Project Report Python Project
Project Report Python Project
Project Report Python Project
ON
BACHELOR OF ENGINEERIN
IN
COMPUTER SCIENCE & ENGINEERING
Submitted to:
Submitted by:
Dheeraj Kumawat (17bcs2101), Geetam Pradhan(17bcs2102), Mohini(17bcs2115)
i
ACKNOWLEDGEMENT
We would like to express our special thanks of gratitude to our teacher who gave me the golden
opportunity to do this wonderful project on the topic health tracking/monitoring system on
python, which also helped us in doing a lot of research and we came to know about so many new
things. We are really thankful to them.
We would like to thank God, for His unending grace and love throughout our academic life.
Without it, I would not have made it this far. We would also like to thank our families for their
help and understanding throughout or academic life.
Again we would also like to thank our friends who helped us a lot in finalizing this project
within the limited time frame.
This project really helped us to learn skills of python and its functionality. I gained a lot of
knowledge while completing this project.
At last we are thankful to each and every person who helped us in completing this project.
ii
ABSTRACT
This is a live project which was developed for a local Vehicle Agent. It is useful to the Agent to
maintain the Customers details, Sales Details, Company items and services and also Vehicle
Details. If any customer buy a vehicle in loan that persons vehicle will recognizes with the help of
vehicle no. Vehicle Recognition System, which will cover the following modules The agent will
enter the Vehicle No It will help the user to search the vehicle details and the required details of
the customer .The agent enters the customer details and maintain company details. Regarding the
registration module, it contains the information about newly joined User details like name of the
user, password etc.
Vehicle Details module contains the details like Name of the Vehicle, send from, send to etc.
Billing and Payment Detail will contain the details like Actual Amount to be paid, emi. Searching
is having the details of the customer. Any agent will login and search the details of the customer it
will show all details like customer Details, vehicle name, payment type etc. This
“Vehicle Showroom Management System”
project mainly contains the vehicle information and loan recovering details. The vehicle is
purchased that vehicle amount will be cleared or not. It will clear then its ok. Other wise the agent
will search the details of the customer and recover the loan.
iii
List of Figures
3 ER diagram xiv
4 DFD diagram xv
Table(1)
iv
Table of Contents
Acknowledgement
Ii ii
Iii Abstract iii
Iv List of figures iv
V Table of contents v
Table(2)
CHAPTER 1- INTRODUCTION
v
1.1 Introduction:
This is a live project which was developed for a Vehicle Showroom. It is useful to the
Management system to maintain the customers details, Sales Detail, Company items and services
and also vehicle details.
1.3 Product Scope
We all know the importance of computerization. The world is moving ahead at lightning speed
and everyone is running short of time. One always wants to get the information and perform a
task he/she/they desire(s) within a short period of time and too with amount of efficiency and
accuracy. The application areas for the computerization have been selected on the basis of
following factors:
Minimizing the manual records kept at different locations.
vi
CHAPTER 2- SRS
1. Introduction
1.1 Purpose
The main purpose for preparing this document is to give a general insight into the analysis and
requirements of the existing system or situation and for determining the operating characteristics
of the system.
1.2 Document Conventions
When writing this SRS for the Vehicle showroom management system, the following
terminologies and standards are used:
● Application Program Interface (API): Set of programming instructions and
standards for accessing a Web based software application or Web tool.
● Application : a software or program which is designed for use by an end-user for specific
operations.
1.3 Product Scope
This Document plays a vital role in the development life cycle (SDLC) and it describes the
complete requirement of the system. It is meant for use by the developers and will be the basic
during testing phase. Any changes made to the requirements in the future will have to go through
formal change approval process.
vii
2. Overall Description
2.1 Product Perspective
A strategy where we architect, integrate and manage technology services and solutions - we
call it AIM for success.
A robust offshore development methodology and reduced demand on customer resources.
A focus on the use of reusable frameworks to provide cost and times benefits.
They combine the best people, processes and technology to achieve excellent results -
consistency. We offer customers the advantages of:
They understand the importance of timing, of getting there before the competition. A rich
portfolio of reusable, modular frameworks helps jump-start projects. Tried and tested
methodology ensures that we follow a predictable, low - risk path to achieve results. Our track
record is testimony to complex projects delivered within and evens before schedule.
Our teams combine cutting edge technology skills with rich domain expertise. What’s equally
important - they share a strong customer orientation that means they actually start by listening to
the customer. They’re focused on coming up with solutions that serve customer requirements
today and anticipate future needs.
2.2 Product Functions
As far as the project is developed the functionality is simple, the objective of the proposal is to
strengthen the functioning of Audit Status Monitoring and make them effective and better. The
entire scope has been classified into five streams knows as Coordinator Level, management
Level, Auditor Level, User Level and State Web Coordinator Level. The proposed software will
cover the information needs with respect to each request of the user group viz. accepting the
request, providing vulnerability document report and the current status of the audit.
viii
2.3 User Classes and Characteristics
The initial users of our application front end will be health and/or fitness conscious individuals
who are familiar with operating application .Health and/or fitness conscious individuals that may
use this application include (but are not limited to), personal trainers, athletes, dieters, and
people looking to live a healthy life. This software application will not be focused on meeting
the needs of people not interested in personal health.
3. System Features
3.1 Functional Requirements
As far as the project is developed the functionality is simple, the objective of the proposal is to
strengthen the functioning of Audit Status Monitoring and make them effective and better. The
entire scope has been classified into five streams knows as Coordinator Level, management
Level, Auditor Level, User Level and State Web Coordinator Level. The proposed software will
cover the information needs with respect to each request of the user group viz. accepting the
request, providing vulnerability document report and the current status of the audit.
INPUT AND OUTPUT
The main inputs, outputs and major functions of the system are as follows
INPUTS:
ix
1 Operator receives the personal details.
1 Technicians receive personal and technical details.
1 Users receive requested reports.
1 Displays search result.
4. Other Requirements and Concerns
4.1 Nonfunctional Requirements
Preliminary investigation examine project feasibility, the likelihood the system will be useful to
the organization. The main objective of the feasibility study is to test the Technical, Operational
and Economical feasibility for adding new modules and debugging old running system. All
system is feasible if they are unlimited resources and infinite time. There are aspects in the
feasibility study portion of the preliminary investigation:
1 Technical Feasibility
1 Operation Feasibility
1 Economical Feasibility
Technical Feasibility
The technical issue usually raised during the feasibility stage of the investigation includes the
following:
x
Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation System’.
The current system developed is technically feasible. It is a web based user interface for audit
workflow at NIC-CSD. Thus it provides an easy access to the users. The database’s purpose is to
create, establish and maintain a workflow among various entities in order to facilitate all
concerned users in their various capacities or roles. Permission to the users would be granted
based on the roles specified. Therefore, it provides the technical guarantee of accuracy,
reliability and security. The software and hard requirements for the development of this project
are not many and are already available in-house at NIC or are available as free as open source.
The work for the project is done with the current equipment and existing software technology.
Necessary bandwidth exists for providing a fast feedback to the users irrespective of the number
of users using the system.
Operational Feasibility
Proposed projects are beneficial only if they can be turned out into information system. That will
meet the organization’s operating requirements. Operational feasibility aspects of the project are
to be taken as an important part of the project implementation. Some of the important issues
raised are to test the operational feasibility of a project includes the following: -
The well-planned design would ensure the optimal utilization of the computer resources and
would help in the improvement of performance status.
Economic Feasibility
A system can be developed technically and that will be used if installed must still be a good
investment for the organization. In the economical feasibility, the development cost in creating
xi
the system is evaluated against the ultimate benefit derived from the new systems. Financial
benefits must equal or exceed the costs.
The system is economically feasible. It does not require any addition hardware or software.
Since the interface for this system is developed using the existing resources and technologies
available at NIC, There is nominal expenditure and economical feasibility for certain.
4.2 Security and Confidentiality Requirements
SYSTEM SECURITY refers to the technical innovations and procedures applied to the
hardware and operation systems to protect against deliberate or accidental damage from a
defined threat.
DATA SECURITY is the protection of data from loss, disclosure, modification and destruction.
SYSTEM INTEGRITY refers to the power functioning of hardware and programs, appropriate
physical security and safety against external threats such as eavesdropping and wiretapping.
PRIVACY defines the rights of the user or organizations to determine what information they are
willing to share with or accept from others and how the organization can be protected against
unwelcome, unfair or excessive dissemination of information about it.
4.3 Safety Concerns
System security refers to various validations on data in form of checks and controls to avoid the
system from failing. It is always important to ensure that only valid data is entered and only valid
operations are performed on the system. The system employees two types of checks and
controls:
xii
Technology Used: ASP.net
Operating System Used: Windows 10 / 8
Hardware requirements:
Core i5(Processor)
4 GB RAM
3 MB Cache memory
Hard Disk 10GB
Software requirements
Windows 10
Front-End:
As we know that such computer language can be use in software development, which must have
the following criteria
xiii
Convenient in coding
Lesser input provides larger output
Highly efficient and productive
Compatibility with other language and other tools
User Interface:
USER INTERFACE DESIGN
It is essential to consult the system users and discuss their needs while designing the user
interface:
In the computer initiated interfaces the computer guides the progress of the user/computer
dialogue. Information is displayed and the user response of the computer takes action or
displays further information.
USER_INITIATED INTERGFACES
User initiated interfaces fall into two approximate classes:
1. Command driven interfaces: In this type of interface the user inputs commands or queries
which are interpreted by the computer.
1. Forms oriented interface: The user calls up an image of the form to his/her screen and
fills in the form. The forms oriented interface is chosen because it is the best choice.
xiv
CHAPTER-3
3.1 ER diagram for project:
xv
Fig(1)
xvi
xvii
3.3 DFD DIAGRAM
Level 0:
xviii
Level 1:
xix
Level 2:
xx
CHAPTER-4
xxi
Methodology
Model View Controller or MVC as it is popularly called, is a software design pattern for
developing web applications. A model View Controller pattern is made up of the following three
parts:
Model - The lowest level of the pattern which is responsible for maintaining data.
View – This is responsible for displaying all or a portion of the data to the user.
Controller – Software Code that controls the interactions between the model and view.
MVC is popular as it isolates the application logic from the user interface layer and supports
separation of concerns. Here the controller receives all request for the application and then works
with the model to prepare any data needed by the view. The View then uses the data prepared by
the controller to generate a final presentable response. The MVC abstraction can be graphically
represented as follows.
ndently.
xxii
BENEFITS:
The project is identified by the merits of the system offered to the user. The merits of this project
are as follows: -
xxiii
LIMITATIONS:
1 The size of the database increases day-by-day, increasing the load on the database back
up and data maintenance activity.
2 Training for simple computer operations is necessary for the users working on the
system.
CHAPTER-7
References
xxiv
www.msdn.microsoft.com/net/quickstart/aspplus/default.com
www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com
www.asptoday.com
www.aspfree.com
www.4guysfromrolla.com/index.aspx
xxv