Skip to main content

Home appliances online purchase

Home appliances online purchase
Abstract:
An online purchase system that permits a customer to submit online orders for items from a store that serves both walk-in customers and online customers. Online purchase is always better and smarter way to spend our money. The online purchase system presents an online display of an order and an associated delivery window for items selected by the customer. The system accepts the customer's submission of a purchase order for the item in response to a time of submission. This system does not settle with a credit supplier of the customer until the item selected by the customer is picked from inventory but before it is delivered. Therefore, the customer can go online and make changes to the order if that ordered item does not available in a store. Online purchases by type of product are then examined to illustrate how the Internet has become both a complement to, and a substitute for, traditional retail. Online purchase is quick and easy as the wide range of products are categorized in a very convenient and user friendly manner.  The results of this system also indicated a significant mean difference between online shoppers and non-online shoppers in gathering product information and comparing price of products before a purchase decision.

Existing system:

The existing system is done by manually, the customer has to enter the details of the products which they want to order and the shopkeeper has to go through it and calculate the amount of the products which had been ordered by the customers. This process will take long time. So, existing system is the time-consuming process for many peoples. In this situation they need the computerization of ordering products. The main drawback of existing system is taking long time for billing reports.

Proposed System:

          The proposed system will prove to be a boon to the use because once the data has been entered correctly sorting and retrieval of data will be done in any efficient manner of the system. The proposed system overcomes all the shortcomings the systems are fully integrated to achieve a compact & interactive system. The system is fully menu driven and used wish the easy by anyone ever with the slight test knowledge of computers.
 The proposed system has validation of data at every stage of data capture. The very purpose of computerization is general is to replace paper work, improve productivity and accuracy, economic expenditure and to provide quick services. Maintaining a hierarchy in the data and avoiding redundancy of data.
MODULES:

© Appending products details
© Customer registration
© Order processing information
© Credit card system

Module description:
Appending products details:
          Administrator can take an important role in this module. They can able to add new products to online system. All the products are categorized by administrator. They have to append price details, stock details and item details of all products to online. Administrator has rights to add and delete product details in online. They have to maintain all order details of each customer.

Customer registration:

          One should get registered to purchase their desired products. One can get registered by giving there personal details such as personal details, login details and credit card details. Their username and password can be used to access their account. Through login they can make online purchase.
Order processing information:
          After login, customer can make order by viewing product details through item menus. Once the order completed, immediately all the unit price details, discounts if any and grand total are generated by the system. All these details are viewed to customers. Then customers have to confirm those ordered products for purchase. If any product is missing, it will be detected by system and customers have to exchange that product.

Credit card system:
          Customers have to purchase their ordered items through credit cards. After the order has been confirmed, the voucher for will be automatically created by system. It also asks credit card details of customers to purchase their orders. We have to check the credit card details of particular customer and give a response to customer.




Hardware Required:

v System                       :           Pentium IV 2.4 GHz
v Hard Disk                 :           40 GB
v Floppy Drive            :           1.44 MB
v Monitor                    :           15 VGA colour
v Mouse                        :           Logitech.
v Keyboard                  :           110 keys enhanced.
v RAM                          :           256 MB


 

S/W System Configuration

v   Operating System               :   Windows 95/98/2000/NT4.0.
v   Application  Server  :   Wamp2.2e

v   Front End                               :   HTML, PHP.
v   Scripts                                    :   JavaScript.
v   Server side Script                :   PHP.
v   Database                               :   Mysql.
v   Database Connectivity       :   PhpMyAdmin.


         


Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se

A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION

A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION ABSTRACT Many visual applications have benefited from the outburst of web images, yet the imprecise and incomplete tags arbitrarily provided by users, as the thorn of the rose, may hamper the performance of retrieval or indexing systems relying on such data. In this paper, we propose a novel locality sensitive low-rank model for image tag completion, which approximates the global nonlinear model with a collection of local linear models. To effectively infuse the idea of locality sensitivity, a simple and effective pre-processing module is designed to learn suitable representation for data partition, and a global consensus regularizer is introduced to mitigate the risk of overfitting. Meanwhile, low-rank matrix factorization is employed as local models, where the local geometry structures are preserved for the low-dimensional representation of both tags and samples. Extensive empirical evaluations conducted on three

LIFI

LIFI Prof . Harald Haas is a technology of high brightness light emitting diodes(LED).It is bidirectional ,high speed and fully networked wireless communication.    LiFi is designed to use LED light bulbs similar to those currently in use in many energy-conscious homes and offices. However, LiFi bulbs are outfitted with a   chip   that modulates the light imperceptibly for optical data transmission. LiFi data is transmitted by the LED bulbs and received by photoreceptors. LiFi's early developmental models were capable of 150 megabits-per-second ( Mbps ). Some commercial kits enabling that speed have been released. In the lab, with stronger LEDs and different technology, researchers have enabled 10   gigabits -per-second (Gbps), which is faster than   802.11ad .  Benefits of LiFi: ·         Higher speeds than  Wi-Fi . ·         10000 times the frequency  spectrum  of radio. ·         More secure because data cannot be intercepted without a clear line of si