Professional Documents
Culture Documents
Chapter 1
INTRODUCTION
The project titled as “Online Crime File Reporter” is a web based application. This
software provides facility for reporting online crimes, complaints, show most wanted persons’
details etc. Any Number of clients can connect to the server. A web Server must be maintained
for temporary storage of complaints and query files for processing purpose. Each user first
User
Administrator
Review Panel
Station
In the existing system, most of the operations are done manually like send complaints,
taking actions against crimes, view status etc. So with the existing system if anybody wants to
complaint against crimes he must do it through the police. In this system, we can see the details
of particular information about the police stations in our state; the existing system has more
The existing system is time consuming and not very user friendly.
As we all know, a covered truth, Bribery plays an important role in the existing system.
Department of CS&E, Dr. MVSIT Page 1
Online Crime File Reporter
This system could provide only investigation and there is no Advocating, Counseling
Even an efficient officer cannot or may not able to handle more than one case at a time.
Evaluation requires monitoring crime before, during and after the initiative.
to look at the contribution and effectiveness of the organization within the public.
We need the whole hearted support of each and every individual member of the site and
cooperation of the users. The administrator, along with the investigators, lawyers, counselors
and other authorities are the partners in our organization. Given their key role in these
partnerships, we felt that an overview of strength and weakness of the organization is needed.
The aim of the project is to bring about improvement to the organization’s contributions.
To avoid conducting and unfair evaluation, it believes that partnership work is highly
beneficial to the organization and that partnership work is the way forward to reduce crime and
disorder.
The proposed system can overcome all the limitations of the existing system. The
existing system provides facilities for: Adding-Complaint, Crime report, Station, Panel and
Panel Member. View-Most wanted persons, Complaint status, and Crime status. Any Number of
clients can connect to the server. Each user first makes their login to sever to show their
availability. The server can be any Web Server. A web Server must be maintained for temporary
Chapter 2
LITERATURE SURVEY
Visual Studio includes a code editor supporting IntelliSense as well as code refactoring.
The integrated debugger works both as a source-level debugger and a machine-level debugger.
Other built-in tools include a forms designer for building GUI applications, web designer, class
designer, and database schema designer.
A Database Management System is a set of programs that enables you to store, modify,
and extract information from a database, it also provides users with tools to add, delete, access,
modify, and analyze data stored in one location. A group can access the data by using query and
reporting tools that are part of the DBMS or by using application programs specifically written to
access the data. DBMS’s also provide the method for maintaining the integrity of stored data,
running security and users’ access, and recovering information if the system fails. The
information from a database can be presented in a variety of formats. Most DBMSs include a
report writer program that enables you to output data in the form of a report. Many DBMSs also
include a graphics component that enables you to output information in the form of graphs and
charts. It typically supports query languages, which are in fact high-level programming
languages, dedicated database languages that considerably simplify writing database application
programs. Database languages also simplify the database organization as well as retrieving and
presenting information from it. A DBMS provides facilities for controlling data access, enforcing
data integrity, managing concurrency control, and recovering the database after failures and
restoring it from backup files, as well as maintaining database security.
IIS
XML data being stored is verified against the schema. XML is converted to an internal binary
data type before being stored in the database. Specialized indexing methods were made available
for XML data. XML data is queried using XQuery; SQL Server 2005 added some extensions to
the T-SQL language to allow embedding XQuery queries in T-SQL. In addition, it also defines a
new extension to XQuery, called XML DML that allows query-based modifications to XML
data. SQL Server 2005 also allows a database server to be exposed over web services using
Tabular Data Stream (TDS) packets encapsulated within SOAP (protocol) requests. When the
data is accessed over web services, results are returned as XML.
C# is designed to work with Microsoft's .Net platform. Microsoft's aim is to facilitate the
exchange of information and services over the Web, and to enable developers to build highly
portable applications. C# simplifies programming through its use of Extensible Markup
Language (XML) and Simple Object Access Protocol (SOAP) which allow access to a
programming object or method without requiring the programmer to write additional code for
each step. Because programmers can build on existing code, rather than repeatedly duplicating it,
C# is expected to make it faster and less expensive to get new products and services to market.
2.1.6 HTML
Short for Hyper Text Markup Language, the authoring language used to create
documents on the World Wide Web. HTML is similar to SGML, although it is not a strict subset.
HTML defines the structure and layout of a Web document by using a variety of tags and
attributes.
HTML is the lingua franca for publishing hypertext on the World Wide Web. It is a non-
proprietary format based upon, and can be created and processed by a wide range of tools, from
simple plain text editors - you type it in from scratch - to sophisticated WYSIWYG authoring
tools. HTML uses tags such as <h1> and </h1> to structure text into headings, paragraphs, lists,
hypertext links etc. Here is a 10-minute guide for newcomers to HTML. W3C's statement of
direction for HTML is given on the HTML Activity Statement. See also the page on our work on
the next generation of Web forms, and the section on Web history.
Hyper Text Markup Language (HTML) is the main markup language for displaying
web pages and other information that can be displayed in a web browser.
HTML elements form the building blocks of all websites. HTML allows images and
objects to be embedded and can be used to create interactive forms. It provides a means to create
structured documents by denoting structural semantics for text such as headings, paragraphs,
lists, links, quotes and other items. It can embed scripts in languages such as JavaScript which
affect the behavior of HTML WebPages.
2.1.7 AJAX
Short for Asynchronous JavaScript And XML. It is a technique for creating fast and
dynamic web pages. AJAX allows web pages to be updated asynchronously by exchanging small
amounts of data with the server behind the scenes. This means that it is possible to update parts
of a web page, without reloading the whole page.
Examples of applications using AJAX: Google Maps, Gmail, YouTube, and Facebook tabs.
Uniform Resource Identifier (URI) and may be a web page, image, video or other piece of
content. Hyperlinks present in resources enable users easily to navigate their browsers to related
resources. A web browser can also be defined as an application software or program designed to
enable users to access, retrieve and view documents and other resources on the Internet.
Although browsers are primarily intended to use the World Wide Web, they can also be
used to access information provided by web servers in private networks or files in file systems.
The major web browsers are Chrome, Firefox, Internet Explorer, Opera, and Safari
The primary purpose of a web browser is to bring information resources to the user
("retrieval" or "fetching"), allow them to view the information ("display", "rendering"), and then
access other information ("navigation", "following links").
This process begins when the user inputs a Uniform Resource Locator (URL), for
example http://www.crimestation.org/, into the browser. The prefix of the URL, the Uniform
Resource Identifier or URI, determines how the URL will be interpreted. The most commonly
used kind of URI starts with http: and identifies a resource to be Retrieved over the Hypertext
Transfer Protocol (HTTP).[10] Many browsers also support a variety of other prefixes, such as
https: for HTTPS, ftp: for the File Transfer Protocol, and file: for local files. Prefixes that the
web browser cannot directly handle are often handed off to another application entirely. For
example, mailto: URIs are usually passed to the user's default e-mail application, and news: URIs
are passed to the user's default newsgroup reader.
Chapter 3
An SRS is unambiguous if and only if every requirement stated has one and only one
interpretation.
An SRS is verifiable if and only if the stated requirement is verifiable. A requirement is
verifiable if there is some cost effective process that can check whether final software meets the
requirement.
An SRS is modifiable if its structure and style are such that any necessary changes can be
made easily preserving completeness and consistency.
3.1 INTRODUCTION
3.1.1 Purpose of the requirements document
The main objective of this document is to illustrate the requirements of the project Online
Crime File Reporter. The document gives the detailed description of both the functional and non
functional requirements proposed by the client. The document is developed after a number of
consultations with the client and considering the complete requirement specifications of the
given project.
Not withstanding this drive and progress, the Panel believes that more fundamental
changes are needed. It hopes that the recommendation made in this report will assist in
changing the culture around partnership.
User: They login at the client level and get access to their account. They can view their profile.
They can also have permission to change their password. But they cannot delete another user
account or make modification.
Review Panel: They are a team of experienced members. They can review and process all the
incoming complaints. They can also have permission to approve a newly entered station by the
administrator.
Station: Once the Complaint is approved from review panel, the complaint will be forwarded to
the appropriate station. The station will assign the police for immediate investigation. They can
release the final report for a complaint.
3.2.4 Constraints
The user has to verify his/her identity using Phone number, Driving License, PAN or
Voter ID before he/she can register.
The user must be at least 18 years of age.
Each district must have at least one Review Panel Member assigned.
Each Station must be under the authorization of a Review Panel.
The existing system is completely dependent on the user to perform all the duties.
Chapter 4
SYSTEM DESIGN
4.1 INTRODUCTION
System design is the process or art of defining the architecture, components, modules,
interfaces, and data for a system to satisfy specified requirements. The design activity begins
when the requirements document for software to be developed is available, this may be the
software requirements specification for the complete system. Design is the first step in the
development phase of any engineered product or system. The goal of the design process is to
produce a model or representation of a system. The design phase is a transition from a user
oriented document to a document oriented to the programmers.
This chapter deals with the modeling of our GPRS Based Home Automation System. It
covers the design process of our project. First we need to understand the most basic concept
necessary to create database. Some basic component such as entity, entity types, attributes,
relationships ER diagrams etc. are given much importance. We mainly categorized this design
into two parts i.e. Abstract design and Detailed design. In Abstract design, we will give simple
data flow diagram of our application. In Detailed design, ER diagram are discussed with
necessary database structure.
Username
and
password Username and password
Log in Register
Admin
StateID
DistrictID StationID Add
Add
Delete/
Add Add criminal
Reject Add station
complaint district city records
state
Username
and
password
Log in
User Register
View Search
station criminal Lodge
FIR
Get criminal
records
Username
and
password Log in
Panel Register
View
complaint Process
complaint
FIR
Approve or
Reject
Username
and
password
Login
Station Register
Approved Assign
Complaint Police
Generate
Report
Panel
The first step in a development effort is to analyze the description of the system and
produce a model of system’s requirements. A use case diagram depicts a static view of the
system functions and their static relationship both with external entities and with one and
another.
It consists of:
System: The system is depicted as rectangle.
Actor: Each actor is shown as a stick figure.
Use case: Each use case shown as a solid-bordered oval labeled with the name of the use case.
Entities:
It is a basic object that the ER model represents, like the entities we have considered are
Criminal, Station, FIR, Review, Member, CriminalStation, Register, CityMaster, StateMaster,
and DistrictMaster.
Attributes:
They are the particular properties that describe an entity. Considering Review entity,
attributes are PanelID, PName.
Relationships:
Can lodge, Contains, Belongs to, Reviews, And Has.
Chapter 5
SYSTEM IMPLEMENTATION
Implementation is the stage where the theoretical design is converted into a working
system. Implementation of the enterprise mailing system is done using SQL server, ASP.Net.
Implementation is the carrying out, execution, or practice of a plan, a method, or any design for
doing something. Implementation is the action that must follow any preliminary thinking in order
for something to actually happen. Implementation means making a change work.
ds = dl.GetDataSet(Qstr);
if (ds.Tables[0].Rows.Count > 0)
{
Session["uname"] = username.Text;
Response.Redirect("RComplaint.aspx");
}
else
{
Qstr = " select * from Station where SName= '" + username.Text + "' and
SPassword= '" + password.Text + "'";
ds = dl.GetDataSet(Qstr);
if (ds.Tables[0].Rows.Count > 0)
{
Session["sname"] = username.Text;
Response.Redirect("FinReview.aspx");
}
else
{
string strMsg = "Invalid Username/Password!";
string script = "<script language='javascript' type=\"text/javascript\">alert('" +
strMsg + "');</script>";
Response.Write(script);
}}}}}}
{
Session["flag"] = 0;
}
String qstr1 = "Select UEmail from Register where UEmail='" + UEmail.Text + "'";
DataSet ds = new DataSet();
ds = dl.GetDataSet(qstr1);
if (ds.Tables[0].Rows.Count > 0)
{
Label2.Text = "Email already exists!! Try Again!!";
Label2.Visible = true;
}
else
{
if (Session["flag"].ToString() == "1")
{
String qstr = null;
qstr = "insert into
Register(UName,UGender,UAddress,UPhone,UEmail,UPassword,UFather,UDOB,UNationality,
UPassport,UOccupation)values('" + UName.Text + "','" + UGender.Text + "','" + UAddress.Text
+ "','" + UPhone.Text + "','" + UEmail.Text + "','" + UPassword.Text + "','" + UFather.Text + "','"
+ UDOB.Text + "','" + UNationality.Text + "','" + UPassport.Text + "','" + UOccupation.Text +
"')";
DataLayer dl1 = new DataLayer();
dl1.DmlCmd(qstr);
Session["uname"] = UEmail.Text;
Response.Redirect("UserHome.aspx");
}
else { Label3.Text = "Please Verify Yourself!!"; }
}
}
myRequest.Credentials = CredentialCache.DefaultCredentials;
HttpWebResponse webResponse = (HttpWebResponse)myRequest.GetResponse();
SourceStream = webResponse.GetResponseStream();
StreamReader reader = new StreamReader(webResponse.GetResponseStream());
string str = reader.ReadLine();
return (str);
}
catch (Exception ex)
{
return (ex.Message.ToString());
}
}
Once the user is registered with his E-mail ID and password, he can view the complaint
based on the complaint number.
protected void Button1_Click1(object sender, EventArgs e)
{
String qstr = null;
DataSet ds = new DataSet();
qstr = "select * from FIR where FIRID='" + Complaint.Text + "'";
ds = dl.GetDataSet(qstr);
DetailsView1.DataSource = ds;
DetailsView1.DataMember = "table";
DetailsView1.DataBind();
}
{
if (FileUpload1.HasFile)
{
FileUpload1.SaveAs(Server.MapPath("imgs\\" + FileUpload1.FileName));
}
String qstr = null;
qstr = "insert into Criminal(CName,CAge,CGender,CLocation,CHeight,CWeight,CCrimes,
CModeOfOperation,CDescription,CImage,AreaID)values('" + CName.Text + "','" +
CAge.Text + "','" + CGender.Text + "','" + CLocation.Text + "','" + CHeight.Text + "','" +
CWeight.Text + "','" + CCrimes.Text + "','" + CModeOfOperation.Text + "','" +
CDescription.Text + "','" + FileUpload1.FileName + "','" + Area.SelectedValue + "')";
DataLayer dl = new DataLayer();
dl.DmlCmd(qstr);
}
GridView1.RenderControl(hw);
StringReader sr = new StringReader(sw.ToString());
Document pdfDoc = new Document(PageSize.A4, 10f, 10f, 10f, 10f);
HTMLWorker htmlparser = new HTMLWorker(pdfDoc);
PdfWriter.GetInstance(pdfDoc, Response.OutputStream);
iTextSharp.text.Image mine =
iTextSharp.text.Image.GetInstance("C:/Users/JD/Desktop/project/TEST –
Copy/imgs/header.jpg");
mine.ScaleAbsoluteHeight(100f);
mine.ScaleAbsoluteWidth(570f);
pdfDoc.Open();
pdfDoc.Add(mine);
htmlparser.Parse(sr);
pdfDoc.Close();
Response.Write(pdfDoc);
Response.End();
}
Assign Police
"';";
dl.DmlCmd(qstr);
Response.Redirect("Default3.aspx");
}
Chapter 6
TESTING
Testing is intended to be used throughout the coding and testing phases of the project.
This document outlines the procedure used for testing and verification of the code. Software
testing is the process used to help identify the correctness, completeness, security and quality of
developed computer software. This includes the process of executing the program or application
with the intent of finding errors.
Testing is the phase where the errors remaining from all the previous phases must be
detected. During testing the program to be tested is executed with a set of test cases and the
output of the program for the test cases is evaluated to determine if the program is performing as
expected. The exact nature of the error is not usually decided by testing. Testing forms the first
Department of CS&E, Dr. MVSIT Page 49
Online Crime File Reporter
step in determining the errors in a program. Testing of the large system is complex activity and
like any other complex activity it has to be broken into smaller activities.
The testing phase consists of evaluating the software that has been developed in order to
conform that it produces the output required in a safe and efficient manner. In this phase inherent
errors that occur, have to be handled and the user should be informed so that he/she can follow
the guidelines and instructions and around the error and obtain the output.
Testing is usually of two types i.e. black box or functional testing and white or structural
testing. In black box testing, the structure of the program is not considered. Test cases are
decided solely on the basis of the requirements or specification of the program or module, and
the program are not considered for selection of test cases. The opposite of a black box is a
system where the inner components or logic are available for inspection (such as a free
software/open source program) which is known as white box testing.
Testing forms the first step in determining the errors in a program. Clearly the success of
testing in revealing errors in programs depends critically on the test cases. Because code is the
only product that can be executed and whose actual behavior can be observed, testing is the
phase where the errors remaining from all the previous phases must be detected.
After the system is put together, the system testing is performed. Here the system is
tested against the system requirements to see if all the requirements are met and if the system
performs as specified by the requirements eg: A hard disk with minimum 1 GB available space
for installation.
the system. These tests are often pre-specified by the customer and given to the team to run
before attempting to deliver the product. The customer reserves the right to refuse delivery of the
software if the acceptance test cases do not pass. However, customers are not trained software
testers. Customers generally do not specify a “complete” set of acceptance test cases. Their test
cases are no substitute for creating your own set of functional/system test cases.
Chapter 7
SNAPSHOTS
FUTURE SCOPE
CONCLUSION
The Software is made user friendly to the maximum so that any lay man can run the
software provided he could access to the system via the login password.
It believes that partnership work is highly beneficial to the organization and that
partnership work is the way forward to reduce crime and disorder
Hence, we wish to remind that its culture should fully endorse partnership work; we urge
to ensure the attention they require.
BIBLIOGRAPHY
[1] Bill Evjen, Scott Hanselman, Devin Rader, Professional ASP.net 3.5: in c# and VB,
Dream tech Press, 2007.
[2] Ian Somerville, Software Engineering, Pearson Education, 8th Edition, 2007.
[3] Jeffery R.Shapiro, Microsoft SQL Server 2005- Complete Reference, Mcgraw
Hill Publishers, 2006.
[4] Bill Hamilton, Programming SQL Server, O’Reilley Publications, 2006.
[5] www.microsoft.com/office/preview/ecmwhitepaper.mspx
[6] www.w3schools.com