INDUSTRIAL TRAINING MONITORING SYSTEM

0
1140

CHAPTER ONE……………………………………………………………………………………………………………….. 8

  1. INTRODUCTION………………………………………………………………………………………………… 8
    1. WHAT IS CLOUD COMPUTING?………………………………………………………………………. 8
    1. BACKGROUND STUDY……………………………………………………………………………………. 10
    1. PROBLEM DEFINITION……………………………………………………………………………………. 12
    1. FEATURES OF THE NEW SYSTEM…………………………………………………………………….. 13
    1. TERMINOLOGIES…………………………………………………………………………………………….. 14

CHAPTER TWO…………………………………………………………………………………………………………….. 15

REVIEW OF RELATED LITERATURE……………………………………………………………………………… 15

What is Responsive Web design?………………………………………………………………………………….. 41

FACEBOOK……………………………………………………………………………………………………………. 42

OrangeHRM……………………………………………………………………………………………………………. 42

PANDADOC…………………………………………………………………………………………………………… 43

WebMail Pro PHP……………………………………………………………………………………………………. 43

CHAPTER THREE – SYSTEM ANALYSIS…………………………………………………………………………. 45

  • PEOPLE-WARE                                                                47
    • SCHEDULE FEASIBILITY                                                                  48
    • ECONOMIC FEASIBILITY                                                                  48
    • CULTURAL FEASIBILITY                                                                  48
    • LEGAL FEASIBILITY                                                                          48
    • OPERATIONAL FEASIBILITY———————————————- 48

CHAPTER FOUR – SYSTEM DESIGN                                                                                             50

  • INTRODUCTION                                                                                                          50
    • STRUCTURE                                                                                                                 50
      • AUTHENTICATION SYSTEM                                                                        50
      • COMMUNICATION SYSTEM                                                                        52
      • ONLINE PAYMENT SYSTEM                                                                        54
      • HUMAN RESOURCE MANAGEMENT SYSTEM——————————– 57
      • INFORMATION SECURITY SYSTEM———————————————- 57
    • GRAPHIC USER INTERFACE – G.U.I————————————————- 57
    • BACKEND DESIGN                                                                                         59 4.4 DATABASE ARCHITECTURE AND DESIGN                                                  59

4.4.1 ENTITY RELATIONSHIP DIAGRAM————————————- 60

4.5 DIAGRAMATIC SCRAPE SYSTEM STRUCTURAL REVIEW——————– 61

CHAPTER 5 – IMPLEMENTATION AND OPERATION————————————————— 66

5.0 INTRODUCTION                                                                                                          66 5.1 CHOOSING AN APPLICATION SERVER                                                                    66

  • LOCAL APPLICATION SERVER                                                                              66
  • XAMPP                                                                                                         67
    • WAMP                                                                                                         75 5.1.1.3 HOW TO INSTALL WAMP SERVER                                                          76
    • WEB APPLICATION SERVER                                                                                    85
      • WHAT IS WEB HOSTING?                                                                           86
      • THINGS TO LOOKOUT FOR WHEN CHOOSING AN HOSTING PLAN— 87
    • LOCAL APPLICATION SERVER CONFIGURATION—————————————- 87
      • ACCESSING YOUR SERVER FROM ANOTHER MACHINE——————- 87
        • ACCESS FROM A MIOBILE MACHINE——————————– 88
      • PORTS CONFIGURATION AND TROUBLESHOOTING———————— 90
      • FILE MANAGEMENT CONFIGURATION————————————— 93
    • SCREEN SHOTS                                                                                               94 CHAPTER 6 – MAINTAINANCE & OPERATION                                                                          99

6.1 CHALLENGES ————————————————————————————   99 6.2 FUTURE EXPECTATIONS & LATER VERSION——————————————— 101

  • CONCLUSION                                                                                                            101
    • REFERENCES                                                                                                            101

ABSTRACT

Industrial Training Fund, I.T.F is a governmental body that deals with man-power development in Nigeria. Its aim is to reduce poverty and the rate of unemployment in the country. It is also involves entrepreneurial skill development in craftsmanship. This scheme have been implemented in schools and other academic institutions whereby registered schools allow their students indulge in the I.T.F work experiences scheme (S.I.W.E.S.S) within a particular period of time which could be days, months, years. Their work experiences are been documented which they return to defend and from which they are graded by the academic institution.

  1. 1.0           INTRODUCTION

CHAPTER ONE

Industrial Training Monitoring System is an Educational Resource Planning Cloud-Based solution developed using web technologies to automate Industrial Training Scheme, S.I.W.E.S.S procedure from service payment through I.T defense using Crawford University as a case study.

1.0.1   WHAT IS CLOUD COMPUTING?

Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. Cloud Computing leverages many technologies (SOA, virtualization, Web 2.0); it also inherits their security issues, which we discuss here, identifying the main vulnerabilities in this kind of systems and the most important threats found in the literature related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions.

The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A study by Gartner [2011] considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in successive years by companies and organizations.

INDUSTRIAL TRAINING MONITORING SYSTEM