E Passport Tracking System Feb
E Passport Tracking System Feb
E Passport Tracking System Feb
REG NO : 20APTN062
Dr .T. RAMESH
ASSOCIATE PROFESSOR
BHARATHIER UNIVERSITY
COIMBATORE 641046
(FEB 2022)
1
DECLARATION
Department of Information Technology and that this project work has not formed the basis
Date :
Countersigned by
2
CERTIFICATE
ANTHONY ( Reg No: 20APTN062) under my supervision and guidance and that
this project work has not formed the basis for the award of any
Degree/Diploma/Associate ship/Fellowship or similar title to any candidate of any
University.
Forwarded by
Director
School of Distance Education
Bharathiar University
Coimbatore – 46
3
TABLE OF CONTENT
4
1. INTRODUCTION
The project entitled “Electronic passport tracking system” is developed using VB.NET as
front end and SQL server as backend. All data can be viewed using data report, for clear data
information retrieval. Basically this is a government based project for passport verification.
The main objective of this project is to develop a client server based passport verification
system for verifying the authorized passport. This method is used for government purpose for all
countries. In case of implementing this project, fake passports will be identified and frequent
visitor to many countries can be identified. This is because now days there are many fake
passports are using by terrorist and business people. In order to control the illegal activates this
methods will implemented. It is very important one in the modern world, because now a days
Passport is very important for all citizen. This project passport management is very useful for the
Passport Authority.
regarding the real work of the Passport Authority, New Passport Registration, Enquiry About the
exiting passport, Administration, conformation. It is totally user friendly and menu driven thus
helping a person to use a project with case and accurately. The records can be updated at any
time. And can able to upload at any time. In this project is mainly divided into three parts. They
are namely New Passport Registration, Enquiry about the Existing Passport, Administration and
conformation.
5
We take so many reports like Passport Details, Personal Details; Passport Issuing
Details, Address Details, Physical Details Report, and Educational Qualification Report,
In future this application can be interact with the web application and mobile
application. So whenever the user do immigration from one county to another county all the
travel history of the user can be fetched out with the passport details.
6
1 DESCRIPTION OF MODULES
Enquiry details
Verification
Eligibility
Issue
Renewal
MODULES DESCRIPTION
MODULE: 1
ENQUIRY DETAILS:
This module contains all the personal details of a person those who are applying for
passport. This contain most of the users information like name, age, dob, education status,
personal identification, finger print details and address information. In case of the user is
uneducated the passport will be comes under the category of the non education list. So that the
user will be restricted to visit some countries.
MODULE: 2
VERIFICATION:
The apply details will be verified to the issue of the passport. Here one person gets one
passport only. So duplication can be avoided. While issuing the passport a keen verification will
be done. The important verification will be the address and the personal identification of the
user.
7
MODULE: 3
ELIGIBILITY:
In case of verifying all the details, the person is eligibility to get the passport. Here the
applicant wants to submit prior medical reports. Here medical details too verified. A spreadable
disease person will not be allowed to travel from one country to another country.
MODULE: 4
ISSUE:
Now the person will get the passport, by getting the permission from the embassy. The
passport will issue in the local police station. After the keen verification the passport was verified
by the local police and issue to the user.
MODULE: 5
RENEWAL:
The issued passport will renew here. All kinds of renewal process will be done, here. The
renewal will done yearly once or yearly twice according to the embassy. The renewal process to
will have the same procedure like, This contain most of the users information like name, age,
dob, education status, personal identification, finger print details and address information.
8
1.2. SYSTEM SPECIFICATION
System : HCL
Processor : Pentium IV
Mouse : Logitech
9
1.3 SOFTWARE FEATURES
VISUAL BASIC.NET
.NET provides a new, object-oriented API as a set of classes that will be accessible
from any programming language. This book describes this framework of classes and provides a
reference to what is available and how you can use this framework to write Windows
applications in the brave new world of .NET.
Microsoft .NET Framework is a computing platform for developing distributed applications for
the Internet. Following are the design goals of Microsoft .NET Framework:
4. To provide high-level code security through code access security and strong type
checking
10
Visual basic.net lets the user to add menus, text boxes, command buttons, option buttons,
check boxes, list boxes, scroll bars, and file directory boxes to blank windows. Visual basic.net
has many different tools.
The CLR is the mechanism through which .NET code is executed. It is built upon
a single, common language—IL—into which source languages are compiled and includes
mechanisms for executing the compiled code. This includes code verification and just-in-time
(JIT) compilation, garbage collection and enforcement of security policies, and the provision of
profiling and debugging services.
The CLR provides a lot of added value to the programs it supports. Because it controls
how a .NET program executes and sits between the program and the operating system, it can
implement security, versioning support, automatic memory management through garbage
collection, and provide transparent access to system services
IMPORTANT FEATURES:
11
The purpose of this document is to help you migrate your applications when
you are migrating the underlying database from Microsoft SQL Server to Some other
Database. Most of the issues encountered when migrating applications to use an Sql Server
Database are related to database incompatibility. This paper presents these incompatibilities
You should familiarize yourself with this document prior to migrating your databases.
The choices made about how to migrate your application affect how you migrate the underlying
If the application uses the Microsoft OLE DB Provider for SQL Server or a third-party
OLE DB Provider to connect the Microsoft SQL Server database, use the Sql Server Provider for
Login Authentication.
Windows NT Authentication
12
FEATURES
Runs on Win 95/98 NT, Netware, UNIX, OS/2, AppleTalk, Banyan VINES.
SQL Server must have Service Pack 4 (SP4) to run on Windows NT 4.0.
13
2. SYSTEM STUDY
EXISTING SYSTEM
Existing passport verification System is implemented by using Visual Basic 6.0. Its
window based application, it works only in desktop machine. So communication is not easy. In
this System can share Database only, not an Application. Application should implement
individually on each and every desktop machine. It causes more machine space, so it takes more
time and less efficient consuming. System needs a lot of system administrator for maintenance.
2.1.1 DRAWBACKS
14
C#.Net is used for server code. C#.Net is developed on OOPs concept, it reduce the code
repetition and provides security for code. So data processing is performed very easily. This
Application becomes more efficient on less time.
AJAX is plays main role in this system. AJAX to perform the most actions in client page.
It reduces the no. of time accessing the server for each transaction. So it provides time efficient
and transaction to be performed very fast.
High security for this Jewellery system is provided. In this system if hackers hacked the
Database but they never get Login to the Application. Hashing is a one-way algorithm cannot be
reversed, so only authorized persons can only modify this Application.
2.2.1 FEATURES
Highly Securable.
Data Processing is very fast
Easy to communicate and sharing of transactions.
It provides accuracy.
No time consuming.
Reduce the needs of human to maintain the machine.
15
3. SYSTEM DESIGN
replace the old system. The purpose of the design phase is the first step in moving from the
problem domain to the solution domain. The design of the system is the critical aspect that
affects the quality of the software. System design is also called top-level design. The design
phase translates the logical aspects of the system into physical aspects of the system.
Input design is one of the most important phase of the system design. Input design is the
process where the input received in the system are planned and designed, so as to get necessary
information from the user, eliminating the information that is not required. The aim of the input
design is to ensure the maximum possible levels of accuracy and also ensures that the input is
16
The input design is the part of overall system design, which requires very careful
attention. if the data going into the system is incorrect then the processing and output will
Screen design to ensure accuracy and efficiency of the input relationship with files.
Careful design of the input also involves attention to error handling, controls, batching
Input design features can ensure the reliability of the system and produce result from
accurate data or they can result in the production of erroneous information. The input design of
Output design is very important concept in the computerized system, without reliable
output the user may feel the entire system is unnecessary and avoids using it. The proper output
design is important in any system and facilitates effective decision-making.
The data in the system has to be stored and retrieved from database.
Designing the database is part of system design. Data elements and data structures to be stored
have been identified at analysis stage. They are structured and put together to design the data
storage and retrieval system. A database is a collection of interrelated data stored with
17
minimum redundancy to serve many users quickly and efficiently. The general objective is to
make database access easy, quick, inexpensive and flexible for the user. Relationships are
established between the data items and unnecessary data items are removed. Normalization is
done to get an internal consistency of data and to have minimum redundancy and maximum
stability. This ensures minimizing data storage required, minimizing chances of data
inconsistencies and optimizing for updates.
Four basic symbols are used to construct data flow diagrams. They are symbols that
represent data source, data flows, and data transformations and data storage. The points at which
data are transformed are represented by enclosed figures, usually circles, which are called nodes.
- Process
- Storage
4. SYSTEM TESTING
Testing is a series of different tests that whose primary purpose is to fully exercise the
computer based system. Although each test has a different purpose, all work should verify that
all system element have been properly integrated and performed allocated function. Testing is
the process of checking whether the developed system works according to the actual requirement
and objectives of the system.
The philosophy behind testing is to find the errors. A good test is one that has a high
probability of finding an undiscovered error. A successful test is one that uncovers the
undiscovered error. Test cases are devised with this purpose in mind. A test case is a set of data
that the system will process as an input. However the data are created with the intent of
determining whether the system will process them correctly without any errors to produce the
required output.
Types of Testing:
Unit testing
19
Integration testing
Validation testing
Output testing
User acceptance testing
Performance Testing
Unit Testing
All modules were tested and individually as soon as they were completed and were checked
for their correct functionality.
Integration Testing
The entire project was split into small program; each of this single programs gives a
frame as an output. These programs were tested individually; at last all these programs where
combined together by creating another program where all these constructors were used. It give a
lot of problem by not functioning is an integrated manner.
The user interface testing is important since the user has to declare that the arrangements
made in frames are convenient and it is satisfied. when the frames where given for the test, the
end user gave suggestion. Based on their suggestions the frames where modified and put into
practice.
Validation Testing:
20
Output Testing
After performing the validation testing the next step is output testing of the proposed
system. Since the system cannot be useful if it does not produce the required output. Asking the
user about the format in which the system is required tests the output displayed or generated by
the system under consideration. Here the output format is considered in two ways. one is on
screen and another one is printed format. The output format on the screen is found to be
corrected as the format was designed in the system phase according to the user needs. And for
the hardcopy the output comes according to the specifications requested by the user.
An acceptance test as the objective of selling the user on validity and reliability of the
system. It verifies that the procedures operate to system specification and mat the integrity of
vital is maintained.
Performance Testing
This project is a application based project, and the modules are interdependent with the
other modules, so the testing cannot be done module by module. So the unit testing is not
possible in the case of this driver. So this system is checked only with their performance to check
their quality.
21
4.2 SYSTEM MAINTENENCE
Software maintenance is a set of software engineering activities that occur after software
has been delivered for the customer and put into operation. The success of software and the
project relies and the maintenance procedure performed.
As with the venture of human, not a single one is perfect. The further modifications are
left to the followers. It is because, the opinion or vision of a thing differs from individual to
individual. The maintenance is performed at regular intervals to keep the project safe and
reliable.
Every time changes attempted on the software will cause serious and unexpected side
effects. So, the maintenance of the software should be considered seriously. Software
maintenance is of course fare more than fixing mistakes. Maintenance can be described as the
activities that are to be undertaken after software is released for the use.
Corrective maintenance
Adaptive maintenance
Perfective maintenance
22
The corrective maintenance deals with the problems that may occur to software and what
sort of corrective measure can be provided to the user on such situations. The 80 % is spent
adapting existing systems to change in their external environment since we have used an
platform independency the software will be adaptive to all hardware and software environment.
5. CONCLUSION
The new computerized system was found to be much faster and reliable and user friendly
than the existing system. The system has been designed and developed step by step and each
module has been developed and tested individually to obtain the necessary required output in the
desired form. The project has been done as user friendly software for easy handling of
transaction. The system developed has been designed and run to satisfy the requirements and
needs of the organization as well as the end users. The system reduces the manual work of
process. The entire system is documented and can be easily understood by the end users. The
forms are very user friendly and also easy to handle. The drawbacks in the existing system are
overcome in the proposed system which runs successfully and efficiently.
23
6. SCOPE FOR FUTURE ENHANCEMENT
The system has been tested and implemented by giving the test data and no programming skill is
required to handle the system. The features of the system are improved security, data security
and reliability. The system can be made real time or online.
24
Even though, the system is efficient for meeting user requirements, the scope of future
enhancement can be inevitable as the user requirements changes day by day.
7. BIBLIOGRAPHY
Elias Awath, “SYSTEM ANALYSIS AND DESIGN”, Tata McGraw Hill Publication, Sixth
Edition,2003
S.Ramachandran,”COMPUTER AIDED DESIGN”, Air Walk Publication, Third Edition,2003
.Richard Fairley, “SOFTWARE ENGINEERING CONCEPTS”, Tata McGraw Hill
Publication, Second Edition,1997
Distributed .NET Programming in VB .NET by Tom Barnaby
Visual Basic .NET How to Program (2nd Edition) by Harvey M. Deitel, Paul J. Deitel,
Tem R. Nieto
25
APPENDIX:
A. DATA FLOW DIAGRAM
DFD Symbols
26
In the DFD there are four symbols as shown below:-
A square defines a source and destination of system data.
An arrow identifies data flow. It is a pipeline through which information
flows
A circle or bubble represents a process that transforms incoming data
flows into out going data flows.
An open rectangle is a data store or a temporary repository of data.
The need ofr multiple data flows by a process is represented by a “*” between the data
flows.the symbol represents the AND relationship.for example, if there is a “*” between the
two input data flows A and B for a process,it means that A AND B are needed for the process.
User Details
User
View Details E Passport
View Details
Tracking Administrator
Manage
Visitor
View Details
Details Office
Login Managemen
t
Confirmation
User name, Password
Validation Updating
User Login
Office Files
Registratio
Registration
n
28
Level 1 DFD- Visitor
Enquires E Details
Visitor Passport Database
View Details Tracking
system
Administrator
Logi
n
Office Files
Verifications & Approvals
Overall
E Control
Passport
Tracking
system
Office
Managemen 29
Visitor t
User Managing
Level 2 DFD- Visitor
Visitor
View Details
Advertisements
Adding Details
Feedback
Enquires Help
Marriage Registration,
Desk
Death Registration
31
start the process
HOME
PAGE
Reading form
valid form
Reenter the
Enter username invalid password
and password
valid
valid
GET
APPOINTME NT
proceesing detail
Verification
details
invalid
valid for enquiry
Police
enquiry
valid report
Issue passport
Passport
delivery
delivery
2)country
3)Eligiblity
4) Enquiry
34
)
35
isActive bit NULL
) ON PRIMARY
36
C..SOURCE CODE:
<Global.Microsoft.VisualBasic.CompilerServices.DesignerGenerated()> _
Inherits System.Windows.Forms.Form
<System.Diagnostics.DebuggerNonUserCode()> _
Try
components.Dispose()
End If
Finally
MyBase.Dispose(disposing)
End Try
End Sub
37
<System.Diagnostics.DebuggerStepThrough()> _
<System.Diagnostics.DebuggerStepThrough()> _
38
Me.Panel3.SuspendLayout()
Me.Panel2.SuspendLayout()
Me.Panel1.SuspendLayout()
'GroupBox1
Me.Panel3.PerformLayout()
Me.Panel2.ResumeLayout(False)
Me.Panel1.ResumeLayout(False)
Me.Panel1.PerformLayout()
Me.GroupBox1.ResumeLayout(False)
Me.GroupBox1.PerformLayout()
Me.ResumeLayout(False)
End Sub
39
Friend WithEvents rdbNo As System.Windows.Forms.RadioButton
40
Screenshots:
Login screen:
41
Enquiry:
Elgibility:
42
43
Renewal
44
45
Verification:
46