Final SRS
Final SRS
Final SRS
PRELIMENERY REPORT
ON
BACHELOR OF ENGINEERING
(Computer Engineering)
BY
SOFTWARE REQUIREMENTS
SPECIFICATION
3.1 INTRODUCTION
The global growth of a technology or product is always fraught with risk in the rapidly
evolving world of technology. Forgery and duplication, which can harm a company’s
reputation and financial performance, and client well-being. The main goal of the
project is to confirm that the customer’s purchased item is as described in the fake
or genuine We have the conventional supply chain in comparison to blockchain.
Typical supply chains offer centralised network where the firm providing the service
or the products holds the data they control the market and the data, making them
vulnerable because they can manipulate it anyway they like.
Blockchain technology aids in addressing the issue of product counterfeiting.
Technology based on blockchain is more secure. A chain will be constructed for that
product’s transactions once it is stored on the network, making it possible to keep
all transaction records for both the product and its present owner. In the blockchain,
all transaction histories will be kept as blocks. In the suggested system, each product
is given a generated QR code that the end user can scan. the product’s full details by
scanning the QR code. We can tell whether a product is genuine or phoney by
scanning the QR code.
3.2 PROJECT SCOPE
The Scope of this system In this project we are using Machine learning and artificial
intelligence technology by using NLP algorithm. It is certainly significantly faster than
looking for an answer in books, but still, it’s far from perfect.
Fast Accurate prediction: Logos can be identified quickly due to the machine’s ability
to learn from experience with the CNN algorithm. Reduce human errors of
identifying whether the product is original or fake is the right of every purchaser. A
Human may err while selecting the product just by looking at the logo, but Deep
Learning (DL) models will provide accurate results. Go through these signs that can
help you identify an original from a counterfeit, and make sure you are not taken for
a ride.
3.4 ASSUMPTIONS AND DEPENDENCIES
1. Database: The Personal details of sender and receiver also account details of
sender and receiver stored in database.
• Website
• RAM : 8 GB
• Hard Disk : 40 GB
The performance of the functions and every module must be well. The overall
performance of the software will enable the users to work efficiently. Performance
of encryption of data should be fast. Performance of the providing virtual
environment should be fast Safety Requirement.
The application is designed in modules where errors can be detected and
solved easily. This makes it easier to install and update new functionality if required.
The application is designed in modules where errors can be detected and fixed easily.
This makes it easier to install and update new functionality if required.
• Our software has many quality attribute that are given below: -
• Availability: This software is freely available to all users. The availability of the
software is easy for everyone.
• Maintainability: After the deployment of the project if any error occurs then
it can be easily maintained by the software developer.
• Reliability: The performance of the software is better which will increase the
reliability of the Software.
• Test ability: The software will be tested considering all the aspects.
• RAM : 8 GB
As we are using Machine Learning Algorithm and Various High Level Libraries
Laptop
• Hard Disk : 40 GB
SYSTEMDESIGN
In Data Flow Diagram, we Show that flow of data in our system in DFD0 we show
that base DFD in which rectangle present input as well as output and circle show
our system, In DFD1 we show actual input and actual output of system input of our
system is text or image & we present operation of user as well as admin.
• Component Diagram.
• Activity Diagram.
• Sequence Diagram.