SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2348
UID SECURE TRAVEL IDENTITY
Rohan Ingale1, Kapil Tripathi2, Shubham Hedaoo3, Prashant Itankar4
1,2,3Student, Computer Department, Datta Meghe College of Engineering, Maharashtra, India
4Professor, Computer Department, Datta Meghe College of Engineering, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - UID system is used to create a tool that
manages the handling of passport and license using the
unique identification associated with each individual. The
application deals with allowing the citizens to register for
a unique identity. The ID is supported with a pin. Citizen’s
being issued passport or those have a passport is then
associated with the UID. This helps the citizen to travel
abroad without having the passport. The UID will provide
access to the passport from the airport for the airline from
the centralized server. The details and profile of the citizen
with the photo can be viewed as part of security check. The
crime department can also use the application to trace or
stop any person from travelling abroad. The airline gets a
notification when the airport staff has access to the
citizen’s passport. The crime department can stop or trace
either using the UID or passport number. They could also
pass the name of the person and the system can generate a
list of photo previews of people having a passport. The
citizen uses the UID scheme to apply for license. The
details of the citizen are picked from the registration
database. The citizen is provided with the test details by
the application. The details contain the location, date and
time information. The test details are provided to the
citizen on completion of the test. The license issue and
denial isrecorded.
1. INTRODUCTION
Software design sits at the technical kernel of the
software engineering process and is applied regardless
of the development paradigm and area of application.
Design is the first step in the development phase for any
engineered product or system. The designer’s goal is to
produce a model or representation of an entity that will
later be built. Beginning, once system requirement have
been specified and analyzed, system design is the first of
the three technical activities -design, code and test that is
required to build and verify software. The importance
can be stated with a single word “Quality”. Design is the
place where quality is fostered in software development.
Design provides us with representations of software that
can assess for quality. Design is the only way that we can
accurately translate a customer’s view into a finished
software product or system. Software design serves as a
foundation for all the software ring steps that follow.
Without a strong design we risk building an unstable
system – one that will be difficult to test, one whose
quality cannot be assessed until the last stage
2. LITERATURE SURVEY
Krishnamurthy et.al in defined “Personally identifiable
information” (PII) which can be used to distinguish or
trace an individual’s identity either alone or when
combined with Sunny Sharma and Vijay Rana
http://www.iaeme.com/IJCET/index.asp 14
editor@iaeme.com other information that is linkable to a
specific individual. He used long term data to present a
longitudinal analysis of privacy diffusion on the Web.
This is the first study to measure the diffusion over an
extended period of time. (On the Leakage of Personally
Identifiable Information via Online Social Networks).
Ivancsy et.al in presented three different methods for
identifying web users. Two of them are the most
commonly used methods in web log mining systems,
whereas the third one is novel approach that uses a
complex cookie-based method to identify web users. To
demonstrate the efficiency they developed an
implementation called Web Activity Tracking (WAT)
system that aims at a more precise distinction of web
users based on log data. Furthermore, they presented
some statistical analysis created by the WAT on real data
about the behavior of the Hungarian web users and a
comprehensive analysis and comparison of the three
methods (Analysis of Web User Identification Methods)
Carmagnola et.al in described the conceptualization and
implementation of a framework that provides a common
base for user identification for cross-system
personalization among web -based user-adaptive
systems. However, the framework can be easily adopted
in different working environments and for different
purposes.
Furthermore the framework represents a hybrid
approach which draws parallels both from centralized
and decentralized solutions for user modeling.
Pazzaniet.al discussed algorithms for learning and
revising user profiles that can determine which World
Wide Web sites on a given topic would be interesting to a
user. They described the use of a naive Bayesian
classifier for this task, and demonstrate that it can
incrementally learn profiles from user feedback on the
interestingness of Web sites. Furthermore, the Bayesian
classifier may easily be extended to revise user provided
profiles. (Learning and Revising User Profiles: The
Identification of Interesting Web Sites)Peacock
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
3. METHODOLOGY
The application requires a central server, similar to the
one provided by the ISP. A well connected network of
clients that connect to the server using the http protocol
and a URL is required. Although the OS is not a
dependent factor (JVM), a web server such as Tomcat has
to be installed, configured and available throughout. A
dedicated port number (8080) to which the incoming
request and outgoing response has to be communicated
should be assigned. The database server should be
available for data access JDBC-ODBC drivers are
required. The design of the application is addressed as
follows,
 UID seva centers – Windows Forms ( Web
forms)
 Online / Server – Web forms
Software Development Methodology: Project
planning, feasibility study: Establishes a high-level view
of the intended project and determines its goals. Systems
analysis, requirements definition: Refines project goals
into defined functions and operation of the intended
application. Analyzes end-user information needs.
Systems design: Describes desired features and
operations in detail, including screen layouts, business
rules, process diagrams, pseudo code and other
documentation. Implementation: The real code is written
here. Integration and testing: Brings all the pieces
together into a special testing environment, then checks
for errors, bugs and interoperability. Acceptance,
installation, deployment: The final stage of initial
development, where the software is put into production
and runs actual business.
System Features
Login & Security: The module allows only authorized
users to use the application. The application comes with
a default administrator account. This account has a user
id “Admin” and password “Admin” by default. This user
can change his password as and when necessary. The
administrator maintains UID seva staffs that are
authorized to handle the application and process
transactions for the citizen.
Citizen Registration: The module allows the citizen to
register for unique identity. The citizen provides his
personal information, photo to the registration module.
The module acknowledges by providing an application
number. The citizen uses the application number to then
check the status of the unique identity. The
administrator is responsible to set the allocation status.
Process & Issue Unique Identity: The applications
registered by the citizens are viewed by the
administrator. When the administrator gets the physical
verification report only then he confirms the issue of the
unique identity. The module generates unique
identification number for each application (citizen). The
uid is also associated with a password which can be
changed by the citizen.
Apply Passport: The module allows the citizen to
register application for passport. The module auto fills
the application with the information already available in
the uid regn database. Only when there is a change of
information the citizen should update the uid regn
database and then apply for passport. For citizens
already having passport and wanted change of
information updating the uid region database
automatically updates the passport database.
Passport Processing: The module allows the
administrator to verify the details of the application, set
the status of the passport. If the application is accepted
then the administrator provides the passport number
and the system automatically updates the date of issue
and expiry. This information is now available to the
citizen as well as to the airport authority. The passport is
a digital passport. The verification of the citizen is done
by the crime/police dept.
Crime Control: The module allows the crime
department to view citizen information either using the
uid or the passport number. They can also provide the
name of a person and have photos viewed for the
citizens having identical names, highly useful when only
the name of the person is known. The crime user can also
set the status for a passport such as fly or no fly there by
intimating the airport authority of flying restrictions for
a citizen.
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2359
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
License Monitor: The module allows the citizen to
apply for passport and have the details and the
status of the test. The citizen will not have to submit
any physical form nor have agents in between. The
UID scheme provides digital form and takes up
citizen information from the registration database
and dynamically fills the form. The test centers,
their location are picked up based upon the pin
code the citizen resides at. The RTA provides inputs
on test schedules and test results
SYSTEM ANALYSIS
Existing System: - The citizen is identified by multiple
identity cards. - There is no unique identity in India. -
Passport has to be carried for travel abroad. - Crime
department cannot talk to the private airlines to trace or
stop travel of a citizen instantly. Disadvantage of Existing
System: - The citizen is identified by multiple identity
cards. - There is no unique identity in India unlike the
SSN in the USA. - An individual can hold more than one
passport. - Possibility of passport being lost or damaged.
- Crime department communicates with the Airport
Authority of India physically on stopping or tracing a
citizen in travel. - License can be applied multiple times,
duplication possible, lost or damaged anytime.
Proposed System: - A citizen is provided with a UID.
The id is associated with a pin number. - A physical
verification is taken up by the surveyor on whose
confirmation the ID is issued. - A citizen holding the ID
can only apply for passport or license. -Based on the type
of application the application is forwarded either to the
Police department for verification or to the RTA for
driving test status. - Citizen has an online mode where he
can check the status of each application. - The crime
department integrates with the airlines and identifies
citizen who has a conditional travel.
Advantage of Proposed System For transaction related to
government departments the ID and pin number should
be quoted - The citizen does not have to approach agents
for applications. UID seva centers would facilitate the
application processing. The citizen has his application
auto-filled when he visits the seva centers. No
commission is involved. - The UID doesn’t allow
duplicate application for any type of card. - The citizen
can apply the next time only when he fails a verification
or test. Address changes easily updated.
4. CONCLUSION
The application can now identify each individual
uniquely. Every citizen is identified for all the Govt
transactions with the help of his UID card. The
application integrates various Govt departments into a
single point of Contact. This helps in avoiding
unnecessary delays or find where the delay is happening
when applications are processed. The application can be
extended to all the Govt departments with modification.
New modules can be added without affecting the existing
modules. Usage of biometric devices to identify citizen.
Usage of the card to perform financial transactions.
PAN, Voter ID, Ration Card etc can also be processed by
using this card.
REFERENCES
[1] D. Peralta, I. Triguero, S. García, F. Herrera, J.M.
Benitez, "DPD-DFF: A dual phase distributed scheme
with double fingerprint fusion for fast and accurate
identification in large databases", Information
Fusion, vol. 32, pp. 40-51, November 2016. 2. 2.
[2] S. Valarmathy, R. Ramani, "Automatic Ration
Material Distributions Based On GSM and RFID
Technology", I. J intelligent systems and applications,
vol. 11, pp. 47-54, 2013. 3.
[3] CrossRef Google Scholar 4. 3.
[4] [online] Available:
http://en.wikipedia.org/wiki/Rationcard(India).co
m.
[5] A Parvathy, Venkatta Rohit Raj, Manikantha
Venumadhav, "RFID Based Exam Hall Maintenance
System", IJCA Special Issue on “Artificial Intelligence
Techniques-Novel Approaches & Practical
Applications” AIT, 2011.
[6] K. Balakarthik, Closed-Based Ration Card System
Using RFID and GSM Technology, vol. 2, no. 4, Apr
2013.
[7] [online] Available:
http://www.indiaenvironmentportal.org.in.
[8] Chetan Swapnil, Ashwini ashlesha, Automatic Ration
Distribution System-A Review, IEEE, ISBN 978-9-
3805-4421-2/16.
[9] Mohit Agarwal, Manish sharma, Bhupendra Singh,
Santhanu, Smart Ration Card Using RFID and GSM
Technique, IEEE, ISBN 978-1-4799- 7/14.
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2350

More Related Content

What's hot

IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form FillingIRJET Journal
 
I03402059063
I03402059063I03402059063
I03402059063theijes
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET Journal
 
Railway Concession Automation
Railway Concession AutomationRailway Concession Automation
Railway Concession AutomationIRJET Journal
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence Athari_1996
 
Real time attendance and estimation of performance using business intelligence
Real time attendance and estimation of performance using business intelligenceReal time attendance and estimation of performance using business intelligence
Real time attendance and estimation of performance using business intelligenceeSAT Journals
 
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricOnline Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricIRJET Journal
 
IRJET- Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET- Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET Journal
 
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET -  	  Centralized Data for Transport Automation System using Android St...IRJET -  	  Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...IRJET Journal
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...IJECEIAES
 
Android civil administration reporting
Android civil administration reportingAndroid civil administration reporting
Android civil administration reportingIJARIIT
 
IRJET - Application for Public Issues
IRJET -  	  Application for Public IssuesIRJET -  	  Application for Public Issues
IRJET - Application for Public IssuesIRJET Journal
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 

What's hot (20)

IRJET - Digital KYC with Auto Form Filling
IRJET - 	  Digital KYC with Auto Form FillingIRJET - 	  Digital KYC with Auto Form Filling
IRJET - Digital KYC with Auto Form Filling
 
I03402059063
I03402059063I03402059063
I03402059063
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTINGA DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
 
IRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry PiIRJET- Biometric Attendance Management System using Raspberry Pi
IRJET- Biometric Attendance Management System using Raspberry Pi
 
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT  SERVER AND MYSQLDATABASENEXTGEN’S HOSPILOGICS USING APACHE TOMCAT  SERVER AND MYSQLDATABASE
NEXTGEN’S HOSPILOGICS USING APACHE TOMCAT SERVER AND MYSQLDATABASE
 
Railway Concession Automation
Railway Concession AutomationRailway Concession Automation
Railway Concession Automation
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence
 
MOBILE BASED WOMEN SAFETY APPLICATION REAL-TIME DATABASE
MOBILE BASED WOMEN SAFETY APPLICATION REAL-TIME DATABASEMOBILE BASED WOMEN SAFETY APPLICATION REAL-TIME DATABASE
MOBILE BASED WOMEN SAFETY APPLICATION REAL-TIME DATABASE
 
Real time attendance and estimation of performance using business intelligence
Real time attendance and estimation of performance using business intelligenceReal time attendance and estimation of performance using business intelligence
Real time attendance and estimation of performance using business intelligence
 
Online Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and BiometricOnline Voting System using Aadhaar Card and Biometric
Online Voting System using Aadhaar Card and Biometric
 
IRJET- Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET- Travel Sequence Application
IRJET- Travel Sequence Application
 
ONLINE BUS PASS GERANERATION AND RENEWAL SYSTEM USING MOBILE APPLICATION
ONLINE BUS PASS GERANERATION AND RENEWAL SYSTEM USING MOBILE APPLICATIONONLINE BUS PASS GERANERATION AND RENEWAL SYSTEM USING MOBILE APPLICATION
ONLINE BUS PASS GERANERATION AND RENEWAL SYSTEM USING MOBILE APPLICATION
 
DRIVER ASSISTANCE FOR HEARING IMPAIRED PEOPLE USING AUGMENTED REALITY
DRIVER ASSISTANCE FOR HEARING IMPAIRED  PEOPLE USING AUGMENTED REALITYDRIVER ASSISTANCE FOR HEARING IMPAIRED  PEOPLE USING AUGMENTED REALITY
DRIVER ASSISTANCE FOR HEARING IMPAIRED PEOPLE USING AUGMENTED REALITY
 
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
SAFETY NOTIFICATION AND BUS MONITORING SYSTEMSAFETY NOTIFICATION AND BUS MONITORING SYSTEM
SAFETY NOTIFICATION AND BUS MONITORING SYSTEM
 
IRJET - Centralized Data for Transport Automation System using Android St...
IRJET -  	  Centralized Data for Transport Automation System using Android St...IRJET -  	  Centralized Data for Transport Automation System using Android St...
IRJET - Centralized Data for Transport Automation System using Android St...
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...
 
Android civil administration reporting
Android civil administration reportingAndroid civil administration reporting
Android civil administration reporting
 
IRJET - Application for Public Issues
IRJET -  	  Application for Public IssuesIRJET -  	  Application for Public Issues
IRJET - Application for Public Issues
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 

Similar to IRJET- UID Secure Travel Identity

IRJET- Travel Sequence Application
IRJET-  	  Travel Sequence ApplicationIRJET-  	  Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET Journal
 
IRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance SystemIRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance SystemIRJET Journal
 
COLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEMCOLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEMIRJET Journal
 
IRJET- Human Activity Recognition using Smartphone Sensors
IRJET- Human Activity Recognition using Smartphone SensorsIRJET- Human Activity Recognition using Smartphone Sensors
IRJET- Human Activity Recognition using Smartphone SensorsIRJET Journal
 
IRJET- RTO Automation using QR Code
IRJET-  	  RTO Automation using QR CodeIRJET-  	  RTO Automation using QR Code
IRJET- RTO Automation using QR CodeIRJET Journal
 
IRJET- Event Compass - An Event Management Application
IRJET- Event Compass - An Event Management ApplicationIRJET- Event Compass - An Event Management Application
IRJET- Event Compass - An Event Management ApplicationIRJET Journal
 
ONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATIONONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATIONIRJET Journal
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMIRJET Journal
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET Journal
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based VotingIRJET Journal
 
IRJET- Emergency Accident Reporting using Smartphone
IRJET- Emergency Accident Reporting using SmartphoneIRJET- Emergency Accident Reporting using Smartphone
IRJET- Emergency Accident Reporting using SmartphoneIRJET Journal
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGIRJET Journal
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET Journal
 
IRJET- Traffic Rules Violation System using NFC Card
IRJET-  	  Traffic Rules Violation System using NFC CardIRJET-  	  Traffic Rules Violation System using NFC Card
IRJET- Traffic Rules Violation System using NFC CardIRJET Journal
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 
IRJET- Queue Control System using Android
IRJET- Queue Control System using AndroidIRJET- Queue Control System using Android
IRJET- Queue Control System using AndroidIRJET Journal
 
IRJET - Android based M-Application for Car Parking using QR Code
IRJET - Android based M-Application for Car Parking using QR CodeIRJET - Android based M-Application for Car Parking using QR Code
IRJET - Android based M-Application for Car Parking using QR CodeIRJET Journal
 

Similar to IRJET- UID Secure Travel Identity (20)

IRJET- Travel Sequence Application
IRJET-  	  Travel Sequence ApplicationIRJET-  	  Travel Sequence Application
IRJET- Travel Sequence Application
 
IRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance SystemIRJET- Usage-Based Automotive Insurance System
IRJET- Usage-Based Automotive Insurance System
 
COLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEMCOLLEGE ONLINE ELECTION SYSTEM
COLLEGE ONLINE ELECTION SYSTEM
 
IRJET- Human Activity Recognition using Smartphone Sensors
IRJET- Human Activity Recognition using Smartphone SensorsIRJET- Human Activity Recognition using Smartphone Sensors
IRJET- Human Activity Recognition using Smartphone Sensors
 
IRJET- RTO Automation using QR Code
IRJET-  	  RTO Automation using QR CodeIRJET-  	  RTO Automation using QR Code
IRJET- RTO Automation using QR Code
 
Project synopsis.
Project synopsis.Project synopsis.
Project synopsis.
 
Car Rental System
Car Rental SystemCar Rental System
Car Rental System
 
IRJET- Event Compass - An Event Management Application
IRJET- Event Compass - An Event Management ApplicationIRJET- Event Compass - An Event Management Application
IRJET- Event Compass - An Event Management Application
 
ONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATIONONLINE DOCUMENT VERIFICATION
ONLINE DOCUMENT VERIFICATION
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
 
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using SeleniumIRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
IRJET- An Efficient Automation Framework for Testing ITS Solution using Selenium
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 
IRJET- Emergency Accident Reporting using Smartphone
IRJET- Emergency Accident Reporting using SmartphoneIRJET- Emergency Accident Reporting using Smartphone
IRJET- Emergency Accident Reporting using Smartphone
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 
IRJET- Traffic Rules Violation System using NFC Card
IRJET-  	  Traffic Rules Violation System using NFC CardIRJET-  	  Traffic Rules Violation System using NFC Card
IRJET- Traffic Rules Violation System using NFC Card
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
IRJET- Queue Control System using Android
IRJET- Queue Control System using AndroidIRJET- Queue Control System using Android
IRJET- Queue Control System using Android
 
IRJET - Android based M-Application for Car Parking using QR Code
IRJET - Android based M-Application for Car Parking using QR CodeIRJET - Android based M-Application for Car Parking using QR Code
IRJET - Android based M-Application for Car Parking using QR Code
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

IRJET- UID Secure Travel Identity

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2348 UID SECURE TRAVEL IDENTITY Rohan Ingale1, Kapil Tripathi2, Shubham Hedaoo3, Prashant Itankar4 1,2,3Student, Computer Department, Datta Meghe College of Engineering, Maharashtra, India 4Professor, Computer Department, Datta Meghe College of Engineering, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - UID system is used to create a tool that manages the handling of passport and license using the unique identification associated with each individual. The application deals with allowing the citizens to register for a unique identity. The ID is supported with a pin. Citizen’s being issued passport or those have a passport is then associated with the UID. This helps the citizen to travel abroad without having the passport. The UID will provide access to the passport from the airport for the airline from the centralized server. The details and profile of the citizen with the photo can be viewed as part of security check. The crime department can also use the application to trace or stop any person from travelling abroad. The airline gets a notification when the airport staff has access to the citizen’s passport. The crime department can stop or trace either using the UID or passport number. They could also pass the name of the person and the system can generate a list of photo previews of people having a passport. The citizen uses the UID scheme to apply for license. The details of the citizen are picked from the registration database. The citizen is provided with the test details by the application. The details contain the location, date and time information. The test details are provided to the citizen on completion of the test. The license issue and denial isrecorded. 1. INTRODUCTION Software design sits at the technical kernel of the software engineering process and is applied regardless of the development paradigm and area of application. Design is the first step in the development phase for any engineered product or system. The designer’s goal is to produce a model or representation of an entity that will later be built. Beginning, once system requirement have been specified and analyzed, system design is the first of the three technical activities -design, code and test that is required to build and verify software. The importance can be stated with a single word “Quality”. Design is the place where quality is fostered in software development. Design provides us with representations of software that can assess for quality. Design is the only way that we can accurately translate a customer’s view into a finished software product or system. Software design serves as a foundation for all the software ring steps that follow. Without a strong design we risk building an unstable system – one that will be difficult to test, one whose quality cannot be assessed until the last stage 2. LITERATURE SURVEY Krishnamurthy et.al in defined “Personally identifiable information” (PII) which can be used to distinguish or trace an individual’s identity either alone or when combined with Sunny Sharma and Vijay Rana http://www.iaeme.com/IJCET/index.asp 14 editor@iaeme.com other information that is linkable to a specific individual. He used long term data to present a longitudinal analysis of privacy diffusion on the Web. This is the first study to measure the diffusion over an extended period of time. (On the Leakage of Personally Identifiable Information via Online Social Networks). Ivancsy et.al in presented three different methods for identifying web users. Two of them are the most commonly used methods in web log mining systems, whereas the third one is novel approach that uses a complex cookie-based method to identify web users. To demonstrate the efficiency they developed an implementation called Web Activity Tracking (WAT) system that aims at a more precise distinction of web users based on log data. Furthermore, they presented some statistical analysis created by the WAT on real data about the behavior of the Hungarian web users and a comprehensive analysis and comparison of the three methods (Analysis of Web User Identification Methods) Carmagnola et.al in described the conceptualization and implementation of a framework that provides a common base for user identification for cross-system personalization among web -based user-adaptive systems. However, the framework can be easily adopted in different working environments and for different purposes. Furthermore the framework represents a hybrid approach which draws parallels both from centralized and decentralized solutions for user modeling. Pazzaniet.al discussed algorithms for learning and revising user profiles that can determine which World Wide Web sites on a given topic would be interesting to a user. They described the use of a naive Bayesian classifier for this task, and demonstrate that it can incrementally learn profiles from user feedback on the interestingness of Web sites. Furthermore, the Bayesian classifier may easily be extended to revise user provided profiles. (Learning and Revising User Profiles: The Identification of Interesting Web Sites)Peacock
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 3. METHODOLOGY The application requires a central server, similar to the one provided by the ISP. A well connected network of clients that connect to the server using the http protocol and a URL is required. Although the OS is not a dependent factor (JVM), a web server such as Tomcat has to be installed, configured and available throughout. A dedicated port number (8080) to which the incoming request and outgoing response has to be communicated should be assigned. The database server should be available for data access JDBC-ODBC drivers are required. The design of the application is addressed as follows,  UID seva centers – Windows Forms ( Web forms)  Online / Server – Web forms Software Development Methodology: Project planning, feasibility study: Establishes a high-level view of the intended project and determines its goals. Systems analysis, requirements definition: Refines project goals into defined functions and operation of the intended application. Analyzes end-user information needs. Systems design: Describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudo code and other documentation. Implementation: The real code is written here. Integration and testing: Brings all the pieces together into a special testing environment, then checks for errors, bugs and interoperability. Acceptance, installation, deployment: The final stage of initial development, where the software is put into production and runs actual business. System Features Login & Security: The module allows only authorized users to use the application. The application comes with a default administrator account. This account has a user id “Admin” and password “Admin” by default. This user can change his password as and when necessary. The administrator maintains UID seva staffs that are authorized to handle the application and process transactions for the citizen. Citizen Registration: The module allows the citizen to register for unique identity. The citizen provides his personal information, photo to the registration module. The module acknowledges by providing an application number. The citizen uses the application number to then check the status of the unique identity. The administrator is responsible to set the allocation status. Process & Issue Unique Identity: The applications registered by the citizens are viewed by the administrator. When the administrator gets the physical verification report only then he confirms the issue of the unique identity. The module generates unique identification number for each application (citizen). The uid is also associated with a password which can be changed by the citizen. Apply Passport: The module allows the citizen to register application for passport. The module auto fills the application with the information already available in the uid regn database. Only when there is a change of information the citizen should update the uid regn database and then apply for passport. For citizens already having passport and wanted change of information updating the uid region database automatically updates the passport database. Passport Processing: The module allows the administrator to verify the details of the application, set the status of the passport. If the application is accepted then the administrator provides the passport number and the system automatically updates the date of issue and expiry. This information is now available to the citizen as well as to the airport authority. The passport is a digital passport. The verification of the citizen is done by the crime/police dept. Crime Control: The module allows the crime department to view citizen information either using the uid or the passport number. They can also provide the name of a person and have photos viewed for the citizens having identical names, highly useful when only the name of the person is known. The crime user can also set the status for a passport such as fly or no fly there by intimating the airport authority of flying restrictions for a citizen. © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2359
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 License Monitor: The module allows the citizen to apply for passport and have the details and the status of the test. The citizen will not have to submit any physical form nor have agents in between. The UID scheme provides digital form and takes up citizen information from the registration database and dynamically fills the form. The test centers, their location are picked up based upon the pin code the citizen resides at. The RTA provides inputs on test schedules and test results SYSTEM ANALYSIS Existing System: - The citizen is identified by multiple identity cards. - There is no unique identity in India. - Passport has to be carried for travel abroad. - Crime department cannot talk to the private airlines to trace or stop travel of a citizen instantly. Disadvantage of Existing System: - The citizen is identified by multiple identity cards. - There is no unique identity in India unlike the SSN in the USA. - An individual can hold more than one passport. - Possibility of passport being lost or damaged. - Crime department communicates with the Airport Authority of India physically on stopping or tracing a citizen in travel. - License can be applied multiple times, duplication possible, lost or damaged anytime. Proposed System: - A citizen is provided with a UID. The id is associated with a pin number. - A physical verification is taken up by the surveyor on whose confirmation the ID is issued. - A citizen holding the ID can only apply for passport or license. -Based on the type of application the application is forwarded either to the Police department for verification or to the RTA for driving test status. - Citizen has an online mode where he can check the status of each application. - The crime department integrates with the airlines and identifies citizen who has a conditional travel. Advantage of Proposed System For transaction related to government departments the ID and pin number should be quoted - The citizen does not have to approach agents for applications. UID seva centers would facilitate the application processing. The citizen has his application auto-filled when he visits the seva centers. No commission is involved. - The UID doesn’t allow duplicate application for any type of card. - The citizen can apply the next time only when he fails a verification or test. Address changes easily updated. 4. CONCLUSION The application can now identify each individual uniquely. Every citizen is identified for all the Govt transactions with the help of his UID card. The application integrates various Govt departments into a single point of Contact. This helps in avoiding unnecessary delays or find where the delay is happening when applications are processed. The application can be extended to all the Govt departments with modification. New modules can be added without affecting the existing modules. Usage of biometric devices to identify citizen. Usage of the card to perform financial transactions. PAN, Voter ID, Ration Card etc can also be processed by using this card. REFERENCES [1] D. Peralta, I. Triguero, S. García, F. Herrera, J.M. Benitez, "DPD-DFF: A dual phase distributed scheme with double fingerprint fusion for fast and accurate identification in large databases", Information Fusion, vol. 32, pp. 40-51, November 2016. 2. 2. [2] S. Valarmathy, R. Ramani, "Automatic Ration Material Distributions Based On GSM and RFID Technology", I. J intelligent systems and applications, vol. 11, pp. 47-54, 2013. 3. [3] CrossRef Google Scholar 4. 3. [4] [online] Available: http://en.wikipedia.org/wiki/Rationcard(India).co m. [5] A Parvathy, Venkatta Rohit Raj, Manikantha Venumadhav, "RFID Based Exam Hall Maintenance System", IJCA Special Issue on “Artificial Intelligence Techniques-Novel Approaches & Practical Applications” AIT, 2011. [6] K. Balakarthik, Closed-Based Ration Card System Using RFID and GSM Technology, vol. 2, no. 4, Apr 2013. [7] [online] Available: http://www.indiaenvironmentportal.org.in. [8] Chetan Swapnil, Ashwini ashlesha, Automatic Ration Distribution System-A Review, IEEE, ISBN 978-9- 3805-4421-2/16. [9] Mohit Agarwal, Manish sharma, Bhupendra Singh, Santhanu, Smart Ration Card Using RFID and GSM Technique, IEEE, ISBN 978-1-4799- 7/14. © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2350