0% found this document useful (0 votes)
10 views57 pages

Gauthaman Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views57 pages

Gauthaman Report

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 57

CHAPTER 1

INTRODUCTION

1.1 COMPANY PROFILE

The Mind IT Solution is one of the few IT system integration, professional


service and software development companies in Macedonia that works with
Enterprise systems and companies. As a privately owned company, The Mind IT
Solution provides IT Consultancy, software design and development as well as
professional services and hardware deployment and maintenance to the following
verticals:

• Government (Local and Central)


• Financial Services (insurance, banking and clearing house)
• Telecommunications
• Energy and Utilities
• Health Care
• Education

The Mind IT Solution is located in Skopje, Macedonia (South-Eastern Europe),


offering fully fledged services for software development and engineering empowering
effective near-shore management to its clients. Recognized both on local and regional
markets since 1995, initially known as ICL and later acquiring regional Fujitsu
Services partner, Infinite continues to operate with higher client expectancy and
flexible solution offers. The Mind IT Solution is a pioneer in Interactive Virtual
Teams (IVT) which enables the client and the service provider to establish instant and
successful communication channels and support off-shoring and near-shoring
business models, thus keeping the deadlines on time and on track.

1
1.2 DESCRIPTION
A company visitor management system is a comprehensive solution designed to
streamline the process of managing visitors within an organization's premises. This
system typically encompasses a range of features and functionalities aimed at enhancing
security, efficiency, and visitor experience. At its core, the system allows organizations
to digitally record and track visitor information, including their identity, purpose of visit,
and entry/exit times. Upon arrival, visitors are required to check-in using various
methods such as self-service kiosks, mobile apps, or visitor registration portals. The
system can generate visitor badges or temporary access credentials to ensure authorized
access to different areas of the facility. Additionally, the visitor management system may
integrate with other security systems such as access control, CCTV cameras, and
employee directories to further enhance security measures and automate certain
processes. Beyond security, the system provides administrative features for managing
visitor appointments, pre-registration, and notifications to hosts upon visitor arrival.
Overall, a company visitor management system serves as a centralized platform to
effectively manage visitor traffic, enhance security protocols, and provide a seamless
experience for both visitors and employees.

1.3 OBJECTIVES
2 The main objective of building this product is to develop a lightweight, user-friendly,
flexible and efficient loan management system. The goal is to develop a system that
helps loans to get processed and service from the very beginning to the end. This creates
a workflow that an employee or a business needs to manage. The main objective of
developing company visitor management system is to computerized the tradition way of
visitors. Another purpose for developing this application is to generate the report
automatically.

2
CHAPTER 2

SYSTEM ANALYSIS

2.1 Existing System


Existing work is completely a manual system because whenever the visitor
came to organisation they should write the details, entry time and outing time in a note.
If the visitor doesn’t entry their visiting in the record note, then no one knows about that
in an organisation.

2.1.1 Disadvantages
 It consisting paper work.
 Outdated and unprofessional.
 Does not provide complete and retrievable records
 No real time or remote access.

2.2 Proposed System


In proposed system overcome all the disadvantages arises from existing system. It is
full of computerized application run through the internet so the position of authority can
easily access and get the real time information.

2.2.1 Advantages
 Easier accessibility.
 Easy to maintain the visitor records in database.
 Easy to retrieve the visitor records between data.
 It reduces man power.

2.3 FEASIBILITY STUDY


3
2.3.1 Technical Feasibility
Technical feasibility for a company visitor management system involves
assessing the practicality and viability of implementing such a system from a
technical perspective.

2.3.2 Operational Feasibility


Operational feasibility for a company visitor management system involves
assessing the practicality and viability of implementing such a system within an
organization.

2.3.3 Economical Feasibility


Economical feasibility for implementing a company visitor management
system involves assessing the costs and benefits associated with deploying such a
system within an organization.

2.3.4 Social Feasibility


Social feasibility for a company visitor management system involves assessing
how the system will be perceived and accepted by various stakeholders, including
employees, visitors, management, and regulatory authorities.

CHAPTER 3

4
SYSTEM SPECIFICATION

3.1 HARDWARE REQUIREMENTS

 Processor Name :Dual Core

 Processor Speed : 3.2 GHz

 RAM : 4 GB

 Hard Disk Capacit : 500 GB

 Display Device : 14’ to 19’ Inch Monitor

 Keyboard Type : PS2 or USB

 Mouse Typ : PS2 or USB

3.2 SOFTWARE RQUIREMENTS

 Technology Implemented : Apache Server , Dream weaver

 Language Used : PHP 5.2

 Database : My SQL 5.2

 User Interface Design : HTML, AJAX , JAVA SCRIPT

 Web Browser : Chrone,IE8

 Operating System : Windows 7

CHAPTER 4

5
SOFTWARE DESCRIPTION

4.1 FRONT END

PHP is the latest incarnation of PHP (PHP: Hypertext Pre-processor)-a programming,

language devised by RasmusLerdorf in 1994 for building dynamic, interactive Websites.

Since then, it’s been evolving into a full-fledged language in its own right, thanks to the hard

work of all the people who contribute to its development.A sure sign that PHP is maturing

(OOP) principles and improved support for XML the zend engine (the part that interprets and

executes PHP code) now enables PHP5 developers to implement, among a host of other

things, graceful application-wide error handling.

With all the new features and functionality that PHP5 provides, it’s important for

programmers to “upgrade” their understanding in order to best make use of this powerful

Web scripting tool. And that’s why it is important for you, the reader to invest your time

learning about the latest and greatest that the people developing PHP5 have to offer.

You know it’s a language for writing computer programs, so the real questions is “what

sort of programs can you write with it?” in technical terms, PHP’s main use is as a cross-

platform, html embedded, server-side web scripting language. Let’s take a moment to

examine these terms

Cross platform: most PHP code can be processed without alternation on computers

running many different operating systems. For Example, a PHP script that runs on Linux

generally also runs well on windows.

6
HTML-embedded: PHP code can be written in files containing a mixture of PHP

instruction and HTML code.Server-side: The PHP programs are run on server-specially a

web server.Web scripting language: PHP programs run via a web browser.

This means you will write programs that mix PHP code and HTML, run them on a

web server, and access them from a web browser that displays the result of your PHP

processing by showing you the HTML returned by the web server. In other words, you can

make your programs available for other people to access across the web, simply by placing

them on a public web server.

You are probably already familiar with HTML (hypertext markup language)-it’s the

main language used to create web pages, combining plain text with special tags that tell

browsers how to treat that text. HTML is used to describe how different elements in a web

page should be displayed, how pages should be linked, where to put image, and so on.

Pure HTML documents, for all their versatility, are little more than static

arrangements of text and pictures, albeit nicely presented ones. However, most of the sites

you find on the web aren’t static but dynamic even interactive. They can show you a list of

articles containing a particular word, in which you are interested, show you the latest news,

even greet you by name when you log on. They enable you to interact, and present you with

different information according to the choice you make.

You can’t build a web site like that using raw HTML, and that’s where PHP comes in.

what sort of things can you do with it? Well, you can program sites that Present data from a

wide variety of sources, such as databases, files, or even other Web pages. Incorporate

interactive elements, such as search facilities, message boards, and straw polls. Enable the

user to perform actions, such as sending e-mail or buying something.

7
In other words, PHP can be used to write the sort of sites that those who regularly use

the web are likely to encounter every day. From search engines to information portals to e-

commerce sites, most major web sites incorporate some or all of these sorts of programming.

Among other things in the course of this book, you will use PHP to build

JAVASCRIPT

An explanation of exactly what JavaScript is has to begin with Java. Java is a new kind
of Web programming language developed by Sun Microsystems. A Java program, or applet,
can be loaded by an HTML page and executed by the Java Interpreter, which is embedded
into the browser.
Java is a complex language, similar to C++. Java is object-oriented and has a wide

variety of capabilities; it's also a bit confusing and requires an extensive development cycle.

That's where JavaScript comes in.

JavaScript is one of a new breed of Web languages called scripting languages. These

are simple languages that can be used to add extra features to an otherwise dull and dreary

Web page. While Java is intended for programmers, scripting languages make it easy for

nonprogrammers to improve a Web page.

JavaScript was originally developed by Netscape Corporation for use in its browser,

Netscape Navigator. It includes a convenient syntax, flexible variable types, and easy access

to the browser's features. It can run on the browser without being compiled; the source code

can be placed directly into a Web page.

You can program in JavaScript easily; no development tools or compilers are required.

You can use the same editor you use to create HTML documents to create JavaScript, and it

executes directly on the browser (currently, Netscape or Microsoft Internet Explorer).

JavaScript was originally called Live Script, and was a proprietary feature of the

Netscape browser. JavaScript has now been approved by Sun, the developer of Java, as a
8
scripting language to complement Java. Support has also been announced by several other

companies.

Although useful in working with Java, you'll find that JavaScript can be quite useful in

its own right. It can work directly with HTML elements in a Web page, something Java can't

handle. It is also simple to use, and you can do quite a bit with just a few JavaScript

statements.

The Advantages of JavaScript

An Interpreted Language

JavaScript is an interpreted language, which requires no compilation steps. This

provides an easy development process. The syntax is completely interpreted by the browser

just as it interpreted HTML tags.

Embedded Within HTML

JavaScript does not requires any special or separate editor for programs to be written

edited or compiled. It can be written in any text editor like Notepad, along with appropriate

HTML tags, and saved as filename. Html. HTML files with embedded JavaScript commands

can then be read and interpreted by any browser that is JavaScript enabled.

Minimal Syntax-Easy to Learn: By learning just a few commands and simple rules of

syntax, complete applications can be built using JavaScript.

Quick Development: Because JavaScript does not require time-consuming

compilations, scripts can be developed in a short period of time. This is enhanced by the fact

many GUI interface features, such as alerts, prompts, confirm boxes, and other GUI elements,

are handle by client side JavaScript, the browser and HTML code.
9
Design for Simple, Small Programs

It is well suited to implement simple, small programs (for example, a unit conversion

calculator between miles and kilometres or pounds and kilograms).Such programs can be

easily written and executed at an acceptable speed using JavaScript. In addition, they can be

easily interpreted into a web page.

Performance

JavaScript can be written such that the HTML files are fairly compact and quite small.

This minimizes storage requirements on the web server and download time for the

client.Additionally, because JavaScript are usually include in the same file as the HTML code

for a web page, they require fewer separate network accesses.

Procedural Capabilities

Every programming language needs to support facilities such as Condition checking,

Looping and Branching .JavaScript provides syntax, which can be used to add such

procedural capabilities to web page (filename.html) coding.

Designed for Programming User Events

JavaScript supports Object/Events based programming JavaScript recognizes when a

form Button is pressed. This event can have suitable JavaScript code attached, which will

executed when the Button Pressed event occurs.

10
JavaScript can be used to implement context sensitive help. Whenever an HTML form’s

Mouse cursor Mouse Over a button or a link on the page a helpful and informative massage

can be displayed in the status bar at the button of the browser window.

Easy Debugging and Testing

Being an interprets language ,scripts in JavaScript are tested line by line, and the

errors are also listed as they are encountered ,i.e. an appropriate error message along with

the line number is listed for every error that is encountered. It is thus easy to locate errors,

make changes, and test it again without the overhead and delay of compiling.

Platform Independence / Architecture Neutral

JavaScript is a programming language that is completely independent of the hardware

on which it works. It is a language that is understood by any JavaScript enabled

browser .Thus ,JavaScript application work on any machine that has an appropriate

JavaScript enabled browser can be anywhere on the network. Since each browser is for a

specific platform, JavaScript interpretation will be with respect to the specific platform. The

browser will add whatever platform specific

Information is required to the JavaScript while it interprets the code. Thus, JavaScript

is truly platform independent. A JavaScript programmer developed on a UNIX machine will

work perfectly well on a Windows machine.

The fact that a platform specific browser , maintained at the client end, does the

interpretation of JavaScript , relieves the developer of the responsibility of maintaining

multiple source code files for multiple platform.

4.2 BACKEND

11
MYSQL

MySQL is a fast, easy-to-use RDBMS used for databases on many Web sites. Speed

was the developers’ main focus from the beginning. In the interest of speed, they made the

decision to offer fewer features than their major competitors (for instance, Oracle and

Sybase).

However, even though MySQL isles full featured than its commercial competitors, it

has all the features needed by the large majority of database developers. It’s easier to install

and use than its commercial competitors, and the difference in price is strongly in MySQL’s

favour.

MySQL is developed, marketed, and supported by MySQL AB, which is a Swedish

company. The company licenses its two ways:

 Open source software: MySQL is available via the GNU GPL (General Public

License) for no charge. Anyone who can meet the requirements of the GPL can use

the software for free.

 If you’re using MySQL as a database on a Web site (the subject of this book), you

can use MySQL for free, even if you’re making money with your Web site.

 Commercial license: MySQL is available with a commercial license for those who

prefer it to the GPL. If a developer wants to use MySQL as part of a new software

product and wants to sell the new product, rather than release it under the GPL, the

developer needs to purchase a commercial license.

 The fee is very reasonable.Finding technical support for MySQL is not a problem.

You can join one of several e-mail discussion lists offered on the MySQL Web site at

www.mysql.com. You can even search the e-mail list archives, which contain a large

knowledge base of MySQL questions and answers. If you’re more comfortable


12
getting commercial support, MySQL AB offers technical support contracts — five

support levels, ranging from direct e-mail support to phone support, at five price

levels.

Advantages of MySQL

MySQL is a popular database with Web developers. Its speed and small size make

it ideal for a Web site. Add to that the fact that its open source, which means free, and you

have the foundation of its popularity. Here is a rundown of some of its advantages:

 It’s fast. The main goal of the folks who developed MySQL was speed.

Consequently, the software was designed from the beginning with speed in mind.

 It’s inexpensive. MySQL is free under the open source GPL license, and the fee for a

commercial license is very reasonable.

 It’s easy to use. You can build and interact with a MySQL database by using a few

simple statements in the SQL language, which is the standard language for

communicating with RDBMSs.

 It can run on many operating systems. MySQL runs on a wide variety of operating

systems — Windows, Linux, Mac OS, most varieties of UNIX (including Solaris,

AIX, and DEC UNIX), FreeBSD, OS/2, Irix, and others.

 Technical support is widely available. A large base of users provides free support

via mailing lists. The MySQL developers also participate in the e-mail lists. You can

also purchase technical support from MySQL AB for a very small fee.

 It’s secure. MySQL’s flexible system of authorization allows some or all database

privileges (for example, the privilege to create a database or delete data) to specific

users or groups of users. Passwords are encrypted.

13
 It supports large databases. MySQL handles databases up to 50 million rows or

more. The default file size limit for a table is 4GB, but you can increase this (if your

operating system can handle it) to a theoretical limit of 8 million terabytes (TB).

 It’s customizable. The open source GPL license allows programmers to modify the

MySQL software to fit their own specific environments.

CHAPTER 5

PROJECT DESCRIPTION

5.1 MODULES
14
 Admin

 Dashboard

5.3. MODULES DESCRIPTION

In CVMS we use PHP and MySQL database. This is the project which keep records of

visitors who visited in the company. CVMS has one module i.e admin.

5.3.1 ADMIN

 Admin Login the website and host the website.

 Admin can only add/manage the staff user.

 Admin can addnew visitor.

 Admin can also update his profile, change password and recover password

5.3.2 DASHBOARD

 Dashboard: In this sections, admin can briefly view how many visitors visited in a
particular period.
 Visitors: In this section, admin adds new visitors by filling their information in add
visitors sections and also view and manage visitors records. Admin also put visitors
out time in the manage records section.
 Search: In this bar, admin can search a particular person by their name and phone
number.
 Reports: In this section admin can generate visitors reports between two dates.

5.4 ARCHITECTURE DIAGRAM

15
DASHBOARD

LOGIN
ADD NEW VISITOR

MANAGE VISITORS
COMPANY VISTOR MANAGEMENT SYSTEM

ADMIN ADD/DELETE USER


LOGOUT

CHECK THE REPORTS

FIG 5.4.1 Architecture Diagram

5.5 DATA FLOW DIAGRAM

DASHBOARD SHOWING NO.OF VISITINGS

16
ADMIN

FIG 5.5.1 Data Flow Diagram

5.6 UML Diagram

USE CASE DIAGRAM

17
DASHBOARD SHOWING NO.OF VISITINGS
FIG 5.6.1 Use Case Diagram

5.7 CLASS DIAGRAM

New Visitors
+Create New Visitor :
VarChar
18
CVMS
+Add New Visitor :
User Management
VarChar
+Manage Visitor : +Register New User :
Manage Visitors
VarChar
VarChar
+Entry Outing Time
+User Permission : :
+User Management:
VarChar
VarChar
VarChar
+Reports: VarChar

Reports
+Check The Reports
B/W dates : VarChar

Login
+Username : String
+Password : VarChar
+Login()

FIG 5.7.1 Class Diagram

5.7.1 SEQUENCE DIAGRAM

COMPANY VISITOR
Admin Sub-Admin/User MANAGEMENT
19
Add New
Visitor

Manage the
Visitors

Check
Visitor B/W
date

Logout

FIG 5.7.1 Sequence Diagram

5.8 INPUT DESIGN

The input design for a company visitor management system involves creating intuitive
and efficient interfaces for users to input visitor information and interact with the system.
This encompasses various components such as visitor registration forms, check-in/check-out

20
screens, and administrative dashboards. The design should prioritize simplicity, usability, and
accessibility to ensure smooth operations and a positive user experience. For visitor
registration, the input form should collect essential details such as name, contact information,
purpose of visit, and host information.

5.8 OUTPUT DESIGN

The output design for a company visitor management system encompasses various
elements aimed at providing a seamless and efficient visitor experience while ensuring
security and compliance. Upon arrival, visitors interact with the system through intuitive user
interfaces, such as self-service kiosks, mobile apps, or web portals, to check in and provide
necessary information. The system generates visitor badges or temporary access credentials,
incorporating personalized details and security features.

CHAPTER 6

SYSTEM TESTING

21
System testing for the company visitor management system involves thoroughly
evaluating the system's functionality, performance, security, and usability to ensure that it
meets the requirements and expectations of stakeholders. This comprehensive testing process
encompasses various aspects of the system's operation, including:

6.1 Functionality Testing

Functionality testing verifies that all features and functionalities of the visitor
management system work as intended. This includes testing user registration, visitor check-
in/check-out processes, badge printing, host notifications, reporting capabilities, and
integration with external systems such as access control and employee directories.

6.2 Performance Testing


Performance testing assesses the system's responsiveness, scalability, and reliability
under different load conditions. This involves simulating various levels of visitor traffic to
measure system response times, throughput, and resource utilization. Performance testing
helps identify and address any bottlenecks or performance issues that may impact the
system's performance in real-world scenarios.

6.3 Security Testing


Security testing evaluates the system's ability to protect sensitive visitor data and
prevent unauthorized access or breaches. This includes testing authentication mechanisms,
data encryption, access control policies, and vulnerability assessments to identify and address
potential security vulnerabilities or weaknesses in the system's architecture.

6.4 Usability Testing


Usability testing focuses on assessing the system's ease of use, intuitiveness, and
overall user experience. This involves gathering feedback from end-users through surveys,
interviews, and usability testing sessions to identify areas for improvement in the system's
user interface, navigation flow, and accessibility features.
6.5 Integration Testing
Integration testing verifies the seamless integration of the visitor management system
with other internal systems and third-party applications. This includes testing data exchange,

22
API integration, and interoperability with access control systems, employee directories, CRM
(Customer Relationship Management) systems, and email/notification services to ensure
smooth communication and data synchronization.

6.7 Regression Testing


Regression testing ensures that new system updates, bug fixes, or changes do not
inadvertently introduce new issues or regressions into the system. This involves retesting
previously validated functionalities and performing automated regression tests to verify
system stability and consistency after modifications.

6.8 Compliance Testing


Compliance testing ensures that the visitor management system adheres to relevant
regulatory requirements, industry standards, and organizational policies. This includes testing
data privacy and protection measures, GDPR compliance, HIPAA compliance (if applicable),
and adherence to industry-specific regulations governing visitor access and security.

CHAPTER 7

SYSTEM IMPLEMENTATION
23
The system implementation for the company visitor management system involves a
systematic process of deploying and configuring the software and hardware components to
ensure the smooth operation of the system. The implementation process begins with thorough
planning and preparation, including defining project goals, identifying stakeholders, and
establishing timelines and milestones. Next, the necessary hardware devices, such as kiosks,
tablets, or card readers, are installed at designated entry points within the organization's
premises. Concurrently, the visitor management software is deployed on servers or cloud
infrastructure, configured according to the organization's requirements, and integrated with
existing systems such as access control and employee directories.

Once testing is successfully completed, the system is rolled out to users, accompanied by
training sessions to familiarize employees with the new processes and interfaces. User
manuals, documentation, and support channels are provided to assist users in navigating the
system effectively and resolving any issues that may arise. Continuous monitoring and
evaluation are performed post-implementation to gauge system performance, gather user
feedback, and identify areas for optimization and enhancement.

Throughout the implementation process, collaboration and communication among


stakeholders, including IT personnel, facility managers, security staff, and end-users, are
paramount to ensure alignment with organizational goals and requirements. By following a
structured and methodical approach to system implementation, the company can successfully
deploy the visitor management system, enhance security protocols, improve visitor
experience, and streamline administrative processes within the organization's premises.

CHAPTER 8
CONCLUSION AND FUTURE ENHANCEMENT
8.1 Conclusion
24
Company visitor management system is very helpful for big organization by
maintaining regular visitor details in database. In our company visitor management system
will help to add the visitor details in database. It will also increase the perception of your
brand. It will work on internet so the authority can easily access.

8.2 Future Enhancement


 In future facilitate of accessing website and booking an employee.
 Visitor can check the availability of employee.
 Employee has an option of accepting or rejecting the visitor.
 It can also provide the facility of restricting trouble some visitors using blocking
option.

CHAPTER 9

APPENDICES

25
9.1 SOURCE CODINGS

Index.php

<?php
session_start();
error_reporting(0);
include('includes/dbconnection.php');
if(isset($_POST['login']))
{
$username=$_POST['username'];
$password=md5($_POST['password']);
$sql ="SELECT * FROM tbladmin WHERE UserName=:username and
Password=:password";
$query=$dbh->prepare($sql);
$query->bindParam(':username', $username, PDO::PARAM_STR);
$query->bindParam(':password', $password, PDO::PARAM_STR);
$query->execute();
$results=$query->fetchAll(PDO::FETCH_OBJ);
if($query->rowCount() > 0)
{
foreach ($results as $result)
{
$_SESSION['odmsaid']=$result->ID;
$_SESSION['login']=$result->username;
$_SESSION['names']=$result->FirstName;
$_SESSION['permission']=$result->AdminName;
$_SESSION['companyname']=$result->CompanyName;
$get=$result->Status;
}
$aa= $_SESSION['odmsaid'];
$sql="SELECT * from tbladmin where ID=:aa";
26
$query = $dbh ->prepare($sql);
$query->bindParam(':aa',$aa,PDO::PARAM_STR);
$query->execute();
$results=$query->fetchAll(PDO::FETCH_OBJ);
$cnt=1;
if($query->rowCount() > 0)
{
foreach($results as $row)
{
if($row->Status=="1")
{
echo "<script type='text/javascript'>document.location ='dashboard.php'; </script>";
} else
{
echo "<script>
alert('Your account was deactivated Approach Admin');document.location ='index.php';
</script>";
}
}
}
} else{
echo "<script>alert('Invalid Details');</script>";
}
}
?>
<!DOCTYPE html>
<html lang="en">
<?php @include("includes/head.php");?>
<body>
<div class="container-scroller">

27
<div class="container-fluid page-body-wrapper full-page-wrapper">
<div class="content-wrapper d-flex align-items-center auth">
<div class="row flex-grow">
<div class="col-lg-4 mx-auto">
<div class="auth-form-light text-left p-5">
<div class="brand-logo" align="center">
<img class="img-avatar mb-3" src="companyimages/logo.png" alt="">
</div>
<form role="form" id="" method="post" enctype="multipart/form-data" class="form-
horizontal">
<div class="form-group mb-3">
<input type="text" class="form-control form-control-lg" name="username"
id="exampleInputEmail1" placeholder="Username" required>
</div>
<div class="form-group mt-3">
<input type="password" name="password" class="form-control form-control-lg"
id="exampleInputPassword1" style="color: black" placeholder="Password" required>
</div>
<div class="mt-3">
<button name="login" class="btnbtn-block btn-gradient-info btn-lg font-weight-medium
auth-form-btn">SIGN IN</button>
</div>
<div class="text-center mt-4 font-weight-light">
<a href="forgot_password.php" class="text-primary">
Forgot Password
</a>
</div>
</form>
</div>
</div>
</div>
</div>
28
<!-- content-wrapper ends -->
</div>
<!-- page-body-wrapper ends -->
</div>
<!-- container-scroller -->
<?php @include("includes/foot.php");?>
<!--endinject -->
</body>
</html>

Dashboard.php
<?php
include('includes/checklogin.php');
check_login();

?>
<!DOCTYPE html>
<html lang="en">
<?php @include("includes/head.php");?>
<body>
<div class="container-scroller">
<!--partial:partials/_navbar.html -->
<?php @include("includes/header.php");?>
<!-- partial -->
<div class="container-fluid page-body-wrapper">
<!--partial:partials/_sidebar.html -->
<?php @include("includes/sidebar.php");?>
<!-- partial -->
<div class="main-panel">
<div class="content-wrapper">

29
<div class="row">
<div class="col-md-3 stretch-card grid-margin">
<div class="card bg-gradient-info card-img-holder text-white" style="height: 150px;">
<div class="card-body" >
<imgsrc="assets/images/dashboard/circle.svg" class="card-img-absolute" alt="circle-
image" />
<h4 class="font-weight-normal mb-3">Today's Visitors</h4>
<?php
//todays visitors
$query=mysqli_query($con,"select ID from tblvisitor where
date(EnterDate)=CURDATE();");
$count_today_visitors=mysqli_num_rows($query);
?>
<h2 class="mb-5"><?php echo $count_today_visitors;?></h2>
</div>
</div>
</div>
<div class="col-md-3 stretch-card grid-margin">
<div class="card bg-gradient-success card-img-holder text-white" style="height: 150px;">
<div class="card-body">
<imgsrc="assets/images/dashboard/circle.svg" class="card-img-absolute" alt="circle-
image" />
<h4 class="font-weight-normal mb-3">Yesterday Visitors</h4>
<?php
//Yesterdays visitors
$query1=mysqli_query($con,"select ID from tblvisitor where
date(EnterDate)=CURDATE()-1;");
$count_yesterday_visitors=mysqli_num_rows($query1);
?>
<h2 class="mb-5"><?php echo $count_yesterday_visitors?></h2>
</div>
</div>
30
</div>
<div class="col-md-3 stretch-card grid-margin">
<div class="card bg-gradient-info card-img-holder text-white" style="height: 150px;">
<div class="card-body">
<imgsrc="assets/images/dashboard/circle.svg" class="card-img-absolute" alt="circle-
image" />
<h4 class="font-weight-normal mb-3">Last 7 Days Visitors </h4>
<?php
//Last Sevendays visitors
$query2=mysqli_query($con,"select ID from tblvisitor where
date(EnterDate)>=(DATE(NOW()) - INTERVAL 7 DAY);");
$count_lastsevendays_visitors=mysqli_num_rows($query2);
?>
<h2 class="mb-5"><?php echo $count_lastsevendays_visitors?></h2>
</div>
</div>
</div>
<div class="col-md-3 stretch-card grid-margin">
<div class="card bg-gradient-primary card-img-holder text-white" style="height: 150px;">
<div class="card-body">
<imgsrc="assets/images/dashboard/circle.svg" class="card-img-absolute" alt="circle-
image" />
<h4 class="font-weight-normal mb-3">Total Visitors Till Date</h4>
<?php
//Total Visitors visitors
$query3=mysqli_query($con,"select ID from tblvisitor");
$count_total_visitors=mysqli_num_rows($query3);
?>
<h2 class="mb-5"><?php echo $count_total_visitors?></h2>
</div>
</div>

31
</div>
</div>
</div>
<!-- content-wrapper ends -->
<!--partial:partials/_footer.html -->
<?php @include("includes/footer.php");?>
<!-- partial -->
</div>
<!-- main-panel ends -->
</div>
<!-- page-body-wrapper ends -->
</div>
<!-- container-scroller -->
<?php @include("includes/foot.php");?>
<script>
$(function () {
/* ChartJS
* -------
* Here we will create a few charts using ChartJS
*/

//--------------
//- AREA CHART -
//--------------

// Get context with jQuery - using jQuery's .get() method.


varareaChartCanvas = $('#areaChart').get(0).getContext('2d')

varareaChartData = {
labels : ['January', 'February', 'March', 'April', 'May', 'June', 'July'],

32
datasets: [
{
label : 'Digital Goods',
backgroundColor : 'rgba(60,141,188,0.9)',
borderColor : 'rgba(60,141,188,0.8)',
pointRadius : false,
pointColor : '#3b8bba',
pointStrokeColor : 'rgba(60,141,188,1)',
pointHighlightFill : '#fff',
pointHighlightStroke: 'rgba(60,141,188,1)',
data : [28, 48, 40, 19, 86, 27, 90]
},
{
label : 'Electronics',
backgroundColor : 'rgba(200, 150, 30, 1)',
borderColor : 'rgba(210, 214, 222, 1)',
pointRadius : false,
pointColor : 'rgba(210, 214, 222, 1)',
pointStrokeColor : '#c1c7d1',
pointHighlightFill : '#fff',
pointHighlightStroke: 'rgba(220,220,220,1)',
data : [66, 59, 80, 81, 56, 55, 41]
},
]
}

varareaChartOptions = {
maintainAspectRatio : false,
responsive : true,
legend: {

33
display: false
},
scales: {
xAxes: [{
gridLines : {
display : false,
}
}],
yAxes: [{
gridLines : {
display : false,
}
}]
}
}

// This will get the first returned node in the jQuery collection.
varareaChart = new Chart(areaChartCanvas, {
type: 'bar',
data: areaChartData,
options: areaChartOptions
})

//-------------
//- LINE CHART -
//--------------
varlineChartCanvas = $('#lineChart').get(0).getContext('2d')
varlineChartOptions = jQuery.extend(true, {}, areaChartOptions)
varlineChartData = jQuery.extend(true, {}, areaChartData)
lineChartData.datasets[0].fill = false;

34
lineChartData.datasets[1].fill = false;
lineChartOptions.datasetFill = false

varlineChart = new Chart(lineChartCanvas, {


type: 'line',
data: lineChartData,
options: lineChartOptions
})

//-------------
//- DONUT CHART -
//-------------
// Get context with jQuery - using jQuery's .get() method.
vardonutChartCanvas = $('#donutChart').get(0).getContext('2d')

vardonutData ={
labels: [
'Chrome',
'IE',
'FireFox',
'Safari',
'Opera',
'Navigator',
],
datasets: [
{
data: [700,500,400,600,300,100],
backgroundColor : ['#f56954', '#00a65a', '#f39c12', '#00c0ef', '#3c8dbc', '#d2d6de'],
}
]

35
}
vardonutOptions ={
maintainAspectRatio : false,
responsive : true,
}
//Create pie or douhnut chart
// You can switch between pie and douhnut using the method below.
vardonutChart = new Chart(donutChartCanvas, {
type: 'doughnut',
data: donutData,
options: donutOptions
})

//-------------
//- PIE CHART -
//-------------
// Get context with jQuery - using jQuery's .get() method.
varpieChartCanvas = $('#pieChart').get(0).getContext('2d')
varpieData = donutData;
varpieOptions ={
maintainAspectRatio : false,
responsive : true,
}
//Create pie or douhnut chart
// You can switch between pie and douhnut using the method below.
varpieChart = new Chart(pieChartCanvas, {
type: 'pie',
data: pieData,
options: pieOptions
})

36
//-------------
//- BAR CHART -
//-------------
varbarChartCanvas = $('#barChart').get(0).getContext('2d')
varbarChartData = jQuery.extend(true, {}, areaChartData)
var temp0 = areaChartData.datasets[0]
var temp1 = areaChartData.datasets[1]
barChartData.datasets[0] = temp1
barChartData.datasets[1] = temp0

varbarChartOptions = {
responsive : true,
maintainAspectRatio : false,
datasetFill : false
}

varbarChart = new Chart(barChartCanvas, {


type: 'bar',
data: barChartData,
options: barChartOptions
})

//---------------------
//- STACKED BAR CHART -
//---------------------
varstackedBarChartCanvas = $('#stackedBarChart').get(0).getContext('2d')
varstackedBarChartData = jQuery.extend(true, {}, barChartData)

varstackedBarChartOptions = {

37
responsive : true,
maintainAspectRatio : false,
scales: {
xAxes: [{
stacked: true,
}],
yAxes: [{
stacked: true
}]
}
}

varstackedBarChart = new Chart(stackedBarChartCanvas, {


type: 'bar',
data: stackedBarChartData,
options: stackedBarChartOptions
})
})
// $(document).ready(function () {
// showGraph();
// });

// function showGraph()
// {
// {
// $.post("data.php",
// function (data)
// {
// console.log(data);

38
// var name = [];
// var marks = [];

// for (vari in data) {


// name.push(data[i].ServiceName);
// marks.push(data[i].population);
// }
// varbarChartOptions = {
// responsive : true,
// maintainAspectRatio : false,
// datasetFill : false,
// scales:{
// yAxes:[{
// ticks:{
// beginAtZero: true
// }
// }]
// }
// }

// varchartdata = {
// labels: name,
// datasets: [
// {
// label: 'Student Marks',
// backgroundColor : ['#f56954', '#00a65a', '#f39c12', '#00c0ef', '#3c8dbc',
'#d2d6de'],
// borderColor: '#46d5f1',
// hoverBackgroundColor: '#CCCCCC',
// hoverBorderColor: '#666666',
// data: marks
39
// }
// ]
// };

// vargraphTarget = $("#graphCanvas");

// varbarGraph = new Chart(graphTarget, {


// type: 'bar',
// data: chartdata,
// options: barChartOptions
// });
// });
// }
// }

$(document).ready(function(){
$.ajax({
url: "data.php",
method: "GET",
success: function(data){
console.log(data);
var name = [];
var marks = [];

for (vari in data){


name.push(data[i].Sector);

marks.push(data[i].total);

40
}
varchartdata = {
labels: name,
datasets: [{
label: 'student marks',
backgroundColor : ['#f56954', '#00a65a', '#f39c12', '#00c0ef', '#3c8dbc', '#d2d6de'],
borderColor: 'rgba(134, 159, 152, 1)',
hoverBackgroundColor: 'rgba(230, 236, 235, 0.75)',
hoverBorderColor: 'rgba(230, 236, 235, 0.75)',
data: marks

}]
};
vargraphTarget = $("#graphCanvas");
varbarGraph = new Chart(graphTarget, {
type: 'bar',
data: chartdata,
options: {
scales: {
yAxes: [{
ticks: {
beginAtZero: true
}
}]
}
}
});
},
error: function(data) {
console.log(data);

41
}

});
});

$(document).ready(function () {
showGraph2();
});
function showGraph2()
{
{
$.post("data.php",
function (data)
{
console.log(data);
var name = [];
var marks = [];

for (vari in data) {


name.push(data[i].Sector);
marks.push(data[i].total);
}

varchartdata = {
labels: name,
datasets: [
{
label: 'Student Marks',
backgroundColor : ['#f56954', '#00a65a', '#f39c12', '#00c0ef', '#3c8dbc', '#d2d6de'],
// borderColor: '#46d5f1',

42
hoverBackgroundColor: '#CCCCCC',
hoverBorderColor: '#666666',
data: marks
}
]
};

vargraphTarget = $("#graphCanvas2");

varpieChart = new Chart(graphTarget, {


type: 'pie',
data: chartdata
});
});
}
}

</script>

<script>
$(document).ready(function(){
$.ajax({
url: "data.php",
method: "GET",
success: function(data){
console.log(data);
var name = [];
var marks = [];

for (vari in data){

43
name.push(data[i].Sector);

marks.push(data[i].total);
}
varchartdata = {
labels: name,
datasets: [{
label: 'student marks',
backgroundColor : ['#f56954', '#00a65a', '#f39c12', '#00c0ef', '#3c8dbc', '#d2d6de'],
borderColor: 'rgba(134, 159, 152, 1)',
hoverBackgroundColor: 'rgba(230, 236, 235, 0.75)',
hoverBorderColor: 'rgba(230, 236, 235, 0.75)',
data: marks

}]
};
vargraphTarget = $("#graphCanvas");
varbarGraph = new Chart(graphTarget, {
type: 'bar',
data: chartdata,
options: {
scales: {
yAxes: [{
ticks: {
beginAtZero: true
}
}]
}
}
});

44
},
error: function(data) {
console.log(data);
}

});
});

$(document).ready(function(){
$.ajax({
url: "data.php",
method: "GET",
success: function(data){
console.log(data);
var name = [];
var marks = [];

for (vari in data){


name.push(data[i].Sector);

marks.push(data[i].total);
}
varchartdata = {
labels: name,
datasets: [{
label: 'No of Bids',
backgroundColor : ['#f56954', '#00a65a', '#f39c12', '#00c0ef', '#3c8dbc', '#d2d6de'],
borderColor: 'rgba(134, 159, 152, 1)',

45
hoverBackgroundColor: 'rgba(230, 236, 235, 0.75)',
hoverBorderColor: 'rgba(230, 236, 235, 0.75)',
data: marks

}]
};
vargraphTarget = $("#graphCanvas3");
varbarGraph = new Chart(graphTarget, {
beginAtZero: true
}
}]
}
}
});
},
error: function(data) {
console.log(data);
}

});
});
marks.push(data3[i].total);
}
varchartdata = {
labels: name,
datasets: [{
label: 'No of Bids',
backgroundColor : ['#f56954', '#00a65a', '#f39c12', '#00c0ef', '#3c8dbc', '#d2d6de'],
borderColor: 'rgba(134, 159, 152, 1)',
hoverBackgroundColor: 'rgba(230, 236, 235, 0.75)',

46
hoverBorderColor: 'rgba(230, 236, 235, 0.75)',
data: marks

}]
};
vargraphTarget = $("#graphCanvas6");
varbarGraph = new Chart(graphTarget, {
type: 'bar',
data: chartdata,
options: {
scales: {
yAxes: [{
ticks: {
beginAtZero: true
}
}]
},
error: function(data) {
console.log(data);
}
});
});
</script>
</body>
</html>

9.2 SCREEN SHOTS

47
48
49
50
51
52
53
54
55
CHAPTER 10

REFERENCES

10.1 BOOK REFERENCES


1.N. Z. Haron, M. B. Mohter, S. A. M. J. Yunus, M. S. A. M. Isa and Rahim, “SAFe: A
secure and fast auto filling form system,” in ISIEA 2013 - 2013 IEEE Symposium on
Industrial Electronics and Applications, 2013, 206–209.
[2] H. Al Ghaithi, and U. Eaganathan, “A Brief Study and Implementation of Visitor
Management System for Asia Pacific University, Malaysia,” International Journal of
Advance Research in Science and Engineering, vol. 5, no. 4, pp. 317–326, 2016.
[3] B. S. Satari, N. A. A. Rahman, and Z. M. Z. Abidin, “Face recognition for security
efficiency in managing and monitoring visitors of an organization.” in Proceedings - 2014
International Symposium on Biometrics and Security Technologies, ISBAST 2014, 2015, pp
95–101.
[4] N. K. M. Noor, J. Sulaiman and H. C. Khor, “Development of Visitor Management
System Using Smart Card: UMP Case Study,” in National Conference on Software
Enginystems 2007 NaCSES’07, 2007.
[5] J. P. Kremer, “The Malaysian Smart Card GMPC (MyKad) White Paper” GMPC Project
White Paper. http://searchsqlserver.techtarget.com/definition/databasemanagement-system.
[6] M. R. M. Isa, Y. H. Yahaya, M. H. M. Halip, M. A. Khairuddin and K. Maskat, "The
design of fingerprint biometric authentication on smart card for PULAPOT main entrance
system," 2010 International Symposium on Information Technology, Kuala Lumpur, 2010,
pp. 1-4.
[8] Margaret Rouse. (2015). “What is database management system (DBMS)?” Definition
from WhatIs.com [Online] Available:
http://searchsqlserver.techtarget.com/definition/databasemanagement-system.

10.1 WEB REFERENCES

 http://searchsqlserver.techtarget.com/definition/databasemanagement-system.
 https://phpgurukul.com/company-visitor-management-system-using-php-and-mysql/
 https://www.coursehero.com/file/202979020/FINAL-CAPSTONE-PDFpdf/

56
57

You might also like