Final SRS

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

A

PRELIMENERY REPORT
ON

Fake Product Identification System

SUBMITTED TO THE SAVITRIBAI PHULE PUNE UNIVERSITY, PUNE


IN THE PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARDS OF
THE DEGREE

BACHELOR OF ENGINEERING
(Computer Engineering)

BY

Student Name Avishkar Hongekar Roll No: BECOA64


Student Name Anand Jaju Roll No: BECOA68
Student Name Prajwal Bhargade Roll No: BECOA16
Student Name Neel Acharya Roll No: BECOA3

Under The Guidance of


Prof. Guide Name

DEPARTMENT OF COMPUTER ENGINEERING


PCET’s PIMPRI CHINCHWAD COLLEGE OF ENGINEERING SECTOR NO. 26,
PRADHIKARAN, NIGDI, PUNE 411044
2022-2023
SAVITRIBAI PHULE PUNE UNIVERSITY

PCCOE, Department of Computer Engineering 2022


CHAPTER3

SOFTWARE REQUIREMENTS
SPECIFICATION
3.1 INTRODUCTION

The global growth of a technology or product is always fraught with risk in the rapidly
evolving world of technology. Forgery and duplication, which can harm a company’s
reputation and financial performance, and client well-being. The main goal of the
project is to confirm that the customer’s purchased item is as described in the fake
or genuine We have the conventional supply chain in comparison to blockchain.
Typical supply chains offer centralised network where the firm providing the service
or the products holds the data they control the market and the data, making them
vulnerable because they can manipulate it anyway they like.
Blockchain technology aids in addressing the issue of product counterfeiting.
Technology based on blockchain is more secure. A chain will be constructed for that
product’s transactions once it is stored on the network, making it possible to keep
all transaction records for both the product and its present owner. In the blockchain,
all transaction histories will be kept as blocks. In the suggested system, each product
is given a generated QR code that the end user can scan. the product’s full details by
scanning the QR code. We can tell whether a product is genuine or phoney by
scanning the QR code.
3.2 PROJECT SCOPE

The Scope of this system In this project we are using Machine learning and artificial
intelligence technology by using NLP algorithm. It is certainly significantly faster than
looking for an answer in books, but still, it’s far from perfect.

3.3 USER CLASSES AND CHARACTERISTICS

Fast Accurate prediction: Logos can be identified quickly due to the machine’s ability
to learn from experience with the CNN algorithm. Reduce human errors of
identifying whether the product is original or fake is the right of every purchaser. A
Human may err while selecting the product just by looking at the logo, but Deep
Learning (DL) models will provide accurate results. Go through these signs that can
help you identify an original from a counterfeit, and make sure you are not taken for
a ride.
3.4 ASSUMPTIONS AND DEPENDENCIES

Assumption: To generate a hash, the SHA256 algorithm is used.


Dependencies: jspservlet, minig, P2P verification, validate & majority, recovery.

3.5 MATHEMATICAL MODELING

Let S be the Whole system S= I,P,O I-input P-procedure O-output.


Input (I) I= Fake Product Data Where, Data contain Real or Fake products. Procedure
(P), P=I, Using System we can perform operations and Identify the Fake Product
using QR Code and Block chain.

PCCOE, Department of Computer Engineering 2022 3


Output (O) O =System Identify the Fake or real Product.

3.6 FUNCTIONAL REQUIREMENTS

3.6.1 System feature

1. Database: The Personal details of sender and receiver also account details of
sender and receiver stored in database.

2. User: User do the registration on the system for QR code scan.

3. System: In system, Blockchain technology is used to identification of real


products and detects fake products.

3.7 EXTERNAL INTERFACE REQUIREMENT

3.7.1 User Interface:

• Website

• Website Hosting Service


3.7.2 QR Code Scanning application

3.7.3 Hardware Interfaces:

• RAM : 8 GB

• Hard Disk : 40 GB

PCCOE, Department of Computer Engineering 2022


4
• Processor : Intel i5 Processor

3.7.4 Software Interfaces

• Programming Language : Java

• Operating System : Windows 10

3.8 NON - FUNCTIONAL REQUIREMENT

3.8.1 Performance Requirements

The performance of the functions and every module must be well. The overall
performance of the software will enable the users to work efficiently. Performance
of encryption of data should be fast. Performance of the providing virtual
environment should be fast Safety Requirement.
The application is designed in modules where errors can be detected and
solved easily. This makes it easier to install and update new functionality if required.

3.8.2 Safety Requirement

The application is designed in modules where errors can be detected and fixed easily.
This makes it easier to install and update new functionality if required.

PCCOE, Department of Computer Engineering 2022 5


3.8.3 Software Quality Attributes

• Our software has many quality attribute that are given below: -

• Adaptability: This software is adaptable by all users.

• Availability: This software is freely available to all users. The availability of the
software is easy for everyone.

• Maintainability: After the deployment of the project if any error occurs then
it can be easily maintained by the software developer.

• Reliability: The performance of the software is better which will increase the
reliability of the Software.

• User Friendliness: Since, the software is a GUI application; the output


generated is much user friendly in its behaviour.

• Integrity: Integrity refers to the extent to which access to software or data by


unauthorized persons can be controlled.

• Test ability: The software will be tested considering all the aspects.

PCCOE, Department of Computer Engineering 2022


6
3.8.4 Security Requirements:

Users are authenticated using many security phases so reliable security is


provided.

3.9 SYSTEM REQUIREMENTS

3.9.1 software requirements

• RAM : 8 GB
As we are using Machine Learning Algorithm and Various High Level Libraries
Laptop

• RAM minimum required is 8 GB.

• Hard Disk : 40 GB

3.9.2 Hardware requirements

• Processor : Intel i5 Processor

• Programming Language : Java

PCCOE, Department of Computer Engineering 2022 7


• Operating System : Windows 10

3.10 ANALYSIS MODEL (SDLC MODEL)

Figure 3.1: Waterfall Model

PCCOE, Department of Computer Engineering 2022


8
CHAPTER 4

SYSTEMDESIGN

4.1 SYSTEM ARCHITECTURE

Figure 4.1: system Architecture

4.1.1 Data Flow Diagram

In Data Flow Diagram, we Show that flow of data in our system in DFD0 we show
that base DFD in which rectangle present input as well as output and circle show
our system, In DFD1 we show actual input and actual output of system input of our
system is text or image & we present operation of user as well as admin.

PCCOE, Department of Computer Engineering 2022 9


4.1.1.1 Data Flow Diagram Level 0

Figure 4.2: Data Flow diagram

PCCOE, Department of Computer Engineering 2022


10
PCCOE, Department of Computer Engineering 2022 11
4.2 UML DIAGRAMS

Unified Modelling Language is a standard language for writing software blueprints.


The UML may be used to visualize, specify, construct and document the artifacts of
a software intensive system. UML is process independent, although optimally it
should be used in process that is use case driven, architecture-enteric, iterative, and
incremental. The Number of UML Diagram is available.

• Use case Diagram.

• Component Diagram.

• Activity Diagram.

• Sequence Diagram.

PCCOE, Department of Computer Engineering 2022


12
Figure 4.5: Use case Diagram

PCCOE, Department of Computer Engineering 2022 13


Figure 4.6: Activity Diagram

PCCOE, Department of Computer Engineering 2022


14
Figure 4.7: Sequence Diagram

PCCOE, Department of Computer Engineering 2022 15


Figure 4.8: Class Diagram

PCCOE, Department of Computer Engineering 2022


16

You might also like