ecop doc

Embed Size (px)

Citation preview

  • 8/2/2019 ecop doc

    1/71

  • 8/2/2019 ecop doc

    2/71

    2

    ONLINE CRIME REPORTING

    1.3 Project purpose

    Usually the citizen has to go to police station to make a complaint. Here we have given an

    opportunity to make a complaint through online and the actors will be taken by the police

    officers immediately. The communication for officers will be easy. The license can be get easily

    through online if it is selected by the officers via sms and mail.

    The main purpose behind the Online crime reporting system was to improve the

    effectiveness of policy performance; to improve the efficiency of police procedures; for

    example, by eliminating redundant processes in the registration of criminal cases; and to

    improve the quality of management information provided for senior policy decision-making,

    particularly through integration of previously separate information systems.

    Within the focus on effectiveness, there was a concern about the non-transparent, even

    dishonest nature of police work, which had become synonymous with corruption and delay. The

    intention was that the new system - through its automation of previously human processes and

    through its state-wide and online accessibility - would make the registration, processing and

    follow-up of criminal cases more open. Under the existing regime, many police require a bribe

    before they are willing to register a case, and also require a bribe to be paid before they answer

    any query about the case, such as its progress, or other information held on file.

    It was partly this poor image of police functioning, that led the Chief Minister of the

    State to impose the system on the police service. There were also drivers from the failure of

    police to properly prosecute some high-profile criminal cases that had political overtones;

    something which was politically-damaging and seen as requiring an equally high-profile

    reaction.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    3/71

    3

    ONLINE CRIME REPORTING

    1.4 Objectives

    Generally many crimes seen by the public will not reach to the police due to many reasons like

    fear, Lack of time, Ignorance. Due to this reason many cases are not even reaching the police

    station. Though some cases are registered they are not investigated properly due to lack of

    evidences and Cooperation of the public. This software helps the public to report about the

    crimes to the police without any fear in correct time. This is helpful to police in solving the

    cases .This is also helpful for higher authorities of police to have an overview about the progress

    of the investigation.

    ECOPS is an online reporting service to which the internet user can report crimes

    committed on or through the Internet. The impact of IT and communications is traversing at afast pace. As information for the department is crucial, an enterprise IT tool for enhancing the

    performance of the police officials became necessary called ONLINE CRIME REPORTING or

    E-Computerized Operations for Police Services, the main purpose is to maintain information,

    monitor and enhance the performance of the department.

    The focus of ONLINE CRIME REPORTING is to computerize the activities of

    controlling crime, administration and support services across the state in an integrated fashion

    so as to enable the division heads and senior officers to obtain the relevant information. Besides,

    it is also envisaged to reduce dependence on paper and help in automatic maintenance of

    registers and generation of reports, data analysis, better planning and coordination, speedy

    detection of crimes and monitoring the prosecutions.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    4/71

    4

    ONLINE CRIME REPORTING

    2. SYSTEM ANALYSIS

    2.1 Existing system

    The normal public in India is afraid to give a complaint in police station because they

    are filled with a false fear about the police department. An online complaint registration system

    will solve the fear of the public and will also help to police dept in catching criminals. It will

    improve the service, so you dont have to wait on hold on the telephone or go down to the

    station to file a report.

    2.2 Drawbacks of existing system

    Existing system is time consuming

    Corrections & maintenance should be done manually

    It needs more man power

    There may be mistakes while maintaining data manually.

    2.3 Proposed system

    An online solution is very useful as the solution is inherently distributive. This distributive

    characteristic of the online solution helps in getting the different police stations to share

    information & get in contact with one another.

    The reports filled online are checked at the administrative department to use if any

    information is lacking or to check the status of the report.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    5/71

  • 8/2/2019 ecop doc

    6/71

    6

    ONLINE CRIME REPORTING

    Administrator:

    This module is accessible to some VIPs like SP, DCP, and DIG etc. By using

    this module they can give any caution to the police department. Also they can perform

    updations to the crime report database.

    3. REQUIREMENT SPECIFICATION

    3.1 Requirement study and analysis

    Generally many crimes seen by the public will not reach to the police due to many reasons like

    fear, Lack of time, Ignorance. Due to this reason many cases are not even reaching the police

    station. Though some cases are registered they are not investigated properly due to lack of

    evidences and Cooperation of the public. This software helps the public to report about the

    crimes to the police without any fear in correct time. This is helpful to police in solving the

    cases .This is also helpful for higher authorities of police to have an overview about the progress

    of the investigation. An online solution is very useful as the solution is inherently distributive.

    This distributive characteristic of the online solution helps in getting the different police stations

    to share information and get in contact with one another.

    With ECOPS, the exchange of information within police stations and other senior police

    officers in the departments is faster. It also streamlines the workflow in police department

    machinery. A central database permits the police units to operate more efficiently leading to

    speedy detection of crime and prosecution monitoring. The senior police officers of the state can

    access the reports, which allow them to take quick and timely decisions. Crime analysis reports

    will enable the senior police officers to observe the crime trends and to guide the investigating

    officers. The technological benefits of ECOPS are to maintain information, monitor and

    enhance the performance of the department, to take a critical look at the existing system,

    processes and procedures of the department so as to identify and remove the redundancy.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    7/71

    7

    ONLINE CRIME REPORTING

    ECOPS is envisaged to reduce the fair amount of paper work and helps in the automatic

    maintenance of registers and generation of reports, data analysis, better planning and

    coordination, timely decision and speedy detection of crime and prosecution monitoring. All

    these factors have contributed to a higher moral of the police officials at all the levels in police

    department. The case registered at one police station can be tracked at any police station.

    This reduces the discretionary dependence of police. Once the case is registered the

    investigation and follow up activities relating to the case cannot be delayed. The grievances

    handling is more efficient. Now, the citizens will have access to senior officers through the web.

    ECOPS introduced transparency and accountability in the whole system.

    The User Interface should be user friendly to the user who uses the home page by whichhe/she can easily register.

    The Operations should take place transparently.

    3.2 Software requirements

    Front End Tool: Java Server Pages, Java Script, and HTML

    Back End Tool: Oracle 9i

    Software Interfaces

    Operating System: Windows 2000

    Database : Oracle 9i

    Server : Tomcat 5.0

    Explorer : Microsoft Internet Explorer

    3.3 Hardware requirements

    Client

    Hardware Platform : P III or above with

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    8/71

    8

    ONLINE CRIME REPORTING

    RAM : 256MB or above.

    Hard Disk : 20GB or above of HD.

    Server

    Hardware Platform : P III or above with

    RAM : 256MB or above.

    Hard Disk : 20GB or above of HD.

    3.4 Block diagram

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    9/71

    9

    ONLINE CRIME REPORTING

    Figure 4.4.1: Block diagram of ECOP working

    3.5 Overall description

    The ONLINE CRIME REPORTING is an application which is providing the features of

    dynamic web application as well as that of the stand alone application on the administrator side.

    The application will be used across the state by the citizens, the law enforcement bodies, and

    private detective and cyber caf & hotel employees. It can be used to track the criminal, to

    gather the information about the crime or about criminal and missing person and to broadcast or

    communicate information ( of any criminal activity or other alert). The citizen can register the e

    complaint here which will ease out the process for the citizens and also for the police to

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    10/71

    COMPLAIN

    TS

    THIEVES

    POLICE

    ADMIN

    10

    ONLINE CRIME REPORTING

    maintain records as the status of the case can be viewed as well as can be updated. The data

    required to be available is the districts of the state along with areas enclosed by them.

    The web pages (XHTML/JSP) are present to provide the user interface on customer

    client side. Communication between customer and server is provided through HTTP/HTTPS

    protocols.

    The Client Software is to provide the user interface on system user client side and for

    this TCP/IP protocols are used.

    On the server side web server is for EJB and database server is for storing the

    information

    4. SYSTEM DESIGN AND DEVELOPMENT

    4.1 System design

    4.1.1 Data design

    It is an object or entity-relationship diagram that primarily documents the data elements (e.g.,

    classes, tables), their component data, and the relationships between them.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    11/71

    11

    ONLINE CRIME REPORTING

    4.1.2 Architectural design

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    12/71

    12

    ONLINE CRIME REPORTING

    4.1.3 Procedural design

    The procedural design describes structured programming concepts using graphical,

    tabular and textual notations. These design mediums enable the designer to represent procedural

    details that facilitates translation to code. This blueprint for implementation forms the basis for

    all subsequent software engineering work.

    4.1.3 Modular design

    User

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    13/71

    13

    ONLINE CRIME REPORTING

    Administrator

    Police Department

    User:

    User can send the complaints to police and they can view the complaint report. User can

    perform these tasks only when he logins to his account otherwise he has to register his new

    account. Police send the status report to the users based on their investigation. The user can

    check the status of their complaints with the help of complaint id given. The user can register

    his complaints to the police and view the thieves information.

    Administrator:

    Higher authorities like VIPS, CP, and DCP can view the complaints which are sent by

    the public. The administrator has to login with their account in order to perform his actions.

    They can send alert messages to the police department regarding any future complications. The

    administrator can also send cautions to the users. Unlike police who can view complaints

    specific to his area the administrator can view the complaints universally.

    Police Department:

    Basing on the complaints given by the public, police can view them and take appropriate

    action timely. The police has to login with their account to view the complaints and to send the

    status of the complaints to the users. They can update the status of the complaint basing on the

    progress of investigation. They will also receive alerts from the higher authorities regarding

    warnings and can take action in advance.

    4.2 Database design

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    14/71

    14

    ONLINE CRIME REPORTING

    TABLENAME: Complaints

    S.No Column Name Data type Description Remarks

    1 cid Number

    Complaint

    Identification

    Number

    Primary

    Key

    2 Loc Varchar2(20)

    Location of

    Crime

    3Description Varchar2(1000) Complaint

    4Crime type Varchar2(20) Type of Crime

    5Email Varchar2(30) Email ID of user

    6 Cdatedate Date of complaint

    When recorded

    TABLENAME: Thieves

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    15/71

    15

    ONLINE CRIME REPORTING

    S.No Column

    name

    Data type Description Remarks

    1 Tid Number Thief ID

    Primary

    Key

    2 Name Varchar2(20) Name of the criminal

    3 Alias name Varchar2(30) Other name of the criminal

    4 DOB date Age of the criminal

    5 Address Varchar2(40) Address of the criminal

    6 Reward Number Prize money announced by police on the

    criminal

    7 Status Varchar2(30)` Status of the criminal given by the police

    TABLENAME: Alert

    S.No Column name Data type Description Remarks

    1 Alert Varchar2(60) Alert message given

    By the Administrator

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    16/71

    16

    ONLINE CRIME REPORTING

    TABLENAME: Crimeimg

    S.No Column name Data type Description Remarks

    1 Tid Number Thief identification

    Number

    2 Path Varchar2(30) Path of the image where

    stored

    TABLENAME: Caution

    S.N

    o

    Column

    name

    Data

    type

    Description Remar

    ks

    1 cid Number Complaint Identification

    Number

    2 Admin

    Caution

    Varchar2(

    30)

    Caution given by the

    Administrator to the

    Given complaint

    TABLENAME: Login

    S.No Column name Data type Description Remarks

    1 Userid Number Administrator Identification

    Number

    Primary

    Key

    2 Pwd Varchar2(30) Password given to the

    Administrator

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    17/71

    17

    ONLINE CRIME REPORTING

    3 Pname Varchar2(30) Name given to the

    administrator

    TABLENAME: Plogin

    S.No Column name Data type Description Remarks

    1 Userid Number Police Identification

    Number

    Primary

    Key

    2 Pwd Varchar2(30) Password given to the Police

    3 Pname Varchar2(30) Name given to the police

    TABLENAME: Status

    S.No Column name Data type Description Remarks

    1 cid Number Complaint Identification

    Number

    2 Status Varchar2(20) Status of the complaint

    Given by the administrator

    TABLENAME: Crimedb

    S.No Column name Data type Description Remarks

    1

    Crime Type Varchar2(30) Type of crime

    2

    Suggestion Varchar2(300)

    Suggestion given to the

    Police dept for particular crime

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    18/71

    18

    ONLINE CRIME REPORTING

    4.3 Feasibility Analysis

    Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses of the

    existing business or proposed venture, opportunities and threats as presented by the

    environment, the resources required to carry through, and ultimately the prospects for success.

    In its simplest terms, the two criteria to judge feasibility are cost required and value to be

    attained. As such, a well-designed feasibility study should provide a historical background of

    the business or project, description of the product or service, accounting statements, details of

    the operations and management, marketing research and policies, financial data, legal

    requirements and tax obligations. Generally, feasibility studies precede technical developmentand project implementation.

    5. DATA FLOW DIAGRAMS

    5.1 Rules of data flow diagram

    Data flow diagram is a pictorial representation of the system in which flow of data from one

    process to another process is described. A Data Flow is composed of

    Data movement shown by arrows.

    Transformation or process of data shown by named circle or rounded rectangle.

    Sources and destination of data represented by named rectangles.

    Static storage or data at rest denoted by an open rectangle that is named.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    19/71POLICE

    USER ADMIN

    ONLINE

    CRIME

    REPORT

    19

    ONLINE CRIME REPORTING

    Data Flow Diagrams are of two types:

    Physical Data Flow Diagrams:

    These are implementation-dependent i.e., they show the actual devices, departments, people,

    etc., involved in the system.

    Logical Data Flow Diagrams:

    These diagrams describe the system independently of how it is actually implemented, they show

    what takes places, rather than how an activity is accomplished.

    The DFD is intended to represent information Flow but it is not a flow chart and is not

    intended decision-making, flow of control, loops and other procedural aspects of the system.

    DFD is a useful Graphical tool and is applied at the earlier stages of requirements analysis. It

    may be further refined at preliminary design stage and is used as mechanism for top-level

    structural design for software.

    The DFD drawn first at a preliminary level is further expanded into greater details:

    The context diagram is decomposed and represented with multiple rectangles.

    Each of these rectangles may be decomposed further and given as more detailed DFD.

    Explanation of DFD.

    Context diagram:

    Its a diagram, which shows whole system at once. The sources in context diagram for

    this system are USER, ADMINISTRATOR, POLICE and these are linked to the

    ONLNECRIMEREPORTING. The Context Diagram is shown in fig (6.1.1):

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    20/71

    20

    ONLINE CRIME REPORTING

    Fig 5.1.1. Context diagram

    5.2 Levels of data diagram

    Level -1 Diagram:

    User login process is the Level-1 DFD shown in Fig(6.2.1). Here user has to enter into the

    registering complaint area any one register the complaint so there is user id and password for it.

    After entering the complaint and pressing submit it will be send to the complaintdatabase. If his complaint has been successfully entered in to the database he is allotted with a

    self generated no which is used for the further purposes.

    The user can view the status of his compliant in the status menu by entering the self

    generated no given by the system.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    21/71

    21

    ONLINE CRIME REPORTING

    The user can also view the details of the thieves present in the various locations to make

    him cautious .By just selecting the location and the thieves id he can view the details of the

    thieves with his photo and reward announced on him by the police.

    Fig.5.2.1 : Level-1 Diagram

    Level -2 Diagram:

    Police login is Level-2 DFD as shown in Fig(6.2.2). In this level, different police officers of

    different locations were provided with their particular user id and password using which they

    have to login in. The entered user id and password were validated and if correct they were made

    to login. Here they can view the alert message given by the administrator and also the caution

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    22/71

    22

    ONLINE CRIME REPORTING

    by the administrator to the particular complaint. Police officers can see the complaints

    belonging to their locality only.

    Fig. 5.2.2 : Level-2 Diagram

    Level -3 DIAGRAM:

    Level-3 DFD diagram is for administrator .Here he consists of login page .Where he has to login

    using user id and password provided to him. After entering user id and password they are

    validated and if correct they made to enter into the page. Here he has two tasks they are sending

    alert messages and caution for the particular complaint to the police. In the caution first he has

    to select the location and then the complaint id and then he has to send the status and caution to

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    23/71

    23

    ONLINE CRIME REPORTING

    the particular complaint. The entered alert, status, and caution were sent to the respective

    databases.

    Fig. 5.2.3 : Level-3 Diagram

    5.3 Flow chart

    A flowchart is a type of diagram that represents an algorithm or process, showing the steps as

    boxes of various kinds, and their order by connecting these with arrows. This diagrammatic

    representation can give a step-by-step solution to a given problem. Process operations are

    represented in these boxes, and arrows connecting them represent flow of control. Data flows

    are not typically represented in a flowchart, in contrast with data flow diagrams; rather, they are

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    24/71

    24

    ONLINE CRIME REPORTING

    implied by the sequencing of operations. Flowcharts are used in analyzing, designing,

    documenting or managing a process or program in various fields.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

    Start

    Open ECOP Website

    &

    User

    Validati

    on

    Browse the

    contents

    Valid

    Register /Reset

    Invalid User

    Logout End

  • 8/2/2019 ecop doc

    25/71

    25

    ONLINE CRIME REPORTING

    6. UML DIAGRAMS

    6.1 Class diagrams

    Fig 6.1.1 : Class Diagram

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    26/71

    26

    ONLINE CRIME REPORTING

    6.2 Use case diagrams

    Registration

    Lodge Complaint

    View Report

    Send Reports

    Send Status

    Login

    View User Complaint

    View Complaint Status

    User

    Police Personell

    Logout

    Admin

    Fig.6.2.1 : Use case Diagram

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    27/71

    27

    ONLINE CRIME REPORTING

    6.3 Sequence diagrams

    Admin Police User

    login

    Registration,login

    login

    lodge Complaint

    View Complaint

    View Complaint

    Send Status

    notify notify

    View Status

    View Status

    Fig.6.3.1: Sequence Diagram

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    28/71

    28

    ONLINE CRIME REPORTING

    6.4 Collaboration diagrams

    Admin

    PoliceUser

    1: login

    7: View Complaint12: View Status

    2: Registration,login11: View Status

    3: login6: View Complaint

    8: Send Status

    9: notify

    4: lodge Complaint

    10: notify

    5:

    Fig. 6.4.1: Collaboration Diagram

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    29/71

    COMPLAINTS

    LOCCID CRIME DESCRIPTION

    SUBMIT

    .

    29

    ONLINE CRIME REPORTING

    6.5 Activity diagrams

    An activity diagram is a special kind of a state chart diagram that shows the flow from activity

    to activity within a system. Here we are having four forms they are

    Complaints, Thieves information, Administrator, Police dept.

    1 .Complaints

    Fig.6.5.1: Activity Diagram

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    30/71

    30

    ONLINE CRIME REPORTING

    2. Thieves information

    Fig. 6.5.2: Activity Diagram

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

    ENTER

    AREA

    LIST OF THIEVES

    HISTORY

    OF THIEVES

  • 8/2/2019 ecop doc

    31/71

    31

    ONLINE CRIME REPORTING

    3. Caution

    Fig.6.5.3: Activity Diagram

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

    POLICE

    LOGIN

    VIEW CAUTION

    SELECTCOMPLAINT

  • 8/2/2019 ecop doc

    32/71

    32

    ONLINE CRIME REPORTING

    4. Administrator

    Fig.6.5.4: Activity Diagram

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

    ADMINIS

    TARTOR

    LOGIN

    ALERT

    SEND ALERT

    CAUTION

    SELECT COMPLALINT

    SELECT LOC

    ENTER CAUTION AND STATUS

  • 8/2/2019 ecop doc

    33/71

    33

    ONLINE CRIME REPORTING

    6.6 Component diagrams

    Fig.6.6.1: Component Diagram

    6.7 Deployment diagrams

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    34/71

    34

    ONLINE CRIME REPORTING

    Fig. 6.7.1: Deployment Diagram

    7. SCREEN SHOTS

    Home page

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    35/71

    35

    ONLINE CRIME REPORTING

    Registration page

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    36/71

    36

    ONLINE CRIME REPORTING

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    37/71

    37

    ONLINE CRIME REPORTING

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    38/71

    38

    ONLINE CRIME REPORTING

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    39/71

    39

    ONLINE CRIME REPORTING

    Police Department login

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    40/71

    40

    ONLINE CRIME REPORTING

    View Complaints Page

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    41/71

    41

    ONLINE CRIME REPORTING

    ]

    Complaint Details Page

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    42/71

    42

    ONLINE CRIME REPORTING

    Complaint Status Page

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    43/71

    43

    ONLINE CRIME REPORTING

    Area Details Page

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    44/71

    44

    ONLINE CRIME REPORTING

    Add Thief Page

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    45/71

    45

    ONLINE CRIME REPORTING

    Thief Info Page

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    46/71

    46

    ONLINE CRIME REPORTING

    8. IMPLEMENTATION AND TESTING

    8.1 Implementation

    About java

    Now-a-days all are familiar with Internet, the worldwide network of computers, which connects

    together thousands of computer all over the world. These network connections are increasing

    day by day in a rapid rate, so the network traffic is increasing at a pulse rate. Computers

    connected to the net are from many different manufacturers, running on different operating

    systems and they differ in architecture, computing power and capacity. By considering this

    point SUN Microsystems Corporation felt the need for a new programming language suitable

    for this heterogeneous Environment and java was the solution. This breaks barriers between

    different computers, chips and operating systems. Using java your application become

    compatible with all operating systems.

    Features of java:-

    Simple

    Secure

    Portable

    Object oriented

    Robust

    Multithreaded

    Simple

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    47/71

    47

    ONLINE CRIME REPORTING

    It is simple for professional programmer to learn & they can use it effectively. If we

    already know object oriented programming, then learning java is very easy. It inherits syntax

    from c & object oriented features from c++, so if the user knows c\c++ then it will be a easy

    way to do effective java programming.

    Secure

    As we know many people are effected by viral infection when they download an

    executable file or program. Rather than, virus programs we have malicious programs that can

    gather private information, such as credit card number, bank account balances & passwords by

    searching the contents of your computers local file system. Java has a better answer for this

    effect i.e., FIREWALL between networked application and your computer.

    Portable

    As already we have discussed about compatibility of operating system, computers,

    chips. In Internet the programs have to be dynamically downloaded to all the various types of

    platforms. For this purpose java program will generate a byte code (which is not a executable

    code). Byte code is a highly optimized set of instructions designed to be executed by java run

    system, which is called as JVM (Java Virtual Machine).

    Object-Oriented:-

    Java is purely object oriented. The object model in java is simple and easy to extend,

    while simple types, such as integers, are kept as high-performance non-objects.

    Robust

    The ability to create robust programs was given a high priority in the design of java. To

    gain reliability, java restricts you in a few key areas, to force you to find your mistakes early in

    program development. At the same time, java frees you from having to worry about many of the

    most common causes of programming errors. Because java is a strictly typed language, it

    checks your code at Compile time. Java is robust for two reasons; they are Memory

    management& mishandled exceptional task in traditional programming environments.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    48/71

    48

    ONLINE CRIME REPORTING

    What is JDBC?

    JDBC is a Java API for executing SQL statements. (JDBC is often thought of as Java

    Database Connectivity) .It consists of a set of classes and interfaces written in the java

    programming language.

    Using JDBC, it is easy to send SQL statements to virtually any relational database. In

    the other words, with the JDBC API, it is not necessary to write to one program to access a

    Sybase database, another program to access Informix database, another program to access

    Oracle database, and so on. One can write a single program using the JDBC API, and the

    program will be able to send SQL statements to the appropriate database. The combinations of

    JAVA and JDBC lets a programmer writes it once and run it anywhere.

    Java, being robust, secure, easy to use, easy to understand, and automatically

    downloadable on a network, is an excellent language basis for database applications.

    JDBC extends what can be done in Java. For example, with Java and the JDBC API, it is

    possible to publish a web page, which contains an applet that uses information obtained from a

    remote database. With more and more Programmers using the Java Programming language, the

    need for easy database access from java is continuing to grow.

    MIS managers like the combination of Java and JDBC because it makes disseminating

    information easy and economical, Businesses can continue to use their installed database and

    access information even if it is stored on different database management systems. Development

    time for new application is short. A programmer can write an application or an update once, putit on the server, and everybody has access to the latest version. A Low Level API and a Base for

    Higher-level APIs.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    49/71

    49

    ONLINE CRIME REPORTING

    JDBC is a Low level interface that means that it is used to invoke SQL commands

    directly, it works very well in this capacity and is easier to use than other database connectivity

    APIs, but it was designed to be a base upon which to build higher level interfaces and tools.

    A high level interface is user-friendly, using a more understandable or more

    convenient API that is translated behind the scenes into a low level interface such as JDBC. At

    the time of writing, two kinds of higher level APIs are under development of top of JDBC.

    1) An embedded SQL for Java. At least one vendor plan to build this DBMS implement SQL, a

    language designed specifically for use with databases. JDBC requires that the SQL statements

    be passed as Strings to Java methods. The embedded SQL preprocessor then translates this

    JAVA/SQL mix into Java with JDBC calls.

    2) A direct mapping of relational database tables to Java classes. In this object/relational

    mapping, each row of the table becomes an instance of that class, and each column value

    corresponds to an attribute of that instance. Programmers can then operate.

    ODBC is hard to learn. It mixes simple and advanced features together, and it has

    complex options even for simple queries. JDBC, on the other hand, was designed to keep simplethings simple while allowing more advanced capabilities where required.

    A Java API like JDBC is needed in order to enable a Pure Java solution. When ODBC

    is used, the ODBC Driver Manager and drivers must be manually installed on every client

    machine. When the JDBC driver is written completely in Java, however, JDBC code is

    automatically installable, portable, and secure on all platforms from network computers to

    mainframes.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    50/71

    50

    ONLINE CRIME REPORTING

    Java server page (jsp)

    Java Server Pages (JSP) is a new technology for web application development that

    has received a great deal of attention since it was first announced.

    Why is JSP so exciting?

    1. JSP is Java-based, and Java is well-suited for enterprise computing.

    In fact, JSP is a key part of the Java 2 Enterprise Edition (J2EE) platform and can take

    advantage of the many Java Enterprise libraries, such as JDBC, JNDI, and Enterprise Java

    Beans.

    2. JSP supports a powerful model for developing web applications that separates presentation

    from processing.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    51/71

    51

    ONLINE CRIME REPORTING

    In the early days of the Web, the only tool for developing dynamic web content was the

    Common Gateway Interface (CGI). CGI outlined how a web server made user input available to

    a program, as well as how the program provided the web server with dynamically generated

    content to send back. CGI scripts were typically written in Perl. (In fact, CGI Perl scripts still

    drive numerous dynamic web sites.) However, CGI is not an efficient solution. For every

    request, the web server has to create a new operating-system process, load a Perl interpreter and

    the Perl script, execute the script, and then dispose of the entire process when it's done.

    To provide a more efficient solution, various alternatives to CGI have been added to

    programmers' toolboxes over the last few years: FastCGI, for example, runs each CGI programin an external permanent process (or a pool of processes). In addition, mod_perl for Apache,

    NSAPI for Netscape, and ISAPI for Microsoft's IIS all run server-side programs in the same

    process as the web server itself. While these solutions offer better performance and scalability,

    each one is supported by only a subset of the popular web servers.

    The Java Servlet API, introduced in early 1997, provides a solution to the portability

    issue. However, all these technologies suffer from a common problem: HTML code embedded

    inside programs. If you've ever looked at the code for a servlet, you've probably seen endless

    calls to out.println( )that contain scores of HTML tags.

    For the individual developer working on a simple web site this approach may work fine,

    but it makes it very difficult for people with different skills to work together to develop a web

    application. This is becoming a significant problem. As web sites become increasingly complex

    and are more and more critical to the success of an organization, the appearance and usability of

    the web interface becomes paramount. New client technologies, such as client-side scripts and

    DHTML, can develop more responsive and interactive user interfaces, style sheets can make it

    easier to globally change fonts and colors, and images can make the interface more appealing.

    At the same time, server-side code is getting more complex, and demands for reliability,

    performance, and fault tolerance are increasing.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    52/71

    52

    ONLINE CRIME REPORTING

    The growing complexity of web applications requires a development model that allows

    people with different skills to cooperate efficiently.

    Java Server Pages provides just such a development model, allowing web page authors

    with skills in graphics, layout, and usability to work in tandem with programmers who are

    experienced in server-side technologies such as multithreading, resource pooling, databases, and

    caching. While there are other technologies, such as ASP, PHP and ColdFusion, that support

    similar development models, none of them offers all the advantages of JSP.

    Introduction to Database Management System (DBMS)

    A Database is an integrated collection of user related data stored with minimum redundancy,

    serves many users/applications quickly and efficiently.

    A database system is basically a computerized record keeping system, i.e. it is a computerized

    system whose overall purpose is to maintain information and make that information available on

    demand. DBMS is a collection of inter-related data and set of programs that allow several users to

    access and manipulate data. Its main purpose is to provide users with an abstract view of the data, i.e.

    the system hides certain details of how the data is stored and maintained.

    Database Management System is divided into 4 main components

    Database

    Hardware

    Software

    User

    Database:

    It consists of collection of persistent data that is used by the application system.

    Hardware:

    The processor(s) and associated main memory that are used to support the execution of database

    system software..

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    53/71

    53

    ONLINE CRIME REPORTING

    Software:

    The layer between the physical database and the users that handles all requests from the user for access

    to the database.

    User:

    There are three types of users

    Application Programmers

    End User

    Database Administrator (DBA)

    Types of dbms

    There are four major categories of DBMS data models.

    Hierarchical

    Network

    Inverted

    Relational

    Relational database management systems

    Database Management System has evolved from hierarchical to network to relational

    models. Today, the most widely accepted database model is the relational model. The relational

    database management system uses only its relational capabilities to manage the information

    stored in the database. The relational model has three different aspects.

    Structures

    Operation

    Integrity rules

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    54/71

    54

    ONLINE CRIME REPORTING

    Structures:

    They are well-defined objects that store the data of a database structure and the data contained within

    them can be manipulated by operations.

    Operations:

    They are clearly defined actions that allow users to manipulate the data and structures of a

    database. The operations on a database must adhere to a predefined set of integrity rules.

    Integrity rules:

    They are laws that govern which operations are allowed on the data and structures of a

    database. Integrity rules protect the data and the structures of a database.

    A DBMS can be regarded as relational only if it obeys a set of 12 rules formulated by

    Dr.E.F.Codd These rules define the scope and functionality of a relational database.

    There is a single overall rule called Zero Rule which is a foundation rule that covers

    all other rules. It states that

    Any truly relational database must be manageable entirely through its relational capabilities.

    The twelve rules are as follows:

    Rule 1: The information rules

    Rule 2: The guaranteed access rule

    Rule 3: The systematic treatment of null values

    Rule 4: The database description rule

    Rule 5: The comprehensive sub-language rule

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    55/71

    55

    ONLINE CRIME REPORTING

    Rule 6:The view update rule

    Rule 7: The insert, update and delete rule

    Rule 8: The physical data independence rule

    Rule 9: The logical data independence rule.

    Rule 10: The integrity independence rule.

    Rule 11: The distribution independence rule.

    Rule 12: The no subversion rules.

    Why Oracle?

    Even though the architecture of all RDBMS is same but the features are different from

    different RDBMS. Oracle, Sybase, Informix. As per the features concerned all the RDBMS can

    be related as it. But with the easiness, demand it is better to go for Oracle.

    Because the professional availability in Oracle is high compared to other RDBMS

    professionals. Because the availability is high the manpower cost will be less compared to

    Sybase professionals, Informix professionals. Even the support from the vendors in also hig in

    Oracle environment rather than other RDBMS.

    Oracle9i is regarded as the RDBMS because it is the most widely acclaimed package

    across the globe with its 100% client-server architecture. Oracle has in-built features like data

    integrity, security, reverie and backup and total GUI based presentation and can easily and

    efficiently support small to very large scale applications.

    Database connections:

    The database connection string is the only JDBC component that references the

    particular database being accessed. You must provide a specific driver connection string that

    uses the protocol defined for the driver. The JDBC Driver Manager class to determine which

    driver to load uses the protocols currently maintained by Java Soft.

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    56/71

    56

    ONLINE CRIME REPORTING

    A Query returns a Result set object. This object contains the results of the query in a

    form of that can be accessed by the application. If the query has no results, the Result Set object

    contains no rows.

    Otherwise it contains rows of data matching the query (up to the limit specified by the

    database). If the database supports doing so, you can set the maximum number of rows using the

    Statement class method setMaxRows ().

    What is Testing?

    A process of executing a program with the explicit intention of finding errors, that is making the

    program fail.

    Software Testing:

    It is the process of testing the functionality and correctness of software by running it. Process of

    executing a program with the intent of finding an error.

    A good test case is one that has a high probability of finding an as yet undiscovered

    error. A successful test is one that uncovers an as yet undiscovered error. Software Testing is

    usually performed for one of two reasons:

    Defect detection

    Reliability estimation

    Black Box Testing:

    Applies to software systems or module, tests functionality in terms of inputs and outputs

    at interfaces.Test reveals if the software function is fully operational with reference to

    requirements specification.

    White Box Testing:

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    57/71

    57

    ONLINE CRIME REPORTING

    Knowing the internal workings i.e., to test if all internal operations are performed

    according to program structures and data structures.

    To test if all internal components have been adequately exercised.

    Software Testing Strategies:

    A strategy for software testing will begin in the following order:

    Unit testing

    Integration testing

    Validation testing

    System testing

    Unit testing

    It concentrates on each unit of the software as implemented in source code and is a white

    box oriented. Using the component level design description as a guide, important control paths

    are tested to uncover errors within the boundary of the module. In the unit testing,

    The step can be conducted in parallel for multiple components.

    Integration testing:

    Here focus is on design and construction of the software architecture. Integration testing

    is a systematic technique for constructing the program structure while at the same time

    conducting tests to uncover errors associated with interfacing. The objective is to take unit

    tested components and build a program structure that has been dictated by design.

    Validation testing:

    In this, requirements established as part of software requirements analysis are validated

    against the software that has been constructed i.e., validation succeeds when software functions

    in a manner that can reasonably expected by the customer.

    System testing:

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    58/71

    58

    ONLINE CRIME REPORTING

    In this software and other system elements are tested as a whole.

    8.2 TESTING

    8.2.1. TEST CASE REPORT

    Having test cases that are good at revealing the presence of faults is central to successful

    testing. The reason for this is that if there is a fault in a program, the program can still provide

    the expected behavior for many inputs. Only for the set of inputs that exercise the fault in the

    program will the output of the program deviate from the expected behavior. Hence, it is fair to

    say that testing is as its test cases.

    Public login:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter the

    incorrect login

    id ,password

    Displays message

    invalid user name and

    password

    -do- p

    2. Enter blank

    values

    Displays an alert

    message enter validvalue for

    corresponding field

    Null values are

    checked with thedatabase values

    F

    3. Enter the

    correct login idand password

    Displays authorized

    action to user

    -do- P

    4. Trigger back

    button

    Page is redirected to

    the home page

    -do- P

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    59/71

    59

    ONLINE CRIME REPORTING

    Registration:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter theincorrect field

    values

    Displays an alertmessage invalid

    user name and

    password

    -do- p

    2. Enter blank values

    Displays an alertmessage enter

    valid value for

    corresponding field

    Null values arestored in the

    database

    F

    3. Trigger submit

    button

    All values are

    stored in database

    and Page isredirected to the

    login page

    -do- P

    Complaint Form:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter blank

    values

    Displays an alert

    message entervalid value for

    corresponding field

    Null values are

    stored in thedatabase

    F

    2. Trigger submit

    button

    All values are

    stored in complaint

    database and acomplaint id has to

    be displayed.

    -do- P

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    60/71

    60

    ONLINE CRIME REPORTING

    Complaint Status:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter invalidComplaint id

    Displays messagenot a valid

    complaint id

    Null pointerException

    F

    2. Enter othersComplaint id

    Displays message ACCESS DENIED

    Others ComplaintRecord displayed

    F

    3. Enter your

    Complaint id

    Displays your

    complaint status

    with details.

    -do- P

    PUBLIC LOGOUT:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Click on logout. Session has to be

    destroyed.

    -do- P

    Police login:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter theincorrect login

    id ,password

    and selectpolice station

    name

    Displays message invalid user name and

    password

    -do- p

    2. Enter blank values

    Displays an alertmessage enter valid

    value for

    corresponding field

    Null values arechecked with the

    database values

    F

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    61/71

    61

    ONLINE CRIME REPORTING

    3. Enter the

    correct login idand password

    and select

    police stationname

    Displays authorized

    action to user

    -do- P

    4. Trigger back

    button

    Page is redirected to

    the home page

    -do- P

    View Complaint by POLICE:

    TESTCASE

    INPUT EXPECTEDBEHAVIOUR

    OBSERVEDBEHAVIOUR

    STATUSPASS FAIL

    1. Select the

    displayedcomplaint ids

    Displays the

    selected recordinformation

    forwarded to the

    particular police

    station.

    -do- P

    Update Complaint by POLICE:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Select thedisplayed

    complaint ids to

    be update

    Displays theprevious status and

    the entered status to

    be updated.

    -do- P

    View Alert Messages by POLICE:

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    62/71

    62

    ONLINE CRIME REPORTING

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Select the

    option view inthe menu Alert

    messages

    Displays the alert

    messages given bythe various police

    stations.

    -do- P

    Give Alert Messages by POLICE:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter the alertmessage and

    Date.

    All the values arestored in the

    database with the

    corresponding alert

    massage issued date.

    -do- P

    View Cautions by POLICE:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Select the

    option view in

    the menu

    Cautions

    Displays the

    cautions given by

    the administrator to

    the particular policestation.

    -do- P

    View Thief information by POLICE:

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    63/71

    63

    ONLINE CRIME REPORTING

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Click on the

    particular thiefphoto to know

    information.

    Displays the

    information of thief.

    -do- P

    Add Thief Information by POLICE:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter theDetails of thethief.

    All the values arestored in the. -do- P

    View Messages by POLICE:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Select the viewin the messages Displays themessages send by

    the various policestations.

    -do- P

    Give Messages by POLICE:

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    64/71

    64

    ONLINE CRIME REPORTING

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter the

    message andDate and select

    the police

    station. .

    All the values are

    stored in thedatabase and to be

    display when the

    police station headclicks on view

    messages.

    -do- P

    POLICE LOGOUT by POLICE:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Click on logout. Session has to be

    destroyed.

    -do- P

    ADMIN LOGIN by Administrator:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter the

    incorrect login

    id ,passwordand select

    police station

    name

    Displays message

    invalid user name and

    password

    -do- p

    2. Enter blank

    values

    Displays an alert

    message enter valid

    value forcorresponding field

    Null values are

    checked with the

    database values

    F

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    65/71

    65

    ONLINE CRIME REPORTING

    3. Enter the

    correct login idand password

    Displays authorized

    action toAdministrator

    -do- P

    4. Trigger back

    button

    Page is redirected to

    the home page

    -do- P

    View Complaints by Administrator:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Select view

    complaint.

    all the complaint ids

    have to be displayed

    with heir status.

    -do- P

    Give Alert Messages by Administrator:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter the alertmessage and

    Date.

    All the values arestored in the

    database with the

    corresponding alertmassage issued date.

    -do- P

    Give Cautions by Administrator:

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    66/71

    66

    ONLINE CRIME REPORTING

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Enter the

    message andPolice station

    name.

    All the values are

    stored in thedatabase and

    displayed when

    police departmentclicks on the view

    messages.

    -do- P

    Administrator logout by Administrator:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    STATUS

    PASS FAIL

    1. Click on logout. Session has to be

    destroyed.

    -do- P

    PUBLIC LOGIN:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    THE WAY WE

    OVERCOME

    THIS DEFECT

    STATU

    S

    PASS

    FAIL

    1. Enter blank

    values

    Displays an alertmessage enter valid

    value forcorresponding field

    -do- By providing theclient side validation

    by writingJavaScript.

    P

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    67/71

    67

    ONLINE CRIME REPORTING

    Registration:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    THE WAY WE

    OVERCOME

    THIS DEFECT

    STATU

    S

    PASSFAIL

    1. Enter

    blank

    values

    Displays an alert

    message enter valid

    value for

    corresponding field

    -do- By providing the

    client side

    validation by

    writing JavaScript.

    P

    Complaint Form:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    THE WAY WE

    OVERCOME

    THIS DEFECT

    STATU

    S

    PASS

    FAIL

    1. Enter

    blankvalues

    Displays an alert

    message enter validvalue for

    corresponding field

    -do- By providing the

    client sidevalidation by

    writing JavaScript.

    P

    Complaint Status:

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    68/71

    68

    ONLINE CRIME REPORTING

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    THE WAY WE

    OVERCOME

    THIS DEFECT

    STATU

    S

    PASS

    FAIL

    1. Enter invalid

    Complaint

    id

    Displays messagenot a valid

    complaint id

    -do- By checking therequested complaint

    id in the database or

    not

    P

    2. Enter others

    Complaintid

    Displays message

    ACCESSDENIED

    -do- By checking the

    requested complaintid with the login

    value

    P

    Police login:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    THE WAY WE

    OVERCOME

    THIS DEFECT

    STATU

    S

    PASS

    FAIL

    1. Enter blank

    values

    Displays an alertmessage enter valid

    value for

    corresponding field

    -do- By providing theclient side validation

    by writing

    JavaScript.

    P

    Administrator login:

    TEST

    CASE

    INPUT EXPECTED

    BEHAVIOUR

    OBSERVED

    BEHAVIOUR

    THE WAY WE

    OVERCOME

    THIS DEFECT

    STATU

    S

    PASS

    FAIL

    1. Enter blank

    values

    Displays an alertmessage enter valid

    value forcorresponding field

    -do- By providing theclient side validation

    by writingJavaScript.

    P

    CONCLUSION

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    69/71

    69

    ONLINE CRIME REPORTING

    The technological benefits of ECOPS are to maintain information, monitor and enhance

    the performance of the department, to take a critical look at the existing system, processes and

    procedures of the department so as to identify and remove the redundancy.

    The case registered at one police station can be tracked at any police station. This

    reduces the discretionary dependence of police. Once the case is registered the investigation and

    follow up activities relating to the case cannot be delayed.

    All these factors have contributed to a higher moral of the police officials at all the

    levels in police department. This project result in great improvement in the organizations

    functioning by reducing the effort spent by the general people.

    GOALS:

    Improve efficiency in police department

    Availability of online police service to citizens

    Availability of data to senior officials for quick decision making

    Better administration and co-ordination

    Speedy detection of crimes

    Duplication of work avoided

    Retrieval and access of data is easy

    Paper work is drastically reduced

    Automatic maintenance of registers

    GLOSSARY

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    70/71

    70

    ONLINE CRIME REPORTING

    Project management is the discipline of planning, organizing, securing, and managing

    resources to achieve specific goals. A project is a temporary endeavor with a defined beginning

    and end (usually time-constrained, and often constrained by funding or deliverables),

    undertaken to meet unique goals and objectives, typically to bring about beneficial change or

    added value. The temporary nature of projects stands in contrast with business as usual (or

    operations), which are repetitive, permanent, or semi-permanent functional activities to produce

    products or services. In practice, the management of these two systems is often quite different,

    and as such requires the development of distinct technical skills and management strategies.

    The primary challenge of project management is to achieve all of the project goals and

    objectives while honoring the preconceived constraints. Typical constraints are scope, time, and budget. The secondaryand more ambitiouschallenge is to optimize the allocation of

    necessary inputs and integrate them to meet pre-defined objectives.

    BIBLIOGRAPHY

    ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

  • 8/2/2019 ecop doc

    71/71

    71

    ONLINE CRIME REPORTING

    Java user site: www.java.com.

    Java at Sun Microsystems., Inc - java.sun.com

    Java Virtual Machine Specifications, 2nd Ed. - Java.Sun.com

    Java Virtual Machine - Wikipedia

    http://java.sun.com/products/jsp/

    http://en.wikipedia.org/wiki/JavaServer_Pages

    http://en.wikipedia.org/wiki/Java_Database_Connectivity

    http://jakarta.apache.org/tomcat/tomcat-5.5-doc

    http://www.java.com/http://java.sun.com/http://java.sun.com/docs/books/vmspec/2nd-edition/html/VMSpecTOC.doc.htmlhttp://en.wikipedia.org/wiki/Java_Virtual_Machinehttp://java.sun.com/products/jsp/http://en.wikipedia.org/wiki/JavaServer_Pageshttp://en.wikipedia.org/wiki/Java_Database_Connectivityhttp://jakarta.apache.org/tomcat/tomcat-5.5-dochttp://www.java.com/http://java.sun.com/http://java.sun.com/docs/books/vmspec/2nd-edition/html/VMSpecTOC.doc.htmlhttp://en.wikipedia.org/wiki/Java_Virtual_Machinehttp://java.sun.com/products/jsp/http://en.wikipedia.org/wiki/JavaServer_Pageshttp://en.wikipedia.org/wiki/Java_Database_Connectivityhttp://jakarta.apache.org/tomcat/tomcat-5.5-doc