Essay: Android application – measure object by taking photo

Essay details:

  • Subject area(s): Information technology essays
  • Reading time: 5 minutes
  • Price: Free download
  • Published on: March 10, 2016
  • File format: Text
  • Number of pages: 2
  • Android application - measure object by taking photo
    0.0 rating based on 12,345 ratings
    Overall rating: 0 out of 5 based on 0 reviews.

Text preview of this essay:

This page of the essay has 1266 words. Download the full version above.

CHAPTER 1
Introduction to Project
1.1 Project Summary
“Mathematica Android Application” provides a facility to measure an object by clicking it’s photo in Android Mobile. We have made the application easier to use and introduce new style of measuring an object. In earlier day we have to carry instruments like measuring tape for measuring an object, so it can be deficult when situation arise that we want to measure some object and we don’t have any measuring g instrument for overcome this problem we made an application which gives measurement of an object by only click an image with measuring scale it gives measurement in meter, centimeter, millimeter, foot, inch etc. In this android application system provide 2 user type like user and member. User can click an image and takes measurement and if he/she want to share an calculated image they should sign up with their personal details and become a member. After that they can share calculated image in any third party application like Whatsapp, Facebook, etc.
1.2 Purpose
Ultimate goal of this android application is to make measurement techniques easier. People can easily measure an object with just a single click. This system reduces the time of user to carry the measuring instrument with them while they want to measure an object.
1.3 Scope
The application is also security oriented and gets associated with in the system, as the general structure of accessibility is fairly demandable. By applying this, we can get much faster and accurate results from android application as per the user requirements. By this system, Many problem are solve.
Chapter 2
Brief History of the work
Chapter 2
Brief History of the work
Requirements Analysis
The development team analyzes the requirements and specifications document for completeness and feasibility. Once everyone agrees on the project specification, the next step is to analyze how to do it. The purpose of the analysis is to determine the scope of the effort. A functional design document should be generated. This document consists of the information, figures and charts so that, when combined with the specification, someone new to the project can understand what the project does and how it does it.
We have used Waterfall Model for developing our application systematically. Using it we have analysed the System Requirement of the user, which is how to measure an object by clicking. Here, user can work offline. If they want to share calculated image then an only then they require internet connection. The overall advantage of the system is for providing portability and decreases the load as well it is time efficient. Generating the required report as per the requirements becomes much easier and information availability at the hand. Feasibility study is an important phase in the software development process. It enables the developer to have an assessment of the product being developed. It refers to the feasibility study of the product in the terms of outcomes of the product, operational use and technical supported required for implementing it.
Security Features.
• Authentication :- Authentication allows you to confidently identify the clients of your service. These might be end users, other services, processes, or computers. WCF supports mutual authentication, which identifies both the client and the service in tandem, to help in preventing man-in-the-middle attacks.
• Authorization :-Authorization determines what system resources and operations can be accessed by the authenticated user. This allows you to grant specific application and resource permissions for authenticated users.
• Confidentiality :- Confidentiality, also referred to as privacy, is the process of making sure that data remains private and confidential, and that it cannot be viewed by unauthorized users. Encryption is frequently used to enforce confidentiality. Privacy is a key concern, particularly for data/messages passed across networks.
• Integrity :- Integrity is the guarantee that data is protected from accidental or deliberate modification. Like privacy, integrity is a key concern, particularly for data/messages passed across networks. Integrity for data in transit is typically provided by using hashing techniques and message authentication codes.
• Transfer security :- Responsible for providing message confidentiality, data integrity, and authentication of communicating parties.
Chapter 3
Tools and Technologies
Chapter 3
Tools and Technologies
Hardware Requirements
 Client Specifications:
 A mobile Device with Android operating System
Software Requirements
 Client Requirement :
 Web Browser : Internet Explorer 8.0 or Any compatible browser
 Operating System : Android
 Server Requirement :
 Operating System : Android
 Front End Tools :Eclipse
 Back End Tools : SQL Lite
 Minimum Specification :
 Operating System : Android
 Ram : 1 GB
Chapter 4
Design/Implementation of
Project Work/Simulation
Chapter 4
Design / Implementation of the Project Work / Simulation
Tables and Figure
4.1 DFD Diagram
Level 0
Level 1
4.2 E-R Diagram
4.3 Flowchart
yes
4.3 Use Case Diagram
4.9 Activity Diagram
4.10 Sequence Diagram
4.11 Class diagram
Chapter 5
Data Dictionary
CHAPTER 5
DATA Dictionary
1) Sign Up:-
• Table Name : login
• Primary Key : email_id , uname
• Description: This table is used for Admin Login.
No Field name Data type Size Description
1 Name Varchar 20 Name of user
2 Add Varchar 100 Address of user
3 City Varchar 15 City
4 Pincode Int 10 Pincode
5 No Int 10 Phone no
6 DOB Int 8 Date of birth
7 Age Int 3 Age
8 Uname Varchar 20 Name of user in application
9 Password Varchar 20 Password
10 Email_id Varchar 50 User email id
2) Temporary image
• Table Name : temp_img
• Primary Key : img_id
• Description :This table is used for temporary image.
No Field name Data type Size Description
1 Img_id Int 10 Id of image
2 Image Blob Image
3 Date Date Date
4 Name Varchar 20 Name of image
3) permanent image:-
• Table Name : permanent_img
• Primary Key : img_id
• Description: This table is used for permanent image
No Field name Data type Size Description
1 Per_id Int 10 Id of permanent image
2 Image Blob Image
3 Date Date Date
4 Name Varchar 10 Name of image
4) Select Parameter and measurement
• Table Name : Select_parameter
• Primary Key :
• Description: This table is used for parameters and measurement.
No Field name Data type Size Description
1 Img Blob – Final image
2 Parameter_id Int 10 Id of parameter
3 Parameter_ name Varchar 50 Name of parameter
4 Measurement_id Int 10 Id of measurement
5 Measurement_name Varchar 50 Name of measurement
6 City_id Int – Branch city id
7 State_id Int – Branch stste id
8 Address Varchar MAX Branch address
9 Image Varchar MAX Branch profiles
5) Login :-
• Table Name : Login
• Primary Key :
• Description: This table is used for login purpose.
No Field name Data type Size Description
1 Uname Varchar 20 Name of User
2 Password Varchar 20 Password
6) Answer :-
• Table Name : Answer
• Primary Key :
• Description: This table is used for giving output
No Field name Data type Size Description
1 Img Blob – Calculated Image
2 Parameter_name Varchar – Parameter like meter, cm etc
3 Measurement varchar 30 Measuring unit like length, height etc
7) Feedback:-
• Table Name : Review
• Primary Key :
• Description :It allows user to review the application
No Field name Data type Size Description
1 Uname Varchar 20 Name of User
2 Rating Int 5 Rate as per the user likes
Abbreviation
TERM DEFINATION
HTML -Hyper Text Mark-up Language
WWW -World Wide Web
SQL -SQL(Structured Query Language) Server Management Studio Express (SQL Server 2005)
OS Operating System
GUI -Graphical User Interface
RAM -Random Access Memory
MB -Mega Bytes
GB -Giga Bytes
Mbps -Mega bits per second
HDD -Hard Disk Drive
Chapter 6
Conclusion
Chapter 6
Conclusion
Methematica android application is time and money efficient. It also reduces the load (measuring instruments) for measuring an object. It is easy to use and portable as well.
List of References
Books
• Programming with C++, Fourth Edition , E. Balagurusamy.
• Roger S.Pressman,Software Engineering ,
Object-oriented modelling and design with UML
Websites
• http://www.w3schools.com/android
o Basic android concept
o Andoidhive

About Essay Sauce

Essay Sauce is the free student essay website for college and university students. We've got thousands of real essay examples for you to use as inspiration for your own work, all free to access and download.

...(download the rest of the essay above)

About this essay:

This essay was submitted to us by a student in order to help you with your studies.

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Android application – measure object by taking photo. Available from:<https://www.essaysauce.com/information-technology-essays/android-application-measure-object-by-taking-photo/> [Accessed 27-05-20].

Review this essay:

Please note that the above text is only a preview of this essay.

Name
Email
Review Title
Rating
Review Content

Latest reviews: