Crop Management System
Crop Management System
COM
Online Bookstore
ONLINE BOOKSTORE
om
Software Engineering Project Report
.c
ya
i
un
D
ls
ia
Acknowledgement
om
We have taken efforts in this project. However, it would not have been possible
without the kind support and help of many individuals and organizations. We
would like to extend our sincere thanks to all of them.
.c
We are highly indebted to TutorialsDuniya.Com for his guidance and constant
ya
supervision as well as for providing necessary information regarding the project
and also for his support in completing the project.
We would like to express
iour gratitude towards our professors
un
TutorialsDuniya.Com for their kind co-operation and encouragement which
helped us in completion of this project.
D
We would like to express our special gratitude and thanks to industry persons for
giving us such attention and time.
ls
ia
Our thanks and appreciations also go to our colleague in developing the project and
people who have willingly helped us out with their abilities.
t or
Submitted By:
Tu
Anurag Sharma
Ishvina Kapoor
Jatin Sharma
Certificate
This is to certify that the software engineering project report entitled
"Online Bookstore" is the work carried out by Anurag Sharma, Ishvina
om
Kapoor, Jatin Sharma, students of BSc(H) Computer Science IV
semester , Keshav Mahavidyalaya, University Of Delhi under the
supervision of TutorialsDuniya.Com. This report has not been
.c
submitted to any other organisation/institution for the award of any other
degree or diploma.
i ya
un
D
ls
ia
TutorialsDuniya
or
TutorialsDuniya
TutorialsDuniya (Principal)
t
Tu
ABSTRACT
The project is an authentication system that validates user for accessing
the system only when they input correct password. The project involves
three levels of user authentication. There are varieties of password
om
systems available, many of which have failed due to bot attacks while
few have sustained it but to a limit. In short, almost all the passwords
available today can be broken to a limit. Hence this project is aimed to
.c
achieve the highest security in authenticating users.
It contains three authentication phases having three different kinds of
ya
password system. The password difficulty increases with each level.
Users have to input correct password for successful login. Users would
be given privilege to set passwords according to their wish. The project
i
un
comprises of text password i.e. pass phrase, image based password and
OTP password for the three levels respectively. This way there would be
negligible chances of bot or anyone to crack passwords even if they have
D
cracked the first level or second level, it would be impossible to crack
the third one. Hence while creating the technology the emphasis was put
ls
case of three level password we tried creating a simple user interface and
providing users with the best possible comfort in solving password.
t or
Tu
Table of Contents
Problem Statement ....................................................................................................................................... 6
Process Model ............................................................................................................................................... 7
1. Software Requirement Specification .................................................................................... 8
1.1 Overall Description............................................................................................................ 8
1.1.1 Product Functions....................................................................................................... 8
om
1.1.2 User Characteristics .................................................................................................... 8
1.1.3 General Constraints .................................................................................................... 9
1.1.4 Assumptions and Dependencies ................................................................................ 9
1.2 External Interface Requirements ...................................................................................... 9
.c
1.2.1 User Interfaces ........................................................................................................... 9
1.2.2 Hardware Interfaces ................................................................................................... 9
ya
1.2.3 Software Interfaces .................................................................................................... 9
1.3 Functional Requirements ................................................................................................ 10
i
1.3.1 FR 1 .............................................................................. .
un
1.3.2 FR 2 .............................................................................. .
1.3.3 FR n .............................................................................. .
1.4 Performance Requirement ............................................................................................. 10
D
1.5 Design Constraints .......................................................................................................... 10
1.6 Data Flow Diagram .......................................................................................................... 11
ls
3. Scheduling ........................................................................................................................... 17
4. Risk Management ............................................................................................................... 20
5. Design.................................................................................................................................. 22
t
Tu
Problem Statement
The software to be designed is for a book store that wishes to go online.It is to be developed to improve
the efficiency for customer.
om
The important features to be developed includes:
Login/Registration module require customer to login into the system or he can create an
account if he not yet have one.
Order module require customer to enter the book detailed that he/she wants to buy.
.c
Book detail(s) module allows the system to keep book information in detailed by name,genre
etc.
Stock management will tell about the quantity of books left in store.
ya
Payment module allows the customer to online payment like paytm and credit/debit cards or
cash on delivery.
Delivery and tracking module gives the information about tracking and by whom it is delivered.
User feedback module.
i
un
D
ls
ia
t or
Tu
Process Model
We choose Waterfall model due to following reasons:
This model is choose because our requirements are very well known, clear and fixed.
Product definition is stable.
om
There are no ambiguous requirements in our project.
The project is short.
This model is simple and easy to understand and use.
It is easy to manage due to the rigidity of the model – each phase has specific deliverables and
.c
a review process.
In this model phases are processed and completed one at a time. Phases do not overlap.
Waterfall model works well for smaller projects where requirements are very well understood.
i ya
un
D
ls
ia
t or
Tu
om
constraints,data flow diagrams, and data dictionary but also gives details about how these things
are related to each other.
.c
1.1.1 Product Functions
ya
The “Online bookstore” software is an independent web based application. There are various user
interfaces related with this software. These interfaces help the user to interact with the software
and provide the necessary information for online bookstore.
i
The entire functionality of this software can be subdivided into fields/modules. The names of the
un
fields involved in the online bookstore are :-
1. Registration/login
2. Books details
D
3. Order
ls
4. Payment
6. User feedback
or
Customer
Administrator
Supplier
Customers are using for viewing and buying the books.Customer can also write feedbacks for books and
services.
Administrator can add,edit and delete products and provide services to the customer.
Administrator can see the daily sell of the books,can also see the feedback given by the
customers.Administrator maintains the deliveries.
Supplier can use the system to see the product,their prices and quantity available profit and lose.
om
The interface will be in English only.
.c
1.1.4 Assumptions and Dependencies
The product does require back-end database server MySQL for storing the username and
ya
Password for different types of user of the system.
ASSUMPTIONS:
i
User must be trained for basic computer functionality.
un
User must have basic knowledge of English.
User of the system will be provided with the Graphical user interface,there is no
ia
Hardware requirement will be same for the both the parties which are follows:
t
1.3.1 Order
om
This module basically deals with the order of the books. It accepts book name , retrieve book details,
calculate price based on selected book. After it payment process start then the book is delivered to the
customer .
.c
1.3.2 Cancellation
ya
Once the order of book has done, it can be cancelled or seen by this module. It accepts order ID verifies
it with the database. On successful confirmation by the customer it can cancel the order. Further, it will
update the bookstore database and the payment gateway to issue refund.
1.3.3 Search
i
un
This module retrieves the details of the books. It accepts book name or subject and course name and
then retrieves the details of the particular book or all the books from particular subject or course name.
D
1. Any number of users can access the system at any time and maintain speed at maximum.
3. Security
or
4. Reliability
5. Portability
t
om
CUSTOMER login/registration SUPPLIER
.c
order
ya
paymentdelivery &tracking
ONLINE BOOKSTORE
feedback
i
un
D
ls
ia
t or
Tu
DFD LEVEL 1:
Books
database
cost
om
Available
Generate
book details
order id and
total cost
Retrive&
.c
display
cost
ya
Available feedback Gener-
Book books order
ate Bill
Details Information User Details
and payment
Customer
i Order ID
un
Order id & cost
Update
feedback database
Acknowledgement Order id
D
Cancell-
ls
ation
CUSTOMER RECORDS
ia
t or
Tu
DFD LEVEL 2:
CHECK
AVAILABILITY
om
ORDERED BOOKS OF BOOKS
CUSTOMER
.c
STOCKS
BOOK DATABASE AVAILABILITY
ya
COLLECTING
INFORMATIO
i ON
un
CUSTOMER INFORMATION
CUSTOMER RECORDS
D
PAYMENT
MODE
ls
PAYMENT
UPDATE
ia
DATABASE COST
T DELIVERY
PAYMENT
or
ONLINE
PAYMENT
PAYMENT
t
Tu
CUSTOMER
TABLE 1:
om
S.no. data Description
1 Customer info.
User name
.c
login id
Userid
ya
Password
2 Registration info
i
un
Fname +Mname+Lastname
Date of birth
Address
D
Phone number
ls
Gender
E-mail id
ia
3 Book Details
or
Book id
Book name
t
Author
Tu
Publishor
Price
Subject
4 order
Order ID
Total cost
Product details
Payment Details
om
.c
2.Estimations
ya
2.1Function Points
i GRADE
un
VALUE
4 Is performance critical? 2
ia
7 Does the on-line data entry require the input transaction to be built 4
t
14 Is the application design to facilitate change and for ease of use by the 5
user?
om
Estimation of Complexity Weighing Factors
.c
ya
VALUE ADJUSTMENT FACTORS, Σfi= 48
i
un
MEASUREMENT OPT LIKELY PESS EST. WEIGHNING FP
PARAMETER COUNT FACTOR COUNT
Number of external 1 1 4 1 4 4
inquiries
ia
Number of external 1 1 3 1 7 7
interfaces
Count total 62
t
Tu
= 70.06
2.2Efforts
om
Cost per FP = 1230
= 70.06 /6.5
.c
=10.778 person months
ya
Total cost for the project = Total efforts * labour rate
= 10.778 * 8000
= Rs. 86224
i
un
D
3.Scheduling
ls
3.1Schedule table
ia
2. REQUIREMENT ANALYSIS
Tu
3. PROJECT MANAGEMENT
Computing F.P. and Effort Week 5
Schedule table Week 6
Risk table Week 7
4. DESIGN ENGINEERING
Architectural Design Week 8
Data Design Week 9
Pseudo Code Week 9
om
Milestone Week 10
5. TESTING Week 12
.c
i ya
un
D
ls
ia
t or
Tu
3.2 Timeline
Wk1 Wk 2 Wk 3 Wk 4 Wk 5 Wk 6 Wk 7 Wk 8 Wk 9 Wk 10 Wk 11 Wk 12
om
1.Identify Customer
Requirements
Meet with customers
Identify needs and
constraints
.c
Establish Problem
Statement
MILESTONE: Problem
ya
statement defined
2.Define function behaviour
Identify modules
Define DFDs
Develop ERDs
i
un
MILESTONE: System
Functions defined
3. Estimation
Function Point Estimation
D
Efforts Calculation
MILESTONE: Cost Estimated
ls
4. Design Development
Formulate System
Architecture
ia
Generate Code
MILESTONE: System Design
or
developed
5. Testing
Develop test cases
Calculate cyclomatic
t
complexity
Tu
4.Risk Management
om
Quality is not maintained PS 60% 2
.c
Delivery deadline will be tightened BU 50% 2
ya
Lack of cooperation from users CU 30% 1
i
Inadequate estimation of required resources PS 50% 1
un
Loss of database PS 50% 1
DESCRIPTION:
Due to various technical reasons or natural calamities, Database of the system may be lost or damaged.
Refinement:
Subcondition 2:As a part of check-pointing ,after every update in the database, checkpoints are
updated which states that the database is updated correctly till that point.
om
Mitigation/Monitoring:
1. A copy of all the databases must be maintained side by side on a different system. Also, it must be
.c
updated simultaneously.
2. A recovery tool must be designed which could recover the database according to the check points.
ya
Management
i
A special team is allocated for the recovery of the database as soon as possible. The secondary
un
databases which were maintained as a copy must be made primary so that the working of the software
is not affected.
D
ls
Originator: AnjanaKumari
Anuj Sahu
t or
Tu
5.Design
5.1System Design
om
ONLINE BOOKSTORE
.c
ya
RETRIEVE BOOK TOTAL COST GENERATE DELIVERY & CANCELLATION
INFORMATION CALCULATION BILL TRACKING ORDER
i
un
DISPLAY
TOTAL COST DELIVERY TO
D
5.2Data Design
ER-Diagram:-
B_name
subject
Name Email_id b_id
M N aurthor
Customer Search Books
om
Publisher
1
Phone
Add. Course name
.c
Phone
Order
ya
Comments
N Mode
Transaction_id
i
un
1 1
Delivery& Generate
Payment
tracking bill
D
1
N
ls
Order_ID
Bill
status
ia
or
S_name
Status of order Transactipon_id Mode
t
Tu
Customer
Email_id Name Mobile Address
om
Book
Book_name Book_id Publisher Author Price
.c
i ya
un
Generate Bill
Order_id Name Book_name Total_cost Address
D
ls
Payment
ia
1. Coding
Inta,found=0;(1)
Char b_name[30],subject[30],author[30];
om
Void Search( ) (2)
{
cout<<”\n (1) SEARCH BY BOOK NAME :”;
cout<<”\n (2) SEARCH BY SUBJECT & AUTHOR :”; (3)
.c
cin>>a;
if(a==1) (4)
ya
{
gets(b_name); (5)
while(!ifile.eof() && found==0) (6)
i
un
{
ifile.read((char*)&S1,sizeof(detail)); (7)
if(strcmp(b_name,S1.book_name)==0) (8)
found=1; (9)
D
}
ls
}
else (10)
{
ia
gets(subject); (11)
gets(author);
or
while(!ifile.eof()) (12)
{
t
ifile.read((char*)&S1,sizeof(detail)); (13)
Tu
2. Testing
7.1Flowgraph
om
2
.c
3
ya
4 10
i
un
5 11
D
6 12
ls
7 13
ia
or
8 14
t
Tu
9
15
16
5
Paths:
Path 1: 1 2 3 4 5 6 16
Path 2: 1 2 3 4 5 6 7 8 6….
Path 3: 1 2 3 4 5 6 7 8 9 6…
Path 4 : 1 2 3 10 11 12 16
om
Path 5: 1 2 3 10 11 12 13 14 12…
Path 6: 1 2 3 10 11 12 13 14 15 12…
.c
Using Regions: -
ya
Number of regions = 6
Therefore, cyclomatic complexity = 6
i
un
Number of Edges (E) = 20
Number of Nodes (N) =16
D
V (G) = E – N + 2
=20 – 16 + 2
ls
=6
Therefore, cyclomatic complexity = 6
ia
=5+1
Tu
=6
Therefore, cyclomatic complexity = 6
When the user enters, ‘Y’(to the Ques. that whether he knows the book name).
Program enters in while loop but the file does not exist or is empty.
& it exits
om
Test Case 2: P3:
When the user enters , ‘Y’(to the Ques. that whether he knows the book name.).
.c
Then the User enters the book name.
Then program enters in while loop, searches the whole file & the corresponding book name is found.
ya
& it exits
i
un
Test Case 3:P2:
When the user enters, ‘Y’(to the Ques. that whether he knows the book name).
Then program enters in while loop, searches the whole file but the corresponding book name is not
found .
ls
& it exits
ia
When the user enters ‘N’(to the Ques. that whether he knows the book name.)
Program enters in while loop but the file does not exist or is empty.
Tu
& it exits.
When the user enters ‘N’ (to the Ques. that whether he knows the book name)
Then program enters in while loop, searches the whole file but the corresponding set of subject and
course name is not found.
& it exits.
om
Test case 6: P6:
When the user enters ‘N’(to the Ques. that whether he knows the book name)
.c
Then the user enters the subject and course name.
Then program enters in while loop , searches the whole file & the corresponding sets of subject and
ya
course name is found.
& it exits.
i
un
D
ls
ia
t or
Tu
SNAPSHOTS
om
.c
i ya
un
D
Figure 1. snapshot 1
ls
ia
t or
Tu
Figure 2. Snapshot 2
om
.c
i ya
Figure 3. Snapshot 3
un
D
ls
ia
t or
Tu
Figure 4 . Snpshot 4
om
.c
i ya
Figure 5. Snapshot 5
un
D
ls
ia
t or
Tu
Figure 6 . Snapshot 6
om
.c
i ya
un
Figure 7. Snapshot 7
D
ls
ia
t or
Tu
Figure 8. Snapshot 8
om
.c
i ya
un
Figure 9 .Snapshot 9
D
ls
ia
t or
Tu
Figure 10 . Snapshot 10
om
.c
i ya
un
Figure 11 . Snapshot 11
D
ls
ia
t or
Tu
Figure 12 . Snapshot 12
om
.c
i ya
un
Figure 13 . Snapshot 13
D
ls
ia
t or
Tu
om
.c
i ya
un
Figure 15. Snapshot 15
D
ls
ia
t or
Tu
om
.c
i ya
un
Figure 17. Snapshot 17
D
ls
ia
t or
Tu
om
.c
i ya
un
Figure 19 . Snapshot 19
D
ls
ia
t or
Tu
8. References
https://www.tutorialsduniya.com
Software Engineering: A Practitioner’s Approach by Roger S.Pressman
om
An Integrated Approach to Software Engineering by P.Jalote
https://www.tutorialsduniya.com
.c
i ya
un
D
ls
ia
t or
Tu