SlideShare a Scribd company logo
Project Report
on
Insurance Envoy
WiCoReWireless & communication research
Project
Started on:20/12/2006
Ended on:28/3/2007
Project done at
WiCoRe Pvt. Ltd. Hyderabad
WiCoReWireless & communication research
Project Description
• Insurance Envoy system is designed by Insurance
companies to make their application work on insurance
policies and claims process easier and flexible.
• Its an intranet based private web application, this web
based application is used within their organization under
the distributed accessibility to check the status of the
customers who have taken new policies and their proper
track and reminding of policy premium payments and
claim conditions.
• This system is actually developed to cater to the process
speed up in their business process such that the
customer satisfaction rates increase and the generic flow
of customers into this domain follows a smooth and
steady fashion.
WiCoReWireless & communication research
Limitations of existing system
• Time Delay
• Redundancy
• Low Accuracy
• Information retrieval is tedious process
• No security
Necessity is the mother of invention
WiCoReWireless & communication research
Advantages of the proposed system
• Speed of the task
• High Accuracy
• Systematized
• Reliable
• Secure
WiCoReWireless & communication research
Modules
WiCoReWireless & communication research
The total project consists of 7 modules:
 Administrative module
 Brokers information module
 Customers information module
 Policies information module
 Policy payment module
 Policy claims module
 Insurance company information module
 Security information module
Actors
WiCoReWireless & communication research
 Broker
 Policy holder
 System administrator
The actors who have been recognized within the system
are:
Use Case Diagram For Administrator
WiCoReWireless & communication research
SEND MESSAGE
ADMIN
LOGIN REQUEST
ADD &
REMOVE
EMPLYOEEADD&
REMOVE
POLICIES
CHANGE
PROFILE
READ
MESSAGES
CHANGE EMPLOYEE
TYPE (DESIGNATION)
VIEW
EMPLOYEES
REMOVE EMPLOYEE
LOGIN
LOG OUT
ADD & REMOVE
CUSTOMER
VERIFICATION
SERVER
LOGIN
Elaborated Diagram of System Administrator
WiCoReWireless & communication research
Enter the
required data
as per the
standards
Raise request for
new company
information
Authenticate
login nameLogin
Authenticate
password
Enable
privileged
access
Check the
authentic of
information
Store
Raise request for
new customer
registration
Enter the required
data as per the
standards
Check the
authenticity of
information
Raise request for
new broker
registration
Enter the
required data
as per the
standards
Check for
due
payments
Store
Raise request for
new policy
registration
Check the
authenticity of
information
Enter the
required data
along with
standards
Store
Raise request for
new user login
creation
Enter the
required data as
per the
standards
Check the
authenticity of
information
Store
Administrator
Home Page
WiCoReWireless & communication research
Home Page For Administrator
WiCoReWireless & communication research
Administrator Zone
WiCoReWireless & communication research
Testing
WiCoReWireless & communication research
TESTING TECHNIQUES
 Black Box Testing.
 White Box Testing.
LEVELS OF TESTING
 Unit Testing.
 Integration Testing.
 System Testing.
 User Acceptance Testing.
SYSTEM REQUIREMENTS
• Server
– Machine : Pentium IV Server
– Memory : 256 MB DDRAM
– Hard Drive : 80 GB HDD
– Display : 800x600 17" SVGA
Color Monitor
– UPS : 5 KVA
• Client
– Machine : Pentium III Client
– Memory : 128 MB DDRAM
– Hard Drive : 6 GB HDD
– Display : 800x600 17" SVGA
Color Monitor
– UPS : 2 KVA
– Operating System : WINDOWS 9X 2000
– Software : Tomcat 4.1
– Front-end Tool : JSP
– Back-end Tool : Oracle-9i
HARDWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
WiCoReWireless & communication research
SCOPE FOR FUTURE WORK
This system is ever ready to attend the following needs of future:
• Interaction with external software.
• Facility to send any report by E-mail.
• Facility for Unicode generation.
• Facility for any advertisement publication.
• Any other feature that client needs.
WiCoReWireless & communication research
Conclusion
WiCoReWireless & communication research
WiCoReWireless & communication research

More Related Content

Viewers also liked

Nanotechnology and its impact on modern computer
Nanotechnology and its impact on modern computerNanotechnology and its impact on modern computer
Nanotechnology and its impact on modern computer
Farah M. Altufaili
 
Ppt of nanocomputing
Ppt of nanocomputingPpt of nanocomputing
Ppt of nanocomputing
shwetarathi Rathi
 
Dna computing
Dna computingDna computing
Dna computing
sathish3
 
DNA computing
DNA computingDNA computing
DNA computing
ashish dixit
 
Cse ppt
Cse pptCse ppt
Nanotechnology ppt
Nanotechnology pptNanotechnology ppt
Nanotechnology ppt
kirtisingh2011
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (7)

Nanotechnology and its impact on modern computer
Nanotechnology and its impact on modern computerNanotechnology and its impact on modern computer
Nanotechnology and its impact on modern computer
 
Ppt of nanocomputing
Ppt of nanocomputingPpt of nanocomputing
Ppt of nanocomputing
 
Dna computing
Dna computingDna computing
Dna computing
 
DNA computing
DNA computingDNA computing
DNA computing
 
Cse ppt
Cse pptCse ppt
Cse ppt
 
Nanotechnology ppt
Nanotechnology pptNanotechnology ppt
Nanotechnology ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Insurance envoy

Vendesk- Vendor Management Solution
Vendesk- Vendor Management SolutionVendesk- Vendor Management Solution
Vendesk- Vendor Management Solution
Highbar Technocrat
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
Steven Cahill
 
Chainyard BITA TYS presentation v0.1.11042019
Chainyard BITA TYS  presentation v0.1.11042019Chainyard BITA TYS  presentation v0.1.11042019
Chainyard BITA TYS presentation v0.1.11042019
Mohan Venkataraman
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
Risk Crew
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91
Shanmugavel Sankaran
 
PlanetVerify for Realtors.pptx
PlanetVerify for Realtors.pptxPlanetVerify for Realtors.pptx
PlanetVerify for Realtors.pptx
RoisinRussell1
 
OIL and Gas - Sales and Distribution System
OIL and Gas -  Sales and Distribution SystemOIL and Gas -  Sales and Distribution System
OIL and Gas - Sales and Distribution System
Ahmed Rami Elsherif, PMP, ITBMC
 
SAS 70 Type II Certification
SAS 70 Type II CertificationSAS 70 Type II Certification
SAS 70 Type II Certification
Virtacore Systems
 
Cp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting ProviderCp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting Provider
guestfd062
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
itnewsafrica
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
WSO2
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
Priyanka Aash
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the Cloud
Cryptzone
 
LifeOffice.net - Insurance Systems Built for Cloud
LifeOffice.net - Insurance Systems Built for CloudLifeOffice.net - Insurance Systems Built for Cloud
LifeOffice.net - Insurance Systems Built for Cloud
Edward Kuo
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Sutedjo Tjahjadi
 
E Commerce: Its role and development
E Commerce: Its role and developmentE Commerce: Its role and development
E Commerce: Its role and development
Anubha Rastogi
 
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
ClubHack
 
PCI 3.0 Compliance and Security for Retailers
PCI 3.0 Compliance and Security for RetailersPCI 3.0 Compliance and Security for Retailers
PCI 3.0 Compliance and Security for Retailers
Aerohive Networks
 
Outpost24 Webinar - To agent or not to agent
Outpost24 Webinar - To agent or not to agent Outpost24 Webinar - To agent or not to agent
Outpost24 Webinar - To agent or not to agent
Outpost24
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
ForgeRock
 

Similar to Insurance envoy (20)

Vendesk- Vendor Management Solution
Vendesk- Vendor Management SolutionVendesk- Vendor Management Solution
Vendesk- Vendor Management Solution
 
Confirm Client Requirements
Confirm Client RequirementsConfirm Client Requirements
Confirm Client Requirements
 
Chainyard BITA TYS presentation v0.1.11042019
Chainyard BITA TYS  presentation v0.1.11042019Chainyard BITA TYS  presentation v0.1.11042019
Chainyard BITA TYS presentation v0.1.11042019
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91
 
PlanetVerify for Realtors.pptx
PlanetVerify for Realtors.pptxPlanetVerify for Realtors.pptx
PlanetVerify for Realtors.pptx
 
OIL and Gas - Sales and Distribution System
OIL and Gas -  Sales and Distribution SystemOIL and Gas -  Sales and Distribution System
OIL and Gas - Sales and Distribution System
 
SAS 70 Type II Certification
SAS 70 Type II CertificationSAS 70 Type II Certification
SAS 70 Type II Certification
 
Cp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting ProviderCp Team Caffeine Hosting Provider
Cp Team Caffeine Hosting Provider
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
 
AppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the CloudAppGate: Achieving Compliance in the Cloud
AppGate: Achieving Compliance in the Cloud
 
LifeOffice.net - Insurance Systems Built for Cloud
LifeOffice.net - Insurance Systems Built for CloudLifeOffice.net - Insurance Systems Built for Cloud
LifeOffice.net - Insurance Systems Built for Cloud
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 
E Commerce: Its role and development
E Commerce: Its role and developmentE Commerce: Its role and development
E Commerce: Its role and development
 
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
 
PCI 3.0 Compliance and Security for Retailers
PCI 3.0 Compliance and Security for RetailersPCI 3.0 Compliance and Security for Retailers
PCI 3.0 Compliance and Security for Retailers
 
Outpost24 Webinar - To agent or not to agent
Outpost24 Webinar - To agent or not to agent Outpost24 Webinar - To agent or not to agent
Outpost24 Webinar - To agent or not to agent
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 

More from Sajan Sahu

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
Sajan Sahu
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
Sajan Sahu
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
Sajan Sahu
 
Data compretion
Data compretionData compretion
Data compretion
Sajan Sahu
 
Deadlock
DeadlockDeadlock
Deadlock
Sajan Sahu
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
Sajan Sahu
 
Information system
Information systemInformation system
Information system
Sajan Sahu
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
Sajan Sahu
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
Sajan Sahu
 
Database system
Database systemDatabase system
Database system
Sajan Sahu
 
GPRS
GPRSGPRS
Bios
BiosBios
Bluetooth
Bluetooth Bluetooth
Bluetooth
Sajan Sahu
 
802.11
802.11802.11
802.11
Sajan Sahu
 
Erp
ErpErp
Internet telephony
Internet telephonyInternet telephony
Internet telephony
Sajan Sahu
 
Wcdma
WcdmaWcdma
Wcdma
Sajan Sahu
 
Criptography
CriptographyCriptography
Criptography
Sajan Sahu
 
Implimating counter
Implimating counterImplimating counter
Implimating counter
Sajan Sahu
 
Honeypot
HoneypotHoneypot
Honeypot
Sajan Sahu
 

More from Sajan Sahu (20)

Architecture of message oriented middleware
Architecture of message oriented middlewareArchitecture of message oriented middleware
Architecture of message oriented middleware
 
Computer’s memory
Computer’s memoryComputer’s memory
Computer’s memory
 
Automated inspection of aircraft
Automated inspection of aircraftAutomated inspection of aircraft
Automated inspection of aircraft
 
Data compretion
Data compretionData compretion
Data compretion
 
Deadlock
DeadlockDeadlock
Deadlock
 
Data warehouseing
Data warehouseingData warehouseing
Data warehouseing
 
Information system
Information systemInformation system
Information system
 
Wireless application protocol (WAP)
Wireless application protocol (WAP)Wireless application protocol (WAP)
Wireless application protocol (WAP)
 
Blink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisatBlink detection and tracking of eyes for eye localisat
Blink detection and tracking of eyes for eye localisat
 
Database system
Database systemDatabase system
Database system
 
GPRS
GPRSGPRS
GPRS
 
Bios
BiosBios
Bios
 
Bluetooth
Bluetooth Bluetooth
Bluetooth
 
802.11
802.11802.11
802.11
 
Erp
ErpErp
Erp
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Wcdma
WcdmaWcdma
Wcdma
 
Criptography
CriptographyCriptography
Criptography
 
Implimating counter
Implimating counterImplimating counter
Implimating counter
 
Honeypot
HoneypotHoneypot
Honeypot
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Insurance envoy

  • 2. Project Started on:20/12/2006 Ended on:28/3/2007 Project done at WiCoRe Pvt. Ltd. Hyderabad WiCoReWireless & communication research
  • 3. Project Description • Insurance Envoy system is designed by Insurance companies to make their application work on insurance policies and claims process easier and flexible. • Its an intranet based private web application, this web based application is used within their organization under the distributed accessibility to check the status of the customers who have taken new policies and their proper track and reminding of policy premium payments and claim conditions. • This system is actually developed to cater to the process speed up in their business process such that the customer satisfaction rates increase and the generic flow of customers into this domain follows a smooth and steady fashion. WiCoReWireless & communication research
  • 4. Limitations of existing system • Time Delay • Redundancy • Low Accuracy • Information retrieval is tedious process • No security Necessity is the mother of invention WiCoReWireless & communication research
  • 5. Advantages of the proposed system • Speed of the task • High Accuracy • Systematized • Reliable • Secure WiCoReWireless & communication research
  • 6. Modules WiCoReWireless & communication research The total project consists of 7 modules:  Administrative module  Brokers information module  Customers information module  Policies information module  Policy payment module  Policy claims module  Insurance company information module  Security information module
  • 7. Actors WiCoReWireless & communication research  Broker  Policy holder  System administrator The actors who have been recognized within the system are:
  • 8. Use Case Diagram For Administrator WiCoReWireless & communication research SEND MESSAGE ADMIN LOGIN REQUEST ADD & REMOVE EMPLYOEEADD& REMOVE POLICIES CHANGE PROFILE READ MESSAGES CHANGE EMPLOYEE TYPE (DESIGNATION) VIEW EMPLOYEES REMOVE EMPLOYEE LOGIN LOG OUT ADD & REMOVE CUSTOMER VERIFICATION SERVER LOGIN
  • 9. Elaborated Diagram of System Administrator WiCoReWireless & communication research Enter the required data as per the standards Raise request for new company information Authenticate login nameLogin Authenticate password Enable privileged access Check the authentic of information Store Raise request for new customer registration Enter the required data as per the standards Check the authenticity of information Raise request for new broker registration Enter the required data as per the standards Check for due payments Store Raise request for new policy registration Check the authenticity of information Enter the required data along with standards Store Raise request for new user login creation Enter the required data as per the standards Check the authenticity of information Store Administrator
  • 10. Home Page WiCoReWireless & communication research
  • 11. Home Page For Administrator WiCoReWireless & communication research
  • 12. Administrator Zone WiCoReWireless & communication research
  • 13. Testing WiCoReWireless & communication research TESTING TECHNIQUES  Black Box Testing.  White Box Testing. LEVELS OF TESTING  Unit Testing.  Integration Testing.  System Testing.  User Acceptance Testing.
  • 14. SYSTEM REQUIREMENTS • Server – Machine : Pentium IV Server – Memory : 256 MB DDRAM – Hard Drive : 80 GB HDD – Display : 800x600 17" SVGA Color Monitor – UPS : 5 KVA • Client – Machine : Pentium III Client – Memory : 128 MB DDRAM – Hard Drive : 6 GB HDD – Display : 800x600 17" SVGA Color Monitor – UPS : 2 KVA – Operating System : WINDOWS 9X 2000 – Software : Tomcat 4.1 – Front-end Tool : JSP – Back-end Tool : Oracle-9i HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTS WiCoReWireless & communication research
  • 15. SCOPE FOR FUTURE WORK This system is ever ready to attend the following needs of future: • Interaction with external software. • Facility to send any report by E-mail. • Facility for Unicode generation. • Facility for any advertisement publication. • Any other feature that client needs. WiCoReWireless & communication research