This document provides an overview and introduction to a student project on the Aadhaar Card Registration System developed under the guidance of a faculty member. It includes sections on the objectives of developing the online registration system, the technologies used including front-end and back-end software, hardware requirements, system design with data flow diagrams and entity relationship diagrams, database design, coding, screen layouts, implementation, and future enhancements. The project aims to provide a complete online solution for Aadhaar card registration and administration.
This presentation gives an overview about how is India progressing into making UN's Vision 2020 goal (of financial inclusion) a reality.
It's a technology breakthrough India has been achieved in combat to score financial data security in 21st century and independence from reliance over other nations to provide multilateral system of payments in India.
To watch full video click on the link below-
https://youtu.be/RRgkQ7lSdqM
NPCI, an initiative of the Reserve Bank of India (RBI) and Indian Banking Association (IBA) is an umbrella organization for operating retail payments and settlement systems in India.
It functions under provision of Payment and Settlement Systems Act, 2007.
It is a not-for-profit organization set up under the provisions of Section 25 of Companies Act, 1956 (amended as Sec 8 of Companies Act 2013).
Facilitates easy access to online payment services with variety of banking products and services.
Products offered by NPCI
IMPS (Immediate Payment Service) is an instant payment inter-bank electronic funds transfer system in India. Unlike NEFT and RTGS, the service is available 24*7 throughout the year.
NFS (National Financial Switch) is the largest network of shared ATMs in India facilitating convenience banking.
AePS (Aadhaar-enabled Payment Service) is a bank led model that allows financial transaction at PoS of any bank using the Aadhaar authentication through the retail merchant.
CTS (Cheque Truncation System) facilitates uses of digital signature or encryption methods to prevent manipulation of data during transition of cheque clearance.
UPI (Unique Payments Interface) is a system that makes multiple bank accounts to be accessed from a single mobile application using mobile no. or UPI id as unique transaction address.
Thank you for Watching
Subscribe to DevTech Finance
This presentation gives an overview about how is India progressing into making UN's Vision 2020 goal (of financial inclusion) a reality.
It's a technology breakthrough India has been achieved in combat to score financial data security in 21st century and independence from reliance over other nations to provide multilateral system of payments in India.
To watch full video click on the link below-
https://youtu.be/RRgkQ7lSdqM
NPCI, an initiative of the Reserve Bank of India (RBI) and Indian Banking Association (IBA) is an umbrella organization for operating retail payments and settlement systems in India.
It functions under provision of Payment and Settlement Systems Act, 2007.
It is a not-for-profit organization set up under the provisions of Section 25 of Companies Act, 1956 (amended as Sec 8 of Companies Act 2013).
Facilitates easy access to online payment services with variety of banking products and services.
Products offered by NPCI
IMPS (Immediate Payment Service) is an instant payment inter-bank electronic funds transfer system in India. Unlike NEFT and RTGS, the service is available 24*7 throughout the year.
NFS (National Financial Switch) is the largest network of shared ATMs in India facilitating convenience banking.
AePS (Aadhaar-enabled Payment Service) is a bank led model that allows financial transaction at PoS of any bank using the Aadhaar authentication through the retail merchant.
CTS (Cheque Truncation System) facilitates uses of digital signature or encryption methods to prevent manipulation of data during transition of cheque clearance.
UPI (Unique Payments Interface) is a system that makes multiple bank accounts to be accessed from a single mobile application using mobile no. or UPI id as unique transaction address.
Thank you for Watching
Subscribe to DevTech Finance
Platforms help create more open platforms. Indian entrepreneurs will address the scale and diversity of India by building smart solutions on top of these DIGITAL PLATFORMS!
New digital lending architecture: As Indian consumers and business go from being data poor to data rich in next 3 years, a new lending architecture which is digital, based on data footprints and using algorithms can scale up rapidly to provide credit for the underserved. This includes P2P lending. The Electronic Consent layer of the India Stack will leverage this data tsunami.
Real time gross settlement systems (RTGS) are specialist funds transfer systems where transfer of money or securities takes place from one bank to another on a "real time" and on "gross" basis. It can be defined as the continuous (real-time) settlement of funds transfers individually on an order by order basis (without netting).
Black Book Project Report on Digital IndiaRabina Yesmin
This is a BLACK BOOK PROJECT REPORT. This BLACK BOOK PROJECT is having all the required & desirable elements, qualities & characteristics, as good as it is possible to be as per University of Mumbai. Please do not copy the Project. This project will help you to accomplished your black book project report effectively. Thank you !
Summary:
This Project report will give you a glance to see where India will going to stand after 5-10 years as digitally. The objective of research of the Digital India project is to come out with knowledge of innovative ideas and practical solutions to realize Hon’ble Prime Minister Narendra Modi’s vision of a digital India. Prime Minister Modi envisions transforming our nation and creating opportunities for all citizens by harnessing digital technologies
To know about the making technology central to enabling change. We can see the changing and developing technology of India in a digital way.
As digital India is being an Umbrella Programme, that is covering many departments.The programme weaves together a large number of ideas and thoughts into a single, comprehensive vision, so that each of them is seen as part of a larger goal. Each individual element stands on its own, but is also part of the larger picture.
Mobile wallets have made it easy to carry out online shopping payments, online utility bill payments, mobile recharge online, DTH recharge online, online bus / movie ticket booking.
In India there are options like Paytm, Mobikwik, Vodafone M-pesa, Chillr, Free-charge, Airtel Money, Oxigen etc.
What is Cashless Economy ? Advantages, Disadvantages, Different Cashless payment methods, internet banking, plastic money, e-wallet, Point of sale, how to secure your cashless payment, future of cashless payment.
It's a powerpoint presentation on United Payment Interface (UPI) which I delivered in the electronics department of IIT(ISM) Dhanbad.Along with UPI i have also discussed on topics such as e-wallets, imps, neft, rtgs etc.
Secure QR code payment is one of the Mobile payment solution of Mobile Money.
jrsys Patented Secure QR code contains not only the URL but also a digital signed data.
www.jrsys.com.tw
Platforms help create more open platforms. Indian entrepreneurs will address the scale and diversity of India by building smart solutions on top of these DIGITAL PLATFORMS!
New digital lending architecture: As Indian consumers and business go from being data poor to data rich in next 3 years, a new lending architecture which is digital, based on data footprints and using algorithms can scale up rapidly to provide credit for the underserved. This includes P2P lending. The Electronic Consent layer of the India Stack will leverage this data tsunami.
Real time gross settlement systems (RTGS) are specialist funds transfer systems where transfer of money or securities takes place from one bank to another on a "real time" and on "gross" basis. It can be defined as the continuous (real-time) settlement of funds transfers individually on an order by order basis (without netting).
Black Book Project Report on Digital IndiaRabina Yesmin
This is a BLACK BOOK PROJECT REPORT. This BLACK BOOK PROJECT is having all the required & desirable elements, qualities & characteristics, as good as it is possible to be as per University of Mumbai. Please do not copy the Project. This project will help you to accomplished your black book project report effectively. Thank you !
Summary:
This Project report will give you a glance to see where India will going to stand after 5-10 years as digitally. The objective of research of the Digital India project is to come out with knowledge of innovative ideas and practical solutions to realize Hon’ble Prime Minister Narendra Modi’s vision of a digital India. Prime Minister Modi envisions transforming our nation and creating opportunities for all citizens by harnessing digital technologies
To know about the making technology central to enabling change. We can see the changing and developing technology of India in a digital way.
As digital India is being an Umbrella Programme, that is covering many departments.The programme weaves together a large number of ideas and thoughts into a single, comprehensive vision, so that each of them is seen as part of a larger goal. Each individual element stands on its own, but is also part of the larger picture.
Mobile wallets have made it easy to carry out online shopping payments, online utility bill payments, mobile recharge online, DTH recharge online, online bus / movie ticket booking.
In India there are options like Paytm, Mobikwik, Vodafone M-pesa, Chillr, Free-charge, Airtel Money, Oxigen etc.
What is Cashless Economy ? Advantages, Disadvantages, Different Cashless payment methods, internet banking, plastic money, e-wallet, Point of sale, how to secure your cashless payment, future of cashless payment.
It's a powerpoint presentation on United Payment Interface (UPI) which I delivered in the electronics department of IIT(ISM) Dhanbad.Along with UPI i have also discussed on topics such as e-wallets, imps, neft, rtgs etc.
Secure QR code payment is one of the Mobile payment solution of Mobile Money.
jrsys Patented Secure QR code contains not only the URL but also a digital signed data.
www.jrsys.com.tw
With the development of digital technologies in recent decades, there has been drastic change in the mode of communication and usages of digital accessories in our today lives . Development nowadays is full of compromises. Engineers are compelled to pick between either assembling the equivalent application on numerous occasions for different working frameworks, or to acknowledge a most reduced shared element arrangement that exchanges local speed and exactness for compactness. The main aim of the research paper is to analyze design, build and test mentors' view apps. In this application the mentor connects with the mentee. Mentor solves the problem of the mentee. In this application mentor and mentee , mentee and mentor both are connected with each other. Software has been developed as an interactive and collaborative learning aid. Flutter is an open source. SDK for making elite, high-devotion versatile applications for iOS and Android. Significant features of flutter are - Just-in-time compilation is a way of executing computer code that involves compilation during execution of a program at run time rather than prior to execution. The application is very easy to use. That tool could benefit students in general. The application does require internet connection. Each user will have their own database for profiles.
The sixth annual conference, organized by PMI Pearl City Chapter, took place on 11-13 September 2014 at the Hyderabad International Convention Center. Delegates from around the country attended the much awaited event to gain knowledge and insights on project management from the experts, share their experience, and network with peers and seniors.
A report file is an output file having sequential organization. A report file has a file description entry containing a REPORT clause. The content of a report file consists of records that are written under control of the RWCS.
SmartSnap was an android image recognition application working on the concept of Optical Character Recognition. It's key features included Document Capture, Visual Search, Real-Time Information and Visual Commerce. It worked on a self created web search engine based on a database populated using web crawlers.
Responsibilities included:
1) Providing a user friendly interface for the application users.
2) Designing and integrating the front end. Designing was done on Photoshop.
3) Researching the latest technologies in the field.
4) Managing and populating the server using the web crawler on daily basis.
The project was awarded the 'BEST STUDENT PROJECT' by Tata Consultancy Services.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
1. project ON
“Unique Identification Authority of India (UIDAI)”
“AadhaAr Card Registration System”
Submitted for an overview of the project proposal for fulfill the need of the degree
Of
“BACHELOR OF COMPUTER APPLICATION”
(2011-2014)
MAHATMA GANDHI KASHI VIDYAPITH
(VARANASI)
UNDER GUIDANCEOF: SUBMITTEDBY:
2. NILIMA MAURYA PRIYANKA SINGH (ROLL NO: 1201776)
(BCA DEPARTMENT) PRITI MISHRA (ROLLNO: 1201775)
Certificate
This is to certify thatMiss ………………………………………………………………
Of the BCA VI Semester Examination, 2011-2014 has completed this
comprehensive project report on topic
“………………………………………………………………………………………......................................”
As a partial fullfillment of degree of Bachelor of Computer Application of
Mahatma GandhiKashiVidhyaPeethvaranasi, under my supervision.
This mater embodied in this project is a genuine work done by the
student at has not submitted whether to this university or to any other university
or institute for the fulfillment of the requirementof any cause of study.
Date:…………………………… (Signature)
……………………………………
(Designation)
3. ACKNOWLEDGEMENT
Contrary to popular belief, that developing a project is not a solo activity. Many
people collaborate in developing it.
I am thankful to all of them for their help and encouragement in carrying out this
project. We express sincere thanks and gratitude from core of our heart towards,
Director of Sunbeam College for Women, Bhagwanpur, Varanasi. Without whose
guidance and inspiration this projectwill notbe possible.
We sincerely thanks to Mr.DayaShankar, HOD of Bachelor of Computer
Application (BCA) for his guidance and unfailing courtesy during the course of our
studies in College and our synopsiswork as well.
We take this opportunity to acknowledge their contribution to project. It is our
pleasure and privilege to express our deep sense of gratitude and thanks to our
guide Ms.Nilima Maurya, BCA faculty for her positive,supportive,inspiring and
illuminating guidance, untiring effort, timely help and constant encouragement
and making this projecta fruitfulsuccessfullearning experience.
I am thankful to my project partner Priti Mishra for their help and support in the
project and also I would like to thanks to all my classmates for their help and
support.
With immense joy and gratitude I raise my heart in praise and thanks giving to
Parents Almighty for his manifold graces and blessings showered on us all through
this study.
4. DATE……………………… NAME...................................
TABLE OF CONTENTS
1. INTRODUCTION
1.1 Objective
1.2 Definition
1.3 Uses
2. FEASIBILITY STUDY
2.1 Economic Feasibility
2.2 Technical Feasibility
2.3 Operational Feasibility
2.4 Legal Feasibility
2.5 Time Feasibility
3. TECHNOLOGY USED
3.1 Software Requirement
Front-End
Back-End
3.2 Hardware Requirement
4. SYSTEM DESIGN
4.1 Data Flow Diagram
5. 4.2 Entity-RelationShip Diagram
4.3 Modules
4.4 Database Design
5. CODING
6. SCREEN LAYOUTS
7. IMPLEMENTATION
8. CONCLUSION
9. FUTURE ENHANCEMENT
10. BIBLIOGRAPHY
Introduction
About UIDAI Background
Unique Identification project was initially conceived by the Planning commission
as an initiative that would provide identification for each resident across the
country and would be used primarily as the basis for efficient delivery of welfare
services. It would also out as a tool for effective monitoring of various programs
and schemes of the Government. This was set up under the Chairmanship of, Dr.
Arvind Virmani PrincipalAdvisor, and Planning Commission.
A “Strategic vision on the UIDAI Project” was prepared and submitted to this
committee by M/S Wipro Limited.
AadhaarCard Logo
6. PrimeMinister’sCouncil
Prime Minister’s Council on UIDAI Authority-Subsequently, on 02 July 2009, the
Government appointed Shri Nandan Mohan Nilekani as Chairman of the Unique
Identification Authority of India (UIDAI), in the rank and status of a Cabinet
Minister for an initial tenure of five years.
Mr.Nilekani has joined the UIDAI as its Chairman on 23 July 2009.The Prime
Minister’s Council of UIDAI Authority of India was set up on 30 July 2009.The first
meeting of the Prime Minister’s Council of UIDAI.
Authority took place on August 2009.
7. The salient decisionsinthePMsCouncilWEREasfollows:
Need for legislative framework
Broad Endorsement of the strategy
Budgetary support to partners
Setting Biometrics and Demographic Standards.
UIDAI Structure contours Approved.
Flexibility in Personnel and other issues.
Choose Deploy and Repatriate officers.
Government Accommodations Eligibility
Broad-banding of posts.
Hiring of professionals from Market
Setting up of Global Advisory Councils of P/Os
Interns & Sabbatical Global Procurement.
On 25 June 2009, the Cabinet also created and approved the position of the
Chairperson of the UIDAI, and appointed Mr.Nandan Nilekani as the first
Chairperson in the rank & status of a Cabinet Minister Mr. Ram Sewak
Sharma hasbeen appointed the Director General.
Head quarter’s Organization
The UIDAI is headquartered in Delhi with Shri Nandan Nilekani as the
Chairman and Shri Vijay S. Madan as the Director General and Mission
Director.
8. AboutAadhaarCard
Aadhaar is a 12 digit individual identification number issued by the UIDAI
identification number issued by the UIDAI on behalf of the Government of India.
This number will serve as a proof of identity and address, anywhere in India.
Each Aadhaar number will be unique to an individual on the basis of
demographic and biometric information and will remain valid for life. Aadhaar
number will help you provide access to service like banking, mobile, phone
connections & other Govt. and non-Govt services in due course.
Three KeyCharacteristics of AadhaAr Number are:
Permanency (Aadhaarno.remain sameduring lifetimeofa resident)
Uniqueness(oneresident hasone ID & two residentshave same ID)
Global (sameidentifiercanbe usedacross applicationanddomains)
Objective:-
Online UIDAI Aadhaar Registration System-is complete end to end solution to cover all
aspectsof online individualregistration process.
The basic Objective of developing this project is:-
Provide complete website solution, including individual person registration, providing
themAadhaarCard.CompleteWeb based administration.
An individualcan register and login into the systemany time.
An individual can get complete information of Aadhaar Card, its importance, they can
CheckAadhaarstatus,updateAadhaardata.
Individual will get unique identity due to its new technology i.e. biometric and
demographicfeatures.
Any Stateof person can register in their own statelanguages.
An individualcan search anything aboutUIDAI Aadhaarcard and itsregistration System.
They can contact and ask their queries if they have. They can also call on toll free
number.
DESCRIPTION
Aadhaar is the national identification number assigned to residents of India. It is auto-
generated random number, without any classification based on caste, creed, religion or
geography. It is a 12 digits unique identification number, which will be unique to an
individual and remains valid for life. Aadhaar will serve as a proof of identity and address,
across India.
9. Uses
Aadhaarwillbe used as identification proof for services like banking,ration card,
passport,mobilephoneconnectionsetc.
Services providewill no longerhaveto repeatedly performknow yourcustomer(KYC)
checks.
Aadhaarwillbe easily verified online in a cost-effectiveway.
Residentswill be enrolled with properverification of their demographic&biometric
information.This will help eliminate the large numberof duplicateand fakeidentities in
governmentand privatedatabases.
Aadhaarwillgive migrantsmobility of identity
Aadhaarwillfacilitate entry of poorand underprivileged residentsinto the formal
banking systemand theopportunity to availservicesprovided by the governmentand
the privatesector.
2. TECHNOLOGY USED
2.1 SOFTWARE REQUIREMENT
10. FRONT –END
1. JavaScript (JS) - JavaScript (JS) is an interpreted computer programming language. As part of
web browsers, implementations allow client-side scripts to interact with the user, control the browser,
communicate asynchronously, and alter the document content that is displayed. The key design
principles within JavaScript are taken from the self and Scheme programming languages. JavaScript is a
prototype-based scripting language with dynamic typing and has first-class functions. The application of
JavaScript to uses outside of web pages—for example, in PDF documents, site-specific browsers, and
desktop widgets—isalso significant.
It is a multi-paradigm language,supporting oriented,imperative,and functionalprogramming styles.
2. PHP (Hypertext Preprocessor)-PHP is a general-purpose scripting language that is
especially suited to server-side web development where PHP generally runs on a web server. PHP code is
interpreted by a web server with a PHP processor module, which generates the resulting web page: PHP
commands can be embedded directly into an HTML source document rather than calling an external file
to process data. It has also evolved to include a command-line interface capability and can be used in
standalone graphical applications. Any PHP code in a requested file is executed by the PHP runtime,
usually to create dynamicweb pagecontentordynamicimagesused on websitesorelsewhere.
3. HTML (Hyper text Markup Language)-HTML is the main markup language for creating
web pages and other information that can be displayed in a web browser. The purpose of a web browser
is to read HTML documents and compose them into visible or audible web pages. The browser does not
display the HTML tags, but uses the tags to interpret the content of the page. An HTML Application (HTA;
file extension ".hta") is a Microsoft Windows application that uses HTML and Dynamic HTML in a
browser to provide the application's graphical interface. A regular HTML file is confined to the security
model of the web browser's security, communicating only to web servers and manipulating only
webpageobjectsand sitecookies.
BACK-END
1. MySQL- MySQL, pronounced either "My S-Q-L" or "My Sequel," is an open source
relational database management system. It is based on the structure query language (SQL),
which is used for adding, removing, and modifying information in the database. Standard SQL
commands, such as ADD, DROP, INSERT, and UPDATE can be used with MySQL.
MySQL can be used for a variety of applications, but is most commonly found on Web servers. A
website that uses MySQL may include Web pages that access information from a database.
These pages are often referred to as "dynamic," meaning the content of each page is generated
from a database as the page loads. Websites that use dynamic Web pages are often referred to as
database-driven websites.
Many database-driven websites that use MySQL also use a Web scripting language like PHP to
access information from the database. MySQL commands can be incorporated into the PHP
code, allowing part or all of a Web page to be generated from database information. Because
11. both MySQL and PHP are both open source (meaning they are free to download and use), the
PHP/MySQL combination has become a popular choice for database-driven websites.
2.2 HARDWARE REQUIREMENT
TYPE
Work Station/Node
SOFTWARE
Windows XP,
MS Office
HARDWARE
1. RAM-256(minimum)/512(recommended)
MB
2. HDD-nGB depending upon the requirement
to storedata minimumof 25GB.
DatabaseServer 1. OS – Win 2003
Enterprise Server
2. SQL Server2005
1.HDD– Min 10 GB, Recommended 25 GB
2.RAM– Min 2 GB, Recommended 4GB
3.Processor- PentiumDualXenon Processor
Application Server 1. OS – Win 2003
Enterprise Server
2. IIS – Internet
Information
Server
1.HDD – Min 5 GB, Recommended 10 GB
2.RAM– Min 2 GB, Recommended 4GB
3.Processor- PentiumDualXenon Processor
12. FEASIBILITYSTUDY
A Feasibility study is carried out to select the best system that meets performance
requirements.The main aim of the feasibility study cativity is to determine whether it would be
financially and technically feasible to develop the product.The feasibility study activity involves
the analysis of the problem and collection of all relevant information relating to the product
such as the different data items which would be input to the system,the processing required to
the system,the processing required to be carried out on these data,the output data required to
be produced by the system as well as various constraints on the behaviour of the system.
Feasibility studies aim to objectively and rationally uncover the strengths and weakness of an
existing business or proposed venture,opportunities and threats present in the environment,the
resources required to carry through,and ultimately the prospects for success.In its simplest
terms,the two criteria to judge feasibility are cost required and value to be attained.
A well-designed feasibility study should provide a historical background of the business or
project,a description of the product or services,accounting statements,details of the operations
and management,marketing research and policies,financial data,legal requirements and tax
obligations.
A feasibility study evaluates the project’s potential for success;therefore,perceived objectivity is
an important factor in the credibility of the study for potential investers and lending institutions.
1.Technical Feasibility-This is concerned with specifying equipment and software that will
successfully satisfy the user requirement.The technical needs of the system may vary
considerably,but might include:
The facility to produce outputs in agiven time.
Response time under certain conditions.
Ability to process a certain volume of transaction at aparticular speed.
Facility to communication data to distant locations.
In examining technical feasibility,configuration of the system is given more importance than the
actual make of hardware.In our project we have used HTML for creating webpages, Javascript
for validation,PHP for making dynamic page and Database for connectivity.
2. Economic Feasibility-Economic analysis is the most frequently used technique for
evaluating the effectiveness of propose system.More commonly known as Cost/Benefits
analysis,the procedure is to determine the benefits and savings that are expected from a
proposed system and compare them with costs. If benefits outweigh costs, a decision is taken
to design and implement the system. Otherwise, further justification or alternative in the
13. proposed system will have to be made if it is to have a chance of being approved. This is an
outgoing effort that improves in accuracy at each phase of the system life cycle.
In my project we have created a website which is free of cost. Anyone can do registration of
aadhar card which is free of cost.
3.Operational Feasibility-Operational feasibility is a measure of how well a proposed
system solves the problems, and takes advantages of the opportunities identified during scope
definition and how it satisfies the requirements identified in the requirements analysis phase of
system development.
To ensure success, desired operational outcomes must be imported during design and
development. These include such design-dependent parameters such as
reliability,maintainability,supportability,usability,productability,sustainability,affor-dability and
others.
4.Legal Feasibility- Legal feasibility is a determination of whether the proposed project is
legal, i.e, it fulfill the requirement of acts or not. It determines whether the proposed system
conflicts with legal requirements, e.g. a data processing system must comply with the local Data
Protection Acts.
In our project we have explained about all the legal formalities which are required for the
registration of aadhar card.
5.Time Feasibility- A project will fail if it takes too long to be completed before it is useful.
Typically this means estimating how long the system will take to develop,and if it can be
completed in a given time period using some methods like payback period.Schedule feasibility is
a measure of how reasonable the project timetable is.
Our project will take minimum time to register and it will show aadhaar status.The people who
have already register are allow login to the form.
14. MODULES
UIDAI
(Unique Identification Authority of India) The authority will issue Aadhaar and set
standards for enrolment and authentication, to be universally followed. Initially,
UIDAI will design, develop and deploy the Aadhaar Application with the help of service
providers. Subsequently, the entire operation will be expanded and operated by an
external service providers. The UIDAI is also responsible for recruiting Registrars,
approving enrolment agencies and providing a list of introducers among others.
Registrars
These are public and private organizations that are currently engaged in providing
service to the residents and which operate on behalf of the UIDAI to provide UIDAI
services to their constitutions. Registrars may collect documentation such as proof of
resident and, proof of identity from residents and store the documents. Registrar may
also receive demographics data and photograph of the resident. Registrar may store
biometric data such as fingerprint, and iris image in a secure manner.
Sub-registrar
These are departments or entities that report to specific Registrar. For instance, the line
departments of the state government such as the Rural Development and Panchayat Raj
(RDPR) department would be sub-registrars to the state government Registrar.
Enrolment Agency
An Agency contracted by the Registrar, subject to certification by the UIDAI, to perform
their duties. Enrolment agencies provide operators and supervisors for the enrolment
stations on the fields, and also create the necessary conditions for the optical enrolment
of residents.
Enrolment agencies must collect demographic data prior to an enrolment drive. They
must notify residents and UIDAI, of the enrolment schedule in advance. Enrolment
agency may be empanelled by the UIDAI for the assistance of the Registrars. The
Registrars will be free to engage any other enrolment agencies se well.
15. Introducer
An introducer is a well known person authorized by the UIDAI or by a Registrar to
introduce individuals for enrolment. An introducer provides an assurance that the
individual applying for an Aadhaar is indeed a resident, and to the best of his/her
personal knowledge who they say they are.
Resident
A resident is defined as a natural person, usually residing in India. Residents are expected
to truthfully provide information and documentation to meet the KYR norms, or be
introduced by an introducer. They are expected to provide biometric information to the
UIDAI.
Authenticator
An Authenticator is an agency that uses the UIDAI System to authenticates a resident.
Authenticators may use demographic data and/or biometric data in addition to the
resident’s Aadhaar. Authenticators must register with the UIDAI and provide an
estimated usage. Authenticator must use the appropriate for Authentication that
provides him/her with the necessary assurance for the transaction.
16. IMPLEMENTATION
Implementation includes all those activies that takes place to convert from the old system to
the new one. The new system may be completely new, replacing an existing manual or
automated system or it may be major modification to an existing system.
Implementation is the part of the process where software engineers actually program the code
for the project. Software testing is an integral and important phase of the software
development process. This part of the process ensures that defects are recognized as soon as
possible.
In our project we created a Static homepage of UIDAI Aadhaar card in which we have given
an introduction of aadhaar card and briefly described about its features. We have also described
about the background of UIDAI. We have described about the uses of aadhar card its
importance. We have also given steps for the enrollment of aadhar card. We have also provided
the facility of checking the status of aadhar card. We have also explained about the use of
biometric aadhar card. We have designed the login form for the people who have already
registered and given the option for the individual to create new password if anyone has
forgotten the password.
We have given the search engine in our website so that anyone can search about the aadhar
card and get information related to aadhar card. We have created our website by the help of
17. html we have given all the entries in database table.We have given the database connectivity
and dynamic webpages with the help of php and javascript for validation.
CONCLUSION
In our project we have created a dynamic webpages. We have given all the details of the UIDAI
Aadhaar card. We can fill registration form only if we have already registered .If we have
registered then we can login by going to the login form and fill registration form/correction
form. If we have filled the registration form then we can check the status of Aadhaar.
At last we have generated an Aadhaar card which will be shown in our status form. We have
created a database table and used PHP for database connectivity. The details shown in
Aadhaar card is taken from the database.
18. FUTUREENHANCEMENT
In our project we have mentioned about the Biometric captures in Aadhaar card but we
haven’t implemented it in our project.The one of the important and new concept used in
Aadhaar card is the biometric capture used in it which make it different from other
cards.
We need Biometric devices to capture Biometric data of individuals.You can take
following data.
Facial image
Iris –both eyes
Fingerprints of all fingers
Left hand four finger slap
Right hand four finger slap
Capture of both the thumbs
19. Biometric capture provides an individuals a unique identity all over India and eliminate
from the data duplication and fake identities.
Through the process of Aadhaar authentication, the resident can authorize UIDAI to
release their KYC data to a service provider, either in person or online. Only upon
successful authentication of the resident, the UIDAI will provide the name of the
resident, address, date of birth, gender and photograph to the service provide.
“The UIDAI expects its e-KYC serviceto enhancecustomer
convenienceand greatly increasebusinessefficiency acrosssectors
that requireproof of identity and addressto open customer,
accounts,” said Vijay Shankar Madan,DG,and UIDAI.
We generate printout of Aadhaar Card with complete detail including photograph and
signature.
BIBLIOGRAPHY
WEBSITES
Following websites are referring to create this project reports.
http://www.google.com
http://www.uidai.gov.in
http://www.en.wikipedia.org/wiki/aadhar
http://www.aadharcarduid.com/aadhar-card-application-form
http://www.portal.uidai.gov.in
http://www.india.gov.in/update
http://www.myaadharcard.in
http://www.governancenow.com
20. http://www.iwwh.in/
http://www.w3schools.com
http://www.htmlgoodies.com
http://html.net/tutorials/javascript/lesson2.php
http://www.php.net/manual/en/reserved.variables.server.php
http://www.javascript.com/
http://www.cs.brown.edu/courses/bridge/1998/res/javascript/javascript-tutorial.html
http://www.learn-javascript-tutorial.com/
BOOKS
Following books and eBooks are used to complete this project reports.
HTML5 Black Book: Covers CSS3,Javascript,XML,XHTML,Ajax, PHP and Jquery
Learning PHP, Mysql, JavaScript and CSS by Robin Nixon
ResponsiveWeb Design withHTML5 and CSS3 (Community ExperienceDistilled)
PHP: The Complete Reference Steven Holzner (Author)
21.
22. DATAFLOWDIAGRAM
A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data through an
information system, modeling its process aspects. Often they are a preliminary step used to
create an overview of the system which can later be elaborated. DFDs can also be used for the
visualization of data processing (structured design).
A DFD shows what kinds of information will be input to and output from the system, where the
data will come from and go to, and where the data will be stored. It does not show information
about the timing of processes, or information about whether processes will operate in sequence
or in parallel (which is shown on a flowchart).
Process: People, procedure or device that use or produced
data.The physicalcomponentisnotidentifies.
Dataflow: Data move in a specific direction from and origin to
a destination theformof a document.
Source or destination: External source or destinationsof
data interact with the system. The terms source and sink are
interchangeablewith origin and destination.
Data Store: Here data are store or referenced by a process in
the system.
Data Store: Data at Rest
23. ENTITYRELATIONSHIPDIAGRAM
An ER model is an abstract way of describing a database. In the case of a relational database, which
stores data in tables, some of the data in these tables point to data in other tables - for instance, your
entry in the database could point to several entries for each of the phone numbers that are yours. The ER
model would say that you are an entity, and each phone number is an entity, and the relationship
between you and the phone numbers is 'has a phone number'. Diagrams created to design these entities
and relationshipsarecalled entity–relationship diagramsorER diagrams.
Component of E-R Diagram:
Rectangle: It representsentity sets.
Ellipses: It representsattributessets
Diamonds: Itrepresentsrelationshipssets
Lines: It link attributeto entity set and entity set to relationship sets
24. STREET
NAME
HOST
ASA KEY API VERS
GENERATE
AADHAR CARD
HEIGHT
EYE COLOR
DATE OF EXPIRYSEX
DATE OF
BIRTH
NAME
CARD NUMBER
REQUEST
FOR
Key Attributes: An attribute that identifies an entity; an entity
identifier