SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Title of Project: Unique ID Management System



Introduction

Motive of this project is to provide a unique ID to each and every citizen of India while
providing him/her a birth certificate. Citizens after attaining age of 18 must register at RTO
office or Collector office or Tasildar office and get a password to access the site. ID card will
be provided to every user after registration. Later on they can change their password. Once
they enter the site they can pay their electricity bill and telephone bill, book railway tickets
and airline tickets and pay their taxes. During elections people can poll online. Government
officials can verify details about a person from the database for issuing vehicle license,
passport, visa, etc.




Problem with the existing System

      There is no structured process of data maintenance.
      Area of Improvement in Communication due to technology limitations between
       internal and external customers.
      Report Generation is Time consuming.
Objectives

      ID Creation and Deletion
      User friendly Software
      Database Maintenance and Maintenance of Report Log
      Ease of maintaining records of citizens of India.
      Ease of electricity bill and telephone bill payment, booking of railway tickets and
       airline tickets and pay taxes.
      Online polling fascility to citizens of India.
      Online issueing of vehicle license, passport, visa , etc.



Advantages of the System

    Centralized Common Database
      Centralized Common Communication Channel between Supplier and Customer
      Report Generation is easy and time consuming
      TAT for the process is maintained.



Users of the System
      All Indian citizens of age 18 and above.
      Authorized Government security officials.
      Administrator




The development of a project plan will list the various activities to be
undertaken in this project work as enumerated below:
      Analysis of present set up
      Design of proposed system
      Coding
      Testing
      Implementation
Data Flow Diagrams(DFD):

     DFDs upto appropriate levels for Identity Management is shown below.
     Level-0 DFD/context diagram: This highest level DFD represents the system as a
      whole.




  Citizens                                                                                  Govt. Officials


        Login & Access his Information,                            Login & view details of Citizens,
        Apply for Passport, Vehicle License etc.                   Update their details.




                                         Unique ID Management System


                                                            Maintain Database,
                                                            Can modify Structural Coding & Structure of System,
                                                            Access the details of all users.




                                                   Administrator
Tools to be Used

      ROSE/RSA / WebSphere Modeler
      Eclipse
      Apache Tomcat Server
      MySQL
      Windows will be the preferred OS.




Technologies to be Used

   Front End
          o J2EE

   Back End
          o MySQL




Functionalities

      User Login: Every citizen can login and access their information page.
      Security: A normal user other than Government officials, moderators and
       administrator can only access his/her information. For any information update they
       must approach corresponding office to get approval.
      Security Officials Login: Authorized security persons in police, army, and airlines
       should given a unique ID and password to access the Security officials page which
       give access to information of all users.
      Admin: Admin can modify the entire coding and structure of the system. Admin can
       have access to details of all the users. He can modify the entire database.
      Admin can change his/her details without any approval.
      Change of photo of every user after 3 years is mandatory.




Reports

      User ID and password.
      Government official ID and password.
      Admin ID and password.
      Information about issues and returns of process id and password..
   Information about status of the process.
      Summary and details on a given day/month/year.



Guide

I hereby thanks Mr. Arun Kumar Patel for guiding us in our synopsis.



Refernces

      Object Oriented Modeling and Design with UML-Michael Blaha, James Rambaugh.
      Software Engineering, Seventh Edition, Ian Sommerville.
      Java - www.sun.com
      Wikipedia - www.wikipedia.com
      Database Management Systems - Navathe.
      Complete Reference - J2EE - Keogh.

Mais conteúdo relacionado

Mais procurados

Synopsis on railway reservation system
Synopsis on railway reservation systemSynopsis on railway reservation system
Synopsis on railway reservation systemAnkit Verma
 
Chapter_1.pptx
Chapter_1.pptxChapter_1.pptx
Chapter_1.pptxAadiSoni3
 
Normalisation muzz
Normalisation muzzNormalisation muzz
Normalisation muzzmuzzii27
 
Software Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemSoftware Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemUttam Singh Chaudhary
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computingeteshagarwal1
 
Class diagram of school management system (OOP)
Class diagram of school management system (OOP)Class diagram of school management system (OOP)
Class diagram of school management system (OOP)Afrasiyab Haider
 
Database Management System report
Database Management System reportDatabase Management System report
Database Management System reportNatasha Maqbool
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management SystemAjay Jha
 
Bus management system
Bus management systemBus management system
Bus management systemShamim Ahmed
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and SolutionsUlf Mattsson
 
Final document project1
Final document project1Final document project1
Final document project1zohaib naveed
 
Mphasis ppt on internet of things for internship
Mphasis ppt on internet of things for internshipMphasis ppt on internet of things for internship
Mphasis ppt on internet of things for internshipNeha Yadav
 

Mais procurados (20)

Synopsis on railway reservation system
Synopsis on railway reservation systemSynopsis on railway reservation system
Synopsis on railway reservation system
 
Chapter_1.pptx
Chapter_1.pptxChapter_1.pptx
Chapter_1.pptx
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Normalisation muzz
Normalisation muzzNormalisation muzz
Normalisation muzz
 
Software Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management SystemSoftware Requirement Specification Of Hotel Management System
Software Requirement Specification Of Hotel Management System
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Class diagram of school management system (OOP)
Class diagram of school management system (OOP)Class diagram of school management system (OOP)
Class diagram of school management system (OOP)
 
Database Management System report
Database Management System reportDatabase Management System report
Database Management System report
 
corruption in india
corruption in indiacorruption in india
corruption in india
 
Aadhar
AadharAadhar
Aadhar
 
Object Oriented Database Management System
Object Oriented Database Management SystemObject Oriented Database Management System
Object Oriented Database Management System
 
Bus management system
Bus management systemBus management system
Bus management system
 
IoT - Attacks and Solutions
IoT - Attacks and SolutionsIoT - Attacks and Solutions
IoT - Attacks and Solutions
 
Cyber law
Cyber lawCyber law
Cyber law
 
Final document project1
Final document project1Final document project1
Final document project1
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
 
Mphasis ppt on internet of things for internship
Mphasis ppt on internet of things for internshipMphasis ppt on internet of things for internship
Mphasis ppt on internet of things for internship
 
Understanding IoT
Understanding IoTUnderstanding IoT
Understanding IoT
 
Online FIR System
Online FIR SystemOnline FIR System
Online FIR System
 
Stop corruption
Stop corruptionStop corruption
Stop corruption
 

Destaque

Unique id project
Unique id projectUnique id project
Unique id projectPriyanka
 
Aadhar card ppt
Aadhar card  pptAadhar card  ppt
Aadhar card ppt08185
 
Online movie ticket booking
Online movie ticket bookingOnline movie ticket booking
Online movie ticket bookingmrinnovater007
 
Presentation on Railway Reservation System
Presentation on Railway Reservation SystemPresentation on Railway Reservation System
Presentation on Railway Reservation SystemPriyanka Sharma
 
Dfd examples
Dfd examplesDfd examples
Dfd examplesMohit
 
ppt on aadhar card project
ppt on aadhar card projectppt on aadhar card project
ppt on aadhar card projectPooja Verma
 
Electronic delivery of services initiative
Electronic delivery of services initiativeElectronic delivery of services initiative
Electronic delivery of services initiativepcmcindia
 
Connect dell equallogic storage to linux instance
Connect dell equallogic storage to linux instanceConnect dell equallogic storage to linux instance
Connect dell equallogic storage to linux instanceSaeed Siddik
 
Ict enabled municipal initiative
Ict enabled municipal initiativeIct enabled municipal initiative
Ict enabled municipal initiativepcmcindia
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES modelSaeed Siddik
 
Quantile Quantile Plot qq plot
Quantile Quantile Plot qq plot  Quantile Quantile Plot qq plot
Quantile Quantile Plot qq plot Saeed Siddik
 
Comparison between VMware and Open Stack Cloud
Comparison between VMware and Open Stack CloudComparison between VMware and Open Stack Cloud
Comparison between VMware and Open Stack CloudSaeed Siddik
 
Trevel presentation
Trevel presentationTrevel presentation
Trevel presentationindra Kishor
 
Unique Identification Number: Implications and Challenges
Unique Identification Number: Implications and ChallengesUnique Identification Number: Implications and Challenges
Unique Identification Number: Implications and ChallengesNikesh Narayanan
 
Co relation between dfd & event table
Co relation between dfd & event tableCo relation between dfd & event table
Co relation between dfd & event tableLaxman Puri
 
Online booking system for car rental companies - Bespoke Car Rental Booking E...
Online booking system for car rental companies - Bespoke Car Rental Booking E...Online booking system for car rental companies - Bespoke Car Rental Booking E...
Online booking system for car rental companies - Bespoke Car Rental Booking E...Orisys Infotech
 

Destaque (20)

Uid
UidUid
Uid
 
Unique id project
Unique id projectUnique id project
Unique id project
 
Aadhar card ppt
Aadhar card  pptAadhar card  ppt
Aadhar card ppt
 
Online movie ticket booking
Online movie ticket bookingOnline movie ticket booking
Online movie ticket booking
 
Aadhaar ppt
Aadhaar ppt Aadhaar ppt
Aadhaar ppt
 
Presentation on Railway Reservation System
Presentation on Railway Reservation SystemPresentation on Railway Reservation System
Presentation on Railway Reservation System
 
Dfd examples
Dfd examplesDfd examples
Dfd examples
 
ppt on aadhar card project
ppt on aadhar card projectppt on aadhar card project
ppt on aadhar card project
 
Electronic delivery of services initiative
Electronic delivery of services initiativeElectronic delivery of services initiative
Electronic delivery of services initiative
 
Connect dell equallogic storage to linux instance
Connect dell equallogic storage to linux instanceConnect dell equallogic storage to linux instance
Connect dell equallogic storage to linux instance
 
Ict enabled municipal initiative
Ict enabled municipal initiativeIct enabled municipal initiative
Ict enabled municipal initiative
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES model
 
Quantile Quantile Plot qq plot
Quantile Quantile Plot qq plot  Quantile Quantile Plot qq plot
Quantile Quantile Plot qq plot
 
Comparison between VMware and Open Stack Cloud
Comparison between VMware and Open Stack CloudComparison between VMware and Open Stack Cloud
Comparison between VMware and Open Stack Cloud
 
Trevel presentation
Trevel presentationTrevel presentation
Trevel presentation
 
Unique Identification Number: Implications and Challenges
Unique Identification Number: Implications and ChallengesUnique Identification Number: Implications and Challenges
Unique Identification Number: Implications and Challenges
 
Co relation between dfd & event table
Co relation between dfd & event tableCo relation between dfd & event table
Co relation between dfd & event table
 
Online booking system for car rental companies - Bespoke Car Rental Booking E...
Online booking system for car rental companies - Bespoke Car Rental Booking E...Online booking system for car rental companies - Bespoke Car Rental Booking E...
Online booking system for car rental companies - Bespoke Car Rental Booking E...
 
Online Bus Service
Online Bus ServiceOnline Bus Service
Online Bus Service
 
Major2ppt
Major2pptMajor2ppt
Major2ppt
 

Semelhante a Uid management-system

major project report Property Management
 major project report Property Management major project report Property Management
major project report Property Managementankonline
 
MechaTronix + Online Selling Process
MechaTronix + Online Selling ProcessMechaTronix + Online Selling Process
MechaTronix + Online Selling ProcessSaad Hussain
 
IRJET- RTO Automation using QR Code
IRJET-  	  RTO Automation using QR CodeIRJET-  	  RTO Automation using QR Code
IRJET- RTO Automation using QR CodeIRJET Journal
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET Journal
 
IRJET - Vahaan Registration System
IRJET - Vahaan Registration SystemIRJET - Vahaan Registration System
IRJET - Vahaan Registration SystemIRJET Journal
 
System design document visa
System design document visaSystem design document visa
System design document visaShaily Dubey
 
Minor Presentation On Real Estate
Minor Presentation On Real EstateMinor Presentation On Real Estate
Minor Presentation On Real EstateKumar Narayan
 
E-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemE-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemAbhishek Kumar
 
Credit Cooperative Society Software
Credit Cooperative Society SoftwareCredit Cooperative Society Software
Credit Cooperative Society SoftwareAccrete Technology
 
FIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFernando Lopez Aguilar
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעZeev Shetach
 
Event managementsystem
Event managementsystemEvent managementsystem
Event managementsystemPraveen Jha
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET Journal
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industryAjit Dadresa
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET Journal
 

Semelhante a Uid management-system (20)

major project report Property Management
 major project report Property Management major project report Property Management
major project report Property Management
 
VEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEMVEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEM
 
MechaTronix + Online Selling Process
MechaTronix + Online Selling ProcessMechaTronix + Online Selling Process
MechaTronix + Online Selling Process
 
IRJET- RTO Automation using QR Code
IRJET-  	  RTO Automation using QR CodeIRJET-  	  RTO Automation using QR Code
IRJET- RTO Automation using QR Code
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel Identity
 
IRJET - Vahaan Registration System
IRJET - Vahaan Registration SystemIRJET - Vahaan Registration System
IRJET - Vahaan Registration System
 
System design document visa
System design document visaSystem design document visa
System design document visa
 
Minor Presentation On Real Estate
Minor Presentation On Real EstateMinor Presentation On Real Estate
Minor Presentation On Real Estate
 
E-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemE-Commerce Mobile Sale System
E-Commerce Mobile Sale System
 
Credit Cooperative Society Software
Credit Cooperative Society SoftwareCredit Cooperative Society Software
Credit Cooperative Society Software
 
FIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE Identity Management and Access Control
FIWARE Identity Management and Access Control
 
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
 
SarojKumarDash
SarojKumarDashSarojKumarDash
SarojKumarDash
 
Event managementsystem
Event managementsystemEvent managementsystem
Event managementsystem
 
BTP – Bullion Trading Portal
BTP – Bullion Trading PortalBTP – Bullion Trading Portal
BTP – Bullion Trading Portal
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IDM in telecom industry
IDM in telecom industryIDM in telecom industry
IDM in telecom industry
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
 
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)IRJET-An Interline Dynamic Voltage Restorer (IDVR)
IRJET-An Interline Dynamic Voltage Restorer (IDVR)
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Uid management-system

  • 1. Title of Project: Unique ID Management System Introduction Motive of this project is to provide a unique ID to each and every citizen of India while providing him/her a birth certificate. Citizens after attaining age of 18 must register at RTO office or Collector office or Tasildar office and get a password to access the site. ID card will be provided to every user after registration. Later on they can change their password. Once they enter the site they can pay their electricity bill and telephone bill, book railway tickets and airline tickets and pay their taxes. During elections people can poll online. Government officials can verify details about a person from the database for issuing vehicle license, passport, visa, etc. Problem with the existing System  There is no structured process of data maintenance.  Area of Improvement in Communication due to technology limitations between internal and external customers.  Report Generation is Time consuming.
  • 2. Objectives  ID Creation and Deletion  User friendly Software  Database Maintenance and Maintenance of Report Log  Ease of maintaining records of citizens of India.  Ease of electricity bill and telephone bill payment, booking of railway tickets and airline tickets and pay taxes.  Online polling fascility to citizens of India.  Online issueing of vehicle license, passport, visa , etc. Advantages of the System  Centralized Common Database  Centralized Common Communication Channel between Supplier and Customer  Report Generation is easy and time consuming  TAT for the process is maintained. Users of the System  All Indian citizens of age 18 and above.  Authorized Government security officials.  Administrator The development of a project plan will list the various activities to be undertaken in this project work as enumerated below:  Analysis of present set up  Design of proposed system  Coding  Testing  Implementation
  • 3. Data Flow Diagrams(DFD):  DFDs upto appropriate levels for Identity Management is shown below.  Level-0 DFD/context diagram: This highest level DFD represents the system as a whole. Citizens Govt. Officials Login & Access his Information, Login & view details of Citizens, Apply for Passport, Vehicle License etc. Update their details. Unique ID Management System Maintain Database, Can modify Structural Coding & Structure of System, Access the details of all users. Administrator
  • 4. Tools to be Used  ROSE/RSA / WebSphere Modeler  Eclipse  Apache Tomcat Server  MySQL  Windows will be the preferred OS. Technologies to be Used Front End o J2EE Back End o MySQL Functionalities  User Login: Every citizen can login and access their information page.  Security: A normal user other than Government officials, moderators and administrator can only access his/her information. For any information update they must approach corresponding office to get approval.  Security Officials Login: Authorized security persons in police, army, and airlines should given a unique ID and password to access the Security officials page which give access to information of all users.  Admin: Admin can modify the entire coding and structure of the system. Admin can have access to details of all the users. He can modify the entire database.  Admin can change his/her details without any approval.  Change of photo of every user after 3 years is mandatory. Reports  User ID and password.  Government official ID and password.  Admin ID and password.  Information about issues and returns of process id and password..
  • 5. Information about status of the process.  Summary and details on a given day/month/year. Guide I hereby thanks Mr. Arun Kumar Patel for guiding us in our synopsis. Refernces  Object Oriented Modeling and Design with UML-Michael Blaha, James Rambaugh.  Software Engineering, Seventh Edition, Ian Sommerville.  Java - www.sun.com  Wikipedia - www.wikipedia.com  Database Management Systems - Navathe.  Complete Reference - J2EE - Keogh.