Electronic shop management system project report pdf




















The language not only allows programmers to create simple GUIapplications, but can also develop complex applications. Programming in VB is a combination of visually arranging components or controls on a form, specifying attributes and actions of those components, and writing additional lines of code for more functionality. Since default attributes and actions are defined for the components, a simple program can be created without the programmer having to write many lines of code.

Performance problems were experienced by earlier versions, but with faster computers and native code compilation this has become less of an issue. MS Access contains the data storage options and the capability to store and process the same volume of data as a mainframe or a mini computer. Its new features provide a very high degree of performance making it comprehensive package for database management.

It is a largely used in medium-sized establishments. Electronic Shop Management System is a workable application for retail store inventory and accounts management. In the beginning, these needs are in the minds of various people in the client organization.

The requirement analyst has to identify the requirements by talking to these people and understanding their needs. For such systems, the requirements problem is complicated by the fact that the needs and requirements of the system many not to be known even to the user- they have to be visualized and created.

Hence, identifying requirements necessarily involves specifying what some people have in their minds. When inputs from multiple people are to be gathered, as is often the case, these inputs are likely to be inconsistent as well. The project will be supposed to implement the storage of products so that a large collection could be maintained with minimum storage space. This project will also be able to provide reports of products sold to the customer and brought to the store.

An average company will not be very keen on spending loads of money on ledgers. Where as our project will greatly reduce the costs which is using common and cheap office items like database and desktop application.

And also there is no requirement to store books or accounts. The data is directly stored in the database in the hard disk of the PC. When we click the main menu the different forms will be enabled. Appropriate actions will be taken. The primary purpose of this application is to implement the above stated functionality. The application should be capable enough to store the products and also perform some updating on the products that is stored.

It will be having user friendly GUIs that will guide the user to easily achieve the same. The application shall also have some features like reports displaying in the same window. In addition to this the application also supports feature to search products. Figure 1. This questionnaire showed us that there were a lot of problems when using paper for student attendance. Some of these problems are cheating, bulkiness of the papers, time consuming, stressful and cost full after a long period.

Because of this, personal identification needs to be associated to a student with an identity. Therefore, they are unable to satisfy these security requirements of the electrically connected information school society. Thus, security system based on Radio Frequency called electronic identifier are needed to ensure high security in sensitive areas such as school systems, heath care, telecommunication, government organizations and even the financial sectors.

We need to build interface that will integrate with RFID system and will show the card code with another interface also need to capture and record student attendance. This project also gives the opportunity for the educational administrators to capture face-to-face classroom data for allocation of proper attendance scores and for further managerial decisions. Hence the ability to achieve higher accurate automatic personal identification is possible.

Furthermore, by using this system it will make attendance become more easy to use. Also, RFID has more capability to receive, store and forward data to a remote source. Hence leads to reduction of work, better student attendance management and less administrative work. There are two scopes that will be cover in this project. Not only brand, but also frequencies of the RFID itself need to be considered. Since this system will be applied to a university, the RFID reader must use same frequencies as university student ID card.

Chapter 1 basically is an introduction of the project. In this chapter, the discussion is all about the background and objectives of the project. The overall overview of the entire project also will be discussed in this chapter. Everything related to the project will, be describe generally in this chapter.

This chapter included several subtopics. The entire hardware used in this project will be discussed briefly. In this section, all basic programming will be explained with a sample programming. The main flow chart for this project will be explained briefly under this topic. Chapter 4 discusses all the results obtained and discussion of the project.

Chapter 5 discusses the conclusion and further development of the project. This chapter also discusses about total costing involved and potential of this project for commercialization. In this chapter, we present the different concepts on electronic attendance system technologies.

However, this system does not have an incorporate door unit which allows access to only registered users.

Figure 2. The Germans, Japanese, Americans and British were all using radar which had been discovered in by Scottish physicist Sir Robert Alexander Watson-Watt to warn of approaching planes while they were still miles away.

RFID is commonly used to transmit and receive information without wires. RFID readers and tags communicate through a distance using radio waves. There are a lot of advantages in RFID system, included their price, size, memory capacity and their capability. The pure memory-based RFID chip without a co-processor is cheap, and its footprint is small and usually use in car immobilizer applications where the IC should fit in a tiny glass tube buried in the key. RFID fast processing speed is also essential.

Scientists and academics in the United States, Europe and Japan did research and presented papers explaining how RF energy could be used to identify objects remotely. Companies began commercializing anti-theft systems that used radio waves to determine whether an item had been paid for or not. Electronic article surveillance tags, which are still used in packaging today, have a 1- bit tag.

The bit is either on or off. If someone pays for the item, the bit is turned off and a person can leave the store. But if the person doesn't pay and tries to walk out of the store, readers at the door detect the tag and sound an alarm. Cardullo claims to have received the first U. That same year, Charles Walton, a California entrepreneur, received a patent for a passive transponder used to unlock a door without a key. A card with an embedded transponder communicated a signal to a reader near the door.

When the reader detected a valid identity, number stored within the RFID tag, the reader unlocked the door. Walton licensed the technology to Schlage Lock of San Francisco, a lock maker and other companies.

This system is still used in cows around the world today. Low-frequency transponders were also put in cards and used to control the access to buildings. High frequency offered greater range and faster data transfer rates.

Companies, particularly those in Europe, began using it to track reusable containers and other assets. Today, A reader in the steering column reads the passive RFID tag in the plastic housing around the key. UHF offered longer read range up to 20 feet under good conditions and faster data transfer.

IBM did some early pilots with Wal-Mart, but never commercialized this technology. When it ran into financial trouble in the mids, IBM sold its patents to Intermec, a bar code systems provider. Intermec RFID systems have been installed in numerous different applications, from ware house tracking to farming. But the technology was expensive at the time due to the low volume of sales and the lack of open, international standards.

Historically, RFID reader were designed to read only a king of tag, but so-called multimode readers that can read many kinds of tags are becoming increasingly popular. RFID readers are usually on, continually transmitting radio energy and awaiting any tags that enter their field of operation. However, for some applications, this is unnecessary and could be undesirable in battery-powered devices that need to conserve energy.

Thus, it is possible to configure an RFID reader so that it sends the radio pulse only in response to an external event. For example, most electronic toll collection systems have the reader constantly powered up so that every passing car will be recorded. Like the tag, themselves, RFID readers come in many sizes.

The largest readers might consist of a desktop personal computer with a special card through shielded cable. The smallest readers are the size of a postage stamp and are designed to be embedded in mobile telephones.

Because of the major application used in worldwide, many systems require the simultaneous use of more than one operating frequency. Most systems available on the world market at present operate at one of the following frequencies or frequency ranges: below kHz kHz, The operating and control characteristics are different for each of these frequencies, and therefore each of them is more appropriate for certain types of application or certain countries.

The most common tags today consist of an Integrated Circuit with memory, essentially a microprocessor chip. Other tags are chip less and have no onboard Integrated circuit. Chip less tags are more effective in applications where simpler range of functions is all that is required; although they can help achieve more accuracy and better detection range, at potentially lower cost than their Integrated Circuit- based counterparts.

From here on out, we will use the term tag to mean Integrated Circuit-based tag. We will refer to chip less tags explicitly, when needed. RFID tags come in two general varieties which are passive and active tag.

Passive tags require no internal power source, thus being pure passive devices they are only active when a reader is nearby to power them , whereas active tags require a power source, usually a small battery. In this we are going to implement the RFID system in our project for improvement of old attendance system and checking system for better result and security of the student.

An RFID tag is an object that can be applied to or inserted into a product, person, or animal for identification and tracking using radio waves. Some identifiers can be read from several centimeters or meters away and beyond the line of sight of the reader.

Several related works exist in works, application of RFID Technology to different areas and specifically to the area of academic attendance monitoring problem. In authors designed and employed a model of a secured and portable embedded reader system to read the biometric data from the electronic passport.

The authors attempted to solve problems of trustworthiness, security and confidentiality in E-passports by authenticating holder online using Global System of Mobile Communications GSM network.

The GSM network is the main edge between identification center and the e passport reader. The communication data is protected between server and e-passport reader by using AES to translate data for protection while transferring through GSM network. The use of Radio-frequency identification RFID technology in automated electronic environment and for tracking objects has been widely researched upon by researchers and deployed by various organizations as part of their automation systems.

RFID is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for identifying and tracking the object. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator, which modulated the reflected radio frequency even though this device was covert listening device, not an identification device or tag, it is a predecessor of radio frequency identification RFID technology because it was likewise passive, being energized and activated by waves from an outside source.

Similar technologies such as the IFF identification friend and foe transponder developed in the United Kingdom, was routinely used by the allies in the World War II to identify aircrafts as friend or foe. Transponders are still used by most powered aircrafts to this day. In that same year, Charles Walton, a California entrepreneur, received a patent for a passive transponder used to unlock a door without a key. A card with an embedded transponder communicates a reader near a door, when the reader detects a valid identification number stored within the tag, the reader unlocks the door.

Walton licensed the technology to Schalge lock of San Francisco, a lockmaker and other companies. The implementation of time and attendance system has a lot of advantages for the manager.

The kind of system that is implemented depends upon what the organization is trying to achieve by implementing the system. There are different types of automatic attendance systems; each type of system is suited to different needs and requirements. Some of the most common types include; biometric attendance system, magnetic stripe attendance system, barcode attendance system, and RFID attendance system. With the automation through barcode technology, the errors previously made in the manual payroll or attendances are eliminated.

In addition, the costs associated with the installation of the system are not too much relative to the cost of payroll or attendance errors. This data from the clock can be downloaded by the manager or the administrator and then used for updating and maintaining time and attendance records. The Universal Product Code UPC is a unique digit number assigned to retail merchandise that identifies a product and the vendor. The UPC for a product is always the same. The first six digits is the vendor unique identification number.

All the products that the vendor sells will have the same first six digits in their UPCs. The next five digits identify the product. The last digit is called the check digit. This is used to verify that the UPC for that specific product is correct. Each time that UPC is read, typically by a scanner reading the barcode, a calculation is done. And, if the check digit is different compared from the one that is calculated, then the computer knows that there is something wrong with the UPC.

Figure 1 is a pictorial diagram of a barcode with its universal product code UPC. In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. There are several types of biometric identification schemes which include: retina, hand geometry, vein, voice etc. The computer uses any of these biometric identification schemes to determine who you are, and based your identity authorized your different level of access.

Under this system, there is time and attendance software that is paired with a time clock for employees which uses biometric technology for authentication purposes. This method has the great benefit that the entire process is easy as well as quick. Other advantages include elimination of the cost previously incurred in getting the students cards.

In the other system that uses card magnetic stripe and barcode systems , there is an ongoing expense associated with the damage, misplacement and stealing of cards and the continuous need for their restoration and maintenance.

This system also read one card at a time and requires contact with the reader. Passive RFID does not use a battery, while an active has an on-board battery that always broadcasts or beacons its signal. A battery assisted passive has a small battery on board that is activated when in the presence of a RFID reader. Most RFID tags contain at least two parts: one is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency RF signal, and other specialized functions; the other is an antenna for receiving and transmitting the signal.

If the reader reads tags in a stationary position, it is called fixed RFID. These fixed readers are set up specific interrogation zones and create a "bubble" of RF energy that can be tightly controlled if the physics is well engineered.

This allows a very definitive reading area for when tags go in and out of the interrogation zone. On the other hand, if the reader is mobile when the reader reads tags, it is called mobile RFID. The block diagram of his project is shown. However, this system does not the incorporate a door unit which allows access to only registered users. In Barcode, only one card read at a time is allowed.

Multiple read at a time is permitted Embedded information cannot be updated, Embedded information can be updated; this allows the Hence the restriction of the repeated overwriting if repeated over-writing if embedded electronic the embedded election information for each card information for each card. It does not allow for the increase technologies like RFID has increased technologies like surveillance cameras to be activated with an surveillance cameras to be activated in conjunction employee being in the vicinity.

It is slower and requires time of sight to function. The requirement analyst has to identify the requirements by talking to these people and understanding their needs. For such systems, the requirements problem is complicated by the fact that the needs and requirements of the system many not to be known even to the user-they have to be visualized and created. Hence, identifying requirements necessarily involves specifying what some people have in their minds.

When inputs from multiple people are to be gathered, as is often the case, these inputs are likely to be inconsistent as well. The project will be supposed to implement the storage of products so that a large collection could be maintained with minimum storage space. This project will also be able to provide reports of products sold to the customer and brought to the store. An average company will not be very keen on spending loads of money on ledgers.

Where as our project will greatly reduce the costs which is using common and cheap office items like database and desktop application. And also there is no requirement to store books or accounts. The data is directly stored in the database in the hard disk of the PC. When we click the main menu the different forms will be enabled. The program consists of the following modules: Source listing This module is suppose to identify the products by their discription.

Add products This module is suppose to take the inputs from an input device. Add customers This module is capable of adding customers in the specified formats.

Update and delete products This module will update and delete products. Update and delete customers This module will be able to update and delete customers Searching In this module the admin or emplyee can search the customer or products from the database based on criterias Transactions This module will take up transactions like selling products, buying products from supplier updating cash and updating the bills.

Appropriate actions will be taken. Report Generation This is a client program which will request for reports. The primary purpose of this application is to implement the above stated functionality.

The application should be capable enough to store the products and also perform some updating on the products that is stored. It will be having user friendly GUIs that will guide the user to easily achieve the same. The application shall also have some features like reports displaying in the same window. In addition to this the application also supports feature to search products. It can also search products based on criteria so that the employees will be able to view the same.

The application is to be fully developed under vb platform using Visual Basic 6. Each user will have to have an individual copy of the product. The product functions will include the following areas: The application is capable enough to store different products and also perform some editng on them that is added.

It will be having user friendly GUIs that will guide the user to easily achive the same. He should understand how to store products and he should have knowledge about various products so that they could be saved. A person who has no knowledge of computers will find it difficult to understand the system. But with a little knowledge it will be very easy to handle the project.

The product must have an interface which is simple enough to understand. Dependencies: All necessary hardware and software are available for implementing and use of The proposed system would be designed, developed and implemented based End users should have basic knowledge of computer and we also assure that the tool. The application should be able to handle all the tasks in an efficient manner. The application should be able to provide up-to-date information.

The application should be able to handle all the changes made. The developer will have to study the designing of the product. The use of the controls and the component from the Add items feature of the Vb 6. The user of the product will get very user friendly forms which will be very easy to work with. The sound card and graphics card will have to be of good quality and capacity.

This is the first step in moving from the problem domain to the solution domain. The design of a system is perhaps the most critical factor affecting the quality of the software; it has a major impact on the later phases is the Design Document. This Document is similar to a blueprint or a plan for the solution and is used later during implementation, testing and maintenance.

System Design is sometimes also called Top-Level Design. This system design aims to identify and modules that should be in the system, the specifications of these modules, and how they interact with each other to produce the desired result. At the end of the System Design all the major data structures, file formats, and the major modules in the system and their specifications are decided.

A Context Flow Diagram is a top level also known as level 0 data flow diagram. It only contains one process node process 0 that generalizes the function of the entire system in relationship to external entities. In context diagram the entire system is treated as a single process and all its inputs, outputs, sinks and sources are identified and shown.



0コメント

  • 1000 / 1000