14-11-2012, 01:20 PM
Visitor Gate Pass system
Visitor Gate Pass.docx (Size: 5.5 MB / Downloads: 118)
ABSTRACT
Visitor Gate Pass system is a web based application, which is used to store the all details of visitors of an organization. This application is used to search all the visitors details based on visited year, month, date, time and inward, outward materials too...
This application is maintained by an administrator who has the privileges to add an employee (security), add the positions, delete the employee, delete the positions, view total visitor details and inward, outward materials details.
Our organization mainly deals with three types of positions i.e. gate security, inward security and outward security. Everyone has their own user id, password allotted by the administrator and they can access the application according to their scope.
This application has a secured centralized database in order to store the visitors & material details. This can be accessed by the employees and administrator.A visitor may be a parent or professional or any unknown person. Gate security captures all the details about the i.e. visiting date, time, personal details, purpose of visit, whom to meet etc... Inward security deals with incoming material such as received time, sent by material type etc. Outward security captures out time, to which we are sending, material type etc. The main aim of our application is to make the reports of visitors, inward material, and outward material at any point of time. It can be accessed by LAN in an organization.
This system design is modularized into various categories. This system has enriched UI so that a novice user did not feel any operational difficulties. This system mainly concentrated in designing various reports requested by the ADMIN as well as higher with export to excel options.
INTRODUCTION :
The project mainly deals with all details of visitors of an organization. This application is used to search all the visitors details based on visited year, visited month, date, time and inward, outward materials.
Mainly it consists of three types of positions.
1. Gate Security
2. Inward Security
3. Outward Security
This application has a centralized database which will be maintained by an administrator who has all privileges to access it.
PURPOSE OF THE PROJECT
It is a web based project mainly designed to reduce the mandatory schedule and to increase the performance of work. By this project we can easily maintain the details of the visitors without any loss and also to retrieve the visitor’s details from the database.
EXISTING SYSTEM & DISADVANTAGES
Existing system is a manual process in this one has to note all the details of visitors on register. By this process it is time consuming process, When ever administrator needs visitor’s details of particular time and date
Disadvantages:
• It will take more time to retrieve visitor/inward/out ward material details.
• No security for the data.
PROPOSED SYSTEM & ITS DISADVANTAGES
To overcome the problems of the existing system we proposed the visitor gate pass application. In this application we are automated the whole manual process with the help of GUI. In this we are maintaining the centralized data base in order to store the details of visitors/inward material/outward material.
Advantages:
It will provide secured data base, accessed by authorized users.
We can generate reports easily (visitor, inward material, outward material).
User friendly GUI, No need to train employees.
Administrator can search details according to his needs.
STUDY OF THE SYSTEM
To provide flexibility to the users, the interfaces have been developed that are accessible through a browser. The GUI’S at the top level have been categorized as
1. Administrative user interface
2. The operational or generic user interface
The ‘administrative user interface’ concentrates on the consistent information that is practically, part of the organizational activities and which needs proper authentication for the data collection. These interfaces help the administrators with all the transactional states like Data insertion, Data deletion and Date updation along with the extensive data search capabilities.
Requirements Gathering stage:
The requirements gathering process takes as its input the goals identified in the high-level requirements section of the project plan. Each goal will be refined into a set of one or more requirements. These requirements define the major functions of the intended application, define
operational data areas and reference data areas, and define the initial data entities. Major functions include critical processes to be managed, as well as mission critical inputs, outputs and reports. A user class hierarchy is developed and associated with these major functions, data areas, and data entities. Each of these definitions is termed a Requirement. Requirements are identified by unique requirement identifiers and, at minimum, contain a requirement title and
textual description.
Designing Stage:
The design stage takes as its initial input the requirements identified in the approved requirements document. For each requirement, a set of one or more design elements will be produced as a result of interviews, workshops, and/or prototype efforts. Design elements describe the desired software features in detail, and generally include functional hierarchy diagrams, screen layout diagrams, tables of business rules, business process diagrams, pseudo code, and a complete entity-relationship diagram with a full data dictionary. These design elements are intended to describe the software in sufficient detail that skilled programmers may develop the software with minimal additional input.
ECONOMIC FEASILITY
The computerized system takes care of the present existing system’s data flow and procedures completely and should generate all the reports of the manual system besides a host of other management reports.
It should be built as a web based application with separate web server and database server. This is required as the activities are spread through out the organization customer wants a centralized database. Further some of the linked transactions take place in different locations.
Open source software like TOMCAT, JAVA, Mysql and Linux is used to minimize the cost for the Customer.