project blog responsive ads

Free download management system project documentation with JAVA, PHP AND ASP.NET source code. In all project report you will get introduction and objective of the project, system analysis, feasibility study, project planning, DFD diagram, system design, database design, complete project coding, and ER diagram of the project. These project reports and synopsis are useful for BCA, MCA BSC CS, MSC IT B.TECH, M.TECH and BE computer science last year students IGNOU, SMU university final year projects

Sponsored Links

ELECTRICITY POWER BILL MANAGEMENT SYSTEM PROJECT REPORT

ELECTRICITY POWER BILLING MANAGEMENT SYSTEM PROJECT REPORT

FREE DOWNLOAD ALL THE PROJECT REPORTS WITH SOURCE CODE FROM HERE
The software package LT BILLING SYSTEM can be used for computerising the electricity bill preparation of the consumers.  The project also contains programs for preparing various kinds of reports such as daily, monthly and personnel etc. This is developed in java a d the database used here is MS SQL SERVER.  It also developed programs to display information of consumers.  Many irregularities exist in the present system, which is manually maintained.  It requires high processing time.  Errors may also occur in this system.  The new system developed includes the provision for future expansion.

The main objective of this system is
1.      To reduce the manual processing time.
2.      To make the system easy for handling by organizing the system in the regular order.
3.      To reduce the  maintenance cost of the system
4.      To easily incorporate the future developments and changes.
5.      To maintain an error free data base.
To achieve this objective we have designed a LT BILLING SYSTEM.  This software package can be operational in menu driven way which will be helpful to the end user

 




PERSPECTIVE TO COMPUTERS - ELECTRICITY POWER BILL MANAGEMENT SYSTEM

Computers are l the most powerful tool man has ever created. Computer has made a great impact on one every day life.  Computers, personnel computers, mainframe computers, super computers are the integral part of daily life.  All kinds of people for variety of tasks in modern industrialized society using the computers.

                        Computer is a programmable machine Earlier computers were used for complex computations and used by only scientist and engineers.  Developments in software and hardware applications of computers for non computational jobs like weather forecasting designing , painting, preparation and manipulation of data storage  and data retrieval, sending  graphics and pictures from one end to  another end   artificial intelligence and  expert systems are the another  modern era facilities provided  by  the computers. Among them robotics is the latest.

                        Most exiting development may perhaps occur the area of information technology internet contributed a lot to this. Internet is a rather the result of a collaborative effort of people and connected computers installed and functioning in different.  Internet is a system of connected computers that allow your desk top computer to exchange data messages and files with any of the very large number of other computers with connections to the internet.  Electronic mail is the most important activity made possible by computer communications.  E-mail is the one feature re that nearly every internet user

uses nearly every day.  Any one who was connected to the internet could sent and receive E-Mail message to anyone.  Hotmail, web servers etc provides survive to avail this facility. Chatting, video conferencing are now a common process to everybody’s life.

NEED OF INFORMATION TECHNOLOGY

                        Most important aspect of the interface is the communication between user and the computer.  Information is the back born of any system.  It is fairly established a fact that information technology has become a strategic weapon in the present information dominated era.  Internet is per4haps the most exciting development take place in the area of information Technology today.  Information is a powerful tool.  People are increasingly becoming dependent on   Information generation in the electronic media the world over.    A user can now have all the latest information   that needs one this finger tips.    Access to information as a basic right can stimulate the world’s economy to the benefit of all.
                        There is  today we have in need of developing low cost ,high quality, better functioning information products that satisfy  human needs  important aspect of   achieving  timely  identification of information needs may be sufficient to cater the needs of the  business groups.

ABOUT JAVA:-
Java is a computer language with a difference.  It is a purely object oriented.  It has having   many features of C++. It can also say that this may be a complete language available today.  This language can be used for doing web based programs.  Java supports
1.      Data abstraction and encapsulation.
2.      Inheritance
3.      Polymorphism


4.      Dynamic binding
5.      Message communication.

BENEFITS AND APPLICATION OF OOPS

                  Since oops supports inheritance and polymorphism, it eliminates redundant codes and extend the use of existing classes.   So we can build the programs on a classic working model.  This saves development of time and disc space. This ensures higher productivity.   Data hiding helps the programmer to build secure applications.   It is easy to have multiple objects to coexist and better possibility of up gradation.  Software complexity can easily manage.  Following a re the features of java.
·        Compiled and interpreted.
·        Platform in depended and portable
·        Object oriented
·        Robust and secure
·        Distributed
·        Familiar, simple and small
·        Multithreaded and  interactive
·        High performance
·        Dynamic and extensible
Java compiler compiles and interprets the source code, and generates machine code that can be directly run by the JRE.  Since this code is platform independent it can be ported to any system we use or work on.  This feature enables the programmer to develop browser programs.   Actually java provides unlimited number of cacheable applets and applications.
           

Each and every thing in java is represented in objects.   All the data and objects are rests inside the objects and classes.  Java provides many safeguards, it has strict run time and compile time checking, security issue is more concerned for the programming people.  A programmer cannot access a memory location without clear authorization.  Java is a distributed language; this is used to create applications in the network.  This enables multiple programmers to work in the same program to develop modular functions.  Many feature of C and C++ are incorporated into this language hence there occurs more detailed comparison of java with C

            Java provides safeguards to code written it is designed as garbage collected language relieving the programmers virtually all memory management problems.   Security becomes an important issue for a language that is used for programming on internet.  Threat of viruses and abuse of resources lies everywhere.  Java systems not only verity all memory access but also ensure that no virus are communicated with applet.   The absence of pointers in java ensures that programs cannot gain access to memory location without proper authorization.

            Java is referred as distributed language for creating applications on networks It has the ability to share data, database and programmers.  These applications can be access to remote objects on internet as easily as they can do in a local system.  This enables multiple programmers at multiple remote locations to collaborate and work together on a single project.

                        Java is referred as simple language.  Java uses multithreading capabilities.  This means we need not wait for the application to finish one task before beginning another.  This support multiprocessor synchronization and construct smoothly running interactive system.  Multithreading incorporates the enhancement of overall execution speed of java programs.

                        Java is a dynamic language, capable of linking in new class libraries, methods, and objects.  These functions are known as native methods.  This facility enables the programmers to use the efficient factions available in this language.

File operations in java programmers:
            Files are primary source and destination for data within most programmers. File operations are common in any language.  Java devotes whole range of methods found in a class called file in the java .io package.

ABOUT MS SQL SERVER:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM

            SQL Server is built to deliver the performance scalability and transactional in gritty required for heavy-duty high visibility databases.  If the data is critical to an organization, then a well developed and maintained sol sever based application is worthy of the tasks.  SQL Server is a complete database system and fully mastering its scope can take years.  In terms of features, commands subsystems, components, and possibilities, SQL sever is one of the largest and most complex database in the market.  Desktop database perform all the database tasks the entire client.   While multi-user desktop database may use client sever fuelled processing it doesn’t qualify as client

server database.  To visualize a desktop database searching for phone number, picture the entire telephone book moving through network actually some desktop database to try to optimize the operation by opening only a portion of the database file, such as an index or a data page.  Once the client computer has the index the client computer searches it and selects the correct row.  It then opens the table and retrieves the row.

            In contrast to the desktop databases which make the clients do all the work client server databases are like research librarians who handle the request by finding the information, and then return a photocopy.  The actual reference materials never leave the watchful eye of the research librarian.
 
            A database is used for day today processing with frequent data inserts updates, and searches is referred to an online transaction processing database OLTP databases typically have multiple purposes with several front end applications  accessing he data for searches modifications  and reporting.  Another database type is the online analysis processing database.  These databases generally receive large amounts of data from several OLTP databases in a process called extract transform load (ETL). Primary task of OLAP database is data retrieval and analysis so the data integrity; concerns presents with an OLTP database don’t apply.

Relationship cardinality:-

            The cardinality of the relationship describes the number of tuples on each side of the relationship.  Either side of the relationship may either   be restricted to a single tuples or allow multiple tuples.  The type of key enforces the e restriction of multiple tuples. Primary keys enforces the single tuples restriction while foreign key permit multiple tuples.

Relationship type
First entity’s key
Second entity’s key
One to one
Primary entity primary key _single tuples
Primary entity primary key _single tuples
One to many
Primary entity primary key _single tuples
Secondary entity foreign key multiple tuples
Many to many
Secondary entity foreign key multiple tuples
Secondary entity _ foreign key multiple tuples

Relationship optimality is the difference between an optional and mandatory relationship.  That is some secondary tuples requires a foreign key point to a primary key.  The secondary tuple would be incomplete or meaningless without the primary entity.  It is critical in the sense that the relationship be enforced as a mandatory relationship for the following reasons.

1.      An order line item without an order is meaningless.
2.      An order without a customer is invalid. 
3.      In the cape hatteras adventures database, an even without an associated tour tuple is a useless event tuple.



DATAMODELS:-
            A data model describes the logical relationship between data in a database and doesn’t concern with the specific values that a data item might take.
There are three data models:-
1.      hierarchical
2.      network
3.      relational
Most relational database management system supports a single data mode.  Most of the micro computer database is relational as they are simpler and more powerful.

DATA BASE:-
            Database technology has been descried as one of the most rapidly growing areas of computer and information science as a field it is still comparatively young.  Basically it is nothing more hat computer based record keeping systems; that is a system whose overall purpose is to record and to maintain.  A database system involves four major components.
1.      data
2.      hardware
3.      software
4.      users
Database is a repository of for stored data.  In general it is both integrated and shared.  Hardware consists of the secondary storage volumes disks, drums etc.  Between the physical database itself and the users of the system it is a larger of software.  Users are application programmers responsible for writing applications programs that use the database.  End user

accessing the database from the terminal and another user is database administrator.

DATABASE MANAGEMENT SYSTEM:-

            All requests from users for access to the database are handled by the Database Management system.  Between the physical database and the users of system is a layer of software, usually called Database Management System is thus shielding of database users from hardware level detail.  The Database Management System is the software that handles all access to the database.  Database Management system performs necessary operation on the stored database and intercepts the request and interprets it. 

The need for relational database management system.
1.      Lack of data definition or program independence.
2.      Data redundancy
3.      Data integrity
4.      Adhoc queries. Multi user  issues
5.      Security issues
6.      Development and maintains of  application systems


SYSTEM DEVELOPMENT TOOLS:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM

            These are tools typically available to development stuff using a Relational Database Management System and can be broadly grouped under
1.      structured query language(SQL)
2.      Form management
3.      4GL
4.      Report Generators

Structured Query Language is the DDL/DML for relational database management system.  Structured Query Language statement can be entered at an interactive keyboard or screen for immediate interpretation and processing by the relational database management system.   The form management feature of relational database management system enable the development of such applications with remarkable rapidity compared to traditional programming methods.  They also support the subsequent running of the application of the users.
 
ABOUT COMPUTER SYSTEM:-
            The computer is used for developing the software entitled “LT BILLING SYSTEM is an IBM based Pentium IV.   The hardware and software which are used in the development is as follows
HARDWARE SPECIFICATION

        
1
System PC/XT
2
Pentium III and above
3
Clock speed 33 MHz  and above
4
Word length 32bit/64bit
5
Ram capacity  256mb  or above
6
Visual display unit  CRT or LCD
7
Monitor 24x80  B/W or Color
9
Key board 101 keys
10
Printer TVS or wipro 136 column
11
Memory  80 GB or above




SOFTWARE SPECIFICATON
            Operating system windows xp, JRE for windows platform, java 1.5.0

ABOUT THE SOFTWARE:-
            Java was selected for computerization of billing system is based on some rules and principles.  Once the programmer has analyzed the problem to be programmed.  The objective of our project is to provide a better management of the billing branch and provision is included to include the cash collection also to be included as a part of the billing system later.   Several windows are designed in addition to the main program so that future applications also may be included while in the expanding environment of the computer application.  Though networking facility is not included presently, it also can be included in the future without much strain because all the codes have been written in java.

ABOUT THE ORGANISATION:-
            The Kerala State Electricity Board was formed as per section 5(1) of the Electricity supply act 1948, 1st April 1957 as successor of the Electricity Department of the Kerala State.  KSEB is the sole authority  which has been responsible for the generation,  transmission and supply of electricity in the State of  kerala, and where  the  distribution profit centers play a major role in  the collection of revenue and management of  distribution of  power  and proper accounting of the  revenue collection.   KSEB generates power mainly form the hydro power and it has now the capacity to design and build sophisticated hydro power projects with its on design.  Board has now equipped with ample number of brilliant engineers and accountants to manage its resources.

ABOUT THE PROJECT:-
            L T BILLING SYSTEM has been developed to computerize the billing system of KSEB where all dealing was done manually earlier.  Now a day’s computerization is spreading with great speed.  Many organizations are being computerized and are surely enjoying the benefits of computerization.

            Earlier one person was gone to collect the meter reading, then another one check the unit charge and another person calculate the total charge.  These details are all stored in special records.  Though al the most importance, tedious a care needed job is the bill calculation.  Any one of mistakes may cause severe consequence.  Computerization helps to overcome all these problems, by integrating the system that is the above said jobs can be done by a single person.  That is one computer user LT BILLING SYSTEM helps to create accurate bills, with great speed.  This includes the consumer details report generation.

EXISTING SYSTEM:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM

            A system can be regarded as a set of interacting elements, producing outputs from a set of inputs.  Existing system is completely manual.  There may be a lot of chance of clerical and procedural errors.  Existing system has several disadvantages such as
                                    1. Redundancy in stored data
                                    2. Lack of security
                                    3. Data is inconsistent
                                    4. More time required
                                    5. Waste storage space

                                    6. Manpower required
                                    7. Errors may occur
                                    8. Regular watching and supervision is necessary

PROPOSED SYSTEM:-

            The system avoids the difficulties of the existing system. The Advantages of proposed system are

1.      Faster performance
2.      Redundancy can be reduced
3.      Time saving
4.      Inconsistency can be avoided
5.      Data Sharing
6.      Security restrictions  can be applied
7.      Less storage space required
8.      Debugging

CHARECTRISTICS OF A SYSTEM:-ELECTRICITY POWER BILL MANAGEMENT SYSTEM

                        Any array of elements or entity arranged according to a plan to achieve an objective or a system is a set of object with relation between those objects and between their attributes.  Any system can be considered as a collection of group of subsystems.  Failure of a subsystem can lead to the failure of a project



CHARAECTERISTICS OF A SYSTEM:-
1.      Organization
2.      Interaction
3.      Interdependence
4.      Integration
5.      Central objective

ELEMENTS OF A SYSTEM:-
1.      Inputs and outputs
2.      Processors
3.      Control
4.      Feedback
5.      Boundaries and interphase
6.      Environment
7.       

SYSTEM ANALYSIS:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM

            In a process of analyzing a system with the potential goal of improving or modifying it.  In other words system analysis involves the study of the present system and formulates the design of something to achieve a desired goal.  In order to modify it hopefully for the better.    Analysis is the process of breaking down the problems into smaller elements for study and ultimately solution.  The system analysis approach to a problem differs from trial and error approach.  In trial and error method, identifying a number of solutions to the problem and then testing each randomly until the alternative appears to

provide can acceptable solution.  In the system analysis approach all major influences and constraints are identified and evaluated in terms of this impact on the various decision points in the system.   A decision point that point in a system at which some person or automatic mechanism must react to input output data and make a division.

STAGES OF COMPUTERIZATION:-
            The way to computerize can be
1.      Initial investigation
2.       Feasibility study
3.       System design
4.       Programming
5.       Implementation
6.      Evaluation
7.      Documentation.

1.     Initial investigation:-
The term is obvious is a study should made in recognizing the various requirements of the business.   It is directed towards clarifying the problem and strengthening the analyst background in the problem area.  The initial investigation is beginning by studying the organization responsible for current system and identifying product flow and information flow.  Study of existing system of organization provides background knowledge of problem area.  The requirement analysis is vital because based up on these arguments only we can to step to next.



2.     Feasibility study:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM

                        A feasibility study is a test of system proposal according to its workability, impact on the organization, ability to meet user need s and effective use of resources.  The objective of a feasibility study is not to solve the problem but to acquire a sense of its scope.  The result of feasibility study is simply a report.  This report contains the nature and scope of the proposed solution the three aspects in feasibility study are technical feasibility, operational feasibility.

2.     System design:-
                        It is the process of planning a new business system or one to replace compliment an existing system.  The design of an information system produces the details that state how a system will meet the requirements identified during analysis.


3.       Programming:-
                        Transforming the system analysis idea procedures to computer programs is a programmer’s job. The selection of programming language depends upon the type of application we are doing.  After programs being written to meet on specific purpose, the programs are completed, debugged and stimulated with some preliminarily data is satisfying it the same purpose.




4.       Implementation:-
                        Implementation is the process of having systems personnel checkout and put new equipment into use, train users, installs the new application, and constructs any files of data needed to use it.
           
Depending  on the size of the organization that will be  involved in using their application and the risk associated with  its use, system developers may choose  to pilot  the operation in only one  area  of the firm, say in one department or with only one or two persons.

5.       Evaluation:-
                        Evaluation of a system is performed to identify its strength and weakness. The actual evaluation can occur along any of the following dimensions. Operational evaluation, Organizational impact, user manager assessment.

6.       Documentation:-
                        It is one of the important aspects of a computer system programmers are also responsible for documenting the program, providing an explanation of who  and why certain  procedures are coded in specific ways.  Documentation is essential to test the program and carry on maintenance once the application has been installed.






                       
SYSTEM DESIGN

INTRODUCTION TO SYSTEM DESIGN:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM

                        The design phase is the life cycle phase in which the detailed design of the selected system in the study phase is accomplished.   In the design phase, the technical specifications are prepared for the performance of all allocated tasks.  It also includes the construction of programs and program testing.
 
                        In the design phase, the first step is to determine the output is to be produced and in what format.  Second, input data and master files have to be designed to meet the requirements of proposed output.
           
                        The system analyst has to define the methods of capturing and input programs and format of the output and its use by the users.

SYSTEM FLOW CHART:-
                        A graphic representation of a system showing the overall flow of  control in the processing  at the job level;  specifies  what activities must be done to  convert from a physical to logical model is known  as a system flowchart.  Thus it summarizes what operations are undertaken and where and when they take place.  Normally in a system flowchart input from outside are shown to the left and outputs to the right.  Symbols representing the  operations


undertaken and  the documents used are then placed in  the appropriate places which gives a general flow of  data from top to bottom and left to right. 

Arrows are used on the connecting lines to indicate the logical flow or sequence where the flow is not in the standard direction.  No interaction is implied by crossing lines.  Decisions which lead to different actions can also be shown

DATA FLOW DIAGRAM:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM

                        A data flow diagram is graphic representation of a system that shows data flows to, from and with in the system, processing functions that change the date in some manner, and the storage of this data.  They are networks of related system function that indicated form where information is revived and to where it is sent.  An external entity is the originator or receiver of data or information.
            .
A data store symbol portraits a file or database in which data resides.  A process is depicted by a circle some times it is called a bubble or transform.  Process portraits the transformation of the content of status of data

DATABASE DESIGN:-
            This activity deals with the design of the physical database. The designer begins to concentrate on file design or how data should be organized around user requirements.  How data are organized depends on the data and response requirements that determine hardware configurations.

            An integrated approach to file design is the database.  The general theme is to handle information as an integrated whole, with a minimum of redundancy

and improved performance, type and size of data structure used.  The objectives of data base are accuracy and integrity, privacy and security of data etc.

CODE DESIGN:-
                        Codes can provide brief identification of data items and replace longer descriptions that would be more awkward to store and to manipulate.

INPUT DESIGN:-
Input design is processing of converting the user oriented description of the inputs of the system.   The goal of designing input data to make data entry as easy logical and free from errors as possible.  In entering data, operates need to know the following.

1.      The allocated space for each field.
2.      Field sequence which must match that in the source document.
3.      The  format in which data fields are entered for example, filling out the data field is  required through the edited format  mm/dd/ yy

When we approach input data design, we design source documents that capture the data and then selected the media use to enter them into the computer.  There are different ways in which data can be introduced into the system such as

a.      The data is converted into a machine sensible from by some realistic source document and types in the relevant items using a keyboard connected to the system.

b.      The document can be read directly by a machine and this converts               information held in the human sensible form into a machine readable form without need for human investigations.

c.      Data entered into a system through a keyboard.  This is done interactively by the person using the system.

d.      Data is presented in a form suitable to computer as a result of some of the processing.

e.      The data entry in the system has been designed so as to make to user friendly and also to incorporate certain validation checks.

         The field name must be documented.  The field name must be known to data entry operator or users so that the data entry will not exceed the allocated space.   Our system contains the following inputs.

OUTPUT DESIGN:-
                        The primary consideration in the design of all output is the information requirement and other objective of the users.  It is the most important and direct source of information to the user.  A major form of output is a hard copy.  Print out should be designed around the output requirements of the user.  Each output should be given a specific name or title.  The output data


is displayed on the visual display unit and output can be redirected to printers and or sorted in a file for later use.
                        Here, in this system, program is designed so as to generate a number of relevant outputs displayed in various kinds of user-defined tables in an easily readable and comprehensive manner which can be readily read and understood by the user. So no further attempt has been made to generate reports which of course could have been easily implemented into the system.

PROCEDURE DESIGN:-
            When program become very long, they are divided into smaller programs or modules.  These smaller programs can be written, tested and debugged separately.  This technique of programming is known as modular programming.  The advantages of modular programming are.
1.      It is easy to write, test and debug a module.
2.      Generally the modules of common nature are prepared, which can be used at many places.
3.       The programmer can use the previously written programs.
4.      If a change is to be made, it is made in the particular module; the entire program is not affected.

                        Functions and procedures are subprograms which perform well defined tasks.  The encourage top down programming be dividing large programs into small, easily programmed parts.  A function is used when a single value is to computed using one or more arguments or when no values are to be computed using one or more arguments.    A function is called by the appearance of the function name in a statement.  When the procedure is to be used in a program it is called by using the name of procedures.

SYSTEM IMPLEMENTATION

           
PROGRAM DEVELOPMENT:-
            In the case of program development first of all the problem is defined.  It includes input-output specifications, requirements, execution times, accuracy etc.  A necessary system flowchart is expended to show additional detail input and out files are identified, and computer programs logic flowchart are prepared for each computer program component.   An algorithm can also write to solve the problem.  The following are the stages for the development of software.

1.                  Problem definition
2.                  Program design
3.                  Coding
4.                  Debugging
5.                  Testing
6.                  Documentation
7.                  Maintenance, Extension, and Redesign.

            The criteria for evolution of a program are reliability, speed hardware cost, programming time and cost of use error tolerance and extensibility.  A good program should utilize memory and times efficiently.  An interface should be simple and less costly as far as possible to perform a ascertain task.  Good design and clear documentation make a program simple and it can be used by others.

SOFTWARE SELECTION:-

                        Software selection is critical aspect of system development.  These are two ways of acquiring software custom-made or “off-the-shelf” packages.  Today’s trend towards purchasing packages, which represent roughly 10 percent of what are costs to, developed same in house.  Prior to selecting the software, the project team must setup criteria for software selection.  Software readability brings up the concept of modularity.  Functionally, it is definition of the e facilities, performance and other factors that the user requires in the finished product.  Capacity refers to the capability of the software package to handle the user’s requirements.  The criterion, usability refers to the effort required to the operate, prepare the input and interpret the output program.  Serviceability focuses on documentation and vendor support lost is major consideration.  The other criteria are flexibility, security, performance, and ownership.

SECURITY FEATURES:-
                        Every candidate system must provide built in for security and integrity of data.  Without safeguards against unauthorized access and natural disasters, a system could be so vulnerable as to threaten survival of the organization.  To do an adequate job on security, a system analyst must analyze the risks, exposure and costs and specify measures such as passwords and encryption to provide protection.  In addition, backup copies of software and recovery re start procedures must be available when needed.

                       
            System security refers to the technical innovations and procedures applied to the hardware and operating system.  To protect against deliberate or accidental damage from a defined threat.  In contrast, data security is the protection of data some loss, disclosure, modification and destruction.  The system security problem can be provided into four related issues: security, integrity, privacy, and access procedures.

                        The software entitled payroll system provides only the password protection.  This lets you means that no one else can open the system they know the password.  It makes sure unauthorized personnel cannot execute it.

Kerala State Electricity Board is the  sole distributor of electric power in  Kerala  They have vide network in the whole kerala  but still now they are using manual system for their collection of revenue and its accounting.  Here this project proposes a computerized collection system very similar to the manual operations they are practicing now. This project gives administrative

power to the server to share resources to the computers in the network This project plans to a client server system, and prone to upgradeable for any type of future requirements.

            Our system can view all users connected with the server.  Our system can view the hardware status of the client and all process currently running under the client machine.

            We can transfer the needed files from and to the system.  Our system supports client screen and can visualize that to the administrator.  He can also get the history of users logged in these systems.   So the project will benefit every administrator in delivering his duties.

OBJECTIVES:-   ELECTRICITY POWER BILL MANAGEMENT SYSTEM

    Today   the consumer who wants to remit his current bill has to identify his counter before standing in the queue.  This is too difficult for him in a rush day. Moreover he has to bring exact tender coins to remit his current charge. In this system, balance if any due to the consumer can be adjusted as his future credit. Since this is a data base program any cashier can access the data of any consumer in front of him this may helpful to both the consumer as well as the staffs handling the huge number of consumers.


This program may reduce the manual processing time. 
TARIFF STRUCTURES:-
LT- IA     domestic (single/three phases)
LT- II       colonies (single/three phases)
LT – III    temporary connection
LT – IV    industry
LT- V       agriculture
LT- VI A     non domestic (single/three phase)
               B      State government office, hostel building (university), TB, etc.
               C      KWA, KSRTC, KSWTC, income tax & central excise dept:    
                     Sales tax dept, postal, railway, etc.
              D    schools, hostels, polio homes and similar institutions,
LT- VII A commercial where connected load exceeds 1000w
LT- VII B commercial where connected load below 1000w                       
LT- VIIC    tariff applicable to cinema theatres, circus and similar activities.
LT- VIII    temporary extension taken form consumer premises 
   





ANALYSIS:-

a)      Data Flow Diagram
Data flow diagram is a graphical representation of data movement, process files used in support of an information system. Unlike detail flow charts, DFDs do not supply detailed description of modules but graphically describe a system’s data and how the data interact with the system. Workflow focuses on what happens to the data through various points in the system. A data flow diagram represents the information at each processing points in the system and the direction it takes from the source and destination

To construct a data flow diagram, we use
v       Arrows
v       Circles
v     Open-ended boxes
v      Squares
An arrow identifies data flow or data in motion. Circle stands for a process that converts data into information. An open-ended box represents a data source or a temporary repository of data. A square defines a source or the destination of given data

The following information rules govern construction of DFD
a)       Arrows should not cross each other
b)      Squares, circles, and files must bear names.
No two data flows, squares or circles can have the same etc.


DEMAND




SL NO
FIELD NAME
TYPE
WIDTH
1
areacode
varchar
20
2
mrcode
varchar
20
3
conno
varchar
20
4
previousreading
numeric

5
presentreading
numeric

6
unitconsumed
numeric

7
demandid
varchar
20
8
fixedcharge
numeric

9
energycharge
numeric

10
duty
numeric

11
mtrrent
numeric

12
reconfee
numeric

13
demand
varchar
20
14
subsidy
numeric

15
advancepaid
numeric

16
previousarrears
numeric

17
total
numeric

18
intrestoncd
numeric

19
netamt
numeric

20
bd
varchar

21
dd
varchar

22
disd
varchar






ACD COLLECTION


SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
acdcollected
varchar
20

CD



SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
cdid
varchar
20
3
cdneeded
numeric

4
cdavilable
numeric

5
acd
numeric

6
intrestoncd
numeric








ADV PAYMENT


SL NO
FIELD NAME
TYPE
WIDTH
1
areacode
varchar
20
2
mtr code
varchar
20
3
conno
varchar
20
4
period
numeric

5
 expected cc
numeric

6
expected mr
numeric

7
rebate
numeric

8
total
numeric






CDADJ



SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
cdid
varchar
20
3
cdadjcc
numeric

4
cdrefund
numeric









CH TARIFF


SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
areacode
varchar
20
3
tariff id
varchar
20
4
old tariff
varchar
20
5
newtariff
varchar
20
6
finalrdng
numeric
200
7
chdate
varchar
20
8
note
varchar
20









CONSUMER


SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
areacode
varchar
20
3
mrcode
varchar
20
4
tariff
varchar
20
5
phase
varchar
20
6
posetno
varchar
20
7
connectedload
varchar
20
8
conname
varchar
20
9
address
varchar
20
10
connectiondate
varchar
20
11
tariffid
varchar
20


DMD ADJ



SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
dmdid
varchar
21
3
nameof office
varchar
22
4
dmdadjted
numeric







DMD WDR


SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
dmdid
varchar
21
3
totdmd
varchar
22
3
withdrawals
varchar
23


SL NO
FIELD NAME
TYPE
WIDTH
1
username
varchar
20
2
password
varchar
20
3
mode
varchar
20


MTRCH



SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
prmtrno
varchar
20
3
fr
numeric

4
newmtrno
varchar
20
5
nodigits
varchar
20
6
initreading
numeric

7
dch
varchar
20
8
mch
varchar
20
9
ych
varchar
20




MTRDETAILS


SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
meterno
varchar
20
3
noofdigits
varchar
20
4
initialreading
numeric




MG



SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
lemgamt
varchar
20
3
scmgamt
varchar
20
4
lramt
varchar
20
5
ilemg
varchar
20
6
iscmg
varchar
20
7
ilr
varchar
20
8
mgendingdate
varchar
20


SBCOLLECTION


SL NO
FIELD NAME
TYPE
WIDTH
1
conno
varchar
20
2
areacode
varchar
20
3
mrcode
varchar
20
4
amtcollected
numeric



CONCLUSION - ELECTRICITY POWER BILL MANAGEMENT SYSTEM



Main achievements of this project:-

Administrative staff can view all the details of consumer bill details and can search for any result. Different types of reports can be obtained from the report menu. Different types of reports can be obtained from the report menu. All manual and paper works in the billing branch can be avoided by implementing this software. Since this is built in java, it is platform independent and it can make workable by simply installing JRE.

ABOUT THIS PROJECT:-

1.      It is simple and user friendly
2.      Platform independent
3.      vide scope for future expansion
4.      manual as well as paper works can be fully eliminated in the billing branch
5.      accuracy and reliability are surely increased
6.      it make sure that unauthorized personal cannot execute this program

System security refers to the technical innovations and procedures applied to hardware and operating system. To protect against deliberate or accidental damage from a defined threat. In contrast, data security is the protection of data, some loss, disclosure, modification and destruction. The system security problem can be provided into four related issues.

1.      Security
2.      integrity
3.      privacy
4.      access procedures

                  Using the power tools of JAVA  and SQL server “LT BILLING SYSTYEM” as developed with a high degree of accuracy and user friendliness. Though the system is developed for domestic and commercial tariffs, a full provision is given for a full fledged billing system used at any billing centre of KSEB. This software provides advancement in KSEBoards revenue collection and accounting of the sale. In future all provided options can be included and activated to increase the functionality of the LT BILLING SYSTEM. 

7 comments:

GIZALUS said...

I want duplicate bill. January 1995 . how I get download-you-bses-rajdhani-bill-online-details

kassapos said...

Nice post and thanks for sharing. keep going

Are you searching for any inexpensive billing software in Chennai? We are here

Billing Software in Chennai
Restaurant Billing Software in Chennai
Cloud Billing Software in Chennai

KhanZada said...

Nice Article I'm really Impressed

Kamalesh said...

This Content is simply amazing, and helpful for students and business people. Gathered lots of information and waiting to see more updates.
RPA Course in Chennai
RPA Online Course
RPA Training in Coimbatore

Bills said...

Nice Article Thanks for this info.

Venkat said...

Nice Article, Thanks for sharing the useful information!

Restaurant POS System

Pizza POS Software

Abi said...

Best billing software provide in chennai. Contact for POS Billing Software

G+

Pages