8/2/2019 ecop doc
1/71
8/2/2019 ecop doc
2/71
2
ONLINE CRIME REPORTING
1.3 Project purpose
Usually the citizen has to go to police station to make a complaint. Here we have given an
opportunity to make a complaint through online and the actors will be taken by the police
officers immediately. The communication for officers will be easy. The license can be get easily
through online if it is selected by the officers via sms and mail.
The main purpose behind the Online crime reporting system was to improve the
effectiveness of policy performance; to improve the efficiency of police procedures; for
example, by eliminating redundant processes in the registration of criminal cases; and to
improve the quality of management information provided for senior policy decision-making,
particularly through integration of previously separate information systems.
Within the focus on effectiveness, there was a concern about the non-transparent, even
dishonest nature of police work, which had become synonymous with corruption and delay. The
intention was that the new system - through its automation of previously human processes and
through its state-wide and online accessibility - would make the registration, processing and
follow-up of criminal cases more open. Under the existing regime, many police require a bribe
before they are willing to register a case, and also require a bribe to be paid before they answer
any query about the case, such as its progress, or other information held on file.
It was partly this poor image of police functioning, that led the Chief Minister of the
State to impose the system on the police service. There were also drivers from the failure of
police to properly prosecute some high-profile criminal cases that had political overtones;
something which was politically-damaging and seen as requiring an equally high-profile
reaction.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
3/71
3
ONLINE CRIME REPORTING
1.4 Objectives
Generally many crimes seen by the public will not reach to the police due to many reasons like
fear, Lack of time, Ignorance. Due to this reason many cases are not even reaching the police
station. Though some cases are registered they are not investigated properly due to lack of
evidences and Cooperation of the public. This software helps the public to report about the
crimes to the police without any fear in correct time. This is helpful to police in solving the
cases .This is also helpful for higher authorities of police to have an overview about the progress
of the investigation.
ECOPS is an online reporting service to which the internet user can report crimes
committed on or through the Internet. The impact of IT and communications is traversing at afast pace. As information for the department is crucial, an enterprise IT tool for enhancing the
performance of the police officials became necessary called ONLINE CRIME REPORTING or
E-Computerized Operations for Police Services, the main purpose is to maintain information,
monitor and enhance the performance of the department.
The focus of ONLINE CRIME REPORTING is to computerize the activities of
controlling crime, administration and support services across the state in an integrated fashion
so as to enable the division heads and senior officers to obtain the relevant information. Besides,
it is also envisaged to reduce dependence on paper and help in automatic maintenance of
registers and generation of reports, data analysis, better planning and coordination, speedy
detection of crimes and monitoring the prosecutions.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
4/71
4
ONLINE CRIME REPORTING
2. SYSTEM ANALYSIS
2.1 Existing system
The normal public in India is afraid to give a complaint in police station because they
are filled with a false fear about the police department. An online complaint registration system
will solve the fear of the public and will also help to police dept in catching criminals. It will
improve the service, so you dont have to wait on hold on the telephone or go down to the
station to file a report.
2.2 Drawbacks of existing system
Existing system is time consuming
Corrections & maintenance should be done manually
It needs more man power
There may be mistakes while maintaining data manually.
2.3 Proposed system
An online solution is very useful as the solution is inherently distributive. This distributive
characteristic of the online solution helps in getting the different police stations to share
information & get in contact with one another.
The reports filled online are checked at the administrative department to use if any
information is lacking or to check the status of the report.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
5/71
8/2/2019 ecop doc
6/71
6
ONLINE CRIME REPORTING
Administrator:
This module is accessible to some VIPs like SP, DCP, and DIG etc. By using
this module they can give any caution to the police department. Also they can perform
updations to the crime report database.
3. REQUIREMENT SPECIFICATION
3.1 Requirement study and analysis
Generally many crimes seen by the public will not reach to the police due to many reasons like
fear, Lack of time, Ignorance. Due to this reason many cases are not even reaching the police
station. Though some cases are registered they are not investigated properly due to lack of
evidences and Cooperation of the public. This software helps the public to report about the
crimes to the police without any fear in correct time. This is helpful to police in solving the
cases .This is also helpful for higher authorities of police to have an overview about the progress
of the investigation. An online solution is very useful as the solution is inherently distributive.
This distributive characteristic of the online solution helps in getting the different police stations
to share information and get in contact with one another.
With ECOPS, the exchange of information within police stations and other senior police
officers in the departments is faster. It also streamlines the workflow in police department
machinery. A central database permits the police units to operate more efficiently leading to
speedy detection of crime and prosecution monitoring. The senior police officers of the state can
access the reports, which allow them to take quick and timely decisions. Crime analysis reports
will enable the senior police officers to observe the crime trends and to guide the investigating
officers. The technological benefits of ECOPS are to maintain information, monitor and
enhance the performance of the department, to take a critical look at the existing system,
processes and procedures of the department so as to identify and remove the redundancy.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
7/71
7
ONLINE CRIME REPORTING
ECOPS is envisaged to reduce the fair amount of paper work and helps in the automatic
maintenance of registers and generation of reports, data analysis, better planning and
coordination, timely decision and speedy detection of crime and prosecution monitoring. All
these factors have contributed to a higher moral of the police officials at all the levels in police
department. The case registered at one police station can be tracked at any police station.
This reduces the discretionary dependence of police. Once the case is registered the
investigation and follow up activities relating to the case cannot be delayed. The grievances
handling is more efficient. Now, the citizens will have access to senior officers through the web.
ECOPS introduced transparency and accountability in the whole system.
The User Interface should be user friendly to the user who uses the home page by whichhe/she can easily register.
The Operations should take place transparently.
3.2 Software requirements
Front End Tool: Java Server Pages, Java Script, and HTML
Back End Tool: Oracle 9i
Software Interfaces
Operating System: Windows 2000
Database : Oracle 9i
Server : Tomcat 5.0
Explorer : Microsoft Internet Explorer
3.3 Hardware requirements
Client
Hardware Platform : P III or above with
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
8/71
8
ONLINE CRIME REPORTING
RAM : 256MB or above.
Hard Disk : 20GB or above of HD.
Server
Hardware Platform : P III or above with
RAM : 256MB or above.
Hard Disk : 20GB or above of HD.
3.4 Block diagram
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
9/71
9
ONLINE CRIME REPORTING
Figure 4.4.1: Block diagram of ECOP working
3.5 Overall description
The ONLINE CRIME REPORTING is an application which is providing the features of
dynamic web application as well as that of the stand alone application on the administrator side.
The application will be used across the state by the citizens, the law enforcement bodies, and
private detective and cyber caf & hotel employees. It can be used to track the criminal, to
gather the information about the crime or about criminal and missing person and to broadcast or
communicate information ( of any criminal activity or other alert). The citizen can register the e
complaint here which will ease out the process for the citizens and also for the police to
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
10/71
COMPLAIN
TS
THIEVES
POLICE
ADMIN
10
ONLINE CRIME REPORTING
maintain records as the status of the case can be viewed as well as can be updated. The data
required to be available is the districts of the state along with areas enclosed by them.
The web pages (XHTML/JSP) are present to provide the user interface on customer
client side. Communication between customer and server is provided through HTTP/HTTPS
protocols.
The Client Software is to provide the user interface on system user client side and for
this TCP/IP protocols are used.
On the server side web server is for EJB and database server is for storing the
information
4. SYSTEM DESIGN AND DEVELOPMENT
4.1 System design
4.1.1 Data design
It is an object or entity-relationship diagram that primarily documents the data elements (e.g.,
classes, tables), their component data, and the relationships between them.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
11/71
11
ONLINE CRIME REPORTING
4.1.2 Architectural design
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
12/71
12
ONLINE CRIME REPORTING
4.1.3 Procedural design
The procedural design describes structured programming concepts using graphical,
tabular and textual notations. These design mediums enable the designer to represent procedural
details that facilitates translation to code. This blueprint for implementation forms the basis for
all subsequent software engineering work.
4.1.3 Modular design
User
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
13/71
13
ONLINE CRIME REPORTING
Administrator
Police Department
User:
User can send the complaints to police and they can view the complaint report. User can
perform these tasks only when he logins to his account otherwise he has to register his new
account. Police send the status report to the users based on their investigation. The user can
check the status of their complaints with the help of complaint id given. The user can register
his complaints to the police and view the thieves information.
Administrator:
Higher authorities like VIPS, CP, and DCP can view the complaints which are sent by
the public. The administrator has to login with their account in order to perform his actions.
They can send alert messages to the police department regarding any future complications. The
administrator can also send cautions to the users. Unlike police who can view complaints
specific to his area the administrator can view the complaints universally.
Police Department:
Basing on the complaints given by the public, police can view them and take appropriate
action timely. The police has to login with their account to view the complaints and to send the
status of the complaints to the users. They can update the status of the complaint basing on the
progress of investigation. They will also receive alerts from the higher authorities regarding
warnings and can take action in advance.
4.2 Database design
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
14/71
14
ONLINE CRIME REPORTING
TABLENAME: Complaints
S.No Column Name Data type Description Remarks
1 cid Number
Complaint
Identification
Number
Primary
Key
2 Loc Varchar2(20)
Location of
Crime
3Description Varchar2(1000) Complaint
4Crime type Varchar2(20) Type of Crime
5Email Varchar2(30) Email ID of user
6 Cdatedate Date of complaint
When recorded
TABLENAME: Thieves
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
15/71
15
ONLINE CRIME REPORTING
S.No Column
name
Data type Description Remarks
1 Tid Number Thief ID
Primary
Key
2 Name Varchar2(20) Name of the criminal
3 Alias name Varchar2(30) Other name of the criminal
4 DOB date Age of the criminal
5 Address Varchar2(40) Address of the criminal
6 Reward Number Prize money announced by police on the
criminal
7 Status Varchar2(30)` Status of the criminal given by the police
TABLENAME: Alert
S.No Column name Data type Description Remarks
1 Alert Varchar2(60) Alert message given
By the Administrator
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
16/71
16
ONLINE CRIME REPORTING
TABLENAME: Crimeimg
S.No Column name Data type Description Remarks
1 Tid Number Thief identification
Number
2 Path Varchar2(30) Path of the image where
stored
TABLENAME: Caution
S.N
o
Column
name
Data
type
Description Remar
ks
1 cid Number Complaint Identification
Number
2 Admin
Caution
Varchar2(
30)
Caution given by the
Administrator to the
Given complaint
TABLENAME: Login
S.No Column name Data type Description Remarks
1 Userid Number Administrator Identification
Number
Primary
Key
2 Pwd Varchar2(30) Password given to the
Administrator
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
17/71
17
ONLINE CRIME REPORTING
3 Pname Varchar2(30) Name given to the
administrator
TABLENAME: Plogin
S.No Column name Data type Description Remarks
1 Userid Number Police Identification
Number
Primary
Key
2 Pwd Varchar2(30) Password given to the Police
3 Pname Varchar2(30) Name given to the police
TABLENAME: Status
S.No Column name Data type Description Remarks
1 cid Number Complaint Identification
Number
2 Status Varchar2(20) Status of the complaint
Given by the administrator
TABLENAME: Crimedb
S.No Column name Data type Description Remarks
1
Crime Type Varchar2(30) Type of crime
2
Suggestion Varchar2(300)
Suggestion given to the
Police dept for particular crime
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
18/71
18
ONLINE CRIME REPORTING
4.3 Feasibility Analysis
Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses of the
existing business or proposed venture, opportunities and threats as presented by the
environment, the resources required to carry through, and ultimately the prospects for success.
In its simplest terms, the two criteria to judge feasibility are cost required and value to be
attained. As such, a well-designed feasibility study should provide a historical background of
the business or project, description of the product or service, accounting statements, details of
the operations and management, marketing research and policies, financial data, legal
requirements and tax obligations. Generally, feasibility studies precede technical developmentand project implementation.
5. DATA FLOW DIAGRAMS
5.1 Rules of data flow diagram
Data flow diagram is a pictorial representation of the system in which flow of data from one
process to another process is described. A Data Flow is composed of
Data movement shown by arrows.
Transformation or process of data shown by named circle or rounded rectangle.
Sources and destination of data represented by named rectangles.
Static storage or data at rest denoted by an open rectangle that is named.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
19/71POLICE
USER ADMIN
ONLINE
CRIME
REPORT
19
ONLINE CRIME REPORTING
Data Flow Diagrams are of two types:
Physical Data Flow Diagrams:
These are implementation-dependent i.e., they show the actual devices, departments, people,
etc., involved in the system.
Logical Data Flow Diagrams:
These diagrams describe the system independently of how it is actually implemented, they show
what takes places, rather than how an activity is accomplished.
The DFD is intended to represent information Flow but it is not a flow chart and is not
intended decision-making, flow of control, loops and other procedural aspects of the system.
DFD is a useful Graphical tool and is applied at the earlier stages of requirements analysis. It
may be further refined at preliminary design stage and is used as mechanism for top-level
structural design for software.
The DFD drawn first at a preliminary level is further expanded into greater details:
The context diagram is decomposed and represented with multiple rectangles.
Each of these rectangles may be decomposed further and given as more detailed DFD.
Explanation of DFD.
Context diagram:
Its a diagram, which shows whole system at once. The sources in context diagram for
this system are USER, ADMINISTRATOR, POLICE and these are linked to the
ONLNECRIMEREPORTING. The Context Diagram is shown in fig (6.1.1):
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
20/71
20
ONLINE CRIME REPORTING
Fig 5.1.1. Context diagram
5.2 Levels of data diagram
Level -1 Diagram:
User login process is the Level-1 DFD shown in Fig(6.2.1). Here user has to enter into the
registering complaint area any one register the complaint so there is user id and password for it.
After entering the complaint and pressing submit it will be send to the complaintdatabase. If his complaint has been successfully entered in to the database he is allotted with a
self generated no which is used for the further purposes.
The user can view the status of his compliant in the status menu by entering the self
generated no given by the system.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
21/71
21
ONLINE CRIME REPORTING
The user can also view the details of the thieves present in the various locations to make
him cautious .By just selecting the location and the thieves id he can view the details of the
thieves with his photo and reward announced on him by the police.
Fig.5.2.1 : Level-1 Diagram
Level -2 Diagram:
Police login is Level-2 DFD as shown in Fig(6.2.2). In this level, different police officers of
different locations were provided with their particular user id and password using which they
have to login in. The entered user id and password were validated and if correct they were made
to login. Here they can view the alert message given by the administrator and also the caution
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
22/71
22
ONLINE CRIME REPORTING
by the administrator to the particular complaint. Police officers can see the complaints
belonging to their locality only.
Fig. 5.2.2 : Level-2 Diagram
Level -3 DIAGRAM:
Level-3 DFD diagram is for administrator .Here he consists of login page .Where he has to login
using user id and password provided to him. After entering user id and password they are
validated and if correct they made to enter into the page. Here he has two tasks they are sending
alert messages and caution for the particular complaint to the police. In the caution first he has
to select the location and then the complaint id and then he has to send the status and caution to
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
23/71
23
ONLINE CRIME REPORTING
the particular complaint. The entered alert, status, and caution were sent to the respective
databases.
Fig. 5.2.3 : Level-3 Diagram
5.3 Flow chart
A flowchart is a type of diagram that represents an algorithm or process, showing the steps as
boxes of various kinds, and their order by connecting these with arrows. This diagrammatic
representation can give a step-by-step solution to a given problem. Process operations are
represented in these boxes, and arrows connecting them represent flow of control. Data flows
are not typically represented in a flowchart, in contrast with data flow diagrams; rather, they are
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
24/71
24
ONLINE CRIME REPORTING
implied by the sequencing of operations. Flowcharts are used in analyzing, designing,
documenting or managing a process or program in various fields.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
Start
Open ECOP Website
&
User
Validati
on
Browse the
contents
Valid
Register /Reset
Invalid User
Logout End
8/2/2019 ecop doc
25/71
25
ONLINE CRIME REPORTING
6. UML DIAGRAMS
6.1 Class diagrams
Fig 6.1.1 : Class Diagram
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
26/71
26
ONLINE CRIME REPORTING
6.2 Use case diagrams
Registration
Lodge Complaint
View Report
Send Reports
Send Status
Login
View User Complaint
View Complaint Status
User
Police Personell
Logout
Admin
Fig.6.2.1 : Use case Diagram
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
27/71
27
ONLINE CRIME REPORTING
6.3 Sequence diagrams
Admin Police User
login
Registration,login
login
lodge Complaint
View Complaint
View Complaint
Send Status
notify notify
View Status
View Status
Fig.6.3.1: Sequence Diagram
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
28/71
28
ONLINE CRIME REPORTING
6.4 Collaboration diagrams
Admin
PoliceUser
1: login
7: View Complaint12: View Status
2: Registration,login11: View Status
3: login6: View Complaint
8: Send Status
9: notify
4: lodge Complaint
10: notify
5:
Fig. 6.4.1: Collaboration Diagram
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
29/71
COMPLAINTS
LOCCID CRIME DESCRIPTION
SUBMIT
.
29
ONLINE CRIME REPORTING
6.5 Activity diagrams
An activity diagram is a special kind of a state chart diagram that shows the flow from activity
to activity within a system. Here we are having four forms they are
Complaints, Thieves information, Administrator, Police dept.
1 .Complaints
Fig.6.5.1: Activity Diagram
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
30/71
30
ONLINE CRIME REPORTING
2. Thieves information
Fig. 6.5.2: Activity Diagram
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
ENTER
AREA
LIST OF THIEVES
HISTORY
OF THIEVES
8/2/2019 ecop doc
31/71
31
ONLINE CRIME REPORTING
3. Caution
Fig.6.5.3: Activity Diagram
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
POLICE
LOGIN
VIEW CAUTION
SELECTCOMPLAINT
8/2/2019 ecop doc
32/71
32
ONLINE CRIME REPORTING
4. Administrator
Fig.6.5.4: Activity Diagram
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
ADMINIS
TARTOR
LOGIN
ALERT
SEND ALERT
CAUTION
SELECT COMPLALINT
SELECT LOC
ENTER CAUTION AND STATUS
8/2/2019 ecop doc
33/71
33
ONLINE CRIME REPORTING
6.6 Component diagrams
Fig.6.6.1: Component Diagram
6.7 Deployment diagrams
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
34/71
34
ONLINE CRIME REPORTING
Fig. 6.7.1: Deployment Diagram
7. SCREEN SHOTS
Home page
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
35/71
35
ONLINE CRIME REPORTING
Registration page
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
36/71
36
ONLINE CRIME REPORTING
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
37/71
37
ONLINE CRIME REPORTING
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
38/71
38
ONLINE CRIME REPORTING
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
39/71
39
ONLINE CRIME REPORTING
Police Department login
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
40/71
40
ONLINE CRIME REPORTING
View Complaints Page
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
41/71
41
ONLINE CRIME REPORTING
]
Complaint Details Page
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
42/71
42
ONLINE CRIME REPORTING
Complaint Status Page
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
43/71
43
ONLINE CRIME REPORTING
Area Details Page
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
44/71
44
ONLINE CRIME REPORTING
Add Thief Page
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
45/71
45
ONLINE CRIME REPORTING
Thief Info Page
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
46/71
46
ONLINE CRIME REPORTING
8. IMPLEMENTATION AND TESTING
8.1 Implementation
About java
Now-a-days all are familiar with Internet, the worldwide network of computers, which connects
together thousands of computer all over the world. These network connections are increasing
day by day in a rapid rate, so the network traffic is increasing at a pulse rate. Computers
connected to the net are from many different manufacturers, running on different operating
systems and they differ in architecture, computing power and capacity. By considering this
point SUN Microsystems Corporation felt the need for a new programming language suitable
for this heterogeneous Environment and java was the solution. This breaks barriers between
different computers, chips and operating systems. Using java your application become
compatible with all operating systems.
Features of java:-
Simple
Secure
Portable
Object oriented
Robust
Multithreaded
Simple
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
47/71
47
ONLINE CRIME REPORTING
It is simple for professional programmer to learn & they can use it effectively. If we
already know object oriented programming, then learning java is very easy. It inherits syntax
from c & object oriented features from c++, so if the user knows c\c++ then it will be a easy
way to do effective java programming.
Secure
As we know many people are effected by viral infection when they download an
executable file or program. Rather than, virus programs we have malicious programs that can
gather private information, such as credit card number, bank account balances & passwords by
searching the contents of your computers local file system. Java has a better answer for this
effect i.e., FIREWALL between networked application and your computer.
Portable
As already we have discussed about compatibility of operating system, computers,
chips. In Internet the programs have to be dynamically downloaded to all the various types of
platforms. For this purpose java program will generate a byte code (which is not a executable
code). Byte code is a highly optimized set of instructions designed to be executed by java run
system, which is called as JVM (Java Virtual Machine).
Object-Oriented:-
Java is purely object oriented. The object model in java is simple and easy to extend,
while simple types, such as integers, are kept as high-performance non-objects.
Robust
The ability to create robust programs was given a high priority in the design of java. To
gain reliability, java restricts you in a few key areas, to force you to find your mistakes early in
program development. At the same time, java frees you from having to worry about many of the
most common causes of programming errors. Because java is a strictly typed language, it
checks your code at Compile time. Java is robust for two reasons; they are Memory
management& mishandled exceptional task in traditional programming environments.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
48/71
48
ONLINE CRIME REPORTING
What is JDBC?
JDBC is a Java API for executing SQL statements. (JDBC is often thought of as Java
Database Connectivity) .It consists of a set of classes and interfaces written in the java
programming language.
Using JDBC, it is easy to send SQL statements to virtually any relational database. In
the other words, with the JDBC API, it is not necessary to write to one program to access a
Sybase database, another program to access Informix database, another program to access
Oracle database, and so on. One can write a single program using the JDBC API, and the
program will be able to send SQL statements to the appropriate database. The combinations of
JAVA and JDBC lets a programmer writes it once and run it anywhere.
Java, being robust, secure, easy to use, easy to understand, and automatically
downloadable on a network, is an excellent language basis for database applications.
JDBC extends what can be done in Java. For example, with Java and the JDBC API, it is
possible to publish a web page, which contains an applet that uses information obtained from a
remote database. With more and more Programmers using the Java Programming language, the
need for easy database access from java is continuing to grow.
MIS managers like the combination of Java and JDBC because it makes disseminating
information easy and economical, Businesses can continue to use their installed database and
access information even if it is stored on different database management systems. Development
time for new application is short. A programmer can write an application or an update once, putit on the server, and everybody has access to the latest version. A Low Level API and a Base for
Higher-level APIs.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
49/71
49
ONLINE CRIME REPORTING
JDBC is a Low level interface that means that it is used to invoke SQL commands
directly, it works very well in this capacity and is easier to use than other database connectivity
APIs, but it was designed to be a base upon which to build higher level interfaces and tools.
A high level interface is user-friendly, using a more understandable or more
convenient API that is translated behind the scenes into a low level interface such as JDBC. At
the time of writing, two kinds of higher level APIs are under development of top of JDBC.
1) An embedded SQL for Java. At least one vendor plan to build this DBMS implement SQL, a
language designed specifically for use with databases. JDBC requires that the SQL statements
be passed as Strings to Java methods. The embedded SQL preprocessor then translates this
JAVA/SQL mix into Java with JDBC calls.
2) A direct mapping of relational database tables to Java classes. In this object/relational
mapping, each row of the table becomes an instance of that class, and each column value
corresponds to an attribute of that instance. Programmers can then operate.
ODBC is hard to learn. It mixes simple and advanced features together, and it has
complex options even for simple queries. JDBC, on the other hand, was designed to keep simplethings simple while allowing more advanced capabilities where required.
A Java API like JDBC is needed in order to enable a Pure Java solution. When ODBC
is used, the ODBC Driver Manager and drivers must be manually installed on every client
machine. When the JDBC driver is written completely in Java, however, JDBC code is
automatically installable, portable, and secure on all platforms from network computers to
mainframes.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
50/71
50
ONLINE CRIME REPORTING
Java server page (jsp)
Java Server Pages (JSP) is a new technology for web application development that
has received a great deal of attention since it was first announced.
Why is JSP so exciting?
1. JSP is Java-based, and Java is well-suited for enterprise computing.
In fact, JSP is a key part of the Java 2 Enterprise Edition (J2EE) platform and can take
advantage of the many Java Enterprise libraries, such as JDBC, JNDI, and Enterprise Java
Beans.
2. JSP supports a powerful model for developing web applications that separates presentation
from processing.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
51/71
51
ONLINE CRIME REPORTING
In the early days of the Web, the only tool for developing dynamic web content was the
Common Gateway Interface (CGI). CGI outlined how a web server made user input available to
a program, as well as how the program provided the web server with dynamically generated
content to send back. CGI scripts were typically written in Perl. (In fact, CGI Perl scripts still
drive numerous dynamic web sites.) However, CGI is not an efficient solution. For every
request, the web server has to create a new operating-system process, load a Perl interpreter and
the Perl script, execute the script, and then dispose of the entire process when it's done.
To provide a more efficient solution, various alternatives to CGI have been added to
programmers' toolboxes over the last few years: FastCGI, for example, runs each CGI programin an external permanent process (or a pool of processes). In addition, mod_perl for Apache,
NSAPI for Netscape, and ISAPI for Microsoft's IIS all run server-side programs in the same
process as the web server itself. While these solutions offer better performance and scalability,
each one is supported by only a subset of the popular web servers.
The Java Servlet API, introduced in early 1997, provides a solution to the portability
issue. However, all these technologies suffer from a common problem: HTML code embedded
inside programs. If you've ever looked at the code for a servlet, you've probably seen endless
calls to out.println( )that contain scores of HTML tags.
For the individual developer working on a simple web site this approach may work fine,
but it makes it very difficult for people with different skills to work together to develop a web
application. This is becoming a significant problem. As web sites become increasingly complex
and are more and more critical to the success of an organization, the appearance and usability of
the web interface becomes paramount. New client technologies, such as client-side scripts and
DHTML, can develop more responsive and interactive user interfaces, style sheets can make it
easier to globally change fonts and colors, and images can make the interface more appealing.
At the same time, server-side code is getting more complex, and demands for reliability,
performance, and fault tolerance are increasing.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
52/71
52
ONLINE CRIME REPORTING
The growing complexity of web applications requires a development model that allows
people with different skills to cooperate efficiently.
Java Server Pages provides just such a development model, allowing web page authors
with skills in graphics, layout, and usability to work in tandem with programmers who are
experienced in server-side technologies such as multithreading, resource pooling, databases, and
caching. While there are other technologies, such as ASP, PHP and ColdFusion, that support
similar development models, none of them offers all the advantages of JSP.
Introduction to Database Management System (DBMS)
A Database is an integrated collection of user related data stored with minimum redundancy,
serves many users/applications quickly and efficiently.
A database system is basically a computerized record keeping system, i.e. it is a computerized
system whose overall purpose is to maintain information and make that information available on
demand. DBMS is a collection of inter-related data and set of programs that allow several users to
access and manipulate data. Its main purpose is to provide users with an abstract view of the data, i.e.
the system hides certain details of how the data is stored and maintained.
Database Management System is divided into 4 main components
Database
Hardware
Software
User
Database:
It consists of collection of persistent data that is used by the application system.
Hardware:
The processor(s) and associated main memory that are used to support the execution of database
system software..
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
53/71
53
ONLINE CRIME REPORTING
Software:
The layer between the physical database and the users that handles all requests from the user for access
to the database.
User:
There are three types of users
Application Programmers
End User
Database Administrator (DBA)
Types of dbms
There are four major categories of DBMS data models.
Hierarchical
Network
Inverted
Relational
Relational database management systems
Database Management System has evolved from hierarchical to network to relational
models. Today, the most widely accepted database model is the relational model. The relational
database management system uses only its relational capabilities to manage the information
stored in the database. The relational model has three different aspects.
Structures
Operation
Integrity rules
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
54/71
54
ONLINE CRIME REPORTING
Structures:
They are well-defined objects that store the data of a database structure and the data contained within
them can be manipulated by operations.
Operations:
They are clearly defined actions that allow users to manipulate the data and structures of a
database. The operations on a database must adhere to a predefined set of integrity rules.
Integrity rules:
They are laws that govern which operations are allowed on the data and structures of a
database. Integrity rules protect the data and the structures of a database.
A DBMS can be regarded as relational only if it obeys a set of 12 rules formulated by
Dr.E.F.Codd These rules define the scope and functionality of a relational database.
There is a single overall rule called Zero Rule which is a foundation rule that covers
all other rules. It states that
Any truly relational database must be manageable entirely through its relational capabilities.
The twelve rules are as follows:
Rule 1: The information rules
Rule 2: The guaranteed access rule
Rule 3: The systematic treatment of null values
Rule 4: The database description rule
Rule 5: The comprehensive sub-language rule
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
55/71
55
ONLINE CRIME REPORTING
Rule 6:The view update rule
Rule 7: The insert, update and delete rule
Rule 8: The physical data independence rule
Rule 9: The logical data independence rule.
Rule 10: The integrity independence rule.
Rule 11: The distribution independence rule.
Rule 12: The no subversion rules.
Why Oracle?
Even though the architecture of all RDBMS is same but the features are different from
different RDBMS. Oracle, Sybase, Informix. As per the features concerned all the RDBMS can
be related as it. But with the easiness, demand it is better to go for Oracle.
Because the professional availability in Oracle is high compared to other RDBMS
professionals. Because the availability is high the manpower cost will be less compared to
Sybase professionals, Informix professionals. Even the support from the vendors in also hig in
Oracle environment rather than other RDBMS.
Oracle9i is regarded as the RDBMS because it is the most widely acclaimed package
across the globe with its 100% client-server architecture. Oracle has in-built features like data
integrity, security, reverie and backup and total GUI based presentation and can easily and
efficiently support small to very large scale applications.
Database connections:
The database connection string is the only JDBC component that references the
particular database being accessed. You must provide a specific driver connection string that
uses the protocol defined for the driver. The JDBC Driver Manager class to determine which
driver to load uses the protocols currently maintained by Java Soft.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
56/71
56
ONLINE CRIME REPORTING
A Query returns a Result set object. This object contains the results of the query in a
form of that can be accessed by the application. If the query has no results, the Result Set object
contains no rows.
Otherwise it contains rows of data matching the query (up to the limit specified by the
database). If the database supports doing so, you can set the maximum number of rows using the
Statement class method setMaxRows ().
What is Testing?
A process of executing a program with the explicit intention of finding errors, that is making the
program fail.
Software Testing:
It is the process of testing the functionality and correctness of software by running it. Process of
executing a program with the intent of finding an error.
A good test case is one that has a high probability of finding an as yet undiscovered
error. A successful test is one that uncovers an as yet undiscovered error. Software Testing is
usually performed for one of two reasons:
Defect detection
Reliability estimation
Black Box Testing:
Applies to software systems or module, tests functionality in terms of inputs and outputs
at interfaces.Test reveals if the software function is fully operational with reference to
requirements specification.
White Box Testing:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
57/71
57
ONLINE CRIME REPORTING
Knowing the internal workings i.e., to test if all internal operations are performed
according to program structures and data structures.
To test if all internal components have been adequately exercised.
Software Testing Strategies:
A strategy for software testing will begin in the following order:
Unit testing
Integration testing
Validation testing
System testing
Unit testing
It concentrates on each unit of the software as implemented in source code and is a white
box oriented. Using the component level design description as a guide, important control paths
are tested to uncover errors within the boundary of the module. In the unit testing,
The step can be conducted in parallel for multiple components.
Integration testing:
Here focus is on design and construction of the software architecture. Integration testing
is a systematic technique for constructing the program structure while at the same time
conducting tests to uncover errors associated with interfacing. The objective is to take unit
tested components and build a program structure that has been dictated by design.
Validation testing:
In this, requirements established as part of software requirements analysis are validated
against the software that has been constructed i.e., validation succeeds when software functions
in a manner that can reasonably expected by the customer.
System testing:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
58/71
58
ONLINE CRIME REPORTING
In this software and other system elements are tested as a whole.
8.2 TESTING
8.2.1. TEST CASE REPORT
Having test cases that are good at revealing the presence of faults is central to successful
testing. The reason for this is that if there is a fault in a program, the program can still provide
the expected behavior for many inputs. Only for the set of inputs that exercise the fault in the
program will the output of the program deviate from the expected behavior. Hence, it is fair to
say that testing is as its test cases.
Public login:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter the
incorrect login
id ,password
Displays message
invalid user name and
password
-do- p
2. Enter blank
values
Displays an alert
message enter validvalue for
corresponding field
Null values are
checked with thedatabase values
F
3. Enter the
correct login idand password
Displays authorized
action to user
-do- P
4. Trigger back
button
Page is redirected to
the home page
-do- P
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
59/71
59
ONLINE CRIME REPORTING
Registration:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter theincorrect field
values
Displays an alertmessage invalid
user name and
password
-do- p
2. Enter blank values
Displays an alertmessage enter
valid value for
corresponding field
Null values arestored in the
database
F
3. Trigger submit
button
All values are
stored in database
and Page isredirected to the
login page
-do- P
Complaint Form:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter blank
values
Displays an alert
message entervalid value for
corresponding field
Null values are
stored in thedatabase
F
2. Trigger submit
button
All values are
stored in complaint
database and acomplaint id has to
be displayed.
-do- P
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
60/71
60
ONLINE CRIME REPORTING
Complaint Status:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter invalidComplaint id
Displays messagenot a valid
complaint id
Null pointerException
F
2. Enter othersComplaint id
Displays message ACCESS DENIED
Others ComplaintRecord displayed
F
3. Enter your
Complaint id
Displays your
complaint status
with details.
-do- P
PUBLIC LOGOUT:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Click on logout. Session has to be
destroyed.
-do- P
Police login:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter theincorrect login
id ,password
and selectpolice station
name
Displays message invalid user name and
password
-do- p
2. Enter blank values
Displays an alertmessage enter valid
value for
corresponding field
Null values arechecked with the
database values
F
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
61/71
61
ONLINE CRIME REPORTING
3. Enter the
correct login idand password
and select
police stationname
Displays authorized
action to user
-do- P
4. Trigger back
button
Page is redirected to
the home page
-do- P
View Complaint by POLICE:
TESTCASE
INPUT EXPECTEDBEHAVIOUR
OBSERVEDBEHAVIOUR
STATUSPASS FAIL
1. Select the
displayedcomplaint ids
Displays the
selected recordinformation
forwarded to the
particular police
station.
-do- P
Update Complaint by POLICE:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Select thedisplayed
complaint ids to
be update
Displays theprevious status and
the entered status to
be updated.
-do- P
View Alert Messages by POLICE:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
62/71
62
ONLINE CRIME REPORTING
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Select the
option view inthe menu Alert
messages
Displays the alert
messages given bythe various police
stations.
-do- P
Give Alert Messages by POLICE:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter the alertmessage and
Date.
All the values arestored in the
database with the
corresponding alert
massage issued date.
-do- P
View Cautions by POLICE:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Select the
option view in
the menu
Cautions
Displays the
cautions given by
the administrator to
the particular policestation.
-do- P
View Thief information by POLICE:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
63/71
63
ONLINE CRIME REPORTING
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Click on the
particular thiefphoto to know
information.
Displays the
information of thief.
-do- P
Add Thief Information by POLICE:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter theDetails of thethief.
All the values arestored in the. -do- P
View Messages by POLICE:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Select the viewin the messages Displays themessages send by
the various policestations.
-do- P
Give Messages by POLICE:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
64/71
64
ONLINE CRIME REPORTING
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter the
message andDate and select
the police
station. .
All the values are
stored in thedatabase and to be
display when the
police station headclicks on view
messages.
-do- P
POLICE LOGOUT by POLICE:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Click on logout. Session has to be
destroyed.
-do- P
ADMIN LOGIN by Administrator:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter the
incorrect login
id ,passwordand select
police station
name
Displays message
invalid user name and
password
-do- p
2. Enter blank
values
Displays an alert
message enter valid
value forcorresponding field
Null values are
checked with the
database values
F
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
65/71
65
ONLINE CRIME REPORTING
3. Enter the
correct login idand password
Displays authorized
action toAdministrator
-do- P
4. Trigger back
button
Page is redirected to
the home page
-do- P
View Complaints by Administrator:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Select view
complaint.
all the complaint ids
have to be displayed
with heir status.
-do- P
Give Alert Messages by Administrator:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter the alertmessage and
Date.
All the values arestored in the
database with the
corresponding alertmassage issued date.
-do- P
Give Cautions by Administrator:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
66/71
66
ONLINE CRIME REPORTING
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Enter the
message andPolice station
name.
All the values are
stored in thedatabase and
displayed when
police departmentclicks on the view
messages.
-do- P
Administrator logout by Administrator:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
STATUS
PASS FAIL
1. Click on logout. Session has to be
destroyed.
-do- P
PUBLIC LOGIN:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
STATU
S
PASS
FAIL
1. Enter blank
values
Displays an alertmessage enter valid
value forcorresponding field
-do- By providing theclient side validation
by writingJavaScript.
P
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
67/71
67
ONLINE CRIME REPORTING
Registration:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
STATU
S
PASSFAIL
1. Enter
blank
values
Displays an alert
message enter valid
value for
corresponding field
-do- By providing the
client side
validation by
writing JavaScript.
P
Complaint Form:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
STATU
S
PASS
FAIL
1. Enter
blankvalues
Displays an alert
message enter validvalue for
corresponding field
-do- By providing the
client sidevalidation by
writing JavaScript.
P
Complaint Status:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
68/71
68
ONLINE CRIME REPORTING
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
STATU
S
PASS
FAIL
1. Enter invalid
Complaint
id
Displays messagenot a valid
complaint id
-do- By checking therequested complaint
id in the database or
not
P
2. Enter others
Complaintid
Displays message
ACCESSDENIED
-do- By checking the
requested complaintid with the login
value
P
Police login:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
STATU
S
PASS
FAIL
1. Enter blank
values
Displays an alertmessage enter valid
value for
corresponding field
-do- By providing theclient side validation
by writing
JavaScript.
P
Administrator login:
TEST
CASE
INPUT EXPECTED
BEHAVIOUR
OBSERVED
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
STATU
S
PASS
FAIL
1. Enter blank
values
Displays an alertmessage enter valid
value forcorresponding field
-do- By providing theclient side validation
by writingJavaScript.
P
CONCLUSION
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
69/71
69
ONLINE CRIME REPORTING
The technological benefits of ECOPS are to maintain information, monitor and enhance
the performance of the department, to take a critical look at the existing system, processes and
procedures of the department so as to identify and remove the redundancy.
The case registered at one police station can be tracked at any police station. This
reduces the discretionary dependence of police. Once the case is registered the investigation and
follow up activities relating to the case cannot be delayed.
All these factors have contributed to a higher moral of the police officials at all the
levels in police department. This project result in great improvement in the organizations
functioning by reducing the effort spent by the general people.
GOALS:
Improve efficiency in police department
Availability of online police service to citizens
Availability of data to senior officials for quick decision making
Better administration and co-ordination
Speedy detection of crimes
Duplication of work avoided
Retrieval and access of data is easy
Paper work is drastically reduced
Automatic maintenance of registers
GLOSSARY
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
70/71
70
ONLINE CRIME REPORTING
Project management is the discipline of planning, organizing, securing, and managing
resources to achieve specific goals. A project is a temporary endeavor with a defined beginning
and end (usually time-constrained, and often constrained by funding or deliverables),
undertaken to meet unique goals and objectives, typically to bring about beneficial change or
added value. The temporary nature of projects stands in contrast with business as usual (or
operations), which are repetitive, permanent, or semi-permanent functional activities to produce
products or services. In practice, the management of these two systems is often quite different,
and as such requires the development of distinct technical skills and management strategies.
The primary challenge of project management is to achieve all of the project goals and
objectives while honoring the preconceived constraints. Typical constraints are scope, time, and budget. The secondaryand more ambitiouschallenge is to optimize the allocation of
necessary inputs and integrate them to meet pre-defined objectives.
BIBLIOGRAPHY
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
8/2/2019 ecop doc
71/71
71
ONLINE CRIME REPORTING
Java user site: www.java.com.
Java at Sun Microsystems., Inc - java.sun.com
Java Virtual Machine Specifications, 2nd Ed. - Java.Sun.com
Java Virtual Machine - Wikipedia
http://java.sun.com/products/jsp/
http://en.wikipedia.org/wiki/JavaServer_Pages
http://en.wikipedia.org/wiki/Java_Database_Connectivity
http://jakarta.apache.org/tomcat/tomcat-5.5-doc
http://www.java.com/http://java.sun.com/http://java.sun.com/docs/books/vmspec/2nd-edition/html/VMSpecTOC.doc.htmlhttp://en.wikipedia.org/wiki/Java_Virtual_Machinehttp://java.sun.com/products/jsp/http://en.wikipedia.org/wiki/JavaServer_Pageshttp://en.wikipedia.org/wiki/Java_Database_Connectivityhttp://jakarta.apache.org/tomcat/tomcat-5.5-dochttp://www.java.com/http://java.sun.com/http://java.sun.com/docs/books/vmspec/2nd-edition/html/VMSpecTOC.doc.htmlhttp://en.wikipedia.org/wiki/Java_Virtual_Machinehttp://java.sun.com/products/jsp/http://en.wikipedia.org/wiki/JavaServer_Pageshttp://en.wikipedia.org/wiki/Java_Database_Connectivityhttp://jakarta.apache.org/tomcat/tomcat-5.5-doc