You are on page 1of 57

Online Crime File Reporter

Chapter 1

INTRODUCTION

The project titled as “Online Crime File Reporter” is a web based application. This

software provides facility for reporting online crimes, complaints, show most wanted persons’

details etc. Any Number of clients can connect to the server. A web Server must be maintained

for temporary storage of complaints and query files for processing purpose. Each user first

registers with the server for reporting crimes.

The main modules in this project are:

 User

 Administrator

 Review Panel

 Station

1.1 EXISTING SYSTEM

In the existing system, most of the operations are done manually like send complaints,

taking actions against crimes, view status etc. So with the existing system if anybody wants to

complaint against crimes he must do it through the police. In this system, we can see the details

of particular information about the police stations in our state; the existing system has more

workload for the authorized person.

Drawbacks of Existing System

 More man power.

 The existing system is time consuming and not very user friendly.

 As we all know, a covered truth, Bribery plays an important role in the existing system.
Department of CS&E, Dr. MVSIT Page 1
Online Crime File Reporter

 Consumes large volume of pare work.

 No direct role for the higher officials.

 This system could provide only investigation and there is no Advocating, Counseling

facilities etc. hence no contact or control or co-ordination on this cell.

 Even an efficient officer cannot or may not able to handle more than one case at a time.

 Evaluation requires monitoring crime before, during and after the initiative.

1.2 PROPOSED SYSTEM

In the proposed system, a ‘committee’ is responsible for performance monitoring decided

to look at the contribution and effectiveness of the organization within the public.

We need the whole hearted support of each and every individual member of the site and

cooperation of the users. The administrator, along with the investigators, lawyers, counselors

and other authorities are the partners in our organization. Given their key role in these

partnerships, we felt that an overview of strength and weakness of the organization is needed.

The aim of the project is to bring about improvement to the organization’s contributions.

To avoid conducting and unfair evaluation, it believes that partnership work is highly

beneficial to the organization and that partnership work is the way forward to reduce crime and

disorder.

The proposed system can overcome all the limitations of the existing system. The

existing system provides facilities for: Adding-Complaint, Crime report, Station, Panel and

Panel Member. View-Most wanted persons, Complaint status, and Crime status. Any Number of

clients can connect to the server. Each user first makes their login to sever to show their

Department of CS&E, Dr. MVSIT Page 2


Online Crime File Reporter

availability. The server can be any Web Server. A web Server must be maintained for temporary

storage of complaints and query files for processing purpose.

Department of CS&E, Dr. MVSIT Page 3


Online Crime File Reporter

Chapter 2
LITERATURE SURVEY

2.1 INTRODUCTION TO DEVELOPMENT TOOLS


The system has developed in ASP.NET as front end and SQL server 2005 as back end.

2.1.1 Microsoft Visual Studio 2010


Microsoft Visual Studio is an Integrated Development Environment (IDE) from
Microsoft. It is used to develop console and graphical user interface applications along with
Windows Forms applications, web sites, web applications, and web services in both native code
together with managed code for all platforms supported by Microsoft Windows, Windows
Mobile, Windows CE, .NET Framework, .NET Compact Framework and Microsoft Silverlight.

Visual Studio includes a code editor supporting IntelliSense as well as code refactoring.
The integrated debugger works both as a source-level debugger and a machine-level debugger.
Other built-in tools include a forms designer for building GUI applications, web designer, class
designer, and database schema designer.

Visual Studio supports different programming languages by means of language services,


which allow the code editor and debugger to support nearly any programming language,
provided a language-specific service exists. Built-in languages include C/ (via Visual C++),
VB.NET (via Visual Basic .NET), C# (via Visual C#), and F# (as of Visual Studio 2010).
Support for other languages such as M, Python, and Ruby among others is available via language
services installed separately. It also supports XML/XSLT, HTML/XHTML, JavaScript and CSS.
Individual language-specific versions of Visual Studio also exist which provide more limited
language services to the user: Microsoft Visual Basic, Visual J#, Visual C#, and Visual C++.

2.1.2 Introduction to Database Management System (DBMS)

A Database Management System is a set of programs that enables you to store, modify,
and extract information from a database, it also provides users with tools to add, delete, access,
modify, and analyze data stored in one location. A group can access the data by using query and

Department of CS&E, Dr. MVSIT Page 4


Online Crime File Reporter

reporting tools that are part of the DBMS or by using application programs specifically written to
access the data. DBMS’s also provide the method for maintaining the integrity of stored data,
running security and users’ access, and recovering information if the system fails. The
information from a database can be presented in a variety of formats. Most DBMSs include a
report writer program that enables you to output data in the form of a report. Many DBMSs also
include a graphics component that enables you to output information in the form of graphs and
charts. It typically supports query languages, which are in fact high-level programming
languages, dedicated database languages that considerably simplify writing database application
programs. Database languages also simplify the database organization as well as retrieving and
presenting information from it. A DBMS provides facilities for controlling data access, enforcing
data integrity, managing concurrency control, and recovering the database after failures and
restoring it from backup files, as well as maintaining database security.

2.1.3 ASP.NET (Active Server Pages.net)


ASP.NET is a free technology that allows programmers to create dynamic web
applications.ASP.NET can be used to create anything from small, personal websites through to
large, enterprise-class web applications. ASP.NET is the latest version of Microsoft's Active
Server Pages technology (ASP).ASP.NET is a part of the Microsoft .NET framework, and a
powerful tool for creating dynamic and interactive web pages. All we need to get started with
ASP.NET is the free .NET Framework and the free Visual Web Developer.
ASP is a server side scripting technology that enables scripts (embedded in web pages) to
be executed by an Internet server.

Department of CS&E, Dr. MVSIT Page 5


Online Crime File Reporter

IIS

Fig 2.1.3 ASP.NET Architecture

            As the illustration shows, all Web Administrators communicate


with ASP.NET applications through IIS. IIS deciphers and optionally authenticates the request.
If Anonymous is turned on, no authentication occurs. IIS also finds the requested resource (such
as an ASP.NET application), and, if the client is authorized returns the appropriate resource.

             In addition to the built-in ASP.NET security features, an ASP.NET application can use


the low-level security features of the .NET Framework.

2.1.4 Microsoft SQL Server 2008


Microsoft SQL Server is a relational database management system developed by
Microsoft. As a database, it is a software product whose primary function is to store and retrieve
data as requested by other software applications, be it those on the same computer or those
running on another computer across a network (including the Internet). Its primary query
languages are T-SQL and ANSI SQL.
SQL Server included native support for managing XML data, in addition to relational
data. For this purpose, it defined an xml data type that could be used either as a data type in
database columns or as literals in queries. XML columns can be associated with XSD schemas;

Department of CS&E, Dr. MVSIT Page 6


Online Crime File Reporter

XML data being stored is verified against the schema. XML is converted to an internal binary
data type before being stored in the database. Specialized indexing methods were made available
for XML data. XML data is queried using XQuery; SQL Server 2005 added some extensions to
the T-SQL language to allow embedding XQuery queries in T-SQL. In addition, it also defines a
new extension to XQuery, called XML DML that allows query-based modifications to XML
data. SQL Server 2005 also allows a database server to be exposed over web services using
Tabular Data Stream (TDS) packets encapsulated within SOAP (protocol) requests. When the
data is accessed over web services, results are returned as XML.

2.1.5 Visual C# Programming Language


C#(C Sharp) an object-oriented programming language from Microsoft and ECMA that
is based on C++ with elements from Visual Basic and Java. Like Java, C# provides automatic
garbage collection, whereas traditional C and C++ do not. C# was created by Microsoft and also
standardized by the European Computer Manufacturers Association (ECMA). Microsoft
designed C# as its flagship programming language for the .NET environment
C# combines the computing power of C++ with the programming ease of Visual Basic.
C# is based on C++ and contains features similar to those of Java.

C# is designed to work with Microsoft's .Net platform. Microsoft's aim is to facilitate the
exchange of information and services over the Web, and to enable developers to build highly
portable applications. C# simplifies programming through its use of Extensible Markup
Language (XML) and Simple Object Access Protocol (SOAP) which allow access to a
programming object or method without requiring the programmer to write additional code for
each step. Because programmers can build on existing code, rather than repeatedly duplicating it,
C# is expected to make it faster and less expensive to get new products and services to market.

2.1.6 HTML

Short for Hyper Text Markup Language, the authoring language used to create
documents on the World Wide Web. HTML is similar to SGML, although it is not a strict subset.
HTML defines the structure and layout of a Web document by using a variety of tags and
attributes.

HTML is the lingua franca for publishing hypertext on the World Wide Web. It is a non-

Department of CS&E, Dr. MVSIT Page 7


Online Crime File Reporter

proprietary format based upon, and can be created and processed by a wide range of tools, from
simple plain text editors - you type it in from scratch - to sophisticated WYSIWYG authoring
tools. HTML uses tags such as <h1> and </h1> to structure text into headings, paragraphs, lists,
hypertext links etc. Here is a 10-minute guide for newcomers to HTML. W3C's statement of
direction for HTML is given on the HTML Activity Statement. See also the page on our work on
the next generation of Web forms, and the section on Web history.

Hyper Text Markup Language (HTML) is the main markup language for displaying
web pages and other information that can be displayed in a web browser.

HTML elements form the building blocks of all websites. HTML allows images and
objects to be embedded and can be used to create interactive forms. It provides a means to create
structured documents by denoting structural semantics for text such as headings, paragraphs,
lists, links, quotes and other items. It can embed scripts in languages such as JavaScript which
affect the behavior of HTML WebPages.

2.1.7 AJAX

Short for Asynchronous JavaScript And XML. It is a technique for creating fast and
dynamic web pages. AJAX allows web pages to be updated asynchronously by exchanging small
amounts of data with the server behind the scenes. This means that it is possible to update parts
of a web page, without reloading the whole page.

AJAX is based on internet standards, and uses a combination of:

 XMLHttpRequest object (to exchange data asynchronously with a server)


 JavaScript/DOM (to display/interact with the information)
 CSS (to style the data)
 XML (often used as the format for transferring data)

Examples of applications using AJAX: Google Maps, Gmail, YouTube, and Facebook tabs.

2.1.8 Web Browser

A web browser is a software application for retrieving, presenting and traversing


information resources on the World Wide Web. An information resource is identified by a

Department of CS&E, Dr. MVSIT Page 8


Online Crime File Reporter

Uniform Resource Identifier (URI) and may be a web page, image, video or other piece of
content. Hyperlinks present in resources enable users easily to navigate their browsers to related
resources. A web browser can also be defined as an application software or program designed to
enable users to access, retrieve and view documents and other resources on the Internet.
Although browsers are primarily intended to use the World Wide Web, they can also be
used to access information provided by web servers in private networks or files in file systems.
The major web browsers are Chrome, Firefox, Internet Explorer, Opera, and Safari
The primary purpose of a web browser is to bring information resources to the user
("retrieval" or "fetching"), allow them to view the information ("display", "rendering"), and then
access other information ("navigation", "following links").
This process begins when the user inputs a Uniform Resource Locator (URL), for
example http://www.crimestation.org/, into the browser. The prefix of the URL, the Uniform
Resource Identifier or URI, determines how the URL will be interpreted. The most commonly
used kind of URI starts with http: and identifies a resource to be Retrieved over the Hypertext
Transfer Protocol (HTTP).[10] Many browsers also support a variety of other prefixes, such as
https: for HTTPS, ftp: for the File Transfer Protocol, and file: for local files. Prefixes that the
web browser cannot directly handle are often handed off to another application entirely. For
example, mailto: URIs are usually passed to the user's default e-mail application, and news: URIs
are passed to the user's default newsgroup reader.

2.1.9 Internet Information Services


Internet Information Services (IIS) formerly called Internet Information Server is a
web server software application and set of feature extension modules created by Microsoft for
use with Microsoft Windows. IIS 7.5 supports HTTP, HTTPS, FTP, FTPS, SMTP and NNTP. It
is an integral part of the Windows Server family of products (and their client counterparts in the
cases of Windows NT 4.0 and Windows 2000), as well as certain editions of Windows XP,
Windows Vista and Windows 7. IIS is not turned on by default when Windows is installed. The
IIS Manager is accessed through the Microsoft Management Console or Administrative Tools in
the Control Panel.
All versions of IIS prior to 7.0 running on client operating systems supported only 10
simultaneous connections and a single web site.

Department of CS&E, Dr. MVSIT Page 9


Online Crime File Reporter

Chapter 3

SYSTEM REQUIREMENTS ANALYSIS


AND SPECIFICATION

A Software Requirement Specification (SRS) is a complete description of the behavior of


the system to be developed. SRS is a document that completely describes what the proposed
software should do without describing how the software will do it. It is two-way policy that
assures that both the client and the organization understand the requirements at any given point
of time.
SRS document itself is precise and it provides the functions and capabilities of a system
that it should provide. It acts as blueprint for completing a project such that it is a cost effective.
It provides feedback to customer. The basic purpose of SRS is to bridge the communication gap
between the parties involved in the development of the software. SRS is the medium through
which the client and user needs are accurately specified. An SRS is customer assurance that the
development organization understands the issues or the problems to be solved and the software
behavior necessary to address those problems.
It serves as an input to design specification. It also serves as the parent document to the
subsequent document. Therefore, the SRS should be easy to understand and also should contain
sufficient details in the system requirements so that a design solution can be devised easily.
SRS should have certain properties. A good SRS is:
 Correct
 Complete
 Unambiguous
 Verifiable
 Modifiable

An SRS is correct if every requirement included in this document represents something


that is required in the final system.
An SRS is complete if the responses of the software to all classes of input data are
specified in the SRS.

Department of CS&E, Dr. MVSIT Page 10


Online Crime File Reporter

An SRS is unambiguous if and only if every requirement stated has one and only one
interpretation.
An SRS is verifiable if and only if the stated requirement is verifiable. A requirement is
verifiable if there is some cost effective process that can check whether final software meets the
requirement.
An SRS is modifiable if its structure and style are such that any necessary changes can be
made easily preserving completeness and consistency.

3.1 INTRODUCTION
3.1.1 Purpose of the requirements document
The main objective of this document is to illustrate the requirements of the project Online
Crime File Reporter. The document gives the detailed description of both the functional and non
functional requirements proposed by the client. The document is developed after a number of
consultations with the client and considering the complete requirement specifications of the
given project.

3.1.2 Scope of the product


The various Future Enhancement which shall include in this software are:
 We look forward to working with the Government in implementing the
recommendations and seeing an improvement in the effectiveness of the
organization
 The method of video conferencing can be added to make the project more lively
 An intercom facility will add a little more flexible communication between the
Master and Branch in Charge, Master and Members, etc.

Not withstanding this drive and progress, the Panel believes that more fundamental
changes are needed. It hopes that the recommendation made in this report will assist in
changing the culture around partnership.

Department of CS&E, Dr. MVSIT Page 11


Online Crime File Reporter

3.1.3 Definition, Acronyms, Abbreviations


Definitions:
Software requirement specification: It establishes the basis for agreement between developers
and users on what all the software product is expected to do, as well as what it is not expected to
do.
Validation: It is the process of checking a certain criterion.
Interoperability: The ability of two or more systems or components to exchange information
and to use the information that has been exchanged.

3.1.4 System overview


Initially, databases of all the police stations and their authorizing review panel members
must be maintained. When a user logs in with his E-mail ID and password, the user can report
the compliant. The reported compliant will be forwarded to the appropriate review panel. Review
panel is responsible for approving or rejecting the complaints. Once it is approved by the review
panel, the report is forwarded to the station for immediate investigation.

3.2 OVERALL DESCRIPTION


3.2.1 Product perspective
When a user is reporting a complaint through his account his details will be stored in the
database. Registered users are given permission to view, update and withdraw the details.

3.2.2 Product Functions


1. Create user
2. Create review panel
3. Add station for reporting
4. Update user details
5. Add criminal
6. Report crime
7. User verification
8. View report status
9. Generate crime report

Department of CS&E, Dr. MVSIT Page 12


Online Crime File Reporter

3.2.3 User characteristics


Administrator: They are the core users and are able to add new user’s station, review panels,
and their members to the system and permit them to access the account when given authorization
by the administrator, and can delete any existing operator or modify their details. They can also
view in real time what a user is performing right away.

User: They login at the client level and get access to their account. They can view their profile.
They can also have permission to change their password. But they cannot delete another user
account or make modification.

Review Panel: They are a team of experienced members. They can review and process all the
incoming complaints. They can also have permission to approve a newly entered station by the
administrator.

Station: Once the Complaint is approved from review panel, the complaint will be forwarded to
the appropriate station. The station will assign the police for immediate investigation. They can
release the final report for a complaint.

3.2.4 Constraints
 The user has to verify his/her identity using Phone number, Driving License, PAN or
Voter ID before he/she can register.
 The user must be at least 18 years of age.
 Each district must have at least one Review Panel Member assigned.
 Each Station must be under the authorization of a Review Panel.

3.2.5 Assumptions and dependencies


 Each User must have an E-mail ID and Password.
 Each Admin must have a Username and Password.
 Each Review panel must have a Username and Password.
 Each Station must have a Station name and Password.
 There is only one Administrator.
Department of CS&E, Dr. MVSIT Page 13
Online Crime File Reporter

 LAN or Wireless LAN connection is a must.


 Proper browsers should be installed.

3.3 SPECIFIC REQUIREMENTS


3.3.1 Functional requirements
Functional requirements specify which outputs should be produced from the given inputs.
They describe the relationship between the input and output of the system. For each functional
requirement, a detailed description of all the data input and their source, the units of measure and
range of valid input are given.
This subsection describes the various processes provided by the system.

3.3.1.1 User Login


Introduction: This process will verify the user name and password.
Input: Enter the user name and password.
Output: Displays User homepage.
Processing: It will verify the user name and password from database.

3.3.1.2 Creating New User


Introduction: New user creation.
Input: User Details along with voter ID or phone number or PAN or driving license.
Output: New user details get stored in the database.
Processing: Verifies the identification details entered by the user.

3.3.1.3 Reporting Crime


Introduction: Crime reporting.
Input: FIR Details.
Output: FIR submitted appropriate Review Panel and stored in database.
Processing: Verifies if FIR Number exists in the database.

3.3.1.4 View FIR Status


Introduction: FIR status viewing.

Department of CS&E, Dr. MVSIT Page 14


Online Crime File Reporter

Input: FIR ID.


Output: Ongoing status of FIR.
Processing: Verifies if FIR ID exists in the database.
3.3.1.5 Update FIR
Introduction: Updating FIR.
Input: FIR ID with updation details.
Output: Updated FIR.
Processing: Verifies FIR ID from the database.

3.3.1.6 View Criminal


Introduction: Searching for Criminal.
Input: Select Area.
Output: Criminal details.
Processing: Look for search phrase in the database.

3.3.1.7 Withdraw Complaint


Introduction: Withdrawing Complaint
Input: FIR ID.
Output: FIR withdraw list submitted to Review Panel.
Processing: Verifies FIR ID from the database.

3.3.1.8 Admin Login


Introduction: This process will verify the user name and password.
Input: Enter the user name and password.
Output: Displays Admin homepage.
Processing: It will verify the user name and password from database.

3.3.1.9 Creating New Station


Introduction: New station creation.
Input: Station Details.
Output: Station Details gets stored in database.

Department of CS&E, Dr. MVSIT Page 15


Online Crime File Reporter

Processing: Verifies whether that particular station is already exist.

3.3.1.10 Add Criminal Details


Introduction: New criminal details addition.
Input: Criminal Details along with photo.
Output: New criminal Details gets stored in database.
Processing: Verifies whether the criminal already exists.

3.3.1.11 Creating New Review Panel


Introduction: New Review Panel creation.
Input: Enter Review Panel Details.
Output: New Review Panel Details gets stored in database.
Processing: Verifies whether Review Panel is already exists.

3.3.1.12 Review Panel Login


Introduction: This process will verify the user name and password.
Input: Enter the user name and password.
Output: Displays Review Panel homepage.
Processing: It will verify the user name and password from database.

3.3.1.13 Station Login


Introduction: This process will verify the user name and password.
Input: Enter the user name and password.
Output: Displays Station homepage.
Processing: It will verify the user name and password from database.

3.3.1.14 Generate Report


Introduction: This process will generate report in PDF format.
Input: Enter the FIR ID.
Output: Printable report.

Department of CS&E, Dr. MVSIT Page 16


Online Crime File Reporter

Processing: It will verify the FIR ID from database.

3.3.2 Nonfunctional Requirements


3.3.2.1 Hardware Requirement
 Processor : Intel Pentium (III) or higher
 512 MB RAM
 4 GB Hard Disk or more
 SVGA Color Monitor
 104 Keyboard
 Any modem

3.3.2.2 Software Requirements


 Operating System: Windows XP or above
 Languages: ASP, C#, HTML
 Front End/IDE: Microsoft Visual Studio 2008
 Platform: dot Net Framework 4.0
 Back End: MS SQL Server 2005
 Browser Program: Internet Explorer/Mozilla Firefox

3.3.3 Performance Requirements


Performance is measured in terms of the output provided by the application. Requirement
specification plays an important part in the analysis of a system. Only when the requirement
specifications are properly given, it is possible to design a system, which will fit into required
environment. It rests largely with the users of the existing system to give the requirement
specification because they are the people who finally use the system. This is because the
requirements have to be known during the initial stages so that the system can be design
according to those requirements. It is very difficult to change the system once it has been
designed and on the other hand design a system, which does not cater to the requirements of the
user, is of no use.
The requirements specification for any system can be broadly stated as given below:

Department of CS&E, Dr. MVSIT Page 17


Online Crime File Reporter

 The system should be able to interface with the existing system.


 The system should be accurate.
 The system should be better than the existing system.

The existing system is completely dependent on the user to perform all the duties.

Department of CS&E, Dr. MVSIT Page 18


Online Crime File Reporter

Chapter 4
SYSTEM DESIGN
4.1 INTRODUCTION
System design is the process or art of defining the architecture, components, modules,
interfaces, and data for a system to satisfy specified requirements. The design activity begins
when the requirements document for software to be developed is available, this may be the
software requirements specification for the complete system. Design is the first step in the
development phase of any engineered product or system. The goal of the design process is to
produce a model or representation of a system. The design phase is a transition from a user
oriented document to a document oriented to the programmers.
This chapter deals with the modeling of our GPRS Based Home Automation System. It
covers the design process of our project. First we need to understand the most basic concept
necessary to create database. Some basic component such as entity, entity types, attributes,
relationships ER diagrams etc. are given much importance. We mainly categorized this design
into two parts i.e. Abstract design and Detailed design. In Abstract design, we will give simple
data flow diagram of our application. In Detailed design, ER diagram are discussed with
necessary database structure.

4.2 HIGH LEVEL DESIGN


4.2.1 Data Flow Diagram
A data flow diagram is a graphical technique that depicts information flow. The functions
to be done by the system which are specified during the definition phase are functionally and
made clear using fully functional data flow diagrams.

Department of CS&E, Dr. MVSIT Page 19


Online Crime File Reporter

Fig 4.2.1: LEVEL 0 DFD

Department of CS&E, Dr. MVSIT Page 20


Online Crime File Reporter

Username
and
password Username and password
Log in Register
Admin

StateID
DistrictID StationID Add
Add
Delete/
Add Add criminal
Reject Add station
complaint district city records
state

FIR State District City Station Criminal

Get state Get district


ID ID

Fig 4.2.2: LEVEL 1 DFD

Department of CS&E, Dr. MVSIT Page 21


Online Crime File Reporter

Username
and
password
Log in
User Register

View Search
station criminal Lodge
FIR

Station Criminal FIR

Get criminal
records

Fig 4.2.3: LEVEL 2 DFD

Department of CS&E, Dr. MVSIT Page 22


Online Crime File Reporter

Username
and
password Log in
Panel Register

View
complaint Process
complaint

FIR
Approve or
Reject

Fig 4.2.4: LEVEL 3 DFD

Department of CS&E, Dr. MVSIT Page 23


Online Crime File Reporter

Username
and
password
Login
Station Register

Approved Assign
Complaint Police

Generate
Report

Panel

Fig 4.2.5: LEVEL 4 DFD

4.2.2 Use case Diagram

The first step in a development effort is to analyze the description of the system and
produce a model of system’s requirements. A use case diagram depicts a static view of the
system functions and their static relationship both with external entities and with one and
another.
It consists of:
System: The system is depicted as rectangle.
Actor: Each actor is shown as a stick figure.
Use case: Each use case shown as a solid-bordered oval labeled with the name of the use case.

Department of CS&E, Dr. MVSIT Page 24


Online Crime File Reporter

Fig 4.2.2.1: Use case diagram for User

Department of CS&E, Dr. MVSIT Page 25


Online Crime File Reporter

Fig 4.2.2.2: Use case diagram for Administrator

Department of CS&E, Dr. MVSIT Page 26


Online Crime File Reporter

Department of CS&E, Dr. MVSIT Page 27


Online Crime File Reporter

Fig 4.2.2.3: Use case diagram for Review Panel

Fig 4.2.2.4: Use case diagram for Station

4.3 USER INTERFACE DESIGN

4.3.1 Database design


Designing data about discovering and completely defining application’s data
characteristics and processes. Data design is a process of gradual refinement, from the coarse to
the precise data structures and processes that provide it. The process of data design includes
identifying the data, defining specific data type and storage mechanisms, and ensuring data
integrity by using business rules and other run-time enforcement mechanisms.

Department of CS&E, Dr. MVSIT Page 28


Online Crime File Reporter

Table 4.1: Table name: Register

Table 4.2: Table name: Criminal

Table 4.3: Table name: Admin

Department of CS&E, Dr. MVSIT Page 29


Online Crime File Reporter

Table 4.4: Table name: FIR

Department of CS&E, Dr. MVSIT Page 30


Online Crime File Reporter

Table 4.5: Table name: FIR Update

Department of CS&E, Dr. MVSIT Page 31


Online Crime File Reporter

Table 4.6: Table name: Member

Table 4.7: Table name: Review

Table 4.8: Table name: Station

Table 4.9: Table name: CriminalStation

Department of CS&E, Dr. MVSIT Page 32


Online Crime File Reporter

Table 4.10: Table name: DistrictMaster

Table 4.11: Table name: StateMaster

Table 4.12: Table name: CityMaster

Table 4.13: Table name: Withdraw

4.3.2 E-R Diagram


An entity-relationship diagram is a way of graphically representing the logical
relationships of entities in order to create a database.

Entities:

Department of CS&E, Dr. MVSIT Page 33


Online Crime File Reporter

It is a basic object that the ER model represents, like the entities we have considered are
Criminal, Station, FIR, Review, Member, CriminalStation, Register, CityMaster, StateMaster,
and DistrictMaster.

Attributes:
They are the particular properties that describe an entity. Considering Review entity,
attributes are PanelID, PName.

Relationships:
Can lodge, Contains, Belongs to, Reviews, And Has.

Chapter 5
SYSTEM IMPLEMENTATION
Implementation is the stage where the theoretical design is converted into a working
system. Implementation of the enterprise mailing system is done using SQL server, ASP.Net.
Implementation is the carrying out, execution, or practice of a plan, a method, or any design for
doing something. Implementation is the action that must follow any preliminary thinking in order
for something to actually happen. Implementation means making a change work.

5.1 USER MODULES:


Department of CS&E, Dr. MVSIT Page 34
Online Crime File Reporter

5.1.1 Login Module


This module is used for the user, to login and register. User enters his E-mail and password. If
the E-mail and password matches then the E-mail and user type is stored in session variable and
then he can login.

protected void Button1_Click(object sender, EventArgs e)


{
string Qstr = " select * from Register where UEmail= '" + username.Text + "' and
UPassword= '" + password.Text + "'";
DataSet ds = new DataSet();
ds = dl.GetDataSet(Qstr);
if (ds.Tables[0].Rows.Count > 0)
{
Session["uname"] = username.Text;
//String qstr = "select UAddress, UPhone, UFather, UOccupation, UFullName from
Register where UEmail='"+username.Text+"' ";
//String s= Session["uname"].ToString()
Response.Redirect("UserHome.aspx");
}
else
{
Qstr = " select * from Admin where Admin= '" + username.Text + "' and Password= '" +
password.Text + "'";
ds = dl.GetDataSet(Qstr);
if (ds.Tables[0].Rows.Count > 0)
{
Response.Redirect("AdminHome.aspx");
}
else
{
Qstr = " select * from Member where MUName= '" + username.Text + "' and
Password= '" + password.Text + "'";

Department of CS&E, Dr. MVSIT Page 35


Online Crime File Reporter

ds = dl.GetDataSet(Qstr);
if (ds.Tables[0].Rows.Count > 0)
{
Session["uname"] = username.Text;
Response.Redirect("RComplaint.aspx");
}
else
{
Qstr = " select * from Station where SName= '" + username.Text + "' and
SPassword= '" + password.Text + "'";
ds = dl.GetDataSet(Qstr);
if (ds.Tables[0].Rows.Count > 0)
{
Session["sname"] = username.Text;
Response.Redirect("FinReview.aspx");
}
else
{
string strMsg = "Invalid Username/Password!";
string script = "<script language='javascript' type=\"text/javascript\">alert('" +
strMsg + "');</script>";
Response.Write(script);
}}}}}}

5.1.2 User Creation


Any new user has to register before login. User enters all his details along with his phone
number or voter ID or PAN or driving license number.

protected void Button1_Click(object sender, EventArgs e)


{
if (Session["flag"] == null)

Department of CS&E, Dr. MVSIT Page 36


Online Crime File Reporter

{
Session["flag"] = 0;
}
String qstr1 = "Select UEmail from Register where UEmail='" + UEmail.Text + "'";
DataSet ds = new DataSet();
ds = dl.GetDataSet(qstr1);
if (ds.Tables[0].Rows.Count > 0)
{
Label2.Text = "Email already exists!! Try Again!!";
Label2.Visible = true;
}
else
{
if (Session["flag"].ToString() == "1")
{
String qstr = null;
qstr = "insert into
Register(UName,UGender,UAddress,UPhone,UEmail,UPassword,UFather,UDOB,UNationality,
UPassport,UOccupation)values('" + UName.Text + "','" + UGender.Text + "','" + UAddress.Text
+ "','" + UPhone.Text + "','" + UEmail.Text + "','" + UPassword.Text + "','" + UFather.Text + "','"
+ UDOB.Text + "','" + UNationality.Text + "','" + UPassport.Text + "','" + UOccupation.Text +
"')";
DataLayer dl1 = new DataLayer();
dl1.DmlCmd(qstr);
Session["uname"] = UEmail.Text;
Response.Redirect("UserHome.aspx");

}
else { Label3.Text = "Please Verify Yourself!!"; }
}
}

Department of CS&E, Dr. MVSIT Page 37


Online Crime File Reporter

5.1.3 Generate SMS


This is used in verification process. After the user logs in with his email and password
next step is he has to enter the code that has been sent to his mobile. After that he can add
compliant, view compliant, view criminals.

public String sendSms(String message, String mobile)


{
message = message.Replace(" ", "+");
string connectionString = "http://s1.freesmsapi.com/bulksms/send?skey
=401e8d10152946f1a8190f7d642f8cde&message=" + message + "&mobile=" + mobile;
try
{
System.IO.Stream SourceStream = null;
System.Net.HttpWebRequest myRequest = (HttpWebRequest)
WebRequest.Create(connectionString);

myRequest.Credentials = CredentialCache.DefaultCredentials;
HttpWebResponse webResponse = (HttpWebResponse)myRequest.GetResponse();
SourceStream = webResponse.GetResponseStream();
StreamReader reader = new StreamReader(webResponse.GetResponseStream());
string str = reader.ReadLine();
return (str);
}
catch (Exception ex)
{
return (ex.Message.ToString());
}
}

5.1.4 View complaint

Department of CS&E, Dr. MVSIT Page 38


Online Crime File Reporter

Once the user is registered with his E-mail ID and password, he can view the complaint
based on the complaint number.
protected void Button1_Click1(object sender, EventArgs e)
{
String qstr = null;
DataSet ds = new DataSet();
qstr = "select * from FIR where FIRID='" + Complaint.Text + "'";
ds = dl.GetDataSet(qstr);
DetailsView1.DataSource = ds;
DetailsView1.DataMember = "table";
DetailsView1.DataBind();
}

5.1.5 Withdraw complaint


Once the complaint is added by the user, the complaint will be withdrawn based on
FIRID and withdrawal reason.
protected void Button1_Click1(object sender, EventArgs e)
{
DataLayer dl = new DataLayer();
String qstr2 = null;
qstr2 = "select * from FIR where WithDrawFlag='false' and FIRID='" + CNumber.Text + "'
and UName='"+Session["uname"].ToString()+"'";
ds = dl.GetDataSet(qstr2);
if (ds.Tables[0].Rows.Count > 0 && ds.Tables[0].Rows[0]["Status"].ToString() !=
"UnRead")
{
String qstr = null;
qstr = "insert into Withdraw(FIRID,Reason)values('" + CNumber.Text + "','" +
Withdraw.Text + "')";
dl.DmlCmd(qstr);
String qstr1 = null;

Department of CS&E, Dr. MVSIT Page 39


Online Crime File Reporter

DataLayer dl1 = new DataLayer();


qstr1 = "update FIR set WithdrawFlag='true' where FIRID='" + CNumber.Text + "'";
dl1.DmlCmd(qstr1);
Response.Redirect("UserHome.aspx");
}
else Label1.Text = "Complaint Not Approved Yet!";
}
}

5.1.6 Update complaint


Once the complaint is added by the user, the complaint can be update based on FIRID
and update details.
protected void Button1_Click(object sender, EventArgs e)
{
DataLayer dl = new DataLayer();
DateTime dt = Convert.ToDateTime(DateTime.Now);
String qstr = null;
qstr = "insert into FIRUpdates(FIRID,Date,UpdateDetails,UpdatedBy)values
('" + CNumber.Text + "','" + dt.ToString("MM/dd/yyyy") + "','" + Update.Text + "','"
+ Session["uname"].ToString() + "')";
dl.DmlCmd(qstr);
String qstr1 = null;
DataLayer dl1 = new DataLayer();
qstr1 = "update FIR set UpdateFlag='true' where FIRID='" + CNumber.Text + "'";
dl1.DmlCmd(qstr1);
Response.Redirect("UserHome.aspx");
}
protected void CNumber_TextChanged(object sender, EventArgs e)
{
DataLayer dl = new DataLayer();
String qstr2 = null;

Department of CS&E, Dr. MVSIT Page 40


Online Crime File Reporter

DataSet ds = new DataSet();


qstr2 = "select * from FIR where FIRID='" + CNumber.Text + "' and UName='"
+ Session["uname"].ToString() + "'";
ds = dl.GetDataSet(qstr2);
if (ds.Tables[0].Rows.Count > 0 && ds.Tables[0].Rows[0]["Status"].ToString() !=
"Withdrawn" && ds.Tables[0].Rows[0]["Status"].ToString() != "Rejected" &&
ds.Tables[0].Rows[0]["Status"].ToString() != "UnRead")
{
String qstr = null;
qstr = "select * from FIRUpdates where FIRID='" + CNumber.Text + "'";
ds = dl.GetDataSet(qstr);
GridView1.DataSource = ds;
GridView1.DataMember = "table";
GridView1.DataBind();
GridView1.Visible = true;
Button1.Visible = true;
String qstr1 = null;
DataLayer dl1 = new DataLayer();
qstr1 = "update FIR set UserUpdateFlag='No' where FIRID='" + CNumber.Text + "'";
dl1.DmlCmd(qstr1);
}
else { GridView1.Visible = false; Label1.Text = "Invalid FIR!"; Button1.Visible = false; }
}
}

5.2 ADMIN MODULES

5.2.1 Add Criminal


Admin logs in with his E-mail and password, and admin adds station, adds panel, adds
panel member and he deletes the fields based on FIRID. All details are stored in the database.

protected void Button1_Click(object sender, EventArgs e)

Department of CS&E, Dr. MVSIT Page 41


Online Crime File Reporter

{
if (FileUpload1.HasFile)
{
FileUpload1.SaveAs(Server.MapPath("imgs\\" + FileUpload1.FileName));
}
String qstr = null;
qstr = "insert into Criminal(CName,CAge,CGender,CLocation,CHeight,CWeight,CCrimes,
CModeOfOperation,CDescription,CImage,AreaID)values('" + CName.Text + "','" +
CAge.Text + "','" + CGender.Text + "','" + CLocation.Text + "','" + CHeight.Text + "','" +
CWeight.Text + "','" + CCrimes.Text + "','" + CModeOfOperation.Text + "','" +
CDescription.Text + "','" + FileUpload1.FileName + "','" + Area.SelectedValue + "')";
DataLayer dl = new DataLayer();
dl.DmlCmd(qstr);
}

5.2.2 Add State


Only admin or station has given permission to access this page can enter the new state
accordingly, district and area to the database. Admin can delete the station. The entered states,
district and area are displayed in the list box.
protected void Button1_Click(object sender, EventArgs e)
{
String qstr = null;
qstr = "insert into StateMaster(StateName)values('" + StateName.Text + "')";
DataLayer dl = new DataLayer();
dl.DmlCmd(qstr);
}

5.2.3 Add District


Only admin or station has given permission to access this page can enter the new district
to the database. Admin can delete the district. The entered districts are displayed in the list box.

Department of CS&E, Dr. MVSIT Page 42


Online Crime File Reporter

protected void Button2_Click(object sender, EventArgs e)


{
String qstr = null;
qstr = "insert into DistrictMaster(DistrictName,StateID)values('" + DistrictName.Text + "',"
+ State.SelectedValue + ")";
DataLayer dl = new DataLayer();
dl.DmlCmd(qstr);
}

5.2.4 Add Area


Only admin or station has given permission to access this page can enter the new area to
the database. The entered areas are displayed in the list box. First admin has to select the state,
then select the district from the dropdown list and then enter the area. Admin can delete the area.

protected void Button3_Click(object sender, EventArgs e)


{
String qstr = null;
qstr = "insert into CityMaster(AreaName,DistrictID)values('" + AreaName.Text + "'," +
District.SelectedValue + ")";
DataLayer dl = new DataLayer();
dl.DmlCmd(qstr);
}

5.2.5 Add Station


Only admin or station has given permission to access this page can enter the new Station
to the database. First admin has to select the state, then select the district from the dropdown list
and then enter the Station Details along with a password.
protected void Button5_Click(object sender, EventArgs e)
{
DataLayer dl1 = new DataLayer();
String q = null;

Department of CS&E, Dr. MVSIT Page 43


Online Crime File Reporter

q = "select * from CityMaster where AreaName='"+ AreaName.Text +"'";


DataSet ds = new DataSet();
ds = dl1.GetDataSet(q);
String qstr = null;
qstr = "insert into Station(AreaID,SName,SHead,SMember,SPhone,SPassword)values
('" + ds.Tables[0].Rows[0]["AreaID"].ToString() + "','" + AreaName.Text + "','" +
SHead.Text + "','" + SMember.Text + "','" + SPhone.Text + "','"+SPassword.Text+"')";
DataLayer dl = new DataLayer();
dl.DmlCmd(qstr);
Panel1.Visible = true;
Button7_ModalPopupExtender.Enabled = true;
Button7_ModalPopupExtender.Show();
}

5.2.6 Add Panel


Admin can add the number of members and authorizing area to the particular state.
Admin can delete the panel. All the details stored in the database.

protected void Button1_Click(object sender, EventArgs e)


{
String qstr = null;
qstr = "insert into Review(PName,PMember)values('" + District.SelectedItem.Text + "','"
+ PMember.Text + "')";
DataLayer dl = new DataLayer();
dl.DmlCmd(qstr);
}

5.2.7 Add Panel Member


Admin logs in with his E-mail ID and password, and admin assigns the panel member
based on the state. Admin only gives the E-mail ID and password to the member. Admin can
delete the panel members. All the details stored in the database.

Department of CS&E, Dr. MVSIT Page 44


Online Crime File Reporter

protected void Button1_Click(object sender, EventArgs e)


{
String qstr = null;
qstr = "insert into Member(MName,PName,MAddress,MCity,MAge,MGender,
MDescription,Password,MUName,MPhone)values('" + MName.Text + "','" +
District.SelectedItem.Text + "','" + MAddress.Text + "','" + MCity.Text + "','" +
MAge.Text + "','" + MGender.Text + "','" + MDescription.Text + "','" + password.Text +
"','" + MUName.Text + "','"+MPhone.Text+"')";
DataLayer dl = new DataLayer();
dl.DmlCmd(qstr);
Panel1.Visible = true;
Button1_ModalPopupExtender.Enabled = true;
Button1_ModalPopupExtender.Show();
}

5.3 REVIEW PANEL MODULES


5.3.1 Review complaint
Review panel members can approve or reject the complaint and put the section for
approved complaint.
protected void Page_Load(object sender, EventArgs e)
{
String qstr = null;
DataSet ds = new DataSet();
qstr = "select * from FIR where FIRID='" + Session["fir"].ToString() + "'";
ds = dl.GetDataSet(qstr);
DetailsView1.DataSource = ds;
DetailsView1.DataMember = "table";
DetailsView1.DataBind();
String qstr1 = "select * from CityMaster where
DistrictName='"+Session["pname"].ToString()+"'";

Department of CS&E, Dr. MVSIT Page 45


Online Crime File Reporter

DataSet ds1 = new DataSet();


ds1 = dl.GetDataSet(qstr1);
CStation.DataSource = ds1;
CStation.DataTextField = "AreaName";
CStation.DataValueField = "AreaID";
CStation.DataBind();
CStation.Items.Insert(0, ds.Tables[0].Rows[0]["SName"].ToString());
}
protected void Button2_Click(object sender, EventArgs e)
{
String qstr = null;
DataSet ds = new DataSet();
qstr = "update FIR set Status='" + Approve.SelectedItem.Text + "' where FIRID='"
+Session["fir"].ToString() + "';";
dl.DmlCmd(qstr);
qstr = "update FIR set SName='" + CStation.SelectedItem.Text + "' where FIRID='"
+ Session["fir"].ToString() + "';";
dl.DmlCmd(qstr);
qstr = "update FIR set AreaID='" + CStation.SelectedValue + "' where FIRID='"
+ Session["fir"].ToString() + "';";
dl.DmlCmd(qstr);
qstr = "update FIR set IsRead='Yes' where FIRID='" + Session["fir"].ToString() + "';";
dl.DmlCmd(qstr);
qstr = "update FIR set Section='" + Section.Text + "' where FIRID='" +
Session["fir"].ToString() + "';";
dl.DmlCmd(qstr);
qstr = "update FIR set ReviewedBy='" + Session["mname"].ToString() + "' where FIRID='"
+ Session["fir"].ToString() + "';";
dl.DmlCmd(qstr);
Response.Redirect("RComplaint.aspx");
}

Department of CS&E, Dr. MVSIT Page 46


Online Crime File Reporter

5.3.3 View FIR


The review panel member can view the FIR once it is registered by the user. These panel
members approve or reject the complaint.

protected void Button1_Click1(object sender, EventArgs e)


{
String qstr = null;
DataSet ds = new DataSet();
qstr = "select * from FIR where FIRID='" + Complaint.Text + "'";
ds = dl.GetDataSet(qstr);
DetailsView1.DataSource = ds;
DetailsView1.DataMember = "table";
DetailsView1.DataBind();
}

5.3 STATION MODULES


5.3.1 Generate Report
Once the complaint is approved by Review panel that will be forwarded to station. The
station member can take a print out of complaint details in the PDF format based on FIR ID

protected void Button4_Click(object sender, EventArgs e)


{
Response.ContentType = "application/pdf";
Response.AddHeader("content-disposition", "attachment;filename=FIR-" + TextBox1.Text
+ ".pdf");
Response.Cache.SetCacheability(HttpCacheability.NoCache);
StringWriter sw = new StringWriter();
HtmlTextWriter hw = new HtmlTextWriter(sw);
GridView1.AllowPaging = false;
FillGrid();

Department of CS&E, Dr. MVSIT Page 47


Online Crime File Reporter

GridView1.RenderControl(hw);
StringReader sr = new StringReader(sw.ToString());
Document pdfDoc = new Document(PageSize.A4, 10f, 10f, 10f, 10f);
HTMLWorker htmlparser = new HTMLWorker(pdfDoc);
PdfWriter.GetInstance(pdfDoc, Response.OutputStream);
iTextSharp.text.Image mine =
iTextSharp.text.Image.GetInstance("C:/Users/JD/Desktop/project/TEST –
Copy/imgs/header.jpg");
mine.ScaleAbsoluteHeight(100f);
mine.ScaleAbsoluteWidth(570f);
pdfDoc.Open();
pdfDoc.Add(mine);
htmlparser.Parse(sr);
pdfDoc.Close();
Response.Write(pdfDoc);
Response.End();
}

Assign Police

protected void Button2_Click(object sender, EventArgs e)


{
String qstr = null;
DataSet ds = new DataSet();
qstr = "update FIR set HandledBy='" + police.Text + "' where FIRID='" +
Session["fir"].ToString() + "';";
dl.DmlCmd(qstr);
qstr = "update FIR set Status='Investigating' where FIRID='" + Session["fir"].ToString() +

Department of CS&E, Dr. MVSIT Page 48


Online Crime File Reporter

"';";
dl.DmlCmd(qstr);
Response.Redirect("Default3.aspx");
}

Chapter 6
TESTING
Testing is intended to be used throughout the coding and testing phases of the project.
This document outlines the procedure used for testing and verification of the code. Software
testing is the process used to help identify the correctness, completeness, security and quality of
developed computer software. This includes the process of executing the program or application
with the intent of finding errors.
Testing is the phase where the errors remaining from all the previous phases must be
detected. During testing the program to be tested is executed with a set of test cases and the
output of the program for the test cases is evaluated to determine if the program is performing as
expected. The exact nature of the error is not usually decided by testing. Testing forms the first
Department of CS&E, Dr. MVSIT Page 49
Online Crime File Reporter

step in determining the errors in a program. Testing of the large system is complex activity and
like any other complex activity it has to be broken into smaller activities.
The testing phase consists of evaluating the software that has been developed in order to
conform that it produces the output required in a safe and efficient manner. In this phase inherent
errors that occur, have to be handled and the user should be informed so that he/she can follow
the guidelines and instructions and around the error and obtain the output.
Testing is usually of two types i.e. black box or functional testing and white or structural
testing. In black box testing, the structure of the program is not considered. Test cases are
decided solely on the basis of the requirements or specification of the program or module, and
the program are not considered for selection of test cases. The opposite of a black box is a
system where the inner components or logic are available for inspection (such as a free
software/open source program) which is known as white box testing.
Testing forms the first step in determining the errors in a program. Clearly the success of
testing in revealing errors in programs depends critically on the test cases. Because code is the
only product that can be executed and whose actual behavior can be observed, testing is the
phase where the errors remaining from all the previous phases must be detected.

6.1 UNIT TESTING


The starting point of the testing is unit testing where a module is tested separately and is
often performed by the coder himself simultaneously along with the coding of the module.
Unit testing comprises the set of test performed by an individual programmer prior to the
integration of units into a large system. A program unit is usually small enough that the
programmer who developed it can test in great detail. Unit testing focuses first on the modules to
locate errors. Their errors are verified and corrected so that unit perfectly fits to the project. Unit
testing is generally done within a class or a component.

6.2 INTEGRATE TESTING


The modules are gradually integrated into sub systems, and integration testing is
performed to detect design errors by focusing on testing the inter connection between modules.

6.3 SYSTEM TESTING


Department of CS&E, Dr. MVSIT Page 50
Online Crime File Reporter

After the system is put together, the system testing is performed. Here the system is
tested against the system requirements to see if all the requirements are met and if the system
performs as specified by the requirements eg: A hard disk with minimum 1 GB available space
for installation.

6.3.1 Validation testing


The process of evaluating a system or component during or at the end of the development
process to determine whether it satisfies specified requirements. At the end of development
validation (the second V) activities are used to evaluate whether the features that have been built
into the software satisfy the customer requirements and are traceable to customer requirements.
For ex: we validate that when a player lands on “Free Parking” they get all the money that was
collected.

6.3.2 Black box testing


Black box testing enables a software engineer to drive set of input conditions that will
exercise all the functional requirements for the program. Black testing is not an alternative to
white box testing techniques; rather, it is a complementary approach that is likely to uncover
different class errors.

6.3.3 White box testing


Knowing the internal working of a product, tests can conducted to ensure that the internal
operation is according to the specifications and all the internal components are adequately
exercised. In other words, the focus is on structural correctness. Hence it is also called structural
testing.

6.4 ACCEPTANCE TESTING


Acceptance testing is performed to demonstrate to the client, on real-life data of the
client, the operation of the system. The final output of the testing phase is the test result and error
report.
Acceptance testing is formal testing conducted to determine whether or not a system
satisfies its acceptance criteria and to enable the customer to determine whether or not to accept

Department of CS&E, Dr. MVSIT Page 51


Online Crime File Reporter

the system. These tests are often pre-specified by the customer and given to the team to run
before attempting to deliver the product. The customer reserves the right to refuse delivery of the
software if the acceptance test cases do not pass. However, customers are not trained software
testers. Customers generally do not specify a “complete” set of acceptance test cases. Their test
cases are no substitute for creating your own set of functional/system test cases.

6.5 TEST CASES

6.5.1 Testing for Login Page

Test case Input Test description Test Result

1 Password entered Valid password need Invalid E-mail and


to be entered password

6.5.2 Testing for Forgot Password

Test case Input Test description Test Result

1 Enter E-mail in E- Valid E-mail need to Invalid E-mail and


mail field be entered Valid E-mail

6.5.3 Testing for User Registration


Test case Input Test description Test Result

1 Enter Driver License Valid Driver License Driver License


number number need to be number does not
entered match or already used
Enter Phone Number Valid Phone number Confirmation code
need to be entered does not match
Enter PAN Number Valid PAN number PAN number does not
need to be entered match or already used
Enter Voter ID Valid Voter ID need Voter ID does not
to be entered match or already used
2 Enter E-mail Valid E-mail needs to E-mail already in use
be entered
3 Enter Password Valid Password need Password should be
to be entered minimum 6 character

Department of CS&E, Dr. MVSIT Page 52


Online Crime File Reporter

Enter Re-Password Valid Password need Re-Password does not


to be entered match with Password

Department of CS&E, Dr. MVSIT Page 53


Online Crime File Reporter

Chapter 7
SNAPSHOTS

Department of CS&E, Dr. MVSIT Page 54


Online Crime File Reporter

FUTURE SCOPE

Department of CS&E, Dr. MVSIT Page 55


Online Crime File Reporter

CONCLUSION

The Software developed is found to be working efficiently and effectively. It results in


regular and timely action against crime reported. It can be observed that the information can be
obtained easily and accurately.

The Software is made user friendly to the maximum so that any lay man can run the
software provided he could access to the system via the login password.

It believes that partnership work is highly beneficial to the organization and that
partnership work is the way forward to reduce crime and disorder

Hence, we wish to remind that its culture should fully endorse partnership work; we urge
to ensure the attention they require.

Department of CS&E, Dr. MVSIT Page 56


Online Crime File Reporter

BIBLIOGRAPHY

[1] Bill Evjen, Scott Hanselman, Devin Rader, Professional ASP.net 3.5: in c# and VB,
Dream tech Press, 2007.
[2] Ian Somerville, Software Engineering, Pearson Education, 8th Edition, 2007.
[3] Jeffery R.Shapiro, Microsoft SQL Server 2005- Complete Reference, Mcgraw
Hill Publishers, 2006.
[4] Bill Hamilton, Programming SQL Server, O’Reilley Publications, 2006.
[5] www.microsoft.com/office/preview/ecmwhitepaper.mspx
[6] www.w3schools.com

Department of CS&E, Dr. MVSIT Page 57

You might also like