ProjRep 1
ProjRep 1
Project I Report
On
Submitted By:
Anika
(1221
Ayush (1221185)
Balwant
Devanshi (1221201)
Submitted to:
Ms. Shilpa
(Asstt. Prof. CSE Dept. JMIT Radaur)
I hereby certify that the work which is being presented in the Project I Report entitled, “E-
Commerce For Artisans” by us, Rana (1221193), Divanshu (1221204), Divya(1221205) in
partial fulfillment of the requirements for the award of degree of Bachelor of Technology in
Computer Science Engineering submitted in the Department of Computer Science and
Engineering at JMIT Radaur (Affiliated to Kurukshetra University Kurukshetra, Haryana
(India)) is an authentic record of our own work carried out under the supervision of [Link] .
The matter presented in the report has not been submitted in any other University/Institute for
the award of any degree.
This is to certify that the above statement made by the candidate is correct to the best of
my knowledge.
Ms. Shilpa
Asstt. Prof. Department of Computer Science and Engg.
JMIT Radaur
The [Link] Project I Viva-voce examination of Britika Rana (1221193), Divanshu (1221204),
Divya(1221205) has been held on and is accepted.
i.
ACKNOWLEDGEMENT
The writing of this project report has been assisted by the generous help of many people. We
feel that we were very fortunate to receive assistance from them. We wish to express my sincere
appreciation to them.
First and foremost, We are indebted to our principal supervisor, Ms. Shilpa (Asst. Prof.,
Department of Computer Science and Engineering) of JMIT Radaur, who has been very
supportive at every stage of my project completion. We wish to express my utmost gratitude to
her for the invaluable advice and patience in reading, correcting and commenting on the drafts of
this report and, more importantly, for his generosity which we have received throughout our
project completion.
We would like to acknowledge and extend my heartfelt gratitude to Ms. Shipla who helped and
encouraged me throughout this journey.
We wish to express my thanks to all staff members of JMIT Radaur, who also helped me in
conducting this study.
Finally, We are particularly indebted to our dearest parents/guardians as without their generous
assistance and love; this project could never have been completed.
Objective:
Components:
Incorporate features such as transaction amount, location, frequency, and user behavior
to enhance accuracy.
2. Sentiment Analysis:
○ Apply natural language processing (NLP) techniques to analyze the sentiment
expressed in textual data, such as customer reviews or social media posts.
○ Classify sentiment as positive, negative, or neutral using algorithms like Support
Vector Machines (SVM) or recurrent neural networks (RNNs).
○ Extract key insights from sentiment analysis to understand customer perceptions
and market trends.
3. Fake News Detection:
○ Develop a machine learning model to distinguish between genuine and fake news
articles.
○ Use features such as language style, source credibility, and fact-checking scores to
assess the authenticity of news content.
○ Implement a web scraping tool to gather news articles from various sources and
analyze them in real-time.
TABLE OF CONTENTS
Declaration …………………………………………………………… i.
Acknowledgement …………………………………………………………… ii.
Abstract …………………………………………………………… iii.
Table Of Contents …………………………………………………………… iv-v.
List Of Figures …………………………………………………………… vi.
List Of Tables …………………………………………………………… vii.
List of …………………………………………………………… viii.
Abbreviations
CHAPTERS
I. Problem Background and Its Context
II System Objective
.
Chapter II Functionality 9-
1. I. 16
A) Unit Testing
Chapter 5. B) Functional Testing 38-
41
Chapter 6. Future Scope & Limitations 42-
45
Chapter 7. Conclusion 46-
47
Chapter 8. Bibliography 48-
49
Chapter 9. Appendix 50-
55
LIST OF FIGURES
Figure. 14
3
Figure. 20
4
Figure. Newsletter 31
7
Figure. Footer 37
10
Another issue is the amplification of negative sentiments and emotions online. Social media platforms
often prioritize content that elicits strong reactions, such as anger or outrage, leading to the proliferation
of negativity and divisiveness. This can contribute to a hostile online environment and adversely affect
individuals' mental well-being.
Furthermore, disparities in access to information and digital literacy can exacerbate sentiments of
mistrust and disillusionment, particularly among marginalized communities. The spread of
misinformation may disproportionately affect vulnerable populations, leading to heightened social
tensions and inequality.
Moreover, cultural and linguistic barriers can impede the accurate interpretation and analysis of
sentiments across different regions and demographics. Sentiment analysis models trained on data from
one language or culture may not generalize well to others, leading to biases and inaccuracies in
sentiment detection and understanding.
Addressing these challenges requires collaborative efforts from various stakeholders, including
governments, technology companies, educators, and civil society organizations. Promoting media
literacy, fostering critical thinking skills, and enhancing digital access and inclusivity are essential steps
toward cultivating a more informed, empathetic, and resilient global community. Additionally,
developing robust sentiment analysis tools and techniques that account for cultural nuances and
linguistic diversity can help mitigate the spread of misinformation and foster more constructive online
discourse.
One common problem related to sentiment analysis projects is the issue of context and ambiguity. Language is
inherently complex, and words or phrases can have different meanings depending on the context in which they are
used. Sentiment analysis models may struggle to accurately interpret nuances, sarcasm, or cultural references,
leading to misclassification of sentiment.
Another challenge is the presence of noisy or unstructured data. Textual data often contains spelling errors,
grammatical mistakes, slang, or abbreviations, which can negatively impact the performance of sentiment analysis
models. Preprocessing techniques like text normalization and spell-checking are essential but may not always fully
address these issues.
Furthermore, sentiment analysis models may exhibit bias based on the training data they are exposed to. Biases in
the data, such as underrepresentation of certain demographics or overrepresentation of specific viewpoints, can lead
to skewed results and inaccurate predictions, affecting the reliability and fairness of the analysis.
Lastly, sentiment analysis models may struggle with domain-specific language or specialized jargon. If the training
data does not adequately cover the domain or industry of interest, the model's performance may suffer when applied
to real-world data from that domain.
Addressing these challenges requires careful data preprocessing, robust model training with diverse datasets,
continual model evaluation and refinement, and consideration of context and domain-specific knowledge.
Additionally, leveraging advanced techniques like transfer learning and ensemble methods can help improve the
performance and generalization of sentiment analysis models.
II
SYSTEM OBJECTIVE
Objective:
Develop an integrated system capable of detecting sentiment in textual data, identifying fraudulent
credit card transactions, and detecting fake news articles.
Provide real-time monitoring and alerts to users to mitigate risks associated with sentiment shifts,
financial fraud, and misinformation.
Components:
Sentiment Analysis:
Utilize natural language processing (NLP) techniques to analyze sentiment in textual data, such as
social media posts, customer reviews, and news articles.
Implement machine learning algorithms to classify sentiment as positive, negative, or neutral,
considering context and linguistic nuances.
Incorporate sentiment analysis APIs or custom-trained models for accuracy and efficiency.
Integration:
Integrate the three detection systems into a unified platform with a centralized dashboard for
monitoring and analysis.
Enable seamless communication between components to share relevant data and insights for
comprehensive risk assessment.
Provide customizable alerting mechanisms to notify users of detected sentiment shifts, fraudulent
transactions, and fake news articles.
Benefits:
Enhance risk management capabilities by providing real-time detection and mitigation of threats
related to sentiment fluctuations, credit card fraud, and misinformation.
Empower businesses, financial institutions, and media organizations to make informed decisions
and take proactive measures to protect against various risks.
Promote trust and integrity in digital interactions by combatting fraud and misinformation, thereby
fostering a safer and more secure online environment.
Overall, the integrated detection system aims to address the multifaceted challenges of sentiment
analysis, credit card fraud detection, and fake news detection, providing users with actionable
insights and proactive risk management solutions.
III
FUNCTION
ALITY
The functionality of the integrated detection system project involves several key components and
processes:
1. Data Collection:
- Gather textual data from various sources, including social media platforms, news websites,
customer reviews, and credit card transaction records.
2. Preprocessing:
- Clean and preprocess textual data to remove noise, such as spelling errors, punctuation, and
irrelevant information.
- Normalize text by converting to lowercase, removing stopwords, and stemming or lemmatizing
words to standardize language.
3. Sentiment Analysis:
- Utilize natural language processing (NLP) techniques to analyze sentiment in textual data.
- Employ machine learning algorithms or sentiment analysis APIs to classify sentiment as positive,
negative, or neutral.
- Consider context and linguistic nuances to accurately interpret sentiment expressed in the text.
6. Integration:
- Integrate the sentiment analysis, credit card fraud detection, and fake news detection components
into a unified platform.
- Establish communication channels between components to share relevant data and insights for
comprehensive risk assessment.
- Implement a centralized dashboard for monitoring and analysis, providing users with real-time
alerts and actionable insights.
Overall, the functionality of the detection system project revolves around collecting, preprocessing,
and analyzing textual data to detect sentiment, credit card fraud, and fake news, enabling users to
mitigate risks and make informed decisions in real-time.
IV
FEASIBILITY STUDY
1. A feasibility study of a project combining credit card fraud detection, sentiment analysis, and fake news detection would assess various aspects to
determine its viability. Here are some key considerations:
2.
3. 1. Technical Feasibility:
4. - Availability of Data: Evaluate the availability and quality of data sources for credit card transactions, textual data for sentiment analysis, and news
articles for fake news detection.
5. - Technology Stack: Assess the suitability of machine learning algorithms, natural language processing techniques, and data preprocessing tools for
implementing each component of the project.
6. - Scalability: Consider the scalability requirements to handle large volumes of data and real-time processing for effective detection and analysis.
7.
8. 2. Financial Feasibility:
9. - Budget: Estimate the costs associated with data acquisition, software development, hardware infrastructure, and ongoing maintenance.
10. - Return on Investment (ROI): Analyze the potential benefits of the project, such as reduced fraud losses, improved customer satisfaction, and
enhanced trust and credibility, compared to the investment required.
11.
12. 3. Legal and Ethical Feasibility:
13. - Data Privacy: Ensure compliance with data protection regulations, such as GDPR or CCPA, when collecting and processing personal and
financial data.
14. - Ethical Considerations: Address ethical concerns related to the use of sensitive data, potential biases in algorithms, and implications of false
positives or negatives in fraud detection and fake news classification.
15.
16. 4. Operational Feasibility:
17. - Integration Complexity: Evaluate the complexity of integrating multiple detection systems into a unified platform, considering interoperability,
data sharing, and communication between components.
18. - User Adoption: Assess the usability and user experience of the system, including the design of the dashboard, alerting mechanisms, and reporting
features, to ensure ease of adoption by stakeholders.
19.
20. 5. Market Feasibility:
21. - Demand Analysis: Investigate the market demand for a comprehensive detection system addressing fraud, sentiment analysis, and fake news
detection across various industries, such as finance, social media, and journalism.
22. - Competitive Landscape: Analyze competitors offering similar solutions and identify unique value propositions or differentiation strategies to gain
a competitive edge.
23.
● Based on the findings of the feasibility study, stakeholders can make informed decisions about whether to proceed with the project, modify its scope, or explore
alternative approaches to address the identified challenges and opportunities.
V
RISK FACTORS IDENTIFICATION & THEIR
MITIGATION
1. Market Volatility
- Identification: Fluctuations in demand for handicrafts due to economic conditions, changing
consumer preferences, or unforeseen events.
- Mitigation: Conduct thorough market research to understand trends and demand drivers.
Diversify product offerings to cater to different market segments. Implement flexible production
and inventory management strategies to adapt to changing market conditions quickly.
2. Technological Challenges:
- Identification: Technical glitches, system failures, or cybersecurity threats that may disrupt
platform functionality or compromise user data.
- Mitigation: Invest in robust and scalable technology infrastructure. Implement regular security
audits and updates to protect against cyber threats. Provide ongoing training and support to users
to minimize technical issues and ensure smooth operation of the platform.
7. Financial Risks:
- Identification: Budget overruns, revenue shortfalls, or cash flow challenges that may impact
the financial viability of the project.
- Mitigation: Conduct thorough financial planning and budgeting to allocate resources
effectively and mitigate financial risks. Explore funding options such as grants, loans, or
partnerships to secure necessary capital. Monitor financial performance closely and adjust
strategies as needed to maintain fiscal health and sustainability.
CHAPTER 2
PRIMARY
RESEARCH
TECHNIQUES AND
ANALYSIS
I
PRIMARY RESEARCH TECHNIQUES AND ANALYSIS
■ Primary research for the detection system project based on credit card fraud detection, fake
news detection, and sentiment analysis involves several key areas:
1. **Technology Research:**
■ - **Machine Learning Algorithms:** Investigate various machine learning algorithms
suitable for credit card fraud detection, sentiment analysis, and fake news detection.
Consider supervised learning algorithms (e.g., logistic regression, decision trees, support
vector machines) for classification tasks and unsupervised learning algorithms (e.g.,
anomaly detection, clustering) for fraud detection and outlier detection.
■ - **Natural Language Processing (NLP) Techniques:** Explore NLP techniques such as
tokenization, stemming, lemmatization, part-of-speech tagging, and named entity
recognition for preprocessing textual data and extracting meaningful features for sentiment
analysis and fake news detection.
■ - **Deep Learning Models:** Research deep learning architectures like recurrent neural
networks (RNNs), convolutional neural networks (CNNs), and transformer models (e.g.,
BERT, GPT) for advanced sentiment analysis and fake news detection tasks.
■ - **Data Integration and Management:** Investigate technologies and platforms for
integrating and managing diverse data sources, including transaction data, textual data, and
news articles, in a unified system. Consider database management systems, data lakes, and
cloud-based solutions for efficient data storage and retrieval.
■ 2. **Analysis Techniques:**
■ - **Feature Engineering:** Explore techniques for feature engineering to extract relevant
features from credit card transaction data and textual data for sentiment analysis and fake
news detection. Consider feature selection methods, dimensionality reduction techniques,
and domain-specific feature engineering approaches.
■ - **Model Evaluation:** Research methodologies for evaluating the performance of
machine learning models, including metrics such as accuracy, precision, recall, F1-score,
ROC-AUC, and confusion matrix analysis. Conduct cross-validation, hyperparameter
tuning, and model comparison experiments to identify the most effective algorithms and
configurations for each task.
■ - **Ethical Considerations:** Investigate ethical considerations and implications of
deploying AI-based detection systems, including fairness, accountability, transparency, and
privacy. Research frameworks and guidelines for responsible AI development and
deployment to ensure ethical and equitable outcomes.
■ 3. **Data Collection and Annotation:**
■ - **Data Sources:** Identify and gather relevant datasets for training and testing machine
learning models, including labeled datasets for credit card fraud detection, sentiment
analysis, and fake news detection. Explore publicly available datasets, proprietary data
sources, and data annotation services for acquiring high-quality training data.
■ - **Annotation Process:** Investigate annotation methodologies and tools for labeling
textual data with sentiment labels (positive, negative, neutral), credit card transactions with
fraud labels (fraudulent, non-fraudulent), and news articles with authenticity labels
(genuine, fake). Consider crowdsourcing platforms, in-house annotation teams, and third-
party data labeling services for efficient data annotation.
■ By conducting primary research in these areas, the detection system project can leverage
state-of-the-art technologies and analysis techniques to develop accurate, reliable, and
scalable solutions for credit card fraud detection, fake news detection, and sentiment
analysis.
II
SECONDARY RESEARCH
Secondary research refers to the process of gathering and analysing existing information and
data that has been previously collected
Secondary research for the detection system project based on credit card fraud detection, fake
news detection, and sentiment analysis involves exploring existing literature, studies, and
resources related to these topics. Here's how secondary research can inform the project:
1. **Literature Review:**
- Conduct a comprehensive literature review of academic journals, conference papers, and
books focusing on credit card fraud detection, fake news detection, and sentiment analysis.
- Identify key research trends, methodologies, algorithms, and technologies used in these
domains.
- Summarize findings from previous studies, including challenges, best practices, and
insights relevant to the project.
By leveraging secondary research findings and insights, the project can benefit from existing
knowledge and expertise in credit card fraud detection, fake news detection, and sentiment
analysis, enabling informed decision-making and effective implementation of the detection
system.
CHAPTER 3
REQUIREMENT ANALYSIS
&
SYSTEM DESIGN
I
REQUIREMENT ANALYSIS
II
SYSTEM DESIGN
A DFD shows what kind of information will be input to and output from the system, how the
data will advance through the system, and where the data will be stored. It does not show
information about process timing or whether processes will operate in sequence or in
parallel, unlike a traditional structured flowchart which focuses on control flow, or a UML
activity workflow diagram, which presents both control and data flows as a unified model.
SYSTEM
IMPLEMENTATIO
N
I
SYSTEM IMPLEMENTATION
System Implementation uses the structure created during architectural design and the results
of system analysis to construct system elements that meet the stakeholder requirements and
system requirements developed in the early life cycle phases. These system elements are then
integrated to form intermediate aggregates and finally the complete system-of-interest (Sol).
The purpose of the implementation process is to design and create (or fabricate) a system
element conforming to that element's design properties and/or requirements. The element is
constructed employing appropriate technologies and industry practices. This process bridges
the system definition processes and the integration process.
Project Details:
2. [Link] [Link]
3. [Link] LoginSignup.c
ss
4. [Link] [Link]
// Code Snippet
[Link]
import React, { useState } from 'react'
import './[Link]';
import logo from '../Assets/[Link]';
import cart_icon from '../Assets/cart_icon.png'
import { Link } from 'react-router-dom';
<div className="nav-login-cart">
<Link to='/login'><button>Log in</button></Link>
<Link to='/cart'><img src={cart_icon} alt="" /></Link>
<div className="nav-cart-count">0</div>
</div>
</div>
)
}
[Link]
import React from 'react'
import "./[Link]"
Fig.7 Newsletter
[Link]
import React from 'react' import
'./CSS/[Link]'; import
{ useState } from 'react';
return (
<div className="loginsignup">
<div className="loginsignup-container">
<h1>{state}</h1>
<div className="loginsignup-fields">
{state=== "Sign Up" ? <input
name='username'
value={[Link]}
onChange={changeHandler
} type='text'
placeholder='Your Name'
></input> : <></>}
<input
name='email'
value={[Link]}
onChange={changeHandler}
type='email'
placeholder='Email Address'
></input>
<input
name='password'
value={[Link]}
onChange={changeHandler}
type='password'
placeholder='Password'
></input>
</div>
<button
onClick={()=> {state === "Login" ? login() : signup()}}
className="btn">
Continue</button>
<div className="loginsignup-agree">
<input
type='checkbox'
name=''
id=''
></input>
<p>By continuing, i agree to the terms of use & privacy policy.</p>
</div>
</div>
</div>
)
}
<div className="footer-social-icon">
<div className="footer-icons-container">
<img src={instagram_icon} alt="" />
</div>
<div className="footer-icons-container">
<img src={pinterset_icon} alt="" />
</div>
<div className="footer-icons-container">
<img src={whatsapp_icon} alt="" />
</div>
</div>
<div className="footer-copyright">
<hr/>
<p>
Copyright @ 2024 - All Right Reserved.
</p>
</div>
</div>
)
}
Fig.10 Footer
CHAPTER 5
TESTING
I
TESTING
Frontend Components: Test React components using testing libraries like Jest and React
Testing Library. Verify that UI elements render correctly, handle user interactions as
expected, and display appropriate data. Mock API responses and user input to simulate
different scenarios and edge cases.
Data Handling and Validation: Test data validation and manipulation functions to ensure
they sanitize input, validate against specified criteria, and handle errors gracefully. Test input
validation and error handling for user input forms and API requests.
Integration Testing: Test interactions between frontend and backend components to ensure
they communicate effectively and handle data exchange correctly. Verify that API endpoints
are called with the correct parameters and that responses are processed appropriately by the
frontend.
Error Handling and Edge Cases: Test error handling logic to verify that errors are caught
and handled appropriately, with informative error messages provided to users. Test edge
cases and boundary conditions to ensure the system behaves predictably and gracefully
handles unusual inputs or scenarios.
Functional testing validates the functional aspects of the application, including user
interactions, data processing, and system behaviour. By systematically testing each feature
against its requirements, functional testing aims to ensure that the application performs as
intended and meets user expectations.
1) Testing Approach: The functional testing approach for the application involved:
a) Reviewing requirements: Understanding the functional requirements specified for each
feature.
b) Designing test cases: Creating test cases based on user stories, use cases, and acceptance
criteria.
c) Test execution: Performing test cases to validate the functionality of each feature.
d) Defect reporting: Documenting any deviations from expected behaviour and reporting
defects for resolution.
2) Functional Test Coverage: Functional testing covered various aspects of the application,
including:
a) User authentication and authorization.
b) Agency registration and management.
3) Test Scenarios and Cases: A variety of test scenarios and cases were developed to validate
different aspects of the application's functionality. Test cases were designed to cover typical
user interactions, edge cases, and error conditions.
a) Examples of test scenarios include:
b) User login with valid credentials.
c) User registration with unique username and valid information.
4) Test Execution and Results: Functional tests were executed manually by following the
predefined test scenarios and cases. Test results were recorded systematically, documenting
both expected and actual outcomes. Any discrepancies or issues encountered during testing
were reported, triaged, and addressed by the development team.
TRANSACTION PATH TESTING: In this phase each and every condition within a unit
program was tested. As and when a loop or conditional statement were incorporated into a
unit, those loops were tested for correctness, for foundry conditions and for not getting into
an infinite execution cycle. The data used was whatever was necessary at that instance. The
path of each transaction from origin to destination was tested for reliable results.
MODULE TESTING: This was carried out during the programming stage itself. Individual
programs were tested at the time of coding and necessary changes are made thereon to make
sure that the modules in the form program, is working satisfactory as regards the expected
output from the modules. AI, aspects of the program viz., all choices available were properly
tested.
STRING TESTING: After loading all individual programs, string testing was performed
for each chain of programs where the output generated by one program was used as input by
another program. This step was completed after making necessary changes wherever
required.
CHAPTER 6
CONCLUSION
CONCLUSION
The development of the cross-border e-commerce platform for Indian artisans represents a
significant opportunity to promote the rich cultural heritage of Indian handicrafts on a global
scale. By providing a centralized marketplace for artisans to showcase their products and connect
with buyers worldwide, the platform aims to empower artisans economically, foster cultural
exchange, and contribute to the overall growth of the Indian handicraft industry.
Despite the inherent challenges and limitations, including logistical constraints, regulatory
complexities, and competitive pressures, the project has the potential to drive positive change and
create lasting impact. Through continuous innovation, collaboration, and commitment to quality
and authenticity, the platform can serve as a catalyst for sustainable economic development, social
empowerment, and preservation of traditional crafts.
Moving forward, it will be essential to address the identified limitations and mitigate risks
effectively while capitalizing on emerging opportunities for growth and expansion. By embracing
technology, fostering partnerships, and prioritizing user feedback and engagement, the platform
can evolve into a vibrant ecosystem that celebrates cultural diversity, fosters meaningful
connections between artisans and buyers, and enriches lives across borders.
In conclusion, the success of the cross-border e-commerce platform hinges on collective efforts
and shared vision to create a more inclusive, ethical, and prosperous future for Indian artisans and
the global handicraft community. With dedication, perseverance, and a commitment to excellence,
the platform has the potential to leave a lasting legacy and make a positive impact for generations
to come
CHAPTER 8
BIBLIOGRAPHY
BIBLIOGRAPHY
Websites
● React Documentation. (n.d.). Retrieved from [Link]
● [Link]
● [Link]
Books
● Freeman, A., & Robson, A. (2017). Pro React. Apress.
This book provides comprehensive coverage of [Link] fundamentals and advanced concepts,
including state management, component lifecycle, and Redux integration.
CHAPTER 9
APPENDIX
APPENDIX
In this appendix, you will find a collection of additional resources and information to supplement
your experience with our app. These resources include project Meeting log Sheets, results and
screen print-outs of our app. The appendix serves as a handy reference to assist you in fully
utilizing the app's features and overcoming any challenges you may encounter. Whether you need
step-by- step instructions or troubleshooting tips, the resources in this appendix are designed to
enhance your experience and ensure you get the most out of it.
Screenshots Of Website:
Fig.12 Newsletter
Fig.13 Login Screen