You are on page 1of 73

PROJECT REPORT

ON

HIGHLY SECURE ONLINE


CHAT SYSTEM
Submitted as the main project of degree program

BACHELOR IN COMPUTER APPLICATION


MAHATMA GANDHI UNIVERSITY KOTTAYAM
BY

ANANDH S (190021092724)

UNDER THE GUIDENCE AND SUPERVISION OF

SCHOOL OF TECHNOLOGY AND APPLIED SCIENCES


CENTER FOR PROFESSIONAL AND ADVANCED STUDIES
(ESTABLISHED BY GOVERNMENT OF KERALA)

AFFILIATED TO MAHATMA GANDHI UNIVERSITY


CHUTTIPPARA-PATHANAMTHITTA-689645
1
SCHOOL OF TECHNOLOGY AND APPLIED SCIENCS
CENTER FOR PROFESSIONAL AND ADVANCED STUDIES
(Established by Government of Kerala)

AFFILIATED TO MAHATHMA GANDHI UNIVERSITY


CHUTTIPPARA-PATHANAMTHITTA-689645
PHONE 0468 2224785 – email - mgucaspta@gmail.com

CERTIFICATE
This is to certify that the project report entitled “HIGHLY SECURE ONLINE CHAT
SYSTEM" submitted in partial fulfillment of the degree of Bachelor in Computer
Application from the Mahatma Gandhi University during the period from June
2021 to November 2021 done by ANANDH S
(190021092724). The matter embodied in this project work has not been submitted
earlier for the award of any degree or diploma to the best of my knowledge and
belief.

INTERNAL EXAMINERS SIGNATURE OF THE GUIDE

EXTERNAL EXAMINERS PRINCIPAL

2
ACKNOWLEDGEMENT

The word acknowledgement is hardly sufficient to convey the deep sense of


gratitude that we have towards all the people who helped us complete this work
successfully. We express our sincere thanks to the staffs of School of
Technology & Applied Sciences Pathanamthitta for providing us the opportunity
to work with their highly esteemed organization.
I would like to express my sincere gratitude to Mrs. REMA K, Principal of
School of Technology & Applied Sciences, Pathanamthitta, who was kind
enough to grant me the opportunity to work on this project. I would like to
express our heartfelt and profound gratitude to Mr. Abdul Muhammed Rasheed,
Project coordinator, School of Technology & Applied Sciences, Pathanamthitta
for his valuable support throughout our project and for providing crucial inputs
and support during the course of our work.
It is my prime and sacred duty to offer my sincere gratitude to the Project
Guides , for constant help, guidance and supervision in
accomplishing the project work. I am obliged to all faculty
members of the Department of Computer Science, School of Technology
& Applied Sciences, Pathanamthitta for their cooperation and the help
rendered during the course of project completion. A special thanks to my
parents for their encouragement throughout this endeavor. I am thankful to my
friends for their support and help. This Project has been carried out as part of
the requirement of Bachelor in Computer Application and it is submitted with
extreme pleasure and gratitude.

ANANDH S

3
DECLARATION

I here by declare that the project report entitled “HIGHLY SECURE


ONLINE CHAT SYSTEM” submitted to the Mahatma Gandhi
University, Kottayam in partial fulfillment of the requirement for the
award of degree of Bachelor in Computer Application is a record of
original work done during my period of study in School of
Technology and Applied Science, Pathanamthitta. Done under the
guidance of

Name of the candidate : ANANDH S


Register Number : 190021092724

Signature of the Student

5
TABLE OF CONTENTS

SL.NO CONTENT PAGE NO

1 INTRODUCTION 9

2 PROJECT OVERVIEW 12

3 SYSTEM SPECIFICATION 14

4 SOFTWARE SPECIFICATION 18

5 HARDWARE SPECIFICATION 23

6 TECHNOLOGY PROFILE 24

7 PYTHON 27

8 HTML, CSS, JAVASCRIPT 30

9 SYSTEM ANALYSIS 33

10 FEASIBILITY STUDY 36

11 TECHNICAL FEASIBILITY 41

12 OPERATIONAL FEASIBILITY 43

13 ECONOMIC FEASIBILITY 45

14 BEHAVIOURAL FEASIBILITY 47

15 SYSTEM STUDY 49

16 WORKING 51

17 SYSTEM TESTING 53

18 VALIDATION TESTING 55

19 WORKING MODEL 56

20 CONCLUSION 62
1. PROFILE OF THE PROBLEM

Page 5
1.1 ABOUT THE PROJECT

Chat application is a feature or a program on the Internet to communicate directly among


Internet users who are online or who were equally using the internet. Chat applications allow
users to communicate even though from a great distance. Therefore, this chat application must
be real-time and multi platform to be used by many users. There are a lot of existing chat
application systems online like Whatsapp, Facebook, Telegram, Instagram etc. Each of them
have their own uses. They really serves the purpose. We can chat, make video calls, make
audio calls, share contacts, share files, share location and even money.

The proposed system Highly Secure Online Chat System is named as 'iChat'. iChat also
provides all the above mentioned services provided by Whatsapp and Telegram. And some
extra features and service that are lacking in the existing systems. One of the main
disadvantage of Whatsapp and other chat applications is, while texting we don't know who is
reading our messages. We sends some text messages to the target person and he receives it. A
read receipt is displayed to the sender. But we cannot fix that the text message we send is read
by the actual receiver. It might be someone else using the target's smartphone. For solving that
the proposed system "iChat" uses Artificial Intelligence to constantly check and verify that
iChat is used by the original user who is logged into. Thus we can solve the problem of
message leaking. For security purpose, iChat uses OTP services and Two Factor Authentication
as well. The messages send through the chat system is end to end encrypted. And a lot of
additional features are added to iChat, that the existing chat applications lacks.
2. SYSTEM STUDY
2.1 INTRODUCTION

The Proposed system named "iChat" is an online chat application which is a replica of Whatsapp
and Instagram. The system overcomes many of the disadvantages of existing systems. Of course it
provides a platform for text messaging others using the modern security features. The chats are
end to end encrypted. Just like Whatsapp. WhatsApp is free to download messenger app for
smartphones. WhatsApp uses the internet to send messages, images, audio or video. The service is
very similar to text messaging services, however, because WhatsApp uses the internet to send
messages, the cost of using WhatsApp is significantly less than texting. You can also use
Whatsapp on your desktop, simply go to the Whatsapp website and download it to Mac or
Windows. It is popular with teenagers because of features like group chatting, voice messages and
location sharing. Users of WhatsApp can share their location in real time over messages. They can
also organise lists of contacts so that they can quickly send messages to lots of people in group
chats through WhatsApp. Probably the best feature of WhatsApp is that it allows users to keep in
touch with people living abroad, without incurring the international charges associated with text
messages. All those features in Whatsapp is also there in iChat.

On the other hand Instagram is much more wider comparing with whatsapp. Because we can only
connect with people who are in our contacts through whatsapp. But using instagram, we can
message, follow etc a million of people who are present in Instagram's server. On Instagram, the
main intention is to share and find the best photos and videos. Every user profile has follower and
following counts, representing how many people they follow and how many other users are
following them. If you want to follow someone, go to their user profile and tap Follow. If a user
has their profile set to private, they must first approve your request. If you create a public account,
anyone can find and view your profile, along with your photos and videos. Set your Instagram
profile to private if you want only the people you approve to see your posts. If you're under 16
when you create your profile, it will start as private by default. You can still make it public
afterward, however. Interacting on posts is fun and easy. Double-tap any post to like it, or tap the
speech bubble to add a comment. Click the arrow button to share a post with someone using
Instagram Direct. Facebook Messenger has been integrated into Instagram's direct messaging, so
you can direct message Facebook contacts from Instagram. If you want to find or add more friends
or interesting accounts, tap Search (magnifying glass icon) to browse through tailored posts
recommended to you. Or, tap Search, then add a user, subject, or hashtag to the search field to
search for that term. iChat is the combination of both these application with some advanced
security features, but paid.
3.2.1 EXISTING SYSTEM

The existing systems includes Whatsapp and Instagram as we mentioned earlier. Both are
used to send text messages. They have their own unique features and services. They are the
most used social media networks in the world.

DISADVANTAGES

• Daily covid cases are shared to thaluks, panchayats etc by spreadsheets.


Medias displays these spreadsheet datas through there websites and news
channels.
• Containment zone datas are send to panchayats by district wise health
centres. According to public, It’s hard to get aware of nearby containment
zones. They came to know about these containment zones with the help of
social medias. Government won’t provide a digital system for this.

• COWIN website is managed by central government. The only role of state


government is to update all vaccination centres with the help of admin
panel. Due to that there is no available slots for registered users. Users are
not getting priority to book slots by there registered order.

• For choosing a desired Quarantine Centre, an individual have to submit a


declaration letter agreeing to all policies of Health Department. That they
are choosing a quarantine centre at there own risk. And the patient needs to
wait for the approval. This is a very complex process.
3.2.2 PROPOSED SYSTEM

The main objective of Covid Expert website or our project is to connect government
with public. It provides daily covid cases, recoveries, TPR and deaths. Kerala
Government can directly manage vaccination without the help of central
government. Our system provides a map that displays all nearby containment zones.
And makes it easier to choose a desired quarantine centre in no time. We also
provides a module for public to donate protective equipments to health workers.

ADVANTAGES

• Instead of sharing daily covid cases through spreadsheets, health department


staffs can upload it directly to Covid Expert website with the help of admin
panel.

• Containment zones are displayed to the public with the help of a map. This
makes it easier to identify nearby containment zones. Containment zones will
be marked in blue circles and critical zones will be marked in red coloured
circles.

• A user who is tries to book vaccine will get priority to get vaccinated by the
order they registers.

• An individual who is searching for a better quarantine centre can easily book
one by simply filling a form and checking a checkbox. By checking the
checkbox, they agrees to all the policies of Health Department.
3.2.3 MODULE DESCRIPTION

1. COVID CASES
In this module, the daily covid positive cases, number of recoveries, Test Positivity Rate and
Death counts are displayed.

2. VACCINE BOOKING
The existing Co-WIN website provides vaccine booking feature. But it have a lot of bugs. A
lot of users are not getting OTP and unable to book vaccine. Another drawback is slot
unavailability. This project overcomes all these drawbacks by giving the registered user
priority for booking slots.

3. CONTAINMENT ZONE MAP


Is another module in this project. Currently there is no stable system for providing
informations related to containment zones and blocked roads. This module provides a map
that displays all the containment zones and blocked roads. An admin can mark these details
Inside this map using the admin panel.

4. QUARANTINE CENTRE BOOKING MODULE


There is no existing system for booking a quarantine centre online. This project overcomes
that drawback and provides a facility to book quarantine centre in no time. An admin can add
quarantine centres and it is stored in the database. This data is displayed in the website. User
can select the location and centre and place a booking.

5. ADMIN MODULE
Is the last module This module will be managed by a Health Department staff.
And it will not be available for public. All the datas and informations are updated through this
. admin panel. Covid Expert Website can be easily managed with the help of this admin module.
4. PROBLEM ANALYSIS
4.1 SYSTEM DEFENITION

Covid Expert enables your interaction with participating healthcare providers, and allows you to
receive your digital lab reports, prescriptions and diagnosis seamlessly. It displays booking slots
of COVID-19 vaccine available in the nearby areas and can be booked on the website.

4.2 FEASIBILITY STUDY

The initial investigation points to the question whether the project is feasible. The
feasibility is conducted to identify the best system that meets all the requirements. This includes
an identification description, an evaluation of proposed systems and the selection of the best
system for the job. The requirements of the system are specified with a set of constraints such as
system objectives and the description of the output. It is the duty of the analyst to evaluate the
feasibility of the proposed system to generate the above results. Three key factors are to be
considered during the feasibility study.

There are three aspects in the feasibility study portion of the preliminary investigation:

• Technical Feasibility
• Economic Feasibility
• Operational
Feasibility
The proposed system “Covid Expert System” must be evaluated from the technical point of view
first, and if technically feasible their impact on the organization must be assessed. If compatible,
operational system can be devised. Then they must be tested for economic feasibility.

4.2.1 Technical Feasibility

The “Covid Expert System” must be evaluated from the technical viewpoint. The assessment of
feasibility must be based on an outline design of the system requirement in the terms of input,
output, programs, procedure and employee. Having identified an outline system, the
investigation must go to suggest the type of the equipment, required method developing the
system, method of running the system once it has been designed. The project should be
developed such that the necessary functions and performance are achieved within the constraints.
Though the system may become obsolete after some period of time, due to the fact that the newer
version software supports the older version, this system may still be used.There are a number of
technical issues, which are generally raised during the feasibility stage of the investigation
Covid Expert System. A study of function, performance and constraints that may affect the
ability to achieve an acceptable system.

Technical feasibility deals with hardware as well as software requirements. If the necessary
requirements are made available with the system then the proposed system is said to be
technically feasible.

The software required for this system is:

Operating System :- Windows 10 or higher , Linux, MacOS

Front End Languages :- HTML, CSS, JAVASCRIPT

Backend Language :- PHP

Database :- MYSQL

4.2.2 Economic Feasibility

Economic feasibility is an important task of system analysis. A system that can be


developed technically and that will be used if installed must still be profitable for the
organization. Financial benefits must equal or exceed the costs. Criteria are to ensure that effort
taken on the project give the best return at the earliest. One of the factors, which affect the
development of a new system, is the cost it would require. Since the system developed is part of
a project work, there is no manual cost to spend for the “Covid Expert System” System. Also all the
resources are already available, giving an indication that the system is economically possible
development. The analysis raises financial and economic questions during the preliminary
investigation to estimate the following:
1. The cost to conduct a full systems investigation

2. The cost of hardware and software for the class of application of the project being
considered.

3. The benefits in the form of reduced costs or fewer costly errors.

To be judged feasible, a proposal for the specific project must pass all these tests, otherwise it is
not considered as a feasible project.

4.2.3 Operational Feasibility

Proposed projects are beneficial only if they can be turned into information systems that
will meet the operating requirements of the organization. This test of feasibility tasks if the
system will work when it is developed and installed.“Covid Expert System” satisfies all the
operational conditions.

One of the main problems faced during development of a new system is getting the acceptance
from the user. They were doubtful about the degree of security provided by our software. We
have considered all the operational aspects. Thus the project is operationally feasible .People
are inherently resistant to change, and computers have been known to facilitate change. An
estimate should be made about the reaction of the user, employee towards the development of
a computerized system.
4.3 PROJECT PLAN

Planning is very important in every aspect of development work. Good managers


carefully monitor developments at various phases. Improper planning leads to failure of
the project. Software project plan can be viewed as the following:

1. Within the organization: How the project is to be implemented? What are various constraints?
What is market strategy?

2. With respect to the customer: Weekly or timely meetings with the customer with presentations
on status reports. Customer feedback is also taken and further modifications and developments
are done. Project milestones and deliverables are also presented to the customer.

For a successful project the following steps can be followed:

• Selection of project: Includes identifying project’s aims and objectives, understanding


requirements and specification, methods of analysis, design and implementation, testing
techniques and documentation.
• Project milestones and deliverables

• Project estimates: including cost, time, size of code and duration

• Resource allocation: including hardware, software, previous relevant project information


and digital library

• Risk management: including risk avoidance, risk detection, risk control and risk
recovery

• Scheduling techniques: including work breakdown structure, activity graph, critical path
method, Gantt chart and Program Evaluation Review Technique.

• People: including staff recruitment, team management and customer interaction.

Quality control and standard


TASK PERIOD JUNE JULY AUGUST SEPTEMBER OCTOBER NOVEMBER

Projeci 6 Months

System Study and


4 Weeks
Analysis

Requirements Modeling 4 Weeks

System Design 4 Weeks

Coding and Testing 4 Weeks

Report Preparation and 7 Weeks


Implementation
5. REQUIREMENT ENGINEERING
Requirement analysis involves studying the current system to find out how it works and
where improvements could be made. A clear idea about the existing system is a must for
making improvements where it is required. Proper planning and collection of data serves the
purpose. The popularity of this document is to describe all the requirements
for the popularity of the application for Covid Expert System. This application helps
send and receive data in a secure manner.

5.2 SPECIFIC REQUIREMENTS

SOFTWARE REQUIREMENTS

• Operating System :- Windows 10 or higher, Linux, MacOS

• Front End Language :- HTML, CSS, JAVASCRIPT

• Backend Language :- PHP

• Database :- MYSQL

HARDWARE REQUIREMENTS

• Processor – i3 or Higher

• Hard Disk – 50 GB

• Memory – 1GB RAM or Higher


5.3 SOFTWARE DESCRIPTIONS

5.3.1 PHP

PHP is an open-source server-side scripting language that many devs use for web
development. It is also a general-purpose language that you can use to make lots
of projects, including Graphical User Interfaces (GUIs). The abbreviation PHP
initially stood for Personal Homepage. But now it is a recursive acronym for
Hypertext Preprocessor. (It's recursive in the sense that the first word itself is an
abbreviation, so the full meaning doesn't follow the abbreviation.)
The first version of PHP was launched 26 years ago. Now it's on version 8,
released in November 2020, but version 7 remains the most widely used.
PHP runs on the Zend engine, which is the most popular implementation. There
are some other implementations as well, like parrot, HPVM (Hip Hop Virtual
Machine), and Hip Hop, created by Facebook. PHP is mostly used for making
web servers. It runs on the browser and is also capable of running in the command
line. So, if you don't feel like showing your code output in the browser, you can
show it in the terminal.

Advantages of PHP
PHP has some advantages that have made it so popular, and it's been the go-to
language for web servers for more than 15 years now. Here are some of PHP's
benefits:

• Cross-Platform: PHP is platform-independent. You don't have to have a


particular OS to use it because it runs on every platform, whether it's Mac,
Windows, or Linux.
• Open Source: PHP is open source. The original code is made available to
everyone who wants to build upon it. This is one of the reasons why one of
its frameworks, Laravel, is so popular.
• Easy to learn: PHP is not hard to learn for absolute beginners. You can pick it
up pretty if you already have programming knowledge.

• PHP syncs with all Databases: You can easily connect PHP to all Databases,
relational and non-relational. So it can connect in no time to MySQL,
Postgress, MongoDB, or any other database.

• Supportive Community: PHP has a very supportive online community. The


official documentation provides guides on how to use the features and you
can easily get your problem fixed while stuck.

Disadvantages of PHP

• It is not that secure due to its open-source, because the ASCII text file are
often easily available.
• It is not suitable for giant content-based web applications.
• It has a weak type, which can cause incorrect data and knowledge to user.
• PHP frameworks got to learn to use PHP built-in functionalities to avoid
writing additional code.
• Using more features of PHP framework and tools cause poor performance of
online applications.
• PHP don’t allow change or modification in core behavior of online
applications.
• The PHP frameworks aren’t equivalent in behavior so does their
performance and features.
• While PHP may be a powerful tool supported by an outsized community and
plentiful reference documentation, there are easier programming languages
for web apps.
• It is widely believed by the developers that PHP features a poor quality of
handling errors. PHP lacks debugging tools, which are needed to look for
errors and warnings. PHP has less number of debugging tools in comparison
to other programming languages.
• It’s highly tough to manage because, it’s not competent modular. It already
imitates the features of Java language.
5.3.2 HTML, CSS, JAVASCRIPT

HTML (HyperText Markup Language) is the most basic building block of the
Web. It defines the meaning and structure of web content. Other technologies
besides HTML are generally used to describe a web page's appearance/presentation
(CSS) or functionality/behavior (JavaScript). "Hypertext" refers to links that
connect web pages to one another, either within a single website or between
websites. Links are a fundamental aspect of the Web. By uploading content to the
Internet and linking it to pages created by other people, you become an active
participant in the World Wide Web. HTML uses "markup" to annotate text, images,
and other content for display in a Web browser. HTML markup includes special
"elements" such as <head>, <title>, <body>, <header>, <footer>, <article>,
<section>, <p>, <div>, <span>, <img>, <aside>, <audio>, <canvas>, <datalist>,
<details>, <embed>, <nav>, <output>, <progress>, <video>, <ul>, <ol>, <li> and
many others. An HTML element is set off from other text in a document by "tags",
which consist of the element name surrounded by "<" and ">". The name of an
element inside a tag is case insensitive. That is, it can be written in uppercase,
lowercase, or a mixture. For example, the <title> tag can be written as <Title>,
<TITLE>, or in any other way.
Cascading Style Sheets, fondly referred to as CSS, is a simple design language
intended to simplify the process of making web pages presentable. CSS is a MUST
for students and working professionals to become a great Software Engineer
specially when they are working in Web Development Domain. I will list down
some of the key advantages of learning CSS:
Create Stunning Web site - CSS handles the look and feel part of a web page. Using
CSS, you can control the color of the text, the style of fonts, the spacing between
paragraphs, how columns are sized and laid out, what background images or colors
are used, layout designs,variations in display for different devices and screen sizes
as well as a variety of other effects. Become a web designer - If you want to start a
carrer as a professional web designer, HTML and CSS designing is a must skill.
JavaScript is a dynamic computer programming language. It is lightweight and most
commonly used as a part of web pages, whose implementations allow client-side script
to interact with the user and make dynamic pages. It is an interpreted programming
language with object-oriented capabilities. JavaScript was first known as LiveScript,
but Netscape changed its name to JavaScript, possibly because of the excitement being
generated by Java. JavaScript made its first appearance in Netscape 2.0 in 1995 with
the name LiveScript. The general-purpose core of the language has been embedded in
Netscape, Internet Explorer, and other web browsers.

• JavaScript is a lightweight, interpreted programming language.


• Designed for creating network-centric applications.
• Complementary to and integrated with Java.
• Complementary to and integrated with HTML.
• Open and cross-platform

Client-Side JavaScript
Client-side JavaScript is the most common form of the language. The script should be
included in or referenced by an HTML document for the code to be interpreted by the
browser. It means that a web page need not be a static HTML, but can include
programs that interact with the user, control the browser, and dynamically create
HTML content. The JavaScript client-side mechanism provides many advantages over
traditional CGI server-side scripts. For example, you might use JavaScript to check if
the user has entered a valid e-mail address in a form field. The JavaScript code is
executed when the user submits the form, and only if all the entries are valid, they
would be submitted to the Web Server. JavaScript can be used to trap user-initiated
events such as button clicks, link navigation, and other actions that the user initiates
explicitly or implicitly.

Advantages of JavaScript
The merits of using JavaScript are −

• Less server interaction − You can validate user input before sending the page
off to the server. This saves server traffic, which means less load on your
server.
• Immediate feedback to the visitors − They don't have to wait for a page reload
to see if they have forgotten to enter something.
5.3.3 MICROSOFT VISUAL STUDIO CODE

Visual Studio Code is a code editor in layman’s terms. Visual Studio Code is “a free-editor that
helps the programmer write code, helps in debugging and corrects the code using the intelli-sense
method ”. In normal terms, it facilitates users to write the code in an easy manner. Many people
say that it is half of an IDE and an editor, but the decision is up to to the coders. Any program/
software that we see or use works on the code that runs in the background. Traditionally coding
was used to do in the traditional editors or even in the basic editors like notepad! These editors
used to provide basic support to the coders.

Some of them were so basic that it was very difficult in writing basic English level programs in
them. As time went by, some programming languages needed a specific framework and support
for further coding and development it, which was not possible using these editors. VI Editor,
Sublime Text Editor, is one of the many kinds of editors that came into existence. The most
prominent and which supports almost every coding language is VISUAL STUDIO CODE. Its
features let the user modify the editor as per the usage, which means the user is able to download
the libraries from the internet and integrate it with the code as per his requirements.

Visual Studio Code has some very unique features. They are listed as below :

• Support for multiple programming languages: Supports multiple programming languages. So


earlier, programmers needed Web-Support: a different editor for different languages, but it
has built-in multi-language support. This also means it easily detects if there’s any fault or
cross-language reference, it’ll be able to detect it easily.
• Intelli-Sense: It can detect if any snippet of code is left incomplete. Also, common variable
syntaxes and variable declarations are made automatically. Ex: If a certain variable is being
used in the program and the user has forgotten to declare, intelli-sense will declare it for the
user.
• Cross-Platform Support: Traditionally, editors used to support either Windows or Linux or
Mac Systems. But Visual Studio Code is cross-platform. So it can work on all three
platforms. Also, the code works on all three platforms; else, the open-source and proprietary
software codes used to be different.
• Extensions and Support: Usually supports all the programming languages but, if the user/
programmer wants to use the programming language which is not supported then, he can
download the extension and use it. And performance-wise, the extension doesn’t slow down
the editor as it rums as a different process.
• Repository: With the ever-increasing demand for the code, secure and timely storage is
equally important. It is connected with Git or can be connected with any other repository for
pulling or saving the instances.
• Web-Support: Comes with built-in support for Web applications. So web applications can be
built and supported in VSC.
• Hierarchy Structure: The code files are located in files and folders. The required code files
also have some files, which may be required for other complex projects. These files can be
deleted as per convenience.
• Improving Code: Some code snippets can be declared a bit differently, which might help the
user in the code. This function prompts the user, wherever necessary, to change it to the
suggested option.
• Terminal Support: Many of the times, the user needs to start from the root of the directory to
start with a particular action, in-built terminal or console provides user support to not to
switch in-between two screens for the same.
• Multi-Projects: Multiple projects containing multiple files/folders can be opened
simultaneously. These projects/folders might or might not be related to each other.
• Git Support: Resources can be pulled from Git Hub Repo online and vice-versa; saving can
be done too. Resource pulling also means cloning the code which is made available on the
internet. This code can later be changed and saved.
• Commenting: A common feature, but some of the languages do not support it. Commenting
on the code helps the user to recall or track according to the sequence he wants.

Another feature that naïve-users or anyone can see instantly different from other editors is the
user-friendliness of the Visual Studio Code. The usability is very easy to handle. The file is
arranged hierarchically and has regular software like a toolbar, status bar, and a sidebar. It also
has a floating windows explorer window, which can be fixed at one place according to
convenience, which consists of the directory structure of files. These files (code files, image
folders, etc.) can be opened or renamed from here, and changes will automatically get reflected
in the storage.
6. MODELING
We create models to obtain a better understanding of the actual entity to be built. The model
focuses on what the system must do and not on how it does it. The second and third
operational analysis principles require that we build modules of function and behavior.
The written word is a wonderful vehicle for communication, but it isn't necessarily the best
way to represent the requirements for computer software. Analysis modeling uses a
combination of text and diagrammatic forms to depict requirements for data, function, and
behavior in a way that is relatively easy to understand, and more important,
straightforward to review for correctness, completeness and consistency. This section
presents resources for conventional and object-oriented analysis (OOA) methods as well as
resources for UML. Analysis modeling is an extremely robust subject.

6.2 GENERAL DESCRIPTION

Requirement Modeling approaches are

1. Scenario-Based modeling
Use Case Diagram
2. UML Models
Activity Diagrams Swim
line Diagram
3. Data modeling
ER Diagram
4. Class Based Modeling
Class Diagram
5. Behavioral Modeling
State Diagram
6.2.1 Scenario-Based Modeling

Scenario based modeling represents requirements from the point of view of various system
‘actors’. Requirement modeling begins with the creation of scenarios in the form of use case
diagrams.

Use Case Diagram


Use cases help to determine the functionality and features of the software from
user’s perspective. A use case describes how a user interacts with the system by defining
the steps required to accomplish a specific goal. Variations in the sequence of steps
describe various scenarios. In the diagram the stick figure represents an actor that is associated
with one category of user. In the use-case diagram the use cases are displayed as ovals.

The actors are connected by lines to the use cases that they carry out. The use cases are placed
in a rectangle but the actors are not .This rectangle is a visual remainder of the system
boundaries and that the actors are outside the system.
Login

Signup

Vaccine
booking

Slot allotment

Quarantine
centre booking

Quarantine centre
allotment
User Containment zone Admin
map

Containment zone
map update

View daily covid


cases

Daily covid case


update
6.2.2 Uml Model

The Unified Modeling Language (UML) offers a way to visualize a system’s blueprints in a
diagram. Including element such as:

• Any activities

• Individual component of the system

• How the system will run

• How entities interact with others

• External user interface

• The UML has been extended to cover a larger set of design


documentation
Activity Diagram

The UML activity diagram supplements the use case by providing a graphical representation
of the flow of interaction within a specific scenario. Similar to the flowchart, an activity diagram
use rounded rectangles to imply a specific system function, arrows to represent flow through
the system, decision diamonds to depict a branching decision, and solid horizontal lines to
indicate that parallel activities are occurring.

Vaccination booking Admin Quarantine centre

Signup
Reject
Reject Approve Approve
Checking Checking
Login

User request User request

Slot allotment Centre allotment

Display result
6.2.3 Data Modeling

If software requirements include the need to create, extend, or interface with a database, the
software team may choose to create a data model as part of overall requirements modeling. It
defines all data objects that are processed within the system, the relationship between the data
objects, and other information that is pertinent to the relationships. The entity relationship
diagram(ERD) addresses these issues and represents all data objects that are entered, stored,
transformed, and produced within an application. Data modeling tools provide a software
engineer with the ability to represent data object, their characteristics, and their relationships.
Used primarily for large database applications and other information systems projects, data
modeling tools provide an automated means for creating comprehensive entity relation diagrams,
data object dictionaries, and related models.

An E-R diagram may also indicate the cardinality of a relationship. Cardinality is the number of
instances of one entity that can, or must, be associated with each instance of another entity. In
general we may speak of one-to-one, one-to-many, or many-to-many relationships.

Rectangle which represents entity sets.

Diamond which represents relationship sets.

Ellipse which represents attributes.

Lines which link attributes to entity sets and entity sets to relationship sets.
ER Diagram

Covid Expert

MONITORS

AADHAAR_
NUMBER ADMIN
CITY
DISTRICT
USER_ CITY
ID AADHAAR_
ADD USER_
NUMBER
ID
VIEW
ID DISTRICT
ID NAME

QUARANTINE_ VACCINE_
USER
BOOKING BOOKING
PASSWORD
PHONE
PHONE
ID
PHONE
NAME
QUARANTINE_
CENTRE EMAIL
NAME AGE
AGE
BOOK ALLOTED
ALLOTED

BOOK VACCINE
ALLOT
USER SLOT
_ID
BOOKING_ID
ID AADHAAR_
NUMBER ID
USER_
ID

VACCINATED
VACCINATED
SLOT
NAME

CENTRE
VACCINE DATE
CITY

DISTRICT AGE TIME DOSE

VACCINE
PHONE
6.3 DIAGRAMS

6.3.1 Data flow Diagram (DFD)

The data flow diagram (DFD) is one of the most important tools used by system analysts.
Data flow diagrams are made up of a number of symbols, which represent system
components. Most data flow modeling methods use four kinds of symbols. These symbols are
used to represent four kinds of system components. Possesses, data stores, data flows
and external entities are the components. Circles in DFD represent a process. Data
flow is represented by a thin line in DFD and square or rectangle represents external entities.

Unlike detailed flow chart, data flow diagrams do not supply detailed description of the
modules but graphically describes a system’s data and how the data interact with the
system.

Symbols used in DFD are:

Square, this defines source or destination of data

Arrow, which shows data flow

Circle, which represents a process that

transforms incoming data into outgoing flow

Open rectangle, which shows a data store


LEVEL 0

request response

User Covid User


Expert

Login

LEVEL 1

request

in Admin admin_user
log
min
ad

request
user
vaccine
valid username/ User vaccine_booking
password

User Login qua


ran request
tine
use
r
User quarantine_booking
co
vid

request
ca
se
us

User
er

covid_cases
LEVEL 1.1

insert slot
Add
vaccine slot vaccine_centre
response

lot
ds
ad
add quarantine Add
insert centre
centre
valid username/ quarantine quarantine_centre
password centre
response
Admin Authentication
add d
aily insert cases
cases covid Add daily
Invalid
covid covid_cases
cases
response
up
da

insert map
te

Update
zo
ne

containment
s

map
zone
response

insert booking
LEVEL 1.2 Book vaccine_booking
vaccine
g
kin

response
oo
db
ad

insert booking
add quaran
tine Book
valid username/ quarantine quarantine_booking
password centre
response
Authentication
User add d
aily c view covid cases
ovid View
Invalid covid covid_cases
cases
vie

response
w
co
nta

view zones
View
inm
en

containment map
tz
on

zone
es

response
7. DESIGN

s
Design for WebApps encompasses technical and non technical activities that include:
establsishing the look and feel of the WebApp, creating the aesthetic layout of the user interface,
defining the overall architectural structure, developing the content and functionality that reside
within the architecture, and planning the navigation that occurs within the WebApp. Design
allows you to create a model that can be assessed for quality and improved before content and
code are generated, tests are conducted, and end users become involved in large
numbers. Design is the place where WebApp quality is established.

In general the following design objectives must be kept in mind;

▪ Practicality of the System


▪ Efficiency of the System
▪ Minimized cost of the System
▪ Flexibility of the System
▪ Security of the System

The system design involves first logical design and then physical construction of the system. The
logical design describes structure and characteristics of features, like the outputs, inputs,
databases and procedures. The physical construction which follows the logical design
produces actual program software files and the working system.

System design sits at the technical kernel of the software engineering and is applied
regardless of the software process model that is used. Beginning once software requirements
have been analyzed and specified, software design is the first technical activity that is used to
build and verify the software. Each activity (designing, coding and testing) transform
information in a manner that ultimately results in validated computer software.
7.2 AESTHESTIC DESIGN
Aesthetic design, also called graphic design, is an artistic endeavor that complements the
technical aspects of WebApp design. Without it, a WebApp may be functional, but unappealing.
With it, a WebApp draws its users into a world that embraces them on a visceral, as well as an
intellectual level. Different layouts are used in ‘Covid Expert System’. There is an old saying,
“beauty exists in the eye of the beholder”. This is particularly appropriate when aesthetic design
for WebApps is considered. To perform effective aesthetic design, return to the user
hierarchy developed as part of the requirements model.

7.3 CONTENT DESIGN

Content design focuses on two different design tasks, each addressed by individuals with
different skill test sets. First, a design representation for content objects and the mechanisms
required to establish their relationship to one another is developed. In addition, the
information within a specific content object is created. The latter task may be conducted by
copywriters, graphic designers, and others who generate the content to be used within a
WebApp.

7.4 ARCHITECTURAL DESIGN


It is tied to the goals established for a web App, the content to be presented, the user who will
visit and the navigation philosophy that has been established. As an architectural designer, you
must identify content architecture and WebApp Architecture. Content architecture focuses on the
manner in which content objects are structured for presentation and navigation. WebApp
Architecture addresses the manner in which the application is structured to manage user
interaction, handle internal processing tasks, effect navigation and present content. Architectural
design - creates a blueprint for the design with the necessary specifications for the hardware,
software, people and data resources. In this project n-Tier architecture is used for development. It
can use objects for handling business rules and data access. It has multiple servers handling
business services.
7.5 NAVIGATION DESIGN
Once the WebApp Architecture has been established and the component of the architecture has
been identified, you must define navigation path way that enable users to access
WebApp content and functions. To accomplish this, you should

(1) Identify the semantics of navigation for different users of the site.

(2) Define the mechanics of achieving the navigation.

7.6 COMPONENT LEVEL DESIGN

Modern WebApp deliver increasingly sophisticated processing functions that,

(1) Perform localized processing to generate content and navigation capability in a dynamic
fashion,

(2) Provide computation or data processing capability that is appropriate for the WebApp’s
business domain,

(3) Provide sophisticated database query and access,

(4) Establish data interface with external cooperate system.

To achieve these capabilities you must design and construct program component that are
identical in form to software components for traditional software. Component level
design occurs after the first iteration of architectural design has been completed .At this
stage, the overall data and program structure of the software has been established. The intent is
to translate the design model into operational software. The component level design represents
the software in a way that allows you to review the details of the design for correctness and
consistency with other design representations.

In this system it has three major components they are Administrator, Employee and users. Each
component has several purposes or functions
7.7 DATABASE DESIGN

The most important aspect of building an application is the design of database. The data they
store must be organized according to the user requirement. A well designed database is
essential for the good performance of the system. A database table known as a relation provides
information related to specific entity.

The basic functions involved in a database system related to the information required by the user
are:

• Defining the data

• Input the data

• Locating the data

• Communicating the data

Database Name: carrentals

TABLE DESCRIPTION

ADMIN_USER

FIELD NAME DATA TYPE SIZE CONSTRAINTS DESCRIPTION


ID INT 4 PRIMARY KEY ADMIN_ID
USERNAME VARCHAR 25 NOT NULL USERNAME
PASSWORD VARCHAR 25 NOT NULL PASSWORD

VACCINE_BOOKING

FIELD NAME DATA TYPE SIZE CONSTRAINTS DESCRIPTION


ID INT 4 PRIMARY KEY ID
NAME VARCHAR 25 NOT NULL NAME
EMAIL VARCHAR 25 NOT NULL EMAIL
PHONE NUMERIC 12 NOT NULL PHONE
AADHAAR_NO VARCHAR 25 NOT NULL AADHAAR_NO
CITY VARCHAR 25 NOT NULL CITY
VACCINATED VARCHAR 20 NOT NULL VACCINATED
ALLOTED VARCHAR 25 NOT NULL ALLOTED
SLOTS

FIELD NAME DATA TYPE SIZE CONSTRAINTS DESCRIPTION


ID INT 4 PRIMARY KEY ID
BOOKING_ID VARCHAR 25 NOT NULL BOOKING_ID
USER_ID VARCHAR 25 NOT NULL USER_ID
DATE DATE 12 NOT NULL DATE
TIME VARCHAR 25 NOT NULL TIME
VACCINE VARCHAR 25 NOT NULL VACCINE
DOSE VARCHAR 20 NOT NULL DOSE
CENTRE VARCHAR 25 NOT NULL CENTRE

NOTIFICATION

FIELD NAME DATA TYPE SIZE CONSTRAINTS DESCRIPTION


ID INT 4 PRIMARY KEY ID
USER_ID NUMERIC 25 NOT NULL USER_ID
CENTRE_ID VARCHAR 25 NOT NULL CENTRE_ID
NAME VARCHAR 12 NOT NULL NAME
LOCATION VARCHAR 25 NOT NULL LOCATION
ROOMS VARCHAR 25 NOT NULL ROOMS

USER

FIELD NAME DATA TYPE SIZE CONSTRAINTS DESCRIPTION


ID INT 4 PRIMARY KEY ID
NAME VARCHAR 25 NOT NULL NAME
PHONE VARCHAR 25 NOT NULL PHONE
EMAIL VARCHAR 12 NOT NULL EMAIL
LOCATION DATETIME 25 NOT NULL LOCATION
PASSWORD VARCHAR 25 NOT NULL PASSWORD
8. CODING
The coding step is a process that transforms design into a programming language. It
translates a detail design representation of software into a programming language
realization. The translation process continues when a compiler accepts source code as input
and produces machine-dependent object code as output. Quality is an important goal
during coding. The quality of source code can be improved by the use of structured coding
techniques; good coding style and readable, consistent code format. During coding, some
coding standards are to be followed. This has two purposes; reducing the chance of
making it easier for some time to modify the code later on. Coding phase affects both
testing and maintenance profoundly.

The “Covid Expert System” uses PHP as the programming language for coding. PHP
code is usually processed on a web server by a PHP interpreter implemented as a module, a
daemon or as a Common Gateway Interface (CGI) executable. On a web server, the result of the
interpreted and executed PHP code – which may be any type of data, such as generated HTML or
binary image data – would form the whole or part of an HTTP response. Various web template
systems, web content management systems, and web frameworks exist which can be employed to
orchestrate or facilitate the generation of that response. Additionally, PHP can be used for many
programming tasks outside the web context, such as standalone graphical applications and robotic
drone control. PHP code can also be directly executed from the command line. The standard PHP
interpreter, powered by the Zend Engine, is free software released under the PHP License. PHP
has been widely ported and can be deployed on most web servers on a variety of operating
systems and platforms. The PHP language evolved without a written formal specification or
standard until 2014, with the original implementation acting as the de facto standard which other
implementations aimed to follow. Since 2014, work has gone on to create a formal PHP
specification.
9.TESTING
The purpose of system testing is to identify and correct errors in the candidate system.
Testing is an important element of the software quality assurance and represents the
ultimate review of specification, design and coding. The increasing visibility of the software as
a system element and the costs associated with a software failure are motivated forces for
well planned, through testing.

The common view of testing held by users is that it is performed to prove that there are no
errors in a program. However, as indicated earlier, this is virtually impossible, since
analyst cannot prove that software is free and clear of errors. The tester, who may be the program
fail. A successful test, then, is one that finds an error. Analysts know that an effective testing
program does not guarantee system reliability. Therefore, reliability must be designed into
the system.

Need of Testing

Testing is essential for

 Existence of program defects of inadequacies is inferred.


 Verifies whether the software behaves as intended by its designer.
 Checks conformance with requirement specification/user needs.
 Assesses the operational reliability of the system.
 Tests the performance of the system.
 Reflect the frequency of actual user inputs.
 Finds the fault, which caused the output anomaly.
 Detects flaws and deficiencies in the requirements.
 Checks whether the software is operationally useful.
 Exercises the program using data like the real data processed by the program.

The turn error is used to refer the difference between the actual output of the software and the
correct output. Fault is a condition that causes the software to fail to perform its
required function. Software reliability is defined as the required function.
Software reliability is defined as the probability that the software will not undergo failure for a
specified time under specified condition. Failure is the inability of a system or a component to
perform a required function according to its specification. Different levels of testing
were employed for software to make an error free, fault free and reliable. Basically in software
testing four type of testing methods are adopted.

➢ Unit testing

➢ Integration testing

➢ Validation testing

➢ System testing

9.2 CONTENT TESTING

Content testing checks that users can easily understand all items that appear on a site and,
importantly, that they are able to correctly interpret the information they read. Accordingly, it
identifies any problem areas that may require simplification or rewriting. The overall purpose of
testing a content concept is to figure out what content strategy you should follow throughout the
project. This system was tested for successful acceptance and was found to be working properly.

Content should be logical and easy to understand. Check for spelling errors. Use of dark
colors annoys users and should not be used in site theme Digital Fortress follows some
standards that are used for mobile application and content building. These are common accepted
standards like mentioned above about annoying colors, fonts, frames, etc. Content should be
meaningful. All the anchor text links should be working properly. Images should be placed
properly with proper sizes. These are some basic standards that are followed Indian Blood Bank

9.3 USER INTERFACE TESTING

This tests the whole end to end scenario (which simulates exactly what the user would be doing).
This (for the most part) goes through all the mouse clicks and keyboard presses the user goes
through to get an action done. If we extend the previous example this would be invoking
the same action except that this time instead of using any test hooks it would be using the
keyboard
shortcut and instead verify the actual displayed results on the application. User Interface testing
is a process to test Digital Fortress user interface and to detect if application is
functionally correct. User Interface testing involves carrying set of tasks and comparing the
result of same with the expected output and ability to repeat same set of tasks multiple times
with different data input and same level of accuracy. User Interface Testing includes how
the Digital Fortress handles keyboard and mouse events, how different GUI components like
menu bars, toolbars, dialogs, buttons, edit fields, list controls, images etc. reacts to user input
and whether or not it performs in the desired manner. Implementing User Interface testing for
your application early in the software development cycle speeds up development, improves
quality and reduces risks towards the end of the cycle. User Interface Testing can be
performed both manually with a human tester or could be performed automatically with use of
a software program.

9.4 COMPONENT LEVEL TESTING

Component level testing similar to unit testing but with a higher level of integration. The big
difference here is that the testing is done in the context of the application instead of just
directly testing the method in question. While testing at the component level you would have the
application open and the document displayed but you would be testing the method
and evaluating its result.(without taking into account the shortcut or what get displayed on
the application afterwards). In Digital Fortress, the system consists of mainly 3 modules.
All modules are tested and were found to be working properly.

9.5 NAVIGATION TESTING

Navigation testing confirms that all internal and external links of Digital Fortress are
working properly. There is no any broken link or orphan page in application. Once the first
layers of the Software have been examined, it is time to perform simple tests to probe the quality
of the global Software navigation. Good Software will provide consistent, well-executed
navigation and should provide alternative navigation schemes, such as Software maps,
indexes, and search engines. First, look to make sure that placement of navigation is consistent
from page to page. Subtle shifting may occur, so try browsing the site extremely fast and notice
whether the menu items bounce or jump position slightly from page to page. Even this minor
variation can break the perceived stability of a site. Next, look to see how robust the navigation
is and whether
multiple forms of Software navigation are supported. Numerous navigation execution questions
should be asked during this phase. The current location clearly indicated with labels or link path
indicators. The Software has text links at the bottoms of pages. Alternative text used for
graphial navigation buttons. The Software requires excessive scrolling.

9.6 CONFIGURATION TESTING

The process of testing a system with each of the configuration of software and hardware that are
supported. Configuration testing is another variation on traditional performance
testing .Rather than testing for performance from the perspective of load you are testing
the effects of configuration changes in the application landscape on application
performance and behavior. Digital Fortress was tested for successful acceptance and was found
to be working properly.

9.7 SECUTITY TESTING

Security testing is the process to determine that an information system protects data and
maintain functionality as intended. During security testing, the tester plays roles of the individual
who desires to penetrate the system. The tester may attempt to acquire passwords through
external clerical means; may attack the system with custom software designed to breakdown any
defenses that have been constructed; may overwhelm the system, thereby denying service to
others; may cause system errors, hoping to find the key to system entry.

Digital Fortress was tested for successful acceptance .User can enter to the website
without register
9.8 PERFORMANCE TESTING

Performance testing is designed to test the run time performance of software within the
context of an integrated system. Performance testing occurs throughout all steps in the testing
process. Even at the unit level, performance of individual module may be assessed as white box
tests are conducted, it is not until all system elements are fully integrated that true
performance of a system can be ascertained. This system was tested for successful acceptance
and was found to be working properly.

9.9 TEST CASES

A test case is a document that describes an input, action or event and an expected
response, to determine if a feature of an application is working correctly. A test case
should contain particulars such as test case identifier, test case name, test conditions,
input data requirements steps, and expected results.

Test cases
Project Title : Car Rental System
Software Tool : HTML, CSS, JavaScript, PHP

Test objective : To check to find the overall system performance.

Steps Data Expected results Actual


Step
results
no:
Enter User name User name = admin Should display Login failed
1
and press LOGIN warning message
Button box "Please
Enter Password"
Enter Password and Password = admin Should display Login failed
2
press LOGIN warning message
Button box "Please Enter
User name”
3 Enter User name and Username = admin and Should display Login
Password and press Password = admin Admin page Success
LOGIN Button

Enter User name Username = Anandh and Should display Login


4
and Password and Password = 12345678 Anandh's page Success
press LOGIN Button
10. IMPLEMENTATION
10.1 IMPLEMENTATION OF THE PROJECT

Implementation means putting the newly developed system into operation. It is the phase in the
project plan where the theoretical design is put into real test. This is the most crucial stage in the
life cycle of a project. During implementation there has to be a strong interaction between
the developers and the users. This is the phase where the new system is given a chance to
prove its worth and to minimize the reluctance to change. The proposed system may be
entirely new, replacing an existing one or may be modifications to the existing system. In either
case, proper implementation is necessary to generate a confidence among users. If the users
have achieved satisfaction with the new project, then the project can be termed as successful
and then onwards its maintenance and other subsequent works can be started. The
system goes for implementation only after passing through some rigorous testing,
especially when it comes to operating systems and other system software.

The implementation phase of the software development is concerned with translating


design specifications into source code. The user tests the developed system and changes
are made according to their needs. Our system has been successfully
implemented. Before implementation several tests have been conducted to ensure that no
errors are encounter during the operation. The implementation phase ends with an evaluation
of the system after placing it into operation for a period of time. Implementation is the third
phase of the system process. In order to achieve the objectives and the expected performance
the system has been developed in a highly interactive and user-friendly manner.

The implementations stage involves following tasks:

 Careful planning.
 Investigation of system and constraints.
 Design of methods to achieves the changeover.
 Training of the staff in the changeover phase.
10.2 POST-IMPLEMENTATION AND SOFTWARE MAINTENANCE
Maintenance involves the software industry captive, typing up system resources. It means
restoring something to its original condition. Maintenance involves a wide range of activities
including correcting, coding, and design errors, updating documentation and test data,
and upgrading user support. Maintenance was done after the success implementation.
Maintenance is continued till the product is reengineered or deployed to another platform.
Maintenance is also done based on fixing the problems reported, changing the interface
with other software or hardware enhancing the software.
12. USER MANUAL
A complete help guide of the software

Developed Title : Covid Expert System

Steps:

1) Open XAMPP

Open up XAMPP software and start Apache and MySql server. Once they are started,
click on "Explore" button which will open up the file directory of xampp. Locate a
folder named htdocs. Paste the project folder inside htdocs.

2) Open Browser

Open any of your desired browser like chorme, firefox etc. Now enter the url "http://
localhost/ccovidexpert/" this will open the home page of car rental

3) Login/Signup

In the navigation bar, we have links to go to login and signup page. For a user who
already has an account can got to the login page. If a user is not registered already
with car rentals, he can create a new account using signup page.

4) Booking

After loging in, the user is able to view daily covid cases, book vaccine, book
quarantine centre and view all the containment zones also.
13. SOURCE CODE
<?php include 'php/map.php'; session_start(); ?>
<!DOCTYPE html>
<html lang="en">

<head>
   <meta charset="UTF-8">
   <meta http-equiv="X-UA-Compatible" content="IE=edge">
   <meta name="viewport" content="width=device-width, initial-scale=1.0">
   <title>Covid Expert</title>
   <link rel="stylesheet" href="css/all.min.css">
   <link rel="stylesheet" href="css/bootstrap.min.css">
   <link rel="stylesheet" href="css/style.css">
   <link href="/covidexpert/img/virus.png" rel="icon" type="image/png">
</head>

<body>

   <!--NavBar-->
   <nav class="navbar fixed-top navbar-expand-lg navbar-dark">
<div class="container-fluid">
<form class="d-flex">
<input class="form-control me-2 search" type="search"
placeholder="Search" aria-label="Search">
<button class="btn btn-search" type="submit"><i class="fas
fa-search"></i></button>
</form>
<div class="collapse navbar-collapse"
id="navbarSupportedContent">
<ul class="navbar-nav ms-auto mb-2 mb-lg-0">
<li class="nav-item">
<a class="nav-link active" aria-current="page"
href="#">Covid Status</a>
</li>
<?php
if(!isset($_SESSION['user-id'])) {
echo '<li class="nav-item">
<a class="nav-link active" aria-
current="page" href="pages/signup.html">Signup</a>
</li>
<li class="nav-item">
<a class="nav-link active" aria-
current="page" href="pages/login.html">Login</a>
</li>';
}
else{
echo '<li class="nav-item">
</ul>
</div>
</div>
   </nav>
   <!--NavBar End-->
   <!--Main-->
   <div class="row">
<div class="col-lg-1">
<!--SideBar-->
<div class="sidebar">
<div class="logo-details">
<i class='bx bxl-c-plus-plus icon'></i>
<div class="logo_name">Covid Expert</div>
<i class='bx bx-menu' id="btn"><i class="fas fa-virus">

</div>
<ul class="nav-list">
<li>
<a href="index.php">
<i class="fas fa-home"></i>
<span class="links_name">Home</span>
</a>
<span class="tooltip">Home</span>
</li>
<li>
<a href="#covid-cases">
<i class="fas fa-chart-area"></i>
<span class="links_name">Covid Cases</span>
</a>
<span class="tooltip">Analytics</span>
</li>
<li>
<a href="pages/map-page.php">
<i class="fas fa-map-marker-alt"></i>
<span class="links_name">Containment Zones</span>
</a>
<span class="tooltip">Containment Zones</span>
</li>
<li>
<a href="pages/vaccine-book.html">
<i class="fas fa-syringe"></i>
<span class="links_name">Book Vaccine</span>
</a>
<span class="tooltip">Files</span>
</li>
<li>
<a href="#">
<i class="fas fa-house-user"></i>
<span class="links_name">Quarantine
</a>
<span class="tooltip">Messages</span>
</li>
<li>
<a href="#">
<i class="fas fa-box-open"></i>
<span class="links_name">Donation</span>
</a>
<span class="tooltip">Order</span>
</li>
<li>
<a href="#">
<i class="fas fa-cog"></i>
<span class="links_name">Setting</span>
</a>
<span class="tooltip">Setting</span>
</li>
<li>
<a href="#">
<i class="fas fa-sign-out-alt"></i>
<span class="links_name">Logout</span>
</a>
<span class="tooltip">Logout</span>
</li>
</ul>
</div>
<!--SideBar End-->
</div>
<div class="col-lg-11">
<!--Body-->
<div class="container">
<div id="covid-cases" class="row covid-cases align-items-

<h2>Covid Status</h2>
<?php
include 'php/db.php';
$query = "SELECT * FROM covid_cases ORDER BY id DESC

$result = mysqli_query($connect, $query);


while($row = mysqli_fetch_array($result)){
echo '<div class="col case-card">
<small>Tested</small>
<h2>'.$row["tested"].'</h2>
<canvas id="tested" width="200"

</div>
<div class="col case-card">
<div class="col case-card">
<small>Death</small>
<h2>'.$row["death"].'</h2>
<canvas id="death" width="200"
height="100"></canvas>
</div>';
}
?>
</div>
<div class="row bottom-row">
<h2>Affected Areas</h2>
<a class="col-lg-8" href="pages/map-page.php">
<div class="map-div">
<?php echo $map; ?>
</div>
</a>
<div class="col-lg-4">
<div class="row vaccine-book">
<h4>Get Vaccinated</h4>
<small>Book your vaccine today.</small>
<a class="btn" href="pages/vaccine-book.php">Book
now</a>
</div>
<div class="row quarantine-book">
<h4>Get Quarantined</h4>
<small>Book your quarantine centre today.</small>
<a class="btn" href="pages/quarantine-
book.php">Book now</a>
</div>
</div>
</div>
</div>
<!--Body End-->
</div>
   </div>
   <!--Main End-->

   <script src="js/jquery.min.js"></script>
   <script
src="https://cdnjs.cloudflare.com/ajax/libs/Chart.js/3.4.1/chart.min.js"
integrity="sha512-5vwN8yor2fFT9pgPS9p9R7AszYaNn0LkQEsZFCL7ucT8z
DCAqlQXDdaqgA1mZP47hdvBMsI oFxq/FyyQ=="
crossorigin="anonymous" referrerpolicy="no-referrer"></script>

   <script src="js/all.min.js"></script>
   <script src="js/bootstrap.min.js"></script>
   <script src="js/main.js"></script>
</body>

</html>
15. APPENDIX
APP SCREENSHOTS

HOME PAGE
LOGIN
VACCINE BOOKING PAGE
ADMIN PAGE
CONFIRMATION PAGE
16. FUTURE WORKS SUGGESTED
FUTURE WORKS SUGGESTED

Adding a donation module is suggested for extending the services provided by


Covid Expert. Using this donation module, public can donate medical
equipments like masks, sanitizers, glows etc to medical workers. This will reduce
the lack of medical equipments faced my medical workers. Extending the
containment zone map module is another suggestion. Thus we can extend and
scale the map to include more locations.
17. CONCLUSION
Conclusion

Project covid expert provides medical services and awareness related to covid19
pandemic all in one website, which makes it easier for both to the admin and the users.
People won't have to wait hours for receiving OTP, booking slots and quarantine center of
their choice . Covid Expert gives the First-Come First-Serve service. Also, easier to locate
nearby hospitals, medical shops and containment zones as well. The daily Covid case
reports are also provided in graphs. Overall Covid Expert is a very user friendly website
that gives much help for users in one go. The District Admin will prepare a Vaccination
Time Table for each CVC for the period of Vaccination Cycle. The date-wise schedule for
the days/dates on which the vaccination is to be organized a CVC along with necessary
inputs in terms of various types of slots, will be prepared and populated on COWIN by the
District Admin. The Time Table so prepared will then be declared for the citizens to
enable them to choose the CVC and date from among the CVCs where open vaccination
slots are still available. Since, unregistered beneficiaries will interact with the system for
the first time, itwould be important to ensure that eligibility of beneficiaries in terms of
their actually being HCWs/FLWs will be important. The plan for onsite registration must
be prepared in close coordination with the concerned health facility in-charge or the head
of the office, as the case may be. Health Facilities or offices may be mapped (not on
COWIN) to the Vaccination Centers and a sufficiently senior official, from the concerned
health facility (for HCWs) and office (for FLWs), must be deputed at the Vaccination
Center to verify the employment credentials of the HCWs/FLWs of their health facility/
office.One of the key aspects of the COVID Vaccination programme in India has been the
roll out of COWIN portal. COWIN is an end to end solution that has utilities for the entire
public health system from national up to the vaccinator level. The COWIN 1.0 system
allowed for creation of users (admins, supervisors, vaccinators), registration of
beneficiaries (bulk upload and individual registration), facilities/planning unit and session
sites followed by planning and scheduling sessions and implementation of vaccination
process.
18. BIBLIOGRAPHY
REFERENCES

ONLINE

[1] https://stackoverflow.com/

[2] https://www.w3schools.com/

[3] https://en.wikipedia.org/wiki/Main_Page

BOOKS

[1] The Joy of PHP Programming: A Beginner’s Guide to Programming Interactive Web Applications
with PHP and MySQL

[2] HTML and CSS: Design and Build Websites – by Jon Duckett

[3] Effective JavaScript: 68 specific ways to harness the power of JavaScript by David Herman

You might also like