True Grabber Price Comparison Report
True Grabber Price Comparison Report
A PROJECT REPORT
Submitted by
KIRUBHAGARAN V
(Reg. No: 18Y025)
THIAGARAJARCOLLEGE OF ENGINEERING
(A Govt. Aided Autonomous Institution affiliated to AnnaUniversity)
(An ISO 9001: 2000 Certified Institution)
May 2021
THIAGARAJAR COLLEGE OF
ENGINEERING MADURAI – 625 015
BONAFIDE CERTIFICATE
Certified that this project report “True Grabber” is the bonafide work of
KIRUBHAGARAN V (18Y025), who carried out the project under my
supervision.
I sincerely thank The Almighty for making my life to be more interesting, challenging
and happier during the project tenure.
I wish to express my deep felt gratitude to my beloved parents for their constant
support and contribution to this project work. Also, I would like to thank all my teachers,
friends and well-wishers who have helped me for doing this project and throughout the MCA
course.
KIRUBHAGARAN V
ABSTRACT
i
TABLE OF CONTENTS
ABSTRACT i
LIST OF TABLES v
LIST OF FIGURES vi
LIST OF ABBREVIATIONSvii
1. INTRODUCTION 1
1.1 ORGANIZATION PROFILE 1
1.2 EXISTING SYSTEM 1
1.3 PROPOSED SYSTEM 2
1.3.1 Advantages of the proposed system 2
2. SYSTEM ANALYSIS 3
2.1 FEASIBILITY STUDY 3
2.1.1 Operational Feasibility 3
2.1.2 Technical Feasibility 3 2.1.3 Economical
Feasibility 4
2.2 USE CASE DIAGRAM 5
2.2.1 Primary Use Case Diagram 5
ii
3.6 TECNOLOGIES USED 9
4. SYSTEM DESIGN 12
4.1 SYSTEM ARCHITECTURE DIAGRAM 12
4.2 DATA FLOW DIAGRAM 12
4.2.1 Level 0 DFD 13
4.3 ER DIAGRAM 14
4.4 PROCESS FLOW DIAGRAM 15
4.5 LOGICAL DESIGN USING UML 16
4.5.1 Class Diagram 16
4.5.2 Sequence Diagram 17
5.6.SYSTEM TESTING 30
6. IMPLEMENTATION 31
7. CONCLUSION 33
8. BIBLIOGRAPHY 34
9. APPENDICES 35
9.1 APPENDIX –A PROJECT SCREEN SHOTS 35
iii
9.2 APPENDIX –B PHP TESTING SCREEN SHOTS 45
LIST OF TABLES
TABLE INDEX NAME OF THE TABLE PAGE NO.
4.8.1 User 28
4.8.2 Product 28
4.8.3 Store 28
4.8.4 Special 29
4.8.5 Country 29
iv
LIST OF FIGURES
FIGURE PAGE
INDEX TITLE OF THE FIGURE
NO.
FIGURE
2.2.1 Primary Use Case 5
2.2.2 User requests access to use job dashboard Use Case 6
2.2.3 User Logins to the Job Dashboard Use Case 6
2.2.4 User Requests the Group Report Use Case 7
2.2.5 User Requests the Job Report Use Case 7
2.2.6 User Generates a Report as CSV Use Case 8
2.2.7 User Requests user view Use Case 8
2.2.8 User Analyze the User View Use Case 8
4.1.1 Architecture Diagram 15
4.2.1 DFD Level 0 16
4.2.2 DFD Level 1 17
4.3.1 Entity Relationship Diagram 18
4.4 Process Flow Diagram 19
4.5.1 Class Diagram 20
4.5.2 Sequence Diagram 21
4.5.3 State Chart 22
4.5.4 Activity Diagram 24
4.6.1 Package Diagram 25
4.6.2 Component Diagram 26
4.6.3 Deployment Diagram 26
4.8.1 Database Design 30
v
LIST OF ABBREVIATIONS
S.No. ABBREVIATION/ACRONYM DESCRIPTION
1 SLA Service Level Agreement
2 JSON JavaScript Object Notation
3 CSV Comma Separated Values
4 Control-M Control-Monitor
5 AJAX Asynchronous JavaScript and XML
6 PHP Hypertext Preprocessor
7 CSS Cascading Style Sheet
8 DFD Data Flow Diagram
9 SQL Structured Query Language
10 SVG Scalable Vector Graphics
11 API Application Programming Interface
12 HTML Hypertext Markup Language
13 CGI Common Gateway Interface
vi
INTRODUCTION
The problem statement of transaction is the data theft which is stored in the
open source like server. There is no any security in transferring the account
number and amount details to bank. Persons that commit online transaction
crime largely go unpunished and repeatedly victimize consumers and
businesses. Typically, the fraudster causes a credit card and debit card of
another person to be charged for a purchase. Today, half of all credit card
and debit card fraud is conducted online, meaning that the fraudsters make
online purchases with the credit card details of other people.
1
1.3 Proposed System
2
2. SYSTEM ANALYSIS
3
2.1.3 Economic Feasibility
Economic analysis is the most frequently used method for evaluating the
effectiveness of a proposed system. Most commonly known, is the cost/benefit
analysis, the procedure is to determine the benefits and savings that all expected
from the proposed system and compare them with costs. The software involved in
the proposed system is Open Source software. There will not be any software
costs incurred in the proposed system. The costs that will be incurred in
implementing the proposed system are developing and operating costs.
4
2.2 Usecase Diagram
5
3. SYSTEM REQUIREMENT SPECIFICATION
3.1 Scope
The scope of this project is to provide service for price monitoring, analysis
and generation of reports in the form of a dashboard in the Self-Service Portal. This
scope of this project is limited within the Self-Service Portal. It allows consumers to
see different lists of prices for the product chosen by user and it helps consumers to
make an informed decision about which to choose in order to save money.
User Function:
Users to register, log in, and log out. ... Each user is assigned one or more roles.
By default there are three roles: anonymous (a user who has not logged in) and
authenticated (a user who is registered), and administrator (a signed in user who will be
assigned site administrator permissions)
Users can view the products and their prices and can add the products to their cart and
switchover to any E-Commerce platform easily.
Admin Function:
Admin adds a new products and manage user’s data their data to the AWS database, so it
needs an active internet connection. The internet speed is not much cared. It can be
minimum of speed to upload the data to the database.
When a request comes from the admin the API gets called and the API contacts with the
server to update the necessity changes to the database whenever needed.
6
View user
In these function admin can view all the users and user work process on these
modules.
Transaction
User can make transaction on these function every users can send money to the
others and make mini statement deposit on this function.
3.3.1 Reusability
3.3.2 Flexibility
The application is developed with the custom MVC structure. It is very easy
for adding functionalities without affecting existing functionalities and also
provides the facility to make modifications to the Application.
3.3.3 Scalability
3.3.4 Performance
The application is available to the user once they login to the system and
7
lasts up to the session expires or until the user sign’s out. And it’s fast and
reliable because of its runs only in the internal server of the organization.
3.3.5 Functionality
8
3.6 Technologies Used
3.6.1 HTML/CSS
HTML:
CSS:
Cascading Style Sheets is a style sheet language used for describing the
presentation of a document written in a markup language like HTML. CSS is a
cornerstone technology of the World Wide Web, alongside HTML and
JavaScript.
3.6.2 JavaScript
3.6.3 jQuery
9
of browsers. With a combination of versatility and extensibility, jQuery has
changed the way that millions of people write JavaScript.
3.6.4 PHP
The standard PHP interpreter, powered by the Zend Engine, is free software
released under the PHP License. PHP has been widely ported and can be
deployed on most web servers on almost every operating system and platform,
free of charge.
3.6.5 Flutter
On Windows, macOS, and Linux. Flutter runs in the Dart virtual machine,
which features a just-in-time execution engine. While writing and debugging an
app, Flutter uses Just In Time compilation, allowing for "hot reload", with
which modifications to source files can be injected into a running application.
10
3.6.6 MS SQL Server
3.6.7 Laravel
Laravel is a free, open-source PHP web framework, created by Taylor Otwell and
intended for the development of web applications following the model–view–
controller (MVC) architectural pattern and based on Symfony. Some of the
features of Laravel are a modular packaging system with a dedicated dependency
manager, different ways for accessing relational databases, utilities that aid in
application deployment and maintenance
11
4. SYSTEM DESIGN
System design is the major process that can be termed as the backbone in the
development of any software product. The design phase in any project will consider the
results of the analysis phase and comes out with the prototype of the product, which is almost
similar to the product which is being developed.
LOGIN REGISTER
LOGOUT
12
to external entities. It represents the entire system as a single bubble with
input and output data indicated by incoming/outgoing arrows.
Level-1 DFD: In level-1 DFD, the context diagram is decomposed into
multiple bubbles or processes. In this level, we highlight the main functions
of the system and breakdown the high-level process of level-0 DFD into
subprocesses.
Admin User
Encryption
13
4.3 ER Diagram
14
4.4 Process Flow Diagram
Mini Statement
DATABASE
15
Fig 4.4 Process Flow Diagram
16
4.5 Logical Design using UML
4.5.1 Class Diagram
17
4.5.2 Sequence Diagram
18
4.5.3 State Chart
Admin:
19
4.5.4 Activity Diagram
20
4.7 Module Description
USER REGISTRATION
USER LOGIN
USER TRANSACTIONS
ADMIN LOGIN
ADMIN VIEW
MODULE DESCRIPTION
USER REGISTRATION
In this module, user has to register with the basic details such as username, mobile
number and PIN. These details will be saved in the database.
USER LOGIN
In this module, the login method is explained. Login can be done by using any of the
two methods. First, username should be entered. Then user should select the login method as
PIN method. In the PIN method is chosen, user has to enter the PIN. All the numbers in the
keypad will look like number 8. If the entered details match with the available details, the
user can proceed to the next step.
USER TRANSACTIONS
In this module, user transactions will be explained. Once the entered details are
correct, user’s home page will be displayed. User can do various transactions like withdraw,
transfer money and deposit.
ADMIN LOGIN
In this module, user can login into the system using admin and admin as username
and password respectively.
ADMIN VIEW
In this module, admin can view the list of users available with the system. Also,
admin can view the list of transactions done between users.
21
4.6 Database Design
22
USER REGISTRATION
Field Type Null Default
id int(11) Yes NULL
name varchar(100) Yes NULL
address varchar(100) Yes NULL
contact varchar(100) Yes NULL
email varchar(100) Yes NULL
uname varchar(100) Yes NULL
pass varchar(100) Yes NULL
rdate varchar(100) Yes NULL
TRANSACTION DETAILS
Field Type Null Default
id int(11) Yes NULL
user varchar(50) Yes NULL
Amount varchar(50) Yes NULL
Date varchar(50) Yes NULL
sender varchar(20) Yes NULL
Receiver varchar(20) Yes NULL
23
5. TESTING
5.1 TESTING OBJECTIVE
Software testing is defined as an activity to check whether the actual results
match the expected results and to ensure that the software system is Defect free.
Testing is the most important activity in the development phase.
The process is also providing the client with information about the quality of
the software. Testing is mandatory because it will be a dangerous situation if the
software fails any of the time due to a lack of testing. So, without testing software
cannot be deployed to the end-user.
Unit testing
Integration testing
User Interface Testing
Functional Testing
System Testing
24
5.2 UNIT TESTING
25
5.3 INTEGRATION TESTING
Integration testing is the level of software testing where individual units are
combined and tested as a group. The purpose of this level of testing is to expose faults
in the interaction between integrated units. Test drivers and test stubs are used to
assist in Integration Testing. Testing performed to expose defects in the interfaces and
the interactions between integrated components or systems.
User module
Admin module
All the above modules are tested and the errors are fixed.
Hence, the objective of integration testing is to take unit tested modules and build a
final program structure. In this project, modules are combined to find the overall
performance of the system.
26
Test
Test Condition Test case/ scenario/
Case Expected Result Actual Result Pass/Fail
Description data description
No.
When admin enters
Check whether
login credentials
admin can Navigate to admin Admin Home page is
1 admin should be Pass
navigate to admin home page loaded
navigated to admin
Homepage.
homepage
When organization
Check whether user enters login
Navigate to
Organization user credentials admin Organization Home
2 organization home Pass
can navigate to should be navigated page is loaded
page
admin Homepage. to organization
homepage
When driver user
Check whether
enters login
driver can Navigate to driver Driver Home page is
3 credentials admin Pass
navigate to admin home page loaded
should be navigated
Homepage
to driver homepage
27
UI testing is a software testing method that checks the Graphical User
Interface (GUI) of the Application under Test. GUI testing involves checking the
screens with the controls like menus, buttons, icons, and all types of bars - toolbar,
menu bar, dialog boxes, and windows, etc. The purpose of Graphical User Interface
Testing is to ensure UI functionality works as per the specification. All the Screen
validations and navigations are tested in the web application. This can be done by the
Capture and Replay approach (i.e) During Capture, test steps are captured by the
automation tool. During playback, the recorded test steps are executed on the
Application under Test.
28
6. IMPLEMENTATION
Implementation forms an important phase in the development life cycle. This
phase of software development is concerned with translating design specifications into a
working model. Implementation is the final phase in achieving a successful system and in
giving the users confidence that the system will work efficiently. Usually, this phase is the
longest of all life cycle phases and is characterized by four distinct changes.
Changeover Routine
maintenance stage
User-acceptance review
Post-implementation reviews
CHANGEOVER
Initially, the new system must be introduced to the business activity stream.
This state is called Changeover. The changeover transaction may take weeks or even months.
After the completion of the changeover, the system enters the operation and
routine maintenance stage. Early in this stage, the evaluation should be made based on
performance measurements that determine whether the specific benefits claimed for the
system have been achieved.
As new activities begin, or change in the procedures occur due to the internal
or external factors the system is prone to modification needs. Thus, for the maintenance
requirements, these post-implementation reviews provide the first source of the users.
29
AUTHORIZATION
The System has been developed successfully. All the functions of the application
need not be executed by all the persons. An admin can only able to approve/manage
User/Customer and manage reports created by the system. Customers can only able to
see the reports and analyze, they can also create user view and edit, update, delete it. For
this Authorization, checks have been included for all functionality. This application is
implemented through web hosting through organization servers.
30
7. CONCLUSION AND FUTURE
ENHANCEMENTS
7.1 CONCLUSION
Graphical passwords use easily seen images that attracts human attention. It
is an easy task for the shoulder-surfer to obtain the account's password since
the password attempt is not masked. This flaw makes most of the graphi-cal
password scheme vulnerable to shoulder-surfer attackers. Many schemes
proposed have shown flaws such as requiring the user to spend too much
time on complex mental activities to derive the correct image to click on.
Others schemes do not conceal the images in the challenge set during
authenti-cation which allows direct shoulder-surfing. These two major
drawbacks make graphical password schemes very vulnerable to shoulder-
surfer attackers. In this paper, a new scheme to hide and conceal the
mechanism or activity required to derive the password-images generation is
proposed. This activity is simple enough to reduce login time while the
images clicked seem to be random and can only be obtained by the complete
knowledge of the registered password along with the activity rules. This
combination makes it tougher for a shoulder-surfer to identify the user's
actual password. From the user study results, it shows that the average login
process for the proposed method is really fast as it was successfully
performed by the participants in less than half a minute. Moreover, the
proposed method is able to resist shoulder-surfing attacks although the
adversaries have the knowledge of how the proposed method works.
31
The term “graphical password” refers to a user authentication method where
pictorial information is used for validation, instead of an alphanumerical
password. This method poses many challenges, such as memo ability
(which refers to how easy the password is to remember), usability, and
security, since graphical passwords may tend to be visually simple and
easily forged. Graphical passwords have become popular due to the
proliferation of touch screen devices, in particular smart phones and
tablets. The prevalent approaches are based on simple graphical
passwords, which can be easily remembered and reproduced by potential
attackers. In this work, we study user authentication based on finger-
drawn doodles (i.e., free-form gestures or sequences of gestures) and on
pseudo signatures, which are implied versions of the signature drawn
with the fingertip. Authentication is based on features extracted from the
dynamics of the gesture drawing process (e.g., speed or
acceleration).These features contain behavioral biometric information,
which has been successfully used for automatic user verification based on
handwritten signatures. As a consequence, a potential attacker would
have to copy not only what the user draws, but also how the user draws it.
Unfortunately, graphical passwords tend to be much simpler than
signatures and are no composed, in general, of previously learned or
heavily practiced movements. This can lead to a higher intra-user
variability (i.e., variations between samples produced by the same person)
than in the case of signatures or may cause users to forget part of or the
whole graphical password.
.
7.2 FEATURES
Easy to use.
Data Shown in the Graph format for clear Understanding.
32
Real time progress of the report.
User-Friendly Screens.
A simple button click operation is enabled.
All data fetched from the database in the server and no need to upload the
data every time.
Customers change their normal view into customized user views where they
can view what should in the report.
Easy for modification and future Enhancement.
The main focus of this proposed system is to give a more secure PIN entry method for
common user authentication with high usability and give compatibility and cost effectiveness
(means no additional expensive hardware) by the session key method. Session key method is
a graphical password method which is easier to the user as well as hard to the shoulder surfer.
The one way hybrid pin password is used to secure the PIN after the logon procedure. In this
system, the human shoulder surfing attack is prevented and a secure transaction between the
mobile App and Server is established by using The Session Key Method.
7.4 LIMITATIONS
For our True secure online transaction system to work effectively, tie
up with an e-commerce solution is a must.
33
8. BIBLIOGRAPHY
8.1 Book References
Laravel : https://laravel.com/docs/8.x
Angular : https://angular.io/docs
Flutter : https://flutter.dev/docs
34
9. APPENDICES
35
Fig 3 Hybrid shuffled digital pin password
36
Fig 5 Deposit amount in the bank
37
11.Fig 7 Amount Transa
38