Professional Documents
Culture Documents
Taqdees Habib
(15-Arid- 1405)
Abdul Moiz
(15-Arid-1295)
Supervised by
Mr. Saif-Ur-Rehman
By
Taqdees Habib
(15-Arid- 1405)
Abdul Moiz
(15-Arid-1295)
Supervised by
II
Dedicated to our beloved parents and to all those, whose
prayers paved the way of our success.
III
PROJECT IN BRIEF
IV
ACKNOWLEDGMENT
ALLAH the almighty gave us the strength to work to complete this project on time and
with the best possible quality and our family and friends who supported us in every step
of life and mostly the past two years of university life.
We would like to thank and sincerely acknowledge the help of our supervisor Mr. Saif
Ur Rehman whose complete guidance, support and encouragement gave us a real
motivation in doing this project.
We would like to thank all the volunteers who helped us out while testing of this
application.
Lastly, we would like to thank all the faculty members of UIIT department for their
help, time, and support that was gladly given to us on the time of need.
Taqdees Habib
(15-ARID-1405)
Abdul Moiz
(15-ARID-1295)
V
DECLARATION
We hereby declare that this project, neither whole or as a part has been copied out from
any source. It is further declared that we have developed this project and accompanied
report entirely on the basis of our personal efforts. If any part of this project is proved
to be copied out from any source or found to be reproduction of some other. We will
stand by the consequences. No Portion of the work presented has been submitted of any
application for any other degree or qualification of this or any other university or
institute of learning.
Taqdees Habib
(15-Arid- 1405)/ BSIT
Abdul Moiz
(15-Arid-1295)/ BSIT
VI
CERTIFICATION
It is certified that the contents and form of the project entitled “Lets Share”
submitted by “Let’s Share” submitted by Taqdees Habib (15-Arid-1405) Abdul
Moiz(15-Arid-1295) has been found satisfactory for the requirements of
Supervisor: _______________________
Mr. Saif-Ur-Rehman
Examiner 1: _______________________
Dr. Saleem Iqbal
Examiner 2: _______________________
Ms. Sidra Tahir
Dated: 01/08/2019
Director: ________________________
VII
ABSTRACT
Traveling in Pakistan is not as easy as it must be, especially for women who have to
face a lot of trouble while traveling in public transport. Because of the poor
infrastructure of public transportation in the country, this is one industry that requires a
lot of attention. Working women and university girls have a face a lot of difficulty in
order find a suitable and trustworthy driver. With Let’s Share, girls and working
women can have access to affordable transportation with no fear and difficulty. This
system is a web and android based system that is designed only for the women. Women
can register both as customer of drivers. The software is designed and developed using
various development tools, technologies, and programming languages.
VIII
TABLE OF CONTENTS
PROJECT IN BRIEF………………………………………………………………..…...IV
ACKNOWLEDGMENT………………………………………………………………..…V
DECLARATION……………………………………………………………………….....VI
CERTIFICATION…………………………………………………………………….....VII
ABSTRACT….……………………………………………………………………….....VIII
Chapter 1……………………………………………………………………................…….1
INTRODUCTION………………………………………………………………………….1
1.7. METHODOLOGY AND SOFTWARE LIFE CYCLE FOR THIS PROJECT .....4
Chapter 2……………………………………………………………………................……6
REQUIREMENT ANALYSIS……………………………………………………….........6
IX
2.2.4 Profile Management ..............................................................................................7
Chapter 3……………………………………………………………………................…..10
X
3.5 ACTIVITY DIAGRAM .......................................................................................36
3.5.4 Overall communication and network between Driver and Passenger ................38
Chapter 4……………………………………………………………………..................…42
PROJECT MANAGEMENT.............................................................................................42
Chapter 5..............................................................................................................................47
IMPLEMENTATION.........................................................................................................47
XI
5.3. SYSTEM REQUIREMENTS ..............................................................................47
Chapter 6……………………………………………………………………................…..49
SOFTWARE TESTING.....................................................................................................49
6.3. SOFTWARE.........................................................................................................49
Chapter 7..............................................................................................................................56
XII
List of Figures
XIII
List of Tables
XIV
Chapter 1
INTRODUCTION
Girls that are working or start workings in offices and girls that is studying or starts
studying in university and colleges, convince is one of the main issue for them. To
find secure taxi or van and their parents are also very worried due to security of
their young girls; parents of kids are also very worried because of present condition
of Pakistan’s security and not able to trust anyone easily. So they don’t want to
send their kids with van or taxi drivers. In response to this problem, this ride-
sharing application will have solutions of all problems. Security problem will be
solved due to female drivers. And parents of kids and young girls will easily trust
and be confident to send them with female delivers.
Project will have two portals i.e. web and android app. Driver and passenger both
will have the permission to register or use both portals.
Girls that are using their own convince on daily bases to go offices, universities etc
will work as a driver in it. Driver will give their information like name, address,
contact no., their route and timings and destination, and it will store on database.
And passengers are the girls that are working or start workings in offices and girls
that is studying or starts studying in university and colleges; convince is one of the
main issue for them to solve this issue we are going to design this app. Girls who
want convince will search for its suitable driver girl schedule and contact it through
app and will set the time. And payment can be on daily bases, on weekly or on
monthly.
Payment will be divided between driver and company on the bases of satisfactory
percentage.
It will Secure, One tap solution and the biggest advantage; Extra income without
over time.
Project Aims:
Figure
Figure 1.1 Project
1: Project AimsAims
2
Time constrained – It will take 7-8 months to complete.
We are facilitating female workers and students for security purpose and also get an
extra income without overtime.
Part A- the ideal: Girls that are working or start workings in offices and girls that is
studying or starts studying in university and colleges, convince is one of the main issue
for them.
Part B - the reality: To find secure taxi or van and their parents are also very worried
due to security of their young girls; parents of kids are also very worried because of
present condition of Pakistan’s security and not able to trust anyone easily. So they
don’t want to send their kids with van or taxi drivers.
Admin will give the initial right to the user, also has access to remove any user account
from the system. Admin can also employ new policies and constraints.
3
Apply new polices.
User manages the privacy based on activities of other users on his uploaded content. If
a user doesn’t interact with other user her rights will be revoked. When the rides are
completed or when dissolution time meets communication will be deleted. Privacy
settings will also be revoked based on users communication history. If the user is
inactive with a certain team member for specific time period, she will be able to change
the privacy settings.
Module 3: Search
Allows user to search a specific route rider/provider, colleague or friend for whom she
wants to provide the facility of Let’s Share. User will be able to add multiple riders at
the same time and same route. User will be also able to change the route according her
routine.
User can check its activity log. Admin can view the communication history of the user.
For the development of our project the software methodology that we would be using
will be the “agile approach.” We have chosen this methodology as it will allow us to
add more functions and modules to the project later if needed. Therefore, the agile
approach will provide us with flexibility in our project for adding more functionality
later and with the use of it we will also not need to repeat the whole process of adding a
function during its development.
4
1.8. DEVELOPMENT REQURIMENTS
C# Language:
There are many reasons why we chose C# for our project. It is a modern
programming language, widely spread, used by millions of programmers around the
entire world. At the same time C# is a very simple and easy to learn (unlike C and
C++). It is natural to start with a language that is suitable for beginners while still
widely used in the industry by many large companies, making it one of the most
popular programming languages nowadays.
Android:
o Developers choose to develop for Android in order to reach the majority
of mobile device users.
o It helps to develop apps efficiently. It provides rich development
architecture. It can distribute app in many different ways such as a Google
Play.
5
Chapter 2
REQUIREMENT ANALYSIS
Functional requirements are those requirements that define the functionality of the
project. In other words functional requirements are basically how the system works for
the users.
6
“passengers”. On one hand there are users which are only using this app for making
extra income and safe ride purposes. On the other hand there are also some users which
are maintaining and managing this application.
User can communicate with each other, send and receive messages, manage her own
profile, share views and emotions, share comment like/dislike ride activity, view her
activity log.
Admin will maintain and manage the application, and will be able to see content of
user, can see conversation between user and driver can see activity log of rider and
provider, can delete users.
2.2.3 Database
Fully functional database is required for every single record over social network, i.e.
user personal information, driver personal information, notifications, route log, ride
logs, user’s/driver’s profile information, estimated cost of ride.
There is a requirement of a well-structured and well managed user profile that she can
share all over the world. User profile does not only refer to its personal information.
But there is one more thing which is attached with this, is Privacy Settings. User can set
her general privacy setting that means who and how user’s uploaded content can be
seen by other users over the network.
There are two types of privacy settings, General Privacy Settings for all contents and
Ride Privacy Settings for single ride content.
7
2.2.6 User Content Checking
User ride content must be seen and checked to ensure that the user over ride isn’t act
anything which is morally, culturally, religiously, or behaviourally explicit.
Non-functional requirements are those requirements that don’t define the actual
working of the system. Non-functional requirements are used to judge and evaluate the
quality of the system. Non-functional requirements cover all the remaining
requirements which are not covered by the functional requirements. They specify
criteria that judge the operation of a system, rather than specific behaviours. Non-
functional requirements in our project are following
2.3.1 Usability
Usability is a quality attribute used to assess how easy the interface is to use. Usability
is ease of use. It tells how user friendly the interface is.
8
It includes memory-ability, learn-ability, and satisfaction. Our software interface has all
the above qualities. Any kind of user, whether he/she is a novice user or technical user
they can easily understand the interface.
The system will be design in such a way that it will be easy understandable by the
users. It is a web based project so it can be accessible only if a user has an internet
connection
2.3.2 Reliability
Reliability is how much the system is consistent in different platforms. The ability of an
apparatus machine, or system to consistently perform its intended or required function
or mission, on demands and without degradation or failure.
2.3.3 Integrity
An integral system is one which is more absorbing and is more precise in nature. When
it comes to replace the human a system should be as precise as possible with
approximately 0% of tolerances.
2.3.4 Performance
Our system’s response time will minimum and it will be dependent on the speed of
internet connection.
2.3.5 Supportability
System will be supported on all browsers. The system will also be supported by mobile
browsers.
9
Chapter 3
10
3.2. USE CASES (Fully Dressed)
Use Case
Name: Admin Login
Actors: Admin
Post
conditions: Admin Logged in Successfully.
Exceptions: In step 2 and 3 of the normal flow if admin enters wrong details system
generates error messages and ask admin to re-enter password/username.
Includes: None
Special
Requirements: 1. Security
2. Reliability
Assumptions: Admin must be registered to the system
11
Table 3.2 Passenger login
Use Case ID: UC-1.1.3
Actors: Passenger
Includes: Uc-1.1.1
12
Table 3.3 Driver login
Actors: Driver
Includes: Uc-1.1.1
Assumptions: None
13
Table 3.4 Delete User (Driver/Passenger)
Use Case ID: UC-1.1.5
Actors: Admin
Exceptions: None
Includes: UC-1.1.1
Assumptions: None
14
Table 3.5 View User profile
Use Case ID: UC-1.1.6
Actors: Admin
Includes: UC-1.1.1
15
Table 3.6 Admin Sign-out
Use Case ID: UC-1.1.7
Actors: Admin
Exceptions: None
Includes: Uc-1.1.1
16
Table 3.7 Communicate with Drivers
Use Case ID: UC-1.2.3
Actors: Admin
Includes: UC-1.1.3
Assumptions: None
17
Table 3.8 User login
Use Case ID: UC-1.3.1
Preconditions:
User is authorized by the system
Post conditions: User logged-in successfully
Includes: None
18
Table 3.9 Update Profile
Use Case ID: UC-1.3.2
Preconditions:
User must be Logged-In
Post conditions: User Successfully enters the profile update screen
Exceptions: None
Includes: UC-1.3.1
19
Table 3.10 Driver add picture
Use Case ID: UC-1.3.3
Actors: Driver
Preconditions:
Driver must be logged-in
Post conditions: Picture added or changed successfully
Includes: UC-1.3.2
20
Table 3.11 Update Contact Information
Use Case ID: UC-1.3.4
Preconditions:
User must be logged-in
Post conditions: Contact information Updated successfully
Exceptions: User enters incorrect format or exceeds the phone number digits
limit
Includes: UC-1.3.2
21
Table 3.12 View Inbox messages
Use Case ID: UC-1.3.5
Description: User can view her messages in inbox after she books her ride
Preconditions:
User must be logged-in
Post conditions: User successfully view messages in her inbox
Includes: UC-1.3.1
22
Table 3.13 View ride history
Use Case ID: UC-1.3.7
Actors: Passenger
Preconditions:
Passenger must be logged-in and successfully see her rides
Post conditions: Passenger successfully view the selected task history
Includes: UC-1.1.3
23
Table 3.14 Delete own account
Use Case ID: UC-1.3.8
Exceptions: None
Includes: UC-1.3.1
24
Table 3.15 Search Ride
Use Case ID: UC-1.3.12
Actors: Passenger
Preconditions:
User must be logged-in
Post conditions: Ride found successfully
Includes: UC-1.3.1
25
Table 3.16 Accept Ride
Use Case ID: UC-1.4.1
Actors: Driver
Preconditions:
Driver must be logged-in
Post conditions: User successfully found the searched name
Includes: UC-1.3.1
26
Table 3.17 Share Ride
Use Case ID: UC-1.4.1
Actors: Passenger
Description: Passenger can share its ride with any family member or friend.
Preconditions:
User must be logged-in
Post conditions: User successfully found the searched name
Includes: UC-1.3.1
27
3.2. ERD
28
3.3 CLASS DIAGRAM
29
3.4 SEQUENCE DIAGRAM
Registration
30
Login
31
Update Account
32
Delete Account
Delete User
33
Connection between driver and passenger
34
Logout
35
3.5 ACTIVITY DIAGRAM
36
Delete Account
Delete User
37
Overall communication and network between Driver and Passenger
38
Logout
39
3.6 COMPONENT DIAGRAM
40
3.7 DEPLOYMENT DIAGRAM
This chapter includes the design of the project its use cases, class diagram, activities
and sequences of the project modules of the project are designed and their flow is
designed in term of class, activity, sequence, use case and other diagrams.
41
Chapter 4
PROJECT MANAGEMENT
4.1. MILESTONES
GUI 15/2/2019
Coding 20/5/2019
Documentation 27/3/2019
Testing 27/6/2019
42
Table 4.2: Project Closeout Reports
Proposal Nov,2018
Design 15 Jan,2019
Development 1 March,2019
43
Table 4.4:Project Resources
Project Team
Taqdees Habib UIIT
Abdul Moeez UIIT
Facilities
HP core i5 UIIT
Software Tools
4.5.2Purpose
The purpose of risk management is to identify potential problems before they occur so
that risk-handling activities may be planned and invoked as needed across the life of
the product or project to mitigate adverse impacts on achieving objectives. Risk
management is a continuous, forward-looking process that is an important part of
business and technical management processes. Risk management should address issues
44
that could endanger achievement of critical objectives. A continuous risk management
approach is applied to effectively anticipate and mitigate the risks that have critical
impact on the project. Effective risk management includes early and aggressive risk
identification through the collaboration and involvement of relevant stakeholders.
Strong leadership across all relevant stakeholders is needed to establish an environment
for the free and open disclosure and discussion of risk. Although technical issues are a
primary concern both early on and throughout all project phases, risk management must
consider both internal and external sources for cost, schedule, and technical risk. Early
and aggressive detection of risk is important because it is typically easier, less costly,
and less disruptive to make changes and correct work efforts during the earlier, rather
than the later, phases of the project.
Developing risk response processes including contingencies plan and preparing reports
on risk.
As before turnover the product a complete risk analysis is needed. In our product, we
have Technology, Organizational, Requirement and Estimation Risk. Technology Risk
may invoke as our system is not very good structured or strong to meet the changes.
Organizational risk occurs when the resources are very limited. Requirement risk can
45
also occur because as we are progressing in our project we are exposing new
requirements as well. Estimation risk can also occur as we have to work very hard for
meeting the deadline.
46
Chapter 5
IMPLEMENTATION
Initially developed by Android Inc., which Google bought in 2005, Android was
unveiled in 2007, with the first commercial Android device launched in September
2008. The current stable version is Android 9 "Pie", released in August 2018.
Google released the first beta of the next release, Android Q, on Pixel phones in
March 2019. The core Android source code is known as Android Open Source
Project (AOSP), which is primarily licensed under the Apache License.
Android has been the best-selling OS worldwide on smartphones since 2011 and on
tablets since 2013. As of May 2017, it has over two billion monthly active users, the
largest installed base of any operating system, and as of December 2018,
the Google Play store features over 2.6 million apps.
47
5.2. FRAMEWORK
The android framework is the set of API's that allow developers to quickly and
easily write apps for android phones. It consists of tools for designing UIs like
buttons, text fields, image panes, and system tools like intents (for starting other
apps/activities or opening files), phone controls, media players, ect. Essentially an
android app consists of Activities (programs that the user interacts with), services
(programs that run in the background or provide some function to other apps), and
broadcast receivers (programs that catch information important to your app).
This chapter includes the design of the project its use cases, class diagram, activity and
sequences of the project modules of the project are designed and their flow is designed
in term of class, activity sequence use case and other diagrams.
48
Chapter 6
SOFTWARE TESTING
After completion of each phase verification was done. To verify the requirements, the
completed phase was fully tested. Against the requirements all the units were found to
be completely satisfactory. As the system should be verified at each stage of the
software process using documents produced during the previous stage therefore we
started verification with requirements reviews and continued through design and code
reviews to product testing. This is an activity to verify whether we have built the
system right or not in the development life cycle.
The following elements are required to support the overall testing effort at all levels.
The “Activity-Centric Social Networks” is tested at university lab with the required
hardware and software requirement.
6.3. SOFTWARE
6.4. HARDWARE
Server Client
Core I5 Core I5
49
6.5. TESTING IDENTIFICATION
A specific test is planned for every test level to test all system components. The test
procedure is designed in detailed so that the system meets all user requirements.
Registration Users
Login Users
Uploading Pictures
Booking Ride
Accepting/ Rejecting Ride
6.6.1.2 Registration
Testing of this unit will ensure that the rivers and passengers can successfully create
their profile to use the application.
50
6.6.1.3 Login
Testing of this unit will ensure that the driver and passengers can successfully login
to their accounts.
Testing of this unit will ensure that the passenger can successfully find the driver of
her route and book her ride.
Testing of this unit will ensure that the driver receives notification from passenger
and can accept or cancel request according to her own route.
51
6.7. TEST CASES
Test cases involve the set of steps, conditions and inputs which can be used while
performing the testing tasks. The main intent of this activity is to ensure whether the
software passes or fails in terms of its functionality and other aspects.
There are many types of test cases like: functional, negative, error, logical test cases,
physical test cases, UI test cases etc. A test is prepared for each test that needs to be
performed. The test cases result in the development of test reports, which will be used
for test output analysis.
Below are some of the test cases to verify the system functional abilities.
Procedural Step
1. Enter the required values
2. Click on the Register button
52
Table 6.3 Test Case II
53
Table 6.5 Test Case IV
54
Table 6.7: Test Case VI
This chapter is about the testing the different phases of the project. We are applying the
known and unknown internal structure, design and implementation. We make a strong
testing by using the different testing processes like Unit testing, Integrated testing,
System testing etc.
55
Chapter 7
7.1. DISCUSSION
There are so many application of pick and drop services and some ride sharing
applications are also online in foreign countries but there is no such ride sharing
application that is only for females. So we made a ride sharing application that is only
for females for their safety.
Girls that are working or start workings in offices and girls that is studying or starts
studying in university and colleges, convince is one of the main issue for them. To find
secure taxi or van and their parents are also very worried due to security of their young
girls; parents of kids are also very worried because of present condition of Pakistan’s
security and not able to trust anyone easily. So they don’t want to send their kids with
van or taxi drivers. In response to this problem, this ride-sharing application will have
solutions of all problems. Security problem will be solved due to female drivers. And
parents of kids and young girls will easily trust and be confident to send them with
female delivers.
Project will have two portals i.e. web and android app. Driver and passenger both will
have the permission to register or use both portals.
Girls that are using their own convince on daily bases to go offices, universities etc will
work as a driver in it. Driver will give their information like name, address, contact no.,
their route and timings and destination, and it will store on database. And passengers
are the girls that are working or start workings in offices and girls that is studying or
starts studying in university and colleges; convince is one of the main issue for them to
solve this issue we are going to design this app. Girls who want convince will search
for its suitable driver girl schedule and contact it through app and will set the time. And
payment can be on daily bases, on weekly or on monthly.
Payment will be divided between driver and company on the bases of satisfactory
percentage.
It will Secure, One tap solution and the biggest advantage; Extra income without over
time.
56
7.2. CONCLUSION
This document provides the complete information about the “Let’s share
Application” with the all details about its structure, interfaces, and some bit of
code.
7.3. LIMITATION
This system is limited to the core functionality which is discussed in detail all structure.
But the system can be taken to the higher level to make it complete and accurate
according to the demand of complete security for females.
57
Chapter 8
SCREENSHOTS
58
59
60
61
62
63
64
65
66