Ilovepdf Merged
Ilovepdf Merged
Jan-April 2024
BOOKWORM
Jan-April 2024
Report Approval
Internal Examiner
Name:
Designation
Affiliation
External Examiner
Name: Designation
Affiliation
1
Declaration
I/We hereby declare that the project entitled “Bookworm” submitted in partial
fulfillment for the award of the degree of Bachelor of Technology/Master of
Computer Applications in ‘Computer science and engineering completed under
the completed under the supervision of Er. Arpit Deo , Faculty of Engineering,
Medi-Caps University Indore is an authentic work.
Further, I/we declare that the content of this Project work, in full or in parts, have
neither been taken from any other source nor have been submitted to any other
Institute or University for the award of any degree or diploma.
2
Certificate
I/We, Ms. Garima S. Tukra certify that the project entitled “Drowsiness Detection
system” submitted in partial fulfillment for the award of the degree of Bachelor
of
EN20CS301317 is the record carried out by him/them under my/our guidance and
that the work has not formed the basis of award of any other degree elsewhere.
3
Acknowledgements
It is their help and support, due to which we became able to complete the design and
technical report.
Without their support this report would not have been possible.
Priyanka Sharma
EN20CS301317
B.Tech. IV Year
Department of Computer Science &
EngineeringFaculty of Engineering
Medi-Caps University, Indore
4
Table of Contents
S. Chapter name Page
N. No.
Report Approval i
Declaration ii
Certificate iii
Acknowledgement iv
Table of Contents v
List of figures vi
List of tables vii
1 Introduction 1-5
1.1 Purpose 1
1.2 Scope 2
3.4 SequenceDiagram
3.5 Class Diagram 12
4 Design 14
4.1 Architectural Design
5
5.2 Features of language and database used for the project 21
5.3 Description of third-party tools used 22
6 Conclusion 22
7 Reference 22
6
List of Figures
Figure 1.1 Effects of Drowsy Driving 3
Figure 1.2 Road accidents caused by sleepy drivers 4
Figure 5.1 Growth of Machine Learning in World Wide Use Cases 15
Figure 5.2 Features of TensorFlow 17
Figure 7.1 Part 1 Source code of our model.py file 23
Figure 7.2 Part 2 Source code of our model.py file 23
Figure 7.3 Part 1 code of our drowsiness.py file 24
Figure 7.4 Part 1 code of our drowsiness.py file 24
Figure 7.5 Part 1 code of our drowsiness.py file 25
7
List of Tables
Table 2.1 Common methods of evaluating drowsiness 6
8
1: INTRODUCTION
BACKGROUND:
“The automobile population is growing exponentially in our country. The biggest
problem with increasing vehicle use is the increase in traffic accidents. Road
accidents are undoubtedly a global threat to our country”. “The frequency of road
accidents in India is one of the highest in the world. The National Crime Records
Bureau (NCRB) reports that about 135,000 people die each year in road accidents in
India. The Global Status Report on Road Safety, published by the World Health
Organization (WHO), identifies driver mistakes and carelessness as the main causesof
traffic accidents. Drowsiness, alcoholism, and driver negligence are the main causes
of accident scenarios”.
Mortality, associated costs and associated risks are considered serious threats to the
country. “All these factors have led to the development of Intelligent Transportation
Systems (ITS). The ITS includes driver assistance systems such as adaptive cruise
control, a parking assist system, a pedestrian detection system, smart headlights and a
blind spot detection system. Considering these factors, the driver's condition is a
major challenge in developing advanced driver assistance systems”.
Driver mistakes and carelessness make a contribution maximum of the street injuries
going on nowadays. “The most important motive force mistakes are resulting from
drowsiness, drunken and reckless conduct of the motive force. The resulted mistakes
and errors make a contribution plenty loss to the humanity. In order to decrease the
consequences of motive force abnormalities, a device for abnormality tracking must
be built in with the vehicle. The actual time detection of those behaviors is a critical
trouble concerning the layout of superior protection structures in automobiles”. This
assignment specializes in a motive force abnormality detection device in ITS on-
automobile domain.
1
Improving public safety and reducing accidents are key goals of Intelligent Transport
Systems (ITS). One of the biggest factors in accidents, especially on baredirt roads, is
driver fatigue and monotony. “Fatigue reduces the driver's perception and decision-
making ability. Research shows that drivers are often tired after 1 hourof driving. In
the early afternoon, after lunch and midnight, drivers are often much more tired and
sleepy than at other times”.
The driver face monitoring system is a real-time system that studies the physical and
mental state of the driver based on the image processing of the driver's face. “The
driver's state can be estimated from eye closure, eyelid distance, blinking, gaze
direction, yawning and head turning.
In driver-facing monitoring systems, two main challenges can be considered: "How to
measure fatigue?" and "how to measure concentration?". These problems are themain
challenge of a monitoring system faced by the driver”.
Admittedly, because of the lack of an exact definition of fatigue, there are no
criteriaor measurement tools. However, the exact definition of fatigue is unknown,
“but there is a link between fatigue and a number of symptoms, including body
temperature, skin resistance, eye movements, breathing rate, heart rate and brain
activity [2, 3, 7, no. 8]. One of the first and most important symptoms of fatigue
appears in the eyes”. There is a very close relationship between psychomotor
vigilance task (PVT) and percentage of eyelids closed over time (PERCLOS).
PVTindicates a person's rate of response to a visual stimulus.
2
3
EFFECT OF DROWSY DRIVING:
Drowsy driving, “also known as driver fatigue or tired driving, is the act of drivingor
operating a motor vehicle while tired and feeling fatigued or sleepy”. “Job stress or
interrupted nights with young children are common reasons to be short on sleep.
However, other factors can contribute to drowsy driving, such as a medication youare
taking or an untreated sleep disorder that leaves you depleted and unable to
stayawake during the day”.
“Late-night and third-shift workers are particularly affected by the natural release of
melatonin associated with dark hours as they journey home after a long shift.
4
The main effects of drowsy driving are inability to concentrate, slow reaction times,
poor judgment, inability to judge distance and speed and of course dozing”.
o
“The effects of drowsy driving are more serious than most people realize.
When you stay awake for more than 18 hours”, “the effects on the body are
the same as if you have a blood alcohol level of 0.05%. According to the
CDC, after 24 hours of sobriety, the blood alcohol level is 0.10%,
wellabove the legal limit in all states. With a legal blood alcohol
concentration(BAC) limit of 0.08%, drowsy driving is similar to driving
while intoxicated”.
o
“Certain groups are especially susceptible to drowsy driving, including
teenagers and young men in their 20s and 30s, who tend to be drowsy
while driving at night”. Drowsy-driving crashes in this group most
commonly occur between “11 p.m. and 5 a.m. and 8 am”.
o
“Older adults are another group that are more likely to be involved in a
drowsy driving accident, with older adults having more accidents in the
mid-afternoon”.
MOTIVATION:
o
Drowsy driving is an important factor in the increasing number of
accidents on today's roads and is widely accepted.
o
Road accidents caused by sleepy drivers: “Update of a Norwegian survey
5
Setting to distinguish when a driver is drowsy and trigger an alarm is an important
guide to accident prevention. A conceivable procedure for differentiating driver
drowsiness in general can be separated into related classifications: detection of
physiological qualities, detection of driver activity. vehicle response, observe the
driver's reaction. Driver fatigue is a notable factor in a large number of vehicle
accidents. Current information indicates that 1,200 deaths and 76,000 injuries per
year can be attributed to burnout-related accidents. Progress in identifying or
preventing driver-seat drowsiness is a significant challenge in the field of crash
avoidance frames. Because the risk of somnolence is present, strategies must be
devised to balance its effects”.
OBJECTIVE:
For this Python project, we are going to create a sleep detection system. Countless
people travel day and night on the highway. Taxi drivers, bus drivers, truck
driversand long-distance commuters suffer from insomnia. Therefore, driving while
drowsy becomes very dangerous.
“The majority of accidents happen because the driver falls asleep. So, to avoid these
accidents, we will build a system using Python, OpenCV and Keras to warn the driver
when he feels drowsy”.
6
CHAPTER 2: LITERATURE REVIEW/SURVEY
The general definition of a driver anomaly is: “Driver anomalies represent less
attention to activities that are essential for safe driving in the absence of competing
activities,Driving behavior detection is a hot topic in ITS. In the area of driving
monitoring and anomaly detection systems, some work is done using different
techniques. Possible techniques for detecting driver drowsiness can be divided into
physiological characteristics, driver operation, vehicle response, And detection of
driver reaction. Of these methods, the most accurate and accurate method is based on
human physiological phenomena. This technique can be implemented in a variety of
ways. B. Measure brain waves (EEG), heart rate (ECG), and eye open / closed
status”. The accuracy of the first two methods is impractical because the
measurement electrodes must be attached directly to the driver's body, which can
interfere with or distract the driver.
The technique based on closing the eyes is well suited to real driving conditions, as
“it can be non-intrusive using the camera to detect the open/closed state of the eyes”.
The eye-tracking-based drowsiness detection system is realized by analyzing the time
when eyes are closed with the camera and developing an algorithm to detect the
driver's drowsiness in advance and warn the driver through the systems.
7
1 Based on By using brain “It is
physiologic waves,drowsiness not
al can be realisti
c,
because to get
8
measures efficiently and these signs,
(particularly accuratelydetected. electrodes
EEG) should be
attached to
thebody,
which is
unpleasant
or annoying
for
driver”.
2 Based on vehicle- Lane tracking, vehicle “Having
based measures steering wheel changes, the restrictions
(vehicle number of lane crossings, against some
performance) the distance from the front changes,
can be used in detecting including
number of lane
crossings, and
the distance
from the
vehicle
type, driver
experience,
road
topology, road
front can be
used in
detecting
quality, and
ambient light
9
and on the
other
hand the
processing of
these methods
require a
considerable
time to analyze
the driver
10
behaviors
thatcause to
not
recognize of
micro-sleep”.
3 Based on In drowsiness, sensible en “Sudden
behavioral
measures (image in appearance and the changes in
head,
11
PROBLEMS ENCOUNTERED DURING RESEARCH:
o
While looking for any existing system, we encountered some problems,
and we’ve listed them down below
To train model “we have to work on huge data so algorithms are
very complex and too much time consuming”.
There is many complex algo used by people “while creating this typeof
detection system”.
Drowsy driving is an important issue in the context of traffic safety. Several methods
have been developed to reduce the risk of drowsy driving. The mechanisms for
detecting driver fatigue and drowsiness have been classified into three main
approaches, including vehicle-based, physiological-based, and behavioral-based
approaches.
Subject diversity Subject diversity was lacking among subjects in areas such as
ethnicity, age, gender and brand media compared with non-participants. Ethnic
differences can affect the accuracy of behavior-based models, with most pdhais using
a single ethnic group; however, another problem exists when ethnicity is often not
reported in pdhai. Research has shown that classifiers often reduce the accuracy of
darker skin tones, especially for women, as models often don't receive extensive
training.
Data loss can occur during recording because sensors can become detached, weather
can interfere with vehicle-based recording, or changes in lighting can affect
recording. behavior recorder.When using an adaptive association model or a model
with multiple sources of sleepiness, data loss does not necessarily mean that sleep
tracking will stop. One study explored this, with a system that continues to function
when the source signal is lost and can continue to monitor sleepiness [152]. Data loss
can happen at any time during monitoring; therefore, the system must continue to
function if this occurs.
12
CHAPTER 3: FEASIBILITY STUDY
FINANCIAL FEASIBILITY:
o
No hosting cost will be incurred because we'll be using Heroku and
Flask to host the web app
TECHNICAL FEASIBILITY:
o
Main technologies used for the project are
OpenCV
Keras
TensorFlow
Pygame
Machine Learning
Deep Learning
Convolutional Neural Networks (CNN)
o
Each of the technologies are freely available and technical skills are
manageable
RESOURCES FEASIBILITY:
o
Resources required for the project are
Programming Device (Laptop)
Hosting Space (Freely available)
Programming Tools (Freely available)
Programming individuals
13
CHAPTER 4: REQUIREMENTS
HARDWARE REQUIREMENTS:
o
Processor: Minimum 1 GHz; Recommended 2GHz or more
o
Ethernet connection (LAN) OR a wireless adapter (Wi-Fi)
o
Memory (RAM): Minimum 1 GB; Recommended 4 GB or above
SOFTWARE REQUIREMENTS:
o
An operating system of your choice
o
Any modern web browser like Chrome, Firefox, etc.
14
CHAPTER 5: PROPOSED METHODOLOGY
“The final layer is likewise a totally related layer with 2 nodes”. A Relu activation
function is used in all layers except the output layer where we used SoftMax.
Process 1 – Through Camera Image as Input Taken
The input will be taken from web cam. So, “to access the webcam we made an
infinite loop that will record every frame. We use the technique provided thru
OpenCV, cv2.VideoCapture(0) to get right of entry to the virtual digital camera
andset the capture object (cap). cap. study () will study everybody and we can shop
the photograph in a body variable”.
15
16
the detection using face = face. DetectMultiScale (gray). It returns a detection array
with the x, y coordinates and the height and width of the element boundary
container”.
“cv2.rectangle(frame, (x, y), (x + w, y + h), (100,100,100), 1)”
17
Process 5 – In Final Process Score is Calculated and through that we
18
Detect Person is Drowsy or Not
19
The rating is essentially a fee that “we can use to decide how lengthy the
individualhas closed their eyes. So if we near each eyes we can hold to boom our
rating andwhile we open our eyes we can lower our rating. We plot the effects on the
show display using the cv2.putText() function, which displays the individual's real-
time status. cv2.put(frame, "Open", (10, height20), font, 1, (255,255,255), 1,
cv2.LINE_AA)”
A threshold is described as an example “if the rating is better than 15, it way that the
individual has closed their eyes for a lengthy time. This is while we sound thealarm.
player ()”.
CONCEPTS INVOLVED:
➢
MACHINE LEARNING
Machine mastering is a subfield of synthetic intelligence (AI). The purposeof
that records into fashions that may be understood and used by people.
popularity era permits “social media structures to assist customers tag and
percentage pix of friends. Optical individual popularity (OCR) era converts
pictures of textual content into movable type. Recommendation engines,
powered through device learning, endorse what films or tv suggests to observe
subsequent primarily based totally on person preferences”.
20
Self-riding motors that depend on system studying to navigate may also
field. Because of this, there are a few issues to preserve in thoughtsas you
21
➢
KERAS:
“Keras is a deep gaining knowledge of API written in Python, walking on
easy workflows have to be short and easy, at the same time as arbitrarily
superior workflows have to be feasible through a clean route thatbuilds upon
what you've got already learned”.
Powerful – “Keras offers industry-electricity overall performance and
scalability: it's far utilized by businesses and corporations along with NASA,
YouTube, or Waymo”.
➢
TENSORFLOW:
“TensorFlow is an open-supply library evolved through Google normally for
open-sourced it”.
edges. “As the execution mechanism is withinside the shape of graphs, it's far
22
a good deal less complicated to execute TensorFlow code in a
23
disbursed way throughout a cluster of computer systems whilst the use of
GPUs”.
FEATURES OF TENSORFLOW:
TensorFlow provides both C++ and Python APIs: “Before libraries were
developed, the coding mechanism for machine learning and deep learning was
much more complex. This library provides a high-level API and does not
require writing complex code for neural network preparation, neural
configuration, or neural programming. The library accomplishes all these
tasks. TensorFlow also has integration with Java and R”.
TensorFlow supports both CPU and GPU computing devices: “Deep
24
25
CPUs. It also has faster compile times than other deep learning libraries,
like Keras and Torch”.
with support for the Keras API and data input pipelines. “Keras provides
easy prototyping and is best suited for object-oriented neural networks.
TensorFlow facilitates machine learning using these features. It allows
usersto create and manipulate the system to generate different types of
models inreal time”.
etc. se training using the same models and different datasets. It also allows
synchronous and asynchronous input and learning techniques. The graphical
approach ensures distributed execution parallelism”.
Correcting: - “It allows you to reflect each node, i.e. individual activity in
relation to its rating. Tensor Board works with graphs to visualize how it
works using its dashboard. It provides graphical computation methods that
support an easy-to-implement model”.
TensorFlow has its own hardware designed to train neural models calledCloud
TPU (TensorFlow Processing Unit).
26
CHAPTER 6: SOFTWARES USED
JUPYTER NOTEBOOK
It is a web interface that allows rapid prototyping and sharing of data-related projects.
It works with many kernels (this is the name given to the code environmentin which it
can run) including but not limited to Python and R (although it is more well-known
and suitable for Python). It was formerly known as IPython Notebook, but it was
renamed and moved to the Jupyter project. Jupyter is an open-source project that aims
to create a better working experience for (data) scientists.
Unique features:
Supports all imports and exports
Great for sharing and collaborative work
Supports variety of data types within the same window such as text, code,
graphs, videos, pictures
Great for Visualizations
the presentation directly from your notebook. One such extension is “RISE”.
editbuilddebug cycle means less time messing with your environment and
more time implementing your ideas. Essentially, Visual Studio Code has a
lightning-fast source code editor that's perfect for everyday use. Withsupport
for hundreds of languages, VS Code helps you get productive in no time with
syntax highlighting, bracket matching, auto-indent, check boxes,
27
28
snippets, and more. Intuitive, easily customizable hotkeys, and community-
contributed hotkey mapping let you easily navigate your code”.
KAGGLE
Kaggle is an Airbnb for data scientists where they spend nights and weekends.
are purely for educational purposes and fun brain exercises, others are real
problems companies are trying to solve. Kaggle makes the environment
competitive by giving prizes and leaderboards to winners and participants.
Prizes are not just money, but can also include attractive rewards such as free
jobs or products from the company running the contest. Monetary prizes are
interesting to most Kagglers. For example, Home Depot has offered a $40,000
prize to research an algorithm that improves search results on
homedepot.com. For most data science enthusiasts, this innovative website is
not only a monetary resource, but it is also an indispensable learning tool to
enhance experience, accumulate knowledge. knowledge, sharpen and improve
skills, and learn from mistakes by resending code. It's the perfect foundation
to practice consistently”.
29
CHAPTER 7: PROCESS FLOW AND IMPLEMENTATION
o
DATA PRE-PROCESSING:
Collecting data is one thing, and making it useful is another. “Data
collected from a variety of media will be in an unorganized format and
may contain many nulls, invalid data values, and unexpected data.
Cleaning all this data and replacing it with appropriate or approximate
data, removing blank and missing data, and replacing it with fixed
replacement values are the basic steps of data preprocessing. Even
collected data can contain completely useless values. It may not be in
the correct format or the way it should be. All of these cases need to be
checked and replaced with surrogate values for the data to be
meaningful and useful for further processing. Data should be kept in
an organized format”.
30
31
o
APPLICATION OF ALGORITHMS:
The next step is to apply algorithms to the data and record and observe
the results. “Algorithms are applied as mentioned in the diagram to
improve accuracy at each step”.
o
TRAINING AND TESTING:
“Finally, after data processing and training, the next task is obviously
testing. This is where algorithm performance, data quality, and
required outputs are displayed. From the huge data set collected, 80%
of the data is used for training and 20% of the data is used for testing.
Training, as we saw earlier, is for the machine to learn and give it the
ability to make deeper predictions based on the training it has
performed. Whereas, test means there is a predefineddata set with the
output also labeled before and the model is tested whether it performs
well and gives correct prediction. If the maximum number of
predictions is correct, the model will have a good and reliable
percentage of accuracy to continue, if not, it is better to change the
prototype”.
o
SOURCE CODE:
MAIN FILE CODE: Our main file code name is model.py and
drowsiness.py which contain code which work when image of a frame
is extracted from live feed from camera and our model will predict
score based on eyes open or close.
32
Fig. 7.1 Part 1 Source code of our model.py file
33
Fig. 7.3 Part 1 code of drowsiness.py file
34
Fig. 7.5 Part 3 code of drowsiness.py file
35
CHAPTER 8 :CONCLUSION
Research Statement:
This research aims to advance the understanding and effectiveness of driver drowsiness
detection technologies. Investigating the limitations, individual variability, and
environmental factors, the study seeks to propose innovative solutions for accurate and
reliable drowsiness detection, contributing to the improvement of road safety and the
development of future driver-assistance systems.
Implications:
The implications of driver drowsiness detection are profound, influencing both
individualsafety and broader societal concerns. By alerting drivers to potential fatigue,
these systems have the capacity to prevent accidents and save lives. However, false
positives and negatives pose challenges, impacting user trust and system effectiveness.
Moreover, the ethical handling of personal data raises privacy concerns. Implementing
these technologies on a larger scale requires collaboration with healthcare
professionals,adherence to global standards, and ongoing research to enhance accuracy.
Despite these challenges, the potential reduction in road accidents underscores the
transformative impact of drowsiness detection on overall road safety.
Limitations:
False Positives and Negatives:
False Negatives: On the other hand, the system may fail to detect actual drowsiness in
some cases, especially if the driver exhibits subtle signs or if the system's algorithms
arenot sensitive enough.
Individual Variability:
Drowsiness detection systems may not account for the significant individual variability
in how people express drowsiness. Some drivers may exhibit unique patterns of
behavioror physiological changes that the system may not accurately interpret.
Cost and Accessibility:
High costs associated with advanced drowsiness detection technologies may limit their
widespread adoption, particularly in older vehicles or in regions with limited resources.
This could create disparities in road safety features across different demographics.
26
Suggest Future Research:
Future applications for the Raspberry Pi 3 could include an infrared camera, speaker,
microphone, and several sensors to help prevent accidents brought on by drivers'
vertigo.In the future, we can also construct a system that is connected to a smartphone
app to monitor the reaction rate in real time. Additionally, the use of driverless cars by
numerousautomakers has reduced accidents at an exponential rate. India has more roads
and trafficthan any other country, therefore it will take time for driverless cars to be
used here.
Innovative Sensor Technologies: The future of driver drowsiness detection lies in the
development of advanced sensor technologies. Miniaturized and non-intrusive sensors
embedded within steering wheels, seats, and dashboards could continuously monitor
physiological indicators such as heart rate variability, eye movement patterns, and
facial expressions. These sensors would provide a more comprehensive and real-time
assessment of a driver's condition.
AI/ML Integration: AI and machine learning (ML) will play a pivotal role in the
evolution of drowsiness detection systems. Advanced algorithms will be capable of
learning individual driver patterns and adapting to various driving conditions. The
integration of deep learning models could enhance the accuracy of drowsiness
prediction by analyzing complex datasets, including biometric information, driving
behavior, and environmental factors.
27
1
BOOKWORM
ACKNOWLEDGEMENT
I started this project as a part of my course minor project. It gives me great pleasure to
present the report of this project work conducted towards the fulfillment of the project
titled “BOOK WORM”
I take this opportunity to thank those who have made the efforts in success of the
project. I extend my special gratitude towards Dr. PS Chouhan Director of SD
Bansal College Indore, Ms. Shraddha Kumar Head of the Department of Computer
Science and lecturer Prof. Manisha Kadam who has been a constant source of
motivation, encouragement, and guidance that has gone a long way in helping the
completion of this project. I express my warm wishes to the entire staff members for
their assistance and kind guidance who helped me out of all my queries. I also heartily
thankful to all my friends and “Live Life” for providing me all the useful requirements
that were needed by me for the completion of project.
CERTIFICATE
work, titled “BOOKWORM” as per the syllabus and have submitted a satisfactory
report on this project as a part of fulfillment towards the degree of “BOOK WORM”
VISHWAVIDHYALAYA, BHOPAL.
DIRECTOR
5
CERTIFICATE
work, titled “BOOK WORM(A Full Stack Website)” as per the syllabus and have
BHOPAL.
TABLE OF CONTENTS
ABSTRACT i
1. Introduction 1
1.1. Purpose 1
1.2. Scope 2
1.3. Problem in existing system 2
1.4. Statement of Problem 3
2.1 Introduction
2.1.1 Purpose
2.1.2 Document Conventions
2.1.3 Intended Audience and Reading Suggestions
2.1.4 Product Scope
2.1.5 References of SRS
3. Analysis 19
4. Design 23
4.1 Architectural Design
4.1.1. System Architecture Diagram
4.1.2. Description Of Architectural Design
4.2 Database Design
4.2.1. Normalization
4.3 Interface Design
4.3.1. Screenshots
5. Implementation 26
6. Conclusion 28
7. Reference 29
8
ABSTRACT
Sellers, acting as vendors, are empowered to add books to the platform but are
required to submit a request for seller status, subject to approval, denial, or rejection
by the admin. The admin possesses comprehensive database access via a user
interface, allowing oversight of registered user details, seller requests, and available
books.
Sellers have complete control over their listings, including the ability to add, delete,
and manage their books. Buyers enjoy full purchasing capabilities, including adding
items to their cart, creating wishlists, and utilizing a seamless checkout process
facilitated by the Razorpay API. Dynamic counting functionality enables real-time
updates to the total cost of items in the cart.
Additionally, a wishlist feature allows users to save desired items for future purchase.
The order summary page provides a comprehensive overview of past purchases,
organized in stack form, with each order capable of containing multiple books.
Security measures are robust, with JWT token implementation safeguarding against
unauthorized access. Unauthenticated users are restricted to read-only access, unable
to utilize cart, wishlist, or checkout functionalities. URL navigation security further
fortifies the platform, ensuring that unauthorized access to private pages, such as the
admin or seller dashboard, is prevented.
Introduction
On the seller side, we aim to streamline the management of online storefronts. Sellers
are equipped with intuitive tools to efficiently manage inventory, process orders, and
track sales. With "Book Worm," sellers can focus on sharing their passion for books
without being bogged down by complexities. Join us as we redefine the online book-
buying and selling experience. Welcome to "Book Worm"—where every page holds a
new adventure, and every reader finds their story.
1.2 Scope
The scope of the book worm e-commerce website project encompasses the
development of a user-friendly online platform aimed at facilitating book buying and
selling for all users. This includes designing and implementing an intuitive user
interface (UI) with features such as personalized book recommendations, advanced
search functionalities, and seamless checkout processes, ensuring ease of use for both
buyers and sellers. Additionally, the project involves developing robust backend
systems to support essential functions like user authentication, inventory
management, order processing, and payment integration, while prioritizing optimal
performance and scalability. Security measures will be implemented to safeguard user
data and transactions, adhering to relevant regulations. Out of scope items include
physical shipment logistics, extensive third-party integrations, and device
customization. The project scope remains adaptable to accommodate stakeholder
feedback and evolving business needs.
10
Functional requirements: Users can register securely with email/password and log in.
The e-commerce book store's Software Requirements Specification (SRS) outlines
functionalities: Buyers can browse, purchase, and review books; sellers manage
listings, inventory, orders, and customer inquiries; administrators oversee user
management, seller activities, order processing, analytics, and website configuration
Non-functional requirements: These describe how well the system should perform its
functions. For example, The bookworm platform should be compatible with major
web browsers (Chrome, Firefox, Safari) for seamless accessibility.
User requirements: These describe the system's functionality from the user's
perspective. For example, the system should be easy to use, with clear instructions and
feedback for the user.
11
System architecture: This describes the overall structure of the system, including the
hardware and software components, and how they interact with each other.
Assumptions and constraints: These are the assumptions made during the
development of the system and the constraints that must be taken into account.
2. Product Catalogue:
Enable users to add books to their shopping carts for later purchase.
Implement a smooth and intuitive checkout process with multiple
payment options.
Calculate shipping costs and taxes dynamically based on user location
and purchase details.
Provide order summary and confirmation before finalizing the purchase.
4. Order Management:
Allow users to view their order history, track shipments, and manage returns.
Provide notifications for order status updates, shipping confirmations, and
delivery estimates.
Enable administrators to manage orders, process payments, and
handle customer inquiries.
5. Recommendation Engine:
The book worm caters to three main user classes: buyers, sellers, and administrators.
Buyers browse, purchase, and review books, while sellers manage listings, inventory,
and orders. Administrators oversee user management, order processing, and website
configuration. The store's characteristics include a diverse product range, user-friendly
interface, secure transactions, responsive customer support, dynamic inventory
management, and engaging content and promotions, ensuring a seamless and
satisfying shopping experience for all users.
The operating environment for a face recognition attendance system includes the
hardware, software, and network infrastructure required to operate the system
effectively. The system should be compatible with a range of hardware devices, such
as cameras and mobile devices, and should be able to function in various lighting
conditions.
The software environment should support the system's operating system and
programming languages. It should be scalable to handle a large volume of images and
data and should be capable of integrating with other software applications, such as HR
and payroll systems.
The network infrastructure should provide sufficient bandwidth to support the transfer
of image data and ensure that data is secure during transmission. Additionally, the
system should have appropriate cybersecurity measures, such as encryption and multi-
factor authentication, to protect employee data and prevent unauthorized access.
The book worm’s user interface (UI) presents an intuitive and visually appealing
platform that facilitates seamless navigation for users. Featuring a clean design, the UI
offers easy access to book categories, search functionalities, and personalized
recommendations. It incorporates interactive elements such as book previews,
reviews, and ratings to aid users in their purchasing decisions. With a responsive
layout optimized for various devices, the UI ensures a consistent and engaging
experience across desktops, tablets, and smartphones, enhancing user satisfaction and
driving conversions through its user-friendly design and seamless browsing
experience. For administrators, the interface should provide access to system settings,
14
user management, and data management. The interface should be straightforward,
allowing administrators to manage the system with ease.
Users should have the ability to add desired books to a virtual shopping cart
for later purchase.
Users should be able to create accounts, log in, and manage their personal
information.
Account management functionalities should include features like
password reset, profile editing, and account deletion.
Tracking Orders:
Users should have the ability to track the status of their orders, including
order confirmation, shipment tracking, and delivery notifications.
The system should offer channels for users to seek assistance, including
FAQs, email support, live chat, or a customer service hotline.
Users should be able to leave reviews and ratings for books they
have purchased, contributing to the overall feedback system.
The division of work for the BOOK WORM attendance system is as follows:
1. Bhavesh Yogi– Bhavesh Yogi plays a pivotal role in the development team as a
backend developer for the bookworm system and the tech stack used is Python Django
for backend. He is primarily responsible for designing, implementing, and maintaining
the backend components of the software, including databases, servers, and APIs.
Bhavesh ensures the seamless integration of frontend and backend functionalities,
18
optimizing system performance, scalability, and security. His expertise in backend
technologies and frameworks contributes to the robustness and reliability of the
bookstore's digital platform, ultimately enhancing the user experience and facilitating
smooth operation of the system
4.1Architectural Design
26
In terms of the database, PostgreSQL is chosen for its reliability, scalability, and
support for complex data types and queries. PostgreSQL's robust features include
ACID compliance, support for JSON data types, and extensibility through custom
functions and extensions. These technologies collectively enable the creation of a
secure, scalable, and feature-rich multi-vendor bookstore application.
For sellers, the platform offers a global marketplace to showcase their books, manage
inventory efficiently, and optimize sales strategies through insightful analytics tools.
This empowers sellers to reach a wider audience and maximize their sales potential.
Reference
The project draws upon a variety of resources to achieve its objectives. These include
official documentation from Django, React, Tailwind CSS, and PostgreSQL, which
served as foundational references for backend, frontend, styling, and database
management respectively. Additionally, tutorials and guides from online platforms
like Medium and YouTube provided step-by-step instructions for implementing
specific features. Books such as "Django for Beginners" and "Learning React" offered
deeper insights into these technologies. Official documentation from third-party tools
like Razorpay and AWS guided integration for payment processing and deployment
on cloud infrastructure. Furthermore, engagement with online communities like Stack
Overflow and Reddit facilitated problem-solving and knowledge-sharing throughout
the development process. These diverse resources collectively contributed to the
project's successful implementation and served as valuable references for its
documentation.