Professional Documents
Culture Documents
MotoReview Report Kripal
MotoReview Report Kripal
MotoReview Report Kripal
A
Major Project Report
ON
Dipesh Sharma
16BCAN076
Divesh Sharma
16BCAN077
Candidate’s Declaration
I hereby declare that the project work, which is being presented in the Project Report, entitled
“MotoReview” in partial fulfillment for the award of Degree of “Bachelor of Computer Application”
I have not submitted the matter presented in this Project Report anywhere for the award of any other
Degree.
Signature
Name of Supervisor/Guide
Mr. Siddharth Mukherji
Countersigned By:
HoD-IT & CA
3
INDEX
ABSTRACT
1. INTRODUCTION
2. FEASIBILITY STUDY OF THE PROJECT
3. SYSTEM SPECIFICATION
3.1 HARDWARE SPECIFICATION
3.2 SOFTWARE SPECIFICATION
4. SOFTWARE FEATURES
4.1 NetBeans IDE 8.2 (Smarter way to code)
4.2 FEATURES OF FXML :
4.2.1 Features of FXML :
4.3 Scene Builder :
5. SYSTEM DESIGN AND DEVELOPMENT
5.1 FILE DESIGN :
5.2 Relational File Database :
5.3 INPUT DESIGN
5.4 OUTPUT DESIGN
5.5 DATABASE DESIGN
5.5.1 Objectives of Database design
5.6 DATAFLOW DIAGRAM
5.6.1 Diagrammatic view for Login Interface
5.6.2 Flow view for further process
5.6.3 Modification view :
6. Analysis
7. SYSTEM TESTING AND IMPLEMENTATION
7.1 SYSTEM TESTING
4
ABSTRACT
In today’s world Computer System is one of the integral part of out life. Computers have
made the life and lifestyle of corporate world to common man ease to a great extend.
The use of software in corporate world has made the functioning of the organization
smooth and efficient. Due to this the industry is able to keep the track of its progress
and maintain the records. These records can be easily accessed and thus help the
organization to know it’s functioning & track the success & failures of the processes.
This helps the organization to grow. Business software applications come with the
capability of automating several processes which are otherwise complex and time
consuming to be done manually. These applications save a lot of time and money by
accomplishing different tasks in minutes. Otherwise, businesses need to hire employees
to do those tasks. Choosing the right business software can help the company grow by
leaps and bounds. Small Business software application can perform word processing,
payroll, inventory control and accounting functions and a lot more. The software is
basically responsible for managing the tasks of the entire organization.
Use of the software is important for automation of the organization’s tasks as well as
reporting the progress or lags in the organization’s activities. This improves company’s
efficiency and effectiveness of the company’s activities. The software reduces the
workload and automation of activities. It also assists in elimination of human errors, as a
result, improves effectiveness and consistency. There are various types of business
software commonly used by companies. Software is responsible for accomplishing
different tasks. One of the most important business software for any organization is the
payroll system. This software is important for managing payments within the
organization for employees and contractors. This is able to calculate the payment and
tax deductions for each and every employee in the organization. Business Software
Solutions provides business productivity that is available in different types and modules.
The most important and motivating factors for using the Business Software are
increasing the productivity and profits.
7
1.INTRODUCTION
In today’s world Computer System is one of the integral part of out life. Computers have
made the life and lifestyle of corporate world to common man ease to a great extend.
The use of software in corporate world has made the functioning of the organization
smooth and efficient. Due to this the industry is able to keep the track of its progress
and maintain the records. These records can be easily accessed and thus help the
organization to know it’s functioning & track the success & failures of the processes.
This helps the organization to grow.
The proposed project is developed to manage the automobile in the automobile dealer
company. The main module in this project is login, automobile management, customer
management, sales, complaints and reports. The first module is the login. The
automobile showroom owner should login to the project for usage. The username and
password are verified and if it is correct, next form opens. If the username and
password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be
taken to a page that shows the details of the automobile including automobile name,
automobile ID, quantity, price etc. “Automobile Management System” is useful for
maintaining automobiles, accurate vehicle information for customers effectively and
hence helps for establishing good relation between customer and automobile
organization. It contains various customized modules for effectively maintaining
automobiles information accurately and safely.
New user can register in order to use the full features of this system. Normal users can
also access the proposed system but with limited features. Only the registered users
can get more priorities than the unregistered guest user. Once the guest users register
to this system, they can also get full access to this system.
8
So in this way our Automobile vehicle manager will work with full efficiency and
accuracy also it contains various customized modules for effectively maintaining
automobiles information accurately and safely.
2. FEASIBILITY STUDY OF THE PROJECT
To make this software more handy and feasible to the user we have divided it into few
different different modules and they are as follows :
Login module
Registration module
User module
Automobile module
Cars company module
Bikes company module
Support module
Car specific module
Bike specific module
Login module :
It is used for logging in the automobile details manager. It is used for verifying the user.
Once the user is authenticated, they can access the system.
Registration module :
New user can register in order to use the full features of this system. Normal users can
also access the proposed system but with limited features. Only the registered users
can get more priorities than the unregistered guest user. Once the guest users register
to this system, they can also get full access to this system.
User module :
It is used for adding new user and for updating existing customers. It is used for storing
new user as well as for updating the customer’s details. The module is very useful to
find the number of user who registered.
Automobile module :
9
It is used for adding new automobiles and for viewing, editing and deleting existing
automobiles. It is used for searching items in this system. Here the admin have the
privileges to search items in this system. Automobile details are stored with their brand
name. When a particular brand is being liked by people, that particular brand will be
purchased and kept in stock with large quantity.
In this module of project we are keeping records of new car companies and if any new
company comes into the market than we have a option to add that new company into
the car company database.
In this module of project we are keeping records of new bikes companies and if any new
company comes into the market than we have a option to add that new company into
the bike company database.
Support module :
In this module of our project we placed a very important feature i.e. feedback and issue
complain. At runtime if any problem occurred to user than they may direct contact to us
and write us their problem in a very elaborative way.
3. SYSTEM SPECIFICATION
10
RAM : 32MB
Hard Disk : 5 GB
Monitor : 16 LG
Support : FXML
4. SOFTWARE FEATURES :
11
NetBeans IDE gives you skeleton applications in the form of project templates for all
the technologies it supports. In addition, it provides a set of sample applications, some
of which can be recreated step by step by following a related tutorial available on
NetBeans.org.
The IDE provides project templates and sample projects that help you create Java SE
applications, Java EE applications, Java ME applications, HTML5 applications,
NetBeans Platform applications, PHP application, and C/C++ applications.
FXML is popular because it focuses on data rather than data presentation. The
other markup language such as HTML is used for data presentation.
12
This separates the data and its presentation part and gives us the freedom to
present the data, the way we want, once we receive it using FXML.
Two or more systems can receive the same data from a same FXML and present
it in a different way using other markup language such as HTML.
CSS support
13
A flat file database is a database designed around a single table. The flat file design
puts all database information in one table, or list, with fields to represent all parameters.
A flat file may contain many fields, often, with duplicate data that are prone to data
corruption. If data between two flat files have to be merged, it is needed to copy and
PSMte relevant information from one file to the other. There is no automation between
flat files.
If two or more flat files that contain client addresses, it is required to manually modify
the address parameters in each file that contains that client’s information. Changing
information in one file has no bearing on other files. Flat files offer the functionality to
store information, manipulate fields, print or display formatted information and exchange
information with others, through email and over the Internet. Some flat files may be
attached to external files, such as text editors, to extend functionality and manage
related information.
A relational database, on the other hand, incorporates multiple tables with methods for
the tables to work together. The relationships between table data can be collated,
merged and displayed in database forms. Most relational databases offer functionality to
share data:
Across networks
Over the Internet
With laptops and other electronic devices, such as palm pilots
With other software systems
Designing flat file databases is simple and requires little design knowledge. Flat files
can be developed using just about any database engine. Flat files can be created in
relational database engines by not taking advantage of relational design concepts.
14
Designing a relational database takes more planning than flat file databases. With flat
files, it is possible to add information, as you deem necessary.
With relational databases, it is required to be careful to store data in tables such that the
relationships make sense. Building a relational database is dependent upon the ability
to establish a relational model. The model must fully describe how the data is
organized, in terms of data structure, integrity, querying, manipulation and storage.
Relational databases allow defining certain record fields, as keys or indexes, to perform
search queries, join table records and establish integrity constraints.
Search queries are faster and more accurate when based on indexed values. Table
records can be easily joined by the indexed values. Integrity constraints can be
established to ensure that table relationships are valid. If the project is able to establish
a one-to-many relationship in the data tables, relational database should be used
because a flat file is not sufficient to handle the data processing needs. Relational
databases offer more robust reporting with report generators that filter and display
selected fields.
Relational databases offer the capability to building own reporting modules. Most
relational databases also offer the capability to import and export data from other
software. There are three primary relational database systems, proprietary, open source
and embedded. Proprietary relational databases require the use of proprietary
development languages, often times, to complement SQL. Microsoft Access, for
example, combines Visual Basic with SQL. Open source databases, such as MySQL,
are distributed freely to encourage user development.
Embedded, relational databases are packaged as part of other software packages, such
as with tax-preparation software packages. The vendor supplies the database, and all
manipulation tools, to control the database structure. These databases are, often times,
accompanied with tools to provide audit trails of transactions. The vendor supplies the
database, and all manipulation tools, to control the database structure.
15
Each row in a table has its own unique key. Rows in a table can be linked to rows in
other tables by adding a column for the unique key of the linked row (such columns are
known as foreign keys). Codd showed that data relationships of arbitrary complexity can
be represented by a simple set of concepts.
Part of this processing involves consistently being able to select or modify one and only
one row in a table. Therefore, most physical implementations have a unique primary
key (PK) for each row in a table. When a new row is written to the table, a new unique
value for the primary key is generated; this is the key that the system uses primarily for
accessing the table. System performance is optimized for PKs. Other, more natural
keys may also be identified and defined as alternate keys (AK). Often several columns
are needed to form an AK (this is one reason why a single integer column is usually
made the PK). Both PKs and AKs have the ability to uniquely identify a row within a
table. Additional technology may be applied to ensure a unique ID across the world,
a globally unique identifier, when there are broader system requirements.
The primary keys within a database are used to define the relationships among the
tables. When a PK migrates to another table, it becomes a foreign key in the other
table. When each cell can contain only one value and the PK migrates into a regular
entity table, this design pattern can represent either a one-to-one or one-to-
many relationship. Most relational database designs resolve many-to-
many relationships by creating an additional table that contains the PKs from both of the
other entity tables—the relationship becomes an entity; the resolution table is then
named appropriately and the two FKs are combined to form a PK. The migration of PKs
to other tables is the second major reason why system-assigned integers are used
normally as PKs; there is usually neither efficiency nor clarity in migrating a bunch of
other types of columns.
When a PK migrates to another table, it becomes a foreign key in the other table. When
each cell can contain only one value and the PK migrates into a regular entity table, this
design pattern can represent either a one-to-one or one-to-many relationship.
16
Input is any data or instructions entered into the memory of a computer. Two types of
input are data and instructions. Data is a collection of unorganized items that can
include words, numbers, pictures, sounds, and video. A computer processes data into
information, which is organized, meaningful, and useful. Instructions can be in the form
of programs, commands, or user responses.
A program is a series of instructions that tells a computer how to perform the tasks
necessary to process data into information. A command is an instruction given to a
computer program. A user response is an instruction you issue to the computer by
responding to a question posed by a computer program. Any hardware component that
allows entering data, programs, commands, and user responses into a computer is an
input device. Inputs of Automobile Management System are eid, ename, qualification,
automobileid, brand, cusid, cusname and salary.
Output design involves specifying how production of on-screen reports and paper based
reports will occur. Output may occur to database or file for storing information entered or
also for use by other systems. Output is data that has been processed into a useful form
called information. Four types of output are text, graphics, audio, and video. Text
consists of characters (letters, numbers, punctuation marks, or any other symbol
requiring one byte of computer storage space) that are used to create words,
sentences, and paragraphs.
Ease of use
Control of data integrity
Control of redundancy
Control of security
Data independence (logical & physical)
Data storage protection
System performance
System functions
System compatibility
In a majority of cases, a person who is doing the design of a database is a person with
expertise in the area of database design, rather than expertise in the domain from which
the data to be stored is drawn e.g. financial information, biological information etc.
Therefore, the data to be stored in the database must be determined in cooperation with
a person who does have expertise in that domain, and who is aware of what data must
be stored within the system.
18
This process is one which is generally considered part of requirements analysis, and
requires skill on the part of the database designer to elicit the needed information from
those with the domain knowledge. This is because those with the necessary domain
knowledge frequently cannot express clearly what their system requirements for the
database are as they are unaccustomed to thinking in terms of the discrete data
elements which must be stored. Data to be stored can be determined by Requirement
Specification.
Once a database designer is aware of the data which is to be stored within the
database, they must then determine where dependency is within the data. Sometimes
when data is changed you can be changing other data that is not visible. For example,
in a list of names and addresses, assuming a situation where multiple people can have
the same address, but one person cannot have more than one address, the address is
dependent upon the name. When provided a name and the list the address can be
uniquely determined; however, the inverse does not hold - when given an address and
the list, a name cannot be uniquely determined because multiple people can reside at
an address. Because an address is determined by a name, an address is considered
dependent on a name.
Once the relationships and dependencies amongst the various pieces of information
have been determined, it is possible to arrange the data into a logical structure which
can then be mapped into the storage objects supported by the database management
system. In the case of relational databases the storage objects are tables which store
data in rows and columns. In an Object database the storage objects correspond
directly to the objects used by the Object-oriented programming language used to write
the applications that will manage and access the data. The relationships may be defined
as attributes of the object classes involved or as methods that operate on the object
classes.
The way this mapping is generally performed is such that each set of related data which
depends upon a single object, whether real or abstract, is placed in a table.
Relationships between these dependent objects is then stored as links between the
various objects.
19
In a majority of cases, a person who is doing the design of a database is a person with
expertise in the area of database design, rather than expertise in the domain from which
the data to be stored is drawn e.g. financial information, biological information etc.
Therefore, the data to be stored in the database must be determined in cooperation with
a person who does have expertise in that domain, and who is aware of what data must
be stored within the system.
the relationships and dependencies amongst the various pieces of information have
been determined, it is possible to arrange the data into a logical structure which can
then be mapped into the storage objects supported by the database management
system. In the case of relational databases the storage objects are tables which store
data in rows and columns. In an Object database the storage objects correspond
directly to the objects used by the Object-oriented programming language used to write
the applications that will manage and access the data.
A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the
processes that change data throughout a system. It’s a structured analysis and design
tool that can be used for flowcharting in place of or in association with information.
Oriented and process oriented system flowcharts. Four basic symbols are used to
20
construct data flow diagrams. They are symbols that represent data source, data flows,
and data transformations and data storage. The points at which data are transformed
are represented by enclosed figures, usually circles, which are called nodes.
For achieving the abovementioned criteria’s we have to make use of various features
that are available with the RDBMS by enforcing integrity constrains, it is possible to
ensure data integrity and reduce data inconsistency to a great extent.
- Data Flow
- Process
- Storage
When analysts prepare the Data Flow Diagram, they specify the user needs at a level of
detail that virtually determines the information flow into and out of the system and the
required data resources.
21
The network is constructed by using a set of symbols that do not imply physical
implementations. The Data Flow Diagram reviews the current physical system, prepares
input and output specification, and specifies the implementation plan.
Process should be named and numbered for easy reference. Each name
should be representative of the process.
The destination of flow is from top to bottom and from left to right.
When a process is exploded in to lower level details they are numbered.
The names of data stores, sources and destinations are written in capital
letters.
Moto Review
Login panel with
Many check
Point.
22
Oracle
database
Validate
username and
Password.
If values are
If values are
invalid than
valid than you
you will get an
will redirect to
error message.
home interface
Procee
d
Flow view for further process :
Successfu
l -
ly
Login
23
Bike company
Car company Specific
Specific Details
Details representing
representing in a table
in a table
After After
proceeding you proceeding you
will get car will get bike
specific specific
interface. interface.
Ex : Ex : Passion Pro
Lamborgirni
Specifications
Modification view :
Specifications
24
Modification
Modifications s
Made according Made
to requirements according to
For cars. requirements
For bikes.
Oracle database
constraints
check
Point.
If invalid
If valid than
than shows error
Data interface.
modified.
6. DATABASE TABLES
Username. Password
26
The common view of testing held by users is that it is performed to prove that there are
no errors in a program. It is extremely difficult since designer cannot prove to be one
hundred percent accurate. Therefore, the most useful and practical approach is with the
understanding that testing is the process of executing a program with explicit intention
of finding errors that make the program fail.
Testing has its own cycle. The testing process begins with the product requirements
phase and from there parallels the entire development process. In other words, for each
phase of the development process there is an important testing activity. It is extremely
difficult since designer cannot prove to be one hundred percent accurate. Therefore, the
most useful and practical approach is with the understanding that testing.
Planning
Project and process control
Risk management
Inspections
Measurement tools
Organization and professionalism
Before going for testing, first we have to decide upon the type of testing to be carried
out. The following factors are taken into consideration:
It is a software testing approach in which the tester doesn’t know the internal working of
the item being tested. For example in a Black box test, on software design the tester
only knows the input and the expected outputs. Tester doesn’t know how the program
derives the output. Tester doesn’t even imagine as to how, the coding is done. Tester
need to know only the specifications.
The test is unbiased because the designer and the tester is independent of
each other
The tester needs no specific knowledge on any programming language
The test is done from the point of view of the user, not the designer.
The test can be designed as soon as the specifications are complete
The test can be redundant if the software designer has already run a test
case.
The test can be difficult to design
Testing every possible input stream is unrealistic.
Unit or module testing is the process of testing the individual components (subprograms
or procedures) of a program. The purpose is to discover discrepancies between the
modules interface specification and its actual behavior. In our system each module must
be tested independently for validation.
interfaces between the components. In our system each of the modules mentioned
above, are tested for checking the integration between them, after each of them are
tested individually.
As the number of possible tests for even simple software components is practically
infinite, all software testing uses some strategy to select tests that are feasible for the
available time and resources. As a result, software testing typically (but not exclusively)
attempts to execute a program or application with the intent of finding software
bugs (errors or other defects). The job of testing is an iterative process as when one
bug is fixed, it can illuminate other, deeper bugs, or can even create new ones.
Software testing can provide objective, independent information about the quality of
software and risk of its failure to users or sponsors.
30
8. System Maintenance
All system is dynamic and subjects to constantly changing requirements. Effort must be
devoted to adapting them and design must be flexible specified so that such changes
can be easily implemented. It activity is called system maintains. It includes
improvement of system functions and correction of errors. Back up of the entire
database files are taken and stored in secondary storage devices like magnetic tapes
and disks so that it is possible to restore the system at the earliest. If there is a break
31
down or collapse, then the system giver provision to restore database files, storing data
in a separate secondary device leads to an effective and efficient maintains of the
system.
The master file has flags for maintains after for maintains. After the mentioned period,
the rejection suppliers, unused data in the files will be deleted in the master file. It
method is the increasing the memory to store the data. Software maintenance is a set of
software engineering activities that occur after software has been delivered for the
customer and put into operation. The success of the software and the project relies on
the maintenance procedure adopted. As with the venture of human, not a single one is
perfect. The further modifications are left to the followers. It is because the opinion or
vision or a thing differs from individual to individual. The maintenance is performed at
regular intervals to keep the project safe and reliable.
These changes have to be designed by the user before the change can be carried out.
Since requirement change request involves cost, user will be cautious while requesting
the software changes. The software will require continued support. The system
maintenance means the maintenance activities after and during the system
32
Maintenance phase identifies if there are any changes required in the current system. If
the changes are identified, then an analysis is made to identify if the changes are really
required. Cost benefit analysis is away to find out if the change is really essential.
System Analysis
The term system is derived from the Greek word ‘systema’, which means of organized
relationship among functioning units of components. And the study of system concepts
has three basic implications:
Preliminary Analysis
Analysis is the detailed study of the various operations performed by a system and their
relationships within and outside the system. For the efficient and effective utilization of
the available resources, timing availability of accurate information is very important.
Information is the back bone of any organization. There for, it has to be made available
all time to ensure proper decision-making.
Information also has to be accurate, current, timely, relevant and usable. In other words,
an effective information system should be able to provide information to those in need of
it, at the time they need of it, at the time they need it and in the way they need it. The
need for managing data and retrieving information efficiently, lead to an extensive use of
computers in the business world.
33
unique to the object are not exposed to other objects. This reduces a source of many
common errors in computer programming.
The software life cycle is typically divided up into stages going from abstract
descriptions of the problem to designs then to code and testing and finally to
deployment. The earliest stages of this process are analysis and design. The distinction
between analysis and design is often described as "what vs. how". In analysis
developers work with users and domain experts to define what the system is supposed
to do. Implementation details are supposed to be mostly or totally (depending on the
particular method) ignored at this phase. The goal of the analysis phase is to create a
functional model of the system regardless of constraints such as appropriate
technology. In object-oriented analysis this is typically done via use cases and abstract
definitions of the most important objects. The subsequent design phase refines the
analysis model and makes the needed technology and other implementation choices. In
object-oriented design the emphasis is on describing the various objects, their data,
behavior, and interactions. The design model should have all the details required so that
programmers can implement the design in code.
Security is a critical stage in system development. Even candidate system must provide
built-in features for security and integrity of data. Without safe guards against
unauthorized access, fraud, embezzlement, fire and natural disaster, a system could be
so vulnerable as to threaten the survival of the organizations.
To do an adequate job on security, the risk, exposure, cost and specific measures such
as password should be analyzed to provide protection. In addition, back up of copies of
software and recovery restart procedures must be available when needed.
The amount of protection depends on the sensitivity of data, the reliability of the user
and the complexity of the system. The motive behind security is to keep the
35
organization running, protect data as an asset and seek management support for more
installations.
After system security risk has been evaluated, the next step is to select security
measures. The measures are
Identification
Access Control
Audit Control
System Integrity
8.3.1 Identification
It is the scheme of identifying person to the system based on “Something you know”
such as a password or a picture badge, “Something you are” such as finger print or
voice print or “Something you have” such as credit card, key or special terminal. The
line of different safeguards the functioning of hardware, software and physical security
and operating procedure. Proper back of hardware and software are extremely
important.
Controlling the access to the computer facility is secured through encoded cards or
similar devices. Encryption prevents intruders from accessing data by scrambling
messages across telephones to the destination.
36
Auditing must be supported at all levels of management. Audit control protects a system
from external security breaches and internal fraud or embezzlement. Various software
programs are available to help in audit function.
The line of different safeguards the functioning of hardware, software and physical
security and operating procedure. Proper back of hardware and software are extremely
important.
9. SYSTEM IMPLEMENTATION
System implementation is the important stage of project when the theoretical design is
tunes into practical system. The main stages in the implementation are as follows:
Planning
Training
System testing and
Changeover planning
37
9.1 Planning :
Planning is the first task in the system implementation. Planning is deciding on the
method and the time scale to be adapted. At the time of implementation of any system
people from different departments and system analysis involve. They are confirmed to
practical problem of controlling various activities of people outside their own data
processing departments. The line manager controlled through an implementation co-
ordinate committee. The committee consists of ideas, Problems and complaints of user
department. It must also consider the implementation of system environment.The line
manager controlled through an implementation co-ordinate committee. They are
confirmed to practical problem of controlling various activities of people outside.
9.2 Training
The personnel in the system must know in detail what their roles will be, how they can
use the system, and what the system will or will not do. The success or failure of
welldesigned and technically elegant systems can depend on the way they are
operated and used.
Systems operators must be trained properly such that they can handle all possible
operations, both routine and extraordinary. The operators should be trained in what
common malfunctions may occur, how to recognize them, and what steps to take when
they come.
Training also involves familiarization with run procedures, which involves working
through the sequence of activities needed to use a new system.
System testing is an essential step for the development of a reliable and error-
freesystem. Once source code has been generated, software must be tested to uncover
andcorrect as many errors as possible before delivery to your customer. Your
goal is todesign a series of test cases that have a high likelihood finding
errors but how, thereare different methods that provides a systematic guidance for
designing tests that,Exercise the internal logic of software components,
andE x e r c i s e t h e i n p u t a n d
o u t p u t d o m a i n s o f t h e p r o g r a m t o u n c o v e r e r r o r s i n t h e program
function, behaviour, and performance
Clean-up
Clean-up product, materials and components from the line. It may range from minor, if
only the label of a package is being changed (for example from an English to
a Spanish label) to major, requiring complete disassembly of the equipment, cleaning
and sterilizing of the line components in the case of an injectable pharmaceutical
product.
Set-up
Set-up is the process of actually converting the equipment. This may be achieved by
adjusting the equipment to correspond to the next product or by changing non-
adjustable "change parts" to accommodate the product. Typically it will be a combination
of both.
Start-up
Start-up is the time spent fine tuning the equipment after it has been restarted. It is
characterized by frequent stoppages, jams, quality rejects and other problems. It is
generally caused by variability in the clean-up and set-up or by variability in the product
or its components.
10. CONCLUSION
The system is completely menu driven and extremely user friendly since it is developed
in an efficient front end tools and FXML. Appropriate error messages are also provided
too guide the user in a proper and user friendly manner.
The software “MOTO REVIEW” has been developed in windows 2010 environment
using FXML+CSS as front end and ORACLE as back end. Time consumptions reduced
to a great extent and user as less complexity in handling it database.
The project is fully fledged and user friendly, End users will be lightened in using it
software because it is easy to have bills and reports and mostly all contents to be
40
entered are to selected from combo box. It reduces the calculating efforts to be carried
out by the user.
Further expansion of the system also can be done in future if needed. The application
can be enhanced in the future with the needs of the organization. The database and the
information can be updated to the latest forthcoming versions.
There are also possibilities for enhancing and further developing the project with
customized reports according to the latest information and needs of the company. Thus
the system can be altered in accordance with the future requirements and
advancements. System performance evaluation must be monitored not only to
41
determine whether or not they perform as plan but also to determine if they should have
to meet changes in the information needed for the company.
The performance of the system will be evaluated to determine whether system achieves
the results that are expected and whether the predicted benefits of the system are
realized.
12. BIBLIOGRAPHY :
www.stackoverflow.com
www.flaticon.com
www.materialui.co
42
www.youtube.com/durgasoft
www.github.com
PIC : 1
PIC : 2
PIC : 3
PIC : 4
PIC : 5
PIC : 6
PIC : 7
PIC : 8
PIC : 9
Pic : 10
14. CODING
<?import com.jfoenix.controls.JFXButton?>
<?import com.jfoenix.controls.JFXPasswordField?>
<?import com.jfoenix.controls.JFXTextField?>
<?import javafx.scene.control.Label?>
<?import javafx.scene.image.Image?>
<?import javafx.scene.image.ImageView?>
<?import javafx.scene.layout.AnchorPane?>
<?import javafx.scene.shape.Line?>
<?import javafx.scene.text.Font?>
<?import com.jfoenix.controls.JFXButton?>
<?import java.net.URL?>
<?import javafx.scene.control.Label?>
<?import javafx.scene.effect.BoxBlur?>
<?import javafx.scene.image.Image?>
<?import javafx.scene.image.ImageView?>
<?import javafx.scene.layout.AnchorPane?>
<?import javafx.scene.layout.Pane?>
<?import javafx.scene.shape.Line?>
<?import javafx.scene.text.Font?>
<font>
<Font name="System Bold" size="12.0" />
</font>
</Label>
<Label fx:id="imptlbl" layoutX="8.0" layoutY="225.0" prefHeight="20.0"
prefWidth="136.0" text="important information" textFill="#b5a2a2">
<font>
<Font name="System Bold" size="12.0" />
</font>
</Label>
<Label fx:id="oflabel" layoutX="6.0" layoutY="243.0" prefHeight="20.0"
prefWidth="136.0" text="of latest cars and Bikes." textFill="#b5a2a2">
<font>
<Font name="System Bold" size="12.0" />
</font>
</Label>
<Label fx:id="dashLabel" layoutX="12.0" layoutY="270.0" prefHeight="47.0"
prefWidth="136.0" text=" Dashboard" textFill="#d7cdcd">
<font>
<Font name="System Bold" size="22.0" />
</font>
</Label>
<Line fx:id="line" endX="34.0" layoutX="51.0" layoutY="128.0" startX="-54.5"
stroke="#fcfcfc" />
<JFXButton fx:id="homeBtn" layoutX="9.0" layoutY="337.0" onAction="#onHomeClick"
prefHeight="34.0" prefWidth="123.0" text="Home" textFill="#a48989">
<font>
<Font size="14.0" />
</font>
</JFXButton>
58
</AnchorPane>
<?import com.jfoenix.controls.JFXButton?>
<?import com.jfoenix.controls.JFXTextField?>
<?import java.net.URL?>
<?import javafx.geometry.Insets?>
<?import javafx.scene.control.Label?>
<?import javafx.scene.control.Separator?>
<?import javafx.scene.control.TableColumn?>
<?import javafx.scene.control.TableView?>
<?import javafx.scene.image.Image?>
<?import javafx.scene.image.ImageView?>
<?import javafx.scene.layout.AnchorPane?>
<?import javafx.scene.layout.HBox?>
<?import javafx.scene.layout.Pane?>
<?import javafx.scene.shape.Line?>
<?import javafx.scene.text.Font?>
</font>
</JFXButton>
<JFXButton fx:id="detailsBtn1" layoutX="660.0" layoutY="465.0"
onAction="#onDetailsClick" prefHeight="27.0" prefWidth="79.0" style="-fx-background-
color: #2196f3;" text="Details" textFill="WHITE">
<font>
<Font name="System Bold" size="12.0" />
</font>
</JFXButton>
</children>
</AnchorPane>
<?import com.jfoenix.controls.JFXButton?>
<?import com.jfoenix.controls.JFXPasswordField?>
<?import com.jfoenix.controls.JFXRadioButton?>
<?import com.jfoenix.controls.JFXTextField?>
<?import java.net.URL?>
<?import javafx.scene.control.Label?>
<?import javafx.scene.control.ToggleGroup?>
<?import javafx.scene.image.Image?>
<?import javafx.scene.image.ImageView?>
<?import javafx.scene.layout.AnchorPane?>
<?import javafx.scene.text.Font?>
xmlns="http://javafx.com/javafx/8.0.171" xmlns:fx="http://javafx.com/fxml/1"
fx:controller="RegisterController">
<stylesheets>
<URL value="@register.css" />
</stylesheets>
<children>
<JFXTextField id="txtField" fx:id="emailIdTxtField" focusColor="WHITE"
labelFloat="true" layoutX="73.0" layoutY="181.0" prefHeight="39.0" prefWidth="288.0"
promptText="EmailId" stylesheets="@register.css" unFocusColor="#9a8a8a"
AnchorPane.bottomAnchor="342.0" AnchorPane.leftAnchor="73.0"
AnchorPane.rightAnchor="65.0" AnchorPane.topAnchor="181.0" />
<JFXRadioButton fx:id="maleRadio" layoutX="56.0" layoutY="275.0" selected="true"
text="Male" textFill="#b9a9a9" AnchorPane.bottomAnchor="223.0"
AnchorPane.leftAnchor="56.0" AnchorPane.rightAnchor="291.0"
AnchorPane.topAnchor="275.0">
<toggleGroup>
<ToggleGroup fx:id="gender" />
</toggleGroup>
</JFXRadioButton>
<JFXRadioButton fx:id="femaleRadio" layoutX="141.0" layoutY="275.0" text="Female"
textFill="#a19191" toggleGroup="$gender" AnchorPane.bottomAnchor="223.0"
AnchorPane.leftAnchor="141.0" AnchorPane.rightAnchor="206.0"
AnchorPane.topAnchor="275.0">
<font>
<Font name="System Bold" size="12.0" />
</font>
</JFXRadioButton>
<JFXTextField id="txtField" fx:id="cityTxtField" focusColor="WHITE" labelFloat="true"
layoutX="74.0" layoutY="335.0" prefHeight="27.0" prefWidth="275.0"
promptText="Enter your city" stylesheets="@register.css" unFocusColor="#978585"
69
AnchorPane.bottomAnchor="186.0" AnchorPane.leftAnchor="74.0"
AnchorPane.rightAnchor="77.0" AnchorPane.topAnchor="335.0" />
<JFXButton fx:id="signUpBtn" layoutX="135.0" layoutY="451.0"
onAction="#onSignUpClick" prefHeight="39.0" prefWidth="134.0" style="-fx-
background-color: #2196f3;" text="Sign Up" textFill="WHITE"
AnchorPane.bottomAnchor="58.0" AnchorPane.leftAnchor="135.0"
AnchorPane.rightAnchor="157.083984375" AnchorPane.topAnchor="451.0" />
<JFXPasswordField id="txtField" fx:id="pwdTextField" focusColor="WHITE"
labelFloat="true" layoutX="72.0" layoutY="225.0" prefHeight="39.0" prefWidth="288.0"
promptText="Enter Password" stylesheets="@register.css" unFocusColor="#908686"
AnchorPane.bottomAnchor="298.0" AnchorPane.leftAnchor="72.0"
AnchorPane.rightAnchor="66.0" AnchorPane.topAnchor="225.0" />
<JFXTextField id="txtField" fx:id="mobTextField" focusColor="WHITE" labelFloat="true"
layoutX="71.0" layoutY="393.0" prefHeight="26.0" prefWidth="275.0"
promptText="Enter mobile number" stylesheets="@register.css"
unFocusColor="#978585" AnchorPane.bottomAnchor="129.0"
AnchorPane.leftAnchor="71.0" AnchorPane.rightAnchor="80.0"
AnchorPane.topAnchor="393.0" />
<Label layoutX="178.0" layoutY="43.0" prefHeight="50.0" prefWidth="120.0"
text="Moto" textFill="#2196f3">
<font>
<Font size="35.0" />
</font>
</Label>
<Label layoutX="266.0" layoutY="42.0" prefHeight="50.0" prefWidth="120.0"
text="Review" textFill="#a7b5bf">
<font>
<Font size="35.0" />
</font>
</Label>
70
</image>
</ImageView>
<ImageView fitHeight="33.0" fitWidth="27.0" layoutX="30.0" layoutY="338.0"
opacity="0.59" pickOnBounds="true" preserveRatio="true">
<image>
<Image url="@location.png" />
</image>
</ImageView>
<ImageView fitHeight="76.0" fitWidth="90.0" layoutX="71.0" layoutY="31.0"
pickOnBounds="true" preserveRatio="true">
<image>
<Image url="@blueCar.png" />
</image>
</ImageView>
<JFXTextField id="txtField" fx:id="nameTxtField" focusColor="WHITE" labelFloat="true"
layoutX="75.0" layoutY="137.0" prefHeight="27.0" prefWidth="288.0"
promptText="Name" stylesheets="@register.css" unFocusColor="#9a8a8a" />
<ImageView fitHeight="25.0" fitWidth="23.0" layoutX="35.0" layoutY="138.0"
opacity="0.55" pickOnBounds="true" preserveRatio="true">
<image>
<Image url="@../LogoMakr_9Tx3RH.png" />
</image>
</ImageView>
</children>
</AnchorPane>