Sie sind auf Seite 1von 13

SYNOPSIS

Submitted To Guru Jambheshwar University of Science and technology, Hisar For the approval of degree of MASTER OF COMPUTER APPLICATIONS (5yrs Integrated Course) IN Directorate of Distance Education Guru Jambheshwar University of Science and technology, Hisar

Under the supervision of:


Name: Mr. Dinesh Sharma Designation: Deputy Manager Department: Department of I.T

Submitted By:
Deepika Jamual 08031801031

Remarks Of Evaluator
1 Evaluation Approved Disapproved (If disapproved, record reasons)
st

2nd Evaluation Approved Disapproved (If disapproved, record reasons)

Directorate of Distance Education Guru Jambheshwar University of Science and Technology, Hisar 125001 (Session 2008-13)

SYNOPSIS OF THESIS / PROJECT REPORT AT MCA LEVEL

NAME OF STUDENT: REGISTRATION NO. : NAME OF DEPARTMENT:

Deepika Jamual 08031801031 DIRECTORATE OF DISTANCE EDUCATION GURU JAMBHESHWAR UNIVERSITY OF SCIENCE & TECHNOLOGY, HISAR

SUBJECT:

PROJECT WORK

NAME (S) OF SUPERVISOR (S): Mr. Dinesh Sharma

SIGNATURE OF STUDENT

Signature of Supervisor(s)

Countersigned by Director of Study Centre with SEAL

DIRECTORATE OF DISTANCE EDUCATION


GURU JAMBHESHWAR UNIVERSITY OF SCIENCE & TECHNOLOGY HISAR RESUME OF SUPERVISOR

1. NAME : 2. DESIGNATION: 3. QUALIFICATION:

Mr. Dinesh Sharma Deputy Manager MCA

4. AREA OF SPECIALIZATION: I.T Project Management 5. EXPERIENCE: 6. OFFICIAL ADDRESS: 7. TELEPHONE NO. : 8. MOBILE NO. : 9. E-MAIL: 21 years DIT,BLOCK NO.24,SDA COMPLEX,KASUMPTI SHIMLA -171009 0177-2626709 9418455355 dinesh.sharma@hp.gov.in

I am willing to supervise Ms.Deepika Jamual Enrolment No 08031801031 on the topic Online aadhaar search portal

(Signature) with Seal

Countersigned by Director of Study Centre with SEAL

CONTENTS OF THE SYNOPSIS

1. Topic of the Project Report 2. Introduction and Related Work Done 3. Objectives of the Study 4. Scope And Relevance of Study 5. Methodology to be used 6. Bibliography

INTRODUCTION AND RELATED WORK DONE


Aadhaar
Aadhaar, which means "foundation" in many Indian languages, is the term for the unique identity number issued by the UIDAI.No resident can have a duplicate number since it is linked to their individual biometrics; thereby identifying fake and ghost identities which result in leakages today.Savings from eliminating duplicates and fakes through Aadhaar-based identification will further enable governments to expand benefits to other eligible residents.

Features and benefits of Aadhaar


One Aadhaar: Aadhaar is a unique number, and no resident can have a duplicate number since it is linked to their individual biometrics; thereby identifying fake and ghost identities which result in leakages today. Savings from eliminating duplicates and fakes through Aadhaar-based identification will further enable governments to expand benefits to other eligible residents.

Portability: Aadhaar is a universal number, and agencies and services can contact the central Unique Identification database from anywhere in the country to confirm a beneficiary's identity.

Inclusion of those without any existing identity documents: A problem in reaching benefits to poor and marginalized residents is that they often lack the identification documents they need to receive State benefits; the "Introducer" system which has been approved for data verification for the UIDAI will enable such residents to establish an identity.

Electronic benefit transfers: The UID-enabled-Bank-Account network will offer a secure and low cost platform to directly remit benefits to residents without the heavy costs associated today with benefit distribution; the leakages in the current system will also be stemmed as a result.

Aadhaar-based authentication to confirm entitlement delivered to the beneficiary: the UIDAI will offer online authentication services for agencies who wish to validate a resident's identity; Clear accountability and transparent monitoring would significantly improve access and quality of entitlements to beneficiaries and the agency alike.

Self-service puts residents in control: Using Aadhaar as an authentication mechanism, residents should be able to access up-to-date information about their entitlements, demand services and redress their grievances directly from their mobile phone, kiosks or other means. In the case of self-service on the resident's mobile, security is assured using two-factor authentication (i.e. by proving possession of the resident's registered Mobile Number and knowledge of the resident's Aadhaar PIN). These standards are compliant with the Reserve Bank of India's approved standards for Mobile Banking and Payment.

INFORMATION NUMBER

REQUIRED

TO

GET

AN

AADHAAR

Demographic information required:


o o o o o o o o o Name Date of Birth Gender Address Parent/Guardian details (required for children, adults may provide) Contact details phone and email (optional) Biometric Information required: Photo 10 finger prints Iris

OBJECTIVES OF THE STUDY


To search a resident record from the KYR data base which is built using the XML files provided by UIDAI.

Steps to use the Utility


a) The user can use 2 options: Basic Search & Advanced Search b) Enter the UID & EID number against basic search to pull up a resident record. c) Enter either 1 field namely Mobile number, Name, Village, Tehsil, District, Pin Code, Gender or a combination of all these to use advanced search and pull up the Resident record.

Functional Requirement
1. Utility should allow search using one or more of the following search criteria. 2. Utility should throw up the records matching the search criteria entered by the user. 3. When the user clicks on the record, the complete Aadhaar record of the individual should show up on screen. 4. Utility show allows the user to go back to the list view from the detailed view & vice versa without having to restart the search.

SCOPE & RELEVANCE OF STUDY

Aadhaar is a 12-digit unique number which the Unique Identification Authority of India (UIDAI) will issue for all residents in India (on a voluntary basis). The number will be stored in a centralized database and linked to the basic demographics and biometric information photograph, ten fingerprints and iris of each individual. It is easily verifiable in an online, cost-effective way.

It is unique and robust enough to eliminate the large number of duplicate and fake identities in government and private databases. The random number generated will be devoid of any classification based on caste, creed, religion and geography.

METHODOLOGY TO BE USED
The spiral model combines the idea of (prototyping) with the systematic, controlled aspects of the under control. At each iteration around the cycle, the products are extensions of an earlier product. This model uses many of the same phases as the waterfall model, in essentially the same order, separated by planning, risk assessment, and the building of prototypes and simulations Documents are produced when they are required, and the content reflects the information necessary at that point in the process. All documents will not be created at the beginning of the process, nor all at the end (hopefully). Like the product they define, the documents are works in progress. The idea is to have a continuous stream of products produced and available for user review. The spiral lifecycle model allows for elements of the product to be added in when they become available or known. This assures that there is no conflict with previous requirements and design. This method is consistent with approaches that have multiple software builds and releases and allows for making an orderly transition to a maintenance activity. Another positive aspect is that the spiral model forces early user involvement in the system development effort. For projects with heavy user interfacing, such as user application programs or instrument interface applications, such involvement is helpful.

Determine the objectives, alternatives, and constraints on the new iteration. Evaluate alternatives and identify and resolve risk issues. Develop and verify the product for this iteration. Plan the next iteration.

10

Note that the requirements activity takes place in multiple sections and in multiple iterations, just as planning and risk analysis occur in multiple places. Final design, implementation, integration, and test occur in iteration 4. The spiral can be repeated multiple times for multiple builds. Using this method of development, some functionality can be delivered to the user faster than the waterfall method. The spiral method also helps manage risk and uncertainty by allowing multiple decision points and by explicitly admitting that all of anything cannot be known before the subsequent activity starts The spiral model is mostly used in large projects

11

The methodology to be used to complete the project will cover many steps. Basically it will be a step by step process to move toward the solution for the Web Portal. Following points give a concise description of the methodology which will be adopted. First phase would be to study the system in place which needs to be automated. In Second phase using automated tools and standards software for the client requirement data will be gathered. In Third phase, the solution designing will be done using software engineering tools. In Fourth phase, the .NET framework and other languages like Visual Basic.NET etc will be used for coding the software. Also the coding will use different coding style to increase its readability and maintainability properties. In Fifth phase, the coded software will be tested using test cases. The test cases will include cases where there is a chance of exception generation. After this the clients data will be used to test the software. Finally, the help will be prepared so that user can independently use the software.

12

BIBLIOGRAPHY

Name of the Book


ASP.NET 2.0 Learning My Sql ODBC using ADO.Net

Authors Name
William Jones Trudy Pelzer Kevi Kline

Publications
BPB Publications. Tata McGraw Hill Tata McGraw Hill

C# And .NET frame Work ASP.NET Visual Studio .Net With C# Software Engineering

Robert Powell

New Age International

James Grusong Herbert K Mathews

Prentice Hall Publications Prentice Hall Publications

K.K. Aggarwal & Yogesh Singh

New Age International

World Wide Web www.wikipedia.com www.codeprojects.com www.w3schools.com www.quackit.com www .dotnetspider.com

13