Escolar Documentos
Profissional Documentos
Cultura Documentos
Declaration
Final Approval
The University of the Poonch Rawalakot
Department of Computer Science and
Information Technology
FINAL APPROVAL
This is to certify that we have read the project report submitted by M. Adnan Shan(2014-BSCS-130) and M.
Hanif Khan(2014-BSCS-148) and it is our judgment that this report is of sufficient standard to warrant its
acceptance by The University of Poonch, Faculty of Basic & Applied Sciences Rawalakot for BS (hons) in
Computer Sciences.
COMMITTEE:
2. Supervisor ___________________________
Mr. Imran Farooq
Lecturer,
Department of Computer Science & IT.
University of the Poonch Rawalakot
3. Chairman ___________________________
Dr. Adnan Idris
Chairman,
Department of Computer Science & IT
University of the Poonch Rawalakot
Dedication
Dedicated to Our
Beloved Parents
ACKNOWLEDGEMENT
All acclamations and appreciation are for the Almighty ALLAH, the most merciful and
Prophet Hazrat Muhammad (PBUH), who is a permanent source of guidance for us and
humanity. Billions of “Darood-o-Salam” to Hazrat Muhammad (PBUH) who is symbol of
guide for humanity.
In the designation of ALLAH, The empathetic and the compassionate, whose ample blessings
empower us to complete our degree project.
We are highly grateful and express our honest thanks to our project Supervisor Mr. Imran
Farooq Lecturer, Department of CS&IT, for his profound interest, sympathetic and inspiring
guidance, and consistent encouragement & immense helped throughout the accomplishment
of our project.
I (Muhammad Adnan Shan) pay my thanks to my great Father and beloved Mother for
everything as they made me into who I am, and also warm thanks for all those relations who
helped me to complete my degree.
My (Muhammad Hanif Khan) humbly gratitude to my Father and Mother for her implacable
love, prayers encouragement & best wishes, which helped me to face the difficulties for life
& enabled me to complete my degree.
And we cordially thanks to All Teachers who made us able to do this project , due to their
keen interest we are able to learn programming skills in such a way so that we done our
degree project. We would like to mention the contribution of those who helped us at times
when we faced problems during the project. Dr. Adnan Idris’s, Dr. Zahid Mehmood’s, Mr.
Irteza’s, Mr. Imran Farooq’s and Mr. Irfan Javed’s insightful advices and attempts to solve
the problems have been precious. In the last but not least I am also thankful to my all
Colleagues.
Muhammad Adnan Shan
Muhammad Hanif Khan
This application will store whole data in database. Application will store the data offline.
User can access the sensitive data of application by login to the using his\her user ID and
password than the data will be displayed to the user. Other malicious user can’t access the
data
Using this application user will be free from worrying about stock, debtor information. This
application will notify the user if any product getting short or any debtor has to pay amount in
current date. Proper backup can provide the facility to recovery of data in any case of loss or
damage.
Computers and devices have become such a ubiquitous part of our everyday lives. As time
has passed, Computers have moved far beyond acting as a proxy for data saving and are now
different applications can reduce human work load and also predict for future. People needs
application’s in business to improve their business strategy as well to improve their income.
Our target is to allow user to make all business transactions by using this application safely.
Table of Content
List of Figures
Figure 1.3.1 Problem Scenario ..................................................................................................... 2
Figure 1.4.1 Solution Scenario ..................................................................................................... 2
Figure 2.4 Use Case Model ........................................................................................................... 8
Figure 3.1.1 Activity Login ......................................................................................................... 22
Figure 3.1.2 Activity Make Invoice ........................................................................................... 23
Figure 3.1.3 Activity Add Purchases ......................................................................................... 24
Figure 3.1.4 Activity Add Product............................................................................................. 25
Figure 3.1.5 Activity Update Stock ............................................................................................ 25
Figure 3.1.6 Activity Add Employee ......................................................................................... 26
Figure 3.1.7 Activity Add Shareholder ..................................................................................... 26
Figure 3.1.8 Activity Logout ...................................................................................................... 27
Figure 3.2.1 Sequence Login ...................................................................................................... 28
Figure 3.2.2 Sequence Make Invoice ......................................................................................... 28
Figure 3.2.3 Sequence Add Purchases....................................................................................... 29
Figure 3.2.4 Sequence Add Product .......................................................................................... 29
Figure 3.2.5 Sequence Add Stock .............................................................................................. 30
Figure 3.2.6 Sequence Add Shareholder ................................................................................... 30
Figure 3.2.7 Sequence Add Employee ....................................................................................... 31
Figure 3.3 Class Diagram ........................................................................................................... 32
Figure 3.4 ER- Diagram ............................................................................................................. 33
List of Tables
Table 2.1 Use case-01 ................................................................................................................... 9
Table 2.2 Use case-02 .................................................................................................................. 10
Table 2.3 Use case-03 .................................................................................................................. 11
Table 2.4 Use case-04 .................................................................................................................. 13
Table 2.5 Use case-05 .................................................................................................................. 14
Table 2.6 Use case-06 .................................................................................................................. 16
Table 2.7 Use case-07 .................................................................................................................. 16
Table 2.8 Use case-08 .................................................................................................................. 18
Table 2.9 Use case-09 .................................................................................................................. 19
Table 5.1 Login ............................................................................................................................ 41
1. Introduction:
Computers and devices have become such a ubiquitous part of our everyday lives. As time
has passed, our Computers have moved far beyond acting as a proxy for data saving and are
now different applications can reduce human work load and also predict for future. People
needs application’s in business to improve their business strategy as well to improve their
income.
1.1 Purpose
This application will allow users to automate all its business to get reliability, consistency and
efficiency. This application will concentrate on automation of business of Al Jabbal
Corporation by using desktop application. This application will store whole data in database.
Application will store the data offline. User can access the sensitive data of application by
login to the using his\her user ID and password than the data will be displayed to the user.
Other malicious user can’t access the data. Using this application user will be free from
worrying about stock, debtor information. This application will notify the user if any product
getting short or any debtor has to pay amount in current date. Proper backup can provide the
facility to recovery of data in any case of loss or damage.
1.2 Scope
Computers and devices have become such a ubiquitous part of our everyday lives. As time
has passed, our Computers have moved far beyond acting as a proxy for data saving and are
now different applications can reduce human work load and also predict for future. People
needs application’s in business to improve their business strategy as well to improve their
income.
This application will be one of the best ways to keep track of products, customer and also
finical transactions. Use of this application will make the user confidential and calm from
anxiety of their data.
The existing system is manual system. Data can be stored in different registers that create a
problem known as Inconsistency of data. If we want to find some sort of information, it can
take more time and may have some error in finding the result. It is difficult to maintain and
manage the stock, customer and company record as well as difficult to maintain finical
investment by each stakeholder.
1.3.1 Problem Scenario
In manual system there are many problems. It is difficult to maintain and manage the stock,
customer and company record as well as difficult to maintain finical investment by each
stakeholder. Following Figure shows some problems in manual system. This figure shows
that there is lot of books to maintain different records it very difficult to find specific record
in any emergency.
1.5 References
This application has been prepared on the basis of discussion with Group member, teacher
and also taken information from different apps.
2. System Analysis:
In the life of the software development, problem analysis provides a base for design and
development phase. The problem is analyzed so that sufficient matter is provided to design a
new system. Large problems are sub-divided into smaller once to make them understandable
and easy for finding solutions. Same in this project all the task are sub-divided and
categorized
2.1 Functional Requirement:
The functional requirements of the system describe the functionality or services that the
system is expected as provide.
ID Requirements Justification
REQ-1 Login Login provides facility to proceed to the Main
page.
REQ-2 Make Invoice User can make invoice as per customer need.
REQ-3 Sales Return User can add products that’s can be returned by
customer after purchasing.
REQ-4 Add Product User can add new product details.
REQ-5 Add Stock User can add stock detail of a particular product.
REQ-6 Update Stock User can update existing stock details.
REQ-7 Delete Product User can delete product if there is no stock of that
product.
REQ-8 View Stock User can view all stock details.
REQ-9 Add Purchases User can add new purchases from different
companies.
REQ-10 Manage Employees User can add, update and view employees.
REQ-11 Manage Shareholders User can add, update and view shareholders.
REQ-12 Manage System Users User can add, update and view users that can
access application functionalities.
REQ-13 Daily Expenses User can add, view and print daily expenses like
food expenses.
REQ-14 Monthly Expenses User can add, view and print Monthly expenses
like building rant, telephone bill etc.
REQ-15 Wages User can add and view the salaries paid to
employees.
REQ-16 Drawings. User can add and view the products withdraw by
the shareholder for its personal use.
REQ-17 Generate Repots User can generate sales report include weekly,
monthly and yearly sales. User can also generates
the report of products and stock.
REQ-18 Make Payments User can paid payments against the debit of
companies and received payments form debater
customers.
REQ-19 Generate Income User can generate the income statement to view
Statement the profit and loss of business.
REQ-20 Generate Shareholder User can generate the profit of all shareholders
equity after generating the income statement.
REQ-21 Maintain Balance sheet User can also make balance sheet to check
equality of assert and liabilities.
The proposed system will be simple and easy to use by the users. The users will comfort in
order to communicate with the system. The user will be provided with an easy interface of
the system.
Accessibility:
The system will be accessible through application and there should be no any known
problem.
Performance:
The system performance will be at its best when performing the functionality of the system.
Reliability:
The proposed system will be reliable in all circumstances and if there is any problem that will
be affectively handle in the design.
Security:
The proposed system will be highly secured; every user will be required registration and
username/password to use the system. The system will do the proper authorization and
authentication of the users based on their types and their requirements. The proposed system
will be designed persistently to avoid any misuse of the application.
Scenario-01 The user has the ability to logon to the system to be able use it.
Frequency Frequent.
Product Unit
4) User hits the
“Save” button.
Password.
Conform Password
Extension and Alternatives 4b) If Information is not valid.
4b.1Re-enter information again.
Frequency Frequent
Frequency Frequent
“Save” button.
Frequency Frequent
Frequency Frequent
Frequency Frequent
3. System Design:
System design is the process of expanding what was learned during domain analysis into a
working implementation. Design implementation that will carry out the system charter and
lead to reuse among many systems.
Designers have developed a set of design rules that can be reapplied during the design of new
applications.
Design Model (Interactive Model)
Interactive modeling emphasis on the illustration of software objects interaction via
messages. The interaction diagram/model is generalization of two UML diagrams types, both
can be used to express similar messages interaction. These are
Sequence diagram
Activity diagram
Class diagram
Entity relationship diagram
3.1.1 Login:
3.1.8 Logout:
3.2.1 Login:
3.2.3 Purchases:
4. Implementation:
The implementation phase of a project starts after design. During this phase a design is
converted into working software. The software is developed in such a way so that it can meet
the requirements and specifications of the users. The implementation of any system is
converted with the tool used in the development work and the component used to implement
the system.
The process of assuring that the system is operational and then allowing users to take over its
operation for the use and evaluation is called implementation. Here, system means new
system, which is going to be implemented. The new system needs to be implemented because
the old system was manual .therefore, there is always room for improvement of the system.
System implementation involves following key features:
• Operating system selection
• Tool selection
• Language selection
• Commenting code
• Naming conventions
4.1 Operating system selection
Windows 8.1 Professional selected as development platform as it is University’s standard and
later the system will be implemented on the windows operating system. So, it is better to use
it at development time for ease enhancement and later compatibility.
Microsoft Windows 8.1 Professional is a powerful multitasking operating system. Its ease of
use, flexibility and communication services increase its demand. Microsoft Windows 8.1
Professional delivers seamless integration with one platform for communication. It is the
most flexible operating system working with wide variety of client operating systems.
4.2 Programming Language Selection
For implementation of Al-Jabbal Manager we use C# language and SQL. We use Visual
studio 2010 as IDE and windows local server .
4.3 Commenting Code
Understanding of where and how to comment your code is important. Commenting code
describe the functions and statements properly that help others to understand the concept of
statements for further enhancements. Comments help us to understand what is to be done. It
is also very backward to write the code and then try to explain what it does. So, most of the
point is tired to make clear by explaining it in comments.
4.4 Naming Convention
It is necessary to follow a standard naming convention throughout the whole project during
the development, to make the code readable. The approach that is used is as follow:
Variable: First letter of variable name represent the name of value or data it holds and first
letter is small and ‘_’ for each word in variable name.
Functions: Function name start with the type of functionality it is doing and first letter of
each word in function name is small and ‘_’ for each word in function name.
Text boxes: The name of all text boxes represent the name of value or data it holds and first
letter is small and ‘_’ for each word in text box name.
5. Testing:
Software testing is an empirical technical investigation conducted to provide stakeholders
with information about the quality of the product or service under test, with respect to the
context in which it is intended to operate.
System testing is an essentials step for the development of the reliable and error free system.
Testing is the process executing a problem with the explicit intention of finding errors i.e.
making the problem fail and test cases are devised with the purpose in mind. A test case is a
set of data items that the system processes as normal input. A successful test is one that has a
high probability of finding an as-yet undiscovered error. Testing involves exercising the
program using data like the real processed by the program.
Testing may be carried out during the implementation phase, to verify if the software behaves
as intended by its designer, or after the completion of its implementation phase. There are
many approaches to software testing.
Unit testing
Interface testing
Integration testing
Module testing
5.5 Evaluation
Evaluation of the system means to examine what goals are achieved by the system and what
are the weaknesses and the deficiencies left behind. Evaluation is the final step in the
development by any system. This phase is for the purpose of reviewing whether objectives
and functional requirements of the Univ. are fulfilled are not.
5.6 Achievements
Software provides the password protected GUI to facilitate the administrator to
manage this system.
In all modules of the system, data is properly add, delete and update.
All verification and validation checks work properly.
System is satisfying almost all of its major specifications and functionality and it can
be concluded that system is satisfying its more than 90% scope.
6. Screen Shots:
7. Conclusion:
Using this application user will be fully confidential of his stock detail, company detail and
for debtor’s information. Proper backup of data makes sure the recovery of data in any case
of loss.
The user will free of doing complex calculations. The time will be saved, and mistakes of
user should be less.
8. References:
1. Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and
Iterative Development (3rd Edition)
2. Sql database developer: ISO/IEC
3. Sql database standard: ISO/IEC 9075
4. https://Microsoft-Visual-Studio-2010-Ultimate/3000-2383_4-75450998.html