Академический Документы
Профессиональный Документы
Культура Документы
ABSTRACT
India’s Public Distribution System (PDS) is the largest food distribution system in the
world. Public distribution system provides a ration card issued under an order or authority of the
State Government for the purchase of essential consumer materials like rice, wheat, kerosene and
oil. State Government issues distinctive ration cards like yellow ration card, saffron ration card,
and white ration card depending on family annual income. The consumer material is distributed
to ration card holders in the first week of every month by ration shopkeeper. Public Distribution
System is one of the systems that involve malpractice. The ration shop owner illegally uses
consumer materials without prior knowledge of ration card holders. The proposed system aids to
control malpractices which are present in ration shop by replacing manual work with automatic
system based on RFID. Every consumer i.e. family head will be provided with a RFID card
which acts as ration card. The RFID card has unique identification number. The consumer scans
the card on RFID reader which is interfaced with microcontroller kept at ration shop. Once
consumer is validated by details, the system shows customer’s ration details and cost. Based on
material chosen by consumer, the consumer will get the ration and he will pay through dummy
payment gateway. The proposed RFID based automatic ration shop system would bring
transparency in public distribution system and become helpful to prevent malpractices.
CHAPTER 1
INTRODUCTION TO RFID
An RFID tag is an object that can be applied to or incorporated into a product, animal, or
person for the purpose of identification and tracking using radio waves. Some tags can be read
from several meters away and beyond the line of sight of the reader.
An RFID tag is an object that can be applied to or incorporated into a product, animal, or
person for the purpose of identification and tracking using radio waves. Some tags can be read
from several meters away and beyond the line of sight of the reader.
What is RFID?
a) An antenna or coil
Electronically programmed with unique information. There are many different types of
RFID systems out in the market. They are categorized according to there frequency ranges. Some
of the most commonly used RFID kits are as follows:
Radio frequency identification (RFID) technology has been in use for several decades to
track and identify goods, assets and even living things. Recently, however, RFID has generated
widespread corporate interest as a means to improve supply chain performance. Market activity
has been exploding since Wal-Mart's June 2003 announcement that its top 100 suppliers must be
RFID-compliant by January 2005. Mandates from Wal-Mart and the Department of Defense
(DoD) are making many companies scramble to evaluate, select and implement solutions that
will make them compliant with their customers' RFID requirements and additional retailers and
other large supply chain channel masters are likely to follow suit.
Ration card
Distribution to granted PDS services has been highly irregular and diverse in various
states. There are no set criteria as to which family is BPL and which APL is So to avoid this, we
move towards a optimized ration card system using RFID, Biometrics and GSM technique. In
the proposed system each ration shop contains a RFID reader which reads the RFID card, RFID
reader is used to check whether the user is valid or not. Biometrics is used to identify the user. It
stores fingerprints of users into the database. GSM is used to send the information of ration taken
to the government and also to the customer. This new produced system will solve all the above
problems effectively.
CHAPTER 2
SYSTEM STUDY
FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal is put forth with a
very general plan for the project and some cost estimates. During system analysis the feasibility
study of the proposed system is to be carried out. This is to ensure that the proposed system is
not a burden to the company. For feasibility analysis, some understanding of the major
requirements for the system is essential.
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will have on
the organization. The amount of fund that the company can pour into the research and
development of the system is limited. The expenditures must be justified. Thus the developed
system as well within the budget and this was achieved because most of the technologies used
are freely available. Only the customized products had to be purchased.
TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the available
technical resources. This will lead to high demands on the available technical resources. This
will lead to high demands being placed on the client. The developed system must have a modest
requirement, as only minimal or null changes are required for implementing this system.
SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must not feel
threatened by the system, instead must accept it as a necessity. The level of acceptance by the
users solely depends on the methods that are employed to educate the user about the system and
to make him familiar with it. His level of confidence must be raised so that he is also able to
make some constructive criticism, which is welcomed, as he is the final user of the system.
CHAPTER 3
SYSTEM ANALYSIS
Short range wireless communication system which uses radio frequency technology for
automatic target recognition. It consists of three parts: labels, antennas and readers. The
technology used to identify every individual uniquely is known as biometrics. Biometrics also
refers to the pattern recognition system where the users’ bio data is being referenced from the
database. GSM (Global System for Mobile Communications) is applied where mobile phones
connect to other cells in the immediate locality. RFID is different from other technologies
because it contains all the sensor tags embedded in the tracked object itself.
PROPOSED SYSTEM:
In this proposed system conventional ration card is replaced by RFID (smart ration card)
in which all the details about users are provided including their bank details which is used for
user authentication. It proposes to use smart card instead of manual ration card with Biometrics
for unique authentication. Main perspective of this system is to avoid frauds in Ration shops and
to provide some technology based environment to government sector.
TECHNOLOGY TO BE USED:
System uses RFID techniques for verification and validation of users. RFID: Radio Frequency
identification is a technology for non contact and automated identification. It is a concept in
which unique items are identified by using radio waves. RFID systems are built up of three
components:
1. Readers (interrogators)
2. Antennas and
SYSTEM SPEDIFICATIONS
• RAM : 4 GB
• GSM Modem
Object oriented.
Component oriented.
Easy to learn.
Structured language.
The .Net framework is a revolutionary platform that helps you to write the following
types of applications:
Windows applications
Web applications
Web services
The .Net framework applications are multi – platform applications. The framework has
been designed in such a way that it can be used from any of the following languages: Visual
Basic, C#, C++, Jscript, and COBOL, etc.All these languages can access the framework as well
as communicate with each other.
The .Net framework consists of an enormous library of codes used by the client
languages like VB.Net. These languages use object - oriented methodology.
Windows Forms
ADO.Net
Integrated Development Environment (IDE) For VB.Net
The last two are free. Using these tools, you can write all kinds of VB.Net programs from
simple command - line applications to more complex applications. Visual Basic Express and
Visual Web Developer Express edition are trimmed down versions of Visual Studio and has the
same look and feel. They retain most features of Visual Studio. In this tutorial, we have used
Visual Basic 2010 Express and Visual Web Developer (for the web programming chapter). You
can download it from here. It gets automatically Istalled in your machine. Please note that you
need an active internet connection for installing the express edition.
Introduction to SQL
Oracle SQL includes many extensions to the ANSI/ISO standard SQL language, and
Oracle tools and applications provide additional statements. The Oracle tools SQL*Plus and
Oracle Enterprise Manager let you run any ANSI/ISO standard SQL statement against an Oracle
database, as well as additional statements or functions that are available for those tools.
Although some Oracle tools and applications simplify or mask SQL use, all database
operations are performed using SQL. Any other data access method circumvents the security
built into Oracle Database and potentially compromises data security and integrity.
SQL Statements:
All operations performed on the information in Oracle Database are run using
SQL statements. A statement consists of identifiers, parameters, variables, names, datatypes, and
SQL reserved words. SQL reserved words have special meaning in SQL and cannot be used for
any other purpose. For example, SELECT and UPDATE are reserved words and cannot be used
as table names.
Only complete SQL statements can be run. A fragment such as the following generates
an error indicating that more text is required before a SQL statement can run:
SELECT last_name;
Data manipulation language (DML) statements query or manipulate data in existing schema
objects. They enable you to:
Retrieve or fetch data from one or more tables or views (); fetches can be scrollable
(see "Scrollable Cursors").
Add new rows of data into a table or view (INSERT).
Lock a table or view, temporarily limiting other users' access (LOCK TABLE).
DML statements are the most frequently used SQL statements. Some examples of DML
statements are:
’14-FEB-1988’,1600,500,30);
When a DML statement encounters an error, the statement can continue processing while
the error code and the associated error message text is logged to an error logging table. This is
particularly helpful to long-running, bulk DML statements. After the DML operation completes,
you can check the error logging table to correct rows with errors.
New syntax is added to the DML statements to provide the name of the error logging
table, a statement tag, and a reject limit. The reject limit determines whether the statement should
be aborted. For parallel DML operations, the reject limit is applied for each slave. The only
values for the reject limit that are precisely enforced on parallel operations are zero and
unlimited.
With data conversion errors, Oracle Database tries to provide a meaningful value to log for the
column. For example, it could log the value of the first operand to the conversion operator that
failed. If a value cannot be derived, then NULL is logged for the column.
Data definition language (DDL) statements define, alter the structure of, and drop schema
objects. DDL statements enable you to:
Create, alter, and drop schema objects and other database structures, including the
database itself and database users (CREATE, ALTER, DROP).
Delete all the data in schema objects without removing the objects' structure
(TRUNCATE).
DDL statements implicitly commit the preceding commands and start new transactions. Some
examples of DDL statements are:
Transaction control statements manage the changes made by DML statements and group
DML statements into transactions. They enable you to:
Undo the changes in a transaction, since the transaction started or since a savepoint
(ROLLBACK).
Session control statements manage the properties of a particular user's session. For example,
they enable you to:
Alter the current session by performing a specialized function, such as enabling and
disabling the SQL trace facility (ALTERSESSION).
Enable and disable roles (groups of privileges) for the current session (SET ROLE).
System control statements change the properties of the Oracle database instance. The
only system control statement is ALTERSYSTEM. It enables you to change settings (such as the
minimum number of shared servers), terminate a session, and perform other tasks.
Embedded SQL statements incorporate DDL, DML, and transaction control statements
within a procedural language program. They are used with the Oracle precompilers. Embedded
SQL statements enable you to:
Oracle Database automatically notices when applications send similar SQL statements to
the database. The SQL area used to process the first occurrence of the statement is shared—that
is, used for processing subsequent occurrences of that same statement. Therefore, only one
shared SQL area exists for a unique statement. Because shared SQL areas are shared memory
areas, any Oracle Database process can use a shared SQL area. The sharing of SQL areas reduces
memory use on the database server, thereby increasing system throughput.
In evaluating whether statements are similar or identical, Oracle Database considers SQL
statements issued directly by users and applications as well as recursive SQL statements issued
internally by a DDL statement.
Parsing
Parsing is one stage in the processing of a SQL statement. When an application issues a SQL
statement, the application makes a parse call to Oracle Database. During the parse call, Oracle
Database:
Determines whether the process issuing the statement has privileges to run it.
Note the difference between an application making a parse call for a SQL statement and Oracle
Database actually parsing the statement.
A parse call by the application associates a SQL statement with a private SQL area. After
a statement has been associated with a private SQL area, it can be run repeatedly without
your application making a parse call.
A parse operation by Oracle Database allocates a shared SQL area for a SQL statement.
Once a shared SQL area has been allocated for a statement, it can be run repeatedly
without being reparsed.
Both parse calls and parsing can be expensive relative to execution, so perform them as seldom
as possible.
See Also:
"Overview of PL/SQL"
Although parsing a SQL statement validates that statement, parsing only identifies errors that can
be found before statement execution. Thus, some errors cannot be caught by parsing. For
example, errors in data conversion or errors in data (such as an attempt to enter duplicate values
in a primary key) and deadlocks are all errors or situations that can be encountered and reported
only during the execution stage.
Query Processing
Queries are different from other types of SQL statements because, if successful, they return data
as results. Whereas other statements simply return success or failure, a query can return one row
or thousands of rows. The results of a query are alwaysin tabular format, and the rows of the
result are fetched (retrieved), either a row at a time or in groups.
Several issues relate only to query processing. Queries include not only
explicit SELECT statements but also the implicit queries(subqueries) in other SQL statements.
For example, each of the following statements requires a query as a part of its execution:
In particular, queries:
Can require the describe, define, and fetch stages of SQL statement processing.
SQL Processing
This section introduces the basics of SQL processing. It starts with a flowchart of typical
SQL statement execution which generally covers most types of SQL statements. Followed by a
general description of the stages of SQL statement processing, and then a section indicating how
the flowchart and description may differ for different types of SQL statements.
CHAPTER 5
SYSTEM IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is turned out into a
working system. Thus it can be considered to be the most critical stage in achieving a successful
new system and in giving the user, confidence that the new system will work and be effective.
The implementation stage involves careful planning, investigation of the existing system
and it’s constraints on implementation, designing of methods to achieve changeover and
evaluation of changeover methods.
In this proposed system, we briefly discuss the existing works about Public Distribution System.
In this automated system conventional ration card is replaced by RFID (smart card) in
which all the details about users are provided including their bank details which is
used for user authentication.
It provides 2 Level Multi-Factor Authentication (RFID Smart Card and Biometrics).
This proposed to use smart card instead of manual ration card with Biometrics for
unique authentication
MODULES
Login Module:
In this module, the system registers beneficiaries details that includes their name, address,
fingerprint, date of birth, age, count of family members and category of the card to which the
family belong, with all the information being uploaded in the database.
RFID being a part of Automatic Identification and Data Capture (AIDC) technologies is
considered to be a fast and reliable means of identifying objects. RFID based Smart Card
verification module consists of two prime components, they are interrogator and transponder.
Processing
The receiving pin of the microcontroller received the data from the RFID reader. The
microcontroller processes the ration card data and match the ration card details with the database
and process it.
Displaying system
If the data is found reliable, then the system will process for displaying the name of the
ration card holder and the quantity of ration chosen for the customer.
CHAPTER 6
SYSTEM DESIGN
FLOW DIAGRAM
INPUT DESIGN
The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to put
transaction data in to a usable form for processing can be achieved by inspecting the computer to
read data from a written or printed document or it can occur by having people keying the data
directly into the system. The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The
input is designed in such a way so that it provides security and ease of use with retaining the
privacy. Input Design considered the following things:
Methods for preparing input validations and steps to follow when error occur.
OBJECTIVES
1.Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process and
show the correct direction to the management for getting correct information from the
computerized system.
2. It is achieved by creating user-friendly screens for the data entry to handle large volume of
data. The goal of designing input is to make data entry easier and to be free from errors. The data
entry screen is designed in such a way that all the data manipulates can be performed. It also
provides record viewing facilities.
3.When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be in maize
of instant. Thus the objective of input design is to create an input layout that is easy to follow
OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users and to
other system through outputs. In output design it is determined how the information is to be
displaced for immediate need and also the hard copy output. It is the most important and direct
source information to the user. Efficient and intelligent output design improves the system’s
relationship to help user decision-making.
1. Designing computer output should proceed in an organized, well thought out manner; the right
output must be developed while ensuring that each output element is designed so that people will
find the system can use easily and effectively. When analysis design computer output, they
should Identify the specific output that is needed to meet the requirements.
3.Create document, report, or other formats that contain information produced by the system.
The output form of an information system should accomplish one or more of the following
objectives.
Future.
Trigger an action.
Confirm an action.
CHAPTER 6
SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the Software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.
Integration testing
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.
Functional test
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
System Test
System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.
White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose. It is
used to test areas that cannot be reached from a black box level.
Black Box Testing
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests,
must be written from a definitive source document, such as specification or requirements
document, such as specification or requirements document. It is a testing in which the software
under test is treated, as a black box .you cannot “see” into it. The test provides inputs and
responds to outputs without considering how the software works.
Unit Testing:
Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be conducted as
two distinct phases.
Field testing will be performed manually and functional tests will be written in detail.
Test objectives
Features to be tested
The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level –
interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
CHAPTER 7
CONCLUSION
The proposed system is more secure and transparent than the normal existing system.
Influence of fraud data entry in the ration database can be maintained simply with the use of this
smart ration card system. Only authorized person (shopkeeper) can maintain the database.
Customer can be authenticated using RFID swapping and thumb detection. In the planned it is
expected that the proposed system will be more transparent, reliable than the existing ration card
system.
FUTURE RESEARCH
The main aim of this paper is to provide the guidelines for further research related to
emotion recognition. The outlines are given below:
Train the system in such a manner that it determines the emotions in a more
efficient and precise way with minimum error rate.
Achieve 100% accuracy in predicting the emotions with the help of above
approaches.
Include new features like mood detection of person.
Design a system which will work with both offline and online.
REFERENCES
[1] Chiou Liou, G. Egan, 1. Patel and S. Bhashyam, "A Sophisticated RFID Application on
Multi-Factor Authentication" IEEE Eighth International Conference on Information Technology,
pp. 180-185, 2011.
[2] R.Ramani, S.Valarmathy, S.Selvaraju and P.Niranjan,” Bank Locker Security System based
on RFID and GSM Technology”, International Journal of Computer Applications (0975 – 8887)
Volume 57– No.18, November 2012
[3] Sandhya Konatham, Bhamini Surya Chalasani, Nikita Kulkarni, Tarik El Taeib,”
ATTENDANCE GENERATING SYSTEM USING RFID AND GSM” Dept. of Computer
Science University of Bridgeport, CT, USA. 940 | P a g e
[4] Ishan Bhardwaj, Narendra D. Londhe,Sunil K. Kopparapu "Feature Selection for Novel
Fingerprint Dynamics Biometric Technique based on PCA"Electrical Engineering Department
NIT Raipur Raipur, India
[5] P. Kalaimathi, V. Ganesan "Extraction and Authentication of Biometric Finger Vein using
Gradient Boosted Feature Algorithm"
[6] Gyanendra K Verma,Pawan Tripathi "A Digital Security System with Door Lock System
Using RFID Technology" Indian Institute of Information Technology Allahabad-India
[7] Ala.Sivaganga Rao,G. Chandr Reddy "SMART AND SECURE RATION SYSTEM" 2
Assistant Professor, Nalanda Institute of Technology(NIT), Siddharth Nagar,India
[8] Ankush Vishwanath, Basappa Yelappa Haibatti, Pavan Krishna Kotekar, Rakesh kumar T S,
Sandesh A, Shreyas M Belavadi,Sudarshan Patil Kulkarni "RFID and GSM based three Level
Security System" Sri Jayachamarajendra College of Engineering, Mysore
[11] Vinayak T. Shelar, Mahadev S. Patil "RFID and GSM based Automatic Rationing System
using LPC2148"
[12] Miss. Prajakta Lokhande, Miss. Dipali Kotkar, Miss Pooja Nikam "Combined RFID-
Biometric based MIS for student information" Department of Computer Engineering Sir
Visvesvaraya Institute Of Technology Chincholi, Nashik.
BIBLIOGRAPHY
http://www.techcrunch.com/2006/12/
http://aws.amazon.com/
http://code.google.com/appengine/
http://tomopt.com/tomlab/,
http://www.cern.com/
http://www.gogrid.com/,
http://www.microsoft.com/azure/
http://www.sdss.org/
SAMPLE CODING:
End
End Sub
TxtUserName.SetFocus
Exit Sub
End If
TxtPassword.SetFocus
Exit Sub
End If
Call InitConn
Unload Me
End If
Else
TxtUserName.SetFocus
End If
End Sub
MDIForm1.Show
End Sub
Dim b As String
Com_entry.SetFocus
End If
If answer = 6 Then
Sql = "Delete * from Entry where Userid ='" & Trim(Tx_ID.Text) & "'"
End If
If answer = 7 Then
Exit Sub
End If
Call Form_Load
End
Set Rrset = Ftcon.Execute("Select * from Entry where UserName ='" & Trim(Com_entry.Text) & "'")
Tx_ID.Text = Rrset("Userid")
Tx_Name.Text = Rrset("UserName")
Combo_gen.Text = Rrset("Gen")
Tx_address.Text = Rrset("Address")
Tx_City.Text = Rrset("City")
Tx_pin.Text = Rrset("Pin")
Tx_phone.Text = Rrset("Phone")
Tx_email.Text = Rrset("Email")
Tx_m1.Text = Rrset("m1")
Tx_m2.Text = Rrset("m2")
Tx_m3.Text = Rrset("m3")
Rrset.MoveNext
Loop
End If
End If
Exit Sub
Com_entry.Text = ""
Tx_Name.Text = ""
Tx_ID.Text = ""
Combo_gen.Text = ""
Tx_address.Text = ""
Tx_City.Text = ""
Tx_pin.Text = ""
Tx_phone.Text = ""
Tx_email.Text = ""
Tx_m1.Text = ""
Tx_m2.Text = ""
Tx_m3.Text = ""
End Sub
Call Com_new_Click
Entry_frm.Visible = False
End Sub
Tx_Name.SetFocus
Exit Sub
End If
Tx_ID.SetFocus
Exit Sub
End If
Tx_m1.SetFocus
Exit Sub
End If
Tx_m2.SetFocus
Exit Sub
End If
Tx_m3.SetFocus
Exit Sub
End If
Screen.MousePointer = vbHourglass
Ftcon.BeginTrans
If Com_entry.ListIndex = -1 Then
Ftcon.RollbackTrans
TxtEmployeeCode.SetFocus
Exit Sub
End If
Sql = "Select Userid from Entry where Userid='" & Trim(Tx_ID.Text) & "'"
cnt = 0
cnt = Rrset.RecordCount
Screen.MousePointer = vbArrow
EmployeeCode.SetFocus
Exit Sub
End If
Rrset.Close
Rrset.AddNew
Rrset("Userid") = Trim(Tx_ID.Text)
Rrset("UserName") = Trim(Tx_Name.Text)
Rrset("Gen") = Trim(Combo_gen.Text)
Rrset("Address") = Trim(Tx_address.Text)
Rrset("City") = Trim(Tx_City.Text)
Rrset("Pin") = Trim(Tx_pin.Text)
Rrset("Phone") = Trim(Tx_phone.Text)
Rrset("Email") = Trim(Tx_email.Text)
Rrset("m1") = Trim(Tx_m1.Text)
Rrset("m2") = Trim(Tx_m2.Text)
Rrset("m3") = Trim(Tx_m3.Text)
Rrset.Update
Rrset.Close
Else
Ftcon.RollbackTrans
TxtUserName.SetFocus
Exit Sub
End If
End If
Ftcon.CommitTrans
Screen.MousePointer = vbArrow
Call Com_new_Click
Call Form_Load
End Sub
MSComm1.CommPort = Val(Tx_comm_val)
MSComm1.PortOpen = True
End Sub
Combo_gen.AddItem "Male"
Combo_gen.AddItem "Female"
Com_entry.Clear
Com_entry.AddItem (Rrset("UserName"))
Rrset.MoveNext
End Sub
Private Sub Form_LostFocus()
MSComm1.PortOpen = False
End Sub
Tx_Time.Text = Time
Tx_Date.Text = Date
End Sub
'INPUT DATA
For j = 1 To 40
Tx_ID.Text = b
End If
Next j
End Sub
Dim b As String
Call Com_dnew_Click
Distrubute_frm.Visible = False
End Sub
txx_name.Text = ""
txx_id.Text = ""
Combo_MAT.Text = ""
txx_city.Text = ""
txx_phone.Text = ""
txx_m1.Text = ""
txx_m2.Text = ""
txx_m3.Text = ""
End Sub
Combo_MAT.SetFocus
Exit Sub
End If
TXX_QTY.SetFocus
Exit Sub
End If
Ftcon.BeginTrans
Screen.MousePointer = vbHourglass
Ftcon.RollbackTrans
Combo_MAT.SetFocus
Exit Sub
End If
Set Rrset = New ADODB.Recordset
Rrset.AddNew
Rrset("Userid") = Trim(txx_id.Text)
Rrset("UserName") = Trim(txx_name.Text)
Rrset("City") = Trim(txx_city.Text)
Rrset("Phone") = Trim(txx_phone.Text)
Rrset("m1") = Trim(txx_m1.Text)
Rrset("m2") = Trim(txx_m2.Text)
Rrset("m3") = Trim(txx_m3.Text)
Rrset("Material") = Trim(Combo_MAT.Text)
Rrset("Oty") = Trim(TXX_QTY.Text)
Rrset.Update
Ftcon.CommitTrans
Screen.MousePointer = vbArrow
Call Com_dnew_Click
End Sub
MSComm2.CommPort = Val(Tx_comm_val)
MSComm2.PortOpen = True
End Sub
MSComm2.PortOpen = False
End Sub
Tx_Date.Text = Date
End Sub
'INPUT DATA
For j = 1 To 40
txx_id.Text = b
End If
Next j
End Sub
Set Rrset = Ftcon.Execute("Select * from Entry where Userid='" & Trim(txx_id.Text) & "'")
txx_name.Text = Rrset("UserName")
txx_city.Text = Rrset("City")
txx_phone.Text = Rrset("Phone")
txx_m1.Text = Rrset("m1")
txx_m2.Text = Rrset("m2")
txx_m3.Text = Rrset("m3")
Rrset.MoveNext
Loop
End If
Exit Sub
End Sub
Dim b As String
CmbYear.SetFocus
Exit Sub
End If
Screen.MousePointer = vbHourglass
Sql = "select * from Distrubute where Userid='" & Trim(txx_id.Text) & "'"
Screen.MousePointer = Default
Command1.SetFocus
Exit Sub
End If
tWS.PageSetup.PaperSize = xlPaperA4
tWS.PageSetup.PaperSize = 11
tWS.PageSetup.Zoom = 70
tWS.PageSetup.PrintTitleRows = "$4:$4"
tWS.Cells.Font.Size = 11
tWS.Cells.VerticalAlignment = vbCenter
tWS.PageSetup.CenterHorizontally = True
tWS.PageSetup.Orientation = xlLandscape
tWS.PageSetup.PrintGridlines = True
tWS.PageSetup.LeftMargin = tEX.Application.InchesToPoints("0.20")
tWS.PageSetup.RightMargin = tEX.Application.InchesToPoints("0.20")
tWS.PageSetup.TopMargin = tEX.Application.InchesToPoints("0.20")
tWS.PageSetup.BottomMargin = tEX.Application.InchesToPoints("0.25")
tWS.Cells(3, 1) = "S.No"
tWS.Cells(3, 3) = "City"
tWS.Cells(3, 4) = "Phone"
tWS.Cells(3, 7) = "Material"
tWS.Cells(3, 8) = "Qty"
Row = 4
sno = 0
mDepartmentName = ""
sno = sno + 1
tWS.Cells(Row, 1) = sno
tWS.Cells(Row, 2) = Rrset("UserName")
tWS.Cells(Row, 3) = Rrset("City")
tWS.Cells(Row, 4) = Rrset("Phone")
tWS.Cells(Row, 5) = Rrset("M1")
tWS.Cells(Row, 6) = Rrset("M2")
tWS.Cells(Row, 7) = Rrset("Material")
tWS.Cells(Row, 8) = Rrset("Oty")
Rrset.MoveNext
Row = Row + 1
Wend
tWS.PageSetup.HeaderMargin = 0
tWS.PageSetup.CenterHorizontally = True
tWS.PageSetup.FooterMargin = 0
tWS.PageSetup.LeftMargin = tEX.Application.InchesToPoints("0.25")
tWS.PageSetup.RightMargin = tEX.Application.InchesToPoints("0.25")
tWS.PageSetup.TopMargin = tEX.Application.InchesToPoints("0.8")
tWS.PageSetup.BottomMargin = tEX.Application.InchesToPoints("0.5")
'tWS.Columns.AutoFit
tWS.Rows.AutoFit
tEX.Visible = True
tEX.WindowState = xlMaximized
Screen.MousePointer = vbArrow
End Sub
MSComm3.CommPort = Val(Tx_comm_val)
MSComm3.PortOpen = True
End Sub
MSComm3.PortOpen = False
End Sub
Tx_Time.Text = Time
Tx_Date.Text = Date
End Sub
'INPUT DATA
For j = 1 To 40
txx_id.Text = b
End If
Next j
End Sub
SAMPLE SCREEN SHOTS: