Food Wastage Management Phone Application
Source…………………………………………………. Figure4: overview of the system ………………………………………………………………18 Figure 5: Demonstration of how JAVA programing is used in modern day computing………. Figure 6: Illustration of the process by which Byte Codes are generated and interpreted……. Figure 7: Constituents of a case diagram. ………………………………………………………32 Figure8: data flow Diagram/ use case diagram/ flow diagram…………………………………. This is all because of new software and operating systems that have been developed such like Android operating system and IOS (iPhone operating system). Nowadays, ANDROID is one of the popular operating system in mobile technology. Android technology was established in Palo Alto of California in United States by Andy Rubin, Rich excavator, Nick singes and Chris White in 2003. Later, Android Inc. was purchased by Google in 2005 and after unique discharge; there have been number of redesigns in the first form of Android.
It had 128 MB of RAM of flash, showing that Android Memory require are reasonable. The demo was carried out using a 3. Mbit/s HSDPA connection. Figure 2 Android platform architecture. Source: (Android Developers, 2016) Purpose of the Project Everyday people waste foods and on the other hand, people suffer from hunger. This project is on food redistribution and it is an enormously successful social innovation that tackles food waste and food poverty. The user’s details are maintained confidential because it maintains a separate account for each user. Proposed System The donor can hold an account in this application & whenever there is food wastage he can login and enter the details of food and location. The agent can also hold an account and can retrieve the details.
After retrieving the details, the agent can collect food from the donor and can redistribute to the orphans or others. This is achieved by using notification button. Guest Here the guest is nothing but the donor who donates food. The donor can hold an account in this application & whenever there is food wastage he can login and enter the details of food and location. Details of food include amount of food available and type of food. Agent The agent can also hold an account and can retrieve the details. He was occupied with connected social studies for general society repatriation of German war detainees at the Tavistock Institute of Human Relations in London with his gathering. The group concentrated more on the large-scale, multi-institutional issues (Thathong et al.
Therefore, they helped various organizations in the decision-making process as well as improving their knowledge in the field. The two founders applied their studies to systematic change between firms. Moreover, they stressed direct specialized-client association and asserted the function of the group association as foundations for problem-solving (Deyet et al. It will be helpful for the researchers since they will be able to utilize the data collected instead of using hunches. Therefore, the research will be more scientific ensuring that all significant findings of Android are brought to the table for future use and development. Moreover, using the methodology will enhance the quality of education or research and hence leading to professionalism. The culture of inquiry regarding the project will also be enhanced, and hence this becomes useful for future research regarding the same project.
Literature Review & Proposal for Food Wastage The prevention of food waste should be possible by adding to spare assets and in addition to diminishing natural effect amid all phases of showcasing framework. Once these things are satisfied, then next steps are to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool, the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system, the above considerations are taken into account for developing the proposed system. Bernstad and Jansen (2011) clarified the financially avoidable food misfortunes have an immediate and adverse effect on the wage of both ranchers and purchasers.
In this venture, the guest can log in and enter their Location, measure of food and kind of food accessible. At that point, a basic warning is given to the agent (Thassitou & Arvanitoyannis, 2001). Subsequent to seeing the warning the specialist among that area can login and can accumulate the points of interest of the benefactor. The donor can hold a record in this application and at whatever point, there is food wastage he can login and enter the subtle elements of food and area. The agent can likewise hold a record and can recover the points of interest. Agent Login & Registration This stage includes login and enlistment for both the guest and Agent. The client's points of interest are kept up classified by keeping up isolated record for every customer.
In the meantime, just the agent can see the subtle elements of the registered guest. Notification This stage includes the notice to the specialist by the guest. The client will send the warning which contains the area of food accessible by means of notice bar. • Android application can send their queries to Guest seeking info about any food wastage that could be avoided (Ganglbauer et al. • Android application can upload the reports of how they used the food for better transparency. • Independent reviews from the general public can be uploaded about the actions and activities of Android application to keep a check on them and ensure accountability. • Show the route and location of Android application and Guest and help the drivers to find the location.
• Live tracking of vehicles carrying food back to Guest centers. MB along with the Device: Android version 2. and higher The food cloud application serves to avoid hole between the Guest and Agent. The application serves to give food wasted to poor people who are struggling for support. The application joins these two, in such a course, to the point that this Android Application can convince the "support to be wasted" without trouble, and the Guest find these food seekers with no extra effort then it will serve a more important cause and will be a large organization to humanity. This application serves to overhaul clear picture of hotels, restaurants who are giving food and it is used for extra money (Bernstad & Jansen, 2011).
Plan The data input design creates a pathway to between the information system and the end user. Essentially, it entails the process of developing features and processes for data processing which can be achieved either by scrutinizing the data that can be easily read by a computer from either a hard copy or a written document. Alternatively, one can delegate the task of data entry to other persons with the relevant skills. Input design is mandated to perform four basic tests as highlighted herein; minimizing errors, eliminating delays, promoting efficiency and simplifying the overall process. In addition, the input design is modified in such a manner that it is able to guarantee security and simplicity in the part of the user.
It is also advisable to direct the management appropriately with regard to obtaining the correct information in order for them to retrieve the correct information from the computerized data. As has been highlighted herein, this system is only plausible when the appearance of screens is adjusted to facilitate appropriate user customized screens that are capable of handling large data volumes. The fundamental idea for designing data input is to ensure that data entry us made easier and flawless. On the data entry screen, moderation is done to make it possible to manipulate data and provide a provision to view records. Upon data entry, the system automatically scrutinizes the data to ascertain its validity. When it comes to my proposed application, its resources are readily available and diverse.
For instance, almost 90% of adults in the world own phones and this is a key resource needed to implement my project. On the other hand, my application will use devices and designs that have already been invented and developed which means that on resources, my project is feasible. Product perspective: The proposed research project is based on the use of the Android operating system and focuses deriving a game-oriented technology with the capacity and potential for diverse technological requirements. From the session, several issues became clear as per the requirements of my proposed research project. As long as one is able to operate a phone, then one can also operate this application. From the findings of the above session, it became apparent that the proposed development would fit coherently into the preexisting system.
The modifications perceived were also ascertained to be worth implementing. Besides, brainstorming, expert consultation and information gathering were essential mechanisms of obtaining the most relevant information regarding a subject matter. ASSUMPTIONS AND DEPENDENCIES • Having only hardware is not sufficient, to access an application Software is must. Windows 7 2. Windows XP 3. Windows 8 Technologies and Languages used to Develop 4. Android 5. Java 6. This phase in the development will entail comprehensive training and seeking information not only from experts in android development but also from other available and reliable sources such as the internet. The primary objective of this phase is to equip myself with comprehensive information and skills on effective android development. This will go a long way in ensuring that I have the required skills and expertise necessary to roll out the perceived project.
My search for information will be limited by the scope of my project to ensure I do not spend time in seeking unnecessary information as well as making the session as productive as possible. In addition, I will not only limit my search to the theoretical aspect but most importantly into the practical aspect of the subject matter. Of these sources, the interactive platforms may be the most instrumental since they allow me to interact positively with other android developers and make inquiries where possible. By so doing, most aspects of the proposed project will be assessed and tackled theoretically. To complement the information, I will also seek to identify books and other publications to seek diverse ideas. JAVA At any one time, different computers and computer systems are connected to the internet from different places globally.
Each of these computers is unique in terms of its make, model and the specifications. Observation From the foregoing, I was able to obtain vast information and develop the relevant android development skills. My experience with the different sources of information enabled me identify and specialize only in the areas where I felt would be most crucial with respect to my project. The interactive sessions with other android developers also played a significant part towards enlightening me and expounding my knowledge in the subject. Besides, the members pointed me in the right direction ensuring I did not fall into the numerous pitfalls during the process of development. They also played a huge part in motivating me in each step I took to develop the software.
This will help me not only develop the system but also use simulations to launch the program and assess its efficacy and efficiency. In this section I will outsource the skills and views of an independent android developer with the necessary skills and expertise in this field. In this phase, I am going to design my application framework with the help of UML (Unified Modeling Language). UML has diverse and extensive usage not only in programming but also in reference to specifying, deriving business models, creating visual images, constructing and documenting fragmented artifacts of software. In addition, UML is also used for other non-software related applications. To combine principles of integrity and ethical practices in modelling. UML Diagrams As highlighted, UML relies on the use of visual or graphical images to create a visual image of the proposed concept in a manner that users can identify with.
The visual modeling feature of UML is used to derive the visual images. Use of case Diagram: Case diagrams refer to objects depicting the association between the initiator and the system. The diagram is used to illustrate the relationship among and between the propagators and the actors. Action Data Flow Diagram This is how guest login with username and password, if correct information provided it goes for next activity enter the location of the guest after that filling the information like amount of food, type of food. This is all information goes to agent as notification. Guest Figure 9: Data flow diagram for Guest User (Battistoni, et al, 2007). Agent: Once agent login through user name and password, getting notifications when any guest ready to donate the food and after that a search on the details about the guest and pick up food from that guest is simple.
Figure 10: Data flow diagram for Agent (Thassitou, 2011). • Login layout • Layout for enter location • Layout for amount of food • Layout for type of food • Sending notification layout • Logout layout In agent main layout I have to create six sub layouts • Login layout • View Notification layout • Enter the location layout • Searching for details layout • Gathering details layout • Logout layout I observed this is initial stage for developing project it take so much time for developing these diagram but I think they will help me further while doing coding and construction of my project. Reflection: I picked up a considerable measure for admiration and appreciation from what i finished. However, i didn't basically get the greater part these learning without setting exert. It at began for a thorough arranging and trying information ahead my Android project from separate wellsprings until when i might have been indeed that i might have been prepared on sit and absorb that data.
Additionally, gathering those books from the library went as stated by how i needed accordingly accomplishing my objectives Also destinations. Most importantly, the proposed program ought to be able to run smoothly in an unsophisticated android device. In this stage Testing with several testing methods. Action I have already compiled a list of the requirements plus accept of the basic fundamental steps involved in the development to ensure the development phase was uninterrupted. The resources were obtained not only from sources I had come across during my research from diverse sources but also from recommendation by my expert advisors in the field. For some of the stages in development, I borrowed from educative YouTube videos for purposes of clarity of different concepts.
Unit Testing Unit testing is an invasive testing that aims to ensure that the performance of each unit of production meets a predetermined thresh hold. Under this category the units are assessed to ascertain that their internal operation procedures are efficient and effective and that the expected output is obtained. During this resting, the key code upon which the system is built on is validated. Unit testing is also structural and is built on the thorough knowledge of the structural and basic function of the system. Each key component is scrutinized keenly. It also checks that the functions are running optimally, the requirements are met as well as the documentation and manuals. Functional testing is centered on the following items: Valid Input : the system ought to satisfy a predetermined set of requirements.
Invalid Input : any unfavorable input or output ought to be identified and eliminated. Functions : the system ought to be able to perform the functions conceived Output : the system ought to produce a particular thresh hold in terms of output Systems/Procedures : the system ought to initiate the interfacing interfaces To determine the functional tests to be performed, it is necessary to focus on the requirements and /or special functions. It is also necessary to carefully identify the business process flows the data fields and other processes and subject them to testing. Requirements Gathering stage Requirements’ gathering is the initial stage in SDL. The step involves using information derived from the goals of the project, carefully refining these goals to come up either with a single or multiple requirements.
The requirements in this case form a basis for determining the scope of the proposed development. The functions may be centred on a key area or may be diversified besides defining the critical input parameters, the outputs as well as the reports. The order developed is linked with major roles, data entry or data areas. In this arrangement, the RTM indicates that each of the requirements developed in appropriately associated to a particular goal. Requirement traceability hereby indicates each requirement is associated to particular goals. Eventually, the outputs are requirements document, the RTM and the corresponding proposed project plan according to the scope of the proposed research study (Lundie, 2005). • Practicability entails an evaluation of the challenges faced in the project • The task force required for execution of a task is identified as ‘Team Formation’.
According to the proposed research study only modules constitute of are individual tasks. In the design features section, this section aims at fully expounding on the proposed software details in such a manner that an experienced programmer can ably create the software devoid of any hitches (Battistoni, 2007). Upon completion and acceptance of the design section, the document is updated on to the RTM to indicate that each of the possible design elements is associated with the appropriate specific requirements. The ultimate output of the design stages include design document, updated RTM as well as an updated project plan. Development (Coding) Stage The key input in the development phase is the design element. A unique software artefact is produced for each element.
Figuire 19: production phase (Thathong et al, 2009). Installation & Acceptance Test This stage will involve loading the software artifacts and other support material into a server. These are then run against all test cases to ascertain that the software is complete and correct. In the event that the software runs smoothly, then progress is made towards acceptance. Customers will only approve and process receipt once the staff verifies the correctness of the production data, and the tests have run smoothly. For the developed software to be effective and efficient, it is crucial for the developer to precisely stipulate the expectations of the conceived plan alongside the requirements for the same in order to ensure the process is goal oriented. Summary and Conclusion FUTURE SCOPE This project is food redistribution is an enormously successful social innovation that tackles food waste and food poverty.
The user’s details are maintained confidential because it maintains a separate account for each user. Conclusion The proposed system involves the food waste management system. Here I have included logins for both the donator and agent. A critical perspective on action research as a method for information systems research. In Enacting Research Methods in Information Systems: Volume 2 (pp. Springer International Publishing. Battistoni, P. Fatone, F. Morrison, K. Research methods in education. Routledge. Contreras, F. Hanaki, K. Ganglbauer, E. Fitzpatrick, G. Molzer, G. December). Creating visibility: understanding the design space for food waste. Routledge. Rodríguez, L. F. Brown, T. M. Cogger, C. G. Fransen, S. C. Nitrogen availability seven years after a high-rate food waste compost application. Thassitou, P. K.
Arvanitoyannis, I. S. Bioremediation: a novel approach to food waste management. Bioresource technology, 98(4), 929-935.
From $10 to earn access
Only on Studyloop