SlideShare a Scribd company logo
1 of 69
P a g e | 1
A
PROJECT REPORT
ON
“BARCODE VERIFICATION”
BY
MR. DURGESH GULABRAO PATIL
SUBMITTED IN PARTIAL FULFILMENT OF
MASTER OF COMPUTER APPLICATION
SAVITRIBAI PHULE PUNE UNIVERSITY
FOR THE ACADEMIC YEAR
2022 – 2023
PROF. JAVED ATTAR
MET’s INSTITUTE OF ENGINEERING,
BHUJBAL KNOWLEDGE CITY,
ADGAON, NASHIK- 422003
SAVITRIBAI PHULE PUNE UNIVERSITY
P a g e | 2
A
PROJECT REPORT
ON
PROJECT TITLE
“Barcode Verification”
Mr. Durgesh Gulabrao Patil
Submitted In Partial Fulfilment Of
MASTER OF COMPUTER APPLICATION
Savitribai Phule Pune University
For The Academic Year
(2022-2023)
Under The Guidance of
Prof. Javed Attar
MET’s INSTITUTE OF ENGINEERING,
BHUJBAL KNOWLEDGE CITY,
ADGAON, NASHIK- 422003
P a g e | 3
Department of Master of Computer Application
Affiliated to
Savitribai Phule Pune University
CERTIFICATE
This is to Certify that project entitled
“Barcode Verification”
Has been satisfactorily completed by
Mr. Durgesh Patil
In Partial Fulfillment of Project Work for the
Under Degree In Master Of Computer Application
Under the Faculty of Engineering
For the Academic year 2022 – 2023
Prof. Javed Attar Prof. P. D. Jadhav
(Project Guide) (H.O.D)
Signed By Dr. V. P. Wani
(External Examiner) (Principal)
P a g e | 4
INTERNSHIP CERTIFICATE
P a g e | 5
NO CODE CERTIFICATE
P a g e | 6
ACKNOWLEDGEMENT
It gives a great pleasure to acknowledge our deep sense of gratitude
of our project Barcode Verification Application. The satisfaction that
accompanies the successful completion of any task would be incomplete
without the mention of people who made it possible and whose constant
guidance and encouragement crown all the efforts with success. This
acknowledgement transcends the reality of formality When we would like
to express deep gratitude and respect to all those people who guided,
inspired and helped us for the completion of our project.
I take opportunity to express our profound gratitude and thanks to
whom we held in height esteem.
Mr. Yogesh Rasal
(Proprietor.)
I would like to thank him for giving this great opportunity to me and for
his continual support and guidance till the end of the project.
Mr. Ashutosh Karve
(Project Manager- Sofsyst.)
I would like to thank him for providing unlimited resources and for giving
constant encouragement throughout the project and also for providing
depth knowledge in C#, ASP.NET, MSSQL and for him guidance and great
P a g e | 7
support in studying, designing and development of the system, required
towards the completion of the project.
Prof. P. D. Jadhav
(Head of the Dept. of MCA, MET BKC IOE College, Nashik)
I would like to thank her for her qualified guidance, valuable suggestions
and constant encouragement throughout the course and project.
Prof. Javed Attar
(Project coordinator MET BKC IOE College, Nashik)
I would like to thank Prof. Javed Attar for her qualified guidance, valuable
suggestions And constant encouragement throughout the course and
project and also for giving her valuable time and help for my
documentation.
Prof. Javed Attar
(Project Guide MET BKC IOE College, Nashik)
I would like to thank Prof. Javed Attar for her qualified guidance, valuable
suggestions And constant encouragement throughout the course and
project and also for giving her valuable time and help for my
documentation.
Mr. Durgesh Gulabrao Patil
P a g e | 8
ABSTRACT
Barcodes are a technology for automatic identification which has
found application in many business sectors. As we know that bar codes have
many applications, they have been most used in segments of the retail
grocery as well as consumer goods industries. They use computers for
barcodes detection. A bar code has a self-contained message whose
information is encoded in the geometry of its printed bars and spaces.
Barcode is read, the patterns of light and dark contained in the bars
and spaces are translated into patterns of ones and zeros which the reading
computer interprets as numeric or alphanumeric data. In a simple bar code
system, her codes are read by passing a wand containing a light source and
a photo-diode across the code to be read.
P a g e | 9
CONTENTS
1. Introduction
1.1 Company Profile
1.2 Overview
1.3 Details Description of Technology Used
1.4 Purpose
1.5 Scope
2. Literature Survey
2.1 Introduction
2.2 Barcode Standards
2.3 Barcode Application
3. Feasibility Study
3.1. Technical Feasibility
3.2. Market Analysis
3.3 Economic Feasibility
P a g e | 10
4. Requirement Analysis
4.1. System Requirement
4.1.1. Hardware Requirement
4.1.2. Software Requirement
4.2. User Requirement
5. System Design
5.1. System Design
5.2. DFD Diagram
5.1.1. DFD Diagram Level 0
5.1.2 DFD Diagram Level 1
5.3. ER Diagram
5.4. Use Case Diagram
5.5. Activity Diagram
P a g e | 11
6. Data Dictionary
6.1 Login
6.2 Model
6.3 Vender
6.4 Barcode Verify
6.5 User
7. Test Procedure and Implementation
7.1 Test Case For Login Function
7.2 Test Case For Add Model Function
7.3 Test Case For Barcode Verify
7.4 Test Case For Add User
7.5 Test Case For Log By
7.6 Test Case For Vender
7.7 Test Case For Report
P a g e | 12
8. Screen Shot
8.1 Login Page
8.2 Login Successful
8.3 Dashboard
8.4 Add Model
8.5 Add Vender
8.6 Barcode Verify
8.7 Barcode Mismatch
8.8 Barcode Duplicate
8.9 Show Category
8.10 Show Model No
8.11 Add User
8.12 Log By
8.13 Report Model No
8.14 Report All
8.15 Report Select Date
8.16 Report Show general
8.17 Barcode Verification Report
8.18 User Access
9. Advantages and Disadvantages
9.1 Advantages
9.2 Disadvantages
P a g e | 13
10. Conclusion and Future Enhancement
10.1 Conclusion
10.2 Future
11. References
11.1 Websites
P a g e | 14
List Of Figure
5.2 DFD Diagram
5.1.1. DFD Diagram Level 0
5.1.2 DFD Diagram Level 1
5.3. ER Diagram
5.4. Use Case Diagram
5.5. Activity Diagram
8.1 Login Page
8.2 Login Successful
8.3 Dashboard
8.4 Add Model
8.5 Add Vender
8.6 Barcode Verify
8.7 Barcode Mismatch
8.8 Barcode Duplicate
8.9 Show Category
8.10 Show Model No
8.11 Add User
8.12 Log By
8.13 Report Model No
8.14 Report All
8.15 Report Select Date
8.16 Report Show general
8.17 Barcode Verification Report
8.18 User Access
P a g e | 15
List Of Table
6.1 Login
6.2 Model
6.3 Vender
6.4 Barcode Verify
6.5 User
7.1 Test Case For Login Function
7.2 Test Case For Add Model Function
7.3 Test Case For Barcode Verify
7.4 Test Case For Add User
7.5 Test Case For Log By
7.6 Test Case For Vender
7.7 Test Case For Report
P a g e | 16
Chapter 1
Introduction
1.1 Company Profile
Company Name : SofSyst Software & System Private Ltd.
Address Of Company : S-19 2nd
floor, City Arcade, Jail Road,
Nashik Road, Nashik- 422101
Company Website : www.sofsyst.com
Contact : 0253-2414888
Introduction Of Sofsyst :
Sofsyst has extensive years of experience in providing customized software
solutions to various industry verticals. Sofsyst has a large pool of skilled and
experienced software engineers to provide you the best solution to satisfy
the growing needs of your organization with easy understandable User
Interface. We help you to optimize business processes and strategies and
maximize profits.
P a g e | 17
Our Organization Provide Quality Software in different Industries. We
Implement Customers ideas with New technology. We Customize your
requirement in our organization and build Interactive Web Application for
you. Design Your World with us and build Attractive Website to interact
with your Customers.
We provide Android and iOS mobile application for low-power handheld
devices, as personal digital assistants, enterprise digital assistants or mobile
phones.
We help you to automate your work with our technology to speed up your
Business and productivity. We Provide SEO and Link Posting to Rank Your
Website top to the search engine. We Provide different solutions in LAN,
WAN and also provide our own software to improve Your Network.
Services Provide:
Software Development
Website Development
Mobile Application Development
Industrial Automation
Search Engine optimization
Customer Satisfaction
P a g e | 18
Our Culture :
We incorporate a work-life balance in a fast-paced and simulating work
environment where flexibility is welcome. Our success is based on
motivated, independent and confident employees. We promote a positive
environment with opportunities for individual growth and development.
Team :
We go all-out to get best talent to support your needs. Software projects are
totally dependent on the competency and the skills of the team. We therefore
ensure that resources are committed, intellectually challenged and are
passionate about the product that they are working on.
Infrastructure :
Our development center has dedicated Infrastructure for creating a
firewalled environment for individual customers. We also have state-of-the-
art communication facilities including a video conferencing setup for close
collaboration. We can also setup point-to-point links if required by the
customer.
P a g e | 19
1.2 Overview
The Barcode Verification is professional bar code verify design software
with certain desktop publishing capabilities. It is designed specifically to
work with your business software and database applications. The printing of
these labels can be done using any printer that supports a Microsoft
Windows driver, Bar code labels, address labels are some examples of what
can be created.
It will easily integrate with any inventory, ERP or POS application for bar
code label generation.
These labels can be used to track inventory or people in Shops, Warehouses,
Government or Corporations. The Barcode Labeler supports several
drawing objects including text, lines, rectangles, ellipses, and bar codes.
P a g e | 20
1.3 Detail Description of Technology Used :
C# :
C# is a simple, modern, general-purpose, object-oriented programming
language developed by Microsoft within its .NET initiative led by Anders
Hejlsberg. This tutorial will teach you basic C# programming and will also
take you through various advanced concepts related to C# programming
language.
C# is pronounced as "C-Sharp". It is an object-oriented programming
language provided by Microsoft that runs on .Net Framework.
By the help of C# programming language, we can develop different types of
secured and robust applications:
o Window applications
o Web applications
o Distributed applications
o Web service applications
o Database applications etc.
ASP.Net:
ASP.NET is a unified web development model integrated with .NET
framework, designed to provide services to create dynamic web applications
and web services. It is built on the Common Language Runtime (CLR) of
the .NET framework and includes those benefits like multi-language
interoperability, type safety, garbage collection and inheritance. Mark
Anders and Scott Guthrie of Microsoft created the first version of ASP.NET
in 1992.
P a g e | 21
It was created to facilitate the development of distributed applications in
structured and object-oriented manner by separating the presentation and 5
content and hence write clean code. ASP.NET uses the code-behind model
to generate dynamic pages based on Model-View-Controller architecture.
They have some the major differences from ASP, an earlier version of
ASP.NET. The object model of ASP.NET has thus significantly improved
from ASP, which makes it fully backward compatible to ASP.
MySql :
MySQL, pronounced either ”My S-Q-L” or ”My Sequel,” is an open source
relational database management system.
It is based on the structure query language (SQL), which is used for adding,
removing, and modifying information in the database. Standard SQL
commands, such as ADD, DROP, INSERT, and UPDATE can be used with
MySQL.
A website that uses MySQL may include Web pages that access
information from a database. These pages are often referred to as “dynamic,”
meaning the content of each page is generated from a database as the page
loads. Websites that use dynamic Web pages are often referred to as
database-driven websites.
Many database-driven websites that use MySQL also use a Web scripting
language like ASP.net to access information from the database. MySQL
commands can be incorporated into the ASP.net code, allowing part or all
of a Web page to be generated from database information.
Because both MySQL and ASP.net are both open source (meaning they are
free to download and use), the ASP.net /MySQL combination has become a
popular choice for database-driven websites.
P a g e | 22
1.4 Purpose
In currently, most of the readers will be having provisions only for reading
from specified set of articles. The reader will not accept labels which are
specified in other languages or formats. Hence the existing system will not
have proper security as well as inability to read according to the wish of user
Barcodes have become a universal tool used by organizations in SCM since
the early 1970s and it is now a multi-billion-dollar business. However,
mounting pressure from a variety of areas is driving organizations to further
increase efficiency, which has led to the rise of RFID. Financial markets
demanding that companies use capital more efficiently and with the advent
of new technologies such as the Internet, consumers now have the ability to
compare prices around the globe, sparking a price war among retailers.
Business needs to be mindful of this trend as it will inevitably lead to tighter
profit margins.
P a g e | 23
1.5 Scope
The proposed 'Barcode Verification System includes all the factors of the
existing system but in more efficient way. Proposed system is developed in
C#.NET under MS SQL SERVER 2005 as back end and 2D barcode
algorithm is used for the implementation Only authorized users can enter in
to the system on entering the correct User name and Password. So
unauthorized users cannot access system.
P a g e | 24
Chapter 2
Literature Survey
2.1 Introduction
This literature review will satisfy the first objective as stated in section
which is to review literature on eBusiness with a view to identifying cases
in the use of barcode and radio frequency identification (RFID) technology
in supply chain management (SCM). The literature review will employ a
topical organization with previous research divided into segments that
represent categories or conceptual subsets relating to the thesis. The review
will consist of the following four distinct sections:
1. Barcodes
2. Radio Frequency Identification
3. Supply Chain Management
4. The Electronic Product Code (EPC)
P a g e | 25
Barcode recognition from an image, which can be used to insert the image
into a Barcode reader. The code can identify the image and retrieve the
portion of the file, which can include details about specific individuals and
organization logos, for example. The Barcode is located in this section.
Barcodes are of two types
i) 1D barcode
ii) 2D Barcode.
1D Barcode encodes the information or data between the parallel lines and
spaces between them, these parallel lines have different widths and different
spaces between them. A 1D barcode can only store the alphanumerical data
if more information is to be stored then the length of the barcode should be
increased.
When a barcode reader device scans the barcode, the reader uses a laser to
read those unique parallel lines and spaces. The barcode reader reads the
code from left to right when scanning it. After that, the barcode reader reads
the pattern of shaded lines on the black and white bar and converts the
encoded data into binary code.
After the information is extracted into a binary form the computer reads the
binary codes and the decoded information or data is displayed in the screen
of the computer screen. Barcodes are made up of 95 blocks out of those 95
blocks barcodes are written in 12 blocks. Three blocks are designated as a
left guard, center guard, and right guard among the 95 total blocks.
P a g e | 26
2.2 Barcode Standards
As with the history of barcodes, most works provide, to some degree,
background information regarding the development of barcode standards.
While most sources examine a number of standards, there is a common facet
among all works in that they discuss the importance of the UPC (Universal
Product Code) standard.
One work in particular by Brown24 provides a thorough insight into the
development of the UPC standard, including its formation and in depth
historical aspects. Regrettably, this book does not explore the use of
barcodes or their application to SCM, as it solely covers the UPC standard
for barcodes and related issues. Most works on barcodes include some
background information regarding the importance and development of the
UPC and the Uniform Code Council (UCC).
P a g e | 27
2.3 Barcode Applications
Barcode technology has been used for decades and during this time has
proved itself as a reliable performer when supporting SCM. Testament to
this is the versatility in which the technology can be adapted to suit specific
applications. There is a plethora of case studies which examine the role of
barcodes within a particular SCM scenario such as Auto Group hits high
notes with new inventory management system and RF cuts processing time
for Lexus car and parts deliveries.
The articles provide a snapshot of specific barcode implementations and, as
with most works of this time, both case studies provide an analysis of how
barcode technology is helping the company improve their SCM processes.
The articles review most aspects and processes of the new system and
outline the benefits realized post implementation.
RFID technology has had a number of substantial technology advancements
of late and as both of these articles were written in 1998, alternative RFID
technology has not been compared in the case studies, which would have
made the case studies much more applicable to this thesis.
P a g e | 28
Chapter 3
Feasibility Study
A feasibility study is made to see if the project on completion will serve the
purpose of the organization for the amount of work, time and effort spent on
it. Feasibility study lets
• The developer to foresee the future of the project and its usefulness.
• Finding out whether a new system is required or not.
• Determining the potentials and drawbacks of the existing system.
• Identification of user requirements and the benefits expected by the user
from the resulting system.
• Finding out the various alternatives available.
• Knowing what should be incorporated in the new system.
• Defining the ingredients and objectives involved in the project. Identifying
whether the proposed system could meet the end needs of the users.
• Providing technical, economic
• Operational Feasibility The proposed system must be evaluated from the
technical point of view first, and if technically feasible their impact on the
organization must be assessed. If compatible, operational system can be
devised. Then they must be tested for economic feasibility.
P a g e | 29
3.1 Technical Feasibility
Technical feasibility study deals with the hardware as well as the software
requirements. The scope was whether the work for the project is done with
the current equipment and the existing software technology has to be
examined in the feasibility study. The outcome was found to be positive.
Technical Feasibility The project appears to be technically feasible. The
system can be developed using web-based, Application-based technologies,
such as C#, Asp.Net and for the user interface, Database management
systems like MSSQL can be used to store Barcode information and Barcode
Verify records. The required technologies and resources are commonly
available, and the development team should possess the necessary expertise.
3.2 Market Analysis
The market for online leave management systems is growing rapidly, as
organizations are increasingly adopting digital solutions for HR processes.
The target market includes businesses of various sizes and industries that
require an efficient and centralized leave management system. Competition
may exist from other software vendors providing similar solutions, but the
unique features and user-friendly interface of this system can give it a
competitive edge.
3.3 Economical Feasibility
The developing system must be justified by cost and benefit a criterion to
ensure that effort taken on the project give the of organization towards the
development of the project. All the operational aspects are considered
carefully. Thus, the project is operationally feasible.
P a g e | 30
Chapter 4
Requirement Analysis
4.1 System Requirement
4.1.1 Software Requirement
Software used:
One of the most difficult tasks is that, the selection of the software, once
system requirement is known is determining whether a particular software
package fits the requirements. After initial selection further security is
needed to determine the desirability of particular software compared with
other candidates. This section first summarizes the application requirement
question and then suggests more detailed comparisons.
1. Operating System : Windows 7/8 or Higher
2. Platform : C#, Asp.NET, MSSQL
3. IDE : Microsoft Visual studio2019 ,Visual studio code
P a g e | 31
4.1.2 Hardware Requirement
The selection of hardware is very important in the existence and proper
working of any software. In the selection of hardware, the size and the
capacity requirements are also important.
1. Processor : Intel i3 or Higher
2. RAM : 4GB
3. Hard Disk : 50 GB or Higher
4. Laser Barcode Scanner : 220 mm Scan Dept
4.2 User Requirement
• System must be user friendly.
• User must have proper authorization.
• System must be easy to operate or access
• GUI must be simple.
• System shall display information to users within few seconds after user
submits requests for that information.
• System should provide flexibility, reliability, usability, performance.
P a g e | 32
Chapter 5
System Design
1. User Interface:
The system will be a web-based application accessible via a browser. The
user interface will consist of separate interfaces for the Admin and users.
Each user interface will have a user-friendly dashboard with relevant
functionalities.
2. User Management:
The Admin user interface will have options to enroll new users and add
them to the system. Admins can assign roles to manage their details (e.g.,
product information, packing details, etc.). Authentication and
authorization mechanisms will be implemented to ensure secure access to
the system.
3. Database:
A database will be used to store user information, and their statuses.
products details, including roles and products status, will be stored.
Products details will be associated with the respective employees/
customer and their corresponding approval status.
P a g e | 33
4. Security:
The system will implement robust security measures, including
encryption and secure authentication protocols, to protect user data and
prevent unauthorized access.
5. Integration and Scalability:
The system can be integrated with existing p management systems to
retrieve product data. It should be designed to handle a growing number
of users and leave applications without sacrificing performance.
This system design provides a high-level overview of the key components
and functionalities of the e-business Management System. Further details
and specific technologies to be used can be determined during the
implementation phase.
P a g e | 34
5.1 DFD Diagram
5.1.1. DFD Level 0 :
P a g e | 35
5.1.2 DFD Level 1 :
P a g e | 36
5.2 ER Diagram :
P a g e | 37
5.3 Use Case Diagram :
P a g e | 38
5.4 Activity Diagram :
P a g e | 39
Chapter 6
Data Dictionary :
6.1 Login
Name Datatype Constraints
Log By Varchar(30) Not Null
User Name Varchar(30) Not Null
Password Varchar(30) Not Null
6.2 Model
Name Datatype Constraints
Model ID Int Primary Key
Model No Int Not Null
Model Name Varchar(20) Not Null
Model Image Varchar(20) Not Null
P a g e | 40
6.3 Vender
Name Datatype Constraints
Vender Id Int Primary Key
Vender Name Varchar(20) Not Null
6.4 Barcode Verify
Name Datatype Constraints
Sr. No. Int Not Null
Model No. Int Not Null
Model Name Varchar(30) Not Null
Vender Name Varchar(30) Not Null
Model Image Varchar(30) Not Null
Verification Varchar(30) Not Null
6.5 User
Name Datatype Constraints
User Name Varchar(30) Not Null
Password Varchar(30) Not Null
Mobile No. Int Not Null
Role Varchar(30) Not Null
P a g e | 41
Chapter 7
Test Procedure and Implementation
7.1 Test Case For Login Functionality
Test Case ID : Login
Test Priority : High Module Name : Login
Test Case : Validation Of Login Module.
Description : This test case will validation the login
functionality.
Precondition : User Should enter the correct URL and
should have registration username and password.
Post Condition : User should navigate to dashboard page.
P a g e | 42
Chapter 8
Screen Shot
8.1 Login Page:
P a g e | 43
8.2 Login Successful
P a g e | 44
8.3 Dashboard :
P a g e | 45
8.4 Add Model:
P a g e | 46
8.5 Add Vender:
P a g e | 47
8.6 Barcode Verify:
P a g e | 48
8.7 Barcode Mismatch :
P a g e | 49
8.8 Barcode Duplicate :
P a g e | 50
8.9 Show Category :
P a g e | 51
8.10 Show Model No. :
P a g e | 52
8.11 Add User:
P a g e | 53
8.12 Log By:
P a g e | 54
8.13 Report Model No. :
P a g e | 55
8.14 Report All
P a g e | 56
8.15 Report Select Date :
P a g e | 57
8.16 Report Show General :
P a g e | 58
8.17 Barcode Verification Report:
P a g e | 59
8.18 User Access
P a g e | 60
Chapter 9
P a g e | 61
Advantages and Disadvantages
9.1 Advantages
1. Universal
Barcodes are universally accepted technology. They are used behind almost
all of the retail items all around the world. Therefore, using a barcode reader
these products can be read wherever you are present in the world.
2. Accuracy
Human errors can cause problems in every face of the business. Using
barcode readers, the users can significantly reduce the number of mistakes
happening. A barcode reader is considered to be highly accurate than
entering data by hand. Even higher than a RFID technology. Regardless of
the material on which they are scanned, their accuracy remains the same.
3. Productivity
The ability to track data fast and accurate can lead to better decision making
in each department. Thus, the overall productivity of the company is
increased.
4. Time Savings
Always the data of a barcodes are readily shown since the information’s are
directly scanned. Within a fraction of seconds all the necessary details of the
product is given. This is especially beneficial in grocery stores where
P a g e | 62
customers purchase multiple items and each needs to be scanned
individually. Hence, there is very minimal amount of time wasted.
5. Employee Training
The entire training process of a barcode reader is less expensive and simple.
Within a shorter duration, the employees can learn how to use them without
the compensation of other co-workers. Therefore, the training times are
reduced notably for new employees.
6. Inventory Control
Barcode readers makes it easier for the inventory control so precisely.
Whatever the items those are scanned, the informations are passed onto a
computer instantly so that they are calculated through stock inventory. As a
result, they are able to provide inventory status about individual products as
well as company's overall inventory.
P a g e | 63
9.2 Disadvantages
1. Cost
For using a barcode technology, a barcode reader must be purchased which
is quite expensive. The prices are even higher if it is a 2D barcode scanner.
Particularly, for small businesses this cost cannot be justified. A separate
analysis needs to be done for ensuring that the investments of a barcode
reader will be beneficial.
2. Range
In order for a barcode reader to be able to function, it should not be kept
above 15 feet from the barcode label. If it is placed more than that, the
barcode reader will have a problem scanning. For some applications, this
shorter range can cause difficulties.
3. Physical Damages
Barcode readers are easily vulnerable to physical damages. Similar to other
equipment’s, it is too subjected to wears and tears. If it undergoes
damages, it can cause additional costs in repairing.
4. Label Damages
Typically, barcodes are printed on labels which is always exposed to outer
world. This makes it easily prone to environmental damages. Even if one
part of the label is damaged, it can pose problems while scanning.
P a g e | 64
5. Information’s
Barcode readers are able to scan only limited number of information.
Those information’s are only about the product and manufacturers.
information about manufacture date and expiry dates are not included.
6. Security
Not all the barcodes are genuine. There can be malicious barcodes setup by
cybercriminals. If a user happens to scan a malicious barcode, the system
could potentially be taken over by the hacker. Since the USB which
connects the scanner and the computer acts as a secondary keyboard, the
hackers could easily gain access to the operating system.
P a g e | 65
Chapter 10
Conclusion and Future Enhancement
10.1 Conclusion
Barcodes are just a simple, effective way to store data. That data can be
manipulated, stored, or tracked in dozens of different ways to help
eCommerce businesses stay efficient and organized.
They have been proven over decades of use to be reliable and inexpensive,
and their popularity shows no signs of slowing.
You can implement a barcode system in a few hours while spending
virtually nothing, making it tough to find something to complain about this
technology. For any business looking to stay organized, efficient, and error-
free, barcodes a must-have.
P a g e | 66
10.2 Future Enhancement
Barcode Scanning and the Future
With the recent trends of continuous barcode breakthroughs, the future
remains bright. From the innovative bar code scanners for iOS and
Android mobile devices to the lauded bar code apps for Google Glass,
today is indeed an exciting time for barcode scanner manufacturers, retail
businesses, and consumers alike.s
How bar code scanning via Google Glass Works
Since the introduction of Google Glass, app developers have been hard
at work developing innovative applications for the wearable device. From
law enforcement use to apps that allow an individual to control the
functions of an electric car, the software being created for Google Glass
is truly cutting-edge. There are even Google Glass apps that are sure to
win plenty of consumers’ hearts: barcode scanning apps.
Other Barcode Technology Breakthrough Coming Soon
The invention of 2D barcodes (QR codes) is probably the biggest
innovation in barcode technology yet. Coupled with camera-based image
readers, 2D barcodes have opened doors for barcode technology
developers to build solutions and devices tailored to specific industries.
P a g e | 67
Chapter 11
References
11.1 Websites
C# :
https://learn.microsoft.com/en-us/dotnet/csharp/tour-of-csharp/
https://www.tutorialspoint.com/csharp/index.htm
https://en.wikipedia.org/wiki/C_Sharp_(programming_language)
https://www.geeksforgeeks.org/csharp-programming-language/
https://www.codecademy.com/learn/learn-c-sharp
https://www.tutorialsteacher.com/csharp
ASP.Net :
https://www.asp.net/
https://dotnet.microsoft.com/enus/learn/aspnet/what-is-aspnet
https://www.w3schools.com/asp/default.ASP
P a g e | 68
https://www.guru99.com/asp-net-tutorial.html
https://github.com/aspnet
https://en.wikipedia.org/wiki/ASP.NET
MySQL :
https://www.mysql.com/
https://www.w3schools.com/MySQL/default.asp
https://www.javatpoint.com/mysql-tutorial
https://www.tutorialspoint.com/mysql/index.htm
https://github.com/mysql/mysql-server
https://en.wikipedia.org/wiki/MySQL
P a g e | 69

More Related Content

Similar to Barcode Verification Dct.docx

Microsoft Technical Lead Resume (1)
Microsoft Technical Lead Resume (1)Microsoft Technical Lead Resume (1)
Microsoft Technical Lead Resume (1)
Ritanshu Barnwal
 
Veera - Infosys - DotNet Devoloper
Veera - Infosys - DotNet DevoloperVeera - Infosys - DotNet Devoloper
Veera - Infosys - DotNet Devoloper
surendra p.v.
 
Rohit Oza_CV_2015
Rohit Oza_CV_2015Rohit Oza_CV_2015
Rohit Oza_CV_2015
Rohit Oza
 
PALLAVI GUPTA RESUMEE
PALLAVI  GUPTA RESUMEEPALLAVI  GUPTA RESUMEE
PALLAVI GUPTA RESUMEE
PALLAVI GUPTA
 

Similar to Barcode Verification Dct.docx (20)

Can ChatGPT Replace Developers?
Can ChatGPT Replace Developers?Can ChatGPT Replace Developers?
Can ChatGPT Replace Developers?
 
SaravanaRaj Dhamodarran-SA
SaravanaRaj Dhamodarran-SASaravanaRaj Dhamodarran-SA
SaravanaRaj Dhamodarran-SA
 
Abhishek Singh-Resume
Abhishek Singh-ResumeAbhishek Singh-Resume
Abhishek Singh-Resume
 
Microsoft Technical Lead Resume (1)
Microsoft Technical Lead Resume (1)Microsoft Technical Lead Resume (1)
Microsoft Technical Lead Resume (1)
 
Veera - Infosys - DotNet Devoloper
Veera - Infosys - DotNet DevoloperVeera - Infosys - DotNet Devoloper
Veera - Infosys - DotNet Devoloper
 
Household Veritas - A platform that provides household services
Household Veritas - A platform that provides household servicesHousehold Veritas - A platform that provides household services
Household Veritas - A platform that provides household services
 
Shivakumara D R
Shivakumara D R Shivakumara D R
Shivakumara D R
 
Experience - Idea Team
Experience - Idea TeamExperience - Idea Team
Experience - Idea Team
 
Rohit Oza_CV_2015
Rohit Oza_CV_2015Rohit Oza_CV_2015
Rohit Oza_CV_2015
 
APRO Software
APRO SoftwareAPRO Software
APRO Software
 
IRJET- A Survey on Technologies used in Mall Assistant
IRJET- A Survey on Technologies used in Mall AssistantIRJET- A Survey on Technologies used in Mall Assistant
IRJET- A Survey on Technologies used in Mall Assistant
 
LANGUAGE TRANSLATOR APP
LANGUAGE TRANSLATOR APPLANGUAGE TRANSLATOR APP
LANGUAGE TRANSLATOR APP
 
Business Utility Application
Business Utility ApplicationBusiness Utility Application
Business Utility Application
 
rip 1.pdf
rip 1.pdfrip 1.pdf
rip 1.pdf
 
Internship-Report-sample-6.pdf
Internship-Report-sample-6.pdfInternship-Report-sample-6.pdf
Internship-Report-sample-6.pdf
 
Internship-Report-sample-6 (1).pdf
Internship-Report-sample-6 (1).pdfInternship-Report-sample-6 (1).pdf
Internship-Report-sample-6 (1).pdf
 
Cs internship report file 1.pdf
Cs internship report file 1.pdfCs internship report file 1.pdf
Cs internship report file 1.pdf
 
PALLAVI GUPTA RESUMEE
PALLAVI  GUPTA RESUMEEPALLAVI  GUPTA RESUMEE
PALLAVI GUPTA RESUMEE
 
Resume
Resume Resume
Resume
 
Somnath Resume
Somnath ResumeSomnath Resume
Somnath Resume
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Barcode Verification Dct.docx

  • 1. P a g e | 1 A PROJECT REPORT ON “BARCODE VERIFICATION” BY MR. DURGESH GULABRAO PATIL SUBMITTED IN PARTIAL FULFILMENT OF MASTER OF COMPUTER APPLICATION SAVITRIBAI PHULE PUNE UNIVERSITY FOR THE ACADEMIC YEAR 2022 – 2023 PROF. JAVED ATTAR MET’s INSTITUTE OF ENGINEERING, BHUJBAL KNOWLEDGE CITY, ADGAON, NASHIK- 422003 SAVITRIBAI PHULE PUNE UNIVERSITY
  • 2. P a g e | 2 A PROJECT REPORT ON PROJECT TITLE “Barcode Verification” Mr. Durgesh Gulabrao Patil Submitted In Partial Fulfilment Of MASTER OF COMPUTER APPLICATION Savitribai Phule Pune University For The Academic Year (2022-2023) Under The Guidance of Prof. Javed Attar MET’s INSTITUTE OF ENGINEERING, BHUJBAL KNOWLEDGE CITY, ADGAON, NASHIK- 422003
  • 3. P a g e | 3 Department of Master of Computer Application Affiliated to Savitribai Phule Pune University CERTIFICATE This is to Certify that project entitled “Barcode Verification” Has been satisfactorily completed by Mr. Durgesh Patil In Partial Fulfillment of Project Work for the Under Degree In Master Of Computer Application Under the Faculty of Engineering For the Academic year 2022 – 2023 Prof. Javed Attar Prof. P. D. Jadhav (Project Guide) (H.O.D) Signed By Dr. V. P. Wani (External Examiner) (Principal)
  • 4. P a g e | 4 INTERNSHIP CERTIFICATE
  • 5. P a g e | 5 NO CODE CERTIFICATE
  • 6. P a g e | 6 ACKNOWLEDGEMENT It gives a great pleasure to acknowledge our deep sense of gratitude of our project Barcode Verification Application. The satisfaction that accompanies the successful completion of any task would be incomplete without the mention of people who made it possible and whose constant guidance and encouragement crown all the efforts with success. This acknowledgement transcends the reality of formality When we would like to express deep gratitude and respect to all those people who guided, inspired and helped us for the completion of our project. I take opportunity to express our profound gratitude and thanks to whom we held in height esteem. Mr. Yogesh Rasal (Proprietor.) I would like to thank him for giving this great opportunity to me and for his continual support and guidance till the end of the project. Mr. Ashutosh Karve (Project Manager- Sofsyst.) I would like to thank him for providing unlimited resources and for giving constant encouragement throughout the project and also for providing depth knowledge in C#, ASP.NET, MSSQL and for him guidance and great
  • 7. P a g e | 7 support in studying, designing and development of the system, required towards the completion of the project. Prof. P. D. Jadhav (Head of the Dept. of MCA, MET BKC IOE College, Nashik) I would like to thank her for her qualified guidance, valuable suggestions and constant encouragement throughout the course and project. Prof. Javed Attar (Project coordinator MET BKC IOE College, Nashik) I would like to thank Prof. Javed Attar for her qualified guidance, valuable suggestions And constant encouragement throughout the course and project and also for giving her valuable time and help for my documentation. Prof. Javed Attar (Project Guide MET BKC IOE College, Nashik) I would like to thank Prof. Javed Attar for her qualified guidance, valuable suggestions And constant encouragement throughout the course and project and also for giving her valuable time and help for my documentation. Mr. Durgesh Gulabrao Patil
  • 8. P a g e | 8 ABSTRACT Barcodes are a technology for automatic identification which has found application in many business sectors. As we know that bar codes have many applications, they have been most used in segments of the retail grocery as well as consumer goods industries. They use computers for barcodes detection. A bar code has a self-contained message whose information is encoded in the geometry of its printed bars and spaces. Barcode is read, the patterns of light and dark contained in the bars and spaces are translated into patterns of ones and zeros which the reading computer interprets as numeric or alphanumeric data. In a simple bar code system, her codes are read by passing a wand containing a light source and a photo-diode across the code to be read.
  • 9. P a g e | 9 CONTENTS 1. Introduction 1.1 Company Profile 1.2 Overview 1.3 Details Description of Technology Used 1.4 Purpose 1.5 Scope 2. Literature Survey 2.1 Introduction 2.2 Barcode Standards 2.3 Barcode Application 3. Feasibility Study 3.1. Technical Feasibility 3.2. Market Analysis 3.3 Economic Feasibility
  • 10. P a g e | 10 4. Requirement Analysis 4.1. System Requirement 4.1.1. Hardware Requirement 4.1.2. Software Requirement 4.2. User Requirement 5. System Design 5.1. System Design 5.2. DFD Diagram 5.1.1. DFD Diagram Level 0 5.1.2 DFD Diagram Level 1 5.3. ER Diagram 5.4. Use Case Diagram 5.5. Activity Diagram
  • 11. P a g e | 11 6. Data Dictionary 6.1 Login 6.2 Model 6.3 Vender 6.4 Barcode Verify 6.5 User 7. Test Procedure and Implementation 7.1 Test Case For Login Function 7.2 Test Case For Add Model Function 7.3 Test Case For Barcode Verify 7.4 Test Case For Add User 7.5 Test Case For Log By 7.6 Test Case For Vender 7.7 Test Case For Report
  • 12. P a g e | 12 8. Screen Shot 8.1 Login Page 8.2 Login Successful 8.3 Dashboard 8.4 Add Model 8.5 Add Vender 8.6 Barcode Verify 8.7 Barcode Mismatch 8.8 Barcode Duplicate 8.9 Show Category 8.10 Show Model No 8.11 Add User 8.12 Log By 8.13 Report Model No 8.14 Report All 8.15 Report Select Date 8.16 Report Show general 8.17 Barcode Verification Report 8.18 User Access 9. Advantages and Disadvantages 9.1 Advantages 9.2 Disadvantages
  • 13. P a g e | 13 10. Conclusion and Future Enhancement 10.1 Conclusion 10.2 Future 11. References 11.1 Websites
  • 14. P a g e | 14 List Of Figure 5.2 DFD Diagram 5.1.1. DFD Diagram Level 0 5.1.2 DFD Diagram Level 1 5.3. ER Diagram 5.4. Use Case Diagram 5.5. Activity Diagram 8.1 Login Page 8.2 Login Successful 8.3 Dashboard 8.4 Add Model 8.5 Add Vender 8.6 Barcode Verify 8.7 Barcode Mismatch 8.8 Barcode Duplicate 8.9 Show Category 8.10 Show Model No 8.11 Add User 8.12 Log By 8.13 Report Model No 8.14 Report All 8.15 Report Select Date 8.16 Report Show general 8.17 Barcode Verification Report 8.18 User Access
  • 15. P a g e | 15 List Of Table 6.1 Login 6.2 Model 6.3 Vender 6.4 Barcode Verify 6.5 User 7.1 Test Case For Login Function 7.2 Test Case For Add Model Function 7.3 Test Case For Barcode Verify 7.4 Test Case For Add User 7.5 Test Case For Log By 7.6 Test Case For Vender 7.7 Test Case For Report
  • 16. P a g e | 16 Chapter 1 Introduction 1.1 Company Profile Company Name : SofSyst Software & System Private Ltd. Address Of Company : S-19 2nd floor, City Arcade, Jail Road, Nashik Road, Nashik- 422101 Company Website : www.sofsyst.com Contact : 0253-2414888 Introduction Of Sofsyst : Sofsyst has extensive years of experience in providing customized software solutions to various industry verticals. Sofsyst has a large pool of skilled and experienced software engineers to provide you the best solution to satisfy the growing needs of your organization with easy understandable User Interface. We help you to optimize business processes and strategies and maximize profits.
  • 17. P a g e | 17 Our Organization Provide Quality Software in different Industries. We Implement Customers ideas with New technology. We Customize your requirement in our organization and build Interactive Web Application for you. Design Your World with us and build Attractive Website to interact with your Customers. We provide Android and iOS mobile application for low-power handheld devices, as personal digital assistants, enterprise digital assistants or mobile phones. We help you to automate your work with our technology to speed up your Business and productivity. We Provide SEO and Link Posting to Rank Your Website top to the search engine. We Provide different solutions in LAN, WAN and also provide our own software to improve Your Network. Services Provide: Software Development Website Development Mobile Application Development Industrial Automation Search Engine optimization Customer Satisfaction
  • 18. P a g e | 18 Our Culture : We incorporate a work-life balance in a fast-paced and simulating work environment where flexibility is welcome. Our success is based on motivated, independent and confident employees. We promote a positive environment with opportunities for individual growth and development. Team : We go all-out to get best talent to support your needs. Software projects are totally dependent on the competency and the skills of the team. We therefore ensure that resources are committed, intellectually challenged and are passionate about the product that they are working on. Infrastructure : Our development center has dedicated Infrastructure for creating a firewalled environment for individual customers. We also have state-of-the- art communication facilities including a video conferencing setup for close collaboration. We can also setup point-to-point links if required by the customer.
  • 19. P a g e | 19 1.2 Overview The Barcode Verification is professional bar code verify design software with certain desktop publishing capabilities. It is designed specifically to work with your business software and database applications. The printing of these labels can be done using any printer that supports a Microsoft Windows driver, Bar code labels, address labels are some examples of what can be created. It will easily integrate with any inventory, ERP or POS application for bar code label generation. These labels can be used to track inventory or people in Shops, Warehouses, Government or Corporations. The Barcode Labeler supports several drawing objects including text, lines, rectangles, ellipses, and bar codes.
  • 20. P a g e | 20 1.3 Detail Description of Technology Used : C# : C# is a simple, modern, general-purpose, object-oriented programming language developed by Microsoft within its .NET initiative led by Anders Hejlsberg. This tutorial will teach you basic C# programming and will also take you through various advanced concepts related to C# programming language. C# is pronounced as "C-Sharp". It is an object-oriented programming language provided by Microsoft that runs on .Net Framework. By the help of C# programming language, we can develop different types of secured and robust applications: o Window applications o Web applications o Distributed applications o Web service applications o Database applications etc. ASP.Net: ASP.NET is a unified web development model integrated with .NET framework, designed to provide services to create dynamic web applications and web services. It is built on the Common Language Runtime (CLR) of the .NET framework and includes those benefits like multi-language interoperability, type safety, garbage collection and inheritance. Mark Anders and Scott Guthrie of Microsoft created the first version of ASP.NET in 1992.
  • 21. P a g e | 21 It was created to facilitate the development of distributed applications in structured and object-oriented manner by separating the presentation and 5 content and hence write clean code. ASP.NET uses the code-behind model to generate dynamic pages based on Model-View-Controller architecture. They have some the major differences from ASP, an earlier version of ASP.NET. The object model of ASP.NET has thus significantly improved from ASP, which makes it fully backward compatible to ASP. MySql : MySQL, pronounced either ”My S-Q-L” or ”My Sequel,” is an open source relational database management system. It is based on the structure query language (SQL), which is used for adding, removing, and modifying information in the database. Standard SQL commands, such as ADD, DROP, INSERT, and UPDATE can be used with MySQL. A website that uses MySQL may include Web pages that access information from a database. These pages are often referred to as “dynamic,” meaning the content of each page is generated from a database as the page loads. Websites that use dynamic Web pages are often referred to as database-driven websites. Many database-driven websites that use MySQL also use a Web scripting language like ASP.net to access information from the database. MySQL commands can be incorporated into the ASP.net code, allowing part or all of a Web page to be generated from database information. Because both MySQL and ASP.net are both open source (meaning they are free to download and use), the ASP.net /MySQL combination has become a popular choice for database-driven websites.
  • 22. P a g e | 22 1.4 Purpose In currently, most of the readers will be having provisions only for reading from specified set of articles. The reader will not accept labels which are specified in other languages or formats. Hence the existing system will not have proper security as well as inability to read according to the wish of user Barcodes have become a universal tool used by organizations in SCM since the early 1970s and it is now a multi-billion-dollar business. However, mounting pressure from a variety of areas is driving organizations to further increase efficiency, which has led to the rise of RFID. Financial markets demanding that companies use capital more efficiently and with the advent of new technologies such as the Internet, consumers now have the ability to compare prices around the globe, sparking a price war among retailers. Business needs to be mindful of this trend as it will inevitably lead to tighter profit margins.
  • 23. P a g e | 23 1.5 Scope The proposed 'Barcode Verification System includes all the factors of the existing system but in more efficient way. Proposed system is developed in C#.NET under MS SQL SERVER 2005 as back end and 2D barcode algorithm is used for the implementation Only authorized users can enter in to the system on entering the correct User name and Password. So unauthorized users cannot access system.
  • 24. P a g e | 24 Chapter 2 Literature Survey 2.1 Introduction This literature review will satisfy the first objective as stated in section which is to review literature on eBusiness with a view to identifying cases in the use of barcode and radio frequency identification (RFID) technology in supply chain management (SCM). The literature review will employ a topical organization with previous research divided into segments that represent categories or conceptual subsets relating to the thesis. The review will consist of the following four distinct sections: 1. Barcodes 2. Radio Frequency Identification 3. Supply Chain Management 4. The Electronic Product Code (EPC)
  • 25. P a g e | 25 Barcode recognition from an image, which can be used to insert the image into a Barcode reader. The code can identify the image and retrieve the portion of the file, which can include details about specific individuals and organization logos, for example. The Barcode is located in this section. Barcodes are of two types i) 1D barcode ii) 2D Barcode. 1D Barcode encodes the information or data between the parallel lines and spaces between them, these parallel lines have different widths and different spaces between them. A 1D barcode can only store the alphanumerical data if more information is to be stored then the length of the barcode should be increased. When a barcode reader device scans the barcode, the reader uses a laser to read those unique parallel lines and spaces. The barcode reader reads the code from left to right when scanning it. After that, the barcode reader reads the pattern of shaded lines on the black and white bar and converts the encoded data into binary code. After the information is extracted into a binary form the computer reads the binary codes and the decoded information or data is displayed in the screen of the computer screen. Barcodes are made up of 95 blocks out of those 95 blocks barcodes are written in 12 blocks. Three blocks are designated as a left guard, center guard, and right guard among the 95 total blocks.
  • 26. P a g e | 26 2.2 Barcode Standards As with the history of barcodes, most works provide, to some degree, background information regarding the development of barcode standards. While most sources examine a number of standards, there is a common facet among all works in that they discuss the importance of the UPC (Universal Product Code) standard. One work in particular by Brown24 provides a thorough insight into the development of the UPC standard, including its formation and in depth historical aspects. Regrettably, this book does not explore the use of barcodes or their application to SCM, as it solely covers the UPC standard for barcodes and related issues. Most works on barcodes include some background information regarding the importance and development of the UPC and the Uniform Code Council (UCC).
  • 27. P a g e | 27 2.3 Barcode Applications Barcode technology has been used for decades and during this time has proved itself as a reliable performer when supporting SCM. Testament to this is the versatility in which the technology can be adapted to suit specific applications. There is a plethora of case studies which examine the role of barcodes within a particular SCM scenario such as Auto Group hits high notes with new inventory management system and RF cuts processing time for Lexus car and parts deliveries. The articles provide a snapshot of specific barcode implementations and, as with most works of this time, both case studies provide an analysis of how barcode technology is helping the company improve their SCM processes. The articles review most aspects and processes of the new system and outline the benefits realized post implementation. RFID technology has had a number of substantial technology advancements of late and as both of these articles were written in 1998, alternative RFID technology has not been compared in the case studies, which would have made the case studies much more applicable to this thesis.
  • 28. P a g e | 28 Chapter 3 Feasibility Study A feasibility study is made to see if the project on completion will serve the purpose of the organization for the amount of work, time and effort spent on it. Feasibility study lets • The developer to foresee the future of the project and its usefulness. • Finding out whether a new system is required or not. • Determining the potentials and drawbacks of the existing system. • Identification of user requirements and the benefits expected by the user from the resulting system. • Finding out the various alternatives available. • Knowing what should be incorporated in the new system. • Defining the ingredients and objectives involved in the project. Identifying whether the proposed system could meet the end needs of the users. • Providing technical, economic • Operational Feasibility The proposed system must be evaluated from the technical point of view first, and if technically feasible their impact on the organization must be assessed. If compatible, operational system can be devised. Then they must be tested for economic feasibility.
  • 29. P a g e | 29 3.1 Technical Feasibility Technical feasibility study deals with the hardware as well as the software requirements. The scope was whether the work for the project is done with the current equipment and the existing software technology has to be examined in the feasibility study. The outcome was found to be positive. Technical Feasibility The project appears to be technically feasible. The system can be developed using web-based, Application-based technologies, such as C#, Asp.Net and for the user interface, Database management systems like MSSQL can be used to store Barcode information and Barcode Verify records. The required technologies and resources are commonly available, and the development team should possess the necessary expertise. 3.2 Market Analysis The market for online leave management systems is growing rapidly, as organizations are increasingly adopting digital solutions for HR processes. The target market includes businesses of various sizes and industries that require an efficient and centralized leave management system. Competition may exist from other software vendors providing similar solutions, but the unique features and user-friendly interface of this system can give it a competitive edge. 3.3 Economical Feasibility The developing system must be justified by cost and benefit a criterion to ensure that effort taken on the project give the of organization towards the development of the project. All the operational aspects are considered carefully. Thus, the project is operationally feasible.
  • 30. P a g e | 30 Chapter 4 Requirement Analysis 4.1 System Requirement 4.1.1 Software Requirement Software used: One of the most difficult tasks is that, the selection of the software, once system requirement is known is determining whether a particular software package fits the requirements. After initial selection further security is needed to determine the desirability of particular software compared with other candidates. This section first summarizes the application requirement question and then suggests more detailed comparisons. 1. Operating System : Windows 7/8 or Higher 2. Platform : C#, Asp.NET, MSSQL 3. IDE : Microsoft Visual studio2019 ,Visual studio code
  • 31. P a g e | 31 4.1.2 Hardware Requirement The selection of hardware is very important in the existence and proper working of any software. In the selection of hardware, the size and the capacity requirements are also important. 1. Processor : Intel i3 or Higher 2. RAM : 4GB 3. Hard Disk : 50 GB or Higher 4. Laser Barcode Scanner : 220 mm Scan Dept 4.2 User Requirement • System must be user friendly. • User must have proper authorization. • System must be easy to operate or access • GUI must be simple. • System shall display information to users within few seconds after user submits requests for that information. • System should provide flexibility, reliability, usability, performance.
  • 32. P a g e | 32 Chapter 5 System Design 1. User Interface: The system will be a web-based application accessible via a browser. The user interface will consist of separate interfaces for the Admin and users. Each user interface will have a user-friendly dashboard with relevant functionalities. 2. User Management: The Admin user interface will have options to enroll new users and add them to the system. Admins can assign roles to manage their details (e.g., product information, packing details, etc.). Authentication and authorization mechanisms will be implemented to ensure secure access to the system. 3. Database: A database will be used to store user information, and their statuses. products details, including roles and products status, will be stored. Products details will be associated with the respective employees/ customer and their corresponding approval status.
  • 33. P a g e | 33 4. Security: The system will implement robust security measures, including encryption and secure authentication protocols, to protect user data and prevent unauthorized access. 5. Integration and Scalability: The system can be integrated with existing p management systems to retrieve product data. It should be designed to handle a growing number of users and leave applications without sacrificing performance. This system design provides a high-level overview of the key components and functionalities of the e-business Management System. Further details and specific technologies to be used can be determined during the implementation phase.
  • 34. P a g e | 34 5.1 DFD Diagram 5.1.1. DFD Level 0 :
  • 35. P a g e | 35 5.1.2 DFD Level 1 :
  • 36. P a g e | 36 5.2 ER Diagram :
  • 37. P a g e | 37 5.3 Use Case Diagram :
  • 38. P a g e | 38 5.4 Activity Diagram :
  • 39. P a g e | 39 Chapter 6 Data Dictionary : 6.1 Login Name Datatype Constraints Log By Varchar(30) Not Null User Name Varchar(30) Not Null Password Varchar(30) Not Null 6.2 Model Name Datatype Constraints Model ID Int Primary Key Model No Int Not Null Model Name Varchar(20) Not Null Model Image Varchar(20) Not Null
  • 40. P a g e | 40 6.3 Vender Name Datatype Constraints Vender Id Int Primary Key Vender Name Varchar(20) Not Null 6.4 Barcode Verify Name Datatype Constraints Sr. No. Int Not Null Model No. Int Not Null Model Name Varchar(30) Not Null Vender Name Varchar(30) Not Null Model Image Varchar(30) Not Null Verification Varchar(30) Not Null 6.5 User Name Datatype Constraints User Name Varchar(30) Not Null Password Varchar(30) Not Null Mobile No. Int Not Null Role Varchar(30) Not Null
  • 41. P a g e | 41 Chapter 7 Test Procedure and Implementation 7.1 Test Case For Login Functionality Test Case ID : Login Test Priority : High Module Name : Login Test Case : Validation Of Login Module. Description : This test case will validation the login functionality. Precondition : User Should enter the correct URL and should have registration username and password. Post Condition : User should navigate to dashboard page.
  • 42. P a g e | 42 Chapter 8 Screen Shot 8.1 Login Page:
  • 43. P a g e | 43 8.2 Login Successful
  • 44. P a g e | 44 8.3 Dashboard :
  • 45. P a g e | 45 8.4 Add Model:
  • 46. P a g e | 46 8.5 Add Vender:
  • 47. P a g e | 47 8.6 Barcode Verify:
  • 48. P a g e | 48 8.7 Barcode Mismatch :
  • 49. P a g e | 49 8.8 Barcode Duplicate :
  • 50. P a g e | 50 8.9 Show Category :
  • 51. P a g e | 51 8.10 Show Model No. :
  • 52. P a g e | 52 8.11 Add User:
  • 53. P a g e | 53 8.12 Log By:
  • 54. P a g e | 54 8.13 Report Model No. :
  • 55. P a g e | 55 8.14 Report All
  • 56. P a g e | 56 8.15 Report Select Date :
  • 57. P a g e | 57 8.16 Report Show General :
  • 58. P a g e | 58 8.17 Barcode Verification Report:
  • 59. P a g e | 59 8.18 User Access
  • 60. P a g e | 60 Chapter 9
  • 61. P a g e | 61 Advantages and Disadvantages 9.1 Advantages 1. Universal Barcodes are universally accepted technology. They are used behind almost all of the retail items all around the world. Therefore, using a barcode reader these products can be read wherever you are present in the world. 2. Accuracy Human errors can cause problems in every face of the business. Using barcode readers, the users can significantly reduce the number of mistakes happening. A barcode reader is considered to be highly accurate than entering data by hand. Even higher than a RFID technology. Regardless of the material on which they are scanned, their accuracy remains the same. 3. Productivity The ability to track data fast and accurate can lead to better decision making in each department. Thus, the overall productivity of the company is increased. 4. Time Savings Always the data of a barcodes are readily shown since the information’s are directly scanned. Within a fraction of seconds all the necessary details of the product is given. This is especially beneficial in grocery stores where
  • 62. P a g e | 62 customers purchase multiple items and each needs to be scanned individually. Hence, there is very minimal amount of time wasted. 5. Employee Training The entire training process of a barcode reader is less expensive and simple. Within a shorter duration, the employees can learn how to use them without the compensation of other co-workers. Therefore, the training times are reduced notably for new employees. 6. Inventory Control Barcode readers makes it easier for the inventory control so precisely. Whatever the items those are scanned, the informations are passed onto a computer instantly so that they are calculated through stock inventory. As a result, they are able to provide inventory status about individual products as well as company's overall inventory.
  • 63. P a g e | 63 9.2 Disadvantages 1. Cost For using a barcode technology, a barcode reader must be purchased which is quite expensive. The prices are even higher if it is a 2D barcode scanner. Particularly, for small businesses this cost cannot be justified. A separate analysis needs to be done for ensuring that the investments of a barcode reader will be beneficial. 2. Range In order for a barcode reader to be able to function, it should not be kept above 15 feet from the barcode label. If it is placed more than that, the barcode reader will have a problem scanning. For some applications, this shorter range can cause difficulties. 3. Physical Damages Barcode readers are easily vulnerable to physical damages. Similar to other equipment’s, it is too subjected to wears and tears. If it undergoes damages, it can cause additional costs in repairing. 4. Label Damages Typically, barcodes are printed on labels which is always exposed to outer world. This makes it easily prone to environmental damages. Even if one part of the label is damaged, it can pose problems while scanning.
  • 64. P a g e | 64 5. Information’s Barcode readers are able to scan only limited number of information. Those information’s are only about the product and manufacturers. information about manufacture date and expiry dates are not included. 6. Security Not all the barcodes are genuine. There can be malicious barcodes setup by cybercriminals. If a user happens to scan a malicious barcode, the system could potentially be taken over by the hacker. Since the USB which connects the scanner and the computer acts as a secondary keyboard, the hackers could easily gain access to the operating system.
  • 65. P a g e | 65 Chapter 10 Conclusion and Future Enhancement 10.1 Conclusion Barcodes are just a simple, effective way to store data. That data can be manipulated, stored, or tracked in dozens of different ways to help eCommerce businesses stay efficient and organized. They have been proven over decades of use to be reliable and inexpensive, and their popularity shows no signs of slowing. You can implement a barcode system in a few hours while spending virtually nothing, making it tough to find something to complain about this technology. For any business looking to stay organized, efficient, and error- free, barcodes a must-have.
  • 66. P a g e | 66 10.2 Future Enhancement Barcode Scanning and the Future With the recent trends of continuous barcode breakthroughs, the future remains bright. From the innovative bar code scanners for iOS and Android mobile devices to the lauded bar code apps for Google Glass, today is indeed an exciting time for barcode scanner manufacturers, retail businesses, and consumers alike.s How bar code scanning via Google Glass Works Since the introduction of Google Glass, app developers have been hard at work developing innovative applications for the wearable device. From law enforcement use to apps that allow an individual to control the functions of an electric car, the software being created for Google Glass is truly cutting-edge. There are even Google Glass apps that are sure to win plenty of consumers’ hearts: barcode scanning apps. Other Barcode Technology Breakthrough Coming Soon The invention of 2D barcodes (QR codes) is probably the biggest innovation in barcode technology yet. Coupled with camera-based image readers, 2D barcodes have opened doors for barcode technology developers to build solutions and devices tailored to specific industries.
  • 67. P a g e | 67 Chapter 11 References 11.1 Websites C# : https://learn.microsoft.com/en-us/dotnet/csharp/tour-of-csharp/ https://www.tutorialspoint.com/csharp/index.htm https://en.wikipedia.org/wiki/C_Sharp_(programming_language) https://www.geeksforgeeks.org/csharp-programming-language/ https://www.codecademy.com/learn/learn-c-sharp https://www.tutorialsteacher.com/csharp ASP.Net : https://www.asp.net/ https://dotnet.microsoft.com/enus/learn/aspnet/what-is-aspnet https://www.w3schools.com/asp/default.ASP
  • 68. P a g e | 68 https://www.guru99.com/asp-net-tutorial.html https://github.com/aspnet https://en.wikipedia.org/wiki/ASP.NET MySQL : https://www.mysql.com/ https://www.w3schools.com/MySQL/default.asp https://www.javatpoint.com/mysql-tutorial https://www.tutorialspoint.com/mysql/index.htm https://github.com/mysql/mysql-server https://en.wikipedia.org/wiki/MySQL
  • 69. P a g e | 69