Online Property Seacrching
Online Property Seacrching
Online Property Seacrching
Date……………………….
1|P a g e
ONLINE PROPERTY SEACRCHING
AND PERCHASE
A Project Report
Submitted in partial fulfillment of the
Requirements for the award of the Degree of
MAHARASHTRA,
2019-2020
2|P a g e
VIDYAVARDHINI’S ANNASAHEB VARTAK COLLEGE
OF SCIENCE
VASAI-MAHARASHTRA-401202
CERTIFICATE
External Examiner
3|P a g e
ABSTRACT
4|P a g e
ACKNOWLEDGEMENT
I am very much thankful to our teacher staff that they have faith on me and gave me
opportunity to work on this project to express my professional gratitude.
Specially. I am very grateful to my project guide Ms. Shital Rode under whom I have
worked on this. The tips and proper guidance of mam helped me to complete the project as
required. Teachers staff are resourceful and provided full support when I needed. A special
thanks to our Head of Department Ms. Shushama mam to very helpful.
Finally, I wish to thanks my all IT department teachers, colleagues who directly or
indirectly helped me in completion of the project. Last but not the least I would thank my
family and those also whom I forgot to mention.
5|P a g e
DECLARATION
The project is done in partial fulfilment of the requirements for the award of degree of
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY) to be submitted as final
semester project as part of our curriculum.
6|P a g e
TABLE OF CONTENTS
7|P a g e
List of Tables
8|P a g e
List of Figures
9|P a g e
Chapter 1
Introduction
Background:
This website is an Online property searching and purchase website through which a
user can access its information and manage all the adding, updating, deleting the assets
and some of its tasks.
The Admin user can change the update the information regarding property selling and
buying and cancellation. The system is very useful for the companies who developed
apartments, hotels, villa, residential properties and commercial properties. Companies
or individual agents can also advertise their property.
Objectives:
The system should have a login. A login box should appear when the system is
invoked.
The Admin should have all the type of authority.
The Admin should maintain property. Admin identify property type as it is
residential or commercial property.
The Admin user can inform their agents for regarding to property and update the
information regarding property and cancellation of property or changing buyer
choice.
The user should book the property for sell or rent with detail of property.
The system is very useful for the companies or builders that can post and edit
their properties and their personal info and admin can monitor records of all of
them.
Purpose:
This website is an Online real estate website through which a user can access its
information and manage all the adding, updating, deleting the assets and some of its
tasks.
The Admin user can change the update the information regarding property selling and
buying and cancellation. The system is very useful for the companies who develop
10 | P a g e
apartments, hotels, villa, residential properties and commercial properties. Companies
or individual agents can also advertise their property.
Scope:
The real of world wide web have spread across millions of households, so naturally,
Internet has become by far the best platform for real estate marketing today. Now days
when everything is online, how is it possible that real estate left website. There are lot
of real estate companies who advertise their property online so idea behind developing
this website is that their property can also sell, or buy rental property using this. These
websites are not widely popular but in future, they have large scope of growth. roles
and basing on its permissions will be granted to add or remove data to the notice board
features.
Applicability:
This website provides easy UI to which easily interact. Here user can post their property
details and who are interested they can buy or take rent property by carefully studying
property details.
Achievements:
After perceiving this project, I have learnt all types of real-estate property ex (hotels,
villa, residential properties and commercial properties). And I also learnt RERA stands
for Real Estate Regulatory Authority.
RERA is an act for regulation and promotion of the real estate sector to ensure
the sale of apartment, plot or building in an efficient and transparent manner. The Act
aims to protect the interest of consumers.
Organization of Report:
As aim was to make property purchase online easy and belief the main report
includes that there may be some manually changes may be possible in Online property
purchase.
11 | P a g e
Chapter 2
Survey of Technologies
Technology Used: html, css, php
12 | P a g e
developer who can help you redefine your online presence by involving the use
of this technology.
Cross-Platform:
PHP is, an application can be run on various platforms. The most important
advantage of PHP is the developer need not have to worry about the operating
system the user is working on.
Ease of Use:
Any individuals who are new to programming can easily learn to use them
within a short duration of time. The syntax for programming in the hypertext
pre-processor is quite similar to the C programming language. So the individual
who is familiar with C can easily create PHP website scripts.
Speed:
A very vital side of web development is the speed. Considering the very
important fact, some individuals still struggle with the challenge of web data
speed. A quick loading website always appreciated by many individuals.
Folks use PHP because of the important fact that it’s quick.
13 | P a g e
collection functional modules and a few of the modules available in PHP
include Graphics and PDF amongst others.
Stable:
PHP has been in existence for about twenty-two years. Over this era, many
developers have worked on the application to enhance the usage of the
application. lots of bugs are discovered over the years and therefore the bugs
are fixed quickly by the team of developers. Based on this, the programming
language is currently very stable.
Data Security
MySQL is globally renowned for being the most secure and reliable database
management system used in popular web applications like WordPress, Drupal,
Joomla, Facebook and Twitter. The data security and support for transactional
processing that accompany the recent version of MySQL
On-Demand Scalability
High Performance
14 | P a g e
Comprehensive Transactional Support
MySQL tops the list of robust transactional database engines available on the
market. With features like complete atomic, consistent, isolated, durable transaction
support, multi-version transaction support, and unrestricted row-level locking, it is the
go-to solution for full data integrity. It guarantees instant deadlock identification
through server-enforced referential integrity.
With the average download and installation time being less than 30 minutes,
MySQL means usability from day one. Whether your platform is Linux, Microsoft,
Macintosh or UNIX, MySQL is a comprehensive solution with self-management
features that automate everything from space expansion and configuration to data
design and database administration
All the fears and worries that arise in an open source solution can be brought to
an end with My SQL’s round-the-clock support and enterprise indemnification. The
secure processing and trusted software of MySQL combine to provide effective
transactions for large volume projects. It makes maintenance, debugging and upgrades
fast and easy while enhancing the end-user experience.
Disadvantage of MySQL
15 | P a g e
It’s Got a Few Stability Issues
It Suffers from Relatively Poor Performance Scaling
Development Is Not Community Driven – and Hence Has Lagged
Its Functionality Tends to Be Heavily Dependent On Add-ons
Developers May Find Some of Its Limitations to Be Frustrating
16 | P a g e
CHAPTER 3
3.Requirement Specification
3.1 Software requirements:
Any Version of browser after Mozilla Firefox 4.0, Internet Explorer 6.0, Chrome.
17 | P a g e
5.Conceptual models
Admin
On the basis of given input like City, Size of rooms, Budget this module will
search the property and display it in properly.
Resale
If property is sale or any one take room on rent, then a mail will send on
registered email to both owner and buyer.
18 | P a g e
5.2 System Flow Chart:
19 | P a g e
20 | P a g e
5.3 Entity Relationship Diagram:
An entity-relationship diagram is a data modelling technique that graphically illustrates
an information system’s entities and the relationships between those entities and the
relationships between those entities. An ERD is a conceptual and representational model of
data used to represent the entity framework infrastructure.
The element of ERD are:
Entities
Relationship
Attributes
21 | P a g e
FEASIBILITY STUDY
This phase implies on the primary job of recognizing the problem. In this stage we
define what the problem is and study the various inputs and outputs of the system.
Recognizing the demands of the system and clearly defining the system must be the
output of this phase of software development life cycle. The output of the preliminary
investigation phase is the input to this phase. This stage aims at analytical conclusions
of developer. This phase implies at analysing whether it is feasible on the part of
programmer and for the user to build the system. The feasibility study is done in terms
of resources such as economy, time etc.
Economic feasibility
Operational feasibility
ECONOMIC FEASIBILITY:
OPERATIONAL FEASIBILITY:
22 | P a g e
Project is operationally feasible since there is no need for special training of staff member and
whatever little instructing on this system is required can be done so quite easily and quickly as
it is essentially.
TECHNICAL FEASIBILITY
During technical analysis, the analyst evaluates the technical merits of the system, at
the same time collecting additional information about performance, reliability, maintainability
and productivity. The main technical issue raised during feasibility is the existence of necessary
technology and whether the proposed equipment has the capacity to hold required data. The
technical guarantee of accuracy, reliability, ease and data were also investigated
In this phase, we try to design our system in latest technology and also technology
should be stable released.
Here we think about software facilities, procedures, process, input and output. We
check that up to what extent our system is able to sustain.
I am trying to develop a system that can be updatable for long time provide full
maintenance to customer for later updates.
ECONOMIC FEASIBILITY
This feasibility has great importance as it can outweigh other feasibilities because costs
affect organization decisions. The concept of Economic Feasibility deals with the fact that a
system that can be developed and will be used on installation must be profitable for the
Organization. The cost to conduct a full system investigation, the cost of hardware and
software, the benefits in the form of reduced expenditure are all discussed during the economic
feasibility. Return on Investment
The cost will be in terms of utilization of resources leading to the cost to the company.
Since our cost of project is our efforts, which is obviously less than the long-term gain for the
company, the project should be made.
23 | P a g e
CHAPTER 4: SYSTEM DESIGN
1.UML
CLASS DIAGRAM:
The class diagram is a static diagram. It represents the static view of an application.
Class diagram is not only used for visualizing, describing and documenting different aspects
of a system but also for constructing executable code of the software application.
The purpose of the class diagram is to model the static view of an application. The class
diagrams are the only diagrams which can be directly mapped with object-oriented languages
and thus widely used at the time of construction.
Class Name:
The name of the class appears in the first partition.
Class Attributes:
Attributes are shown in the second partition. The attribute shown after the colon.
Class Operation:
The return type of the method is shown after the colon at the end of the method
signature.
Aggregation:
A special type of the association. It represents a “part of” relationship.
Composition:
A special type of the aggregation where parts are destroyed when the whole is
destroyed.
24 | P a g e
Use Case Diagram: -
A use case diagram at its simplest is a representation of a user's interaction with the system that
shows the relationship between the user and the different use cases in which the user is
involved.
Login: System
User
Forgot password
Server
Signup(New user)
Validate user
Login
25 | P a g e
26 | P a g e
Activity Diagram: -
Activity diagram is another important diagram in UML to describe the dynamic aspects of the
system. Activity diagram is basically a flowchart to represent the flow from one activity to
another activity. The activity can be described as an operation of the system. The control flow
is drawn from one operation to another.
Login:
27 | P a g e
Resale:
28 | P a g e
Rent:
Create an account
Login
Yes
Already exists
SignUp No
If like
No
yes
Check other property
Buy
send Invoice with details on registor email
29 | P a g e
Component Diagram: -
• A component diagram, also known as a UML component diagram, describes the organization
and wiring of the physical components in a system. Component diagrams are often drawn to
help model implementation details and double-check that every aspect of the system's required
function is covered by planned development.
• As shown in below component diagram, the main two modules are Time Table generation &
Merit List generator and other related modules are course, teachers, subject, login & more.
Sequence Diagram: -
➢ A sequence diagram simply depicts interaction between objects in a sequential order i.e.
the order in which these interactions take place. We can also use the terms event diagrams or
event scenarios to refer to a sequence diagram.
➢ Sequence diagrams describe how and in what order the objects in a system function.
➢ These diagrams are widely used by businessmen and software developers to document and
understand requirements for new and existing systems.
30 | P a g e
Login:
31 | P a g e
Resale
32 | P a g e
Rent:
33 | P a g e
2.Data Design
Table Name: Postproperty_Resale
Table2: Postproperty_rent
Table Name: Postrequirement_buy
Primary Key: login_id
Description: To store the details of the person for requirent of property.
Table3: Postrequirement_buy
34 | P a g e
Table Name: Postrequirement_Resale
Primary Key: login_id
35 | P a g e
36 | P a g e
4.3 Test Case Designs:
o Login
If new user then sign up or login in next step
If username and password is correct then allowed to login otherwise -
Go to password recovery and reset password and login.
o Searching
If all fields value provided by user then search in details otherwise
Depends on which basis user want to search.
o Resale
First login Uploads property details.
If not a valid user first signup otherwise not allow.
After login Buyer can check detail and buy property.
o Rent
First login Uploads property details.
Upload Monthly payee, Deposite amount, contact no.
After login Buyer can check property and contact the seller.
o Invoice
Invoice is sent to user if Email is register otherwise not send.
37 | P a g e
4.5 Security Issues
Login
Login system authenticates the authorized user and allow access to work on
system. If user is unauthorized than should not allow to interact with the system.
Login should not do by anonymous user. In case user is system user with no
account then signup will go on.
Password recovery & change module to periodically change password to
prevent system from hackers.
SQL Injection
DDoS Attack
The robustness of DDoS attacks is growing day by day. Hackers are targeting
organizations to steal crucial data and they do it using the approach of a DDoS
attack. Common methods include flooding websites and networks with false
traffic.
Self-Propagating Ransomware
This type of ransomware spreads via systems that are unpatched workstations.
All they need is an automated software update. The key purpose of this type of
ransomware seems to be to destroy data rather than extort money.
The only solution is to keep data backed-up and make sure that all systems are
patched.
38 | P a g e
Phishing
Phishing is a security threat that is carried out via email. The recipient is
tricked into divulging information after being convinced that the mail is from a
legitimate source. The system becomes infected when the recipient clicks a
link or downloads an attachment.
Phishing can be prevented by training employees to identify suspicious emails
and installing security solutions that can scan emails.
39 | P a g e