Hardware Management Information System-14550044 PDF
Hardware Management Information System-14550044 PDF
Hardware Management Information System-14550044 PDF
System
A.M.S.J.Atapaththu
University of Colombo School of Computing
2017
Declaration
The thesis is my original work and has not been submitted previously for a degree at this or
any other university/institute.
To the best of my knowledge it does not contain any material published or written by another
person, except as acknowledged in the text.
_____________________
Signature: Date:
Mr./Ms.
Under my supervision. The thesis has been prepared according to the format stipulated and is
of acceptable standard.
Certified by:
_____________________
Signature: Date:
i
Abstract
As a very successful business in past 10 years in hardware industry in western province of Sri
Lanka; I.M.N.Hardware requires Information management system to fulfill their service.
The Current system is manual and use Microsoft office package for data processing. This
method is very time consuming and it make staff extra work. The staff have to document
everything in the business and it impacts the company's daily processes. Current system could
not handle large amount of data and highly inflexible, Business continuity is at risk in case of
damage to information and analysis data is very difficult.
Therefore the objective of this project was to design and develop a system that provides a
solution to solve existing issues, improve the efficiency and effectiveness of the whole
processes and mitigate the risk. After carefully analyzing the requirements, a new Information
System was proposed and designed.
In this system mainly includes about the handling the products, manage the employees and
customers. At the products module include about the issuing and receiving products. For the
customers module include there details about payments & their personal information’s. After
the payment receipt will be printed through the system. And employees’ module includes their
personal details, salary details. Management can get report by this sytem.It is easily to get day
to day reports by this system.
System was implemented using Visual Studio .NET (vb.net) and MYSQL handles the database
components. The entire application could be viewed on Windows platform. Apart from the
implementation, the development practice included a proper Quality Assurance process, user
training sessions, and demonstration to improve the benefits of the system.
ii
Acknowledgment
I would like to express my deepest appreciation to all those who provided me the possibility to
complete this project. A special gratitude I give to my supervisor and coordinator,
Dr.Lakshman Jayaratne has supported and guided to carry out the project and observant during
the progress of the development of system, stimulating suggestions and encouragement.
Furthermore I would also like to acknowledge with much appreciation the crucial role of the
staff of I.M.N. Hardware, who gave the permission to use all required documents to complete
the project.
I would like to take this opportunity to thank my friends, who gives endless support and
advices during the development of this project.
Millions of thanks to my parents and beloved family. Without the continued strong support and
encouragement provided by them, especially during those difficult times of my project I may
have not reached the end of this strenuous journey.
A.M.S.J.Atapaththu
iii
List of Abbreviations
PC Personal Computer
OS Operating System
iv
Table of Contents
v
3.3.1 Technical Feasibility ......................................................................................... 14
3.3.2 Operational Feasibility ...................................................................................... 14
3.3.3 Legal Feasibility ............................................................................................... 14
3.3.4 Economic Feasibility ......................................................................................... 14
2.3.5 Schedule Feasibility .......................................................................................... 15
3.4 Non-functional requirements.................................................................................... 15
3.5 Functional Requirement........................................................................................... 18
3.6 Database Analysis: .................................................................................................. 19
3.7 Logical Database Design ......................................................................................... 19
3.8 UML Diagrams ....................................................................................................... 20
3.8.1 Use case diagrams: ............................................................................................ 21
3.8.2 ER diagrams: .................................................................................................... 23
3.8.3 Class diagrams: ................................................................................................. 24
3.9 User Interface Design .............................................................................................. 24
Chapter 4 - Implementation............................................................................................... 27
4.1 Introduction ............................................................................................................ 27
4.2 Implementation Architecture.................................................................................... 28
4.3 Development Process .............................................................................................. 28
4.3.1 Major code segments ......................................................................................... 28
4.3.2. Login ............................................................................................................... 29
4.3.3. Validation ........................................................................................................ 29
4.3.4 Database ........................................................................................................... 30
4.3 Sample reports ........................................................................................................ 31
Chapter 05 – Evaluation.................................................................................................... 33
5.1. Introduction ........................................................................................................... 33
5.2. Evaluation Techniques............................................................................................ 33
5.2.1 Benchmarking ................................................................................................... 33
5.2.2 Focus groups ..................................................................................................... 33
5.2.3 User feedbacks. ................................................................................................. 34
5.2.4 Database testing ................................................................................................ 34
5.2.5 Software testing ................................................................................................ 34
5.3. Procedures of testing .............................................................................................. 35
5.3.1 Unit Testing ...................................................................................................... 36
vi
5.3.2 Integration Testing ............................................................................................ 36
5.3.3 System Testing.................................................................................................. 36
5.3.4 Black-box testing .............................................................................................. 36
5.3.5 White-box testing .............................................................................................. 36
5.3.6 Regression Testing ............................................................................................ 37
5.4. System Test Case ................................................................................................... 37
5.5. Test plan ................................................................................................................ 38
5.6 Test data ................................................................................................................. 38
5.7 Test Users ............................................................................................................... 38
Chapter 06 – Conclusion ................................................................................................... 42
6.1 Introduction ............................................................................................................ 43
6.2 Problems Encountered and Lessons Learnt ............................................................... 43
6.3 Critical Evaluation of the Project ............................................................................. 43
6.4 Suggestions for Future Enhancements ...................................................................... 44
References ....................................................................................................................... 45
APPENDIX A - SYSTEM DOCUMENTATION .............................................................. 46
APPENDIX B - DESIGN DOCUMENTATION ............................................................... 50
APPENDIX C – USER DOCUMENTATION ................................................................... 60
APPENDIX D – TEST RESULTS .................................................................................... 67
APPENDIX E – CODE LISTING ..................................................................................... 74
APPENDIX F – EVALUATION QUESTIONNAIRS ....................................................... 77
GLOSSARY .................................................................................................................... 87
vii
Table of Figures
viii
Figure 33 : Add item activity diagram ............................................................................... 56
Figure 34-Login sequence diagram ................................................................................... 57
Figure 35-Item issue sequence diagram ............................................................................. 58
Figure 36-Report view sequence diagram .......................................................................... 59
Figure 37-User login interface........................................................................................... 60
Figure 38-Home dashboard interface ................................................................................. 61
Figure 39-Main category interface..................................................................................... 62
Figure 40-Add item interface ............................................................................................ 63
Figure 41-Add new user interface ..................................................................................... 65
Figure 42-Report dashboard .............................................................................................. 66
Figure 43-Barcode generation interface ............................................................................. 66
Figure 44-Variables .......................................................................................................... 74
Figure 45-Check quantity code sample .............................................................................. 75
Figure 46-Check issue number .......................................................................................... 75
Figure 48-Barcode code sample ........................................................................................ 76
Figure 49-Get balance sample code ................................................................................... 76
Figure 50: Is the Initial interface is attractive analyze graph ............................................... 80
Figure 51-interfaces are not complicated analyze graph ..................................................... 80
Figure 52-Processes involved in the software, are not found complex analyze graph ........... 81
Figure 53-Speed of application software analyze graph ...................................................... 81
Figure 54-Message and instructions receiving from software analyze graph........................ 82
Figure 55-Response and attendance to enquiries analyze graph .......................................... 82
Figure 56-Satisfied with the whole software provided analyze graph .................................. 83
Figure 57-Satisfied with the service provided analyze graph .............................................. 83
Figure 58-Process needs within the systems of the institution are fulfilled analyze graph .... 84
Figure 59-Process are similar and find no issues within the used titles analyze graph .......... 84
Figure 60-software and manual analyze graph ................................................................... 85
Figure 61-Compatibility with other application software’s analyze graph ........................... 85
Figure 62-How often does our software freeze or crash analyze graph ................................ 86
Figure 63 - Would you recommend our software to others analyze graph ........................... 86
ix
Table of Tables
x
Chapter 1 - Introduction
This chapter gives the background of the organization, background of the problem, significance
of the problem, overview of the proposed solution and the objectives target to achieve from the
proposed solution given. This chapter will also discuss about the complete overview and list
the requirements which meet the needs of the Hardware Management System.
1
Figure 1 : Use case for existing system
2
Mishandling of stocks is untraceable and it has become a serious problem at present. It is
difficult to find out where the problem is occurring.
3
In the other section of the system includes combined of both inventory part and stock
part. In the hardware they had various types of items. And they had branches. For this main,
subcategory and sections included. Then according to categories include items. Items provided
by the different suppliers. In the system can allocate different item for different suppliers. In
item receive section includes about all the receiving details according to bill numbers and items.
And also prices of the item will be maintained in this section. In the issue section all the items
issued for other hardware’s. All the issue details maintain in issue section. All the return items
maintain in return section. And also some items may be expired. Then they destroy that items.
This section also handle by this system. Some of the employees & managers should able to log
to the system and do their tasks. This should be able to category different user levels and give
privileges.
Some tasks should be able to access for managers. User management & login module
handle these kind of situations. This system should be able generate any kind of reports that
they needed. Such as main stock, employees, customers,receving and also receipts that the user
want. Should be simple and user friendly for the users.
1.7 Benefits
Eliminate data redundancy
Increase the efficiency of the existing process
Provide better user friendly environment
4
Chapter 2- Background / Literature Review
Sumelro Hardware System This is one of the hardware’s located in kurunegala. In this
hardware there is system for control hardware items. I.M.N. hardware owner is friend of this
hardware. So I visit there and looked features of that system. In this system also include item
receive and issue modules. But there is no subsections. And user logins provide by the software
developed company. Item return module not include in this system. Not having proper
navigation user faced problems to find the interface. In this include only day to reports like
issuing and receiving.
Zoho InventoryZoho Inventory is an online application that enables to manage orders and
inventory. With multi-channel selling, shipping integrations and powerful inventory control
system. In this system can divide categories into three subcategories. Users can log to system
any place in the word and can order the products. They shipped item only for their country.
Can customized the features of this system. It is advantage for the system users. Proper
5
reporting module also included in this system. But it is not user friendly and not provide proper
user manual.
InFlow InventoryInFlow Inventory Software offers users and opportunity to organize every
aspect of their business by drawing information on customers, warehouse stock, pending
orders, sales, and more. InFlow is dominated by four major modules for organizing a business,
including Sales, Purchasing, Inventory, and Reports useful for most small business managers.
InFlow was designed for small to mid-sized businesses looking for a simple, easy to learn and
use solution to completely manage their inventory from purchasing to sales. The menu button
located on the top left gives you access to all important aspects of the software including sales,
purchasing, inventory, reports and settings. Access restricts right option that has access to see
or modify the different component. InFlow allows users to create different login users, each
with a different set of access rights. After selecting a product, it enables to view all the
important information related to it with the ability to make changes, other details such as the
product's vendors and movement history can be viewed by selecting the tabs. The product view
conveniently displays all the products in a list.
6
2.3 Recommended Hardware Requirements
The recommended minimal server hardware specification in order to obtain the best application
performance
Table 2-1 : Hardware Requirements
7
2.6 Language Specifications
2.6.1 Visual Basic .NET
Microsoft's integrated development environment (IDE) for developing in Visual Basic .NET
language is Visual Studio. Most of Visual Studio editions are commercial; the only
exceptions are Visual Studio Express and Visual Studio Community, which are freeware. In
addition, .NET Framework SDK includes a freeware command-line compiler called
vbc.exe. Mono also includes a command-line VB.NET compiler. [3]
9
Being some OEM versions. InnoDB became a product of Oracle Corporation after their
acquisition of Innobase Oy in October 2005. The software is dual licensed; it is distributed
under the GNU General Public License, but can also be licensed to parties wishing to combine
InnoDB in proprietary software [5].
MYISAM:
MyISAM was the default storage engine for the MySQL relational database management
system versions prior to 5.5.It is based on the older ISAM code but has many useful extensions.
The major deficiency of MyISAM is the absence of transactions support. Versions of MySQL
5.5 and greater have switched to the InnoDB engine to ensure referential integrity constraints,
and higher concurrency.
10
Chapter 3- Analysis and Design/ Methodology
This chapter describes the detailed description of requirement gathering process, requirements
specification and object oriented design of the system. The requirement specification section
includes the identified functional requirements and non-functional requirements. Furthermore,
Use cases and Sequence diagrams are used to describe the functionalities of the proposed
Hardware Management solution.
The problem analysis was done in precise manner when considered with the actual problem
domain. Requirements analysis involves frequent communication with system users to
determine specific feature expectations, resolution of conflict or ambiguity in requirements as
demanded by the various users or groups of users, avoidance of feature creep and
documentation of all aspects of the project development process from start to finish. Energy
should be directed towards ensuring that the final system or product conforms to client needs
rather than attempting to mold user expectations to fit the requirements
In here concern on requirement gathering from the client and analyzing gathered data. This is
the most important phase in the Software Development Life Cycle (SDLC) of the project as
the state of affairs of the client can be evaluated here. The requirements can be defined clearly
to ensure the design and implementation success. Different kinds of tools are being used to do
the analyzing to find a solution to the expectations.
11
such as SQIRO (Sampling, Questioners, Interviews, Background Reading, Observations)
among them Observation, Interviewing and Background Readings were used in this project
work.
3.2.1 Interviews
This is one of the best method to collect accurate information from stakeholders. Operator,
Agent and Manager had been interviewed. It was enabled to share different knowledge in
different user point of view. Main drawback in this method was limited time availability of
resource persons due to present busy environment. With the interview observed that they have
different educational backgrounds so designing system should be understandable for all users
those who use system.
With the operation officers and some of the staff initial informal discussions were carried out
and was able to get some time from their busy schedule to do the formal interview. During the
interview it was clear that they were facing more difficulties with regard handling the stock &
maintained it. Further it was clear how the whole operations taking place in this organization.
It was difficult to reach top level management personnel due to their busy schedule and was
unable to interview them.
Stock books, Sales reports, Purchase orders, Goods Issuing’s and Goods Receiving had
been carefully examined to obtain proper knowledge about the manual process. Also it's
assisted to design required formats to be included in to the proposed system. Document analysis
used for thoroughly to design this system because it is very difficult to gather data from other
methods. This method is very useful for because all the transactions has been recorded. So data
is reliable when considering the other methods.
3.2.3 Prototyping
Prototyping is a relatively modern technique for gathering requirements. Using this approach
gathered preliminary requirements which should be used to build an initial version of the
12
solution of prototype. Created prototype was shown to the main system user and it had been
developed in advanced manner using Operator's comments. This method gave clear idea about
the new system should expect by the company.
3.2.5 Survey
Majority of information related to surveys were collected through internet. Related blogs &
forums had been referred and analyzed demo versions of existing similar systems of proposed
system to capture main valuable concepts. Above forms of methods examined thoroughly to
get a proper picture with the required system. This requirement gathering method assist to add
value addition functionalities to the system to satisfy the customer.
3.2.6 Observation
Observation is the study of users in their day to day activities and performance of assigned
tasks and duties. By observing users it was noted that process flows, awkward steps, pain points
and opportunities for improvement. Also observed the existing manual system users and
assisted to gather valuable key points to be developed.
13
3.3.1 Technical Feasibility
This method mainly focuses on gaining an understanding of the present technical resources of
the organization and their applicability needs to be incorporated to the proposed system. It is
an evaluation of both hardware and software. Users must know how to interact with the
computer.
14
approval for their budget includes these functionalities. Economic feasibility considers the
following
15
Figure 4 : Diagrams illustrate how the non-functional requirements can be categorized.
Process requirements
Process requirements are constraints placed upon the development process of the
system. Process requirements include: Requirements on development standards and
methods which must be followed CASE tools which should be used the management
reports which must be provided a disaster recovery plan for the system development
must be specified
Product Requirement
Specify the desired characteristics that a system or subsystem must possess.
External Requirement
External requirements are the one which Derived from the environment in which the
system is developed.
The need for the system to work with other systems
Health and safety or data protection regulations
Easy System Accessibility to the authorized parties’ while was ensuring that data is
protected from unauthorized access. The system shall include a user authorization
16
procedure where users must identify themselves using a login name and password. Only
users who are authorized in this way may access the system data.
Availability
The application also needs to be available all 24/7. If there is a down time and if it’s
planned down time that needs to be informed early, so that the hassles and
inconveniences will be minimized. If it’s an unplanned one the down time needs to be
minimum and needs to be speedily up.
Usability
The current system is a total manual system, hence working with computers are not
going to be easy for all the users. There for if the system is complex, People who are
not very confident in handling computer will find difficult. Also the system needs to be
developed in such a way that user should be able to use this system for users
convenience and to improve their productivity and serve the patient effectively and
provide the better service.
Security
Stock details, personal information, account details is a very confidential hence Author
have a high responsibility of maintaining the security and to make sure that the
information is not passes to the third part personals.
Risk Management
Managing risks is an important part of the project. It is important to establish procedures
to ensure that the system is up all throughout the time. Hence monitor, and manage
internal and external risks throughout a project’s life cycle. Internal risks include items
17
changing functional requirements, unexpected personnel changes or inaccurate
development assumptions and work flow challenges, process changes.
18
3.6 Database Analysis:
Database design is an important place in designing a system. During this phase care should be
taken to avoid redundancy of information storing into a database, since it leads to wastage of
memory space. Database should properly analyzed for the project.
19
Table 3-3 : Sub_category table
1. Class Diagram
2. Object Diagram
20
3. Use-Case Diagram
4. Sequence Diagram
5. Collaboration Diagram
6. State chart Diagram
7. Activity Diagram
8. Component Diagram
9. Deployment Diagram
21
Figure 5 : Use case for proposed system
22
3.8.2 ER diagrams:
An Entity Relationship (ER) Diagram is a type of flowchart that illustrates how “entities” such
as people, objects or concepts relate to each other within a system
23
3.8.3 Class diagrams:
Possibility of user error occurrences is considerably high in the absence of a good user interface
design. Because of this good user interface design is vital to the success of a system. Most of
the application system users are interested in using graphical user interfaces because of the
following advantages.
Fast and immediate accessibility to anywhere on the screen
Easy to learn and handle
Facility of using multiple screen (Windows)
Below mentioned some of the interfaces in Hardware MIS,
24
Login Interface
25
Main Category Interface
Report Dashboard
26
Chapter 4 - Implementation
4.1 Introduction
This chapter is focused about the actual implementation process of the proposed system, which
is the conversion of the design to a set of programs. A good implementation can reap vast
rewards in organizational strengths and efficiencies. This chapter describes the activities
carried out during the development of the Hardware management system and it will explain
how implemented environment, Reusable codes and Development tools were integrated
effectively as per the System Design.
The .NET Framework is the technology introduced by Microsoft that provides support for easy
design, development, and deployment of computer applications. Its major design goal is to ease
the development of Internet applications and distributed applications development. The .NET
Framework includes the .NET Framework Class Library (FCL), a framework that can be used
for the creation of system tools and application packages. Some of the main features of vb.net
are listed below.
Simple
Modern
Vb.net has been based according to the current trend and is very powerful and simple for
building interoperable, scalable, robust applications
Object oriented
Scalable
.NET has introduced assemblies, which are self-describing by means of their manifest.
Assemblies need not to be register anywhere
27
4.2 Implementation Architecture
The system was developed using 3- tier architecture. This is a client-server architecture in
which the functional process logic, data access, computer data storage and user interface are
developed and maintained as independent modules on divided platforms. Three-tier
architecture is a software design pattern and well-established software architecture. Its three
tiers are the Presentation Layer, Business Logic Layer and Data Access Layer.
Cording of the proposed system was done using Visual Studio 2012. In below included the
some major code segments of the system.
28
4.3.2. Login
When implementing the Login functionality, it was decided to provide maximum security
possible by using password encryption and preventing multiple logins. The function for
password encryption and decryption is implemented as follows.
4.3.3. Validation
29
Public Function validateEmail(emailAddress) As Boolean
Dim email As New Regex("\w+([-+.']\w+)*@\w+([-.]\w+)*\.\w+([-.]\w+)*")
If email.IsMatch(emailAddress) Then
Return True
Else
Return False
End If
End Function
4.3.4 Database
This is very important code segment this code used for connect the MySQL database. And
using transactions queries for efficiency system.
30
Figure 18: Connection to MYSQL
31
Figure 20-Item receve report-Item code
32
Chapter 05 – Evaluation
5.1. Introduction
Evaluation is a systematic determination of a subject's merit, worth and significance, using
criteria governed by a set of standards. It can assist an organization, program, project or any
other intervention or initiative to assess any aim, realizable concept/proposal, or any
alternative, to help in decision-making; or to ascertain the degree of achievement or value in
regard to the aim and objectives and results of any such action that has been completed. The
primary purpose of evaluation, in addition to gaining insight into prior or existing initiatives,
is to enable reflection and assist in the identification of future change. Evaluation is often used
to characterize and appraise subjects of interest in a wide range of human enterprises, including
the arts, criminal justice, foundations, organizations, government, health care, and other human
services.[7]
Benchmarking.
Testing.
Interviews.
Focus groups.
Inspection.
Walkthroughs.
User feedbacks.
5.2.1 Benchmarking
33
facilitator in a non-threatening environment. In community development, focus groups provide
a deliberative venue for learning, trust-building, creative problem solving, and ultimately serve
as a way for citizens to influence strategic community planning and development.
This is also an important part of the evaluation. It can take the form of freeform text comments
and also it is about what user feels about the system. User feedback questioner and evaluation
results mentioned on APPENDIX (F).
All the information is stored in the database according to categories and may not deal with the
same type of data. It is very important part of the system. Because of the data is lost or any
corruption occurred whole operation will be failed. All the database fully normalized and
include the primary keys and foreign keys. Usually SQL queries are used to develop the tests.
Ex. Select * from employee where emp_id=”001”. Data that were violating the constraints
were also tested for insertion, to test the effectiveness of the constraints. Security level should
be improved in the database. This system is installed into three machines and use navicat
software and locked using password. If we need to do any changes in the database password is
needed.
For the proper testing it is very important to get test data correctly because the users may enter
data in different ways so to make proper discipline in data entry and to catch errors proper
sample data need to be chosen. I.M.N. hardware provides sample documents to be used as the
test data. After deliver the system they use the same data for the system. Because of it, we can
easily identify the bugs of the system.
Although there were different types of Evaluation techniques Testing and User feedbacks used
for this project. Because of the strict time period and busy time schedule in the hardware.
Results of this techniques include in the appendix.
34
5.3. Procedures of testing
A proper system testing should be carried out to evaluate the system and it helps to see and
understand its compatibility as a solution for the problem domain. Software testing is most
often done and at this phases working with executable system components. The test results
developer to identify and minimize errors (software bugs) in the system during the development
itself. Using the Iterative RUP software development life cycle made it possible to test the
system.
Quality and the reliability of the system is another key factor in making the application a
success. Since users do not like to access to the applications which causes invalid or inaccurate
results. Few methods of testing were applied throughout the duration of this project to ensure
the quality of the application and to detect the introduction of regressions in the source code
during the development process.
Testing was another most important part of the project. Some Testing processes were carried
out throughout the project. Testing was based on main two categories,
Testing was improved the system’s quality. This was a critical phase of the Software life cycle.
Therefore testing must be done throughout the project life cycle .Following testing types were
used in this system.
Unit Testing
Integration Testing
System Testing
Black-box testing
White-box testing
Regression Testing
Acceptance testing
35
5.3.1 Unit Testing
Unit testing was done while implementing the project. This is done for individual units.
2. When the username was entered correctly and password was wrong, it failed to log
in and showed an error message.
3. When both of these fields were provided incorrectly, it failed to log in to the system.
Integration Testing is carried out after the separate software modules have been unit testing.
Integration testing is based on the functional specification of the software. E.g. When provided
the correct credentials to the login module, it logged to the administration module.
System testing is carried out at the completion of the integration testing. The purpose of system
testing is to prove that the software meets the agreed user requirements and works in the target
environment. System testing covers both functional and non-functional requirements.
E.g.: By logging into the system and routing through different processes the whole system
was tested.
This type of testing is done without testing its internal structure. Testing is done only to see
whether it meets desired outputs.
This is done to test the systems internal structure. This is also called Glass box testing.
36
5.3.6 Regression Testing
This is done after changes are made to a system application. This test is to prove that the
change has been made correctly and that change has not introduced any new errors.
Acceptance tests are black box system tests. Each acceptance test represents some expected
result from the system. Customers responsible for verifying the correctness of the acceptance
tests.
Test case is an outline which tests a feature or set of features. It provides developer a systematic
approach for testing. Therefore it will ensure the completeness of test and provide the highest
likelihood for uncovering errors in the software. Test case consist of:
Test data
Expected results
Purpose of having the particular test data.
For the functions and procedures a unit testing is carried out first when coding the system. The
behaviour is intended by the unit test. The units of codes are tested and it is called a code level
testing. To test the modules of the system an integration testing is processed. When using
different kinds of implementation technologies this is a must to ensure the proper working of
all the integrated components for the relevant outcome. The whole system has been tested after
the unit testing and integration testing to guarantee the standard of the system using an
environment similar to the environment where the system is going to practically used. A
customer confirmation is obtained by a user acceptance testing after the completion of the
system. It ensures the requirements are fulfilled by the developed system.
37
5.5. Test plan
Test plan is a document containing the detailed systematic approach to test a system. It basically
consists of the details of how the system will be in final workflow. To get a proper outcome
from the testing procedure a test plan is created before the implementation of the system
covering all types of phases. Entire testing process is guided by the Test plan and also test cases
are designed to execute that feature with possible inputs and outputs.
Database testing.
Software testing.
Collective system (both database & software) testing.
Test data is actually the input given to a software program. In order to test a software
application need to enter some data for testing most of the features. Some test data is used to
confirm the expected result, i.e. when test data is entered the expected result should come and
some test data is used to verify the software behaviour to invalid input data. For the system
entered test data provide by the hardware and input sample data for the system. They provide
forms that they collected from the employees.
For the success of the testing it is important to select test users. At the beginning users involve
in testing to find out system is user friendly and the language is useful to them. Some employees
were selected who had good IT knowledge and tested the admin components discussed the
results with the manager. Other management module were also tested because top level
management couldn’t involve in this process.
38
Login Module
Table 4-1 : Login test case
3 Validate the user input details Empty username & Display error
password message
4 Validate the user input details Enter only username Display error
message
5 Validate the user input details Enter only password Display error
message
1 Save the category details Without filling all the Display error
require fields message
39
2 Save the category details filling all the require Successfully Save
fields with message &
display in the table
2 Save the received items filling all the require Successfully Save
fields with message &
display in the table
3 Update the category details Click the record in the Successfully Update
table that want update. with message &
display in the table
40
4 Edit main category, sub Click main category, Couldn’t edit the
category & item details subcategory and try to details
edit
6 Delete the receive details Click the row in the Successfully Delete
table that want delete. with message
2 Issue the received items Filling all the require Successfully Save
fields with message &
display in the table
3 Issue the received items Click the record in the Successfully Update
table that want update. with message &
display in the table
4 Issue the same issue number Enter same issue Display error
number & click enter message
button
5 Issue the quantity more than in Click the main Display the items in
the main stock category & sub the grid.
category
41
6 Remove the issue item Click the row in the Successfully Delete
table that want delete. with message
3 Enter same item again Enter same item and Display error
save message
Test Results
The tested results for the cases give above are attached in the Appendix (D).
42
Chapter 06 – Conclusion
6.1 Introduction
A critical evaluation for the final system is included in this chapter with the suggestions for
future enhancements and descriptions of lessons learnt. A detailed check list is also intended
to be presented in this chapter in order to prove that the expected requirements of the client
have been successfully fulfilled.
Above mentioned about the problems encountered while working with the system
Learning a new language was a lesson experienced in the project which allows getting
extensive knowledge of the vb.net language. Project planning is another lesson, before the start
of the project a feasible project plan was developed. A step by stem approach was taken in
developing the system. The experience of the Stressful work load is another example of a
lesson, in the industry a developer always needs to meet various deadliness want work
according to strict schedules. It was a challenge to develop a system within a limited time
period and with busy office work. The experience of writing a formal project dissertation was
another lesson leant in this project. The experience gained in that process was an
encouragement to develop a system methodologically and with own efforts.
Mostly most of the sections include in the systems were similar. But there are some kind of
features include in this system. Mostly most of the similar systems not user friendly. User
couldn’t understand what should do it. Some interfaces were very complex and not consistence.
43
Barcode system not provide in the some similar systems. One of the similar systems have print
all the barcode at once. But in this system they should print it one by one. But they can print
any number of barcodes in this system.
And also in this system has customer and employee information’s sections. Can divide sections
and users can add to different sections. Anyone who don’t have prior computer knowledge can
use this system.
Customize report is another feature include in this system. And also can get reports by any type
of charts. Top level management can easily get decisions according to reports.
System running on a standalone PC will not fulfill this requirement so that Web Based
Application will be introduced. So other sub branches of the hardware can access it. Everyone
will be able to access the system under the terms and conditions through the Internet. This will
ease the work of the staff and save time of the users. Introduced system has been developed
with the possibility of any expansions such as adding more functions to the system much easily.
44
References
http://www.capterra.com/inventory-management-software/
[2]. Popa, Bogdan (2014, Apr.) Microsoft introduced an operating environment named
Windows on November 20, 1985 as a graphical operating system. [Online].Available:
http://en.wikipedia.org/wiki/Microsoft_Windows
[3]. Krill, Paul (2014, Apr.) Visual Basic .NET (VB.NET) is a multi-paradigm, object-
oriented programming language, implemented on the .NET Framework [Online].Available:
https://en.wikipedia.org/wiki/Visual_Basic_.NET
[4]. Oracle. (2014, Apr) MySQL is a relational database management system (RDBMS),
MySQL databases or manage data contained within the databases. [Online].Available:
http://en.wikipedia.org/wiki/MySQL
[5]. Oracle. (2014, Apr) MySQL 5.5 Reference Manual: 14 the InnoDB Storage Engine: 14.1
Introductions to InnoDB 1.1. [Online].Available:
http://dev.mysql.com/doc/refman/5.5/en/innodb-introduction.html
[6]. Oracle. (2014, Mar.) MySQL 5.0 Reference Manual: 14 Storage Engines: 14.1 the
MyISAM Storage Engine. [Online].Available:
http://dev.mysql.com/doc/refman/5.0/en/myisam-storage-engine.html
[7]. Oracle. (2014, Mar.) MySQL 3.23, 4.0, 4.1 Reference Manual: 13 Storage Engines:
13.10 the ISAM Storage Engine. [Online].Available:
http://dev.mysql.com/doc/refman/4.1/en/isam-storage-engine.html
[8]. "2. What Is Evaluation?". International Center for Alcohol Policies - Analysis. Balance.
Partnership. International Center for Alcohol Policies. Retrieved 13
May 2012.[Online].Available:
https://en.wikipedia.org/wiki/Evaluation
45
APPENDIX A - SYSTEM DOCUMENTATION
This document explains, the guidelines to be followed when installing the Hardware
Management System. This also includes the minimum hardware and software requirements to
operate the system. This document is helpful in the initial stages and latter stages, when
extensions are added to the system.
The above mentioned installation processes could be completed according to the following
steps.
1. Installation of Xampp
Download the Xampp server from the below link and download it.
https://www.apachefriends.org/index.html
46
Figure 22-Xampp services
Go to phpmyAdmin and crate the database and import the .sql file in the CD include the db.
If the installation is doing on a server machine, select SQL Server as the Data Source.
If it is a client machine, SQL Server Native Client as the Data Source. The ODBC Data
Source Administrator window is represented in Figure A.3.
47
Figure 25-ODBC Configuration
Once you have finished configuring your data source, you should see your new DSN
(Data Source Name) in the list shown in the ODBC Data Source Administrator
“System DSN” tab.
Run “Setup.exe” from the SAP Crystal Report version for Visual Studio 2010
directory.
Select a language for the setup application.
Accept the license agreement in the “License Agreement” dialog. Click
“Next”
48
Click “Finish” to complete the installation process.
4. Database Backup
49
APPENDIX B - DESIGN DOCUMENTATION
50
Login use case
Overview
Pre-conditions
Flow of events
Post conditions
Users able to log to system
51
Create user use case
Overview
Creating users for log to system and do their tasks through the system
Pre-conditions
Users must work with the system
Flow of events
1. Log to system
2. Provide username & passwords
3. Create user accounts
4. Provide user accounts for users
Post conditions
52
Reporting use case
Use-Case Reporting
Actor Admin, Manager
Overview
Post conditions
Must get all the reports that top level management’s needs.
53
B.2 Activity Diagram
54
Item issue Activity Diagram
55
Add Item Activity Diagram
56
B.3 Sequence Diagram
57
Item issue Sequence Diagram
Following sequence diagram shows about the item issue
58
Report view Sequence Diagram
Following sequence diagram shows about the report generating of the system
59
APPENDIX C – USER DOCUMENTATION
User manual
User login
First you should login to the by providing correct username and password. If you 1st time log
to the system enter the username and password in the CD.
Home page
If you enter correct username and password then display the home page.
There are various menu items listed inside each categorized functional section of the
“Home Page”
60
Figure 38-Home dashboard interface
Categorized Functional Sections
Item Receive – When item received to the main stock include here
Main category
Can enter main categories of the hardware. Mainly use items in the hardware is enter in this
section.
61
When clicking the items on the table can update, delete main category.
By clicking “Clear” button can clear the textboxes.
Select the main category & then enter the subcategory according to main category.
All the saved details display in the table.
When clicking the items on the table can update, delete sub category.
Add Item
In this section can add the items that have in the hardware.
62
Figure 40-Add item interface
Sections
All the sections that have in the hardware can enter in this section.
Suppliers
The suppliers that provide items to the hardware can register their details in this section.
Item Receive
All the items received from the suppliers can enter in this section.
63
If click “Complete Bill” you cannot enter the same bill number again.
Item Issue
Item Return
After issue the items you can return items by this section.
Item Depreciate
After some years items are depreciate. You can depreciate items by this section.
64
Then click the “Depreciate” button.
You couldn’t remove the Depreciate items.
So carefully depreciate the items.
First you should log to the system by enter the username and password that provide in the CD.
Reports
In this section include the all the reports that requested to be want.
65
You can select whatever report by clicking the relevant report. Ex: issue report, receive
report etc.
66
APPENDIX D – TEST RESULTS
Login Module
Table D-1: Login module test results
1 Succfully log to
system
2 Enter invalid
username,
password &
section
3 Empty username
& password
4 Enter only
username
5 Enter only
password
67
6 Enter pressing
‘Enter’ key
1 Without
filling all
the require
fields
2 filling all
the require
fields
68
3 Enter same
category
again
4 Click the
main
category in
the table
that want
update.
5 Click the
main
category in
the table
that want
delete.
6 Delete the
main
category
that
entered the
sub
category.
69
Item Receive Module
Table D-3: Item receive module test results
1 Enter some
of the
require
fields
2 filling all
the require
fields
3 Click main
category,
subcategor
70
y and try to
edit
2 Filling all
the require
fields
71
3 Issue the received items Click the
record in
the table
that want
update.
4 Enter same
issue
number &
click enter
button
5 Issue the quantity more than in the main stock Click the
main
category &
sub
category
1 Enter some
of the
require
72
fields and
save
2 Filling all
the require
fields
3 Enter same
item and
save
4 Select data
from table
and enter
value that
need to
delete
73
APPENDIX E – CODE LISTING
Module Variable
Public d_conn As MySqlConnection
Public d_cmd As MySqlCommand
Public d_conn1 As MySqlConnection
Public d_cmd1 As MySqlCommand
Public d_reader As MySqlDataReader
Public d_adapt As MySqlDataAdapter
Public ds As DataSet
Public dt As DataTable
Public i As Integer
Public dataset As DataSet
Public Sql As String
Public txtAddress As TextBox
Public Zipcode As Integer = 0
Public Adding, Editing As Boolean
Public Products As Integer = 0
Public Employees As Integer = 0
Public Search As Integer = 0
End Module
Figure 44-Variables
This code segment is used to check the issue number already entered to the system.
Else
cmbReMc.Enabled = True
cmbReSc.Enabled = True
cmbIssIteam.Enabled = True
txtIssuQuan.Enabled = True
End If
74
This code segment is used to check the quantity of the item when issuing the items .
End If
connection_close()
'-------------------------------------------------------/////
End Sub
This code segment is used to check the issue number already entered to the system .
75
This code segment is used to barcode genaration.
End Sub
End Try
End Sub
76
APPENDIX F – EVALUATION QUESTIONNAIRS
Questionnaire
Table F-1: Evaluation Questionnaire
Name of Employee –
Section –
Designation –
77
o No
78
10. Titles used in the general process are
similar and find no issues within the used o Extremely Satisfied
titles of the software. o Very Satisfied
o Somewhat Satisfied
o Not so Satisfied
o Not at all Satisfied
13. How often does our software freeze o Not at all often
or crash? o Slightly often
o Moderately often
o Very often
79
Questionnaire Analysis
0%
3%
44%
0%
3% Extremely Satisfied
23% 30% Very Satisfied
Somewhat Satisfied
Not so Satisfied
80
3. Processes involved in the software, are not found complex. I feel comfortable.
3%3%
17% 27% Extremely Satisfied
Very Satisfied
Somewhat Satisfied
Not so Satisfied
Not at all Satisfied
50%
Figure 51-Processes involved in the software, are not found complex analyze graph
0%
3% Very Fast
13%
36% Fast
Moderately
Slow
48% Very slow
81
5. Message and instructions receiving from software are available where ever we need.
17% 0%
Extremely Satisfied
50% Very Satisfied
33% Somewhat Satisfied
Not so Satisfied
Not at all Satisfied
7%
Yes
No
93%
82
7. I am satisfied totally with the whole software provided
6%0%
Extremely Satisfied
27% Very Satisfied
Somewhat Satisfied
Not so Satisfied
67%
Not at all Satisfied
0%
3%
Extremely Satisfied
23% 30%
Very Satisfied
Somewhat Satisfied
Not so Satisfied
Not at all Satisfied
44%
83
9. All, in process needs within the systems of the institution are fulfilled by this software.
Figure 57-Process needs within the systems of the institution are fulfilled analyze graph
10. Titles used in the general process are similar and find no issues within the used titles of the
software.
0%
3%
20% Extremely Satisfied
Very Satisfied
44%
Somewhat Satisfied
Not so Satisfied
Figure 58-Process are similar and find no issues within the used titles analyze graph
84
11. No misleading guides were found within the software and Manual.
7%0%
Extremely Satisfied
33% Very Satisfied
27%
Somewhat Satisfied
Not so Satisfied
Not at all Satisfied
33%
3%
13%
36% Excellent
Good
Average
Bad
48%
85
13. How often does our software freeze or crash?
13% 0%
Not at all often
Figure 61-How often does our software freeze or crash analyze graph
7%
10%
Yes
May Be
No
83%
86
GLOSSARY
Use Case Diagram - Its simplest is a representation of a user's interaction with the system.
DBMS (Database Management System) – DBMS is a system software that manage storage,
updating and retrieval of data in a computer system.
GUI (Graphical User Interface) – A visual method of interacting with a computer through
menus, icons and windows etc.
87
88