ELECTRICITY POWER BILLING MANAGEMENT SYSTEM PROJECT REPORT
FREE DOWNLOAD ALL THE PROJECT REPORTS WITH SOURCE CODE FROM HERE
The software package LT BILLING SYSTEM can be used for computerising the electricity bill preparation of the consumers. The project also contains programs for preparing various kinds of reports such as daily, monthly and personnel etc. This is developed in java a d the database used here is MS SQL SERVER. It also developed programs to display information of consumers. Many irregularities exist in the present system, which is manually maintained. It requires high processing time. Errors may also occur in this system. The new system developed includes the provision for future expansion.
The software package LT BILLING SYSTEM can be used for computerising the electricity bill preparation of the consumers. The project also contains programs for preparing various kinds of reports such as daily, monthly and personnel etc. This is developed in java a d the database used here is MS SQL SERVER. It also developed programs to display information of consumers. Many irregularities exist in the present system, which is manually maintained. It requires high processing time. Errors may also occur in this system. The new system developed includes the provision for future expansion.
The main objective of
this system is
1.
To reduce the manual processing time.
2.
To make the system easy for handling by
organizing the system in the regular order.
3.
To reduce the maintenance cost of the system
4.
To easily incorporate the future
developments and changes.
5.
To maintain an error free data base.
To achieve
this objective we have designed a LT BILLING SYSTEM. This software package can be operational in
menu driven way which will be helpful to the end user
PERSPECTIVE TO COMPUTERS - ELECTRICITY POWER BILL MANAGEMENT SYSTEM
Computers are l the most powerful tool man has ever
created. Computer
has made a great impact on one every day life.
Computers, personnel computers, mainframe computers, super computers are
the integral part of daily life. All
kinds of people for variety of tasks in modern industrialized society using the
computers.
Computer
is a programmable machine Earlier computers were used for complex computations
and used by only scientist and engineers.
Developments in software and hardware applications of computers for non
computational jobs like weather forecasting designing , painting, preparation
and manipulation of data storage and
data retrieval, sending graphics and
pictures from one end to another
end artificial intelligence and expert systems are the another modern era facilities provided by the
computers. Among them robotics is the latest.
Most exiting development may perhaps occur the area of information technology
internet contributed a lot to this. Internet is a rather the result of a
collaborative effort of people and connected computers installed and
functioning in different. Internet is a
system of connected computers that allow your desk top computer to exchange
data messages and files with any of the very large number of other computers
with connections to the internet.
Electronic mail is the most important activity made possible by computer
communications. E-mail is the one feature
re that nearly every internet user
uses nearly every day. Any one who was connected to the internet
could sent and receive E-Mail message to anyone. Hotmail, web servers etc provides survive to
avail this facility. Chatting, video conferencing are now a common process to everybody’s
life.
NEED OF INFORMATION TECHNOLOGY
Most
important aspect of the interface is the communication between user and the
computer. Information is the back born
of any system. It is fairly established
a fact that information technology has become a strategic weapon in the present
information dominated era. Internet is
per4haps the most exciting development take place in the area of information
Technology today. Information is a
powerful tool. People are increasingly
becoming dependent on Information
generation in the electronic media the world over. A user can now have all the latest
information that needs one this finger
tips. Access to information as a basic
right can stimulate the world’s economy to the benefit of all.
There
is today we have in need of developing
low cost ,high quality, better functioning information products that
satisfy human needs important aspect of achieving
timely identification of
information needs may be sufficient to cater the needs of the business groups.
ABOUT JAVA:-
Java is a
computer language with a difference. It
is a purely object oriented. It has
having many features of C++. It can
also say that this may be a complete language available today. This language can be used for doing web based
programs. Java supports
1.
Data abstraction and encapsulation.
2.
Inheritance
3.
Polymorphism
4.
Dynamic binding
5.
Message communication.
BENEFITS AND APPLICATION OF OOPS
Since
oops supports inheritance and polymorphism, it eliminates redundant codes and extend
the use of existing classes. So we can
build the programs on a classic working model.
This saves development of time and disc space. This ensures higher
productivity. Data hiding helps the
programmer to build secure applications. It is easy to have multiple objects to
coexist and better possibility of up gradation.
Software complexity can easily manage.
Following a re the features of java.
·
Compiled and interpreted.
·
Platform in depended and portable
·
Object oriented
·
Robust and secure
·
Distributed
·
Familiar, simple and small
·
Multithreaded and interactive
·
High performance
·
Dynamic and extensible
Java compiler
compiles and interprets the source code, and generates machine code that can be
directly run by the JRE. Since this code
is platform independent it can be ported to any system we use or work on. This feature enables the programmer to
develop browser programs. Actually java
provides unlimited number of cacheable applets and applications.
Each and every
thing in java is represented in objects.
All the data and objects are rests inside the objects and classes. Java provides many safeguards, it has strict
run time and compile time checking, security issue is more concerned for the
programming people. A programmer cannot
access a memory location without clear authorization. Java is a distributed language; this is used
to create applications in the network.
This enables multiple programmers to work in the same program to develop
modular functions. Many feature of C and
C++ are incorporated into this language hence there occurs more detailed
comparison of java with C
Java provides safeguards to code written it is designed
as garbage collected language relieving the programmers virtually all memory
management problems. Security becomes
an important issue for a language that is used for programming on
internet. Threat of viruses and abuse of
resources lies everywhere. Java systems
not only verity all memory access but also ensure that no virus are
communicated with applet. The absence
of pointers in java ensures that programs cannot gain access to memory location
without proper authorization.
Java is referred as distributed language for creating
applications on networks It has the ability to share data, database and programmers. These applications can be access to remote
objects on internet as easily as they can do in a local system. This enables multiple programmers at multiple
remote locations to collaborate and work together on a single project.
Java is
referred as simple language. Java uses
multithreading capabilities. This means
we need not wait for the application to finish one task before beginning
another. This support multiprocessor
synchronization and construct smoothly running interactive system. Multithreading incorporates the enhancement
of overall execution speed of java programs.
Java is
a dynamic language, capable of linking in new class libraries, methods, and
objects. These functions are known as
native methods. This facility enables
the programmers to use the efficient factions available in this language.
File operations in java programmers:
Files are primary source and destination for data within
most programmers. File operations are common in any language. Java devotes whole range of methods found in
a class called file in the java .io package.
ABOUT MS SQL SERVER:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM
SQL Server is built to deliver the
performance scalability and transactional in gritty required for heavy-duty
high visibility databases. If the data
is critical to an organization, then a well developed and maintained sol sever
based application is worthy of the tasks.
SQL Server is a complete database system and fully mastering its scope
can take years. In terms of features,
commands subsystems, components, and possibilities, SQL sever is one of the
largest and most complex database in the market. Desktop database perform all the database
tasks the entire client. While
multi-user desktop database may use client sever fuelled processing it doesn’t
qualify as client
server
database. To visualize a desktop
database searching for phone number, picture the entire telephone book moving
through network actually some desktop database to try to optimize the operation
by opening only a portion of the database file, such as an index or a data
page. Once the client computer has the
index the client computer searches it and selects the correct row. It then opens the table and retrieves the
row.
In contrast to the desktop databases
which make the clients do all the work client server databases are like
research librarians who handle the request by finding the information, and then
return a photocopy. The actual reference
materials never leave the watchful eye of the research librarian.
A database is used for day today
processing with frequent data inserts updates, and searches is referred to an
online transaction processing database OLTP databases typically have multiple
purposes with several front end applications
accessing he data for searches modifications and reporting.
Another database type is the online analysis processing database. These databases generally receive large
amounts of data from several OLTP databases in a process called extract
transform load (ETL). Primary task of OLAP database is data retrieval and analysis
so the data integrity; concerns presents with an OLTP database don’t apply.
Relationship cardinality:-
The cardinality of the relationship
describes the number of tuples on each side of the relationship. Either side of the relationship may
either be restricted to a single tuples
or allow multiple tuples. The type of
key enforces the e restriction of multiple tuples. Primary keys enforces the
single tuples restriction while foreign key permit multiple tuples.
Relationship type
|
First entity’s key
|
Second entity’s key
|
One to one
|
Primary entity primary key _single tuples
|
Primary entity primary key _single tuples
|
One to many
|
Primary entity primary key _single tuples
|
Secondary entity foreign key multiple tuples
|
Many to many
|
Secondary entity foreign key multiple tuples
|
Secondary entity _ foreign key multiple tuples
|
Relationship optimality is the difference between an optional and
mandatory relationship. That is some
secondary tuples requires a foreign key point to a primary key. The secondary tuple would be incomplete or
meaningless without the primary entity.
It is critical in the sense that the relationship be enforced as a
mandatory relationship for the following reasons.
1.
An order line
item without an order is meaningless.
2.
An order without
a customer is invalid.
3.
In the cape hatteras
adventures database, an even without an associated tour tuple is a useless
event tuple.
DATAMODELS:-
A data model describes the logical
relationship between data in a database and doesn’t concern with the specific
values that a data item might take.
There
are three data models:-
1.
hierarchical
2.
network
3.
relational
Most relational database management system supports a single data
mode. Most of the micro computer database
is relational as they are simpler and more powerful.
DATA BASE:-
Database technology has been
descried as one of the most rapidly growing areas of computer and information science
as a field it is still comparatively young.
Basically it is nothing more hat computer based record keeping systems;
that is a system whose overall purpose is to record and to maintain. A database system involves four major
components.
1.
data
2.
hardware
3.
software
4.
users
Database is a repository of for stored data. In general it is both integrated and
shared. Hardware consists of the
secondary storage volumes disks, drums etc.
Between the physical database itself and the users of the system it is a
larger of software. Users are
application programmers responsible for writing applications programs that use the
database. End user
accessing
the database from the terminal and another user is database administrator.
DATABASE MANAGEMENT SYSTEM:-
All requests from users for access
to the database are handled by the Database Management system. Between the physical database and the users
of system is a layer of software, usually called Database Management System is
thus shielding of database users from hardware level detail. The Database Management System is the
software that handles all access to the database. Database Management system performs necessary
operation on the stored database and intercepts the request and interprets
it.
The
need for relational database management system.
1.
Lack of data
definition or program independence.
2.
Data redundancy
3.
Data integrity
4.
Adhoc queries.
Multi user issues
5.
Security issues
6.
Development and
maintains of application systems
SYSTEM DEVELOPMENT TOOLS:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM
These are tools typically available
to development stuff using a Relational Database Management System and can be
broadly grouped under
1.
structured query
language(SQL)
2.
Form management
3.
4GL
4.
Report
Generators
Structured Query Language is the DDL/DML
for relational database management system.
Structured Query Language statement can be entered at an interactive
keyboard or screen for immediate interpretation and processing by the
relational database management system.
The form management feature of relational database management system
enable the development of such applications with remarkable rapidity compared
to traditional programming methods. They
also support the subsequent running of the application of the users.
ABOUT COMPUTER SYSTEM:-
The
computer is used for developing the software entitled “LT BILLING SYSTEM is an IBM based Pentium IV. The hardware and software which are used in
the development is as follows
HARDWARE SPECIFICATION
1
|
System PC/XT
|
2
|
Pentium
|
3
|
Clock speed 33 MHz and above
|
4
|
Word length 32bit/64bit
|
5
|
Ram capacity 256mb or above
|
6
|
Visual display unit
|
7
|
Monitor 24x80 B/W or Color
|
9
|
Key board 101 keys
|
10
|
Printer TVS or wipro 136 column
|
11
|
Memory 80 GB or above
|
SOFTWARE SPECIFICATON
Operating system windows xp, JRE for
windows platform, java 1.5.0
ABOUT THE SOFTWARE:-
Java was selected for
computerization of billing system is based on some rules and principles. Once the programmer has analyzed the problem
to be programmed. The objective of our
project is to provide a better management of the billing branch and provision
is included to include the cash collection also to be included as a part of the
billing system later. Several windows
are designed in addition to the main program so that future applications also
may be included while in the expanding environment of the computer
application. Though networking facility
is not included presently, it also can be included in the future without much
strain because all the codes have been written in java.
ABOUT THE ORGANISATION:-
The Kerala State Electricity Board was
formed as per section 5(1) of the Electricity supply act 1948, 1st April
1957 as successor of the Electricity Department of the Kerala State . KSEB is the sole authority which has been responsible for the
generation, transmission and supply of
electricity in the State of kerala, and
where the distribution profit centers play a major role
in the collection of revenue and
management of distribution of power
and proper accounting of the
revenue collection. KSEB
generates power mainly form the hydro power and it has now the capacity to
design and build sophisticated hydro power projects with its on design. Board has now equipped with ample number of
brilliant engineers and accountants to manage its resources.
ABOUT THE PROJECT:-
L T BILLING SYSTEM has been
developed to computerize the billing system of KSEB where all dealing was done
manually earlier. Now a day’s
computerization is spreading with great speed.
Many organizations are being computerized and are surely enjoying the
benefits of computerization.
Earlier one person was gone to collect
the meter reading, then another one check the unit charge and another person
calculate the total charge. These
details are all stored in special records.
Though al the most importance, tedious a care needed job is the bill
calculation. Any one of mistakes may
cause severe consequence. Computerization
helps to overcome all these problems, by integrating the system that is the
above said jobs can be done by a single person.
That is one computer user LT BILLING SYSTEM helps to create accurate
bills, with great speed. This includes
the consumer details report generation.
EXISTING SYSTEM:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM
A system can be regarded as a set of
interacting elements, producing outputs from a set of inputs. Existing system is completely manual. There may be a lot of chance of clerical and
procedural errors. Existing system has
several disadvantages such as
1.
Redundancy in stored data
2.
Lack of security
3.
Data is inconsistent
4.
More time required
5.
Waste storage space
6.
Manpower required
7.
Errors may occur
8.
Regular watching and supervision is necessary
PROPOSED SYSTEM:-
The system avoids the difficulties
of the existing system. The Advantages of proposed system are
1.
Faster
performance
2.
Redundancy can
be reduced
3.
Time saving
4.
Inconsistency
can be avoided
5.
Data Sharing
6.
Security
restrictions can be applied
7.
Less storage
space required
8.
Debugging
CHARECTRISTICS OF A
SYSTEM:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM
Any
array of elements or entity arranged according to a plan to achieve an
objective or a system is a set of object with relation between those objects
and between their attributes. Any system
can be considered as a collection of group of subsystems. Failure of a subsystem can lead to the failure
of a project
CHARAECTERISTICS OF A
SYSTEM:-
1.
Organization
2.
Interaction
3.
Interdependence
4.
Integration
5.
Central
objective
ELEMENTS OF A SYSTEM:-
1.
Inputs and
outputs
2.
Processors
3.
Control
4.
Feedback
5.
Boundaries and interphase
6.
Environment
7.
SYSTEM ANALYSIS:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM
In a process of analyzing a system
with the potential goal of improving or modifying it. In other words system analysis involves the
study of the present system and formulates the design of something to achieve a
desired goal. In order to modify it
hopefully for the better. Analysis is
the process of breaking down the problems into smaller elements for study and
ultimately solution. The system analysis
approach to a problem differs from trial and error approach. In trial and error method, identifying a
number of solutions to the problem and then testing each randomly until the alternative
appears to
provide
can acceptable solution. In the system
analysis approach all major influences and constraints are identified and
evaluated in terms of this impact on the various decision points in the
system. A decision point that point in
a system at which some person or automatic mechanism must react to input output
data and make a division.
STAGES OF COMPUTERIZATION:-
The way to computerize can be
1.
Initial
investigation
2.
Feasibility study
3.
System design
4.
Programming
5.
Implementation
6.
Evaluation
7.
Documentation.
1. Initial
investigation:-
The term is obvious is a study should
made in recognizing the various requirements of the business. It is directed towards clarifying the
problem and strengthening the analyst background in the problem area. The initial investigation is beginning by
studying the organization responsible for current system and identifying
product flow and information flow. Study
of existing system of organization provides background knowledge of problem
area. The requirement analysis is vital
because based up on these arguments only we can to step to next.
2. Feasibility study:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM
A
feasibility study is a test of system proposal according to its workability,
impact on the organization, ability to meet user need s and effective use of
resources. The objective of a
feasibility study is not to solve the problem but to acquire a sense of its
scope. The result of feasibility study
is simply a report. This report contains
the nature and scope of the proposed solution the three aspects in feasibility
study are technical feasibility, operational feasibility.
2. System
design:-
It
is the process of planning a new business system or one to replace compliment
an existing system. The design of an
information system produces the details that state how a system will meet the
requirements identified during analysis.
3. Programming:-
Transforming
the system analysis idea procedures to computer programs is a programmer’s job.
The selection of programming language depends upon the type of application we
are doing. After programs being written to meet on specific
purpose, the programs are completed, debugged and stimulated with some
preliminarily data is satisfying it the same purpose.
4. Implementation:-
Implementation
is the process of having systems personnel checkout and put new equipment into
use, train users, installs the new application, and constructs any files of
data needed to use it.
Depending on the size of the
organization that will be involved in
using their application and the risk associated with its use, system developers may choose to pilot
the operation in only one
area of the firm, say in one
department or with only one or two persons.
5. Evaluation:-
Evaluation
of a system is performed to identify its strength and weakness. The actual
evaluation can occur along any of the following dimensions. Operational
evaluation, Organizational impact, user manager assessment.
6. Documentation:-
It
is one of the important aspects of a computer system programmers are also
responsible for documenting the program, providing an explanation of who and why certain procedures are coded in specific ways. Documentation is essential to test the
program and carry on maintenance once the application has been installed.
SYSTEM DESIGN
INTRODUCTION TO SYSTEM DESIGN:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM
The design phase is the life cycle phase in
which the detailed design of the selected system in the study phase is
accomplished. In the design phase, the
technical specifications are prepared for the performance of all allocated
tasks. It also includes the construction
of programs and program testing.
In the
design phase, the first step is to determine the output is to be produced and
in what format. Second, input data and
master files have to be designed to meet the requirements of proposed output.
The
system analyst has to define the methods of capturing and input programs and
format of the output and its use by the users.
SYSTEM FLOW
CHART:-
A
graphic representation of a system showing the overall flow of control in the processing at the job level; specifies
what activities must be done to
convert from a physical to logical model is known as a system flowchart. Thus it summarizes what operations are undertaken
and where and when they take place.
Normally in a system flowchart input from outside are shown to the left
and outputs to the right. Symbols
representing the operations
undertaken and the documents used are then placed in the appropriate places which gives a general
flow of data from top to bottom and left
to right.
Arrows are
used on the connecting lines to indicate the logical flow or sequence where the
flow is not in the standard direction.
No interaction is implied by crossing lines. Decisions which lead to different actions can
also be shown
DATA FLOW DIAGRAM:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM
A data
flow diagram is graphic representation of a system that shows data flows to,
from and with in the system, processing functions that change the date in some
manner, and the storage of this data.
They are networks of related system function that indicated form where
information is revived and to where it is sent.
An external entity is the originator or receiver of data or information.
.
A data store
symbol portraits a file or database in which data resides. A process is depicted by a circle some times
it is called a bubble or transform. Process
portraits the transformation of the content of status of data
DATABASE DESIGN:-
This activity deals with the design of the physical database.
The designer begins to concentrate on file design or how data should be
organized around user requirements. How
data are organized depends on the data and response requirements that determine
hardware configurations.
An integrated approach to file design is the
database. The general theme is to handle
information as an integrated whole, with a minimum of redundancy
and improved performance,
type and size of data structure used. The
objectives of data base are accuracy and integrity, privacy and security of
data etc.
CODE DESIGN:-
Codes
can provide brief identification of data items and replace longer descriptions
that would be more awkward to store and to manipulate.
INPUT DESIGN:-
Input design
is processing of converting the user oriented description of the inputs of the
system. The goal of designing input
data to make data entry as easy logical and free from errors as possible. In entering data, operates need to know the
following.
1.
The allocated space for each field.
2.
Field sequence which must match that in
the source document.
3.
The
format in which data fields are entered for example, filling out the
data field is required through the
edited format mm/dd/ yy
When we
approach input data design, we design source documents that capture the data
and then selected the media use to enter them into the computer. There are different ways in which data can be
introduced into the system such as
a.
The data is converted into a machine sensible
from by some realistic source document and types in the relevant items using a
keyboard connected to the system.
b.
The document can be read directly by a
machine and this converts information
held in the human sensible form into a machine readable form without need for
human investigations.
c.
Data entered into a system through a
keyboard. This is done interactively by
the person using the system.
d.
Data is presented in a form suitable to
computer as a result of some of the processing.
e.
The data entry in the system has been
designed so as to make to user friendly and also to incorporate certain
validation checks.
The field name must be documented. The field name must be known to data entry
operator or users so that the data entry will not exceed the allocated
space. Our system contains the following
inputs.
OUTPUT DESIGN:-
The
primary consideration in the design of all output is the information
requirement and other objective of the users.
It is the most important and direct source of information to the
user. A major form of output is a hard
copy. Print out should be designed
around the output requirements of the user.
Each output should be given a specific name or title. The output data
is displayed on the
visual display unit and output can be redirected to printers and or sorted in a
file for later use.
Here, in
this system, program is designed so as to generate a number of relevant outputs
displayed in various kinds of user-defined tables in an easily readable and
comprehensive manner which can be readily read and understood by the user. So
no further attempt has been made to generate reports which of course could have
been easily implemented into the system.
PROCEDURE DESIGN:-
When program become very long, they are divided into
smaller programs or modules. These
smaller programs can be written, tested and debugged separately. This technique of programming is known as
modular programming. The advantages of
modular programming are.
1.
It is easy to write, test and debug a
module.
2.
Generally the modules of common nature are
prepared, which can be used at many places.
3.
The
programmer can use the previously written programs.
4.
If a change is to be made, it is made in
the particular module; the entire program is not affected.
Functions and procedures are subprograms
which perform well defined tasks. The
encourage top down programming be dividing large programs into small, easily
programmed parts. A function is used
when a single value is to computed using one or more arguments or when no values
are to be computed using one or more arguments. A function is called by the appearance of
the function name in a statement. When
the procedure is to be used in a program it is called by using the name of
procedures.
SYSTEM IMPLEMENTATION
PROGRAM DEVELOPMENT:-
In the case of program development first of all the
problem is defined. It includes
input-output specifications, requirements, execution times, accuracy etc. A necessary system flowchart is expended to
show additional detail input and out files are identified, and computer
programs logic flowchart are prepared for each computer program component. An algorithm can also write to solve the
problem. The following are the stages
for the development of software.
1.
Problem definition
2.
Program design
3.
Coding
4.
Debugging
5.
Testing
6.
Documentation
7.
Maintenance, Extension, and Redesign.
The criteria for evolution of a program are reliability,
speed hardware cost, programming time and cost of use error tolerance and
extensibility. A good program should
utilize memory and times efficiently. An
interface should be simple and less costly as far as possible to perform a ascertain
task. Good design and clear
documentation make a program simple and it can be used by others.
SOFTWARE SELECTION:-
Software selection is critical aspect of
system development. These are two ways
of acquiring software custom-made or “off-the-shelf” packages. Today’s trend towards purchasing packages,
which represent roughly 10 percent of what are costs to, developed same in
house. Prior to selecting the software,
the project team must setup criteria for software selection. Software readability brings up the concept of
modularity. Functionally, it is
definition of the e facilities, performance and other factors that the user
requires in the finished product.
Capacity refers to the capability of the software package to handle the
user’s requirements. The criterion,
usability refers to the effort required to the operate, prepare the input and
interpret the output program. Serviceability
focuses on documentation and vendor support lost is major consideration. The other criteria are flexibility, security,
performance, and ownership.
SECURITY FEATURES:-
Every candidate system must provide built in
for security and integrity of data.
Without safeguards against unauthorized access and natural disasters, a
system could be so vulnerable as to threaten survival of the organization. To do an adequate job on security, a system
analyst must analyze the risks, exposure and costs and specify measures such as
passwords and encryption to provide protection.
In addition, backup copies of software and recovery re start procedures must
be available when needed.
System security refers to the technical innovations and
procedures applied to the hardware and operating system. To protect against deliberate or accidental
damage from a defined threat. In
contrast, data security is the protection of data some loss, disclosure,
modification and destruction. The system
security problem can be provided into four related issues: security, integrity,
privacy, and access procedures.
The software entitled payroll system provides
only the password protection. This lets
you means that no one else can open the system they know the password. It makes sure unauthorized personnel cannot
execute it.
Kerala State
Electricity Board is the sole
distributor of electric power in
Kerala They have vide network in
the whole kerala but still now they are
using manual system for their collection of revenue and its accounting. Here this project proposes a computerized
collection system very similar to the manual operations they are practicing
now. This project gives administrative
power to the server to
share resources to the computers in the network This project plans to a client
server system, and prone to upgradeable for any type of future requirements.
Our system can view all users connected with the
server. Our system can view the hardware
status of the client and all process currently running under the client
machine.
We can transfer the needed files from and to the
system. Our system supports client
screen and can visualize that to the administrator. He can also get the history of users logged
in these systems. So the project will
benefit every administrator in delivering his duties.
OBJECTIVES:- ELECTRICITY POWER BILL MANAGEMENT SYSTEM
Today
the consumer who wants to remit his current bill has to identify his
counter before standing in the queue.
This is too difficult for him in a rush day. Moreover he has to bring
exact tender coins to remit his current charge. In this system, balance if any
due to the consumer can be adjusted as his future credit. Since this is a data
base program any cashier can access the data of any consumer in front of him
this may helpful to both the consumer as well as the staffs handling the huge
number of consumers.
This program may reduce
the manual processing time.
TARIFF STRUCTURES:-
LT-
II colonies (single/three phases)
LT
– III temporary connection
LT
– IV industry
LT-
V agriculture
LT-
VI A non domestic (single/three
phase)
B State government office, hostel building
(university), TB, etc.
C KWA,
KSRTC, KSWTC, income tax & central excise dept:
Sales tax dept, postal,
railway, etc.
D schools, hostels, polio homes and similar
institutions,
LT- VII A commercial
where connected load exceeds 1000w
LT- VII B commercial
where connected load below 1000w
LT- VIIC
tariff applicable to cinema theatres, circus and similar activities.
LT-
VIII temporary extension taken form
consumer premises
ANALYSIS:-
a)
Data Flow
Diagram
Data flow diagram is a graphical representation of data movement, process
files used in support of an information system. Unlike detail flow charts, DFDs
do not supply detailed description of modules but graphically describe a
system’s data and how the data interact with the system. Workflow focuses on
what happens to the data through various points in the system. A data flow
diagram represents the information at each processing points in the system and
the direction it takes from the source and destination
To construct a data flow
diagram, we use
v Arrows
v Circles
v Open-ended boxes
v Squares
An
arrow identifies data flow or data in motion. Circle stands for a process that
converts data into information. An open-ended box represents a data source or a
temporary repository of data. A square defines a source or the destination of
given data
The following
information rules govern construction of DFD
a)
Arrows should not cross each other
b)
Squares, circles, and files must bear names.
No
two data flows, squares or circles can have the same etc.
DEMAND
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
areacode
|
varchar
|
20
|
2
|
mrcode
|
varchar
|
20
|
3
|
conno
|
varchar
|
20
|
4
|
previousreading
|
numeric
|
|
5
|
presentreading
|
numeric
|
|
6
|
unitconsumed
|
numeric
|
|
7
|
demandid
|
varchar
|
20
|
8
|
fixedcharge
|
numeric
|
|
9
|
energycharge
|
numeric
|
|
10
|
duty
|
numeric
|
|
11
|
mtrrent
|
numeric
|
|
12
|
reconfee
|
numeric
|
|
13
|
demand
|
varchar
|
20
|
14
|
subsidy
|
numeric
|
|
15
|
advancepaid
|
numeric
|
|
16
|
previousarrears
|
numeric
|
|
17
|
total
|
numeric
|
|
18
|
intrestoncd
|
numeric
|
|
19
|
netamt
|
numeric
|
|
20
|
bd
|
varchar
|
|
21
|
dd
|
varchar
|
|
22
|
disd
|
varchar
|
ACD COLLECTION
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
acdcollected
|
varchar
|
20
|
CD
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
cdid
|
varchar
|
20
|
3
|
cdneeded
|
numeric
|
|
4
|
cdavilable
|
numeric
|
|
5
|
acd
|
numeric
|
|
6
|
intrestoncd
|
numeric
|
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
areacode
|
varchar
|
20
|
2
|
mtr code
|
varchar
|
20
|
3
|
conno
|
varchar
|
20
|
4
|
period
|
numeric
|
|
5
|
expected
cc
|
numeric
|
|
6
|
expected mr
|
numeric
|
|
7
|
rebate
|
numeric
|
|
8
|
total
|
numeric
|
CDADJ
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
cdid
|
varchar
|
20
|
3
|
cdadjcc
|
numeric
|
|
4
|
cdrefund
|
numeric
|
|
CH TARIFF
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
areacode
|
varchar
|
20
|
3
|
tariff id
|
varchar
|
20
|
4
|
old tariff
|
varchar
|
20
|
5
|
newtariff
|
varchar
|
20
|
6
|
finalrdng
|
numeric
|
200
|
7
|
chdate
|
varchar
|
20
|
8
|
note
|
varchar
|
20
|
CONSUMER
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
areacode
|
varchar
|
20
|
3
|
mrcode
|
varchar
|
20
|
4
|
tariff
|
varchar
|
20
|
5
|
phase
|
varchar
|
20
|
6
|
posetno
|
varchar
|
20
|
7
|
connectedload
|
varchar
|
20
|
8
|
conname
|
varchar
|
20
|
9
|
address
|
varchar
|
20
|
10
|
connectiondate
|
varchar
|
20
|
11
|
tariffid
|
varchar
|
20
|
DMD ADJ
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
dmdid
|
varchar
|
21
|
3
|
nameof office
|
varchar
|
22
|
4
|
dmdadjted
|
numeric
|
DMD WDR
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
dmdid
|
varchar
|
21
|
3
|
totdmd
|
varchar
|
22
|
3
|
withdrawals
|
varchar
|
23
|
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
username
|
varchar
|
20
|
2
|
password
|
varchar
|
20
|
3
|
mode
|
varchar
|
20
|
MTRCH
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
prmtrno
|
varchar
|
20
|
3
|
fr
|
numeric
|
|
4
|
newmtrno
|
varchar
|
20
|
5
|
nodigits
|
varchar
|
20
|
6
|
initreading
|
numeric
|
|
7
|
dch
|
varchar
|
20
|
8
|
mch
|
varchar
|
20
|
9
|
ych
|
varchar
|
20
|
MTRDETAILS
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
meterno
|
varchar
|
20
|
3
|
noofdigits
|
varchar
|
20
|
4
|
initialreading
|
numeric
|
MG
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
lemgamt
|
varchar
|
20
|
3
|
scmgamt
|
varchar
|
20
|
4
|
lramt
|
varchar
|
20
|
5
|
ilemg
|
varchar
|
20
|
6
|
iscmg
|
varchar
|
20
|
7
|
ilr
|
varchar
|
20
|
8
|
mgendingdate
|
varchar
|
20
|
SBCOLLECTION
|
|||
SL NO
|
FIELD NAME
|
TYPE
|
WIDTH
|
1
|
conno
|
varchar
|
20
|
2
|
areacode
|
varchar
|
20
|
3
|
mrcode
|
varchar
|
20
|
4
|
amtcollected
|
numeric
|
CONCLUSION - ELECTRICITY POWER BILL MANAGEMENT SYSTEM
Main achievements of
this project:-
Administrative staff can view all the details of consumer bill details
and can search for any result. Different types of reports can be obtained from
the report menu. Different types of reports can be obtained from the report
menu. All manual and paper works in the billing branch can be avoided by
implementing this software. Since this is built in java, it is platform
independent and it can make workable by simply installing JRE.
ABOUT THIS PROJECT:-
1. It is simple and user friendly
2. Platform independent
3. vide scope for future expansion
4. manual as well as paper works can be fully eliminated in the
billing branch
5. accuracy and reliability are surely increased
6. it make sure that unauthorized personal cannot execute this
program
System security refers to the technical innovations and procedures
applied to hardware and operating system. To protect against deliberate or
accidental damage from a defined threat. In contrast, data security is the
protection of data, some loss, disclosure, modification and destruction. The
system security problem can be provided into four related issues.
1. Security
2. integrity
3. privacy
4. access procedures
Using
the power tools of JAVA and SQL server
“LT BILLING SYSTYEM” as developed with a high degree of accuracy and user
friendliness. Though the system is developed for domestic and commercial
tariffs, a full provision is given for a full fledged billing system used at
any billing centre of KSEB. This software provides advancement in KSEBoards
revenue collection and accounting of the sale. In future all provided options
can be included and activated to increase the functionality of the LT BILLING
SYSTEM.
7 comments:
I want duplicate bill. January 1995 . how I get download-you-bses-rajdhani-bill-online-details
Nice post and thanks for sharing. keep going
Are you searching for any inexpensive billing software in Chennai? We are here
Billing Software in Chennai
Restaurant Billing Software in Chennai
Cloud Billing Software in Chennai
Nice Article I'm really Impressed
This Content is simply amazing, and helpful for students and business people. Gathered lots of information and waiting to see more updates.
RPA Course in Chennai
RPA Online Course
RPA Training in Coimbatore
Nice Article Thanks for this info.
Nice Article, Thanks for sharing the useful information!
Restaurant POS System
Pizza POS Software
Best billing software provide in chennai. Contact for POS Billing Software
Post a Comment