You are on page 1of 54

Table of Contents

ABSTRACT

1.INTRODUCTION

2.SYSTEM ANALYSIS
2.1 Existing System

2.2 Proposed System

2.3 Feasibility Study

3. SYSTEM SPECIFICATION
3.1 Hardware Requirements

3.2 Software Requirements

3.3 Language Specification

4. SYSTEM DESIGN
4.1 Module Description

4.2 Table Design

4.3 System Flow Diagram

4.4 Data Flow Diagram

4.5 Use Case Diagram

4.6 Interaction Diagram

5. IMPLEMENTATION & TESTING


5.1 Result & Discussion

5.2 Testing

6. CONCLUSION

7.REFERENCES & APPENDIX (CODE & SCREENSHOT)


ABSTRACT

A disaster information management system, called Disaster Management System, was


developed for providing timely and targeted information to people in difficult environments.
Disaster Management System uses mobile services to acquire real-time information about users
and their surroundings, and constructs service agents (servants) to provide active services for
mobile users. Additionally, Disaster Management System summarizes the content of several
disasters which have been posted on various platforms with pictures to increase awareness about
the events. To perform their functions, the servants frequently invoke a set of intelligent services
from Disaster Management System which can access public services from government and other
organizations. The system has been successfully tested in several disaster drills, and is now being
applied for managing various disasters.
CHAPTER 1 – INTRODUCTION

Disaster Management System can be defined as the organization and management of


resources and responsibilities for dealing with all humanitarian aspects of emergencies, in
particular, preparedness, response and recovery in order to lessen the impact of disasters. It
means that all such measures should be taken so that hazard cannot take the form of disaster.
Since we cannot prevent the coming of many natural hazards but can reduce their harmful effects
through proper management, so that the loss of life and property can be minimized. As we know,
the present dangers is not from the natural disasters, but are the human disasters. Disasters are
the consequences of natural or human hazards. Therefore, through disaster management, we can
prevent hazards from being turned into a disaster. Disaster management broadly encompasses the
management before, during and after a disaster. It simply means planning of various steps to
reduce the aftermath of a disaster, planning effective response system, planning rehabilitation
and also preparing disaster resilient communities in our very own layman language.

The National Disaster Management Authority (NDMA), headed by the Prime Minister of
India, is the apex body for Disaster Management in India. Setting up of NDMA and the creation
of an enabling environment for institutional mechanisms at the State and District levels is
mandated by the Disaster Management Act, 2005.

1.1. Objectives
1) To present the architectural structure and working mechanism of Disaster Management
System, this can provide guidance and assistance for the construction of similar service-based
systems.
2) To propose an efficient heuristic algorithm for service request scheduling, this is
crucial to the success of the system and can be useful for many other service scheduling
problems.
3) To present simulation results and real-world applications of the system, the lessons
learned from which can benefit both the system developers and the disaster managers.
4) To maintain the summarized content of any particular disaster with lot of pictures
posted by different means.
1.2. STATEMENT OF THE PROBLEM

As it has being observed that the conventional method used in preparing and managing disaster
report has resulted to the following problems:

1. Unavailability of Report as at when needed.

2. Longer time involved in preparing disaster report.

3. Inability to access disaster report anytime and anywhere.

4. Time consuming and costly to produce reports.

5. Lack of security.

6. Duplication of data entry.

1.3 AIM AND OBJECTIVE

The aim of this project work is to design an online disaster report management system for
NEMA.

The objectives are:

1. Developing a web page that enable Search and rescue

2. Policy and strategy

3. Information, education and prevention

4. Administration, finance and logistics

5. Relief and rehabilitation

6. Research and planning

1.4 SIGNIFICANCE OF THE STUDY

1. To prevent disaster report from being eating up by rodents

2. To enable Search and rescue


3. To enhance the availability of Information.

4. To enable the detection of better strategies to prevent future occurrence.

1.5 . SCOPE AND DELIMITATION OF THE STUDY

The scope of this research work is strictly on the design of an online disaster report management
system.

This study is limited to the body mentioned above because of:

1. Time limit for the project

2. Limited fund

3. Limited data available to the research

4. Inconsistency and unstable power supply.

1.6 DEFINITION OF TERMS

1. REPORT: an account given of a particular matter, especially in the form of an official


document, after thorough investigation or consideration by an appointed person or body.
2 DISASTER: A disaster is a sudden, calamitous event that seriously disrupts the functioning
of a community or society and causes human, material, and economic or environmental
losses that exceed the community's or society's ability to cope using its own resources.

3 INTERNET: a global computer network providing a variety of information and


communication facilities, consisting of interconnected networks using standardized
communication protocols.

4 PHP: (recursive acronym for PHP: Hypertext Pre-processor) is a widely-used open source
general-purpose scripting language that is especially suited for web development and can be
embedded into HTML.

5 HTML: Hypertext Mark-up Language, a standardized system for tagging text files to
achieve font, colour, graphic, and hyperlink effects on World Wide Web pages.

6 PHOTOSHOP: A graphic designing application


7 SERVER: A specific application called a web server will be responsible for communicating
with the browser.

8 SQL: Structured Query Language, basically used in querying the database to retrieve,
updates, and review database.

9 WEB: This is an acronym of world wide web.

10 WEBBASED: Is any program that is accessed over a network connection, rather than
existing or quitting within a devices memory.

11 WEBSITE: A website is a collection of information about a particular topic or subject.

12 WINDOW: An operating system.

1.6. POSSIBLE TECHNIQUES

The disaster report management system will be designed in such a way that the
information will be accessible online through the internet by uploading all the necessary
documents, the report will be automatically processed online . HTML, CSS, and some JavaScript
for the front end to make the application interactive; in the backend, PHP will be used to create a
connection between the application portal and the MySQL database.

2.3 TOOLS AND PROGRAMING LANGUAGE FOR DOING THE PROJECT

i. Window 7 operating system


ii. Cascading style sheets(css)
iii. Structural query language( mySQL)
iv. Hypertext Markup Language(HTML5)
v. Hypertext pre-processor(PHP)
vi. AJAX
vii. Computer system
viii. Hard disk size 40GB and above
ix. Processor speed of 1.6GHZ and above
x. RAM size of 512MB and above
2.4 METHOD AND PLANNING OF THE PROJECT

The method used in planning this project is the waterfall model. This model is a linear sequential
design approach for software development, in which progress flows in one direction downward
like water waterfall.

For this project the system runs through the phase of conception, initiation, analysis, design,
testing, deployment and maintenance.

REQUIREMENT
PRODUCT

DESIGN

IMPLEMENTATION

VERIFICATION

MAINTENANCE

Chapter-2-SYSTEM ANALYSIS
2.1 Existing System
A lot of weakness are associated with the existing system, involves the use of
traditional method . The system has proved defective as the objective of the system has also
failed. Among the weakness associated with the existing system include the following:

 Unavailability of Report as at when needed.

 Longer time involved in preparing disaster report.

 Inability to access disaster report anytime and anywhere.

 Time consuming and costly to produce reports.

 Lack of security.

 Duplication of data entry.

 Its manual process for earlier system.

 Need for more resources.

 Its chance to lose our life.

2.2 Proposed System


The proposed system will be designed to replace the existing system to enable importer
apply for their road worthiness certificate online without undergoing much stress. HTML,
CSS, and some JavaScript for the front end to make the application interactive; in the
backend, PHP will be used to create a connection between the registration portal and the
MySQL database.

 The query will be sent immediately.


 After view admin for this query post solution for escape details also.
 User can registered their account and post their queries for disaster time.
 Public can also post their queries and view solution for rescue without register and login.
 People can get to know the detailed study of the disaster.

2.3. Feasibility Study


What is A Disaster?

A disaster is a natural or man-made (or technological) hazard resulting in an event of substantial


extent causing significant physical damage or destruction, loss of life, or drastic change to
the environment. A disaster can beostensively defined as any tragic event stemming from events
such as earthquakes, floods, catastrophic accidents,fires WAES, or explosions. It is a
phenomenon that can cause damage to life and property and destroy the economic, social and
cultural life of people.

In contemporary academia, disasters are seen as the consequence of inappropriately managed


risk. These risks are the product of a combination of both hazard/s and vulnerability. Hazards
that strike in areas with low vulnerability will never become disasters, as is the case in
uninhabited regions.

Developing countries suffer the greatest costs when a disaster hits – more than 95 percent of all
deaths caused by disasters occur in developing countries, and losses due to natural disasters are
20 times greater (as a percentage of GDP) in developing countries than in industrialized
countries.

Types of DISASTERS

There is no country that is immune from disaster, though vulnerability to disaster varies. There
are four main types of disaster.

 Natural disasters. These disasters include floods, hurricanes, earthquakes and volcano
eruptions that can have immediate impacts on human health, as well as secondary impacts
causing further death and suffering from floods causing landslides, earthquakes resulting in
fires, tsunamis causing widespread flooding and typhoons sinking ferries

 Environmental emergencies. These emergencies include technological or industrial


accidents, usually involving hazardous material, and occur where these materials are
produced, used or transported. Large forest fires are generally included in this definition
because they tend to be caused by humans.
 Complex emergencies. These emergencies involve a break-down of authority, looting and
attacks on strategic installations. Complex emergencies include conflict situations and war.

 Pandemic emergencies. These emergencies involve a sudden onset of a contagious disease


that affects health but also disrupts services and businesses, bringing economic and social
costs.

What is Disaster Management?


Disaster management (or emergency management) is the discipline of avoiding and
dealing with both natural and man-made disasters. It involves preparedness, response and
recovery plans made in order to lessen the impact of disasters.

Preparedness training may be done by private citizens, as by the Federal Emergency


Management Agency (FEMA) in the United States.

All aspects of disaster management deal with the processes used to protect populations or
organizations from the consequences of disasters, wars and acts of terrorism. This can be seen
through government publications such as the National Strategy for Homeland Security which
detail how individuals and varying levels of government respond during the different phases of a
disaster.

Emergency management can be further defined as “the discipline and profession of applying
science, technology, planning and management to deal with extreme events that can injure or kill
large numbers of people, do extensive damage to property, and disrupt community life” (Drabek,
1991a, p. xvii).

An ‘emergency’ is ‘an unplanned event that can cause deaths or significant injuries to
employees, customers or the public; or that can shut down your business, disrupt operations,may
cause physical or environmental damage, or threaten the facility’s financial standing or public
image’ (FEMA, 1993).

Emergency events can include terrorist attacks, industrial sabotage, fire, natural disasters (such
as earthquakes, severe weather, etc.), public disorder, industrial accident, communications failure
and loss, or corruption of critical information. Some examples of catastrophic incidents are:
1. The 1995 Kobe, Japan, earthquake, which killed more than 6000 people and left another
30,000 injured.
2. The 1994 Northridge, California, earthquake, which resulted in approximately $33 billion
in damages.

These individual events are significant enough, but the losses are even more dramatic when
accumulated over time. Between 1989 and 1999, the average natural disaster loss in the US was
$1 billion each week.

Disaster management does not necessarily avert or eliminate the threats themselves, although the
study and prediction of the threats are an important part of the field. The basic levels of
emergency management also include the various kinds of search and rescue activity.

In simple words Disaster Management is

‘Disaster management can be defined as the organization and management of resources and
responsibilities for dealing with all humanitarian aspects of emergencies, in particular
preparedness, response and recovery in order to lessen the impact of disasters’.

COMPONENTS OF DISASTER MANAGEMENT

1. Preparedness:
It involves measure to insure that communities and services are capable of coping with
the effect of disaster.
Example of preparedness:
a. Community Awareness and Education
b. Proper warning system
c. Mutual Aid arrangement
d. Mock Drill, Training Practices

2. Disaster Response:
It involves measures taken in anticipation of during and immediately after a disaster to
ensure the effects are minimized.
Example of Response:
a. Implementing the Disaster Management Plan
b. Setting up Medical Camps and Mobilizing Resources
c. Providing adequate shelter and sanitary facilities

3. Disaster Recovery:
It involves measures, in which support emergency affected areas in reconstruction of the
physical infrastructure and restoration of economic and emotional well-being.

Examples of Recovery:
a. Counselling programmes for those who lost the near ones.
b. Restoring services like roads, communication link.
c. Providing Financial support employment
d. Reconstructing damaged buildings and surroundings

4. Reduction and mitigation:


It involves measures to reduce or eliminate the incidence of severity of disasters.
Chapter-3 - SYSTEM SPECIFICATION

3.1 System Specifications

Hardware Requirements:-
1. Computer system

2. Hard disk size 40GB and above

3. Processor speed of 1.6GHZ and above

4. RAM size of 512MB and above

5. Ups

6. Intel processor preferable

Software Requirements: -
1. Window 7 operating system

2. Cascading style sheets(css)

3. Structural query language( mySQL)

4. Hypertext Markup Language(HTML)

5. Hypertext preprocessor(PHP)

Front-End : HTML5, CSS3, and JS


Back-End : Angular JS, PHP 8.1, MYSQL
Tools: : xampp-win64-8.1
3.3. Language Specification

Introduction to Html Framework

HyperText Markup Language, commonly referred to as HTML, is the standard markup


language used to create web pages. Along with CSS, and JavaScript, HTML is a cornerstone
technology used to create web pages, as well as to create user interfaces for mobile and web
applications. Web browsers can read HTML files and render them into visible or audible web
pages. HTML describes the structure of a website semantically along with cues for presentation,
making it a markup language, rather than a programming language.

HTML elements form the building blocks of HTML pages. HTML allows images and other
objects to be embedded and it can be used to create interactive forms. It provides a means to
create structured documents by denoting structuralsemantics for text such as headings,
paragraphs, lists, links, quotes and other items. HTML elements are delineated bytags, written
using angle brackets. Tags such as <img /> and <input /> introduce content into the page
directly. Others such as <p>...</p> surround and provide information about document text and
may include other tags as sub-elements. Browsers do not display the HTML tags, but use them to
interpret the content of the page.

HTML can embed scripts written in languages such as JavaScript which affect the
behavior of HTML web pages. HTML markup can also refer the browser to Cascading Style
Sheets (CSS) to define the look and layout of text and other material

6.2 Cascading Style Sheets (CSS)

CSS is a style sheet language used for describing the presentation of a document written in
a markup language. Although most often used to set the visual style of web pages and user
interfaces written in HTML and XHTML, the language can be applied to any XML document,
including plain XML, SVG andXUL, and is applicable to rendering in speech, or on other media.
Along with HTML and JavaScript, CSS is a cornerstone technology used by most websites to
create visually engaging webpages, user interfaces for web applications, and user interfaces for
many mobile applications.

CSS is designed primarily to enable the separation of document content from document
presentation, including aspects such as the layout, colors, and fonts. This separation can improve
content accessibility, provide more flexibility and control in the specification of presentation
characteristics, enable multiple HTML pages to share formatting by specifying the relevant CSS
in a separate .css file, and reduce complexity and repetition in the structural content, such
as semantically insignificant tables that were widely used to format pages before consistent CSS
rendering was available in all major browsers. CSS makes it possible to separate presentation
instructions from the HTML content in a separate file or style section of the HTML file. For each
matching HTML element, it provides a list of formatting instructions. For example, a CSS rule
might specify that "all heading 1 elements should be bold", leaving pure semantic HTML
markup that asserts "this text is a level 1 heading" without formatting code such as a<bold> tag
indicating how such text should be displayed.

This separation of formatting and content makes it possible to present the same markup page in
different styles for different rendering methods, such as on-screen, in print, by voice (when read
out by a speech-based browser orscreen reader) and on Braille-based, tactile devices. It can also
be used to display the web page differently depending on the screen size or device on which it is
being viewed. Although the author of a web page typically links to a CSS file within the markup
file, readers can specify a different style sheet, such as a CSS file stored on their own computer,
to override the one the author has specified. If the author or the reader did not link the document
to a style sheet, the default style of the browser will be applied. Another advantage of CSS is that
aesthetic changes to the graphic design of a document (or hundreds of documents) can be applied
quickly and easily, by editing a few lines in one file, rather than by a laborious (and thus
expensive) process of crawling over every document line by line, changing markup.

The CSS specification describes a priority scheme to determine which style rules apply if more
than one rule matches against a particular element. In this so-called cascade, priorities
(or weights) are calculated and assigned to rules, so that the results are predictable.

6.3 MYSQL Server

MySQL is an open-source relational database management system (RDBMS);[6] in July


2013, it was the world's second most widely used RDBMS, and the most widely used open-
source client–server model RDBMS. It is named after co-founder Michael Widenius's daughter,
My. The SQL acronym stands for Structured Query Language. The MySQL development project
has made its source code available under the terms of the GNU General Public License, as well
as under a variety of proprietary agreements. MySQL was owned and sponsored by a single for-
profit firm, the Swedishcompany MySQL AB, now owned by Oracle Corporation. For
proprietary use, several paid editions are available, and offer additional functionality.

6.4 PHP

PHP is a server-side scripting language designed for web development but also used as
a general-purpose programming language. Originally created by Rasmus Lerdorf in 1994, the
PHP reference implementation is now produced by The PHP Group. PHP originally stood
for Personal Home Page, but it now stands for therecursive backronym PHP: Hypertext
Preprocessor.

PHP code may be embedded into HTML code, or it can be used in combination with
various web template systems, web content management system and web frameworks. PHP code
is usually processed by a PHPinterpreter implemented as a module in the web server or as
a Common Gateway Interface (CGI) executable. The web server combines the results of the
interpreted and executed PHP code, which may be any type of data, including images, with the
generated web page. PHP code may also be executed with a command-line interface(CLI) and
can be used to implement standalone graphical applications.

The standard PHP interpreter, powered by the Zend Engine, is free software released
under the PHP License. PHP has been widely ported and can be deployed on most web servers
on almost every operating system andplatform, free of charge.

The PHP language evolved without a written formal specification or standard until 2014,
leaving the canonical PHP interpreter as a de facto standard. Since 2014 work has gone on to
create a formal PHP specification.

6.5 ANGULAR JAVA SCRIPT

AngularJS (commonly referred to as "Angular" or "Angular.js") is an open-source web


application framework mainly maintained by Google and by a community of individuals and
corporations to address many of the challenges encountered in developing single-page
applications. It aims to simplify both the development and the testing of such applications by
providing a framework for client-side model–view–controller (MVC) and model–view–
viewmodel(MVVM) architectures, along with components commonly used in rich Internet
applications.
The AngularJS framework works by first reading the HTML page, which has embedded
into it additional custom tag attributes. Angular interprets those attributes as directives to bind
input or output parts of the page to a model that is represented by standard JavaScript variables.
The values of those JavaScript variables can be manually set within the code, or retrieved from
static or dynamic JSON resources.

According to JavaScript analytics service Libscore, AngularJS is used on the websites


of Wolfram Alpha, NBC,Walgreens, Intel, Sprint, ABC News, and approximately 8,400 other
sites out of 1 million tested in July 2015.

AngularJS is the frontend part of the MEAN stack, consisting


of MongoDB database, Express.js web application server framework, Angular.js itself,
and Node.js runtime environment.
CHAPTER-4 SYSTEM DESIGN

4.1 Module Description

Disaster Management System consists of two generally independent systems. The first is
a regular web application, which provides a number of web pages containing documents,
pictures and other materials that have been picked up from every medium as a summarization
can be accessed through mobile browsers of the clients. After becoming registered members, the
client users can also upload and maintain their personal information, receive customized
information, and participate in forum discussions.

4.2 System Features

In the life of the software development, problem analysis provides a base for design and
development phase. The problem is analyzed so that sufficient matter is provided to design a
new system. Large problems are sub-divided into smaller once to make them understandable
and easy for finding solutions. Same in this project all the task are sub-divided and
categorized.

System Modules

 ADMIN
 Login
 View Disaster Queries
 Post Solution
 Maintain Summary

 USER
 Register
 Login
 Post Query
 View solution

PUBLIC

 Post Query
 View solution
 Summary Review

4.4. MODULES

 ADMIN
 Login

Admin can login this system after they can view home page.

 View Query Disaster


Admin enters this system and view user and public post their query details
 Post solution
Admin can only post solution for public and user queries.

 Maintain Summary
Admin will extract all the related posts of the disaster in every site and
then maintain summary of the disaster with the real pictures and content.

 USER
 Register

User enters this system and register with own details.

 Login

User can login this system after they can view home page.

 Post Query

User can login this system after they can post their own queries about
escape of this situation.

 View solution

User can login this system after they can view solution.
 PUBLIC
 Post Query

Public can directly post their own queries about escape of this situation.

 View solution

Public can access this system so that they can view solution.

 Summary Review
 Public can this give their review about the summary given if there is any
correction in the information provided after viewing the solution.

4.5 TABLE DESIGN


Design is the first step in the development phase for any techniques and principles for the
purpose of defining a device, a process or system in sufficient detail to permit its physical
realization.

Once the software requirements have been analyzed and specified the software design
involves three technical activities - design, coding, implementation and testing that are required
to build and verify the software.

The design activities are of main importance in this phase, because in this activity,
decisions ultimately affecting the success of the software implementation and its ease of
maintenance are made. These decisions have the final bearing upon reliability and
maintainability of the system. Design is the only way to accurately translate the customer’s
requirements into finished software or a system.

Design is the place where quality is fostered in development. Software design is a process
through which requirements are translated into a representation of software. Software design is
conducted in two steps. Preliminary design is concerned with the transformation of requirements
into data.

4.1.UML Diagrams

UML stands for Unified Modeling Language. UML is a language for specifying,
visualizing and documenting the system. This is the step while developing any product after
analysis. The goal from this is to produce a model of the entities involved in the project which
later need to be built. The representation of the entities that are to be used in the product being
developed need to be designed.

There are various kinds of methods in software design:

 Use case Diagram


 Sequence Diagram
 Collaboration Diagram
4.1.1Use Case Diagrams

Use case diagrams model behavior within a system and helps the developers understand
of what the user require. The stick man represents what’s called an actor. Use case diagram can
be useful for getting an overall view of the system and clarifying who can do and more
importantly what they can’t do.

Login

Disaster Type

<<include>>
View Query Escape Root
<<include>>
Admin
<<include>>
Alternate solution
<<include>>
Post Solution
<<include>>
Palce

Disaster Range

Register

login

User
Post Query

View Solution
Post query

view Solution
Public

Use case diagram consists of use cases and actors and shows the interaction between the
use case and actors.
 The purpose is to show the interactions between the use case and actor.
 To represent the system requirements from user’s perspective.
 An actor could be the end-user of the system or an external system.

4.1.2 Sequence Diagram

Sequence diagram and collaboration diagram are called INTERACTION DIAGRAMS.


An interaction diagram shows an interaction, consisting of set of objects and their relationship
including the messages that may be dispatched among them.

A sequence diagram is an introduction that empathizes the time ordering of messages.


Graphically a sequence diagram is a table that shows objects arranged along the X-axis and
messages ordered in increasing time along the Y-axis.
Admin User Public Database

1 : login()

2 : Register and login()

3 : post queries()

4 : view solution()
5 : post queries()

6 : view solution()

7 : view queries()

8 : post solution()

4.1.3 Collaboration Diagram

A collaboration diagram is a type of visual presentation that shows how various


software objects interact with each other within an overall IT architecture and how users can
benefit from this collaboration. A collaboration diagram often comes in the form of a visual
chart that resembles a flow chart.
4.1.4 Workflow diagram
4.1.5 ER Diagram

4.1.6 Class Diagram

Queries Query

+Queries Type +Query Ty pe


+Queries Decription +Query Description

+View Queries() +Post Query()

User Public User


ADMIN
+Email +general
+Username +Password
+Password +Public User Login()
+User login()
+Admin Login()

Solution solution

+Disaster Type +Disaster Type


+Escape Root +Escape Root
+Alternate Solution +Place
+Place +Alternate Solution
+Disaster Solution +Disaster Solution

+post Solution() +View Solution()


4.1.7 Activity Diagram

Admin Login User Login Public Login

View Queries
post Queries

Post Solution View Solution


CHAPTER 5 – IMPLEMENTATION & TESTING

System implementation is the construction of the new system and the delivery
of the new system to the Directorate for petroleum Resources.

The evaluation of performance, from the perspectives of both developers and


the staff of the DPR of complex system of hardware and software become
increasingly because of networking, distributed computing, distributed and
heterogeneous databases and the needs to store large quantities of data.

a. PROGRAM DEVELOPMENT

Program development is the process of defining the architectures, component,


modules, interface and data for a system to satisfy specified requirement. This
could also be seeing as the application of software theory to produce
development.

Before development of software, it is very necessary to consider certain


factors such as;

 Purpose of the software

 Cost of maintenance

 Users needs.
SYSTEM TESTING

The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub-assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the Software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.

TESTCASE

S.NO SCENARIO INPUT EXPECTED ACTUAL OUTPUT

OUTPUT

1 User register Email and All the user details Register successfully
Password register successfully
Or

Register
unsuccessfully

2 User Login Email and If correct directed to Login successfully or


Password home page
Login unsuccessfully
otherwise show
“Invalid Login”

3 Post Query User will enter all If all the post Query Created successfully or
post Query “Created created unsuccessfully
Successfully”

4 Admin login Admin will enter Login successfully or Login successfully or


Details email and if incorrect login
password details Login unsuccessfully
“Login
unsuccessfully”

5 View Disaster Admin will check Admin view All View all Disaster
Queries All Disaster Disaster Queries Queries
Queries

6 Post Solution Admin Advisor Update Solution Updated successfully


update Solution or unsuccessfully

7 View Solution User will check User view All View all Solution
All Solution Solution

8 Public login Admin will enter Login successfully or Login successfully or


Details email and if incorrect login
password details Login unsuccessfully

“Login
unsuccessfully”

9 Post Query Public will enter If all the post Query Created successfully or
all post Query “Created created unsuccessfully
Successfully”

10 View Solution Public will check Public view All View all Solution
All Solution Solution

11 Maintain Admin Advisor Update Summary Updated successfully


Summary update Summary or unsuccessfully

12 View Public check Public view View all Summary


Summary and view Summary
Review
Summary
Review Review
Review
TYPES OF TESTS

Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.

Integration testing
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.

Functional test
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.

Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.

Functions : identified functions must be exercised.

Output : identified classes of application outputs must be exercised.


Systems/Procedures: interfacing systems or procedures must be invoked.

Organization and preparation of functional tests is focused on requirements, key functions, or


special test cases. In addition, systematic coverage pertaining to identify Business process flows;
data fields, predefined processes, and successive processes must be considered for testing.
Before functional testing is complete, additional tests are identified and the effective value of
current tests is determined.

System Test
System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.

White Box Testing


White Box Testing is a testing in which in which the software tester has
knowledge of the inner workings, structure and language of the software, or at least
its purpose. It is purpose. It is used to test areas that cannot be reached from a black
box level.

Black Box Testing


Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests,
must be written from a definitive source document, such as specification or requirements
document, such as specification or requirements document. It is a testing in which the software
under test is treated, as a black box .you cannot “see” into it. The test provides inputs and
responds to outputs without considering how the software works.
5.1 Unit Testing

Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be conducted as
two distinct phases.

Test strategy and approach


Field testing will be performed manually and functional tests will be written in detail.

Test objectives
 All field entries must work properly.
 Pages must be activated from the identified link.
 The entry screen, messages and responses must not be delayed.

Features to be tested
 Verify that the entries are of the correct format
 No duplicate entries should be allowed
 All links should take the user to the correct page

5.2 Integration Testing


Software integration testing is the incremental integration testing of two or more
integrated software components on a single platform to produce failures caused by interface
defects.

The task of the integration test is to check that components or software applications, e.g.
components in a software system or – one step up – software applications at the company level –
interact without error.

Test Results: All the test cases mentioned above passed successfully. No defects encountered.
5.3 Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.

Test Results: All the test cases mentioned above passed successfully. No defects encountered.
SCREEN SHOTS
CHAPTER 6 - CONCLUSIONS

The project Disaster Management System: An System for Disaster Event


Management Summarization, a service-oriented system for assisting sufferers and
rescuers in disaster rescue operations. It consists a population of servants for
communicating with the client users, a set of internal intelligent support services,
and a number of wrappers for accessing public services. It also contains the
summarization of the entire disaster from all the sites to spread the detailed
knowledge with the pictures of the particular disaster.
CHAPTER 11- REFERENCES

[1] A. Weiser and A. Zipf, “Web service orchestration of OGC web services for disaster
management,” in Geomatics Solutions for Disaster Management, ser. Lecture Notes in
Geoinformation and Cartography, J. Li, S. Zlatanova, and A. Fabbri, Eds. Springer Berlin
Heidelberg, 2007, pp. 239–254.

[2] M. Gloria, V. Lersi, G. Minei, D. Pasquariello, C. Monti, and A. Saitto, “A semantic Web
services platform to support disaster and emergency management,” in 4th Biennial Meeting of
International Environmental Modelling and Software Society, 2008, pp. 1524– 1532.

[3] D. Rosenkrantz, S. Goel, S. Ravi, and J. Gangolly, “Resilience metrics for service-oriented
networks: A service allocation approach,” IEEE Transactions on Services Computing, vol. 2, no.
3, pp. 183–196, 2009.

[4] M. Farnaghi and A. Mansourian, “Disaster planning using automated composition of


semantic OGC web services: A case study in sheltering,” Computers, Environment and Urban
Systems, vol. 41, no. 1, pp. 204–218, 2013.

[5] C. Oxendine, M. Sonwalkar, and N. Waters, “A multi-objective, multi-criteria approach to


improve situational awareness in emergency evacuation routing using mobile phone data,”
Trans. GIS, vol. 16, no. 3, pp. 375–396, 2012.
CHAPTER 12 - CODING

Index.html

<!DOCTYPE html>

<html ng-app="myapp">

<head>

<!-- Basic -->

<meta charset="utf-8">

<meta name="keywords" content="HTML5 Template" />

<meta name="description" >

<meta name="author" content="pixelgeeklab.com">

<!-- Mobile Metas -->

<meta name="viewport" content="width=device-width, initial-scale=1.0">

<!-- Web Fonts -->

<link href='css/css.css' rel='stylesheet' type='text/css'>

<link rel="stylesheet" href="fonts/font.css">

<!-- Vendor CSS -->

<link rel="stylesheet" href="vendor/fontawesome/css/font-awesome.css">

<link rel="stylesheet" href="vendor/owlcarousel/owl.carousel.css" media="screen">

<link rel="stylesheet" href="vendor/owlcarousel/owl.theme.css" media="screen">

<link href="vendor/owl-carousel/owl.transitions.html" rel="stylesheet"


media="screen">
<link rel="stylesheet" href="vendor/flexslider/flexslider.css" media="screen">

<link rel="stylesheet" href="vendor/chosen/chosen.css" media="screen">

<link rel="stylesheet" href="vendor/magnific-popup/magnific-popup.css"


media="screen">

<!-- Theme CSS -->

<link rel="stylesheet" href="css/theme.css">

<link rel="stylesheet" href="css/theme-animate.css">

<!-- Style Switcher-->

<!-- Head libs -->

<script src="vendor/modernizr/modernizr.js"></script>

<!--[if IE]>

<link rel="stylesheet" href="css/ie.css">

<![endif]-->

<!--[if lte IE 8]>

<script src="vendor/respond/respond.js"></script>

<script src="vendor/excanvas/excanvas.js"></script>

<![endif]-->

<style>

.container {
background-color: #6b1991;

position:relative;

margin-top:100px;

.row{

margin-left:50px;

margin-right:50px;

text-align:center;

.login p{

position:relative;

text-align:center;

font-size:30px;

color:#ffffff;

p{

position:relative;

text-align:center;

font-family:'Quicksand';

font-size:35px;

color:#ffffff;

font-weight:200;

h2{
position:relative;

text-align:center;

font-size:30px;

color:#ffffff;

font-weight:200;

h3{

text-align:center;

font-size:80px;

color:#ffffff;

font-weight:200;

img{

align:middle;

</style>

<!-- script back button -->

<script src="cordova.js"></script>

<script>

function onLoad()

document.addEventListener("deviceready", deviceReady, false);

}
function deviceReady()

document.addEventListener("backbutton", backButtonCallback, false);

function backButtonCallback()

navigator.app.exitApp();

</script>

</head>

<!-- angular js -->

<script src="js/angular-1.3.js"></script>

<script src="js/angular_cookies.js"></script>

<body >

<div class="container">

<h2 style="font-weight:500;">DETS App</h2>

<div class="row">

<div class="col-md-12">

<img style="width:450px;height:450px;margin-left:300px;"
class="img-responsive" src="images/wall.png">

</div>

</div>

<div class="login">

<a href="user_login.html">
<p>User Login</p>

</a>

</div>

<div class="login">

<a href="user_register.html">

<p>User Register</p>

</a>

</div>

<div class="login">

<a href="admin_login.html">

<p>Admin Login</p>

</a>

</div>

</div>

<script src="vendor/jquery/jquery.js"></script>

<script src="vendor/bootstrap/bootstrap.js"></script>

<script src="vendor/jquery.validation/jquery.validation.js"></script>

<script src="vendor/owlcarousel/owl.carousel.js"></script>

<script src="vendor/flexslider/jquery.flexslider-min.js"></script>

<script src="vendor/countdown/countdown.min.js"></script>

<script src="vendor/chosen/chosen.jquery.min.js"></script>

<script src="vendor/pricefilter/jquery.pricefilter.js"></script>
<script src="vendor/masonry/imagesloaded.pkgd.min.js"></script>

<script src="vendor/masonry/masonry.pkgd.min.js"></script>

<script src="vendor/uikit/uikit.js"></script>

<script src="vendor/magnific-popup/jquery.magnific-popup.js"></script>

<!-- Theme Base, Components and Settings -->

<script src="js/theme.js"></script>

<!-- Style Switcher -->

<script type="text/javascript" src="style-switcher/js/switcher.js"></script>

<!-- angular js -->

</body>

</html>

User_login.php

<?php

/* Following code will match admin login credentials */

//user temp array

$response = array();

// include db connect class

require_once __DIR__ . '/db_connect.php';


// connecting to db

// check for post data

$data = json_decode(file_get_contents("php://input"));

$get_empid = ($data->email);

$get_password = ($data->password);

if(empty($get_empid) || empty($get_password))

$response["success"] = 2;

echo json_encode($response);

else

$result = mysqli_query($conn,"SELECT * FROM login WHERE email = '$get_empid' AND


password = '$get_password'");

if (mysqli_num_rows($result))

$Allresponse = mysqli_fetch_array($result);

// temp user array

$response = array();

$response = $Allresponse;

$response["success"] = 1;
echo json_encode($response);

else

// success

$response["success"] = 0;

// echoing JSON response

echo json_encode($response);

?>

You might also like