0% found this document useful (0 votes)
110 views32 pages

Online Id Card Generator Report

online id card generator by university name project report

Uploaded by

yogeshvw56
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views32 pages

Online Id Card Generator Report

online id card generator by university name project report

Uploaded by

yogeshvw56
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Mini-Project

Report on

“Online ID Card Generator System”

Submitted In Fulfillment of the Requirement

For the Third year

Bachelor of Technology

In

Artificial Intelligence and Data Science

Hindi Seva Mandal’s (Estd. 1950)

SHRI SANT GADGE BABA


COLLEGE OF ENGINEERING AND TECHNOLOGY
Bhusawal – 425203. Dist. Jalgaon (M. S.)
Affiliated to
Dr. Babasaheb Ambedkar Technological University Lonere, Maharashtra

Submitted By
Mr. Saurabh Pradip Warke
[T2151701995511]
Mr. Mrunal Girdhar Patil
[T2151701995506]

Academic Year (2022-2023)


Hindi Seva Mandal’s (Estd. 1950)

SHRI SANT GADGE BABA


COLLEGE OF ENGINEERING AND TECHNOLOGY
Bhusawal – 425203. Dist. Jalgaon (M. S.)
Dr. Babasaheb Ambedkar Technological University, Lonere, Maharashtra

CERTIFICATE

This is to certify that Saurabh Pradip Warke and Mrunal Girdhar


Patil has undergone and successfully completed his “Mini-Project II” in
“Online ID Card Generator” for the fulfillment of the Third Year of
Bachelor of Technology in Artificial Intelligence and Data Science as
prescribed by Dr. Babasaheb Ambedkar Technological University, Lonere
during the academic year 2022-2023.

Prof. D. G. Agrawal
Prof. D. G. Agrawal
[Head of
[Mini-Project Guide]
Department]

Dr. R. B. Barjibhe
(Principle)
Index

Sr No Title Page no
1 Introduction 01
2 Literature Survey 02
3 System Analysis 07
4 System Design 23
5 Implementation 26
6 Testing 27
7 Conclusion 31
8 Reference 34
ABSTRACT

The I-Card Generator System will help to generate the Id cards for
the employees of any organization or for the students and teachers of the
educational institutes without any difficulty. The User will add all the
relevant details to be shown on the Id card. And the system will generate
the Id card based on entered detail The most well-known utilization of an
ID card is to confirm that the individual holding it is to be sure who she/he
professes to be. You can then utilize it to match any extra data she gives
you, for example, the location on an application structure. However, the ID
must be issued by an agency that you accept as legitimate, such as a state
government or federal agency. Examples include driver’s licenses, military
identification and passports. These cards commonly distinguish the
responsible body and incorporate an image of the holder, so you can
outwardly match her face. Additional details may also be included such as
address, birth date and signature. ID Card Generator offers a wide variety
of ID card templates that work for many categories: employee ID cards,
student ID cards, visitor ID cards, club member ID cards, and a lot more.
Keywords: CSS, HTML, JavaScript, Id Education, System
LIST OF FIGURES

Figure No. Title Page


No.
4.1 Architecture Diagram 14
4.2 DFD 0 level diagram 15
4.3 DFD 1 level diagram 16
4.4 DFD 2 level diagram 17
4.5 ER Diagram 18
4.6 Use Case Diagram 19
4.7 Sequence Diagram 20
4.8 Class Diagram 21
LIST OF TABLES

Table No. Title Page No.

2.1 Literature Survey 5


3.1 Team Structure 10
6.1 Test Case 25
DECLARATION

I hereby declare that the Mini Project Report entitled, “Online ID


Card Generator System” is written by me. This report is written by
studying the various articles, books, papers, journals and other resources
available on internet out of which some of them are listed in the end of
report.

Place: Bhusawal Signature of Student:

Date:
Mr. Mrunal Girdhar Patil
En. No - 2151701995506

Mr. Saurabh Pradip Warke


En. No - 2051701995511
INTRODUCTION

1.1 General Background:

ID card maker software helps to create professional Id cards by modifying


cards dimensions has per the needs and requirements. User provided a list
of templates for designing ID cards for facility to design templates by own
is also offered by software. Easy to use business utility in various designing
tools for creating ID cards. The most well-known utilization of an ID card
is to confirm that the individual holding it is to be sure who she/he
professes to be. You can then utilize it to match any extra data she gives
you, for example, the location on an application structure. However, the ID
must be issued by an agency that you accept as legitimate, such as a state
government or federal agency. Examples include driver’s licenses, military
identification and passports. These cards commonly distinguish the
responsible body and incorporate an image of the holder, so you can
outwardly match her face. Additional details may also be included such as
address, birth date and signature. ID Card Generator offers a wide variety
of ID card templates that work for many categories: employee ID cards,
student ID cards, visitor ID cards, club member ID cards, and a lot more.
Regardless of what kind of ID card they want to create, they’ll be covered.
The project. ID Card Generator" is made to diminish the human exertion,
which we are here to present a completely robotized arrangement that will
create and keep up with the ID card. It is highly essential for an educational
institute to provide ID cards to each and every student of it. An ID card is
generally considered to be the summary of anyone's information.
According to this circumstance one institute or organization must produce
and provide ID cards. However, ID cards can increase building security in
a number of ways. Utilizing picture ID cards makes it simple for security
faculty to rapidly recognize every worker or guest, limiting the gamble of
pantomime and burglary
It is highly essential for an educational institute to Provide ID Card to each
and every student of it.ID Card is generally Considered to be the summary
of a student’s information According to this circumstance one institute
must produce and provide to the student. The project “Online Id Card
Generator” is created to reduce the human efforts, which we are to
introduce a fully automated solution that will generate and maintain the id
card n identity document (also called ID or colloquially as papers) is any
document that may be used to prove a person's identity. If issued in a small,
standard credit card size form, it is usually called an identity card (IC, ID
card, citizen card), or passport card. Some countries issue.
formal identity documents, as national identification cards that may be
compulsory or non-compulsory, while others may require identity
verification using regional identification or informal documents. When
the identity document incorporates a person's photograph, it may be
called photo ID
1.2 Scope
Future Scope of this project is that we can create an expert and guides who
can give the answers of the students Also we can add visitors and parent
modules in this web application so that if parents want to ask any queries
to the faculties so they can also contact with the faculties.
1.3 Application:
The project “ONLINE ID CARD GENERATOR” computerizes all the
manual activities in the existing site. As the technology grows, we must
adopt the advantages of the technologies to our organization. The project
titled
“ONLINE ID CARD GENERATOR” has been done successfully and
satisfies all the requirements specified. This system helps in providing live
data to the authorities and help in decision making without wastage of time.
This website provides a user-friendly approach towards the system. This
system has been well developed and when implemented, is bound to satisfy
all of the requirements. Painstaking efforts have been taken to make the
system impeccable and upgradeable. There is a hope that this website will
be utilized to its maximum and will do a good job in the long run. With
blessings of God, the exertions are hoped to bear fruit. The program for
carrying out various activities have been run and successfully tested to
ensure that the website developed meets the needs satisfactorily. Any users
can process this system without any experience in any software products.
The newly developed system consumes less processing time and all the
details are updated and processed immediately. Modules are designed to
be highly flexible so that any failure requirements can be easily added to
the modulus without facing many problems.
1.4 Motivation:
The present 21st century is a digital era. Now a days the development in
various aspects of computer technology has reached beyond our
imagination and expectations. Every new day, new software is launched
in the market. Software has an attractive user interface and easy
maintenance facility which helps us in our working filed. In certain
University of Tripura students don't have printed I-card and the card it
has not carry so much of information. This fact inspired us to develop
software which will aid in computerization of identity card generation
system
1.5 Problem Definition:
Our present ID card system lacks innovation. Its value can be increased
significantly. Present use of ID cards is only for identification purpose.
which is very less compared to the potential it contains. Although our
college ID card is used in libraries for borrowing, renewing and returning
books, but we need to increase this functionality as much as possible. It is
also observed that many shopkeepers and students face problems of
change. unavailability, this idea solves this problem efficiently. It also
solves insecurities associated with carrying of cash which may not be
found once lost. Installing such a system leads to complications but this
idea can be easily implemented with existing college ID and minimal
efforts.
1.6 Existing System
For identification of people, they still lie on manual handwritten ID card
and files. In the traditional process the administration has to take
sufficient information about the people. Then the authority authenticates
the information and if it’s true they provide the ID card to its owner. All
these processes are done manually and for this process is too much time
consuming. Persons are to wait for several days to have their ID cards. As
we consider traditional ID cards, then it will only contain all the details
with hand written and anyone can make the fake ID card easily. When
administrator make ID card with his or her hand writing then it can be
filled of error and mistake. Sometimes they made the mistake of writing
wrong name with spelling and so on.
1.7 Presently Available System:
On this website, HTML, CSS, and JavaScript are used as advanced tools.
For identification of people they still lie on manual handwritten ID card
and file. In the traditional process the administration has to take sufficient
information about the people. the authority authenticates the information
and if it’s true they provide the ID card to its owner. All these process are
done manually and for this process is too much time consuming.
1.8 Proposed System
The Proposed system is a ultimate solution for ID card generation. In this
online card generation process is completely done by the computer with
the help of the software. The information of the persons ID card can be
provided by the administration. As a result, there is no tension about the
wastage of time and also the data manipulating and storing is suitable for
the whole process. If proper ID card system is introduced then it would be
much classier to identify a person and can track his/her progress. Online
ID card had image capturing facility and requirements of an ID and there
is no need of hand written ID card Online ID card generation is being made
computerized to increase efficiency and reducing of error of human being.
The concept of time wasting is totally eliminated in here. More over this
process is highly compatible with data storing data storing manipulating.
The proposed system, design and implementation of online ID card
generation is created to reduce the human effort, which we are to introduce
a fully automated solution that will generate and maintain the ID card.
2. LITERATURE SURVEY

It is highly essential for an educational institute to Provide ID Card to each


and every student of it.ID Card is generally Considered to be the summary
of a student’s information According to this circumstance one institute
must produce and provide to the student. The project “Online Id Card
Generator” is created to reduce the human efforts, which we are to
introduce a fully automated solution that will generate and maintain the id
card n identity document (also called ID or colloquially as papers) is any
document that may be used to prove a person's identity. If issued in a small,
standard credit card size form, it is usually called an identity card.
2.2. Related Work:
ID Card Generator is a piece of software that converts your details into
digitized ID Cards. As we all know, making an ID card from paint and
other software can become very painful plus time consuming. To make this
software user friendly we go through all surveys and did our research as
much as we can. The application of the project becomes very easy and
convenient at the user-end since they have to visit the web app, simply
Select the type of Id card they want to get done and they will find all related
templates on the selected title. Once finalized, they can Fill the relevant
details on selected ID card and it's done. The User will add all the relevant
details to be shown on the Id card. And the system will generate the Id card
based on the details the user entered. Talking about the features of Online
ID Generator Website, the user can add numbers of data through excel file
or individually. It should contain a student’s name, sex, college
id/company’s name, and program. After that, the system automatically
generates an ID card on the selected template. The I-Card Generator
System will be developed Using Html, CSS, Python and databases. So, the
Features of this system are it helps to generate the Id cards for the
employees of any organization or for the students and teachers of the
educational institutes without any difficulty. The UI of this system is
simple so that the user won’t get any difficulties while working on it.
2.3 Previous System:
For identification of people, they still lie on manual handwritten ID card
and files. In the traditional process the administration has to take sufficient
information about the people. Then the authority authenticates the
information and if it's true they provide the ID card to its owner. All these
processes are done manually and for this process is too much time
consuming. Persons are to wait for several days to have their ID cards.
As we consider traditional ID cards, then it will only contain all the details
with hand written and anyone can make the fake ID card easily. When
administrator make ID card with his or her hand writing then it can be filled
of error and mistake. Sometimes they made the mistake of writing wrong
name with spelling and so on.
• Sometimes they made the mistake of writing

• This process is too much time consuming

• Authentication problems.
3. SYSTEM ANALYSIS

System analysis is the study of sets of interacting entities, including


computer system Analysis. This field is closely related to operation
research. It is also an explicit formal inquiry carried out to help someone
identify a better course of action and make better decisions than he might
otherwise have made
System Analysis of Computer science:
The development of a computer-based information system includes a
system analysis phase which produce or enhances the data model which
itself is a precursor to creating or enhancing a database There are a number
of different approaches to system analysis. When a computer-based
information system is developed, systems analysis would constitute the
following steps:
• The development of a feasibility study, involving determining whether a
project is economically, socially, technologically and organizationally
feasible.

• Conducting fact-finding measure, designed to ascertain the requirements


of the system end-users. These typically span interview span interviews,
questionnaires, or visual observations of work on the existing system

• Gauging how the end users would operate the system (in terms of general
experience in using computer hardware or software), what the system
would be used for etc.
3.1Analysis phase of ID Card Generator
The systems analysis process is an iterative one that cycles repeatedly
through the following
interrelated and somewhat indistinct phases:
1. Problem statement
2. Alternative designs
3. Mathematical formulation
4. Evaluation of alternatives
5. Selection and implementation of the most preferred solution
3.1.1 Problem statement :
The system is defined in terms of its environment, goals, objectives,
constraints, criteria, actors (decision makers, participants in the system,
impacted constituency) and other objects and their attributes, according to
our project the environment is Microsoft based operating system. The
primary goals and objectives are to reduce the human effort and produce
the automated student ID Card. To ensure student participation in the
process, we conducted the true information about the student body to assess
the awareness level, security and privacy concerns. These are the
constraints of our project.
3.1.2 Alternative Designs :
The solutions are identified. In our project the successful run of the parts
of the solution can be referred to as alternative designs.
3.1.3 Mathematical Formulation :
A mathematical description of the system is developed, tested, and
validated; In us project the mathematical formulations are done by database
management system.
3.1.4 Evaluation of Alternatives :
The mathematical model is used to evaluate and rank the possible
alternative designs by means of the criteria. In ID Card Generation the
mathematical model that is our database management system is used to
satisfy the tasks. 3.3.5 Selection and Implementation of the most Preferred
Solution
The process includes feedback loops in which the outcomes of each phase
are reconsidered based on the analyses and outcomes of the other phases.
For example, during the implementation phase, constraints may be
uncovered that hinder the solution's implementation and thus cause the
mathematical model to be reformulated. The analysis process continues
until there is evidence that the mathematical structure is suitable; that is, it
has enough validity to yield answers that are of value to the system
designers or the decision maker. After the successful running we choose
and implement the most successful running solution as our project.
3.2 Hardware and Software Requirement
A. Software Requirements:
-HTML, CSS, JavaScript
-MS Word 97 or later
-Web Browser: Microsoft Internet Explorer, Mozilla, Google Chrome or
later
B. Hardware Requirements:
-System: Intel I3 Processor
-Hard Disk: 500 GB
-Monitor: Standard LED Monitor
-Input: Keyboard - Ram: 4GB
3.3 Requirement analysis:
Requirement analysis involves studying the current system to find out how
it works and where improvements could be made. A clear idea about the
existing system is a must for making improvements where it is required.
Proper planning and collection of data serves the purpose. The popularity
of document is to describe all the requirements for the popularity of the
website for ‘Online Id Card Generator System’. This website gives all the
information for a person. In our busy life, we cannot go to each department
or offices. This problem will manage the site. It will help to avoid in
correction and missing data.
4. SYSTEM DESIGN

Design allows you to create a model that can be assessed for quality and
improved before content and code are generated, tests are conducted, and
end users become involved in large numbers. Design is the place where
Web app quality is established.
In general, the following design objectives must be kept in mind;
• Practicality of the System

• Efficiency of the System

• Minimized cost of the System

• Flexibility of the System

• Security of the System

The system design involves first logical design and then physical
construction of the system. The logical design describes structure and
characteristics of features, like the outputs, inputs, databases and
procedures. The physical construction which follows the logical design
produces actual program software files and the working system.
System design sits at the technical kernel of the software engineering and
is applied regardless of the software process model that is used. Beginning
once software requirements have been analyzed and specified, software
design is the first technical activity that is used to build and verify the
software. Each activity (designing, coding and testing) transforms
information in a manner that ultimately results in validated computer
software.
Software system design is a process of problem-solving and planning for a
software solution. After the purpose and specifications of software are
determined, software developers will designer employ designers to
develop a plan for a solution. It includes low-level component and
algorithm implementation issues as well as the architectural view.
Designing software is an exercise in managing complexity. The complexity
exists within the software design itself. Software design is very similar to
systems design. It can span multiple technologies and often involves
multiple sub-disciplines. Software specifications tend to be fluid, and
change rapidly and often, usually while the design process is still going on
The design concepts provide the software designer with a foundation from
which more sophisticated methods can be applied.
A set of fundamental design concepts has evolved. They are:
• Abstraction- Abstraction is the process or result of generalization by
reducing the information content of a concept or an observable
phenomenon, typically in order to retain only information which is relevant
for a particular purpose.

• Refinement: It is the process of elaboration. A hierarchy is developed by


decomposing a macroscopic statement of function in a stepwise fashion
until programming language statements are reached. In each step, one or
several instructions of a given program are decomposed into more detailed
instructions. Abstraction and Refinement are complementary concepts.

• Modularity: - Software architecture is divided into components called


modules.

• Software Architecture: - It refers to the overall structure of the software


and the ways in which that structure provides conceptual integrity for a
system. A good software architecture will yield a good return on
investment with respect to the desired outcome of the project, e.g., in terms
of performance, quality, schedule and cost.

• Control Hierarchy - A program structure that represent the organization


of program components and implies a hierarchy of control.

• Structural Partitioning: - The program structure can be divided both


horizontally and vertically. Horizontal partitions define separate branches
of modular hierarchy for each major program function. Vertical
partitioning suggests that control and work should be distributed top down
in the program structure.

• Data Structure - It is a representation of the logical relationship among


individual elements of data.

• Software Procedure - It focuses on the processing of each module


individually

• Information Hiding: - Modules should be specified and designed so that


information contained within a module is inaccessible to other modules
that have no need for such information
There are many aspects to consider in the design of a piece of software.
The importance of each
should reflect the goals the software is trying to achieve. Some of these
aspects are:
• Compatibility: - The software is able to operate with other products that
are designed for interoperability with another product. For example, a piece
of software may be backward-compatible with an older version of itself.

• Extensibility: New capabilities can be added to the software without


major changes to the underlying architecture.
• Fault-tolerance - The software is resistant to and able to recover from
component failure.

• Maintainability: The software can be restored to a specified condition


within a specified period of time. For example, antivirus software may
include the ability to periodically receive virus definition updates in order
to maintain the software's effectiveness.

• Packaging: Printed material such as the box and manuals should match
the style designated for the target market and should enhance usability. All
compatibility information should be visible on the outside of the package.
All components required for use should be included in the package or
specified as a requirement on the outside of the package.

• Reliability: The software is able to perform a required function under


stated conditions for a specified period of time.

• Reusability: - the software is able to add further features and


modification with slight or no modification.

• Robustness - The software is able to operate under stress or tolerate


unpredictable or invalid input. For example, it can be designed with
resilience to low memory conditions.

• Usability: The software user interface must be usable for its target
user/audience. Default values for the parameters must be chosen so that
they are a good choice for the majority of the users.

4.1 Architecture Diagram:

Fig.4.1: Architecture Diagram


4.2 Data Flow Diagram:
DFD 0 Level Diagram:
The data flow diagram (DFD) is one of the most important tools used by
system analysts. Data flow diagrams are made up of a number of symbols,
which represent system components. Most Data flow modeling methods
use four kinds of symbol. These symbols are used to represent four kinds
of system components. Possesses, data stores, data flows and external
entities are the components. Circle in DFD represents a process. Data flow
is represented by a thin line in DFD and square or rectangle represents
external entities.
DFD 1 Level Diagram:
The data flow diagram (DFD) is one of the most important tools used by
system analysts. Data flow diagrams are made up of a number of symbols,
which represent system components. Most data flow modeling methods
use four kinds of symbols These symbols are used to represent four kinds
of system components. Possesses, data stores, data flows and external
entities are the components. Circles in DFD represent a process. Dataflow
is represented by a thin line in DFD and square or rectangle represents
external entities. Unlike detailed flow chart, data flow diagrams do not
supply detailed description of the modules but graphically describes a
system’s data and how the data interact with the system. Symbols used in
DFD are: Square, this defines source or destination of data Arrow, which
shows data flow Circle, which represents a process that transforms. As
shown in figure no. 4.2
Fig.4.2: DFD 1 Level Diagram

4.3 UML Diagram:


ER- Diagram:
If software requirements include the need to create, extend, or interface
with a database, the software team may choose to create a data model as
part of overall requirements modeling. It defines all data objects that are
processed within the system, the relationship between the data objects, and
other information that is pertinent to the relationships. The entity –
relationship diagram (ERD) addresses these issues and represents all data
objects that are entered, stored, transformed, and produced within an
application. Data modeling tools provide a software engineer with the
ability to represent data object, their characteristics, and their
relationships.Used primarily for large database applications and other
information systems projects, data modeling tools provide an automated
means for creating comprehensive entity relation diagrams, data object
dictionaries, and related models. An E-R diagram may also indicate the
cardinality of a relationship. Cardinality is the number of instances of one
entity that can, or must, be associated with each instance of another entity.
In general, we may speak of one-to-one, one-to-many, or many-to-many
relationships. See in Figure no. 4.3
Fig.4.5 : ER- Diagram
Use Case Diagram:
Use cases help to determine the functionality and features of the software
from user’s perspective. A use case describes how a user interacts with the
system by defining the steps required to accomplish a specific goal.
Variations in the sequence of steps describe various scenarios. In the
diagram the stick figure represents an actor that is associated with one
category of user. In the use-case diagram the use cases are displayed also.
The actors are connected by lines to the use cases that they carry out. The
use cases are placed in a rectangle but the actors are not. This rectangle is
a visual remainder of the system boundaries and that the actors are outside
the system. As shown in fig no.4.4
Sequence Diagram:
In the Unified Modelling Language, a sequence diagram shows the
interaction between different systems. It is one of the four diagram types
UML defines. Usually, it shows how objects exchange messages. A
sequence diagram or system sequence diagram (SSD) shows process
interactions arranged in time sequence in the field of software engineering.
It depicts the processes involved and the sequence of messages exchanged
between the processes needed to carry out the functionality. Sequence
diagrams are typically associated with use case realizations in the 4+1
architectural view model of the system under development. Sequence
diagrams are sometimes called event diagrams or event scenarios. . As
shown in fig no.4.5

Fig.4.7: Sequence Diagram


Class Diagram:
In software engineering, a class diagram in the Unified Modeling
Language (UML) is a type of static structure diagram that describes the
structure of a system by showing the system's classes, their attributes,
operations (or methods), and the relationships among objects. The class
diagram is the main building block of object-oriented modeling. It is used
for general conceptual modeling of the structure of the application, and for
detailed modeling, translating the models into programming code. Class
diagrams can also be used for data modeling. The classes in a class diagram
represent both the main elements, interactions in the application, and the
classes to be programmed. In the design of a system, a number of classes
are identified and grouped together in a class diagram that helps to
determine the static relations between them. In detailed modeling, the
classes of the conceptual design are often split into subclasses.As shown in
fig no.4.8

Fig.4.8 : Class Diagram


5. IMPLEMENTATION

Introduction to HTML
The Hypertext Markup Language or HTML is the standard markup
language for documents designed to be displayed in a web browser. It is
often assisted by technologies such as Cascading Style Sheets (CSS) and
scripting languages such as JavaScript.
Web browsers receive HTML documents from a Web server or from local
storage and render the documents into multimedia web pages. HTML
describes the structure of a web page semantically and originally included
cues for its appearance.
HTML elements are the building blocks of HTML pages. With HTML
constructs, images and other objects such as interactive forms may be
embedded into the rendered page. HTML provides a means to create
structured documents by denoting structural semantics for text such as
headings, paragraphs, lists, links, quotes, and other items. HTML elements
are delineated by tags, written using angle brackets. Tags such as <img />
and <input /> directly introduce content into the page. Other tags such as
<p> and </p> surround and provide information about document text and
may include sub-element tags. Browsers do not display the HTML tags but
use them to interpret the content of the page.
HTML can embed programs written in a scripting language such as
JavaScript, which affects the behavior and content of web pages. The
inclusion of CSS defines the look and layout of content. The World Wide
Web Consortium (W3C), former maintainer of the HTML and current
maintainer of the CSS standards, has encouraged the use of CSS over
explicit presentational HTML since 1997.[2] A form of HTML, known as
HTML5, is used to display video and audio, primarily using the <canvas>
element, together with JavaScript.
JavaScript:
JavaScript is an object based, cross-platform, loosely typed multiuse
programming language that is used to add interactivity to the web pages.
A JavaScript is a program that is included on an HTML page. Because it is
enclosed in the <SCRIPT> tag, the text of the script doesn't appear on the
user's screen, and the Web browser knows to run the JavaScript program.
The <SCRIPT> tag is most often found within the <HEAD> section of the
HTML page. Scripts 23
is case sensitive. Scripts can be put in either of two places on an HTML
page: between the <HEAD> and </HEAD> tag or between the <BODY>
and </BODY> tag. One of the main uses of JavaScript is to provide
feedback to people browsing your site. An alert window can be created that
pops up and gives the user the vitally important information that they need
to know about the page. Different languages versions can be have had on
different scripts on one page.
6. TESTING

6.1 Security Testing: -


Security testing is the process to determine that an information system
protects data and maintain functionality as intended. During security
testing, the tester plays roles of the individual who desires to penetrate the
system. The tester may attempt to acquire passwords through external
clerical means; may attack the system with custom software designed to
breakdown any defenses that have been constructed; may overwhelm the
system, thereby denying service to others; may cause system errors, hoping
to find the key to system entry.
“ONLINE ID CARD GENREATOR SYSTEM” was tested for successful
acceptance i.e., she/he must enter username or password to enter to the
system
6.2. Performance Testing: -
Performance testing is designed to test the run time performance of
software within the context of an integrated system. Performance testing
occurs throughout all steps in the testing process. Even at the unit level,
performance of individual module may be assessed as white box tests are
conducted, it is not until all system elements are fully integrated that true
performance of a system can be ascertained. This system was tested for
successful acceptance and was found to be working properly.
6.3. Content Testing: -
Content testing checks that users can easily understand all items that appear
on a site and, importantly, that they are able to correctly interpret the
information they read. Accordingly, it identifies any problem areas that
may require simplification or rewriting. The overall purpose of testing a
content concept is to figure out what content strategy you should follow
throughout the project. Content should be logical and easy to understand.
Check for spelling errors. Use of dark colors annoys users and should not
be used in site theme. “ONLINE ID CARD GENREATOR SYSTEM”
7. CONCLUSION

In conclusion, it will be very effective and user friendly to use. It will be


very low cost to maintain the system even to print the card too. The system
will provide an error free user interface so that all the manual error has
been taken care. However, Id Card Generator is enriched with barcode
generating system to let everyone have access to entire system in an easier
way i.e., taking book from the library, returning the book etc.
Our project provides all kinds of facilities as required. From every point of
view, this project is feasible enough. The ID card provide all information
of the card holder correctly as possible.
The Online ID Card Generator process made computerized to reduce
human errors and to increase the efficiency. The maintenance of records is
made efficient, as all the records are stored in the Microsoft SQL server
Database. The editing is also made simpler. The authority is just to provide
the required information and to print the Identity card with the student
image which is captured in real time video streaming. The computerization
of the automated student Identity card generation will not only improve the
efficiency but also reduces human stress thereby improving human
resources.
Our plan is to provide the student a plastic made identity card which is
more familiar now-a- days. A specific identity number will also be
included as Social Security number. A digital signature will be included
through digital touch pad and digital pen. And the additional part of this
project is the Data Bank. We can add more software on this single project
such as Teacher's
salary payment system, student result system and so on.
8. REFERENCES

[1] Richard Dybowski 2019. The Class Lectures. IT project. September


October. London: School Of technology and Management [1]
[2] Dictionary Reference.2020.ID card. . [online] Available from:
http://dictionary.reference.com/browse/ID+card [Accessed August 14
2020] [2]
[3] Marksprague Wordpress.2021.Understanding QR code [online]
Available from: http://marksprague.wordpress.com/understanding-qr-
codes/
[Accessed August 24 2021][4]
[4] Japanese proposed ID card.2021. [online image] Available from:
<http://www.2d-code.co.uk/japanese-id-card-qr-code/> [Accessed
September 21 2021] [6]
[5] http://en,wikipedia.org/wiki/software_design

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy