0% found this document useful (0 votes)
7 views39 pages

Final Report 12

Uploaded by

mathanmahi2928
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views39 pages

Final Report 12

Uploaded by

mathanmahi2928
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 39

ACKNOWLEDGEMENT

First of all, we would like to thank God, the Almighty, for having made
everything possible by giving us strength and courage this project successfully. We
acknowledge with great gratitude to all those helped us to make this project a great
success.
We unreservedly express our indebtedness to our Managing Trustee and
Correspondent Thiru.R.Solaisamy & Managing Trustee and Director
Mrs.S.Vigneswari Arunkumar, B.Tech., for providing the needed facilities.
It is with deep sense of gratitude that we wish to express our heart thanks to
our beloved Principal Dr. J.S.Senthil Kumaar, M.E., Ph.D., for his unbound
dynamism.
We pour our profound gratitude to respected Head of the Department,
Dr.K.Valarmathi, M.Tech., Ph.D., Department of Electronics and communication
Engineering for providing ample facilities made available to undergo the project
successfully.
We thank our Supervisor Dr.P.Ranjith kumar, M.E., Ph.D., Professor,
Department of Electronics and communication engineering for his excellent
guidance patiently throughout our project work.
We wish to express our sincere thanks to our Project Coordinators,
Dr.J.Sivadasan, M.E., Ph.D., ASP/ECE & Mr.R.Hariharan, M.E., AP/ECE.,
for having helped us with excellent suggestion and hints, which facilitated our task
very much.
We also bound to thank the other Teaching and Non-Teaching
members of the department and also convey our special thanks to family
memebers, whose support and cooperation also contributed much to complete
our work.

1
ABSTRACT

Nowadays, Register Marriage are done and noted by book or diary. Incase
the book or diary is destroyed by any natural disater.there is an easy way for
marriage cheater like second marriage.To reduce this cheating method,the
register marriage is done and noted by online registration.By this technique ,it
can easily found out the marriage cheater.In this work,by creating an mobile
application and register in it. The form may contain the entire details of newly
married people and it ask to fill the name, age, date of married, address, aadhar
number, Pincode, native, gender, etc. Once the following detail may given to the
application it may stored in the data base in cloud platform using the cloud
services.The data of the marriagers may highly secured with the help of cloud
server.The marriagers can only know the details through out authentication
server and register platform.Once the data has been submitted in cloud
storage,the detail of the person is same as twice it may alert the opposite gender
to notice the user is register a marriage register form. The alert is the important
notice system which may occur in through out SMS message system alert pop up
notification. By this Integration ,the marriage cheater may reduce slowly.

2
TABLE OF CONTENTS

Chapter No. Contents Page No.

ABSTRACT

LIST OF TABLES 03

LIST OF FIGURES 04

LIST OF ABBREVATIONS 05

1 INTRODUCTION 06

2 LITERATURE REVIEW 10

3 INTEGRATION OF MARRIAGE HALLS 13


AND WORKSHIP USING CLOUD
COMPUTING
3.1 Halls and workship 13
3.2 Existing Methology 20
3.3 Proposed Application 20
3.4 System Module 21
3.5 Modules Description 21
4 HARDWARE & SOFTWARE 23
SPECIFICATION
4.1 Hardware Specification 23
4.2 Software Specification 23
4.3 About The Software 23

3
5 RESULT & DISCUSSION 30
5.1 Testing 30
5.2 Unit Testing 30
5.3 Integrating Testing 31
5.4 Validation & Function Testing 31
6 OUTPUT 32
7 CONCLUSION 35
7.1 Reference 36

LIST OF TABLES

4
S.NO TOPIC PAGE NO

1. Website 19
2. Details 19
3. Form Fill 19
4. Register 20

5
TABLE OF FIGURES

FIGURE NO. FIGURE DESCRIPTION PAGENO.

1. Register Marriage 15

2. Temple Marriage 16
3. Temple Marriage & Register
Marriage Analyzis 18
4. Uses of Javascript 27
5. MYSQl Data base 30

6. Workflow Diagram 33

6
LIST OF ABBREVIATIONS

ADB: Android Debug Bridge.


IDE: Integrated Development Environment.
SDK: Software Development Kit.
XML: Extensible Markup Language.
API: Application Programming Interface.
UI: User Interface.
JNI: Java Native Interface.
AVD: Android Virtual Device.
DDMS: Dalvik Debug Monitor Server.

7
CHAPTER 1
INTRODUCTION

Nowadays, register marriage are done and


noted by book or diary. Incase, the book or diary is destroyed by any natural
disaster, there is an easy way for marriage cheater. By mobile application
registration method, it can easily found out the marriage cheaters also it have
many benefits marriages can register their marriage from the comfort of their
home, eliminating the need to visit government offices. It saves time by
bypassing long queues and bureaucratic processes typically associated with
traditional registration method. There is a cost saving associated with app based
registration as it eliminates the need for travel expenses and reduce paperwork
marriage certificates and documents are stored digitally making them easy to
access and share whenever needed. The security of the marriages also be
protect by cloud server.

Once the data has been submitted in cloud


storage, the detail of the person is same as twice it may alert the opposite gender
to notice the user is register a marriage register form. The alert is the important
notice system which may occur in through out SMS message system alert pop
up notification. By this Integration ,the marriage cheater may reduce slowly. It
have a advantage to find a marriage cheater also, in same way with all these
benefits. Disadvantages of the app is not everyone may have access to
smartphones or the internet, particularly in rural or underserved areas, which
could exclude certain couples from utilizing app based registration systems. The
mobile application may create for user convenient free and new user should log
in easily. The mobile application can run properly.

8
Overall, Benefits of app register is more
sufficient than disadvantages. So registering a marriage through an app registry
offers a modern, efficient, and user friendly alternative to traditional methods.
The Puranic Period and Early Medieval period gave rise to new configurations
of Hinduism, especially bhakti and Shaivism, Shaktism, Vaishnavism, Smarta,
and smaller groups like the conservative Shrauta. The early Islamic period also
gave rise to new movements. Indian religions, sometimes also termed Dharmic
religions or Indic religions, are the religions that originated in the Indian
subcontinent.
Religion include Buddhism, Hinduism, Jainism,
and Sikhism, are also classified as Eastern religions. Although Indian religions
are connected through the, they constitute a wide range of religious
communities, and are not confined to the Indian subcontinent. The documented
history of Indian religions begins with the historical Vedic religion, the religious
practices of the early Indo-Iranians, which were collected and later redacted into
the Vedas, as well as the Agamas of Dravidian origin.

The period of the composition, redaction, and


commentary of these texts is known as the Vedic period, which lasted from
roughly. The philosophical portions of the Vedas were summarized
in Upanishads, which are commonly referred to as Vedanta, variously
interpreted to mean either the "last chapters, parts of the Veda" or "the object,
the highest purpose of the Veda". The early Upanishads all predate the Common
Era, five of the eleven principal Upanishads were composed in all likelihood
before 6th century BCE, and contain the earliest mentions of Yoga and Moksha.
The ramaṇa period between 200 BCE marks a "turning point between the Vedic
Hinduism and Puranic Hinduism".

9
The Shramana movement, an ancient Indian
religious movement parallel to but separate from Vedic tradition, often defied
many of the Vedic and Upanishadic concepts of soul (Atman) and the ultimate
reality (Brahman). In 6th century BCE, the Shramnic movement matured
into Jainism and Buddhism and was responsible for the schism of Indian
religions into two main philosophical branches of astika, which venerates Veda
(e.g., six orthodox schools of Hinduism) and nastika (e.g., Buddhism, Jainism,
Charvaka, etc.). However, both branches shared the related concepts
of Yoga, saṃsāra (the cycle of birth and death) and moksha (liberation from that
cycle).

The puristic artist EarlyMedieval


configurations
Hinduism,especially bhakti and Shaivism, Shaktism, Vaishnavism, Smarta, and
smaller groups like the conservative Shrauta. The early Islamic period also gave
rise to new movements.

Sikhism was founded in the 15th century on


the teachings of Guru Nanak and the nine successive Sikh Gurus in Northern
India. The vast majority of its adherents originate in the Punjab region. During
the period of British rule in India, a reinterpretation and synthesis of
Hinduism arose, which aided the Indian independence movement. While there
are many festival-related rituals in Hinduism, vivaah (wedding) is the most
extensive personal ritual a Hindu undertakes in his or her life. Typical Hindu
families spend significant effort and financial resources to prepare and celebrate
weddings. The rituals and process of a Hindu wedding vary depending on
region of India, local adaptations, resources of the family and preferences of the
bride and the groom. Nevertheless, there are a few key rituals common in Hindu
weddings – Kanyadaan, Panigrahana, and Saptapadi; these are respectively,

10
giving away of daughter by the father, voluntarily holding hand near the fire to
signify impending union, and taking seven steps before fire with each step
including a set of mutual vows.

After the seventh step and vows of Saptapadi,


the couple is legally husband and wife. Jain and Buddhist weddings in India,
share many themes, but are centered around their respective religious ideas and
texts. Indian Sikh marriages are through a ceremony called Anand Karaj. The
couple walk around the holy book, the Guru Granth Sahib four times, and then
do an Ardaas, a traditional Sikh prayer. Indian Muslims celebrate a
traditional Islamic wedding, with rituals including Nikah, payment of financial
dower called Mahr by the groom to the bride, signing of marriage contract, and
a reception.

Indian Christian weddings


following traditional Christian marriage customs. Among Protestants in India,
the betrothal rite celebrates the engagement of a couple, with prayers being
offered for the couple and engagement rings being blessed by a pastor. A day
before the wedding, the Haldi/ Ubtan/ Mayun ceremony (as it is known in
northern India) or the Roce ceremony (as it is known in Goa and Mangalore in
India) is held, in which "haldi or turmeric paste is applied on North Indian
Christians and coconut paste is applied on South Indian Christians." After some
time, Indian Christians are married, during which, the couple meet in the
presence of a minister, often in a church or place of worship. Readings from the
Bible take place.

The bride and groom take their marriage vows.


The bride and groom often exchange rings symbolizing their endless love.
Weddings are a major business in India. According to a report by KPMG in
2017, the Indian wedding industry is estimated to be around $40–50 billion. It is
the second largest wedding market after the United States, which is at $70
11
billion. While the industry is very unorganized with small and medium scale
businesses, there are also corporate entities who are trying to tap this industry.

CHAPTER 2

LITERTURE REVIEW

Shagufta Praveen et. Al(2017) proposed a novel “Evolution


of data base in cloud system”. The meaningful data becomes an information is
the foremost line that people often start their studies with. A data should be
stored properly so that it could become information for the reader and for
whoever accessing it. Finally a system came into existence which gathers all
important fact and figure.(Sequential File system,Random access file system)
Later data processing moved to information processing, and finally came up
with demand of MIS (Management Information system).
Babak Bashari Rad et. Al(2017) proposed a “Data base in
cloud system” The cloud holds the information on distinctive server farms
situated in diverse areas. This makes the cloud database structure not the same
as the objective database administration framework. Over a cloud database,
there are numerous hubs, intended for question administrations, for server farms
that are also corporate farms and are situated in distinctive land areas. This
connection is required for the convenient and full access to the database on the
cloud administrations.
Abraham Ekow Dadzie et. al (2019) utilized “Data Security in
cloud computing” Cloud Computing is now a worldwide concept which is being
utilized by majority of internet users. The number of institutions, companies and
other personal users relying on the resources provided by the cloud and as well
storing the critical information in the cloud has increased drastically over the
years due to the simplistic and attractive features it possesses. In spite of its
utilization, there are also a number of hindrances with regards to the protection

12
of data which is being stored to the cloud.

Prat Rajini Jindal.et.al (2020) utilized “Blockchain Technology


for Cloud Storage” The demand for Blockchain innovation and the significance
of its application has inspired ever-progressing exploration in various scientific
and practical areas. Even though it is still in the initial testing stage, the
blockchain is being viewed as a progressive solution to address present-day
technology concerns, such as decentralization, identity, trust, character,
ownership of data, and information-driven choices.
Basel Katt et.al (2022) proposed a “System security” assurance
provides the confidence that security features, practices, procedures, and
architecture of software systems mediate and enforce the security policy and are
resilient against security failure and attacks. Alongside the significant benefits
of security assurance, the evolution of new information and communication
technology (ICT) introduces new challenges regarding information protection.
Security assurance methods based on the traditional tools, techniques, and
procedures may fail to account new challenges due to poor requirement
specifications, static nature, and poor development processes.
Maharsh Patel et. Al(2019) utilized a "Automated Email Response
Bot Using Machine Learning".One of the most ubiquitous and widely used
modes of communication in professional as well as personal aspects is Email. It
is always exciting when one seeks someone or some enterprise out via email
and they respond instantly in no time. In today’s society, especially as
technology grows, people are looking for immediate response and satisfaction.
Not only does it provide with a boost in efficiency but also it can be a great.

Chunnu Khawas et.al(2021) created a


“Application of Firebase in website App Development” The web application
has become more and more reliant upon large amount of database and

13
unorganized data such a videos, images, audio, text, files and other arbitrary
types. It is difficult for Relational Database Management System (RDBMS)
to handle the unstructured data. Firebase is a relatively new technology
for handling large amount of unstructured data. It is very fast as compared to
RDBMS. This paper focuses on the application of Firebase with Android and
aims at familiarizing its concepts, related terminologies, advantages and
limitations.
Vahid ghrosi et.al(2021) proposed a “web application testing”
He had a significant impact on all aspects of our society. As our society relies
more and more on the Web, the dependability of web applications has become
increasingly important. To make these applications more dependable, for the
past decade researchers have proposed various techniques for testing web-based
software applications.

14
CHAPTER 3

INTEGRATION OF MARRIAGE HALLS AND WORKSHIP


USING CLOUD COMPUTING
3.1 HALLS AND WORKSHIP

Nowadays, Register Marriage are done and noted by book or diary.


Incase the book or diary is destroyed by any natural disaster there is an easy
way for marriage cheater like second marriage. To reduce this cheating method
the register marriage is done and noted by online registration. By this
technique ,it can easily found out the marriage cheater. In this work, by creating
an mobile application and register in it. The form may contain the entire details
of newly married people and it ask to fill the name, age, date of married,
address, aadhar number, Pincode, native, gender, etc. Once the following detail
may given to the application it may stored in the data base in cloud platform
using the cloud services. The data of the marriagers may highly secured with the
help of cloud server. The marriagers can only know the details through out
authentication server and register platform. Once the data has been submitted in
cloud storage, the detail of the person is same as twice it may alert the opposite
gender to notice the user is register a marriage register form. The alert is the
important notice system which may occur in through out SMS message system
alert pop up notification. By this Integration ,the marriage cheater may reduce
slowly. We have to take a survey of the internet society the marriage register
portal has been filled due to integration of the marriage system but when the any
cause of an internal manufactured occur of any red fall and loss of any flood
disaster the main propose of the register information may have been submitted

15
due to inconvient of the literature survey the report may be disaster after the
emergency survey of the users should have been recorded so we should have to
developed the data base of marriage register platform. We may create a double
domain platform of the two security of the users may been inconvient of the
user may register or user may been defused the cloud platform should be in and
the system specification.
REGISTER MARRIAGE

Register Marriage
73
72
71
70
PERCENTAGE

69 Register Marriage
68 Linear (Register Marriage)
67
66
65
64
2020 2021 2022 2023
YEAR

FIGURE NO : 1

Marriage, also know matrimony or wedlock, is a culturally and


often legally recognised union between people called spouses. It establishes
rights and obligations between them, as well as between them and
their children (if any), and between them and their in laws . It is nearly
a cultural universal, but the definition of marriage varies
between cultures and religions, and over time. Typically, it is an institution in
which interpersonal relationships, usually sexual, are acknowledged or
sanctioned. In some cultures, marriage is recommended or considered to be A
marriage ceremony is called a wedding, while a private marriage is sometimes

16
called an elopement.
Around the world, there has been a general trend towards
ensuring equal rights for women ending discrimination and harassment against
couples who are interethnic, interracial, interfaith, interdenominational, inter-
caste, transnational, and same-sex as well as immigrant couples, couples with an
immigrant spouse, and other minority couples. Debates persist regarding the
legal status of married women, leniency towards violence within marriage,
customs such as dowry and bride price, marriageable age, and criminalization of
premarital and extramarital sex. Individuals may marry for several reasons,
including legal, social, libidinal, emotional, financial, spiritual, cultural, econom
ic, political, religious, and sexual purposes. In some areas of the world, arranged
marriage, forced marriage, polygamy marriage, polyandry marriage, polygyny
marriage, group marriage, coverture marriage, child marriage, cousin
marriage, sibling marriage, teenage marriage, avunculate marriage,
and incestuous marriage are practiced and legally permissible, while others
areas outlaw them to protect human rights. Female age at marriage has proven
to be a strong indicator for female autonomy and is continuously used
by economic history research.

TEMPLE MARRIAGE

17
Temple Marriage
80
70
60
50
PERCENTAGE

Temple Marriage
40
Linear (Temple Marriage)
30
20
10
0
2020 2021 2022 2023
YEAR

FIGURE NO : 2

Indian religions, sometimes also termed Dharmic religions or Indic


religions, are the religions that originated in the Indian subcontinent. These
religions, which include Buddhism, Hinduism, Jainism, and Sikhism, are also
classified as Eastern religions. Although Indian religions are connected through
the history of India, they constitute a wide range of religious communities, and
are not confined to the Indian subcontinent.

Evidence attesting to prehistoric religion in the Indian subcontinent


derives from scattered Mesolithic rock paintings. The Harappan people of
the Indus Valley civilisation, which lasted from 3300 to 1300 BCE (mature
period 2600–1900 BCE), had an early urbanized culture which predates the
Vedic religion. The documented history of Indian religions begins with
the historical Vedic religion, the religious practices of the early Indo-Iranians,
which were collected and later redacted into the Vedas, as well as

18
the Agamas of Dravidian origin. The period of the composition, redaction, and
commentary of these texts is known as the Vedic period, which lasted from
roughly 1700 BCE.
The philosophical portions of the Vedas were summarized
in Upanishads, which are commonly referred to as Vedanta, variously
interpreted to mean either the "last chapters, parts of the Veda" or "the object,
the highest purpose of the Veda". The early Upanishads all predate the Common
Era, five of the eleven principal Upanishads were composed in all likelihood
before 6th century BCE, and contain the earliest mentions of Yoga and Moksha.

REGISTER MARRIAGE & TEMPLE MARRIAGE ANALYZIS

80

70

60

50
Percentage

40 Register Marrage
Temple Marrage
30 Linear (Temple Marrage)
Illegal Marrage
20

10

0
2020 2021 2022 2023
Years

19
FIGURE NO : 3

3.2 DATABASE DESCRIPTION (WEBSITE)

A collected information which is in an organized form for easier


access, management, and various updating is known as a database. Data
can be defined as a collection of facts and records on which we can apply
reasoning or can-do discussion or some calculation.

Containers having a huge amount of data are known as databases.


Databases are computer structures that save, organize, protect, and deliver
data.

Table No: 1 Name : website

Field Name Data Type


id int(11)
user_id int(11)
form_id int(11)
form int(11)

Table No:2 Name : Detail

Field Name Data Type


id int(11)
Name varchar(100)
cat_slug varchar(150)

Table No:3 Name : Formfill

20
Field Name Data Type
id int(11)
register_id int(11)
admin_id int(11)
Database form int(11)

Table No: 4 Name : Register

Field Name Data Type


id int(11)
adminbase_id int(11)
user_id varchar(50)
registerid_date date

3.3 EXISTING METHOLOGY


The existing Handwritten should be very complicated and it discourage it
any inconvinent accident so we should describe the application to register
their marriage form and it may be in the database of government
registeration we could create and if there the any gender create a second
marriage of illegal it should be describe the opposite gender notification.
Maintaining the inventory details

Generating the marriage report

Handling the details of the user

Also, there is a high chance of data loss in manual maintenance.


Searching the particular form is complex because all the records are
maintained in a database.

21
3.3 PROPOSED APPLICATION

The main purpose of the marriage registery website is to avoid the illegal
marriage cheater by using “MARRIAGE REGISTERY”

The proposed is to overcome the problems of an existing system. In this


proposed system following features are implemented,

 User authentication mechanisms to ensure data security.

 Inventory details are maintained in database for easy access.

 The form should be encrypted and does not been decrypted


then maintained.

 Friendly user interface is designed to maintain the overall


activities

3.4 System Modules


Admin
 Login
 Add Marriage Details
 Check the detail is correct or not
 Update the given details
 Log out
User
 Register
 Login
 Search their marriage details and document – Locality,
Category
 View their marriage details
 Submit
 View their details

22
3.5 MODULES DESCRIPTION
Admin
 Login
In Login module the admin can login to the application with the
master login details.Admin can maintain the all user details.
 Form
Admin can add the New Marriage details form and Stored it in the
database of data server.

 Check Their Form


Once the form is filled and check the both gender.
 Update Status
Admin can update the status when the Form.

 Register
Another main function of our proposed system is
registration, in order to register with the unique application details
such as name,phone number,password.
 Login
The main activities in the application are the user login page
for user. The other modules are followed by this login page. This
module records only phone number and password of the user.
 Search their marriage details
User will search the marriage details anywhere on the earth.
 View details
Once the marriage form is register throught it should not be
edited throught the users only the admin can change and edit the
form.

23
 Logout
User can logout their accounts using logout option.

CHAPTER 4
HARDWARE AND SOFTWARE SPECIFICATION
4.1 HARDWARE SPECIFICATION

RAM : 8 GB RAM
Hardware Disk : 128 GB
Monitor : 15”monitor
Keyboard : Standard Keyboard with 101
Processor : Dual Core Processor

4.2 SOFTWARE SPECIFICATION

Operating System : Windows 10


Front end : HTML, CSS, Javascript, PHP
Back end : MySQL

4.3 ABOUT THE SOFTWARE


HTML

24
HTML stands for Hyper Text Markup Language. It is used to
design web pages usingthe markup language. HTML is the combination
of Hypertext and Markup language. Hypertext defines the link between
the web pages and markup language defines the text document within the
tag that define the structure of web pages.

HTML elements are the building blocks of HTML pages. With


HTML constructs, images and other objects such as interactive forms
may be embedded into the rendered page. HTML provides a means to
create structured documents by denoting structural semantics for text
such as headings, paragraphs, lists, links, quotes, and other items.

HISTORY OF HTML

The first version of HTML was written by Tim Berners-Lee in


1993. Since then, there have been many different versions of HTML. The
most widely used version throughout the 2000's was HTML 4.01, which
became an official standard in December 1999. Another version,
XHTML, was a rewrite of HTML as an XML language.

KEY FEATURES

 Consists of a hierarchical structure with tags like <html>,


<head>, <body>, etc.
 Supports multimedia elements such as images and videos.

ADVANTAGES OF HTML

 HTML is Browser friendly


 Allowed to utilize
 Lightweight and quick
25
 Information stockpiling
 Utilization of formats

CSS

Cascading Style Sheets, fondly referred to as CSS, is a simply


designed language intended to simplify the process of making web pages
presentable. CSS allows you to apply styles to web pages. More
importantly, CSS enables you to do this independent of the HTML that
makes up each web page. It describes how a webpage should look: it
prescribes colors, fonts, spacing, and much more. In short, you can make
your website look however you want.

The best thing about CSS is its capability of introducing uniform


changes on all the pages of a website. Developers work to define a style
in a cascading style sheet, and they can use it throughout several pages by
just referencing that particular CSS file. Hence, the amount of styling
work is saved, and repetition is eliminated.

HISTORY OF CSS

CSS was first proposed by Hakon Wium Lie on October 10,


1994. At the time, Lie was working with Tim Berners-Lee (father of
Html) at CERN. The European Organization for Nuclear Research is
known as CERN. Hakon wium lie is know as father of a CSS. CSS was
proposed in 1994 as a web styling language, to solve some of the
problems of Html.

KEY FEATURES

 Selectors are used to target HTML elements for styling.


 Supports various layout techniques, including flexbox and grid.
 Enables the creation of responsive designs for different devices.

26
ADVANTAGES OF CSS

 Easier to Maintain
 Consistent Design
 Time-Saving
 Better Device Compatibility

JAVASCRIPT
JavaScript (js) is a light-weight object-oriented programming
language which is used by several websites for scripting the web pages. It
is an interpreted, full-fledged programming language that enables
dynamic interactivity on websites when applied to an HTML document.

Since then, it has been adopted by all other graphical web


browsers. With JavaScript, users can build modern web applications to
interact directly without reloading the page every time. The traditional
website uses js to provide several forms of interactivity and simplicity .

FIGURE NO : 4
HISTORY OF JAVASCRIPT

27
JavaScript was invented by Brendan Eich in 1995. It was
developed for Netscape 2, and became the ECMA-262 standard in 1997.
After Netscape handed JavaScript.

ECMA, the Mozilla foundation continued to develop JavaScript


for the Firefox browser. Mozilla's latest version was 1.8.

ADVANTAGES OF JAVASCRIPT

 Interoperability
 Server Load
 Extended Functionality
 Versatility

DISADVANTAGES OF JAVASCRIPT

 Client-side Security.
 Lack of Debugging Facility.
 Single Inheritance.

PHP
PHP is an HTML-embedded, server-side scripting language
designed for web development. It is also used as a general purpose
programming language. It was created by Rasmus Lerdorf in 1994 and
appeared in the market in 1995. Much of its syntax is borrowed from C,
C++, and Java.

PHP codes are simply mixed with HTML codes and can be used in
combination with various web frameworks. Its scripts are executed on the
server. PHP code is processed by a PHP interpreter. The main goal of
PHP is to allow web developer to create dynamically generated pages
quickly.

28
A PHP file consists of texts, HTML tags and scripts with a file
extension of .php, php3, or .phtml. You can create a login page, design a
form, create forums, dynamic and static websites and many more with
PHP.

KEY FEATURES OF PHP

 PHP is a server-side scripting language like ASP.


 PHP supports various databases like MySQL, Oracle, Sybase,
Solid, PostgreSQL, Informix etc
 PHP is an open source software and it is free to download and use.
 Easily integrates with databases, making it suitable for building
dynamic websites.
 Enables the creation of dynamic web pages, forms, and handling of
user input.

MySQL
MySQL is an open source relational database management system
that was originally released in 1995. MySQL is popular among all
databases, and is ranked as the 2nd most popular database, only slightly
trailing Oracle Database. Among open source databases, MySQL is the
most popular database in use today.

WORKING WITH MySQL

A table is a primary database object of SQL that is used to store


data. Each table consists of rows and columns to store data.

The Information which is stored in the database can be operated through


the following commands.

 DDL - Create, Alter, Drop


 DML - Insert, Delete, Update, Select

29
 DTL - Grant, Revoke
 TCL - Commit, Rollback, Save point

The data in the database is retrieved or manipulated using a query.


The query is defined by the programmer. Each query has its own
functionality. When these queries are executed they return the required
output data from the database.

FEATURES OF MySQL

 MySQL is considered one of the very fast database languages,


backed by a large number of the benchmark test.
 MySQL supports multi-threading that makes it easily scalable. It
can handle almost any amount of data, up to as much as 50 million
rows or more.
 MySQL supports a large number of embedded applications, which
makes MySQL very flexible.

Register Book
Workship
Marriage
Authorized
Marriage Registry Register Signature
Application
Marriage Halls Register Book

30
FIGURE NO : 5

CHAPTER 5
RESULT & DISCUSSION
5.1 TESTING

System Testing is a level of testing that validates the complete


and fully integrated software product. The purpose of a system test is to
evaluate the end-to-end system specifications. Usually, the software is
only one element of a larger computer-based system. Ultimately, the
software is interfaced with other software/hardware systems. System
Testing is defined as a series of different tests whose sole purpose is to
exercise the full computer- based system.

As a rule, System testing takes, as its input, all of the


“integrated” software components that have passed integration testing and
also the software system itself integrated with any applicable hardware
systems. In this project, Test plan has been created and bugs has been
cleared. Smoke testing has been completed and test cases and test data
has been approved.

5.2 UNIT TESTING

Unit testing is a type of software testing that focuses on


individual units or components of a software system. The purpose of unit

31
testing is to validate that each unit of the software works as intended and
meets the requirements. Unit testing is typically performed by developers,
and it is performed early in the development process before the code is
Integrated and tested as a whole system.

In this project, Unit tests are automated and are run each time
the code is changed to ensure that new code does not break existing
functionality. Unit tests are designed to validate the smallest possible unit
of code.

5.3 INTEGRATION TESTING

Integration testing is the second level of the software testing


process comes after unit testing. In this testing, units or individual
components of the software are tested in a group. The focus of the
integration testing level is to expose defects at the time of interaction
between integrated components or units.

5.4 VALIDATION AND FUNCTIONAL TESTING

Validation testing is testing where tester performed functional


and non- functional testing. Here functional testing includes Unit Testing
(UT), Integration Testing (IT) and System Testing (ST), and non-
functional testing includes User acceptance testing (UAT).

5.5 FLOWDIAGRRM OF WEBSITE TESTING

The existing method the new flowchart


could be given through the new user log in details and the validation
form of the every existing state Validation testing is testing where tester
performed functional and the only keywords must be user may be
register their website and the detail form through the only existing
methodology of the current cloud platform and the database state the

32
database could be given through the only admin page the current process
of the two register form should be given through the same IP address of
the user or detail of the main propose methodology should be given if
the declared and error correction of the admin verification details should
included the phase of admin database and given a data of the alert
system to the other option the same data base descripted then the
marriage cheater should clarify and aware of the only few know a be a
awareness to the serial marriage cheater.

Workflow Diagram

33
FIGURE NO : 6

CHAPTER 6
OUTPUT

OUTPUT

FIGURE NO 7 : ADMIN PAGE

34
FIGURE NO 8 : LOG IN PAGE

FIGURE NO 9 : BRIDE REGISTER FORM

35
FIGURE NO 10 :BRIDEGROOM FORM

FIGURE NO 11 : SUCCESFULL MESSAGE

36
FIGURE NO 12 : ADMIN PAGE MESSAGE

CHAPTER 7
CONCLUSION
The integration of marriage halls with cloud computing
technology for identifying serial marriage cheaters presents a promising
solution to address a significant societal issue. By leveraging cloud-based data
analytics and machine learning algorithms, marriage halls can enhance security
measures and protect individuals from potential fraud. The integration of
marriage halls with cloud computing technology offers a myriad of benefits,
including streamlined operations, enhanced customer experience, improved data
management and increased scalability. This innovative approach not only
streamlines the identification process but also fosters trust and transparency

37
within the marriage industry. However, it's crucial to ensure data privacy and
ethical considerations are prioritized throughout the implementation process.
With careful planning and collaboration, this integration has the potential to
revolutionize the way we approach marriage fraud detection and prevention. By
using this integration of marriage halls with cloud computing technology we
can reduce the time conception. Then we can identify the pre-registered
information and identify the status of already existing details from the database.

7.1 REFERENCES

1. Hwang ,G Fuses F. “Proof of violation for Trust and Accountability of


Cloud Database Systems,” 2016 IEEE/ACM International symposium on
clusters, cloud and Grid computing, Banglore india , pp 425-433,
doi:10.1109/CCGrid.2016.27.
2. Chao,Lee. “Cloud database development and management,” 2014 Boca
Raton, Taylor and Francis , pp 17-20 ,ISBN 978-1-4665-6506-7.
3. McHaney, Roger. “Cloud Technologies of an overview of cloud
computing technology for managers,” 2021 Hoboken, NJ, pp 37-40 ,
ISBN 978-1-119-76951-.4

38
4. Sakr,Sherif. “Cloud hosted databases and technologies, challenges and
opportunities,” 2014 World Conference on Computer Engineering and
Intelligent Manufacturing, pp 487-502, doi:10.1007/s10586-013-0290-7
5. Modi, A “Live migration of virtual machines with their local persistent
storage in a data intensive cloud,” 2017 International Journal of high
performance computing and networking, pp 1-134,
doi:10.1504/IJHPCN.2017.083213
6. S.Cass. “Designing for the Cloud,” 2009 MIT Technology Review, pp
10-14, doi:10.1109/CMAME.2018.8592233.
7. Bellare,Mihir; and Rogaway, phillip. “Introduction to modern
cryptography,” 2005 International Conference on computer, Automative
and material engineering, pp 10-22 , doi:10.1109/CCIE.2010.12.
8. Abraham Ekow Dadzie, “Data security in cloud computing,” 2019 IEEE
Central and Panama student conference, pp 14-35.

39

You might also like