Preview

Passport Automation System

Satisfactory Essays
Open Document
Open Document
2050 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Passport Automation System
Virtual Tutor

www.virtual-tutor.co.cc

Passport Automation System
1.Objective:
To develop the passport automation system software using UML language. It is the interface between applicant and authority responsible for issue the passport. It aims at improving efficiency and reducing complexities.

2.Scope:
The system provides the online interface to the user where we can fill their form and personal detail with necessary proof. The authority concerned with the issue of passport can use this system to reduce is workload and process it speedy manner. It provides communication platform between administrator and applicant. To transfer the data between passport authority and local police verifying the applicant’s information.

3.Project description:
My project title is passport automation system. In this project we can develop the 5 modules such as login, fill the form with necessary proof, verifying the applicant’s information, validity checking and issue the passport for that particular applicant.

www.virtual-tutor.co.cc

In this login module, we can perform that that perform that enters into the login website for the different actors, and then fill for the can be done by the
Passport Automation System
Page 1 of 20

Virtual Tutor

www.virtual-tutor.co.cc

primary and verification, validation checking and issuing the passport can be done for the supporting actor.

4.Requirements:
*Functional requirements: It is defined as how they should react in the particular input and how the system should react in the particular situations and what the system do not do.

In my project, login as functional requirement. In that functional requirement we may check the user name and password is correct or not. After checking entity of login, we can show the detail based on the type of actor.  Analysis: In this place, the project requirement is analyzed and availability of requirement is seen.

 Design: Project manager makes the design of the project.

 Implementation: The

You May Also Find These Documents Helpful

  • Good Essays

    Technology affects communication capabilities of specialized databases in the criminal justice system by different systems such as Live Scan, Automated Finger Identification System that is also known as AFIS database, and Mobile data terminal. All these systems were created over the recent years and were made with many modern technological features.…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    |Trigger: |The use case can begin to following step by step as above described once customer began to log in and submitted |…

    • 621 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Juliet uses many metaphors and allusions to demonstrate or describe her thoughts and lust for Romeo. She begins her riddle of allusions by asking phaeton’ s carriage to bring in the dark of night for Romeo to arrive in this quote(3.2.2) “ Toward Phoebus lodging such a wagoner driver.” . She then thinks of how fast the night will come and how much she wants the night to come in this following saying of Juliet (3.2.4)“ bring in the cloudy night immediately.” . Romeo is supposed to come to Juliet at night, by climbing up the ladder. She hopes when he climbs up the ladder he will do what Juliet says in this following line (3.2.7) “ Leap to these arms untalked of and unseen.” She is anxiously dreaming and thinking of her husband arrival.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Every year, American businesses fill millions of temporary and permanent job openings. While each new hire requires verification of the candidate's eligibility for employment, no system exists that can guarantee the accuracy of this verification process.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Student Name: Kayla Stradomski Course # and Section/Time: COMM 101 DAH; Monday, 11:00 a.m. - 1:50 p.m. Topic: Light Pollution General Purpose: To persuade Specific Purpose Statement: To motivate my audience to learn more about light pollution. INTRODUCTION Attention Getter: Growing up, I watched a show called “Hey Arnold!”…

    • 1341 Words
    • 6 Pages
    Better Essays
  • Better Essays

    the analysis of the Sub in order to secure the clients account exclusively. While performing the…

    • 1289 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Software requirements can help a user understand why a product is needed. Not all requirements are at the same level. The software requirements are statements of what the system is designed to do, not necessarily how it will be done. The process of requirements can be broken down into discovery (elicitation), analysis, modeling and documentation, communication, and validation (Schedlbauer, 2011). The requirements will also describe what the finished product will be like. The requirements should also include descriptions of…

    • 3189 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Theoritical Framework

    • 608 Words
    • 3 Pages

    Presented on the table above that the independent variable of the two systems are the resident profile and the constituents in applying their clearances. Then information about the crime report gathering. This part refers to the basis need to identify the needs of the constituents and to enable to predict the needed actions on the said barangay. Then intervening the variable on the existing system is simply the manual filing and creating clearance and resident profiling under on the said barangay. Then the proposed system is the propose system which is automated version of the said barangay. Then the dependent variable of the two systems hence first on the existing system which is the constituent profile on a manual compilation while the proposed is a digital compilation of the residents profile. To generate reports regarding on what are the needs of the constituents in terms of security needs.…

    • 608 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security; by providing the best and stable system to make customer’s information secure from unauthorized people to gain it. Through creation of administrator account who will be the only person who has access to view this kind of information in the system. This will make system secure especially for transaction.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sports Management System

    • 1588 Words
    • 7 Pages

    The application will have a user friendly and menu based interface. Following screens can be found: (a) A login screen for entering the user name, ID number and…

    • 1588 Words
    • 7 Pages
    Good Essays
  • Better Essays

    The Commission’s mandate can be categorized into four (4) major action tracks, namely: 1. Establish the National Identity Management Commission as the primary legal, regulatory and institutional mechanism for implementing Government’s reform initiative (in the identity sector) as contained in the National Policy and NIMC Act, Sections 1, 2, 5 and 6. 2. Wind up and take over the assets and liabilities of the former DNCR which no longer exist, including the personnel in both the State and Local Government Offices nationwide; 3. Establish, operate and manage the National Identity Management System (NIMS): a. Carry out the enrolment of citizens and legal residents as provided for in the Act; b. Create and operate a National Identity Database; c. Issue Unique National Identification Numbers to qualified citizens and legal residents; d. Issue a National Identity Smart Card to every registered person 16 years and above; e. Provide a secure means to access the National Identity Database so that an individual can irrefutably assert his/her identity [Person Identification Verification Services (PIVS) Infrastructure]; f. Harmonize and integrate Identity…

    • 2143 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Automated ID system

    • 3009 Words
    • 13 Pages

    Doing the same thing better produces great results. There were a lot of automation and improvement done as time goes by. Automation is really fundamental in some companies or institutions in which it reduces human intervention as it defines. Like in any companies, automation is really applicable and useful in any process. But there some which are still in manual operations like the reception area for the visitors in a school or any company in which they are still after the pen and paper visitor management like the system of De La Salle Lipa. With this operation, a visitor can enter the school through surrendering valid ID after filling up all the necessary information into the log book. Then, security personnel will receive and sort the visitor’s ID into its proper rack in exchange for the visitor’s pass which has its distinct color that depends upon the destination of a visitor.…

    • 3009 Words
    • 13 Pages
    Powerful Essays