Professional Documents
Culture Documents
TitlePage No.
ABSTRACT -------------------------------------------------------------------------------- 1
Chapter 1 introduction--------------------------------------------------------------------- 2-7
1.1 Motivation------------------------------------------------------------------------------- 4
1.2 Scope------------------------------------------------------------------------------- 5
1.3 Objective------------------------------------------------------------------------------- 6
1.4 Application ----------------------------------------------------------------------------- 7
Chapter 2 Literature survey-------------------------------------------------------------- 8-11
2.1 Literature Survey----------------------------------------------------------------------- 10
2.2 Conclusion----------------------------------------------------------------------------- 11
Chapter 3 Problem Statement ----------------------------------------------------------- 12-14
3.1 Problem Statement-------------------------------------------------------------------- 13
Chapter 4 Hardware and Software Requirements ---------------------------------- 15-17
4.1 Software Requirement---------------------------------------------------------------- 15
4.2 Hardware Requirement--------------------------------------------------------------- 16
Chapter 5 Method Used------------------------------------------------------------------- 18-21
5.1 Method---------------------------------------------------------------------------------- 19
Chapter 6 Design Framework ------------------------------------------------------------ 22-30
6.1 ER Diagram----------------------------------------------------------------------------- 23
6.2 Data Flow Diagram-------------------------------------------------------------------- 26
6.3 Used Case Diagram-------------------------------------------------------------------- 29
Chapter 7 Implementation----------------------------------------------------------------- 31-49
7.1 Snapshot --------------------------------------------------------------------------------- 32
7.2 Coding----------------------------------------------------------------------------------- 36
Chapter 8 Testing---------------------------------------------------------------------------- 40-43
8.1 Testing------------------------------------------------------------------------------------ 40
Chapter 9 Conclusion and Future Scope ------------------------------------------------ 44-46
9.1 Conclusion and future scope ---------------------------------------------------------- 45
REFERENCES -------------------------------------------------------------------------------- 47
ABSTRACT
Digitized police management system or E-Cop Record based filing is a system which
provides user a simpler access to the police crime investigation or crime solving system. In
this project we provide a simple way to register or report a crime, rather than storing it
manually, we have decided to digitize the process of keeping police records.
This will be helpful in sensitive situations when the actual records are deliberately misplaced
or sometimes even changed. The project consists of a platform to access police investigatory
system. In this system we can report a crime; also the status of the reported crime can be
inspected. The user can also be provided with a specific unique no. from which they can
access their account.
In this account, all the information which is registered while filing a manual FIR is as it is
present in the digitalized filing system, significant data like name, complaint, officer which
handled the case, progress of the case etc has also been added. Our main motive is to provide
an easy, accessible and secured service to the citizens as well as the police officers, so that
the filing and the recording of evidence cannot be misplaced by any unfair means as the
victims and the cops can directly interact with the investigation system.
1
CHAPTER-1
INTRODUCTION
CRIME MANAGEMENT SYSTEM
2
INTRODUCTION
Crime Management system or police management system is a system which provides user a
very easy way to access to the police crime records and investigations.This software also
provide police to maintain the records , files and criminal related things this easily.This
software provides a platform to access police investigation system and report a crime or to
check details about the reported crime.This system provides forms like user registration form,
crime registration form, women complaint registration form and many more.This software
will provide different username , ids and passwords to the user which will help them to
access their accounts.This project also provide excellent security of data at every level of
user.
The purpose to design this phase is to plan a solution for problem specified by the
requirements system design aims to identify the modules that should be in the system.
The main purpose of the software is to give upper hand to the users to have all the
information they needed in the correct format without wasting their time sitting in the
police stations for hours.
This software will resolve each and every query of the user as they will have all the
records in front of them.
Main motive is to provide an easy accessible service to the citizens as well as the
police departmen
1.1 MOTIVATION
Provide the investigating officers with the tools, technology and information
to facilitate faster and more accurate investigation of crime and detection of
criminals.
3
Make the Police functioning citizen friendly and more transparent by
automating the functioning of Police Stations.
Keep track of the progress of the crime and criminal investigation and
prosecution Cases.
Improve the Police functioning in various other areas such as Law & Order,
Traffic Management, curbing organized crimes, resource management etc.
1.1 SCOPE
Project scope is the part of project planning that involves determining and documenting a list
of specific project goals, tasks, costs and deadlines. The documentation of a project's scope,
which is called a scope statement, terms of reference or statement of work, explains the
boundaries of the project, establishes responsibilities for each team member and sets up
procedures for how completed work will be verified and approved. During the project, this
documentation helps the project team remain focused and on task. The scope statement also
provides the project team with guidelines for making decisions about change requests during
the project.
The system ‘crime management’ is a reporting website that will be used for automating the
mutual process to register different cases in police department. This system will manage the
4
details of all the crimes. The system provides an interface to store the crime details of
criminals and allows the user to search and view records. The system will simplify the overall
procedure of crime files.
5
1.2 OBJECTIVE
Project objectives are goals, plain and simple. These are the business objectives that you want
the project to accomplish. The main reason why effective objectives are important is that the
more clear your objectives are, the more likely they are to be achieved.
The Objective of Crime Reporting System is to develop a web based application using which
people can report crimes online. It provides the facility of uploading images or videos of
crime scenes so that police can take action immediately. It also provides the information of
missing persons, most wanted criminals and safety tips for the awareness of people.
Police need not have to maintain records manually since our software maintains all
the records with centralized database.
No loss of records.
We know users are of many categories, like users from who know working with
computers very well and users who don’t know about computers all the category can
use this system . it is user friendly
This website is made to work efficiently and effectively. It results in regular and
timely action against crime reported . it can be observed that the information is
obtained easily and accurately .
Update the case details timely to ensure that fast action strategy is applied .
The aim of this project is to secure and make privacy on crime related data over
manually data storage. This website based project is made for providing the
information and awareness about crimes.
6
1.4 APPLICATION
It is a software which helps the user to work with the crimes easily.
After registration one can log in the system as the operator of the system on the
behalf of user. After this he has the other useful interfaces available for further
actions.
This software reduces danger of all paper work and gives great efficiency.
The User Interface is very friendly and can be easily used by anyone.
The user can write FIR and can save it. The saved FIR can be seen only by the valid
users.
The user must know that which criminal is there and for which crime. So the user can
check it in the database whenever he wants and about whoever he wants.
It also decreases the amount of time taken to write FIR details and other modules.
All the details about any complaint or any other criminal can be checked and can be
saved.
This Crime Management System is a solution to all the problems related to the
crime reports , criminal details, their crime , their punishment and others etc.
At the end, we can say that this software is performing all the tasks accurately and is
doing the work for which it is made.
7
CHAPTER 2
LITERATURE SURVEY
8
WHAT IS LITERATURE SURVEY?
A literature survey or a literature review in project report is that section which shows the
various analyses and research made in the field of our project, taking into account the various
parameters of the project and the extend of the project. It is the most important part of the
report as it gives us a direction in the area of our research. It helps us to set a goal for our
analysis – thus giving us our problem statement.
A literature survey in a project report represents the study done to assist in the completion
of a project.
The focus of a literature survey is on the following and in this order:
Literature surveys are used in ensuring that the used experiments, methodologies and
experiments offer reliability and validity in the research being conducted. The surveys need
to show essential content avoiding much interpretation. One’s opinions and conclusions
require to be separated from the content in the cited sources.
The topic of literature survey must be relevant and narrow for it to be straight to the point. It
identifies the most relevant research papers from a study on the topic. Writing the tutorial on
a subject requires citing of identified literature as much as possible. However, it should not
present any new results but provide a summary of the existing state of knowledge on a
subject.
A project report is an assessment during a process or project conveying these details:
9
Why do we use literature reviews?
Literature review provide you with a handy guide with a particular topic. If we have limited
time to conduct research, literature review can give you an overview or act as a stepping
stone. It also provides a solid background for the project investigation. Comprehensive
knowledge is essential to most researches and projects.
Crime poses substantial risks to the health of victims and, consequently, generates additional
demand for health services. This literature review examines the current state of knowledge
and understanding of the impacts of crime on physical and psychological health; responses to
the needs of victims by health workers and other professionals; and resulting costs to health
services. The review concludes by identifying issues for research, policy and practice.
In the absence of effective formal means for controlling crime in the Western world,
community crime prevention has emerged as a major alternative and supplement to the
criminal justice system. This article attempts to review what is known currently about the
nature, extent, and effectiveness of community-based efforts to prevent residential crime.
Included in this assessment are citizen actions to protect themselves, their property, and their
neighborhood, as well as efforts to prevent crime through changes in the physical
environmental and through innovations in community policing.
10
4- Community crime prevention
ABSTRACT
Purpose- This paper aims to the common performance indicators for the policing of organised
crimes, and to purpose a new approach.
CONCLUSION
In real world people are facing a lot of problems in filing a report or regarding crimes in their
area easily and efficiently, this survey helps our system to know the percentage of people
happy or are against this system.
Researches says that this system helps a majority to get their problem solved for a police
officer or even for the peoples.
With the help of researches and articles we got a lot of knowledge about how people are
unaware of the system that are so helpful for them.
People does not have any idea how they can make their lives easy and fruitful by simply
using these software.
In all these one is our crime management system which is built for the betterment of the
criminal system to be managed with full ease.
11
CHAPTER 3
PROBLEM STATEMENT
12
PROBLEM STATEMENT
The conventional police record management system with time has proved to be a threat and a
deliberate means to change data and alter the crime scenes, records and evidences.
Sometimes, the case files are even misplaced, either by unfair means or because of careless
staff handling. This results in important cases being either closed without proper legal
deliberation over it or the victims further being tortured for another statement which might
not be as authentic as the earlier one. The loss of evidence slows down the process of police
investigation and results in an inefficient work-procedure which also makes the handling of
other cases very tedious and cumbersome.
A secured and easy-to-access Report Filing System is required which enables not only the
victims to file FIRs digitally, but also allows the police officials to access the respective case
files with proper case evidences stored in the same. Proposition of a proper authentication
method is a must as only the victims and the officials should be able to see the status of their
cases, also crime record of a person can be added as a special feature as the part of the
project.
PROPOSED SOLUTION
The present world is technology driven as it is employed by many fields in the performance
of their operation. In the case of law enforcement agencies, this is evident in the use of
automated crime record management systems (CRMS) worldwide to keep record of crime
and criminals involved. Crime being an act against the law of a society is a threat to the well-
being of the populace and so, requires efficient and effective monitoring. For this reason,
CRMS have been developed to achieve this purpose.
As per the above problem statement, a leap from the conventional crime record system can be
made to the Digitized Report System which would include the following functionalities in
order to overcome the rendering difficulties:-
In this project, a website is to be developed which directly connects the victims and
the citizens to the police department. It exclusively provides the facility of reporting
crimes, complaints online through a website login.
A registration page and a login page for already registered users of the website. The
regular updation of status of the case by the police officials.
The number of clients that access the website can be umpteen and can connect to the
server, making it easier when simultaneous users are accessing the website.
A separate page will be developed to make people aware about their fundamental
rights and the court of law. This page will be dedicated only for helpline numbers for
immediate use in case of emergencies for the general public.
13
The major objective also includes making the system work faster so usage of light-
weight software like JavaScript makes it easier to achieve it.
CHAPTER 4
HARDWARE AND
SOFTWARE
REQUIREMENTS
14
INTRODUCTION:
To be used efficiently, all computer software needs certain hardware components or the other
software resources to be present on a computer. These pre-requisites are known
as(computer)system requirements and are often used as a guideline as opposed to an absolute
rule. Most software defines two sets of system requirements: minimum and recommended.
With increasing demand for higher processing power and resources in newer versions of
software, system requirements tend to increase over time. Industry analysts suggest that this
trend plays a bigger part in driving upgrades to existing computer systems than technological
advancements.
Platform
A computer platform describes some sort of framework, either in hardware or software,
which allows software to run. Typical platforms include a computer's architecture, operating
system, or programming languages and their runtime libraries.
Operating system is one of the requirements mentioned when defining system requirements
(software). Software may not be compatible with different versions of same line of operating
systems, although some measure of backward compatibility is often maintained. For example,
most software designed for Microsoft Windows XP does not run on Microsoft Windows 98,
although the converse is not always true. Similarly, software designed using newer features
of Linux Kernel v2.6 generally does not run or compile properly (or at all) on Linux
distributions using Kernel v2.2 or v2.4.
Web browser
15
Most web applications and software depending heavily on internet technologies make use of
the default browser installed on system. Microsoft Internet Explorer is a frequent choice of
software running on Microsoft Windows, which makes use of ActiveX controls, despite their
vulnerabilities.
Architecture
All computer operating systems are designed for a particular computer architecture. Most
software applications are limited to particular operating systems running on particular
architectures. Although architecture-independent operating systems and applications exist,
most need to be recompiled to run on a new architecture.
Processing power
The power of the central processing unit (CPU) is a fundamental system requirement for any
software. Most software running on x86 architecture define processing power as the model
and the clock speed of the CPU. Many other features of a CPU that influence its speed and
power, like bus speed, cache, are often ignored.
Memory
All software, when run, resides in the random access memory (RAM) of a computer.
Memory requirements are defined after considering demands of the application, operating
system, supporting software and files, and other running processes. Optimal performance of
other unrelated software running on a multi-tasking computer system is also considered when
defining this requirement.
16
Secondary storage Hard-disk requirements vary, depending on the size of software
installation, temporary files created and maintained while installing or running the
software, and possible use of swap space (if RAM is insufficient).
RAM : 8 GB
MEMORY : 2TB
17
CHAPTER 5
METHODS
18
METHODS
The project method is an educational enterprise in which children solve a practical problem
over a period of several days or weeks. It may involve building a rocket, designing a
playground, or publishing a class newspaper. The projects may be suggested by the teacher,
but they are planned and executed as far as possible by the students themselves, individually
or in groups. Project work focuses on applying, not imparting, specific knowledge or skills,
and on improving student involvement and motivation in order to foster independent
thinking, self-confidence, and social responsibility.
METHOD USED IN OUR SOFTWARE IS DISCUSSED BELOW:-
The distinguishing feature of PHP is that the scripting code is executed on the
server, which generates HTML that is sent back to the client. The client
receives the result of executing the script without knowing the underlying
code. Developers can configure the web server to process all the HTML files
(containing the PHP script).
We use the structure created by our HTML code to reference, enhance, and
manipulate elements on a web page using CSS and JavaScript. For instance,
we have used HTML to mark all of the headings on a web page, and then use
CSS to specify the font, size, and color you want to apply to those headings to
reflect a visual design developed for the site.
Apache and PHP run on many different platforms and operating systems. PHP
can also be integrated with other web servers.
One or more PHP scripts can be embedded into static HTML files and this
makes client tier integration easy. On the downside, this can blend the scripts
with the presentation.
Cascading Style Sheets (CSS) has been used for describing the presentation of
a document written in a markup language like HTML. CSS is designed to
enable the separation of presentation and content, including layout, colors, and
fonts.
JavaScript, a client scripting language is used for creating the graphic effect in
the web pages. It is a standalone language developed in Netscape. It is used
19
when a webpage is to be made dynamic and add special effects on pages like
rollover, roll out and many types of graphics.
Apache Server does the job to establish a connection between a server and the
browsers of website visitors (Firefox, Google Chrome, Safari, etc.) while
delivering files back and forth between them (client-server structure). Apache
is cross-platform software; therefore it works on both UNIX and Windows
servers.
The CSS, JS and HTML files are combined in order to get the desired results.
1. Database
The next step is to create the database tables for storing the website
information. Creating a database table using PHPMyAdmin is also simple.
Alternatively, one can create and configure the entire database using the
following PHP script:
Fields
}
Where the Fields are coded as fieldname type(length) extra_info
The following command is used in the PHP script to connect to the MySQL
database:
mysql_connect(localhost,$username,$password);
There is more than one user who needs to access the data at the same time.
There is at least a moderate amount of data. For example, you might need to
maintain information about a few hundred customers.
20
There are relationships between the stored data items. For example, customers
may have any number of related invoices.
There is more than one kind of data object. For example, there might be
information about customers, orders, inventory, and other data in an online
store.
There are constraints that must be rigidly enforced on the data, such as field
lengths, field types, uniqueness of customer numbers, and so on.
21
CHAPTER 6
FLOW DIAGRAMS
22
6.1 ER DIAGRAM –
The ER or (Entity Relational Model) is a high-level conceptual data model diagram. Entity-
Relation model is based on the notion of real-world entities and the relationship between
them.
ER modelling helps you to analyse data requirements systematically to produce a well-
designed database. So, it is considered a best practice to complete ER modelling before
implementing your database.
Entity relationship diagram displays the relationships of entity set stored in a database. In
other words, we can say that ER diagrams help you to explain the logical structure databases.
At first look, an ER diagram looks very similar to the flowchart. However, ER Diagram
includes many specialized symbols, and its meanings make this model unique.
Here, are prime reasons for using the ER Diagram in our project-
23
ER DIAGRAM OF CRIME MANAGEMENT SYSTEM
Admin
Con
Status
Person
1
1 m 1 m
Has Police station Has Officers
User
Status 1
1 Descrip 1
tion Areaid
id
Add
m
FIR Details Find
Has
Has
Fir ID
Descrip Crime_Id
tion
Date Time m
FIR Details
M 1 m m
Profile Has
Criminals
m
Does
Crime
m
Has
Crimetype
Fig 6.1
ER DIAGRAM
24
Complaints Entity : Attributes of Complaints are complain_id, complain_name,
complain_type, complain_description
FIR Entity : Attributes of FIR are FIR_id, FIR_name, FIR_type, FIR_description
Charge Sheet Entity : Attributes of Charge Sheet are charger_sheet_id, charger_sheetfine,
charger_sheettype, charger_sheet_description
Presioner Entity : Attributes of Presioner are prisoner_id, prisoner_crime_id, prisoner_name,
prisoner_mobile, prisoner_email, prisoner_username, prisoner_password, prisoner_address
Criminals Entity : Attributes of Criminals are criminal_id, criminal_crime_id,
criminal_name, criminal_mobile, criminal_email, criminal_username, criminal_password,
criminal_address
Data flow diagrams are used to graphically represent the flow of data in a business
information system. DFD describes the processes that are involved in a system to transfer
data from the input to the file storage and reports generation.
Data flow diagrams can be divided into logical and physical. The logical data flow diagram
describes flow of data through a system to perform certain functionality of a business. The
physical data flow diagram describes the implementation of the logical data flow.
One of the rule for developing DFD is that all flow must begin with and end at a processing
step. This is quite logical, because data can’t transform on its own with being process. By
using the thumb rule, it is quite easily to identify the illegal data flows and correct them in a
DFD.
25
Why use DFD?
DFD graphically representing the functions, or processes, which capture, manipulate, store,
and distribute data between a system and its environment and between components of a
system. The visual representation makes it a good communication tool between User and
System designer. Structure of DFD allows starting from a broad overview and expand it to a
hierarchy of detailed diagrams. DFD has often been used due to the following reasons:
Logical information flow of the system
Determination of physical system construction requirements
Simplicity of notation
Establishment of manual and automated systems requirements
2-level DFD: 2-level DFD goes one step deeper into parts of 1-level DFD. It can be
used to plan or record the specific/necessary detail about the system’s functioning.
Complaint Management
User ID, Complaints
Solutions, Feedback
26
Fig 6.2 0 LEVEL DFD
Administrator
View Complaints
complaints Complaint
Details
Postmortem
Mortem details
Management
Mortem
Details
Add
Report
Reports Reports
Generation
View Reports
User
Add Solutions
View Feedback
User
Feedback
Add FIR Reports
Mortem Details
27
Fig 6.4 2-LEVEL DFD
28
6.3 USE CASE DIAGRAM-
A use case diagram is the primary form of system/software requirements for a new software
program underdeveloped. Use cases specify the expected behaviour (what), and not the exact
method of making it happen (how). Use cases once specified can be denoted both textual and
visual representation (i.e. use case diagram). A key concept of use case modelling is that it
helps us design a system from the end user's perspective. It is an effective technique for
communicating system behaviour in the user's terms by specifying all externally visible
system behaviour .
A use case diagram is usually simple. It does not show the detail of the use cases:
It only summarizes some of the relationships between use cases, actors, and systems.
It does not show the order in which steps are performed to achieve the goals of each
use case.
Use case diagrams are typically developed in the early stage of development and people often
apply use case modelling for the following purposes:
Specify the context of a system
Capture the requirements of a system
Validate a systems architecture
Drive implementation and generate test cases
Developed by analysts together with domain experts
Actors: The users that interact with a system. An actor can be a person, an
organization, or an outside system that interacts with your application or system. They
must be external objects that produce or consume data.
System: A specific sequence of actions and interactions between actors and the
system. A system may also be referred to as a scenario.
Goals: The end result of most use cases. A successful diagram should describe the
activities and variants used to reach the goal.
29
Manage user and full
website
Manage FIR
Registers fir
Add criminals
Admin
Upload documents
Add chargesheets
30
Fig 6.5 USE CASE DIAGRAM
CHAPTER7
IMPLEMENTATION
31
SNAPSHOTS
Fig 7.1
Signup page
Sign Up to get connected directly with the officials of our Indian Police Department. A closer
and a safer way to ensure one’s safety on the go!!
32
Fig 7.2 Home page
33
Fig 7.3
Contact us page
Our services comprise of advocating essential issues to not only the police officials, but also
to higher degree recommended seniors of the governing body, it also specializes in giving a
“how to” tutorial to make the website familiar for the new users, also we have RTI officials in
line for any further queries.
Fig 7.4
34
Fig 7.4
Thousands of criminal cases have been piling up, there are numerous organisingdatabases
and software that have proven to be insufficient when it comes to identificationof specific
cases and targets.
The easiest way to register and report a crime would make it easier for the citizens to
dealwith the present scenario where immediate action is required. E-cops or police
management is a way thatprovides the user to connect with crime investigation or crime
solving system.
In this account all the information is present like name, complaint, officer whichhandled the
case, progress of the case etc. Our main motive is to provide an easyaccessible service to the
citizen, so that they can directly interact with ourinvestigation system.
Online Crime Reporting system is a system which providesuser a very elementary access to
the police crime investigation or crime solving system. Inthis website, we provide a simple
way to register or report a crime. This will prove to be veryhelpful in sensitive situations
where the victim has to report a crime almost immediately. In this website, we provide a
platform toaccess police investigatory system. In this system we can report a crime and we
canalso know our status of reported crime so as to keep track of one's case at hand. Our team
including the back-end and front end developers have put their best foot forward in order to
develop an ideal police case reporting website to file an FIR. You simply carry your police
station on your phone or laptop!!
our team comprises of the following efficient personalities who have made all of this
possible.
35
Fig 7.6
Login page
The Login page is the lead handler and enabler of our efficient cops, and the fellow citizens
against any crime and reporting an FIR.
36
CODINGS
1- ECOPS.PHP
?php
require "connection.php";
session_start();
if(isset($_POST['logout'])){
$_SESSION['session']=FALSE;
}
if(isset($_POST['submit'])){
if((isset($_POST['email'])&&$_POST['email']!="")&&(isset($_POST['password'])&&$_PO
ST['password']!="")){
validateCredentials($conn, $_POST['email'], $_POST['password']);
}else{
echo "Noting set";
}
}
?>
<!DOCTYPE html>
<html>
<head>
37
<title> ECOPS-CITIZEN SERVICE</title>
<link rel="stylesheet"
href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css">
<link rel="stylesheet" type="text/css" href="a.css">
</head>
<body style="background:skyblue;" >
<style>
a{
color:white;
}
</style>
}
Else
{
38
2- LOGIN.PHP
<?php
/**
* WordPress User Page
*
* Handles authentication, registering, resetting passwords, forgot password,
* and other user handling.
*
* @package WordPress
*/
/** Make sure that the WordPress bootstrap has run before continuing. */
require __DIR__ . '/wp-load.php';
/**
* Output the login page header.
*
* @since 2.1.0
*
* @global string $error Login error message set by deprecated pluggable wp_login()
function
* or plugins replacing it.
* @global bool|string $interim_login Whether interim login modal is being displayed. String
'success'
* upon successful login.
* @global string $action The action that brought the visitor to the login page.
*
* @param string $title Optional. WordPress login Page title to display in the `<title>`
element.
* Default 'Log In'.
* @param string $message Optional. Message to display in header. Default empty.
* @param WP_Error $wp_error Optional. The error to pass. Default is a WP_Error instance.
*/
function login_header( $title = 'Log In', $message = '', $wp_error = null ) {
global $error, $interim_login, $action;
39
// Don't index any of these forms.
add_action( 'login_head', 'wp_sensitive_page_meta' );
if ( ! is_wp_error( $wp_error ) ) {
$wp_error = new WP_Error();
}
// Shake it!
$shake_error_codes = array( 'empty_password', 'empty_email', 'invalid_email',
'invalidcombo', 'empty_username', 'invalid_username', 'incorrect_password',
'retrieve_password_email_failure' );
/**
* Filters the error codes array for shaking the login form.
*
* @since 3.0.0
*
* @param array $shake_error_codes Error codes that shake the login form.
*/
$shake_error_codes = apply_filters( 'shake_error_codes', $shake_error_codes );
/* translators: Login screen title. 1: Login screen name, 2: Network or site name. */
$login_title = sprintf( __( '%1$s ‹ %2$s — WordPress' ), $title,
$login_title );
if ( wp_is_recovery_mode() ) {
/* translators: %s: Login screen title. */
$login_title = sprintf( __( 'Recovery Mode — %s' ), $login_title );
}
/**
* Filters the title tag content for login page.
*
* @since 4.9.0
*
* @param string $login_title The page title, with extra context added.
* @param string $title The original page title.
*/
$login_title = apply_filters( 'login_title', $login_title, $title );
?><!DOCTYPE html>
<!--[if IE 8]>
40
CHAPTER 8
TESTING
INTEGRATED TESTING –
41
The objective is to take unit tested components and build a program structure that has been
dictated by design .Integration testing is testing in which a group of components are
combined to produce output.
Integration testing is of four types: (i) Top down (ii) Bottom up (iii) Sandwich (iv) Big-Bang
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of
components is correct and consistent. Integration testing is specifically aimed at exposing the
problems that arise from the combination of components.
SYSTEM TESTING –
System testing ensures that the entire integrated software system meets requirements. It tests
a configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.
In this software is tested such that it works fine for different operating system .It is covered
under the black box testing technique. In this we just focus on required input and output
without focusing on internal working.
In this we have security testing, recovery testing , stress testing and performance testing.
PERFORMANCE TESTING –
It is designed to test the run-time performance of software within the context of an integrated
system . It is used to test speed and effectiveness of program.
ALPHA TESTING –
This is a type of validation testing .It is a type of acceptance testing which is done before the
product is released to customers. It is typically done by QA people.
BETA TESTING –
The beta test is conducted at one or more customer sites by the end-user of the software. This
version is released for the limited number of users for testing in real time environment
42
White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose.
Itis used to test areas that cannot be reached from a black box level.
ADVANTAGES:
Testing can be commenced at an earlier stage. One need not wait for the GUI to be
available.
Testing is more thorough, with the possibility of covering most paths.
Test objectives:-
All field entries must work properly.
Pages must be activated from the identified link.
The entry screen, messages and responses must not be delayed.
Features to be tested:-
Verify that the entries are of the correct format.
No duplicate entries should be allowed
All links should take the user to the correct page.
Test Results:-
43
All the test cases mentioned above passed successfully. No defects encountered.
Acceptance Testing:-
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.
44
CHAPTER 9
CONCLUSION AND
FUTURE SCOPE
9.1 CONCLUSION
Now-a-days everything is getting computerized. Manual work usually consumes a lot of time
and is error prone. To make complaining easy and manage crime records this application is
very helpful. Thus, Crime Management System overcomes most of the limitations of the
existing system along with being very user friendly application.
45
So the outcome of all the the hard work done for prison management system is here. It
is a software which helps the user to work with the prisons and crimes easily.
This software reduces the amount of manual data entry and gives greater efficiency.
The User Interface of it is very friendly and can be easily used by anyone.
It also decreases the amount of time taken to write FIR details and other modules.
All the details about any complaint, postmortem or any other criminal can be checked
and can be saved.
This Crime Management System is a solution to all the problems related to the crime
reports, postmortems, criminals details, their crime , their punishment and others etc.
At the end, we can say that this software is performing all the tasks accurately and is
doing the work for which it is made.
Apart from serving the primary purpose of digitizing the conventional manual system of
keeping records of FIRs and criminal records along with the evidences, the project can
further be extended to work on the following verticals in a more significant and effective
way.
A separate account can be created for the affected victims to function on their own
specific criminal cases and to check the status of the FIR filed.
A common FIR filing platform can be created for the general public incase a victim is
not able to reach the police station and a digital confirmation by the police department
can be sent on the phone itself.
46
Requests for police security and helpline contacts and services must be at disposal on
the site as the site can also serve as an emergency booth on the go.
A unique ID must be provided to all the registered users, and the ID should regularly
change and should be sent only on registered phones at the time of login, this adds
another layer of security to the system as the IDs have a chance of being hacked.
Digital signatures can also be added to the system at the time of login and logout,
automatic logout functioning at the end of a session will also add to the security of the
website.
47
REFERENCES :-
www.phptpoint.com
www.slideshare.net
www.w3school.com
www.geeksforgeeks.com
48