Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 50

A SEMINAR REPORT

ON

CYBER CRIME

Submitted in Partial Fulfillment of the Requirements for

BACHELOR OF TECHNOLOGY

IN

COMPUTER SCIENCE & ENGINEERING

BY

A.RACHANA (16C31A0506)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

BALAJI INSTITUTE OF TECHNOLOGY & SCIENCE


Accredited by NBA(UG-CE,ECE,ME,CSE )& NAAC
(Affiliated to JNTU Hyderabad and Approved by the AICTE, New Delhi)
NARSAMPET, WARANGAL – 506331.

2019-20

CSE Department,BITS
BALAJI INSTITUTE OF TECHNOLOGY & SCIENCE
Accredited by NBA(UG-CE,ECE,ME,CSE )& NAAC
(Affiliated to JNTU Hyderabad and Approved by the AICTE, New Delhi)
NARSAMPET, WARANGAL – 506331.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE

This is to certify that A.RACHANA, Roll no:(16C31A05O6)


of B.Tech IV/I has satisfactorily completed the seminar work entitled

“CYBER CRIME” in partial fulfillment of the requirements of the


degree of B.TECH in Computer Science and Engineering from Balaji
Institute of Technology & Science during academic year 2019-20.

External Examiner

CSE Department,BITS
ACKNOWLEDGEMENT

I would thank to DR.A.ARUNKUMARwhose knowledge and guidance has


motivated me to achieve goals I never thought possible. He has consistently been a
source of motivation, encouragement, and inspiration. The time I have spent working
under his supervision has truly been a pleasure.

I thank H.O.D Dr. Kande Srinivas for his effort and guidance and all senior
faculty members of CSE Department for their help during my course. Thanks to
programmers and non-teaching staff of C.S.E Department of our college.

I heartily thank to our PrinicpalDr.V.S.HARIHARANfor giving this great


opportunity and her support to complete my project.

I would to appreciate the guidance given by project coordinator as well as


the panels especially in my project presentation that has improved my presentation
skills by their comment and tips.

Finally Special thanks to my parents for their support and encouragement


throughout my life and this course. Thanks to all my friends and well wishers for their
constant support.

A.RACHANA (16C31A0506)

CSE Department,BITS
ABSTRACT

Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies
“War Games” and “Hackers,” has grown into a mature and sophisticated threat to the open
nature of the Internet. “Cybercriminals,” like their non-virtual traditional criminal
counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news
media is filled with reports of debilitating denial of service attacks, defaced web sites, and
new computer viruses worming their way through the nation’s computers. However, there
are countless other cyber-crimes that are not made public due to private industry’s
reluctance to publicize its vulnerability and the government’s concern for security. Along
with the phenomenal growth of the Internet has come the growth of cyber-crime
opportunities. As a result of rapid adoption of the Internet globally, computer crimes include
not only hacking and cracking, but now also include extortion, child pornography, money
laundering, fraud, software pirating, and corporate espionage, to name a few. Law
enforcement officials have been frustrated by the inability of legislators to keep cyber-crime
legislation ahead of the fast-moving technological curve. At the same time, legislators face
the need to balance the competing interests between individual rights, such as privacy and
free speech, and the need to protect the integrity of the world’s public and private
networks. Further complicating cyber-crime enforcement is the area of legal jurisdiction.
Like pollution control legislation, one country cannot by itself effectively enact laws that
comprehensively address the problem of Internet crimes without cooperation from other
nations. While the major international organizations, like the OECD and the G-8, are
seriously discussing cooperative schemes, many countries do not share the urgency to
combat cyber-crime for many reasons, including different values concerning piracy and
espionage or the need to Wisam Shakir Hussain et al, International Journal of Computer
Science and Mobile Computing, Vol.8 Issue.1, January- 2019, pg. 131-143 © 2019, IJCSMC All
Rights Reserved 132 address more pressing social problems. These countries, inadvertently
or not, present the cyber-criminal with a safe haven to operate. Never before has it been so
easy to commit a crime in one jurisdiction while hiding behind the jurisdiction of another. In
section II of this article, we begin by providing an overview of cyber-crimes, the state of the
law, and cyber-crime perpetrators and their motivations. Then, in section III we discuss in
detail three major computer crimes and analyze how the different statutory subsections are
applied depending upon the technical details of the crime itself. Just as a murder
prosecution is dependent on how the crime was committed, different hacking techniques
trigger different federal anti-computer crime subsections. We begin with a discussion of the
various denial of service attacks and the applicable statutes. Next we discuss the technical
details of several hacking techniques and apply the relevant statutory subsections to the
specific techniques. Finally, we explore the various types of computer viruses and how viral
“payloads” and the class of the targeted computer will determine which federal subsection
can be applied to the crime. In section IV, we discuss proposed legislative changes to the
Computer Fraud and Abuse Act and related privacy concerns. Despite technological
measures being adopted by corporate organizations and individuals, we have witnessed that

CSE Department,BITS
the frequency of cyber crimes has increased over the last decade. Since users of computer
system and internet are

increasing worldwide in large number day by day, where it is easy to access any information
easily within a few seconds

by using internet which is the medium for huge information and a large base of
communications around the world. The

objective of this paper is to discuss about the cyber crime and its categories, professions
giving birth to cyber crimes and

its impact on businesses and the preventive measures to be taken to control the cyber
crime.

CSE Department,BITS
TABLE CONTENTS
1. INTRODUCTION……………………………………………………………………………………………

1.1 CYBER CRIME…………………………………………………………………………………………….

1.2 PROFESSIONS GIVING BIRTH TO CYBER CRIME…........................................

2 .LITERATURE SURVEY………………………………………………………………………………….

2.1 PREVENTION OF CYBER CRIME……………………………………………………………….

3. CATEGORIES OF CYBER CRIME…………………………………………………………………..

3.1 CYBER CRIMES AGAINST PERSONS…………………………………………………………..

3.2 CYBER CRIMES AGAINST PROPERTY…………………………………………………………

3.3 CYBER CRIMES AGAINST GOVERNMENT…………………………………………………

3.4 CYBER CRIMES AGAINST SOCIETY AT LARGE………………………………………….

4. ARCHITECTURE………………………………………………………………………………………..

5. APPLICATIONS…………………………………………………………………………………………

6. ADVANTAGES………………………………………………………………………………………….

7. FUTURE SCOPE………………………………………………………………………………………

8. CONCLUSION………………………………………………………………………………………….

9. REFERENCES……………………………………………………………………………………………

CSE Department,BITS
INTRODUCTION

Technology has come to play a major role not only in the life of a
consumer but also in the delivery of the services. The Government’s
push for digital India is a step towards ensuring access to Technology
to every Indian. There is no doubt that today almost all service
providers have made life easier by use of technology be it Banking,
Insurance, E-Commerce etc. technology not only bridges the distance
but also provides a better service to the consumers. With the rapid
growth of Information technology in business, consumers are .now
vulnerable to many risks. Electronic commerce has become a new
form of strategic competition where the internet is used for
communicating with customers and buying, selling products.

Consumers are doing online purchases and are defrauded by internet


thieves sometimes. But the customers are not aware of the associate
problems. Business methods and procedures are changing everyday
but the laws regulating business are not changed at that frequency.
Consumer protection may become a myth under these circumstances.

CYBER CRIME

Cyber crime is not a matter of concern for India only but it is a


global problem and therefore the world at large has to come forward
to curb this menace. Further complicating cyber crime enforcement
is the area of legal jurisdiction. Like pollution control legislation, one
country cannot by itself effectively enact laws that comprehensively
address the problem of internet crimes without cooperation from
other nations. While the major international organizations, like the
OECD and the G-8, are seriously discussing cooperative schemes, but
many countries do not share the urgency to combat cyber crimes for
many reasons, including different values concerning piracy or
espionage or the need to address more pressing social problems.
Though the issue of jurisdiction in cyberspace cannot be settled
spontaneously, but still a global effort in this direction is the need of

CSE Department,BITS
hour. India has witnessed a huge increase in Cyber crimes whether
they pertain to Trojan attacks, salami attacks, e-mail bombing, DOS
attacks, information theft, or the most common offence of hacking
the data or system to commit crime. Despite technological measures
being adopted by corporate organizations and individuals, we have
witnessed that the frequency of cyber crimes has increased over the
last decade.

PROFESSIONS GIVING BIRTH TO CYBER CRIMES:

There are three kinds of professionals in the cyberspace

1. IT or Tech Professionals: Since Cyber Crime is all about


computers and Networks (Internet), many types of IT & Technology
professionals are quite prominently active in the same, which include
but are not restricted to:

• Network Engineers

• Cyber Security Software Professionals

• Cyber Forensic Experts

• IT Governance Professionals

• Certified Internet Security Auditors

• Ethical Hackers

2. Cyber Law Experts: Cyber Law has become a multidisciplinary


approach and hence specialization in handling

cyber crimes is required. Cyber law experts handle:

• Patent and Patent Infringements or other Business Cyber crimes

• Cyber Security for Identity thefts and Credit Cards and other
financial transactions

• General Cyber Law

• Online Payment Frauds

• Copyright Infringement of software, music and video.

CSE Department,BITS
3. Cyber Law Implementation Professionals: Many agencies play a
role in cyber law implementation, which include the e-Governance
agencies, law and enforcement agencies, cybercrime research cells
and cyber forensic labs. Eachof these would have a different category
of professionals.

2. LITERATURE SURVEY
2.1 PREVENTION OF CYBER CRIME

Prevention of Cyber Crime: Prevention is always better than cure. It


is always better to take certain precautions while working on the net.
One should make them a part of his cyber life.

Identification of exposures through education will assist


responsible companies and firms to meet these challenges.

One should avoid disclosing any personal information to strangers,


the person whom they don’t know, via e-mail or while chatting or
any social networking site.

One must avoid sending any photograph to strangers by online as


misusing or modification of photograph incidents increasing day by
day.

An update Anti-virus software to guard against virus attacks


should be used by all the netizens and should also keep back up
volumes so that one may not suffer data loss in case of virus
contamination.

A person should never send his credit card number or debit card
number to any site that is not secured, to guard against frauds.

Web site owners should watch traffic and check any irregularity
on the site. It is the responsibility of the web site owners to adopt
some policy for preventing cyber crimes as number of internet users
are growing day by day.

Web servers running public sites must be physically separately


protected from internal corporate network.

CSE Department,BITS
It is better to use a security programs by the body corporate to
control information on sites.

Strict statutory laws need to be passed by the Legislatures keeping


in mind the interest of netizens.

IT department should pass certain guidelines and notifications for


the protection of computer system and should also bring out with
some more strict laws to breakdown the criminal activities relating to
cyberspace.

As Cyber Crime is the major threat to all the countries worldwide,


certain steps should be taken at the international level for preventing
the cybercrime.

A complete justice must be provided to the victims of cyber crimes


by way of compensatory remedy and offenders to be punished with
highest type of punishment so that it will anticipate the criminals of
cyber crime.

CATEGORIES OF CYBER CRIME


1.CATEGORIES AGAINST PERSONS

Cyber crimes committed against persons include various crimes like


transmission of child-pornography, cyber porn, harassment of
person using a computer such as through e-mail, fake escrow scams.
The trafficking, distribution, posting, and dissemination of obscene
material including pornography and indecent exposure, constitutes
one of the most important Cyber crimes known today.

Harassment via E-Mails: This is very common type of harassment


through sending letters, attachments of files & folders i.e. via e-mails.
At present harassment is common as usage of social sites i.e.
Facebook Twitter, Orkut etc. increasing day by day.

Cyber-Stalking: It is expressed or implied a physical threat that


creates fear through the use to computer technology such as internet,
e-mail, phones, text messages, webcam, websites or videos.

CSE Department,BITS
Defamation: It involves any person with intent to lower down the
dignity of the person by hacking his mail account and sending some
mails with using vulgar language to unknown persons mail account.

Hacking: It means unauthorized control/access over computer


system and act of hacking completely destroys the whole data as well
as computer programs. Hackers usually hacks telecommunication
and mobile network.

Cracking: It is act of breaking into your computer systems without


your knowledge and consent and has tampered with precious
confidential data and information.

E-Mail Spoofing: A spoofed e-mail may be said to be one, which


misrepresents its origin. It shows its origin to be different from which
actually it originates.

SMS Spoofing: Spoofing is a blocking through spam which means


the unwanted uninvited messages. Here a offender steals identity of
another person in the form of mobile phone number and sending
SMS via internet and receiver gets the SMS from the mobile phone
number of the victim. It is very serious cyber crime against any
individual.

Carding: It means false ATM cards i.e. Debit and Credit cards
used by criminals for their monetary benefits through withdrawing
money from the victim’s bank account. There is always unauthorized
use of ATM cards in this type of cyber crimes.

Cheating & Fraud: It means the person who is doing the act of
cyber crime i.e. stealing password and data storage has done it with
having guilty mind which leads to fraud and cheating.

Child Pornography: In this cyber crime defaulters create,


distribute, or access materials that sexually exploit underage
children.

Assault by Threat: It refers to threatening a person with fear for


their lives or lives of their families through the use of a computer
network i.e. E-mail ,videos or phones.

CSE Department,BITS
2. CYBER CRIME AGAINST PROPTERY

The second category of Cyber-crimes is that of Cyber crimes against


all forms of property. These crimes include computer vandalism
(destruction of others' property) and transmission of harmful viruses
or programs.

Intellectual Property Crimes: Intellectual property consists of a


bunch of rights. Any unlawful act by which the owner is deprived
completely or partially of his rights is an crime. The most common
type of IPR violation may be said to be software piracy, infringement
of copyright, trademark, patents, designs and service mark violation,
theft of computer source code, etc.

Cyber Squatting: It involves two persons claiming for the same


Domain Name either by claiming that they had registered the name
first on by right of using it before the other or using something
similar to that previously.

For example two similar names i.e. www.yahoo.com.

Cyber Vandalism: Vandalism means deliberately damaging


property of another. Thus cyber vandalism me and destroying
damaging the data or information stored in computer when a
network service is stopped or disrupted.

Hacking Computer System: Hackers attacks those included


Famous Twitter, blogging platform by unauthorized access/control
over the computer. Due to the hacking activity there will be loss of
data as well as computer system.

Transmitting Virus: Viruses are programs written by


programmers that attach themselves to a computer or a file and the
circulate themselves to other files and to other computers on a
network. They mainly affect the data on a computer, either by
altering or deleting it.

Cyber Trespass: It means to access someone’s computer or


network without the right authorization of the owner and disturb,
alter, misuse, or damage data or system by using wireless internet
connection.

CSE Department,BITS
Internet Time Thefts: Basically, Internet time theft comes under
hacking. It is the use by an unauthorized person, of the

Internet hours paid for by another person.

3. CYBER CRIME AGAINST GOVERNMENT

The third category of Cyber-crimes relates to Cyber crimes against


Government. Cyber terrorism is one distinct kind of crime in this
category. The growth of internet has shown that the medium of
Cyberspace is being used by individuals and groups to threaten the
international governments as also to threaten the citizens of a
country. This crime manifests itself into terrorism when an
individual "cracks" into a government or military maintain website.
The Parliament attack in Delhi and the recent Mumbai attack fall
under this category.

4. CYBER CRIMES AGAINST SOCIETY AT LARGE

An unlawful act done with the intention of causing harm to the


cyberspace will affect large number of persons. These offences
include:

Child Pornography: In this act there is use of computer networks


to create, distribute, or access materials that sexually exploit
underage children. It also includes activities concerning indecent
exposure and obscenity.

Cyber Trafficking: It involves trafficking in drugs, human beings,


arms weapons etc. which affects large number of persons.
Trafficking in the cybercrime is also a gravest crime.

Online Gambling: Online fraud and cheating is one of the most


lucrative businesses that are growing today in the cyber space. In
India a lot of betting and gambling is done on the name of cricket
through computer and internet. There are many cases that have
come to light are those pertaining to credit card crimes, contractual
crimes, offering jobs, etc.

Financial Crimes: This type of offence is common as there is huge


growth in the users of networking sites and phone networking where

CSE Department,BITS
culprit will try to attack by sending bogus mails or messages through
internet. Ex: Using credit cards by obtaining password illegally.

Forgery: It means to deceive large number of persons by sending


threatening mails as online business transactions are becoming the
habitual need of today’s life style.

CSE Department,BITS
CSE Department,BITS
TABLE OF CONTENTS
INDEX
CONTENTS PAGE NO

1.Introduction........................................................................................6-9
1.1 Introduction.................................................................................
1.2 Experimental Model
1.2.1 Arduino Uno Microcontroller
1.2.2 Bluetooth Model
1.2.3 Voice Controller
1.2.4 Touch Pad
2. Literature Survey
2.1 Voice Operated Wheelchair
3

CSE Department,BITS
1.INTRODUCTION

1.1 INTRODUCTION
Our domain is Wheelchair. Wheelchair is used by the physically handicapped or
paralyzed persons which are unable to walk or move their hands to drive the
wheelchair and for this such type of peoples we have designed the circuit for
wheelchair which is operated by his or her own hand gestures as well as by his or her
Voice. It is cooperative for the handicapped people to make their life comfortable and
simple.
The design of Wheelchair uses less muscle movement and pressure than the self with
the increase of elderly and incapacitated people, a wide range of support devices and
modern apparatus has been developed to help to be improving their quality of their
life. Some patients cannot be manipulating the wheelchair with their arms due to a
lack of required force. By using this method the wheel chair for handicapped person
using their own voice and touch screen technology. It will enable a disabled person to
move around independently using a touch screen and voice reorganization application
which is interfaced with motors through microcontroller.
When we want to change the direction, the touch screen sensor is modeled to direct
the user to required destination using direction keys on the screen and that values are
given to microcontroller. Depending on the direction selected on the touch screen,
microcontroller controls the wheel chair directions. This can also be controlled
through simple voice commands using voice controller. A speech reorganization
system is easy to use programmable speech reorganization circuit that is the system to
be trained the words the user wants the circuit to recognize. A speed controller works
by varying the average voltage send to the motor.

1.2EXPRIMENTAL METHOD:
1.2.1Arduino Uno Microcontroller:
Arduino is anopensource electronics prototyping platform which is based on
flexible, easy-to-use hardware and software The Uno is pin and code-compatible with
the Duemilanove,Diecimilla and older arduino so all your shields, libraries, code will
still work. The Arduino can sense the environment by receiving input from a variety

CSE Department,BITS
of sensors and can affect its surroundings by controlling lights, motors, and other
actuators. The microcontroller which is programmed using the Arduino programming
language (based on Wiring) and the Arduino development environment.

Fig: Arduino Uno Microcontroller Pin.


1.2.2 Bluetooth Model:
These Bluetooth modules have two types one is master and other is salver
device. Which is basically introduces Bluetooth serial module. The device named
after even number is defined to be master or salver when out of factory and cannot be
changed to the other made. But for the device named after odd number. By AT
commands users can set the work.

Fig:Bluetooth Model
1.2.3 VOICE CONTROLLER:
Few patients such as quadriplegics and multiple sclerosis type cannot drive joystick
operated powered wheelchair.they are dependent on other people or helpers to move

CSE Department,BITS
from one place to another and in such a way they don’t have the freedom or
mobility.this powered wheelchair motor control and drive system which consists of
microcontroller and DC motors.the voice recognition system is used to detect and
recognizes the patient’s voice and its output in the digital from will be sent to
microcontroller.

Fig:Voice Controller

1.2.4 TOUCH PAD:


Output of touch screen display is analog. To convert it into digital,
output of touch screen display is given to microcontroller’s pin analog to digital
converter A0 and A1.

Fig:Touch Screen Display

CSE Department,BITS
2.Literature Survey:
A wheelchair is a chair fitted with wheels.the device comes in
variations allowing either manual propulsion by the seated occupant turning the rear
wheels by hand,or electric prpulsion by motors.there are often handles behind the seat
to allow it to be pusged by another person.wheelchair are used by people for whom
walking is difficult or impossible due to illness, injury, or disability. People who have
difficulty sitting and make use of a wheel bench.

The earliest records of wheeled furniture was an inscription found


on a stone in China and a child’s bed depicated in a frieze on a Greek vase, both
dating back to the 5th century BCE. The first records of wheeled seats being used for
transporting the disabled date to three centuries later in Chaina. theChinese used their
invented wheel barrow to move people as well as heavy objects.A distinction between
the two functions was not made for another several hundred years, around 525 CE,
when image of wheeled chairs made specifcally to carry people being to occur in
Chinese are. Later dates relate to Europeans using this technology during the German
Renaissance.the invalid carriage or Bath Chair seems to date from around 1760. In
1887, wheelchairs(“rolling chaairs”) Were introduced to Atlantic City so invalid
tourists could rent them to enjoy the Boardwalk.Soon, many healthy tourists also
rented the decorated “rolling chairs” and servants to push them as a show of
decadence and treatment they could never experinnce at home.

Harry Jennings and his disabled friend Herbent Everest , both


mechanical engineers , invented the first lightweight, steel, collapsible wheel chair in
1933. Everest had broken his back in a mining accident. The two saw the business
potential of the invention and went on to become the first mass-manufactures of
wheelchairs.Everest and Jennings. Their “X-brace” design is still in common
use,albeit with updated materials and other improvement.

A 1993 report prepared by Rehabilitation Engineering center


suggests that the selecton of wheelchairs depends on one’s physical status , functional
capabilities and usage requirements. Light-duty chairs do not provide much in terms

CSE Department,BITS
of support, and rarely provide the means to adjust the chairs to the user.as a bsic
wheelchair is use if the user wants to take a break from walking. This is the most cost
effective choice. Heavy-duty chairs solve many of the comfort and adjustment issues
that light-duty chairs lack at the expense of some compactness. These types can be
with seat cushions and hard backs which greatly increase the comfort and support for
the user.

When an unfortunate event effects the motor capacity of a person.


It is necessary to use devices like wheelchair that offer a means of displacement for
patients with motors problem of the lower limbs.Tremendous leaps have been made in
the field of wheelchair technology.However, even these sugnificant advances haven’t
been able to help quadriplegics navigate wheelchair unassisted.the though of realizing
Automation in wheelchair at lower cost lead us to study various papers related to
automation of wheelchair.some of the points which caught the sight from referred
materials are listed below.

Automated wheelchair for physically disabled people is a


dependent user recognition voice system and ultrasonic and infrared sensor sysyem
have been integrated in the proposed wheelchair. In the automatic wheelchair which
can be driven using voice commands and with the possibility of avoiding obstacles by
using infrared sensors and down stairs or hole detection by ultrasonic sensor was
proposed. The wheelchair has also been developed to work on movement of
accelerometer which will help for the person whose limbs are not working. The
speech is recognized by the HM2007 IC and processed thus giving comments to the
microcontroller accordingly and hence to the robot. When accelerometer moves or
tilts its position ,thus gives anolog signal to microcontroller and convert it into
appropriate digital level so as to move the motors of wheelchair. Infrared sensors is
used detect the obstacle. If any obstacle is detect then it gives signal to microcontoller
and it will stop the motors microcontrooler controls the movements of the robot.

Automated wheelchair using Gesture Recognition is a


dependent-userrecognition using Head movements and infrared sensor integrated with
wheelchair. Wheelchair which can be driven using accelarayion sensor and head
movements with the possibility of avoiding obstacles. Obstacle in the way can be

CSE Department,BITS
dertermined by wheelchair and wheelchair will stop automatically. The wheelchair
can als0 intergrate with Head movements and compiuters. The pilot can use the same
controls to drive the wheelchaire and operate another assistive device, so handicap
person who cannot make use of his hands can drive by Head movements.

Head Gesture Based wheelchair movement Control for


Disabled Person Using MEMS- this project discusses to develop a wheelchair
control which is useful to the physically disabled person with his hand movement or
his hand gesture recognition using Acceleration technology. This paper also
demonstrates that accelerometers can be used to effectively trabslate finger and hand
gesture into computer interpreted signals.for gesture recognition the accelometer data
is calibrated and filtered. The accelerometer can measure the magnitude and directon
of gravity indetection. addition to movement include acceleration.

Voice and Accelerometer controlled wheelchair-Intended


users cintrols the chair by wearing a gloves fitted with accelerometer for controlling
the movements and the directions of the wheelchair. The wheelchair os also assisted
with a voice recognition kit,with the help of which the user can guidethe wheelchair
through voice commands. Ultrasonic sensor are used for real-time obstacle detection.
The possibility of avoiding obstacles withremoving by ultasonic sensor which detects
obstacles within 25cm range.the wheelchair has also been developed to allow manual
driving. The prototype of the wheekchair is bulit using a micro-controller, chosen for
its low cost, in addition to its versatility and performance in mathematical operations
and communications with other electronic devices.

Voice Activated Wheelchair with Colision Avoidence Using


Sensor Information- this project develops afunctional voice activated wheelchair.
The system applies the collision avoidance function(CAF) by which wheelchair
avoids the wall or obstacle is equipped with ten sensor.two ultrasonic and eight IR.
User inputs voice commands to laptop through hedset microphone, the plateform is
PIC system which uses Japanese fifteen instructton commands eight basic movement
commands, four little movements commands ,two speed control commands and one
repetition command and two verfication commands the user controls the wheelchair
by the interactive operation .then proposed system prevents the wheelchair to take

CSE Department,BITS
incorrect movement by false recognition. The top movement is set to prevent collision
to both the stationary obstacle such as the wall and moving obstacle such as person.
The avoidence movement provides the reduction of the problem. This movement
rotates the posture of the wheelchair to parallel to ther obstacle when the wheelchair
diagonally closes the wall or obstacle decleration movement. This movement slows
dwn the moving speed so that the user avoids the wall or obstacle himself by voice
command before applying the stop movement when it is close to the wall or obstacle.

2.1VOICE OPERATED WHEELCHAIRS:


Few patients such as quadriplegics and multiple sclerosis type cannont
drive joystick operated powerred wheelchair so they are dependent on the people or
helpers ro move from one place to another place and in such a way they don’t have
the freedom of mobility. So it is needed to develop apowered wheelchair which
operates on real anloogous voice signal of patient or user on that wheelchair. This
powereed wheelchair motor control and drive syetm which consists of microcontroller
and DC motor. The voice recognition system is used to detect and recognizes the
patient’s voice and its output in the digital from will be sent to microcontroller which
then controls whe wheelchair accrording to its program.

The wheelchair does not require any person to move it as it is


automated with motors, such kind of wheelchair are less observerd in india as
compared to the other countries(USA,Europe,China,etc). hence this wheelchair
provides the need of the quadriplegic patients and makes them independent for
mobility at reasonable rate. The future scope of this is thst the current system limits its
applications in noise free environment. Future studies should aim at making it
insensitive to noise by introducing proper noise filter into it. By making advanced and
partial modifications, this wheelchair be used in acoustic control of vehicles braking
systems thus reducing risk of accidents. Also ,the wheelchair can be done by using
soft computing on MATLAB for efficient output. We can also add the GSM/GPS
system to the present moduke so that it can help anyone to track if any accidents occur
as the patients would not be in a condition to call someone.

CSE Department,BITS
Fig:Voice operated Wheelchair

Several researchers have described voice control mechanisms for


a power wheelchair, but voice control has yet to become a commerically viable
control alternative. One problem with voice control is that the voice’s limited
bandwidth rebders it impossible to make frequent small adjustments to the
wheelchair’s velocity. And also the tone of the speaker should match the threshold set
by the manufacture. If the set threeshold is not reached then the commands instructed
by the speaker will not be performed. One possible solution is to utilize voice control
In combination with the navigation assistance provided by “smart wheelchair” which
use sensors to identify and avoid obstacles in the wheelchair’s path.

3.Problem Description:

A handicapped person with locomotive disabilities needs a


wheelchair to perform functions that require him or her to move around. He can do so
manually by pushing the wheelchair with his hands. However many individuals have
weak upper limbs or find the manual mode of operating too tiring. Hence it is
desirable to provide them with a motorized wheelchair that can be controlled by
moving a joystick or through voice commands. Since the motorized wheelchair can
move at a fair speed, it is important that it be able to avoid obstacles automatically in
real time. All this should be achieved at a cost that is affordable for as many
handicapped people as possible, as well as for organizations that support them. With

CSE Department,BITS
these requirements in mind we propose an automated wheelchair with real-time
obstacle avoidance capability. The power wheelchair control interfaces currently still
not enough to provide truly independent mobility for substantial number of person
with disabilities. Through research and design wise, the power wheelchair to control
development along safe and effective use of the provision independence and self-use
mobility. This project will provide disability weight innovative solutions to handle the
wheel chairs to use voice interface.

This project describes a wheelchair which can be controlled only by


using the user's voice. This project aims to facilitate the movement of the disabled
people and elderly people who cannot move properly then enable them to lead better
lives without any problem. Speech recognition technology is a key technology which
can provide a new way of human interaction with machines or tools for controlling a
wheelchair. This project consists of two parts which is software and hardware. It is
realized by using the microphone as an intermediary which is used as the input of
human voice. In this project, Programmable
Integrated Circuit (AVR) is used as a switch to control the movement
of wheelchair based on the human voice as an input with installing two DC motor as
the driving force. There are five options for basic motions of a wheelchair to be
applied by the user. The five conditions of the wheelchair can be described as the
following:
i. Moving forward
ii. Moving backward
iii. Turning to the right
iv. Turning to the left
v. Stop condition
This project describes the design and development of the motion control using voice
recognition for a wheelchair application.

4.

CSE Department,BITS
7.Advantages:

8.Future Scope:

To make the present touch screen feasible to all classes of disabled, particularly for
the blind. the touchscreen can be made braille so that the blind person can feel the
touch pad and operate the wheelchair accordingly. The touchscreen in the present
prototype has keys as the input mode. Also, the wheelchair can be controlled by the
user himself through voice recognition.The range of sensing can be further increased
by using high accuracy senssors.to save energy, the erergy from the motion of the
wheels can stored in a battery and made use.

9.Conclusion:

The motor drive and control system of the prototype intelligent wheelchiar has been
presented.the proposed voice and touchscrren operated intelligent wheelchair would
bring more conveninence for the disabled people.the technology can also enchance
safety for users who use ordinary joystick controlled powered wheelchairs, by
preventing collisions with walls, fixed objects, furniture and other people.
Speech can be one of the desirable interfaces for wheelchair. When this project used
by disabled person, he will be more comfortable, and self-dependent in his life. There
is possibility to run the chair at different speeds and choose between joystick and
voice control methods.

CSE Department,BITS
1.4 PURPOSE, SCOPE AND APPLICABILITY

1.4.1 Purpose
The purpose of order online meat-buy is ordering and delivering meat doorsteps. The
customers will select meat shops online through App and the App helps us find the
best meat shop based on reviews of previous customers and deliver it through delivery
boy.

. 1.4.2 Scope

In this project a fresh meat research will be conducted and enables customers order
for meat and get delivered accordingly and also reduce long queues of customers at
the counter ordering for meat and reduce the work load on the employees.

1.4.3 Applicability

The Company/Website/Application is committed to provide the Services with utmost


care and skill in accordance with good industry standards.Our warehouses are verified
by Food Safety professionals on a timely basis Training is provided to our staff on
matters including freshness, hygiene, cleanliness, packaging and quality of Meat.

CSE Department,BITS
2.SYSTEM ANALYSIS

2.1 INTRODUCTION

If You Want to prepare some interesting meat dishes, but do not know where you can
get fresh meat? Now you can goorder online meat-buy then your favourite protein at
the click of a mouse. "In India, people have been selling stale and frozen products in
the name of fresh meat. There is no worry in terms of freshness, pricing and quality.
Our sight is that we sell fresh and preservative free meat, which is sourced straight
from the farms dailyThe online meat delivery segment offers ample opportunities but
not without its share of risk.

2.2 ANALYSIS MODEL

The model that is basically being followed is the WATERFALL MODEL, which
states that the phases are organized in a linear order. First of all the feasibility study is
done. Once that part is over the requirement analysis and project planning begins. If
system exists one and modification and addition of new module is needed, analysis of
present system can be used as basic model.
The design starts after the requirement analysis is complete and the coding begins
after the design is complete. Once the programmimg is completed, the testing is done.
In this model the sequence of activities performed in a software development project
are:-
 Requirement Analysis
 Project Planning
 System design
 Detail design
 Coding
 Unit testing
 System integration & testing

Here the linear ordering of these activities is critical. End of the phase and the output
of the one phase is the input of other phase. The output of each phase is to be
consistent with the overall requirement of the system. Some of the qualities of spiral

CSE Department,BITS
model are also incorporated like after the people concerned with the project review
completion of each of the phase the work done. WATERFALL MODEL was being
chosen because all requirements were known beforehand and the objective of our
software development is the online house rental system.

Fig2.2: Waterfall Model

2.3. HARDWARE & SOFTWARE REQUIREMENTS


HARDWARE REQUIREMENTS
Processor : Intel
Memory Size :2GB
Input :Mouse and Keyboard/Touch

SOFTWARE REQUIREMENTS

CSE Department,BITS
Operating System :Windows
Database :Mysql
Programinniglanguage : php

2.4EXISTING SYSTEM:
 In the existing system, customer goes to meat shop and stands inline
hours and hours.
 The customer doesn’t have any idea that whether the meat is
available or not until they Visitthe meat shop.
2.5PROPOSED SYSTEM
 In the proposed system, meat will be ordered in online.
 The customer or user can order meat at any time and anywhere.
 By sitting at home you can order meat.
 Before 2 hours only you have to order meat and the time limit willbe there
that is from morning 10:00 AM to evening 8:00PM,You have to order in
this time limit only.
 And coupons also available for first three attempts for each user.

2.6 INPUT DESIGN & OUTPUT DESIGN


INPUT DESIGN
The input design is the link between the information system and the user. It comprises
the developing specification and procedures for data preparation and those steps are
necessary to put transaction data in to a usable form for processing can be achieved by
inspecting the computer to read data from a written or printed document. The design
of input focuses on controlling the amount of input required, controlling the errors,
avoiding delay, avoiding extra steps and keeping the process simple. The input is
designed in such a way so that it provides security and ease of use with retaining the
privacy. Input Design considered the following things:
 What data should be given as input?
 How the data should be arranged or coded?
 Methods for preparing input validations and steps to follow when error occur.
Objectives

CSE Department,BITS
1. Input Design is the process of converting a user-oriented description of the
input into a computer-based system. This design is important to avoid errors in
the data input process and show the correct direction to the management for
getting correct information from the system.
2. It is achieved by creating a user-friendly screens for the data entry to handle
large volume of data. The goal of designing input is to make data entry easier
and to be free from errors. The data entry screen is designed in such a way that
all the data manipulates can be performed.
3. When the data is entered it will check for its validity. Data can be entered with
the help of screens.

OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the
users and to other system through outputs. In output design it is determined how the
information is to be displaced for immediate need and also hard copy output. It is the
most important and direct source information to the user. Efficient and intelligent
output design improves the system’s relationship to help user decision-making.

2.7 MODULES
1. Administrator
2. Delivery Boy
3. User
MODULES DESCRIPTION
1.ADMINISTAROR:
 The admin will have login page and he should login first.
 And he should have to manage request by this he receive requestsfrom the
users and he should manage meat and notifications.
 He has to accept the orders from the customers and he shouldprovide
menu for meat.
2.DELIVERY BOY:

CSE Department,BITS
 The delivery boy should login in the website (order online meat-buy) andhe
has to receive the orders from meat shop and he should deliver theorders to the
customers.
 And he should send message to the customer and administrator that hehad
delivered the meat after delivering.
3.USER:
 The user have to login to the website.
 The user should order the meat by seeing menu and he has to pay moneyin
online itself.
 There is no cash payment.

3.FEASIBILITY REPORT
3.1 FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal is
put forth with a very general plan for the project and some cost estimates. During
system analysis the feasibility study of the proposed system is to be carried out. This
is to ensure that the proposed system is not a burden to the company. For feasibility
analysis, some understanding of the major requirements for the system is essential.
Three key considerations involved in the feasibility analysis are:
 ECONOMICAL FEASIBILITY
 TECHNICAL FEASIBILITY
 SOCIAL FEASIBILITY

3.1.1.ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will
have on the organization. The amount of fund that the company can pour into the
research and development of the system is limited. The expenditures must be justified.
Thus the developed system as well within the budget and this was achieved because
most of the technologies used are freely available. Only the customized products had
to be purchased.
3.1.2.TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on
the available technical resources. This will lead to high demands on the available

CSE Department,BITS
technical resources. This will lead to high demands being placed on client. The
developed system must have a modest requirement, as only minimal or null changes
are required for implementing this system.
3.1.3.SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by the
user. This includes the process of training the user to use the system efficiently. The
user must not feel threatened by the system, instead must accept it as a necessity. The
level of acceptance by the users solely depends on the methods that are employed to
educate the user about the system and to make him familiar with it.

4.SOFTWARE REQUIREMENT SPECIFICATIONS


A software requirements specification(SRS) is a description of a software system to
be developed. The software requirements specification lays out functional and non-
functional requirements, and it may include a set of use cases that describe user
interactions that the software must provide. The software requirements specification
document lists sufficient and necessary requirements for the project development.
4.1.FUCTIONAL REQUIREMENTS
These are statements of services the system should provide, how the system should
react to particular inputs, and how the system should behave in particular situations, It
specifies the application functionality that the developers must build into the product
to enable users to accomplish their tasks.
 User should have single login form.
 Each user have only one user id and password.
 User and delivery boy will get notifications.
 User can order meat.
 User makes payment.
 Order will be home delivered.
4.2.NON-FUNCTIONAL REQUIREMENTS
In Non-functional requirements are requirements that are not directly concerned with
the specific services delivered by the system to its users. They may define constraints
on the system implementation such as the capabilities of input devices or the data
representation used in interfaces with other system.
 After registration only user can login.

CSE Department,BITS
 User can have one user id and password by considering mail id or
phone number.
 Notifications will send by admin.
 Order item will be delivered from shops available near user
address/location.
 Payment will be done by using cards/wallets.
 Delivery done by delivery boy.
 Discounts/coupons can be applied by the time of payment.

5.SOFTWARE ENVIRONMENT

5.1.PHP(Hypertext Pre-processor)
Hypertext Pre-processor is a widely used, general-purpose scripting language
that was originally designed for web development to produce dynamic web pages. For
this purpose, PHP code is embedded into the HTML source document and interpreted
by a web server with a PHP processor module, which generates the web page
document.

As a general-purpose programming language, PHP code is processed by an


interpreter application in command-line mode performing desired operating system
operations and producing program output on its standard output channel. It may also
function as a graphical application. PHP is available as a processor for most modern
web servers and as standalone interpreter on most operating systems and computing
platforms.

PHP was originally created by Rasmus Lerdorf in 1995 and has been in
continuous development ever since. The main implementation of PHP is now
produced by the PHP Group and serves as the de facto standard for PHP as there is no
formal specification. PHP is free software released under the PHP License.

PHP is a general-purpose scripting language that is especially suited to server-


side web development where PHP generally runs on a web server. Any PHP code in a
requested file is executed by the PHP runtime, usually to create dynamic web page
content. It can also be used for command-line scripting and client-side GUI
applications. PHP can be deployed on most web servers, many operating systems and
platforms, and can be used with many relational database management systems. It is
available free of charge, and the PHP Group provides the complete source code for
users to build, customize and extend for their own use.

Originally designed to create dynamic web pages, PHP now focuses mainly on
server side scripting, and it is similar to other server-side scripting languages that
provide dynamic content from a web server to a client, such as Microsoft's Active
Server Pages, Sun Microsystems’ Java Server Pages, and mod_perl. PHP has also
attracted the development of many frameworks that provide building blocks and a

CSE Department,BITS
design structure to promote rapid application development (RAD). Some of these
include CakePHP, Symfony, Code Igniter and Zend Framework, offering features
similar to other web application frameworks.

2.2 PHP Syntax:


HTML and PHP code is written on the same page, and to distinguish PHP code
from HTML, the PHP code is enclosed within Tags.

For example:

<html>
<head><title>php basics</title></head>
<body>
<h2>HELLO</h1><?php
echo "hello";
?>
</body>
</html>

In the above example PHP code is embedded within HTML. In this way PHP and
HTML coding is combined on the same page.

Since PHP is a server side scripting language, the PHP coding cannot be seen by
the end user through view source option, due to this feature PHP is very secure.

PHP is a parsed language; therefore PHP environment is necessary at the


server for running PHP scripts.

2.3 Working Of PHP:


When a client requests web page containing PHP code from the server, then the
requested PHP pages are parsed under PHP environment and interaction with
database is made if required.

After server side processing, the resulting HTML pages are passed to client and
displayed on the browser.

In this way the working of php is complete.

2.4 Connecting PHP Application to MySQL Database:


Make a connection variable to the database:

$con= mysql_connect ("localhost","servername","password");

Here $con is a connection variable to database.

Select database over that connection variable

CSE Department,BITS
$db=mysql_select_db("databasename",$con);

Prepare a sql query to execute:

$qry= Select * from abc; Run the sql query:

$result=mysql_query($qry);

Iterate over the result:

while($row = mysql_fetch_array($result))

//some logic

2.5 Introduction to MySQL:


MySQL is a relational database management system (RDBMS) that runs as a server
providing multi-user access to a number of databases. MySQL is officially
pronounced ("My S-Q-L"), but is often pronounced ("My Sequel"). It is named for
original developer Michael Widenius's daughter My.

The MySQL development project has made its source code available under the terms
of the GNU General Public License, as well as under a variety of proprietary
agreements. MySQL is owned and sponsored by a single for-profit firm, the Swedish
company MySQL AB, now owned by Sun Microsystems, a subsidiary of Oracle
Corporation.

MySQL code uses C and C++. The SQL parser uses yacc and a home-brewed lexer,
sql_lex.cc.

MySQL works on many different system platforms, including AIX, BSDi, FreeBSD,
HPUX, i5/OS, Linux, Mac OS X, NetBSD, Novell NetWare, OpenBSD, OpenSolaris,
eComStation, OS/2 Warp, QNX, IRIX, Solaris, Symbian, SunOS, SCO OpenServer,
SCO UnixWare, Sanos, Tru64 and Microsoft Windows. A port of MySQL to
OpenVMS also exists.

All major programming languages with language-specific APIs include Libraries for
accessing MySQL database. In addition, an ODBC interface called MyODBC allows
additional programming languages that support the ODBC interface to communicate
with a MySQL database, such as ASP or ColdFusion. The HTSQL - URL based query
method also ships with MySQL adapter allowing direct interaction with MySQL
database from any web client via structured URLs. The MySQL server and official
libraries are mostly implemented in ANSI C/ANSI C++.

6.SYSTEM DESIGN

CSE Department,BITS
6.1.INTRODUCTION
Software design sits at the technical kernel of the software engineering process and is
applied regardless of the development paradigm and area of application. Design is the
first step in the development phase for any engineered product or system. The
designer’s goal is to produce a model or representation of an entity that will later be
built. Beginning, once system requirement have been specified and analyzed, system
design is the first of the three technical activities design, code and test that is required
to build and verify software.

During design, progressive refinement of the data structure, program structure, and
procedural details are developed reviewed and documented. System design can be
viewed from either technical or project management perspective. From the technical
point of view, design is comprised of four activities – architectural design, data
structure design, interface design and procedural design.

6.2.E - R DIAGRAMS
The relation upon the system is structure through a conceptual ER-Diagram, which
not only specifies the existential entities but also the standard relations through which
the system exists.

ER diagram is a graphical representation of a system entities their attributes and the


relationship between them.

The set of primary components that are identified by the ERD are:

 Data object

 Relationships

 Attributes

 Various types of indicators

E - R Diagram

CSE Department,BITS
Fig 6.2.1 E-R Diagram

6.3. DATA FLOW DIAGRAMS(DFD)


A Data Flow Diagram (DFD) is a graphical representation that depicts the information
flow and the transforms that are applied as data moves from input to output. These are
the central tool and the basis from which the other components are developed. The
transformation of the data from input to output, through processed, may be described
logically and independently of physical components associated with the system.
These are known as the logical data flow diagrams. Each component in a DFD is

CSE Department,BITS
labeled with a descriptive name. The development of DFD’s is done in several levels.
Each process in lower level diagrams can be broken down into a more detailed DFD
in the next level. The top-level diagram is often called context diagram. It consists a
single process bit, which plays vital role in studying the current system. The process
in the context level diagram is exploded into other process at the first level DFD.

Level 0 DFD:

Fig 6.3.1 Level 0 Data Flow Diagram

Level 1 DFD:

CSE Department,BITS
Fig 6.3.2 level 1 Data Flow Diagram

6.4. UML DIAGRAMS


It is a simple graphical formalism that can be used to represent a system in terms of
the input data to the system, various processing carried out on these data, and the
output data is generated by the system.

CSE Department,BITS
6.4.1 CLASS DIAGRAM

In software engineering, a class diagram in the Unified Modeling Language (UML)


is a type of static structure diagram that describes the structure of a system by
showing the system's classes, their attributes, operations (or methods), and the
relationships among objects.

In the diagram, classes are represented with boxes that contain three compartments:

 The top compartment contains the name of the class. It is printed in bold and
centered, and the first letter is capitalized.
 The middle compartment contains the attributes of the class. They are left-aligned
and the first letter is lowercase.
 The bottom compartment contains the operations the class can execute. They are
also left-aligned and the first letter is lowercase.

Fig 6.4.1 Class Diagram

6.4.2 USE CASE DIAGRAM

A use case diagram is a graph of actors, a set of use cases enclosed by


a system boundary, participation associations between the actors and the use cases,
and generalization among the use cases.

In general, the use case defines the outside(actors) and inside(use


cases) of the system’s typical behavior. A use case is shown as an ellipse containing
the name name of the use case and name of the intiated by actors.

An actor is anything that intracts with the use case.this is symbolized by a


stick figure with the name of the actor.

CSE Department,BITS
System

login
<<include>> select nearest shop

orders meat

admin

payment

<<include>>
customer

online payment
customer details
<<include>>

delivery boy
deliver's meat

notifications

feedback/ratings

update profile

Fig:6.4.2 Use Case Diagram

6.4.3. SEQUENCE DIAGRAM

A sequence diagram shows object interactions arranged in time sequence. It depicts


the objects and classes involved in the scenario and the sequence of messages
exchanged between the objects needed to carry out the functionality of scenario. The
sequence diagram has two dimensions: the vertical dimensionrepresentsthe time, the
horizontal dimension represents different objects. The virtual line also called the
objects’s lifeline represents the object’s existence during the interaction.

CSE Department,BITS
user admin delivery boy

1 : orders meat()

2 : check details()

3 : online payment()

4 : payment successfull() 5 : order confirmed()

6 : delivered()

7 : order placed()

8 : feedback()

Fig 6.4.3 Sequence Diagram

6.4.4 STATECHART DIAGRAM

A state diagram is a type of diagram used in computer science and related fields to
describe the behavior of systems. State diagrams require that the system described is
composed of a finite number of states; sometimes, this is indeed the case, while at
other times this is a reasonable abstraction. Many forms of state diagrams exist, which
differ slightly and have different semantics.

CSE Department,BITS
Fig 6.4.4 Statechart Diagram

7.SAMPLE CODE

CSE Department,BITS
8.OUTPUT SCREENS

CSE Department,BITS
9.IMPLEMENTATION AND TESTING
9.1 IMPLEMENTATION

The online House Rental system in used in the following modules that can be
implemented.

Modules Details:

The Implemented modules in given below

1.Registration/Login module

2.Booking Module

3 House Posting Module

Login modules:

Login modules is implemented in the online House Rental Management to only


allowed a register person. we have to use this module in security purpose related on
the detail.

Registration modules:

The online House Rental management system in Registration modules is used to


collect the user personal information. It has to collect the address, name, phone
number also. The registration module details are stored in the database.

Booking Modules:

Online House Rental Management System has an implementation of House Booking


where only registered members are allowed to view and book house/office/land/home
for rental or lease

Post House Module:

CSE Department,BITS
House Rental Management System has been implemented with House posting
module where the seller/landlord or system administrator can upload house/property
details for sale or rent.

9.2 TESTING

Testing is the process of detecting errors. Testing performs a very critical role for
quality assurance and for ensuring the reliability of software. The results of testing are
used later on during maintenance also.

Psychology of Testing

The aim of testing is often to demonstrate that a program works by showing that it has
no errors. The basic purpose of testing phase is to detect the errors that may be present
in the program. Hence one should not start testing with the intent of showing that a
program works, but the intent should be to show that a program doesn’t work. Testing
is the process of executing a program with the intent of finding errors.

Testing Objectives:

The main objective of testing is to uncover a host of errors, systematically and with
minimum effort and time. Stating formally, we can say

 Testing is a process of executing a program with the intent of finding an error.


 A successful test is one that uncovers an as yet undiscovered error.
 A good test case is one that has a high probability of finding error, if it exists.
 The tests are inadequate to detect possibly present errors.
 The software more or less confirms to the quality and reliable standards.

Levels of Testing:

In order to uncover the errors, present in different phases we have the concept of
levels of testing. The basic levels of testing are as shown below…

 Client Needs
 Requirements

CSE Department,BITS
 Design
 Code

10.CONCLUSION

House Rental business has emerged with a new goodies compared to the past
experience where every activity concerning House rental business is limited to a
physical location only. Even though the physical location has not been totally
eradicated; the nature of functions and how these functions are achieved has been
reshaped by the power of internet. Nowadays, customers can reserve book/buy/sale
House online, rent House online, and have the house contracted successfully without
any sweat once the customer is a registered member of the House Rental Management
System.

The web based House rental system has offered an advantage to both Tenants as well
as Landlords to efficiently and effectively manage the business and satisfies
customers’ need at the click of a button.

10.1 Limitation of the system

The system at present does not take care of the money payment methods, as the
consolidated constructs need SSL standards and are critically to be initiated in the first
face, the application of the credit card transactions is applied as a developmental
phase in the coming days. The system needs more elaborative technicality for its
inception and evolution.

CSE Department,BITS
11. REFERENCES

Books Used:

• Software Engineering - R.S. Pressman

• PHP for Dummies

• PHP Beginners Guide by McGraw-Hill Publication

• JavaScript by McGraw-Hill Publication

References Used

: • http://www.resgroup.net/

• http://www.a1realestate.solutions

• Wikipedia.org

• www.w3schools.com

12.GLOSSARY

1. MB Megabytes

2. GB Gigabytes

3. SQL Structural Query language

4. Admin Administrator

5. RAM Random Memory

6. PHP Hypertext preprocessor

CSE Department,BITS
7. HTML Hypertext Markup Language

CSE Department,BITS

You might also like