Final AadharSRS

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 163

INDEX

S. No CONTENTS PAGE NO.

1. Acknowledgement 3

2. Company Profile 4

3. Introduction 5

4. Identification of Need 6-7

5. Objective and Scope of Project 8

6. Problem Statement 9

7. System Analysis 10-15

 Preliminary
investigation

 Feasibility
study

8. Software Requirement Specification 16-32

 Introduction

 Overall Description
 Requirement Analysis
and Planning Steps

GANTT Chart

PERT Chart

 System Feature

 External Interface
Requirement

 Software Quality
Attribute

 Other Non-Functional
Requirements

 Other Requirements

ADDHAR SECURE TRAVEL ID Page 1


9. Software Engineering Paradigm Applied 33-37

 Waterfall Model

 Prototyping Model

10. High Level Design 38-43

 DFD

 ERD

 Use Case Diagram

11. Database Design 44-49

12. Screen Shots 50-86

13. Software Cost Estimation 87-88

14. Testing 89-90

15. Conclusion 91

16. Future Scope 92

17. Bibliography 93
ADDHAR SECURE TRAVEL ID Page 2
Acknowledgement

It gives me great pleasure to express my gratitude and heart full thanks to


all those who helped me

in completing this project. I am extremely thankful to E.Soft Technologies


pvt.Ltd for giving me the

opportunity to make this project.

I want to thank Miss Pooja Verma, who have always encouraged and
helped me to make this

project. In addition to this, I am grateful to other faculties too who made me


move in right direction

and gave me their precious time and expert guidance whenever


necessary through which I could

achieve this extent.

At last but not the least, I am feeling glad to say about my family, whose
wishes are always with me,

without which, it was not possible for me to reach to this extent.

Thank you
ADDHAR SECURE TRAVEL ID Page 3
2. Company Profile

About the Organization

E.Soft Technologies Limited is a software development and business


process consulting company

providing business process re-engineering consultancy and services,


enterprise solutions, ERP,

Engineering Services, e-business intelligence, data warehousing,


ecommerce solutions and CAD

solutions.

Soft was incorporated with the prime objective of providing on-site


and off-site professional

services specializing in system integration, application development, and


CAD and web services.

Company Mission:

To Make Technology More Useful for our Clients. This is the mission for
each and every e.Soft

employee.
e. Soft deliver premium IT services, CAD services and software solutions
that clearly execute the

strategic business objectives of their clients and want to be the technology


partner that empowers

businesses to succeed.

e. Soft accurately reflect your business vision through IT


implementations. e. Soft

Technologies was initially formed to leverage experience solving


complex IT issues. Designing,

developing and delivering solid solutions has become our forte.


Custom application development,

web solutions, Business Intelligence software, ecommerce and CAD are our
specialties. E.Soft can

move your company through the analysis phase and help you to
clearly define your requirements

before investing in the more costly development phases. The resulting


solution will accurately reflect

your vision.

ADDHAR SECURE TRAVEL ID Page 4


3. INTRODUCTION

 In Current System the citizen is identified by multiple identity cards.


There is no unique

identity in India. The Aadhar Secure Travel Identity System provides a


unique identity of

citizen.

 It creates a tool that manages the handling of travel that includes


passport and license using

the unique identification associated with each individual.

 It Integrates Citizen, Aadhar Department, Crime, Passport & RTA to


address travel issues

and disputes.
ADDHAR SECURE TRAVEL ID Page 5
4. IDENTIFICATION OF NEED

Current(Existing) System:

 The citizen is identified by multiple identity cards.

 There is no unique identity in India.

 Passport has to be carried for travel abroad.

 Change of address has to be made as per the department


concerned.

 Agents play the role of intermediates to facilitate


operations between the citizen and

the corresponding Government department.

 Money has to be paid to the agents as commission.

Problem with the Current(Existing) System:

 The citizen is identified by multiple identity cards.

 There is no unique identity in India unlike the SSN in the


USA.

 An individual can hold more than one passport.

 Possibility of passport being lost or damaged.

 Crime department communicates with the Airport


Authority of India physically on

stopping or tracing a citizen in travel.


 License can be applied multiple times, duplication
possible, lost or damaged anytime.

ADDHAR SECURE TRAVEL ID Page 6


Automated Processes:

Automated process is a process which is executed automatically by the


system. After

completion of interaction with the user, the system will perform some
automated processes.

 In the user registration process, user is asked to fill a registration form.


After filling the form his

registration will be completed by the system with the issuing of a user id.

 After the user get UID and then apply for license and passport then basic
data is fetch through

the UID automatically by the system.

 Issuing of UID is also an automated process and the database is


automatically updated with

UID.

Non-Automated Processes:

Non-automated Process is a process, which is completely executed by the


human actor. If any

modifications are required to the System then the human actor will handle
them.
 Apply for Aadhar, passport, license is done manually.

 Registration process and verifying process is done manually.

 Sending the license and passport document is done manually by the


citizen.

ADDHAR SECURE TRAVEL ID Page 7


5. Objective and Scope of Project

Objective:

 Creates a tool that manages the handling of travel that includes


passport and license

using the unique identification associated with each individual.

 To reduce the paper work and create an online platform where user
can easily apply

for the Aadhar card, passport and license.

 To resolve the problem of forgetting the license, passport, Aadhar card


and create a

digital document of these.

 It give a UID to each individual person and UID is connect


with passport and

license which makes easy to verify and trace the person in any
travelling issues or

criminal acts.

Scope and limitations:

 Citizen Registration, identification of each citizen using UID(Unique


Identification number).

 Secure passport application

 Passport application verification by the police authority in online


mode.

 Passport Issue & Denial.

ADDHAR SECURE TRAVEL ID Page 8


6. Problem Statement

There are some problems arise with the Existing System:

In the existing system all the work is done manually. This is chance of
committing errors and it will

take more time to perform any transaction. There is so many limitations in


the existing system. So

the existing system should be automated. If the system is carried


over manually, for every

transaction it take more time. So it is difficult to take immediate decisions.

There are some problems arise with the Existing System:

• Existing system was not user friendly

• System was not well organized and precise

• It was time consuming

• Information was redundant and inconsistent

• It didn’t integrate all the departments.

• It is difficult to find out where the problem is occurring.

• Citizen identify by the multiple cards.

• Citizens have no unique identity.

.
ADDHAR SECURE TRAVEL ID Page 9
7. System Analysis
System is created to solve problems. One can think of the systems approach
as an organized way of

dealing with a problem. In this dynamic world, the subject system analysis
and design, mainly deals

with the software development activities.

Since a new system is to be developed, the one most important phases of


software development life

cycle is system requirement gathering and analysis. Analysis involves


detailed study of the current

system, leading to specification of a new system. Analysis is a detailed study


of various operations

performed by a system and their relationship within and outside the


system. Using the following

steps it becomes easy to draw the exact boundary of the new system under
consideration.

Keeping in view the problems and new requirements, workout the pros and
cons including new area

of the system.

All procedures, requirements must be analysed and documented in the


form of detailed DFDs,

logical data structure and miniature specifications.

System analyses also include sub-dividing of complex process involving


the entire system,

identification of data store and manual processes.


System Analysis is conducted with the following steps

 Information gathering

 The tools of structured analysis

 Identification of Need

 System Planning and initial investigation

 Feasibility study

ADDHAR SECURE TRAVEL ID Page 10


Information Gathering:

 Information about the firm

 Information about the workflow

 Various tools used are:

o Review of literature

o Procedure

o Forms

 The tools of structured analysis:

 DFD

 Data Dictionary

 Decision Tree and Structured English

Initial investigation:

 Problem definition and project initiation

 Determining the requirements

 Needs identification

 Dimension of planning

 Determination of feasibility

Feasibility Analysis:
 System Performance definition

 Identification of system objectives

 Description of outputs

ADDHAR SECURE TRAVEL ID Page 11


Preliminary Investigation:
 Evaluation of project request is major purpose of preliminary
investigation.

 It is the collecting information that helps committee members to


evaluate merits of the

project request and make judgment about the feasibility of the proposed
projects.

 To answer the above questions, system analysts discuss with different


category of person to

collect facts about their business and their operations.

 When the request is made, the first activity the preliminary


investigation begins.

 Preliminary investigation has three parts-

1. Request clarification

2. Feasibility study

3. Request approval

Request Clarification:

An information system is intended to meet needs of an organization. Thus


the first step

is in this phase is to specify these needs and requirements.

 The next step is to determine the requirements met by the system.


Many requests
from employees and users in the organizations are not clearly defined.
Therefore,

it become necessary that project request must examine and


clarified properly

before considering system investigation.

 Information related to different needs of the System can be obtained


by different

users of the system. This can be done by reviewing different


organization’s

documents such as current method of storing sales data, complaint data


etc. By

observing the onsite activities the analyst can get close information
related to real

system.

ADDHAR SECURE TRAVEL ID Page 12


Feasibility Study:

The feasibility report of the project holds the advantages and


flexibility of the project. This is

divided into three sections:

 Economical Feasibility

 Technical Feasibility

 Operational Feasibility

1. Economical Feasibility:

A systems financial benefit must exceed the cost of developing


that system. i.e. a new

system being developed should be a good investment for the organization.

The proposed system is economically feasible because:

i. The system requires very less time factors.

ii. The System reduces paper cost.

iii. The system will provide fast and efficient automated environment
instead of slow and

error prone manual system, thus reducing both time and man power
spent in running

the system.

iii. The system will have GUI interface and very less user-training is
required to learn it
iv. The system will provide service to view various information for
proper managerial decision

making.

ADDHAR SECURE TRAVEL ID Page 13


2. Technical Feasibility:

Technical feasibility centres around the existing computer


system ((hardware and software)

whether it can support the addition of proposed system, if not, to what


extent it can support and the

organization’s capacity to acquire additional components.

Our proposed system is technically feasible because –

 The hardware and software required are easy to install and handle

 The necessary hardware configuration and software platform is already


there

 The system supports interactivity with the user through GUI

Proposed system is technically feasible because of the following reasons:-

i. It’s required less system resources.

ii. Expandability will be maintained in the new system. New modules can be
added later on the

application, if required in the future.

iii. The application will have User-friendly Forms and Screens, all validation
checks. So the new

system guarantees accuracy, reliability, ease of access and data security.

3. Behavioural Feasibility:
Behavioural feasibility determines how much effort will go in the proposed
information system, and

in educating and training the users on the new system, along with the new
ways of conducting the

business. Behavioural study strives on ensuring that the equilibrium of the


organization and status

quo in the organization neither are nor disturbed and changes are readily
accepted by the users.

The proposed system is behaviourally feasible because of the following:

The users will accept it because they are already acquainted with
computers.This system is also

meant for the general user. Nowadays the Internet is almost familiar
to everyone. So, it is not

difficult for the user to use the system, in fact they feel comfortable in using
this system.

Most of the users are familiar with the web browser and the process of
booking the auditorium will

be simplified for the users. The organization is definitely ready to welcome


the computerized system.

ADDHAR SECURE TRAVEL ID Page 14


8. Software Requirement Specification

Introduction:
 In Current System the citizen is identified by multiple identity cards.
There is no unique

identity in India. The Aadhar Secure Travel Identity System provides a


unique identity of

citizen.

 It creates a tool that manages the handling of travel that includes


passport and license using

the unique identification associated with each individual.

 It Integrates Citizen, Aadhar Department, Crime, Passport & RTA to


address travel issues

and disputes.

Purpose:

To create a tool that manages the handling of travel that includes passport,
license
and crime using the unique identification associated with each individual.
Integrate Citizen, Aadhar Department, Crime, Passport and RTA to address
travel issues

and disputes.

Document Conventions:

• The purpose of this document is to write down formally the requirements


considered to be

necessary for building the Aadhar Secure Travel Identity System.

• The first section provides a brief idea about the working of the
project along acronyms,

definitions, abbreviations, and reference materials.

• Section 2 provides overview of the system, and a brief description


of all the system

functions.

• Section 3 gives a detailed description of the components.

ADDHAR SECURE TRAVEL ID Page 15


Intended Audience and Reading Suggestions:

This SRS would be used by the following people-

Developers: The developers would use this document to implement


the functionalities and to

ensure traceability of the software.

Testers: The testers would use this document to know the interfaces
and to test the software

accordingly.

Users: The users would use this document to verify if the requirements
specified satisfy their needs.

Scope:

 Citizen Registration, identification of each citizen using UID(Unique


identification number)

 Secure passport application

 Passport application verification by the police authority in online mode

 Passport Issue & Denial

 Provide crime department to integrate with the airport to stop someone


from flying

 Apply for License

 Provide Test details and scenario - RTA.

 Provide test result.


 Issue or deny License.

 Change of address in one ID reflects the change in others.

Existing System with Limitations:

References:

 Google search engine(www.google.com)

 Yahoo search engine(www.yahoo.com)

 E.Soft guidelines

ADDHAR SECURE TRAVEL ID Page 16


Overall Description:

1. Product Perspective:

 Government of India would like to implement the system as a common


platform for

citizens.

 Citizen can request for aadhar card, license and passport through the
system.

2. Product Feature:

The main modules of the project are:

1. Citizen Registration

2. Profile Management

3. Application Verification and Issue UID

4. License Application Management

5. Apply Passport

6. Passport Processing

7. Report
ADDHAR SECURE TRAVEL ID Page 17
Detailed descriptions of modules are:

1. Citizen Registration:

The module allows the citizen to register for unique identity. The
citizen provides his

personal information, photo to the registration module. The module


acknowledges by

providing an application number. The citizen uses the application


number to then check the

status of the unique identity. The administrator is responsible to set the


allocation status.

2. Profile Management:

In this module every user can manage their own profiles .The
admin manage their profile

.The Citizen, RTO, AAI manage their profile in this module.

3. Application Verification and Issue UID:

The applications registered by the citizens are viewed by the


administrator. When the

administrator gets the physical verification report only then he confirms


the issue of

the unique identity. The module generates unique identification number


for each

application (citizen). The UID is also which can be changed by the


citizen.

4. License Application Management:

The module allows the citizen to apply for passport and have the details
and the status of

the test. The citizen will not have to submit any physical form nor have
agents in between.

The Aadhar scheme provides digital form and takes up citizen


information from the

registration database and dynamically fills the form. The test


centers, their location are

picked up based upon the pin code the citizen resides at. The RTA
provides inputs on test

schedules and test results to Aadhar

ADDHAR SECURE TRAVEL ID Page 18


5. Apply Passport:
The module allows the citizen to register application for passport. The
module auto fills the

application with the information already available in the UID


registration database. Only

when there is a change of information the citizen should update


the UID registration

database and then apply for passport. For citizens already having
passport and wanted

change of information updating the UID registration database


automatically updates the

passport database.

6. Passport Processing:
The module allows the administrator to verify the details of the
application, set the status

of the passport. If the application is accepted then the administrator


provides the passport

number and the system automatically updates the date of issue and
expiry. This information

is now available to the citizen as well as to the airport authority. The


passport is a digital

passport. The verification of the citizen is done by the crime/police dept.

7. Reports:

i. Generate Aadhar registration list


ii. Generate license application list

iii. Generate list of Passport applications

ADDHAR SECURE TRAVEL ID Page 19


User Class and Characteristics :

User classes of the system are as following:

Aadhar Staf: Administrator is responsible for following


activities-

 View the request of UID.

 Verify the Citizen UID request..

 After verification give a UID to citizen.

 Update the details of citizen in database.

i. Citizen: Citizen is responsible for following activities-

 Register on the Aadhar secure travel identity and get id and password.

 After registration login in the Aadhar secure travel identity website.

 Apply for UID and get UID.

 After getting UID apply for the license and passport.


 View and update own profile.

 Send feedback and message to any department.

ADDHAR SECURE TRAVEL ID Page 20


ii. RTO: Administrator is responsible for following activities:

 View all request for license.

 Verify the request for the license.

 Assign time, date and venue to citizen for the test.

 After test if citizen successfully clear the test issue the license.

 Send a digital license to citizen in their mail id.

 Update the records in license database

iii. AAI: AAI is responsible for following activities:

 View all request for passport.

 Verify the request for the passport.

 Assign time, date and venue to citizen for the document verification.

 After document verification, if all document are correct then send UID of
the citizen to
criminal department to check the criminal records.

 Send a digital passport to citizen in their mail id.


 Update the records in passport database.

ADDHAR SECURE TRAVEL ID Page 21


Operating Environment:

 The system developed in J2EEas front end and My SQL as Back end.

 Minimum hardware requirements are Operating system should be


Windows family.

Design Implementation and Constraints:

 For ensuring platform independence of the software the implementation


will be jsp so the

end users system must have a tomcat environment.

 Login and password is used for identification of registered users and


there is no facility for

non-registered users to login.

 This system works only on a single server.

 GUI is only in English.

User Documentation:

A user document should be provided at the end of the development. It


should have the following
1. A read me file to help the user about the product

2. A well-documented user manual.

ADDHAR SECURE TRAVEL ID Page 22


Requirement Analysis and Planning Steps:

 GANTT Chart:

A standard technique employed in recent times to keep track of a


project's progress is the Gantt

chart named after the industrial engineer Henry Gantt (1861-1919). They
are easy to draw, easy to

understand and readily adaptable to other planning approaches (e.g. Pert


Charts).

Each task displayed in the GANTT chart is listed below:

1.1 Identify needs and benefits


Identification of Need and Project Constraints

Meet with customers

Establish Product Statement

Milestone: Product Statement defined

Preparing Feasibility Study

Milestone: Feasibility Study Completed

1.2 Preparing Software & Hardware Requirement Study


Define Software Scope
Information Description
Functional Description
Behavioural Description
Validation Criteria
Hardware Requirement Study
Milestone: SRS Complete

1.3 Define desired output/control/input (OCI)


Define Keyboard functions
Define modes of interaction.

Define import functions

Review OCI with customer

Milestone: OCI define

1.4 Isolate software elements

Milestone: Software elements defined

Research availability of existing software

Research text editing components

ADDHAR SECURE TRAVEL ID Page 23


Research image editing components

Research MS Word document migration components

Milestone: Reusable components identified

1.5 Database preparation


Milestone: Database preparation complete

1.6 Coding
Milestone: Coding completes

1.7 Implementation of System Security Measures


Milestone: System Security Measures implemented

1.8 Testing Software


Milestone: Testing Software Complete

Tabular description of Gantt chart is given below:

Gantt chart

Jan Feb March April May

Task Name Start Finish Days

15/1 25/1 4/2 14/2 24/2 6/16/3 26/3 5/15/4 25/4 5/15/5
345

Project 3
5/1/2017 17/1/2017
Definition 1
System 6
Overview 18/1/2017 23/1/2017
and Analysis
Requirement 14
Gathering
and Software
/1/2017 6/2/2017
Requirement 24
Specification
(SRS)
Tools and 5
2/2017 11/2/2017
Technology 7/
Data Flow 10
2/2/2017 21/2/2017
Diagrams 1

Designing 22/2/20113/3/2017 20
7

42
Coding 14/3/2017 24/4/201
7

Rework 19/4/2017 23/4/2015


7

Final Report 24/4/20129/4/2016


77

ADDHAR SECURE TRAVEL ID Page 24



PERT Chart:

A PERT chart is a project management tool used to schedule, organize,


and coordinate tasks

within a project. PERT (stands for Program Evaluation Review


Technique), a methodology

developed by the U.S. Navy in the 1950s to manage the Polaris


submarine missile program.

A PERT chart presents a graphic illustration of a project as a network


diagram consisting of

numbered nodes (either circles or rectangles) representing events,


or milestones in the

project linked by labelled vectors (directional lines) representing


tasks in the project. The

direction of the arrows on the lines indicates the sequence of tasks.


ADDHAR SECURE TRAVEL ID Page 25
A PERT chart presents a graphic illustration of a project as a
network diagram consisting of

numbered nodes (either circles or rectangles) representing events, or


milestones in the project

linked.

The PERT chart is sometimes preferred over the Gantt chart, another
popular project management

charting method, because it clearly illustrates task dependencies. On the


other hand, the PERT chart

can be much more difficult to interpret, especially on complex


projects. Frequently, project

managers use both techniques.

System Feature:

 Description and Priority:


The product offers the following Key features:

 Web based Application

 Client-server architecture
 Supports for both intranet and internet operations

 Highly scalable and extendible

ADDHAR SECURE TRAVEL ID Page 26



Functional Requirements:

General Constraints:
There are some of the general constraints that is pre-conditions, post-
conditions and business rules

which we need to maintain in our system they are listed below

Pre-Conditions

• The user has to register before applying for the UID.

• The user should have their Aadhar no (UID) for applying license and
passport.

• User has to fill his UID; the system will fetch their all information
required for license or

passport.

Post-Conditions

• The user has to enter the uid to track the status of application.

• The citizen should pass the driving test.

Business Rules
• The non-registered users cannot apply.

• The citizen should pass the driving test to get the license.

• The citizen shouldn’t have any criminal record.

ADDHAR SECURE TRAVEL ID Page 27


External Interface Requirements:

 User Interface:
The user interface is an important part of this software and will make
the software very user

friendly.

• Input Screen: The input screen should have some icons that will be used
for opening the

browse window and importing the input files. It should also show
the files that are being

imported. This screen should also have a time line over which the
imported files can be

placed and the duration of the files in the presentation can be adjusted

• Preview Screen: The preview screen should be able to show the


presentation slides, video

and the table of contents as a complete multimedia presentation.

• Publish Screen: The publish screen must get the input from the user
about where to store

the presentation. It should show some animation representing the


status of the publishing

wizard.
ADDHAR SECURE TRAVEL ID Page 28

Hardware Interface:
It is recommended that the minimum configuration for clients is as
appended below:-

Processor : Intel Series (1GHz or above)

 RAM : 1 GB

 Hard Disk : With 80GB or above

 Monitor : SVGA Monitor

 CD Drive : 52X or above

 Keyboard : Normal/Multimedia

 Mouse : Normal

 Software Interface:
 Front end : JAVA/J2EE

 Back end : MYSQL 5.5

 Tools : Java Script, Ajax, CSS

 Languages : Java (core & Advance)

 Operating System : Windows XP & Above

 Web Server : Apache Tomcat Server 7.0


ADDHAR SECURE TRAVEL ID Page 29

Communication Interface:

Client on Internet will be using HTTP protocol.

 Client on Intranet will be using TCP/IP protocol.

 A Web Browser such as IE 5.0 or equivalent.

 Non-Functional Requirements:

Performance Requirements:

To achieve good performance the following requirements must be


satisfied

 Scalability: The ease with which a system or component can be modified


to fit the problem

area.


Portability: The ease with which a system or component can be
transferred from one

hardware or software environment to another.

 Security: It is the ideal state where all information can be


communicated across the internet

company secure from unauthorized persons being able to read it and/or


manipulate it. It is
also the process of preventing and detecting unauthorized use of one’s
computer.

 Maintainability: The ease with which a software system or


component

can be modified to correct faults, improve performance, or other


attributes, or adapt to a

changed environment.

 Reliability: The ability of a system or component to perform its


required

functions under stated conditions for a specified period of time.

 Reusability: The degree to which a software module or other work


product can be used in

more than one computing program or software system.

ADDHAR SECURE TRAVEL ID Page 30


Safety Requirements:

Database is an important aspect of any system. So it is required to


take backup of the

database. Special exception handling mechanism should be in place to avoid


system error.

In case scenarios where data integrity can be compromised, measures


should be taken to

ensure that all changes are made before system is shutdown. The
user must have a

registered account to use all facility of the web application

Security Requirements:

• Only registered students are able to access the test.

• The test can be made available on specific date and time.

• The no. of times student access test can be set.

• The login and logoff time per student is available

Software Quality Attribute:

1. Functionality: The capability to Provides functions which meet stated


and implied needs

when the software is used.


2. Reliability: The capability to be maintains a specified level of
performance.

3. Usability : The capability to be understood, learned and used.

4. Eficiency: The capability to Provides appropriate performance


relative to the amount of

resources used.

5. Maintainability: The capability to modified for the purpose of


making corrections and

improvement

6. Portability: The capability to adopted for different specified


environments without applying

actions or means other than those provided for this purpose in the
product.

ADDHAR SECURE TRAVEL ID Page 31


Other Requirements:

 Appendix A: Glossary :

• HTML: Hypertext Mark-up Language is a Mark-up language used


to design static

web pages.

• J2EE:Java 2 Enterprise Edition is a programming platform part of the


Java Platform

for developing and running distributed multitier architecture Java


applications, based

largely on modular software components running on an application


server.

• MySQL: MySQL Database is the database management system


that delivers a

flexible and cost effective database platform to build robust on


demand business

applications.

• HTTP: Hypertext Transfer Protocol is a transaction oriented


client/server protocol

between web browser & a Web Server.

• HTTPS: Secure Hypertext Transfer Protocol is a HTTP over SSL


(secure socket

layer)

• TCP/IP: Transmission Control Protocol/Internet Protocol, the suite


of

communication protocols used to connect hosts on the


Internet. TCP/IP uses
several protocols, the two main ones being TCP and IP.

ADDHAR SECURE TRAVEL ID Page 32



Appendix B: Analysis Model:
ADDHAR SECURE TRAVEL ID Page 33
9. Software Engineering Paradigm
Applied
Software engineering is a layered technology. The foundation for
software engineering is the

process layer. Software engineering processes the glue that holds the
technology layers together and

enables ratios and timely development of computer software. Process


defines a framework for a set

of key process areas that must be established for effective delivery of


software engineering

technology.

Software engineering methods provide the technical how-to’s for


building software. Methods

encompass a broad array of tasks that include requirements analysis,


design, program construction,

testing and support. Software engineering tools provide automated or semi-


automated support for

the process and the methods. When tools are integrated so that information
created by one tool can

be used by another tool, a system for the support of software development,


called computer-aided

software engineering is established.

The following paradigms are available:

1. The Waterfall Model

2. The Prototyping Model


The Waterfall Model:

• The waterfall Model originally proposed by Boehme is a software


process

models that tuples.

• The iterative nature of prototyping with the controlled and systematic


aspects

of the linear.

• Sequential model.

• Using the waterfall model website is developed in a series of


incremental

releases.

This model is also known as Linear Sequential Model. In this model the
software development is

carried out in six phases. This classical model suggests well-defined


activities to be carried out in

every phase of development. This method is called waterfall model because


it is similar to a waterfall

and all the activities are done sequentially.

ADDHAR SECURE TRAVEL ID Page 34


 Feasibility Study

 Requirement Analysis

 Design

 Coding

 Testing

 Implementation & Maintenance

Feasibility
Study

Requiremen

Analysis

Design

Coding

Testing

Implementation

& Maintenance

The Prototyping Model:


Fig.: The Waterfall Model
The Prototyping model is similar to the waterfall model with some
differences. It has been

noticed by several system analysts that most of the time, the


customer is not sure about the

functionality he requires in the software product. In such cases, it is not


considered a good practice

to develop a product as only perceived by the software development team.


Before preparing the SRS

documents, the customers must also understand the functionality of


the product. Under such

circumstances, the prototyping model for software development is


used. In this approach a quick

design of the product is prepared and shown to the customer. Prototype is a


toy representation of

the software modified. As per the suggestion of the customer, the prototype
is rebuilt and modified.

Once the customer accepts the design, the design phase according to the
waterfall model starts.

ADDHAR SECURE TRAVEL ID Page 35


Initial Requirement & Specification

Rapid Design

Refine Construct Prototype

Requirement

Evaluation of Prototype
Building a Prototype

Design
Coding

Testing

Implementation and

Maintenance

Fig: The Prototype

Model

ADDHAR SECURE TRAVEL ID Page 36


The Project is based on Prototype Model as:

The basic idea of prototyping is that instead of freezing the


requirements before any design or

coding can proceed, a throwaway prototype is built to help


understand the requirements. This

prototype is developed based on the prototype obviously undergoes design,


coding & testing, but

each of these phases is not done very formally or thoroughly. By using this
prototype the client can

get an actual feel of the system, because the interactions with the prototype
can enable the client to

better understand the requirements of the desired system.

Design Code Test

In this Project used Prototype Model because the system is complicated


and large and there is no

existing system (computerized) prototyping is an attractive idea. In


this situation letting the client

test the prototype provides the variable inputs, which help in determining
the requirements of the

system. It is also an effective method of demonstrating the feasibility of a


certain approach.

Some Advantages of Prototype model:


 Reduces development time.

 Reduces development costs.

 Requires user involvement.

 Developers receive quantifiable user feedback.

 Facilitates system implementation since users knows what to expect.

 Results in higher user satisfaction.

 Exposes developers to potential future system enhancements.

ADDHAR SECURE TRAVEL ID Page 37


10. High Level Design

1.Data Flow Diagrams:

 Context/Zero Level DFD:


ADDHAR SECURE TRAVEL ID Page 38

1- Level DFD:
ADDHAR SECURE TRAVEL ID Page 39
2-Level DFD for RTO:
ADDHAR SECURE TRAVEL ID Page 40
2-Level DFD for AAI:
ADDHAR SECURE TRAVEL ID Page 41
2. E-R Diagram:
ADDH
AR SECURE TRAVEL ID Page 42
3. Use Case Diagrams:

Use Case Diagram For Admin And Citizen:

View Request

Verify Request

Issue UID

Admin
(Aadhar staff)
Add Manage RTO,AAI

Apply For UID Request

View Aadhar and download

Apply For Driving License


Citizen

View License and Download

Apply For Passport

View and Download

ADDHAR SECURE TRAVEL ID Page 43


Use Case Diagram For RTO And AAI:

View License Registration

Assign date time & Venue

For test

RTO
Accept or Reject Application

View passport Request

Assign date & time for

document Verification
AAI

Application Accept or Reject

ADDHAR SECURE TRAVEL ID Page 44


11. Database Design

Database Name Secure Travel

Table Structure:

 Registration

 Login

 Aadhar Staff

 RTO Staff

 Airport Staff

 Country Id

 State Id

 City Id

 Feedback

 News

 Message

 License

 Passport

 UID

 Verify Passport
 Verify License

 Verify UID

ADDHAR SECURE TRAVEL ID Page 45


Table: login

Column Name Length Data type Constraints

User_Id 15 Varchar Primary key

Password 15 Varchar Not null


Type 10 Varchar Not null

Table: Aadhar Staf

Column Name Length Data type Constraints

User_Id 15 Varchar Primary key


Name 25 Varchar Not null

Password 15 Varchar Not null

Gender 10 Varchar Not null


Location 20 Varchar Not null

Office Address 45 Varchar Not null

Permanent Address 45 Varchar Not null


Email Id 20 Varchar Not null

Contact Info 15 Integer Not null

Table: RTO Staf


Column Name Length Data type Constraints

User_Id 15 Varchar Primary key


Name 25 Varchar Not null

Password 15 Varchar Not null

Gender 10 Varchar Not null


Location 30 Varchar Not null

Office Address 45 Varchar Not null

Permanent Address 45 Varchar Not null


Email Id 20 Varchar Not null

Contact Info 10 Integer Not null

ADDHAR SECURE TRAVEL ID Page 46


Table: Airport Staf

Column Name Length Data type Constraints

User_Id 15 Varchar Primary key

Name 25 Varchar Not null


Password 15 Varchar Not null

Gender 10 Varchar Not null

Location 30 Varchar Not null


Office Address 45 Varchar Not null

Permanent Address 45 Varchar Not null

Email Id 20 Varchar Not null


Contact Info 15 Integer Not null

Table: Country

Column Name Length Data type Constraints

Country_Id 20 Varchar Primary key

Country_Name 20 Varchar Not null

Table: State

Column Name Length Data type Constraints


State_Id 20 Varchar Primary key

State_Name 30 Varchar Not null


Country_Name 20 Varchar Not null

Table: City

Column Name Length Data type Constraints

City_id 20 Varchar Primary key


City_Name 30 Varchar Not null

State_Name 20 Varchar Not null

ADDHAR SECURE TRAVEL ID Page 47


Table: News

Column Name Length Data type Constraints

News_Id 20 Varchar Primary key

News 30 Varchar Not null


Status 20 Varchar Not null

Table: Feedback

Column Name Length Data type Constraints


User_Id 20 Varchar Primary key

Feedback 30 Varchar Not null

Table: Message

Column Name Length Data type Constraints


Message to 15 Varchar Primary key

Message from 25 Varchar Not null

Subject 15 Varchar Not null


Message 20 Varchar Not null

Status 30 Varchar Not null

Table: License

Column Name Length Data type Constraints

User_Id 15 Varchar Foreign key


Name 30 Varchar Not null
Father_Name 30 Varchar Not null

Gender 10 Varchar Not null

DOB 10 Varchar Not null


Local Address 45 Varchar Not null

Permanent Address 20 Varchar Not null

Qualification details 20 Varchar Not null


Vehicle type 10 Varchar Not null

2wheeler type 10 Varchar Not null

Blood group 10 Varchar Not null


E-mail 25 Varchar Not null

Contact Info 25 Varchar Not null

Upload mark sheet 25 Varchar Not null


Status 15 Varchar Not null

ADDHAR SECURE TRAVEL ID Page 48


Table: Passport

Column Name Length Data type Constraints

User_Id 15 Varchar Foreign key

Applying for 10 Varchar Not null


Type of application 10 Varchar Not null

Type of passport 10 Varchar Not null


booklet
DOB 10 Varchar Not null

Village 45 Varchar Not null

Country 20 Varchar Not null


State 20 Varchar Not null

City 20 Varchar Not null

Gender 10 Varchar Not null


Marital status 10 Varchar Not null

Pan 25 Varchar Not null

Voter_Id 10 Varchar Not null


Employment type 25 Varchar Not null

Educational 15 Varchar Not null


Qualifications

Father name 20 Varchar Not null

Mother name 20 Varchar Not null


Guardian name 25 Varchar Not null

Address 20 Varchar Not null

Mobile no 10 Varchar Not null


Passport no 25 Varchar Not null

Date of issue 10 Varchar Not null


Date of expiry 10 Varchar Not null
Place of issue 15 Varchar Not null

Applied passport 20 Varchar Not null

Self-declaration 20 Varchar Not null


Place 10 Varchar Not null

Date 20 Varchar Not null

Photo 530 Varchar Not null


Status 25 Varchar Not null

ADDHAR SECURE TRAVEL ID Page 49


Table: UID

Column Name Length Data type Constraints

User_Id 15 Varchar Foreign key

First name 30 Varchar Not null


Middle name 30 Varchar Not null

Last name 30 Varchar Not null

Gender 30 Varchar Not null


Address 45 Varchar Not null

Country 20 Varchar Not null

State 20 Varchar Not null


City 35 Varchar Not null

E-mail id 20 Varchar Not null

Contact info 50 Varchar Not null


Opt 25 Varchar Not null

Name 25 Varchar Not null

Eid 25 Varchar Not null


Share info 15 Varchar Not null

Bank info 20 Varchar Not null

State name 20 Varchar Not null


Bank name 35 Varchar Not null

IFSC 20 Varchar Not null

Account no 50 Varchar Not null


Verification type 25 Varchar Not null

POI 25 Varchar Not null

POA 25 Varchar Not null


DOB 15 Varchar Not null
POR 20 Varchar Not null

Introducer 20 Varchar Not null


Optn 35 Varchar Not null

Photo 20 Varchar Not null

Sign 30 Varchar Not null


Thumb 25 Varchar Not null

DOB 20 Varchar Not null

Status 50 Varchar Not null


Pass 25 Varchar Not null

ADDHAR SECURE TRAVEL ID Page 50


Table: Verify License

Column Name Length Data type Constraints

User_Id 20 Varchar Primary key

RTO Officer_Id 30 Varchar Not null


Test date 20 Varchar Not null

Test time 20 Varchar Not null

Venue 45 Varchar Not null


Status 45 Varchar Not null

Table: Verify Passport

Column Name Length Data type Constraints


User_Id 20 Varchar Primary key

Airport Officer_Id 30 Varchar Not null

Submission date 20 Varchar Not null


Submission time 20 Varchar Not null

Venue 45 Varchar Not null

Status 45 Varchar Not null

Table: Verify UID

Column Name Length Data type Constraints

Applicant_Id 20 Varchar Primary key

UID 30 Varchar Not null


Password 20 Varchar Not null
Status 20 Varchar Not null

Table: Registration

Column Name Length Data type Constraints

User_Id 20 Varchar Primary key

Name 20 Varchar Not null


F_Name 20 Varchar Not null

Address 45 Varchar Not null

Gender 10 Varchar Not null


State 20 Varchar Not null

City 20 Varchar Not null

Pincode 10 Integer Not null


E-mail 30 Varchar Not null

DOB 10 Varchar Not null

Mobile No 10 Integer Not null

ADDHAR SECURE TRAVEL ID Page 51


12. Screen Shot

Home:
ADDHAR SECURE TRAVEL ID Page 52
REGISTRATION:
ADDHAR SECURE TRAVEL ID Page 53
POPUP:
ADDHAR SECURE TRAVEL ID Page 54
LOGIN:
ADDHAR SECURE TRAVEL ID Page 55
CITIZEN HOME:
ADDHAR SECURE TRAVEL ID Page 56
UID FORM :
ADDHAR SECURE TRAVEL ID Page 57
PASSPORT FORM:
ADDHAR SECURE TRAVEL ID Page 58
LICENSE FORM:
ADDHAR SECURE TRAVEL ID Page 59
VIEW PROFILE
ADDHAR SECURE TRAVEL ID Page 60
CHECK STATUS UID :

CH
ECK STATUS UID :
ADDHAR SECURE TRAVEL ID Page 61
CHECK STATUS UID :

ACC
OUNT DROPDOWN

ADDHAR SECURE TRAVEL ID Page 62


CHANGE PASSWORD

FEE
DBACK
ADDHAR SECURE TRAVEL ID Page 63
ADMIN HOME PAGE

VIE
W UID REQUEST
ADDHAR SECURE TRAVEL ID Page 64
ADD DROP DOWN

VIE
W DETAILS DROP DOWP
ADDH
AR SECURE TRAVEL ID Page 65
VIEW AADHAR STAFF DETAILS

VIE
W RTO DETAILS
ADDH
AR SECURE TRAVEL ID Page 66
VIEW CITIZEN DETAILS
ADDH
AR SECURE TRAVEL ID Page 67
VIEW AAI DETAILS

VIE
W FEEDBACK
ADDH
AR SECURE TRAVEL ID Page 68
VIEW MESSAG
ADDHAR SECURE TRAVEL ID Page 69
RTO HOME
VIE
W LICENSE
ADDH
AR SECURE TRAVEL ID Page 70
PASSPORT HOME

VIE
W PASSPORT
ADDHAR SECURE TRAVEL ID Page 71
13. Software Cost Estimation

Line of Code:

Program length (LOC) can be used to predict program characteristics e.g.


person-month effort and

ease of maintenance.

The measure was first proposed when programs were typed on cards with
one line per card.

Advantages:
 Simple to measure

Disadvantages:
 Defined on code: it cannot measure the size of specification

 Based on one specific view of size: length. What about complexity and
functionality!!

 Bad s/w may yield more LOC

 Language dependent

Function Point &LOC:


scan be used to estimate LOC depending on the average number of LOC
per FP for a given

language

 LOC = AVC * number of function points

AVC is a language-dependent factor varying from approximately 300 for


assembles language to 12-

40 for a 4 GL.

ADDHAR SECURE TRAVEL ID Page 72


LOC Approach

Functions Estimated LOC/Pd $/LOC COST EFFORT(Days)


LOC

Citizen 180 15 16 2880 12


Registration

Profile 110 8 16 1760 13.75


Management

Application 105 10 16 1680 10.5


Verification
And Issue UID

License 120 9 16 1920 13.33


Application
Management

Apply Passport 150 10 16 2400 15

Passport 90 8 16 1440 11.25


Processing

Report 50 5 16 800 10

Total 805 12880 85.83


ADDHAR SECURE TRAVEL ID Page 73
14. Testing

Software testing is a critical element of software quality assurance


and represents the

ultimate review of specification, design and coding testing requires


that the developer

discard preconceived notions of the “correctness” of software just


developed and

overcome a conflict of interest that occurs when errors are uncovered.

Testing is a process of executing a program with the intent of finding an


error. Also

testing is one element of a broader topic often referred as Validation &


Verification.

Test Cases:

Project History

Project ID AADHAR SECURE TRAVEL IDENTITY

Test Case History

Created By Shiv Kumar Mandal Date Created By 25-04- 2017

Reviewed By Pooja Verma Date Reviewed By 30-04-2017


Approved By Brijesh Kumar Date Last Updated 30-04-2017

Test Executed By Pooja Verma

ADDHAR SECURE TRAVEL ID Page 74


1. Test Case Name: Aadhar Staff (Admin)/Citizen/RTO/AAI Login Operation

Test Case Objective: Verify Login operation

TC# Test Input Expected Actual Pass Fail Comments Bug


Design Data Result Result
TC_01 Click on User Id, Should Display Pass If User_Id or
Login on Password display Aadhar Password
Aadhar Staff does not exist
Page Staff ,it display
(Aadhar Page Invalid
Staff ) Page User_Id or
Password

TC_02 Click on User Id, Should Display Pass If Citizen


Login on Password display Citizen User_Id or
Home Citizen Password
Page Page does not exist
(Citizen) Page ,it Invalid
User_Id or
Password
TC_03 Click on User Id, Should Display Pass If RTO
Login on Password display RTO User_Id or
RTO Password
Page Page does not exist
(RTO) Page ,it Invalid
User_Id or
Password
TC_04 Click on User Id, Should Display Pass If AAI
Login on Password display User_Id or
Home Password
Page Home Page does not exist
(AAI) Page ,it Invalid
User_Id or
Password
ADDHAR SECURE TRAVEL ID Page 75
2. Test Case Name: Registration/UID/RTO/AAI

Test Case Objective: Verify Registration Operation

TC# Test Input Expected Actual Pass Fail Comments Bug


Design Data Result Result
TC_01 Click on Citizen , Registration Request Pass If Citizen
Registration Name, Request Send to already
Link on DOB, Should Send Admin registered
Home Page Address, to Admin en a
Type, message
display on

url/screen.
TC_02 Click on Name, UID Request Pass If Citizen
Novar Tab Father Registration Send to already
(Apply for) name, Request Aadhar registered
UID DOB, Should Send Staff Then a
Link on Address, Aadhar message
Citizen Photo, Staff display on
Home Page
url/screen
TC_03 Click on Registration Request Pass If Citizen
Novar Tab Name, Request Send to already
(Apply for) DOB, Should Send RTO registered
RTO Vehicle, to RTO Then a
Link on Vehicle message
Citizen Type display on
Home Page Address,
url/screen

TC_04 Click on Passport Registration Request Pass If Citizen


Novar Tab Booklet Request Send to already
(Apply for) Type, Should Send registered
Name, AAI Then a
Link on DOB, message
Citizen Address, display on
Home Page
url/screen
ADDHAR SECURE TRAVEL ID Page 76
3. Test Case Name: Verify

Test Case Objective: Verify UID/License/Passport

TC# Test Input Expected Actual Pass Fail Comments Bug


Design Data Result Result
TC_01 Click on Pass If Details are
Verify UID correct after physical
Link on verification
Aadhar Then verify citizen
Staff and send UID to
Home Page citizen

TC_02 Click on If Details are


Verify correct
RTO Then verify citizen
Link on and send Digital
RTO Staff license information
Home Page to citizen

TC_03 Click on If Details are


Verify AAI correct
Link on Then verify citizen
Airport and send Digital
Staff Passport
Home Page Information
to citizen
ADDHAR SECURE TRAVEL ID Page 77
15. Conclusion

The system’s capability is to keep track of all the information and generate
the reports as its main

feature, which helps the management to know the current position of the
organization activities by

just glancing through system, generated details.

The system has been developed considering every single quality


factor. Due to this reason

the system is highly secure from the crash down problem. Moreover, the
system is highly reliable

and due to the security and integrity features, provides for the
system, unauthorized users cannot

access the system.

This Web Application provides facility to conduct online examination


worldwide. It saves time as it

allows number of students to give the exam at a time and displays the
results as the test gets over, so

no need to wait for the result.

It is automatically generated by the server. Administrator has a privilege to


create, modify and delete

the test papers and its particular questions. User can register, login and
give the test with his specific

id, and can see the results as well.


ADDHAR SECURE TRAVEL ID Page 78
16. Future Scope

The Future Scope and Enhancement which might be implemented in this


proposed

system can be:-

 The Project should be flexible enough so as to easily adapt to any


future changes

 Likely to be added in the software.

 Should be supportive so as to hold large number of records in the


database.

 This website/project can be enhanced with following feature in future


based on

 business needs

 Ability to add promotional offers to attract more user subscriptions,


this can lead to more

revenue for a business.

 Use of Secured Socket Layer (https) protocol to provide enhanced


security for website.
ADDHAR SECURE TRAVEL ID Page 79
17. Bibliography

Books:

I. Java-2 Black Book.pdf

II. Database Programming With JDBC And Java, 2nd_Edition.pdf

III. Head First Java - SharpensOne.pdf

Websites:

I. www.google.com

II. www.wikipidea.com

III. www.w3schools.com
ADDHAR SECURE TRAVEL ID Page 80

You might also like