Profile of The Problem: Online ID Card Management System Project Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 64
At a glance
Powered by AI
The key takeaways are that the system aims to reduce human effort in generating ID cards through an online portal and storing user information in a centralized database.

The purpose of the ID card management system is to generate, maintain and distribute ID cards for organizations in an efficient manner through a digital process.

The main features of the system include adding user details, uploading photos, printing cards, storing user information in a database, and generating cards in bulk.

Online ID Card Management System Project Report

1. PROFILE OF THE PROBLEM

STAS, Pathanamthitta Page | 1


Online ID Card Management System Project Report

1.1ABOUT THE PROJECT

The present 21 century is a digital era now a day’s development in various aspects of
computer technology has reached beyond all imagination and expectations. Every new day,
new software is launched in the market. Now-a-days with rapid growth of population, people
need to be identified and it is now a must for every organization from a company to a large
country to have the Identity card (ID) for every people. Therefore, now for every organization
an ID card for a person is compulsory. ID card is said to be the summary of any person
indeed. Software has an attractive user interface and easy maintenance facility which helps as
in our working field. The current times demand for desperate and safety in many
organizations. The first step in acquiring such standards begins by issuing ID’s for people.

Here introduce, the project design and implementation of “online ID card generation “is
created to reduce human effort. An identity document is any document which may be used to
verify aspects of a person’s personal identity. A card giving identifying data about a person,
as full name, address, age, and often containing a photograph; for use as identification at a
place of employment, school, club, etc. ID card is generally considered to be the summary of
person’s information.

ID card generation refers to the process to generate, maintain and distribution of the ID cards.
This will also ensure that there is no forgery in the generation of ID card. It will help
generating a huge bulk of ID cards without any confusion.it will help in detecting any forgery
that’s done in the ID card generation. The user interface must be simple and easy to
understand. this will be a useful solution for the enterprises and institution which will reduce
their work. In our system the total process of card generation is done with the help of
computer through this software rather than manually. This Online ID card generator will
provide all the information of the card holder correctly as possible. Person’s information is
collected and stored in database and at the same time the administration can provide the
person’s ID card. So, the concept of time wasting totally eliminated in here.

It will be very effective and user friendly to use. This application will help in having only one
ID card for a person. This application will help in providing various features like photos of
persons, adding person’s details, print card etc. It will also provide permanent database and

STAS, Pathanamthitta Page | 2


Online ID Card Management System Project Report

this will help to store the person’s identity information in an error free and non-redundant
way along with better option for maintaining the records.

The programming has been accomplished in PHP. The administrator and the user can login
using the username and password which they can select according to their choice. Only
restriction is that multiple persons will not be permitted to accept the same username. The
project has been developed in PHP as front end and MY SQL as back end which develop to
help powerful software.
This website is developed in such a way that it makes use of the current hardware as far as
possible in care of up gradation that it should be done. This software is easy to use and has a
good graphical user interface.

STAS, Pathanamthitta Page | 3


Online ID Card Management System Project Report

2. SYSTEM STUDY

STAS, Pathanamthitta Page | 4


Online ID Card Management System Project Report

2.1 INTRODUCTION

System Study is a general term that refers to an orderly, structured


process for identifying and solving problems. We call system Study process lifecycle
methodology, since it relates to four significant phases in the lifecycle of all business
information system. The system is studied to the minute details and analyzed. Analysis
implies the process of breaking something into parts so that the whole may be understood.
The definition of the system analysis includes not only the process of analysis but also that of
synthesis, which implies the process of putting together to form a new whole.

All activities associated with each life cycle phase must be performed, managed and
documented. Hence, we define system analysis as the performance, management,
documentation of the activities related to the life cycle phases of a computer-based business
system. In the study phase a detailed study of the project is made and clear picture of the
project is in mind. In the design phase the designing of the input, output and table designs are
made. Development phase is where the physical designing of the input-output screens and
coding of the system is done. System implementation actually implements the system by
making necessary testing.

2.2 EXISTING SYSTEM

For identification of people they still lie on manual handwritten ID


card and files. In the traditional process the administration has to take sufficient information
about the people. Then the authority authenticates the information and if it’s true they provide
the ID card to its owner. All these process are done manually and for this process is too much
time consuming. Persons are to wait for several days to have their ID cards.
As we consider traditional ID cards, then it will only contain all the details
with hand written and anyone can make the fake ID card easily. When administrator make ID
card with his or her hand writing then it can be filled of error and mistake. Sometimes they
made the mistake of writing wrong name with spelling and so on.
 Sometimes they made the mistake of writing
 This process is too much time consuming
 Authentication problems.

STAS, Pathanamthitta Page | 5


Online ID Card Management System Project Report

 Traditional ID card system will make errors, and redundant data.


 Data manipulating and storing is difficult

2.3 PROPOSED SYSTEM

The proposed system is a ultimate solution for ID card generation. In


this online card generation process is completely done by the computer with the help of the
software. The information of the persons is stored in the database and by this time the
persons ID card can be provided by the administration. As a result there is no tension about
the wastage of time and also the data manipulating and storing is suitable for the whole
process.
If proper ID card system is introduced then it would be much easier to identify a person and
can track his/her progress. Online ID card had image capturing facility and requirements of
an ID and there is no need of hand written ID card.

Online ID card generation is being made computerised to increase efficiency and


reducing of error of human being. The concept of time wasting is totally eliminated in here.
More over this process is highly compatible with data storing data storing manipulating.
The proposed system, design and implementation of online ID card generation is created to
reduce the human effort, which we are to introduce a fully automated solution that will
generate and maintain the ID card.

STAS, Pathanamthitta Page | 6


Online ID Card Management System Project Report

3. PROBLEM ANALYSIS

STAS, Pathanamthitta Page | 7


Online ID Card Management System Project Report

3.1 SYSTEM DEFENITION


The project ID Card Management System is developed using
PHP. The new user can register and only the registered user can go further. The administrator
can control all the operations in the website. He can also modify and upload data to the
website. The registered user can see all information about the products, searching and
viewing product details. The website is designed in such a way that the future plans of
expansion can be implementing easily without affecting the existing features. The website
and its operations should be safe and unauthorized access should not be allowed. The user is
able to view the product details only if he is logged in and active user.

3.2 FEASIBILITY ANALYSIS

A feasibility study is a test of system proposal according to its


workability, impact on the organization, ability to meet user needs, and effective use of
resources. The objective of feasibility study is acquiring a sense of the scope of the system.

The feasibility of a project can be ascertained in terms of technical


factors, economic factors, or both. A feasibility study is documented with a report showing
all the ramifications of the project. It is very important to evaluate the feasibility study and
risk analysis is related in many ways. If the project study is great, the feasibility of producing
quality software is reduced.

The key factors considered during the feasibility study are:

1. Economic Feasibility
2. Behavioral Feasibility
3. Technical Feasibility
4. Operational Feasibility
5. Legal Feasibility

STAS, Pathanamthitta Page | 8


Online ID Card Management System Project Report

3.2.1 ECONOMIC FEASIBILITY

Economic analysis is the most commonly used method for evaluating


effectiveness of a system. Cost-benefit analysis is the most important assessment of economic
justification of the project. Cost –benefit analysis delineates the cost for project development
and weighs them against tangible and intangible benefits of a system. This type of analysis
varies with the characteristics of the system to be developed, the relative site of the project,
and the expected return on investment. Benefits of a new system are always determined
relative to the existing mode of operation.

Economic feasibility deals about the economic impact faced by the


organization to implement the new system. Not only cost of hardware, software etc. is
considered but also the form of reduced costs. The project, installed certainly be beneficial
since there will be a reduction in manual wok, increase in speed of work. The analysis raises
financial and economic questions during the preliminary investigation to estimate the
following:

 The cost to conduct a full systems investigation.


 The cost of hardware and software for the class of application of the project being
considered.

To be judged feasible, a proposal for the specific project must pass all these tests, otherwise it
is not considered as a feasible project. I gathered the details regarding the financial aspects
incorporated in the system to make it cost efficient.

3.2.2 BEHAVIORAL FEASIBILITY

Proposed projects are beneficial only if they can be turned into


information systems that will meet the operating requirements of the organization. This test
of feasibility asks if the system will work when it is developed satisfies all the operational
conditions. It was the most difficult task for me, but met efficiently.

STAS, Pathanamthitta Page | 9


Online ID Card Management System Project Report

As this package is found to be feasible technically, economically and


functionally, the system is judged feasible. Viewing the collected information,
recommendation and justification, conclusions is made of the proposed system. Hence
decision is taken to go on with the project.

3.2.3 TECHNICAL FEASIBILITY

There are a number of technical issues, which are generally raised during
the feasibility stage of the investigation. A study of function, performance and constraints
gave me the ability to achieve acceptable system. The software required for this system is:

 PHP
 MySQL

3.2.4 OPERATIONAL FEASIBILITY

Suppose for a moment that technical and economic resources are both
judged adequate. The systems analyst must still consider the operational feasibility of the
requested project. Operational feasibility is dependent on human resources available for the
project and involves projecting whether the system will operate and be used once it is
installed. If users are virtually wed to the present system, see no problems with it, and
generally are not involved in requesting a new system, resistance to implementing the new
system will be strong. Chances for it ever becoming operational are low.

3.2.5 LEGAL FEASIBILITY

A determination of any infringement, violation, or liability that could


result from development of the system. Legal feasibility encompasses a broad range of
concerns that include contracts, liability, infringement, and myriad other traps frequently
unknown to technical staff.

STAS, Pathanamthitta Page | 10


Online ID Card Management System Project Report

3.3 PROJECT PLAN

Planning is very important in every aspect of development work. Good


managers carefully monitor developments at various phases. Improper planning leads to
failure of the project. Software project pan can be viewed as the following:

1. Within the organization: How the project is to be implemented? What are various
constraints? What is market strategy?

2. With respect to the customer: Weekly or timely meetings with the customer with
presentations on status reports. Customer feedback is also taken and further modifications
and developments are done. Project milestones and deliverables are also presented to the
customer. For a successful project the following steps can be followed:

Selection of project: Includes identifying project’s aims and objectives, understanding


requirements and specification, methods of analysis, design and implementation, testing
techniques and documentation.

 Project milestones and deliverables.


 Project estimates: including cost, time, size of code and duration.
 Resource allocation: including hardware, software, previous relevant project
information and digital library.
 Risk management: including risk avoidance, risk detection, risk control and risk
recovery.
 Scheduling techniques: including work breakdown structure, activity graph, critical
path method, Gantt chart and Program Evaluation Review Technique.
 People: including staff recruitment, team management and customer interaction.
 Quality control and standard.

STAS, Pathanamthitta Page | 11


Online ID Card Management System Project Report

Fig: Gantt chart

STAS, Pathanamthitta Page | 12


Online ID Card Management System Project Report

4. REQUIREMENT ENGINEERING

STAS, Pathanamthitta Page | 13


Online ID Card Management System Project Report

4.1 INTRODUCTION
Requirement analysis involves studying the current system to find out how
it works and where improvements could be made. A clear idea about the existing system is a
must for making improvements where it is required. Proper planning and collection of data
serves the purpose. The popularity of this document is to describe all the requirements for the
popularity of the website for ‘ONLINE ID CARD MANAGEMENT SYSTEM’. This
website gives all the information for a person. In our busy life, we cannot go to each
department or offices. This problem will manage this site. It will help to avoid in correction
and missing data.

4.2 SPECIFIC REQUIREMENTS

HARDWARE REQUIREMENTS:
CPU - 1.8 GHz or faster processor
HARD DISK SPACE - Minimum 160GB
RAM - 2GB or more

WEB SERVER - APACHE


INTERNET TOOLS - HTML, CSS, JavaScript, JSON, AJAX, Bootstrap,
jQuery
CODING LANGUAGE - PHP
FRONT END - Microsoft Visual Studio Code
BACK END - MySQL
OPERATING SYSTEM - Windows (Any Version)
SOFTWARE REQUIREMENTS:

Introduction to PHP
PHP, stands for "Hypertext Preprocessor" is an extremely popular scripting
language that is used to create dynamic Web pages. Combining syntax from the C, Java

STAS, Pathanamthitta Page | 14


Online ID Card Management System Project Report

and Perl languages, PHP code is embedded within HTML pages for server-side
execution. PHP is used to develop Static websites or Dynamic websites or Web
applications. A scripting language is a language that interprets scripts at runtime. Scripts
are usually embedded into other software environments.

PHP is a powerful PHP framework designed for PHP coders who are looking for a simple
and elegant toolkit to form full-featured web applications. CodeIgniter can develop projects
much faster by providing a set of libraries for commonly desired tasks, and a simple interface
and logical structure to access these libraries. It has simple installation process with minimum
configuration, and avoids PHP version conflict. It can work well with most of the shared and
dedicated hosting platforms.

 PHP files can contain text, HTML, CSS, JavaScript, and PHP code
 PHP code are executed on the server, and the result is returned to the browser as plain
HTML
 PHP files have extension ".php"
 PHP can generate dynamic page content
 PHP can create, open, read, write, delete, and close files on the server
 PHP can collect form data
 PHP can send and receive cookies
 PHP can add, delete, modify data in your database
 PHP can restrict users to access some pages on your website
 PHP can encrypt data
 PHP runs on various platforms (Windows, Linux, Unix, Mac OS X, etc.)
 PHP is compatible with almost all servers used today (Apache, IIS, etc.)
 PHP supports a wide range of databases
 PHP is easy to learn and runs efficiently on the server side

STAS, Pathanamthitta Page | 15


Online ID Card Management System Project Report

JavaScript
JavaScript is an object based, cross-platform, loosely typed multiuse programming
language that is used to add interactivity to the web pages. A JavaScript is a program that is
included on an HTML page. Because it is enclosed in the <SCRIPT> tag, the text of the
script doesn't appear on the user's screen, and the Web browser knows to run the JavaScript
program. The <SCRIPT> tag is most often found within the <HEAD> section of the
HTML page. Scripts that write text to the screen or that write HTML is best put in the body
section. JavaScript allows you create an active interface, giving the users feedback as they
navigate your pages. JavaScript can be used to make sure that your users enter valid
information in forms, which can save time and money. If the forms require calculations,
you can do them in JavaScript on the user's machine without needing to use a complex
server CGI.

With JavaScript, you have the ability to create custom HTML pages depending on
actions that the user takes. JavaScript controls the browser, because JavaScript has a set of
date and time features. Java script deals with commands called event handles. An action by
the user on the page triggers an event handler in your script. JavaScript is case sensitive.
Scripts can be put in either of two places on an HTML pages: between the <HEAD> and
</HEAD> tag or between the <BODY> and </BODY> tag. One of the main uses of
JavaScript is to provide feedback to people browsing your site. An alert window can be
created that pops up and gives the user the vitally important information that they need to

STAS, Pathanamthitta Page | 16


Online ID Card Management System Project Report

know about the page. Different languages versions can be have had on different scripts on
one page.
MySQL
MySQL is an open-source relational database management system (RDBMS). A relational
database organizes data into one or more data tables in which data types may be related to
each other; these relations help structure the data. SQL is a language programmer use to
create, modify and extract data from the relational database, as well as control user access to
the database. In addition to relational databases and SQL, an RDBMS like MySQL works
with an operating system to implement a relational database in a computer's storage system,
manages users, allows for network access and facilitates testing database integrity and
creation of backups.

MySQL is free and open-source software under the terms of the GNU General Public
License, and is also available under a variety of proprietary licenses. MySQL has stand-alone
clients that allow users to interact directly with a MySQL database using SQL, but more often
MySQL is used with other programs to implement applications that need relational database
capability.

MySQL is used by many database-driven web applications, including Drupal, Joomla,


phpBB, and WordPress. MySQL is also used by many popular websites, including Facebook,
Flickr, MediaWiki, Twitter, and YouTube.

 MySQL is a database system used on the web.


 MySQL is a database system that runs on a server.
 MySQL is ideal for both small and large applications.
 MySQL is very fast, reliable, and easy to use.
 MySQL supports standard SQL.
 MySQL compiles on a number of platforms.
 MySQL is free to download and use.
 MySQL is developed, distributed, and supported by Oracle Corporation.
 PHP combined with MySQL are cross-platform (you can develop in Windows and serve
on a Unix platform).

STAS, Pathanamthitta Page | 17


Online ID Card Management System Project Report

5. MODELING

STAS, Pathanamthitta Page | 18


Online ID Card Management System Project Report

5.1 INTRODUCTION
We create models to obtain a better understanding of the actual entity to be
built. The model focuses on what the system must do and not on how it does it. The second
and third operational analysis principles require that we build modules of function and
behavior. The written word is a wonderful vehicle for communication, but it isn't
necessarily the best way to represent the requirements for computer software. Analysis
modeling uses a combination of text and diagrammatic forms to depict requirements for
data, function, and behavior in a way that is relatively easy to understand, and more
important, straightforward to review for correctness, completeness and consistency. This
section presents resources for conventional and object-oriented analysis (OOA) methods as
well as resources for UML. Analysis modeling is an extremely robust subject.

5.2 GENERAL DESCRIPTION


Requirement Modelling approaches are
1. Scenario-Based modeling
o Use Case Diagram
2. Data modeling
o ER Diagram
3. Class based modeling
o Class diagrams
4. Behavioral modeling
o State Diagram

5.2.1 Scenario-Based modeling


Scenario based modeling represents requirements from the point of
view of various system ‘actors’. Requirement modeling begins with the creation of
scenarios in the form of use case diagrams.

STAS, Pathanamthitta Page | 19


Online ID Card Management System Project Report

o Use Case Diagram


Use cases help to determine the functionality and features of the
software from user’s perspective. A use case describes how a user interacts with the system
by defining the steps required to accomplish a specific goal. Variations in the sequence of
steps describe various scenarios. In the diagram the stick figure represents an actor that is
associated with one category of user. In the use-case diagram the use cases are displayed as
ovals.

The actors are connected by lines to the use cases that they carry out. The use
cases are placed in a rectangle but the actors are not .This rectangle is a visual remainder of
the system boundaries and that the actors are outside the system.
Admin

Providing Information
Searching Information

Deleting Information
Modifying Account

Generating ID Card

Saving Information
Printing ID Card
Student

STAS, Pathanamthitta Page | 20


Online ID Card Management System Project Report

Fig: Use Case Diagram

5.2.3 Data Modeling

If software requirements include the need to create, extend, or


interface with a database, the software team may choose to create a data model as part of
overall requirements modeling. It defines all data objects that are processed within the
system, the relationship between the data objects, and other information that is pertinent to
the relationships. The entity –relationship diagram (ERD) addresses these issues and
represents all data objects that are entered, stored, transformed, and produced within an
application. Data modeling tools provide a software engineer with the ability to represent data
object, their characteristics, and their relationships. Used primarily for large database
applications and other information systems projects, data modeling tools provide an
automated means for creating comprehensive entity relation diagrams, data object
dictionaries, and related models.

An E-R diagram may also indicate the cardinality of a


relationship. Cardinality is the number of instances of one entity that can, or must, be
associated with each instance of another entity. In general, we may speak of one-to-one, one-
to-many, or many-to-many relationships.

Rectangle which represents entity sets.

Diamond which represents relationship sets.

Ellipse which represents attributes.

STAS, Pathanamthitta Page | 21


Online ID Card Management System Project Report

Lines which link attributes to entity sets and entity sets to


relationship sets.

s
u n
s p a s
e a um i
s b
r ne d
s a p
n a
w t h
a M m S
o c o
m e A t
r a h n
e n i d u
d i em
a n a m d
g a s g i e
e d _ e n n
s d a t
n
r dd
a
e do
m
s r b
e
s re
es
gs

Fig: ER Diagram

STAS, Pathanamthitta Page | 22


Online ID Card Management System Project Report

6. DESIGN

STAS, Pathanamthitta Page | 23


Online ID Card Management System Project Report

6.1 INTRODUCTION
Design for Web apps encompasses technical and non-technical activities
that include: establishing the look and feel of the Web app, creating the aesthetic layout of the
user interface, defining the overall architectural structure, developing the content and
functionality that reside within the architecture, and planning the navigation that occurs
within the Web app.
Design allows you to create a model that can be assessed for quality and
improved before content and code are generated, tests are conducted, and end users become
involved in large numbers. Design is the place where Web app quality is established.
In general, the following design objectives must be kept in mind;

 Practicality of the System


 Efficiency of the System
 Minimized cost of the System
 Flexibility of the System
 Security of the System
The system design involves first logical design and then physical
construction of the system. The logical design describes structure and characteristics of
features, like the outputs, inputs, databases and procedures. The physical construction which
follows the logical design produces actual program software files and the working system.

System design sits at the technical kernel of the software engineering and is applied

regardless of the software process model that is used. Beginning once software requirements

have been analyzed and specified, software design is the first technical activity that is used to

build and verify the software. Each activity (designing, coding and testing) transforms

information in a manner that ultimately results in validated computer software.

STAS, Pathanamthitta Page | 24


Online ID Card Management System Project Report

6.2 USER INTERFACE DESIGN


The interface describes how the software communicates with itself. The

user interface is the link between the users and the employers. A well-designed user interface

makes it very easy for users to learn software. The user interface portion of software is

responsible for all interaction with the user. Development of good user interface usually takes a

significant portion of the total system development effort. GUI can be defined as a program

interface that takes advantages of the computer’s graphic capabilities to make the program

easier to use.

The “ONLINE ID CARD MANAGEMENT SYSTEM” is a web based

one. Web application use client/server architecture. The web application resides on a server and

responds to request from multiple clients over the Internet on the client side, a browser, such as

Internet Explorer, Netscape Navigator, hosts the Web application. The application’s user

interface takes the form of HTML pages that are interpreted and displayed by the client’s

browser. On the server side, the Web application runs under Microsoft Internet Information

Services (IIS). IIS manages the application, passes requests from clients to the application, and

returns the application’s response to the client.

6.3 CONTENT DESIGN


Content design focuses on two different design tasks, each addressed by
individuals with different skill test sets. First, a design representation for content objects and
the mechanisms required to establish their relationship to one another is developed. In
addition, the information within a specific content object is created. The latter task may be
conducted by copywriters, graphic designers, and others who generate the content to be used
within a Web app.

STAS, Pathanamthitta Page | 25


Online ID Card Management System Project Report

In the “ ONLINE ID CARD MANAGEMENT SYSTEM” admin has


the total control to the website. Admin will manage all registration and report generation.
Admin enters student details and generate ID card based on these details. Admin can choose
different types of ID card templates. All the information of students is stored in the database.
Therefore, we can print again the ID card when it is missed.

6.4 ARCHITECTURAL DESIGN


It is tied to the goals established for a web App, the content to be
presented, the user who will visit and the navigation philosophy that has been established. As
an architectural designer, you must identify content architecture and WebApp Architecture.
Content architecture focuses on the manner in which content objects are structured for
presentation and navigation. WebApp Architecture addresses the manner in which the
application is structured to manage user interaction, handle internal processing tasks, effect
navigation and present content. Architectural design - creates a blueprint for the design with
the necessary specifications for the hardware, software, people and data resources. In this
project n-Tier architecture is used for development. It can use objects for handling business
rules and data access. It has multiple servers handling business services.

6.5 NAVIGATION DESIGN


Once the WebApp Architecture has been established and the component of
the architecture has been identified, you must define navigation path way that enable users to
access WebApp content and functions. To accomplish this, you should
(1) Identify the semantics of navigation for different users of the site.
(2) Define the mechanics of achieving the navigation.
The main pages used in the system are,

7.6 COMPONENT LEVEL DESIGN

STAS, Pathanamthitta Page | 26


Online ID Card Management System Project Report

Modern Webapp deliver increasingly sophisticated processing functions


that,
(1) Perform localized processing to generate content and navigation capability in a dynamic
fashion,
(2) Provide computation or data processing capability that is appropriate for the Webapp’s
business domain,
(3) Provide sophisticated database query and access,
(4) Establish data interface with external cooperate system.

6.7 DATABASE DESIGN


The most important aspect of building an application is the
design of database. The data they store must be organized according to the user requirement.
A well-designed database is essential for the good performance of the system. A database
table known as a relation provides information related to specific entity.
The basic functions involved in a database system related to the information required by the
user are:
 Defining the data
 Input the data
 Locating the data
 Communicating the data

Database Name: ECARD


* Primary Key

User_Info

FIELD NAME DATA SIZE CONSTRAINTS DESCRIPTION

* USERNAME VARCHAR 40 PRIMARY KEY Username of the user

PASSWORD VARCHAR 30 NOT NULL Password of the user

NAME VARCHAR 35 NOT NULL Name of the user

STAS, Pathanamthitta Page | 27


Online ID Card Management System Project Report

SEC_QSTN VARCHAR 120 NOT NULL Security Question

SEC_ANS VARCHAR 30 NOT NULL Security Answer

Student_Info

FIELD DATA SIZE CONSTRAINTS DESCRIPTION


NAME

UNAME VARCHAR 40 NOT NULL Username of the user

SNAME VARCHAR 35 NOT NULL Student Name

SID VARCHAR 15 NOT NULL Student ID

BATCH VARCHAR 50 NOT NULL Batch

ADDRESS VARCHAR 20 Address

INST_ADDR VARCHAR 160 NOT NULL Institution Address

PHONE VARCHAR 180 NOT NULL Phone Number

REG_DATE VARCHAR 13 NOT NULL Registration Date

DOB VARCHAR 30 NOT NULL Date of Birth

PATH MEDIUMTEXT NOT NULL Image Path

STAS, Pathanamthitta Page | 28


Online ID Card Management System Project Report

6.8. DIAGRAMS

6.8.1 Data flow Diagram (DFD)

The data flow diagram (DFD) is one of the most important tools used
by system analysts. Data flow diagrams are made up of a number of symbols, which
represent system components. Most data flow modeling methods use four kinds of symbols.
These symbols are used to represent four kinds of system components. Possesses, data stores,
data flows and external entities are the components. Circles in DFD represent a process. Data
flow is represented by a thin line in DFD and square or rectangle represents external entities.

Unlike detailed flow chart, data flow diagrams do not


supply detailed description of the modules but graphically describes a system’s data and how
the data interact with the system.

Symbols used in DFD are:

Square, this defines source or destination of data

Arrow, which shows data flow

Circle, which represents a process that transforms

STAS, Pathanamthitta Page | 29


Online ID Card Management System Project Report

incoming data into outgoing flow

Open rectangle, which shows a data store

Level-0

User Request Response User

ID Card
Generator

Level-1

Register User_Info

User Login

ID Card
Generator Student_Info

STAS, Pathanamthitta Page | 30


Online ID Card Management System Project Report

7. CODING

STAS, Pathanamthitta Page | 31


Online ID Card Management System Project Report

7.1 INTRODUCTION
The coding step is a process that transforms design into a programming
language. It translates a detail design representation of software into a programming language
realization. The translation process continues when a compiler accepts source code as input
and produces machine-dependent object code as output. Quality is an important goal during
coding. The quality of source code can be improved by the use of structured coding
techniques; good coding style and readable, consistent code format. During coding, some
coding standards are to be followed. This has two purposes; reducing the chance of making it
easier for some time to modify the code later on. Coding phase affects both testing and
maintenance profoundly. The “ONLINE ID CARD MANAGEMENT SYSTEM” uses
PHP as the programming language for coding.

STAS, Pathanamthitta Page | 32


Online ID Card Management System Project Report

8. TESTING

STAS, Pathanamthitta Page | 33


Online ID Card Management System Project Report

8.1 INTRODUCTION
The purpose of system testing is to identify and correct errors in the candidate
system. Testing is an important element of the software quality assurance and represents the
ultimate review of specification, design and coding. The increasing visibility of the software
as a system element and the costs associated with a software failure are motivated forces for
well planned, through testing.

Software testing is a critical element of software quality assurance and


represents the ultimate quality review of specifications, design and code generation. Once the
source code has been generated, the program should be executed before the customer gets it
with the specific intend of fining and removing all errors, test must be designed using
disciplined techniques. Testing techniques provides the systematic guidance for designing
tests. To uncover the errors in the program behavior function and performance the following
steps to be done:
 Execute the integral logic of the software components.
 Execute the input and output domains of the program to uncover errors

During testing the system is used experimentally to ensure that the software
does not fail, i.e., it will run according to the specification and in the way the user expects.
Preparation of test data plays n vital role in the system testing. Different set of test data are
generated and the system under study is tested using that data. While testing using test data
errors are again uncovered and corrected using different testing techniques.

STAS, Pathanamthitta Page | 34


Online ID Card Management System Project Report

System testing was conducted in order to detect errors and for comparing then
the final system with the requirement specification report. That is, whether the system meets
requirements. During testing the software was executed with a set of test cases and the output
of the program for the test cases was evaluated to determine if the program is performing as it
was expected to.

Testing presents, an interesting challenge for the software engineer attends to


hold software from an abstract concept to an acceptable implementation. In testing engineer
creates a series of test cases that o c c u r s w h e n e r r o r s a r e uncovered. Testing is the
process of executing a program for finding errors. A good test is one that has high probability
of finding an uncovered error

The turn error is used to refer the difference between the actual output of the
software and the correct output. Fault is a condition that causes the software to fail to perform
its required function. Software reliability is defined as the required function.

Software reliability is defined as the probability that the software will not
undergo failure for a specified time under specified condition. Failure is the inability of a
system or a component to perform a required function according to its specification.
Different levels of testing were employed for software to make an error free, fault free and
reliable. Basically, in software testing four type of testing methods are adopted.

8.2 CONTENT TESTING


Content testing checks that users can easily understand all items that appear on
a site and, importantly, that they are able to correctly interpret the information they read.
Accordingly, it identifies any problem areas that may require simplification or rewriting. The
overall purpose of testing a content concept is to figure out what content strategy you should
follow throughout the project. This system was tested for successful acceptance and was
found to be working properly.
Content should be logical and easy to understand. Check for spelling errors.
Use of dark colors annoys users and should not be used in site theme. “ONLINE ID CARD
MANAGEMENT SYSTEM” follows some standards that are used for web page and

STAS, Pathanamthitta Page | 35


Online ID Card Management System Project Report

content building. These are common accepted standards like mentioned above about
annoying colors, fonts, frames, etc. Content should be meaningful. All the anchor text links
should be working properly. Images should be placed properly with proper sizes. These are
some basic standards that are followed in “ONLINE ID CARD MANAGEMENT
SYSTEM”

8.3 USER INTERFACE TESTING

This tests the whole end to end scenario (which simulates


exactly what the user would be doing). This (for the most part) goes through all the mouse
clicks and keyboard presses the user goes through to get an action done. If we extend the
previous example this would be invoking the same action except that this time instead of
using any test hooks it would be using the keyboard shortcut and instead verify the actual
displayed results on the application. User Interface testing is a process to test “ONLINE ID
CARD MANAGEMENT SYSTEM” user interface and to detect if application is
functionally correct. User Interface testing involves carrying set of tasks and comparing the
result of same with the expected output and ability to repeat same set of tasks multiple times
with different data input and same level of accuracy. User Interface Testing includes how the
“ONLINE ID CARD MANAGEMENT SYSTEM” handles keyboard and mouse events,
how different GUI components like menu bars, toolbars, dialogs, buttons, edit fields, list
controls, images etc. reacts to user input and whether or not it performs in the desired
manner. Implementing User Interface testing for your application early in the software
development cycle speeds up development, improves quality and reduces risks towards the
end of the cycle. User Interface Testing can be performed both manually with a human tester
or could be performed automatically with use of a software program.

8.4 COMPONENT LEVEL TESTING


Component level testing similar to unit testing but with a higher level of
integration. The big difference here is that the testing is done in the context of the application

STAS, Pathanamthitta Page | 36


Online ID Card Management System Project Report

instead of just directly testing the method in question. While testing at the component level
you would have the application open and the document displayed but you would be testing
the method and evaluating its result.(without taking into account the shortcut or what get
displayed on the application afterwards). In “ONLINE ID CARD MANAGEMENT
SYSTEM”, the system consists of several modules. All modules are tested and were found to
be working properly.

8.5 NAVIGATION TESTING


Navigation testing confirms that all internal and external links of “ONLINE
ID CARD MANAGEMENT SYSTEM” are working properly. There is no any broken link
or orphan page in application. Once the first layers of the Software have been examined, it is
time to perform simple tests to probe the quality of the global Software navigation. Good
Software will provide consistent, well-executed navigation and should provide alternative
navigation schemes, such as Software maps, indexes, and search engines. First, look to make
sure that placement of navigation is consistent from page to page. Subtle shifting may occur,
so try browsing the site extremely fast and notice whether the menu items bounce or jump
position slightly from page to page. Even this minor variation can break the perceived
stability of a site. Next, look to see how robust the navigation is and whether multiple forms
of Software navigation are supported. Numerous navigation execution questions should be
asked during this phase. The current location clearly indicated with labels or link path
indicators. The Software has text links at the bottoms of pages. Alternative text used for
graphical navigation buttons. The Software requires excessive scrolling.

8.6 CONFIGURATION TESTING


The process of testing a system with each of the configuration of software and
hardware that are supported. Configuration testing is another variation on traditional
performance testing .Rather than testing for performance from the perspective of load you are
testing the effects of configuration changes in the application landscape on application

STAS, Pathanamthitta Page | 37


Online ID Card Management System Project Report

performance and behavior. “ONLINE ID CARD MANAGEMENT SYSTEM” was tested


for successful acceptance and was found to be working properly.

8.7 SECUTITY TESTING


Security testing is the process to determine that an information system protects
data and maintain functionality as intended. During security testing, the tester plays roles of
the individual who desires to penetrate the system. The tester may attempt to acquire
passwords through external clerical means; may attack the system with custom software
designed to breakdown any defenses that have been constructed; may overwhelm the system,
thereby denying service to others; may cause system errors, hoping to find the key to system
entry.
“ONLINE ID CARD MANAGEMENT SYSTEM” was tested for successful
acceptance i.e., she/he have to enter username or password to enter to the system. If the
username and password is not correct the message invalid username or password is
displayed. So unauthorized user cannot access the system.

8.8 PERFORMANCE TESTING


Performance testing is designed to test the run time performance of software
within the context of an integrated system. Performance testing occurs throughout all steps in
the testing process. Even at the unit level, performance of individual module may be assessed
as white box tests are conducted, it is not until all system elements are fully integrated that
true performance of a system can be ascertained. This system was tested for successful
acceptance and was found to be working properly.

STAS, Pathanamthitta Page | 38


Online ID Card Management System Project Report

8.9 TEST CASES


A test case is a document that describes an input, action or event and an
expected response, to determine if a feature of an application is working correctly. A test case
should contain particulars such as test case identifier, test case name, test conditions, input
data requirements steps, and expected results.

Test cases
Project Title : “ONLINE ID CARD MANAGEMENT SYSTEM”
Software Tool : PHP
Test objective : To check whether the entered User name and Password are valid or invalid.
Test data : User name = admin and password = admin
Step Steps Data Expected results Actual
no: results
1 Enter User name and User name = Should display warning Login
press LOGIN Button admin message box "Please Enter failed
Password"
2 Enter Password and Password = Should display warning Login
press LOGIN Button admin message box "Please Enter failed
User name “
3 Enter User name and User = admin Should display warning Login
Password and press and Password = message box "Invalid User failed
LOGIN Button XYZ name or Password"

4 Enter User name and User = XYZ and Should display warning Login
Password and press Password = message box "Invalid User failed
LOGIN Button admin name or Password"
5 Enter User name and User = xyz and Should display warning Login
Password and press Password = xyz message box "Invalid User failed
LOGIN Button name or Password"
6 Enter User name and User = “ ” and Should display warning Login

STAS, Pathanamthitta Page | 39


Online ID Card Management System Project Report

Password and press Password = “ ” message box "Please Enter failed


LOGIN Button User name and Password“
7 Enter User name and User = admin Should navigate to admin Login
Password and press and password home page made
LOGIN Button =admin

9. IMPLEMENTATION

STAS, Pathanamthitta Page | 40


Online ID Card Management System Project Report

9.1 IMPLEMENTATION OF THE PROJECT


The implementation is the final stage and it is an important phase. It
involves the individual programming; system testing, user training and the operational
running of developed proposed system that constitutes the application subsystems. One major
task of preparing for implementation is education of users, which should really have been
taken place much earlier in the project when they were being involved in the investigation
and the design.

The implementation phase of the software development is concerned with


translating design specifications into source code. The user tests the developed system and
changes are made according to their needs. Our system has been successfully implemented.
Before implementation several tests have been conducted to ensure that no errors are
encounter during the operation. The implementation phase ends with an evaluation of the
system after placing it into operation for a period of time. Implementation is the third phase
of the system process. In order to achieve the objectives and the expected performance the
system has been developed in a highly interactive and user-friendly manner.

9.2 POST-IMPLEMENTATION AND SOFTWARE MAINTENANCE


Maintenance involves the software industry captive, typing up system
resources. It means restoring something to its original condition. Maintenance involves a
wide range of activities including correcting, coding, and design errors, updating
documentation and test data, and upgrading user support. Maintenance was done after the
success implementation. Maintenance is continued till the product is reengineered or
deployed to another platform. Maintenance is also done based on fixing the problems
reported, changing the interface with other software or hardware enhancing the software.

STAS, Pathanamthitta Page | 41


Online ID Card Management System Project Report

10. PROJECT LEGACY

STAS, Pathanamthitta Page | 42


Online ID Card Management System Project Report

10.1 CURRENT STATUS OF THE PROJECT


The project “ONLINE ID CARD MANAGEMENT SYSTEM”
computerizes all the manual activities in the existing site. As the technology grows, we must
adopt the advantages of the technologies to our organization.
The project titled “ONLINE ID CARD MANAGEMENT SYSTEM”
has been done successfully and satisfies all the requirements specified. This system helps in
providing live data to the authorities and help in decision making without wastage of time.
This website provides a user-friendly approach towards the system. This
system has been well developed and when implemented, is bound to satisfy all of the
requirements. Painstaking efforts have been taken to make the system impeccable and
upgradeable. There is a hope that this website will be utilized to its maximum and will do a
good job in the long run. With blessings of God, the exertions are hoped to bear fruit.
The program for carrying out various activities have been run and
successfully tested to ensure that the website developed meets the needs satisfactorily. Any
users can process this system without any experience in any software products. The newly
developed system consumes less processing time and all the details are updated and
processed immediately. Modules are designed to be highly flexible so that any failure
requirements can be easily added to the modules without facing many problems.

10.2 REMAINING AREAS OF CONCERN


The existing system is a manual one. Though the proposed system tries to
overcome the limitations of the existing system, we cannot say that the proposed system is
fully developed. So, the proposed system is developed with an insight that further
modifications can be applied. 

STAS, Pathanamthitta Page | 43


Online ID Card Management System Project Report

Evolution in technology will give the customer more sophisticated


service. The “ONLINE ID CARD MANAGEMENT SYSTEM” system will give a small
part of its actual working. Introducing the distributed database concept can make further
extension to this system. Module related to the functions of Product Dealers will add in
future. Trial test may conduct in future.

11. SOURCE CODE

STAS, Pathanamthitta Page | 44


Online ID Card Management System Project Report

<!doctype html>
<html>

<head>
<meta charset="utf-8">
<link rel="icon" href="bgs/eCARD.png" type="image/png">
<title>ECARD LOGIN</title>
<meta name="viewport" content="width=device-width, initial-
scale=1.0">
<link rel="icon" href="bgm/favcon.ico" type="image/icon">
<link rel="stylesheet" href="css/bootstrap.min.css">
<link rel="stylesheet" href="css/mdb.min.css">
<link rel="stylesheet"
href="https://use.fontawesome.com/releases/v5.8.2/css/all.css">
<link rel="stylesheet" href="https://fonts.googleapis.com/css?
family=Roboto:300,400,500,700&display=swap">
<style type="text/css">
.modal-backdrop {
background-color: black;
}

.bgcnav {
background-color: #1c2331;
height: 65px;
}

STAS, Pathanamthitta Page | 45


Online ID Card Management System Project Report

#imgdiv1 {
margin-top: -65px;
margin-left: 15px;
position: absolute;

body {
background: linear-gradient(to top left, #3f3d52 14%,
#161d27 100%);
background-attachment: fixed;
}

#Divlogin,
#Divregister,
#Divregarr {
width: 350px;
height: 400px;
border: 5px solid rgba(28, 35, 49, 0.1);
background-color: rgba(15, 15, 15, 0.2);
top: 50%;
left: 50%;
margin-left: -300px;
margin-top: -200px;
position: absolute;
box-shadow: -24px 13px 62px -9px rgba(0, 0, 0, 0.75);
}

#Divregister {
margin-left: 50px;
background-color: rgba(255, 255, 255, 0.4);
box-shadow: 10px 10px 21px -1px rgba(0, 0, 0, 0.55);
}

STAS, Pathanamthitta Page | 46


Online ID Card Management System Project Report

#Divregarr {
width: 500px;
height: 450px;
margin-top: -200px;
margin-left: -225px;
display: none;
background: linear-gradient(to top left, #3f3d52 14%,
#161d27 100%);
background-attachment: scroll;
border: 0px solid white;
}

.ngm {
font-size: 30px;
margin-top: -50px;
color: white;
position: absolute;
left: 100%;
margin-left: -50px;
}

#INF {
font: normal 18px Cambria, "Hoefler Text", "Liberation
Serif", Times, "Times New Roman", "serif";
position: absolute;
left: 100%;
margin-left: -100px;
display: none;
}

#forgotdata:hover {

STAS, Pathanamthitta Page | 47


Online ID Card Management System Project Report

text-decoration: underline;
}

#second {
display: none;
}

#first {
position: absolute;
top: 50%;
left: 50%;
margin-left: -180px;
margin-top: -180px;
}

h2 {
margin-top: 110px;
}

#cpSuccess {
color: green;
margin-top: 20px;
transform: rotate(360deg);
animation: rotateYs 1s
}

@keyframes rotateYs {
0% {
transform: rotate(200deg);
}
100% {

STAS, Pathanamthitta Page | 48


Online ID Card Management System Project Report

transform: rotate(360deg);
}
}
</style>
</head>
<script type="text/javascript" src="js/jquery.min.js"></script>
<script type="text/javascript" src="js/popper.min.js"></script>
<script type="text/javascript" src="js/bootstrap.min.js"></script>
<script type="text/javascript" src="js/mdb.min.js"></script>

<body>
<div id="first" align="center">
<img src="bgs/eCARD.png" alt="ECARD">
<h3 class="text-white-50" style="font:small-caps bolder 35px
Constantia, 'Lucida Bright', 'DejaVu Serif', Georgia,
'serif'">online id card maker</h3>
</div>
<div id="second">
<!--Navigation Bar-->
<div id="navdiv0">
<nav class="navbar bgcnav" id="navbar"></nav>
<div id="imgdiv1">
<img src="bgs/eCARD.png" height="60" alt="ecdlogo">
</div>
<i class="fas fa-adjust ngm text-white-50" role="button"
onMouseOver="addINF()" onMouseOut="remINF()" onClick="changeMode()"
id="modeicon"></i>
<span id="INF" class="text-white-50 font-weight-
bold">Day Mode</span>
</div>
<!-- Login Div -->
<div id="Main">

STAS, Pathanamthitta Page | 49


Online ID Card Management System Project Report

<div id="Divlogin" class="container-fluid"


align="center">
<div class="col-sm-8 col-md-10 col-lg-10 col-xl-10">
<img src="bgs/userimg.png" height="100"
width="110" alt="USER">
<form method="POST" action="Main.php">
<div class="md-form">
<input type="text" id="username"
class="form-control" required name="username">
<label for="username">Username</label>
</div>
<div class="md-form">
<input type="password" id="password"
class="form-control validate" required name="password">
<label for="password" data-error="wrong"
data-success="right">Type your password</label>
</div>
<div align="center">
<input type="hidden" name="typeData"
value="login">
<button type="submit" class="btn btn-block"
style="background-color: rgba(236,236,236,0.6);border-radius:30px;
font-weight:bold;margin-top:-15px;" id="logbtn">Log In</button>
<span id="forgotdata" role="button">Forgot
Password</span>
<br/>
<span id="returnSpan" style="color:red;font-
size:15px;"></span>
</div>
</form>

</div>

STAS, Pathanamthitta Page | 50


Online ID Card Management System Project Report

</div>
<div id="Divregister" class="container-fluid"
align="center">
<div class="col-sm-12 col-md-12 col-lg-12 col-xl-
12">
<h2 class="font-weight-bold"
id="h2">Register</h2>
<h6 style="font:normal 17px 'Gill Sans', 'Gill
Sans MT', 'Myriad Pro', 'DejaVu Sans Condensed', Helvetica, Arial,
'sans-serif';" id="h6">Dont have an account? Register one!</h6>
<div class="container">
<button class="btn btn-block"
style="background-color: rgba(0,0,0,0.6);border-radius:30px;margin-
top:50px;font-weight: bold;color:white"
id="regbtn">Register</button></div>
</div>
</div>
</div>
<div id="Divregarr" align="center">
<div id="regHead" style="background-
color:rgba(236,236,236,0.6);height:50px;">
<br/>
<h3 style="color:rgba(0,0,0,0.7);font-
weight:bold;margin-top:-18px;">Register Here</h3>
</div>
<form id="form-register">
<div class="container">
<div class="row container">
<div class="col-sm-6 col-md-6 col-lg-6 col-
xl-6">
<div class="md-form input-with-post-
icon">

STAS, Pathanamthitta Page | 51


Online ID Card Management System Project Report

<input type="text" id="fname"


class="form-control form-control-sm text-white" required>
<label for="fname" class="text-
white">First Name</label>
</div>
Request.onload =
function() {
var serverReturn = Request.responseText;
if (serverReturn != 0) {

document.getElementById("displayPassword").innerHTML = "Password: "


+ serverReturn;
} else {

document.getElementById("displayPassword").innerHTML = "Incorrect
security answer";
}
$("#displayPasswordDiv").css("display",
"block");
};
Request.open("POST", "Main.php");
Request.setRequestHeader("Content-type",
"application/x-www-form-urlencoded");
Request.send("username=" + uname + "&password=" +
answer + "&typeData=showAnswer&name=null&qstn=null&answer=null");
});
$("#forgotmodal").on('hide.bs.modal', function(e) {
$("#displayPasswordDiv").css("display", "none");
document.getElementById('qstn').value = "Security
Question";
document.getElementById('answer').value = "Type your
answer";

STAS, Pathanamthitta Page | 52


Online ID Card Management System Project Report

});
$("#regmemb").click(function() {
var fname, lname, uname, pswd, cpswd, scqstn,
scanswer;
fname = document.getElementById('fname').value;
lname = document.getElementById('lname').value;
uname = document.getElementById('uname').value;
pswd = document.getElementById('pswd').value;
cpswd = document.getElementById('cpswd').value;
scqstn = document.getElementById('scqstn').value;
scanswer =
document.getElementById('scanswer').value;
if (fname != "" || lname != "" || uname != "") {
fname = fname + " " + lname;
if (pswd.length >= 8) {
if (pswd == cpswd) {
if (scqstn != "" || scanswer != "") {
Request.onload = function() {
var responseData =
Request.responseText;
responseData =
responseData.split('&');
if (responseData[0] != "error")
{
$("#success").modal('show');
$
("#cpSuccess").removeClass('fas fa-times fa-4x');
$
("#cpSuccess").addClass('fas fa-check fa-4x');
$("#cpSuccess").css("color",
"green");

STAS, Pathanamthitta Page | 53


Online ID Card Management System Project Report

$
("#divhead2").css("background-color", "green");

document.getElementById('head2').innerHTML = "Account created";


$
("#closeBtnSuccess").css("background-color", "green");
$
("#isFailed").css("display", "none");
} else {
$("#success").modal('show');
$
("#cpSuccess").removeClass('fas fa-check fa-4x');
$
("#cpSuccess").addClass('fas fa-times fa-4x');
$("#cpSuccess").css("color",
"red");
$
("#divhead2").css("background-color", "red");

document.getElementById('head2').innerHTML = "Account creation


failed";
$
("#closeBtnSuccess").css("background-color", "red");
$
("#isFailed").css("display", "block");
}

};
Request.open("POST", "Main.php");
Request.setRequestHeader("Content-
type", "application/x-www-form-urlencoded");

STAS, Pathanamthitta Page | 54


Online ID Card Management System Project Report

Request.send("username=" + uname +
"&password=" + pswd + "&typeData=register&name=" + fname + "&qstn="
+ scqstn + "&answer=" + scanswer);
}
}
}
}
if (pswd.length < 8 && pswd != "" || pswd != cpswd)
$("#passwordError").css("display", "block");
$("#closeBtnSuccess").click(function() {
document.getElementById('fname').value = "";
document.getElementById('lname').value = "";
document.getElementById('uname').value = "";
document.getElementById('pswd').value = "";
document.getElementById('cpswd').value = "";
document.getElementById('scqstn').value = "";
document.getElementById('scanswer').value = "";
});
});
$("#form-register").submit(function(e) {
e.preventDefault();
});
var url=window.location.href;
url=url.split('?');
if(url[1]=='failed'){

document.getElementById('returnSpan').innerHTML="Incorrect
password";
}else if(url[1]=='nouser'){
document.getElementById('returnSpan').innerHTML="No
such user found";
}

STAS, Pathanamthitta Page | 55


Online ID Card Management System Project Report

</script>
</body>

</html>

12. CONCLUSION

STAS, Pathanamthitta Page | 56


Online ID Card Management System Project Report

Conclusion

Online ID-card management system report in php. In the conclusion we can say that it will be
very effective and user friendly to use. Even it will be very low cost to maintain the system
even to print the card too. The system will provide an error free user interface so that all the
manual error has been taken care.

As the name suggest, the online Id card generator system


will help in generating id cards to the employees of the enterprises or the students of the
institution with great ease. The Id cards can be generated in bulk for the employees or the
students who are need of it. And also, the Id card will give unique identity to each and every
person in the organization or the institution. Id card can be easily be generated with just drag
and drop facility. ID card generation refers to the process to generate, maintain and distribute
of the Id cads. What requirement it needs, is provided correctly at the same time we must
concern about the non-requirement. data must be secured and safe.

One such project will see that no one gets more than one ID card. The user
interface must be simple and easy to understand. This will be a useful project for the
enterprises and the institutions which will reduce their work. Our project provides all kinds of
facilities as required. The ID card will provide all the information of the person correctly as
possible.

STAS, Pathanamthitta Page | 57


Online ID Card Management System Project Report

13. APPENDIX

STAS, Pathanamthitta Page | 58


Online ID Card Management System Project Report

SCREEN LAYOUT

Home

Login Page

STAS, Pathanamthitta Page | 59


Online ID Card Management System Project Report

Register Page
Admin Page

Student Details

STAS, Pathanamthitta Page | 60


Online ID Card Management System Project Report

Settings

Generated ID Card – 1

STAS, Pathanamthitta Page | 61


Online ID Card Management System Project Report

Generated ID Card – 2

STAS, Pathanamthitta Page | 62


Online ID Card Management System Project Report

14. BIBILOGRAPHY

STAS, Pathanamthitta Page | 63


Online ID Card Management System Project Report

Books References:

PHP and MYSQL Web Development,3rd E, Luke welling,Laur

PHP 5 Fast and Easy Web Development, Julie Maloni

PHP and MYSQL, W Jason Gilmore

PHP: The Complete Reference, Steven Holzner, McGraw Hill Professional, 2008

Web References:

https://www.w3schools.com/php/
https://www.javatpoint.com/mysql-tutorial
https://api.jquery.com/
https://www.tutorialspoint.com/jquery/index.htm
https://www.w3schools.com/js/js_json_intro.asp
https://www.w3schools.com/js/DEFAULT.asp

STAS, Pathanamthitta Page | 64

You might also like