Professional Documents
Culture Documents
Sherbimet Report 6th Sem
Sherbimet Report 6th Sem
SHERBIMET
SUBMITED TO
OF
IN YEAR 2020-2021
BY
ii
R. C. Technical Institute
Sola, Ahmedabad - 60
CERTIFICATE
This is to certify that this work of PROJECT-1 Subject & 3350706 Subject Code
of 6th Sem with title: SHERBIMET represents the work of the following
students for the fulfillment of the Certificate of Diploma in Computer
Engineering at R. C. Technical Institute Sola, Ahmedabad - 60, Gujarat, during
the academic year 2 0 2 0 - 2 0 2 1 and the work is completed and found
satisfactory.
iii
ACKNOWLEDGEMENT
Regards,
Vidit Pujara (186400307088)
Parth Rana (186400307091)
iv
ABSTRACT
v
LIST OF FIGURES
SR. FIGURE PAGE
NO NO.
1 ITREAIVE MODEL 11
2 GANTT CHART 15
10 ER DIAGRAM 46
11 LEVEL – 0 DFD 47
vi
LIST OF TABLES
1 ADMIN_TABLE 41
2 SERVICES 41
3 USER_MASTER 42
4 PACKAGE_MASTER 42
5 WORKER_MASTER 43
6 LOGIN_INFO 43
7 BOOKING 44
8 FEEDBACK 44
9 PAYMENTS 45
10 WORKER_PAYOUT 45
vii
Index
1.0 Introduction……………………………………………………………..01
1.1 Project Summary & Profile…………………………………………..02
1.2 Purpose……………………………………………………………….03
1.3 Scope & Objectives…………………………………………………..05
1.4 Technologies…………………………………………………………06
2.0 Project Management……………………………………………………09
2.1 Project Planning……………………………………………………...10
2.1.1 Project Development Approach & Planning…………………..10
7.0 Testing………..…..………...………………………………..................109
7.1 Testing Plan And Strategy………………………………………….110
9.0 Conclusion……………………………..…………………..................120
9.1 Conclusion………………...………………………………………121
10.0 References………………………………………………..................122
10.1 Websites………………...………………………………………123
ix
SHERBIMET 186400307088 | 186400307091 | 186400307098
Chapter 1
Introduction
➢ Whichever service will the user need he/she can apply for it.
➢ The be according to the work. If he/she wants to hire for cleaning then he/she
need to enter the area of place in sq. feet. Or he/she need pricing will to hire
for cooking then he/she need to enter number of members and what they
prefer to eat.
➢ Then according to their input system will send request to workers by matching
profiles with user input and whoever will accept the request system will
allocate worker/s to the client.
➢ At any time, the user doesn’t like the work he/she can apply for replacement.
Within 48 hours system will allocate another worker to them.
➢ User has to make payments monthly, quarterly, half-year, yearly in the app
only through their credit card, debit card, net banking, Paytm, etc. He/she can
get the invoice through mail as well as in the app also.
➢ Workers will be paid monthly according to their work done in their bank
accounts directly.
➢ User can give their feedbacks in the worker's profile.
➢ User can even refer a worker and can apply for his/her profile.
➢ Workers can also get their workplace in the app and get navigated to that
place.
➢ Workers can also apply for their profile through our call service.
1.2 PURPOSE
TRUST:
MIGRANTS:
As India is a developing country, we do not have all the facilities in every city.
So, people migrant from one place to another place for different reasons like
for studies, job, business, better living, etc. But when they came to metro
cities, they face some problems as they are new here. They face major
RCTI (CE) 3|Page
SHERBIMET 186400307088 | 186400307091 | 186400307098
For that our application “Sherbimet” can provide them multiple option and if
they don’t like the service, they can request for new maid also.
SAVING TIME:
In cities like Mumbai where people don’t have time to breathe, they face
difficulty in hiring maids as it takes too much time. Mumbai, where people
comes from all corners of the country. Here they can hire maid through their
mobile phones by just searching their need on “Sherbimet” and done. What
they need to do is just some clicks and everything will be on their fingertips.
WORKING PARENTS:
As the time has changed, today both husband and wife work together and
some of them have babies too. But to manage the expenses the have to work.
For their babies they can find trusted baby sitters on “Sherbimet”. As
described above all workers are verified.
SCOPE
➢ The scope defines the boundaries of the proposed system.
OBJECTIVE
➢ We want to provide a quality service to our users.
Platform: Windows 10
JAVA
➢ The language derives much of its syntax from C and C++, but it has fewer
low-level facilities than either of them.
ANDROID
➢ Android is the most widely used operating system on a mobile phone today.
➢ The selling of android OS is higher than the windows, iOS, and Mac
operating systems.
MY SQL
➢ A relational database organizes data into one or more data tables in which data
types may be related to each other.
➢ SQL is a language programmer use to create, modify and extract data from
the relational database, as well as control user access to the database.
➢ MySQL has stand-alone clients that allow users to interact directly with a
MySQL database using SQL, but more often MySQL is used with other
programs to implement applications that need relational database capability.
PHP
Chapter 2
PROJECT MANAGEMENT
Project planning is one of the major tasks that are performed during the
development of the project. Using project planning, the task of finding the size
of the project is done and with that total amount of time and cost required for
the project is calculated.
The approach to develop the software system should follow some systematic
way i.e. Software Development Life Cycle. Using the upper-level analysis
and the environment of the project, Which life cycle model would fit properly
for this project was judged. After deciding the proper software development
lifecycle model, the development of this project according to the model was
done.
➢ The project is done based on the decided development life cycle model. We
decide on the Iterative Waterfall Model for our application.
RCTI (CE) 10 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
“The iterative waterfall model provides feedback paths from every phase to
its preceding phases, which is the main difference from the classical waterfall
model.”
Feedback paths introduced by the iterative waterfall model are shown in the
figure below.
RCTI (CE) 11 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
When errors are detected at some later phase, these feedback paths allow
correcting errors committed by programmers during some phases. The
feedback paths allow the phase to be reworked in which errors are committed
and these changes are reflected in the later phases. But there is no feedback
path to the stage – feasibility study, because once a project has been taken, it
does not give up the project easily. It is good to detect errors in the same phase
in which they are committed. It reduces the effort and time required to correct
the errors.
➢ Feedback Path: In the classical waterfall model, there are no feedback paths,
so there is no mechanism for error correction. But in iterative waterfall model
feedback path from one phase to its preceding phase allows correcting the
errors that are committed and these changes are reflected in the later phases.
➢ Simple: The Iterative waterfall model is very simple to understand and use.
That’s why it is one of the most widely used software development models.
RCTI (CE) 12 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 13 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
Vidit Pujara
Requirement Collection Parth Rana
Shubham Sagar
Vidit Pujara
Analysis Parth Rana
Shubham Sagar
Vidit Pujara
Design Parth Rana
Shubham Sagar
Vidit Pujara
Implementation Parth Rana
Shubham Sagar
RCTI (CE) 14 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RISK IDENTIFICATION
Risk is an inevitable concept of the softer project and it mainly concerns future
happenings. We want to produce a well working system; therefore, we must
consider all the possible defects and unexpected conditions.
RCTI (CE) 15 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RISK ANALYSIS
Risk analysis is a review of the risks associated with an event or action. It is
applied to projects, information technology, security issues and any action
where risks may be analysed on a quantitative and qualitative basis.
RISK PLANNING
A risk is a list of all risks that threaten the project, along with a plan to mitigate
some or all those risks. If there were no uncertainty, then every project plan
would be accurate, and every project would go off without a hitch. Usually at
the most inconvenient times. The risk plan is an insurance policy against
uncertainty.
Into higher the mitigation response is the action plan to eliminate, reduce or
minimize the probability of a risk event occurring and or the impact of the
project risk event should it occur.
Here are several reasons why risks may occur within a typical project:
➢ Changing circumstances, updates, and new developments.
RCTI (CE) 16 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
All risk management processes follow the same basic steps, although
sometimes different jargon is used to describe these steps. Together these 5
risk management process steps combine to deliver a simple and effective risk
management process.
Step 1: Identify the Risk. You and your team uncover, recognize and describe
risks that might affect your project or its outcomes. There are several
techniques you can use to find project risks. During this step, you start to
prepare your Project Risk Register.
Step 2: Analyse the risk. Once risks are identified you determine the
likelihood and consequence of each risk. You develop an understanding of the
nature of the risk and its potential to affect project goals and objectives. This
information is also input to your Project Risk Register.
Step 3: Evaluate or Rank the Risk. You evaluate or rank the risk by
determining the risk magnitude, which is the combination of likelihood and
consequence. You make decisions about whether the risk is acceptable or
whether it is serious enough to warrant treatment. These risk rankings are also
added to your Project Risk Register.
Step 4: Treat the Risk. This is also referred to as Risk Response Planning.
During this step, you assess your highest ranked risks and set out a plan to
treat or modify these risks to achieve acceptable risk levels. How can you
minimize the probability of the negative risks as well as enhancing the
opportunities? You create risk mitigation strategies, preventive plans and
contingency plans in this step. And you add the risk treatment measures for
the highest ranking or most serious risks to your Project Risk Register.
RCTI (CE) 17 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
Step 5: Monitor and Review the risk. This is the step where you take your
Project Risk Register and use it to monitor, track and review risks.
RCTI (CE) 18 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
Chapter 3
SYSTEM REQUIREMENTS
STUDY
RCTI (CE) 19 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
EXISTING SYSTEM
➢ Existing system is partially offline.
➢ Existing system is complex to understand.
➢ In current system is difficult to manage data.
➢ There is no security provide in current system.
➢ You cannot order for services any time. There is a fix time for booking
services.
➢ If the service provider in the offline market is not someone who has been
appointed for years for a specific task, it might get difficult for you to trust
them, while in online people would be able to choose a trusted professional
by taking a dip at the reviews and ratings which makes it much easier for them
to have decision that they won’t regret almost every time.
➢ In Existing system, you will not get every type of service provider at same
place which makes it frustrating for customer to get specific task done easily
and quickly.
RCTI (CE) 20 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
SCENARIO
➢ The new system reduce time and reduce cost for customers. It is more efficient
for customer.
➢ The new system empowers customers to connect only with authorized service
providers and pick the right one based on the feedback from existing
customers and other factors.
➢ In new system customers rely upon the service providers and feel free to leave
their place with the service provider while performing their other tasks
because the Reliability of service providers is more than existing system.
➢ In new system customers get the pre-priced home services, that’s why they do
not get more confusion for fees of services they pay.
➢ The reviews and ratings help to get an idea of the quality of works the services
providers offer and thus, go with online home service provide that matches
your needs and expectations.
➢ In new system we have Ease of payment, therefore customers can get more
efficient way of payment than offline market. Customer have more efficient
way for manage billing and payment transactions.
➢ With ease of payment feature the service providers an escape from the stress
of the payment and avails their best efforts into their responsibilities. This
feature is also more helpful for the customers to pay in different forms, apart
from cash.
RCTI (CE) 22 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
The main purpose of the system is to provide a better service to the people on
which the can relay. They can get same quality of service any location (if the
area is serviceable).
R1: Registration
User needs to register to use features of the application.
R2: Login
User needs to login to use the service. As the features will be different for
workers and client.
RCTI (CE) 23 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
R3: Search
R4: Payments
R5: Complaints
R5.1: Select worker
RCTI (CE) 24 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
R6: Feedback
R6.1: User can give a feedback about the service on worker’s profile.
Input: give star rating and describe.
Output: Thank you message will be displayed.
R7: Booking
R7.1: After selecting service user can book workers.
R8: Profile
R8.1: User can view workers profile and documents.
Input: User can select on worker profile to view.
Output: Worker’s profile will open and display the information experience
and documents.
R9: My Accounts
R9.1: User or Worker can view and update their profile.
RCTI (CE) 25 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
Input: Can update address, cuisine, house details, family members, visiting
hours.
Output: Data will be updated in database and will reflect on user’s profile.
Output: Data will be updated in database and will reflect on user’s profile.
R10: Payment
Input: Select the date of payment.
ADMIN:
Admin is a user who manages the whole system. He has the maximum rights.
He can Prove or reject worker profile, and can manage their bookings too.
Admin also look after the compliments registered by users. He also manages
the payments.
CLIENT:
Client is a person who want the service he needs to verify only his mobile
number to register. He can easily book service from the app anytime.
RCTI (CE) 26 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
WORKERS:
The people who needs work can register as a worker. They need to provide
some documents and police verification, to register.
RCTI (CE) 27 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 28 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
Chapter 4
SYSTEM ANALYSIS
RCTI (CE) 29 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
TECHNICAL FEASIBILITY:
RCTI (CE) 30 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
➢ Ascertains that the technology chosen for software development has many
users so that they can be consulted when problems arise, or improvements are
required.
OPERATIONAL FEASIBILITY:
RCTI (CE) 32 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 33 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 35 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 36 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 37 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 38 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 39 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
Chapter 5
SYSTEM DESIGN
RCTI (CE) 40 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
• ADMIN_TABLE
• SERRVICES
RCTI (CE) 41 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
• USER_MASTER
• PACKAGE_MASTER
RCTI (CE) 42 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
• WORKER_MASTER
• LOGIN_INFO
Column Name Datatype (Size) Constraint
RCTI (CE) 43 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
• BOOKING
• FEEDBACK
RCTI (CE) 44 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
• PAYMENT
• WORKER_PAYOUT
RCTI (CE) 45 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
5.1.2 ER DIAGRAM
RCTI (CE) 46 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
LEVEL – 0 DFD
RCTI (CE) 47 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 48 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 49 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 50 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
Chapter 6
Implementation
RCTI (CE) 51 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
• GUI vs Non-GUI:
➢ This application has both GUI and Non-GUI based Implementation
Environment.
➢ As we all know that every system has GUI to interact with user, and,
our System also have Non-GUI environment.
• Single vs Multiuser:
➢ One is Admin and others are the one who uses the application or
you can say society members.
RCTI (CE) 52 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
USER APP:
RCTI (CE) 53 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 54 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 55 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 56 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 57 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 58 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 59 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 60 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 61 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 62 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 63 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 64 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 65 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 66 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 67 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 68 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
WORKER APP:
RCTI (CE) 69 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 70 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 71 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 72 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 73 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 74 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 75 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 76 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
ADMIN PANEL:
• Forms and layout
Login Page
RCTI (CE) 78 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
Dashboard
RCTI (CE) 79 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 80 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 81 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 82 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 83 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 84 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 85 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 86 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 87 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 88 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 89 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 90 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 91 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 92 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 93 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 94 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 95 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 96 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 97 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 98 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
RCTI (CE) 99 | P a g e
SHERBIMET 186400307088 | 186400307091 | 186400307098
Chapter 7
Testing
BACK-TO-BACK TESTING:
It is used when different versions of a system are available. They are tested
together and their outputs are compared. Testing can be done to check the
performance of the product.
SYSTEM TESTING:
System Testing typically involves running through every possible input to
verify that it results in the right outputs using the software as an end-user
would. It is needed to improve the performance of the system so user can
have fast processing of all work.
BLACK-BOX TESTING:
The technique of testing without having any knowledge of the interior
workings of the application is called black-box testing. The tester is
oblivious to the system architecture and does not have access to the source
code. Typically, while performing a black-box test, a tester will interact with
the system's user interface by providing inputs and examining outputs
without knowing how and where the inputs are worked upon.
Fig. 7.27
WHITE-BOX TESTING:
White-box testing is the detailed investigation of internal logic and structure
of the code. White-box testing is also called glass testing or open-box
testing. In order to perform white-box testing on an application, a tester
needs to know the internal workings of the code.
The tester needs to have a look inside the source code and find out which
unit/chunk of the code is behaving inappropriately.
GREY-BOX TESTING:
Grey-box testing is a technique to test the application with having a
limited knowledge of the internal workings of an application. In software
testing, the phrase the more you know, the better carries a lot of weight
while testing an application.
RCTI (CE) 113 |
Page
SHERBIMET 186400307088 | 186400307091 | 186400307098
Mastering the domain of a system always gives the tester an edge over
someone with limited domain knowledge. Unlike black-box testing, where
the tester only tests the application's user interface; in grey-box testing, the
tester has access to design documents and the database. Having this
knowledge, a tester can prepare better test data and test scenarios while
making a test plan.
Chapter 8
Limitations and Future
Enhancement
LIMITATIONS
o Bandra
o Borivali
o Church Gate
o Colaba
o Dadar
o Gathkopar
o Juhu
o Malabar Hills
o Malad
o Marins
o Mulun
o Parel
o Thane
o Valkeshvar
o Versova
FUTURE ENHANCHMENT
➢ In coming time we want to launch this app in all the metropolitin cities
of india.
➢ To make app more attractive and responsive.
Chapter 9
Conclusion
CONCLUTION
Chapter 10
REFERENCES
WEBSITES: -
• www.w3schools.com
• https://stackoverflow.com
• www.youtube.com
• https://developer.android.com/
• www.github.com
• http://www.tutorialspoint.com