Professional Documents
Culture Documents
1. INTRODUCTION…………………………………….
2. REVIEW OF LITERATURE………………………….
3. PLANNIG…………………………………..
4. DESIGN……………………………………….
5. CODING………………………………………………
6. OUTPUT……………………………………….
7. USER MANUAL………………………………………
8. TESTING…………………………………………….
9. COSTING…………………………………………..
10.FUTURE IMPLEMENTATION……………………..
11.CONCLUSION……………………………………..
12.BIBLIOGRAPHY………………………………
1
INTRODUCTION
2
INTRODUCTION
This application which we have built is to be used anywhere portably. During any situation where the customer
forgets to carry ATM card in any place. This helps the customer to roam freely without any tension of carring
ATM cards which can be a very hetic job.
We developing this project with keeping all details & problem. So in this
Project it take Data from customer and provide some service such as:-
The main objective of this project is to reduce the human effort taken. Since now a days the
customer has to use an ATM card for money transaction , but here the customer can withdraw money
without any effort and without any use of ATM card.
A Cardless Cash Withdrawal transaction enables the sender to withdraw cash from your any Bank
account to anyone with a valid IMEI number across India. The recipient can withdraw the amount from any
specified any Bank ATM without having to use a debit or a credit card.
This is data retrieval front end and back end database project.
It gives easy user interface that any user can insert, retrieve and view
data according to its need.
It has all the facility that makes the working fast & gives good
facility to maintain & store all the data.
It gives all the facilities to view the records according to the user
need like its previous record.
4
PURPOSE OF THE SOFTWARE
The main purpose of this project is to provide every customer an easy and portable way to transact money
and access his/her account anywhere.
5
PROJECT CATEGORY
6
REVIEW OF LITERATURE
7
Review of Literature
Back-End : MySQL:-
My The SQL acronym stands for Structured Query Language. The MySQL development project
has made its source code available under the terms of the GNU General Public License, as well as under a
variety of proprietary agreements.
MySQL was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB,
now owned by Oracle Corporation. For proprietary use, several paid editions are available, and offer additional
functionality.
Features of MySQL :
A broad subset of ANSI SQL 99, as well as extensions
Cross-platform support
Stored procedures, using a procedural language that closely adheres to SQL/PSM[73]
Triggers
Cursors
Updatable views
8
Online DDL when using the InnoDB Storage Engine.
Information schema
Front-End :
Java is the programming language originally develpoed by “ James Gosling “ at “sun-
Microsystem”. This language drives much of its syntax from C and C++ but has a simple object model
and fewer low facilities.
Java applications are typically compiled to byte code that can run on any “ Java Virtual
Machine “ (JVM) regardless of configuration.
Java is currently one of the most popular programming languages in use and it is widely used
form application software to web application.
Features:
9
1. Simple:
If we know C++, reading, writing, understanding java programs easy.
2. Object oriented:
It is true OPP language. Almost everything in the JAVA is the objects .It
contains OOP like class, object, constructors, inheritance, polymorphism and so on.
3. Compiled and interpreted:
Java programs are compiled to create . class files. It is also called
bytecode file. It is intermediate code between source code and executable code. Because of byte code file
, java is platform independent and architecture neutral. Java programs are compiled according to JVM (Java
Virtual Machine). This JVM is part of java software. It contains universal configuration . byte code file is
interpreted to get output.
4. Platform independent & portability:
The byte code file of one operating system is operated at any type
of other operating system. Most significant contribution of JAVA all over the language is that its Portability. It
can be transfer or moved to any where any time.
5. Architecture Neutral:
The byte code file of one pc configuration is operated at any type of other
configuration.
6. Multithreaded:
Java is used to develop multi process applications.
7. High performance:
Have impressive performance for interpreted languages, due to the use of Byte code .
Speed is comparable to the C & CPP .In architecturethe over heads are reduced during run time.
10
Java can be used to create two types of programs : applications and applets. An application is a
program that runs on your computer, under the operating system of that computer. That is, an application
created by Java is more or less like one created using C or C++. When used to create applications, Java is
not much different from any other computer language. Rather, it is Java's ability to create applets that
makes it important.
An applet is an application designed to be transmitted over the Internet and executed by a Java-
compatible Web browser. An applet is actually a tiny Java program, dynamically downloaded across the
network, just like an image, sound file, or video clip.
The important difference is that an applet is an intelligent program, not just an animation or media file.
In other words, an applet is a program that can react to user input & dynamically change - not just run the same
animation or sound over and over.
As exciting as applets are, they would be nothing more than wishful thinking if Java were not able
to address the two fundamental problems associated with them: security & portability. Before continuing,
let's define what these two terms mean relative to the Internet.
Security :
As you are likely aware, every time that you download a "normal" program, you are
risking a viral infection. Prior to Java, most users did not download executable programs frequently, and
those who did scanned them for viruses prior to execution.
This type of program can gather private information, such as credit card numbers, bank
account balances, and passwords, by searching the contents of your computer's local file system. Java
answers both of these concerns by providing a "firewall" between a networked application and your
computer.
When you use a Java-compatible Web browser, you can safely download Java applets without
fear of viral infection or malicious intent . Java achieves this protection by confining a Java program to
the Java execution environment and not allowing it access to other parts of the computer.
The ability to download applets with confidence that no harm will be done and that no security
will be breached is considered by many to be the single most important aspect of Java.
11
The user is expected to ensure that the minimum system requirement for loading the software are
satisfied. The requirement are given in following section.
The hardware and software environment in which this package was developed are given below. It is
necessary in the part of the user to make sure that the hardware and the software they uses is given compatible
to the specification given below:
SOFTWARE SPECIFICATION:
HARDWARE SPECIFICATION :
ATM Machine
Android Mobile
12
PLANNING
13
Planning
To develope this project what we did is we learnt “ How to transact money without using ATM cards“,
We saw how they are maintaining their records of customer.
We took many details from customer like name, card number, imei number etc.
Months
January February March
Weeks
Analysis
1.
Task Division
2.
Admin Module
3.
Registration
4.
Module
Learning Administrator
1.
Module
User Registration Module
2.
Tracer module
3.
Testing
4.
Testing
1.
Testing
2.
Thesis work
3.
Finalizing
4.
14
DESIGN
15
Design
16
CODING
17
Login form coding:-
package com.projects.atmsecurity;
import android.app.Activity;
import android.content.Intent;
import android.os.AsyncTask;
import android.os.Bundle;
import android.view.View;
import android.view.View.OnClickListener;
import android.widget.Button;
import android.widget.EditText;
import android.widget.Toast;
@Override
super.onCreate(savedInstanceState);
setContentView(R.layout.login);
btnLogin.setOnClickListener(new OnClickListener() {
@Override
@Override
super.onPreExecute();
@Override
19
publishProgress(resp);
return null;
@Override
super.onProgressUpdate(values);
if(resp.trim().equals("1"))
startActivity(intMain);
else
txtAcc.setText("");
20
txtPassword.setText("");
};
atask.execute("");
});
}}
21
Coding of Main Activity :-
package com.projects.atmsecurity;
import java.util.ArrayList;
import android.os.AsyncTask;
import android.os.Bundle;
import android.app.Activity;
import android.app.AlertDialog;
import android.app.ProgressDialog;
import android.content.Context;
import android.content.DialogInterface;
import android.telephony.TelephonyManager;
import android.view.View;
import android.view.View.OnClickListener;
import android.widget.ArrayAdapter;
import android.widget.Button;
import android.widget.EditText;
import android.widget.ListView;
import android.widget.TextView;
import android.widget.Toast;
22
public class MainActivity extends Activity {
@Override
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_main);
lblIMEI.setText(imei);
publishProgress(resp);
return null;
@Override
super.onProgressUpdate(values);
for(String acc:resp)
if(dat.length == 3)
24
String num = dat[0];
lstCards.setAdapter(new ArrayAdapter<String>(MainActivity.this,
android.R.layout.simple_list_item_1,arrNum));
};
atask.execute("");
btnCode.setOnClickListener(new OnClickListener() {
@Override
25
final String password = txtPassoword.getText().toString();
try
int code_val = 0;
for(int count=0;count<code.length();count++)
ProgressDialog pd;
super.onPreExecute();
};
@Override
String query = "?imei=" + imei + "&name=" + name + "&acc_num=" + card + "&password=" + password +
"&code=" + out_code + "&amount=" + amount + "&op=check_user";
publishProgress(resp);
return null;
super.onProgressUpdate(values);
27
if(resp.length == 2)
if(resp[0].equals("0"))
else
abuild.setTitle("Transaction added");
@Override
dialog.cancel();
});
abuild.create().show();
28
}
else
};
pd.dismiss();
};
};
atask.execute("");
catch(Exception ex)
}
29
});
import java.io.BufferedReader;
import java.io.InputStreamReader;
import org.apache.http.HttpEntity;
import org.apache.http.HttpResponse;
import org.apache.http.client.HttpClient;
import org.apache.http.client.methods.HttpGet;
import org.apache.http.impl.client.DefaultHttpClient;
try
30
HttpClient http = new DefaultHttpClient();
http_entity.getContent()));
return result;
}
31
Coding of ATM interface :-
<?php
// pour WAMP5
//afficher phpinfo
if (isset($_GET['phpinfo']))
phpinfo();
exit();
32
if (isset ($_GET['lang']))
$langue = $_GET['lang'];
$langue = 'fr';
else
$langue = 'en';
$langues = array(
'txt_no_projet' => 'No project yet.<br />To create a new one, just create a directory in \'www\'.',
'txt_no_alias' => 'No Alias yet.<br />To create a new one, use the WAMP5 menu.',
),
'mysqlerror1' => 'MySQL n\'est pas lancé ou votre configuration phpmyadmin n\'est pas bonne.',
'txt_no_projet' => 'Aucun projet.<br /> Pour en ajouter un nouveau, créez simplement un
répertoire dans \'www\'.',
'txt_no_alias' => 'Aucun alias.<br /> Pour en ajouter un nouveau, utilisez le menu de WAMP5.',
),
);
// Version d'apache.
35
// Version de MySQL.
$pma_conf_file = 'c:/wamp/phpmyadmin/'.'config.inc.php';
if (file_exists($pma_conf_file))
include ($pma_conf_file);
if (extension_loaded('mysql'))
$mysql_version = mysql_get_server_info();
else
$mysql_version = $langues[$langue]['mysqlerror1'];
if (extension_loaded('mysqli'))
$mysql_version = mysqli_get_server_info($link);
else
$mysql_version = $langues[$langue]['mysqlerror1'];
else
$mysql_version = $langues[$langue]['mysqlerror2'];
36
echo '<?xml version="1.0" encoding="iso-8859-1"?>';
?>
<html>
<head>
<style type="text/css">
DIV.all { width: 70%; border: groove #888888 3px; margin-left: auto; margin-right: auto; text-align: left;
background-color: #EDEDED; padding: 0; font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-style:
normal; font-weight: normal; color: #000000;}
37
SPAN.header_bar { display: block; float: right; margin-top: 100px; }
H1 { font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-style: normal; font-weight: bold; text-
decoration: underline; color: #000000; margin: 0; padding: 0; padding-left: 15px; padding-top: 15px; }
IMG { border: 0; }
DIV.footer { font-size: 10pt; text-align: right; height: 28px; padding-right: 5px; vertical-align: top; }
</style>
</head>
<div class="all">
<div class="cell">
<span class="header_bar">Version
38
<?php
echo $langues['all']['version'];
?>
</span>
</div>
<div class="clearer2"></div>
<div class="cell">
</div>
<div class="content">
<div class="vitem"> </div>
<div class="vitem"> </div>
echo $langues[$langue]['php_ext'].'</div>';
$loaded_extensions = get_loaded_extensions();
$separateur = '';
echo $separateur.$extension;
?>
</div>
<div class="vitem"> </div>
</div>
<div class="clearer"></div>
<div class="content">
</div>
<div class="clearer"></div>
<div class="content">
<?php
$handle=opendir(".");
$msg = $langues[$langue]['txt_no_projet'];
$msg = '';
closedir($handle);
echo $msg;
?>
</div>
<div class="clearer"> </div>
<div class="content">
<?php
$alias_dir = 'c:/wamp/apache2/conf/alias/';
$handle=opendir($alias_dir);
$msg = $langues[$langue]['txt_no_alias'];
41
while ($file = readdir($handle)) {
$msg = '';
closedir($handle);
echo $msg;
?>
</div>
<div class="clearer"> </div>
<div class="clearer"></div>
<hr />
<div class="footer">
</div>
</div>
</body>
</html>
42
OUTPUT
43
ATM App Login form :-
44
OTP generate Form :-
45
Atm machine login form :-
46
47
Amount & OTP form :-
48
Transaction success form :-
49
USER MANUAL
50
51
52
53
54
55
56
TESTING
57
Testing
Testing is process of executing software with intention of finding bugs. It helps us to identify
correctness, completeness, security, quality with reliability and uasbility.
There are two primary methods by which test can be assigned and they are :-
White - Box testing
Black - Box testing
White-Box Testing :
It deals with the internal logic and stucture of code. The test written based on the white box
testing strategy incorporate coverage of code written, paths and internal logic of code, etc.
The testing has to deal with the code hence is needed to pass knowledge of coding and logic.
Black-Box Testing :
It is a type of test which tests the software without having an insight
details of the coding. In this we did not need to know what happens inside the software “box”,
we only need to know what should be input, output and the operations.
58
2. Password Number Accept pass
59
Formal review :
It is the process through which static white box testing is performed. The formal review can range from a simple
meeting between two programs to regarous inspection of software design on its code.
Identify rules
Follow rules
Prepare
Write a report
Types of Reviews :-
Peer Review
Walkthrough Review
Inspection Review
Walkthrough Review :-
In this , the programmer who wrote the code present it to a small group of five or more, so other programmers
and tester should recive copies of software in advance so they can examine it.
60
VALIDATIONS
It is not possible that every data feed to the computer must be acceptable. Sometimes the operator feed
some wrong data but machines have validation for checking the data whether it is valid or not. It executes the
date if the date is not valid and it gives message to the end user.
This type of security is only due to validation of machine or computer is used e.g. in the present system,
if the user enters the date in dd/mm/yy format then it gives you a message “Invalid Entry please enter date in
dd-mm-yy” format. Since date is in dd-mm-yy format. This process will be continuing until the user enters the
valid date. The procedure of validation and execution of the data is the self adjusting of the computer, which is
the vital point of the computer system.
MAINTENANCE
61
After the system is implemented it must be maintained. All the program modules must be periodically
modified and kept up to date. Maintenance is performed for two reasons. Firstly, to correct system errors, no
matter how thoroughly the system is tested, some bugs or errors are always present in computer programs.
Secondly, to enhance the system’s capability to respond to changing organizational needs.
Users often request additional features after they become familiar with the computer system and its
capabilities. Hardware and software also change at an accelerated rate. So, this phase of maintenance is of
utmost importance in system development.
The total cost of system maintenance may exceed that of system development. So, at certain point it becomes
more feasible to perform a new system development instead of maintaining the old system.
62
COSTING
Costing
In developing any project , it may be a small or big costing plays an important role in project. The project
should be cost-efficient, reliable and within our fixed budget .
It includes all those things such as software cost, books cost, internet usage cost, hardware cost, etc. it includes
all those thing for which we had to pay money .
63
2. PHP 2500/-
4. Documentation 2500/-
5. Other 1400/-
Total 7,200/-
FUTURE
64
IMPLEMENTATION
65
Future Scope
In this application also, there is scope for development of the future. For example, in the current application will
be avilble for all platforms like ios and windows based mobile phones.
When in crisi if there is no internet connection with the customer the bank atm will also provide a short range
wi-fi system which the customer will only use for transaction.
This otp generation system will also be available on a web page system which will ensure that customers can
aaccess the atm system anywhere.
66
CONCLUSION
67
Conclusion
We have completed our project successfully . We faced problems during development of the project but due to
our team work we overcame it easily.
For the future use, our project will be implemented in successful manner. Our project is very simple, reliable
and cost efficient.it doesnot need any maintainance but it needs updations after certain interval of time.
Maintaining database, retrieving data, adding data and many such functions are very easily done. Our project is
user friendly.
After finishing our project , now came to know how to analyse and design the software and how to divide
software in modules.
68
BIBLIOGRAPHY
69
BIBLIOGRAPHY
Books Reffered :
70