Professional Documents
Culture Documents
Umer. REPORT
Umer. REPORT
Declaration
I hereby declare that the project report entitled “PHYSICAL ASSET TRACKING AND
MANAGEMENT” are product my own development under the guidance of Mr. IDREES and no
part has been copied from any published source (except the references, standard mathematical or
genetic models/equations/formulate/protocol etc.). I further declare that the work reported in this
project has not been submitted by any other either in part or in full, for the award of any other
degree or diploma in this university. The university may take action if the information provided
is found inaccurate at any stage.
----------------------------------------
To,
University of Agriculture,
Faisalabad.
We, the supervisory committee, certify that the contents and form of this report
submitted by Mr. MUHAMMAD NADEEM SARWAR Regd. No. 2017-ag-
3959 have been found satisfactory and recommend that it be processed for
evaluation for the award of the degree.
Supervisory committee:
O, ALLAH
You could have left me in darkness,
But you didn’t.
I am grateful
All Praise is Yours
ALHAMDULILLAH
DEDICATED
TO
HOLY PROPHET
(S.A.W)
MY FAMILY
MY TEACHERS
&
MY FRIENDS
WHO ENCOURAGED ME AT
EVERY STEP OF THE DEGREE
AKNOWLEDGEMRNT
Here I am gladly present this project report on “PHYSICAL ASSET TRACKING AND
MANAGEMENT” as a FINAL project of M.sc (Computer Science). At this time of submitting this
report I use this opportunity to mention those people who with me along the work. I take this
occasion to thank God, almighty for blessing us with his grace and taking me Endeavour to a
successful culmination. I extend my sincere and heartfelt thanks to our esteemed guide Mr.
IDREES for providing us with the right guidance, advice and for showing us the right way. I
also extend my sincere thanks to our respected Head of the Department Mr. MUHAMMAD
ALI AUN to giving me an opportunity to polish my capabilities. I would like to thank the other
faculty members also who lead me to a successful development, at this occasion. Last but not the
least; I would like to thank friends for the support and encouragement they have given me during
the course of my work.
ABSTRACT
Asset tracking and management system for library using active radio frequency identification
(RFID).In Today's world RFID (radio frequency identification) technology is one of the most
popular technologies for tracking and tracing, whereby a person or an object is identified using
Radio Frequency (RF) transmission using a special kind of a sensor network. Recently, radio
frequency identifications (RFIDs) are used to identify the assets which are permanent objects
used internally in business. Computers, tools, library books, equipment are some examples of the
assets. In the proposed work, physical location of the library books can be found quickly using
radio frequency identification (RFID). It reduces the searching time and hence the unnecessary
wastage of time is avoided.
1.10.1 Purpose5
1.10.2 Data Storage5
1.10.3 Eliminating data redundancy5
1.10.4 Flexibilty 5
10.5 Solving Problem5
1.11 Advantages of new system6
1.11.1 User Friendly6
11.2 Economical6
11.3 Reliable6
11.4 Time Saving6
11.5 Efficient7
11.6 Security7
11.7 Accessibilty7
Chaptaer: 27
Methodology7
2.1 Functional Requirement…………………………………………………………………………………………………………………….7
2.2 Adapted Methdology8
2.3 V model8
2.3.1 Diagram of V Model9
2.3.2 When to use V Model9
2.3.3 Advantages of V model9
HNIVERSITY OF AGRICULTURE FAISALABAD Page 7
PHYSICAL ASSEST TRACKING AND MANAGEMENT
3.2.6 Security26
3.2.7 Economy26
3.2.8 Data entry26
3.2.9 Time saving26
3.2.10 Amendment of data26
3.2.11 Neat and clean setup26
3.3 client manual27
3.3.1 to register client27
3.4 user manual29
3.5 future scope29
3.6 conclusion30
3.7 Action plan30
List of Table
CHAPTER NO: 1
INTRODUCTION
1.1 Importance of Computer:
The blooming technology has taken deep roots in every field now days. By the use of a
computer, tasks can be done automatically and that will lead to saving the countless hours that
may otherwise have been spent on doing the job manually. The computer has thoroughly
changed the way we witness things. It is one of the most brilliant gifts of science. Computers are
constantly being updated to make our lives better. In fact the computer is a wonderful electronic
brain that we have come to rely on in our everyday life. The computer has proved a friend and
servant of science, technology and industry. It is impossible for anyone to imagine a world
without high computing environment also it is the worst nightmare for any organization to
imagine its functioning without high end computerized automated system. Providing maximum
facilities and comfort to customers is the main goal of firm. To achieve this goal modern
facilities relating to computers should have to be provided. No firm without using computers in
modern age can be succeeded.
make corrections, if a manual document contains errors or needs updating, it is often necessary
to create the whole document from scratch rather than just a new version. If user wants to get
information about a particular customer, then it is a very difficult and time consuming job.
The main Objectives of the PMS is making the pharmacy organizations computerized by
creating neat work through minimizing or eliminating wasting of time as well as removing the
resources such as papers for data saving since know a days is paper based, decrease
malfunctioned works on the medical usage by giving correct information on each medicine.
1.10.4 Flexibility:
System must be capable to meet the desired objective and goals of the organization. System
must be capable to change accordingly to the situation or requirements of the organization. It
must have flexibility in it to change accordingly to the requirements.
1.11.2 Economical:
The new system is economical. There will no stationary expense and work will be done with
minimum manpower. Means that it is too much economical.
1.11.3 Reliable:
There is no any online Payment gateway provided in this portal. So, any company which would
register would not be able to pay online. Payment would be done by check/case. There are no
banners for advertisement on the site.
1.11.5 Efficient:
No delay in availability of information in the system, so decision making is faster and easier.
This system is so much efficient as it performs better and correctly.
1.11.6 Security:
Management System provides a very strong security feature. Only the authorized users can
access the developed system. Hence it provides high level of security to the data.
1.11.7 Accessibility:
No delay in availability of information in the system, so decision making is faster and easier.
User can access easily and can do his work. So these are the main advantages of the new system.
CHAPTER NO: 2
MATHLODOGY
There are functions done by the system such as: store the necessary information of drugs, prepare
bill for the medicine, give week reports, easily searching of medicine, working in two languages,
Update, delete and save data’s of medicine.
Generate Report:
The pharmacy management system generates report weakly on information about the drugs and
it exports the information as output document.
ADAPTED METHODOLOGY:
The V_SHAPED Model means Verification and Validation model. Just like the waterfall model
V-Shaped life cycle is a sequential path of execution of processes. Each phase must be
completed before the next phase begins. Testing of the product is planned in parallel with a
corresponding phase of development.
2.3. V_MODEL:
Requirements:
Like BRS and SRS begin the life cycle model just like the waterfall model. But, in this model
before development is started, a system test plan is created. The test plan focuses on meeting the
functionality specified in the requirements gathering.
Figure # 2 of V Model
2.3.2 When to Use The V-Model:
The V-shaped model should be used for small to medium sized projects where requirements are
clearly defined and fixed. The V-Shaped model should be chosen when ample technical
resources are available with needed technical expertise. High confidence of customer is required
for choosing the V-Shaped model approach. Since, no prototypes are produced, there is a very
high risk involved in meeting customer expectations.
.
2.3.3 Advantages of V-Model:
Simple and easy to use. Testing activities like planning, testing design happens well before
coding. This saves a lot of time. Hence higher chance of success over the waterfall model.
Proactive defect tracking – that is defects are found at early stage.
Coding:
This is at the bottom of the V-Shape model. Module design is converted into code by developers.
2.4.1 Database:
The database is used in this is MYSQL I made database and tables in it. This step
involves breaking down the system in different pieces to analyze the situation, analyzing project
goals, breaking down what needs to be created and attempting to engage users so that definite
requirements can be defined.
2.4.3 Language:
Different type of language used in the project as PHP, JAVASCRIPT, CSS, HTML.
2.4.4 Tools:
Sublime text and Dreamweaver.
2.5.2 Software:
Minimal Software Requirements:
Windows 7/8
Adobe Dream Viewer CS6
XAMPP
SQL server 2005
Microsoft Office 2007
2.6.1 Design:
I want to design my site in the way that any person can easily understand it Design is the heart
of any website today we are living in the era of computer science. So that why I use a simple
design.
2.6.2 Environments:
At the Implementation time is the most critical time of my project because I use php, html, css.
Then I change it to takes valid information of the user and execute systems that move through
the SDLC. Development environment, where developers can work independently of each other
before trying to merge their work with the work of others,
• Common build environment, where merged work can be built, together, as a combined
system,
• Systems integration testing environment, where basic testing of a system’s integration
points to other upstream or downstream systems can be tested,
• User acceptance testing environment, where business stakeholders can test against their
original business requirements,
• Production environment, where systems finally get deployed to, for final use by their
intended end users.
2.6.3 Testing:
At testing level whenever I test my code lots of error and syntax error fatal error occur in my
testing in testing of database to send and retrieve the data.
The code is tested at various levels in software testing, Unit, system and user acceptance
testing’s often performed. This is a grey area as many different opinions exist as to what the
stages of testing are and how much, if any iteration occurs. Defect testing the failed scenarios,
including defect tracking:
• Path testing
• Data set testing
• Unit testing
• System testing
• Black-box testing
• White-box testing
• Automation testing
• User acceptance testing
• Software performance testing
2.8 Unified Modeling Language (UML): Unified modeling language has come in to use
with the rise of object oriented development and provides an unambiguous model of the system
to be implemented. UML syntax and notations describes thoroughly and completely that how to
use UML in the context of object oriented application development method (Schmuller, 2004).
2.8.1 Use Case Diagram: Users interact with a system by interacting with its use cases. It is
essential that the buyer and the builder of the system agree on this black box view in order to
know that the right System Being built.
Class diagram of this system shows all the entity and their processes like job seeker is an entity
and it perform the all function of the job portal like name age email and other information,
gender job type and record and manage all its function.
FIGURE#5
2.11. DFD FOR FCJPS:
Data flow diagram for end user. Get Information about pharmacy
2.13 Data Flow of Admin: Figure # 8 of admin data flow in this data flow admin can
handle the whole flow of the site he can post the jobs edit the jobs delete the jobs and approved
the applied jobs. He has the full authorization of site.
2.14 Whole system data flow diagram and working:
SYSTEM
The most creative and challenging phase of the system life cycle is system design. It refers to
technical specification that was applied in implementing the system. The purpose of system
design is to transform the information models that were developed during analysis to model that
confirm to target technology which was used for system implementation.
Input design
• Output design
• Database design
2.16.1 Input Design:
The input design includes the development of procedures and specifications for all aspect of data
entry and data input. Data capture refers to the identification and recording of source data. Data
entry is the process of converting source data into a computer readable form.
Most common way of data entry is form filling. Data can be retrieved display and credit after
entry using the same display. Following points are considered during the form design:
• Messages remains on the screen long enough to be read.
• Screen presentation is consistent.
It plays an important role where several fields have a number of known values. Thus its
significant can be ignoring. Codes are used due to following reasons
• Save computer storage.
• Checking code is easier.
• Speed up data retrieval.
• Uniqueness can be enforced.
Output design phase of any system have system output which can be in the form of queries and
reports. The form of the reports and queries should be decided in the beginning of the system
design so it is necessary of the successful implementation of the system that its outputs.
• Executive users
• Executive preferences
• Alternative design
• Executive feedback
• Screen space limitations
• Text
The data is stored in computer in the form of tables so far an accurate and free of anomalies
system the tables designing is further divided into parts;
For apply
TABLE#1
CHAPTER NO: 3
SYSTEM REQUIRMENT:
The functional requirements are the functionalities of a system. Getting required functional
requirements is the most important part of software development, so this part needs proper time
and concentration. The FCJPS has different functional requirements which we have gathered
with the help of our supervisor. Some functional requirements of FCJPS are given below with
brief description.
3.1.1. Authorized Login:
The system would provide access (admin panel) to authorized users. Unauthorized users can’t
get access to the system. The user of the system can get access to the FCJPS by putting correct
username and password.
3.1.2. User Characteristics:
End User
Every user should be comfortable of working with computer and net browsing. He
must have basic knowledge of English too. He has must be some knowledge of
how to use any websites.
Administrator
Administrator is an entity that will manage entire system.. An administrator can
cover areas such as database, security and integration. He can view, modify or
delete records. He can do all kind of alterations in the database.
A non-functional requirement is a requirement that specifies criteria that can be used to judge the
operation of a system, rather than specific behaviors. Non-functional requirements are
"constraints", "quality attributes", and "non-behavioral requirements. Non-Functional
Requirements includes following.
Interactive
Our system is very interactive to use, all functionalities and features are visible
and easy to use.
Security
Unauthorized person cannot access system software side and a person with fake
ID & password cannot access any activity.
Portability
We can transfer a system or component of our project from one environment to
another. We can deploy our project in any organization.
Performance
Our display system work 24/7. Our display will not be downgraded while
running.
3.2 Out Put Of The Developed System:
The new system has many implications and has many advantages over the existing system some
of the advantages are:
3.2.1 Speed And Accuracy:
The primary objectives of the new developed system are to provide speed and accuracy during
data processing and report generation. This system should provide timely correct retrieval of
information in an accurate and efficient manner.
3.2.2 Efficiency And Flexibility:
Provide efficient data maintenance and storage for different suppliers the system must be flexible
and capable of adapting to changing environmental conditions.
3.2.3 Managerial Acceptability:
The data updating can be made in all easy way so that the management in obtaining any type of
report may not face any problems in dealing with it.
3.2.4 Eliminating Data Redundancy:
New system removes optimum redundancies which are present in the existing system. So it have
been tried to avoid redundancy as much as possible.
To provide user friendly environment for all users even having basic knowledge about the
system. No specific computer staff was required relevant personal can easily process further and
access the required information.
3.2.6 Security:
Security in a system is very important security provide protecting system data from deliberate
damage accidental damage or access by unauthorized persons. Security is a very huge problem in
the new era. Because of threats we have maintain the security standards.
3.2.7 Economy:
The database system is more economical and efficient as compared with manual system. Because
in manual system stationary as well as large staff is involved the records keeping that constitute
high cost. Hence database system was very beneficial economically.
3.2.8 Data Entry:
User can enter data through forms and this stored in database. We can see this data in database.
We can generate reports from this data.
3.2.9 Time Saving:
Everyone wants quick response to his queries because decisions are based on up to date
information. Due to high speed of processing the computerized system takes less time to access
information from database.
3.2.10 Amendment Of Data:
In manual system the process of amendment of record is time consuming and inefficient process.
To remove this drawback it has been to make many changes in data whenever it occurs.
3.2.11 Neat and Clean Setup:
The manual system lacks cleanliness because the files which are not regularly accessible are
usually found full of dust. The updating and deletion process also cause a lot of disorganization
and clutter. The computerized system provides a neat and clean setup.
3.3USER MANUAL :
Open the Web Browser and write the given code in URL//: BAR
3.3.1Localhost/Pharmacy management system/index.php
FIGURE#12
After giving the exact name and password you get in the ADMIN main
preview.
FIGURE #13
HNIVERSITY OF AGRICULTURE FAISALABAD Page 37
PHYSICAL ASSEST TRACKING AND MANAGEMENT
FIGURE # 14
Due to the findings from carrying out this research on Online Pharmaceutical Management
System, some points to consider in its implementation in the future include: 1. A platform
capable of use at a regional/national level 2. Strict security measures put in place to prevent an
abuse of the application in general
A number of limitations were encountered in the course of preparing this research work. One of
such was in the creation of the tables in the database of the system. Due to the size of the system,
many tables had to be created to accommodate all the data required in the management system.
Also, implementing security features on the system proved to be a challenge as the application is
yet to be tested on a national/regional level
CONCLUSION:
The management system employs strict measures to protect the users from intruders or
outsiders. One of such measures is the inability of a prospective user to register on the platform
without the permission of the administrators. To register on the platform, all necessary details
such as: name, address, tax documents, payment methods, and relevant licenses are sent to the
administrator for proper verification. When the authenticity of these documents have been
proven, the administrator then creates the account for the customer and forwards the details for
login to the management system. Also, since the drugs purchased through the platform are for
pharmaceutical purposes, and as such, are ordered in bulk, if a small quantity of drugs is ordered,
the administrators are notified, who then confirms the order from the pharmacy to ensure that an
intruder has not obtained their login details. This research work dealt with Online
Pharmaceutical Management Systems. It is eminent that the system provides a safe, secure and
verified platform for all parties which help to bridge the communication gap and provide
legitimate drugs. Because drugs are harmful when abused or misused by individuals or
organizations, security checks have been added to the design logic. Therefore, if all
recommendations are strictly adhered to, there will be strict monitoring and regulation of how
drugs are circulated and a decrease in the spread of fake drugs.
Survey 3 Days
ANALYSIS/Design 9 Days
PHP Coding 11 Days
Error of PHP in Coding 13 Days
Total 5 Weeks