Professional Documents
Culture Documents
Online Smart Ration Card System With Multifactor Authentication
Online Smart Ration Card System With Multifactor Authentication
Dr. T. K. Nagaraj
External Examiner Principal
Place :
Date :
BE Comp-2018 ‘Online Smart Ration Card System With Multifactor
Authentication’
Acknowledgments
I would like to take this opportunity to thank my internal guide PROF. GAURI
VIRKAR for giving me all the help and guidance I needed. I am really grateful
to them for their kind support. Their valuable suggestions were very helpful.
BHARATI KAMBLE
NEHA DAMBE
SHREE VIRKAR
SHRIRAM KULKARNI
(B.E. Computer Engg.)
In this system, we have proposed a smart ration card using RFID card, biometrics,
Multi-color code authentication and SMS gateway to prevent the ration forgery.
The color code sequence is used at the time of uder login. In the proposed system
user request admin. Admin verify user mobile number and generate order after
generating order deliver to the user’s home at the time of delivery biometeric
verification will be take place and after that hand over the grocery. The user will
have to provide thumb impression on the biometric machine. If the user is found
authentic then the quantity of ration to be given to customer according to the total
number of family member will be displayed on the LCD display This smart ration
card is free from theft and forgery as the information about the delivered ration will
be sent directly to the government and customer through SMS gateway.
INDEX
Acknowledgment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I
Abstract...............................................................................................................II
List of Figures...................................................................................................VI
List of Tables....................................................................................................VII
1 SYNOPSIS 1
1.1 Project Title . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Project Option . . . . . . . . . . . . . . . . . . . . . . . . . .. . 1
1.3 Internal Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.4 Sponsorship and External Guide . . . . . . . . . . . . . . . . . . . 1
1.5 Technical Keywords (As per ACM Keywords) . . . . . . . . . . . . 1
1.6 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.7 Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.8 Goals and Objective . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.9 Relevant mathematics associated with the Project . . . . . . . . . . 3
1.10 Names of Conferences / Journals where papers can be published . . 4
1.11 Review of Conference/Journal Papers supporting Project idea . . . . 4
1.12 Plan of Project Execution . . . . . . . . . . . . . . . . . . . . . . . 7
2 Technical Keywords 8
2.1 Area of Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2 Technical Keywords . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3 INTRODUCTION 10
3.1 Project Idea...............................................................................................10
III
3.2 Motivation of the Project..........................................................................11
3.3 LITERATURE SURVEY.........................................................................11
3.3.1 Existing System...........................................................................14
3.3.2 Disadvantages of Existing System..............................................14
5 Project Plan 18
5.1 Project Estimates......................................................................................18
5.1.1 Reconciled Estimates...................................................................18
5.1.2 Project Resources........................................................................20
5.2 Risk Management w.r.t. NP Hard analysis..............................................20
5.2.1 Risk Identification.......................................................................20
5.2.2 Risk Analysis...............................................................................21
5.2.3 Overview of Risk Mitigation, Monitoring, Management............22
5.3 Project Schedule.......................................................................................23
5.3.1 Project task set.............................................................................23
5.3.2 Timeline Chart.............................................................................24
5.4 Team Organization...................................................................................24
5.5 Team structure..........................................................................................24
5.5.1 Management reporting and communication................................25
III
6.1.1 Purpose and Scope of Document.................................................27
8 CONCLUSION 41
9 References 42
III
List of Figures
VI
List of Tables
SYNOPSIS
Internal project
NO.
1. C.Information Systems
1
BE Comp-2018 ‘Online Smart Ration Card System With Multifactor
Authentication’
B. Integrity
C. Protection
i. C.2.1 Languages
A. Data description languages
B. Data manipulation languages
C. Query languages
1.7 ABSTRACT
In this system, we have proposed a smart ration card using RFID card, biometrics,
Multi-color code authentication and SMS gateway to prevent the ration forgery.
The color code sequence is used at the time of uder login. In the proposed system
user request admin. Admin verify user mobile number and generate order after
generating order deliver to the user’s home at the time of delivery biometeric
verification will be take place and after that hand over the grocery. The user will
have to provide thumb impression on the biometric machine. If the user is found
authentic then the
Technical Keywords
Data Mining
1. C.Information Systems
i. C.2.1 Languages
A. Data description languages
B. Data manipulation languages
C. Query languages
8
BE Comp-2018 ‘Online Smart Ration Card System With Multifactor Authentication’
INTRODUCTION
Proportion card is an exceptionally vital archive for each resident in India. Propor-
tion card is utilized to buy different essential things like sugar, oil and so on from
the proportion shops at a less expensive rate, issued by the administration. This
proportion card likewise goes about as address and in addition personality verifica-
tion. Proportion card is required when you apply for identification, PAN number,
driving permit and so on. Thus, proportion card is an essential archive. The ra-
tion distribution system is established by the Government of India under Ministry
of Consumer Affairs, Food, and Public Distribution to distribute grocery items to
poor people at fair price . The existing conventional ration card system has
numerous problems. These problems ranges from the basic issues of renewing the
ration card every year by pasting excess leaves which has to be done manually by
the employees to the malpractices done by FPS dealers like diverting food grains to
open market to make profits. There is another problem of irregularity in opening
shops and false announcements of deficit in food grains. By using this system the
major problems like bribery, irregular distribution and other difficulties faced by
the poor people are eliminated. Illegal activities in the FPS can be greatly reduced
by this method. The distribution process is automated using centralized server and
so the government fa- cilities reach people properly. The corruption and bribery is
the major problem in FPS which can be avoided using this system. The
computerized database maintained avoids wrong entry of the product by the
officials and provides authenticated trans-
10
BE Comp-2018 ‘Online Smart Ration Card System With Multifactor
Authentication’
The motivation is that By using this system the major problems like bribery, ir-
regular distribution and other difficulties faced by the poor people are eliminated.
Illegal activities in the FPS can be greatly reduced by this method. The distribution
process is automated using centralized server and so the government facilities
reach people properly. The corruption and bribery is the major problem in FPS
which can be avoided using this system.
The existing conventional ration card system has numerous problems. These
problems ranges from the basic issues of renewing the ration card every year by
past- ing excess leaves which has to be done manually by the employees to the
malprac- tices done by FPS dealers like diverting food grains to open market to
make profits. There is another problem of irregularity in opening shops and false
announcements of deficit in food grains. By using this system the major problems
like bribery, irreg- ular distribution and other difficulties faced by the poor people.
Illegal activities in the FPS. The distribution process is not automated and so the
government facilities are not reach to the people properly. The corruption and
bribery is the major problem in FPS.
• The issues of renewing the ration card every year by pasting excess leaves
which has to be done manually by the employees.
15
BE Comp-2018 ‘Online Smart Ration Card System With Multifactor
Authentication’
The three most significant project constraints -schedule(Time), cost and scope are
sometimes known as the triple constraint or the project management triangle. A
projects scope involves the specific goals, deliverables and tasks that define the
boundaries of the project. The schedule (sometimes stated more broadly as time)
specifies the timeline according to which those components will be delivered, in-
cluding the final deadline for completion. Cost (sometimes stated more broadly as
resources) involves the financial limitation of resources input to the project and
also the overall limit for the total amount that can be spent.
• Time:
This refers to the actual time required to produce a deliverable. Which in this
case, would be the end result of the project. Naturally, the amount of time
required to produce the deliverable will be directly related to the amount of
requirements that are part of the end result (scope) along with the amount of
resources allocated to the project (cost).
• Cost:
This is the estimation of the amount of money that will be required to
complete the project. Cost itself encompasses various things, such as:
resources, labor rates for contractors, risk estimates, et cetera. All aspects of
the project that have a monetary component are made part of the overall cost
structure. The system should have Low cost
• Scope:
These are the functional elements that, when completed, make up the end de-
liverable for the project.
• The single problem can be solved by different solutions. This considers the
performance parameters for each approach. Thus considers the efficiency is-
• Processor : Pentium
• RAM : 2 GB Minimum
• Biometrics Device
Project Plan
5.1.1 Reconciled
Costs of the getting knowledge is depends on the resources and efforts needed for
the development of the system.
18
BE Comp-2018 ‘Online Smart Ration Card System With Multifactor
Authentication’
Cost Estimates
Cost of project
C=N*Cp
C=4*5000
C=20,000/month
Total cost=20,000*6
1. Have top software and customer managers formally committed to support the
project?
Ans:- Not applicable. As there are no customer or Software managers at this
stage.
3. Are requirements fully understood by the software engineering team and its
customers?
Ans:- Yes, all requirements are fully understood by the software engineering
team and its customers.
4. Have customers been involved fully in the definition of
requirements? Ans:-Yes, Customer is involved fully.
Risk ID 1
Risk Description Connectivity
Category Development Environment.
Source Software requirement Specification document.
Probability Low
Impact High
Response Mitigate
Strategy Let users know in the beginning about all requirement
Risk Status May occur sometime
Risk ID 2
Risk Description User privacy
Category Requirements
Source Software Design Specification documentation review.
Probability Low
Impact High
Response Mitigate
Strategy Better testing will resolve this issue.
Risk Status Identified
Risk ID 3
Risk Description Feedback not uploaded on database
Category Technology
Source This was identified during early development and testing.
Probability Low
Impact Very High
Response Accept
Strategy Database manager will resolve this issue.
Risk Status Identified
• Task 5: Coding.
• Task 6: Testing.
• Task 7: Implementation
• Task 8: Maintenance
Whatever activities are done related to the project that we all showing all details log
to our guide. All the reporting are noted to the guide.
The team structure for the project is identified. Roles are defined. Our team have
four members. We select this topic after discussing with each other. All the
members
performing all the task whatever tasks are assign to the members.
6.1 INTRODUCTION
The purpose of this document understands the project and search time efficiency.
In detail, this document will provide a general description of our project, including
user requirements, product perspective, and overview of requirements, general
con- straints. In addition, it will also provide the specific requirements and
functionality needed for this project - such as interface, functional requirements
and performance requirements.
27
BE Comp-2018 ‘Online Smart Ration Card System With Multifactor
Authentication’
All use-cases for the software are presented. Description of all main Use cases using
use case template is to be provided.
Use case diagrams are typically used to model circumstances where your system or
application interfaces with outside entities, which are known as actors. Use case di-
agrams are usually referred to as behavior diagrams used to describe a set of
actions (use cases) that some system or systems (subject) should or can perform in
collabo- ration with one or more external users of the system (actors). Each use
case should provide some observable and valuable result to the actors or other
stakeholders of the system.
Use cases: A use case describes a sequence of actions that provide something of
measurable value to an actor and is drawn as a horizontal ellipse.
Actors: An actor is a person, organization, or external system that plays a role in
one or more interactions with your system. Actors are drawn as stick figures.
Associations: Associations between actors and use cases are indicated by solid
lines. An association exists whenever an actor is involved with an interaction
described by a use case.
In below diagram it is showing the use cases for the research. The actors in
the use case are data owner and data user who wants to use the files shared by the
data owner.
The class diagram is a static diagram. It represents the static view of an appli-
cation. Class diagram is not only used for visualizing, describing and documenting
different aspects of a system but also for constructing executable code of the soft-
ware application. The class diagram describes the attributes and operations of a
class and also the con-straits imposed on the system. The class diagrams are widely
used in the modeling of object oriented systems because they are the only UML
diagrams which can be mapped directly with object oriented languages. The
class dia- gram shows a collection of classes, interfaces, associations,
collaborations and con- straints. There are three classes in the class diagram such as
cloud and data owner and data user. The attributes for the cloud class are files, ip
address etc.And for the data user attributes are user name ,password,email address
etc. User can download and upload files to the cloud server.
A description of each major software function, along with data flow (structured
anal- ysis) or class hierarchy (Analysis Class diagram with class description for
object oriented system) is presented.
• The system will be available 100% of the time. Once there is a fatal error,
the system will provide understandable feedback to the user.
• All data will be backed-up everyday automatically and also the system
admin- istrator can back- up the data as a function for him.
• The system is designed in modules where errors can be detected and fixed
easily.
6.8.3 Software Quality Attributes
• Reliability: The Client machine will change the status of data indicating suc-
cessful data transmission.
In this system, employee makes its registration. He login to the system and send
locations to server, so system design should contain: ext boxes to input user infor-
mation such as name, password.
7.1 INTRODUCTION
35
BE Comp-2018 ‘Online Smart Ration Card System With Multifactor
Authentication’
• Login Module :
In this module, the system takes beneficiaries details like their name,
address, fingerprint, date of birth, age, contact number for sending SMS
alerts, count of family members, color code sequence pattern and category of
the card to which the family belongs to. All the information is stored in the
database.
• Purchase Module :
After beneficiary identification by using biometrics, the beneficiary is pre-
sented with a list of commodities present in the FPS. The beneficiary has to
select the list of commodity he/she wants to purchase. The system will
display the total quantity of the commodities that he/she wants to purchase.
Once after he/she confirms the commodities, payment is done and
beneficiaries are given a receipt in form of a SMS.
7.2.1 Database
description MySQL
MySQL is a fast, easy-to-use RDBMS being used for many small and big
businesses. MySQL is developed, marketed, and supported by MySQL AB, which
is a Swedish company. MySQL is becoming so popular because of many good
reasons:
2. MySQL is a very powerful program in its own right. It handles a large subset
of the functionality of the most expensive and powerful database packages.
5. MySQL works very quickly and works well even with large data sets.
6. MySQL is very friendly to PHP, the most appreciated language for web
devel- opment.
The class diagram Supports architectural design and provides structural view of
sys- tem to represent the basics of object-oriented systems. Also the class diagram
is illustration of the relationship and source code dependencies among classes in
the UML.
A class defines the method and variables in an object which is a specific entity in a
program or the unit of code representing that entity.
CONCLUSION
In this system we have proposed a model for Smart Ration Card by using bio-
metrics and SMS gateway technology. In the current system, there is a drawback
of ration forgery. So, in proposed system we are replacing the manual entries and
thereby reducing forgery. As we are using user with his/her thumb impression thus
there is very less chances to misuse the Ration card. Also, the system will send
transaction details to the users registered mobile number through SMS gateway
thus transparency is maintained in the system.
41
Chapter 9
References
[1] Balekar Swati D, Kulkarni Rituja R, “ Online Ration Card System by using
RFID and Biometrics ”, International Journal of Advanced Research in Com-
puter Science and Software Engineering, 2015.
[3] Parvathy A, V.R. Raj, Venumadhav, Manikanta, “ RFID Based Exam Hall
Maintenance System , International Journal of Computer Applications
(IJCA), 2011.
[6] Md. Wasi-ur-Rahman, Mohammad Tanvir Rahman, Tareq Hasan Khan and S.
M. Lutful Kabir, Proceedings of the IEEE International Conference on Infor-
mation and Automation(ICIA), 2009.
BE Comp-2018 ‘Online Smart Ration Card System With Multifactor Authentication’
[7] K. Michael, L. Mccathie, “ The Pros and Cons of RFID in Supply Chain
Man- agement ”, Proceedings of the IEEE International Conference on
Information and Automation(ICIA), 2005.
[9] Je Brown, Bill Shipman, Ron Vetter, SMS - “ The Short Message Service ,
IEEE International Conference on Information and Automation(ICIA), 2007.
[13] Pravada P. Wankhade and Prof. S. O. Dahad, “ Real Time Vehicle locking and
Tracking System using GSM and GPS Technology-An Anti-theft System ,
In- ternational Journal of Technology and Engineering System (IJTES): Jan
March 2011- Vol. 2. No.3
[14] A.W Ahmad, N. Jan, S. Iqbal and C. Lee, “ Implementation of ZigBee GSM
based home security monitoring and remote control system , IEEE 54th Inter-
national Midwest Symposium on Circuits and Systems (MWS-CAS), 2011,
pp. 1-4.