SlideShare a Scribd company logo
1 of 24
project ON
“Unique Identification Authority of India (UIDAI)”
“AadhaAr Card Registration System”
Submitted for an overview of the project proposal for fulfill the need of the degree
Of
“BACHELOR OF COMPUTER APPLICATION”
(2011-2014)
MAHATMA GANDHI KASHI VIDYAPITH
(VARANASI)
UNDER GUIDANCEOF: SUBMITTEDBY:
NILIMA MAURYA PRIYANKA SINGH (ROLL NO: 1201776)
(BCA DEPARTMENT) PRITI MISHRA (ROLLNO: 1201775)
Certificate
This is to certify thatMiss ………………………………………………………………
Of the BCA VI Semester Examination, 2011-2014 has completed this
comprehensive project report on topic
“………………………………………………………………………………………......................................”
As a partial fullfillment of degree of Bachelor of Computer Application of
Mahatma GandhiKashiVidhyaPeethvaranasi, under my supervision.
This mater embodied in this project is a genuine work done by the
student at has not submitted whether to this university or to any other university
or institute for the fulfillment of the requirementof any cause of study.
Date:…………………………… (Signature)
……………………………………
(Designation)
ACKNOWLEDGEMENT
Contrary to popular belief, that developing a project is not a solo activity. Many
people collaborate in developing it.
I am thankful to all of them for their help and encouragement in carrying out this
project. We express sincere thanks and gratitude from core of our heart towards,
Director of Sunbeam College for Women, Bhagwanpur, Varanasi. Without whose
guidance and inspiration this projectwill notbe possible.
We sincerely thanks to Mr.DayaShankar, HOD of Bachelor of Computer
Application (BCA) for his guidance and unfailing courtesy during the course of our
studies in College and our synopsiswork as well.
We take this opportunity to acknowledge their contribution to project. It is our
pleasure and privilege to express our deep sense of gratitude and thanks to our
guide Ms.Nilima Maurya, BCA faculty for her positive,supportive,inspiring and
illuminating guidance, untiring effort, timely help and constant encouragement
and making this projecta fruitfulsuccessfullearning experience.
I am thankful to my project partner Priti Mishra for their help and support in the
project and also I would like to thanks to all my classmates for their help and
support.
With immense joy and gratitude I raise my heart in praise and thanks giving to
Parents Almighty for his manifold graces and blessings showered on us all through
this study.
DATE……………………… NAME...................................
TABLE OF CONTENTS
1. INTRODUCTION
1.1 Objective
1.2 Definition
1.3 Uses
2. FEASIBILITY STUDY
2.1 Economic Feasibility
2.2 Technical Feasibility
2.3 Operational Feasibility
2.4 Legal Feasibility
2.5 Time Feasibility
3. TECHNOLOGY USED
3.1 Software Requirement
 Front-End
 Back-End
3.2 Hardware Requirement
4. SYSTEM DESIGN
4.1 Data Flow Diagram
4.2 Entity-RelationShip Diagram
4.3 Modules
4.4 Database Design
5. CODING
6. SCREEN LAYOUTS
7. IMPLEMENTATION
8. CONCLUSION
9. FUTURE ENHANCEMENT
10. BIBLIOGRAPHY
Introduction
About UIDAI Background
Unique Identification project was initially conceived by the Planning commission
as an initiative that would provide identification for each resident across the
country and would be used primarily as the basis for efficient delivery of welfare
services. It would also out as a tool for effective monitoring of various programs
and schemes of the Government. This was set up under the Chairmanship of, Dr.
Arvind Virmani PrincipalAdvisor, and Planning Commission.
A “Strategic vision on the UIDAI Project” was prepared and submitted to this
committee by M/S Wipro Limited.
AadhaarCard Logo
PrimeMinister’sCouncil
Prime Minister’s Council on UIDAI Authority-Subsequently, on 02 July 2009, the
Government appointed Shri Nandan Mohan Nilekani as Chairman of the Unique
Identification Authority of India (UIDAI), in the rank and status of a Cabinet
Minister for an initial tenure of five years.
Mr.Nilekani has joined the UIDAI as its Chairman on 23 July 2009.The Prime
Minister’s Council of UIDAI Authority of India was set up on 30 July 2009.The first
meeting of the Prime Minister’s Council of UIDAI.
Authority took place on August 2009.
The salient decisionsinthePMsCouncilWEREasfollows:
 Need for legislative framework
 Broad Endorsement of the strategy
 Budgetary support to partners
 Setting Biometrics and Demographic Standards.
 UIDAI Structure contours Approved.
 Flexibility in Personnel and other issues.
 Choose Deploy and Repatriate officers.
 Government Accommodations Eligibility
 Broad-banding of posts.
 Hiring of professionals from Market
 Setting up of Global Advisory Councils of P/Os
 Interns & Sabbatical Global Procurement.
On 25 June 2009, the Cabinet also created and approved the position of the
Chairperson of the UIDAI, and appointed Mr.Nandan Nilekani as the first
Chairperson in the rank & status of a Cabinet Minister Mr. Ram Sewak
Sharma hasbeen appointed the Director General.
Head quarter’s Organization
The UIDAI is headquartered in Delhi with Shri Nandan Nilekani as the
Chairman and Shri Vijay S. Madan as the Director General and Mission
Director.
AboutAadhaarCard
Aadhaar is a 12 digit individual identification number issued by the UIDAI
identification number issued by the UIDAI on behalf of the Government of India.
This number will serve as a proof of identity and address, anywhere in India.
Each Aadhaar number will be unique to an individual on the basis of
demographic and biometric information and will remain valid for life. Aadhaar
number will help you provide access to service like banking, mobile, phone
connections & other Govt. and non-Govt services in due course.
Three KeyCharacteristics of AadhaAr Number are:
 Permanency (Aadhaarno.remain sameduring lifetimeofa resident)
 Uniqueness(oneresident hasone ID & two residentshave same ID)
 Global (sameidentifiercanbe usedacross applicationanddomains)
Objective:-
Online UIDAI Aadhaar Registration System-is complete end to end solution to cover all
aspectsof online individualregistration process.
The basic Objective of developing this project is:-
 Provide complete website solution, including individual person registration, providing
themAadhaarCard.CompleteWeb based administration.
 An individualcan register and login into the systemany time.
 An individual can get complete information of Aadhaar Card, its importance, they can
CheckAadhaarstatus,updateAadhaardata.
 Individual will get unique identity due to its new technology i.e. biometric and
demographicfeatures.
 Any Stateof person can register in their own statelanguages.
 An individualcan search anything aboutUIDAI Aadhaarcard and itsregistration System.
 They can contact and ask their queries if they have. They can also call on toll free
number.
DESCRIPTION
Aadhaar is the national identification number assigned to residents of India. It is auto-
generated random number, without any classification based on caste, creed, religion or
geography. It is a 12 digits unique identification number, which will be unique to an
individual and remains valid for life. Aadhaar will serve as a proof of identity and address,
across India.
Uses
 Aadhaarwillbe used as identification proof for services like banking,ration card,
passport,mobilephoneconnectionsetc.
 Services providewill no longerhaveto repeatedly performknow yourcustomer(KYC)
checks.
 Aadhaarwillbe easily verified online in a cost-effectiveway.
 Residentswill be enrolled with properverification of their demographic&biometric
information.This will help eliminate the large numberof duplicateand fakeidentities in
governmentand privatedatabases.
 Aadhaarwillgive migrantsmobility of identity
 Aadhaarwillfacilitate entry of poorand underprivileged residentsinto the formal
banking systemand theopportunity to availservicesprovided by the governmentand
the privatesector.
2. TECHNOLOGY USED
2.1 SOFTWARE REQUIREMENT
FRONT –END
1. JavaScript (JS) - JavaScript (JS) is an interpreted computer programming language. As part of
web browsers, implementations allow client-side scripts to interact with the user, control the browser,
communicate asynchronously, and alter the document content that is displayed. The key design
principles within JavaScript are taken from the self and Scheme programming languages. JavaScript is a
prototype-based scripting language with dynamic typing and has first-class functions. The application of
JavaScript to uses outside of web pages—for example, in PDF documents, site-specific browsers, and
desktop widgets—isalso significant.
It is a multi-paradigm language,supporting oriented,imperative,and functionalprogramming styles.
2. PHP (Hypertext Preprocessor)-PHP is a general-purpose scripting language that is
especially suited to server-side web development where PHP generally runs on a web server. PHP code is
interpreted by a web server with a PHP processor module, which generates the resulting web page: PHP
commands can be embedded directly into an HTML source document rather than calling an external file
to process data. It has also evolved to include a command-line interface capability and can be used in
standalone graphical applications. Any PHP code in a requested file is executed by the PHP runtime,
usually to create dynamicweb pagecontentordynamicimagesused on websitesorelsewhere.
3. HTML (Hyper text Markup Language)-HTML is the main markup language for creating
web pages and other information that can be displayed in a web browser. The purpose of a web browser
is to read HTML documents and compose them into visible or audible web pages. The browser does not
display the HTML tags, but uses the tags to interpret the content of the page. An HTML Application (HTA;
file extension ".hta") is a Microsoft Windows application that uses HTML and Dynamic HTML in a
browser to provide the application's graphical interface. A regular HTML file is confined to the security
model of the web browser's security, communicating only to web servers and manipulating only
webpageobjectsand sitecookies.
BACK-END
1. MySQL- MySQL, pronounced either "My S-Q-L" or "My Sequel," is an open source
relational database management system. It is based on the structure query language (SQL),
which is used for adding, removing, and modifying information in the database. Standard SQL
commands, such as ADD, DROP, INSERT, and UPDATE can be used with MySQL.
MySQL can be used for a variety of applications, but is most commonly found on Web servers. A
website that uses MySQL may include Web pages that access information from a database.
These pages are often referred to as "dynamic," meaning the content of each page is generated
from a database as the page loads. Websites that use dynamic Web pages are often referred to as
database-driven websites.
Many database-driven websites that use MySQL also use a Web scripting language like PHP to
access information from the database. MySQL commands can be incorporated into the PHP
code, allowing part or all of a Web page to be generated from database information. Because
both MySQL and PHP are both open source (meaning they are free to download and use), the
PHP/MySQL combination has become a popular choice for database-driven websites.
2.2 HARDWARE REQUIREMENT
TYPE
Work Station/Node
SOFTWARE
Windows XP,
MS Office
HARDWARE
1. RAM-256(minimum)/512(recommended)
MB
2. HDD-nGB depending upon the requirement
to storedata minimumof 25GB.
DatabaseServer 1. OS – Win 2003
Enterprise Server
2. SQL Server2005
1.HDD– Min 10 GB, Recommended 25 GB
2.RAM– Min 2 GB, Recommended 4GB
3.Processor- PentiumDualXenon Processor
Application Server 1. OS – Win 2003
Enterprise Server
2. IIS – Internet
Information
Server
1.HDD – Min 5 GB, Recommended 10 GB
2.RAM– Min 2 GB, Recommended 4GB
3.Processor- PentiumDualXenon Processor
FEASIBILITYSTUDY
A Feasibility study is carried out to select the best system that meets performance
requirements.The main aim of the feasibility study cativity is to determine whether it would be
financially and technically feasible to develop the product.The feasibility study activity involves
the analysis of the problem and collection of all relevant information relating to the product
such as the different data items which would be input to the system,the processing required to
the system,the processing required to be carried out on these data,the output data required to
be produced by the system as well as various constraints on the behaviour of the system.
Feasibility studies aim to objectively and rationally uncover the strengths and weakness of an
existing business or proposed venture,opportunities and threats present in the environment,the
resources required to carry through,and ultimately the prospects for success.In its simplest
terms,the two criteria to judge feasibility are cost required and value to be attained.
A well-designed feasibility study should provide a historical background of the business or
project,a description of the product or services,accounting statements,details of the operations
and management,marketing research and policies,financial data,legal requirements and tax
obligations.
A feasibility study evaluates the project’s potential for success;therefore,perceived objectivity is
an important factor in the credibility of the study for potential investers and lending institutions.
1.Technical Feasibility-This is concerned with specifying equipment and software that will
successfully satisfy the user requirement.The technical needs of the system may vary
considerably,but might include:
 The facility to produce outputs in agiven time.
 Response time under certain conditions.
 Ability to process a certain volume of transaction at aparticular speed.
 Facility to communication data to distant locations.
In examining technical feasibility,configuration of the system is given more importance than the
actual make of hardware.In our project we have used HTML for creating webpages, Javascript
for validation,PHP for making dynamic page and Database for connectivity.
2. Economic Feasibility-Economic analysis is the most frequently used technique for
evaluating the effectiveness of propose system.More commonly known as Cost/Benefits
analysis,the procedure is to determine the benefits and savings that are expected from a
proposed system and compare them with costs. If benefits outweigh costs, a decision is taken
to design and implement the system. Otherwise, further justification or alternative in the
proposed system will have to be made if it is to have a chance of being approved. This is an
outgoing effort that improves in accuracy at each phase of the system life cycle.
In my project we have created a website which is free of cost. Anyone can do registration of
aadhar card which is free of cost.
3.Operational Feasibility-Operational feasibility is a measure of how well a proposed
system solves the problems, and takes advantages of the opportunities identified during scope
definition and how it satisfies the requirements identified in the requirements analysis phase of
system development.
To ensure success, desired operational outcomes must be imported during design and
development. These include such design-dependent parameters such as
reliability,maintainability,supportability,usability,productability,sustainability,affor-dability and
others.
4.Legal Feasibility- Legal feasibility is a determination of whether the proposed project is
legal, i.e, it fulfill the requirement of acts or not. It determines whether the proposed system
conflicts with legal requirements, e.g. a data processing system must comply with the local Data
Protection Acts.
In our project we have explained about all the legal formalities which are required for the
registration of aadhar card.
5.Time Feasibility- A project will fail if it takes too long to be completed before it is useful.
Typically this means estimating how long the system will take to develop,and if it can be
completed in a given time period using some methods like payback period.Schedule feasibility is
a measure of how reasonable the project timetable is.
Our project will take minimum time to register and it will show aadhaar status.The people who
have already register are allow login to the form.
MODULES
 UIDAI
(Unique Identification Authority of India) The authority will issue Aadhaar and set
standards for enrolment and authentication, to be universally followed. Initially,
UIDAI will design, develop and deploy the Aadhaar Application with the help of service
providers. Subsequently, the entire operation will be expanded and operated by an
external service providers. The UIDAI is also responsible for recruiting Registrars,
approving enrolment agencies and providing a list of introducers among others.
 Registrars
These are public and private organizations that are currently engaged in providing
service to the residents and which operate on behalf of the UIDAI to provide UIDAI
services to their constitutions. Registrars may collect documentation such as proof of
resident and, proof of identity from residents and store the documents. Registrar may
also receive demographics data and photograph of the resident. Registrar may store
biometric data such as fingerprint, and iris image in a secure manner.
 Sub-registrar
These are departments or entities that report to specific Registrar. For instance, the line
departments of the state government such as the Rural Development and Panchayat Raj
(RDPR) department would be sub-registrars to the state government Registrar.
 Enrolment Agency
An Agency contracted by the Registrar, subject to certification by the UIDAI, to perform
their duties. Enrolment agencies provide operators and supervisors for the enrolment
stations on the fields, and also create the necessary conditions for the optical enrolment
of residents.
Enrolment agencies must collect demographic data prior to an enrolment drive. They
must notify residents and UIDAI, of the enrolment schedule in advance. Enrolment
agency may be empanelled by the UIDAI for the assistance of the Registrars. The
Registrars will be free to engage any other enrolment agencies se well.
 Introducer
An introducer is a well known person authorized by the UIDAI or by a Registrar to
introduce individuals for enrolment. An introducer provides an assurance that the
individual applying for an Aadhaar is indeed a resident, and to the best of his/her
personal knowledge who they say they are.
 Resident
A resident is defined as a natural person, usually residing in India. Residents are expected
to truthfully provide information and documentation to meet the KYR norms, or be
introduced by an introducer. They are expected to provide biometric information to the
UIDAI.
 Authenticator
An Authenticator is an agency that uses the UIDAI System to authenticates a resident.
Authenticators may use demographic data and/or biometric data in addition to the
resident’s Aadhaar. Authenticators must register with the UIDAI and provide an
estimated usage. Authenticator must use the appropriate for Authentication that
provides him/her with the necessary assurance for the transaction.
IMPLEMENTATION
Implementation includes all those activies that takes place to convert from the old system to
the new one. The new system may be completely new, replacing an existing manual or
automated system or it may be major modification to an existing system.
Implementation is the part of the process where software engineers actually program the code
for the project. Software testing is an integral and important phase of the software
development process. This part of the process ensures that defects are recognized as soon as
possible.
In our project we created a Static homepage of UIDAI Aadhaar card in which we have given
an introduction of aadhaar card and briefly described about its features. We have also described
about the background of UIDAI. We have described about the uses of aadhar card its
importance. We have also given steps for the enrollment of aadhar card. We have also provided
the facility of checking the status of aadhar card. We have also explained about the use of
biometric aadhar card. We have designed the login form for the people who have already
registered and given the option for the individual to create new password if anyone has
forgotten the password.
We have given the search engine in our website so that anyone can search about the aadhar
card and get information related to aadhar card. We have created our website by the help of
html we have given all the entries in database table.We have given the database connectivity
and dynamic webpages with the help of php and javascript for validation.
CONCLUSION
In our project we have created a dynamic webpages. We have given all the details of the UIDAI
Aadhaar card. We can fill registration form only if we have already registered .If we have
registered then we can login by going to the login form and fill registration form/correction
form. If we have filled the registration form then we can check the status of Aadhaar.
At last we have generated an Aadhaar card which will be shown in our status form. We have
created a database table and used PHP for database connectivity. The details shown in
Aadhaar card is taken from the database.
FUTUREENHANCEMENT
In our project we have mentioned about the Biometric captures in Aadhaar card but we
haven’t implemented it in our project.The one of the important and new concept used in
Aadhaar card is the biometric capture used in it which make it different from other
cards.
We need Biometric devices to capture Biometric data of individuals.You can take
following data.
 Facial image
 Iris –both eyes
 Fingerprints of all fingers
 Left hand four finger slap
 Right hand four finger slap
 Capture of both the thumbs
Biometric capture provides an individuals a unique identity all over India and eliminate
from the data duplication and fake identities.
Through the process of Aadhaar authentication, the resident can authorize UIDAI to
release their KYC data to a service provider, either in person or online. Only upon
successful authentication of the resident, the UIDAI will provide the name of the
resident, address, date of birth, gender and photograph to the service provide.
“The UIDAI expects its e-KYC serviceto enhancecustomer
convenienceand greatly increasebusinessefficiency acrosssectors
that requireproof of identity and addressto open customer,
accounts,” said Vijay Shankar Madan,DG,and UIDAI.
We generate printout of Aadhaar Card with complete detail including photograph and
signature.
BIBLIOGRAPHY
WEBSITES
Following websites are referring to create this project reports.
 http://www.google.com
 http://www.uidai.gov.in
 http://www.en.wikipedia.org/wiki/aadhar
 http://www.aadharcarduid.com/aadhar-card-application-form
 http://www.portal.uidai.gov.in
 http://www.india.gov.in/update
 http://www.myaadharcard.in
 http://www.governancenow.com
 http://www.iwwh.in/
 http://www.w3schools.com
 http://www.htmlgoodies.com
 http://html.net/tutorials/javascript/lesson2.php
 http://www.php.net/manual/en/reserved.variables.server.php
 http://www.javascript.com/
 http://www.cs.brown.edu/courses/bridge/1998/res/javascript/javascript-tutorial.html
 http://www.learn-javascript-tutorial.com/
BOOKS
Following books and eBooks are used to complete this project reports.
 HTML5 Black Book: Covers CSS3,Javascript,XML,XHTML,Ajax, PHP and Jquery
 Learning PHP, Mysql, JavaScript and CSS by Robin Nixon
 ResponsiveWeb Design withHTML5 and CSS3 (Community ExperienceDistilled)
 PHP: The Complete Reference Steven Holzner (Author)
DATAFLOWDIAGRAM
A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data through an
information system, modeling its process aspects. Often they are a preliminary step used to
create an overview of the system which can later be elaborated. DFDs can also be used for the
visualization of data processing (structured design).
A DFD shows what kinds of information will be input to and output from the system, where the
data will come from and go to, and where the data will be stored. It does not show information
about the timing of processes, or information about whether processes will operate in sequence
or in parallel (which is shown on a flowchart).
Process: People, procedure or device that use or produced
data.The physicalcomponentisnotidentifies.
Dataflow: Data move in a specific direction from and origin to
a destination theformof a document.
Source or destination: External source or destinationsof
data interact with the system. The terms source and sink are
interchangeablewith origin and destination.
Data Store: Here data are store or referenced by a process in
the system.
Data Store: Data at Rest
ENTITYRELATIONSHIPDIAGRAM
An ER model is an abstract way of describing a database. In the case of a relational database, which
stores data in tables, some of the data in these tables point to data in other tables - for instance, your
entry in the database could point to several entries for each of the phone numbers that are yours. The ER
model would say that you are an entity, and each phone number is an entity, and the relationship
between you and the phone numbers is 'has a phone number'. Diagrams created to design these entities
and relationshipsarecalled entity–relationship diagramsorER diagrams.
Component of E-R Diagram:
Rectangle: It representsentity sets.
Ellipses: It representsattributessets
Diamonds: Itrepresentsrelationshipssets
Lines: It link attributeto entity set and entity set to relationship sets
STREET
NAME
HOST
ASA KEY API VERS
GENERATE
AADHAR CARD
HEIGHT
EYE COLOR
DATE OF EXPIRYSEX
DATE OF
BIRTH
NAME
CARD NUMBER
REQUEST
FOR
Key Attributes: An attribute that identifies an entity; an entity
identifier

More Related Content

What's hot

Bim.info summer project Bachelor in information management 6th semester
Bim.info summer project Bachelor in information management  6th semesterBim.info summer project Bachelor in information management  6th semester
Bim.info summer project Bachelor in information management 6th semesterrishi ram khanal
 
DATA FLOW DIAGRAM OF AADHAAR CARD REGISTRATION SYSTEM
DATA FLOW DIAGRAM OF AADHAAR CARD REGISTRATION SYSTEMDATA FLOW DIAGRAM OF AADHAAR CARD REGISTRATION SYSTEM
DATA FLOW DIAGRAM OF AADHAAR CARD REGISTRATION SYSTEMPriyanka Singh
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technologyNikhil Sabu
 
Probabilistic Interestingness Measures - An Introduction with Bayesian Belief...
Probabilistic Interestingness Measures - An Introduction with Bayesian Belief...Probabilistic Interestingness Measures - An Introduction with Bayesian Belief...
Probabilistic Interestingness Measures - An Introduction with Bayesian Belief...Adnan Masood
 
Railway reservation system
Railway reservation systemRailway reservation system
Railway reservation systemKOYELMAJUMDAR1
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksDatabricks
 
Feasibility studytemplate
Feasibility studytemplateFeasibility studytemplate
Feasibility studytemplateUmair Sarwer
 
Project Report on Grocery Store Website
Project Report on Grocery Store WebsiteProject Report on Grocery Store Website
Project Report on Grocery Store Website'Ashmeet Sehgal'
 
Synopsis on railway reservation system
Synopsis on railway reservation systemSynopsis on railway reservation system
Synopsis on railway reservation systemAnkit Verma
 
Ppt of online Attendance system
Ppt of online Attendance system Ppt of online Attendance system
Ppt of online Attendance system Shyam Sundar Pandey
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
Online Cab Booking System Final Report
Online Cab Booking System Final ReportOnline Cab Booking System Final Report
Online Cab Booking System Final ReportPiyushPatil73
 
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...Vignesh C
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
Online course portal for campus with query system
Online course portal for campus with query systemOnline course portal for campus with query system
Online course portal for campus with query systemganeshpaul6
 
TEACHER RECORD MANAGEMENT SYSTEM REPORT PPT
TEACHER RECORD MANAGEMENT SYSTEM REPORT PPT TEACHER RECORD MANAGEMENT SYSTEM REPORT PPT
TEACHER RECORD MANAGEMENT SYSTEM REPORT PPT Gowtham119048
 
School management System
School management SystemSchool management System
School management SystemHATIM Bhagat
 

What's hot (20)

Bim.info summer project Bachelor in information management 6th semester
Bim.info summer project Bachelor in information management  6th semesterBim.info summer project Bachelor in information management  6th semester
Bim.info summer project Bachelor in information management 6th semester
 
DATA FLOW DIAGRAM OF AADHAAR CARD REGISTRATION SYSTEM
DATA FLOW DIAGRAM OF AADHAAR CARD REGISTRATION SYSTEMDATA FLOW DIAGRAM OF AADHAAR CARD REGISTRATION SYSTEM
DATA FLOW DIAGRAM OF AADHAAR CARD REGISTRATION SYSTEM
 
Online attendance management system
Online attendance management systemOnline attendance management system
Online attendance management system
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Probabilistic Interestingness Measures - An Introduction with Bayesian Belief...
Probabilistic Interestingness Measures - An Introduction with Bayesian Belief...Probabilistic Interestingness Measures - An Introduction with Bayesian Belief...
Probabilistic Interestingness Measures - An Introduction with Bayesian Belief...
 
Railway reservation system
Railway reservation systemRailway reservation system
Railway reservation system
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In Databricks
 
Feasibility studytemplate
Feasibility studytemplateFeasibility studytemplate
Feasibility studytemplate
 
Project Report on Grocery Store Website
Project Report on Grocery Store WebsiteProject Report on Grocery Store Website
Project Report on Grocery Store Website
 
Synopsis on railway reservation system
Synopsis on railway reservation systemSynopsis on railway reservation system
Synopsis on railway reservation system
 
Ppt of online Attendance system
Ppt of online Attendance system Ppt of online Attendance system
Ppt of online Attendance system
 
Aadhar
AadharAadhar
Aadhar
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Online Cab Booking System Final Report
Online Cab Booking System Final ReportOnline Cab Booking System Final Report
Online Cab Booking System Final Report
 
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Internship Presentation.pdf
Internship Presentation.pdfInternship Presentation.pdf
Internship Presentation.pdf
 
Online course portal for campus with query system
Online course portal for campus with query systemOnline course portal for campus with query system
Online course portal for campus with query system
 
TEACHER RECORD MANAGEMENT SYSTEM REPORT PPT
TEACHER RECORD MANAGEMENT SYSTEM REPORT PPT TEACHER RECORD MANAGEMENT SYSTEM REPORT PPT
TEACHER RECORD MANAGEMENT SYSTEM REPORT PPT
 
School management System
School management SystemSchool management System
School management System
 

Similar to Aadhaar Card Registration System.

IRJET- Survey on Virtual Assistants
IRJET-  	  Survey on Virtual AssistantsIRJET-  	  Survey on Virtual Assistants
IRJET- Survey on Virtual AssistantsIRJET Journal
 
Rcruitment & selection
Rcruitment & selectionRcruitment & selection
Rcruitment & selectionankush bathla
 
“Mentors View” Application
“Mentors View” Application“Mentors View” Application
“Mentors View” ApplicationAI Publications
 
CONTENT MANAGEMENT SYSTEM nw
CONTENT MANAGEMENT SYSTEM nwCONTENT MANAGEMENT SYSTEM nw
CONTENT MANAGEMENT SYSTEM nwRana Harsh
 
AIT-Portfolio - thomas
AIT-Portfolio - thomasAIT-Portfolio - thomas
AIT-Portfolio - thomasThomas Russell
 
AIT-Portfolio - thomas
AIT-Portfolio - thomasAIT-Portfolio - thomas
AIT-Portfolio - thomasThomas Russell
 
AIT-Portfolio - thomas
AIT-Portfolio - thomasAIT-Portfolio - thomas
AIT-Portfolio - thomasThomas Russell
 
AIT-Portfolio - thomas
AIT-Portfolio - thomasAIT-Portfolio - thomas
AIT-Portfolio - thomasThomas Russell
 
AIT-Portfolio - thomas
AIT-Portfolio - thomasAIT-Portfolio - thomas
AIT-Portfolio - thomasThomas Vinsen
 
Practitioners Converge on Hyderabad for PMI India National Conference 2014
Practitioners Converge on Hyderabad for PMI India National Conference 2014Practitioners Converge on Hyderabad for PMI India National Conference 2014
Practitioners Converge on Hyderabad for PMI India National Conference 2014Project Management Institute (PMI) India
 
Business plan of a software house
Business plan of a software houseBusiness plan of a software house
Business plan of a software houseFarwa Ansari
 
travel guidence.pdf
travel guidence.pdftravel guidence.pdf
travel guidence.pdfSRIDHAMCH
 
industrial_report_final
industrial_report_finalindustrial_report_final
industrial_report_finalDhruv Bhasin
 
Smart Snap - Report
Smart Snap - ReportSmart Snap - Report
Smart Snap - ReportTapan Desai
 

Similar to Aadhaar Card Registration System. (20)

IRJET- Survey on Virtual Assistants
IRJET-  	  Survey on Virtual AssistantsIRJET-  	  Survey on Virtual Assistants
IRJET- Survey on Virtual Assistants
 
Rcruitment & selection
Rcruitment & selectionRcruitment & selection
Rcruitment & selection
 
“Mentors View” Application
“Mentors View” Application“Mentors View” Application
“Mentors View” Application
 
CONTENT MANAGEMENT SYSTEM nw
CONTENT MANAGEMENT SYSTEM nwCONTENT MANAGEMENT SYSTEM nw
CONTENT MANAGEMENT SYSTEM nw
 
AIT-Portfolio - thomas
AIT-Portfolio - thomasAIT-Portfolio - thomas
AIT-Portfolio - thomas
 
AIT-Portfolio - thomas
AIT-Portfolio - thomasAIT-Portfolio - thomas
AIT-Portfolio - thomas
 
AIT-Portfolio - thomas
AIT-Portfolio - thomasAIT-Portfolio - thomas
AIT-Portfolio - thomas
 
AIT-Portfolio - thomas
AIT-Portfolio - thomasAIT-Portfolio - thomas
AIT-Portfolio - thomas
 
AIT-Portfolio - thomas
AIT-Portfolio - thomasAIT-Portfolio - thomas
AIT-Portfolio - thomas
 
Aswani kumar kandala
Aswani  kumar kandalaAswani  kumar kandala
Aswani kumar kandala
 
Practitioners Converge on Hyderabad for PMI India National Conference 2014
Practitioners Converge on Hyderabad for PMI India National Conference 2014Practitioners Converge on Hyderabad for PMI India National Conference 2014
Practitioners Converge on Hyderabad for PMI India National Conference 2014
 
Aswani Kumar Kandala
Aswani  Kumar KandalaAswani  Kumar Kandala
Aswani Kumar Kandala
 
RahulCV
RahulCVRahulCV
RahulCV
 
Business plan of a software house
Business plan of a software houseBusiness plan of a software house
Business plan of a software house
 
travel guidence.pdf
travel guidence.pdftravel guidence.pdf
travel guidence.pdf
 
REport Fle.pdf
REport Fle.pdfREport Fle.pdf
REport Fle.pdf
 
industrial_report_final
industrial_report_finalindustrial_report_final
industrial_report_final
 
Smart Snap - Report
Smart Snap - ReportSmart Snap - Report
Smart Snap - Report
 
Depository
DepositoryDepository
Depository
 
Internship mid presentation
Internship mid presentationInternship mid presentation
Internship mid presentation
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Aadhaar Card Registration System.

  • 1. project ON “Unique Identification Authority of India (UIDAI)” “AadhaAr Card Registration System” Submitted for an overview of the project proposal for fulfill the need of the degree Of “BACHELOR OF COMPUTER APPLICATION” (2011-2014) MAHATMA GANDHI KASHI VIDYAPITH (VARANASI) UNDER GUIDANCEOF: SUBMITTEDBY:
  • 2. NILIMA MAURYA PRIYANKA SINGH (ROLL NO: 1201776) (BCA DEPARTMENT) PRITI MISHRA (ROLLNO: 1201775) Certificate This is to certify thatMiss ……………………………………………………………… Of the BCA VI Semester Examination, 2011-2014 has completed this comprehensive project report on topic “………………………………………………………………………………………......................................” As a partial fullfillment of degree of Bachelor of Computer Application of Mahatma GandhiKashiVidhyaPeethvaranasi, under my supervision. This mater embodied in this project is a genuine work done by the student at has not submitted whether to this university or to any other university or institute for the fulfillment of the requirementof any cause of study. Date:…………………………… (Signature) …………………………………… (Designation)
  • 3. ACKNOWLEDGEMENT Contrary to popular belief, that developing a project is not a solo activity. Many people collaborate in developing it. I am thankful to all of them for their help and encouragement in carrying out this project. We express sincere thanks and gratitude from core of our heart towards, Director of Sunbeam College for Women, Bhagwanpur, Varanasi. Without whose guidance and inspiration this projectwill notbe possible. We sincerely thanks to Mr.DayaShankar, HOD of Bachelor of Computer Application (BCA) for his guidance and unfailing courtesy during the course of our studies in College and our synopsiswork as well. We take this opportunity to acknowledge their contribution to project. It is our pleasure and privilege to express our deep sense of gratitude and thanks to our guide Ms.Nilima Maurya, BCA faculty for her positive,supportive,inspiring and illuminating guidance, untiring effort, timely help and constant encouragement and making this projecta fruitfulsuccessfullearning experience. I am thankful to my project partner Priti Mishra for their help and support in the project and also I would like to thanks to all my classmates for their help and support. With immense joy and gratitude I raise my heart in praise and thanks giving to Parents Almighty for his manifold graces and blessings showered on us all through this study.
  • 4. DATE……………………… NAME................................... TABLE OF CONTENTS 1. INTRODUCTION 1.1 Objective 1.2 Definition 1.3 Uses 2. FEASIBILITY STUDY 2.1 Economic Feasibility 2.2 Technical Feasibility 2.3 Operational Feasibility 2.4 Legal Feasibility 2.5 Time Feasibility 3. TECHNOLOGY USED 3.1 Software Requirement  Front-End  Back-End 3.2 Hardware Requirement 4. SYSTEM DESIGN 4.1 Data Flow Diagram
  • 5. 4.2 Entity-RelationShip Diagram 4.3 Modules 4.4 Database Design 5. CODING 6. SCREEN LAYOUTS 7. IMPLEMENTATION 8. CONCLUSION 9. FUTURE ENHANCEMENT 10. BIBLIOGRAPHY Introduction About UIDAI Background Unique Identification project was initially conceived by the Planning commission as an initiative that would provide identification for each resident across the country and would be used primarily as the basis for efficient delivery of welfare services. It would also out as a tool for effective monitoring of various programs and schemes of the Government. This was set up under the Chairmanship of, Dr. Arvind Virmani PrincipalAdvisor, and Planning Commission. A “Strategic vision on the UIDAI Project” was prepared and submitted to this committee by M/S Wipro Limited. AadhaarCard Logo
  • 6. PrimeMinister’sCouncil Prime Minister’s Council on UIDAI Authority-Subsequently, on 02 July 2009, the Government appointed Shri Nandan Mohan Nilekani as Chairman of the Unique Identification Authority of India (UIDAI), in the rank and status of a Cabinet Minister for an initial tenure of five years. Mr.Nilekani has joined the UIDAI as its Chairman on 23 July 2009.The Prime Minister’s Council of UIDAI Authority of India was set up on 30 July 2009.The first meeting of the Prime Minister’s Council of UIDAI. Authority took place on August 2009.
  • 7. The salient decisionsinthePMsCouncilWEREasfollows:  Need for legislative framework  Broad Endorsement of the strategy  Budgetary support to partners  Setting Biometrics and Demographic Standards.  UIDAI Structure contours Approved.  Flexibility in Personnel and other issues.  Choose Deploy and Repatriate officers.  Government Accommodations Eligibility  Broad-banding of posts.  Hiring of professionals from Market  Setting up of Global Advisory Councils of P/Os  Interns & Sabbatical Global Procurement. On 25 June 2009, the Cabinet also created and approved the position of the Chairperson of the UIDAI, and appointed Mr.Nandan Nilekani as the first Chairperson in the rank & status of a Cabinet Minister Mr. Ram Sewak Sharma hasbeen appointed the Director General. Head quarter’s Organization The UIDAI is headquartered in Delhi with Shri Nandan Nilekani as the Chairman and Shri Vijay S. Madan as the Director General and Mission Director.
  • 8. AboutAadhaarCard Aadhaar is a 12 digit individual identification number issued by the UIDAI identification number issued by the UIDAI on behalf of the Government of India. This number will serve as a proof of identity and address, anywhere in India. Each Aadhaar number will be unique to an individual on the basis of demographic and biometric information and will remain valid for life. Aadhaar number will help you provide access to service like banking, mobile, phone connections & other Govt. and non-Govt services in due course. Three KeyCharacteristics of AadhaAr Number are:  Permanency (Aadhaarno.remain sameduring lifetimeofa resident)  Uniqueness(oneresident hasone ID & two residentshave same ID)  Global (sameidentifiercanbe usedacross applicationanddomains) Objective:- Online UIDAI Aadhaar Registration System-is complete end to end solution to cover all aspectsof online individualregistration process. The basic Objective of developing this project is:-  Provide complete website solution, including individual person registration, providing themAadhaarCard.CompleteWeb based administration.  An individualcan register and login into the systemany time.  An individual can get complete information of Aadhaar Card, its importance, they can CheckAadhaarstatus,updateAadhaardata.  Individual will get unique identity due to its new technology i.e. biometric and demographicfeatures.  Any Stateof person can register in their own statelanguages.  An individualcan search anything aboutUIDAI Aadhaarcard and itsregistration System.  They can contact and ask their queries if they have. They can also call on toll free number. DESCRIPTION Aadhaar is the national identification number assigned to residents of India. It is auto- generated random number, without any classification based on caste, creed, religion or geography. It is a 12 digits unique identification number, which will be unique to an individual and remains valid for life. Aadhaar will serve as a proof of identity and address, across India.
  • 9. Uses  Aadhaarwillbe used as identification proof for services like banking,ration card, passport,mobilephoneconnectionsetc.  Services providewill no longerhaveto repeatedly performknow yourcustomer(KYC) checks.  Aadhaarwillbe easily verified online in a cost-effectiveway.  Residentswill be enrolled with properverification of their demographic&biometric information.This will help eliminate the large numberof duplicateand fakeidentities in governmentand privatedatabases.  Aadhaarwillgive migrantsmobility of identity  Aadhaarwillfacilitate entry of poorand underprivileged residentsinto the formal banking systemand theopportunity to availservicesprovided by the governmentand the privatesector. 2. TECHNOLOGY USED 2.1 SOFTWARE REQUIREMENT
  • 10. FRONT –END 1. JavaScript (JS) - JavaScript (JS) is an interpreted computer programming language. As part of web browsers, implementations allow client-side scripts to interact with the user, control the browser, communicate asynchronously, and alter the document content that is displayed. The key design principles within JavaScript are taken from the self and Scheme programming languages. JavaScript is a prototype-based scripting language with dynamic typing and has first-class functions. The application of JavaScript to uses outside of web pages—for example, in PDF documents, site-specific browsers, and desktop widgets—isalso significant. It is a multi-paradigm language,supporting oriented,imperative,and functionalprogramming styles. 2. PHP (Hypertext Preprocessor)-PHP is a general-purpose scripting language that is especially suited to server-side web development where PHP generally runs on a web server. PHP code is interpreted by a web server with a PHP processor module, which generates the resulting web page: PHP commands can be embedded directly into an HTML source document rather than calling an external file to process data. It has also evolved to include a command-line interface capability and can be used in standalone graphical applications. Any PHP code in a requested file is executed by the PHP runtime, usually to create dynamicweb pagecontentordynamicimagesused on websitesorelsewhere. 3. HTML (Hyper text Markup Language)-HTML is the main markup language for creating web pages and other information that can be displayed in a web browser. The purpose of a web browser is to read HTML documents and compose them into visible or audible web pages. The browser does not display the HTML tags, but uses the tags to interpret the content of the page. An HTML Application (HTA; file extension ".hta") is a Microsoft Windows application that uses HTML and Dynamic HTML in a browser to provide the application's graphical interface. A regular HTML file is confined to the security model of the web browser's security, communicating only to web servers and manipulating only webpageobjectsand sitecookies. BACK-END 1. MySQL- MySQL, pronounced either "My S-Q-L" or "My Sequel," is an open source relational database management system. It is based on the structure query language (SQL), which is used for adding, removing, and modifying information in the database. Standard SQL commands, such as ADD, DROP, INSERT, and UPDATE can be used with MySQL. MySQL can be used for a variety of applications, but is most commonly found on Web servers. A website that uses MySQL may include Web pages that access information from a database. These pages are often referred to as "dynamic," meaning the content of each page is generated from a database as the page loads. Websites that use dynamic Web pages are often referred to as database-driven websites. Many database-driven websites that use MySQL also use a Web scripting language like PHP to access information from the database. MySQL commands can be incorporated into the PHP code, allowing part or all of a Web page to be generated from database information. Because
  • 11. both MySQL and PHP are both open source (meaning they are free to download and use), the PHP/MySQL combination has become a popular choice for database-driven websites. 2.2 HARDWARE REQUIREMENT TYPE Work Station/Node SOFTWARE Windows XP, MS Office HARDWARE 1. RAM-256(minimum)/512(recommended) MB 2. HDD-nGB depending upon the requirement to storedata minimumof 25GB. DatabaseServer 1. OS – Win 2003 Enterprise Server 2. SQL Server2005 1.HDD– Min 10 GB, Recommended 25 GB 2.RAM– Min 2 GB, Recommended 4GB 3.Processor- PentiumDualXenon Processor Application Server 1. OS – Win 2003 Enterprise Server 2. IIS – Internet Information Server 1.HDD – Min 5 GB, Recommended 10 GB 2.RAM– Min 2 GB, Recommended 4GB 3.Processor- PentiumDualXenon Processor
  • 12. FEASIBILITYSTUDY A Feasibility study is carried out to select the best system that meets performance requirements.The main aim of the feasibility study cativity is to determine whether it would be financially and technically feasible to develop the product.The feasibility study activity involves the analysis of the problem and collection of all relevant information relating to the product such as the different data items which would be input to the system,the processing required to the system,the processing required to be carried out on these data,the output data required to be produced by the system as well as various constraints on the behaviour of the system. Feasibility studies aim to objectively and rationally uncover the strengths and weakness of an existing business or proposed venture,opportunities and threats present in the environment,the resources required to carry through,and ultimately the prospects for success.In its simplest terms,the two criteria to judge feasibility are cost required and value to be attained. A well-designed feasibility study should provide a historical background of the business or project,a description of the product or services,accounting statements,details of the operations and management,marketing research and policies,financial data,legal requirements and tax obligations. A feasibility study evaluates the project’s potential for success;therefore,perceived objectivity is an important factor in the credibility of the study for potential investers and lending institutions. 1.Technical Feasibility-This is concerned with specifying equipment and software that will successfully satisfy the user requirement.The technical needs of the system may vary considerably,but might include:  The facility to produce outputs in agiven time.  Response time under certain conditions.  Ability to process a certain volume of transaction at aparticular speed.  Facility to communication data to distant locations. In examining technical feasibility,configuration of the system is given more importance than the actual make of hardware.In our project we have used HTML for creating webpages, Javascript for validation,PHP for making dynamic page and Database for connectivity. 2. Economic Feasibility-Economic analysis is the most frequently used technique for evaluating the effectiveness of propose system.More commonly known as Cost/Benefits analysis,the procedure is to determine the benefits and savings that are expected from a proposed system and compare them with costs. If benefits outweigh costs, a decision is taken to design and implement the system. Otherwise, further justification or alternative in the
  • 13. proposed system will have to be made if it is to have a chance of being approved. This is an outgoing effort that improves in accuracy at each phase of the system life cycle. In my project we have created a website which is free of cost. Anyone can do registration of aadhar card which is free of cost. 3.Operational Feasibility-Operational feasibility is a measure of how well a proposed system solves the problems, and takes advantages of the opportunities identified during scope definition and how it satisfies the requirements identified in the requirements analysis phase of system development. To ensure success, desired operational outcomes must be imported during design and development. These include such design-dependent parameters such as reliability,maintainability,supportability,usability,productability,sustainability,affor-dability and others. 4.Legal Feasibility- Legal feasibility is a determination of whether the proposed project is legal, i.e, it fulfill the requirement of acts or not. It determines whether the proposed system conflicts with legal requirements, e.g. a data processing system must comply with the local Data Protection Acts. In our project we have explained about all the legal formalities which are required for the registration of aadhar card. 5.Time Feasibility- A project will fail if it takes too long to be completed before it is useful. Typically this means estimating how long the system will take to develop,and if it can be completed in a given time period using some methods like payback period.Schedule feasibility is a measure of how reasonable the project timetable is. Our project will take minimum time to register and it will show aadhaar status.The people who have already register are allow login to the form.
  • 14. MODULES  UIDAI (Unique Identification Authority of India) The authority will issue Aadhaar and set standards for enrolment and authentication, to be universally followed. Initially, UIDAI will design, develop and deploy the Aadhaar Application with the help of service providers. Subsequently, the entire operation will be expanded and operated by an external service providers. The UIDAI is also responsible for recruiting Registrars, approving enrolment agencies and providing a list of introducers among others.  Registrars These are public and private organizations that are currently engaged in providing service to the residents and which operate on behalf of the UIDAI to provide UIDAI services to their constitutions. Registrars may collect documentation such as proof of resident and, proof of identity from residents and store the documents. Registrar may also receive demographics data and photograph of the resident. Registrar may store biometric data such as fingerprint, and iris image in a secure manner.  Sub-registrar These are departments or entities that report to specific Registrar. For instance, the line departments of the state government such as the Rural Development and Panchayat Raj (RDPR) department would be sub-registrars to the state government Registrar.  Enrolment Agency An Agency contracted by the Registrar, subject to certification by the UIDAI, to perform their duties. Enrolment agencies provide operators and supervisors for the enrolment stations on the fields, and also create the necessary conditions for the optical enrolment of residents. Enrolment agencies must collect demographic data prior to an enrolment drive. They must notify residents and UIDAI, of the enrolment schedule in advance. Enrolment agency may be empanelled by the UIDAI for the assistance of the Registrars. The Registrars will be free to engage any other enrolment agencies se well.
  • 15.  Introducer An introducer is a well known person authorized by the UIDAI or by a Registrar to introduce individuals for enrolment. An introducer provides an assurance that the individual applying for an Aadhaar is indeed a resident, and to the best of his/her personal knowledge who they say they are.  Resident A resident is defined as a natural person, usually residing in India. Residents are expected to truthfully provide information and documentation to meet the KYR norms, or be introduced by an introducer. They are expected to provide biometric information to the UIDAI.  Authenticator An Authenticator is an agency that uses the UIDAI System to authenticates a resident. Authenticators may use demographic data and/or biometric data in addition to the resident’s Aadhaar. Authenticators must register with the UIDAI and provide an estimated usage. Authenticator must use the appropriate for Authentication that provides him/her with the necessary assurance for the transaction.
  • 16. IMPLEMENTATION Implementation includes all those activies that takes place to convert from the old system to the new one. The new system may be completely new, replacing an existing manual or automated system or it may be major modification to an existing system. Implementation is the part of the process where software engineers actually program the code for the project. Software testing is an integral and important phase of the software development process. This part of the process ensures that defects are recognized as soon as possible. In our project we created a Static homepage of UIDAI Aadhaar card in which we have given an introduction of aadhaar card and briefly described about its features. We have also described about the background of UIDAI. We have described about the uses of aadhar card its importance. We have also given steps for the enrollment of aadhar card. We have also provided the facility of checking the status of aadhar card. We have also explained about the use of biometric aadhar card. We have designed the login form for the people who have already registered and given the option for the individual to create new password if anyone has forgotten the password. We have given the search engine in our website so that anyone can search about the aadhar card and get information related to aadhar card. We have created our website by the help of
  • 17. html we have given all the entries in database table.We have given the database connectivity and dynamic webpages with the help of php and javascript for validation. CONCLUSION In our project we have created a dynamic webpages. We have given all the details of the UIDAI Aadhaar card. We can fill registration form only if we have already registered .If we have registered then we can login by going to the login form and fill registration form/correction form. If we have filled the registration form then we can check the status of Aadhaar. At last we have generated an Aadhaar card which will be shown in our status form. We have created a database table and used PHP for database connectivity. The details shown in Aadhaar card is taken from the database.
  • 18. FUTUREENHANCEMENT In our project we have mentioned about the Biometric captures in Aadhaar card but we haven’t implemented it in our project.The one of the important and new concept used in Aadhaar card is the biometric capture used in it which make it different from other cards. We need Biometric devices to capture Biometric data of individuals.You can take following data.  Facial image  Iris –both eyes  Fingerprints of all fingers  Left hand four finger slap  Right hand four finger slap  Capture of both the thumbs
  • 19. Biometric capture provides an individuals a unique identity all over India and eliminate from the data duplication and fake identities. Through the process of Aadhaar authentication, the resident can authorize UIDAI to release their KYC data to a service provider, either in person or online. Only upon successful authentication of the resident, the UIDAI will provide the name of the resident, address, date of birth, gender and photograph to the service provide. “The UIDAI expects its e-KYC serviceto enhancecustomer convenienceand greatly increasebusinessefficiency acrosssectors that requireproof of identity and addressto open customer, accounts,” said Vijay Shankar Madan,DG,and UIDAI. We generate printout of Aadhaar Card with complete detail including photograph and signature. BIBLIOGRAPHY WEBSITES Following websites are referring to create this project reports.  http://www.google.com  http://www.uidai.gov.in  http://www.en.wikipedia.org/wiki/aadhar  http://www.aadharcarduid.com/aadhar-card-application-form  http://www.portal.uidai.gov.in  http://www.india.gov.in/update  http://www.myaadharcard.in  http://www.governancenow.com
  • 20.  http://www.iwwh.in/  http://www.w3schools.com  http://www.htmlgoodies.com  http://html.net/tutorials/javascript/lesson2.php  http://www.php.net/manual/en/reserved.variables.server.php  http://www.javascript.com/  http://www.cs.brown.edu/courses/bridge/1998/res/javascript/javascript-tutorial.html  http://www.learn-javascript-tutorial.com/ BOOKS Following books and eBooks are used to complete this project reports.  HTML5 Black Book: Covers CSS3,Javascript,XML,XHTML,Ajax, PHP and Jquery  Learning PHP, Mysql, JavaScript and CSS by Robin Nixon  ResponsiveWeb Design withHTML5 and CSS3 (Community ExperienceDistilled)  PHP: The Complete Reference Steven Holzner (Author)
  • 21.
  • 22. DATAFLOWDIAGRAM A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data through an information system, modeling its process aspects. Often they are a preliminary step used to create an overview of the system which can later be elaborated. DFDs can also be used for the visualization of data processing (structured design). A DFD shows what kinds of information will be input to and output from the system, where the data will come from and go to, and where the data will be stored. It does not show information about the timing of processes, or information about whether processes will operate in sequence or in parallel (which is shown on a flowchart). Process: People, procedure or device that use or produced data.The physicalcomponentisnotidentifies. Dataflow: Data move in a specific direction from and origin to a destination theformof a document. Source or destination: External source or destinationsof data interact with the system. The terms source and sink are interchangeablewith origin and destination. Data Store: Here data are store or referenced by a process in the system. Data Store: Data at Rest
  • 23. ENTITYRELATIONSHIPDIAGRAM An ER model is an abstract way of describing a database. In the case of a relational database, which stores data in tables, some of the data in these tables point to data in other tables - for instance, your entry in the database could point to several entries for each of the phone numbers that are yours. The ER model would say that you are an entity, and each phone number is an entity, and the relationship between you and the phone numbers is 'has a phone number'. Diagrams created to design these entities and relationshipsarecalled entity–relationship diagramsorER diagrams. Component of E-R Diagram: Rectangle: It representsentity sets. Ellipses: It representsattributessets Diamonds: Itrepresentsrelationshipssets Lines: It link attributeto entity set and entity set to relationship sets
  • 24. STREET NAME HOST ASA KEY API VERS GENERATE AADHAR CARD HEIGHT EYE COLOR DATE OF EXPIRYSEX DATE OF BIRTH NAME CARD NUMBER REQUEST FOR Key Attributes: An attribute that identifies an entity; an entity identifier