• Tidak ada hasil yang ditemukan

Daffodil International University Co-Supervised By

N/A
N/A
Protected

Academic year: 2023

Membagikan "Daffodil International University Co-Supervised By "

Copied!
39
0
0

Teks penuh

This project entitled Design and Development of the Security Devices Market Secured BD, submitted by Al-Amin to the Department of Computer Science and Engineering, Daffodil International University, has been accepted as satisfactory for the partial fulfillment of the requirements for the grade of B .Sc. . Department of Computer Science and Engineering Faculty of Science and Information Technology Daffodil International University. Jueal Mia, Department of Computer Science and Engineering, Daffodil International University of Bangladesh, for partially fulfilling the requirements for the B.Sc.

In-depth knowledge and keen interest of our supervisor in the field of design and development of security equipment market to carry out this project. Ahmed Al Marouf and Head of CSE Department, for his kind assistance in completing our project, and also to other faculty members and staff of CSE Department of Daffodil International University. The design and development of the security equipment marketplace will, with any luck, gain a greater reputation every day as the variety of site e-commerce customers grows rapidly.

One such powerful device is our security hardware design and development marketplace, which is designed using PHP as the frontend and MySQL as the backend. We can use it like Amazon. We have created a website that is Design and Development of Security Equipment Market Place. The primary goal of this task is to create a design and development of a security equipment market where every customer can allow a choice in addition to buy and rent a security system online based primarily on the gadget.

The venture is known as Security Equipment Market Design and Development which is an online product store.

Project Outline

Literature Review

Introduction

Methodology

  • Developed the crucial functionalists
  • Facilitating the user for allowing them access in the system
  • Use of waterfall method
  • Proposed solutions
    • Administrator
    • Registered use
    • Guest user

In my next section we are able to expand the panel and the consumer get the login to login. This ability can be a major problem due to the fact that most consumers want to know every element of the product and order information. Our requirement quite simple and easy, Requirements are a fixation of the features and limitations that the interrupted person expects from the gadget.

In our service, we are able to serve higher centers for regular use by people. Our realized device is exceptional than a different actual device and you gain right of entry to easy, however now you no longer get right of entry to, due to the fact that some other services simply provide purchase and protection equipment, however one purchase per device, offer purchase for and rental of any device. So there are 3 types of clients used in those systems, they are the system administrator, guest clients and first of all the clients that control the user are identified.

An administrator could asynchronously grant the right to enter the system GUI (Graphical User Interface) in a user-friendly manner. The user can select, buy and rent any version of the product on this website with the most convenient online login.

Figure 2.1: Customer use case diagram
Figure 2.1: Customer use case diagram

Design and Implementation

  • Introduction
  • Data Dictionary
  • Use Case Diagram
  • Activity Diagram
  • E-R Diagram
  • Representation of Components
  • DFD for User registration
  • DFD for person view
  • Graphical User Interface
    • Home Page
    • Registration
    • Login
  • Users Order .1 Rent list
  • Admin
    • Admin home
    • Order list
    • Devices management

User and administrator are 2 actors that are protected by the online security tool Store. An activity diagram is very much a flowchart and quite simple to symbolize the movement from the parent interest to all other interests. If a consumer browses this website online, they will see products that they can see little or nothing.

If the consumer needs to buy or rent, motivate our product on this website online first, sign up. Each square shape represents each different table/entity, each name in the square shape represents the column of the table. Here the information will be collected by the data entry operator from the person which includes the private details of the person.

This bankruptcy will display the graphical user interface (GUI) of the device via screenshots and person courses that how they will function the device. If a consumer is registered, he can immediately sign up to log in, contact and input his email address and password if he needs, he can forget the password. Users can see here the number of tools ordered for the rental if the consumer who wants to rent more than one device that collected that device is also here.

This is the admin home internet web page admin can see how many customers have used it access so our internet site online can be very beautiful, there are various devices in which there are different time authorities persons, there are various classes. An internet site publishes content material that can divide our public on quite a few subjects their web page is many possibilities and the buyer luck we use web page.

Figure 3.1: Use Case Diagram
Figure 3.1: Use Case Diagram

Used Technologies and Test Plan

  • Introduction
  • Back-end Technologies
    • Hypertext Pre-Processor (PHP)
  • What Can PHP Do?
    • Laravel
  • The HTTP Layer
  • Security
  • General topics
  • Database
  • Testing
  • Front-stop Technologies
    • Hypertext Markup Language (HTML)
    • Cascading Style Sheets (CSS)
    • Bootstrap
    • JQuery
    • Ajax
  • Featured to be tested
  • Approach

PHP can create, open, read, enlarge, write, delete and close documents at the server - PHP can collect form information and facts. PHP can add, delete, change facts to your database - PHP can be used to manipulate user permission - PHP can encrypt facts. Laravel is a loose open-source PHP net framework, created by means of Taylor Otwell and intended for the improvement of net packages according to the model-view-controller (MVC) architectural pattern [3].

The access factor for all requests to be accepted in a Laravel application is the public/index.personal home page document. All requests are oblique, continue to link to this document by way of your web server configuration (Apache/Nginx). The home page index.personal document contains hundreds of autoloader definitions generated by Composer, after which it takes a Laravel instance from the home page script bootstrap/app.personal.

In the HTTP layer, the unique kind of operation plays while a request goes to the utility it needs for route registration; is used for the controller, then the controller plays the common sense operation of the company, the record is opened, which we are able to display in the browser. Here are a few general service offerings given below: Craftsman Console, Broadcasting, Cache, Collections, Errors and Troubleshooting for Logging, Events, Document Storage, Helpers, Mail, Notifications, Package, Queues, Scheduled Task. In fact, PHP Unit testing support is covered out of the container, and a phpunit.xml record is already set up on your utility.

HTML for extraordinary constructions, pictures and equipment that includes eleven although interactive office work can be included in the featured page. Our online internet web site can be very smoothly and tags along the side image and outbound entry without delay to present material material on the page.[4] Browsers now do not display our and indicate that all screens are part of the HTML tag organization. CSS is designed to allow separation of presentation material and content, along with layout, colors, appearance, and fonts[5].

An Ajax request ("Asynchronous JavaScript and XML") is occasionally called an XHR request ("Xml Http Request"). It is the decision that most well-known browsers provide to the object used to deliver an Ajax request. ] because of the reality, at least to start with Ajax calls that involve sending and receiving XML, but now it's really a mundane area of ​​delivering/obtaining JSON data. The predominant hassle obligations that so many people use are Unit Testing's Unit checkout is a way to check out that verifies that gadgets of its delivery code are now working properly. Accurately testing the load Billing the load creates the processing of the procedure for calling up our gadget and/or tool and measuring.

Figure 4.3: Admin List of Secure BD
Figure 4.3: Admin List of Secure BD

Conclusion and Future Work

Limitations of the machine

Prospective destiny development

Gambar

Figure 2.1: Customer use case diagram
Figure 2.2: waterfall method
Figure 3.1: Use Case Diagram
Figure 3.2: Activity Diagram of Secure BD
+7

Referensi

Dokumen terkait

Hasil penelitian menunjukkan bahwa Ada pengaruh guru Pendidikan Agama Islam dalam membentuk kecerdasan emosional siswa SMA Negeri 1 Trimurjo dengan nilai hit2 yang diperoleh dalam

©Daffodil International University APPROVAL This Project titled “DESIGN AND DEVELOPMENT OF WEB APPLICATION ON RESORT BOOKING: VROMON BILASH”, submitted by Redwanul Islam, ID:- 141-