You are on page 1of 12

Project Proposal

1. Title of the Project 2. Introduction & objective of the project 3. Project Category 4. Tools/ Platform, Hardware & Software Requirements 5. Problem Definition, Requirements Specifications, Project Planning & Scheduling 6. Analysis (DFD, ER etc) 7. Complete Structure includes a. Modules b. Data Structure c. Process Logic d. List of Reports 8. Implementation of Security 9. Future Scope 10.Bibliography

OnLineWalFareShopAirForce

TITLE OnLineWalFareShopAirForce INTRODUCTION


This project deals with the transaction criteria of the AF Welfare Shop. AF Welfare Shop is a place where all the articles of daily use are made available for sale at moderate rate. Basically the project deals with the preparation of bills, purchasing of items, modification of customers and suppliers list, keeping an eye on critical stock & re order level etc. In addition the scope of project extended to assist the management in taking various important decisions like restricting the wastage of products while in transaction, maximizing the profit through various austerity measures, alerting the pending supplies and periodical status of sales and stocks. Further the scope of project covers the new concept of SMART CARD system to avoid the misuse of the facility. This Card will identify the customer and check for his/her various authorization and limitations.

OnLineWalFareShopAirForce

OBJECTIVE OF THE PROJECT


For easy and convenient processing we need to develop software which works as per our requirements. While preparing this software we got to remember few things i.e. this software must have a friendly environment, in other words it should not be much complicated to handle, it should have options for future modifications in the AF Welfare Shop i.e. customers list, items and suppliers list. For smooth functioning, we had to prepare a database by which we could enter the required data in their respective locations. In this data base all the records of daily transactions made are stored i.e. items sold, bills generated, order placed etc., so that we can use them in future whenever needed. From security point of view this software has a special login name and password allotted to the staff. Other than those no one could use this and on entering an illegal password or login name an error message get displayed.

PROJECT CATEGORY
RDBMS & Expert System

OnLineWalFareShopAirForce

TOOLS/ PLATFORM, HARDWARE &SOFTWARE REQUIREMENTS

SOFTWARE REQUIREMENT: Operating System Database Language : Windows 98,95,9X : MYSQL :HTML/ PHP

HARDWARE REQUIREMENT: MINIMUM REQUIREMENT: USER INTERFACE:


It has been required that every form interface should be user friendly and simple to use. Besides, there should be facility of accessing the system through keyboard along with mouse i.e. keyboard shortcuts.

Pentium @ 200 MHz and above. 32 MB Ram 200 MB Hard Disk space Dot matrix printer(80 column) Mouse

SOFTWARE INTERFACE:
It has been reared that these could be necessity of using the stored data for some kind of report that if not supported by proposed system at present. So the e proposed system is required to export its data as file so that some other application software can impact the data.

PROBLEM DEFINITION, REQUIREMNTS, SPECIFICATION


The analysis model is a concise, precise abstraction of what the desired system must do, and not how it will be done after the study of existing system is completed. This

OnLineWalFareShopAirForce

basically includes system study and requirement analysis. Interacting with people using the system to fulfill their requirements and expectations is requirement analysis. The steps, which are necessary to analyze a system, are: Research and define the essential components. Analyze current process and identify gaps. Interview users, managers and other concerned persons regarding essential components and current process. Write required documents. Define standards for policies and procedures. Review draft requirement documents with users, managers. Update and expand project plan.

PROBLEM STATEMENT The AF Welfare its Shop Shop management to fully requires its

computerizing

automate

corresponding activities. The requirements from the proposed software are as follows: a)Customers information handling. b)Suppliers information handling.
c) Products information handling. d) Printing of Bills. e) Searching of Supplier information
The article, published on the BBC News website on 9 October 2008, talks about quantum cryptography and how it differs from the mathematically-based security systems used on today's computer networks which are said to be extremely hard - but

OnLineWalFareShopAirForce

not impossible - for outsiders to crack. Quantum encryption certainly sounds like the next generation of computer security but is it too early to be discounting traditional security measures and considering them substandard in comparison? Ian Haughton, Managing Director of Corporate Mailing Solutions thinks not. Providing transactional mail and election services to a long list of blue chip financial institutions for several years means that Ian has been working at the core of an industry where data security is paramount. He says, "Amongst other things we've had to make sure our online voting system - Castavote - is based on absolute data security, otherwise our clients just wouldn't entertain it. All voting data is secured by 128-bit SSL security certificates on servers that are protected by several of the very best hacker, fraud and malicious code safeguards." Castavote is a consumer-tested, custom-designed online voting system that offers voters a convenient, secure and modern online voting option that can be seamlessly integrated into any client's website. Getting down to the nitty gritty of security features, Castavote offers a cast iron interface including a random modulated entry system, a web server-run script to prevent incorrect data entries, a firewall-protected SQL database that holds no personal voter information, server-based scripting, and a web server that is managed by an internationally reputable company recognised as having one of the world's most secure data centres. Castavote offers exceedingly high levels of security together with a range of additional benefits that has made it attractive to various building societies and financial institutions.

OnLineWalFareShopAirForce

ANALYSIS (DFDs, ER)

OnLineWalFareShopAirForce

NUMBER OF MODULES AND THEIR DESCRIPTION:


a)

Purchase and Bill Module

This module deals with the functioning of purchasing and after that process of bill generation. Customer can select their required products from the list and purchase them. After all the purchasing is done, AF Welfare Shop management should provide the bill to the customer.
b)

Supplier Module

In this module functions related to supplier are done. For ex. Addition of new supplier, deletion and modification of existing supplier, generation of supplier list etc.
c)

Stock Module

In this module functions related to items are done. For ex. Addition of new item, deletion and modification of existing item, generation of item list etc. Purchasing of items from the supplier by giving them order. d) Security Module

This module handles the security features of software. It checks for unauthorized login/accesses, unauthorized deletion/editing of records, defining the access permissions to users, etc.

Process Logic
This module deals with the purchasing and bill generation process. This module uses two tables namely DAILY_BILLS and CUSTOMER for storage and retrieval purpose.

OnLineWalFareShopAirForce

Supplier Module This module performs all functions related supplier information such as addition, deletion, modification etc. This module uses two tables namely PRODUCT and SUPPLIER for storage and retrieval purpose. Item Module

This module is used for creating/modifying new/existing items. The items would be stored in PRODUCT Table. Supplier details would be stored in SUPPLIER. Details of orders would be stored in ORDER. Security Module An operator can be an Administrator (full access) or a User (permissible access). In case of User, the permissions granted will be retrieved from LOG IN MASTER Table. Reprting Module This module handles the process of all types of report generation for ex. Bill generation, Daily Summary generation, Monthly Summary generation, Reports for taking various important managerial decisions etc. by using four tables namely PRODUCT, DAILY_BILLS, SUPPLIER & ORDERS for storage and retrieval purpose. Types of Report Generation Management Information System (MIS) Reports Daily Reports (a) (b) (c) Daily Cash/Credit Sales Summary Daily Stock Status Summary (Optional) Daily Stock Receipt Summary

OnLineWalFareShopAirForce

(d) (e) (f)

Daily Pending Supply Summary Daily Reorder Level Summary Daily Refund Summary

Data Structure,
Table: Users:
FIELDNAME REGNO NAME USERID PASSWORD ADDR AGE FEE SEX DOR FIELDTYPE INTEGER VARCHAR2 VARCHAR2 VARCHAR2 VARCHAR2 INTEGER INTEGER VARCHAR2 DATE FIELDWIDTH 50 10 10 50

10

Table: Propuct
FIELDNAME PRODID NAME QTY DOP RATE LPR FIELDTYPE INTEGER VARCHAR2 INTEGER DATE INTEGER INTEGER FIELDWIDTH 50

Table: LOG
FIELDNAME LOGID NAME SHARENAME START END QUANTITY NAV FIELDTYPE FIELDWIDTH INTEGER VARCHAR2 50 VARCHAR2 50 DATE DATE INTEGER INTEGER

OnLineWalFareShopAirForce

Table: Sales
FIELDNAME USERID NAME QUANTITY RATE FIELDTYPE VARCHAR2 VARCHAR2 INTEGER INTEGER FIELDWIDTH 50 50

Table: PaymentTransaction
FIELDNAME USERID BANKNAME AMOUNT DOT FIELDTYPE FIELDWIDTH VARCHAR2 50 VARCHAR2 50 INTEGER DATE

OnLineWalFareShopAirForce

SECURITY MEASURES
Security constraints guard against accidental or intentional tampering with data whereas integrity constraints ensure that any properly authorized access, alteration, deletion, or insertion of the data in the database does not change the consistency and validity of the data. Database Security: In Database security, we have secure data and data integrity. Authentication: The simplest and most common authentication scheme used is User name & Password to authenticate the user. Application Security: Application security is quite different from database security. Application security focuses on securing not only data but also processes. Security constraints: We have some constraints in security for database and application. I. We cannot secure system files of operating system and application. II. Hardware Security.

FUTURE SCOPE
The future scope of the project is that it can be used as website which is registered as on line & then any one can use it for share trading

BIOLIOGRAPHY
Teach Your self HTML Teach Your self PHP Teach Your self mySql Web reference as SHAREKHAN.COM, INDIABULLS.COM etc

OnLineWalFareShopAirForce

You might also like