Python, Ruby, or Node.js to process
requests and generate responses. These scripts can retrieve data from
databases, perform calculations, or fetch data from external sources.

3. Benefits of AJAX
➢ Improved User Experience: AJAX eliminates the need for full page reloads,
making web applications more responsive and interactive.
➢ Reduced Bandwidth Usage: Only the necessary data is transmitted between the
client and server, reducing bandwidth consumption and speeding up data
retrieval.
➢ Efficiency: AJAX enables partial updates, so only specific sections of a web
page are modified, reducing the workload on the server and improving
performance.

AJAX has played a significant role in enhancing the user experience of web
applications by allowing for dynamic updates without the need for full page reloads.
It remains a valuable tool in web development, but its usage may vary depending on
the specific requirements of a project and the technologies employed in modern web
development practices.

College Of Applied Science Perissery


20
BBDMS

2.2 BACK END

MySQL

MySQL is an open-source relational database management system (RDBMS) that is


widely used for storing, managing, and retrieving structured data. It is a powerful and
popular choice for web applications and other software systems that require robust
data storage and management capabilities.

1. Relational Database Management System (RDBMS)

MySQL is classified as an RDBMS because it organizes data into structured tables


with rows and columns. It follows the principles of relational databases, which allow
for efficient data storage and retrieval through the use of SQL (Structured Query
Language).

2. Key Features
➢ Tables: Data in MySQL is stored in tables, where each table consists of rows
and columns. Columns represent fields, while rows contain individual data
records.
➢ SQL: MySQL uses SQL for querying and manipulating data. SQL allows you
to create, read, update, and delete records, as well as define relationships
between tables.
➢ ACID Compliance: MySQL ensures data integrity by adhering to the ACID
(Atomicity, Consistency, Isolation, Durability) properties. These properties
guarantee that database transactions are processed reliably.
➢ Indexing: MySQL supports the creation of indexes on columns, which
improves data retrieval performance, especially for large datasets.
➢ Transactions: It allows you to group multiple SQL statements into
transactions, ensuring that a series of operations either succeed or fail as a
single unit.
➢ Security: MySQL offers user authentication and authorization features,
allowing administrators to control who can access the database and what
actions they can perform.

College Of Applied Science Perissery


21
BBDMS

➢ Replication: MySQL supports data replication, allowing you to create copies


of a database on different servers for redundancy and load balancing.
➢ Scalability: MySQL can handle large amounts of data and high query loads,
making it suitable for both small and enterprise-level applications.
➢ Triggers and Stored Procedures: You can define triggers and stored
procedures in MySQL, which are sets of pre-defined actions that can be
executed when certain events occur.

3. Storage Engines

MySQL provides multiple storage engines, each with its own advantages and use
cases. Common engines include InnoDB (for transactions and foreign key support),
MyISAM (for read-heavy applications), and MEMORY (for in-memory tables).

4. Command-Line and GUI Tools

MySQL can be interacted with using command-line tools like mysql and mysqldump.
Additionally, there are graphical user interface (GUI) tools available, such as
phpMyAdmin and MySQL Workbench, that provide a more visual way to manage
databases.

5. Licensing

MySQL is dual-licensed under the GNU General Public License (GPL) or a


commercial license. This means you can use it freely under the GPL or purchase a
commercial license for proprietary use.

MySQL's versatility, performance, and scalability make it a popular choice for many
different types of applications. Whether you're building a small website or a large-
scale enterprise system, MySQL provides a reliable and feature-rich database
solution for managing your data

College Of Applied Science Perissery


22
BBDMS

PHP

PHP, which stands for "PHP: Hypertext Preprocessor," is a widely used server-side
scripting language for web development. It is especially well-suited for creating
dynamic web pages and web applications.

1. Server-Side Scripting
PHP is a server-side scripting language, which means it runs on a web server and
generates dynamic content in response to user requests. The result is typically
HTML, but it can also be XML, JSON, or other formats.

2. Core Features
➢ Variables and Data Types: PHP supports various data types, including
integers, strings, arrays, and objects. Variables are used to store and
manipulate data.
➢ Control Structures: Like other programming languages, PHP provides control
structures such as conditionals (if, else, switch), loops (for, while), and error
handling (try, catch) for making decisions and controlling program flow.
➢ Functions: PHP allows you to define functions for encapsulating and reusing
code. It also comes with a wide range of built-in functions for common tasks.

➢ Superglobals: PHP includes predefined arrays like $_GET, $_POST,


$_SESSION, and $_COOKIE that make it easy to access data sent by clients
and maintain session information.
➢ File Handling: PHP provides functions for reading and writing files on the
server, which is useful for tasks like storing user data or managing
configurations.

College Of Applied Science Perissery


23
BBDMS

PHP is a versatile and powerful scripting language that has been a cornerstone of web
development for many years. While it faces competition from other server-side
languages, PHP continues to be a popular choice for building dynamic and interactive
web applications and websites. It is an essential technology for web developers
looking to create server-side functionality and deliver dynamic content to users.

For Example

<!DOCTYPE html>
<html>
<head>
<title>Dynamic Page</title>
</head>

<body>
<h1>Welcome, <?php echo "John"; ?>!</h1>
</body>
</html>

XAMPP

XAMPP is a free and open-source cross-platform web server solution stack that
simplifies the process of setting up a local development environment for web
applications. The name "XAMPP" is an acronym that stands for:

➢ X - Cross-platform: XAMPP is available for Windows, macOS, and Linux,


making it versatile and suitable for developers using different operating
systems.
➢ A - Apache: Apache HTTP Server is included as the web server component
of XAMPP. It is one of the most widely used web servers in the world.

College Of Applied Science Perissery


24
BBDMS

➢ M - MySQL: XAMPP includes MySQL or MariaDB as the relational


database management system (RDBMS) for storing and managing data.
➢ P - PHP: PHP (Hypertext Preprocessor) is included for server-side scripting.
PHP is used for creating dynamic web applications and is often paired with
databases like MySQL.
➢ P - Perl: XAMPP also includes Perl, a popular scripting language, although
its use is less common in web development compared to PHP.

Key Features and Components of XAMPP

➢ Web Server (Apache): XAMPP bundles the Apache HTTP Server, which
serves web pages to your local development environment.
➢ Database Server (MySQL or MariaDB): XAMPP provides a database server,
either MySQL or its compatible fork MariaDB, which allows you to create
and manage databases for your applications.

➢ Server-Side Scripting (PHP): PHP is a server-side scripting language


included in XAMPP. You can use PHP to create dynamic web applications.
➢ Additional Tools: XAMPP often includes other tools and software, such as
phpMyAdmin (a web-based database management tool), FileZilla (FTP
server), and Mercury (SMTP server), to enhance your development
environment.

Advantages of XAMPP

➢ Easy Setup: XAMPP is known for its user-friendly and straightforward


installation process. It simplifies the task of setting up a local web server
environment.
➢ Cross-Platform: XAMPP is available for multiple operating systems,
ensuring that developers can use the same development stack across different
platforms.

College Of Applied Science Perissery


25
BBDMS

➢ All-in-One Solution: XAMPP provides a comprehensive development stack,


including the web server, database server, and scripting language, reducing
the need to install and configure these components separately.
➢ Pre-Configured: XAMPP comes pre-configured with default settings that
work well for most development scenarios. However, you can also customize
settings to meet specific project requirements.
➢ Popular in Education: XAMPP is widely used in educational settings and for
quick prototyping due to its ease of use and versatility.

XAMPP is an excellent tool for web developers looking to create and test web
applications locally before deploying them to a production server. It offers a quick
and hassle-free way to set up a development environment with a web server,
database, and scripting language, making it a popular choice for beginners and
experienced developers alike.

College Of Applied Science Perissery


26
BBDMS

3. SYSTEM DESIGN

College Of Applied Science Perissery


27
BBDMS

3.1 INTRODUCTION
Design is the first step in the development phase of any system. It may be defined
as a new process of applying various techniques and principles for the purpose
of defining device, a process or a system in sufficient detail to permit its physical
realization. The design steps are:

System Design
Design has been described as a multistep process in which representation of data
and program structure, interface characteristics, and procedural detail are
synthesized from information requirement. Emphasis is given on translating
performance into design specification. Design goes through the logical and
physicals stages of development .logical design reviews present physical system
prepares logical design walkthrough. The physical design plans the system
implementation devices a test implementation and specifies any new hardware
and software.

Input Design
The user interface design is very important for any application. the interface
design describes how the software communicate within itself, to system that
interpreted with it and with humans who use it. The interface design is very good;
the user will fall into an interactive software application.

The input design is the process of converting the user-oriented inputs in to the
computer based format. The data is fed into the system using simple interactive
forms.

The forms have been supplied with message so that user can enter data without
facing any difficulty. The data is validated wherever it requires in the project.
This ensures that only the correct data have been incorporated into the system.

The goal of designing input data is to make the automation as easy and free from
error as possible. For providing a good input design for the application

College Of Applied Science Perissery


28
BBDMS

Easy data input and selection features are adopted. The input design requirement
such as user Friendliness, consistent format and interactive dialogue for giving
the right message and help for the user at right time are also considered for the
development of this project.

Output Design
A quality output is one, which meets the requirements of the end user and
present the information clearly .in many system results of processing are
communicating to the user and to other system through outputs. In the output
design it is determined how the information is to be displayed for immediate need
and also the hard copy output. It is the most important and direct source
information to the user. Efficient and intelligent output design improves the
system’s relationship with the user and helps in decision making.

The objective of the output design is to convey the information of all the past
activities, current status and to emphasize important events. The output generally
refers to the results and information that is generated from the system. Outputs
from computers are required primary to communicate the result of processing to
the user. They are also used to provide a permanent copy of these results for later
consideration.

3.2 DATA FLOW DIAGRAM

A dataflow is a graphical technique that depicts information flow and


transforms that are applied as data move from input to output. The DFD is also
known as data flow graph or bubble chart .the DFD is used to represent increasing
information flow and fundamental details. Also DFD can be stated as the starting
point of the design phase and functionally decomposes the requirement
specifications down to the lowest level of detail.

A level o also called a fundamental system model or a context level DFD that
represent the entire software elements as a single bubble with input and output
data indicated by incoming and outgoing arrows, respectively.

College Of Applied Science Perissery


29
BBDMS

Additional process and information flow parts are represented in the next level
i.e., level 1DFD, each of the processes represented at level1 are sub Functions of
overall. System depicted in the context model. Any processes that are complex
in level 1 will be further represented into sub functions of overall system depicted
in the context model Any process that is complex in level 1 will be further
represented into sub functions in the next level, i.e., level 2.

Data flow diagram is a means of representing a system at any level of detail


with graphic network of symbols showing data flows, data stores, data processes
and sources. The purpose of dataflow diagram is to provide a semantic bridge
between users and system developers. The diagram is the basis of structured
system analysis. A DFD describes what dataflow rather than how they are
processed, so it doesn’t depend on hardware, software, data structure file
organization.

Component of Data Flow Diagram


There are four symbols that are used in drawing of data flow diagrams:
➢ Entities

External entities represent source of data the enter the system or the recipients
of data that leave the system

➢ Process

Process represents activities in which data is manipulated by being stored


or retrieved or transformed in some way. A circle represents it. The process will
show the data transformation or change.

College Of Applied Science Perissery


30
BBDMS

➢ Databases

Databases represent storage of data within the system

➢ Dataflow

A data flow shows the flow of information from its source to its destination
line represents a data flow, with arrowheads showing the direction of flow

DATA FLOW DIAGRAM

LEVEL 0

College Of Applied Science Perissery


31
BBDMS

LEVEL 1

Admin View

LEVEL 1

Admin Details

College Of Applied Science Perissery


32
BBDMS

LEVEL 1

Donor Details

4 ER DIAGRAM
An Entity-Relationship Diagram (ER Diagram) is a graphical representation of entities,
their attributes, and the relationships between them in a database. It is used during the
database design process to visualize and organize data logically. Entities (depicted as
rectangles) represent objects or concepts like "Customer" or "Order." attributes (shown
as ellipses) describe properties of entities such as "Name" or "ID." and relationships
(represented by diamonds) illustrate associations like "Purchases" between "Customer"
and "Order." Additionally, cardinality defines how many instances of one entity relate to
instances of another e.g., one-to-one, one-to-many.

ER Diagrams provide a clear blueprint to ensure a structured and efficient database


design.
4.4.1 Entities:
An entity is a fundamental component that represents a real-world object,
concept, or thing within the database system. Entities are depicted as rectangles in the
diagram.

College Of Applied Science Perissery


33
BBDMS

4.4.2 Relationship:
A relationship represents an association or interaction between two or more entities.
Relationships are depicted as diamonds in the diagram and are labelled to specify the
nature of the association.

4.4.3 Degree of Relationship:


The degree of relationship in an Entity-Relationship Diagram (ER Diagram) defines the
number of entities involved in a relationship. It specifies how entities are connected,
providing clarity on the complexity of interactions. There are three types:

1 Unary Relationship (Degree 1)


2 Binary Relationship (Degree 2)
3 Ternary Relationship (Degree 3)
1. Unary Relationship
Unary relationship in ER modelling represents a connection within a single
entity,
where the entity is related to itself. It's often called a recursive relationship.
2. Binary Relationship
Binary relationship in ER modelling refers to a relationship involving two
distinct entities. This is the most common type of relationship, linking entities
like Student and Course through an association like "enrolls in" or Customer
and Order with "places."

3.Ternary Relationship
A ternary relationship in ER modeling is a relationship that involves three
different entities simultaneously. It is used when a direct relationship between
three entities cannot be properly represented using only binary (two-entity)
relationships.

College Of Applied Science Perissery


34
BBDMS

4.4.4 Symbols in ER Diagram


o Entities: Represented as rectangles, they signify the main objects in the database, such
as Student or Employee. Each entity can have attributes that describe its
characteristics.

o Relationships: Shown as diamonds, relationships define the associations between


entities, such as "enrolls" linking Student and Course. They provide context to how
entities interact with each other.

o Attributes: These are represented as ovals and describe properties of an entity, like
Name or Age. Attributes are connected to their respective entities or relationships with
a straight line.

o Connecting lines: are solid lines that connect attributes to show the relationships
of entities in the diagram

College Of Applied Science Perissery


35
BBDMS

4.5 Use Case diagram

A use case diagram is used to represent the dynamic behavior of a system. It


encapsulates the system's functionality by incorporating use cases, actors, and their
relationships. It models the tasks, services, and functions required by a system/subsystem
of an application. It depicts the high level functionality of a system and also tells how the
user handles a system. he main purpose of a use case diagram is to portray the dynamic
aspect of a system. It accumulates the system's requirement, which includes both internal

College Of Applied Science Perissery


36
BBDMS

as well as external influences. It invokes persons, use cases, and several things that
invoke the actors and elements accountable for the implementation of use case diagrams.

It represents how an entity from the external environment can interact with a part of the
system.

Following are the purposes of a use case diagram given below:


1. It gathers the system's needs.
2. It depicts the external view of the system.
3. It recognizes the internal as well as external factors that influence the system.
4. It represents the interaction between the actors.

Actors Use case

• Actors: are the entities that interact with a system. Although in most cases, actors are
used to represent the users of system, actors can actually be anything that needs to
exchange information with the system. So, an actor may be people, computer
hardware, other systems, etc.

• Use case: represents a user goal that can be achieved by accessing the system or
software application. In Visual Paradigm, you can make use of the sub-diagram feature
to describe the interaction between user and system within a use case by creating a
sub-sequence diagram .

College Of Applied Science Perissery


37
BBDMS

College Of Applied Science Perissery


38
BBDMS

4.6 DATABASE DESIGN

The most important aspect of building applications the design of database. The
data they store must be organized according to the user requirement. A well designed
database is essential for the good performance of the system. A database table known
as a relation provides information related to specific entity.

The basic function involved in a database system related to the information


required by the user is:

➢ Defining the data


➢ Input the data
➢ Locating the data
➢ Communicating the data
Data Normalization

The most important aspect of building an application is the design of


database. The data they store must be according to the user requirement. A well-
designed database is essential for the good performance of the system. A database
table is known as a relation that provides information related to specific entity. The
basic function involved in a database system related to the information required by
user .The data to eliminate redundancy and make sure that data is associated with
the correct table or relationship.

➢ Minimization of duplication of data.


➢ Enabling the model to be translated to database design.
➢ All relations in a relational database are required to satisfy the following
conditions.
Data in First Normal Form

➢ Remove repeating data from table.


➢ From the removed data, create one or more tables and relationships.

College Of Applied Science Perissery


39
BBDMS

Data in Second Normal Form

➢ Identify tables and relationships with one or more than one key.
➢ Remove data that depends on only one part of the key.
➢ From the removed data, create one or more tables and relationships.
Data in Third Normal Form

➢ Remove that depends on other hand in the table or relationships.


➢ From the removed data, create one or more tables and relationships.
Advantages of Normalization are :

➢ Helps in complexity of maintaining data relationships.


➢ It reduces inconsistency of data.
➢ Eliminate the repeating field.
➢ Create a row for each occurrence of a repeated field.
➢ Allows exploitation of column function.
The second normal form has the characteristics of the first normal form and all
the attributes must fully be depend on the primary key. The proposed system is using
second normal form as it is found most suitable.

DATABASE TABLES

This is one of the major tasks in designing the database. I is important to realize
that the design of the system is totally interrelated and so table design cannot really
bee consider in isolation from inputs, outputs, procedures, codes and security
requirements

Database Name:
RESULT
*Primary Key
** Foreign Key

College Of Applied Science Perissery


40
BBDMS

DATABASE DESIGN

TABLE: - tbladmin

FIELD DATA
SIZE CONSTRAINTS DESCRIPTION
NAME TYPE

ID* int 10 Primary key Login ID

AdminName varchar 120 Not Null Name

UserName varchar 120 Not Null User Name

Mobile Number
MobileNumber bigint 10 Not Null

Email varchar 200 Not Null Email ID

Password varchar 200 Not Null Password

AdminRegdate timestamp CURRENT_TIMESTAMP Date

College Of Applied Science Perissery


41
BBDMS

TABLE: - tblblooddonors

FIELD DATA
SIZE CONSTRAINTS DESCRIPTION
NAME TYPE
id int 11 Primary key Login ID

FullName varchar 100 Not Null Name


MobileNu Mobile Number
char 11 Not Null
mber
Email ID
EmailId varchar 100 Not Null

Gender varchar 10 Not Null Gender

Age int 11 Not Null Age


BloodGrou
varchar 10 Not Null Blood Group
p
Address varchar 255 Not Null Address

Message mediumtext Not Null Message


PostingDat CURRENT_TIMESTA
timestamp Posting Date
e MP
status int 1 Not Null Status

Password varchar(250) 250 Not Null Password

TABLE: - tblbloodgroup

FIELD
DATA TYPE SIZE CONSTRAINTS DESCRIPTION
NAME
ID* int(10) 10 Primary key Login ID

BloodGroup varchar 120 Not Null Blood Group

PostingDate timestamp 120 Not Null Posting Date

College Of Applied Science Perissery


42
BBDMS

TABLE: - tblbloodrequirer

FIELD DATA
SIZE CONSTRAINTS DESCRIPTION
NAME TYPE

ID* int 10 Primary key Login ID

BloodDonarID
int 10 Not Null Blood Donor ID
**

name varchar 250 Not Null Name

EmailId varchar 250 Not Null Email ID

ContactNumber bigint 10 Not Null Mobile Number

BloodRequirefo
varchar 250 Not Null Blood Details
r

mediumtex
Message Not Null Message
t

CURRENT_TIMES
ApplyDate timestamp Date
TAMP

TABLE: - tblcontactusquery

FIELD DATA SIZ DESCRIPTIO


CONSTRAINTS
NAME TYPE E N
id * int 11 Primary key Login ID
name varchar 100 Not Null Name
EmailId varchar 120 Not Null Email ID
ContactNumbe char
11 Not Null Mobile Number
r
Message longtext Not Null Message
PostingDate timestam CURRENT_TIMESTAM
p
Posting Date
P
status int 11 Not Null Status

College Of Applied Science Perissery


43
BBDMS

5. CODING AND TESTING

College Of Applied Science Perissery


44
BBDMS

5.1 CODING STEPS


The coding step is a process that transforms design into a programming language. It
translates a detailed design representation of software into a programming language
realization. The translation process continues when a compiler accepts source code as
input and produces machine dependent object code as output. Quality is an important goal
during coding. The quality of source code can be improved by the use of structured coding
techniques, good coding style, and readable, consistent code format. During coding, some
coding standards are to be followed. This has two purposes: reducing the chance of errors
and making it easier to modify the code later on. The coding phase affects both testing and
maintenance profoundly.

The "BBDMS" uses PHP as the programming language for coding. PHP is a widely-used,
open-source, interpreted scripting language especially suited for web development and can
be embedded into HTML. It is simple, efficient, and powerful, supporting object-oriented,
procedural, and functional programming paradigms. PHP integrates well with databases
such as MySQL, making it ideal for building dynamic and data-driven web applications.
It has built-in support for handling forms, sessions, file operations, and server-side logic,
while also allowing the use of external libraries and frameworks. PHP is highly extensible,
with modules and extensions that enhance its functionality. It also provides interfaces to
many system calls, APIs, and external services.
Finally, PHP is portable and platform-independent: it runs on almost all operating systems,
including Linux, Windows, and macOS, and is supported by most major web servers like
Apache and Nginx.
5.2. TEST PLANS
The purpose of system testing is to identify and correct errors in the candidate system.
Testing is an important clement of the software quality assurance and represents the
ultimate review of specification, design and coding. The increasing visibility of the
software as a system element and the costs associated with a software failure are motivated
forces for well planned, through testing.

The common view of testing held by users is that it is performed to prove that there are no
errors in a program. However, as indicated earlier, this is virtually impossible, since
analyst cannot prove that software is free and clear of errors. The tester, who may be the
program fail. A successful test, then, is one that finds an error. Analysts know that an
effective testing program does not guarantee system reliability. Therefore, reliability must
be designed into the system.

Need of Testing ,Testing is essential for:


 Existence of program defects of inadequacies is inferred.
 Verifies whether the software behaves as intended by its designer.

College Of Applied Science Perissery


45
BBDMS

 Checks conformance with requirement specification/user needs.


 Assesses the operational reliability of the system.
 Tests the performance of the system

 Reflect the frequency of actual user inputs.


 Finds the fault, which caused the output anomaly.
 Detects flaws and deficiencies in the requirements

Exercises the program using data like the real data processed by the program. The tan error
is used to refer the difference between the actual output of the software and the correct
output. Fault is a condition that causes the software to fail to perform its required function.

Software reliability is defined as the required function Software reliability is defined as


the probability that the software will not undergo failure for a specified time under
specified condition Failure is the inability of a system or a component to perform a
required function according to its specification. Different levels of testing were employed
for software to make an error free, fault free and reliable.

5.3 CLASSIFICATIONS OF TESTING


Black box Testing - Internal system design is not considered in this type of testing. Tests
are based on requirements and functionality.

White box Testing - This testing is based on knowledge of the internal logic of an
application's code. Also known as Glass box Testing. Internal software and code working
should be known for this type of testing. Tests are based on coverage of code statements,
branches, paths, and conditions.

Unit Testing - Testing of individual software components or modules. Typically done by


the programmer and not by testers, as it requires detailed knowledge of the internal
program design and code may require developing test driver modules or test harnesses.

Incremental integration Testing - Bottom-up approach for testing i.e., continuous testing
of an application as new functionality is added; Application functionality and modules
should be independent enough to test separately done by programmers or by testers.

Integration Testing - Testing of integrated modules to verify combined functionality after


integration. Modules are typically code modules, individual applications, client and server
applications on a network, etc. This type of testing is especially relevant to client/server
and distributed systems. knowledge of the internal logic of an application's code. Also
known as Glass box Testing. Internal software and code working should be known for this
t

College Of Applied Science Perissery


46
BBDMS

type of testing. Tests are based on coverage of code statements, branches, paths, and
conditions.

Functional Testing-This type of testing ignores the internal parts and focuses on whether
the output is as per requirement or not. Black-box-type testing geared to the functional
requirements of an application

System Testing-Entire system is tested as per the requirements. Black-box type testing
that based on overall requirements specifications, covers all combined parts of a system.

End-to-end Testing - Similar to system testing, involves testing of a complete application


environment in a situation that mimics real-world use, such as interacting with a database,
using network communications, or interacting with other hardware, applications, or
systems if appropriate.

Acceptance Testing -Normally this type of testing is done to verify if a system meets the
customer-specified requirements. The user or customer does this testing to determine
whether accept an application.

Load Testing - It's performance testing to check system behaviour under load. Testing an
application under heavy loads, such as testing of a website under a range of loads to
determine at what point the system's response time degrades or fails.

Stress Testing - The system is stressed beyond its specifications to check how and when
it fails Performed under heavy loads like putting large numbers beyond storage capacity,
complex database queries, and continuous input to system or database load.

Performance Testing-Term often used interchangeably with, stress" and, load" testing.
To check whether the system meets performance requirements. Used different
performance and had tools to do this.
Usability Testing - User-friendliness check. The application flow is tested, can new
users understand the application easily, Proper help is documented whenever the user
stuck at any point System navigation is checked in this testing.

Security Testing - Can the system be penetrated by any hacking way? Testing how well
the system protects against unauthorized internal or external access. Checked if the
system and database are safe from external attacks.

Compatibility Testing-Testing how well software performs in a particular


hardware/software/operating system/network environment and different combinations of
the above.

College Of Applied Science Perissery


47
BBDMS

Alpha testing - In house virtual user environment can be created for this type of testing.
Testing is done at the end of development. Still minor design changes may be made as a
result of such testing.

Beta testing – Testing typically done by end-users or others. Final testing before
releasing application for commercial purpose.

5.4 SAMPLE CODE

<?php
error_reporting(0);
include('includes/config.php');
?>
<!DOCTYPE html>
<html lang="zxx">

<head>
<title>Blood Bank Donar Management System | Home Page</title>

<script>
addEventListener("load", function () {
setTimeout(hideURLbar, 0);
}, false);

function hideURLbar() {
window.scrollTo(0, 1);
}
</script>
<!--// Meta tag Keywords -->

College Of Applied Science Perissery


48
BBDMS

<!-- Custom-Files -->


<link rel="stylesheet" href="css/bootstrap.css">
<!-- Bootstrap-Core-CSS -->
<link rel="stylesheet" href="css/style.css" type="text/css" media="all" />
<!-- Style-CSS -->
<link rel="stylesheet" href="css/fontawesome-all.css">
<!-- Font-Awesome-Icons-CSS -->
<!-- //Custom-Files -->

<!-- Web-Fonts -->


<link
href="//fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,7
00i,800,800i&amp;subset=cyrillic,cyrillic-ext,greek,greek-ext,latin-ext,vietnamese"
rel="stylesheet">
<link
href="//fonts.googleapis.com/css?family=Roboto+Condensed:300,300i,400,400i,700,70
0i&amp;subset=cyrillic,cyrillic-ext,greek,greek-ext,latin-ext,vietnamese"
rel="stylesheet">
<!-- //Web-Fonts -->

</head>

<body>
<?php include('includes/header.php');?>

<!-- banner -->


<div class="slider">
<div class="callbacks_container">
<ul class="rslides callbacks callbacks1" id="slider4">
<li>

College Of Applied Science Perissery


49
BBDMS

<div class="banner-top1">
<div class="banner-info_agile_w3ls">
<div class="container">
<h3>Blood bank services that you
<span>can trust</span>
</h3>

</div>
</div>
</div>
</li>
<li>
<div class="banner-top2">
<div class="banner-info_agile_w3ls">
<div class="container">
<h3>One Blood Donation Save three Lives
<span>every day</span>
</h3>

</div>
</div>
</div>
</li>
<li>
<div class="banner-top3">
<div class="banner-info_agile_w3ls">
<div class="container">
<!-- <h3>"Sometimes money cannot save life

College Of Applied Science Perissery


50
BBDMS

<span>but donated blood can</span>


</h3> -->

</div>
</div>
</div>
</li>
</ul>
</div>
</div>
<!-- //banner --><!-- Banner Bottom Section with bg1 class -->
<div class="banner-bottom py-5 bg1">
<div class="container py-xl-5 py-lg-4">
<div class="row align-items-center">

<!-- Left Text Content -->


<div class="col-lg-6 mb-4">
<div class="banner-left-bottom-w3ls">
<h3 class="text-white mb-4" style="font-size: 42px; font-weight: bold;">
High Professional Doctors
</h3>
<p style="font-size: 20px; color: #e0e0e0;">
All specialists have extensive practical experience and regularly attend training
courses in top medical education centers around the world.
</p>
</div>
<div class="mt-4">
<a href="about.php" class="w3ls-button-agile"

College Of Applied Science Perissery


51
BBDMS

style="padding: 14px 32px; font-size: 20px; background-color: #ff4d4d; border-radius:


8px; color: white; text-decoration: none;">
Read More <i class="fas fa-hand-point-right"></i>
</a>
</div>
</div>

<!-- Right Image Content -->


<div class="col-lg-6">
<img src="images/t3.jpg" alt="Doctors" class="img-fluid rounded shadow"
style="max-height: 850px; width: 100%; object-fit: cover;">
</div>
</div>
</div>
</div>

<!-- //banner bottom -->


<!-- blog -->
<div class="blog-w3ls py-5" id="blog">
<div class="container py-xl-5 py-lg-3">
<div class="w3ls-titles text-center mb-5">
<h3 class="title text-white">Some of the Donors</h3>
<span>
<i class="fas fa-user-md text-white"></i>
</span>
</div>
<div class="row package-grids mt-5">
<?php

College Of Applied Science Perissery


52
BBDMS

$status=1;
$sql = "SELECT * from tblblooddonars where status=:status order by rand() limit 6";
$query = $dbh -> prepare($sql);
$query->bindParam(':status',$status,PDO::PARAM_STR);
$query->execute();
$results=$query->fetchAll(PDO::FETCH_OBJ);
$cnt=1;
if($query->rowCount() > 0)
{
foreach($results as $result)
{ ?>
<div class="col-md-4 pricing" style="margin-top:2%;">

<div class="price-top">

<img src="images/bdl.jpg" alt="" class="img-fluid" />

<h3><?php echo htmlentities($result->FullName);?>


</h3>
</div>
<div class="price-bottom p-4">
<h4 class="text-dark mb-3">Gender: <?php echo htmlentities($result-
>Gender);?></h4>
<p class="card-text"><b>Blood Group :</b> <?php echo
htmlentities($result->BloodGroup);?></p>

<a class="btn btn-primary" style="color:#fff" href="contact-


blood.php?cid=<?php echo $result->id;?>">Request</a>
</div>

College Of Applied Science Perissery


53
BBDMS

</div><?php }} ?>

</div>
</div>
</div>
<!-- //blog -->

<!-- treatments -->


<div class="screen-w3ls py-5">
<div class="container py-xl-5 py-lg-3">
<div class="w3ls-titles text-center mb-5">
<h3 class="title" style="font-size: 42px;">BLOOD GROUPS</h3>
<span>
<i class="fas fa-user-md" style="font-size: 28px;"></i>
</span>
<p class="mt-2" style="font-size: 20px;">
Blood group of any human being will mainly fall in any one of the following
groups..
</p>
</div>

<div class="row">
<div class="col-lg-6">
<ul style="font-size: 20px; line-height: 1.8;">
<li>A positive or A negative</li>
<li>B positive or B negative</li>
<li>O positive or O negative</li>

College Of Applied Science Perissery


54
BBDMS

<li>AB positive or AB negative</li>


</ul>
<p style="font-size: 20px;">
A healthy diet helps ensure a successful blood donation, and also makes you
feel better! Check out the following recommended foods to eat prior to your donation.
</p>
</div>
<div class="col-lg-6">
<img class="img-fluid rounded" src="images/blood-donor (1).jpg" alt="">
</div>
</div>

<div class="row mb-4">


<div class="col-md-8">
<h4 style="padding-top: 30px; font-size: 28px;">UNIVERSAL DONORS AND
RECIPIENTS</h4>
<p style="font-size: 20px;">
The most common blood type is O, followed by type A.
<br><br>
Type O individuals are often called "universal donors" since their blood can
be transfused into persons with any blood type. Those with type AB blood are called
"universal recipients" because they can receive blood of any type.
</p>
<<a class="btn btn-lg btn-block login-button ml-lg-5 mt-lg-0 mt-4 mb-lg-0 mb-3"
data-toggle="modal" data-target="#exampleModalCenter1"
style="font-size: 20px; background: linear-gradient(to right, #ff416c, #ff4b2b); color:
white; border: none;">
Become a Donor
</a>

College Of Applied Science Perissery


55
BBDMS

</div>
</div>
</div>
<!-- //treatments -->

<!-- footer -->


<?php include('includes/footer.php');?>

<!-- Js files -->


<!-- JavaScript -->
<script src="js/jquery-2.2.3.min.js"></script>
<!-- Default-JavaScript-File -->

<!-- banner slider -->


<script src="js/responsiveslides.min.js"></script>
<script>
$(function () {
$("#slider4").responsiveSlides({
auto: true,
pager: true,
nav: true,
speed: 1000,
namespace: "callbacks",
before: function () {
$('.events').append("<li>before event fired.</li>");
},
after: function () {
$('.events').append("<li>after event fired.</li>");

College Of Applied Science Perissery


56
BBDMS

}
});
});
</script>
<!-- //banner slider -->

<!-- fixed navigation -->


<script src="js/fixed-nav.js"></script>
<!-- //fixed navigation -->

<!-- smooth scrolling -->


<script src="js/SmoothScroll.min.js"></script>
<!-- move-top -->
<script src="js/move-top.js"></script>
<!-- easing -->
<script src="js/easing.js"></script>
<!-- necessary snippets for few javascript files -->
<script src="js/medic.js"></script>

<script src="js/bootstrap.js"></script>
<!-- Necessary-JavaScript-File-For-Bootstrap -->

<!-- //Js files -->

</body>

</html>

College Of Applied Science Perissery


57
BBDMS

6 SYSTEM IMPLEMENTATION

College Of Applied Science Perissery


58
BBDMS

6 .1 INTRODUCTION

Implementation is the most difficult part of the stage and the key stage in
achieving a successful system. Implementation is the stage in the project where the
theoretical design is turned into a working system and is giving confidence on the
new system for the users that it will work efficiently and effectively. The objective
of the system implementation is to put the tested system into operation while
holding costs, risks and personal irritation to the minimum. Therefore it involves
careful planning, design of methods to achieve the changeover, an evaluation of
change over methods.

In order to implement a system, planning is very essential. Proper planning


has been done to take care of the following issues.

➢ Implication of the system environment


➢ Stand-by facilities
➢ Channels of communication
➢ Methods of change over resource
➢ Resources available
➢ Staff selection and allocation for every data
➢ Consultations with unions
Throughout all phases of the project, the activities of the project, the
activities of implementation were planned. Apart from planning, major task of
preparing the implementation are education and training of users. The more
complex system being implemented, the more involved will be the system analysts
and the design effort required for implementation.

Implementation is the final and important phase. The most critical stage in
achieving a successful new system and in giving the users confidence that the new
system will work and be effective. The system can be implemented only after
thorough testing. This method also offers the greatest security.

College Of Applied Science Perissery


59
BBDMS

In this system Microsoft SQL 2008 is used to create and connect relational tables to
the database. Visual Basic 6.0 is used to develop the Graphical User Interface (GUI).

6.2 SYSTEM SECURITY MEASURES

Security of a system is a crucial task. It is a process of ensuring confidentiality and


integrity of the OS. A system is said to be secure if its resources are used and
accessed as intended under all the circumstances, but no system can guarantee
absolute security from several of the various malicious threats and unauthorized
access. Security of a system can be threatened via two violations: Threat: A program
which has the potential to cause serious damage to the system. Attack: An attempt to
break security and make unauthorized use of an asset. Security violations affecting
the system can be categorized as malicious and accidental. Malicious threats, as the
name suggests are a kind of harmful computer code or web script designed to create
system vulnerabilities leading to back doors and security breaches. Accidental
Threats, on the other hand, are comparatively easier to be protected against.
Example: Denial of Service Destock. Security is an important property of any
software. Many applications are outsourced too where the application development
lacks strong integration of software security. The growing need to address software
security measures across development life cycle has been discussed here.
Application Security can be seamlessly integrated in the SDLC by introducing
specific steps or process within the development phases.

6.3 IMPLEMENTATION OF THE PROJECT

Implementation means putting the newly developed system into operation. It is the
plisse in the project plan where the theoretical design is put into real test. This is the
most crucial stage in the life cycle of a project. During implementation there has to
be a strong interaction between the developers and the users. This is the phase where
the new system is given a chance to prove its worth and to minimize the reluctance
to change. The proposed system may be entirely new, replacing an existing one or
may be modifications to the existing system to either case, proper implementation is
necessary to generate a Confidence among users. If the users have achieved
satisfaction with the new project, then the project can be termed as successful and
then onwards its maintenance and other subsequent works can be started. The
system goes for implementation only after passing through some rigorous testing,
especially when it comes to operating systems and other system software.

The implementation phase of the software development is concerned with


translating design specifications into source code. The user tests the developed
system and changes are made according to their needs. Our system has been
successfully implemented. Before implementation several tests to been conducted to
ensure that no errors are encounter during the operation. The implementation phase

College Of Applied Science Perissery


60
BBDMS

ends with an evaluation of the system after placing it into operation for a period of
time. Implementation is the third phase of the system process In order to achieve the
Objectives and the expected performance the system has been developed in a highly
interactive and user-friendly manner.

• The implementations stage involves following tasks:


• Careful planning.
• Investigation of system and constraints.

• Design of methods to achieves the changeover.


• Training of the staff in the changeover phase.

6.4 MAINTENANCE

Maintenance involves the software industry captive, typing up system resources. It


means restoring something to its original condition. Maintenance involves a wide
range of activities including correcting. Coding, and design errors, updating
documentation and test data, and upgrading user support. Maintenance was done
after the success implementation. Maintenance is continued till the product is
reengineered or deployed to another platform. Maintenance is also done based on
fixing the problems reported, changing the interface with other software or hardware
enhancing the software.

A Post-Implementation is conducted after completing a project. Its purpose is to


evaluate whether project objectives were met, to determine how effectively the
project was run, to learn lessons for the future, and to ensure that the organization
gets the greatest possible benefit from the project. After a long project, the last thing
many project teams want to do is relive the process and look for ways to improve.
However, a forward-looking review can discover many tips and strategies for
improvement. By conducting a thorough and timely PIR, you'll identify key lessons
learned and you can then apply those lessons to the planning and management of
future projects.

College Of Applied Science Perissery


61
BBDMS

7. APPENDIX

College Of Applied Science Perissery


62
BBDMS

Home Page

College Of Applied Science Perissery


63
BBDMS

Donor List

College Of Applied Science Perissery


64
BBDMS

Donor Registration

College Of Applied Science Perissery


65
BBDMS

Donor Login

College Of Applied Science Perissery


66
BBDMS

Donor Profile

College Of Applied Science Perissery


67
BBDMS

Change Password

College Of Applied Science Perissery


68
BBDMS

Admin
Admin Login

Dashboard

College Of Applied Science Perissery


69
BBDMS

Add Blood Group

Manage Blood Group

College Of Applied Science Perissery


70
BBDMS

Donor List

Manage Contact Us Query

College Of Applied Science Perissery


71
BBDMS

8. FUTURE ENHANCEMENT

College Of Applied Science Perissery


72
BBDMS

As there was a little number of contact person’s information given, some people may
face difficulty in getting blood fast. So I like to gather more information regarding the
contact persons in other cities as well as villages and will provide much more services
for the people and help everyone with humanity.

The other features, which the Blood bank services provide, can also be incorporated into
this Blood Bank. The Encryption standards can also be used to make the transactions
more secure. The Socket Secure Layer protocol can also use in implementing the system,
which gives highest security in the Internet.

College Of Applied Science Perissery


73
BBDMS

9. CONCLUSION

College Of Applied Science Perissery


74
BBDMS

This project has given me an ample opportunity to design, code, and test and
implements an application. This has helped in putting into practice of various Software
Engineering principles and Database Management concepts like maintaining integrity
and consistency of data. Further, this has helped me to learn more about MYSQL, PHP,
HTML, JAVASCRIPT, Adobe Photoshop 7.0 and Personal Web Server.

College Of Applied Science Perissery


75
BBDMS

10 BIBLIOGRAPHY

College Of Applied Science Perissery


76
BBDMS

BOOK REFERENCES
➢ Ramez Elmasri and Shamkant B.Bavathe - DATABASE SYSTEMS ,
Sixth Edition, Pearson Education
➢ K K Aggarwal, Yogesh Singh - Software Engineering,Third Edition, New
Age International Publications.
➢ “Beginning PHP”, Dave W Mercer, Allan Kent, Steven D Nowicki, David
Mercer, Dan Squier, Wankyu Choi, Wiley Publishing, Inc
➢ Rhea, John. A Beginner's Guide to Learning HTML (and Smacking
Zombies Upside the Web Development), Undead Institute, 2018
➢ Scott, MacDonald, and Powers. JavaScript Cookbook, 3rd Edition,
O'Reilly Media, Inc., 2021.

WEBSITES
1. https://www.php.netanual/en/history.php.php

2. https://www.mysql.com/why-mysql/presentations/

3. https://learn.jquery.com/style-guide/

4. https://api.jqueryui.com/1.12/category/interactions/

5. https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference

College Of Applied Science Perissery

You might also like