0% found this document useful (0 votes)
208 views68 pages

Vel Tech High Tech: Dr. Rangarajan Dr. Sakunthala Engineering College

Uploaded by

Mee Uuu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
208 views68 pages

Vel Tech High Tech: Dr. Rangarajan Dr. Sakunthala Engineering College

Uploaded by

Mee Uuu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 68

VEL TECH HIGH TECH

Dr. RANGARAJAN Dr. SAKUNTHALA ENGINEERING


COLLEGE
An Autonomous Institution
Approved by AICTE-New Delhi, Affiliated to Anna University, Chennai
Accredited by NBA, New Delhi & Accredited by NAAC with “A” Grade & CGPA of 3.27

DEPARTMENT OF COMPUTER SCIENCE ENGINEERING


AY 2022-23 EVEN / SEMESTER – IV / 2021-2025 BATCH / II YEAR
21HC45T / SOFTWARE ENGINEERING / INNOVATIVE ASSIGNMENT – I

COURSE DETAILS
FACULTY
HTS 991 FACULTY NAME Dr.J.SENTHIL MURUGAN
CODE
SUBJECT CODE 21HC45T SUBJECT NAME SOFTWARE ENGINEERING
YEAR SECOND YEAR SEMESTER 4TH SEMESTER, Section: A
COMPUTER SCIENCE AND
DEGREE B.E BRANCH
ENGINEERING
BATCH 2020-2024 ACADEMIC YEAR 2022-2023

COURSE CODE 21HC45T YEAR/SEMESTER II YR/ IV SEM


CATEGORY PROFESSIONAL CORE COURSE (PCC) L T P C
COURSE TITLE SOFTWARE ENGINEERING (COMMON TO CSE & IT) 3 0 0 3

SYLLABUS No. of Credits: 3

UNIT I SOFTWARE PROCESS AND AGILE DEVELOPMENT 9


Introduction to Software Engineering, - Software Process – Process models – Prescriptive Process Models –
Specialized Process Models – Agile Development – Extreme Programming (XP) –XP Process- Other Agile Process
Models.
UNIT II REQUIREMENTS ANALYSIS AND DESIGN PRINCIPLES 9
Functional and non functional – Software requirement document – Requirement engineering process - Feasibility
studies – Functional and behavioural models – Structured analysis and data dictionary - Design process and
concepts – Design heuristic – Architectural design – Mapping data flow into a software architecture - Data design
– User interface design - Interface analysis, Interface Design - Component level Design: Designing Class based
components, traditional Components, Real time software design

CO. No. Course Outcomes Blooms


level
On successful completion of this Course, students will be able to
C405.1 Explain the concept of Software life cycle models. K2
C405.2 Analyze the software requirement specification and design software K3
according to the specification.
Note: 1: Slight, 2: Moderate, 3: Substantial

K1 K2 K3 K4 K5 K6
Remember Understand Apply Analyse Evaluate Create
SAMPLE ASSIGNMENT FORMAT

Example 1:
Assume that the Teacher has to maintain attendance record of the classes to which it is teaching.
With the help of this system Teacher should be in a position to send e-mail to the students who
remain absent for the class. The system provides a cumulative report at every month end for the
corresponding class.

SOLUTION:

OBJECTIVE:

The Objective is to create the attendance maintenance system that replaces the traditional, manual
attendance system by which a lot of paper work will be reduced, using Software Engineering Concept and
methods.

Purpose
The identity of student is verified and then marked present at particular date and Time. The
purpose of this document is that the requirements mentioned in it should be utilized by software
developer to implement the system.
Scope
This system allows the student to interact the Teacher. The purpose of the document is to have
statistical report and should display individual’s report or a cumulative report whenever
required, and maintain a good relationship.
Overview
This system facilitates to send an e-mail/warning to the student remaining absent in the class.

INSTRUCTION
This attendance maintenance system replaces the traditional, manual attendance system by which a lot of paper work
will be reduced.
1. The Teacher should able to view photograph of a student along with his attendance in his Laptop.
2. This is the primary feature of this system.
3. Another feature is that Teacher can be allowed to edit particular record at desired time.
4. The system should produce monthly attendance report.
5. And there should be facility to send an e-mail/warning to the student remaining absent in the class

REQUIREMENTS

1.1 User Manual


The system should provide Help option in which how to operate the system should be
explained. Also hard copy of this document should be given to the user in a booklet form.
2. Functional Requirements

2.1 Description
The identity of student is verified and then marked present at particular date and
Time. The system should display student photograph along with their names for that
corresponding class. The student may be marked present or absent depending upon his
presence. The system should send e-mails to absent students. A statistical report should
display individual’s report or a cumulative report whenever required.
2.2 Technical Issues
The system should be implemented in VC++

INTERFACES
3. Interface Requirements

3.1 GUI
GUI 1 : Main menu should provide options such as File, Edit, Report, Help.
GUI 2 : In File menu one can create a new record file or can open an existing
record file. For example : If file SECOMP_SEMI_07 is opened then we
may view attendance record of SE COMPUTER class in year 2007 and a
record for semester-I can be viewed.
GUI 3 : The display of record should be

The photo can be clicked to mark student present for particular class. The e-mail button can be clicked
to send e-mail to the student being absent.

GUI 4 : Report option should display statistical report. It may be for


particular student or for the whole class.
GUI 5 : Help option should describe functionality of the system. It should be
written in simple HTML.

3.2 Hardware Interface

Hardware Interface 1 : The system should be embedded in the laptops.


Hardware Interface 2 : The laptop should use wireless Ethernet card to send e-mails.
These Laptops should be the clients of departmental
database server.
3.3 Software Interface

Software Interface 1 : Attendance maintenance system.


Software Interface 2 : The attendance database should be transmitted to
departmental database server.
Software Interface 3 : E-mail message generator which generates standard
message of absence.
Software Interface 4 : Report generators

DESIGN SCENARIOS
4. Performance Requirements
This system should work concurrently on multiple processors between the
college hours. The system should support 50 users.
The e-mail should be sent within one hour after the class gets over.
The system should support taking attendance of maximum 100 students per class.
5. Design Constraints
The system should be designed within 6 months.
6. Other Non-functional Attributes

6.1 Security
The teacher should provide password to log on to the system. He/she should be able
to see the record of his/her class.
The password can be changed by the Teacher by providing existing password.
6.2 Reliability
Due to wireless connectivity , reliability can not be guaranteed.
6.3 Availability
The system should be available during college hours.
6.4 Maintenability
There should be a facility to add or delete or update Teachers and students for
each semester.
6.5 Reusability
The same system will be used in each new semester.
OPERATIONAL SCENARIOS
7. Operational Scenarios
There will be student database, Teacher database. The student database will
contain students name, class, attendance, e-mail address, address, phone number.
The Teacher database will contain Teacher’s name, classes taught, e-mail
address, phone number.
8. Preliminary Schedule
The system has to be implemented within 6 months.

CONVERT TO SRS DOCUMENT


Importance of SRS : The software requirements provide a basis for creating the
Software Requirements Specifications (SRS).
The SRS is useful in estimating cost, planning team activities, performing tasks,
and tracking the team’s progress throughout the development activity.

USE CASE
ACTIVITY

SEQUENCE
DFD LEVEL
The output to student database system are -
1) students name, class, attendance, e-mail address, address, phone number.
2) Teacher’s name, classes taught, e-mail address, phone number.
3) Teacher database and student report is given to Institution.

Name Meaning

The Process section of the DFD alters data and creates output. In addition, it does
Process calculations, sorts data based on logic, and controls data flow according to corporate
requirements.

External entities are the source and destination of information from the system and
External interact with it. An example of an external entity is a third-party company or person, a
Entity computer system, or a business system. People use the words terminators, sources, links,
and actors to determine entities.

Data A database table or a membership application are examples of files or repositories that
Store store data for later use. Moreover, this component must be properly labeled.

Data flow is the flow of data between external entities, processes, and data repositories.
Data
It illustrates the relationship between the other components. Additionally, a labeled
flow
arrow is utilized to demonstrate data flow.

1. Level 0 DFD:
The external entities of the system are also highlighted in DFD level 0. For the student management system, the
external entities are the “students” and the “faculty”. These entities will be the source of inputs and receive outputs.
2. Level 1 DFD:

To elaborate more on the context diagram, the 1st level in DFD is applied. DFD level 1 gives more specificity to
the idea given in DFD level 0. Therefore, DFD level 1 is the expanded version of the context diagram.

This level reveals the sub-processes of the student management (0.0) process. However, this diagram only
highlighted more on the external entities of the main process. This includes:

 Subjects
 Faculties
 Class Schedules
 Students
 Semester
 Attendance

Therefore, the system DFD level 1 implies that the student management system is the central process. Its external
entities are specified to know the flow of data and its processes.

In contrast, this level can be subject to modification if you want to expand a more detailed diagram. Just make sure
to provide the necessary information and processes to justify your concept.

The student management system project processes may vary depending on the needs of its users. Nevertheless, the
purpose of level 1 is to discuss more on DFD level 0.

3. Level 2 DFD:

The 2nd level of the data flow diagram (DFD) is the last but not the less. This is the high level among the three
and is more detailed.
DFD level 2 gives more information about the Attendance maintenance system. The processes specified include the
following:

For instance, the mentioned processes are included in the scope of the Attendance maintenance system.

Assigning attendance is the process that the instructors apply during class.

Assigning schedules is the process of scheduling classes for students and professors. This process is next to
assigning subjects.

Assign subjects come after processing the student’s primary transaction such as enrollment.

Assigning semester is automatically processed by the system that is based on the school’s academic year. This is
the system’s next process after the student’s information is provided.

The included processes were all part of the main process “Attendance maintenance system”.

Note: The last level (DFD level 2) is not required all the time. It is only necessary when there’s a need to discuss
more of the included sub-processes.

CONCLUSION

The Attendance maintenance system is an overview of the data flow that may come in and out of the system. It
provides the directions of data flow, details of its source, and how they were processed in software engineering.

REFERENCES:

https://www.coursera.org/articles/software-development-life-cycle
https://theproductmanager.com/topics/software-development-life-cycle/
https://stackify.com/what-is-sdlc/
https://www.win.tue.nl/~wstomv/edu/2ip30/references/index.html
IEEE Software Requirements Specifications
Template http://www.cas.master.ca/~carette/SE3M04/2003/f iles/
srs_template.doc
 Jessica Keyes. Software Engineering Handbook. Auerbach Publications (CRC Press), 2003.
Contains complete examples of various SE documents.
 Roger S. Pressman. Software Engineering: A Practioner's Approach (Sixth Edition, International
Edition). McGraw-Hill, 2005.
 Ian Sommerville. Software Engineering (Seventh Edition). Addison-Wesley, 2004.
 Hans van Vliet. Software Engineering: Principles and Practice (Second Edition). Wiley, 1999.
 M.R.V. Chaudron, J.F. Groote, K.M. van Hee, C. Hemerik, L.J.A.M. Somers and T. Verhoeff.
"Software Engineering Reference Framework". Technical Report CS-Report 04-039, Computer
Science Reports, Department of Mathematics and Computer Science, Eindhoven University of
Technology, Eindhoven, The Netherlands, 2004.
 Barry Boehm, Richard Turner. Balancing Agility and Discipline: A Guide for the Perplexed.
Addison Wesley, 2004.
 Bob Colwell. "Design Reviews". IEEE Computer. October 2003, pp. 8-10.
 Tom Gilb, Dorothy Graham. Software Inspection. Addison-Wesley Pub Co; 1st edition (December
31, 1993).
 Daniel P. Freedman, Gerald M. Weinberg. Handbook of Walkthroughs, Inspections, and
Technical Reviews: Evaluating Programs, Projects, and Products. Dorset House; 3rd edition
(August 1990).
VEL TECH HIGH TECH
Dr. RANGARAJAN Dr. SAKUNTHALA ENGINEERING
COLLEGE
An Autonomous Institution
Approved by AICTE-New Delhi, Affiliated to Anna University, Chennai
Accredited by NBA, New Delhi & Accredited by NAAC with “A” Grade & CGPA of 3.27

Course : COMPUTER SCIENCE ENGINEERING

Course Code : 21HC45T

Title : SOFTWARE ENGINEERING

Student Name :

Register No. :

VHC No. :

Branch Name : COMPUTER SCIENCE ENGINEERING

Batch No. :

Assignment No. : INNOVATIVE ASSIGNMENT – I

Year and Sem. : AY 2022-23 - EVEN / SEMESTER – IV / II YEAR/ A Sec.

Submission Date :

Faculty Signature
21HC45T - SOFTWARE ENGINEERING

INNOVATIVE ASSIGNMENT QUESTIONS

11283 113021104001 ABHINAV S


11285 113021104002 ABISHALOM S P
11284 113021104003 ABI SANKAR S
K.
BATCH 1 No.
1 For the requirement given below, identify stakeholders, functional and non-functional K3
. requirements
A software is to be built that will control an Automated Teller Machine (ATM). The ATM machine
services customers 24 by 7. ATM has a magnetic stripe reader for reading an ATM card, a
keyboard and display for interaction with the customer, a slot for depositing envelopes, a dispenser
for cash, a printer for printing receipts and a switch that allows an operator to start/stop a machine.
The ATM services one customer at a time.
When a customer inserts an ATM card and enters the Personal Identification Number (PIN), the
details are validated for each transaction. A customer can perform one or more transactions.
Transactions made against each account are recorded so as to ensure validity of transactions.
If PIN is invalid, customer is required to re-enter PIN before making a transaction, If customer is
unable to successfully enter PIN after three tries, card is retained by machine and customer has
to contact bank.
The ATM provides the following services to the customer :
1) Deposit cash in multiples of 100
2) Transfer amount between any two accounts.
3) Make balance enquiry.
4) Print receipt.
Each of the above transactions must be made within 60 seconds in case the time exceeds 60
seconds, then the transaction is cancelled automatically. Also, if the machine is not used for more
than two minutes after entry of card, the card is retained by the machine. An operator panel
with a key-operated switch allows an operator to start and stop the servicing of customers. When the
switch is moved to the "off position, the machine will shut down, so that the operator may remove
deposit envelopes and reload the machine with cash,
blank receipts, etc. The operator is required to verify and enter the total cash on hand before starting
the system from this panel.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the requirement given
3) Each of the above transactions’ enquiry based on DFD.
2 (a) Draw use case and data flow diagrams for a restaurant system. The activities of the
. restaurant system are listed below.
1. Receive the customer food orders, K2,
2. Produce the customer ordered foods, K3
3. Serve the customer with their ordered foods,
4. Collect payment from customers,
5. Store customer payment details,
6. Order raw materials for food products,
7. Pay for raw materials and pay for labor.

(b) A coffee vending machine dispenses coffee to customers.


Customers order coffee by selecting a recipe from a set of recipes. Customers pay for the
coffee using coins.
Change is given back, if any, to the customers.
The 'Service Assistant' loads ingredients (coffee. powder, milk, sugar, water, chocolate)
into the coffee machine.
The 'Service Assistant' adds a recipe by indicating the name of the coffee, the units of
coffee powder, milk, sugar, water and chocolate to be added as well as the cost of the coffee.
The Service Assistant can also edit and delete a recipe.
i) Develop the use case diagram for the specification above.
ii) For any two scenarios draw an activity diagram and sequence diagram.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the restaurant system
3) Each of the above transactions’ enquiry based on DFD.
4) Testing and implementation on White Box Testing
K3,
K2

3
(a) Based on the library management system design construct the following.
.
1. Analyze a Problem statement based on basis of formal models of software systems,
2. what project ideas for software development could be developed.
(b) Prepare a software requirement specification document for "Library Management
System" and The library management system will automate the major library operations.
1. Various subsystems will be student accounts management system,
2. Book issuing system,
3. Stock maintenance systems and
4. fine calculation and management system.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the library management
3) Each of the above discussion must be shown.
4) Apply in different testing Strategy
5) Implementation method has to be carried out.
11289 113021104007 ALLWIN SAMUEL A
11290 113021104008 AMARENDAR YADAV R
11295 113021104013 ARAVINDHAN V
K.
BATCH 2 No.
1 According to the World Health Organization, 12 million deaths occur yearly due to heart disease. Load of K3
. cardiovascular disease is rapidly increasing all over the world in the past few years. Early detection of cardiac
diseases can decrease the mortality rate and overall complications. However, it is not possible to monitor
patients every day in all cases accurately and consultation with a patient for 24 hours by a doctor is not
available since it requires more patience, time and expertise.

Construct a Heart Failure Prediction System is intended to assist patients in recognizing their heart state
early and receiving treatment at an earlier stage, allowing them to avoid any serious conditions.
I. We have designed this system using the Machine Learning model to predict the future possibility of
heart disease by implementing the Logistic Regression algorithm.
II. The framework used in this project is Django.
III. The Front End involves Html, CSS and JavaScript. The Back End involves MySQL Database. The
Back End Language is Python

The user would need to register first to log into the system. For the system to predict if there is heart failure or
not, the user would require to give inputs. The parameters include Age, Sex, Chest Pain Type, Resting BP,
Cholesterol, Fasting BS, Resting ECG, Maximum Heart Rate, Exercise-induced Agina, Oldpeak, and the slope
of the peak exercise ST segment. After the user provides all these inputs, the system will detect if there is any
heart disease. The chatbot in the system will inform the user about the causes of heart failure, and the diagnosis
test required. It will also provide links to nearby hospitals/clinics that specializes in heart disease. The user can
also check out some free checkup camps.

The admin can log in using their credentials. They can view the users using the system. They can also add free
checkup camp details. We have used Logistic Regression to develop this system. It is a significant machine
learning algorithm because it can provide probabilities and classify new data using continuous and discrete
datasets.

1) The system is easy to maintain.


2) It is user-friendly.
3) Users can search for a doctor’s help at any point in time.
4) Very useful in case of emergency.
5) They can also look for free check-up camps.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
2 (a)Develop complete use case for the following, Searching for books based on title in an K2,
. on-line book store. K3
 In order to develop a software development project,
 what are ideas should be founded on software project management and planning.

(b)An independent trunk company wants to track and record its drivers driving habits.
i) For this purpose the company has rented 800 phones numbers and has printed
the numbers in the front, back and sides of all trucks owned by the company.
ii) Next to The 800 numbers a message is written
iii) "PLEASE REPORT ANY DRIVER OR TRUCK PROBLEM BY CALLING
THIS NUMBER".
The hacking company waits for you to develop a system that:
i) Collects information from caller about the driver performance and behavior as
well as truck condition,
ii) Generates daily and monthly reports for each driver and truck management.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in different testing Strategy
5) Implementation method has to be carried out.
3 The customers in this system are book sellers who do not make a stock of books. K3
. 1. As the orders come the books are demanded from publishers directly.
2. As per the problem description it is clear that the input to this system is
‘customer’ who places an order and output will be purchase order given to
publisher.
3. Prepare a CFD for a Books order processing system and
4. Discuss project ideas for software development are founded on software risk
management and maintenance.
Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in different testing Strategy
5) Implementation method has to be carried out.
11286 113021104004 AJAYKUMAR P
11787 113021104301 AJITH AAKASH
11297 113021104015 ARUN KUMAR.M
K.
BATCH 3 No.
1 (a) Consider the process of ordering a pizza over the phone. K3
. i) Draw the use case diagram and also sketch the activity diagram representing each
step of the process, from the moment you pick up the phone to the point where you
start eating pizza.
ii) Include activities that others need to perform.
iii) Add exception handling to the activity diagram you developed.
iv) Consider at least two exceptions
(e.g. delivery person wrote down wrong address, deliver person brings wrong pizza).

(b) Assume a restaurant system and based on it


i) Draw use case and data flow diagrams for
ii) The activities of the restaurant system are listed below.
iii) Receive the customer food orders,
iv) produce the customer ordered foods,
v) serve the customer with their ordered foods,
vi) collect payment from customers,
vii) store customer payment details,
viii) order raw materials for food products,
ix) pay for raw materials and pay for labor.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in different testing Strategy
5) Implementation method has to be carried out.
2 (a)Develop a dataflow diagram for burglar alarm system along with entity relationship K3,
. diagram, and Create a software development project ideas based on software K3
documentation also Compare and contrast quality assurance and quality control
(b) Prepare a software requirement specification document for "Library Management
System" and The library management system will automate the major library
operations.
1. Various subsystems will be student accounts management system,
2. Book issuing system,
3. Stock maintenance systems and
4. fine calculation and management system.
Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process with Implementation
3 (a) Prepare and Draw the Level 0 and Level 1 data flow diagram for the following system & K3
. Identify entities in the system and draw a diagram showing the relationship between entities. The
Chocolate Vending Machine (CVM) system requirements are as follows :

The CVM dipenses chocolates :


(1) Very large Chocolates (VC) at ` 15,
(2) Large Chocolates (LC) at ` 10 and
(3) a Small Chocolates (SC) at ` 5.

The vending machine only. deals in coins. The CVM gives the proper change after the product
selection is made. The CVM must check the amount deposited by the customer. The vending
machine operates in the following Way.
(A) The CVM remains idle until a customer or owner begins to interact with the machine. When a
selection button is pressed the VCM indicates the required amount (` 15/-, ` 10/-, ` 5).
(B) If the full amount needed has been deposited then dispense the proper chocolate and display :
Thank You!
(C) If an insufficient amount (possibly zero) has been deposited then display : remaining amount
needed.
(D) If an over amount

(b)Prepare a standard format and use it for all requirements.


 Apply consistency in the language. Use
- ‘shall’ for mandatory requirements
- and ‘should’ for desirable requirements.
 The text which is mentioning the key requirements should be highlighted.
 Avoid the use of computer jargon (computer terminologies). It should be written in
simple language.
Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in different testing Strategy
5) Implementation method has to be carried out.
11291 113021104009 AMRUTHAVARSHAN R S
11292 113021104010 AMUTHAN M
11303 113021104021 DANIEL S
K.No
BATCH 4 .
1 Weather Forecasting:Assume that a project is being divided into two modules, Data K3
. Gathering & Pre-processing, and Prediction Algorithm. This project would be based on
prediction and that’s why data needs to be prepared in a structured way. For this, you can
either be parsing or one-hot encoding. It’s best to implement Scikit-Learn (linear
regression) model to train the datasets and once they’re trained you can provide inputs
(temp, pressure, etc.)

This app is well-capable in predicting 6-7 days (up to) data sets and will fetch weather
details on an hourly basis. It will also offer users to change location and measurements as
per their choices.

Key Features:

1. This project would require Linear Regression to predict the amount of Rainfall (in
inches).
2. This project will take certain parameters to measure weather i.e. temperature,
humidity, wind speed, etc.
3. Software requirement – Jupyter Notebook, Windows/Linux, Python 3, etc.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Stress testing Strategy and also Implementation method has to be carried out.
2 A social network for college with student login, administrator login, placement officer K3
. login and staff login. The administrator has the most authority. This account may be
handled by principal or other senior member. This website notifies students about various
college events and placement opportunities. Only staff, placement officer and
administrator have the permission to post events. Students can view those notifications
and react accordingly. Whenever a new event or notification is posted students are
automatically notified of it by an Sms. It also informs the staff and gives them a list of
students with high marks and those below standard attendance on a single button click. It
also includes a student greviences area where students may post college inconsistencies
and other problems. These posts will only be visible to the administrator.
1) Students can make more friends within short span of time.
2) Students will be updated with new thoughts and views.
3) Student can share as well as obtain knowledge by using this application.
4) Student does not have to go online to view messages, they can view messages
offline.
Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in different testing Strategy
5) Implementation method has to be carried out.
3 The software system is an online blood bank management system that helps in managing K3
. various blood bank operations effectively. The project consists of a central repository
containing various blood deposits available along with associated details hosted in server.
These details include blood type, storage area and date of storage. These details help in
maintaining and monitoring the blood deposits. The online system allows to check whether
required blood deposits of a particular group are available in the blood bank. Moreover the
system also has added features such as patient name and contacts, blood booking and even
need for certain blood group is posted on the website to find available donors for a blood
emergency.

Note:
1) Explanation from the given Question and based on the Use Case construct the Blood Bank
Process,
2) Steps involved in carrying out the online blood bank management system
3) Each of the above transactions’ enquiry based on DFD.
4) Testing and implementation on White Box Testing
11293 113021104011 ANDENE GOWTHAM
11254 113021104043 JAYAPRAKASH J
11294 113021104012 ARANIDHI A
K.
BATCH 5 No.
1 Consider a Banking System, the software engineering project like the banking system is a K3
. very essential project in the banking sector to store the account information and also banking
transactions within the database. This banking system application also adds new customer
details. By using this project, data searching can be done very fast in less time. By using this
software, clerical work can be reduced almost. This software allows quick transactions of
creating a new account for the customer, cash withdrawal from the user account, cash
deposit into the account, account balance checking for the account holder even if there is
huge data within the database. This project provides user-friendly, fast, reliable, efficient
interfaces for banking. So there is no chance of losing the customers data This system can be
easily connected to the scanners and printers so that the user can get the annual report in a
printable format.

Note:
1) Explanation from the given Question and based on the Use Case construct the Bank Process,
2) Steps involved in carrying out the banking system
3) Each of the above transactions’ enquiry based on DFD.
2 The Course Management System is an application that permits students to compare, K3
. tamper and present student’s data in an important manner. The project develops student's
information system for the Intranet Automation of student information management
system Software, if the institution does not have a Course Information Management System,
they face many problems specially about wasting time. It is hard to find data and to get any
comment from students or teachers, the system has been to ease good Interaction/
communication facilities between the Students and administration. In doing so, the project
helps a lot in doing faster duties in Institutions, there are some new ideas like Bulletin board
system, Students comment, analysis skill student etc. We need some methods to complete
that system using detailed Unified Modelling Language (UML Diagram), Dataflow
Diagrams and Entity Relationship Diagrams (E-R Diagrams). The web pages about students
are created dynamically based on the student's user ID, user password and links.

1. Introduction
2. Requirements & System Use Cases
3. Test Plan and Test Cases & Flow Chart
4. System Sequence Diagram
5. System Architecture Database
6. Tables Technologies to be Used
7. References
Note:
1) Explanation from the given Question
2) Steps involved in carrying out in the Course Management System
3 (a)Prepare a software requirement specification document for "Library Management System" K3
.
and The library management system will automate the major library operations.
1. Various subsystems will be student accounts management system,
2. Book issuing system,
3. Stock maintenance systems and
4. fine calculation and management system.

(b) Assume a restaurant system and based on it


i) Draw use case and data flow diagrams for
ii) The activities of the restaurant system are listed below.
iii) Receive the customer food orders,
iv) produce the customer ordered foods,
v) serve the customer with their ordered foods,
vi) collect payment from customers,
vii) store customer payment details,
viii) order raw materials for food products,
ix) pay for raw materials and pay for labor.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in different testing Strategy
5) Implementation method has to be carried out.
11296 113021104014 ARJUN M
11298 113021104016 ASWIN J
11333 113021104053 KEERTHIVASAN C
K.
BATCH 6 N
o.
1 Online Pizza ordering system is a dedicated solution that helps you accept and manage K
. deliveries, takeaways, schedules, and dine-in efficiently. On-tap Pizza delivery system aims to 3
meet the state of industry analysis, ensuring to improve your overall business operational
activities and customer experience. Pizzeria software offered by Elluminati helps you offer
extensive user support with business-enhancing features. It provides crucial elements helping
you keep your customers coming back:

The mobile-friendly interface that helps you provide the best service experience. Feature
loaded white label pizza delivery tracking system helping you have complete control over
each business activity. The suitable and scalable platform makes it easier for you to handle
single/multiple orders simultaneously.

Every Requirement Our Pizza Ordering Software Caters


1) Promotion & Coupon Codes
2) Website Setups
3) Operational zone management
4) Set up Email & SMS templates
5) Quick Help & Support Access

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in different testing Strategy
5) Implementation method has to be carried out.
2 Chocolate Vending Machine (CVM) system has different requirements, can you identify the K
. entities in the system and draw the relationship between entities. 3
The CVM dipenses chocolates :
(1) Very large Chocolates (VC) at ` 15,
(2) Large Chocolates (LC) at ` 10 and
(3) a Small Chocolates (SC) at ` 5.
The vending machine only. deals in coins. The CVM gives the proper change after the product
selection is made. The CVM must check the amount deposited by the customer. The vending
machine operates in the following Way.
(A) The CVM remains idle until a customer or owner begins to interact with the
machine. When a selection button is pressed the VCM indicates the required amount (`
15/-, ` 10/-, ` 5).
(B) If the full amount needed has been deposited then dispense the proper chocolate
and display : Thank You!
(C) If an insufficient amount (possibly zero) has been deposited then display :
remaining amount needed.
(D) If an over amount

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in smoke testing
3 Assume that you have to develop a protection system to avoid software privacy & also enhance K
. 3
the protection of software. In industries, software piracy is a major threat because hackers
using different malicious and malware codes to get access to software products. Thus, it is
crucial to use the required protection system to maintain data protection and software products’
copyright rights. At first, the users must register their software products and then buy the
software online. When the online payment is done, software product users can easily download
the software along with the serial key. This software reads the desktop ID so that it generates a
user ID through an algorithm. So the user can access by using the ID and serial key. Once the
key is entered, then the software will produce a key through encryption to compare it with the
user’s serial key for verification. If the generated key matches with the user key, it gives access
to the software product otherwise it will be locked.

Note:
1) Explanation from the given Question
11304 113021104022 DARWINS DIVAKAR A
12999 113021104018 B M CHANDRU
11305 113021104023 DEEPAK K
K.
BATCH 7 No
.
1 Software Engineering Project Agile Model is fast otherwise adaptable and it refers to the development K3
. of software depending on the expansion of iterative. The methods of Agile will split the tasks into mini
iterations. Every iteration can be considered as a short period “frame” within the development model of
Agile, which normally lasts from 1 week to 4 weeks. The separation of the whole project into minor
parts will help in reducing the risk of project risk and also the delivery time of the entire project.

Every iteration involves a team working using a life cycle of full software development like design,
planning, coding, requirements analysis & testing before a running product is shown to the client. The
agile model includes different phases like a gathering of requirements, design, iteration or construction,
assurance of quality or testing, deployment, and feedback.

E.g., OCR (Optical Character Recognition):


Show how the optical character recognition project is developed by using the Agile Model.
Construct this project and implement a device to send an input file for reading the data from
documents and the image file as data can be attained through an optical scanner.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Diagram Explanation
2 A Book Bank lends books and magazines to member, who is registered in the system. Also it K3
. handles the purchase of new titles for the Book Bank. Popular titles are brought into multiple
copies. Old books and magazines are removed when they are out or date or poor in condition. A
member can reserve a book or magazine that is not currently available in the book bank, so
that when it is returned or purchased by the book bank, that person is notified. The book bank can
easily create, replace and delete information about the tiles, members, loans and reservations from
the system.
1. Problem Statement:
2. Preparation of Software Requirement Specification Document:
3. Preparation of Software Configuration Management
4. Study and usage of any Design phase CASE tool
1. Use Case Diagram
2.Class Diagram
3.Sequence Diagram
4.Collaboration Diagram
5.Statechart Diagram
6.Component Diagram
7.Deployment Diagram
8. Composite Structure Diagram
5. Performing the Design by using any Design phase

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Diagram Explanation
3 Transfer of Text Securely using Cloud Computing, construct using software engineering K3
. methodology such that it is used to transfer the data very securely. There are several methods to
maintain the private as well as sensitive data protective. In that, encryption is one kind of method
which helps in protecting the secret data using a password or key. Here, the key must be decrypted to
access the data. This project helps in exchanging any sort of text messages or images securely. The
encryption methods used in this method is two way which can be utilized from private and public key
encryption actions. This method is much secured because it utilizes the SQL database for storing any
type of data that needs to be exchanged.

Note:
1) Explanation from the given Question and based on the Use Case construct the Transfer of Text
Securely using Cloud Computing
2) Steps involved in carrying out the Transfer of Text Securely using Cloud Computing
3) Each of the above transactions must be based on DFD.
4) Diagram Explanation
11308 113021104027 DHARUN J P
11337 113021104025 M DHANUSHKUMAR
11316 113021104035 GOKUL P
K
.
BATCH 8 N
o.
1 Black Box Testing tools are mainly record and playback tools. These tools are used for Regression K
. Testing to check whether a new build has created any bugs in the previous working application 3
functionality.
#1) Equivalence Partitioning

This technique is also known as Equivalence Class Partitioning (ECP). In this technique, input values
to the system or application are divided into different classes or groups based on its similarity in the
outcome.

Hence, instead of using each and every input value, we can now use any one value from the group/class
to test the outcome. This way, we can maintain test coverage while we can reduce the amount of
rework and most importantly the time spent.

Based on the same technique, Construct a Black Box Testing tools are mainly record and
playback based on the below diagram using Decision Table Testing.

Note:
1. In the above example condition, C1 has two values as true and false, C2 also has two values
as true and false. The total number of possible combinations would then be four. This way
we can derive test cases using a decision table.
2. Explanation from the given Question
3. Steps involved in carrying out the process
4. Each of the above discussion must be shown.
5. Diagram Explanation
2 Chocolate Vending Machine (CVM) system has different requirements, can you identify the K
. entities in the system and draw the relationship between entities. 3
The CVM dipenses chocolates :
(1) Very large Chocolates (VC) at ` 15,
(2) Large Chocolates (LC) at ` 10 and
(3) a Small Chocolates (SC) at ` 5.
The vending machine only. deals in coins. The CVM gives the proper change after the
product selection is made. The CVM must check the amount deposited by the customer. The
vending machine operates in the following Way.
(A) The CVM remains idle until a customer or owner begins to interact with the
machine. When a selection button is pressed the VCM indicates the required amount (`
15/-, ` 10/-, ` 5).
(B) If the full amount needed has been deposited then dispense the proper chocolate
and display : Thank You!
(C) If an insufficient amount (possibly zero) has been deposited then display :
remaining amount needed.
(D) If an over amount

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in smoke testing

3 (a)Develop complete use case for the following, Searching for books based on title in an K
. on-line book store. 3
 In order to develop a software development project,
 what are ideas should be founded on software project management and planning.

(b)An independent trunk company wants to track and record its drivers driving habits.
iv) For this purpose the company has rented 800 phones numbers and has printed the
numbers in the front, back and sides of all trucks owned by the company.
v) Next to The 800 numbers a message is written
vi) "PLEASE REPORT ANY DRIVER OR TRUCK PROBLEM BY CALLING
THIS NUMBER".
The hacking company waits for you to develop a system that:
iii) Collects information from caller about the driver performance and behavior as well
as truck condition,
iv) Generates daily and monthly reports for each driver and truck management.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in different testing Strategy
5) Implementation method has to be carried out.
11310 113021104029 DHINESHKUMAR S
11317 113021104036 GOKUL R K
11320 113021104039 GOWTHAM KUMAR M K
K.
BATCH 9 No.
1 K3
b) Assume a restaurant system and based on it Draw use case and data flow diagrams for the
.
activities of the restaurant system are listed below.
1) Receive the customer food orders,
2) produce the customer ordered foods,
3) serve the customer with their ordered foods,
4) collect payment from customers,
5) store customer payment details,
6) order raw materials for food products,
7) pay for raw materials and pay for labor.
(b)Constuct a graph based testing as shown in the diagram below for the activities of the
restaurant system are listed above.

Fig: Graph based Testing

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Apply in Graph based testing Strategy
5) Implementation method has to be carried out.
2 Domino’s was one of the original restaurant chains to drive disruption with the development K3
. of an online tracker, with a solid history that goes back a good 10 years. Recently, Domino’s
was one of the first players in voice-activated mobile ordering. But the real-time delivery
tracker still ranks as the top reason customers say the pizza company has the best mobile
experience. When offering your app users a solid order tracking system, guarantee your
location testing and GPS services include Location testing for order tracking:

1) Ability for customer to view delivery driver’s actual position


2) Provide accurate data about the destination point and planned route
3) Location information should the order arrive incorrectly
Geolocation also helps calculation of delivery charges for restaurants that don’t provide free
or fixed delivery charges.

Most large Quick Service Restaurant (QSR) chains now offer mobile apps with features like
advanced ordering, pick-up time scheduling, group orders, exclusive deals, and loyalty
programs. Testlio conducts end-to-end testing for QSRs and uncovers not only software
bugs but also issues impacting the entire app-driven customer experience. The process
includes a variety of testing types such as usability testing, exploratory testing, payments
testing, and “in the store” testing.

Based on the above example construct a true end-to-end testing of the entire app-
driven experience in a simulated environment. Test Quick Service Restaurant (QSR)
applications in a real environment ensure everything works correctly.
Note:
1) Explanation from the given Question
2) End to End Testing Design framework consists of three parts
a. Build user functions
b. Build Conditions
c. Build Test Cases
3 (a)Prepare a standard format and use it for all requirements. K3
.
 Apply consistency in the language. Use
- ‘shall’ for mandatory requirements
- and ‘should’ for desirable requirements.
 The text which is mentioning the key requirements should be highlighted.
 Avoid the use of computer jargon (computer terminologies). It should be written in
simple language.
(b)Develop complete use case for the following, Searching for books based on title in an
on-line book store.
 In order to develop a software development project,
 what are ideas should be founded on software project management and planning.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Test and Implement.
11318 113021104037 GOKULRAJ M
11302 113021104020 DANIL ABRAHAM T
11321 113021104040 GURUPRASANTH K
K.
BATCH 10 No.
1 K3
Multi-Object Tracking and Identification in Panoramic View in Real-Time, using this
.
concept construct a Computer vision has an important role to play to ease the problem of
security. Ranging from identifying objects and people in pictures and videos to using post and
pre and post-processing strategies to obtain valuable information is deemed essential to
guarantee security. Image tracking over critical areas assists a lot in this respect.
Though quite a lot of effort has been put into this realm, the concern is tracking the numerous
objects and the processing speed of the input images or videos. In this process, you can make
use of Open CV algorithms for stitching videos and for the purpose of tracking objects.
These algorithms not only let quick detection, stitching, and tracking but also give very
precise results.
I. To create a panoramic view, you can stitch input live stream videos from numerous
cameras together, creating a larger field of vision as well as ensuring ease of use.
II. To make the usage of hardware seamless, you have to constantly test the algorithms
on different machines, with different operating systems. Typically, the quickest and
most precise outcomes are accomplished with HADOOP clustering where we have
one fronted and numerous computing nodes.
Receive the customer food orders,
1. To handle large software
2. Cost management
3. For more scalability
4. For more useful quality management
5. To handle the dynamic quality of software

Note:
6) Explanation from the given Question
7) Steps involved in carrying out the process
8) Each of the above discussion must be shown in Data Flow Diagram.
2 A Smart Security Surveillance System Construct a prevailing security situation requires K3
. that all sectors contributed to some extent to facilitate measures that prevent evildoers from
carrying out their deviant activities.
i. Surveillance via IP cameras is one of the most important processes that are essential
to safeguard various sensitive places all over the country. Presently, the systems that
are used rely too much on a constant human watch, which can lead to negligence and
error.

ii. The requirement here is to use contemporary AI techniques to guarantee


exceptionally watchful surveillance round the clock. To accomplish that with a
system that lets users choose an area of interest on the available streams, any
movement within that region will be scanned, the objects within it will be
categorized based on an available database and any suspicious activity will generate
an alarm, alerting the authorities.
iii. A Voice recognition system can also be incorporated here.

Note:
5) Explanation from the given Question
6) Steps involved in carrying out the requirement given
7) Each of the above transactions’ enquiry based on Data Flow Diagram.
8) Testing and implementation on Black Box Testing
3 E-Learning Platform: create an online e-learning platform, which is shareable. This e-learning K3
. platform backed by cloud computing would let the independent LMS (Learning Management
Systems) implanted in different e-Learning standards to share their learning content. Cloud
computing will facilitate the sharing of a broad spectrum of learning objects, letting learners avail
themselves of those easily.
1. The software must have a three-layer architecture to enable sharing learning modules, and
interoperability among various learning content effectively.
2. The middle layer of the infrastructure includes a metadata transformation module and an
indexing module to facilitate the transfer of metadata among recognized e-Learning
standards.

Note:
5) Explanation from the given Question
6) Steps involved in carrying out the process
7) Each of the above discussion must be shown.
8) Test and Implement.

11323 113021104042 JACKSON K P


11326 113021104045 KAMESH N
11328 113021104047 KARTHIKRAJ V N
K.
BATCH 11 No.
1 Android Local Train Ticketing System create a ticketing application for local trains. K3
.
Customers can look into the app to make reservations for local trains and acquire online
booking receipts.
1. Customers can print these receipts as proof for traveling.
2. The app comprises two accounts, one Admin account, and the other being a user
account.
3. With the help of the Admin account, the Admin can view all the booked tickets of a
user.
4. While using the application, users have to fill a ticket booking form to make the
reservation.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
2 K3
. Personality Analysis: Construct for a person who is always very much keen to know about
themselves and their personality. So there is a need for a medium where people will get an
ideal analysis of their dispositions based on some research work.
1. This process concentrates on analyzing one’s personality on the basis of what a user
shares on their social media sites.
2. Let us take Twitter for example, a user’s tweets are gathered from his profile, pre-
processed, features are pulled, and then sent to a personality prediction algorithm.
3. The best part of this project is that the person can comprehend the outcomes with 8
various types of graphs which are rendered as output displaying percentages of each
trait.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the requirement given
3) Each of the above transactions’ enquiry based on DFD.
3 Online Election System: Construct a online election system would include contender registration, K3
. verification, auto-generated customer ID, and pass for contenders and voters. Admin login is
managed by Election Commission. Candidate Login is managed by a contender, voters will be given
a unique ID and password, with the help of which they can vote for a contender only once per
election.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Test and Implement.
11742 113021104050 KAVIYAN A
11340 113021104059 MANI DEEPAK A
11287 113021104005 AAKASH
K.
BATCH 12 No.
1 K3
Revenue Recovery System: Construct a project that helps the departments with greater
.
clarity, convenience, promptness, responsiveness. This software module renders different
reports on the basis of revenue recovery collection entries. It also provides a graphical
presentation of the data and it stores and backs up the data efficiently. This software module
also offers web-based dissemination. This project is accessible in the Revenue Recovery
system.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
2 Secured Mail System: Construct to guarantee security to the organizational data, an K3
. organization itself creates its mailing system, and the complete database lives at the
organization head.

1) The employees of that company must intercommunicate with the admin via this mailing

system only.
2) As the database resides at the organizational head, a person can look through the database

and the activities of every employee.


3) Whenever an employee quits, the admin of the company can get the information and the

transactions done by him.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the requirement given
3) Each of the above transactions’ enquiry based on DFD.
4) Testing and implementation on Black Box Testing
3 Virtual Class Room: Construct a Virtual reality will be at its peak in the coming years. The K3
. suggestion is to create an idea that could virtualize a classroom environment, utilizing the
abilities of Kinect and HTC VIVE or any other VR platform. Students from different
locations could connect to the class and feel just like in a classroom environment and learn
from the teacher delivering a lecture in front of them.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Test and Implement.

11322 113021104041 HEMA SUREYA S


11335 113021104055 KUNAL K
11336 113021104056 LOKESH V
K.
BATCH 13 No.
1 K3
Customer Experience Management: Construct how a Customer Experience Management is to
.
handle the customers’ experience by the service provider themselves. It has an important role
to play in lessening a load of management for several mobile service providers. This project is
solely associated with Mobile Networks. This project will allow the service providers to
enhance their service quality. With this, the service provider will have less irritated customers
and more satisfied customers. The solution can observe and control elements of significance
for CEM on all customer-related KPIs and indexes like their network and channels
experience, segment performance, geographical alerts, etc. KPI’S are ‘key performance
indexes’ on which the calculation of CEM is based. All the details will be shown on a
dashboard portraying all the outcomes in different forms. The database will have all the
customers’ CEMs results and are saved and used as per the needs of the dashboard.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
2 Android Task Monitoring: This project topic idea is solely created to streamline the K3
. monitoring and tracking of everyday activities through an Android app.
1) Considering our daily schedules, it becomes impossible to keep a track of our daily
appointments, events, meetings.
2) To handle this issue, this project concentrates on creating a Weekly Task Alerting System
for Android devices that can remind users of all the tasks and appointments that are
scheduled for the day.
3) The process is essentially a reminder app backed by an AI chatbot that alerts users of all
the daily tasks.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the requirement given
3) Each of the above transactions’ enquiry based on DFD.
4) Testing and implementation on Black Box Testing
3 Setting-Up Personal Home Cloud: Consider if we have a central repository for all our K3
.
photos, videos, and music that are already stored on various devices so that these files are
available on not only the devices on the home broadband network but anywhere in this
world?
I. All members of the family with access to the network would be able to access the
files, creating a common space for sharing content.
II. A network access storage (NAS) drive with a home Cloud setup will come to your
rescue.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Test and Implement.

11300 113021104017 BALAJI K


11338 113021104057 MALARAVAN.S
11332 113021104052 KEERTHIVASAN A
K.
BATCH 14 No.
1 Construct a common platform for processing at different level with different privileges not K3
.
only helps to create a proper communication channel and but also providing security to data.
Manual processing and preparing of tax paper are always a time-consuming system. So,
we need an automation system.
1) As the system will be opened and closed at same time for all different levels through this

web application, so there is no chance of any fraud.


2) Due to centralize database, documents verification can easily be made even from remote

location and a convenient method for all working departments.


3) Only authorized person with working credentials will responsible to perform their only

activity.
4) Persons don’t have to wait in line and with online form availability, they will able to get

their deposited slip with unique journal number.


5) By accessing data from relational database, query builder will help to achieve all our task

such as list of defaulters, late payment list, generating reports etc.


Modules
1. Login Module.
2. Payment Module.
3. Department Modules.
4. Database Module.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
2 Construct a Health Prediction system in such a way that it might have happened so many K3
.
times that you or someone yours need doctors help immediately, but they are not available
due to some reason. The Health Prediction system is an end user support and online
consultation project. Here we propose a system that allows users to get instant guidance on
their health issues through an intelligent health care system online.
1) The system is fed with various symptoms and the disease/illness associated with those

systems.
2) The system allows user to share their symptoms and issues. It then processes user’s

symptoms to check for various illness that could be associated with it.
3) Here we use some intelligent data mining techniques to guess the most accurate illness

that could be associated with patient’s symptoms.


4) If the system is not able to provide suitable results, it informs the user about the type of

disease or disorder it feels user’s symptoms are associated with.


5) If user’s symptoms do not exactly match any disease in our database, is shows the

diseases user could probably have judging by his/her symptoms.


6) It also consists of doctor address, contacts along with Feedback and administrator

dashboard for system operations.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the requirement given
3) Each of the above transactions’ enquiry based on DFD.
4) Testing and implementation on Black Box Testing
3 Developed a Travel and Tourism website that is a comprehensive solution to help plan K3
.
your itinerary. This system consists of two entities: User and Admin. Users can also use this
system to look for available travel packages. Moreover, this system also has a chatbot to
help improve user-friendliness. It is designed to help users with planning out their itinerary
more effectively and efficiently. This system is developed using the Django framework with
Python as the programming language.

1) Be it a vacation or a work trip, this Travel and Tourism website aims to be a one-stop

solution to assist you with seamlessly planning out your trip and helping you make the
bookings. This system consists of two entities: User and Admin.

2) Admin needs to log in with their valid login. After successful login, the admin can access

all the modules and perform/manage each task accurately. Admin can perform tasks such
as view users, view bookings, manage flights, manage hotels, etc.

3) Users can use this system to browse for hotels in addition to flights. Users can also use

this system to look for available travel packages. Moreover, this system also has a
chatbot to help improve user-friendliness.

 Interstation communication in real-time.


 Centralized data handling.
 Reduced time consumption.
 Computerized record keeping with manpower.
 Cost reduction.
 Operational efficiency.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Test and implement.

11331 113021104051 KEERTHIKA M


11330 113021104049 KATHAMBARI M
11327 113021104046 KANAGALASHMI A
K.
BATCH 15 No.
1 Construct a bug tracking system or defect tracking system is a software application that K3
. keeps track of reported software bugs in software development projects. It may be regarded
as a type of issue tracking system.
1) Many bug tracking systems, such as those used by most open-source software projects,

allow end-users to enter bug reports directly.


2) Other systems are used only internally in a company or organization doing software

development.
3) Typically bug tracking systems are integrated with other project management software.

4) A bug tracking system is usually a necessary component of a professional software

development infrastructure, and consistent use of a bug or issue tracking system is


considered one of the "hallmarks of a good software team".
5) A major component of a bug tracking system is a database that records facts about known

bugs.
6) Facts may include the time a bug was reported, its severity, the erroneous program

behavior, and details on how to reproduce the bug; as well as the identity of the person
who reported it and any programmers who may be working on fixing it.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
2 Weather Forecasting:Assume that a project is being divided into two modules, Data K3
. Gathering & Pre-processing, and Prediction Algorithm. This project would be based on
prediction and that’s why data needs to be prepared in a structured way. For this, you can
either be parsing or one-hot encoding. It’s best to implement Scikit-Learn (linear regression)
model to train the datasets and once they’re trained you can provide inputs (temp, pressure,
etc.)

This app is well-capable in predicting 6-7 days (up to) data sets and will fetch weather
details on an hourly basis. It will also offer users to change location and measurements as
per their choices.

Key Features:

1. This project would require Linear Regression to predict the amount of Rainfall (in
inches).
2. This project will take certain parameters to measure weather i.e. temperature,
humidity, wind speed, etc.
3. Software requirement – Jupyter Notebook, Windows/Linux, Python 3, etc.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3 According to the World Health Organization, 12 million deaths occur yearly due to heart K3
. disease. Load of cardiovascular disease is rapidly increasing all over the world in the past
few years. Early detection of cardiac diseases can decrease the mortality rate and overall
complications. However, it is not possible to monitor patients every day in all cases
accurately and consultation with a patient for 24 hours by a doctor is not available since it
requires more patience, time and expertise.

Construct a Heart Failure Prediction System is intended to assist patients in recognizing


their heart state early and receiving treatment at an earlier stage, allowing them to avoid any
serious conditions.
I. We have designed this system using the Machine Learning model to predict the
future possibility of heart disease by implementing the Logistic Regression
algorithm.
II. The framework used in this project is Django.
III. The Front End involves Html, CSS and JavaScript. The Back End involves MySQL
Database. The Back End Language is Python

The user would need to register first to log into the system. For the system to predict if there
is heart failure or not, the user would require to give inputs. The parameters include Age,
Sex, Chest Pain Type, Resting BP, Cholesterol, Fasting BS, Resting ECG, Maximum Heart
Rate, Exercise-induced Agina, Oldpeak, and the slope of the peak exercise ST segment.
After the user provides all these inputs, the system will detect if there is any heart disease.
The chatbot in the system will inform the user about the causes of heart failure, and the
diagnosis test required. It will also provide links to nearby hospitals/clinics that specializes
in heart disease. The user can also check out some free checkup camps.

The admin can log in using their credentials. They can view the users using the system. They
can also add free checkup camp details. We have used Logistic Regression to develop this
system. It is a significant machine learning algorithm because it can provide probabilities
and classify new data using continuous and discrete datasets.

1) The system is easy to maintain.


2) It is user-friendly.
3) Users can search for a doctor’s help at any point in time.
4) Very useful in case of emergency.
5) They can also look for free check-up camps.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
11313 113021104032 DURGA J
11314 113021104033 GAYATHRI M
11791 113021104305 VENNILA
K.
BATCH 16 No.
1 Exchanging Loyalty Points: Assume that Nowadays most companies & banks are offering K3
. loyalty points on every purchase they make. But, the major drawback is that more than 60%
of points get wasted due to unstable tracking of those points. To boost this, blockchain-based
exchange of loyalty points will enable an easy exchange platform for their users.

With this project, a tokenized loyalty point system can be introduced so that perform 3 tasks
seamlessly:

a. Track their loyalty points


b. To check no tampering has been done
c. To spend loyalty points on their desired choices

Key Features:
1) This software engineer project aims to provide a decentralized system which means there
will be only one ownership i.e. USER
2) This project aims to provide advanced high security which can be achieved using
Tomochain, which is a scalable blockchain network.
3) This project can reduce operational costs and will minimize the chances of errors.

4)

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
2 Railway Time Tracking & Prediction System; Assume that the app is intended to build to K3
. fetch details from one end and push it to the user’s end. By using this application, users can
easily track their train along with its timing, running status, and expected time to reach
(user’s desired) station. It’s a web-based application having two modules i.e. admin and
user.

Construct an Applications like these use predictive methods and rail tracking applications
can also be found nowadays on the play store and app store. The app will be designed to
help local commuters and can also be used to use for tracking buses (after applying minor
upgradation).

1) This software engineer project entails an admin system (module) that will fetch all the
required details of the train including train number, timing, etc. and the same will be
passed through the server which can be later tracked by the user.
2) Admin will have permission to add/remove information such as train arrival, expected
arrival/departure, and so on.
3) Software Requirements

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the requirement given
3) Each of the above transactions’ enquiry based on DFD.
4) Testing and implementation on Black Box Testing
3 Suspicious Activity Tracker: Construct a project that will build an automated AI camera K3
. system to track any suspicious activity to prevent any unfortunate incidents in Banks, Malls,
Airports, etc. The activity tracker will use schematics to work on the behavioral patterns and
gestures of a person on the live feed.

If any such activity (fighting, pointing guns, etc.) occurs, an automated alarm will start
ringing and nearby Police will get notified about the incident. This would require training
cameras and deploying ML models, also customized functions can be added for auto-
triggering the message/calls.

Three major components are required for this project, they are:
1) Raspberry Pi 4
2) RPi Camera
3) Speaker or Amplifier
This software engineer project would require an ML model to teach working on normal
modules such as walking, talking, reading, etc. so that the camera can be trained for this
project.
You can use TensorFlow, Lobe, or Edge Impulse to prepare this model and the method can
be aligned with Raspberry Pi to convert the normal camera into a smart one.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Test and implement.
11301 113021104019 CHINTANICA K
17 11311 113021104030 DHIVYA V
11309 113021104028 DHASHWINI M B
K.
BATCH 17 No.
1 Construct a bug tracking system or defect tracking system is a software application that K3
. keeps track of reported software bugs in software development projects. It may be regarded
as a type of issue tracking system.
1) Many bug tracking systems, such as those used by most open-source software projects,

allow end-users to enter bug reports directly.


2) Other systems are used only internally in a company or organization doing software

development.
3) Typically bug tracking systems are integrated with other project management software.

4) A bug tracking system is usually a necessary component of a professional software

development infrastructure, and consistent use of a bug or issue tracking system is


considered one of the "hallmarks of a good software team".
5) A major component of a bug tracking system is a database that records facts about known

bugs.
6) Facts may include the time a bug was reported, its severity, the erroneous program

behavior, and details on how to reproduce the bug; as well as the identity of the person
who reported it and any programmers who may be working on fixing it.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
2 Weather Forecasting: Assume that a project is being divided into two modules, Data K3
. Gathering & Pre-processing, and Prediction Algorithm. This project would be based on
prediction and that’s why data needs to be prepared in a structured way. For this, you can
either be parsing or one-hot encoding. It’s best to implement Scikit-Learn (linear regression)
model to train the datasets and once they’re trained you can provide inputs (temp, pressure,
etc.)

This app is well-capable in predicting 6-7 days (up to) data sets and will fetch weather
details on an hourly basis. It will also offer users to change location and measurements as
per their choices.

Key Features:

1. This project would require Linear Regression to predict the amount of Rainfall (in
inches).
2. This project will take certain parameters to measure weather i.e. temperature,
humidity, wind speed, etc.
3. Software requirement – Jupyter Notebook, Windows/Linux, Python 3, etc.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3 According to the World Health Organization, 12 million deaths occur yearly due to heart K3
. disease. Load of cardiovascular disease is rapidly increasing all over the world in the past
few years. Early detection of cardiac diseases can decrease the mortality rate and overall
complications. However, it is not possible to monitor patients every day in all cases
accurately and consultation with a patient for 24 hours by a doctor is not available since it
requires more patience, time and expertise.

Construct a Heart Failure Prediction System is intended to assist patients in recognizing


their heart state early and receiving treatment at an earlier stage, allowing them to avoid any
serious conditions.
I. We have designed this system using the Machine Learning model to predict the
future possibility of heart disease by implementing the Logistic Regression
algorithm.
II. The framework used in this project is Django.
III. The Front End involves Html, CSS and JavaScript. The Back End involves MySQL
Database. The Back End Language is Python

The user would need to register first to log into the system. For the system to predict if there
is heart failure or not, the user would require to give inputs. The parameters include Age,
Sex, Chest Pain Type, Resting BP, Cholesterol, Fasting BS, Resting ECG, Maximum Heart
Rate, Exercise-induced Agina, Oldpeak, and the slope of the peak exercise ST segment.
After the user provides all these inputs, the system will detect if there is any heart disease.
The chatbot in the system will inform the user about the causes of heart failure, and the
diagnosis test required. It will also provide links to nearby hospitals/clinics that specializes
in heart disease. The user can also check out some free checkup camps.

The admin can log in using their credentials. They can view the users using the system. They
can also add free checkup camp details. We have used Logistic Regression to develop this
system. It is a significant machine learning algorithm because it can provide probabilities
and classify new data using continuous and discrete datasets.

1) The system is easy to maintain.


2) It is user-friendly.
3) Users can search for a doctor’s help at any point in time.
4) Very useful in case of emergency.
5) They can also look for free check-up camps.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
11288 113021104006 ALFRED NAVIN S A
18 11315 113021104034 GNANA SEKAR A
11341 113021104060 MANOJ KUMAR CH
K.
BATCH 18 No.
1 Daily Reminder: Construct a Task reminder app is a useful project to keep track of every K3
. necessary task regularly. In this application, users will be allowed to view all of their tasks in
the form of a list. You can even set custom reminders for any dedicated tasks along with the
Alarm tone so that you never skip any daily/weekly/monthly task.

It’s a simple app that can save a lot of time and can be a useful resource for achieving your
goals. You can start working on this project by carrying below-mentioned prerequisites:

Stroke patients often experience problems of taking medications due to forgetfulness, a


number of medications causing confusion to take, or even the side effects making the
patients refuse to take medications resulting in ineffective treatment. In this study, the
researchers study and develop information technology in the form of Android application in
order to educate and remind the stroke patients to take medications by developing a
prototype system called DCMed. The research finds that the stroke patients in the
experimental group using DCMed system are more interested and complied with taking
medications accounting for 42.86%. Moreover, the patients can take medications more
timely than those in the control group at the significant level of 0.05.

 This task can be built using Android Studio (Java & XML), SQLite, etc.
 Users can add, edit or remove any task along with the date & time
 The user will also be allowed to put notifications on any of the certain tasks

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
2 Fingerprint Voting System: construct a software engineering project that focuses on K3
. building a finger-print EVM (Electronic Voting Machine) that will lead to conducting
successful elections. It’s a solid solution for any small-scale elections and can also be used
within organizations for conducting polls during meetings.

Since, this project runs in electronic mode, the manpower, time, and transportation would be
relieved if this can be planned to introduce on a bigger scale. It would also require Proteus
Design Suite for ARM module operation which will alert when one candidate will try to
vote multiple times.

Key Features:

1. This project would require – 1 Voting System, a Fingerprint module, and an ARM
(Advanced RISC Machine) controller.
2. Paperless User Identification can be conducted after the introduction of fingerprint
EVM which can save lots of time and resources.
3. In this project, both the candidates and the admin can view the results in real-time.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the requirement given
3) Each of the above transactions’ enquiry based on DFD.
4) Testing and implementation on Black Box Testing
3 Emotion-Based Music Player: Assume that the introduction of AER (Audio Emotion K3
. Recognition) and MIR (Music Information Retrieval) has made it possible to build systems
by applying machine learning algorithms. This project entails working on automation to
generate playlists for users.

Where the AER technology will evaluate the audio waves depending on the mood and
emotions of the user, the MIR will follow a pattern to fetch the desired outputs based on the
provided input.

1) The emotion modules included in this project could be sadness, joy-anger, joy-surprise,
joy-excitement, joy, sad-anger, and anger.
2) The accuracy may vary between 80% -90% for detecting real-time images.
3) This software engineering project can revolve around three pillars i.e. Audio Feature
Extraction Module, Emotion-Audio Recognition Module, and Emotion Extraction
Module.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
11339 113021104058 MANCY AROKIYA MARY V
19 11306 113021104024 DEEPIKA M
11309 113021104028 DHASWINI M B
K.
BATCH 19 No.
1 Construct a bug tracking system or defect tracking system is a software application that K3
. keeps track of reported software bugs in software development projects. It may be regarded
as a type of issue tracking system.
1) Many bug tracking systems, such as those used by most open-source software projects,

allow end-users to enter bug reports directly.


2) Other systems are used only internally in a company or organization doing software

development.
3) Typically bug tracking systems are integrated with other project management software.

4) A bug tracking system is usually a necessary component of a professional software

development infrastructure, and consistent use of a bug or issue tracking system is


considered one of the "hallmarks of a good software team".
5) A major component of a bug tracking system is a database that records facts about known

bugs.
6) Facts may include the time a bug was reported, its severity, the erroneous program

behavior, and details on how to reproduce the bug; as well as the identity of the person
who reported it and any programmers who may be working on fixing it.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
2 Weather Forecasting:Assume that a project is being divided into two modules, Data K3
. Gathering & Pre-processing, and Prediction Algorithm. This project would be based on
prediction and that’s why data needs to be prepared in a structured way. For this, you can
either be parsing or one-hot encoding. It’s best to implement Scikit-Learn (linear regression)
model to train the datasets and once they’re trained you can provide inputs (temp, pressure,
etc.)

This app is well-capable in predicting 6-7 days (up to) data sets and will fetch weather
details on an hourly basis. It will also offer users to change location and measurements as
per their choices.

Key Features:

1. This project would require Linear Regression to predict the amount of Rainfall (in
inches).
2. This project will take certain parameters to measure weather i.e. temperature,
humidity, wind speed, etc.
3. Software requirement – Jupyter Notebook, Windows/Linux, Python 3, etc.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3 According to the World Health Organization, 12 million deaths occur yearly due to heart K3
. disease. Load of cardiovascular disease is rapidly increasing all over the world in the past
few years. Early detection of cardiac diseases can decrease the mortality rate and overall
complications. However, it is not possible to monitor patients every day in all cases
accurately and consultation with a patient for 24 hours by a doctor is not available since it
requires more patience, time and expertise.

Construct a Heart Failure Prediction System is intended to assist patients in recognizing


their heart state early and receiving treatment at an earlier stage, allowing them to avoid any
serious conditions.
I. We have designed this system using the Machine Learning model to predict the
future possibility of heart disease by implementing the Logistic Regression
algorithm.
II. The framework used in this project is Django.
III. The Front End involves Html, CSS and JavaScript. The Back End involves MySQL
Database. The Back End Language is Python

The user would need to register first to log into the system. For the system to predict if there
is heart failure or not, the user would require to give inputs. The parameters include Age,
Sex, Chest Pain Type, Resting BP, Cholesterol, Fasting BS, Resting ECG, Maximum Heart
Rate, Exercise-induced Agina, Oldpeak, and the slope of the peak exercise ST segment.
After the user provides all these inputs, the system will detect if there is any heart disease.
The chatbot in the system will inform the user about the causes of heart failure, and the
diagnosis test required. It will also provide links to nearby hospitals/clinics that specializes
in heart disease. The user can also check out some free checkup camps.

The admin can log in using their credentials. They can view the users using the system. They
can also add free checkup camp details. We have used Logistic Regression to develop this
system. It is a significant machine learning algorithm because it can provide probabilities
and classify new data using continuous and discrete datasets.

1) The system is easy to maintain.


2) It is user-friendly.
3) Users can search for a doctor’s help at any point in time.
4) Very useful in case of emergency.
5) They can also look for free check-up camps.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.
11312 113021104031 DINESH R
11342 113021104061 MATHEESWARAN M
20
11391 113021104109 SUKUMAR K
11325 113021104044 JEEVA VIGNESH R
K.
BATCH 20 No.
1 Android Local Geofence System: Construct a Geo-fencing uses the global positioning K3
. system (GPS) or radio frequency identification (RFID) to define geographical boundaries. A
geofence can be considered a virtual boundary. A network-based geo-fencing will be used
by the system.

The goal of the application is to use the properties of the geofencing system to detect
whether the user has entered a particular area by keeping track of his location. Once the user
entered the geofenced area he will be provided with news notifications within that area. This
helps the user to rectify the hurdles coming into his routine activities. For example, if a user
enters a geo-fenced area where there is an accident and traffic jam due to the accident he
may opt for the alternate route. This app can be used in places where cameras or
microphones are not allowed. In this way, you’ll be able to carry your mobile phones, but
the camera and microphone will automatically be disabled whenever you enter that
particular area.

1) The application is used to track a person’s location using their smartphone. The
smartphone should have a GPS-enabled device for real-time tracking.

2) On opening the application, users need to set a geo-fence around them by selecting a
point on the map. A User can also update the geo fence around them whenever required.

3) Smartphones will start monitoring the fence which is set by the user. Whenever the user
exists or enters the fence, a notification will be received on the application and the
Camera and Microphone will be disabled.

4) This app can be used in places like museums, where cameras or microphones are not
allowed. In this way, you’ll be able to carry your mobile phones, but the camera and
microphone will automatically be disabled whenever you enter that particular area.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the requirement given
3) Each of the above transactions’ enquiry based on Data Flow Diagram.
4) Testing and implementation on Black Box Testing
2 Android Based Image Steganography: Maintaining confidentiality is an important and K3
. inevitable aspect of cyberspace. Here comes the importance of information hiding.
Steganography is the concept of concealing a secret file within another nonsecret and
normal-looking file. The word steganography originated from the Greek term
“Steganographia”, which integrates the words “steganos” which means “covered or
concealed”, and “graphia” which means “writing”. Steganography is really a useful concept
for maintaining the security principles like confidentiality and authentication.

Our Android-Based Image Steganography is a simple android system that implements the
steganography concept. In this project, image steganography is used so that a text message
can be hidden securely in an image. The system is good at effective information hiding and
secret communication while maintaining Confidentiality and Authentication.

Our Android-Based Image Steganography comprises 1 module: User.


The user will have the access to encode as well as decode secret messages. The user would
require to register first to log in. After registering successfully, the user can log into the
system. The user can add a process to the process list by uploading the image, entering the
text message, choosing the encryption type and entering the key. Two encryption types are
being used here – AES (Advanced Encryption Standard) and DES (Data Encryption
Standard). The user can also delete any process if they want. They can share the process ID
or the encrypted image with other users.

There are two methods of decoding shared messages. If a process is being shared, the user
would require to enter the process ID and its key. If an image is being shared, the user would
require to upload the image and enter its key.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the requirement given
3) Each of the above transactions’ enquiry based on DFD.
4) Testing and implementation on Black Box Testing
3 Android Grocery Management App: With increased responsibility, it has become difficult for K3
. people to keep track of the number and quantity of groceries available. Thus, a poor grocery
management system leads to the problem of not having enough groceries when required. In this fast
world, remembering the groceries in the kitchen is really a tough job for people who are involved in
jobs away from home. A smart grocery management system is in demand to keep track of the
availability of grocery items in the kitchens at home.

We have designed an Android Grocery Management App to tackle the above-mentioned problem.
Our project will help to keep track of the grocery available. It can be applied anywhere where an
efficient management system is required, like homes, stores, restaurants, etc. To enhance the user
experience, we have also added a recipe feature which will help the user to make interesting and
delicious food items with the available grocery in the inventory.

The system comprises 1 module: User.


The user would require to register first to log in. After registering successfully, the user can log in
using their credentials. If the user forgets their password, the system will send the existing password
to their email. The user will have the access to add, update and view items in their inventory.

The system will even suggest recipes to the user based on the items available in their inventory. The
system will show the recipes by searching 60% of ingredients that matches the items in the
inventory. In the recipe ingredients, the system will also show how much quantity is required and
how much quantity of ingredients is available.

The user can view the list of all the recipes included by them as well as the others. While adding
ingredients to the recipe, they can either choose from the items already available in the inventory or
add a new one. They can also edit and delete any recipes they have added.

The user can scan the barcode of any item, if that item is available in the inventory, they can update
it or else the system will ask them to add it to the list. In the Shopping list, the user can manage the
items they want to shop for in their inventory.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown.
4) Test and implement.
4 Construct a bug tracking system or defect tracking system is a software application that K3
. keeps track of reported software bugs in software development projects. It may be regarded
as a type of issue tracking system.
1) Many bug tracking systems, such as those used by most open-source software projects,

allow end-users to enter bug reports directly.


2) Other systems are used only internally in a company or organization doing software

development.
3) Typically bug tracking systems are integrated with other project management software.

4) A bug tracking system is usually a necessary component of a professional software

development infrastructure, and consistent use of a bug or issue tracking system is


considered one of the "hallmarks of a good software team".
5) A major component of a bug tracking system is a database that records facts about known

bugs.
6) Facts may include the time a bug was reported, its severity, the erroneous program

behavior, and details on how to reproduce the bug; as well as the identity of the person
who reported it and any programmers who may be working on fixing it.

Note:
1) Explanation from the given Question
2) Steps involved in carrying out the process
3) Each of the above discussion must be shown in Data Flow Diagram.
4) Apply in Smoke testing Strategy
5) Implementation method has to be carried out.

You might also like