You are on page 1of 71
Project scope Project overview Online crime reporting is a virtual police station which can maintain the
Project scope
Project overview
Online crime reporting is a virtual police station which can maintain the records of crime, case
detail and police departments like law and order, women protection, traffic control etc.
The virtual police station corresponds to a physical police station situated in location.
Anyone can see the name and designations of the appointed officers at the police station.
For the police, initiatives such as ECOPS are designed to improve their long-term
relations with the citizens due to effective feedback and faster exchange of critical information
between various departments and police stations.
The main aim of this system is to provide online vigilance facilities, the stations,
criminal records; licensing record gets online, so that privileges authorities can view/modify the
records. Detectives& Magistrates have access to criminal records where they can search and
justify the people in a better and faster way.
An online solution is very useful as the solution is inherently distributive. This distributive
characteristic of the online solution helps in getting the different police stations to share
information and get in contact with one another. With respect to ECOPS, going forward, the aim
is to develop new technologies that include designing new techniques to fight crime and
improve criminal justice. Plans are afoot to embed multi-purpose technologies such as traffic
management, mobile data techniques, warrants, personnel scheduling, gang activity analysis,
field reporting, human resource development of police personnel, etc.
1.1
1.2

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

1. INTODUCTION

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

1

Within the focus on effectiveness, there was a concern about the non-transparent, even dishonest nature of

Within the focus on effectiveness, there was a concern about the non-transparent, even dishonest nature of police work, which had become synonymous with corruption and delay. The intention was that the new system - through its automation of previously human processes and through its state-wide and online accessibility - would make the registration, processing and follow-up of criminal cases more open. Under the existing regime, many police require a bribe before they are willing to register a case, and also require a bribe to be paid before they answer any query about the case, such as its progress, or other information held on file.

The main purpose behind the Online crime reporting system was to improve the effectiveness of policy performance; to improve the efficiency of police procedures; for example, by eliminating redundant processes in the registration of criminal cases; and to improve the quality of management information provided for senior policy decision-making, particularly through integration of previously separate information systems.

It was partly this poor image of police functioning, that led the Chief Minister of the State to impose the system on the police service. There were also drivers from the failure of police to properly prosecute some high-profile criminal cases that had political overtones; something which was politically-damaging and seen as requiring an equally high-profile reaction.

Usually the citizen has to go to police station to make a complaint. Here we have given an opportunity to make a complaint through online and the actors will be taken by the police officers immediately. The communication for officers will be easy. The license can be get easily through online if it is selected by the officers via sms and mail.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

1.3 Project purpose

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

2

Generally many crimes seen by the public will not reach to the police due to many

Generally many crimes seen by the public will not reach to the police due to many reasons like fear, Lack of time, Ignorance. Due to this reason many cases are not even reaching the police station. Though some cases are registered they are not investigated properly due to lack of evidences and Cooperation of the public. This software helps the public to report about the crimes to the police without any fear in correct time. This is helpful to police in solving the cases .This is also helpful for higher authorities of police to have an overview about the progress of the investigation.

The focus of ONLINE CRIME REPORTING is to computerize the activities of controlling crime, administration and support services across the state in an integrated fashion so as to enable the division heads and senior officers to obtain the relevant information. Besides, it is also envisaged to reduce dependence on paper and help in automatic maintenance of registers and generation of reports, data analysis, better planning and coordination, speedy detection of crimes and monitoring the prosecutions.

ECOPS is an online reporting service to which the internet user can report crimes committed on or through the Internet. The impact of IT and communications is traversing at a fast pace. As information for the department is crucial, an enterprise IT tool for enhancing the performance of the police officials became necessary called ONLINE CRIME REPORTING or E-Computerized Operations for Police Services, the main purpose is to maintain information, monitor and enhance the performance of the department.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

1.4 Objectives

DEPARTMENT OF CSE

3

Proposed system Drawbacks of existing system Existing system The reports filled online are checked at the
Proposed system
Drawbacks of existing system
Existing system
The reports filled online are checked at the administrative department to use if any
information is lacking or to check the status of the report.
An online solution is very useful as the solution is inherently distributive. This distributive
characteristic of the online solution helps in getting the different police stations to share
information & get in contact with one another.
The normal public in India is afraid to give a complaint in police station because they
are filled with a false fear about the police department. An online complaint registration system
will solve the fear of the public and will also help to police dept in catching criminals. It will
improve the service, so you don’t have to wait on hold on the telephone or go down to the
station to file a report.
Existing system is time consuming
Corrections & maintenance should be done manually
It needs more man power
There may be mistakes while maintaining data manually.
2.1
2.2
2.3

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

2. SYSTEM ANALYSIS

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

4

2.4 Modules of the product From this module public give their complaints through online. The complaints
2.4 Modules of the product
From this module public give their complaints through online. The complaints
are stored into crime report database .One complaints are entered into this database it
cannot be modified by any person. This is read only module.
This module displays the information about thieves and terrorist information
with their photos and rewards on them.
∑ Caution
∑ Administrator
Module description:
The modules present in the online crime reporting are:
Thieves’ information:
Thieves’ information
∑ Complaints
Complaints:
Caution:

This module gives cautions to police department and gives some helpful suggestions. Suppose any incident done in the city like bomb blast or any terrorist killed by the police, immediately alert message will be displayed on this site & also what actions should be taken. It is very helpful to police department.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

5

3. REQUIREMENT SPECIFICATION
3. REQUIREMENT SPECIFICATION

With ECOPS, the exchange of information within police stations and other senior police officers in the departments is faster. It also streamlines the workflow in police department machinery. A central database permits the police units to operate more efficiently leading to speedy detection of crime and prosecution monitoring. The senior police officers of the state can access the reports, which allow them to take quick and timely decisions. Crime analysis reports will enable the senior police officers to observe the crime trends and to guide the investigating officers. The technological benefits of ECOPS are to maintain information, monitor and enhance the performance of the department, to take a critical look at the existing system, processes and procedures of the department so as to identify and remove the redundancy.

Generally many crimes seen by the public will not reach to the police due to many reasons like fear, Lack of time, Ignorance. Due to this reason many cases are not even reaching the police station. Though some cases are registered they are not investigated properly due to lack of evidences and Cooperation of the public. This software helps the public to report about the crimes to the police without any fear in correct time. This is helpful to police in solving the cases .This is also helpful for higher authorities of police to have an overview about the progress of the investigation. An online solution is very useful as the solution is inherently distributive. This distributive characteristic of the online solution helps in getting the different police stations to share information and get in contact with one another.

This module is accessible to some VIP’s like SP, DCP, and DIG etc. By using this module they can give any caution to the police department. Also they can perform updations to the crime report database.

3.1 Requirement study and analysis

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

Administrator:

6

: Software requirements Hardware requirements The Operations should take place transparently. Operating System: Windows 2000 The
:
Software requirements
Hardware requirements
The Operations should take place transparently.
Operating System: Windows 2000
The User Interface should be user friendly to the user who uses the home page by which
he/she can easily register.
Front End Tool: Java Server Pages, Java Script, and HTML
Back End Tool: Oracle 9i
Software Interfaces
Oracle 9i
: Tomcat 5.0
: Microsoft Internet Explorer
Database
Server
Explorer
This reduces the discretionary dependence of police. Once the case is registered the
investigation and follow up activities relating to the case cannot be delayed. The grievances
handling is more efficient. Now, the citizens will have access to senior officers through the web.
ECOPS introduced transparency and accountability in the whole system.
3.2
3.3

ECOPS is envisaged to reduce the fair amount of paper work and helps in the automatic maintenance of registers and generation of reports, data analysis, better planning and coordination, timely decision and speedy detection of crime and prosecution monitoring. All these factors have contributed to a higher moral of the police officials at all the levels in police department. The case registered at one police station can be tracked at any police station.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

: P III or above with

Hardware Platform

DEPARTMENT OF CSE

Client

7

: P III or above with : 256MB or above. : 20GB or above of HD.
: P III or above with
: 256MB or above.
: 20GB or above of HD.
Hardware Platform
RAM
Hard Disk

RAM

: 256MB or above.

Hard Disk

: 20GB or above of HD.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

3.4 Block diagram

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

Server

8

Figure 4.4.1: Block diagram of ECOP working 3.5 Overall description
Figure 4.4.1: Block diagram of ECOP working
3.5 Overall description

The ONLINE CRIME REPORTING is an application which is providing the features of dynamic web application as well as that of the stand alone application on the administrator side. The application will be used across the state by the citizens, the law enforcement bodies, and private detective and cyber café & hotel employees. It can be used to track the criminal, to gather the information about the crime or about criminal and missing person and to broadcast or communicate information ( of any criminal activity or other alert). The citizen can register the e complaint here which will ease out the process for the citizens and also for the police to

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

9

is TS COMPLAIN 4.1 System design 4.1.1 Data design The Client Software is to provide the
is
TS
COMPLAIN
4.1 System design
4.1.1 Data design
The Client Software is to provide the user interface on system user client side and for
this TCP/IP protocols are used.
for storing the
4. SYSTEM DESIGN AND
DEVELOPMENT
for EJB and database server
ADMIN
side web server
information
the server
is
THIEVES
POLICE
On

The web pages (XHTML/JSP) are present to provide the user interface on customer client side. Communication between customer and server is provided through HTTP/HTTPS protocols.

maintain records as the status of the case can be viewed as well as can be updated. The data required to be available is the districts of the state along with areas enclosed by them.

It is an object or entity-relationship diagram that primarily documents the data elements (e.g., classes, tables), their component data, and the relationships between them.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

10

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE 4.1.2 Architectural design ONLINE CRIME REPORTING DEPARTMENT OF CSE 11

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

4.1.2 Architectural design

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

11

4.1.3 Procedural design
4.1.3 Procedural design

The procedural design describes structured programming concepts using graphical, tabular and textual notations. These design mediums enable the designer to represent procedural details that facilitates translation to code. This blueprint for implementation forms the basis for all subsequent software engineering work.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

  • 4.1.3 Modular design

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

User

12

Police Department: Administrator:
Police Department:
Administrator:

User can send the complaints to police and they can view the complaint report. User can perform these tasks only when he logins to his account otherwise he has to register his new account. Police send the status report to the users based on their investigation. The user can check the status of their complaints with the help of complaint id given. The user can register his complaints to the police and view the thieves’ information.

Basing on the complaints given by the public, police can view them and take appropriate action timely. The police has to login with their account to view the complaints and to send the status of the complaints to the users. They can update the status of the complaint basing on the progress of investigation. They will also receive alerts from the higher authorities regarding warnings and can take action in advance.

Higher authorities like VIP’S, CP, and DCP can view the complaints which are sent by the public. The administrator has to login with their account in order to perform his actions. They can send alert messages to the police department regarding any future complications. The administrator can also send cautions to the users. Unlike police who can view complaints specific to his area the administrator can view the complaints universally.

Administrator

Police Department

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

4.2 Database design

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

User:

13

14 ONLINE CRIME REPORTING TABLENAME: Complaints S.No Column Name Data type Description Remarks Complaint Identification Primary
14
ONLINE CRIME REPORTING
TABLENAME: Complaints
S.No
Column Name
Data type
Description
Remarks
Complaint
Identification
Primary
1
cid
Number
Number
Key
Location of
2
Loc
Varchar2(20)
Crime
3
Description
Varchar2(1000)
Complaint
4
Crime type
Varchar2(20)
Type of Crime
5
Email
Varchar2(30)
Email ID of user
date
6
Cdate
Date of complaint
When recorded
TABLENAME: Thieves
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
15 ONLINE CRIME REPORTING S.No Column Data type Description Remarks name Primary Key 1 Tid Number
15
ONLINE CRIME REPORTING
S.No
Column
Data type
Description
Remarks
name
Primary
Key
1
Tid
Number
Thief ID
2
Name
Varchar2(20)
Name of the criminal
3
Alias name
Varchar2(30)
Other name of the criminal
4
DOB
date
Age of the criminal
5
Address
Varchar2(40)
Address of the criminal
6
Reward
Number
Prize money announced by police on the
criminal
7
Status
Varchar2(30)`
Status of the criminal given by the police
TABLENAME: Alert
S.No
Column name
Data type
Description
Remarks
1
Alert
Varchar2(60)
Alert message given
By the Administrator
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
16 ONLINE CRIME REPORTING TABLENAME: Crimeimg S.No Column name Data type Description Remarks 1 Tid Number
16
ONLINE CRIME REPORTING
TABLENAME: Crimeimg
S.No
Column name
Data type
Description
Remarks
1
Tid
Number
Thief identification
Number
2
Path
Varchar2(30)
Path of the image where
stored
TABLENAME: Caution
S.N
Column
Data
Description
Remar
o
name
type
ks
1
cid
Number
Complaint Identification
Number
2
Admin
Varchar2(
Caution
30)
Caution given by the
Administrator to the
Given complaint
TABLENAME: Login
S.No
Column name
Data type
Description
Remarks
1
Userid
Number
Administrator Identification
Primary
Number
Key
2
Pwd
Varchar2(30)
Password given to the
Administrator
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
17 ONLINE CRIME REPORTING 3 Pname Varchar2(30) Name given to the administrator TABLENAME: Plogin S.No Column
17
ONLINE CRIME REPORTING
3
Pname
Varchar2(30)
Name given to the
administrator
TABLENAME: Plogin
S.No
Column name
Data type
Description
Remarks
1
Userid
Number
Police Identification
Primary
Number
Key
2
Pwd
Varchar2(30)
Password given to the Police
3
Pname
Varchar2(30)
Name given to the police
TABLENAME: Status
S.No
Column name
Data type
Description
Remarks
1
cid
Number
Complaint Identification
Number
2
Status
Varchar2(20)
Status of the complaint
Given by the administrator
TABLENAME: Crimedb
S.No
Column name
Data type
Description
Remarks
1
Crime Type
Varchar2(30)
Type of crime
2
Suggestion
Varchar2(300)
Suggestion given to the
Police dept for particular crime
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE

18

5.1

4.3

DEPARTMENT OF CSE

ONLINE CRIME REPORTING

Feasibility Analysis

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Data flow diagram is a pictorial representation of the system in which flow of data from one process to another process is described. A Data Flow is composed of

Data movement shown by arrows. Transformation or process of data shown by named circle or rounded rectangle. Sources and destination of data represented by named rectangles. Static storage or data at rest denoted by an open rectangle that is named.

Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses of the existing business or proposed venture, opportunities and threats as presented by the environment, the resources required to carry through, and ultimately the prospects for success. In its simplest terms, the two criteria to judge feasibility are cost required and value to be attained. As such, a well-designed feasibility study should provide a historical background of the business or project, description of the product or service, accounting statements, details of the operations and management, marketing research and policies, financial data, legal requirements and tax obligations. Generally, feasibility studies precede technical development and project implementation.

5. DATA FLOW DIAGRAMS Rules of data flow diagram ∑
5. DATA FLOW DIAGRAMS
Rules of data flow diagram
19 ONLINE CRIME REPORTING Data Flow Diagrams are of two types: Physical Data Flow Diagrams: These
19
ONLINE CRIME REPORTING
Data Flow Diagrams are of two types:
Physical Data Flow Diagrams:
These are implementation-dependent i.e., they show the actual devices, departments, people,
etc., involved in the system.
Logical Data Flow Diagrams:
These diagrams describe the system independently of how it is actually implemented, they show
what takes places, rather than how an activity is accomplished.
The DFD is intended to represent information Flow but it is not a flow chart and is not
intended decision-making, flow of control, loops and other procedural aspects of the system.
DFD is a useful Graphical tool and is applied at the earlier stages of requirements analysis. It
may be further refined at preliminary design stage and is used as mechanism for top-level
structural design for software.
The DFD drawn first at a preliminary level is further expanded into greater details:
The context diagram is decomposed and represented with multiple rectangles.
Each of these rectangles may be decomposed further and given as more detailed DFD.
Explanation of DFD.
ONLINE
Context diagram:
CRIME
USER
REPORT
ADMIN
It’s a diagram, which shows whole system at once. The sources in context diagram for
this system are USER, ADMINISTRATOR, POLICE and these are linked to the
ONLNECRIMEREPORTING. The Context Diagram is shown in fig (6.1.1):
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
POLICE
Fig 5.1.1. Context diagram
Fig 5.1.1. Context diagram

After entering the complaint and pressing submit it will be send to the complaint database. If his complaint has been successfully entered in to the database he is allotted with a self generated no which is used for the further purposes.

The user can view the status of his compliant in the status menu by entering the self generated no given by the system.

User login process is the Level-1 DFD shown in Fig(6.2.1). Here user has to enter into the registering complaint area any one register the complaint so there is user id and password for it.

5.2 Levels of data diagram Level -1 Diagram:

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

20

Police login is Level-2 DFD as shown in Fig(6.2.2). In this level, different police officers of different locations were provided with their particular user id and password using which they have to login in. The entered user id and password were validated and if correct they were made to login. Here they can view the alert message given by the administrator and also the caution

The user can also view the details of the thieves present in the various locations to make him cautious .By just selecting the location and the thieves’ id he can view the details of the thieves with his photo and reward announced on him by the police.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Fig.5.2.1 : Level-1 Diagram

Level -2 Diagram:

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

21

Police login is Level-2 DFD as shown in Fig(6.2.2). In this level, different police officers of

Level-3 DFD diagram is for administrator .Here he consists of login page .Where he has to login using user id and password provided to him. After entering user id and password they are validated and if correct they made to enter into the page. Here he has two tasks they are sending alert messages and caution for the particular complaint to the police. In the caution first he has to select the location and then the complaint id and then he has to send the status and caution to

by the administrator to the particular complaint. Police officers can see the complaints belonging to their locality only.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Fig. 5.2.2 : Level-2 Diagram

ONLINE CRIME REPORTING

Level -3 DIAGRAM:

DEPARTMENT OF CSE

22

Level-3 DFD diagram is for administrator .Here he consists of login page .Where he has to
Fig. 5.2.3 : Level-3 Diagram
Fig. 5.2.3 : Level-3 Diagram

A flowchart is a type of diagram that represents an algorithm or process, showing the steps as boxes of various kinds, and their order by connecting these with arrows. This diagrammatic representation can give a step-by-step solution to a given problem. Process operations are represented in these boxes, and arrows connecting them represent flow of control. Data flows are not typically represented in a flowchart, in contrast with data flow diagrams; rather, they are

the particular complaint. The entered alert, status, and caution were sent to the respective databases.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

5.3 Flow chart

23

Valid Browse the contents Logout Invalid User Register / Reset Open ECOP Website & Validati Start
Valid
Browse the
contents
Logout
Invalid User
Register /
Reset
Open ECOP Website
&
Validati
Start
User
End
on

implied by the sequencing of operations. Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

24

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE Fig 6.1.1 : Class Diagram 6. UML DIAGRAMS 6.1 Class

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Fig 6.1.1 : Class Diagram

6. UML DIAGRAMS

6.1 Class diagrams

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

25

Admin View User Complaint Login Registration Lodge Complaint Send Status Police Personell Send Reports View Report
Admin
View User Complaint
Login
Registration
Lodge Complaint
Send Status
Police Personell
Send Reports
View Report
View Complaint Status
Logout
User

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Fig.6.2.1 : Use case Diagram

6.2 Use case diagrams

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

26

Registration,login lodge Complaint View Complaint View Complaint Send Status View Status View Status notify notify Admin
Registration,login
lodge Complaint
View Complaint
View Complaint
Send Status
View Status
View Status
notify
notify
Admin
Police
login
login
User

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Fig.6.3.1: Sequence Diagram

6.3 Sequence diagrams

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

27

1: login 7: View Complaint 12: View Status 3: login 5: 6: View Complaint 8: Send
1: login
7: View Complaint
12: View Status
3: login
5:
6: View Complaint
8: Send Status
9: notify
4: lodge Complaint
Police
Fig. 6.4.1: Collaboration Diagram
2: Registration,login
11: View Status
10: notify
Admin
User

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

6.4 Collaboration diagrams

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

28

An activity diagram is a special kind of a state chart diagram that shows the flow
An activity diagram is a special kind of a state chart diagram that shows the flow from activity
to activity within a system. Here we are having four forms they are
COMPLAINTS
CID
LOC
CRIME
DESCRIPTION
SUBMIT
Complaints, Thieves’ information, Administrator, Police dept.
1 .Complaints
.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Fig.6.5.1: Activity Diagram

6.5 Activity diagrams

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

29

Fig. 6.5.2: Activity Diagram LIST OF THIEVES OF THIEVES HISTORY ENTER AREA
Fig. 6.5.2: Activity Diagram
LIST OF THIEVES
OF THIEVES
HISTORY
ENTER
AREA

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

2. Thieves information

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

30

VIEW CAUTION Fig.6.5.3: Activity Diagram POLICE LOGIN SELECT COMPLAINT
VIEW CAUTION
Fig.6.5.3: Activity Diagram
POLICE
LOGIN
SELECT
COMPLAINT

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

3. Caution

31

ENTER CAUTION AND STATUS SELECT COMPLALINT Fig.6.5.4: Activity Diagram ALERT CAUTION SEND ALERT SELECT LOC ADMINIS
ENTER CAUTION AND STATUS
SELECT COMPLALINT
Fig.6.5.4: Activity Diagram
ALERT
CAUTION
SEND ALERT
SELECT LOC
ADMINIS
TARTOR
LOGIN

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

4. Administrator

32

Fig.6.6.1: Component Diagram Deployment diagrams
Fig.6.6.1: Component Diagram
Deployment diagrams
Fig.6.6.1: Component Diagram Deployment diagrams ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE Component diagrams ONLINE CRIME REPORTING

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Component diagrams

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

6.7

6.6

33

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE Fig. 6.7.1: Deployment Diagram 7. SCREEN SHOTS ONLINE CRIME REPORTING

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Fig. 6.7.1: Deployment Diagram

7. SCREEN SHOTS

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

Home page

34

Registration page
Registration page

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

35

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE ONLINE CRIME REPORTING DEPARTMENT OF CSE 36

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

36

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE ONLINE CRIME REPORTING DEPARTMENT OF CSE 37

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

37

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE ONLINE CRIME REPORTING DEPARTMENT OF CSE 38

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

38

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE Police Department login ONLINE CRIME REPORTING DEPARTMENT OF CSE 39

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Police Department login

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

39

View Complaints Page
View Complaints Page

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

40

Complaint Details Page ]
Complaint Details Page
]

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

41

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE Complaint Status Page ONLINE CRIME REPORTING DEPARTMENT OF CSE 42

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Complaint Status Page

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

42

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE Area Details Page ONLINE CRIME REPORTING DEPARTMENT OF CSE 43

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Area Details Page

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

43

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE ONLINE CRIME REPORTING Add Thief Page DEPARTMENT OF CSE 44

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

Add Thief Page

DEPARTMENT OF CSE

44

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE ONLINE CRIME REPORTING Thief Info Page DEPARTMENT OF CSE 45

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

Thief Info Page

DEPARTMENT OF CSE

45

Multithreaded Robust Object oriented Portable Secure Simple ∑ ∑ ∑ ∑ ∑ ∑
Multithreaded
Robust
Object oriented
Portable
Secure
Simple

Now-a-days all are familiar with Internet, the worldwide network of computers, which connects together thousands of computer all over the world. These network connections are increasing day by day in a rapid rate, so the network traffic is increasing at a pulse rate. Computers connected to the net are from many different manufacturers, running on different operating systems and they differ in architecture, computing power and capacity. By considering this point SUN Microsystems Corporation felt the need for a new programming language suitable for this heterogeneous Environment and java was the solution. This breaks barriers between different computers, chips and operating systems. Using java your application become compatible with all operating systems.

8.1 Implementation About java

8. IMPLEMENTATION AND TESTING

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

Features of java:-

DEPARTMENT OF CSE

Simple

46

47

If we

Secure

Robust

Portable

DEPARTMENT OF CSE

ONLINE CRIME REPORTING

Object-Oriented:-

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

It is simple for professional programmer to learn & they can use it effectively.

Java is purely object oriented. The object model in java is simple and easy to extend, while simple types, such as integers, are kept as high-performance non-objects.

already know object oriented programming, then learning java is very easy. It inherits syntax from c & object oriented features from c++, so if the user knows c\c++ then it will be a easy way to do effective java programming.

As we know many people are effected by viral infection when they download an executable file or program. Rather than, virus programs we have malicious programs that can gather private information, such as credit card number, bank account balances & passwords by searching the contents of your computers local file system. Java has a better answer for this effect i.e., “FIREWALL” between networked application and your computer.

As already we have discussed about compatibility of operating system, computers, chips. In Internet the programs have to be dynamically downloaded to all the various types of platforms. For this purpose java program will generate a byte code (which is not a executable code). Byte code is a highly optimized set of instructions designed to be executed by java run system, which is called as JVM (Java Virtual Machine).

The ability to create robust programs was given a high priority in the design of java. To gain reliability, java restricts you in a few key areas, to force you to find your mistakes early in program development. At the same time, java frees you from having to worry about many of the most common causes of programming errors. Because java is a strictly typed language, it checks your code at Compile time. Java is robust for two reasons; they are Memory management & mishandled exceptional task in traditional programming environments.

47 If we Secure Robust Portable DEPARTMENT OF CSE ONLINE CRIME REPORTING Object-Oriented :- ARYABHATA INSTITUTE
to to use, and easy easy Java, secure, being robust, understand,
to
to
use,
and
easy
easy
Java,
secure,
being
robust,
understand,

48

What is JDBC?

automatically

DEPARTMENT OF CSE

ONLINE CRIME REPORTING

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

downloadable on a network, is an excellent language basis for database applications.

JDBC is a Java API for executing SQL statements. (JDBC is often thought of as “Java Database Connectivity”) .It consists of a set of classes and interfaces written in the java programming language.

JDBC extends what can be done in Java. For example, with Java and the JDBC API, it is possible to publish a web page, which contains an applet that uses information obtained from a remote database. With more and more Programmers using the Java Programming language, the need for easy database access from java is continuing to grow.

MIS managers like the combination of Java and JDBC because it makes disseminating information easy and economical, Businesses can continue to use their installed database and access information even if it is stored on different database management systems. Development time for new application is short. A programmer can write an application or an update once, put it on the server, and everybody has access to the latest version. A Low Level API and a Base for Higher-level APIs.

Using JDBC, it is easy to send SQL statements to virtually any relational database. In the other words, with the JDBC API, it is not necessary to write to one program to access a Sybase database, another program to access Informix database, another program to access Oracle database, and so on. One can write a single program using the JDBC API, and the program will be able to send SQL statements to the appropriate database. The combinations of JAVA and JDBC let’s a programmer writes it once and run it anywhere.

A Java API like JDBC is needed in order to enable a “Pure Java” solution. When

A Java API like JDBC is needed in order to enable a “Pure Java” solution. When ODBC is used, the ODBC Driver Manager and drivers must be manually installed on every client machine. When the JDBC driver is written completely in Java, however, JDBC code is automatically installable, portable, and secure on all platforms from network computers to mainframes.

1) An embedded SQL for Java. At least one vendor plan to build this DBMS implement SQL, a language designed specifically for use with databases. JDBC requires that the SQL statements be passed as Strings to Java methods. The embedded SQL preprocessor then translates this JAVA/SQL mix into Java with JDBC calls.

JDBC is a “Low level “ interface that means that it is used to invoke SQL commands directly, it works very well in this capacity and is easier to use than other database connectivity APIs, but it was designed to be a base upon which to build higher level interfaces and tools.

A high level interface is “user-friendly”, using a more understandable or more convenient API that is translated behind the scenes into a low level interface such as JDBC. At the time of writing, two kinds of higher level APIs are under development of top of JDBC.

ODBC is hard to learn. It mixes simple and advanced features together, and it has complex options even for simple queries. JDBC, on the other hand, was designed to keep simple things simple while allowing more advanced capabilities where required.

2) A direct mapping of relational database tables to Java classes. In this “object/relational” mapping, each row of the table becomes an instance of that class, and each column value corresponds to an attribute of that instance. Programmers can then operate.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

49

1. JSP is Java-based, and Java is well-suited for enterprise computing. Why is JSP so exciting?
1. JSP is Java-based, and Java is well-suited for enterprise computing.
Why is JSP so exciting?

In fact, JSP is a key part of the Java 2 Enterprise Edition (J2EE) platform and can take advantage of the many Java Enterprise libraries, such as JDBC, JNDI, and Enterprise Java Beans.

Java Server Pages™ (JSP) is a new technology for web application development that has received a great deal of attention since it was first announced.

2. JSP supports a powerful model for developing web applications that separates presentation from processing.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Java server page (jsp)

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

50

For the individual developer working on a simple web site this approach may work fine, but

For the individual developer working on a simple web site this approach may work fine, but it makes it very difficult for people with different skills to work together to develop a web application. This is becoming a significant problem. As web sites become increasingly complex and are more and more critical to the success of an organization, the appearance and usability of the web interface becomes paramount. New client technologies, such as client-side scripts and DHTML, can develop more responsive and interactive user interfaces, style sheets can make it easier to globally change fonts and colors, and images can make the interface more appealing. At the same time, server-side code is getting more complex, and demands for reliability, performance, and fault tolerance are increasing.

In the early days of the Web, the only tool for developing dynamic web content was the Common Gateway Interface (CGI). CGI outlined how a web server made user input available to a program, as well as how the program provided the web server with dynamically generated content to send back. CGI scripts were typically written in Perl. (In fact, CGI Perl scripts still drive numerous dynamic web sites.) However, CGI is not an efficient solution. For every request, the web server has to create a new operating-system process, load a Perl interpreter and the Perl script, execute the script, and then dispose of the entire process when it's done.

To provide a more efficient solution, various alternatives to CGI have been added to programmers' toolboxes over the last few years: FastCGI, for example, runs each CGI program in an external permanent process (or a pool of processes). In addition, mod_perl for Apache, NSAPI for Netscape, and ISAPI for Microsoft's IIS all run server-side programs in the same process as the web server itself. While these solutions offer better performance and scalability, each one is supported by only a subset of the popular web servers.

The Java Servlet API, introduced in early 1997, provides a solution to the portability issue. However, all these technologies suffer from a common problem: HTML code embedded inside programs. If you've ever looked at the code for a servlet, you've probably seen endless calls to out.println( ) that contain scores of HTML tags.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

51

It consists of collection of persistent data that is used by the application system.

∑ Database ∑ Hardware ∑ Software ∑ User
Database
Hardware
Software
User

Java Server Pages provides just such a development model, allowing web page authors with skills in graphics, layout, and usability to work in tandem with programmers who are experienced in server-side technologies such as multithreading, resource pooling, databases, and caching. While there are other technologies, such as ASP, PHP and ColdFusion, that support similar development models, none of them offers all the advantages of JSP.

The growing complexity of web applications requires a development model that allows people with different skills to cooperate efficiently.

The processor(s) and associated main memory that are used to support the execution of database system software ..

access and manipulate data. Its main purpose is to provide users with an abstract view of the data, i.e. the system hides certain details of how the data is stored and maintained.

A database system is basically a computerized record keeping system, i.e. it is a computerized system whose overall purpose is to maintain information and make that information available on

A Database is an integrated collection of user related data stored with minimum redundancy, serves many users/applications quickly and efficiently.

DBMS is a collection of inter-related data and set of programs that allow several users to

52

Introduction to Database Management System (DBMS)

Database Management System is divided into 4 main components

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

Hardware:

Database:

demand.

∑ Integrity rules ∑ Operation ∑ Structures ∑ Types of dbms There are three types of
Integrity rules
Operation
Structures
Types of dbms
There are three types of users
Relational database management systems
There are four major categories of DBMS data models.
Relational
User:
Inverted
Network
Hierarchical
Application Programmers
End User
Database Administrator (DBA)
Database Management System has evolved from hierarchical to network to relational
models. Today, the most widely accepted database model is the relational model. The relational
database management system uses only its relational capabilities to manage the information
stored in the database. The relational model has three different aspects.

The layer between the physical database and the users that handles all requests from the user for access to the database.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

Software:

53

54

Structures:

Operations:

DEPARTMENT OF CSE

Integrity rules:

ONLINE CRIME REPORTING

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

They are well-defined objects that store the data of a database structure and the data contained within them can be manipulated by operations.

There is a single overall rule called “Zero Rule” which is a foundation rule that covers all other rules. It states that

They are laws that govern which operations are allowed on the data and structures of a database. Integrity rules protect the data and the structures of a database.

They are clearly defined actions that allow users to manipulate the data and structures of a database. The operations on a database must adhere to a predefined set of integrity rules.

A DBMS can be regarded as relational only if it obeys a set of 12 rules formulated by Dr.E.F.Codd These rules define the scope and functionality of a relational database.

Any truly relational database must be manageable entirely through its relational capabilities. The twelve rules are as follows:

Rule 1:The information rules Rule 2:The guaranteed access rule Rule 3:The systematic treatment of null values Rule 4:The database description rule Rule 5:The comprehensive sub-language rule

54 Structures: Operations: DEPARTMENT OF CSE Integrity rules: ONLINE CRIME REPORTING ARYABHATA INSTITUTE OF TECHNOLOGY AND
Rule 7:The insert, update and delete rule Rule 8:The physical data independence rule Rule 9:The logical

Rule 7:The insert, update and delete rule Rule 8:The physical data independence rule Rule 9:The logical data independence rule. Rule 10: The integrity independence rule. Rule 11: The distribution independence rule. Rule 12: The no subversion rules.

The database connection string is the only JDBC component that references the particular database being accessed. You must provide a specific driver connection string that uses the protocol defined for the driver. The JDBC Driver Manager class to determine which driver to load uses the protocols currently maintained by Java Soft.

Oracle9i is regarded as the RDBMS because it is the most widely acclaimed package across the globe with its 100% client-server architecture. Oracle has in-built features like data integrity, security, reverie and backup and total GUI based presentation and can easily and efficiently support small to very large scale applications.

Because the professional availability in Oracle is high compared to other RDBMS professionals. Because the availability is high the manpower cost will be less compared to Sybase professionals, Informix professionals. Even the support from the vendors in also hig in Oracle environment rather than other RDBMS.

Even though the architecture of all RDBMS is same but the features are different from different RDBMS. Oracle, Sybase, Informix. As per the features concerned all the RDBMS can be related as it. But with the easiness, demand it is better to go for Oracle.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Rule 6:The view update rule

ONLINE CRIME REPORTING

Database connections:

DEPARTMENT OF CSE

Why Oracle?

55

Otherwise it contains rows of data matching the query (up to the limit specified by the
Otherwise it contains rows of data matching the query (up to the limit specified by the
database). If the database supports doing so, you can set the maximum number of rows using the
Statement class method setMaxRows ().
Applies to software systems or module, tests functionality in terms of inputs and outputs
at interfaces.Test reveals if the software function is fully operational with reference to
requirements specification.
A good test case is one that has a high probability of finding an as yet undiscovered
error. A successful test is one that uncovers an as yet undiscovered error. Software Testing is
usually performed for one of two reasons:
It is the process of testing the functionality and correctness of software by running it. Process of
executing a program with the intent of finding an error.
A process of executing a program with the explicit intention of finding errors, that is making the
program fail.
Defect detection
Reliability estimation
Black Box Testing:
Software Testing:
What is Testing?

A Query returns a Result set object. This object contains the results of the query in a form of that can be accessed by the application. If the query has no results, the Result Set object contains no rows.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

White Box Testing:

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

56

Integration testing: Unit testing Validation testing: The step can be conducted in parallel for multiple components.
Integration testing:
Unit testing
Validation testing:
The step can be conducted in parallel for multiple components.
A strategy for software testing will begin in the following order:
It concentrates on each unit of the software as implemented in source code and is a white
box oriented. Using the component level design description as a guide, important control paths
are tested to uncover errors within the boundary of the module. In the unit testing,
Here focus is on design and construction of the software architecture. Integration testing
is a systematic technique for constructing the program structure while at the same time
conducting tests to uncover errors associated with interfacing. The objective is to take unit
tested components and build a program structure that has been dictated by design.
Unit testing
Integration testing
Validation testing
System testing

In this, requirements established as part of software requirements analysis are validated against the software that has been constructed i.e., validation succeeds when software functions in a manner that can reasonably expected by the customer.

Knowing the internal workings i.e., to test if all internal operations are performed according to program structures and data structures.

To test if all internal components have been adequately exercised.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

Software Testing Strategies:

ONLINE CRIME REPORTING

System testing:

DEPARTMENT OF CSE

57

58 ONLINE CRIME REPORTING In this software and other system elements are tested as a whole.
58
ONLINE CRIME REPORTING
In this software and other system elements are tested as a whole.
8.2 TESTING
8.2.1. TEST CASE REPORT
Having test cases that are good at revealing the presence of faults is central to successful
testing. The reason for this is that if there is a fault in a program, the program can still provide
the expected behavior for many inputs. Only for the set of inputs that exercise the fault in the
program will the output of the program deviate from the expected behavior. Hence, it is fair to
say that testing is as its test cases.
Public login:
INPUT
EXPECTED
OBSERVED
STATUS
TEST
BEHAVIOUR
BEHAVIOUR
PASS FAIL
CASE
1.
Enter the
-do-
p
incorrect login
id ,password
Displays message “
invalid user name and
password”
2.
Enter blank
values
Displays an alert
message “enter valid
value for
corresponding field”
Null values are
checked with the
database values
F
3.
Enter the
correct login id
and password
Displays authorized
action to user
-do-
P
4.
Trigger back
button
Page is redirected to
the home page
-do-
P
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
59 ONLINE CRIME REPORTING Registration: TEST INPUT EXPECTED OBSERVED STATUS CASE BEHAVIOUR BEHAVIOUR PASS FAIL 1.
59
ONLINE CRIME REPORTING
Registration:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Enter the
Displays an alert
message “ invalid
user name and
password”
-do-
p
incorrect field
values
2.
Enter blank
values
Displays an alert
message “enter
valid value for
corresponding field”
Null values are
stored in the
database
F
3.
Trigger submit
All values are
stored in database
and Page is
redirected to the
login page
-do-
P
button
Complaint Form:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Enter blank
values
Displays an alert
message “enter
valid value for
corresponding field”
Null values are
stored in the
database
F
2.
Trigger submit
button
All values are
stored in complaint
database and a
complaint id has to
be displayed.
-do-
P
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
60 ONLINE CRIME REPORTING Complaint Status: TEST INPUT EXPECTED OBSERVED STATUS CASE BEHAVIOUR BEHAVIOUR PASS FAIL
60
ONLINE CRIME REPORTING
Complaint Status:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Enter invalid
Complaint id
Displays message
“not a valid
complaint id”
Null pointer
F
Exception
2.
Enter others
Others Complaint
Record displayed
F
Complaint id
Displays message “
ACCESS DENIED”
3.
Enter your
Displays your
-do-
P
Complaint id
complaint status
with details.
PUBLIC LOGOUT:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Click on logout.
Session has to be
destroyed.
-do-
P
Police login:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Enter the
-do-
p
incorrect login
id ,password
Displays message “
invalid user name and
password”
and select
police station
name
2.
Enter blank
values
Displays an alert
message “enter valid
value for
corresponding field”
Null values are
checked with the
database values
F
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
61 ONLINE CRIME REPORTING 3. Enter the correct login id and password and select police station
61
ONLINE CRIME REPORTING
3.
Enter the
correct login id
and password
and select
police station
name
Displays authorized
action to user
-do-
P
4.
Trigger back
button
Page is redirected to
the home page
-do-
P
View Complaint by POLICE:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Select the
Displays the
selected record
information
forwarded to the
particular police
station.
-do-
P
displayed
complaint ids
Update Complaint by POLICE:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Select the
displayed
complaint ids to
be update
Displays the
previous status and
the entered status to
be updated.
-do-
P
View Alert Messages by POLICE:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
62 ONLINE CRIME REPORTING TEST INPUT EXPECTED OBSERVED STATUS CASE BEHAVIOUR BEHAVIOUR PASS FAIL 1. Select
62
ONLINE CRIME REPORTING
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Select the
option view in
the menu Alert
messages
Displays the alert
messages given by
the various police
stations.
-do-
P
Give Alert Messages by POLICE:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Enter the alert
message and
Date.
All the values are
stored in the
database with the
corresponding alert
massage issued date.
-do-
P
View Cautions by POLICE:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Select the
option view in
the menu
Cautions
Displays the
cautions given by
the administrator to
the particular police
station.
-do-
P
View Thief information by POLICE:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
63 ONLINE CRIME REPORTING TEST INPUT EXPECTED OBSERVED STATUS CASE BEHAVIOUR BEHAVIOUR PASS FAIL 1. Click
63
ONLINE CRIME REPORTING
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Click on the
particular thief
photo to know
information.
Displays the
information of thief.
-do-
P
Add Thief Information by POLICE:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Enter the
Details of the
thief.
All the values are
stored in the.
-do-
P
View Messages by POLICE:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Select the view
in the messages
Displays the
messages send by
the various police
stations.
-do-
P
Give Messages by POLICE:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
64 ONLINE CRIME REPORTING TEST INPUT EXPECTED OBSERVED STATUS CASE BEHAVIOUR BEHAVIOUR PASS FAIL 1. Enter
64
ONLINE CRIME REPORTING
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Enter the
message and
Date and select
the police
.
All the values are
stored in the
database and to be
display when the
police station head
clicks on view
messages.
-do-
P
POLICE LOGOUT by POLICE:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Click on logout.
Session has to be
destroyed.
-do-
P
ADMIN LOGIN by Administrator:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Enter the
Displays message “
invalid user name and
password”
-do-
p
incorrect login
id ,password
and select
police station
name
2.
Enter blank
values
Displays an alert
message “enter valid
value for
corresponding field”
Null values are
checked with the
database values
F
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
65 ONLINE CRIME REPORTING 3. Enter the correct login id and password Displays authorized action to
65
ONLINE CRIME REPORTING
3.
Enter the
correct login id
and password
Displays authorized
action to
Administrator
-do-
P
4.
Trigger back
button
Page is redirected to
the home page
-do-
P
View Complaints by Administrator:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Select view
complaint.
all the complaint ids
have to be displayed
with heir status.
-do-
P
Give Alert Messages by Administrator:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Enter the alert
message and
Date.
All the values are
stored in the
database with the
corresponding alert
massage issued date.
-do-
P
Give Cautions by Administrator:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
66 ONLINE CRIME REPORTING TEST INPUT EXPECTED OBSERVED STATUS CASE BEHAVIOUR BEHAVIOUR PASS FAIL 1. Enter
66
ONLINE CRIME REPORTING
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Enter the
-do-
P
message and
Police station
name.
All the values are
stored in the
database and
displayed when
police department
clicks on the view
messages.
Administrator logout by Administrator:
TEST
INPUT
EXPECTED
OBSERVED
STATUS
CASE
BEHAVIOUR
BEHAVIOUR
PASS FAIL
1.
Click on logout.
Session has to be
destroyed.
-do-
P
PUBLIC LOGIN:
TEST
INPUT
EXPECTED
OBSERVED
STATU
CASE
BEHAVIOUR
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
S
PASS
FAIL
1.
Enter
blank
values
Displays an alert
message “enter valid
value for
corresponding field”
-do-
By providing the
client side validation
by writing
JavaScript.
P
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
67 ONLINE CRIME REPORTING Registration: TEST INPUT EXPECTED OBSERVED CASE BEHAVIOUR BEHAVIOUR THE WAY WE OVERCOME
67
ONLINE CRIME REPORTING
Registration:
TEST
INPUT
EXPECTED
OBSERVED
CASE
BEHAVIOUR
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
STATU
S
PASS
FAIL
1.
Enter
blank
values
Displays an alert
message “enter valid
value for
corresponding field”
-do-
By providing the
client side
validation by
writing JavaScript.
P
Complaint Form:
TEST
INPUT
EXPECTED
OBSERVED
CASE
BEHAVIOUR
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
STATU
S
PASS
FAIL
1.
Enter
blank
values
Displays an alert
message “enter valid
value for
corresponding field”
-do-
By providing the
client side
validation by
writing JavaScript.
P
Complaint Status:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
68 ONLINE CRIME REPORTING TEST INPUT EXPECTED OBSERVED CASE BEHAVIOUR BEHAVIOUR THE WAY WE OVERCOME THIS
68
ONLINE CRIME REPORTING
TEST
INPUT
EXPECTED
OBSERVED
CASE
BEHAVIOUR
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
STATU
S
PASS
FAIL
1.
Enter
Displays message
“not a valid
complaint id”
-do-
invalid
Complaint
id
By checking the
requested complaint
id in the database or
not
P
2.
Enter others
Displays message
“ ACCESS
DENIED”
-do-
By checking the
requested complaint
id with the login
value
P
Complaint
id
Police login:
TEST
INPUT
EXPECTED
OBSERVED
STATU
CASE
BEHAVIOUR
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
S
PASS
FAIL
1.
Enter
Displays an alert
message “enter valid
value for
corresponding field”
-do-
values
By providing the
client side validation
by writing
JavaScript.
P
blank
Administrator login:
TEST
INPUT
EXPECTED
OBSERVED
STATU
CASE
BEHAVIOUR
BEHAVIOUR
THE WAY WE
OVERCOME
THIS DEFECT
S
PASS
FAIL
1.
Enter
-do-
P
blank
values
Displays an alert
message “enter valid
value for
corresponding field”
By providing the
client side validation
by writing
JavaScript.
CONCLUSION
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE
DEPARTMENT OF CSE
∑ Improve efficiency in police department Availability of online police service to citizens Availability of data
Improve efficiency in police department
Availability of online police service to citizens
Availability of data to senior officials for quick decision making
Better administration and co-ordination
Speedy detection of crimes
Duplication of work avoided
Retrieval and access of data is easy
Paper work is drastically reduced
Automatic maintenance of registers

The technological benefits of ECOPS are to maintain information, monitor and enhance the performance of the department, to take a critical look at the existing system, processes and procedures of the department so as to identify and remove the redundancy.

The case registered at one police station can be tracked at any police station. This reduces the discretionary dependence of police. Once the case is registered the investigation and follow up activities relating to the case cannot be delayed.

All these factors have contributed to a higher moral of the police officials at all the levels in police department. This project result in great improvement in the organization’s functioning by reducing the effort spent by the general people.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

GLOSSARY

GOALS:

69

Project management is the discipline of planning, organizing, securing, and managing resources to achieve specific goals.

Project management is the discipline of planning, organizing, securing, and managing resources to achieve specific goals. A project is a temporary endeavor with a defined beginning and end (usually time-constrained, and often constrained by funding or deliverables), undertaken to meet unique goals and objectives, typically to bring about beneficial change or added value. The temporary nature of projects stands in contrast with business as usual (or operations), which are repetitive, permanent, or semi-permanent functional activities to produce products or services. In practice, the management of these two systems is often quite different, and as such requires the development of distinct technical skills and management strategies.

The primary challenge of project management is to achieve all of the project goals and objectives while honoring the preconceived constraints. Typical constraints are scope, time, and budget. The secondary—and more ambitious—challenge is to optimize the allocation of necessary inputs and integrate them to meet pre-defined objectives.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

BIBLIOGRAPHY

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

70

http://jakarta.apache.org/tomcat/tomcat-5.5-doc
http://jakarta.apache.org/tomcat/tomcat-5.5-doc

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

ONLINE CRIME REPORTING

DEPARTMENT OF CSE

71