You are on page 1of 93

Health & Nutrition e-Assistant

INTRODUCTION

2019 Page 1
Health & Nutrition e-Assistant

INTRODUCTION

The health is the most important thing in the world. Our project is a

mobile first responsive web application to support common man to analyze his

food intake to understand is it sufficient or harmful as per his metabolic condition

such as health, whether suffering chronic diseases, Sugar, Cholesterol, pressure

levels etc…. . Web Application will support as a nutrition assistant to analyze and

select his daily and supplementary food items by cross matching variety of food

combinations depends on its calorie value, Vitamin dissipations, Proteins, Fats

too. We are using selections and cross matching algorithms to attain it.

It is a mobile first responsive web application to support common man to

analyze his food intake to understand is it sufficient or harmful as per his

metabolic condition such as health, whether suffering chronic diseases, Sugar,

Cholesterol, pressure levels etc. In the above web Application will support as an

nutrition assistant to analyze and select his daily and supplementary food items

by cross matching variety of food combinations depends on its calorie value,

Vitamin dissipations, Proteins, Fats too. Using selected food items and diseases

are cross matching to this application

2019 Page 2
Health & Nutrition e-Assistant

Existing System

* Few health check up and monitoring, online web services and applications

are available.

* Analyzing these web applications to find out its major drawbacks

* The existing system is separated for Health & Nutrition, This is helpful to

peoples to given their health controls.

Disadvantages of the existing system

• No a single functionality for evaluating metabolic specification with food habits

of a person

• No option for giving chronic disease and cross check with the food in take of a

person

• Doesn’t give historic report by collecting all interpretations provided by uses time

to time

• Not provide accurate data like is the food in take is “Harmful,sufficient,or not

healthy “like predictions based on the input provided

2019 Page 3
Health & Nutrition e-Assistant

Proposed System

In the proposed system is used to as eliminate the disadvantages of existing

system. In this web application with give option for inputting metabolic and

physical specification of a person at the time of user registration.

Then has login using credentials and check his food habits really support his

healthy life or not. By giving selecting or defining his own food habits like

breakfast, lunch, dinner and supper of food items

Advantage of proposed system

• Integrated functionality for evaluating metabolic specification with food

habits of a person

• Chronic disease and food in take of a person to provide accuracy in the result

• A person can re_enter after a long period of time his metabolic values get

changed or varies.

• Activity history log to store all such data

• Accurately provide the result

2019 Page 4
Health & Nutrition e-Assistant

Modules

• Nutritionist Module

• Public User Module

• Administrator Module

• Cross Matching Functional Module

2019 Page 5
Health & Nutrition e-Assistant

ADMINISTRATOR:-

This is the most important module in this project. In this the admin

can manage the entire application, Main functions of this module:-

- This module applying various data set manipulations. User management

activities etc…

- Control the web application

- To seen the feedback of user

NUTRITIONIST:-

This module deals with the predefined data set for nutritional values for

vegitables, fruits, cereals, nuts, meat, fish items in using small scale data

mining. For example in Fruits modules there are hundreds of fruits with

different nutritional factors.

2019 Page 6
Health & Nutrition e-Assistant

PUBLIC USER:-

# Registration Module:

The public user can login after one time registration. This registration

sub module collects complete metabolic parameters of the user like,

age, chronic health issues suffering like cholesterol, Blood pressure,

Blood Sugar etc… Also any abnormal detection in Blood, Urine samples.

Using the data we will create a personal data set which can be used for

cross matching functionalities.

# Here the user check his favorite foods available in the list provided as

breakfast, dinner, supper etc. If it is there he can audit is it good or

harmful to continue. Also he can find alternative solution for the same

too.

# Here the user will create new food and template in different times like

breakfast, dinner, supper ,lunch .Then the abov selected items are

will crossmatched.

CROSS MATCHING:-

We are using selection sort based cross matching algorithms to give a fast

and reliable output to users

2019 Page 7
Health & Nutrition e-Assistant

FEASIBILITY STUDY
The development of a computer-based system is more likely to be
plagued by security to resources and difficult delivery rates. The feasibility
study is not warranted system in which economic justification is obvious
technical risk is low, few legal problems are expected and no reasonable
alternative exists. Not all requested projects are feasible.

After the requirement analysis, we checked whether the system is feasible or


not. Three essential aspects are involved in the feasibility study promotion of
preliminary investigation. The aim is to establish whether the direction and
requirements of the project are feasible this should not be end expensive or time
consuming exercise the aim is to evaluate the feasibility of the proposal.
Involving an analysis of the problem and determination of the best solution.

FEASIBILITY CONSIDERATION

To pass this stage and go through to system development a proposal must


determine

 ECONOMIC FEASIBILITY

 TECHNICHAL FEASIBILITY
 OPERATIONAL FEASIBILITY

2019 Page 8
Health & Nutrition e-Assistant

TECHNICAL FEASIBILITY

Technical feasibility centers on the existing computer and to what extend it


can support the proposed addition. For e.g.: the current computer is operating at
80% capacity, then running another application could overload the system and
require additional hardware. This system requires a multiple user environment.
It needs a powerful RDBMS database Oracle to the purpose. So judged
technically feasible.

ECONOMIC FEASIBILITY

Economic analysis is the most frequently used method for evaluating the
effectiveness of a candidate system. More commonly known as cost/benefit
analysis, the procedure is to determine the benefit and saving that are expected
from a candidate system and compare them with the term of time by automating
the process of report generation. A system that can be developed technically and
that will be used if installed must still be a good investment or the organization
is more.
After the feasibility study it is realized that the system is economically
feasible for both management and developer of our system. Hence this package
is economically feasible.

OPERATIONAL FEASIBILITY

Proposed systems are beneficial only if they can be turned into


information system that will meet the organization’s operating requirements.
People are inheritably resistant to change and computers have been known to
facilitate change. An estimate should be made to know how strong the reaction
of a user staff is likely to have towards the development computerized system.
Since this system ready to use in the organization, this system operationally
feasible.

2019 Page 9
Health & Nutrition e-Assistant

SYSTEM
REQUIRMENTS

2019 Page 10
Health & Nutrition e-Assistant

SYSTEM REQUIREMENTS

The purpose or the document is to describe the complete requirement for the
project GRANT AUDIEVENT. The document captures the hardware and
software requirements for the proposed system to provide a complete and
comprehensive description of the system requirements.

SOFTWARE AND HARDWARE REQUIREMENTS

The Following requirements are only the minimal requirements to run this
utility more successfully and efficiently. There should be sufficient memory and
software tools for efficient processing.

HARDWARE ENVIRONMENT FOR DEVELOPER

The minimal hardware specification of the system used in our project is:

Processor : Pentium IV or above

Hard Disk : 80 GB and above

Ram : 512MB Ram

2019 Page 11
SOFTWARE ENVIRONMENT FOR DEVELOPER
The minimum software specification of the system used in our project is:
Operating System : Windows XP,7 or above
Web application : PHP Technology
Front End : WAMP SERVER (PHP, HTML, CSS, JAVASCRIPT)
Back End : SQL SERVER.
Tools : Photoshop CS3, MS Word
Other Requirements : Dreamweaver CS3

HARDWARE ENVIRONMENT FOR USER

 End user should have at his free disposal the following hardware entities.
 End users should be able to make use of computers.
 User should have permanent username and password.
 User should have a printer and thumb machine.

SOFTWARE ENVIRONMRNT FOR USER.

End user should have at his free disposal the following software entities.
User should be able to make use of minimum Windows operating system
User should be installed .net frame works.

FUNCTIONAL REQUIREMENTS

It is the statement of services the system should provide and also what the
system should not do. These are statements of services the system should
provide. How the system should react to particular inputs and how the system
should behave in particular situations. Functional Requirements should include
description of data to be entered into system.
Functional Requirements Should Include:

 Description of data to be entered into system.


 Description of operations performed by each screen.
 Description of workflows performed by the system.
 Description of system reports of the outputs.
 Who can enter data into system
Functional requirements document (functional specification or functional
requirement specification) define the capabilities and function that a system
must be able to perform successfully.

NON FUNCTIONAL REQUIREMENTS

It is the requirements that are not defectively concerned with the specific
function delivered by the system. Then nonfunctional requirements are:

 Software should be user friendly.


 It must be reliable.
 It should be maintainable and able to add new features without an
extra effort.
 Safely Backup in case of failure.
TECHNOLOGY

PHP (Hypertext Pre-Processor)

PHP is a powerful tool for making dynamic and interactive Web pages.PHP
is the widely – used, free and efficient alternative to competitors such as
Microsoft’s ASP.PHP stands for Hypertext Preprocessor. It is a server-side
scripting language, and the scripts are executed on the server.PHP supports many
database (MySQL, Informix, Oracle, Sybase, Solid, PostgreSQL, Generic ODBC,
etc.). PHP is open source software and is free to download and use.
PHP is an advanced product of PHP/FI. Rasmus Ledorf created
PHP/FI in the year 1995. PHP /FI stands for personal home page. Forms
interpreter. Initially it was a simple set Perl script, which was used for tracking
accesses to his online resumes. These set of scripts were named as personal
homepage tools. After writing larger C implementation the scripts were able to
write work with the data bases and the users were able to develop simple dynamic
applications. PHP 3.0 is the first version recent PHP. Andi Gutmans and Zeev
Surakshi created PHP 3.0 in the year 1997. It provides a concrete infrastructure for
different databases, protocols, and API’s to the end user. In addition it also
provides object oriented syntax support.

FEATURES

 PHP scripts are executed on the server side.


 PHP can generate dynamic page content.
 PHP is free to download and use.
 PHP can create, open, read, write, delete and close files on the server.
 PHP collect form data.
 PHP can send and receive cookies.
 PHP can add, delete, modify data in our database.
 PHP can be used to control user-access.
 PHP can encrypt data.
 PHP can run on various platforms (Windows, Linux, Mac OS).
 PHP is compatible with almost all servers.
 PHP supports a wide range of databases.
 PHP is easy to learn and runs efficiently on the server side.

DATABASE SERVERS

A database server is used to store data in a database. Users can access


the data and manipulate it. An application can provide the user with the interface to
the database. There are many types of databases. The most popular among them is
the Relational Database Management System (RDBMS).

SQL (Structured Query Language)

SQL stands for “Structured Query Language” .It is a query language


used for accessing and modifying information in the database. IBM first developed
SQL in 1970s. Also it is an ANSI/ISO standard. It has become a Standard
Universal Language used by most of the relational database management systems
(RDBMS).Few of the sql commands used in SQL programming are SELECT
Statement, UPDATE Statement, INSERT INTO Statement, DELETE Statement,
WHERE Clause, ORDER BY Clause, GROUP BY Clause, ORDER Clause, Joins,
Views, GROUP Functions, Indexes etc.

In a simple manner, SQL is a non-procedural, English-like language


that processes data in groups of records rather than one record at a time. Few
functions of SQL are: store data, modify data, retrieve data, delete data, and create
tables and other database objects

SQL Commands:

SQL commands are instructions used to communicate with the


database to perform specific task that work with data. SQL commands can be
used not only for searching the database but also to perform various other
functions like, for example, you can create tables, add data to tables, or modify
data, drop the table, set permissions for users. SQL commands are grouped into
three major categories depending on their functionality:

 Data Definition Language (DDL) - These SQL commands are used for
creating, modifying, and dropping the structure of database objects. The
commands are CREATE, ALTER, DROP, RENAME, and TRUNCATE.
 Data Manipulation Language (DML) - These SQL commands are used
for storing, retrieving, modifying, and deleting data. These commands are
SELECT, INSERT, UPDATE, and DELETE.
 Transaction Control Language (TCL) - These SQL commands are used
for managing changes affecting the data. These commands are COMMIT,
ROLLBACK, and SAVEPOINT.

SQL Server 2005 includes tools for extracting and analyzing summary
data for online analytical processing. SQL server also includes tools for visually
designing databases and analyzing data using English based questions.

 Cost of SQL Server is less.


 Less expensive to both purchase and operate.

JAVASCRIPT
JavasScript is an object-oriented scripting language used to enable programmatic

access to objects with both the client application and other applications .It is

primarily used in the form of client-side JavaScript , implemented as an integrated

component of the web browser, allowing the development of enhanced user

interface and dynamic website. JavaScript is a dialect of the ECMA script was
influenced by many language and was designed to look like Java, but to be easier

for non-programmers to work with.

JavaScript, despite the name, is essentially unrelated to the Java programming

language even though the two do have superficial similarities. Both languages use

syntaxes influenced by that of C syntax, and JavaScript copies many Java names

and naming conventions. The language‟s name is the result of a co-marketing deal

between Netscape and sun, in exchange for Netscape bundling sun‟s Java runtime

with their then-dominant browser. The key design principles within JavaScript are

inherited from the Self and Scheme programming languages.

“JavaScript” is a trademark of Sun Microsystems. It was used under license for

technology invented and implemented by Netscape communications and current

entities such as the Mozilla Foundation.

WAMP
WAMP are packages of independently-created programs installed on computers

that use a Microsoft Windows operating system. The interaction of these programs

enables dynamic web pages to be served over a computer network, such as the

internet or a private network.

“WAMP” is an acronym formed from the initials of the operating system

(windows) and the package‟s principal components :Apache, MySQL and PHP(or

Perl or python). Apache is a web server, which allows people with web browsers
like Internet Explorer or Firefox to connect to a computer and see information

there as web pages.

MySQL is a database manager that keeps track of data in a highly organized way.

PHP is a scripting language which can manipulate information held in a database

and generate web pages afresh each time an element of content is requested from a

browser. Other programs may also be included in a package, such as phpMyAdmin

which provides a graphical interface for the MySQL database manager, or the

alternative scripting languages Python or Perl.

Licensing and costs of WAMP/LAMP:

Apart from the Windows operating system itself, the components of

WAMP/LAMP are available as free/open source software. This means that a

dynamically-generated web site can be set up without major software purchase or

update subscription costs. Many web hosting services take advantage of this by

offering pre-installed WAMP/LAMP components among their options.

ADOBE DREAMWEAVER
Adobe Dreamweaver is a web development application originally created by

Macromedia, and is now developed by Adobe Systems, which acquired

Macromedia in 2005. Dreamweaver is available for the both Mac and Windows

operating system. Recent versions have incorporated support for web technologies

such as CSS, Java Script, and various serverside scripting languages and

frameworks including ASP, ColdFusion, and PHP.


Dreamweaver allows users to preview websites in locally-installed web servers.It

also has site management tools such as FTP/SFTP and WebDAV file transfer and

synchronization features, the ability to find and replace lines of text or code by

search terms and regular expressions across the entire site, and the templating

feature that allows single-source updates of shared code and layout across entire

sites without server-side includes or scripting. The behaviors panel also enables

use of basic Java Script without any coding knowledge, and integration with

Adobe‟s Spry AJAX frameworks offers easy access to dynamically – generated

content and interfaces.

Dreamweaver can use third-party “Extensions” to extend core functionality of the

application, which any web developer can write (largely in HTML and Java

Script). Dreamweaver is supported by a large community of extensions developers

who make extensions available (both commercial and free) for most web

development tasks from simple rollover effects to full-featured shopping carts.

Dreamweaver , like other HTML editors , edits files locally then uploads them to

the remote web server using FTP, SFTP, and WebDAV. Dreamweaver CS4 now

supports the Subversions(SVN) version control system.


SYSTEM DESIGN
SYSTEM DESIGN

System design is the process of developing specifications for a candidate


system that meet the criteria established in the system analysis. Major step in the
system design is the preparation of input form and output report in a form
applicable to users.

The main objective of the system design is to use the package easily by any
computer operators. System design is the creative act of invention, developing new
input, new database, offline files, method and output for processing business to
meet an organization objective. System design builds information gathered during
the system analysis.

The system design is the most creative and challenging phase. The first step
is to determine how the output is produced and what format. Sample of input and
outputs are presented. Next the input data and the master data are to be designed to
meet the requirement of proposed output. The operational phase is handled through
program construction testing, including a list of programs needed to meet the
system objective and complete documentation.

DATA FLOW DIAGRAM

DFD is a diagrammatic representation of the data flow in the software


system. In the software development environment a system analyst will interview a
client for all the project specifications. If the diagram is as per requirements and
fulfills all needs of client, then the creation of the database and table will follow.
Data flow diagrams represent one of the most ingenious tools used for structured
analysis.
DFD has the purpose of clarifying system requirements and identifying
major transformations that will become progressive in system design. It is the
major starting point in the design phase that functionally decomposes the
requirements specifications down to the lowest level of detail. The DFD, also
known as bubble chart has the purpose of clarifying system requirement and
identifying transformation, which is the primary phase of software development.

The graphical representation of system makes it good communication tool


between the user and the analyst. In normal convention, logical DFD can be
completed using 5 Notations.

Data Flow: - Data flow means the movement of data in a system from a point of
origin to a specific destination that is the flow of data between process, data stores
and external entities indicated by a line and arrow.

Data Store: - It is a component of DFD that describe the repositories of data in a


system. The symbol used is an open rectangle.

Process: -A procedure that transforms input into useful output in a DFD is


indicated by a bubble or circle.

Source, Destination: - A square defines a source or destination of system data.


Symbols Definitions

Source or destination of system data

Processes

Table

Flow of data

Database

The merit of DFD is that it can provide an overview of what data a system
would process, what transformation of data are done, what files are used and where
the result flow.
Once any system is represented using a data flow diagrams we can identify
the following things easily:

 Various entities interacting with the system.


 Flow of data from one entity to another.
 The various processes involved in between the interaction of two or more
entities in the system.
 The various data stores, which hold the data in between the processes.

The data flow diagram was first developed by Larry Constantine as a way
of expressing system requirement in a graphical form.DFD also known as “Bubble
chart” has the purpose of clarifying system requirements and identifying manor
transformation that will become programs in system design. So it is the starting
point of the design phase that functionally decomposes the requirements
specification down to the lowest level of detail.

A DFD provides an easy, graphic means of modeling the flow of data


through a system whether manual, automated or mixture of both. It is a picture
showing the flow of data through a system of any kind showing the external
entities that are sources or destinations of data, and the places where data are
stored. A DFD consists of series of bubbles joined by lines. The bubble represents
data transformations and line represents data flow in the system.
DATA FLOW DIAGREMS
L evel - 0

R equest R equest

H e a lth
U ser &
N u tritio n d b _ h e alth

R espo nse R esponse


L e v e l:1

A u th e n tic
A d m in
atio n

N u tritio n
N u tritio n
d e ta ils

d a tab as e

U ser C heckup

O b tain
C ro s s M atc h in g
R e s u lt
L e v e l - 2 .1 [ A d m in is t r a t o r ]

U p d a te 1 .1

U p d a te
C r e d e n t ia l
a d m in _ lo g i
n
V a lid a te c r e d e n tia ls
R e g is t e r
1 .2

M anage n u tr i_ r e g
N u t r it i o n i s t
M ange

1
A d m in is trato r
L o g in
1 .3 V ie w
u se r_re g
U ser

R e g is t e r

1 .4 fo o d_ m a s te
Food r
M a s te r
U p d a t e / D e le t e

R e g is t e r
1 .5
fo o d_ te m pl
T e m p la t e a te
M s te r
U p d a t e / D e le t e
L e v e l - 2 .2 [ N u t r itio n is t]
1 .1
U p d a te
U p d a te
C r e d e n t ia ls

n u t r i_ r e g

V a lid a te c r e d e n tia ls
Add
1 .2
in g r e d ie n t s _
A d d N u t r it io n reg
F a c ts

M anage

N u tritio n 1
R e g is t e r
L o g in 1 .3

Food food_ re g
R e g is t e r
M anage

R e g is t e r
1 .4
fo o d_te m pl
C re a te F o o d a te
T e m p la t e s

U p d a t e / D e le t e

1 .5

M anage
Food

1 .6 R e g is t e r
fo o d_ te m pl
ate
Food
T e m p la t e

U p d a t e / D e le t e
1 .7

M anage
T e m p la t e
L e v e l 2 .3 [U s e r] 2 .1
u p d a te
U p d a te

u se r_re g

v ie w food_ re g
r e g is t e r
2 .2
v a lid a t e
1 S earc h v ie w
Food
R e g is t e r

v ie w
f o o d _ in g r i
User
2 C ross
M a tc h

T e m p o ra ry sto ra g e c ro s s D a ta
L o g in

2 .3 te m p la te _ r e g

S earc h
T e m p la t e

te m p

F e t c h r e s u lt

d is e a s e _ in fo
R e s u lt

M a t c h d a t a 's
L e v e l 2 .4 [ C r o s s m a t c h ]
u ser_reg

v ie w food_ re g

M a tc h B a s e d v ie w
O n Food

v ie w
fo o d _ in g r i
C ro ss M a tch
C ross
M a tc h

T e m p o ra ry sto ra g e c ro s s D a ta
2

M a tc h B a s e d
O n T e m p la t e
te m p la te _ r e g

te m p

F e t c h r e s u lt

d is e a s e _ in fo
R e s u lt

M a t c h d a t a 's
DATA BASE TABLES
Table Name: Admin Login

Field Name Data Type Constrains


ID INT(100) PRIMARY KEY

USERNAME VARCHAR(100) NOT NULL

PASSWORD VARCHAR(100) NOT NULL

Table Name: Feedback

Field Name Data Type Constrains

ID INT(50) PRIMARY KEY

USER_ID INT(50) NOT NULL

MESSAGE VARCHAR(100) NOT NULL

DATE DATE NOT NULL


Table Name: Food _Ingri_Reg

Field Type Data Type Constrains

ID INT(100) PRIMARY KEY

FOOD NAME VARCHAR(100) NOT NULL

INGREDIENS VARCHAR(100) NOT NULL

QUANTITY VARCHAR(100) NOT NULL

Table Name: Master Food Reg

Field Type Data Type Constrains

ID INT(100) PRIMARY KEY

MASTER NAME V ARCHAR(100) NOT NULL

FOOD VARCHAR(100) NOT NULL

QUANTITY VARCHAR(100) NOT NULL


Table Name: Nutrition Facts Reg

Field Type Data Type Constrains

REG_ID INT(100) PRIMARY KEY

NAME VARCHAR(100) NOT NULL

CATEGORY VARCHAR(100) NOT NULL

FAT VARCHAR(100) NOT NULL

SUGAR VARCHAR(100) NOT NULL

FIBER VARCHAR(100) NOT NULL

CARBOHYDRATE INT(100) NOT NULL

WATER INT(100) NOT NULL

MINERALS VARCHAR(100) NOT NULL

PROTEIN VARCHAR(100) NOT NULL

VITAMINS VARCHAR(100) NOT NULL


Table Name: Nutrition Reg

Field Type Data Type Constrains

REG_ID INT(100) PRIMARY KEY

NAME VARCHAR(100) NOT NULL

PLACE VARCHAR(100) NOT NULL

DOB DATE NOT NULL

CONTACT BIGINT(100) NOT NULL

EMAIL VARCHAR(100) NOT NULL

USERNAME VARCHAR(100) NOT NULL

PASSWORD VARCHAR(100) NOT NULL


Table Name: Reg Food Master

Field Type Data Type Constrains

REG_ID INT(100) PRIMARY KEY

FOOD NAME VARCHAR(100) NOT NULL

TIME VARCHAR(100) NOT NULL

CATEGORY VARCHAR(100) NOT NULL

Table Name: Reg Template master

Field Name Data Type Constrains

ID INT(100) PRIMATY KEY

NAME VARCHAR(100) NOT NULL

TYPE VARCHAR(100) NOT NULL


Table Name: User Food Ingri Reg

Field Type Data Type Constrains

ID INT(30) PRIMARY KEY

USER ID INT(30) NOT NULL

FOOD NAME VARCHAR(50) NOT NULL

INGREDIENTS VARCHAR(50) NOT NULL

QUANTITY INT(50) NOT NULL

Table Name: User Master Food Reg

Field Type Data Type Constrains

ID INT(25) PRIMARY KEY

USER ID INT(50) NOT NULL

MASTER NAME VARCHAR(50) NOT NULL

FOOD VARCHAR(50) NOT NULL

QUANTITY INT(30) NOT NULL


Table Name: User Reg

Field Type Data Type Constrains

REG_ID INT(100) PRIMARY KEY

NAME VARCHAR(100) NOT NULL

PLACE VARCHAR(100) NOT NULL

DOB DATE NOT NULL

CONTACT BIGINT(100) NOT NULL

PRESSURE VARCHAR(100) NOT NULL

CHOLESTEROLE VARCHAR(100) NOT NULL

SUGAR VARCHAR(100) NOT NULL

PASSWORD VARCHAR(100) NOT NULL


INPUT DESIGN

During the system study phase a lot of time was taken to study process
involved in the form, report generation and also in the types of data to be entered
in the system. Accordingly, Input design was carried out. Input designing make
data entry as we see, user friendly and error free as possible. Input forms are
always an important part of the systems design functions. In addition to this, data
is validated wherever it requires in the project. This ensures that only the correct
data have been incorporated into the system. The aim of designing input data is
to make the automation as easy and free from errors as possible. The objectives
of input design are as follows:

 Avoiding error in data


 Avoiding extra step
 Keeping process simple
 Controlling of the input

Input forms are always an important part of the systems design functions.
The data is fed into the system using simple interactive forms. The forms have
been supplied with messages so that user can enter data without any difficulty. In
addition to this, data is validated wherever it requires in the project. This ensures
that only the correct data have been incorporated into the system. The aim of
Designing input data is to make the automation as easy and free from errors as
possible. In entering data, operators need to know the following:

 The allocated space for each field.


 Field sequence, which must match that in the source document.
 The format in which data fields are entered.

The input design requirements such as user friendliness, consistent format


and interactive dialogue for giving the right message and help for the user at right
time are also considered for the development of this project. Input design
involves determining the record media, method of input, speed of validation and
entry to the system.

OUTPUT DESIGN

Here the output forms are designed carefully to meet complete user
satisfaction since it is the direct source for stored information. The output forms
are efficiently and intelligibly designed in order to improve the system
relationship with the user and help the decision making. Output design was an
ongoing activity almost on the beginning of the project. Reports are the common
outputs. They can be in the form of paper printout or may be displayed on the
screen. The output generally refers to the results and information that is
generated from the system or stored by the user. Outputs from the computers
are required primarily to communicate the result of processing to the users. The
Objective of the output Design is to convey the information of all the past
activities, current status and emphasize important events.
SYSTEM DEVELOPMENT
SYSTEM DEVELOPMENT

SYSTEM DEVELOPMENT STRATEGIES

As the system requirement was predictable. It was decided to follow


classical system Development life-cycle method (water fall model). The steps of
the classical life-cycle paradigm are very similar to the generic steps. Those are
applicable to all software engineering paradigms. The life-cycle approach
encompasses the following activities:

System Engineering and Analysis

Because software is always part of a larger system, work begins by


establishing requirements of all system elements and then allocating some subsets of
these requirements to software. This system view is essential when software must
interface with other elements such as hardware, people and database. System
engineering and analysis and encompasses requirements gathering at the system
level with a small amount of top- level design and analysis.

Software Requirement Analysis

The requirement gathering process is intensified and focused specially on


software. To understand the nature of programmed to be built the software
engineers understand to the information domain for the software. As well as the
required function performance and as interfacing. Requirements for both the
system and software are documented and reviewed with the user.

Design

Software design is actually a multistep process that focuses on four


distinct attributes of the program:
 Data Structure.
 Software Architecture,
 Procedural Details
 Interface Characterization
The design face translates the requirements into a representation of the
software that can be assessed for quality before coding begins.

Coding

The design must be translated into a machine- readable form the coding
steps performs this task. If design is performed in detailed manner, Coding can be
accomplished mechanistically.

Testing

The testing processors focus on the logical internal of the software. and ensuring
that all statements have been tested and on the functional externals, that is
Conducting tests to uncover errors and ensure that defined input will produce
actual results. That with agreed required results.

Maintenance

Software will undergo the change after it is delivered to the user. It is because
Errors have been encountered, because the software must be adapted to
accommodate changes in its external environment. Software maintenance applies
each of the proceeding lifecycles steps to an existing program rather than a new
one.
DEVELOPMENT APPROACH

A software development methodology or system development


methodology in software engineering is a framework that is used to structure,
plan and control the process of developing an information system. Every software
development methodology framework acts as a basis for applying specific
approaches to develop and maintain software. Several software development
approaches have been used since the origin of information technology.

They are:

 Waterfall: a linear frame work.


 Prototyping: an iterative framework.
 Incremental: a combined linear iterative framework.
 Spiral: a combined linear iterative framework
 Rapid Application Development (RAD): an iterative framework
 Extreme Programming.
We have used the waterfall approach in our project. The Waterfall model is
a sequential development approach, in which development is seen as flowing
steadily downwards (like a waterfall through the phases of requirements analysis,
design. Implementation, testing (validation), integration, and maintenance.

The basic principles are:

Project is divided into sequential phases. With some overlap and


splash back acceptable between phases. Emphasis is on planning time schedules,
target dates. Budgets and implementation of an entire system at one time. Tight
control is maintained over the life of the project via extensive written
documentation, formal reviews, and approval/signoff by the user and information
technology management occurring at the end of most phases before beginning the
next phase It can be extended to software maintenance. It provides mechanism for
Software Quality Assurance. It allows re-evaluation after each phase.
CODING

The process of translation of the design specification into a programming


language that is ultimately transformed into machine executable instructions.
Coding phase begin after the design phase is completed. The output of the design
phase is the detailed design document: it is the input to the coding phase.

Coding is the part where we program the main functionality of the system.
The aim of the coding phase is to produce simple and clean programs. All the
syntax and semantic errors of the program must be detected and solved. Coding
produces modules that must be unit files are written in programming language.

The following are some of the general coding principles:

 Keep the coding simple.

 Keep the module short.

 Code should be legible.

 Add comments (internal documents).


SYSTEM TESTING
SYSTEM TESTING

Software testing is critical element of software quality assurance and


represents the ultimate review of the specification, design and coding system
testing makes a logical assumption that all the part of the system is correct. The
goal will be successfully will be achieved. Testing is a set of activity that can be
planned in advance and conducted. Systematically this s aimed at ensuring that the
system works accurately and efficiently before live operations commences.

 Testing is the process of correcting a program with intend of finding error.


 A good test case is one that has high probability of finding a yet
undiscovered error
 A successful test is one that uncovers a yet undiscovered error.
TESTING OBJECTIVES

There are several rules that can serve as testing objectives:

 Testing is a process of executing a program wishes the intent of finding an


error.
 A good test case is on that has high probability finding an undiscovered
error.
 A successful test is one that uncovers an undiscovered error.

Testing is vital to the success of the system. system testing makes a logical
assumption on that if all parts of the system are subject to variety of tests on-
line response, volume, stress, recovery and security and usability tests .A series
of tents are performed before the system is ready for user acceptance testing.

TESTING STRATEGIES

White Box Testing

Black Box Testing

White Box Testing

White box testing is also known as code testing. The code testing
strategy checks for the correctness of the every statement in the program. To
follow this strategy there should be cases that result in execution of every
instruction in the program or module.

Which is every path in the program is tested. The test cases be


guaranteed that independent paths within module are executed once.

Exercise all logical decision on their true or false sides. Execute an loops
at their boundaries and within their operational bounds This testing strategy, on
the face of it, sounds exhaustive, if every statement in the program is checked for
its validity, there does not seem to be much scope error.

Black Box Testing

Black box testing is also known as specification testing, to perform black


box testing. The analyst examines the specification taking what the program or
module should do and how should perform on the various conditions and
submitted for processing. By examine the result, the analyst can examine whether
the program performs according to the specified requirements.

TYPES OF TESTING

Different types of testing are:


 Unit testing.
 Integration testing.
 System testing.
 User acceptance testing.
Unit Testing

Unit testing enables a programmer to detect error in coding. A unit test


focuses verification of the smallest unit of software design. This testing was
carried out during the coding itself in this testing step. Each module is going to be
work satisfactorily as the expected output from the module.

Project aspect

The front-end design consists of various forms. They were tested for data
acceptance. Similarly, the back-end also tested for successful acceptance and
retrieval of data.

Integration Testing

This is through each program work individually. They should work after
linking together referred to as interfacing. Data may be lost across the interface
one module can have adverse effect on the other. Subroutines after linking may
not do the desired function expected by the main routine.

Integration testing is the systematic technique for constructing the program


structure while at the same time conducting test to uncover errors associated with
the interface. Using integrated test plan prepared in the design phase of the system
development as a guide the integration test was carried out. All the errors found in
the system corrected for the next testing step.
Project aspect

After connecting the back-end and the front-end as whole module, the data entered
in the front-end once submitted were successfully entered in the database. On
request, data were successfully retrieved in to forms.

System Testing

After performing the integration testing, the next step is output testing
of the proposed system. No system the integration output in a specified could be
useful if it doesn't produce the required format. The output generated are displayed
by the system under consideration and then tested by comparing with the form
require by the user. Here the output format is considered into two ways, one in on-
screen and other in printed format.

Project Aspect

The entire project was tested and found successful.

Validation Testing

The user has to work with the system and check whether the project
meets his needs in the validation checking, the user works with the beta version
of the software.

Project aspects

User enters the appropriate data and results was checked and validated.
User acceptance test

User acceptance of a system is a key factor of the success of any system. The
system under consideration was tested for user acceptance by running a
prototype of the software.

Project aspects

An alpha version is demonstrated to the users. Their suggestions are record.


SYSTEM
IMPLIMENTATION
SYSTEM IMPLIMENTATION

INTRODUCTION

Implementation is the key to successful information system it is a stage of


the project when the theoretical design is turned into a working system. It simply
means converting a new system design into operation newly developed system
attains fulfillment only after its the implementation of the newly system designed
into operational one. This implementation involves various jobs like planning for
implementation, transaction and training. In order to implement the system,
planning is essential. Proper planning has been done to take care of the issues like
the implication of the system environment, stand by facilities, channel for
communication resource availability, methods of changeover. The plan of
implementation consists of steps like detection and correction of errors, making
necessary changes in the system, checking the reports with that of existing system.
Training the involvement of user personnel installation of hardware and software.

The implementation plan was well executed and results are obtained.
As per the observation some minor problem were identified and rectified. The
system was found to be user friendly. The implementation phase of the software
design consists of different tasks to be done sequentially for obtaining the desired
results. Here we do not implement parallel: instead we first implement admin and
then the user module.

The different phases are:


CREATING THE DATABASE

A Database is created, in which all the tables are defined which are required
to do the different operations such as storage and retrieval of information.
Databases are designed in such a way it can handle the different database queries.
User and admin can retrieve required details from the system on clicking on the
links and buttons.

CREATING SYSTEM ENVIRONMENT

For the intended project to work on, we need to implement its required
hardware and software requirements. This system is build using Visual Studio
2010 under NET framework and based on Windows Operating System. Memory
and Hard disk should confirm according to hardware requirements mentioned
above.

PERFORMING FUNCTIONS

Initially we implement the admin module because the operation made in


admin reflects the after implementing this, we check whether all the operations
and in user module. Reports are up to the specification. Only after ensuring this
we go for user module. With the help of a user-friendly visual interface, the end
users can perform the desired operations upon selecting any operation, the
corresponding link commands will be passed to database and the response is also
received. The responses are then retrieved and displayed in screen. The system
was newly developed was found satisfactory in all aspects and considering the
nature of business environment
SYSTEM MAINTENANCE
SYSTEM MAINTENANCE

The maintenance phase of the software cycle is the time in which a


software product performs useful work. After a system is successfully
implemented, it should be maintained in proper manner. System maintenance is an
important aspect in the software development life cycle. The need for the system
maintenance is to make it adaptable to the changes in the system environment.
There may be social, technical and other environment changes, which affects a
system, which is implemented .Software product enhancement may involve
providing new functional capabilities, improving user displays and mode of
interaction, upgrading the performance characteristics of the system. So only
through proper system maintenance procedures, the system can be adapted to cope
up with these changes. It is the last stage of the software life cycle.

Software maintenance activities can be classified into:

 Corrective maintenance: Fixing bugs in the code.


Adaptive maintenance: Adapting the software to new environments.
 Predictive maintenance: Updating the software according to changes in user
requirements.

 Preventive Maintenance: deals with updating documentation and making


the son ware more maintainable.
SECURITY AND MAINTENANCE

The security of a system is an assessment of the extent that the system protects
itself from external attacks that may be accidental or deliberate.

Attacks

Might be viruses, unauthorized use of system services, and unauthorized


modification of system or data. Security is important for all systems and unless a
reasonable level of security is reached the availability, reliability, and safety will
not be reached .This system ensures security through password and it denials its
services for unauthorized users. The administrator his own password and members
can login by creating his username and password.

Maintenance

After the installation phase is completed the administrator has been given a
working model demo. After that a brief class is given about the maintenance to the
officials of agriculture office. There is sequence of maintenance firstly the
member’s has its own username password after the registration. The official also
has password username system to edit and use the personal information of the
users. The administrator which control whole structure by analyzing whole
members and official details.

Training

Before the final system has been delivered the users need to be trained The
Administrator requires training for each module. He should be given ideas of
database concepts, maintaining security. And report generation. Navigation of each
link and Information flow, About Us and Help links helps to clarify doubts and
provide overall view of the system to admin and members.
SCOPE OF

FUTURE ENHANCEMENT
FUTURE ENHANCEMENT

The system can be enhanced by various means depending on the type of


design and layout of the website. Developer can also add some more features to the
project with more and more user friendly. Now the system is developed with
limited features on user reputation. The drawbacks of existing system as listed
before are fully evacuated. All the existing inconsistencies such as paper work and
time wasting can be reduced.

The system is very flexible for further up graduation. It also possible to


include more features into the system. The flexibility makes the system
widening its scope. The daily work can be done with much more easily and
efficiently without manual error.
CONCLUSION
CONCLUSION

This project “HEALTH&NUTRITION E-ASSISTANT” was successfully


completed within the time span allotted. It is successfully designed and
implemented according to the requirements and specifications. All the modules
are tested separately and put together to form the main system. Finally the system
is tested with real data and everything worked successfully. Thus the system has
fulfilled the entire objective identified.

The system had been developed in an attractive design way. So user with
Minimum knowledge about internet can also access the system easily through
Internet. To conclude this, we thank all people who helped us to complete this
Project successfully.
APPENDIX
Book References
Html

CSS

PHP

Bootstrap

Website Referred

1. www.w3schools.com
2. www.wikipedia.com
Programming codes

User Registration:-

<?php

if (!isset($_SESSION)) {

session_start();
}
if(isset($_SESSION['user_id']))
{
$_SESSION['user_id'];

}
else

?>

<?php
require_once("../connection/connection.php");
#start insert
if(isset($_POST['REGISTER']))
{
$name=$_POST['name'];
$place=$_POST['place'];
$dob=$_POST['dob'];
$contact=$_POST['contact'];
$pressure=$_POST['pressure'];
$cholesterol=$_POST['cholesterol'];
$suger=$_POST['suger'];
$password=$_POST['password'];
mysql_query("insert into
user_reg(name,place,dob,contact,pressure,cholesterol,suger,password)
values('$name','$place','$dob','$contact','$pressure','$cholesterol','$suger','$p
assword')") or die(mysql_error());

$slqry=mysql_query("SELECT * FROM `user_reg` ORDER BY


`user_reg`.`Reg_id` DESC LIMIT 1");
$laid= mysql_fetch_assoc($slqry);
$user_id=$laid['Reg_id'];
//session_start();
$_SESSION['user_id']=$user_id;
header("location:login.php");
}
#end insert
?>
<!DOCTYPE html>
<html lang="en">
<head>
<title>Bootstrap Example</title>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet"
href="https://maxcdn.bootstrapcdn.com/bootstrap/3.4.0/css/bootstrap.min.css
">
<script
src="https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js"></scrip
t>
<script
src="https://maxcdn.bootstrapcdn.com/bootstrap/3.4.0/js/bootstrap.min.js"><
/script>
<script
src="https://ajax.googleapis.com/ajax/libs/angularjs/1.6.4/angular.min.js"></s
cript>
</head>

<style>
.input.ng-untouched
{
border:1px solid #ccc;
}
input.ng-invalid
{
border:1px solid red;
}
input.ng-valid
{
border:2px solid green;
}

</style>
<body>
<br>
<br>
<div class="container">
<div class="row">
<div class="col-sm-4">
</div>
<div class="col-sm-8">
<h3 align="center"><b>USER REGISTRATION</b></h3>
<!--form started-->
<form class="form-horizontal" action="" method="post" ng-
app="myApp" ng-controller="validateCtrl" name="myForm"
method="post">
<div class="form-group">
<label class="control-label col-sm-2" for="name">Name:</label>
<div class="col-sm-10">
<!-- <input type="text" class="form-control" id="name"
placeholder="Enter name" name="name">-->
<input type="text" name="name" ng-model="name" ng-minlength="3"
placeholder="Enter name" class="input form-control" required>
<span style="color:red" ng-show="myForm.name.$dirty && myForm.name.
$invalid">
<span ng-show="myForm.name.$error.required">Name is required.</span>
<span class="msg" ng-show="myForm.name.$dirty && myForm.name.
$error.minlength">Not a Name</span></span>
</div>
</div>
<div class="form-group">
<label class="control-label col-sm-2" for="place">Place:</label>
<div class="col-sm-10">
<!-- <input type="text" class="form-control" id="place"
placeholder="Enter place" name="place">-->
<input type="text" name="place" ng-model="place" ng-minlength="3"
placeholder="Enter place" class="input form-control" required>
<span style="color:red" ng-show="myForm.place.$dirty && myForm.place.
$invalid">
<span ng-show="myForm.place.$error.required">Place is required.</span>
<span class="msg" ng-show="myForm.place.$dirty && myForm.place.
$error.minlength">Not a place name</span></span>
</div>
</div>
<div class="form-group">
<label class="control-label col-sm-2" for="dob">DOB:</label>
<div class="col-sm-10">
<input type="text" class="form-control" id="txtfuturedate"
placeholder="yyyy/mm/dd" name="dob">
</div>
</div>
<div class="form-group">
<label class="control-label col-sm-2" for="place">CONTACT:</label>
<div class="col-sm-10">
<!-- <input type="number" class="form-control" id="place"
placeholder="Enter NUMBER" name="contact">-->
<input type="number" name="contact" placeholder="Enter NUMBER"
ng-model="contact" ng-minlength="10" ng-maxlength="10" class="input
form-control" required/>
<span style="color:red" ng-show="myForm.contact.$dirty &&
myForm.contact.$invalid">
<span ng-show="myForm.contact.$error.required">Contact is
required.</span>
<span class="msg" ng-show="myForm.contact.$dirty && myForm.contact.
$error.minlength">Not A Contact Number</span>
<span class="msg" ng-show="myForm.contact.$dirty && myForm.contact.
$error.maxlength">Not A Contact Number</span></span>
</div>
</div>
<div class="form-group">
<label class="control-label col-sm-2" for="preasure">Preasure:</label>
<div class="col-sm-10">
<select name="pressure" class="form-control" required="">
<option value="">Select</option>
<option value="Low">Low</option>
<option value="Normal">Normal</option>
<option value="Border">Border</option>
<option value="Patient">Patient</option>
<option value="Critical">Critical</option>
</select>
</div>
</div>
<div class="form-group">
<label class="control-label col-sm-2"
for="cholesterol">cholesterol:</label>
<div class="col-sm-10">
<select name="cholesterol" class="form-control" required="">
<option value="">Select</option>
<option value="Low">Low</option>
<option value="Normal">Normal</option>
<option value="Border">Border</option>
<option value="Patient">Patient</option>
<option value="Critical">Critical</option>
</select>
</div>
</div>
<div class="form-group">
<label class="control-label col-sm-2" for="suger">suger:</label>
<div class="col-sm-10">
<select name="suger" class="form-control" required="">
<option value="">Select</option>
<option value="Low">Low</option>
<option value="Normal">Normal</option>
<option value="Border">Border</option>
<option value="Patient">Patient</option>
<option value="Critical">Critical</option>
</select>
</div>
</div>
<div class="form-group">
<label class="control-label col-sm-2" for="password">Password:</label>
<div class="col-sm-10">
<!--<input type="password" class="form-control" id="password"
placeholder="Enter password" name="password">-->
<input type="password" name="password" placeholder="Enter
password" ng-model="password" ng-minlength="5" class="input form-
control" required/>
<span style="color:red" ng-show="myForm.password.$dirty &&
myForm.password.$invalid">
<span ng-show="myForm.password.$error.required">Password is
required.</span>
<span class="msg" ng-show="myForm.password.$dirty &&
myForm.password.$error.minlength">Minimum Length Is
Five</span></span>
</div>
</div>
<div class="form-group">
<label class="control-label col-sm-2" for="pwd">C-Password:</label>
<div class="col-sm-10">
<!--<input type="password" class="form-control" id="pwd"
placeholder="Enter password" name="pwd">-->
<input type="password" name="cpassword" ng-model="cpassword"
placeholder="Enter password" class="input form-control" required/>
<span style="color:#F00" ng-show="myForm.cpassword.$dirty > 0 &&
password !== cpassword">Password miss match</span>
<span style="color:red" ng-show="myForm.cpassword.$dirty &&
myForm.cpassword.$invalid">
<span ng-show="myForm.cpassword.$error.required">Password is
required.</span>
</span>
</div>
</div>
<div class="form-group">
<div class="col-sm-offset-2 col-sm-10">
<button type="submit" name="REGISTER" class="btn btn-default"
ng-disabled="myForm.name.$dirty && myForm.name.$invalid||
myForm.place.$dirty && myForm.contact.$invalid || myForm.place.$dirty
&& myForm.contact.$invalid || myForm.password.$dirty &&
myForm.password.$invalid || myForm.cpassword.$dirty &&
myForm.cpassword.$invalid || myForm.cpassword.$dirty > 0 && password !
== cpassword" class="btn btn-default">Submit</button>
</div>
</div>
</form>
<!--close form -->
</div>
</div>

</div>

</body>
<script
src="https://ajax.googleapis.com/ajax/libs/jquery/3.3.1/jquery.min.js"></scrip
t>
<link rel="stylesheet"
href="http://code.jquery.com/ui/1.9.1/themes/base/jquery-ui.css" />
<script src="http://code.jquery.com/ui/1.9.1/jquery-ui.js"></script>
<script>
$("#txtfuturedate").datepicker({
maxDate: 0
});
</script>
<!---------script for validations--------->
<script>
var app = angular.module('myApp', []);
app.controller('validateCtrl', function($scope) {
});
</script>
<!----------close script---------------->
</html>
ARCHITECTURES
Home pages:-
Admin Login:
Admin Home Page:-
Nutrition Registration:-
Register Food:-
Register Template:-
Nutrition Login:-
Facts Registration:-
Register Food:-
Create Template:-
User Login:-
User Registration:-
User Available Food:-
User Available Template:-
THANK YOU

You might also like