Input and exit control portal software (security)

General introduction

The security system is one of the integrated university intelligent software subsystems that is designed for use in the university and recording student violations, and with its facilities, it can identify all violations related to students in the university. Among the features of the security system is the possibility of carrying a card reader to record violations by security colleagues. The security system can communicate with Sida and Morvarid software and can activate or deactivate students' profiles based on this information. One of the prominent features of the security system is the classification of violations. The security system can also archive the results of student violations in the system. Sorting, grouping and also scoring violations are prominent features of the security system and other features of this system are obtaining various reports from the system based on violations and recording events. This system is connected to the dormitory entry and exit system

Features and tools of the software
  • Receive information from the educational system

  • Ability to define types of violations

  • Ability to record student events and violations

  • Obtaining various reports

  • Can be used in the dormitory

  • Possibility of monitoring

  • Can be used with portable card readers & amp; nbsp;

Software reporting features:
  • Send information to formats such as (Excel, Word, XML, PDF) in order to analyze user data

  • Browse information entered at all levels in a simple and analytical manner

  • Simple and analytical reports in the form of comprehensive reports

  • Preparation of common reports in technical systems as standard

  • Submitting a report of small items based on the needs and requests of the employer

  • Design (localization) of conventional reports with the announcement and needs of the employer & amp; nbsp;

Technical specifications and software design tools:
  • Database used: 2017 SQL server

  • Technologies used: .NET, JAVA SCRIPT, MVC

  • How to communicate with the database: ADO.NET

  • Standards observed in the design process

  • Communication layer: SHTTP –HTTP - TCP / IP Middle layer: JSP - ASP - PHI - SSI - CGI .NET User interface layer: XML –DHTML –VB SCRIPT - JAVA - CSSXSL –DTD

  • Operating system and servers: XP, WINDOWS2000, WINDOWS2003, WINDOWS2008, WINDOWS2012

  • Software development methodology: RUP

Software security:

& amp; nbsp; Regarding security, the latest technology in the production of web-based software, which is controlled by .NET and depending on the type of parts with several levels, will try to close all security holes.

  • Logging operations in the system

  • Possibility of licensing different parts of the system

  • Ability to define work processes

some of the customers :
  • Mapna Company

  • Atomic Energy Organization of Iran & amp; nbsp;

  • East Azerbaijan Province Telecommunication Company

  • Fatehan Asr Tadbir Investment Company