Professional Documents
Culture Documents
SYNOPSIS
This project “GOODS MANAGEMENT SYSTEM” has been developed for the
computerization to handle the garments details. The proposed system is windows application
software used to maintain product details, order details, purchase details, production details has
been developed for the entire respective module. This makes the database manager to manage
the product easily and can retrieve the information easily.
The main goal of this project is to reduce manual works, increase the processing
speed and ensure reliability of data. This project also takes care of maintaining records of all the
students’ details, staff details viewing the status of the concern.
Various reports are generated based on the requirement of the concern; reports will
present the management with the current position of the company. The project will be an
efficient tool for the company and it will aid in the improvement of the company. It has been
designed and developed by PHP as Front-End tool and MYSQL as back-end tool.
1. INTRODUCTION
The proposed system is windows application software used to maintain supplier details,
order details, purchase details, production details, delivery details, staff details, carrier details
and report has been developed for all the respective module of the private organization.
This helps to eliminate the human errors and can be processed easily. The purpose of the
system is to provide accurate results in all transaction of data in effective manner. This package
is designed for the particular need of the company to work out the operations effectively and
efficiently.
So that the various departments can more easily share information and communicate with
each other. Each of those departments typically has its own computer system optimized for the
particular ways that the department does its work
Who We Are
Live Technologies is an established web development company delivering web development
services of any complexity to clients worldwide. Being in IT business for over 4 years now Live
Technologies has a strong team of skilled experienced IT experts. Our customers are companies
of all sizes ranging from startups to large enterprises who realize that they need a professional
internet solution to generate revenue streams, establish communication channels or streamline
business operations.
What We Do
Live Technologies delivers comprehensive web services ranging from custom website design to
development of complex internet systems. We base our offerings on an understanding of clients’
business requirements and providing dependable solutions. We combine business domain
knowledge with technology competence and proven methodologies to deliver high quality results
in a cost-effective manner to maximize your competitive advantage and productivity.
Our Strengths
One-stopInternetSolutionsVendor
Whether you need an appealing website design or complex multi-tier internet system
development or custom programming using latest technologies and industry trends (e.g. Web
2.0) – Live Technologies has required experience and expertise to do it all.
Full-CycleDevelopmentServices
At Live Technologies we support a full-cycle development process from requirements definition
and specification, architecture design, coding, testing and validation to product maintenance and
support. Depending on your specific requirements our experts will take you step by step through
each phase of solution development providing you with a sound advice on technology and
application options.
ExperienceandExpertise
Having over 5 years of experience in providing internet services and solutions and having
completed hundreds of projects in different domains Live Technologies has built a large database
of knowledge that enables us to deliver the “right” solutions that address the needs of clients.
Quality Standards
1. Quality personnel
2. Quality Process
3. Quality Communications
Each project at Live Technologies is under constant control of a dedicated quality assurance
department that monitors project activities and results at each development phase.
VastPoolofITProfessionals
Whether you need a top-notch expert with a specific knowledge or a team with diverse
technology skills and domain expertise Live Technologies has a pool of over IT experts
including business analysts, project managers, software architects, web and graphic designers,
flash animators, software developers, quality assurance and testing specialists.
We at Live Technologies are committed to delivering maximum value to our clients helping
them succeed in a constantly changing and challenging biz world. Our fundamental company
values stem from understanding that our success is tied with success of our clients. Our key
business principles.
SOFTWARE FEATURES
Visual Basic .NET is the second series of Microsoft's Visual Basic series. It is sometimes
shortened to VB.NET. It is an IDE (Integrated Development Environment) and it includes an
easy 'drag-and-drop' interface. It can make complete programs for Windows very easily.
This package is the 'backbone' of Visual Basic .NET. When applications are created,
the Windows Installer includes the framework with it. It includes all the items needed to run the
VB.NET applications that have been made.
A programmer can create an application using the components provided by the Visual
Basic program itself. Over time the community of programmers has developed new third party
components, keeping this programming language to modern standards. Programs written in
Visual Basic can also use the Windows API, which requires external function declarations.
Advantages of VB.NET
First of all, VB.NET provides managed code execution that runs under the Common
Language Runtime (CLR), resulting in robust, stable and secure applications. All features
of the .NET framework are readily available in VB.NET.
VB.NET is totally object oriented. This is a major addition that VB6 and other earlier
releases didn't have.
The .NET framework comes with ADO.NET, which follows the disconnected paradigm,
i.e. once the required records are fetched the connection no longer exists. It also retrieves
the records that are expected to be accessed in the immediate future. This enhances
Scalability of the application to a great extent.
VB.NET uses XML to transfer data between the various layers in the DNA Architecture
i.e. data are passed as simple text strings.
Error handling has changed in VB.NET. A new Try-Catch-Finally block has been
introduced to handle errors and exceptions as a unit, allowing appropriate action to be
taken at the place the error occurred thus discouraging the use of ON ERROR GOTO
statement. This again credits to the maintainability of the code.
Another great feature added to VB.NET is free threading against the VB single-threaded
apartment feature. In many situations developers need spawning of a new thread to run as
a background process and increase the usability of the application. VB.NET allows
developers to spawn threads wherever they feel like, hence giving freedom and better
control on the application.
The CLR takes care of garbage collection i.e. the CLR releases resources as soon as an
object is no more in use. This relieves the developer from thinking of ways to manage
memory. CLR does this for them.
Common Language Runtime (CLR) integration was introduced with this version,
enabling one to write SQL code as Managed Code by the CLR. For relational data, T-SQL has
been augmented with error handling features (try/catch) and support for recursive queries with
CTEs (Common Table Expressions). SQL Server 2005 has also been enhanced with new
indexing algorithms, syntax and better error recovery systems. Data pages are check summed for
better error resiliency, and optimistic concurrency support has been added for better
performance. Permissions and access control have been made more granular and the query
processor handles concurrent execution of queries in a more efficient way. Partitions on tables
and indexes are supported natively, so scaling out a database onto a cluster is easier. SQL CLR
was introduced with SQL Server 2005 to let it integrate with the .NET Framework.
SQL Server 2005 introduced Multi-Version Concurrency Control. User facing features
include new transaction isolation level called SNAPSHOT and a variation of the READ
COMMITTED isolation level based on statement-level data snapshots. SQL Server 2005
introduced "MARS" (Multiple Active Results Sets), a method of allowing usage of database
connections for multiple purposes.
SQL Server 2005 introduced DMVs (Dynamic Management Views), which are
specialized views and functions that return server state information that can be used to monitor
the health of a server instance, diagnose problems, and tune performance.
Service Pack 1 (SP1) of SQL Server 2005 introduced Database Mirroring, a high
availability option that provides redundancy and failover capabilities at the database level.
Failover can be performed manually or can be configured for automatic failover. Automatic
failover requires a witness partner and an operating mode of synchronous (also known as high-
safety or full safety).
SQL Server 2005 has reduced application downtime, increased scalability and
performance, and tight yet flexible security controls.
Sql server 2005 provides the ability to have more than one pending request per
connection. In Sql Server 2000 while reading records with one reader we can update another
record at the same time.
We need to depend on ERROR for any errors that way that developers program more
powerful and error resistant SQL code with structured exception handling. We can use try/catch
compare in Sql Server 2005 Performance of query execution is much faster as compared to sql.
Setting It has a new XML data type as well as a new varbinary(max) data type Integration
with the Visual Studio development environment provides more efficient development and
debugging of line-of-business and business intelligence (BI) applications.
BACK END: SQL SERVER 2005
Enterprise (only support Windows Server OS) Enterprise (only support Windows Server
OS) –Includes all of the features of Includes all of the features of SQL Server 2005 and meets the
hi SQL Server 2005 and meets the high demands of demands of enterprise online transaction pr
enterprise online transaction processing and data warehousing and data warehousing applications
Standard (mostly support Windows Server OS) Standard (mostly support Windows Server OS) –
Includes the essential functionality needed for e Includes the essential functionality needed for e-
commerce, data warehousing, commerce, data warehousing, and line and line-of-business
solutions business solutions
Workgroup– – Includes the core database Includes the core database features of the SQL
Server product of the SQL Server product line, and is the ne, and is the data management
solution for small data management solution for small organizations that need a dat organizations
that need a database with no abase with no limits on size or number of users limits on size or
number of users
Express (free) Express (free) –A free, easy A free, easy-to-use, lightweight, and
embeddable use, lightweight, and embeddable version of SQL Server 2005, of SQL Server 2005,
includes powerful features such as SQL Server 2005 Reporting Ser includes powerful features
such as SQL Server 2005 Reporting Services and vices and SQL Server 2005 Management
Studio Express
Developer (can support Windows XP OS) Developer (can support Windows XP OS) –
Includes all of the functionality of Includes all of the functionality of Enterprise Edition, but is
Enterprise Edition, but is licensed only for licensed only for development, test, and demo use
development, test, and demo use
Compact–A free, easy A free, easy-to-use embedded database engine that use embedded
database engine that lets developers build robust lets developers build robust Windows Desktop
and mobile Windows Desktop and mobile applications that run on all Windows ions that run on
all Windows platforms
SQL Server 2005 provides a new capability for the partitioning of tables across
filegroups in a database. Has Features of XML, Multidimensional Expressions (MDX), and
XML for Analysis (XMLA). Integration with the Visual Studio development environment
provides more efficient development and debugging of line-of-business and business intelligence
(BI) applications SQL Server 2005 provides a lot of benefits over SQL Server 2000 including
within the replication feature set. You might be relieved to know that, although most of the
benefits accrue on the side of a SQL Server 2005 Publisher, you can still set up SQL Server 2005
as a subscriber on a SQL Server 2000 Publisher.
Thus, you can begin to merge in the newest release of SQL Server into an existing
replication scheme. You can read more about this here. Although major advantage to SQL Server
2005 over 2000 is that changes to the schema, such as through ALTER TABLE statements,
replicate out to all subscribing servers. The cool news in a mixed version environment is that the
ALTER TABLE statements will be published to SQL Server 2000 Subscribers from a SQL
Server 2005 Publisher.
Security Enhancements:
The security model in SQL Server 2005 separate users from objects, provides fine-grain access,
and enables greater control of data access. Additionally, all system tables are implemented as
views, providing more control over database system objects
2. SYSTEM ANALYSIS
2.1 EXISTING SYSTEM:
The existing system is developed using Microsoft Visual basic as front end and
Microsoft Access as back end. It is not secure. It takes long time to identify a supplier details,
order details, purchase details, production details, delivery details, staff details, carrier details in
the database so it cannot handle large amount of data. So the proposed system is planned to be
developed using VB.Net and SQL Server .To keep the large amount of data with quick accessing
and security. In the existing there is no security but using the proposed system it is possible.
1. Manpower is reduced.
2. Duplication of records gets reduced.
3. Increases the customer satisfaction through shorter delivery cycle.
4. Data tampering is reduced
5. Provides security that protect against outsider crime.
6. Reduces cost of operations
7. Brings down number of order processing mistakes.
2.2.1 Advantages:
Expense becomes less.
Large volumes of data can be stored with ease.
Security is assured.
Maintenance of file is flexible.
Stored data and procedures can be easily edited.
Easy report generation.
Less manpower required.
3. SYSTEM DESIGN AND DVELOPMENT
System design centres the software engineering and applied science regardless of the
software process model that is used. Once the software requirements have been analyzed and
specified, tests that are required in the building and verifying the software is done. Each activity
transforms information in a number that ultimately results in validated computer software.
There are mainly three characteristics that serve as guide for evaluation of good design,
The design must implement all of explicit requirements contained in the analysis model,
and it must accommodate all of the implicit requirements desired by the customer.
The design must be readable, understandable guide for those who generate code and for
those who test and subsequently support the software.
The design should provide a complete picture of software, addressing the data, its
functional and behavioural domains from the implementation perspective.
System design is a process of planning a new system or to the complement of the existing
system. The design based on the limitations of the existing system and the requirements
specification gathered in the phase of system analysis.
3.2 INPUT DESIGN
Input design is the process of converting the user-oriented description of the computer
based business information into program-oriented specification. The goal of designing input data
is to make the automation as easy and free from errors as possible.
Input design and control:
Input specifications describe the manner in which data enter the system for processing.
Input design features will ensure the reliability of the systems and produce results from accurate
data, or thus can be result in the production of erroneous information. The input design also
determines whenever the user can interact efficiently with this system.
Input design consists of developing specifications and procedures for data preparation,
the steps necessary to put transaction data into a usable from for processing and data entry, the
activity of data into the computer processing. The five objectives of input design are:
Data preparation and data entry operation depend on people, because labour costs are
high, the cost of preparing and entering data is also high. Reducing data requirement expense. By
reducing input requirement the speed of entire process from data capturing to processing to
provide results to users.
Avoiding delay:
The processing delay resulting from data preparation or data entry operations is called
bottlenecks. Avoiding bottlenecks should be one objective of input.
Avoiding errors:
The designer should avoid the input design that cause extra steps in processing saving or
adding a single step in large number of transactions saves a lot of processing time or takes more
time to process.
If controls are more people may feel difficult in using the systems. The best-designed
system fits the people who use it in a way that is comfortable for them.
3.3 OUTPUT DESIGN
Output Design is the most important and direct source of information to the user. The
output design is an ongoing activity during study phase. The objectives of the output design
define the contents and format of all documents and reports in an attractive and useful format.
One of the most important factors of an information system for the user is the output the
system produces. Without the quality of the output, the entire system may appear unnecessary
that will make us avoid using it possibly causing it to fail. Designing the output should process
the in an organized well throughout the manner. The right output must be developed while
ensuring that each output element is designed so that people will find the system easy to use
effectively.
Types of output:
Whether the output is formatted report or a simple listing of the contents of a file, a
computer process will produce the output.
A Document
A Message
Retrieval from a data store
Transmission from a process or system activity
Directly from an output sources
3.4 DATA BASE DESIGN
Data Constraints
All business in the world runs on business data being gathered stored and analyzed.
Business managers determine a set of rules that must be applied to the data being stored to
ensure its integrity.
There are two types of data constraints that can be applied to data being inserted into a
database table .One type of constraint is called an I/O constraint. The other type of constraint is
called a business rule constraint.
I/O Constraints
The input /output data constraint is further divided into two distinctly different
constraints.
That none of the cells belonging to the table column are left empty.
The Foreign Key Constraint
Foreign constraint establishes a relationship between records across a master and a detail table.
The relationship ensures.
Records cannot be inserted in a detail table if corresponding records in the master
table does not exist.
The Database allows the application of business rules to table columns. Business
managers determine business rules.
Table Level
Column Level Constraints
If data constraints are defined along with the column definition where creating or altering
a table structure, they are column level constraints.
If data constraints are defined after defining all the table columns when creating or
altering a table structure, it is a table level constraint.
A NULL value is different from a blank of zero. NULL values are treated specially by
the database. A NULL value can be inserted into the columns of any data type.
Not Null Constraint Defined at the Column Level
When a column is defined as not null, then that column becomes a mandatory column .It
implies that a value must be entered into the column if the record is to be accepted for storage in
the table.
A primary key in a table used to uniquely identify each row in the table .A primary key
column in a table has special attributes.
It defines the column as a mandatory column i.e. the column cannot be left blank.
The NOT NULL attribute is active.
Normalization :
The first normal form (or 1NF) requires that the values in each column of a table are
atomic. By atomic we mean that there are no sets of values within a column.
The second normal form (or 2NF) any non-key columns must depend on the entire
primary key. In the case of a composite primary key, this means that a non-key column cannot
depend on only part of the composite key.
Third Normal Form (3NF) requires that all columns depend directly on the primary key.
Tables violate the Third Normal Form when one column depends on another column, which in
turn depends on the primary key (a transitive dependency).
TABLE DESIGN:
Primary Key:Order_no
The systems development is a conceptual model used in project Management that describes the
stages involved in an information system development project, from an initial feasibility study
through maintenance of the completed application.
1. The existing system is evaluated. Deficiencies are identified. This can be done by
interviewing users of the system and consulting with support personnel.
2. The new system requirements are defined. In particular, the deficiencies in the existing
system must be addressed with specific proposals for improvement.
3. The proposed system is designed. Plans are laid out concerning the physical construction,
hardware, operating systems, programming, communications, and security issues.
4. The new system is developed. The new components and programs must be obtained and
installed. Users of the system must be trained in its use, and all aspects of performance
must be tested. If necessary, adjustments must be made at this stage.
5. The system is put into use. This can be done in various ways. The new system can phased
in, according to application or location, and the old system gradually replaced. In some
cases, it may be more cost-effective to shut down the old system and implement the new
system all at once.
6. Once the new system is up and running for a while, it should be exhaustively evaluated.
Maintenance must be kept up rigorously at all times. Users of the system should be kept
up-to-date concerning the latest modifications and procedures.
3.5 MODULE DESCRIPTION
Supplier Details:
This module deals with information about the details of the supplier. It consist of details
such as the supplier id, name, address phone no etc.
Order Details:
This module deals with the information about the order details of the organization. It
consists of details such as order no, delivery date, quantity, remarks, total amount etc.
Purchase Details:
This module deals with the information about the purchase details of the organization. It
consists of details such as purchase no, description, rate, quantity, vat, round off, total amount
etc.
Production Details:
This production module deals with the information about the production details of the
organization.
Delivery Details:
This module deals with the information about the delivery details of the fabrics in the
organization. It consists of details such as order no, delivery date, delivery no, party name,
quantity, rate, total amount etc.
Staff Details:
This module deals with the information about the staff details of the organization. It
consists of details such as staff id, name, date of joining, relieving date, experience etc.
Report Generation:
This module is used to view all the information.
4. SYSTEM TESTING AND IMPLEMENTATION
is sufficiently usable,
It Can be installed and run in its intended environments, and achieves the general result
its stakeholders desire.
The Unit testing used in the each and every modules of the textile management project.
Unit testing focuses verification efforts on the smallest unit of the software design, the module.
This is also known as “Module Testing”. The modules are tested separately. This testing carried
out during programming stage itself. In this testing each module is found to be working
satisfactorily as regards to the expected output from the module.
This testing refers to tests that verify the functionality of a specific section of code,
usually at the function level. In an object-oriented environment, this is usually at the class level,
and the minimal unit tests include the constructors and destructors.
Unit testing aims to eliminate construction errors before code is promoted to QA; this
strategy is intended to increase the quality of the resulting software as well as the efficiency of
the overall development and QA process.
INTEGRATION TESTING:
The integration testing used in the main module or the MDI form of the textile
management project. All the modules are combined and tested as a whole. Here correction is
difficult because the isolation of cause is complicate by the vast expense of the entire program.
Thus in the integration testing stop, all the errors uncovered are corrected for the text testing
steps.
The Integration testing is any type of software testing that seeks to verify the interfaces
between components against a software design. Software components may be integrated in an
iterative way or all together. Normally the former is considered a better practice since it allows
interface issues to be located more quickly and fixed.
Integration testing works to expose defects in the interfaces and interaction between
integrated components. Progressively larger groups of tested software components corresponding
to elements of the architectural design are integrated and tested until the software works as a
system.
ACCEPTANCE TESTING:
At last the time of the desktop security project is delivered to the user for Acceptance
testing.
SECURITY TESTING:
The textile management project is also user for system security. The Security testing is
essential for software that processes confidential data to prevent system intrusion by hackers, this
system followed by the third modules of the desktop security project.
Internal system design is not considered in this type of testing. Tests are based on
requirements and functionality.
This testing is based on knowledge of the internal logic of an application’s code. Also
known as Glass box Testing. Internal software and code working should be known for this type
of testing. Tests are based on coverage of code statements, branches, paths, conditions.
4.2 SYSTEM IMPLEMENTATION
In the implementation section, firstly the difficulties and the reasons leading to a specific
approach are explained. Then, the basic components of the system like Window and Document
processing unit are stated. The other aspects of the system are explained briefly at the end.
The difficulties of the implementation are numerous. The fundamental difficulties are
firstly from the shortage of debugging tool. It is hard to debug Script and even harder to debug
.net. The Visual Studio is not designed for .Net products, or it is better to say that there is no
serious debug tool for the project implementation.
The MSSQL and VB.NET at the time of writing. In order to have an intuitive feeling of
the Scripting code, the components such as window are isolated as a single .net file. The file is
then read into the main page at runtime through the database. assessment of the manner in which
the system functions, including ease of use, response time, suitability of information formats,
overall reliability, and level of utilization.
5. CONCLUSION:
The System reduces the Clerical work and result in retrieval of information, which is very
vital for the progress of an organization. Cost is minimized in the case of the stationary and man
power. Burden of Manual work is reduced whenever transaction takes place, where there is no
need for recording it many places manually. The report can be taken easily.
The application has many options as its future scope. Development of Textile
management application will be emphasized on following aspects:
Can be used to protect my computer so that no one can view the information.
Can be used enhance the entire platform like Mac, windows, Linux, Android.
BIBLIOGRAPHY
BOOK REFERENCES
Davis, Harold. Visual Basic.Net for Windows. Berkeley, CA: Peach pit Press, 2008.
Sandvig, Chris. ASCII Character Codes for VBScript and VB.NET (ISO 8859-1). 8
January 2008.
SYBEX. Visual Basic Dot Net Complete. Alameda, CA: SYBEX, 1999.
Karve, Sandit. File Handling using VB6. 28 December 2010 Microsoft. MSDN
Library. 2010.
WEB REFERENCES:
http://www.vbdotnetheaven.com/
http://www.stellarpc.com/articles/board.aspx?id=5
http://www.homeandlearn.co.uk/net/vbnet.html
www.codeproject.com
<http://yorktown.cbe.wwu.edu/sandvig/docs/ASCIICodes.aspx>.
<http://swik.net/SWiK/Dream.In.Code+Programming+Tutorials/File+
Handling+in+Visual+Basic+6+Part+1+-
+Sequential+Files+in+Visual+Basic+Tutorials/bbv3x>.