Вы находитесь на странице: 1из 51

RFID BASED RATION CARD

ABSTRACT
India’s Public Distribution System (PDS) is the largest food distribution system in the
world. Public distribution system provides a ration card issued under an order or authority of the
State Government for the purchase of essential consumer materials like rice, wheat, kerosene and
oil. State Government issues distinctive ration cards like yellow ration card, saffron ration card,
and white ration card depending on family annual income. The consumer material is distributed
to ration card holders in the first week of every month by ration shopkeeper. Public Distribution
System is one of the systems that involve malpractice. The ration shop owner illegally uses
consumer materials without prior knowledge of ration card holders. The proposed system aids to
control malpractices which are present in ration shop by replacing manual work with automatic
system based on RFID. Every consumer i.e. family head will be provided with a RFID card
which acts as ration card. The RFID card has unique identification number. The consumer scans
the card on RFID reader which is interfaced with microcontroller kept at ration shop. Once
consumer is validated by details, the system shows customer’s ration details and cost. Based on
material chosen by consumer, the consumer will get the ration and he will pay through dummy
payment gateway. The proposed RFID based automatic ration shop system would bring
transparency in public distribution system and become helpful to prevent malpractices.
CHAPTER 1

INTRODUCTION TO RFID

Radio-frequency identification (RFID) is an automatic identification method, relying on


storing and remotely retrieving data using devices called RFID tags or transponders. The
technology requires some extent of cooperation of an RFID reader and an RFID tag.

An RFID tag is an object that can be applied to or incorporated into a product, animal, or
person for the purpose of identification and tracking using radio waves. Some tags can be read
from several meters away and beyond the line of sight of the reader.

An RFID tag is an object that can be applied to or incorporated into a product, animal, or
person for the purpose of identification and tracking using radio waves. Some tags can be read
from several meters away and beyond the line of sight of the reader.

What is RFID?

A basic RFID system consists of three components:

a) An antenna or coil

b) A transceiver (with decoder)

c) A transponder (RF tag)

Electronically programmed with unique information. There are many different types of
RFID systems out in the market. They are categorized according to there frequency ranges. Some
of the most commonly used RFID kits are as follows:

1) Low-frequency (30 KHz to 500 KHz)

2) Mid-Frequency (900KHz to 1500MHz)

3) High Frequency (2.4GHz to 2.5GHz)


These frequency ranges mostly tell the RF ranges of the tags from low frequency tag ranging
from 3m to 5m, mid-frequency ranging from 5m to 17m and high frequency ranging from 5ft to
90ft. The cost of the system is based according to there ranges with low-frequency system
ranging from a few hundred dollars to a high-frequency system ranging somewhere near 5000
dollars.

How RFID Is Changing the Business Environment today

Radio frequency identification (RFID) technology has been in use for several decades to
track and identify goods, assets and even living things. Recently, however, RFID has generated
widespread corporate interest as a means to improve supply chain performance. Market activity
has been exploding since Wal-Mart's June 2003 announcement that its top 100 suppliers must be
RFID-compliant by January 2005. Mandates from Wal-Mart and the Department of Defense
(DoD) are making many companies scramble to evaluate, select and implement solutions that
will make them compliant with their customers' RFID requirements and additional retailers and
other large supply chain channel masters are likely to follow suit.

Ration card

A public distribution shop is a part of India's public distribution system established by


Government of India which distributes rations at a subsidized price to the poor. Locally these are
known as "ration shops" and chiefly sell wheat, rice and sugar at a price lower than the market
price. Other essential commodities may also be sold. To buy this items one must have a "Ration
Card". A below poverty line (BPL) card holder should be given 35 kg of food grain and the card
holder above the poverty line should be given 15 kg of food grain as per the norms of PDS.
However, there are concerns about the efficiency of the distribution process.

Distribution to granted PDS services has been highly irregular and diverse in various
states. There are no set criteria as to which family is BPL and which APL is So to avoid this, we
move towards a optimized ration card system using RFID, Biometrics and GSM technique. In
the proposed system each ration shop contains a RFID reader which reads the RFID card, RFID
reader is used to check whether the user is valid or not. Biometrics is used to identify the user. It
stores fingerprints of users into the database. GSM is used to send the information of ration taken
to the government and also to the customer. This new produced system will solve all the above
problems effectively.
CHAPTER 2

SYSTEM STUDY

FEASIBILITY STUDY

The feasibility of the project is analyzed in this phase and business proposal is put forth with a
very general plan for the project and some cost estimates. During system analysis the feasibility
study of the proposed system is to be carried out. This is to ensure that the proposed system is
not a burden to the company. For feasibility analysis, some understanding of the major
requirements for the system is essential.

Three key considerations involved in the feasibility analysis are

 ECONOMICAL FEASIBILITY

 TECHNICAL FEASIBILITY

 SOCIAL FEASIBILITY

ECONOMICAL FEASIBILITY

This study is carried out to check the economic impact that the system will have on
the organization. The amount of fund that the company can pour into the research and
development of the system is limited. The expenditures must be justified. Thus the developed
system as well within the budget and this was achieved because most of the technologies used
are freely available. Only the customized products had to be purchased.

TECHNICAL FEASIBILITY

This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the available
technical resources. This will lead to high demands on the available technical resources. This
will lead to high demands being placed on the client. The developed system must have a modest
requirement, as only minimal or null changes are required for implementing this system.
SOCIAL FEASIBILITY

The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must not feel
threatened by the system, instead must accept it as a necessity. The level of acceptance by the
users solely depends on the methods that are employed to educate the user about the system and
to make him familiar with it. His level of confidence must be raised so that he is also able to
make some constructive criticism, which is welcomed, as he is the final user of the system.
CHAPTER 3

SYSTEM ANALYSIS

EXISTING WORK RFID:

Short range wireless communication system which uses radio frequency technology for
automatic target recognition. It consists of three parts: labels, antennas and readers. The
technology used to identify every individual uniquely is known as biometrics. Biometrics also
refers to the pattern recognition system where the users’ bio data is being referenced from the
database. GSM (Global System for Mobile Communications) is applied where mobile phones
connect to other cells in the immediate locality. RFID is different from other technologies
because it contains all the sensor tags embedded in the tracked object itself.

PROPOSED SYSTEM:

In this proposed system conventional ration card is replaced by RFID (smart ration card)
in which all the details about users are provided including their bank details which is used for
user authentication. It proposes to use smart card instead of manual ration card with Biometrics
for unique authentication. Main perspective of this system is to avoid frauds in Ration shops and
to provide some technology based environment to government sector.

TECHNOLOGY TO BE USED:

System uses RFID techniques for verification and validation of users. RFID: Radio Frequency
identification is a technology for non contact and automated identification. It is a concept in
which unique items are identified by using radio waves. RFID systems are built up of three
components:

1. Readers (interrogators)

2. Antennas and

3. Tags (transponders) that take the data on a small microchip.


Now a day's RFID technology is used in many applications, including security and access
control, transportation and supply chain tracking etc. Many types of RFID exist, but at the
highest level, The RFID devices are divided into two broad classes: Active and Passive.
CHAPTER 4

SYSTEM SPEDIFICATIONS

4.1 HARDWARE REQUIREMENTS


• Processor : INTEL PENTIUM IV 2.6 Ghz

• RAM : 4 GB

• Hard Disk Drive : 500 GB

• Key Board : Standard 128 Keys

• Monitor : 17” TFT MONITOR

• Mouse : Logitech Serial Mouse

• RFID - Radio-frequency identification

• GSM Modem

4.2 SOFTWARE REQUIREMENTS

• Operating System : Windows 7 or XP

• Frond end : VISUAL BASIC 6.0

• Back end : SQL Server 2005


4.3 SOFTWARE SPECIFICATION

VISUAL BASIC .NET

(VB.NET) is an object oriented computer programming language implemented on the


.NET Framework. Although it is an evolution of classic Visual Basic language, it is not
backwards compatible with VB6, and any code written in the old version does not compile under
VB.NET. Like all other .NET languages, VB.NET has complete support for object -oriented
concepts. Everything in VB.NET is an object, including all of the primitive types (Short, Integer,
Long, String, Boolean, etc.) and user - defined types, events, and even assemblies. All objects
inherits from the base class Object.

VB.NET is implemented by Microsoft's .NET framework. Therefore, it has full access to


all the libraries in the .Net Framework. It's also possible to run VB.NET programs on Mono, the
open -source alternative to .NET, not only under Windows, but even Linux or Mac OSX.

The following reasons make VB.Net a widely used professional language:

 Modern, general purpose.

 Object oriented.

 Component oriented.

 Easy to learn.

 Structured language.

 It produces efficient programs.

 It can be compiled on a variety of computer platforms.

 Part of .Net Framework.


.Net Framework

The .Net framework is a revolutionary platform that helps you to write the following
types of applications:

 Windows applications

 Web applications

 Web services

The .Net framework applications are multi – platform applications. The framework has
been designed in such a way that it can be used from any of the following languages: Visual
Basic, C#, C++, Jscript, and COBOL, etc.All these languages can access the framework as well
as communicate with each other.

The .Net framework consists of an enormous library of codes used by the client
languages like VB.Net. These languages use object - oriented methodology.

Following are some of the components of the .Net framework:

 Common Language Runtime (CLR)

 The .Net Framework Class Library

 Common Language Specification

 Common Type System

 Metadata and Assemblies

 Windows Forms

 ASP.Net and ASP.Net AJAX

 ADO.Net
Integrated Development Environment (IDE) For VB.Net

Microsoft provides the following development tools for VB.Net programming:

 Visual Studio 2010 (VS)

 Visual Basic 2010 Express (VBE)

 Visual Web Developer

The last two are free. Using these tools, you can write all kinds of VB.Net programs from
simple command - line applications to more complex applications. Visual Basic Express and
Visual Web Developer Express edition are trimmed down versions of Visual Studio and has the
same look and feel. They retain most features of Visual Studio. In this tutorial, we have used
Visual Basic 2010 Express and Visual Web Developer (for the web programming chapter). You
can download it from here. It gets automatically Istalled in your machine. Please note that you
need an active internet connection for installing the express edition.

Structured Query Language

Introduction to SQL

SQL is nonprocedural language that provides database access. It is nonprocedural in that


users describe in SQL what they want done, and the SQL language compiler automatically
generates a procedure to navigate the database and perform the desired task.

Oracle SQL includes many extensions to the ANSI/ISO standard SQL language, and
Oracle tools and applications provide additional statements. The Oracle tools SQL*Plus and
Oracle Enterprise Manager let you run any ANSI/ISO standard SQL statement against an Oracle
database, as well as additional statements or functions that are available for those tools.

Although some Oracle tools and applications simplify or mask SQL use, all database
operations are performed using SQL. Any other data access method circumvents the security
built into Oracle Database and potentially compromises data security and integrity.
SQL Statements:

All operations performed on the information in Oracle Database are run using
SQL statements. A statement consists of identifiers, parameters, variables, names, datatypes, and
SQL reserved words. SQL reserved words have special meaning in SQL and cannot be used for
any other purpose. For example, SELECT and UPDATE are reserved words and cannot be used
as table names.

A SQL statement is a computer program or instruction. The statement must be the


equivalent of a complete SQL sentence, such as:

SELECT last_name, department_id FROM employees;

Only complete SQL statements can be run. A fragment such as the following generates
an error indicating that more text is required before a SQL statement can run:

SELECT last_name;

SQL statements are divided into the following categories:

 Data Manipulation Language Statements

 Data Definition Language Statements

 Transaction Control Statements

 Session Control Statements

 System Control Statements

 Embedded SQL Statements

Data Manipulation Language Statements

Data manipulation language (DML) statements query or manipulate data in existing schema
objects. They enable you to:

 Retrieve or fetch data from one or more tables or views (); fetches can be scrollable
(see "Scrollable Cursors").
 Add new rows of data into a table or view (INSERT).

 Change column values in existing rows of a table or view (UPDATE).

 Update or insert rows conditionally into a table or view (MERGE).

 Remove rows from tables or views (DELETE).

 View the execution plan for a SQL statement (EXPLAIN PLAN).

 Lock a table or view, temporarily limiting other users' access (LOCK TABLE).

DML statements are the most frequently used SQL statements. Some examples of DML
statements are:

SELECT last_name, manager_id, commission_pct + salary FROM employees;

INSERT INTO employees VALUES(1234, ‘DAVIS’, ‘SALESMAN’, 7698,

’14-FEB-1988’,1600,500,30);

DELETE FROM employees WHERE last_name IN (‘WARD’,’JONES’);

DML Error Logging

When a DML statement encounters an error, the statement can continue processing while
the error code and the associated error message text is logged to an error logging table. This is
particularly helpful to long-running, bulk DML statements. After the DML operation completes,
you can check the error logging table to correct rows with errors.

New syntax is added to the DML statements to provide the name of the error logging
table, a statement tag, and a reject limit. The reject limit determines whether the statement should
be aborted. For parallel DML operations, the reject limit is applied for each slave. The only
values for the reject limit that are precisely enforced on parallel operations are zero and
unlimited.
With data conversion errors, Oracle Database tries to provide a meaningful value to log for the
column. For example, it could log the value of the first operand to the conversion operator that
failed. If a value cannot be derived, then NULL is logged for the column.

Data Definition Language Statements

Data definition language (DDL) statements define, alter the structure of, and drop schema
objects. DDL statements enable you to:

 Create, alter, and drop schema objects and other database structures, including the
database itself and database users (CREATE, ALTER, DROP).

 Change the names of schema objects (RENAME).

 Delete all the data in schema objects without removing the objects' structure
(TRUNCATE).

 Grant and revoke privileges and roles (GRANT, REVOKE).

 Turn auditing options on and off (AUDIT, NOAUDIT).

 Add a comment to the data dictionary (COMMENT).

DDL statements implicitly commit the preceding commands and start new transactions. Some
examples of DDL statements are:

CREATE TABLE plants

(COMMON_NAME VARCHAR2 (15), LATIN_NAME VARCHAR2 (40));

DROP TABLE plants;

GRANT SELECT ON employees TO scott;

REVOKE DELETE ON employees FROM scott;


Transaction Control Statements

Transaction control statements manage the changes made by DML statements and group
DML statements into transactions. They enable you to:

 Make changes to a transaction permanent (COMMIT).

 Undo the changes in a transaction, since the transaction started or since a savepoint
(ROLLBACK).

 Set a point to which you can roll back (SAVEPOINT).

 Establish properties for a transaction (SET TRANSACTION).

Session Control Statements

Session control statements manage the properties of a particular user's session. For example,
they enable you to:

 Alter the current session by performing a specialized function, such as enabling and
disabling the SQL trace facility (ALTERSESSION).

 Enable and disable roles (groups of privileges) for the current session (SET ROLE).

System Control Statements

System control statements change the properties of the Oracle database instance. The
only system control statement is ALTERSYSTEM. It enables you to change settings (such as the
minimum number of shared servers), terminate a session, and perform other tasks.

Embedded SQL Statements

Embedded SQL statements incorporate DDL, DML, and transaction control statements
within a procedural language program. They are used with the Oracle precompilers. Embedded
SQL statements enable you to:

 Define, allocate, and release cursors (DECLARE CURSOR, OPEN, CLOSE).


 Specify a database and connect to Oracle Database (DECLARE
DATABASE, CONNECT).

 Assign variable names (DECLARE STATEMENT).

 Initialize descriptors (DESCRIBE).

 Specify how error and warning conditions are handled (WHENEVER).

 Parse and run SQL statements (PREPARE, EXECUTE, EXECUTE IMMEDIATE).

 Retrieve data from the database (FETCH).

Shared SQL Areas

Oracle Database automatically notices when applications send similar SQL statements to
the database. The SQL area used to process the first occurrence of the statement is shared—that
is, used for processing subsequent occurrences of that same statement. Therefore, only one
shared SQL area exists for a unique statement. Because shared SQL areas are shared memory
areas, any Oracle Database process can use a shared SQL area. The sharing of SQL areas reduces
memory use on the database server, thereby increasing system throughput.

In evaluating whether statements are similar or identical, Oracle Database considers SQL
statements issued directly by users and applications as well as recursive SQL statements issued
internally by a DDL statement.

Parsing

Parsing is one stage in the processing of a SQL statement. When an application issues a SQL
statement, the application makes a parse call to Oracle Database. During the parse call, Oracle
Database:

 Checks the statement for syntactic and semantic validity.

 Determines whether the process issuing the statement has privileges to run it.

 Allocates a private SQL area for the statement.


Oracle Database also determines whether or not there is an existing shared SQL area containing
the parsed representation of the statement in the library cache. If so, the user process uses this
parsed representation and runs the statement immediately. If not, Oracle Database generates the
parsed representation of the statement, and the user process allocates a shared SQL area for the
statement in the library cache and stores its parsed representation there.

Note the difference between an application making a parse call for a SQL statement and Oracle
Database actually parsing the statement.

 A parse call by the application associates a SQL statement with a private SQL area. After
a statement has been associated with a private SQL area, it can be run repeatedly without
your application making a parse call.

 A parse operation by Oracle Database allocates a shared SQL area for a SQL statement.
Once a shared SQL area has been allocated for a statement, it can be run repeatedly
without being reparsed.

Both parse calls and parsing can be expensive relative to execution, so perform them as seldom
as possible.

See Also:

"Overview of PL/SQL"

Although parsing a SQL statement validates that statement, parsing only identifies errors that can
be found before statement execution. Thus, some errors cannot be caught by parsing. For
example, errors in data conversion or errors in data (such as an attempt to enter duplicate values
in a primary key) and deadlocks are all errors or situations that can be encountered and reported
only during the execution stage.

Query Processing

Queries are different from other types of SQL statements because, if successful, they return data
as results. Whereas other statements simply return success or failure, a query can return one row
or thousands of rows. The results of a query are alwaysin tabular format, and the rows of the
result are fetched (retrieved), either a row at a time or in groups.
Several issues relate only to query processing. Queries include not only
explicit SELECT statements but also the implicit queries(subqueries) in other SQL statements.
For example, each of the following statements requires a query as a part of its execution:

INSERT INTO table SELECT...

UPDATE table SET x = y WHERE...

DELETE FROM table WHERE...

CREATE table AS SELECT...

In particular, queries:

 Require read consistency

 Can use temporary segments for intermediate processing

 Can require the describe, define, and fetch stages of SQL statement processing.

SQL Processing

This section introduces the basics of SQL processing. It starts with a flowchart of typical
SQL statement execution which generally covers most types of SQL statements. Followed by a
general description of the stages of SQL statement processing, and then a section indicating how
the flowchart and description may differ for different types of SQL statements.
CHAPTER 5

SYSTEM IMPLEMENTATION

Implementation is the stage of the project when the theoretical design is turned out into a
working system. Thus it can be considered to be the most critical stage in achieving a successful
new system and in giving the user, confidence that the new system will work and be effective.

The implementation stage involves careful planning, investigation of the existing system
and it’s constraints on implementation, designing of methods to achieve changeover and
evaluation of changeover methods.

IMPLEMENTATION AND DISCUSSION

In this proposed system, we briefly discuss the existing works about Public Distribution System.

 In this automated system conventional ration card is replaced by RFID (smart card) in
which all the details about users are provided including their bank details which is
used for user authentication.
 It provides 2 Level Multi-Factor Authentication (RFID Smart Card and Biometrics).
 This proposed to use smart card instead of manual ration card with Biometrics for
unique authentication
MODULES

Login Module:

In this module, the system registers beneficiaries details that includes their name, address,
fingerprint, date of birth, age, count of family members and category of the card to which the
family belong, with all the information being uploaded in the database.

RFID Card Verification Module:

RFID being a part of Automatic Identification and Data Capture (AIDC) technologies is
considered to be a fast and reliable means of identifying objects. RFID based Smart Card
verification module consists of two prime components, they are interrogator and transponder.

Processing

The receiving pin of the microcontroller received the data from the RFID reader. The
microcontroller processes the ration card data and match the ration card details with the database
and process it.

Displaying system

If the data is found reliable, then the system will process for displaying the name of the
ration card holder and the quantity of ration chosen for the customer.
CHAPTER 6

SYSTEM DESIGN

FLOW DIAGRAM
INPUT DESIGN

The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to put
transaction data in to a usable form for processing can be achieved by inspecting the computer to
read data from a written or printed document or it can occur by having people keying the data
directly into the system. The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The
input is designed in such a way so that it provides security and ease of use with retaining the
privacy. Input Design considered the following things:

 What data should be given as input?

 How the data should be arranged or coded?

 The dialog to guide the operating personnel in providing input.

 Methods for preparing input validations and steps to follow when error occur.

OBJECTIVES

1.Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process and
show the correct direction to the management for getting correct information from the
computerized system.

2. It is achieved by creating user-friendly screens for the data entry to handle large volume of
data. The goal of designing input is to make data entry easier and to be free from errors. The data
entry screen is designed in such a way that all the data manipulates can be performed. It also
provides record viewing facilities.

3.When the data is entered it will check for its validity. Data can be entered with the help of
screens. Appropriate messages are provided as when needed so that the user will not be in maize
of instant. Thus the objective of input design is to create an input layout that is easy to follow
OUTPUT DESIGN

A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users and to
other system through outputs. In output design it is determined how the information is to be
displaced for immediate need and also the hard copy output. It is the most important and direct
source information to the user. Efficient and intelligent output design improves the system’s
relationship to help user decision-making.

1. Designing computer output should proceed in an organized, well thought out manner; the right
output must be developed while ensuring that each output element is designed so that people will
find the system can use easily and effectively. When analysis design computer output, they
should Identify the specific output that is needed to meet the requirements.

2.Select methods for presenting information.

3.Create document, report, or other formats that contain information produced by the system.

The output form of an information system should accomplish one or more of the following
objectives.

 Convey information about past activities, current status or projections of the

 Future.

 Signal important events, opportunities, problems, or warnings.

 Trigger an action.

 Confirm an action.
CHAPTER 6

SYSTEM TESTING

The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the Software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.

TYPES OF TESTS

Unit testing

Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.

Integration testing

Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.
Functional test

Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.

Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.

Functions : identified functions must be exercised.

Output : identified classes of application outputs must be exercised.

Systems/Procedures: interfacing systems or procedures must be invoked.

Organization and preparation of functional tests is focused on requirements, key functions, or


special test cases. In addition, systematic coverage pertaining to identify Business process flows;
data fields, predefined processes, and successive processes must be considered for testing.
Before functional testing is complete, additional tests are identified and the effective value of
current tests is determined.

System Test

System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.

White Box Testing

White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose. It is
used to test areas that cannot be reached from a black box level.
Black Box Testing

Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests,
must be written from a definitive source document, such as specification or requirements
document, such as specification or requirements document. It is a testing in which the software
under test is treated, as a black box .you cannot “see” into it. The test provides inputs and
responds to outputs without considering how the software works.

Unit Testing:

Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be conducted as
two distinct phases.

Test strategy and approach

Field testing will be performed manually and functional tests will be written in detail.

Test objectives

 All field entries must work properly.

 Pages must be activated from the identified link.

 The entry screen, messages and responses must not be delayed.

Features to be tested

 Verify that the entries are of the correct format

 No duplicate entries should be allowed

 All links should take the user to the correct page.


Integration Testing

Software integration testing is the incremental integration testing of two or more


integrated software components on a single platform to produce failures caused by interface
defects.

The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level –
interact without error.

Test Results: All the test cases mentioned above passed successfully. No defects encountered.

Acceptance Testing

User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.

Test Results: All the test cases mentioned above passed successfully. No defects encountered.
CHAPTER 7

CONCLUSION

The proposed system is more secure and transparent than the normal existing system.
Influence of fraud data entry in the ration database can be maintained simply with the use of this
smart ration card system. Only authorized person (shopkeeper) can maintain the database.
Customer can be authenticated using RFID swapping and thumb detection. In the planned it is
expected that the proposed system will be more transparent, reliable than the existing ration card
system.

FUTURE RESEARCH

The main aim of this paper is to provide the guidelines for further research related to
emotion recognition. The outlines are given below:

 Train the system in such a manner that it determines the emotions in a more
efficient and precise way with minimum error rate.
 Achieve 100% accuracy in predicting the emotions with the help of above
approaches.
 Include new features like mood detection of person.
 Design a system which will work with both offline and online.
REFERENCES

[1] Chiou Liou, G. Egan, 1. Patel and S. Bhashyam, "A Sophisticated RFID Application on
Multi-Factor Authentication" IEEE Eighth International Conference on Information Technology,
pp. 180-185, 2011.

[2] R.Ramani, S.Valarmathy, S.Selvaraju and P.Niranjan,” Bank Locker Security System based
on RFID and GSM Technology”, International Journal of Computer Applications (0975 – 8887)
Volume 57– No.18, November 2012

[3] Sandhya Konatham, Bhamini Surya Chalasani, Nikita Kulkarni, Tarik El Taeib,”
ATTENDANCE GENERATING SYSTEM USING RFID AND GSM” Dept. of Computer
Science University of Bridgeport, CT, USA. 940 | P a g e

[4] Ishan Bhardwaj, Narendra D. Londhe,Sunil K. Kopparapu "Feature Selection for Novel
Fingerprint Dynamics Biometric Technique based on PCA"Electrical Engineering Department
NIT Raipur Raipur, India

[5] P. Kalaimathi, V. Ganesan "Extraction and Authentication of Biometric Finger Vein using
Gradient Boosted Feature Algorithm"

[6] Gyanendra K Verma,Pawan Tripathi "A Digital Security System with Door Lock System
Using RFID Technology" Indian Institute of Information Technology Allahabad-India

[7] Ala.Sivaganga Rao,G. Chandr Reddy "SMART AND SECURE RATION SYSTEM" 2
Assistant Professor, Nalanda Institute of Technology(NIT), Siddharth Nagar,India

[8] Ankush Vishwanath, Basappa Yelappa Haibatti, Pavan Krishna Kotekar, Rakesh kumar T S,
Sandesh A, Shreyas M Belavadi,Sudarshan Patil Kulkarni "RFID and GSM based three Level
Security System" Sri Jayachamarajendra College of Engineering, Mysore

[9] Aamir Nizam Ansari, Arundhati Navada, Sanchit Agarwal,Siddharth Patil,Balwant A


Sonkamble "Automation of Attendance System using RFID, Biometrics, GSM Modem with .Net
Framework" Department of Computer Engineering, Pune Institute of Computer Technology,
Pune, India
[10] Geetha Govindan, Suresh Kumar Balakrishnan, Rejith Lalitha Ratheendran, Saji
Koyippurathu Sivadasan "Real time Security Management using RFID, Biometric and Smart
Messages" Sree Chitra Tirunal Institute For Medical Sciences & Technology, Medical College
Campus Thiruvananthapuram, Kerala, India

[11] Vinayak T. Shelar, Mahadev S. Patil "RFID and GSM based Automatic Rationing System
using LPC2148"

[12] Miss. Prajakta Lokhande, Miss. Dipali Kotkar, Miss Pooja Nikam "Combined RFID-
Biometric based MIS for student information" Department of Computer Engineering Sir
Visvesvaraya Institute Of Technology Chincholi, Nashik.
BIBLIOGRAPHY

http://www.techcrunch.com/2006/12/

http://aws.amazon.com/

http://code.google.com/appengine/

http://tomopt.com/tomlab/,

http://www.cern.com/

http://www.gogrid.com/,

http://www.microsoft.com/azure/

http://www.sdss.org/
SAMPLE CODING:

Private Sub CmdCancel_Click()

End

End Sub

Private Sub CmdOk_Click()

If Trim(TxtUserName) = "" Then

MsgBox "Type User Name", vbInformation

TxtUserName.SetFocus

Exit Sub

End If

If Trim(TxtPassword) = "" Then

MsgBox "Type Password", vbInformation

TxtPassword.SetFocus

Exit Sub

End If

Call InitConn

Set Rrset = Ftcon.Execute("Select * from UserName where UserName = '" &


Trim(TxtUserName.Text) & "' and Password='" & Trim(TxtPassword.Text) & "'")

If Rrset.EOF = False Then

If Trim(TxtUserName.Text) = Rrset("UserName") And Trim(TxtPassword.Text) =


Rrset("Password") Then

Unload Me

End If

Else

MsgBox "UserName or Password not correct", vbCritical

TxtUserName.SetFocus

If Rrset.State = adStateOpen Then Rrset.Close


Exit Sub

End If

End Sub

Private Sub Form_Unload(Cancel As Integer)

MDIForm1.Show

End Sub

Dim b As String

Dim rxx As String

Private Declare Sub Sleep Lib "kernel32.dll" (ByVal dwMilliseconds As Long)

Private Sub Com_delete_Click()

If Trim(Com_entry.Text) = "" Then

MsgBox "Select Name", vbInformation

Com_entry.SetFocus

End If

answer = MsgBox("Delete", vbYesNo + vbQuestion)

If answer = 6 Then

Sql = "Delete * from Entry where Userid ='" & Trim(Tx_ID.Text) & "'"

Set Rrset = Ftcon.Execute(Sql)

End If

If answer = 7 Then

Exit Sub

End If

Call Form_Load

End

Private Sub Com_entry_Click()

If Screen.MousePointer = vbHourglass Then Exit Sub


If Com_entry.ListIndex <> -1 Then

Set Rrset = Ftcon.Execute("Select * from Entry where UserName ='" & Trim(Com_entry.Text) & "'")

If Rrset.EOF = False Then

Do While Rrset.EOF = False

Tx_ID.Text = Rrset("Userid")

Tx_Name.Text = Rrset("UserName")

Combo_gen.Text = Rrset("Gen")

Tx_address.Text = Rrset("Address")

Tx_City.Text = Rrset("City")

Tx_pin.Text = Rrset("Pin")

Tx_phone.Text = Rrset("Phone")

Tx_email.Text = Rrset("Email")

Tx_m1.Text = Rrset("m1")

Tx_m2.Text = Rrset("m2")

Tx_m3.Text = Rrset("m3")

Rrset.MoveNext

Loop

End If

End If

Exit Sub

Private Sub Com_new_Click()

Com_entry.Text = ""

Tx_Name.Text = ""

Tx_ID.Text = ""

Combo_gen.Text = ""

Tx_address.Text = ""
Tx_City.Text = ""

Tx_pin.Text = ""

Tx_phone.Text = ""

Tx_email.Text = ""

Tx_m1.Text = ""

Tx_m2.Text = ""

Tx_m3.Text = ""

End Sub

Private Sub eexit_Click()

Call Com_new_Click

Entry_frm.Visible = False

End Sub

Private Sub esave_Click()

If Trim(Tx_Name.Text) = "" Then

MsgBox "Enter Name", vbInformation

Tx_Name.SetFocus

Exit Sub

End If

If Trim(Tx_ID.Text) = "" Then

MsgBox "Enter id", vbInformation

Tx_ID.SetFocus

Exit Sub

End If

If Trim(Tx_m1.Text) = "" Then

MsgBox "Enter Member 1", vbInformation

Tx_m1.SetFocus
Exit Sub

End If

If Trim(Tx_m2.Text) = "" Then

MsgBox "Enter Member 2", vbInformation

Tx_m2.SetFocus

Exit Sub

End If

If Trim(Tx_m3.Text) = "" Then

MsgBox "Enter Member 3", vbInformation

Tx_m3.SetFocus

Exit Sub

End If

Screen.MousePointer = vbHourglass

Ftcon.BeginTrans

If Com_entry.ListIndex = -1 Then

answer = MsgBox("Save", vbYesNo + vbQuestion)

If answer = vbNo Then

Ftcon.RollbackTrans

TxtEmployeeCode.SetFocus

Exit Sub

End If

Sql = "Select Userid from Entry where Userid='" & Trim(Tx_ID.Text) & "'"

Set Rrset = Ftcon.Execute(Sql)

cnt = 0

cnt = Rrset.RecordCount

If cnt > 0 Then


Ftcon.RollbackTrans

Screen.MousePointer = vbArrow

MsgBox "Employee Code already exists", vbCritical

EmployeeCode.SetFocus

Exit Sub

End If

Rrset.Close

Set Rrset = New ADODB.Recordset

Rrset.Open "select * from Entry", Ftcon, adOpenStatic, adLockOptimistic

Rrset.AddNew

Rrset("Userid") = Trim(Tx_ID.Text)

Rrset("UserName") = Trim(Tx_Name.Text)

Rrset("Gen") = Trim(Combo_gen.Text)

Rrset("Address") = Trim(Tx_address.Text)

Rrset("City") = Trim(Tx_City.Text)

Rrset("Pin") = Trim(Tx_pin.Text)

Rrset("Phone") = Trim(Tx_phone.Text)

Rrset("Email") = Trim(Tx_email.Text)

Rrset("m1") = Trim(Tx_m1.Text)

Rrset("m2") = Trim(Tx_m2.Text)

Rrset("m3") = Trim(Tx_m3.Text)

Rrset.Update

Rrset.Close

MsgBox "Record Saved", vbInformation

Else

answer = MsgBox("Update", vbYesNo + vbQuestion)


If answer = vbNo Then

Ftcon.RollbackTrans

TxtUserName.SetFocus

Exit Sub

End If

MsgBox "Record Updated"

End If

Ftcon.CommitTrans

Screen.MousePointer = vbArrow

Call Com_new_Click

Call Form_Load

End Sub

Private Sub Form_Activate()

MSComm1.CommPort = Val(Tx_comm_val)

MSComm1.PortOpen = True

End Sub

Private Sub Form_Load()

Combo_gen.AddItem "Male"

Combo_gen.AddItem "Female"

Sql = "Select Userid,UserName, Userid from Entry order by Userid"

Set Rrset = Ftcon.Execute(Sql)

Com_entry.Clear

Do While Rrset.EOF = False

Com_entry.AddItem (Rrset("UserName"))

Rrset.MoveNext

End Sub
Private Sub Form_LostFocus()

MSComm1.PortOpen = False

End Sub

Private Sub Timer1_Timer()

Tx_Time.Text = Time

Tx_Date.Text = Date

End Sub

'INPUT DATA

Private Sub Timer2_Timer()

On Error Resume Next

b = MSComm1.Input 'b=Dim a As String

For j = 1 To 40

If Mid$(b, j, 9) = "Navi.S.V_" Then

Tx_ID.Text = b

End If

Next j

End Sub

Dim b As String

Dim rxx As String

Private Sub Com_dexit_Click()

Call Com_dnew_Click

Distrubute_frm.Visible = False

End Sub

Private Sub Com_dnew_Click()

txx_name.Text = ""

txx_id.Text = ""
Combo_MAT.Text = ""

txx_city.Text = ""

txx_phone.Text = ""

txx_m1.Text = ""

txx_m2.Text = ""

txx_m3.Text = ""

End Sub

Private Sub Com_dsave_Click()

If Trim(Combo_MAT.Text) = "" Then

MsgBox "Enter MAterial", vbInformation

Combo_MAT.SetFocus

Exit Sub

End If

If Trim(TXX_QTY.Text) = "" Then

MsgBox "Enter Quantity", vbInformation

TXX_QTY.SetFocus

Exit Sub

End If

Ftcon.BeginTrans

Screen.MousePointer = vbHourglass

answer = MsgBox("Save", vbYesNo + vbQuestion)

If answer = vbNo Then

Ftcon.RollbackTrans

Combo_MAT.SetFocus

Exit Sub

End If
Set Rrset = New ADODB.Recordset

Rrset.Open "select * from Distrubute", Ftcon, adOpenStatic, adLockOptimistic

Rrset.AddNew

Rrset("Userid") = Trim(txx_id.Text)

Rrset("UserName") = Trim(txx_name.Text)

Rrset("City") = Trim(txx_city.Text)

Rrset("Phone") = Trim(txx_phone.Text)

Rrset("m1") = Trim(txx_m1.Text)

Rrset("m2") = Trim(txx_m2.Text)

Rrset("m3") = Trim(txx_m3.Text)

Rrset("Material") = Trim(Combo_MAT.Text)

Rrset("Oty") = Trim(TXX_QTY.Text)

Rrset.Update

MsgBox "Record Updated"

Ftcon.CommitTrans

Screen.MousePointer = vbArrow

Call Com_dnew_Click

End Sub

Private Sub Form_Activate()

MSComm2.CommPort = Val(Tx_comm_val)

MSComm2.PortOpen = True

End Sub

Private Sub Form_LostFocus()

MSComm2.PortOpen = False

End Sub

Private Sub Timer1_Timer()


Tx_Time.Text = Time

Tx_Date.Text = Date

End Sub

'INPUT DATA

Private Sub Timer2_Timer()

On Error Resume Next

b = MSComm2.Input 'b=Dim a As String

For j = 1 To 40

If Mid$(b, j, 9) = "Navi.S.V_" Then

txx_id.Text = b

End If

Next j

End Sub

Private Sub txx_id_Change()

If Screen.MousePointer = vbHourglass Then Exit Sub

Set Rrset = Ftcon.Execute("Select * from Entry where Userid='" & Trim(txx_id.Text) & "'")

If Rrset.EOF = False Then

Do While Rrset.EOF = False

txx_name.Text = Rrset("UserName")

txx_city.Text = Rrset("City")

txx_phone.Text = Rrset("Phone")

txx_m1.Text = Rrset("m1")

txx_m2.Text = Rrset("m2")

txx_m3.Text = Rrset("m3")

Rrset.MoveNext

Loop
End If

Exit Sub

End Sub

Dim b As String

Dim rxx As String

Dim tEX As Excel.Application

Dim tWB As Excel.Workbook

Dim tWS As Excel.Worksheet

Private Sub Command1_Click()

If txx_id.Text = "" Then

MsgBox "Enter ID", vbInformation

CmbYear.SetFocus

Exit Sub

End If

Screen.MousePointer = vbHourglass

Sql = "select * from Distrubute where Userid='" & Trim(txx_id.Text) & "'"

Sql = Sql & " order by Oty"

Set Rrset = Ftcon.Execute(Sql)

If Rrset.EOF = True Then

Screen.MousePointer = Default

MsgBox "No Record Found", vbInformation

Command1.SetFocus

Exit Sub

End If

Set tEX = New Excel.Application

Set tWB = tEX.Workbooks.Add


Set tWS = tWB.Worksheets(1)

tWS.PageSetup.PaperSize = xlPaperA4

tWS.PageSetup.PaperSize = 11

tWS.PageSetup.Zoom = 70

tWS.PageSetup.PrintTitleRows = "$4:$4"

tWS.Cells.Font.Name = "Times New Roman"

tWS.Cells.Font.Size = 11

tWS.Cells.VerticalAlignment = vbCenter

tWS.PageSetup.CenterHorizontally = True

tWS.PageSetup.Orientation = xlLandscape

tWS.PageSetup.PrintGridlines = True

tWS.PageSetup.LeftMargin = tEX.Application.InchesToPoints("0.20")

tWS.PageSetup.RightMargin = tEX.Application.InchesToPoints("0.20")

tWS.PageSetup.TopMargin = tEX.Application.InchesToPoints("0.20")

tWS.PageSetup.BottomMargin = tEX.Application.InchesToPoints("0.25")

tWS.Cells(1, 1) = "ELECTRONIC CARD BASED RATION SYSTEM"

tWS.Cells(3, 1) = "S.No"

tWS.Cells(3, 2) = "User Name"

tWS.Cells(3, 3) = "City"

tWS.Cells(3, 4) = "Phone"

tWS.Cells(3, 5) = "Member 1"

tWS.Cells(3, 6) = "Member 2"

tWS.Cells(3, 7) = "Material"

tWS.Cells(3, 8) = "Qty"

Row = 4
sno = 0

mDepartmentName = ""

While (Rrset.EOF = False)

sno = sno + 1

tWS.Range("a" & Row, "a" & Row).HorizontalAlignment = xlCenter

tWS.Range("b" & Row, "b" & Row).HorizontalAlignment = xlLeft

tWS.Range("c" & Row, "c" & Row).HorizontalAlignment = xlLeft

tWS.Range("d" & Row, "d" & Row).HorizontalAlignment = xlLeft

tWS.Range("e" & Row, "e" & Row).HorizontalAlignment = xlRight

tWS.Range("e" & Row, "e" & Row).NumberFormat = "0.00"

tWS.Range("f" & Row, "f" & Row).HorizontalAlignment = xlRight

tWS.Range("f" & Row, "f" & Row).NumberFormat = "0.00"

tWS.Range("g" & Row, "g" & Row).HorizontalAlignment = xlRight

tWS.Range("g" & Row, "g" & Row).NumberFormat = "0.00"

tWS.Range("h" & Row, "h" & Row).HorizontalAlignment = xlRight

tWS.Range("h" & Row, "h" & Row).NumberFormat = "0.00"

tWS.Cells(Row, 1) = sno

tWS.Cells(Row, 2) = Rrset("UserName")

tWS.Cells(Row, 3) = Rrset("City")

tWS.Cells(Row, 4) = Rrset("Phone")

tWS.Cells(Row, 5) = Rrset("M1")

tWS.Cells(Row, 6) = Rrset("M2")

tWS.Cells(Row, 7) = Rrset("Material")

tWS.Cells(Row, 8) = Rrset("Oty")

Rrset.MoveNext

Row = Row + 1
Wend

tWS.PageSetup.HeaderMargin = 0

tWS.PageSetup.CenterHorizontally = True

tWS.PageSetup.LeftFooter = Format(DateValue(Now), "dd/MMM/yyyy HH:MM")

tWS.PageSetup.RightFooter = "Startechnico Technocrats All Rights Reserved. "

tWS.PageSetup.CenterFooter = "&P of &N"

tWS.PageSetup.FooterMargin = 0

tWS.PageSetup.LeftMargin = tEX.Application.InchesToPoints("0.25")

tWS.PageSetup.RightMargin = tEX.Application.InchesToPoints("0.25")

tWS.PageSetup.TopMargin = tEX.Application.InchesToPoints("0.8")

tWS.PageSetup.BottomMargin = tEX.Application.InchesToPoints("0.5")

'tWS.Columns.AutoFit

tWS.Rows.AutoFit

tEX.Visible = True

tEX.WindowState = xlMaximized

Screen.MousePointer = vbArrow

End Sub

Private Sub Form_Activate()

MSComm3.CommPort = Val(Tx_comm_val)

MSComm3.PortOpen = True

End Sub

Private Sub Form_LostFocus()

MSComm3.PortOpen = False

End Sub

Private Sub Timer1_Timer()

Tx_Time.Text = Time
Tx_Date.Text = Date

End Sub

'INPUT DATA

Private Sub Timer2_Timer()

On Error Resume Next

b = MSComm3.Input 'b=Dim a As String

For j = 1 To 40

If Mid$(b, j, 9) = "Navi.S.V_" Then

txx_id.Text = b

End If

Next j

End Sub
SAMPLE SCREEN SHOTS:

Вам также может понравиться