Professional Documents
Culture Documents
07A-003-BS
Ahmer Hussain
09B-006-BS
10B-097-BS
Supervisor
Engr. Abdul Rahman Mahmood.Assistant Professor
Project report submitted in partial fulfillment of the requirement for the award of the
Degree of BS (CS)
Karachi
Aug 2014
ST-13, Block 7, Gulshan-e-Iqbal, AbulHasanIsphani Road,
Opposite Safari Park, P.O. Box 75300, Karachi, Pakistan.
Phone: 34978274-5; 349904305, 34982476
http://www.uit.edu.pk
CHA
CERTIFICATE
The undersigned certify that they have read and accepted the Final Year Project Report
entitled
Software
Application)
Process
submitted
Implementation
by
Syed
In
E-commerce
Nabeel
Junaid
Portal
(Web
07A-003-BS,
Dated: _________________
_____________________________
Asst. Prof. Abdul Rahman Mahmood
Project Supervisor
ii
CHA
CERTIFICATE
This is to certify that the project report entitled Software Process Implementation
In E-Commerce Portal (Web Application) being submitted by Mr. Anas Ul Haq Qureshi,
Mr. Syed Nabeel Junaid and Mr. Ahmer Hussain in partial fulfillment for the award of
the Degree of Bachelor of Computer Science in 2014 to the Hamdard University is a
record of bonafied work carried out by said students under the supervision of Engr.
Abdul Rahman Mahmood Assistant Professor and evaluated by the panel.
The results embodied in this project report have not been submitted to any other
University or Institute for the award of any Degree or Diploma
________________________________
Assoc. Prof. Engr. Parkash Lohana
HOD, CS Department
__________________________
Asst. Prof. Syed Faisal Ali
FYP, Incharge
_________________________________
Engr. Asst. Prof. Abdul Rahman Mahmood
Supervisor
iii
CHA
__________________________
External Supervisor
ACKNOWLEDGEMENT
We have taken efforts in this project. However, it would not have been possible without
the kind support and help of many individuals. We would like to extend my sincere
thanks to all of them.
This project could not have been completed without Engr. Abdul Rahman Mahmood (IT
Security Consultant-Appxone, Assistant Professor -UIT) who not only served as our
supervisor but also encouraged and challenged us throughout our academic program. And
to my panels, Asst. Prof. Syed Faisal Ali (FYP In-charge) and Engr. Abdul Rahman
Mahmood thank you for evaluating our report with fairness and objectivity.
We would also like to express our gratitude to all our friends who provide advice and
guidance. Last but not least to our parents for supporting us when we need them.
Our thanks and appreciations also go to our university in developing the project and
people who have willingly helped us out with their abilities.
iv
CHA
ABSTRACT
The purpose of this project is to study software process model and to understand how to apply
software engineering concepts in the development of E-Commerce portal. In order to understand
the concepts of analysis, architecture and design. We also prepared case studies which in future
can be taught in software development course.
The project includes all major features and functionality of a typical e-commerce website.
Including a categorize list of different products available purchase, an application to search a
specific product, shopping cart application, a sign-up / log-in application, credit card payment
application etc. This project is done under a guidance of a software house.
CHA
TABLE OF CONTENT
i List of Tables .............................................................................................................. ix
ii List Of Figures .............................................................................................................x
1 Introduction .................................................................................................................1
1.1 Four E-Commerce business models......................................................................2
1.2 Project Objective ..................................................................................................5
1.3 Project Scope ........................................................................................................5
2 Software And Hardware Requirements ...................................................................6
2.1 Hardware Requirement .........................................................................................7
2.2 Software Requirement ..........................................................................................8
3 Literature Review .......................................................................................................9
3.1 Privacy and security issue's .................................................................................10
3.2 Processes .............................................................................................................13
3.3 Methodology .......................................................................................................18
3.4 SDLC ..................................................................................................................20
3.5 Case Studies ........................................................................................................22
4 Software Requirment Analysis ................................................................................28
4.1Software Requirments ..........................................................................................29
4.2 System Modules And Their Functionalities ......................................................29
4.2.1 User ............................................................................................................30
4.2.2 Administrator .............................................................................................30
5 Software design ..........................................................................................................36
vi
CHA
vii
CHA
viii
CHA
LIST OF TABLES
ix
CHA
LIST OF FIGURES
CHA
CHAPTER 1
_____________________________________________________________________________
CHAPTER 1
INTRODUCTION
_____________________________________________________________________________
CHA
CHAPTER 1
The software process implementation is defined as to develop software step by step acquiring
the activities which includes planning, design, coding and deployment/maintenance. To
implement these activities we developed an e-commerce application [1]. A typical e-commerce
website which includes a categorized list of different product available for purchase, an
application to search a specific product, a shopping cart application, a sign-up/ log-in application,
a credit card payment application etc.
E-commerce is a trading in products or services using computer networks, such as the internet.
Electronic commerce draws on technologies such as mobile commerce, electronic funds
transfer, supply chain management, Internet marketing, online transaction processing, electronic
data interchange (EDI), inventory management systems, and automated data collection systems.
Modern electronic commerce typically uses the World Wide Web for at least one part of the
transaction's life cycle, although it may also use other technologies such as e-mail
[2]
. E-
Provide detail or virtual storefront on websites with online catalogs, sometimes gathered into
a "virtual mall"
Gather and use demographic data through web contacts and social media.
Reach prospective and established customers by e-mail or fax (for example, with
newsletters).
CHA
CHAPTER 1
all examples of B2C. B2B are businesses selling products to other businesses. B2B are usually
larger companies that are supplying a service to other businesses. For example, office max is a
business that sells office supplies to other businesses. Also, they are almost always doing
business over the web. C2C is a website that consumers sell to other consumers. People are
brought together to sell and buy products for this model
[4]
place for consumers to sell and buy items. B2G consists of businesses working with the
government. For example, the IRS is a way for businesses to pay their taxes through the web.
These four E-Commerce business models are very common in this day-in-age.
1.1.1 Business-to-Consumer
Business-to- consumer (B2C) model is a business or transactions conducted directly between a
company and consumers who are the end-users of its products or services. [5] The term became
popular during the dot-com boom
[6]
down, the companies such as Amazon.com and Priceline.com survived and became the most
successful companies in the world. This model is likely familiar to most people. If a person have
purchased an item online for their own use, the person e-tailed. The concept was first developed
in 1979 by Michael Aldrich, an English inventor, who connected a television set to a transaction
processing computer with a telephone line and coined the term "teleshopping."[7]
1.1.2 Business-to-Business
Business-to-business (B2B) is a type of commerce transaction that exists between businesses,
such as those involving a manufacturer and wholesaler, or a wholesaler and a retailer. A typical
supply chain involves multiple business to business transactions, as companies purchase
components and other raw materials for use in its manufacturing processes.[8] An example that
illustrates the business to business concept is automobile manufacturing such as buying tires,
glass for windscreens, and rubber hoses for its vehicles. B2B is also used in the context of
communication where employees from different companies can connect and communicate with
one another, such as through social media like Linkedin.com
CHA
CHAPTER 1
1.1.3 Consumer-to-Consumer
Consumer-to-Consumer (C2C) is a type of electronic commerce in which consumers buy, sell, or
trade products and services from one another through a third party website. [9] The third party
website can be either fee-based or free as long as transactions are between consumers. Some
popular websites known for Consumer-to-Consumer transactions include Craigslist, eBay, and
Auto Trader. There are many advantages of C2C e-commerce. Because business transactions are
done between consumers and not businesses, buyers and sellers do not need to account for taxes.
Also, the transactions are done on a personal level and there are no legal obligations like
companies might have. This allows for prices to be negotiated and sometimes bartering can take
place. Most transactions that take place on websites like Craigslist, however, are paid for with
cash, so it is difficult to return items or purchase them with credit cards. There is also a lot of
safety concerns with consumer-to-consumer transactions. Because many sales are completed
from peoples houses, there is a lack of privacy. Also, because the buyers may be going to
someones house to buy a product, there are in danger of being kidnapped. That is why many
Craigslist users suggest meeting in a public area. The best part about C2C commerce is that there
are many different websites that you can use to match both the product you are selling as well as
the way you would like to sell it. If you dont want to have someone coming to your house
through Craigslist, then you can simply sell your item through eBay and ship it to another
consumer. It is all about putting more power into the consumers hands. [10]
This project is about online shopping or e-shopping is a form of electronic commerce which
allows consumers to directly buy goods or services from a seller over the internet using a web
browser. Alternative names are: e-web-store, e-shop, e-store, Internet shop, web-shop, web-store,
online store, online storefront and virtual store.
An online shop evokes the physical analogy of buying products or services at a bricks-andmortar retailer or shopping center; the process is called business-to-consumer (B2C) online
shopping.
CHA
CHAPTER 1
1.2 Project objectives
It will display the product catalogue and details according to the category.
Display and allow cancelation of orders that are eligible for cancelation.
Admin panel is the back end of application from where the admin can manage the whole
site and its contents as well.
User will be able to purchase products online and get a confirmation email.
Also prepare case studies which in future can be taught in Software development course.
CHA
CHAPTER 2
_____________________________________________________________________________
CHAPTER 2
SOFTWARE AND HARDWARE REQUIREMENTS
_____________________________________________________________________________
CHA
Our project is about E-Commerce portal (online shopping) in which user can buy product
online. The following is the development environment of what we will be developed:
Aptana Studio
My SQL
Xampp Server
PHP
CHA
CHAPTER 2
Hardware
Microsoft
Windows
XP/
CHA
CHAPTER 2
CHAPTER 3
_____________________________________________________________________________
CHAPTER 3
LITERATURE REVIEWS
_____________________________________________________________________________
CHA
Customers will be able to register to this site, browse product, make purchases and can update
their profile information
[11]
[12]
the website of the retailer directly or by searching among alternative vendors using a shopping
search engine.
Once a particular product has been found on the website of the seller, most online retailers
use shopping cart to allow the consumer to accumulate multiple items and to adjust quantities,
like filling a physical shopping cart or basket in a conventional store
[13]
. A "checkout" process
follows (continuing the physical-store analogy) in which payment and delivery information is
collected, if necessary
[14]
account so that some or all of this information only needs to be entered once. The consumer
often receives an e-mail confirmation once the transaction is complete.
Less sophisticated stores may rely on consumers to phone or e-mail their orders (although full
credit card numbers, expiry date, and Card Security Code,[15] or bank account and routing
number should not be accepted by e-mail, for reasons of security).
Admin panel is the back end of application from where the admin can manage the whole site and
its contents as well
[16]
email.
10
CHA
CHAPTER 3
websites.
people nowadays have various choices to do their shopping [17]. Big companies such as eBay and
amazon.com have introduced many value added features to help the customers to decide what to
shop for. With features such as price comparison, product photos and user reviews, consumers
can shop easily and smartly without even going to the stores and having such a hard time looking
for the products they want. All they have to do are just browse for the product they want in the
website and within a few mouse clicks they are off. Such simplicity is what makes online
shopping appealing for consumers [18]. The question is, why do many people still deny shopping
online? Well, for most people, privacy and security issues are their concerns. Hence, here I will
discuss customers perception of privacy and security issues, the reality of such issues and ways
to avoid those issues, all based on some trustworthy sources I have found.
To know customers perception of customer and security issues, I reviewed a scholarly article
entitled Consumer Perceptions of Privacy and Security Risks for Online Shopping produced
in the Journal of Consumer Affairs. In the United States, more than half of the adult population
uses the Internet and from that number, approximately half have shopped online (Sefton, qtd. in
Miyazaki and Fernandez
[19]
that privacy and security issues are vital for them to shop online (Rohm and Milne, qtd. in
Miyazaki and Fernandez
[20]
concern (U.S. FTC, qtd. in Miyazaki and Fernandez). In the research conducted by Miyazaki and
Fernandez, who are the authors of the articles themselves, privacy and security issues accounted
for more than 65 percent of consumers main concern as oppose to the other
[21]
for shopping
inconveniences and others. They also concluded that more experienced Internet users tend to
have more concern regarding privacy issues but less concern on security issues. Nevertheless,
consumers still consider both as their main concern for online shopping as suggested in the
survey.
11
CHA
CHAPTER 3
Shopping online has never been so easy. With the flourishing numbers of online merchants,
Now, after knowing that privacy and security issues are vital for consumers in online shopping, I
would like to know the emphasis in the real world. From an article titled The Myth of Secure EShopping published in PC World, the reality of such issue is revealed. While most consumers
House and IKEA, these big companies still receive frequent security threats (Kandra). Joseph
McDonnell, a CEO of online security firm I Shop Secure even confessed that all online firms
must have received threats of some sorts. He added by saying that hackers could easily infiltrate
and get customers personal information online as online shoppers are not anonymous. Experts
also discover that security measures taken by online retailers are insufficient
[22]
. For instance,
data encryption only applies in actual transfer of customer data but not in the database which is
ironically the most common targets for hackers. Some other sites however, do not even have
privacy and security policy posted implying that they do not protect their customers (Hairell).
This is what happened to Biblio find when it was hacked hence compromising its customers
credit information (Kandra) [23]. Apart from the retailers themselves, credit card processing firms
and third party sites also receive threats (Kandra).Creditcards.com once had disclosed that
someone had infiltrated its site and posted more than 55000 credit card numbers on the Internet.
So, from all these indications, I can see that online shopping is not totally safe.
However, customer rights and security aspects are not just the responsibility of online merchants.
To uphold them, the consumers themselves need to act. According to Ten Things Your Mother
Never Told You about Online Shopping published in Yahoo! Internet Life, to be an ace
consumer, online shoppers need to prepare themselves with some basics (Halpin). As the
prominent method of payment is credit card, consumers should be more aware in handling it
[24]
They should never disclose their credit information via e-mail. Some of the credit card issuers
also have some sorts of protection that consumers should apply for. Apart from that, consumers
should limit themselves from releasing unnecessary personal information such as age and income
to protect their privacy (Hood, qtd. in Halpin). Also, as Todd Richter who is the president of girl
shop (an e-commerce site) had said, consumers should always be aware of the security
technology used by merchant sites
[12]
VeriSign play vital part in distinguishing one site from another. Nonetheless, consumers should
always be alert of the privacy and customer policy in each site they tend to buy from (Halpin).
12
CHA
CHAPTER 3
trust big and well established online merchant such as CD Universe, Travelocity, Columbia
Lastly, if there are still dissatisfactions, consumers could always report them to consumer-related
agencies such as Better Business Bureau or Federal Trade Commission (Halpin).
Thus, after reviewing these three reliable sources related to the privacy and security issues of
tends to shop online will think twice before they buy anything as to consider the privacy and
security issues related to it. This is proven in my first source (Consumer Perceptions of Privacy
and Security Risks for Online Shopping) through the survey. People are always conscious about
their privacy and security. However, this is not the case in the real world. As my second source
(The Myth of Secure E-Shopping) has proposed, even though online merchants have tried their
best to beef up the security, threats and attacks still prevail
[25]
act fast to protect their privacy when shopping online. My third source (10 Things Your Mother
Never Told You about Online Shopping) explains many ways that consumers could do to
enhance the privacy and security aspect apart from what online merchants have done for the
same reason. Taking all these contents as a whole, I would say that in any situation, people can
still shop online safely provided they understand the reality and take some precautions above all.
3.2 PROCESSES
The process which is not implementing in the project is the discount process which is not part of
the requirement of the project. And there is an option given in the project whenever the price of
the product reduces admin will reduce the price by getting into edit option. Following are the
processes which implement in the project are
3.2.1.
Sign In Process
3.2.2.
Sign Up Process
3.2.3.
Purchase Process
3.2.4.
Order Process
3.2.5.
3.2.6.
Checkout Process
3.2.7.
Admin Process
3.2.8.
Confirmation Process
13
CHA
CHAPTER 3
online shopping, I can see some interconnections between them. By common sense, anyone who
User view the sign In page and enter user name and password .If the user name and
password are correct then system display the page
If the username and password are in correct then it show the message username/password
are incorrect
In this process user have to register (sign Up) for this site and submit the required
information as needed.
System save the information and confirm the user to successfully to sign in
14
CHA
CHAPTER 3
In this process the shopping cart keep the track of the products which the user selected .
Before checkout if a user want to remove or change some quantity of product then user
can do it
This process starts when the user done with shopping cart process and user click on the
checkout button.
If the user logged In then he can buy the product give the shipment address and billing
address and give the payment online after the payment user receive the confirmation
email.
If the user not log In/Sign Up then user cant buy the product
15
CHA
CHAPTER 3
When user wants to buy the product user simply select the product and add the product to
shopping cart.
If user wants to buy more product he simply select more products and add to shopping
cart and change the quantity of products according to his needs and then checkout .
After selecting the product user wish to purchase the product and proceed to the shopping
cart and checkout.
After checkout user give the shipment address and billing address and give the payment
online after the payment user receive the confirmation email.
16
CHA
CHAPTER 3
In this process the admin can add, edit the product detail, activate, deactivate the product
also
After the shipment address, billing address and online payment the user receive the email as
confirmation from system about the recent buy from the user
17
CHA
CHAPTER 3
3.3 METHODOLOGY
The waterfall model implement in the project. The waterfall model is a sequential design process
In each phase of this model it has specific deliverables and review process
This model works well for small projects where requirements are understood
Its not a good model for object oriented and complex projects
18
CHA
CHAPTER 3
which used in software development process in which progress is seen as flowing steadily
CHAPTER 3
3.3.3.1 REQUIREMENTS
In this phase we gather the data for the project, analysis the user (dgs) needs and developed their
requirement. Create the functional requirement document known as SRS (Software Requirement
Specification) for the user (dgs Software House) needs
3.3.3.2 DESIGN
For high-level design we focus on system architecture and design. It provide overview of
solution platform, system, product and services .For low-level design software components are
designed. It define actual logic for each and every component of system
3.3.3.3 TESTING
In this phase once coding is complete we integrate data and design. For testing we did white box
testing and quality assurance testing. Testing software were also used for load testing and
performance testing for the system
19
CHA
3.3.3.4 IMPLEMENTATION
After the some integration and testing process we implement our system into production
Data
Requirement
Designing
Development
Integration &
Testing
Implementation
Maintenance
3.4.1.
Planning
3.4.2.
3.4.3.
Designing
3.4.4.
Development
3.4.5.
3.4.6.
Implementation
3.4.7.
Maintenance
3.4.1 PLANNING
In this project we developed a plan first to gather data and made some documents of the project
which required explanation of the project, advantages of this project and mockup plan, uml
diagrams, templates and structure. Second to start the development and implementation and last
the integration and testing to be done
20
CHA
CHAPTER 3
3.4.3 DESIGN
In this phase design has been made and according to the requirement the design had to be simple,
attractive and user friendly and HCI (Human Computer Interaction) principle has also been
followed in this design. For high-level design we focus on system design and architecture. It
provide overview of solution platform, system, product and services. For low-level design
software components are designed. It defines actual logic for each and every component of
system. Class diagram with all methods and relation between the classes comes under low level
diagram
3.4.4 DEVELOPMENT
In development we convert a design into complete information system which acquire some
system for which we install Xampp server, aptana studio. For Database we use My SQL. And for
coding HTML code, PHP code and codeingniter framework were used for the development.
21
CHA
CHAPTER 3
needs and developed their requirement. Create the functional requirement document known as
3.4.6 IMPLEMENTATION
After the some integration and testing process we implement our system into production
CHAPTER 3
Client:
Ahmed Rashid
Location:
Karachi, Pakistan
Project Name:
3.5.1.1 PROBLEM
Client is a Business man , He own one website which is on online shopping to grow his business
via internet as todays most of the economy is running through internet (i.e E-Commerce).
Users are facing problem in his website, quantity of a product in shopping cart was not updating
in the database automatically. It only update when user change the quantity and press update
button.
22
CHA
Client ask to remove update button from shopping cart and ask to put drop box in quantity so
3.5.1.2 SOLUTION
The process started with a series of requirement gathering sessions, and once we felt we had
enough information, a sketch based version of the system was developed to demonstrate how we
felt it would function. Following a number of refinements, we were able to take a detailed
specification through to development and delivered a working solution within a relatively short
timeframe. By using php and My Sql database, the system can be accessed from any internet
browser, whether it's in or out of the office and has made a dramatic improvement to this part of
the business.
23
CHA
CHAPTER 3
24
CHA
This solid foundation allowed us to come up with a carefully thought-out analysis, which in its
turn provided the support for a complete design. Marketing contributed by supplying only a
minimal number of functionality changes during the development process. The well-thought-out
Estimates for the reuse fraction of the output of the analysis, design, and implementation phases
range between 80% and 100%.
Whether the maintenance cost for this system will be reduced is as yet unknown.
Q2: How many people wrote code for new shopping cart functionality? How many people
Report the problems? How many people repaired defects?
We want to see how large the shopping cart development is, and identify how many people
actually occupied each of these traditional development and support roles.
25
CHA
CHAPTER 3
development.
We conjecture that the well-thought-out requirements document was the key element. Our
familiarity with the product domain must also have contributed to the clarity of the requirements.
3.5.3.4 PROBLEM
Our sets of questions (Q1-Q2) are aimed at understanding the problem of shopping cart which
came to exist.
26
CHA
CHAPTER 3
MySql. And for coding HTML code, PHP code and codeingniter framework were used for the
CHAPTER 3
RESULT
27
CHA
CHAPTER 4
SOFTWARE REQUIREMENT ANALYSIS
_____________________________________________________________________________
28
CHA
CHAPTER 4
_____________________________________________________________________________
E-Commerce stands for electronic commerce. It has two panels user and administrator. User can
sign up/login, buy, add, edit, delete items in shopping cart. Admin can add, activate/deactivate
product, reset password
XAMP Server
- Functional requirement
- Non-Functional requirement
4.2.1 FUNCTIONAL REQUIREMENT
4.2.1.1 SYSTEM MODULES AND THEIR FUNCTIONALITIES:
Following are the main module of the system:
4.2.1.1.1.
User
4.2.1.1.2.
Administrator
4.2.1.1.1 User:
User can simply signup/login into web self-care portal view site, buy, add, edit,
delete items in shopping cart
29
CHA
CHAPTER 4
4.2.1.1.2 Administrator:
Admin can add, activate/deactivate product, reset password of customer confirm
and cancel order of customer
4.2.1 NON-FUNCTIONAL REQUIREMENT
Easy to maintain
30
CHA
CHAPTER 4
CHAPTER 4
Figure 4.3.1- Shopping Portal
31
CHA
32
CHA
CHAPTER 4
33
CHA
user was not automatically login user had to enter username and password to login. Later that
bug was observed and the developer fixed it now after the signup process user automatically
login
4.3.5.2 WORKING OF SIGN IN & SIGN UP
34
CHA
CHAPTER 4
There was a bug when user sign Up and fill the requirement which required the. After signup
CHAPTER 4
the product and view the product detail also. User can see the product detail from any page
35
CHA
_____________________________________________________________________________
SOFTWARE DESIGN
____________________________________________________________________________
36
CHA
CHAPTER 5
CHAPTER 5
CHAPTER 5
interactions organized around the objects and their links to each other.
37
CHA
Admin
User
Manage site
users and
Products
Login/Sign Up
View Product
Buy Product
38
CHA
CHAPTER 5
Select
Product
CHAPTER 5
programmed
39
CHA
(i)
User class which is responsible to add user, update user record, delete user record and change
user password.
Administrator class which is responsible to deactivate user account and reset user password.
(iii)
(iv)
Shopping cart class which is responsible to add and delete the product.
(v)
(vi)
CHAPTER 5
(ii)
40
CHA
CHAPTER 5
perspective.
Fig 5.4 shows the static design of system but from the real or prototypical perspectives
41
CHA
CHAPTER 5
Fig 5.5 shows the hardware configurations together with the software components that lived on.
42
CHA
43
CHA
CHAPTER 5
In fig 5.6 shows (i) New customer can search products, register account then purchase product (ii) Normal
customer can simply login then purchase product (iii) Admin can manage site and manage user account
44
CHA
CHAPTER 5
CHAPTER 5
registered user can only browse the products but cannot buy anything
45
CHA
CHAPTER 5
manage site
46
CHA
CHAPTER 5
product
47
CHA
CHAPTER 5
In register user sequence diagram that user has simply log in for purchasing the product
48
CHA
CHAPTER 5
In admin sequence diagram that admin can manage products, manage user account also enable or
disable account.
49
CHA
Arrows run from the start towards the end and represent the order in which activities
happen.
50
CHA
CHAPTER 5
CHAPTER 5
Fig. 5.8 Activity Diagram
In Fig. 5.8 This activity diagram is used to identify the user and then granting him the selected
privileges
51
CHA
5.9 FLOWCHART
A flowchart is a type of diagram that represents an algorithm, workflow or process, showing the
CHAPTER 5
steps as boxes of various kinds, and their order by connecting them with arrows.
52
CHA
5.10 ER DIAGRAM
An entity-relationship diagram is a data modeling technique that creates a graphical
representation of the entities in a system, and the relationships between entities. The main
components of ER models are entities (things) and the relationships that can exist among them,
and databases.
Fairly mechanical ways to convert E.R diagrams to real implementations like relational
databases exist
53
CHA
CHAPTER 5
CHAPTER 5
Fig. 5.10ER Diagram
54
CHA
CHAPTER 5
of individual objects as well as the overall operation of the system in real time.
55
CHA
56
CHA
CHAPTER 5
them
In this Fig 5.13 it tells the relationship between the login, shopping cart, checkout ,payment and email
confirmation
In this Fig 5.14 it shows the state of different nodes that user has to first login then select the
item to shopping cart then user can purchase the item
57
CHA
CHAPTER 5
58
CHA
CHAPTER 5
_____________________________________________________________________________
CHAPTER 6
Algorithm And Its Complexity
CHAPTER 6
_____________________________________________________________________________
59
CHA
instructions.
A software fragment with a CCN value between 1-4 has low complexity.
Everything between 6-10 has a high complexity, while everything greater 10 is very
complex and hard to understand.
60
CHA
CHAPTER 6
step at a time. In both uses, the dry run is frequently assisted by a table (on a computer screen or
on paper) with the program or algorithm's variables on the top.
The usage of "dry run" in acceptance procedures (for example in the so-called FAT = factory
acceptance testing) is meant as following: the factory - which is a subcontractor - must perform a
complete test of the system it has to deliver before the actual acceptance from the contractor side.
else
2.3) if (target < middle item)
list = first half of list
2.4) else (target > middle item)
list = last half of list
end while
3) if (have found target)
location = position of target in original list
4) return location as the result
Pseudo Code:
location = -1;
first = 0;
last = number of items minus 1;
while ((number of items left to search >= 1) and (target not found))
middle = position of middle item, halfway between first and last
if (item at middle position is target)
61
CHA
target found
else
if (target < middle item)
search lower half of array next
last = middle - 1;
else
search upper half of array next
first = middle + 1;
end while
6.4.1Complexity:
To evaluate search, count the number of comparisons in the best case and worst case. This
analysis omits the average case, which is a bit more difficult, and ignores any differences
between algorithms in the amount of computation corresponding to each comparison.
The best case occurs if the middle item happens to be the target. Then only one comparison is
needed to find it. As before, the best case analysis does not reveal much.
When does the worst case occur? If the target is not in the array then the process of dividing the
list in half continues until there is only one item left to check.
The following table 6.1 summarizes the analysis for searching algorithm.
62
CHA
CHAPTER 6
Model
Number of Comparisons
Comparisons as a function
(for n = 100000)
of n
Best Case
(Least/fewest Comparisons)
Worst Case
16
(Most comparisons)
Log2n
Table 6.3
O(1)
Worst Case:
O(log2n)
The running time of sorting is a linear function of the array size, r p + 1, and the distance of q
from p, q p. This is (r p + 1).
Graphical Representation:
5
4
3
2
1
0
1
9 10 11 12 13 14 15 16 17 18 19 20
O(1)
O(Log2n)
63
CHA
CHAPTER 6
ELSE
PRINT Users first Login
Update user address in database
64
CHA
END IF
END
Complexity:
To evaluate search, count the number of comparisons in the best case and worst case. This
analysis omits the average case, which is a bit more difficult, and ignores any differences
between algorithms in the amount of computation corresponding to each comparison.
The best case occurs if the middle item happens to be the target. Then only one comparison is
needed to find it. As before, the best case analysis does not reveal much.
When does the worst case occur? If the target is not in the array then the process of dividing the
CHAPTER 6
list in half continues until there is only one item left to check.
The following table 6.2 summarizes the analysis for login algorithm.
Model
Number of Comparisons
Comparisons as a function
(for n = 100000)
of n
Best Case
(Least/fewest Comparisons)
Worst Case
16
(Most comparisons)
O(1)
Worst Case:
O(log2n)
65
CHA
Log2n
Graphical Representation:
5
4
3
2
0
1
9 10 11 12 13 14 15 16 17 18 19 20
O(1)
O(Log2n)
66
CHA
CHAPTER 6
_____________________________________________________________________________
TESTING
_____________________________________________________________________________
67
CHA
CHAPTER 7
CHAPTER 7
7.0 TESTING:
Testing is the practice of making objective judgments regarding the extent to which the system
(device) meets, exceeds or fails to meet stated objectives.
There are two fundamental purposes of testing: verifying procurement specifications and
managing risk. First, testing is about verifying that what was specified is what was delivered: it
verifies that the product (system) meets the functional, performance, Design and implementation
requirements identified in the procurement specifications. Second, testing is about managing risk
for both the acquiring agency and the systems Vendor/developer/integrator.
The testing program is used to identify when the work has Been completed so that the contract
CHAPTER 7
can be closed, the vendor paid, and the system Shifted by the agency into the warranty and
maintenance phase of the project [31].
Testing to verify a product meets customer specified requirements. A customer usually does this
type of testing on a product that is developed externally.
Testing without knowledge is the internal workings of the item being tested. Tests are usually
functional.
68
CHA
Testing to ensure compatibility of an application or web site with different browsers, operating
syatem, and hardware platforms. Compatibility testing can be performed manually or can be
driven by an automated functional or regression test suite.
Verifying implementation conformance to industry standards. Producing tests for the behavior of
an implementation to be sure it provides the portability, interoperability, and/or compatibility a
Validating an application or Web site conforms to its specifications and correctly performs all its
required functions. This entails a series of tests which perform a feature by feature validation of
behavior, using a wide range of normal and erroneous input data. This can involve testing of the
product's user interface, APIs, database management, security, installation, networking; etc
testing can be performed on an automated or manual basis using black box or white box
methodologies.
It is a testing in which the modules are combined and tested as a group. Modules are typically
code modules, individual applications, client and server applications on a network, etc.
Integration Testing follows unit testing and precedes system testing.
69
CHA
CHAPTER 7
standard defines.
Load testing is a generic term covering Performance Testing and Stress Testing.
Performance testing can be applied to understand your application or web site's scalability, or to
benchmark the performance in an environment of third party products such as servers and
middleware for potential purchase. This sort of testing is particularly useful to identify
performance bottlenecks in high use applications. Performance testing generally involves an
automated test suite as this allows easy simulation of a variety of normal, peak, and exceptional
CHAPTER 7
load conditions.
70
CHA
71
CHA
CHAPTER 7
specified requirements. System testing falls within the scope of black box testing, and as such,
Performance testing is testing that is performed, to determine how fast some aspect of a
system performs under a particular workload.
It can serve different purposes like it can demonstrate that the system meets performance
criteria.
It can compare two systems to find which performs better. Or it can measure what part of
the system or workload causes the system to perform badly.
This process can involve quantitative tests done in a lab, such as measuring the response
time or the number of MIPS (millions of instructions per second) at which a system
CHAPTER 7
functions.
72
CHA
Fig 7.1.1
Failed unit tests tell which assert (file:line) failed, but not which validation resulted in the
failure.
Blue Line Shows the Users
In Failed Validation the User Line Shows that how many user use the application at a
time.
73
CHA
CHAPTER 7
Fig 7.1.2
If your pages/steps/second for your static content is low but dynamic content is high, then
your application or server configuration may be to blame.
Blue Line Shows Users
In Failed Validation the User Line Shows that how many user use the application at a
time.
74
CHA
CHAPTER 7
Fig 7.1.3
75
CHA
CHAPTER 7
The concept of a time constant works - and works well - for first order systems
8 GB RAM
Conclusion:
Execution time depends upon the following factors
Numbers of users
Speed
Speed of system
76
CHA
CHAPTER 7
Hardware Configuration:
Pages
The Page
Load
Time section
pages: With
Virtual
Users, Scroll
Chart and Chart by Region. These tabs show graphs with page load time statistics in different
modes. The sections below contain a detailed description of the tabbed pages and graphs
mentioned above.
This tab contains a graph that shows how the page load time and the number of virtual users
changed during the test run. Note that during the test run, you can view the same information
plotted in real in the Load time graph in Runtime Graphs.
Below is a sample image of the graph. It may be different for your website, for example, if you
used continuous load or a non-default load profile.
77
CHA
If your pages/steps/second for your static content is low but dynamic content is high, then
your application or server configuration may be to blame.
78
CHA
CHAPTER 7
Individual graph lines can be turned off and on by clicking the line name in the graph legend.To
see the exact value of a metric at a specific moment, however the mouse pointer over the needed
data point on the graph - the metric value will be shown in a tooltip.
Note that Load UI Web shows the data shown in the graph in the tabular format. An appropriate
table is shown under the Page Load Time graph when you start printing the contents of the
Report panel, that is, when you click Print on the panel's toolbar.
Column
Description
Time
Page load The total page loading time (loading of all images, scripts, CSS files, and so
on) measured at the specified moment. Note that this value does not include
time
the think time simulated for pages.
Users
More Information
For more information on working with the graphs and charts shown in the Report panel,
see viewing the reports charts & graphs.
79
CHA
CHAPTER 7
If your pages/steps/second for static content is high, then you may have reached the
hardware/configuration limits of your server.
If your pages/steps/second for your static content is low but dynamic content is high, then
your application or server configuration may be to blame.
80
CHA
CHAPTER 7
You can zoom into this graph in and out. You can also select the desired area of the graph and
then overlay it with another area. For more information on working with scroll graphs,
see Working with Scroll Graphs.
CHAPTER 7
Conclusion:
Execution time depends upon the following factors
Numbers of users
Speed
Speed of system
81
CHA
CHAPTER 7
Fig 7.2.1
82
CHA
Fig 7.2.2
Description:
Table 7.2.1 shows different parameters on which stress testing is performed but there are two
main parameters first one is uploading speed time which shows the time taken to execute and
second one is downloading speed which shows the record retrieve from database. Fig.7.2.2
shows all this activity is graph form.
Hardware Configuration:
Intel core2duo 2.0GHz
1GB RAM
80 GB Hard Drive
83
CHA
CHAPTER 7
Conclusion:
Number of images
Number of data
CHAPTER 7
84
CHA
A load test is type of testing which is conducted to understand the behavior of the
application under a specific expected load.
Load testing is performed to determine a systems behavior under both normal and at
peak conditions.
The popular load testing tools available also provide insight into the causes for slow
performance. There are numerous possible causes for slow system performance, including, but
not limited to, the following:
Application server
Database server
Network
Client-side processing
CHAPTER 7
Fig 7.3.1
85
CHA
The duration of the Average Page duration period, expressed in format. Individual tests
within a load test might still be running when the load test finishes. During the cool-down
period, those tests can continue until they complete or the end of the cool-down period is
reached. By default, there is no cool-down period, and individual tests are terminated
when the load test finishes based on the Run Duration setting.
The maximum number of threshold violations to save for this load test. You can increase
this number if you have to, but doing this will also increase the size and processing time
of the load test result.
The minimum number of unique Web Load test request URLs on which to report results
in this load test. You can increase this number if you have to, but doing this will also
increase the size and processing time of the load test result.
86
CHA
CHAPTER 7
Figure 7.3.1 shows the load testing perform on the system, there are two main columns in
it, first one is user which shows how many users are login into the system at the time of
testing and second important column is execution time which the time taken by the
CHAPTER 7
87
CHA
Fig 7.3.2
The primary goal of load testing is to define the maximum amount of work a system can
handle without significant performance degradation.
Figure.7.3.2 shows start time and end time in graph format.
88
CHA
CHAPTER 7
Description:
Load testing is same as performance testing; the little difference in performance and load testing
is that load testing is done when more than one user accessing server at the same time. A load
test enables you to measure response times, throughput rates, and resource-utilization levels, and
to identify your applications breaking point, assuming that the breaking point occurs below the
peak load condition.
Hardware Configuration:
1GB RAM
80 GB Hard Drive
Number of images
Number of data
89
CHA
CHAPTER 7
Conclusion:
Bug Condition(H/L)
Login
Fix
Count
Fix
Sign Up
Fix
Shipment Address
Fix
Billing Address
Fix
Shipment Method
Fix
Fig 7.4.1
Fig 7.4.2
90
CHA
Fix/Notfix
CHAPTER 7
S-no
Fig 7.4.3
Sign up bug has been fix
Fig 7.4.4
.
Fig 7.4.5
Billing address has been fix
Fig 7.4.6
91
CHA
CHAPTER 7
In the context of performance testing, a unit test is any test that targets a module of code where
that module is any logical subset of the entire existing code base of the application, with a focus
on performance characteristics. Commonly tested modules include functions, procedures,
routines, objects, methods, and classes. Performance unit tests are frequently created and
conducted by the developer who wrote the module of code being tested
6
No of Bugs in graphical Form
4
0
Login
Count
92
CHA
CHAPTER 7
10
Description:
Table shows different forms on which unit testing is performed and describes the bugs
conditions and also defines that are fixed or not fixed.
Hardware Configuration:
Intel core2duo 2.0GHZ
1GB RAM
80 GB Hard Drive
Conclusion:
the bugs, there are numbers of bugs which are fix and shown in figure 7.4.7. The biggest
benefits by doing unit testing are
Unit Testing can improve the design of code especially with Test-Drive
93
CHA
Development.
CHAPTER 7
Unit test also known as white box testing .It refectories the code and by doing unit testing it fix
_____________________________________________________________________________
CHAPTER 8
CONCLUSION
CHAPTER 8
_____________________________________________________________________________
94
CHA
After careful observations, it has come to my conclusion that e-commerce has undeniably
become an important part of our society. The World Wide Web is and will have a large part in
our daily lives. It is therefore critical that small businesses have their own to keep in competition
with the larger websites. Since web developers have lowered down the prices for their services, it
has become more affordable for small businesses to use the World Wide Web to sell their
products. Although there are negative aspects of e-commerce, small businesses have tried to
accommodate to the needs of the consumers. For example, one of the negative aspects of ecommerce is that consumers lack the advice and guidance of sellers, to accommodate that, they
have customer service through the phone of online to answer any questions. It is also important
to note that e-commerce does not benefit all small companies equally. How much revenue a
business gets from e-commerce depends on what kind of service it gives. For example, most
people would like to try on clothes before they buy them, so it probably would not benefit a
small business that sells clothes as much as a small business that sells home supplies or specialty
books. Nevertheless, e-commerce does benefit any business even in small ways. This is why it is
crucial to understand how e-commerce affects small businesses because it is becoming such a
huge part of how society functions that it affects the economy greatly and whatever happens to
the economy affects us. This is why is it important to understand this subject because in the long
E-commerce is an effective and efficient way of doing business. It can not only offer a wide
range of functionality to compete with or complement the physical trade but also brings with it
the added advantages of convenience, presentation and security.
95
CHA
CHAPTER 8
_____________________________________________________________________________
CHAPTER 9
FURTHER
ENHANCEMENT AND RECOMMENDATIONS
CHAPTER 9
_____________________________________________________________________________
96
CHA
CHAPTER 9
97
CHA
_______________________________________
CHAPTER 10
REFERENCES/BIBLIOGRAPHY
CHAPTER 10
_______________________________________
98
CHA
[1]. Arnold, Mark J.; Kristy E. Reynolds; Nicole Ponderc; Jason E. Lueg (August
2005)."Customer delight in a retail context: investigating delightful and terrible shopping
experiences". Journal
of
Business
Research 58 (8):
1132
[6].The structure of phenotypic personality traits. Goldberg, Lewis American Psychologist, Vol
48(1), Jan 1993, 26-34. http://dx.doi.org/10.1037/0003-066X.48.1.26
[7].LR Goldberg - American psychologist, 1993 - psycnet.apa.org.
[8].The Human Resources Scorecard: Measuring the Return on Investment (Improving Human
Performance)Jack J. Phillips PhD in Human Resource Management., Ron Stone,Patricia Phillips
[9].The Chief Learning Officer: Driving Value within a Changing Organization through
Learning and Development (Improving Human Performance) Tamar Elkeles, Jack J. Phillips
PhD in Human Resource Management.
99
CHA
CHAPTER 10
[10]. The ROI Field book: Startegies for implementing ROI in H.R and training
Patricia
Phillips, Jack J. Phillips PhD in Human Resource Management., Ron Stone, Holly Burkett M.A.
SPH.R
[11].John, O. P., Neumann, L. P., & Soto, C. J. (2008). Paradigm Shift to the Integrative BigFive Trait Taxonomy: History, Measurement, and Conceptual Issues. In O. P. John, R. W.
Robins, & L. A. Pervin (Eds.), Handbook of personality: Theory and research (pp. 114-158).
New York, NY: Guilford Press.
[12].Measelle, J. R., John, O. P., Ablow, J. C., Cowan, P. A., & Cowan, C. P. (2005). Can
children provide coherent, stable, and valid self-reports on the Big Five dimensions? A
longitudinal study from ages 5 to 7. Journal of Personality and Social Psychology, 89, 90-106.
[13].Helson, R., Kwan, V. S. Y., John, O. P., & Jones, C. (2002). The growing evidence for
personality change in adulthood: Findings from research with personality inventories. Journal of
Mason
Holloway.
[http://www.astd.org/Education/Programs/Human-Performance-
Improvement-Programs]
[15].Srivastava, S., John, O. P., Gosling, S. D., & Potter, J. (2003). Development of personality
in early and middle adulthood: Set like plaster or persistent change? Journal of Personality and
Social Psychology, 84, 1041-1053.
[16] Online Educational web-app that provide plenty of online courses and educational material
http://online.stanford.edu/courses
100
CHA
CHAPTER 10
that
harnesses
insights
and
makes
them
useful
for
communicating across a wide range of research groups. JJ Odell, HVD Parunak, B Bauer Agent-oriented software engineering, 2001 Springer.
[24].B Bauer, JP Mller, J Odell - Agent-oriented software engineering, 2001 - cin.ufpe.br
101
CHA
CHAPTER 10
[25].UML for ontology development P Kogut, S Crane field, L Hart, M Dutra - The
Knowledge , 2002 - Cambridge Univ Press
[26].From UML activity diagrams to Stochastic Petri nets: application to software performance
engineering JP Lpez-Grao, J Merengue, J Campos - ACM SIGSOFT software , 2004 dl.acm.org
[27]. Simple diagnostic tests for spatial dependence L Anselin, AK Bera, R Florax, MJ Yoon Regional science and urban , 1996 Elsevier
[28]. Qualitative research methods for the social sciences BL Berg, H Lune - 2004 - sisis.rz.htwberlin.de and Categories 350 Classes and Categories 351 Discourse Analysis and Content
Analysis 352 Open Coding 353 Coding Frames 356 A Few More Words on Analytic Induction
358
[29]. Prior to 2012, PLTA was published by the Language Testing Research Centre at the
University of Melbourne under the name, Melbourne Papers in Language Testing. The full
102
CHA
CHAPTER 10
catalogue of back issues of Melbourne Papers in Language Testing, where individual papers can
_____________________________________________________________________________
CHAPTER 11
ANNEXURES
ANNEXURE
_____________________________________________________________________________
103
CHA
______________________________________________________________________________
ANNEXURE
______________________________________________________________________________
104
CHA
Name
Mohammad Ahmer Hussain
Enrolment
09B-006-BS
Name
Anas Ul Haq Qureshi
Enrolment
10B-097-BS
Name
Syed Nabeel Junaid
Enrolment
07A-003-BS
Batch 10B
105
CHA
ANNEXURE
HAMDARD UNVIERSITY
Usman Institute of Technology
Department Of Computer Science
FINAL PROJECT APPROVAL FORM
The Head of Department,
Computer Science Department,
Usman Institute of Technology,
Karachi.
Subject:
Date:
Batch: __10B___
Respect Sir,
We, the below listed students of final Year BS __BS(CS)___ class, desire to undertake work
on the following project.
106
CHA
ANNEXURE
We request you to kindly grant approval for undertaking the work on the above-cited
project. I abide by all terms and conditions mentioned below.
next
project
in
continuation,
depends
upon
the
scope
and
application of
project.
14.Proper dressing and way of presentation should be in English during proposal
defend session, milestones
and final presentations.
15.Marking of milestones and final presentation should be based on individual
evaluation of each faculty members and marks would be granted during
session.
16.When we go for proposal defends session a list of all previous projects with
their brief introduction must be available during session for our reference.
(Introduction, Scope of project, tools and technology and batch must be
available).
17. I understand that it is my responsibility to update my advisor and FYP
committee members with the status of my project and submit reports on
time.
100,000
75,000
50,000
1 Lac PKR
Seventy Thousand PKR
Fifty Thousand PKR
Yours sincerely,
Name
1.
10B-097-BS
2.
jnabeel@hotmail.com
3.
09B-006-BS
ahmer_hussain61@hotmail.com
Signature
Ahmer Hussain
ANNEXURE
107
CHA
TABLE OF CONTENTS
PROJECT EXECUTIVE SUMMARY ..................................................................................................................109
PROJECT OVERVIEW .........................................................................................................................................109
PROJECT OBJECTIVES .......................................................................................................................................109
PROJECT SCOPE ..................................................................................................................................................109
PROJECT ESTIMATED EFFORT/COST/DURATION.....................................................................................110
ESTIMATED EFFORT HOURS ...........................................................................................................................110
ESTIMATED DURATION .....................................................................................................................................110
PROJECT ASSUMPTIONS ...................................................................................................................................111
PROJECT RISKS ....................................................................................................................................................111
PROJECT APPROACH .........................................................................................................................................112
TOOLS AND TECHNOLOGIES ...........................................................................................................................112
EXPECTED FINAL PRODUCT ............................................................................................................................113
LIST DOWN SIMILAR PRODUCTS AVAILABLE ONLINE WITH URL.PRODUCTS AVAILABLE ......114
ANNEXURE
108
CHA
Project objectives
It will display the product catalogue and details according to the category.
Display and allow cancelation of orders that are eligible for cancelation.
Project scope
Admin panel is the back end of application from where the admin can manage the whole
site and its contents as well.
User will be able to purchase products online and get a confirmation email.
109
CHA
ANNEXURE
Estimated duration
Working
Estimated
Durations
1 week
Planning
4 weeks
Database design
2 weeks
Coding
8 weeks
Testing
3 weeks
Documentation
4 weeks
Reporting
2 weeks
ANNEXURE
Requirement
110
CHA
Project assumptions
We assume that customer will have a proper internet connection for this project.
Project risks
Risk Area
Level
(H/M/L)
Risk Plan
1. Database risk
Make backup of db
111
CHA
ANNEXURE
Project approach
We will follow the SDLC (Software Development life cycle) to build the system in different
phases which are:
Planning
Design
Development
Implementation
Maintenance
The project will start from requirement gathering than we will do planning of our project then we
will move towards the designing phase after that the coding will be done which will take some
time, than we will do testing to find out the bugs and errors and how to solve them. After that we
will submit our project.
PHP
Xampp Server
My Sql
Aptana Studio
ANNEXURE
112
CHA
ANNEXURE
113
CHA
Common Name
Features
www.3dcart.com
3dcart
www.bigcommerce.com
Bigcommerce
www.amazon.com
Amazon
www.1and1.com
1&1
ANNEXURE
URL
114
CHA
Project approvals:
Add any signatures that are important for the approval of the project. (Remove this comment
Name:
Project Supervisor
Signature
Name:
Project Supervisor
Signature
Head of Department of CS
Signature
Signature
Signature
Signature
Signature
Signature
115
CHA
ANNEXURE
ANNEXURE
______________________________________________________________________________
116
CHA
117
CHA
ANNEXURE
______________________________________________________________________
118
CHA
PLAGIRISM
______________________________________________________________________________
CHAPTER 1 INTRODUCTION
119
CHA
PLAGIRISM
120
CHA
PLAGIRISM
121
CHA
PLAGIRISM
122
CHA
PLAGIRISM
123
CHA
PLAGIRISM