Академический Документы
Профессиональный Документы
Культура Документы
Semester- VII
A PROJECT REPORT
Submitted by
Internal Guide:
Sanjay Bhanderi
Assistant Professor
GEC, Rajkot
Date:
This is to certify that the project entitled Yogacise has been carried out by
Odedara Deviben enrollment number 160200107062 under my guidance in
partial fulfillment of the degree of Bachelor of Engineering in Computer (7th
Semester) of Gujarat Technological University, Ahmadabad during the
academic year 2019-20.
Computer Department
CERTIFICATE
Date:
This is to certify that the project entitled Yogacise has been carried out by
Pathak Devanshee enrollment number 160200107077 under my guidance in
partial fulfillment of the degree of Bachelor of Engineering in Computer (7th
Semester) of Gujarat Technological University, Ahmadabad during the
academic year 2019-20.
Team:
Name of Guide
Sanjay Bhanderi
Assistant Professor
GEC Rajkot
Signature of Guide
INDEX
No. Title Page No.
Acknowledgement
Abstract
List of Figures
List of Symbols
1. Introduction
1.1 Project Summary
1.2 Purpose
1.3 Scope
1.4 Technology and Literature Review
2 Project Management
2.1 Project Planning and Scheduling
4 System Analysis
4.1 Study of Current System
4.2 Problems and Weakness of Current System
4.3 Requirements of New System
4.3.1 Functional Requirements
4.3.2 Nonfunctional Requirements
4.4 Feasibility Study
4.4.1 Technical Feasibility
4.4.2 Economical Feasibility
4.4.3 Operational Feasibility
4.5 Requirements Validation
4.6 Functions of Systems
5 System Design
5.1 Database Design
5.1.1 Tables and Relationship
5.2 System Procedural Design
5.2.1 Algorithm for Methods or Operations
5.2.2 Flow Chart
5.2 Input Output and Interface Design
5.3.1 Access Control and Security
5.4 System Architecture Design
7 Testing
7.1 Testing Plan
7.2 Testing Strategy
7.3 Testing Methods
7.4 Test Cases
9 Conclusion
References
Experience
List of Figures
No. Title Page
No.
2.1.1 Spiral Model
CLASS Diagram
ACKNOWLEDGEMENT
Every work that complete successfully stands on the constant encouragement, good will and
support of people. It gives us immense pleasure and satisfaction in presenting this report of
the project under taken during the final year of B.E. As it is first step into my professional
life, I would like to take this opportunity to express my gratitude to all those who have
contributed to accomplish my project successfully. We are happy to submit our idea of
“Yogacise” in Gujarat Technology University, Ahmedabad for Bachelor Engineering degree
in computer branch.
This project has been prepared under the most supporting guide Prof. Sanjay Bhanderi of
Department of Computer Engineering, Government Engineering College, Rajkot.
Due to his continuous support, guidelines, his helping nature, and very thankful to him to any
time resolving our queries and provides all necessary facilities during our work. Also
thankful for giving us such new directions. Without him, keen interest and knowledge of the
subject and constant encouragement we cannot complete our dream.
We are also grateful to Dr. Chirag Thaker, Head of the Department and all the faculty
members of the Department of Information Technology for their kind support throughout this
journey. Our obligation remains to GEC faculty members, all these people and friends who
have directly or indirectly helped us in successful completion of our project. No amount of
words here will be sufficient for my sense of gratitude towards all of them.
We also take the privilege to acknowledge the elite authors of numerous books and papers
and blogs which we have referred during progress of this.
The feeling of gratefulness to any one’s help directly arises from the bottom of heart. A small
but an important and timely help can prove to be a milestone in one’s life.
We take the opportunity to thank all those who have directly or indirectly helped us to fulfill
our dream.
I would like to express my gratitude towards my teammates for their kind cooperation and
encouragement which help me in completion of this project.
The central concept is to guide users how to perform Yogas . Awareness of Importance
of Mental as well as physical health with their day to day activities and diet plan with
solving their queries by certified doctors.
The objective of the project is to make website to view online and offline videos of
yogas and exercise also a diet chart for different purposes and also can view different
poses of yogas and exercise. A computer based management system is designed to
handle all the primary information required to calculate the statement. This project
intends to introduce more user friendly in the various activities such as record updating,
maintenance and searching
1.2 Scope
This system can be implemented within any type and anywhere of user having no
knowledge of Yoga . This system is designed for the user who requires to build their
physical as well as mental health. User can download photos and videos offline. There is
a Feature for using free time of doctors to upload and advice users.
⮚ HTML :
HTML stands for Hyper Text Markup Language. HTML is not a programming language;
it is a markup language. A markup language is a set of markup tags HTML uses markup
tags to describe web pages.
In the application, it is used for browser support. Easy to learn and use. It is by default in
every windows so user don’t need to purchase extra software.
⮚ CSS :
CSS stands for Cascading Style Sheets. Styles define how to display HTML elements.
Styles are normally stored in Style Sheets. Styles were added to HTML 4.0 to solve a
problem External Style Sheets can save a lot of work External Style Sheets are stored in
CSS files. Multiple style definitions will cascade into one.
⮚ JavaScript :
MySQL :
The open source MySQL is owned and sponsored by a single for-profit firm, the
Swedish company MySQL AB, which holds the copyright to most of the codebase. Both
the MySQL server software itself and the client libraries are distributed under a dual-
licensing format. Media Wiki deploys MySQL under the GNU General Public License.
MySQL is an open source Relational Database Management System. MySQL is very fast
reliable and flexible Database Management System. It provides a very high performance
and it is multi-threaded and multi user Relational Database management system.
MySQL is one of the most popular relational databases Management System on the web.
The MySQL Database has become the world's most popular open source Database,
because it is free and available on almost all the platforms. The MySQL can run on
UNIX, window, and Mac OS. MySQL is used for the internet applications as it provides
good speed and is very secure. MySQL was developed to manage large volumes of data
at very high speed to overcome the problems of existing solutions. MySQL can be used
for verity of applications but it is mostly used for the web applications on the internet.
MySQL is a database system used on the web. Basically, a MySQL database allows you
to create a relational database structure on a web-server somewhere in order to store data
or automate procedures. If you think of it in comparison to Microsoft Access, MySQL is
what holds all of your tables, PHP acts as your queries (among other things), and your
forms are basically web pages with fields in them. With all of this combined, you can
create truly spectacular projects on the web.
Advantages of MySQL :
MySQL and MS SQL are two of the mostly used database systems by the web
developers. But there is a debate over the benefits and several disadvantages of using
these two databases. Both the systems work as a support system to XML. From the
point of view of data storage and retrieval, both the systems more or else perform in a
similar pattern.
License:
Under the General Public License, MySQL is an open source system. Without
spending any amount, a developer can start working with this system. But a person
needs to buy a commercial license if he wants to sell the software. But the case is bit
different for MS SQL. A developer has to secure a license.
Functionality:
If the two systems are compared on the basis of their performance, then it will be seen
that MySQL surely has more advantages. It takes a very less storage space in the disk
and the MyISAM database gives remarkable performance. Besides Windows, this
system also performs well on UNIX and LINUX systems. For MS SQL, its
performance is comparatively complex. It is difficult to work with it without very
sound knowledge and efficient hardware. Working with MS SQL takes up more disk
space compared to MySQL.
Technical Drawbacks:
Compared to MS SQL, most of the foreign keys are not supported by MySQL. Some
of the relational features found in MS SQL are missing in MySQL.
Recovery:
If the two systems are considered on the basis of recovery process, then SQL has
more benefits than MySQL. Since it has a configuration with MyISAM, it sometimes
becomes a drawback for the system. If there is a disturbance or interruption takes
place while working with MySQL, then it may result to loss of data. Even if the
system faces any problem while working with MS SQL the data is not lost.
Security:
Both MySQL and MS SQL adopt ample security measures from the very beginning.
If a port becomes too vulnerable to use then the user is allowed to change it. The user
is required to update the software from time to time to protect them from unwanted
users and intruders.
⮚ Apache-Tomcat Server :
The Apache Tomcat® software is an open source implementation of the Java Servlet, JavaServer
Pages, Java Expression Language and Java WebSocket technologies. The Java Servlet, JavaServer
Pages, Java Expression Language and Java WebSocket specifications are developed under the Java
Community Process.
The Apache Tomcat software is developed in an open and participatory environment and released
under the Apache License version 2. The Apache Tomcat project is intended to be a collaboration of
the best-of-breed developers from around the world. We invite you to participate in this open
development project.
Apache Tomcat software powers numerous large-scale, mission-critical web applications across a
diverse range of industries and organizations. Some of these users and their stories are listed on
the PoweredBy wiki page.
Apache Tomcat, Tomcat, Apache, the Apache feather, and the Apache Tomcat project logo are
trademarks of the Apache Software Foundation.
⮚ PHP:
The life cycle model that has been followed for developing this project is the
Spiral Model.
Fig. 2.1.1
For making any project planning is the most essential thing. As with most any
development project, the first step is go through an initial planning stage to map
out the specification documents, establish software or hardware requirements, and
generally prepare for the upcoming stages of the cycle. In this project we also
work also work with the same strategy as above mentioned. For making
successfully planning we also visit the industry to understand the requirements
and according to that we make strategy of software and hardware requirements
and prepare for upcoming stage of project.
2.1.2.1 Milestones
The project team defines the milestones during project planning as a means to
identify key project activities and activity dependencies and to provide a way to
compare project performance to planned targets. Upon completion of a milestone,
a project manager receives customer sign-off. A project manager relies on the
milestone listing as a quick reference of project milestones, the target completion
dates and the particular team member who is responsible for the completion of
each milestone.
2 1.2.2 Deliverables
Pathak Devanshee
2.1.2.5 Dependencies
The structure chosen for the system is the chief programmer structure. In this system,
Chief Programmer team structure is used because in the organization, a senior engineer
provides the technical leadership and is designated as the chief programmer. For this
system reporting entity represents myself and the role of chief programmer is played
by my internal guide.
Risk management consists of a series of steps that help a software development team
to understood and manage uncertain problems that may arise during the course of
software development and can plague a software project.
Risks are the dangerous conditions or potential problems for the system which may
damage the system functionalities to very high level which would not be acceptable
at any cost. So in order to make our system stable and give its 100% performance we
must have identify those risks, analyze their occurrences and effects on our system
and must prevent them to occur.
o Database Corruptness
o Garbage Collection
o Network Problem
o Power Off
⮚ Avoid:
The best thing you can do with a risk is avoid it. If you can prevent it from
happening, it definitely won’t hurt your project. The easiest way to avoid this risk
is to walk away from the cliff, but that may not be an option on this project.
⮚ Mitigate:
If you can’t avoid the risk, you can mitigate it. This means taking some sort of
action that will cause it to do as little damage to your project as possible.
⮚ Transfer:
One effective way to deal with a risk is to pay someone else to accept it for you.
The most common way to do this is to buy insurance.
⮚ Accept:
When you can’t avoid, mitigate, or transfer a risk, then you have to accept it. But
even when you accept a risk, at least you’ve looked at the alternatives and you
know what will happen if it occurs. If you can’t avoid the risk, and there’s
nothing you can do to reduce its impact, then accepting it is your only choice.
After the risk has been identified and evaluated, the project team develops a risk
mitigation plan, which is a plan to reduce the impact of an unexpected event. The
⮚ Risk avoidance
⮚ Risk sharing
⮚ Risk transfer
It is a risk reduction method that shifts the risk from the project to another
party. The purchase of insurance on certain items is a risk transfer method.
The risk is transferred from the project to the insurance company. A
construction project in the Caribbean may purchase hurricane insurance that
would cover the cost of a hurricane damaging the construction site. The
purchase of insurance is usually in areas outside the control of the project
team. Weather, political unrest, and labor strikes are examples of events that
can significantly impact the project and that are outside the control of the
project team.
2.3 Estimation
2.3.1 Effort Estimation
Effort estimates may be used as input to project plans, iteration plans, budgets,
investment analyses, pricing processes and bidding rounds.
2.3.1 Effort Estimation
2.3.2 Cost Analysis
Estimates are made to discover the cost, to the developer, of producing a software
System. The cost estimation is usually dependent upon the size estimate of the
project, which may use lines of code or function points as metrics. Cost estimation
can be defined as the approximate judgement of the costs for a project. Cost
estimation will never be an exact science because there are too many variables
involved in the calculation for a cost estimate, such as human, technical,
environmental, and political. Furthermore, any process that involves a significant
human factor can never be exact because humans are far too complex to be entirely
predictable.
3.3 Constraints
3.3.1 Regulatory Policies:
Regulatory policy is about achieving government's objectives through the use of regulations,
laws, and other instruments to deliver better economic and social outcomes and thus enhance
the life of citizens and business. Regulatory policies, or mandates, limit the discretion of
individuals and agencies, or otherwise compel certain types of behavior. These policies are
generally thought to be best applied when good behavior can be easily defined and bad
behavior can be easily regulated and punished through fines or sanctions. An example of a
fairly successful public regulatory policy is that of a highway speed limit.
Effective communication is a critical project success factor. It also ensures that project
management should be done in using higher order language use by using such technical
words and terminology for such words and language should that much compatible that all
the user are able to understand it. Due to this requirement this is also look professional in
corporate world and also understand other foreign clients to understand it and effective
communication can continuously process.
Security:
As a developer of the system we are responsible for providing the system a higher level
of security as we all know that either it is a web application or any android application,
system must be given a great level of security so that system will be used long last.
User's information will be kept confidential and hence security was a great part to
concentrate for us. We have tried to secure the system from any unauthorized access by
providing different users a different user id as per his or her designation. If user is Admin
(Top Management), he/she will have all the access, privileges and constraints to use this
system. He / She can access the entire database details. He/she is able to modify or delete
any record or details from the database. Other users have limited access according to their
designation in the organization. Because of limited privileges these other users will not be
able to modify or delete other details or records of organization.
Chapter 4 : System Analysis
4.1 Study of Current System
First thing in the Analysis model is Study of Existing System, which is available. In
current education paper work is more and school have to maintain large data of the
whole school so how they maintain data, how they update data, how we efficiently
and fast retrieve data when we needed.
For developing a new system some requirements were provided by the user. As per the specified
requirements, it could be categorized in two different ways:
⮚ Functional Requirement
⮚ Nonfunctional Requirement
Functional requirement is provided by the system in which user first logs into the
system and is able to download and upload photos and videos of different yogasans
and perform it well. Also Diet plan is include with respect to their day to day life-
style.
Non-functional requirements cover all the remaining requirements which are not
covered by the functional requirements. They specify criteria that judge the operation
of a system, rather than specific behaviors.
● A brief description of the business to assess more possible factors which could
affect the study
● The part of the business being examined
● The human and economic factor
● The possible solutions to the problem
Operational feasibility is the measure of how well a proposed system solves the
problems, and takes advantage of the opportunities identified during scope definition and
how it satisfies the requirements identified in the requirements analysis phase of system
development.
The operational feasibility assessment focuses on the degree to which the proposed
development project fits in with the existing business environment and objectives with regard
to development schedule, delivery date, corporate culture and existing business processes.
To ensure success, desired operational outcomes must be imparted during design and
development. These include such design-dependent parameters as reliability, maintainability,
supportability, usability, reducibility, disposability, sustainability, affordability and others.
These parameters are required to be considered at the early stages of design if desired
operational behaviors are to be realized.
4.5 Requirements Validation
R1. System should react as per the type of the user logged in.
R2. System should be very user friendly.
R3. All the mandatory field validations and input validations should be done.
R4. Browser Compatibility.
4.6 Functions of System
Superimpose a logical structure upon the data on the basis of these relationships.
Single User:
2) An application that provides single interface from which a user can access
multiple applications. For example, a social networking application that
integrates multiple social platforms that can be used and accessed from a single
interface.
Multi Users:
Many DOS programs include some features of GUIs, such as menus, but are not
graphics based. Such interfaces are sometimes called graphical character-based
user interfaces to distinguish them from true GUIs.
Pointer: A symbol that appears on the display screen and that you move to
select objects and commands. Usually, the pointer appears as a small angled
arrow. Text -processing applications, however, use an I-beam pointer that is
shaped like a capital I.
Desktop: The area on the display screen where icons are grouped is often
referred to as the desktop because the icons are intended to represent real objects
on a real desktop.
Windows: You can divide the screen into different areas. In each window, you
can run a different program or display a different file. You can move windows
around the display screen, and change their shape and size at will.
Menus: Most graphical user interfaces let you execute commands by selecting a
choice from a menu.
NON GUI:
Non-graphic user interface is a system that allows the user to communicate with
the machine without using any graphic.
4) Expert Module: This module provides online chat between experts and user.
5) Wishlist Module: This module is used to add the videos whichever user wishes
to watch later.
6) Registration Module: This module is for to register the new account for user.
⮚ Software Maintenance
⮚ Task Automation
⮚ Language Factors
⮚ Common Conventions
Chapter 7 : Testing
Various parameters like implementation environment, program modules and coding
standards are explained in previous chapter while this chapter is aimed to provide brief
account of testing the software.
The testing ensures that the software is according to the required specification standards
and performs the task meant for it. The testing is done by our in house employee that act
as novice user and test the application with all possible way to find the bugs and error as
well as check validation.
⮚ Design
⮚ Implementation
⮚ Coding
The design errors are to be rectified at the initial stage. Such errors are very difficult to
repair after the execution of software.
The errors occurred at this stage can’t be overlooked because such errors do not allow
the further process.
A strategy for software testing integrates software test case design method into a well-
planned series of steps that result in the successful construction of the software.
The strategy provides the roadmap that describes the steps to be conducted as a part of
testing, then these steps are planned and then undertaken, and how much effort, time and
resource will be required.
The unit testing is meant for testing smallest unit of software. There are two approaches
namely bottom-up and top-down. In bottom up approach the last module is tested and
then moving towards the first module while top down approach reverses the action. In
present work we opt for the first one.
The integration testing is meant to test all the modules simultaneously because it is
possible that all the modules may function correctly when tested individually. But they
may not work altogether and may lead to unexpected outcome.
The database of the system has to be stored on the hard disk. So the storage capacity of
the hard disk should be enough to store all the data required for the efficient running of
the system
7.4 Test Cases
Purpose Registration.
Required Input Valid User name password and
confirm password …
Test Action Checking For all valid information.
Error Error! Invalid username or password or
you are
not verified.
Expected Output Error! Invalid username or password or
you are not verified.
Chapter 8 : Limitation and Future Enhancement
8.1 Limitations
In this system user is not allowed to create his own templates and upload it as
per his design thinking. He has to use the templates provided by the system itself.
Chapter 9 : Conclusion
⮚ Cost: A project is not typically considered viable if its value exceeds its costs.
Sometimes the cost viability of a project can change over the course of the project’s
development or implementation. For example, if you have a particular amount of
money designated for a project, and it appears actual costs will exceed the budget,
the project is likely to lose its viability. Many factors can impact costs, such as an
increase in the cost of supplies or materials or the scope of the project.
⮚ Time: A project that is not on track from a deadline perspective can lose its
viability. For example, if you have a project to design and print invitations for a
grand opening event, if time delays result in the invitations going to print the day
before the event, the project loses its viability. Invitations issued after an event has
taken place are worthless, and continuing to pursue their production wastes time and
money. Likewise, delays that result in additional fees -- such as rushed late printing
fees -- may also render a project non-viable.
⮚ Manpower: Losing key members of your staff can cause a project to lose its
viability. For example, if you have a graphic designer on staff who is developing your
new logo, and that person quits without notice, the project may lose its viability,
because the manpower anticipated for the role no longer exists. The project has the
potential to regain its viability if someone else can take over the task or it can be
effectively outsourced to another party.
⮚ Quality: If the quality of a project is not attainable as anticipated, it can lose its
viability. For example, if you own a small construction business and provide an
estimate for building a custom home, that estimate is based largely on the current
price of home-building materials. If the price goes up suddenly or the same quality of
materials is no longer available, the project, as planned, loses its viability. It can
regain its viability if materials of equal quality and similar price can be obtained.
References
http://www.tutorials.com/
http://www.w3schools.com/
http://www.php.net/
http://www.apachefriends.org/