Professional Documents
Culture Documents
ON
VISITOR GATEPASS
SYSTEM
BY
Mr . Krushna Yuvraj Patil
And
Mr. Shiyon Joseph George
“The successful” makes everyone happy. But the happiness will be gold
without glitter if we didn’t state the persons who have supported us to make it’s
a success.
Success will be crowned to people who have made it a reality but the
people whose constant guidance and encouragement made it possible will be
crowned first on the eve of success.
We have taken efforts in this project .However , it would not have been
possible without the kind support and help of many individuals. We would like
to extend my sincere thanks to all of them.
We are highly indebted to Miss. Shruti Gosavi for their guidance and
constant supervision as well as for providing necessary information regarding
the project & also for their support in completing the project.
We would like to express our gratitude toward HOD of computer Science
Department “For their kind co-operation and encouragement which help me in
completion of this project.
Last but not least, we thanks and appreciations also go to those people who
have willingly helped me out with their abilities , indirectly guided and helped
us in preparation of this project.
1. Introduction…………………………………………………………..04
1.1 Existing system……………………………………………………....07
1.2 Fact-finding techniques……………………………………………...08
1.3Need for system ……………………………………………………...10
1.4 Scope of the system …………………………………………………11
1.5 Feasibility study …………………………………………………….12
1.6 Background Information…………………………………………….16
1.7 Software requirements………………………………………………17
1.8Hardware requirements………………………………………………18
2. Proposed System…………………………………………………….19
2.1 The objective of the system…………………………………………20
2.2 User requirement……………………………………………………21
The Visitor Gatepass System App is a digital solution that allows organizations
to manage their visitors efficiently. This app helps to streamline the process of
issuing gate passes to visitors and ensures that all necessary security checks are
completed before granting access to the premises. The Visitor Gatepass System
app is a software application designed to manage and track visitors' entry and
exit from an organization or any other premises. This app can be used to
maintain a secure and organized environment by recording visitor details,
generating gate passes, and tracking their IN & OUT logs. This is a green
initiative that has less/no manual intervention and the use of paper. In the
traditional way of booking it use to be very easy to search or track any user
when the user base was less, but gradually when data grows it will be really a
challenge to manage data efficiently. This app/ solution solves all those
drawbacks. This solution is a need of the hour since the world is going through
a pandemic phase where less interaction with humans is recommended, this
solution makes sure your organization is not compromising security by
following general guidelines issued by the government.
Many companies have a security guard who will take manual entries in a book
regarding visitor information. Now, this has two concerns this is an offline and
insecure way of storing information i.e These books would pile up in years and
won't be maintained in years secondly, these records won’t fully identify the
visitor. Visitors with wrong intent might just have their goofed-up name and
fake ID, no other identity to validate the user henceforth. Another big concern is
these details from books can be manipulated. Security of current security system
can be compromised.
• Interview
• Questionnaires
• Record Review
• Observation
According to the need and scope of system, analyst can use all or any of them
for information retrieval.
Interview
Interview is most effective technique for requirement gathering. This technique
is mainly used for upper management where client is in limited no. Analyst can
arrange meeting in advanced time, duration, and place for meeting is being
specify in advanced. Some time client is not interested in providing right
information or may hide the fact. At this time analyst have to be smart and take
information whatever is need. Analyst have to take care about not only client is
speak but in what way he is. This technique is very effective as compare to
Questionnaires
Questionnaires are useful when client side is very large. where individual
interaction is not possible for example 200 employee are there and every one
need to be questioned then this technique is very useful as compare to interview.
There are chances that client may not take interest in giving answer or provide
wrong answer to the questions. Generally there are many questions in one form
with options provided or open ended described answers.
Record Review
Above to techniques are concerns with human interaction. Where they can
speak wrong but document can't. Record review means the existing system
which is currently working is being accessed by analyst. The purpose behind is
that to collect information
l. Operational Feasibility.
2. Technical Feasibility.
3. Economical Feasibility.
If system is well liked and used to the extent that the person will not be able to
see any reasons for a change, there may be no resistance.
If the current business methods are not acceptable for the users, they may
welcome a change that will bring about a more operational and useful system. It
has to be seen that the proposed system does not harm the organization or
individual performance being poor after implementation. Therefore all
operational aspects have been considered carefully.
Since we are providing the solution for the problems which are currently
faced administrator which we have already specify under "Problem
Specification" heading. After installing this software the faced problem will be
removed. Thus it will meet the user's requirements.
2. Technical Feasibility
The technical issues usually raised during the stage of investigation. It includts
the following:
[1] Implement Keys: Implement Primary Key, Foreign Key, and Candidate key.
[2] Build Constraints: Build all Types of constraints such as Null, Not Null, and
Unique.
[3] Join The Tattles: Join the table to inap the relation.
[4] Implement Functions: Implement all type of functions such as Pow(), Sqrt(),
Date().
• The cost of hardware and software for the class of application being
considered.
This new online system is used to define the allowed personnel authorized to
allow access by car to guests. Which means for every entry there is someone
responsible for.
The end user will have secured web interface i.e. GATE PASS SYSTEM to
enter the guest details with inviter credentials which will be processed for
validity and up on success will be accessible online to Security personnel
occupying the gate post. Now system would have information who is visiting,
for what purpose for, who has invited him.
The invitation will be kept in the database and will be available to the Security
staffs and to the invitees. Admin can view any record at any point in time.
Full web based administration and report engine were implemented based on
SQL queries. The database has all records and safety measure of records
Visitor:
➢ Visitor will add his identity details onto the screen and click a photo.
➢ Post this activity VGS will add all his details into a database and generate
an e-gatepass which will be stored in an image format on the server also
a link (to view or download )would be sent to visitor's registered mobile
number.
➢ And system will log his/her attendance/visit data time stamp in the
database.
➢ If visitors are visiting the office a second time they will be prompted to
just add their already registered mobile number, and this will log them
IN.
Specifically, a visitor gatepass system for a startup can have the following
objectives:
2. Security: The system should be able to monitor the movements of visitors and
detect any unauthorized activities or security breaches.
3. Record keeping: The system should maintain a record of all visitors who
enter and exit the premises, including their personal information and purpose of
visit.
5. Efficiency: The system should be easy to use and administer, with minimal
disruption to the daily operations of the startup.
1. Security: One of the primary user requirements for a visitor gatepass system
is to enhance the security of the premises. This includes verifying the identity of
visitors, controlling access to different areas of the premises, and monitoring
visitor movements.
2. Ease of Use: The system should be easy to use for both visitors and
administrators. This includes having a simple registration process, clear
instructions for visitors, and a user-friendly interface for administrators.
6. Scalability: The system should be able to scale as the business grows. This
includes being able to handle a large volume of visitors and having the
flexibility to adapt to changing security needs.
7. Support: The vendor should provide adequate support for the system,
including training for administrators and technical support when needed.
1. System Requirements Analysis: The first step in the System Analysis and
Design phase is to analyse the requirements of the visitor gatepass system. This
includes identifying the key features and functionalities of the system, such as
visitor registration, authentication, access control, monitoring, record keeping,
reporting, and customization.
3. User Interface Design: The user interface of the visitor gatepass system
should be user-friendly and intuitive for both visitors and administrators. The
design should focus on simplicity, clarity, and ease of use.
2. Design: During design, a data dictionary can be used to define the data model
and its relationships. This helps ensure that the data is organized and structured
in a way that supports the requirements of the system, and that the data is
consistent and accurate.
4. Testing: During testing, a data dictionary can be used to validate the data and
ensure that it meets the requirements of the system. This helps identify any
errors or inconsistencies in the data, which can then be addressed before the
system is deployed.
The purpose of a data dictionary is to define and document the data elements
and their relationships in a database or information system. It provides a
common language and understanding of the data, which facilitates
communication and collaboration among stakeholders. A data dictionary
typically includes the following information about each data element:
3. Data Type: The type of data, such as string, integer, date, etc.
There are several types of UML diagrams, each with a specific purpose
and level of abstraction. Some of the most commonly used UML diagrams
include: