doc handicraft (1)docs

Upload: tibinkampamcodu

Post on 03-Jun-2018

226 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 Doc Handicraft (1)docs

    1/63

    1

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    1.INTRODUCTION1.1 PROJECT OVERVIEW

    The purpose of our project titled, ONLINE HANDICRAFT MARKETING

    MANAGEMENT, is a web application project, which include PHP, HTML,

    JavaScript and Ajax. Most of the Handcrafter could not get desired price for their

    product and most case a broker or a third party will get most benefit than the actual

    producer. Also a large area of marketing handicraft product is depending on

    foreigners but unfortunately our Govt. Could not provide an online sale of such

    product to a reach of worldwide so that any foreigner can shop the most traditional art

    from their country. The project entitled ONLINE HANDICRAFT MARKETING

    MANAGMENT is a website whichprovides a high quality online service and a best

    place to meet both for the Producers and Consumers. It helps Ordinary Customers to

    buy high quality product from the Producers. Bidding is also possible through this

    site. User can request for a product, so they can purchase crafts on their demand. It

    also has.

    MODULAR DESCRIPTION

    A module is logically separate part of a program. It is a program unit that is

    discreet and identifiable with respect to compiling and loading. A system is

    considered to modular if it consists of discrete components so that each component

    can be implemented separately and a change to one component has minimal impact

    on other components. Modularity is clearly a desirable property in a system.

    Modularity helps in system debuggingisolating the system problems to component

    is easier if the system is modular.

    In system repair or changing a part of the system is easy as it affect few other

    parts and system building. A modular system can easily built by putting its modules

    together.

    The main modules are:

    1. Admin2. Handcrafters3. Agencies4. Users

  • 8/12/2019 Doc Handicraft (1)docs

    2/63

    2

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Module 1: Admin

    Admin is an authorized person and he is in full control of the overall system.

    The administrator can:

    a) Agency Managementb) online bidding Approvec) Publish productsd) Event castinge) View insight/feedbackf) Process loan requestg) Process withdrawalh) Logini) Change password

    Module 2: Handcrafters

    The Handcrafter is the one who is registered in the system for selling his

    product through this application. He can perform the following functions:

    a) Registrationb) Loginc) Changing passwordd) Managing producte) Bidding Requestf) View approval statusesg) View preordersh) Sales statusi) Withdraw money to bank

    j) Change bank detailsk) View Upcoming Events/ training program

  • 8/12/2019 Doc Handicraft (1)docs

    3/63

    3

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Module 3: Agency

    The Agency is the intermediate between handicrafts and users. He can

    purchase handicrafts from Handcrafters. These products are buying through this

    application. He can perform the following functions:

    a) Loginb) Change passwordc) Manage handcrafterd) Product managemente) View order infof) Manage shippingg) View Upcoming Events/ training program

    Module 4: User

    The user is the consumer of handicrafts they buy, bid and view products thatare uploaded to our network. Also user can view all the events that are organized by

    our firm. Also pre request for a product to a particular handcrafter.

    a) Registerb) Loginc) Manage profiled) Buy, bid Products and pay using carde) Gift product to anotherf) View productg) View order /delivery statush) Pre request to a producti) View Upcoming Events/ training program

    j) Feedback, Report

  • 8/12/2019 Doc Handicraft (1)docs

    4/63

    4

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    1.2 ABOUT THE ORGANIZATION

    IPSR GROUP-An Overview

    Information Technology or IT is finding applications in every walk of life

    today-communications, industry, education, business, etc, and enhancing life in ways

    unimaginable a few decades back. Harnessing this power of IT to user in huge

    benefits is the IPSR group, a young firm of dynamic, creative and future-focused IT

    professionals. The IPSR group is a provider of total IT services-IT Training, Website

    Development, Software Development and Hardware sales and service. Born out of the

    strategic vision of a new academicians and entrepreneurs, the IPSR group has carved

    a niche for itself in the field of IT services, through qualitative and innovative work.

    Based in Kottayam, IPSR has recently expanded their services to the North Kerala

    region with the inauguration of the Regional Office at Kozhikode and administrative

    officers in Kannur.

    IPSR -The Training Wing

    Institute of Professional Studies Research (IPSR), the training division of the

    IPSR Group is an info-management institute owned by Self Employers Service

    Society(SESS)and promoted by members of Kerala Vyapari Vyavasai EKopana

    Samithi(KVVES),an organization of industrialists and businessmen of Kerala.

    KVVES has a statewide network of over 10 lakh members and 1400 regional centers,

    which provides valuable backing to the organization. Eminent academicians and

    industrialists from all parts of India and abroad are on the panel of policy-making

    bodies of IPSR, strive, value-based modules in high-end courses of today, armed with

    a faculty and infrastructure that meet global industry standards.

    IPSR Solutions Limited-The IT Company

    IPSR Solutions Ltd., the first Public Limited IT Company in Kottayam, is

    IPSR Group's development arm. The company focuses on Software Development,

    Web Based Applications, Hardware & Networking Solutions and Technical

    Consultancy. Manned by a team of dynamic professionals, IPSR Solutions Ltd is

    committed to understanding client needs and providing comprehensive solutions that

    are in sync with latest technologies. IPSR's clients include companies and

    organizations from various sectors like banking, manufacturing, retail, etc.

  • 8/12/2019 Doc Handicraft (1)docs

    5/63

    5

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    2.SYSTEM STUDY AND ANALYSISSYSTEM ANALYSIS

    System Analysis is the process of gathering and interpreting facts, diagnosingthe problems and using the information to recommend improvements on the system.

    System analysis is a problem solving activity that requires intensive communication

    between system user and system developers. System analysis or study is an important

    phase of any system development process. The system is viewed on a whole and

    inputs to the system are identified. The output from the organization is travel through

    various phases of the processing of inputs.

    The system is viewed as a whole and inputs to the system are in defined the

    output from the system are traced through the various data are collected on available

    files.

    Description points and transaction held by the present system. Based on

    analysis, a cost or benefit analysis are considered, cost of the system is calculated on

    the basis of analysis made on the solution is given as a proposal. The proposal is then

    weighed with the existing system analytically and the best on is selected. The

    proposal is presented to the user request and suitable changes are made. This is a loop

    that ends as the user is satisfied with the proposal. After all, this proposal becomes a

    biometric passports are to speed up clearance through immigration and the prevention

    of identity fraud.

    A detailed study of these processes must be made by the various techniques

    like interviews, questionnaires, etc. The data collected by these sources must be

    scrutinized to arrive to a conclusion .The conclusion is an understanding of how the

    system functions. This system is called the existing system. Now, the existing system

    is subject to close study and the problem areas are identified. The designer now

    functions on a problem solver and tires to sort out the difficulties that weighed with

    the existing faces. The solutions an given on a proposal. The proposal is then

    weighed with the existing system analytically and the best one is selected. The

    proposal is presented to the user for any endorsement by the user. The proposal is

    reviewed on user request and suitable changes that made. This is a loop that ends as

    soon as the user in satisfied with the proposal.

    SYSTEM STUDY

  • 8/12/2019 Doc Handicraft (1)docs

    6/63

    6

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    The major activities in the system study are studying the ways an organization

    currently retrieving and processing data to produce information. It involves the study

    of various operation performed by the system and their relationship within and outside

    the system. The system study is usually done on the basic approaches of

    understanding the problem or user requirements. To understand the user requirements

    the analyst communicates with the user or customer and studies the basic

    requirements of the user the study of the existing system was necessary to carry out

    the preliminary investigation. The major methods in the system study are

    1. Interviewing persons

    2. Questionnaire

    3. Observing the current system

    4. Gather documents currently in use

    5. Discussion

    The existing system is a semi manual system, less user friendly and time taken

    for processing data is very large.

    EXISTING SYSTEM

    A handicraft, sometimes more precisely expressed as artisanal handicraft,

    is any of a wide variety of types of work where useful and decorative objects are

    made completely by hand or by using only simple tools. It is a traditional main sector

    of craft, The main problem faced by many handcrafters are the unavailability of a

    centralized market of their product. If there is many stores they act as a mediator, that

    is they buys products form handcrafter and sales the product in market but most case

    handcrafter will not get the desired price they desire. Also if there any foreigners need

    to buy handcraft they must visit the store. A very important thing in this field is

    handicrafts are arts good product must have a great movements in market if a product

    has a huge demand in market there is a chance to conduct a auction for that particular

    product so that the handcrafter can make a desired price. Government supports

    handcrafters for their welfare and rehabilitation but most of the group will not utilize

    this type of projects, the right thing is most of them didnt know the favors that Govt.

    offers.

  • 8/12/2019 Doc Handicraft (1)docs

    7/63

    7

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    2.2 PROPOSED SYSTEM AND ADVANTAGES

    The proposed system is a very flexible online marketing bidding management

    application for Handcrafters and Govt. this is a web based application that offers a

    wide range of operations such as, an online market, the handicraft product upload

    straight to the online store and ordinary users can view and buy their desired one.

    Through this a handcrafter gets his payment straight to his account that registered

    with this web application and later they can transfer to their bank account so there is

    no need for an inter mediate to sell their product also handcrafters will never cheated.

    The provision budding section will produce better output rare products. Reach of

    product in worldwide will lead to a better marketing, it lead more profit for

    handcrafters.

    Advantages

    global reach of handicraft product Bidding for demanding product Pre request provision Improved user interface and designs All transactions done through the automated system No need for additional calculation Administrations can create a wide range of reports for analysis Insight management allows knowing the current trend and moves of product.

  • 8/12/2019 Doc Handicraft (1)docs

    8/63

    8

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    2.3 FEASIBILITY STUDY

    An initial investigation culminates in a proposal that determine whether an

    ultimate system is feasible. When a proposed system is made and approved it initiates

    a feasibility study. The purpose of the feasibility study is to identify various candidate

    systems and evaluates whether they are feasible by considering technical, economical

    and operational feasibility and to recommend to best candidate system.

    The feasibility of such a program is listed in a simulated environment. Once

    all features are working property in a simulated environment, we can implement in a

    real platform.

    During product engineering, we consider following types of feasibility:

    2.3.1 Technology and System Feasibility

    A study of function, performance and constraints that may affects the ability to

    achieve an acceptable system. The assessment is based on an outline design of system

    requirement in terms of input, Processes, Output, Fields, Programs, and Procedures.

    This can be quantified in terms of volumes of data trends, frequency of updating etc in

    order to estimate whether the new system will perform adequately or not. Technical

    feasibility identifies whether the proposed system can be developed with the

    existing technologies and available hardware and software resources. As part of

    the technical feasibility of the system , the following points are to be

    emphasized.

    2.3.2. Operational Feasibility

    Proposed projects are beneficial only if they can be turned into information

    systems that will meet the operating requirements of the organization. This test of

    feasibility asks if the system will work when it is developed and installed. This project

    satisfies all the operational conditions. The project is found to work well on

    installation , All types of users can operate the system without any difficulty.

    User interfaces are designed in such a way that even ordinary users without

    having much knowledge in computer technology can easily operate the system .

    The access time of data is considerably low and the operation is less time

    consuming . Traders can by their product from the organization or online. The

    operation is labor free and less time consuming. The consumers can view and buy

    desired products easily.

  • 8/12/2019 Doc Handicraft (1)docs

    9/63

    9

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    2.3.3 Economic Feasibility

    An evaluation of development cost weighted against the ultimate income or

    the benefit derived from the developed system or product. Economic feasibility of a

    system means that the cost incurred in developing and implementing a system

    should not be higher than the financial benefits obtained by the users. During

    the economic feasibility study the following points were investigated.

    The cost to conduct a full system investigation The cost of hardware and software for the application being developed. The benefits derived by the users in terms of time , effort, accuracy of

    information , better decision making. Etc are quantified and compared.

    The cost incurred by the user in making use of the application isdetermined.

    On examining all these factors it is found that the system is

    economically feasible.

    2.3.4 Legal Feasibility

    A determination of any infringement, violation or liability that could result

    from the development of the system. An evolution of alternative approaches to the

    development of the system or product.

    A feasibility study is not warranted systems, in which economic justification is

    obvious, technical risk is low, few legal problems are expected and no reasonable

    alternative exists. However, if any of the preceding conditions fail, a study of that area

    should be conducted.

    Economic justification include a broad range of concerns that include cost-

    benefit analysis, long-term corporate income strategies, impact on other profit

    concerns or products, cost of resources needed for development and potential market

    growth.

    Technical feasibility is frequently the most difficult area to assess at the stage

    of the product engineering process. It is essential that the process of analysis and

    definition be conducted in parallel with an assessment of technical feasibility. The

    considerations that are normally associated with technical feasibility are development

    risk, resource availability and technology.

  • 8/12/2019 Doc Handicraft (1)docs

    10/63

    10

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Legal feasibility encompasses a broad range of concerns that include contracts

    and liability.

    The feasibility study may be documented as a separate report to upper

    management and include as an appendix to the system specification to assess content

    reliability and by upper management to assess project status ONLINE

    HANDICRAFT MARKETING MANAGEMENT is feasible in all respects. The

    given system can be developed under optimal expenses with the available hardware

    and software. Besides it is good economic to invest in such a kind of software from

    the users point of view as the benefits weigh the costs. The resources needed to run

    the above project should be less in cost and highly reliable so that there might be no

    hanging and minimal level of expense to implement the software. This project is

    developed with the help of Dream viewer, PHP, MySQL, JavaScript and Ajax.

  • 8/12/2019 Doc Handicraft (1)docs

    11/63

    11

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    2.4 SYSTEM SPECIFICATION

    Key information for programming, testing and implementing the project. The major

    document produced by the system analysis at the end of the system study stage. It provides

    complete details of the analysts proposed solution to the problem outlined in terms of

    references. This is the description of the proposed new computer system in great detail, it

    specified how the system would do it, and the machinery needed the costs and benefits

    expected for the project. The system specification describes the hardware and software

    specification used to develop the application.

    Hardware Requirements:-

    Pentium-IV(Processor). 256 MB Ram 512 KB Cache Memory Hard disk 10 GB Microsoft Compatible 101 or more Key Board

    Software Requirements: -

    Operating System : Windows 95/98/XP with MS-office Programming languages : PHP 5 Scripting languages : JavaScript, Ajax Web-Technology : Dreamweaver

    Back-End : MYSQL

    Web Server : Apache

  • 8/12/2019 Doc Handicraft (1)docs

    12/63

    12

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    2.5 SOFTWARE DESCRIPTION

    2.5.1 PHP

    Introduction

    PHP is a computer scripting language originally designed for producing dynamic

    web pages. It is used for, server-side scripting language but can be used from a command line

    interface or in standalone graphical applications.

    While PHP was originally created by Rasmus Lerdorf in 1995, the main

    implementation of PHP is now produced by the PHP group and serves as the de facto

    standard for PHP License; the free software foundation considers it to be free software.

    PHP is a widely-used general-purpose scripting language that is especially suited

    for web development and can be embedded into HTML. It generally runs on a web browser,

    taking PHP code as its input and creating web pages as output. It can be deployed on most

    web servers and on almost every operating system and platform free of change. PHP is

    installed on more than 20 million websites and 1 million web servers. It is also the most

    popular Apache module among computers using Apache as web server. The most recent

    major release of PHP was the versions 5.2.6 on May 1, 2008.

    History

    PHP originally stood for Personal Home Page. It began in 1994 as a set of

    Common Gateway Interface binaries written in the C programming language by

    Danish/Greenlandic programmer Rasmus Lerdorf. Lerdorf initially created these Personal

    Home Page tools to replace a small set of Perl scripts he had been using to maintain his

    Personal Home Page. The tools used to perform tasks such as displaying his resume and

    recording how much traffic his page was receiving. He combined these binaries with his form

    interpreter to create PHP/F1, which had more functionality; PHP/F1 included a large C

    implementation and could communicate with databases enabling the building of simple,

    dynamic web applications. He released PHP publically on June 8, 1995 to accelerate bug

    location and improving the code. This release was named PHP version 2 and already had the

    basic functionality that PHP has today. This included Perl-like variables, form handling and

    the ability to embed HTML. The syntax was similar to Perl but was more limited, simpler and

    less consistent.

    Zee Suraski and Andy Gutmans, two Israeli developers at the TechnionIT,

    rewrote the parser in 1997 and formed the base PHP 3, changing the languages, name to the

    recursive initialize PHP: Hypertext Preprocessor. The development team officially released

  • 8/12/2019 Doc Handicraft (1)docs

    13/63

    13

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    PHP/F1 2 in November 1997 after months of beta testing. Afterwards, public testing of PHP

    3 began, and the official launch came in June 1998. Suraski and Gutmans then started a new

    rewrite of PHPs core, producing the Zend Engine in 1999. They also founded Zend

    Technologies in Ramat Gan, Israel which manages the development of PHP.

    On May 22, 2000 PHP 4, powered by the Zend Engine 1.0, was released. On

    July 13, 2004, PHP 5 was released, powered by the new Zend Engines.

    PHP 5 included new features such as improved support for object-oriented

    programming, the PHP data objects extension (which defines a lightweight and consistent

    interface for accessing databases), and numerous performance enhancements. The most

    recent update released by the PHP group is for the older PHP version 4 code branch. As of

    January 2008, this branch is up to version 4.4.8 PHP 4 is no longer under active development

    but will be supported by security updates until August 8, 2008.

    In 2008, PHP 5 becomes the only stable version under development. Late static

    binding has been missing from PHP and will be added in version 5.3. Alongside PHP 5, PHP

    6 is also under active development. Major changes include the removal of register globals,

    magic quotes and safe modes.

    PHP does not have complete native support for Unicode or multibyte string;

    Unicode support will be included in PHP 6. Many high profile open source projects cased to

    supports PHP 4 in new code as of February 5, 2008, due to the Go PHP5 initiative, provided

    by a consortium of PHP developers promoting the transition from PHP 4 to PHP 5.

    It runs both 32-bit and 64-bit environments, but on Windows the only official

    distribution is 32-bit, requiring Windows 32-bit compatibility mode to be enabled using 11s

    in a 62-bit Windows environment. There is a third-party distribution available for 64-bit

    Windows.

    Usage

    PHP is a general-purpose scripting language that is especially suited for the web

    development. PHP generally runs on a web server, taking PHP code as its input and creating

    web pages as outputs. It can be used for command-line scripting and client-side GUI

    operating systems and platforms, and can be used with many relational database management

    systems. It is available free of charge, and the PHP group provides the complete source code

    for users to builds, customize and extend for their own use.

    PHP primarily act as a filter, taking input from a file or stream containing text

    and/or PHP instructions and outputs another stream of data; most commonly the output will

    be HTML. It can automatically detect the language of the user. From PHP 4, the PHP parser

  • 8/12/2019 Doc Handicraft (1)docs

    14/63

    14

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    compiles input to produce byte codes for processing by Zend Engine, giving improved

    performance over its interpreter predecessor.

    Originally designed to create dynamic web pages, PHPs main focus is on

    server-side scripting, and it is similar to other server-side scripting languages that provides

    dynamic content from a web server to a client, such as Microsoft ASP.NET system, Sun

    Microsystemss Java Server Pages and mod-perl. PHP has also attracted the development of

    many frameworks that provide building blocks and a design structure to promote Rapid

    Application Development (RAD). Some of these include CakePHP, PRADO, Symphony and

    Zend framework, offering features similar to other web application framework. As of April

    2007, over 20 million internet domains were hosted on servers with PHP installed and PHP

    was recorded as the most popular Apache module.

    Syntax

    PHP only parses code within its delimiters; anything outside its delimiters is send

    directly to the output and is not parsed by PHP. The most common delimiters are , which are open and close delimiters respectively. and

    delimiters are also available. Short tags (

  • 8/12/2019 Doc Handicraft (1)docs

    15/63

    15

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Polymorphism: As the name suggest one name multiple form, Polymorphism is theway of providing the different functionality by the functions having the same name

    based on the signatures of the methods.

    Dynamic binding: Sometimes we don't have the knowledge of objects about theirspecific types while writing our code. It is the way of providing the maximum

    functionality to a program about the specific type at runtime.

    As the languages like Objective C, C++ fulfils the above four characteristics yet

    they are not fully object oriented languages because they are structured as well as object

    oriented languages. But in case of java, it is a fully Object Oriented language because object

    is at the outer most level of data structure in java. No stand alone methods, constants, and

    variables are there in java. Everything in java is object even the primitive data types can also

    be converted into object by using the wrapper.

    Data Types

    PHP store whole numbers in a platform-dependent range. This range is typically

    that of 32-bit signed integers. Unsigned integers are converted to signed values in certain

    situations; this behavior is different from other programming languages. Integer variables can

    be assigned using decimal (positive and negative), octal and hexadecimal notations. Real

    numbers are also stored in a platform-specific range.

    They can be specified using floating point notation, or two forms of scientific

    notation. PHP has a native Boolean type that is similar to native Boolean types in Java and

    C++. Using Boolean type conversation rules, non-zero values are interpreted as true and zero

    as false, as in Perl and C++. The null data type is NULL. Variables of the resource type

    represent reference to resource from external sources. These are typically created by

    functions from a particular extension, and can be processed by functions from the same

    extension; examples include file, image and database resources. Array can contain elements

    of any type that PHP can handle, including resources, objects, and even other arrays. Order is

    preserved in lists of values and in hashes with both keys and values, and the two can be

    intermingled. PHP also supports strings, which can be single quotes, double quotes or

    heredoc syntax.

  • 8/12/2019 Doc Handicraft (1)docs

    16/63

    16

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    2.5.2 MYSQL

    MySQL is an open source Relational Database Management System. MySQL is very

    fast reliable and flexible Database Management System. It provides a very high performance

    and it is multi threaded and multi user Relational Database management system.

    MySQL is one of the most popular relational database Management System on the

    web. The MySQL Database has become the world's most popular open source Database,

    because it is free and available on almost all the platforms. The MySQL can run on Unix,

    window, and Mac OS. MySQL is used for the internet applications as it provides good speed

    and is very secure. MySQL was developed to manage large volumes of data at very high

    speed to overcome the problems of existing solutions. MySQL can be used for verity ofapplications but it is mostly used for the web applications on the internet. MySQL, the most

    popular Open Source SQL database management system, is developed, distributed, and

    supported by Oracle Corporation. MySQL offers standard database driver connectivity for

    using MySQL with applications and tools that are compatible with industry standards ODBC

    and JDBC. Any system that works with ODBC or JDBC can use MySQL.

    This software is developed for general use in a variety of information management

    applications. It is not developed or intended for use in any inherently dangerous applications,

    including applications which may create a risk of personal injury. If you use this software in

    dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup,

    redundancy, and other measures to ensure the safe use of this software.

    MySQL is a database management system. A database is a structured collection of data.

    It may be anything. MySQL is a relational database management system.

    A relational database stores data in separate tables rather than putting all the data in

    one. The MySQL Server design is multi-layered with independent modules. Many of the

    world's largest and fastest-growing organizations use MySQL to save time and money

    powering their high-volume Web sites, critical business systems, and packaged software.

    MySQL is a key part of LAMP (Linux, Apache, MySQL, PHP /Perl/ Python), the fast-

    growing open source enterprise software stack. More and more companies are using LAMP

    as an alternative to expensive proprietary software stacks because of its lower cost and

    freedom from platform lock-in.

  • 8/12/2019 Doc Handicraft (1)docs

    17/63

    17

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    The features of MySQL server are:

    A very fast thread-based memory allocation system.Very fast joins using an optimized one-sweep multi-join.In-memory hash tables, which are used as temporary tables.SQL functions are implemented using a highly optimized class library and should be

    as fast as possible. Usually there is no memory allocation at all after query

    initialization.

    The best and the most-used database in the world for online applications.Available and affordable for all. MySQL command line tool is very powerful and can be used to run SQL queries

    against database.Continuously improved while remaining fast, secure and reliable.Fun to use and improve.MySQL is very Lightweight application

    2.5.3 MACROMEDIA DREAMWEAVER 8

    Macromedia Dreamweaver is one of the most popular web-design programs in the

    industry. It allows you to develop professional websites and its user-friendly interface, tools

    and features have made it the must-have package for web designers.

    Dreamweaver uses both Cascading Style Sheets (CSS) and Hyper Text Markup

    Language (HTML) and it has good code-editing support features that will help you to write

    the CSS and HTML. Alongside writing the code, you can use the visual layout tools to build

    your sites and make them look exceptional.

    Macromedia Dreamweaver 8 offers the most comprehensive set of tools available for

    building dynamic and accessible web applications. Dreamweaver 8 makes it faster and easier

    than ever to build accessible forms. Using the Accessibility preferences, Dreamweaver 8

    prompts designers and developers to add elements that make a form accessible to users with

    disabilities, such as labels, access keys, and a tab index for form objects.

    Features:

    Developers can use it with the server technology of their choice to build powerful netapplications.

    Cross-Browser Validation. Improved Workflow.

  • 8/12/2019 Doc Handicraft (1)docs

    18/63

    18

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    3.SYSTEM DESIGNDesign is the second phase in the system development life cycle. Software design is the

    first of the three technical activities in the software development process such as design, code

    writing and testing.

    During this phase, the analyst schedules design activities, works with the user to

    determine the various data inputs to the system, plans how data will flow through the system,

    designs required outputs and writes program specifications. Again the analysts activities

    focus on solving a users problem in logical terms.

    During this second step, analysts employ a variety of tools such as data flow diagrams,

    entity-relationship diagrams, data dictionaries and Gantt chart.

    The systems design converts the theoretical solution introduced by the feasibility study

    into a logical reality. During design the analyst:

    Draws a model of the new system, using data flow and entity-relationshipdiagrams.

    Develop methods for collecting and inputting data. Defines the detailed data requirements with a data dictionary. Writes program specifications. Specifies control techniques for the systems outputs, databases and inputs. Identifies and orders any hardware or software that the system will need.

    In the physical design phase, necessary software is developed to accept input from the

    user, to perform necessary calculations through the manipulation of data stored in the

    databases to produce the appropriate result.

  • 8/12/2019 Doc Handicraft (1)docs

    19/63

    19

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    3.1 OUTPUT DESIGNOutput design is an ongoing activity almost from the beginning of the project.

    Computer output is the most important and direct source of information to the user. Output

    design is a process that involves designing necessary outputs that have to be given to various

    users according to their requirements. Efficient output design should improve the systems

    relationship with the user and help in decision making .The system has got the capability to

    display standard screen layouts. These layouts should be designed around the output

    requirements and they must be designed with utmost care and details in the screen layouts

    must be simple, descriptive and clear to the user.

    While designing a systems output, the analyst must make several independent

    decisions. Every system produces some kind of reports. No matter what is the content of the

    report. The following guidelines can be applied to any report.

    The information should be clear, accurate, concise and restricted to relevantdata.

    Reports should have titles, date and descriptive headings for columns of data,numbered pages and so on. If printed, they should also appear on standard size

    of paper.

    The reports contents should be in a logical arrangement so that user can easilylocate what they need.

    The report should come on an output medium that best suits the users needs.

  • 8/12/2019 Doc Handicraft (1)docs

    20/63

    20

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    3.2 INPUT DESIGNInput design is the process of converting user oriented input into a computer based

    format. The data flow diagram indicates logical data flows, data stores source and

    destinations. Input data are collected and organized into a group of numbered data. Once

    identified appropriate input data media are selected for processing.

    The goal of input design is to make data entry as easy and free from errors as much as

    possible. Proper data validation checking is exercised to correct the mistakes made during

    data entry.

    3.3 DATABASE DESIGNA database is a collection of interrelated data stored with minimum redundancy to

    serve users more quickly and efficiently. The general objective of a database is to make

    information access easy, quick, inexpensive, integrated and shared by different applications

    and users. Database design is an important yet sometimes overlooked part of the application

    development lifecycle. An accurate and up-to-date data model can serve as an important

    reference tool for Database Administrators, developers, and other members of jointapplication development team

    Effective database designers will keep in mind the principles of normalizationwhile they design a database.

    Normalization is a database design approach that seeks the following four objectives:

    Minimization of data redundancy, Minimization of data restructuring, Minimization of I/O by reduction of transaction sizes, and Enforcement of referential integrity.

    The concepts and techniques used when designing an effective database includes:

    An entityis a logical collection of things that are relevant to r database. The physical

    counterpart of an entity is a database table

    An attribute is a descriptive or quantitative characteristic of an entity. The physical

    counterpart of an attribute is a database column (or field).

    A primary key is an attribute (or combination of attributes) that uniquely identifies

    each instance of an entity. A primary key cannot be null and the value assigned to a primary

    key should not change over time. A primary key also needs to be efficient. For example, a

  • 8/12/2019 Doc Handicraft (1)docs

    21/63

    21

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    primary key that is associated with an INTEGER data type will be more efficient than one

    that is associated with a CHAR data type.

    A relationship is a logical link between two entities. A relationship represents a

    business rule and can be expressed as a verb phrase.

    The second type of relationship is the "many-to-many" relationship. In a "many-to-

    many" relationship, many instances of one entity relate to many instances of the other entity.

    "Many-to-many" relationships need to be resolved in order to avoid data redundancy. "Many-

    to-many" relationships may be resolved by creating an intermediate entity known as a cross-

    reference (or XREF) entity.

    A "foreign key" exists when the primary key of a parent entity exists in a child

    entity. A foreign key requires that values must be present in the parent entity before like

    values may be inserted in the child entity.

    3.3.1 NORMALISATIONNormalization is the process of taking data from a problem and reducing it to a set of

    relations while ensuring data integrity and eliminating data redundancy

    Data integrity - all of the data in the database are consistent, and satisfy all integrityconstraints.

    Data redundancy - if data in the database can be found in two different locations(direct redundancy) or if data can be calculated from other data items (indirect

    redundancy) then the data is said to contain redundancy.

    Data should only be stored once and avoid storing data that can be calculated from other data

    already held in the database. During the process of normalization redundancy must be

    removed, but not at the expense of breaking data integrity rules.

    If redundancy exists in the database then problems can arise when the database is in normal

    operation:

    When data is inserted the data must be duplicated correctly in all places where there isredundancy. For instance, if two tables exist for in a database, and both tables contain

    the employee name, then creating a new employee entry requires that both tables be

    updated with the employee name.

  • 8/12/2019 Doc Handicraft (1)docs

    22/63

    22

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    When data is modified in the database, if the data being changed has redundancy, thenall versions of the redundant data must be updated simultaneously. So in the employee

    example a change to the employee name must happen in both tables simultaneously.

    The removal of redundancy helps to prevent insertion, deletion, and update errors, since the

    data is only available in one attribute of one table in the database.

    The data in the database can be considered to be in one of a number of `normal forms'.

    Basically the normal form of the data indicates how much redundancy is in that data. The

    normal forms have a strict ordering:

    1. 1stNormal Form2. 2ndNormal Form3. 3rdNormal Form4. BCNF

    There are other normal forms, such as 4th and 5th normal forms. They are rarely utilised in

    system design and are not considered further here.

    To be in a particular form requires that the data meets the criteria to also be in all normal

    forms before that form. Thus to be in 2ndnormal form the data must meet the criteria for both

    2ndnormal form and 1stnormal form. The higher the form the more redundancy has been

    eliminated.

  • 8/12/2019 Doc Handicraft (1)docs

    23/63

    23

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    1. Table Name : Login

    Description : To store login detail

    Primary key : id

    Field name Data type Size Constraints Description

    Id INTEGER 10 PRIMARY KEY Id of login

    Username VARCHAR 20 NOTNULL User name

    Password VARCHAR 20 NOT NULL Password

    Role VARCHAR 30 NOT NULL Role

    Status VARCHAR 10 NOT NULL Status

    2. Table Name : Agency_profile

    Description : To store Agency_details

    Primary key : Id_Agency

    FOREIGN KEY:Id_login

    Field name Data type Size Constraints Description

    Id_agency INTEGER 10 PRIMARY KEY Agency id

    Id_login INTEGER 10 FOREIGN KEY Login id

    Name VARCHAR 30 NOT NULL Agency name

    Address VARCHAR 100 NOT NULL Agency address

    Pin INTEGER 10 NOT NULL Agency place pincode

    Email VARCHAR 20 NOT NULL Agency email

    Phone INTEGER 15 NOT NULL Agency phone number

    Mobile INTEGER 15 NOT NULL Agency mobile number

  • 8/12/2019 Doc Handicraft (1)docs

    24/63

    24

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    3. Table Name : user_profile

    Description : To store user_details

    Primary key : Id_user

    FOREIGN KEY:Id_login

    Field name Data type Size Constraints Description

    Id_user INTEGER 10 PRIMARY KEY User id

    Id_login INTEGER 10 FOREIGN KEY Login id

    Name VARCHAR 30 NOT NULL Name of user

    Gender VARCHAR 10 NOT NULL Users gender

    Age INT 3 NOT NULL Age

    Address VARCHAR 100 NOT NULL User address

    Pin INTEGER 10 NOT NULL User place pin codeCountry VARCHAR 30 NOT NULL Users country

    Email VARCHAR 20 NOT NULL User email

    Phone INTEGER 15 NOT NULL phone number

    Mobile INTEGER 15 NOT NULL User mobile number

    4. Table Name : Handicraft_profile

    Description : To store handicraft detail

    Primary key : Id_hnd

    FOREIGN KEY:Id_login

    Field name Data type Size Constraints Description

    Id_hnd INTEGER 10 PRIMARY KEY Handicraft id

    Id_login INTEGER 10 FOREIGN KEY Login id

    Name VARCHAR 30 NOT NULL Handcrafters name

    Gender VARCHAR 30 NOT NULL Gender of handcrafter

    Age INTEGER 3 NOT NULL Age

    Address VARCHAR 100 NOT NULL Handcrafters address

    District VARCHAR 30 NOT NULL District

    Pin INTEGER 10 NOT NULL Handcrafters place pincode

    Email VARCHAR 20 NOT NULL Handcrafters email

    Mobile INTEGER 15 NOT NULL Handcrafters mobilenumber

    Accno INTEGER 30 NOT NULL HandcraftersAcc. no

    Bank details VAECHAR 30 NOTNULL Handcrafters bankdetails

  • 8/12/2019 Doc Handicraft (1)docs

    25/63

    25

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Turn over INTEGER 10 NOT NULL Annual turn over

    Acct balance INTEGER 20 NOTNULL Handcrafters acctbalance

    Types of craft VARCHAR 20 NOTNULL Handcrafters productdetails

    Types ofproduction

    VARCHAR 20 NOTNULL Handcrafters productiondetails

    5. Table Name : ORDER

    Description : To store ORDER details

    Primary key : Id_OD

    FOREIGN KEY: id_prd,id_user

    Field name Data type Size Constraints Description

    Id_od INTEGER 10 PRIMARY KEY User id OF order

    Id_prd INTEGER 10 FOREIGN KEY Id of product

    Id_user INTEGER 30 FOREIGN KEY Id of user

    No_item INTEGER 10 NOT NULL No of item

    Date DATE NOT NULL Order date

    Total_amount INTEGER 20 NOT NULL total amount

    6.Table Name : bidding

    Description : To store bidding details

    Primary key : Id_bid

    FOREIGN KEY:Id_user,id_prd,id_agency

    Field name Data type Size Constraints DescriptionId_bid INTEGER 10 PRIMARY KEY Bidding id

    Id_agency INTEGER 10 FOREIGN KEY Agency id

    Id_prd INTEGER 10 FOREING KEY Product id

    Id_user INTEGER 10 FOREING KEY USERS id

    date DATE NOT NULL Bidding date

    Time DATE NOT NULL Bidding time

    Starting price INTRGER 10 NOT NULL Bidding start price

    Current price INTEGER 10 NOT NULL Current price of bidding

  • 8/12/2019 Doc Handicraft (1)docs

    26/63

    26

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    7.Table Name : cart

    Description : To store temporary shopping info

    Primary key : Id_cart

    FOREIGN KEY:userid, pid,

    Field name Data type Size Constraints Description

    Id INTEGER 10 PRIMARY KEY Id of cart

    Pid INTEGER 10 FOREIGN KEY Id of product

    Userid INTEGER 30 FOREIGN KEY Id of user

    Count INTEGER 3 NOT NULL Quantity

    Date DATE NOT NULL Date added

    Total amount INTEGER 20 NOT NULL Payment data amount

    8. Table Name : delivery

    Description : To store temporary shopping info

    Primary key : Id

    FOREIGN KEY:userid, pid,Field name Data type Size Constraints Description

    Id INTEGER 10 PRIMARY KEY Id of cart

    Pid INTEGER 10 FOREIGN KEY Id of product

    Userid INTEGER 30 FOREIGN KEY Id of user

    Date DATE NOT NULL Date added

    Address VARCHAR 100 NOT NULL User address

    Pin INTEGER 10 NOT NULL User place pin code

    Country VARCHAR 30 NOT NULL Users country

    Email VARCHAR 20 NOT NULL User email

    mobile INTEGER 15 NOT NULL Mobile number

    Track id VARCHAR 25 NOT NULL Shipping id

    Dispatch VARCHAR 50 NOTNULL Dispatch status

  • 8/12/2019 Doc Handicraft (1)docs

    27/63

    27

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    9. Table Name : Event

    Description : To store event information

    Primary key : Id

    Field name Data type Size Constraints Description

    Id INTEGER 10 PRIMARY KEY Id of event

    Date DATE NOT NULL Date of event

    Time DATE NOT NULL Time of event

    Info VARCHAR 2000 NOT NULL Event info

    Title VARCHAR 300 NOTNULL Title

    Place VARCHAR 300 NOTNULL Place of event

    Type VARCHAR 50 NOTNULL Event type

    10. Table Name : Product details

    Description : To store product information

    Primary key : Id

    FOREIGN KEY:hdct_id,Agent id

    Field name Data type Size Constraints Description

    Id INTEGER 10 PRIMARYKEY

    Id of product

    Hdct_id INTEGER 10 FOREIGN KEY Id of uploaded handcrafter

    Agent id INTEGER 10 FOREIGN KEY Id of corresponding agent

    Date DATE NOTNULL Date uploaded

    Name VARCHAR 100 NOTNULL Name of product

    Info VARHCAR 200 NOTNULL Description

    Type VARCHAR 50 NOTNULL Product type

    Count INTEGER 5 NOTNULL Count of item

    Image VARCHAR 100 NOTNULL Location of images

    Price INTEGER 10 NOTNULL Price of item

    Status VARCHARR 50 NOTNULL Status of product

  • 8/12/2019 Doc Handicraft (1)docs

    28/63

  • 8/12/2019 Doc Handicraft (1)docs

    29/63

    29

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    13. Table Name : pre request

    Description : store the pre request form the user

    Primary key : Id

    FOREIGN KEY: user id

    Field name Data type Size Constraints Description

    Id INTEGER 10 PRIMARY KEY Id pre request

    User id INTEGER 10 FOREIGN KEY Requested user id

    Date DATE NOTNULL Date of request

    Name VARCHAR 100 NOTNULL Name of applicant

    Message VARHCAR 2000 NOTNULL Message to handcrafter

    Status VARCHAR 30 NOTNULL Status form handcrafter

    14. Table Name: withdrawal

    Description: store the withdrawal request

    Primary key: Id

    FOREIGN KEY: hcid

    Field name Data type Size Constraints Description

    Id INTEGER 10 PRIMARY KEY Id withdraw requestHcid INTEGER 10 FOREIGN KEY Requested handcrafter id

    Date DATE NOTNULL Date of request

    Amount INTEGER 10 NOTNULL Withdrawal amount

    Status VARCHAR 20 NOTNULL Status of withdrawal

  • 8/12/2019 Doc Handicraft (1)docs

    30/63

    30

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    3.4 DATA FLOW DIAGRAMData Flow Diagram (DFD) isan important tool used by system analyst. DFD provide

    an overview of what data a system would process, What transformation of data are done,

    what files are used and where the results flow. The graphical representation of the systemmakes it a good communication tool between the user and the analyst.

    Analysis model help us to understand the relationship between different components

    in the design. Analysis model shows the user clearly how a system will function. This is the

    first technical representation of the system.

    The analysis modeling must achieve three primary objectives.

    To establish a basis for creation of software design.

    To describe what the user requires. To define set of requirements that can be validated once the software us build.A data flow diagram is a graphical technique that depicts information flow and

    transforms that are applied as data move from input to output. The DFD is used to represent

    increasing information flow and functional details. A level 0 DFD also called fundamental

    system model represents the entire software elements as single bubble with input and output

    indicated by incoming and outgoing arrow respectively.

    Data Flow Notations

    Process

  • 8/12/2019 Doc Handicraft (1)docs

    31/63

    31

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Processes represent activities in which data is manipulated by being stored or retrieved

    or transformed in some way. A circle represents it. The process will show the data

    transformation or change. Data coming into a process must be worked-on or

    transformed in some way. Thus all process my have an input and output.

    External Entities

    External entities represent the sources of data that enter the system or the recipients of data

    that leave the system. They can be duplicated, one or more times on the diagram to

    avoid line crossing. Data Stores

    Data stores represent stores of data within the system. Data stores may be long-term

    files such as sales ledgers, or may be short-term accumulations: For example batches

    of documents that are waiting to be processed. Each data store should be given areference followed by an arbitrary number.

    Data FlowA data flow shows the flow of information from its source to its destination. A line

    represents a data flow, with arrowheads showing the direction of flow. Information

    always flows to or from a process and may be written, verbal or electronic. Each data

    flow may be referenced by the processes or data stores at its head and tail, or by adescription of its contents.

  • 8/12/2019 Doc Handicraft (1)docs

    32/63

    32

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Context diagram for ONLINE HANDICRAFT MARKETING MANAGEMENT

    Level 1 DFD for admin

  • 8/12/2019 Doc Handicraft (1)docs

    33/63

    33

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Level 1 DFD for Agency

  • 8/12/2019 Doc Handicraft (1)docs

    34/63

    34

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Level 1 for handcrafters

  • 8/12/2019 Doc Handicraft (1)docs

    35/63

    35

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Level 1 DFD for User

  • 8/12/2019 Doc Handicraft (1)docs

    36/63

    36

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Level 2 DFD for Admin

  • 8/12/2019 Doc Handicraft (1)docs

    37/63

    37

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Level 2 DFD for Agency

  • 8/12/2019 Doc Handicraft (1)docs

    38/63

    38

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Level 2 DFD for Handcrafter

  • 8/12/2019 Doc Handicraft (1)docs

    39/63

    39

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Level 2 DFD for User

  • 8/12/2019 Doc Handicraft (1)docs

    40/63

    40

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

  • 8/12/2019 Doc Handicraft (1)docs

    41/63

    41

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    3.5 SYSTEM FLOW CHART

  • 8/12/2019 Doc Handicraft (1)docs

    42/63

    42

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    3.6 STRUCTURE CHART

  • 8/12/2019 Doc Handicraft (1)docs

    43/63

    43

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    3.7 MENU TREE

  • 8/12/2019 Doc Handicraft (1)docs

    44/63

    44

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    4.SYSTEM CODING

  • 8/12/2019 Doc Handicraft (1)docs

    45/63

    45

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    $res=$ob->execute("SELECT `Id` FROM `user_loging` WHERE

    `User_name`='$username';");$loginId= mysql_fetch_row($res);

    /*Inserting details to user_profile table*/

    $res=$ob->execute("INSERT INTO `base_table`.`user_profile` (`Id_login`, `Name`,

    `Gender`, `Age`, `Address`, `Pin`, `Country`, `Email`, `Phone`, `Mobile`) VALUES

    ('$loginId[0]', '$name', '$gender', $age, '$address', '$pin', '$country', '$email', '$phone',

    '$mobile');");

    return $res;

    }

    /*-end of function insert-user_profile()-*/

    }

    /*This class containg the details of Handicrafters insertin functions*/

    class insert_Handicraft

    {

    /*This Function insert value from form handicraft_register */

    public function

    insert_profile($name,$gender,$age,$username,$password,$address,$pin,$district,$email,$mo

    bile,$turnover,$acountNo,$typeOfCraft,$typeOfProduct,$bankdtls)

    {

    $ob=new dbase();

    /*Inserting login details to login table */

    $res=$ob->execute("INSERT INTO `base_table`.`user_loging` (`User_name`,

    `Password`, `Role`, `Status`) VALUES ('$username', '$password', 'HANDCRAFTER',

    'ACTIVE');");

    /*Selecting the id form login table to use in user_profile table*/

  • 8/12/2019 Doc Handicraft (1)docs

    46/63

    46

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    $res=$ob->execute("SELECT `Id` FROM `user_loging` WHERE

    `User_name`='$username';");

    $loginId= mysql_fetch_row($res);

    /*Inserting details to handicraft_profile table*/$res=$ob->execute("INSERT INTO `base_table`.`handicrfter_profile` (`Id_login`, `Name`,

    `Gender`, `Age`, `Address`, `District`, `Pin`, `Email`, `Mobile`, `Tp_crft`, `Tp_prdcn`,

    `Turn_over`, `Bank_dtls`, `Acc_no`) VALUES ('$loginId[0]', '$name', '$gender', '$age',

    '$address', '$district', '$pin', '$email', '$mobile', '$typeOfCraft', '$typeOfProduct', '$turnover',

    '$bankdtls', '$acountNo');");

    return $res;

    }/*-End of function insert-profile-()-*/

    public function insert_product($uid,$agid,$d,$pname,$des,$type,$pho,$price,$qty)

    {

    $ob=new dbase();

    $ob->execute("insert into

    product_dtls(Id_hdct,agent_id,Date,Name,Info,Type,Image,Price)values($uid,$agid,'$d','$pna

    me','$des','$type','$pho','$price')");

    }

    public function request_loan($amount,$hid,$dat)

    {

    $ob=new dbase();

    $res=$ob->execute("select name from handicrfter_profile where

    id_login='$hid'");

    $hname= mysql_fetch_row($res);

    $ob->execute("INSERT INTO `base_table`.`loan` (`u_id`, `name`, `date`,

    `amount`, `status`) VALUES ('$hid', '$hname[0]', '$dat', '$amount', 'PENDING');");

    }

    }

    /*This class containg the details of Agency insertin functions*/class insert_Admin

  • 8/12/2019 Doc Handicraft (1)docs

    47/63

    47

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    {

    /*This Function insert value from form Agency_register */

    public function

    insert_profile($name,$username,$password,$address,$district,$pin,$email,$phone,$mobile){

    $ob=new dbase();

    /*Inserting login details to login table */

    $res=$ob->execute("INSERT INTO `base_table`.`user_loging` (`User_name`,

    `Password`, `Role`, `Status`) VALUES ('$username', '$password', 'AGENCY', 'ACTIVE');");

    /*Selecting the id form login table to use Agency_profile

    table*/

    $res=$ob->execute("SELECT `Id` FROM `user_loging` WHERE

    `User_name`='$username';");

    $loginId= mysql_fetch_row($res);

    /*Inserting details to Agency_profile table*/

    echo $q="INSERT INTO `base_table`.`agency_profile`

    (`Id_login`, `Name`, `Address`, `district`, `Pin`, `Email`, `Phone`, `Mobile`) VALUES

    ($loginId[0], '$name', '$address', '$district', '$pin', '$email', '$phone', '$mobile')";

    $res=$ob->execute("");

    return $res;

    }

    /*-End of function insert-profile-()-*/

    /*Inserting event to table */

    public function insert_event($title,$date,$info,$place,$type,$time){

    $ob=new dbase();

  • 8/12/2019 Doc Handicraft (1)docs

    48/63

  • 8/12/2019 Doc Handicraft (1)docs

    49/63

  • 8/12/2019 Doc Handicraft (1)docs

    50/63

  • 8/12/2019 Doc Handicraft (1)docs

    51/63

    51

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Login

    User Name

    Password

    Not Yet Registerd ?

    User,Handicrafter

    Categories

  • 8/12/2019 Doc Handicraft (1)docs

    52/63

    52

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    Category 1

    Category 2

    Category 3

    Category 4

    Category 5

    Category 6

    Category 7

    Category 8

    Category 9

    Category 10

    Category 11

    Category 12

    Category 13

  • 8/12/2019 Doc Handicraft (1)docs

    53/63

    53

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    previous next

    Donec imperdiet

    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec imperdiet, metus ac

    cursus auctor, arcu felis ornare dui.

  • 8/12/2019 Doc Handicraft (1)docs

    54/63

  • 8/12/2019 Doc Handicraft (1)docs

    55/63

    55

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    2010 Shop Around. Design by Chocotemplates.com

  • 8/12/2019 Doc Handicraft (1)docs

    56/63

  • 8/12/2019 Doc Handicraft (1)docs

    57/63

    57

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    execution and resultant data collection and evaluation. A software testing strategy should be

    flexible enough to promote a customized testing approach. At the same time, it must be rigid

    enough to promote reasonable planning and management tracking as the project progresses.

    The project manager, software engineers and testing specialists develop a strategy for

    software testing. The general characteristics of software testing strategies are :

    White Box Testing

    White box testing strategy deals with the internal logic and structure of the code.

    White box testing is also called as glass, structural, open box or clears box testing. The tests

    written based on the white box testing strategy incorporate coverage of the code written,

    branches, paths, statements and internal logic of the code etc.

    In order to implement white box testing, the tester has to deal with the code and hence

    is needed to possess knowledge of coding and logic i.e. internal working of the code. White

    box test also needs the tester to look into the code and find out which unit/statement/chunk of

    the code is malfunctioning.

    Black box Testing

    Black Box Testing is not a type of testing; it instead is a testing strategy, which does

    not need any knowledge of internal design or code etc. As the name "black box" suggests, no

    knowledge of internal logic or code structure is required. The types of testing under this

    strategy are totally based/focused on the testing for requirements and functionality of the

    work product/software application. Black box testing is sometimes also called as "Opaque

    Testing", "Functional/Behavioral Testing" and "Closed Box Testing".

    The base of the Black box testing strategy lies in the selection of appropriate data as

    per functionality and testing it against the functional specifications in order to check for

    normal and abnormal behavior of the system.

  • 8/12/2019 Doc Handicraft (1)docs

    58/63

    58

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    6. SYSTEM IMPLEMENTATION

    The implementation is the final and important phase. It involves user training, system

    testing in order to ensure successful running of the proposed system. Once the system design

    phase is over, the next stage is to implement and monitors the operation of the system to

    ensure that it continues the work effectively and efficiently.

    The three main phases in implementation take place in series. These are the initial

    installation, the test of the system as a whole and evaluation maintenance and control of the

    system. The implementation plan and action to implement should be bound closely together.

    The implementation plan is a function of line management at least as far as key decision or

    alternative plans are concerned.

    The implementation plan was to convert the existing clerical files to the computer.

    The implementation plan listed all sub tasks so that individuals in the organization may be

    assigned specific responsibilities.

    The installation of the new system that is bound to replace the current one may

    require a major revision of computer facilities as well as completely new after space. Space

    planning took into account the space occupied by the people, space by equipment and the

    movement of people and equipment in the working investment. After conduction the initial

    testing the system is loaded on the client offices computer. Some of the user employees in

    this case are selected. These users are trained first and they run the system. A detailed

    documentation is prepared to this set of employees. There may be slight modifications to

    meet the organization.

    After all modifications specified by the users in the documentation are made, the

    computer system is run along with manual system. Even though this kind of parallel run

    make extra burden to the employees and management, the system is run in parallel for the

    sake of checking reliability and efficiency. After this document, which compares the result of

    the manual system with those of the computerized is prepared. If there is any modifications

    are made as needed.

    A procedure is developed for delivering instructions and forms to supervisors for

    coordination and integrating the proposal with other parts of the organization, and for

    working out of problems with people involved. This procedure also helped for evaluation of

    hardware and software. A program was developed to emphasis the nature and goals of the

  • 8/12/2019 Doc Handicraft (1)docs

    59/63

    59

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    new system on the management and the support personnel and train operation personnel in

    their new tasks.

    In the case of management many of whom participated in the development of the

    system short seminars were given. Particular attention was paid to the training of end users.

    The training sessions were aimed at giving the user staff the specific skills required in their

    new jobs. They were given practical training to have a thorough understanding of what the

    new system is like and how it behaves.

    Education involved creating the right atmosphere and motivation of user staff. It

    explained the need for changes and helped to overcome the resentment caused by the feeling

    that computers took away the responsibility from individual departments.

    Various measures have been taken by department officials in order to find suitable

    solutions by the following issues:

    About the skill to be acquired. Reduction of man power in department About the new form having all required option.

  • 8/12/2019 Doc Handicraft (1)docs

    60/63

    60

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    7. SYSTEM MAINTENANCE

    The term maintenance is used to describe the software engineering activities that

    occur following the delivery of a software product to the customer. The maintenance phase

    of the software lifecycle is the time period in which software performs useful work. We

    may define maintenance by describing four activities that are undertaken after a program

    is released for use. During the use of any large program, errors will occur and be reported

    to the developer. The process that includes the diagnosis and correction of one or more

    error is called corrective maintenance. Thus problem correction involves modification and

    revalidation of software to corrective maintenance.

    The second activity that contributes to a definition of maintenance occurs

    because of the rapid change that is encountered in every aspect of computing. An activity

    that modifies software to properly interface with a changing environment is adaptive

    maintenance. The third activity occurs when a software package is successful. As software

    is used recommendations for new capabilities, modifications to existing function and

    general enhancements are received from users. To satisfy request in this category,perfective maintenance is performed. The fourth and last maintenance activity occurs

    when software is changed to improve future maintainability or reliability or to provide

    activities including correcting, coding and design, updating, documentation and test data

    and upgrading user support. Maintenance means restoring something to its original

    conditions. In contrast, enhancements mean adding or modifying or re execution.

  • 8/12/2019 Doc Handicraft (1)docs

    61/63

    61

    B.Sc Computer Science ,UIT Yeroor 2011-2014

    ONLINE HANDICRAFT MARKETING

    8. SYSTEM SECURITY

    System Securityencompasses measures taken throughout the application's life-cycle

    to prevent exceptions in the security policy of an application or the

    underlying system (vulnerabilities) through flaws in the design, development, deployment,

    upgrade, or maintenance of the application.

    Applications only control the use of resources granted to them, and

    not which resources are granted to them. They, in turn, determine the use of these resources

    by users of the application through application security.

    Open Web Application Security Project (OWASP) and Web Application Security

    Consortium (WASC) updates on the latest threats which impair web based applications. This

    aids developers, security testers and architects to focus on better design and mitigation

    strategy. OWASP Top 10 has become an industrial norm in assessing Web Applications.

    Threat. A negative effect. Vulnerability. A weakness that makes a threat possible. Attack (or exploit). An action taken to harm an asset. Countermeasure. A safeguard that addresses a threat and mitigates risk.

    Security testing techniques scour for vulnerabilities or security holes in applications. These

    vulnerabilities leave applications open to exploitation. Ideally, security testing is

    implemented throughout the entire software development life cycle (SDLC) so that

    vulnerabilities may be addressed in a timely and thorough manner. Unfortunately, testing is

    often conducted as an afterthought at the end of the development cycle.

    ONLINE HANDICRAFTS MARKETING MANAGEMENT is secured by means of

    providing password protection for every type of users. It is also less vulnerable to external

    attacks by using php for its development. Non repudiations are avoided by logging all

    activities of users.

  • 8/12/2019 Doc Handicraft (1)docs

    62/63

  • 8/12/2019 Doc Handicraft (1)docs

    63/63