Você está na página 1de 16

TABLES OF CONTENTS

SL.NO: 1. 1.1 1.2 2. 2.1 2.2 2.3 2.4 3. 3.1 3.2 3.3 3. 3.1 3.2 3.3 3.4 4. 4.1 4.2 5. 5.1 5.2 6. 6.1 6.2 7. TITLE INTRODUCTION PURPOSE SCOPE OVERALL DESCRIPTION PRODUCT PERSPECTIVE PRODUCT FUNCTIONS USER CHARACTERISTICS ASSUMPTIONS FEASIBILITY STUDY TECHNICAL FEASIBILITY ECONOMICAL FEASIBILITY OPERATIONAL FEASIBILITY ACTIVITY DIAGRAMS LOGIN ADMINISTRATOR USER DATA FLOW DIAGRAM SYSTEM REQUIREMENTS HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTS DATABASE DESIGN LOGIN ANALYSIS SOFTWARE SYSTEM ATTRIBUTES RELIABILITY SECURITY CONCLUSION PAGE_NO 1 1 1 2 2 3 3 3 4 5 5 5 6 6 7 8 9 11 11 11 12 12 12 12 12 12 13

PAGE NO:1

1. INTRODUCTION
The Barcode Labeler is professional bar code label design software with certain desktop publishing capabilities. It is designed specifically to work with your business software and database applications. The printing of these labels can be done using any printer that supports a Microsoft Windows driver. Bar code labels, address labels are some examples of what can be created. It will easily integrate with any inventory, ERP or POS application for bar code label generation. These labels can be used to track inventory or people in Shops, Warehouses, Government or Corporations. The Barcode Labeler supports several drawing objects including text, lines, rectangles, ellipses, and bar codes. Each of these drawing objects has full edit capabilities. The draw style, size, position, and color are some of the edit properties. In addition, practically any picture can be imported or exported onto the label design or linked to the original file. An object properties box presents the edit properties to the user and allows precision sizing and positioning of each object.

1.1 PURPOSE
In currently, most of the readers will be having provisions only for reading from specified set of articles. The reader will not accept labels which are specified in other languages or formats. Hence the existing system will not have proper security as well as inability to read according to the wish of user.

1.2 SCOPE
The proposed Barcode Labeler System includes all the factors of the existing system but in more efficient way. Proposed system is developed in C#.NET under MS SQL SERVER 2005 as back end and 2D barcode algorithm is used for the implementation .Only authorized users can enter in to the system on entering the correct User name and Password. So unauthorized users cannot access system..

PAGE NO:2

2. OVERALL DESCRIPTION
2.1 PRODUCT PERSPECTIVE

View the login details User Management New user Registration

Barcode Labeler System

Barcode generation

Barcode Printing

Store the barcodes

Barcode Reading

The barcode labeler system allows users to read barcode labels as input through barcode scanner ,the software allows administrator to permit authorised users only . The users needs to log in to the software to use the software. The barcode printing is another feature of the software ,which prints out and stores the barcode for future use.

PAGE NO:3

2.2 PRODUCT FUNCTIONS


Barcode Generation Valid user can generate new barcode and also can take printouts of newly generated barcodes. Barcode Reading Valid user can read the different types of barcodes with the help of laser barcode scanner.

2.3 USER CHARACTERISTICS


With a valid username and password the user can log on to the system. There is also an option for change password.

2.4 ASSUMPTIONS
1. Ability to put cut marks for labels. 2. Serialize label with auto increment/decrement feature. 3. Supports Code 3 of 9, code 128,UCC 128,code 93,Interleaved 2 of 5,UPC-A,UPCE,EAN/JAN-8,EAN/JAN-13,Coda bar,MSI Plessey,Post Net,PDF-417,Maxi Code,Data Matrix and UCC/EAN-128 barcode. 4. Import text files or Microsoft Excel worksheets. 5. Precision sizing and positioning of drawing objects. 6. Import-Export BMP and other images.
PAGE NO:4

2. SYSTEM ANALYSIS
System analysis is an important activity that takes place when a new system is being built. It is the central intact of system development and it includes gathering and interpreting facts, diagnosing and using this information to recommended improvements to the system. System analysis gives the structure and functioning of the system and it specifies what the system should do. It is helpful to understand the problem and emphasize what is needed from the system. Before designing a computer system, which will satisfy the information requirements of an organization, it is important that the nature of the business and the way it currently operates are clearly understood. The process of system investigation includes several methods of gathering the required information .It is important that the approach is appropriate to the system under consideration and the user of the system. System analysis should be creative and imaginative in producing new solutions to meet the user requirements. In brief the system is analyzed by gathering various information such as system functionality, problems encountered, requirement of the proposed system, users, their tasks and responsibilities.

2.1 EXISTING SYSTEM


In currently, most of the readers will be having provisions only for reading from specified set of articles. The reader will not accept labels which are specified in other languages or formats. Hence the existing system will not have proper security as well as inability to read according to the wish of user.

2.2 PROPOSED SYSTEM


The proposed Barcode Labeler System includes all the factors of the existing system but in more efficient way. Proposed system is developed in VB.NET under MS SQL SERVER 2005 as back end and 2D barcode algorithm is used for the implementation .Only authorized users can enter into the system on entering the correct User name and Password. So unauthorized users cannot access system.

3. FEASIBILITY STUDY
A feasibility study is made to see if the project on completion will serve the purpose of the organization for the amount of work, time and effort spent on it. Feasibility study lets the developer to foresee the future of the project and its usefulness. Finding out whether a new system is required or not. Determining the potentials and drawbacks of the existing system. Identification of user requirements and the benefits expected by the user from the resulting system. Finding out the various alternatives available. Knowing what should be incorporated in the new system. Defining the ingredients and objectives involved in the project. Identifying whether the proposed system could meet the end needs of the users. Providing technical, economic, operational feasibility of the proposed system. There are three aspects in the feasibility study portion of the preliminary investigation Technical Feasibility Economical Feasibility

Operational Feasibility

The proposed system must be evaluated from the technical point of view first, and if technically feasible their impact on the organization must be assessed. If compatible, operational system can be devised. Then they must be tested for economic feasibility.

PAGE NO:5

3.1 Technical Feasibility


Technical feasibility study deals with the hardware as well as the software requirements. The scope was whether the work for the project is done with the current equipment and the existing software technology has to be examined in the feasibility study. The outcome was found to be positive.

3.2 Economical Feasibility


The developing system must be justified by cost and benefit a criterion to ensure that effort taken on the project give the best return at the earliest .One of the factors, which affect the development of a new system, is the cost it would require. Since the system developed is apart of a project work, there is no manual cost to spend for the proposed system .Also all the resources are already available, giving an indication that the system is economically possible for development.

3.3 Operational Feasibility


The proposed project would be beneficial to organization satisfying the objectives when developed and installed. One of the main problems faced during development of a new system is getting the acceptance from the user. There is support from the management

of organization towards the development of the project. All the operational aspects are considered carefully. Thus the project is operationally feasible.

PAGE NO:6

4.ACTIVITY DIAGRAM
4.1 Login

Show login dialog box Print wrong username & password Enter username & password

No

Validate username & password

yes Chec k user

Admin Display administrator options Display user options

PAGE NO:7

4.2 Administrator

Show admin login page

Display admin options

Options for user accounts

Report generation

If option is to logout

PAGE NO:8

4.3 User

Show user login page

Report generation

If option is to logout

PAGE NO:9

4.4 DATA FLOW DIAGRAM

Alpha numeric codes

Generated barcode

USER
Cost

BSS
Scanned

POS code

CONTEXT DIAGRAM

PAGE NO:10

Save Barcode

Alphanumeric code Barcode Generator Header text

Print barcode

Create barcode

LEVEL1 DFD

Scan the barcode using barcode scanner

Barcode Reader

Reading Cost

LEVEL2 DFD

PAGE NO:11

5. SYSTEM REQUIREMENTS

5.1 Hardware Requirement


Processor Type Random Access Memory Hard Disk Drive Laser Barcode Scanner : : : : Intel X86 family 256 MB or Higher 20 GB or Higher 220 mm Scan Depth

5.2 Software Requirements


Operating System Front End Back End : : : 32/64 bit OS VB.NET 2005 MS SQL SERVER 2005

PAGE NO:12

6. DATABASE DESIGN
6.1 LOGIN FIELD NAME Username Password Status Role TYPE Varchar(50) Varchar(50) Varchar(50) Bit WIDTH DESCRIPTION Username of Administrator Password of Administrator Check the Status Check the Role

6.2 ANALYSIS FIELD NAME Bill-Number Date of purchase Total amount Tax amount Discount amount Grand Total TYPE Int Datetime Money Varchar(50) Varchar(50) Money WIDTH DESCRIPTION Number of bill Purchasing date Amount of purchase Tax for the amount Discount for the purchase Amount to be paid

7. SOFTWARE SYSTEM ATTRIBUTES


7.1 RELIABILITY This software helps in implementing vb.net language and sql database to ensure an error free source code is printed out. This software helps to detect the chance of error occurrence also. 7.2 SECURITY

This software is more secure because only administrator and user can acess this. Nonauthenticated users cant acess without the permission of administrator .

Você também pode gostar