Professional Documents
Culture Documents
An institution that has its roots in the annals of history and has evolved
and grown ever since, so as to be preserved as a part of our educational
and cultural heritage. The college with its aura of history and heritage
dates back to 1905, when His Highness, Maharaja Sir Pratap Singh
announced the opening of the college as Prince of Wales College. This was
to commemorate the visit of His Royal Highness, Prince of Wales, the
future King George V. Maharaja Pratap Singh, a benevolent ruler and a
great visionary of his times, thus, created the only institution of higher
learning in the entire Jammu region.
Prince of Wales College actually started functioning from 20th April 1907
in the then Ajaibghar. It had 26 students on its roll and Prof. R.N.
1|Page
Mukherjee officiated as the Principal of the College. The foundation
stone of the present college campus was laid in July 1904, amidst a vast
lush green area of about sixty-five acres, by the then Resident of
Kashmir, Sir Francis Young Husband.
The college was shifted to the present campus on 18th September 1912
with Prof. S. Robson as the Principal. The founders of the college were
undoubtedly men of great acumen and vision. The infrastructure planned a
hundred years ago, continues substantially to meet the ever increasing
needs of this institution even now. The college hostel that started
functioning in July 1910, nearly two years before the college was shifted
to the present campus, bears an ample testimony to the farsightedness of
the founders. The Prince of Wales College was affiliated to Punjab
University, Lahore in May 1908. Initially a stream of subjects namely
English, Mathematics, Chemistry, History, Persian, Sanskrit and
Philosophy were taught up to the Intermediate state. In January 1910,
two more subjects namely Geology and Arabic were introduced and
gradually most of the courses were upgraded to graduation level. During
this period, the college excelled academically and its infrastructure was
amongst the best in the whole of northern India. It attracted scholars
and teachers of repute and stature as its faculty members. In the
thirties, postgraduate classes were started in Geology, Economics and
Mathematics. The doyen of Indian Geology Dr. D.N. Wadia established
the Department of Geology of the college. Its departmental museum, with
its rich and rare collection, continues to be one of the best museums of
Geology in the whole of Northern India.
From 1931 onwards the college admitted both male and female students
on its rolls till 1944, when a separate Maharani Mahila College was opened
in the Present Luthra Academy at Kachi Chawni. However, in medical
stream, female students continued to be on the rolls till as late as 1966.
In the recent years with the introduction of subjects like Electronics,
Computer Applications, Functional English, BCA and Postgraduate course,
the college has once again started admitting female students. The college
2|Page
continued to expand and in 1940 Sh. K.G. Sayaiden, the then Director of
Education inaugurated an independent Library block. Around the same
time, the Arts Block came up and subsequently departments of Bio-
Sciences (1954) and Geography were also added. With the dawn of
independence, Prince of Wales College could not escape the spirit of
freedom and euphoria sweeping across the country. Thus, the College was
renamed as Govt. Gandhi Memorial College on 20th May 1948. In the
subsequent years, Arts and Science streams were separated and in the
Year 1954, two colleges namely Govt. Gandhi Memorial Science College and
Govt. Maulana Azad Memorial Arts College came into existence. Initially
both the Colleges operated from the same campus until the Arts stream
was shifted to the present campus of M.A.M. College. After
independence, the college was affiliated to the then J&K University and
subsequently to the University of Jammu in 1969, which came into
existence under the University Act-XXIV.
The College is recognized by UGC under Section 2b & 12f of UGC Act-
1956.
Since its inception, the College has been epitome of academic excellence,
adhering to the ever-changing aspiration and the needs of the student
community. The College strongly believes in blending tradition and
modernity in order to install age-old values amongst the students and yet
remain relevant to the 21st century academic scenario by transforming
and modernizing its academic and extra-curricular schedule.
To meet the growing challenges of the fast changing global scenario, our
faculty is actively involved in research and extension activities. Till date
the faculty members of the staff of the College have published numerous
research papers in Journals of National and International repute.
Teaching faculty is also regularly deputed to attend refresher
courses/orientation courses, summer school and national/international
seminars, conferences and workshops.
3|Page
INTRODUCTION:
In any grade school, college, or university, the safety and security of
students and staff is incredibly important! For this reason, it is common
place for all students and staff to be issued an ID card. However, many
educational facilities are missing out on the power and potential that this
one simple looking plastic card can offer. So just what can it do? It is
highly essential for educational as well as other institutions to provide ID
card to each and every person of it. ID card is generally considered to be
the summary of one’s information. According to these circumstances one
institute must produce and provide identity cards. This project is made
with the motive of Identity registration of all the students, teaching and
non-teaching staff and also a database is created for saving the gathered
information.
4|Page
photo ID cards makes it easy for security personnel to quickly identify
each employee or visitor, minimizing the risk of impersonation and theft.
EXISTING SYSTEM:
At present, College staff uses the primitive way of announcing any
to every class and interrupting the on-going lecture and then read whole
they just pin the notice on any college walls or gates. There are no such
applications made to ease this whole process. In the existing system, the
provide the identity card to its owner. All those processes are done
5|Page
manually and hence consume too much time and man power. Students have
to wait for several days even for months to have their identity cards. The
identity cards are hand written which takes lot of time and human
resources and if lost once, the recovery is not possible. One whose card
had lost had to make a complaint for the lost card. Thus the process
requires more manual power and is time consuming. Also recovery for the
not permit able. As it take more time so one have to wait for long time to
PROPOSED SYSTEM:
The Identity card is not just a plastic card, it is an integral part of a vast
with surface information like Name, Address and Gender. Identity card
identity card to its owner. All those processes are done manually and
hence consume too much time. Students have to wait for several days
6|Page
Student’s information are collected and stored at the database and at the
same time the administration provides a unique six digit id to login to get
the ID card. So the concept of time wasting is totally eliminated.
Moreover this process is highly compatible with data storing and
manipulating.
The operator clicks Print Card. Card generator Producer prints and
encodes the card and carries out all of the operations setup in the
background, to store information back to databases and print reports.
All without any user intervention.
ADVANTAGES:
Identification cards serve several important purposes. The first main
advantage of smart ID card is their flexibility. They have multiple
functions i.e. contains personal information such as telephone numbers and
medical history. The card can be easily replaced if lost, and, the unique ID
which the software generates serves as an additional security from the
unauthorized access to the information by others. Faculty, staff, and
7|Page
students are able to access a variety of benefits through use of their ID
card:
for staff as well as students which give them full access to parking
lots and libraries. It is the best way to prove your identity as you
time efficient.
areas or items that without one you would be unable to. To keep
card production secure, the user login feature allows each operator
to be assigned to an access level group where they can only see the
capture photos and print student cards but not edit data nor print
staff cards.
8|Page
RELIABILITY: The software is able to perform a required
FEATURES OF PROJECT:
To manage access authorization or to provide person-specific
and the installation can dramatically improve the efficiency and ease of
note that the features mentioned are not all supported in all editions of
are used.
9|Page
Design: It provides attractive and functional card design which is just
for both print and encoding, plain paper printers for reports etc., and
even label printers are compatible with Card generator Producer. Each
Update: One who is logged in once can update its info any time by
more interactive.
more robust.
10 | P a g e
SCOPE OF PROJECT:
This project is developed to ease the work of students. The projects
involve a unique ID which is self-generating at the time of registration.
Every user on getting registered gets a unique ID code which serves as
the security parameter. The details can be modified updated whenever
the user feels its needs by simply logging up with just that unique ID
name and date of birth. This card is useful in order to meet the needs in
library, canteen and stationary shops. The card is used to store the
important documents that will be needed by the student for any of its
work. Also the project aims at reducing the time taken to allot the cards
by giving user the access to update, delete, and insert his/her details.
GOALS:
The project aims at achieving following goals:
protected area.
11 | P a g e
MODULES IN THE PROJECT:
The project is divided into number of different modules that are working
together under the same hood in coordination with each other. Some
modules are working on registration, some are working on storing and
retrieving data from the database, some are working on searching the
record from the database and displaying the ID card. All the modules
provide the easiest environment to the user for work.
Home: It’s the first working page provided with different buttons
for different accesses to the user.
Staff Log In: It’s the section for the staff members of the
institution whether teaching or non-teaching.
12 | P a g e
SYSTEM DESIGN:
There are two major modules in ID card generator project:
STAFF LOGIN
STUDENT LOGIN
SELECTION
FORM
STAFF STUDENT
LOGIN LOGIN
NON-
TEACHING 1st YEAR 2ND YEAR 3RD YEAR
TEACHING
13 | P a g e
CASE DIAGRAM:
PROVIDING INFORMATION
MANUPULATING INFORMATION
SEARCHING
14 | P a g e
DATA FLOW DIAGRAM(D.F.D.):
A data flow diagram or D.F.D. is a graphical representation of flow of
data through an information system, modelling its process aspects. A
D.F.D. is often used as preliminary steps to create an overview of the
system without going into great details, which can later be elaborated. A
D.F.D. shows what kind of information will be input to and output from the
system, how the data will advance through the system, and where the
data will be stored.
Retrieving
Database
15 | P a g e
ER DIAGRAM:
An entity-relationship model describes interrelated things of interest in a
specific domain of knowledge. A basic ER model is composed of entity
types and specifies relationships that can exist between instances of
those entity types.it is a data modelling technique that can help design
business processes and be used as the foundation for a relational
database.
User
Issue
Name D.O.B
ID card
Parentage Blood
Group
Contact No.
Gender
Address
16 | P a g e
SYSTEM REQUIREMENT:
In order to carry the projects various hardware, software technologies
are required. The minimum required hardware and software components
required for this project are as:
Hardware Requirement:
Software Requirement:
Operating
Windows 7/8/8.1/10
System
Languages Vb.Net, SQL
Database MS-Access
MS-Front Page,
Tools
Notepad
Case Tools MS-office
17 | P a g e
VB.NET FRAMEWORK:
1. What is .NET Framework?
Microsoft .NET technology you will have access to a new generation of
advanced software joining the best of computing and communications in a
revolutionary new way. The effect will be to totally transform the Web
and every other aspect of the computing experience. .NET enables
developers, businesses, and consumers to harness technology on their
terms. .NET will allow the creation of truly distributed Web services that
will integrate and collaborate with a range of complementary services to
help customers in ways that today’s dotcoms can only dream of. The
fundamental idea behind .NET is that the focus is shifting from individual
Web sites or devices connected to the Internet to constellations of
computers, devices, and services that work together to deliver broader,
richer solutions. People will have control over how, when, and what
information is delivered to them. Computers, devices and services will be
able to collaborate with each other to provide rich services, instead of
being isolated islands where the user provides the only integration.
Businesses will be able to offer their products and services in a way that
lets customers seamlessly embed them in their own electronic fabric.
Microsoft .NET will make computing and communicating simpler and easier
than ever. It will spawn a new generation of Internet services, and enable
tens of thousands of software developers to create revolutionary online
services and businesses. It will put you back in control, and enable greater
control of your privacy, digital identity, and data. And software is what
makes it all possible. However, Microsoft’s .NET technology will only
succeed if others adopt this new standard..NET Framework is a complete
environment that allows developers to develop, run, and deploy the
following applications:
Console applications
Windows Forms applications
Windows Presentation Foundation (WPF) applications
Web applications (ASP.NET applications)
Web services
Windows services
18 | P a g e
Service-oriented applications using Windows Communication
Foundation (WCF)
Workflow-enabled applications using Windows Workflow Foundation
(WF)
19 | P a g e
3. What is Microsoft Intermediate Language (MSIL)?
The .NET Framework is shipped with compilers of all .NET
programming languages to develop programs. There are separate
compilers for the Visual Basic, C#, and Visual C++ programming
languages in .NET Framework. Each .NET compiler produces an
intermediate code after compiling the source code. The intermediate
code is common for all languages and is understandable only to .NET
environment. This intermediate code is known as MSIL.
4. What is an IL?
Intermediate Language is also known as MSIL (Microsoft Intermediate
Language) or CIL (Common Intermediate Language). All .NET source
code is compiled to IL. IL is then converted to machine code at the
point where the software is installed, or at run-time by a Just-In-Time
(JIT) compiler.
20 | P a g e
different machines. Unmanaged code is the code that is executed directly
by the operating system outside the CLR environment. It is directly
compiled to native machine code which depends on the machine
configuration. In the managed code, since the execution of the code is
governed by CLR, the runtime provides different services, such as
garbage collection, type checking, exception handling, and security
support. These services help provide uniformity in platform and language-
independent behaviour of managed code applications. In the unmanaged
code, the allocation of memory, type safety, and security is required to be
taken care of by the developer. If the unmanaged code is not properly
handled, it may result in memory leak. Examples of unmanaged code are
ActiveX components and Win32 APIs that execute beyond the scope of
native CLR.
21 | P a g e
BACK END:
The back end is designed using MS-Access to create the database, to
manage it and to retrieve the records.
MS-Access:
Let’s explore some of the basic functions of Access and how they can help
your business be more productive.
Access is most popular for its tables, forms and queries. The database
tables are similar to spreadsheets, so you shouldn’t have much trouble
using the basic functions of the program. However, it does take time to
learn the full features.
When setting up a database, you may list the subject matter of each
column, just as you would with a spreadsheet, and add as many columns as
you’d like. When this is completed, each row leaves room for more data
input.
One feature that users really like is that they don’t need to finalize the
tables manually. Also, Access has a query function that allows information
to be combined from more than one table, and you can even specify the
conditions. This saves a lot of time because you don’t have to look through
rows and rows of information.
22 | P a g e
What Types of Things Can Microsoft Access Help With?
Run reports and analyses using the reports and charts. You can
basically run a report on anything within a matter of minutes, such
as customers who are behind on payment.
23 | P a g e
Software Development Life Cycle consists of the following stages −
24 | P a g e
Stage 2: Defining Requirements
Once the requirement analysis is done the next step is to clearly define
and document the product requirements and get them approved from the
customer or the market analysts. This is done through an SRS (Software
Requirement Specification) document which consists of all the product
requirements to be designed and developed during the project life cycle.
SRS is the reference for product architects to come out with the best
architecture for the product to be developed. Based on the requirements
specified in SRS, usually more than one design approach for the product
architecture is proposed and documented in a DDS - Design Document
Specification.
In this stage of SDLC the actual development starts and the product is
built. The programming code is generated as per DDS during this stage. If
the design is performed in a detailed and organized manner, code
generation can be accomplished without much hassle.
25 | P a g e
Stage 5: Testing the Product
This stage is usually a subset of all the stages as in the modern SDLC
models, the testing activities are mostly involved in all the stages of
SDLC. However, this stage refers to the testing only stage of the product
where product defects are reported, tracked, fixed and retested, until
the product reaches the quality standards defined in the SRS.
FUTURE ENHANCEMENT:
Firstly it is a proposed system so it can modified later and this
modification may include barcode scanner or online database usage for
better security purpose and proper authentication.
26 | P a g e
SCREENSHOTS:
Home
About Project:
27 | P a g e
About Us:
Proceed Window:
28 | P a g e
Log In Page:
Registration Page:
29 | P a g e
Registration Page(Checks included):
Log In Page:
30 | P a g e
ID card Retrieved:
Delete Window:
31 | P a g e
Print Record:
CODING:
HOME PAGE:
End Sub
32 | P a g e
Private Sub Label2_Click(sender As Object, e As EventArgs)
Handles Label2.Click
End Sub
End Sub
End Sub
End Sub
33 | P a g e
End Class
CHOOSE FORM:
End Sub
End Sub
34 | P a g e
Private Sub secondyear_Click(sender As Object, e As EventArgs)
Handles secondyear.Click
LoginForm.Show()
End Sub
Log In Form:
Imports System.Data.OleDb
Public Class LoginForm
Public email As String
Public a As Integer
' TODO: Insert code to perform custom authentication using the
provided username and password
' (See http://go.microsoft.com/fwlink/?LinkId=35339).
' The custom principal can then be attached to the current thread's
principal as follows:
' My.User.CurrentPrincipal = CustomPrincipal
' where CustomPrincipal is the IPrincipal implementation used to
perform authentication.
' Subsequently, My.User will return identity information encapsulated
in the CustomPrincipal object
' such as the username, display name, etc.
35 | P a g e
Dim ds As New DataSet
Dim da As New OleDbDataAdapter(str, con)
con.Open()
da.Fill(ds)
con.Close()
Dim x As Boolean
Dim row As String
Dim count As Integer
row = ds.Tables(0).Rows.Count.ToString
count = CType(row, Integer)
Dim data1(CType(count, Integer)) As String
Dim data2(CType(count, Integer)) As String
For i As Integer = 0 To ds.Tables(0).Rows.Count - 1
data1(i) = ds.Tables(0).Rows(i).Item("User_Email").ToString
data2(i) = ds.Tables(0).Rows(i).Item("Password").ToString
If data1(i) = CStr(UsernameTextBox.Text) And data2(i) =
CStr(PasswordTextBox.Text) Then
x = True
a=i
End If
Next
If x = True Then
MsgBox("Record Found")
infoshow.Label23.Text = ds.Tables(0).Rows(a).Item(0)
infoshow.LabelH.Text = ds.Tables(0).Rows(a).Item(1)
infoshow.Label22.Text = ds.Tables(0).Rows(a).Item(2)
infoshow.Label21.Text = ds.Tables(0).Rows(a).Item(4)
infoshow.Label20.Text = ds.Tables(0).Rows(a).Item(5)
infoshow.Label19.Text = ds.Tables(0).Rows(a).Item(6)
infoshow.Label18.Text = ds.Tables(0).Rows(a).Item(3)
infoshow.Label17.Text = ds.Tables(0).Rows(a).Item(8)
infoshow.Label16.Text = ds.Tables(0).Rows(a).Item(9)
infoshow.PictureBox2.Image =
Image.FromFile(ds.Tables(0).Rows(a).Item(10))
infoshow.Show()
Else
MsgBox("No Record Found")
36 | P a g e
End If
End Sub
End Sub
End Sub
End Sub
37 | P a g e
Private Sub LinkLabel1_MouseHover(sender As Object, e As
EventArgs) Handles LinkLabel1.MouseHover
Label1.Show()
End Sub
End Sub
38 | P a g e
Private Sub infoshow_Load(sender As Object, e As EventArgs)
Handles MyBase.Load
Me.MdiParent = pf
LoginForm.Close()
LabelH.Hide()
End Sub
End Sub
End Sub
End Sub
End Sub
39 | P a g e
Dim com As New OleDbCommand(s, con)
com.ExecuteNonQuery()
con.Close()
Me.Close()
End Select
End Sub
End Sub
End Sub
End Sub
End Sub
Private Sub Label7_Click(sender As Object, e As EventArgs)
Handles Label7.Click
End Sub
End Class
40 | P a g e