Crop Management System
Crop Management System
Crop Management System
The crop is basic reason of production of food and raw material, which eventually is reason
of survival of the population. In Indian most of the population is dependent on crops. However,
there is also need to review and revitalize the mechanism for updating the technology. In the
upcoming years agriculture will see major changes. The main purpose for such project is to develop
a mobile phonebased solution that helps in crop management, leads to agricultural yield
improvement and helps in care/maintenance of the crops. The large amount of crop is getting
damage in the field due to the bacterial attacks and lack of information resources. Annually, such
loss exceeds 40% in total. So, the paper presented here suggest various ways in which a farmer
can utilize on their handsets using application called “crop management system”, to assist them
for relatively better cultivation and merchandise. Our proposed crop management system
application will provides the details about customer and farmer and also it avoids the third party
buyer problem which cause problem for farmers. This project used to search for fertilizer and
cultivate crop. This helps to update the fertilizer and crop and cultivate. And shows the result of
TITLE PAGENO
ABSTRACT
LIST OF TABLES
LIST OF FIGURES
LIST OF ABBREVATIONS
1. INTRODUCTION
1.1Synopsis
1.2Objective
2. SYSTEM ANALYSIS
4. SOFTWARE DESCRIPTION
5. SYSTEM DESIGN
6. IMPLEMENTATION
• Module description
• Home Module
• Fertilizer Module
• Crop Module
7. SYSTEM TESTING
8. CONCLUSION
8.1 Summary
APPENDIX 1
APPENDIX 2
LITERTURE REVIEW
REFERENCES
CHAPTER 1
INTRODUCTION
Business Process Outsourcing and Human Resource Consultant with a dictum to provide
We believe in strategic partners rather than solution providers in our professional arena
that allows transforming higher business results than fulfilling the business operation alone.
Our Service towards the higher vision and dictum provisions the optimal solution to any target
We are open to technological challenges with Strategic scheme that experiences you from
a well-planned requirement initiative to quality business deliverables with great efficiency and
responsiveness.
WIKITECHY INFOTECH-MISSION
team of highly motivated managers and staff dedicated to providing the best products and
services available in the industry. Our Strength is greater from our Commitment towards our
accountability
WEBSITE MAINTENANCE
Creating a website is easy when compared to maintain it. Over the years we have been
developing websites and we have realized that maintaining a site can require more money and
effort than developing it. If you don’t want to spend your time updating your website, then let us
A Website with informative and educational content is a desirable place to visit and will
leave your visitors to feel that they have gained something value from it. Content that tells your
visitors about your services and products and helps your customers to choose before they buy or
We have well experienced and ever-growing database of content writers and researchers. Our
clients have been excited with the content developed for their websites. Our team of content writers
is huge, creative, and professional. They have covered up various topics like hostels, machineries,
R&D
Our R&D staff with rich and vivid experience work round the clock with innovative skills,
updated software technologies and perfect interpersonal learning, which makes this division an
unique one. Our researchers utilize advanced search techniques and carry out research on many
search engines and other search tools on the world wide web.
program is one of our challenging and complicated projects constructed in drupal. Since,
customer is enforcing in drupal. We have done the project with the technology specified
by the customer. This project focuses towards grouping the entire Nursing community
under a single roof. This project incorporates many more functionalities like integrating
the existing databases with our app, social plugin and functional integrations related to
Social Networking.
• Project Name:
Khalidharr portal Description: A project from Arab Emirates and it's one of a very
it's step towards transportation domain. This project is a mix up of PHP API, MySQL,
CSS and Java Scripts. This project is in progress with the customer.
• Project Name:
Hello Cars Revamp System Description : Hello Cars is one of our Indian projects and it's
given to one of the car re-seller company. It’s a very common platform to maintain
management, financial solution. A comprehensive platform focusing each and every layer
of business for the company. This project is primary done in Dotnet 4.0, VS2010 with SQL
CHAPTER 2
Online Crop management system project is aimed to developed an online crop managing
information. Every organization has different crop management needs; therefore, we design
exclusive crop management systems that are adapted to our managerial requirements. This is
designed to assist in strategic planning and will help you ensure that in your organization is
equipped with the right level of human resources for your future goals. This helps the customer to
get products to cultivate crop and fertilizer. Which means the allocation of time periods for
agriculture. There is no existing project to develop. This gets detailed information to develop for
Our proposed crop management system application will provides the details
about customer and farmer and also it avoids the third party buyer problem which cause problem
for farmers.
The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system analysis the
feasibility study of the proposed system is to be carried out. This is to ensure that the proposed
system is not a burden to the company. For feasibility analysis, some understanding of the major
• TECHNICAL FEASIBILITY
• ECONOMIC FEASIBILITY
• OPERATIONAL FEASIBILITY
2.4.1 TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical requirements
of the system. Any system developed must not have a high demand on the available technical
resources. This will lead to high demands on the available technical resources. This will lead to
high demands being placed on the client. The developed system must have a modest requirement,
as only minimal or null changes are required for implementing this system.
equipment). It also studies the availability of the technical manpower for the project.
• Analyzes the technical skills and capabilities of the software development team members
• Determines whether the relevant technology is stable and established. This statement was
agreed by our application. The software which is used can able to solve the problem in the
• Backend software Sql server 2008 R2, in this software installation, become more
complications such as having the server name, local host number, database name then the
Operational feasibility assesses the extent to which the required software performs a series
of steps to solve business problems and user requirements. This feasibility is dependent on human
resources (software development team) and involves visualizing whether the software will operate
after it is developed and be operative once it is installed. Operational feasibility are generally
Process: Using this online shipping management application makes the customer to feel
friendly.
Evaluation: This process can able to work wherever this application get used.
Implementation: The project gets implemented with calculating the total amount of goods
with updated GST tax is displayed and sent to the customer mobile through SMS
high priority
team is acceptable
Operational Feasibility study is necessary as it ensures that the project developed can be
successfully implemented. Everything is provided in easy access manner so that any novice users
financial gains for an organization. It involves the cost incurred on the software development team,
estimated cost of hardware and software, cost of performing feasibility study, and so on. For this,
it is essential to consider expenses made on purchases (such as hardware purchase) and activities
required to carry out software development. In addition, it is necessary to consider the benefits that
• Cost required to conduct full software investigation (such as requirements elicitation and
requirements analysis)
The human needs which are targeted by the project or product are only satisfied during. The
last stage of the product or project life cycle, the stage of operation and maintenance.
The services that satisfy the targeted human needs are valued by attaching a market price to
them and counting them. In this way, the utility value of the product or service is determined.
The various stages in the life cycle of an engineering product or project are also associated
with costs, or value sacrificed to create utility value. These costs are incurred during all the stages,
namely:
Accounting profit
The accounting concept of profit is defined as value created in excess of value sacrificed, by
an economic unit or investment project, during an accounting period (usually not exceeding one
year). This can also be expressed through the accounting principles of revenue (value created
Planning plays vital role in any types of project. In this project also planned in such a manner and
• 16-01-18 to 19-01-18 Assigning the front end and back end for project.
3.1 INTRODUCTION
Requirement specification involves studying the current business system to find out how it
works and where improvements should be made. The requirement is the feature that must be
included in a new system. The analysis of requirements should study and collecting the details of
existing system. Software requirements specification (SRS) is the technical way of expressing the
requirements for software product. It is treated as the first task of development Process. The
The software requirements specification is produced at the conclusion of the analysis tasks.
The function and performance allocated to software as part of system engineering are refined by
tasks that go into determining the needs or conditions to meet for a new or altered product or
requirements.
Requirements analysis is critical to the success or failure of a systems or software project. The
identified business needs or opportunities, and defined to a level of detail sufficient for system
design.
3.2.1 PURPOSE
This project is aimed to develop the “Crop Management System” for reducing the manual
evaluating the performance of the crop and give the accurate result about crop to manage their
periods.
3.2.2 SCOPE
This allows a page to have more links than the out-degree threshold if the cost is reasonable
and hence offers a good balance between minimizing changes to a website and reducing
information overload to users. Third, we propose two evaluation metrics and use them to assess
the improved structure to confirm the validity of our model. The evaluation procedure developed
in this paper provides a framework for evaluating website structures win similar studies.
3.2.3 OVERVIEW
the overall system is too clumsy and complicated., time complexity and also the farmer facing lot
of problems to know their schedule details for every periods. It manages every product for the crop
stored in database.
online, it consists of many functions i.e. maintain admin module, admin user registration module,
login page module, staff detail module, staff vs leave module staff vs subject allocation module,
final reallocation module, admin has full authority for managing the entire process.
• USER CHARACTERISTICS
The admin has to login into the application by using the login id and password. It displays
an admin interface for user authentication. This login page for a project is used to provide a proper
genuine authentication to the application with this we can restrict the unauthorized and illegal users
in to the application It act as a very great security feature to the application. If the Admin use
proper user id and password it enters in to application or else it returns back in to the authentication
• GENERAL CONSTRAINTS
• System should have a facility for displaying total amount with updated GST tax for the
goods.
• System should allow the admin to maintain the entire process of application.
• System should allow the admin to create report to entire system process.
• FUNCTIONAL REQUIREMENTS
The relationship between Input and Output to the system is determined by the functional
requirement of the Software Requirement Specifications. The system should provide how the
system should react toparticular input sand how the system should behave in particular situations.
Functional requirements may be calculations, technical details, data manipulation and processing
and other specific functionality that define what a system is supposed to accomplish.
As in the functional requirements the process involved are accept of submissions in form
of customer and perform calculation analysis of the total amount with the GST tax for the goods.
Performance Requirements
Performance depends on two basic factors, they are time complexity and space complexity.
Time
This is one of the most important factors, as the response time has to be minimal to facilitate
Space
Now a day’s storage space has become cheap and is not that much of constraints in software
development.
• The prime requirement is that no error condition causes a project to exit abruptly.
• All the system generated error is directed to a separate page through proper “try and catch
• Any error occurred in any process should return an error messages about the nature of the
Risk analysis is a process that helps you identify and manage potential problems that could
To carry out the risk analysis, you must first identify the possible threats that you face, and
Risk analysis can be complex, as you will need to draw on detailed information such as
project plans, financial data, security protocols, marketing forecasts and other relevant
information. However, it’s essential planning tool, and one that could save time, money, and
reputations.
• INTERFACE REQUIREMENTS
produce the specification analysis of the task and also to establish complete information about the
requirement, behaviour and other constraints such as functional performance and so on.
During data collection, we investigated and found how the current system operates not only
that we also found which are all the problems are faced and how best they can be settled.
The customer described some of the basic requirements of the system that includes
calculating the amount and sent through SMS to the customer and viewing report.
• RAM : 4 GB
• IDE : C#.Net
3.2.7.1 SECURITY
Network Applications are available via network access, it is difficult, if not impossible, to
In order to protect sensitive content and provide secure modes of data transmission, strong security
Security has to be enforced at two levels. At first level, no one other than the person, who
knows the user name and password, can be able to logon to the system. At the next level, measures
have to be taken so that any normal person does not exercise any of the administrator rights.
3.2.7.2 RELIABILITY
Reliability is the ability of a system to remain operational over time. Reliability is measured
as a probability that a system will not fail to perform its intended functions over a specified time
interval.
3.2.7.3 MAINTAINABILITY
The term software maintenance is commonly used to refer to the modifications that are
made to a software system. This system is developed with ease of maintenance in mind. The
modules in this project are clearly documented and have power over the least degree of coupling
Maintainability is the ease with which a product can be maintained in order to:
working parts
Usability defines how well the application meet the requirements of the user and consumer
by being intuitive, easy to localize and globalize, providing good access for disabled users, and
The application will be developed using standard open source software like java, tomcat web
server, internet explorer browser etc. This software will work both on windows and Linux
SOFTWARE DESCRIPTION
The .NET Framework is a new computing platform that simplifies application development in the
There are different types of application, such as Windows-based applications and Web-based
The common language runtime is the foundation of the .NET Framework. It manages code at
execution time, providing important services such as memory management, thread management,
and remoting and also ensures more security and robustness. The concept of code management is
a fundamental principle of the runtime. Code that targets the runtime is known as managed code,
while code that does not target the runtime is known as unmanaged code.
applications based on the latest innovations provided by ASP.NET, such as Web Forms and XML
Web services.
The .NET Framework can be hosted by unmanaged components that load the common language
runtime into their processes and initiate the execution of managed code, thereby creating a software
environment that can exploit both managed and unmanaged features. The .NET Framework not
only provides several runtime hosts, but also supports the development of third-party runtime
hosts.
Internet Explorer is an example of an unmanaged application that hosts the runtime (in the form
of a MIME type extension). Using Internet Explorer to host the runtime to enables embeds
The common language runtime manages memory; thread execution, code execution, code safety
verification, compilation, and other system services these are all run on CLR.
• Security.
• Robustness.
• Productivity.
• Performance.
Security
The runtime enforces code access security. The security features of the runtime thus enable
managed components are awarded varying degrees of trust, depending on a number of factors that
include their origin to perform file-access operations, registry-access operations, or other sensitive
functions.
ROBUSTNESS:
The runtime also enforces code robustness by implementing a strict type- and code-verification
infrastructure called the common type system(CTS). The CTS ensures that all managed code is
self-describing. The managed environment of the runtime eliminates many common software
issues.
PRODUCTIVITY:
The runtime also accelerates developer productivity. For example, programmers can write
applications in their development language of choice, yet take full advantage of the runtime, the
PERFORMANCE:
The runtime is designed to enhance performance. Although the common language runtime
provides many standard runtime services, managed code is never interpreted. A feature called just-
in-time (JIT) compiling enables all managed code to run in the native machine language of the
system on which it is executing. Finally, the runtime can be hosted by high-performance, server-
side applications, such as Microsoft® SQL Server™ and Internet Information Services (IIS).
ASP.NET
ASP.NET is the next version of Active Server Pages (ASP); it is a unified Web development
platform that provides the services necessary for developers to build enterprise-class Web
applications. While ASP.NET is largely syntax compatible, it also provides a new programming
model and infrastructure for more secure, scalable, and stable applications.
compatible language, including Visual Basic .NET, C#, and JScript .NET. Additionally, the entire
.NET Framework is available to any ASP.NET application. Developers can easily access the
benefits of these technologies, which include the managed common language runtime environment
ASP.NET has been designed to work seamlessly with WYSIWYG HTML editors and other
programming tools, including Microsoft Visual Studio .NET. Not only does this make Web
development easier, but it also provides all the benefits that these tools have to offer, including a
GUI that developers can use to drop server controls onto a Web page and fully integrated
debugging support.
Developers can choose from the following two features when creating an ASP.NET application.
Web Forms and Web services or combine these in any way they see fit. Each is supported by the
same infrastructure that allows you to use authentication schemes; cache frequently used data, or
can use ASP.NET server controls to create common UI elements, and program them for common
tasks. These controls allow we to rapidly build a Web Form out of reusable built-in or custom
An XML Web service provides the means to access server functionality remotely. Using Web
services, businesses can expose programmatic interfaces to their data or business logic, which in
turn can be obtained and manipulated by client and server applications. XML Web services enable
the exchange of data in client-server or server-server scenarios, using standards like HTTP and
XML messaging to move data across firewalls. XML Web services are not tied to a particular
using any component model, and running on any operating system can access XML Web services
Each of these models can take full advantage of all ASP.NET features, as well as the power of the
Accessing databases from ASP.NET applications is an often-used technique for displaying data to
Web site visitors. ASP.NET makes it easier than ever to access databases for this purpose. It also
ASP.NET provides a simple model that enables Web developers to write logic that runs at the
application level. Developers can write this code in the global.aspx text file or in a compiled class
deployed as an assembly. This logic can include application-level events, but developers can easily
developers and are readily compatible with all other .NET Framework APIs.
ASP.NET offers the HttpHandler and HTTP Module interfaces. Implementing the IHttpHandler
interface gives you a means of interacting with the low-level request and response services of the
IIS Web server and provides functionality much like ISAPI extensions, but with a simpler
programming model. Implementing the IHttpModule interface allows you to include custom
ASP.NET takes advantage of performance enhancements found in the .NET Framework and
common language runtime. Additionally, it has been designed to offer significant performance
improvements over ASP and other Web development platforms. All ASP.NET code is compiled,
rather than interpreted, which allows early binding, strong typing, and just-in-time (JIT)
compilation to native code, to name only a few of its benefits. ASP.NET is also easily factorable,
meaning that developers can remove modules (a session module, for instance) that are not relevant
ASP.NET provides extensive caching services (both built-in services and caching APIs).
ASP.NET also ships with performance counters that developers and system administrators can
Writing custom debug statements to your Web page can help immensely in troubleshooting your
application's code. However, it can cause embarrassment if it is not removed. The problem is that
removing the debug statements from your pages when your application is ready to be ported to a
pages as we develop them. They appear only when you have enabled tracing for a page or entire
application. Enabling tracing also appends details about a request to the page, or, if you so specify,
to a custom trace viewer that is stored in the root directory of your application.
The .NET Framework and ASP.NET provide default authorization and authentication schemes for
Web applications. we can easily remove, add to, or replace these schemes, depending upon the
ASP.NET configuration settings are stored in XML-based files, which are human readable and
writable. Each of our applications can have a distinct configuration file and we can extend the
As you develop applications using ADO.NET, you will have different requirements for working
with data. You might never need to directly edit an XML file containing data - but it is very useful
• Interoperability
• Maintainability
• Programmability
• Performance Scalability
INTEROPERABILITY:
ADO.NET applications can take advantage of the flexibility and broad acceptance of XML.
Because XML is the format for transmitting datasets across the network, any component that can
read the XML format can process data. The receiving component need not be an ADO.NET
component.
The transmitting component can simply transmit the dataset to its destination without regard
to how the receiving component is implemented. The destination component might be a Visual
Studio application or any other application implemented with any tool whatsoever.
The only requirement is that the receiving component be able to read XML. SO, XML was
MAINTAINABILITY:
In the life of a deployed system, modest changes are possible, but substantial, Architectural
changes are rarely attempted because they are so difficult. As the performance load on a deployed
application server grows, system resources can become scarce and response time or throughput
can suffer. Faced with this problem, software architects can choose to divide the server's business-
logic processing and user-interface processing onto separate tiers on separate machines.
In effect, the application server tier is replaced with two tiers, alleviating the shortage of system
various ways that help you program more quickly and with fewer mistakes.
PERFORMANCE:
ADO.NET datasets offer performance advantages over ADO disconnected record sets. In
SCALABILITY:
resources. Any ADO.NET application employs disconnected access to data; it does not retain
Visual Studio .NET is a complete set of development tools for building ASP Web applications,
XML Web services, desktop applications, and mobile applications In addition to building high-
performing desktop applications, you can use Visual Studio's powerful component-based
development tools and other technologies to simplify team-based design, development, and
Visual Basic .NET, Visual C++ .NET, and Visual C# .NET all use the same integrated
development environment (IDE), which allows them to share tools and facilitates in the creation
of mixed-language solutions. In addition, these languages leverage the functionality of the .NET
Framework and simplify the development of ASP Web applications and XML Web services.
Visual Studio supports the .NET Framework, which provides a common language runtime and
unified programming classes; ASP.NET uses these components to create ASP Web applications
and XML Web services. Also, it includes MSDN Library, which contains all the documentation
XML Web services are applications that can receive the requested data using XML over HTTP.
XML Web services are not tied to a particular component technology or object-calling convention
but it can be accessed by any language, component model, or operating system. In Visual Studio
.NET, you can quickly create and include XML Web services using Visual Basic, Visual C#,
XML SUPPORT:
Extensible Markup Language (XML) provides a method for describing structured data. XML is a
subset of SGML that is optimized for delivery over the Web. The World Wide Web Consortium
(W3C) defines XML standards so that structured data will be uniform and independent of
applications. Visual Studio .NET fully supports XML, providing the XML Designer to make it
Visual Basic.NET, the latest version of visual basic, includes many new features. The Visual Basic
Visual Basic.NET is also compliant with CLS (Common Language Specification) and supports
structured exception handling. CLS is set of rules and constructs that are supported by the CLR
(Common Language Runtime). CLR is the runtime environment provided by the .NET
Framework; it manages the execution of the code and also makes the development process easier
by providing services.
Visual Basic.NET is a CLS-compliant language. Any objects, classes, or components that created
in Visual Basic.NET can be used in any other CLS-compliant language. In addition, we can use
objects, classes, and components created in other CLS-compliant languages in Visual Basic.NET.
The use of CLS ensures complete interoperability among applications, regardless of the languages
IMPLEMENTATION INHERITANCE:
Visual Basic.NET supports implementation inheritance. This means that, while creating
applications in Visual Basic.NET, we can drive from another class, which is know as the base class
that derived class inherits all the methods and properties of the base class. In the derived class, we
can either use the existing code of the base class or override the existing code. Therefore, with help
Constructors are used to initialize objects, whereas destructors are used to destroy
them. In other words, destructors are used to release the resources allocated to the object. In Visual
Basic.NET the sub finalize procedure is available. The sub finalize procedure is used to complete
the tasks that must be performed when an object is destroyed. The sub finalize procedure is called
automatically when an object is destroyed. In addition, the sub finalize procedure can be called
GARBAGE COLLECTION:
Garbage Collection is another new feature in Visual Basic.NET. The .NET Framework
monitors allocated resources, such as objects and variables. In addition, the .NET Framework
automatically releases memory for reuse by destroying objects that are no longer in use. In Visual
Basic.NET, the garbage collector checks for the objects that are not currently in use by
applications. When the garbage collector comes across an object that is marked for garbage
OVERLOADING:
multiple procedures with the same name, where each procedure has a different set of arguments.
Besides using overloading for procedures, we can use it for constructors and properties in a class.
MULTITHREADING:
can handle multiple tasks simultaneously, we can use multithreading to decrease the time taken by
respond to user interaction, we must ensure that a separate thread in the application handles user
interaction.
Visual Basic.NET supports structured handling, which enables us to detect and remove errors
exception handlers. Using Try…Catch…Finally statements, we can create robust and effective
The OLAP Services feature available in SQL Server version 7.0 is now called SQL Server 2000
Analysis Services. The term OLAP Services has been replaced with the term Analysis Services.
Analysis Services also includes a new data mining component. The Repository component
available in SQL Server version 7.0 is now called Microsoft SQL Server 2000 Meta Data Services.
References to the component now use the term Meta Data Services. The term repository is used
They are,
1. TABLE
2. QUERY
3. FORM
4. REPORT
5. MACRO
TABLE:
VIEWS OF TABLE:
1. Design View
2. Datasheet View
Design View
To build or modify the structure of a table we work in the table design view. We can specify
Datasheet View
To add, edit or analyses the data itself we work in tables datasheet view mode.
QUERY:
A query is a question that has to be asked the data. Access gathers data that answers the
question from one or more table. The data that make up the answer is either dynaset (if you edit it)
or a snapshot (it cannot be edited). Each time we run query, we get latest information in the
dynaset.Access either displays the dynaset or snapshot for us to view or perform an action on it
FORMS:
A form is used to view and edit information in the database record by record .A form
displays only the information we want to see in the way we want to see it. Forms use the familiar
controls such as textboxes and checkboxes. This makes viewing and entering data easy.
Views of Form:
We can work with forms in several primarily there are two views,
They are,
1. Design View
2. Form View
Design View
To build or modify the structure of a form, we work in forms design view. We can add control
to the form that are bound to fields in a table or query, includes textboxes, option buttons, graphs
and pictures.
Form View
The form view which display the whole design of the form.
REPORT:
A report is used to vies and print information from the database. The report can ground
records into many levels and compute totals and average by checking values from many records
at once. Also, the report is attractive and distinctive because we have control over the size and
appearance of it.
MACRO:
A macro is a set of actions. Each action in macros does something. Such as opening a form or
printing a report. We write macros to automate the common tasks the work easy and save the time.
MODULE:
Modules are units of code written in access basic language. We can write and use module to
SYSTEM ANALYSIS
4.1 INTRODUCTION
System analysis is the process of studying a procedure or business in order to identify its
goals and purposes and create systems and procedures that will achieve them in an efficient way.
Another view sees system analysis as a problem-solving technique that breaks down a system into
its component pieces for the purpose of the studying how well those component parts work and
SYSTEM DESIGN
procedural details, (algorithms etc.) and interface between modules. The design process also
translates the requirements into the presentation of software that can be accessed for quality
Computer software design changes continuously as new methods; better analysis and
broader understanding evolved. Software Design is at relatively early stage in its revolution.
Therefore, Software Design methodology lacks the depth, flexibility and quantitative
nature that are normally associated with more classical engineering disciplines. However,
techniques for software designs do exist, criteria for design qualities are available and design
Input design is one of the most expensive phases of the operation of computerized system and is
Output design generally refers to the results and information that are generated by the
system for many end-users; output is the main reason for developing the system and the basis on
which they evaluate the usefulness of the application. In any system, the output design
A use case diagram at its simplest is a representation of a user's interaction with the system
that shows the relationship between the user and the different use cases in which the user is
involved. A use case diagram can identify the different types of users of a system and the different
use cases and will often be accompanied by other types of diagrams as well.
Only static behaviour is not sufficient to model a system rather dynamic behaviour is more
important than static behaviour. In UML, there are five diagrams available to model the dynamic
nature and use case diagram is one of them. Now as we have to discuss that the use case diagram
is dynamic in nature, there should be some internal or external factors for making the interaction.
These internal and external agents are known as actors. Use case diagrams consists of
actors, use cases and their relationships. The diagram is used to model the system/subsystem of
Sequence diagram is the most common kind of interaction diagram, which focuses on
are exchanged, along with their corresponding occurrence specifications on the lifelines.
UML sequence diagrams are used to show how objects interact in a given situation.
An important characteristic of a sequence diagram is that time passes from top to bottom
the interaction starts near the top of the diagram and ends at the bottom (i.e. Lower equals Later).
A popular use for them is to document the dynamics in an object-oriented system. For each key
collaboration, diagrams are created that show how objects interact in various representative
scenarios for that collaboration. The sequence diagram captures the time sequence of the message
Activity diagram is another important diagram in UML to describe the dynamic aspects of
the system. Activity diagram is basically a flowchart to represent the flow from one activity to
another activity. The activity can be described as an operation of the system. The control flow is
This flow can be sequential, branched, or concurrent. Activity diagrams deal with all type
of flow control by using different elements such as fork, join, etc. Activity diagrams are graphical
representations of workflows of stepwise activities and actions with support for choice, iteration
and concurrency. In the Unified Modeling Language, activity diagrams are intended to model
In software engineering, a class diagram in the UML is a type of static structure diagram
that describes the structure of a system by showing the system classes, their attributes, operations
and the relationship among the classes. It explains which class contains information’s and shows
a collection of static model elements such as classes and types, their contents, and their
relationship.
CHAPTER 5
SYSTEM DESIGN
5.1 INTRODUCTION
System design is the process of defining the elements of a system such as the
architecture, modules and components, the different interfaces of those components and the data
that goes through that system. It is meant to satisfy specific needs and requirements of a business
The design process for identifying the sub-systems making up a system and the
framework for sub-system control and communication is architectural design. The output of this
• It defines an abstraction level at which the designers can specify the functional and
• It develops and documents top-level designs for the external and internal interface
• It defines and documents preliminary test requirements and the schedule for software
integration.
System architecture is a conceptual model that defines the structure, behaviour, and more views of
organized in a way that supports reasoning about the structure and behaviour of the system.
Architecture Design Representation
components.
2. Dynamic model: Specifies the behavioural aspect of the software architecture and
indicates how the structure or system configuration changes as the function changes due to change
3. Process model: Focuses on the design of the business or technical process, which must
encountered in similar types of application. This leads to an increase in the level of abstraction.
Data design is the first design activity, which results in less complex, modular and
efficient program structure. The information domain model developed during analysis phase is
The data objects, attributes, and relationships depicted in entity relationship diagrams and
the information stored in data dictionary provide a base for data design activity.
During the data design process, data types are specified along with the integrity rules
required for the data. For specifying and designing efficient data structures, some principles should
• The data structures needed for implementing the software as well-as the operations that can
• A data dictionary should be developed to depict how different data objects interact with
each other and what constraints are to be imposed on the elements of data structure.
• Stepwise refinement should be used in data design process and detailed design decisions
• Only those modules that need to access data stored in a data structure directly should be
• A library containing the set of useful data structures along with the operations that can be
graphical representation of entities and their relationships to each other, typically used in
User interface is the front-end application view to which user interacts in order to use
the software. User can manipulate and control the software as well as hardware by means of user
interface. Today, user interface is found at almost every place where digital technology exists,
right from computers, mobile phones, cars, music players, airplanes, ships etc.
User interface engineering is the design of user interfaces for machines and software,
such as computers, home appliances, mobile devices, and other electronic devices, with the focus
on maximizing usability and the user experience. The goal of user interface design is to make the
user's interaction as simple and efficient as possible, in terms of accomplishing user goals (user-
cantered design). Interface design is involved in a wide range of projects from computer systems,
to cars, to commercial planes; all of these projects involve much of the same basic human
The format of the all interfaces was designed as possible as easy understanding and
user friendly. Pages were connected to each other in a consistent way. Operations that are done
with the system were repeatable. The design of the pages allows the users to use this easily.
CHAPTER 6
IMPLEMENTATION
6.1 INTRODUCTION
Implementation is the stage of the project when the theoretical design is turned out into
a working system. Thus, it can be considered to be the most critical stage in achieving a successful
new system and in giving the user, confidence that the new system will work and be effective.
The implementation stage involves careful planning, investigation of the existing system
and its constraints on implementation, designing of methods to achieve changeover and evaluation
of changeover methods. Implementation is the most crucial stage in achieving a successful system
and giving the user’s confidence that the new system is workable and effective. Implementation
of a modified application to replace an existing one. This type of conversation is relatively easy to
Each program is tested individually at the time of development using the data and has verified that
this program linked together in the way specified in the programs specification, the computer
system and its environment is tested to the satisfaction of the user. The system that has been
developed is accepted and proved to be satisfactory for the user. And so the system is going to be
implemented very soon. A simple operating procedure is included so that the user can understand
Initially as a first step the executable form of the application is to be created and loaded in the
common server machine which is accessible to all the user and the server is to be connected to a
network. The final stage is to document the entire system which provides components and the
developed modules that are not combined until the program is linked. A single module can contain
one or several routines. The project contains the following main modules.
• Home Module
• Fertilizer Module
• Crop Module
HOME MODULE
This module the buttons of other modules where connected here and the connected
• fertilizer module
• search module
FERTILIZER MODULE
In fertilizer module, we can update the newly arrived fertilizer for later use then it will
store the databae of the fertilizers. Fields required in this module are listed below
In search fertilizer Module, we can search the fertilizers using their name which was saved
already in the database. Fields required in this module are listed below
CROP MODULE
The crop module is used to store the Entire details of the crop. Fields Required in this
In this module, we can update the results of the crop using the fertilizer. Fields Required
In search crop Module, we can search the crops using their name which was saved already
Project Screenshots :
CHAPTER 7
7.1 INTRODUCTION
7.2.1Unit testing
Unit testing involves the design of test cases that validate that the internal
program logic is functioning properly, and that program inputs produce valid
outputs. All decision branches and internal code flow should be validated. It is the
testing of individual software units of the application .it is done after the completion
of an individual unit before integration. This is a structural testing, that relies on
knowledge of its construction and is invasive. Unit tests perform basic tests at
component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs
accurately to the documented specifications and contains clearly defined inputs and
expected results.
7.2.2Integration testing
Integration tests are designed to test integrated software components to
determine if they actually run as one program. Testing is event driven and is more
concerned with the basic outcome of screens or fields. Integration tests demonstrate
that although the components were individually satisfaction, as shown by
successfully unit testing, the combination of components is correct and consistent.
Integration testing is specifically aimed at exposing the problems that arise from
the combination of components.
Test objectives
• All field entries must work properly.
• Pages must be activated from the identified link.
• The entry screen, messages and responses must not be delayed.
Features to be tested
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results. An
example of system testing is the configuration oriented system integration test.
System testing is based on process descriptions and flows, emphasizing pre-driven
process links and integration points.
White Box Testing is a testing in which in which the software tester has
knowledge of the inner workings, structure and language of the software, or at least
its purpose. It is purpose. It is used to test areas that cannot be reached from a black
box level.
Black Box Testing is testing the software without any knowledge of the inner
workings, structure or language of the module being tested. Black box tests, as most
other kinds of tests, must be written from a definitive source document, such as
specification or requirements document, such as specification or requirements
document. It is a testing in which the software under test is treated, as a black box
.you cannot “see” into it. The test provides inputs and responds to outputs without
considering how the software works.
Unit Testing:
Unit testing is usually conducted as part of a combined code and unit test
phase of the software lifecycle, although it is not uncommon for coding and unit
testing to be conducted as two distinct phases.
Test objectives
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires
significant participation by the end user. It also ensures that the system meets the
functional requirements.
Test Results:
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the functionality
with the intent of ensuring that the software system meets its requirements and user expectations
and does not fail in an unacceptable manner. There are various types of test. Each test type
The performance of any system reflects the amount of testing done on it. In every project
a crucial part is testing the activities, which help to access and improve the quality of product that
generates during the expansion and modification of the software. Quality attributes include
correctness, reliability efficiency and performance of standards and overall cost effectiveness.
Software testing is a critical element of software quality assurance and signifies the final
Unit testing involves the design of test cases that validate that the internal that the internal
program logic in functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual software units
of the application. It is done after the completion of an individual unit before integration.
This is a structural testing, that relies on knowledge of its construction and is invasive. Unit
tests performs basic tests at component level and test a specific business process, application,
and/or system configuration. Unit test ensure that each unique path of a business process performs
accurately to the documented specifications and contains clearly defined inputs and expected
results.
Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be conducted as two
distinct phases.
Test strategy and approach. Field testing will be performed manually and functional test
• Test objectives
• Features to be tested
7.4 INTEGRATION TESTING
The purpose of integration testing is to verify the functional, performance, and reliability
between the modules that are integrated. The testing of combined parts of an application to
Integration testing was performed in a regressive way. As and when a module was
developed and tested, it was integrated with the remaining modules. Bottom-up testing strategy
was followed in each case. Modules were integrated moving upward the control hierarchy.
In “Crop Management system” all the modules were tested individually first with
testing in all cases. Then they were integrated with the next higher-level module. Within a module,
the subsystem was focused on those modules, which were tightly coupled. After a full-fledged
integration of all the modules to the main form, the application was tested for interface errors; a
whole. Every system is delineated by its spatial and temporal boundaries, surrounded and
influenced by its environment, described by its structure and purpose and expressed in its
functioning.
The process of evaluating software during the development process or at the end of the
defined as to demonstrate that the product fulfils its intended use when deployed on appropriate
environment.
Validation testing plays an important role. The application was developed especially for
the company and so it is necessary to confirm, whether the right details have been entered? Each
and sub-module was tested, whether it is provided the required functionalities? Each input field
Advantages of Validation:
• During verification if some defects are missed then during validation process it can be
caught as failures.
then during validation process while executing the functionality the difference between the
Sample Code:
HOME.CS
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
namespace fertiliser
public Home()
InitializeComponent();
fertile.Show();
this.Hide();
}
private void button2_Click(object sender, EventArgs e)
crop.Show();
this.Hide();
crop.Show();
this.Hide();
search.Show();
this.Hide();
FERTILIZER.CS
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Data.SqlClient;
namespace fertiliser
public Fertiliser()
InitializeComponent();
{
}
else
con.Open();
int x = cmd.ExecuteNonQuery();
if (x > 0)
else
con.Close();
}
private void linkLabel1_LinkClicked(object sender, LinkLabelLinkClickedEventArgs
e)
fertiliser.Show();
this.Hide();
}
SEARCH FERTILIZER.CS
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Data.SqlClient;
namespace fertiliser
public searchfertiliser()
InitializeComponent();
connc.Open();
SqlCommand cmd1 = new SqlCommand("Select Name from fertilizer", connc);
//while (reader.Read())
//{
// MyCollection.Add(reader.GetString(0));
//}
//textBox1.AutoCompleteCustomSource = MyCollection;
dta.Fill(dts);
dataGridView1.DataSource = dts.Tables[0];
connc.Close();
search.Show();
this.Hide();
textBox1.ResetText();
CROP.CS
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Data.SqlClient;
namespace fertiliser
public Crop()
InitializeComponent();
}
private void linkLabel1_LinkClicked(object sender, LinkLabelLinkClickedEventArgs
e)
crop.Show();
this.Hide();
else
con.Open();
int x = cmd.ExecuteNonQuery();
if (x > 0)
else
}
con.Close();
CROP VS FERTILIZER.CS
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Data.SqlClient;
namespace fertiliser
public Cropvsfertilizer()
InitializeComponent();
{
if (textBox1.Text == ""|| textBox2.Text == ""|| textBox3.Text == "")
else
con.Open();
int x = cmd.ExecuteNonQuery();
if (x > 0)
else
con.Close();
cropvsfertilizer.Show();
this.Hide();
textBox1.ResetText();
textBox2.ResetText();
textBox3.ResetText();
}
CHAPTER 8
8.1 CONCLUSION
Technology is introducing new innovations day by day, thus reducing the time required to
do things. Shipping is a challenging obstacle for any ecommerce business. The many variables
involved in shipping a product from point A to point B means every business shipping strategy
will be unique to their product, customers, business and location. The proposed system can be used
to reduce the time required to calculate the total amount of goods with currently updated GST tax
that is to be imported or exported. The web application provides a way of communication and
synchronization between the Customer and the Shipping management system. It also provides
them with the facility of communicating with the nearby customer in emergency. The database is
a vital aspect of the system. The database of the customer and the shipping system must be checked
for consistency on regular basis for smooth working of the system while the web application for
the shipping management system and the customer is also developed using open source tools,
Every application has its own merits and demerits. The project has covered almost all the
requirements. Further requirements and improvements can easily be done since the coding is
mainly structured or modular in nature. Changing the existing modules or adding new modules
can append improvements. Further enhancements can be made to the application, so that the web
site functions very attractive and useful manner than the present one.
We enhance the existing system with the social network tagging practice with personalized
recommendation model based on combination of user interest and tagging practices This System
being web-based application. We decide to develop this web application with the tracking system.
To track the ship where the ship is on process to reach the destination. And also We decide to
enhance this web application into Android application in future to make easier way to indulge the
LITERTURE REVIEW
1)TOPIC : survey of text classification algorithms
• In this paper, the author is trying to use generalization and suppression techniques to
safeguard the data.
• The data in the system is analyzed for generalization like replacing (or recoding) a value
with a less specific but semantically consistent values.
ADVANTAGES:
• By using generalization and suppression techniques the data can be secured and
semantically having consistent values
Drawbacks :
• The major issue with this paper is that, there is no clear explanation on, how the data is
going to be secured in suppression technique.
• Considering, the data is not semantically linked. In that case, this technique won’t be
effective.
• It specifies how the distributor can “intelligently” give data to agents in order to improve
the chances of detecting a guilty agent.
• By adding fake objects to distributed set, the distributor can find the guilt agent easily.
ADVANTAGES:
• We can get the clear idea to know about the leakage and to detect the guilty agent easily.
Drawbacks :
• This paper didn’t explain the kind of impact happening on the system while adding the fake
objects.
Collections
• Clustering can be applied to any database relation having attributes which are such that
changes in a few of their values do not affect the applications.
• The tuples attributes within a tuple, bit positions in an attribute, and specific bit values are
all algorithmically determined under the control of a private key known only to the owner
of the data.
ADVANTAGES:
• The technique used in this paper is flexible and very easy to find the leakage based upon
the attributes.
Drawbacks :
• Didn’t explain how the knowledge about the schema and Clustering will be given to the
other user.
• Not sure how the owner will identify the criticality of the data to be changed.
ADVANTAGES:
• By Using Mining Concepts The Data Modifications Can Be Done While Data Storing And
The Structure also defined to trace the transformation.
Drawbacks :
• This paper didn’t focus on the latest tools which will solve this kind of problem
automatically.
• Document Networks can be applied to any database relation having attributes which are
such that changes in a few of their values do not affect the applications.
• The tuples attributes within a tuple, bit positions in an attribute, and specific bit values are
all algorithmically determined under the control of a private key known only to the owner
of the data.
• ADVANTAGES:
• The technique used in this paper is flexible and very easy to find the leakage based upon
the attributes.
• Drawbacks :
• Didn’t explain how the knowledge about the schema and watermark will be given to the
other user.
• Not sure how the owner will identify the criticality of the data to be changed.
BIBILOGRAPHY
BOOK REFERENCE:
• Web Development with Java Server Pages Book by Duane K.Fields and Mark A.Kolb
WEBSITE REFERENCE:
• Social media and organ donation Research paper, Authors: alexmorgan ,kushalpatel
• www.google.com
• www.w3schools.com
• http://www.tutorialspoint.com