Event Scheduler Documetation

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 59

Shri Vile Parle Kelavani Mandal’s

NARSEE MONJEE
COLLEGE OF COMMERCE
AND ECONOMICS
NAAC Accredited ‘A’ Grade

Event Scheduler

A Project Report
Submitted in partial fulfilment of the
Requirements for the award of the Degree of

BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY)


By
Deepu Gupta - 45207190059
Under the esteemed guidance of
Mr. Gufran Qureshi
Assistant Professor

DEPARTMENT OF INFORMATION TECHNOLOGY


NARSEE MONJEE COLLEGE OF COMMERCE AND ECONOMICS
(Affiliated to University of Mumbai)
MUMBAI, 400056
MAHARASHTRA
2021

NARSEE MONJEE COLLEGE OF COMMERCE AND ECONOMICS


(Affiliated to University of Mumbai)
MUMBAI- MAHARASHTRA-400056
DEPARTMENT OF INFORMATION TECHNOLOGY

CERTIFICATE

This is to certify that the project entitled, “Event Scheduler”, is bonafide work of
Deepu Gupta bearing Seat No: 45207190059 submitted in partial fulfilment of the
requirements for the award of degree of BACHELOR OF SCIENCE in INFORMATION
TECHNOLOGY from the University of Mumbai.

Internal Guide Coordinator

External Examiner

Date: College Seal

PROFORMA FOR THE APPROVAL PROJECT PROPOSAL

PRN No.: _____________________ Roll no: ________________


1. Name of the Student
_____________________________________________________________________

2. Title of the Project


_____________________________________________________________________

3. Name of the Guide


_____________________________________________________________________

4. Teaching experience of the Guide _________________________________________

5. Is this your first submission? Yes No

Signature of the Student Signature of the Guide

Date: _______________ Date: _______________

Signature of the Coordinator

Date: _______________
ABSTRACT
In present scenario, people are busy in heavy work, as everyone is engaged with busy
schedules, and hectic tasks which make them depart from family life. If any event occur they
have to find an event manager for a specific event. There is the different managers for
different event and also they charged more and not time friendly. It is important to manage
both professional and family life. Thus, event scheduler come to help. The system allow user
to login and register. This project provides most of the basic functionality required for an
event. It allows to user to select a list of event types. Once the user enters the event like
marriage, Dance show and other event like any product launching, sport event like cricket
and hocky. The system then allows the user to select the date and time of event place and the
event equipment.

Online event scheduler is a best way to keep clients engaged with the service as they
are on the move. As technology is growing rapidly, we are also moving to a technical world
where everything we want is to be online. The main aim of this proposal is to develop an
online event management system. To gather requirements for designing an online event
management system. To design or model an online event management system and to test,
validate and implement the designed system.
ACKNOWLEDGEMENT
“The acknowledgment of a single possibility can change everything”

I have a great pleasure while keeping this thesis work in front of reputed personalities ,

in the research. I take this opportunity as a deep sense of gratitude to those people &

institutions that helped me during this research work.

Firstly, I would like to express my heartfelt gratitude Dr. Parag Ajagaonkar, the

Principal of SVKM’s Narsee Monjee College of Management, who guided me throughout

the research work and writing up of the thesis . Without her constant inspiration,

encouragement and constructive criticism, the present work would not have been possible.
I take this opportunity to express my profound gratitude and deep regards to my guide
Mr. Gufran Qureshi, for exemplary guidance at each step of this project, monitoring and

constant encouragement throughout the course of this project . She also helped me in

preparing for a professional environment, where I realized the power of schedule.


I would also like to thank the department of BACHELOR OF SCIENCE
(INFORMATION TECHNOLOGY), for their resources and training that made the

implementation smoother. A special mention to all the faculties, lab assistants and the non-

teaching staff of the department as well for their efforts and cooperation.

Lastly, I would like to thank the institute , SVKM NARSEE MONJEE COLLEGE

OF COMMERCE AND ECONOMICS, for giving me this opportunity to explore and

expand our horizons through this project and all our academic endeavors.
DECLARATION

I hereby declare that the project entitled, “Event Scheduler” done at MUMBAI, has
not been in any case duplicated to submit to any other university for the award of any

degree. To the best of my knowledge other than me , no one has submitted to any other

university.

The project is done in partial fulfilment of the requirements for the award of degree
of BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY ) to be submitted
as final semester project as part of our curriculum.

Name and Signature of Student


TABLE OF CONTENTS

Chapter 1: Introduction

1.1 Background 1
1.2 Objectives 2
1.3 Purpose, Scope and Applicability 3
1.3.1 Purpose 3
1.3.2 Scope 3
1.3.3 Existing system 3
1.4 Achievements 4
1.5 Organization of Report 5
Chapter 2: Survey of Technologies
2.1 PHP vsASP.NET 7
2.2 Description of Chosen Technology 9
Chapter 3: Requirements and Analysis
3.1 Problem Definition 13
3.2 Requirements Specification 14
3.2.1 Existing System 14
3.2.2 Proposed System 15
3.2.3 System Requirements 16
3.2.3.1 Functional Requirements 16
3.2.3.2 Non – Functional Requirements 17
3.3 Planning and Scheduling 18
3.4 Software and Hardware Requirements 21
3.4.1 Software Requirements 21
3.4.2 Hardware Requirements 21
3.5 Preliminary Product Design 22
3.6 Conceptual Design 23
3.6.1 ERD Diagram 23
3.6.2 Data Flow Diagram 24
3.6.3 Use Case Diagram 25
3.6.3.1 Admin Use Case Diagram 25
3.6.3.2 Service Provider Use Case Diagram 26
3.6.3.3 Customer Use Case Diagram 27
3.6.4 Sequence Diagram 28
3.6.4.1 Admin Sequence Diagram 28
3.6.4.2 Service Provider Sequence Diagram 29
3.6.4.3 Customer Sequence Diagram 30
3.6.5 Activity Diagram 31
Chapter 4: System Design
4.1 Basic Modules 32
4.2 Data Design 34
4.2.1 Schema Design 34
4.2.1.1 Admin Table 34
4.2.1.2 Service provider Table 35

4.2.1.3 Customer Table 36


4.2.1.4 Order Service Table 36

4.2.1.5 Category Table 37

4.2.1.6 Reply Detail Table 37

4.2.1.7 Feedback Table 37

4.2.2 Data Integrity and Constraints 38


4.3 Procedural Design 39
4.3.1 Logic Diagram 39
4.3.2 Data Structures 39
4.3.3 Algorithm Design 41
4.4 User Interface 42
4.4.1 Home Page 42
4.4.2 Customer Login Page 43
4.4.3 Admin Login Page 44
4.4.4 Customer Registration Page 45
4.4.5 Service Provider Registration Page 46
4.5 Security Issues 47
4.6 Test Cases 49

List of Tables
Table 2.1 Comparison of frontend Technologies Table 7
Table 2.2 Comparison of backend Technologies Table 8
Table 4.2.1.1 Admin Table 34
Table 4.2.1.2 Service provider Table 35
Table 4.2.1.3 Customer Table 36
Table 4.2.1.4 Order Service Table 36
Table 4.2.1.5 Category Table 37
Table 4.2.1.6 Reply Detail Table 37
Table 4.2.1.7 Feedback Table 37
Table 4.6 Test Case Table 49

List of Figures
Figure 1.1 The special event 2
Figure 1.2 The process schedule an event 4
Figure 3.2.1 Services provided by Mechanics 14
Figure 3.3.1 Gantt chart for the first half of the project 19
Figure 3.3.2 Gantt chart for the second half of the project 20
Figure 3.4.2 Logo of Software Requirements 21
Figure 3.6.1 ERD Diagram 23
Figure 3.6.2 Data Flow Diagram 24
Figure 3.6.3.1 Admin Use Case Diagram of the project 25
Figure 3.6.3.2 Service Provider Use Case Diagram of the project 26
Figure 3.6.3.3 Customer Use Case Diagram of the project 27
Figure 3.6.4.1 Admin Sequence Diagram of the project 28
Figure 3.6.4.2 Service Provider Sequence Diagram of the project 29
Figure 3.6.4.3 Customer Sequence Diagram of the project 30
Figure 3.6.5 Activity Diagram of the Login and Registration 31
Figure 4.3.1 System Flow of the project 38
Figure 4.3.7 Algorithm Design 39
Figure 4.4.1 Home Page 42
Figure 4.4.2 Customer Login Page 43
Figure 4.4.3 Admin Login Page 44
Figure 4.4.4 Customer Registration Page 45
Figure 4.4.5 Service Provider Registration Page 46
Chapter 1

Introduction

1.1 Background
In today’s time everything is getting fast paced, and people want everything to be on
time. But managing and schedule an event become pain in head. Where people use today’s
technology in everything like booking snacks and mechanics but chose to manage event them
salve and take time like week .

The "Event Schedule" has been developed to override the problems prevailing in the
practicing manual system. we are going to make our website and mobile application where
the people get appropriate result. This software is supported to eliminate and, in some cases,
reduce the hardships faced by this existing system. The interface of the website is very easy,
and anybody can easily work on it. Moreover, this system is designed for the particular need
of the company to carry out operations in a smooth and effective manner.

The event schedule website is also very useful because the customer doesn’t have to
visit to service provider’s office and also need not to ask anyone whether they have any place
for event via this website and he/she can also pay the payment online in this website if
available. So, he/she can book hall, ground etc in advanced.

To make this application work successfully we have used some latest technology such
as PHP, HTML, CSS as the platform and My SQL as the database management environment.
I have also included UML diagram which is beneficial to display the flow of process
throughout the system so even an inexperienced people or newly people who recently settled
in city can easily get the idea of this system.

1|Page
The Special event

1.2 Objectives
The main objective of the Project on Event Management System is to manage the
details of Event, Activity. Organizers, Attendees, Conductors. It manages all the information
about Event, Payment, Conductors, Event. The project is totally built at administrative end
and thus only the administrator is guaranteed the access. The purpose is to maintain a
centralized database of all events related information and the project is to build an application
program to reduce the manual work for managing the Event, Activity, Payment, Organizers.
It tracks all the details about the Organizers, Attendees, Conductors.

1.3 Purpose, Scope and Existing system

1.3.1 Purpose

Traditionally we search and ask people if they know any event management and when
they have different event management like for party wedding and sport event. But now these
issues is going to be solved sitting at home and getting all your work done easily. Our
purpose is to solve the issues when the customer needs any kind of event.

1.3.2 Scope

The main scope of this project is to make event schedule very easy. In a very short time, the
puser can find and book hall ground in very , simple and sensible. It will help a person to
know the management of passed by perfectly and vividly. It also helps in current all works

2|Page
relative to Event Management System. It will be also reduced the cost of booking the
management & event will go on smoothly.

Our project aims at Business process automation, i.e. we have tried to computerize various
processes of Event Management System.
1.3.3 Existing system
This existing system is not providing secure registration and profile management of
all the users properly. This system is not providing on-line help. This system doesn’t
provide tracking of users activities and their progress. This manual system gives us very less
security for saving data and some data may be lost due to mismanagement. This system
is not providing event management through internet. This system is not providing proper
events information. The system is giving manual information through the event management
executer.

1.4 Achievements
Time Saving: Especially in metro cities, life has become so mechanical that people don’t
have time for his or her personal life. With the assistance of online home service, you'll easily
find the proper professional for your job. This is able to save lot of your time and therefore
the quality of the service would be great compared to the local service provider.

New People in Town: Online home service are considerably beneficial for working
professionals and also very beneficial for the people that are recently relocated to the town
because the people that are recently relocated to the town, they don’t know anyone therein
area so through this website they will easily get all kinds of help they have.

Quality Service: The simplest part of the web services is Quality they promise and
delivery. they are doing document verification of the partners and appearance at their past
experience within the field. Sometimes they also ask their few past customers to validate the
work provided by the service partner.

3|Page
Multi-Tasking: While online service provider takes care of all of your requirements,
you'll relax or resume your work without disturbing your planner.

Punctuality: The time slots you choose for your requirements are going to be placed on
high priority and therefore the service partners will reach the place on time and its best
interest of the web service provider to send the service partners on time.

Login into Get a


website confirmation

Select place and Book that hall


event type ground

Figure 1.2: The process of schedule an event.

1.5 Organization of Report

This chapter has mainly focused on a brief description of the background and context

of the project and its relation to work . It has given a concise statement of the aims and

objectives of the project, answers questions on why this project is being done, how the

project could improve the system its significance and theoretical framework , what are the

main issues being covered in the project , what are the main functions of the project , and how

this project will serve the computer world and people. This chapter will also explain what

knowledge the student has achieved after the completion of the work , what contributions has

the project made to the chosen area. It will also state the goals achieved describing the degree

to which the findings support the original objectives laid out by the project.

In the 2nd chapter, Survey of Technologies, I will highlight my collective awareness

and understanding of available technologies related to the topic of the project . I will also give
the detail of all the related technologies that are necessary to complete the project and are

4|Page
available in the chosen area. I will also present a comparative study of all those available
technologies and explain why selected the one technology for the completion of the

objectives of the project.

The 3rd chapter, Requirements and Analysis, will define the problem on which I am

working and will provide details of the overall problem in the project . In this phase I will
also define the requirements of the system, independent of how these requirements will be
accomplished, describe the things in the system and the actions that can be done on these

things, and identify the operation and problems of the existing system . The way I have
planned to complete the project will be shown by with the help of Gantt Chart. This will

describe how I have scheduled my whole project completion . It will also give the details of

all the software and hardware needed for the development and implementation of the project .

Lastly, I will explain the problem domain and produce a model of the system , which
describes operations that can be performed on the system, and the allowable sequences of
those operations.
The 4th chapter of the project will describe the desired features and operations in

detail, including screen layouts, business rules, process diagrams, and pseudocode. I will
divide the overall problem into more manageable parts and develop each part or module

separately. When all modules are ready, I will integrate all the modules into one system. In

this phase, I will briefly describe all the modules and the functionality of these modules . In

user interface, I will describe the external and internal components and the architecture of

user interface. I will also include real-time considerations and security issues related to the

project and explain how I intend avoiding those security problems . The test cases, will
provide easy detection of errors and mistakes with in a minimum period and with the least

effort.

The 5th chapter, Implementation and Testing, will define the plan of implementation,

and the standards that I would be using in the implementation . The code will include only the

important codes (algorithms, applets code, forms code etc). It will also include the testing

5|Page
approaches, modifications and improvements that I have done to my project over the course

of time.

The 6th chapter, Results and Discussion, will explain the test results and reports based
on the test cases, which should show that the project can face any problematic situation and

that it works fine in different conditions . The results will be discussed with different

scenarios which will in turn help to determine the success rate of the project.

The 7th chapter, Conclusions, brings together the limitations encountered during the

testing of the project and how they can be eliminated in the future . It also enlists the

criticisms accepted during the demonstrations of the project . It will also include the future

scope of the project describing two things: firstly, new areas of investigation prompted by

developments in this project, and secondly, parts of the current work that were not completed

due to time constraints and/or problems encountered.

Chapter 2
Survey of Technologies

2.1 PHP vs ASP.NET

PHP ASP.NET
PHP is a mix between a programming ASP.NET is an open-source server-side web
language and a web framework by the application framework designed for web
PHP Group. development to produce dynamic web pages
developed by Microsoft.
PHP is a server-side scripting language An object-oriented programming language in
designed for web development but also development from Microsoft, which is intended
used as a general- to combine the computing power of C++ with
Purpose programming language. the programming ease of Visual Basic.

6|Page
PHP is faster at the core level. ASP.NET was built to build apps quicker at the
expense of a loss in overall performance

PHP is used as a general-purpose ASP.NET is more widely used to build dynamic


programming language that is especially web sites, web applications and web services.
suited to server-side web development, in
which case PHP generally runs on a web
server.
PHP is compiled down to an intermediate ASP code are interpreted on the fly each time it
bytecode that is then interpreted by the is accessed
runtime engine.

PHP error handling is traditionally It informs developer if they made any mistake in
considered poor when compared to other coding before compile
programming languages.

Table 2.1: Comparison of frontend Technologies Table

2.2 SOL vs My SQL

SQL Server My SQL


SQL Server is a Structured Query Language My SQL is a relational database
used to manage Relational database management system used to store, retrieve,
modify a database using SQL.

It is a query language. It is database software. It uses SQL as a


language to query the database.

Since it is language it does not get updated Since it is software so it gets updated or
or modify. SQL commands remains same modified frequently.
always.

It is developed by Microsoft. It is developed by Oracle Corporation.

SQL Server syntax is simple and easy to MySQL syntax is bit complex
use.

7|Page
Available in multiple languages. Available only in English languages

Table 2.2: Comparison of backend Technologies Table

2.3 Description of Chosen Technology

1. HTML
HTML stands for Hypertext Markup Language.HTML files are saved with
.html extensions. It creates and describes the structure of web pages. It consists of
series of elements. All elements instruct the browser of how to the web page should
look like. HTML elements are from start tag to end tag. The purpose of a web browser
is to read HTML documents and display them correctly and in correct order. HTML
elements can be building block of HTML pages.

HTML can be assisted by CSS (Cascading Style Sheet) and also scripting
language such as JavaScript. Web browsers receive HTML documents from a web
server or from local storage and render the documents into multimedia web pages.
HTML provides a means to create structured documents by denoting
structural semantics for text such as headings, paragraphs, lists, links, quotes and
other items. HTML elements are defined by tags which are used inside the angular
brackets.

Tags such <img>, <links>, etc. are directly directed to the next page. Other
tags such as <p> provide information about document text and may include other tags
as sub-elements. Browsers do not display the HTML tags, but use them to interpret
the content of the page.

2. CSS

CSS stands for Cascading Style Sheet. CSS files are saved with .css
extensions. CSS is used for describing the presentation of the document written on

8|Page
markup page which is HTML. It is technology of World Wide Web along with
HTML and JavaScript.

CSS is designed for the separation of design and content. It helps to design the
background of the page, layout, and font of the parting paragraph. This separation can
provide more flexibility and enable multiple web pages to share formatting by
specifying the relevant CSS in a separate .css file which reduces complexity and
repetition in the content as well as enabling the .css file to improve the page load
speed between the pages that share the file and its formatting.

3. PHP

PHP stands for Hypertext Preprocessor. PHP files are saved by .php extension. PHP is
a server scripting language, and a powerful tool for making dynamic and interactive
Web pages. PHP is a widely-used, free, and efficient alternative to competitors such
as Microsoft's ASP. It was originally created by Danish-
Canadian programmer Rasmus Lerdorf in 1994. PHP can be used for many
programming tasks outside of the web context, such as standalone graphical
applications.

On a web server, the result of the interpreted and executed PHP code – which
may be any type of data, such as generated HTML or binary image data – would form
the whole or part of a HTTP response. Various web template systems, web content
management systems, and web frameworks exist which can be employed to
orchestrate or facilitate the generation of that response. 

4. Microsoft SQL Server

1. Relational database management


A relational database management system uses only its relational capabilities to

manage the information stored in its database.

1. Information Representation

9|Page
All information stored in a RDBMS is represented only by data item values , which are

stored in the tables that makeup the database.

2. Logical Accessibility
Every data item value stored in a relational database is accessible by stating the name
of the table it is stored in, the name of the column under which it is stored and the

value of the primary key that defines the row in which it is stored.

3. Representation of Null Values


The database management system has a consistent method for representing null

values. For example, null values for numeric data must be distinct from zero or any
other numeric value and for character data it must be different from a string of blanks

or any other character value.

4. Catalog Facility
The logical description of the relational database management system is represented

in the same manner as ordinary data. This is done so that the facilities of the relational

database management system itself can be used to maintain database description.

5. Data Language
A relational database management system may support many types of languages for

description data and accessing the database . However, there must be at least one

language that uses ordinary character strings to support the definition of data , the

definition of views, the manipulation of data, constraints on data integrity,

information concerning authorization and the boundaries for recovery of units.

6. View Updating

10 | P a g e
Any view that can be defined using combinations of base tables , that are theoretically

updateable, is capable of being updated by the relational database management

system.

7. Insert, Update and Delete:


Any operand that describes the results of a single retrieval operation is capable of

being applied to an insert, update or delete operation as well.

8. Physical Data Independence


Changes made to physical storage representations or access methods do not require

changes to be made to application programs.

9. Logical Data Independence


Changes made to tables, that do not modify any data stored in that table , do not

require changes to be made to application programs.

10. Database Distribution


The data language implemented by the relational database management system
supports the ability to distribute the database, without requiring changes to be made

application programs.

11 | P a g e
Chapter 3

Requirements and Analysis

3.1 Problem Definition


The truth of the manual process of finding event organizer becomes difficult in day-

to-day life. Usually correctness, robustness to fraudulent behaviors, coherence, consistency,


security are all key requirements for the integrity tom organize an event. Booking system
must be sufficiently robust to withstand a variety of fraudulent behaviors , must be

sufficiently transparent and comprehensible that the customers find it easy.


There are several service booking systems available all over the world with each of

them having its peculiar problems. The manual booking system still appears prominent

among the developing nations. In traditional booking system, customers can choose or mark

their choices of mechanics and call them to resolve their issues, which are sealed and

officially opened under special conditions to warrant transparency . The calling mechanics

manually, which is a tedious process that is subject to human error.

12 | P a g e
This method of booking has littered history with examples of mechanics being

manipulated to influence their outcome.


Furthermore, the cost and process of manual booking of services are both increasing
geometrically and tedious to execute and there has been a declining participation rate due to:

inconvenience of manual system of booking services like , mechanic is not available at that
time, new people who came to stay and also town is new for them so they get difficulty in
finding the mechanics, if the mechanics charges high price and demand for the more, also
when the mechanics does not behaves properly with customers, also some mechanics charges

low and after doing their work they charge higher prices.

3.2 Requirements Specification

3.2.1 Existing System


In many parts of our country people cannot find mechanics around them because of

several reasons. To illustrate, sometimes people may not be in their own registration region

and due to this fact, they are not able to find mechanics or are not able to contact them . In the
present system there is no such application level system provisions in the country to find

mechanics and procedure as a whole. Also, in the present status, there is no such application
in use for online mechanics help and getting problems solved very easily and effectively

structure existing in the country. All the step by step procedures are carried out by the
registered mechanics and also when their details are provided with the correct information

and job that they do. The fact is all the procedures are carried out manually , starting from the

registration process to result of booking.

If this process is done manually it wastes a lot of time and money . Thus, the present

system proves itself to be an inefficient one. The existing system is not web based. The user
or person must register themselves and then book the mechanic as per their needs and use.

13 | P a g e
Figure 3.2.1: Services provided by Mechanics

3.2.2 Proposed System


The design of any online mechanics helping system, whether electronic or manual ,
must satisfy several sometimes-competing criteria including a high degree of security and
accuracy, eligibility and authentication, integrity, verifiability and auditability, reliability,

flexibility, performance and scalability.


As India is moving towards the Digital India and the conventional findings of the

mechanics is very difficult for new people to adjust with this if any problems occur . The new

implemented website protocol has two main players : The customer and the administrator

sections. The customer (which can be found at home, in a working station, or any other

device have the function of booking). The administrator performs the function of mechanics

registration, validation of customer, database and booking the service.

The main advantages of the new protocol are the following:


1. Customer finds it easy as they need not to find them anywhere else.
2. Inured to manual troubles like mechanics not available or he his on holiday.
3. Possibility of configuration for different bookings of the services at a particular

time.

14 | P a g e
Furthermore, it is assumed that a trustworthy Administrator is available . Apart from

that, the accessibility to the customer in booking the procedure plays a special role , which
means that the booking result can be monitored and mechanics gets the work to go that to that

house and do his work. Accessibility to the customer is necessary for all booking stages.
The system is to cater for the following generic requirements:

1. Privacy: After customer login with username and password their login-info should

not get revealed or else there are chance of getting their account hacked.
2. Accuracy: Customer should book only what kind of service is been needed. They
shouldn’t book the services which is not in their use.
3. Security: Throughout the booking process, once the slot is booked they cannot

book the same service at same particular point of time again.

4. Democracy: All customers can book their particular services . One person can book
multiple services if needed.

5. Verifiability: Customers as well as mechanics both can verify the services .


Customer can verify whether service is booked or not and mechanics can verify where he has

to go, whose house he has to visit.

The system-specific requirements of the framework allow:

1. Multi-user: Several customers can book services simultaneously.


2. Availability: Whether the mechanic is available or not.

3.2.3 System Requirements

3.2.3.1 Functional Requirements


Enhancement to the online booking system will primarily provide a more precise
services management tool that will establish easy and fast services to customers , and thus

allowing customers to feel a greater level of confidence in booking. Appropriate behavior


and the functionality of a system and there is often a tight correspondence between

requirements and particular functions of the solution system.

15 | P a g e
The following represents a list of functional requirements for the online booking of
home services:

1. The system must provide customer with accurate details of the any type of event.

2. Ease of GUI use that can be accessed via web browser must be established.
3. The system must follow technical development standards supported on known
operating systems such as Windows, Linux, and UNIX, in addition to future operating

systems versions.

4. Backup data restore capabilities should be granted.


5. The system must provide data integrity checks to ensure data remains consistent

and updated.

3.2.3.2 Non - Functional Requirements


Nonfunctional requirements are requirements that are not specifically concerned with

the functionality of a system. They normally place restrictions on the product being

developed and the development process. Nonfunctional requirements may be regarded as

parameters of functionality in that they determine how quickly , how accurately, how

reliably, how securely, etc., functions must operate.

Some of the online booking of home services system’s Non - Functional


requirements are as follows:

1. Response and net processing time must be acceptable by user and by application.
2. When checking the database for errors, a 100% scan of the data is required, rather

than selecting a sample set.

3. The system must be working at 100% peak efficiency during the booking process.

4. The system should be allow adding more customers to allow better services.

16 | P a g e
5. The system should provide friendly graphical Interface to ensure ease of use when

end users utilize system functionality.

3.3 Planning and Scheduling

A Project Plan is defined as a management summary that describes the essentials of a

project in terms of its objectives , justification and how the objectives are to be achieved . It
describes how all the major activities under each project management function are to be

accomplished, including that of overall project control.

Planning of a system involves the modularization of the project in a definite number

of stages and creating a sequence of activities to be performed . The entire project can be

viewed as several independent modules. These modules follow chronological sequence. They
are:

1. Preliminary studies and investigation.

2. Data gathering or Systems study.

3. System analysis.

17 | P a g e
4. Synopsis.

5. Development of Software and Testing.

6. Implementation and Evaluation.

Project scheduling is one of the critical management tasks as it dictates the time
frames in which the project will be completed , in terms of resource requirements and the

sequence of tasks to be completed. Project scheduling is defined as the process of


determining when project activities will take place depending upon defined durations and

precedent activities. Schedule constraints specify when an activity should start or end, based

on duration, predecessors, external predecessor relationships, resource availability, target

dates or other time constraints. Project scheduling is a complex and iterative task.

Scheduling refers to the time needed to conduct systems investigations, formulate the

logical design, code the software and prepare files, develop test data, test the software and

install it. In other words, each activity is associated with the project development requires an

amount of time that must be correctly estimated and incorporated in the project schedule.

A Gantt chart is a type of bar chart that illustrates a project schedule . This chart lists

the tasks to be performed on the vertical axis, and time intervals on the horizontal axis . The
Gantt Chart shows planned and actual progress for several tasks displayed against a

horizontal time scale. It is effective and easy-to-read method of indicating the expected and

actual status for each of set of tasks compared to planned progress for each activity of the set .

Gantt Charts provide a clear picture of the current state of the project.

The figure below shows the expected and actual durations of the first half of the

project timeframe.

18 | P a g e
Figure 3.3.1: Gantt Chart for first half of the project

The figure below gives the expected duration of the second half of the project

timeframe.

19 | P a g e
Figure 3.3.2: Gantt Chart for the second half of the project

3.4 Software and Hardware Requirements

3.4.1 Hardware Requirements

20 | P a g e
 Processor: Intel Pentium IV and above
 RAM: 1GB or more
 Hard disk 250 GB and more

3.4.2 Software Requirements

 Operating System:
o Microsoft Windows
o Smart Phone: 2 GB RAM and 8 GB and more ROM

 Front End:
o PHP, CSS, HTML.
 Back End:
o SQL Server 2008 R2
o Wamp Version 1.8.3-5

Others:

1. Web Browser: Internet Explorer, Google Chrome.

Documentation:

 Microsoft Word 2010 and above


 Microsoft Excel 2010 and above

Figure 3.4.2: Logo of Software Requirements

3.5 Preliminary Product Description

1. Admin

21 | P a g e
Administrator has maximum privileges to access the system. He maintains user login
details, can assign access rights to a user, can manipulate data and do all the transactions.
Administrator is the super-user of the system.

He/she can verify service provider and customer.

He/she manages all the categories of service.

He/she can take the payment from the customer.

He/she can add the new advertisement.

He/she can send notification to the customer and service provider.

He/she can give order for service instrument to the shopkeeper.

He/she can also comment to user.

2.   Service Provider:

In this android application service provider first do registration and then login after
this process the service provider can view the service which are ordered by user and send
acknowledgement to the user in positive reply. After that service provider get the QR code
which is matched with the QR code of customer.in this application we are providing the map
for the service provider to find his location. The then service provider comes at the place of
customer then he verifies the QR code with the customer and then do his work.

3. Customer:

In this application the customer first do registration and then do login, after the user
search for the particular service and receiver the list of service available on our android
application. The user then selects the service and request for the service after this process.
He/she can get acknowledgement as reply and get QR code which is unique for every user.

3.6 Conceptual Models

22 | P a g e
3.6.1 Entity-Relationship Diagram

Figure 4.3.6: E-R Model of the project

3.6.2 Data Flow Diagram

23 | P a g e
Figure 4.3.5: Data Flow Diagram of the project

3.6.3 Use Case Diagram

3.6.3.1 Admin Use Case Diagram

24 | P a g e
Figure 3.6.3.1: Admin Use Case Diagram of the project

3.6.3.2 Service Provider Use Case Diagram

25 | P a g e
Figure 3.6.3.2: Service Provider Use Case Diagram of the project

3.6.3.3 Customer Use Case Diagram

26 | P a g e
Figure 3.6.3.3: Customer Use Case Diagram of the project

3.6.4 Sequence Diagram

3.6.4.1 Admin Sequence Diagram

27 | P a g e
Figure 3.6.4.1: Admin Sequence Diagram of the project

3.6.4.2 Service Provider Sequence Diagram

28 | P a g e
Figure 3.6.4.2: Voter Sequence Diagram of the project

3.6.4.3 Customer Sequence Diagram

29 | P a g e
Figure 3.6.4.3: Customer Sequence Diagram of the project

3.6.5 Activity Diagram

30 | P a g e
Figure 3.6.5: Activity Diagram of the Login and Registration

31 | P a g e
Chapter 4

System Design

4.1 Basic Modules

1. Administrator

In this administrator module the service provider or admin having the authorization to

access this one. Admin is the super user of the system . In this module admin or service

provider will get the requests from the customers. In this module admin will receive the all

registration request from users. These requests will be scrutinized by admin that will be

sending to concerned field mechanics for further verification . By checking verification

details from the field mechanics, the admin will take decision like accept. Admin should give

the acceptance to the customer those who have send for booking the service register .

Customer’s acceptance will be finalized by the admin itself . Administrator can view the all

users, customer’s in the form of reports.

2. Registration Module

This is a module through which general user as well as customer’s will be registered

by admin. The user should provide the Entire information about him regarding name, contact

number, etc. User should upload his / her image at the time of registration. Also, the details
filled by customer’s and respective service provider should be accurate.

3. Customer Module

It will be providing interface to the customer . By this, customers can access the

system. Credentials will be provided by admin . By using these credentials customers can

enter home page. In this module service provider can manage his personal data . Service

32 | P a g e
provider will get the queries from admin of user registration request for further verification .

Customer’s will send reply to the queries to the admin.

4. Service Provider Module

To the registration as Service provider, then the mechanics should be registered first.

The service provider registration request goes to admin . The acceptance will be given by

admin only. Customers can enter his home page by using his credentials that was accepted by

admin. In this module customers can view all the details about the service provider like
occupation, name, address, etc. this helps customer to book their mechanics as per their
requirements. Also, this benefits customer to know where the mechanics works and whether
the mechanics is in his area or is somewhere far away.

5. Reports

This module comes under admin module as sub module . By the admin can know

entire details about customer registration and different mechanics occupation wise . By this
admin can know who has booked which services

6. Authentication Module

This module contains all the information about the authenticated users . User without

his username and password can’t enter the login. If he / she is an authenticated user , only
then he / she can enter to his / her login and then he / she will have authorization based upon

their roles.

33 | P a g e
4.2 Data Design

A database design is a collection of stored data organized in such a way that the data

requirements are satisfied by the database. The general objective is to make information

access easy, quick, inexpensive and flexible for the user . There are also some specific

objectives like controlled redundancy from failure, privacy, security and performance. A

collection of relative records makes up a table. To design and store data to the needed forms

database tables are prepared.

4.2.1 Schema Design

4.2.1.1 Admin Table

Column Type Integrity Constraints

Username Varchar (50) PRIMARY KEY


Password Varchar (10) NOT NULL
Name char NOT NULL

Table 4.2.1.1: Admin Table

34 | P a g e
4.2.1.2 Service Registration Table

Column Type Integrity Constraints

Sid Int (10) PRIMARY KEY

Name Varchar (50) NOT NULL

Address Varchar (255) NOT NULL

City Varchar (50) NOT NULL

State Varchar (50) NOT NULL

Mobile No Varchar (50) NOT NULL

Email ID Varchar (50) NOT NULL


Password Varchar (10) NOT NULL
Service rate Int (10) NOT NULL
Status Varchar (20) NOT NULL
Cat_Id Varchar (50) FOREIGN KEY

Table 4.2.1.2: Service Registration Table

35 | P a g e
4.2.1.3 Customer Table

Column Type Integrity Constraints

C_ID Int (10) Primary key

C_Name Varchar (50)


Address Varchar (255)
City Varchar (50)
State Varchar (50)
Mobile_No Int (10)
Email_ID Varchar (50)
Password Varchar (10)
Status Varchar (50)

Table 4.2.1.3: Customer Table

4.2.1.4 Order Service Table

Column Data Type Indexes


Order_ID Int (10) Primary Key
C_ ID Int (10) Foreign Key
S_ ID Int (10) Foreign Key
Description Int (10)
Address Varchar (255)
City Varchar (50)
Mobile_No Varchar (10)
Book_Date Date
QR Code Varchar (20)
Status Varchar (10)

Table 4.2.1.4: Order Service Table

4.2.1.5 Category Table

36 | P a g e
Column Data Type Indexes
Cat_Id Int (10) Primary Key
Category Varchar (50) Not null
Cat_Image Varchar (50) Not null

Table 4.2.1.5: Category Service Table

4.2.1.6 Reply Detail Table

Column Datatype Indexes


Reply_ID Int (10) Primary Key
Reply_Date Date
S_Regis_ID Int (10) Foreign Key
C_Regis_ID Int (10) Foreign Key
Reply_Msg Varchar (255)
Sender Type Varchar (50)

Table 4.2.1.6: Reply Detail Table

4.2.1.7 Feedback Table

Column Data Type Indexes


FeedbackID Int (10) Primary Key
S_Regis_ID Int (10) Foreign Key
Description Varchar (255)
Feedback_Date Date

Table 4.2.1.7:
Feedback Table

4.2.2 Data Integrity and Constraints

37 | P a g e
Data integrity is used to maintain accuracy and consistency of data in a table. The
classification of data integrity is:
 Pre-Defined Integrity: We can implement this using constraint. This is further divided
into three categories –
 Entity Integrity: This integrity ensures that each row in a table is uniquely identified
entity. We can apply entity integrity by specifying primary key, unique key and not
null.
 Referential Integrity: This integrity ensures the relationship between the tables. We
can apply this using foreign key constraints.
 Domain Integrity: this integrity ensures the data values in a database follow defined
rules for values, range, and format. A database can be checked using these rules and
using Check and Default constraints.

 User Defined Integrity: We can implement this using triggers.

Constraints are used for validating or restricting data. These are mainly used to restrict data
from table. Main three types of constraints in SQL Server are:
 Default: Default constraints are used to assign the default value to the particular
column in the table. A table can contain any number of default constraints.
 Unique: Unique constraints are used to avoid duplication of data in a column but
accepts null values in column. It also applies to any datatypes.
 Not Null: These avoids null values from column-accepted duplicate values. It can also
apply on any datatype. A table can contain any number of null constraints.

4.3 Procedural Design


38 | P a g e
4.3.1 Logic Diagram

Figure 4.3.1: System Flow of the project

4.3.2 Data Structures


 Tree: Tree represents the nodes connected by edges. We will discuss binary tree or
binary search tree specifically.

Algorithm-
If root is NULL
then create root node
return
If root exists then
compare the data with node.data
while until insertion position is located
If data is greater than node.data
goto right subtree
else
goto left subtree

endwhile
39 | P a g e
insert data
end If

 Stack: A stack is an Abstract Data Type (ADT), commonly used in most programming
languages. It is named stack as it behaves like a real-world stack, for example – a deck of
cards or a pile of plates, etc.

Algorithm for peek()-


begin procedure peek
return stack[top]
end procedure

Algorithm for isfull()-


begin procedure isfull
if top equals to MAXSIZE
return true
else
return false
endif
end procedure

Algorithm for isEmpty()-


begin procedure isempty
if top less than 1
return true
else
return false
endif
end procedure

4.3.3 Algorithm Design

40 | P a g e
The below algorithm is implemented in the E –Booking System of Services.

Step 1: Start.

Step 2: Login into the system using the Credentials provided by the Admin in registered.

Step 3: If not registered, then get registered by Admin.

Step 4: After getting registered Login into the system using the credentials provided.

Step 5: After logging in into the system using correct credentials , book for your preferred

service provider.

Step 6: The booking won’t be possible if details are wrongly inserted.

Step 7: Once the booking is done you will able to see the various service providers.
Step 8: Book your services.

Step 9: Logout of the System.

Step 10: Stop.

4.4 User Interface Design

41 | P a g e
4.4.1 Home Page of the System

Figure 4.4.1: Home Page of the System

The Home Page of the system will consist of a Home Button, Login Button and

Registration Button on the upper right-hand corner . It will also display the various service

provider. After clicking on those service providers it will display the information of the
service providers.

4.4.2 Customer Login Page

42 | P a g e
Figure 4.4.2: Login Page of the System

After clicking on the login button, the user will be asked to login as an admin or a

voter and enter the credentials for the same. The login page will also consist of a Home

button, a Notifications button, a Sign In button and a Logout button to help the user logout of

the system.

43 | P a g e
4.4.3 Admin Login Page

Figure 4.4.3: Admin Login Page of the System

When the Admin logs in into his / her account after entering correct credentials he /

she will be able to manage the customers as well as the service provider. The admin can

logout of the system anytime he / she wants.

44 | P a g e
4.4.4 Customer Registration Page

Figure 4.4.4: Customer Registration Page of the System

When the customer registers into his account, he has to fill up all his details such as
name, city, email, password, re-type password, etc. out of these some of them have been
mentioned above. After registration his data will be stored in database along with all his
details.

45 | P a g e
4.4.5 Service Provider Registration Page

Figure 4.4.5: Service Provider Registration Page of the System

When the mechanics registers into his account, he has to fill up all his details such as
name, city, email, password, re-type password, occupation, etc. out of these some of them
have been mentioned above. After registration his data will be stored in database along with
all his details.

46 | P a g e
4.5 Security Issues

Electronic service booking systems represent a great security challenge . Any

successful attack would be highly visible, and thus, motivating much of the related hacking

activity to date. Traditionally, security is incorporated in a software system after all the

functional requirements have been addressed. Due to its criticality , security should be

integrated in the software life cycle . Booking software security can be achieved if security is
merged into service booking software functional requirements during the early stages of

software requirements engineering.

The implementation of this E –Service Booking System requires various technical

solutions to ensure accurate booking is done , secrecy of the accounts and security . As a

service booking method, any booking system needs confidence, without security there is no

confidence. When designing any security architecture of any service provider booking , they

should consider the insecurity of the communication medium.

The four main threats in the E – Service Booking System are: -

1. Viruses or Malicious Software

There is a threat of introducing any malicious software onto the internet service
booking server, by any communication link or email and if huge number of PCs (personal

computers) connected to the internet service booking server, then any PC which is infected

with virus, there might be a greater number of chances to spread the viruses to the service

booking server. The insecurity of the browser setup or operating system , at the user end may

easily lead to install the malicious software, and which may change the confidentiality and
integrity of the getting services booked or even the customer may face number of issues and

face lot of problems due to it.

47 | P a g e
2. Hacking

If the links of the service booking system is changed or hacked then the customer
may face difficulty in booking his/her services, which may create issues for them and not
getting issues solved immediately which may create problem for them later.

3. Data and identity theft

Data generated by unprotected gadgets and smart appliances provides cyber attackers
ample of targeted personal information that can lead to fraudulent transactions and identity
theft.

4. Denial of service attacks (DOS)

This is a threat when the customer books the services online and if the hacker
overloads the web server, then that may lead to prevent the customer from booking his/her

services. This type of attack is known as denial of service attack.

48 | P a g e
4.6 Test Cases
Testing is the process of executing a program with the intent of finding any errors .

Testing is vital to the success of the system . Without proper testing hidden errors will surface

after some time of use and perhaps irreversible damage has been done to valuable data . A

series of tests like responsiveness, its value, stress and security are performed before the

system is ready for user acceptance testing . System testing follows the logical conclusion that
is all part of the system are tested and found to be working properly under all kinds of
situations, and then the system is achieving its goal of processing the data perfectly ,

according to user rules and requirements. The different types of test cases are given below: -

Name Inputs Expected Output Actual Output Observation

User login Email id & Homepage open Homepage open Pass


password
User login Email id & Homepage open Error message Fail
password “Incorrect email id
or password”
User status Active / Inactive Access to Homepage When verified Pass
through database
User status Active / Inactive Access to Homepage When not verified Fail
through database
Apply for services Apply for the Successfully apply Apply for the service Pass
service for service successful
Apply for services Apply for the Unsuccessfully Apply for the service Fail
service apply for service unsuccessful
Generate for customer Generate the Successfully Generated details Pass
details customer details generate the details success
Generate for customer Generate the Unsuccessfully Generated details Fail
details customer details generate the details unsuccessful

Table 4.6: Test Cases for the System

49 | P a g e

You might also like