Académique Documents
Professionnel Documents
Culture Documents
CHAPTER 1
INTRODUCTION
Agriya is a 14 years old custom web development company based out of Chennai,
India employing over 200+ developers across a range of disciplines which include
php, web development, web designing, search engine optimization experts. It has
been recognized throughout the world as a cutting edge web development and mobile
development company.
They specialize in creating extremely user friendly and SEO friendly websites
and web applications in a variety of domains which include crowd sourcing, crowd
funding, clone scripts, marketplace type of sites for B2B and B2C. Their skills and
offshore location mean that they can often provide maximum cost savings to
businesses around the world on custom web development and mobile development
projects.
They are a leading edge web development company who focus on the latest
technologies and platforms to create websites and applications for small, medium,
large enterprises and startup entrepreneurs. They always adopt the trends and
approaches which give businesses maximum return on their investments. They
embraced open source technology like PHP, Java and so on
1.2 OBJECTIVE
The data which are stored is unchangeable and fraudulent activities might be
avoided by giving the electronic card verification to the user. All the manual process
is reduced in proposed system and can be easily avoided by performing customized
consumer travel verification through electronic card.
3
CHAPTER 2
SYSTEM ANALYSIS
The existing system is not providing secure registration and profile management
properly. In previous system all the data about RTO are recorded manually. So the
system takes long time to verify the license. Vehicle and its owner details are not
maintained properly. It gives very less security for saving data and some data may be
lost due to mismanagement. Time consuming is high in this system for employee and
customer.
Drawbacks:
Smart cards are becoming increasingly more popular for security and personal
identification applications. Smart cards have one or more microcontrollers embedded
in them which manage access to, and storage of, sensitive data that is actually stored
in memory devices on the smart card. The smart chip included on a smart card
provides a means for secured electronic transactions and a means for identification.
The integrated chip is embedded in the smart card and operates to process
specific transactions. The smart card uses a serial interface and receives its power
from an external source such as a smart card reader. Through this RFID CARD
license and the case details with the fine amount paid are easily entered and verified.
Advantages:
CHAPTER 3
SYSTEM SPECIFICATIONS
RAM : 1 GB
Language : VB.NET
CHAPTER 4
SOFTWARE DESCRIPTION
Microsoft .Net
Microsoft .net is a set of micro soft software technologies for rapidly building
and integrating xml web services, micro soft windows-based applications, and web
solutions. The .net framework is a language-neutral platform for writing programs
that can easily and securely interoperate. Theres no language barrier with .net: there
are numerous languages available to the developer including managed c++, c#, visual
basic and java script.
First, it was intended to make Windows applications much more reliable, while also
providing an application with a greater degree of security. Second, it was intended to
simplify the development of Web applications and services that not only work in the
traditional sense, but on mobile devices as well. Lastly, the framework was designed
to provide a single set of libraries that would work with multiple languages. The
following sections examine each of the .NET Framework components.
Web Development
The .NET Framework was designed with one thing in mind: to fuel Internet
development. This new fuel to add to Internet development is called Web Services.
You can think of Web Services as a Web site that interacts with programs, rather than
people. Instead of delivering Web pages, a Web Service takes a request formatted as
XML, performs a particular function, and then returns a response to the requester as
an XML message.
Note XML or eXtensible Markup Language is a self describing language
much like that of HTML. XML on the other hand has no predefined tags thus
allowing it great flexibility in representing a wide variety of objects.
SQL Server 2005 is the successor to SQL Server 2000. It included native
support for managing XML data, in addition to relational data. For this purpose, it
defined an xml data type that could be used either as a data type in database columns
or as literals in queries. XML columns can be associated with XSD schemas. XML
data being stored is verified against the schema. XML is converted to an internal
binary data type before being stored in the database.
Specialized indexing methods were made available for XML data. XML data
is queried using XQuery. Common Language Runtime (CLR) integration was a main
feature with this edition, enabling one to write SQL code as Managed Code by the
CLR. SQL Server 2005 added some extensions to the T-SQL language to allow
embedding XQuery queries in T-SQL. In addition, it also defines a new extension to
XQuery, called XML DML that allows query-based modifications to XML data.
8
SQL Server 2005 also allows a database server to be exposed over web
services using Tabular Data Stream (TDS) packets encapsulated within SOAP
(protocol) requests. When the data is accessed over web services, results are returned
as XML. For relational data, T-SQL has been augmented with error handling features
(try/catch) and support for recursive queries with CTEs (Common Table
Expressions). SQL Server 2005 has also been enhanced with new indexing
algorithms, syntax and better error recovery systems.
Managing Services
SQL Server
SQL Server Agent
SQL Server Browser
SQL Server Integration Services
SQL Server Analysis Services
The registered servers pane allows viewing and managing parameters for
connecting to servers. The tool includes both script editors and graphical tools which
work with objects and features of the server. A central feature of SQL Server
Management Studio is the Object Explorer, which allows the user to browse, select,
and act upon any of the objects within the server.
9
CHAPTER 5
PROJECT DESCRIPTION
In the existing system the overall process is carried out manually. The time
consuming is high in this system. The data can be erased or edited by the consumers
and manual payment entry is required. Data integrity is not provided. Maintaining
document is so difficult. It takes more time. Database is not maintained properly and
may have a chance of human errors. So in order to overcome these issues and make
the RTO process so efficiently RTO management system is introduced.
The RTO Management System project was developed for RTO office to
maintain all the records like two and four wheeler registration, learning and driving
license, changing of address, Tax collection form, permits section, inspection and
many more in systematically. This software application is developed with fully
computerized method to manage all the data .In Existing system, all the records are
maintained manually
systems. Radio Frequency identification is one such technology which can be used to
design automated systems.
The main objective of the project is to design an automated system which can
perform tasks like vehicle RC book and driving license verification and all using
RFID.
Authentication
User details
The card issued under an order or authority of the company, as per the Public
Distribution System.
A RFID card is a company-issued that certifies the identity of its holder for the
purpose of travel. The elements of identity contained in all standardized card include
information about the holder, including name, mobile, gender, aathar number and
place. In user profile module, the user specifies their details like the name, age,
location, address, so on.
1
1
This module is used to enter the vehicle Registration details like Transport,
Non-Transport, Temporary Registration, Re-Registration, Transfer of Ownership,
Change of address, Clearance Certification, vehicle owner, Registration date and
renewal of Registration and related works
Tax details
This module is used to enter the records of tax. The tax like one-time tax,
lump sum tax (LST), Road tax/Special Road Tax. Non-Transport and Transport are
under one-time tax .Mandatory and Optional are under lump sum tax.
This module is used to enter the details of record like leaner license, driving
license, international driving permit, conductor license and renewal of license. The
data entered can be modified by the admin.
Case details
In this module admin enters the case details of vehicle owner and also the fine
paid by the corresponding person based on the RFID card number. This can be
modified by admin.
RFID verification
In card verification module, the card is being validated by the RFID reader
whether the appropriate users are valid. From this card holders license details and the
cases filed on him are verified from RFID card.
1
2
Reports
User Report
Verification Report
Case details
The Data Flow Diagram (DFD) is a graphical representation of the flow of data
through an information system, modeling its process aspects. A DFD is often used as
a preliminary step to create an overview of the system, which can later be elaborated.
DFD can also be used for the visualization of data processing.
The DFD shows what kind of information will be input to and output from the
system, where the data will come from and go to, and where the data will be stored. It
does not show information about the timing of process or information about whether
processes will operate in sequence or in parallel.
Level 0
RTO Reports
Admin/User Managem
ent system
Login
Admin
Viewin
Case
g User Details
details
detail
s
RFI
D
Scannin
g
Verific
a
tion
Authorized
card
Address
Cardn
uname nam o
pwd e Mob
Vn
Updat o User details
Admin
es
vna
Case_no
Cardno
date
finamt
Secret no Card no
Hnam
e
RFID CARD Verifi
es
In output design the admin can view the reports for user details, case details,
license details and so on.
SYSTEM TESTING
The most important phase in system development life cycle is system testing.
The number and nature of errors in a newly designed system depends on the system
specifications and the time frame given for the design.
A newly designed system should have all the subsystems working together,
but in reality each subsystems work independently. During this phase, all the
subsystems are gathered into one pool and tested to determine whether it meets the
user requirements.
Testing is done at two levels .Testing of individual modules and testing the
entire system. During the system testing, the system is used experimentally to ensure
that the software will run according to the specifications and in the way the user
expects. Each test case is designed with the intent of finding errors in the way the
system will process it.
Unit testing is the first level of testing. The different modules are tested
against the specifications produced during the integration. This is done to test the
internal logic of each module. Those resulting from the interaction between modules
are initially avoided. The input received and output generated is also tested to see
whether it falls in the expected range of values. Unit testing is performed from the
bottom up, starting with the smallest and lowest modules and proceeding one at a
time.
The units in a system are the modules and routines that are assembled and
integrated to perform a specific function. The programs are tested for correctness of
logic applied and detection of errors in coding. Each of the modules was tested and
errors are rectified. They were then found to function properly.
For example, in RTO Management System user enters the username and
password to login. The validation is performed to identify the valid user. After the
validation is successful the system allows the user to enter into the RTO Management
System.
Integration testing is testing in which, the tested modules are combined into
sub-systems, which are then tested. The goal of integration testing to check whether
the modules can be integrated properly emphasizing on the interfaces between
modules. The different modules were linked together and integration testing done on
them.
After unit testing all the forms are integrated to the respective pages. While
integrating, the application developer checked whether the integrated forms are
working properly or not. The pages like new lead adding and editing, Project, General
settings, etc. are integrated with the system. These programs were tested individually
at last all these programs were combined together by creating another program.
The objective of the validation test is to tell the user about the validity and
reliability of the system. It verifies whether the system operates as specified and
the integrity of important data is maintained. User motivation is very important for the
successful performance of the system.
In validation testing, each fields like card no, license no, name, email, gender,
contact number, etc. for example, the validation is mainly for login page and
registration page. The user name must contain an alphabet. Password is alpha
numeric. The user contact number must contain numbers (0-9) only. The user name
must contain only alphabets. The login id and password field must not be blank. Card
no must be unique.
6.4 OUTPUT TESTING
After performing validation testing the next step is output testing of the
proposed system. Since the system cannot be useful if it does not produce the required
output. Asking the user about the format in which the system is required tests output
displayed or generated by the system user consideration. And the output comes
according to the specifications requested by the user.
In output testing, the reports are verified and tested by the admin. User reports,
Case reports, License reports, are the main reports generated in this application. For
example, blank and empty reports are not allowed to generate.
The steps taken for User Acceptance Testing typically involve one or more of
the following:
For example, to ensure an effective User Acceptance Testing Test cases are
created for RTO Management System. These Test cases can be created using various
use cases identified during the Requirements definition stage. The Test cases ensure
proper coverage of all the scenarios during testing.
CHAPTER 7
SYSTEM IMPLEMENTATION
The project execution was checked with live environment and the user
requirements are satisfied. Proper implementation is essential to provide a reliable
system to meet the organization requirements.
CHAPTER 8
CONCLUSION AND FUTURE ENHANCEMENT
8.1 CONCLUSION
The project RTO Management System was successfully designed and
developed as per the requirements and specification. It is concluded that the
application works well. The application is tested very well and errors are properly
debugged. The application is simultaneously accessed from more than one system.
Simultaneous login from more than one place is tested.
This system is user friendly so everyone can use easily. Proper documentation
is provided. The end user can easily understand how the whole system is implemented
by going through the documentation. The system is tested, implemented and the
performance is found to be satisfactory. All necessary output is generated. Thus, the
project is completed successfully.
The finger print technique will be implemented to the project for the efficient
data retrieval. The speed of the transactions will become more effective.
APPENDIX 1
Imports System.Data.SqlClient
Public Class Form1
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles Button1.Click
cn.Open()
Dim cmd As New SqlCommand("select * from tbl_user where user_name='" &
TextBox1.Text & "' and password='" & TextBox2.Text & "' ", cn)
Dim dr As SqlDataReader = Nothing
dr = cmd.ExecuteReader()
If dr.Read() Then
main.MenuStrip1.Enabled = True
Me.Hide()
Else
MessageBox.Show("Enter Correctly..!")
End If
dr.Close()
cn.Close()
End Sub
End Class
MAIN FORM
Imports System.Windows.Forms
Public Class main
Private m_ChildFormNumber As Integer
Private Sub main_Load(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles MyBase.Load
Form1.MdiParent = Me
Form1.Show()
End Sub
USER FORM
Imports System.Data.SqlClient
Public Class user
Private Sub vehicle_Load(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles MyBase.Load
fillgrid()
fun1()
TextBox1.Visible = False
End Sub
Public Sub fun1()
Try
cn.Open()
Dim da As New SqlDataAdapter("select cardno from tbl_license", cn)
Dim dt As New DataTable
Dim dr As DataRow
da.Fill(dt)
cn.Close()
For Each dr In dt.Rows
ComboBox1.Items.Add(dr.Item(0))
Next
Catch ex As Exception
MsgBox(ex.ToString())
End Try
End Sub
Private Sub button6_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles button6.Click
clr()
End Sub
Public Sub clr()
TextBox2.Text = ""
TextBox3.Text = ""
TextBox4.Text = ""
TextBox5.Text = ""
textBox6.Text = ""
textBox7.Text = ""
textBox8.Text = ""
End Sub
PASSWORD FORM
Imports System.Data.SqlClient
Public Class password
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles Button1.Click
If TextBox2.Text = TextBox3.Text Then
cn.Open()
Dim cmd1 As New SqlCommand()
cmd1.CommandText = "update tbl_user set password='" & TextBox3.Text &
"'"
cmd1.Connection = cn cmd1.ExecuteNonQuery()
MessageBox.Show("Password Changed Successfully")
cn.Close()
Else
MessageBox.Show("Mismatch Password...Please Check..!")
End If
End Sub
End Class
APPENDIX 2
A.2 SCREENSHOTS
MAIN PAGE
VERIFICATION FORM
USER REPORT
BOOKS
WEBSITE
1. http://www.dotnetspider.com
2. http://www.programersheaven.com
3. http://www.sql-server-performance.com
4. http://www.developerfusion.com
5. http://www.winsocketdotnetworkprogramming.com