A Project Report On Crime Record Management System

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 75

A PROJECT REPORT ON

CRIME RECORD MANAGEMENT SYSTEM

Submitted in partial fulfillment of the requirements for award of the degree of


BACHELOR OF TECHNOLOGY
In
INFORMATION TECHNOLOGY
By

G.POOJITHA(15BH1A1218)

K.VIJAYA LAKSHMI(15BH1A1221)

M.RASHMITHA

K.JANANI
Under the guidance of
Mr. N.S. SHEKAR BABU
INCHARGE, CED
Of
ECIL-ECIT
ELECTRONICS CORPORATION OF INDIA LIMITED
(A Government of India Enterprise)

Department of Computer Science & Engineering


AURORA’S ENGINEERING COLLEGE,BHONGIR
YADADRI-BHUVANAGIRI

(Affiliated to JNTU)

0
DECLARATION

We hereby declare that the project entitled “Crime Record Management


system” submitted in the partial fulfillment of the requirements for the award of
degree of Bachelor of Technology in COMPUTER SCIENCE AND
ENGINEERING. This dissertation is our original work and the project has not
formed the basis for the award of any degree, associate-ship, fellowship or any
other similar titles and no part of it has been published or sent for the
publication at the time of submission.

M.SHARATH KUMAR (15621A0592)

M.PRASHANTH (15621A0593)

V.SHIVANI (15621A05D2)

1
ACKNOWLEDGEMENT

We wish to take this opportunity to express our deep gratitude to all those
who helped, encouraged, motivated, and have extended their cooperation in
various ways during our project work. It is our pleasure to acknowledge the
help of all those individuals who was responsible for foreseeing the successful
completion of our project.
We would like to thank Mr. N.S.SHEKAR BABU(Incharge, CED) and
express our gratitude with great admiration and respect to our project guide Mr.
BHARADWAJ for the valuable advice and help throughout the development
of this project by providing us with required information without those
guidance, cooperation and encouragement, this project could not have been
materialized.
Last but not the least; we would like to thank the entire respondents for
extending their help in all circumstances.

M.SHARATH KUMAR (15621A0592)

M.PRASHANTH (15621A0593)

V.SHIVANI (15621A05D2)

2
1 INTRODUCTION………………………………………………………………………………6

1.1 ABSTRACT………………………………………………………………………………..7

2 ORGANISATION PROFILE…………………………………………………………………..8

3 PROBLEM DEFINITION………………………………………………………………......10

4 SYSTEM ANALYSIS………………………………………………………………………...11

4.1 EXISTING SYSTEM…………………………………………………………………….11

4.2 PROPOSED SYSTEM....................................................................................................11

5 FEASIBILITY STUDY.........................................................................................................12

5.1 TECHNICAL FEASIBILITY.........................................................................................12

5.2 OPERATIONAL FEASIBILITY....................................................................................12

5.3 ECONOMICAL FEASIBILITY.....................................................................................13

6 PROJECT OVERVIEW.........................................................................................................14

7 DEFINITION ACRONYMS ABBREVIATIONS.................................................................19

8 SYSTEM REQUIREMENTS................................................................................................20

8.1 Hardware Requirements..................................................................................................20

8.2 Software Requirements...................................................................................................20

9 TECHNOLOGIES.................................................................................................................21

9.1 INTRODUCTION TO JAVA..........................................................................................22

10 SYSTEM DESIGN................................................................................................................38

10.1 Use Case Diagrams:....................................................................................................39

10.2 SEQUENCE DIAGRAM............................................................................................40

10.3 Activity Diagrams.......................................................................................................52

3
10.4 CLASS DIAGRAM....................................................................................................55

11 SCREEN LAYOUT...............................................................................................................60

12 DATADASE DESIGN...........................................................................................................64

13 TEST REPORT AND TEST PLAN.......................................................................................68

14 CONCLUSION......................................................................................................................74

15 BIBLIOGRAPHY..................................................................................................................75

4
1 INTRODUCTION

ABSTRACT

The Crime Records Management System applies to all the Police Stations across the
country and specifically looks into the subject crime prevention, detection, conviction of
criminals depending on the highly responsive backbone of Information Management. The
efficiency of the Police and the effectiveness with which it tackles crime depending upon what
quality of information it can derive from its existing records.
Project analysis:
1. Citizen
2. Station
3. Crime
4. Search
5. Administrators
6. Avocation

Project modules
Module1: Citizen
Citizens, who have the complaints, get registered by entering the details like name,
address, phone numbers etc. Citizens can sign-in and register their complaints

Module2: Station
Deals with processing of complaints, creating FIR, entering victim and witness details.

Module3: Crime
All details about the crime like date and time, police station where it is recorded, place,
nature of Crime, Location of the Crime will be maintained.

5
Module4: Search
For searching the crime in station wise, nature of crime.

Module5: Administrators
Maintenance of Master data, removal of old and outdated data.

Module 6: Avocation:
Deals with the Law part of every crime.

Software Requirements:
Operating System : Windows XP Service Pack2
Technology : Java/J2EE (Servlets, JSP, JDBC)
Web Technology : HTML, JavaScript, CSS
Web Server : Tomcat 6.0
Database : Oracle 10g Express Edition
Software’s : JDK 1.6

Hardware Requirements:
Hardware : Pentium based systems with a minimum of P4
RAM : 256MB (minimum)

6
2 ORGANIZATION PROFILE

ECIL was setup under the department of Atomic Energy in the year 1967 with a view to
generate a strong indigenous capability in the field of professional grade electronic. The initial
accent was on Self-reliance and ECIL was engaged in the Design Development Manufacture and
Marketing of several products emphasis on three technology lines viz. Computers, control
system and communications. ECIL thus evolved as a multi-product company serving multiple
sectors of Indian economy with emphasis on import of country substitution and development of
products and services that are of economic and strategic significance to the country.
Electronics of India Li (ECIL) entered into collaboration with OSI system Inc.
(www.osi-system.con) and set up a joint venture "ECIL_RAPSICAN, U.K, U.S.A with the same
state of art Technology, Requisite Technology is supplied by RAPSICAN and the final product is
manufactured at ECIL facility.
Recognizing the need for generating quality IT professional and to meet the growing
demand of IT industry, a separate division namely CED has been established to impart quality
and professional IT training under brand name of ECIT. ECIT, the prestigious offshoot of ECIL
is an emerging winner and is at the fore front of IT education in the country.

MISSION
ECIL's mission is to consolidate its status as a valued national asset in the area of
strategic electronics with specific focus on Atomic Energy, Defense, Security and such critical
sectors of strategic national importance.

OBJECTIVES
To continue services to the country's needs for peaceful uses Atomic Energy. Special and
strategic requirements of Defense and Space, Electronics security system and support for civil
aviation sector. To establish newer Technology products such as container scanning system and
Explosive Detectors. To re-engineer the company to become nationally competitive by paying
particular attention to delivery, cost and quality in all its activities.

7
To explore new avenues of business and work for growth in strategic sectors in addition
to working realizing technological solutions for the benefit of society in areas like agriculture,
Education, Health, Power, Transportation, Food, Disaster Management etc.

DIVISIONS
The company is organized into divisions serving various sectors, national and commercial
Importance. They are Divisions serving nuclear sector like control and Automation Division
(CAD), Instruments and System Division(ISD), Division Serving defence sector like
communications Division (CND), Antenna products Division (APD), Servo System
Division(SSD) etc. Division handling Commercial products are Telecom Division (TCD),
Customer Support Division (CSD), Computer Education Division (CED).

EXPORTS
ECIL is currently operating in major business EXPORT segment like instruments and
system design, Industrial/Nuclear, Servo System, Antenna Products, Communication, Control
and Automation and several other components.

SERVICES
The company played a very significant role in the training and growth of high caliber
technical and managerial manpower especially in the fields of Computer and Information
Technology. Though the initial thrust was on meeting the control and instrumentation
requirements of Nuclear Power Program, the expanded scope of self-reliance pursed by ECIL
enabled the company to develop various products to cater to the needs of Defence, Civil
Aviation, Information and Broadcasting, Tele communications, etc.

8
3 PROBLEM DEFINITION

The workflow in CRIME RECORDS MANGEMENT SYSTEM is to maintain all the


required applications from customers, details of employees and customers in the form of papers
or files. A bid problem arises, if those papers are lost, as they are essential for all the works to get
done. Reconstruction of all the lost work requires much time and more man power.
In order to make a perfect and secured workflow, we have to use new way, which is
completely through online. This should include all the required tasks like Customers applying for
registration, adding complaints and employees issuing all the status to customers who have
launched a complaint. Admin has the details of all the citizens he gives the tasks to do.
To design this site, Security issues are to be considered with care, providing complete
security to all the users and data is essential.

9
4 SYSTEM ANALYSIS

 EXISTING SYSTEM
In the existing system only the users can see details of particular information about the
Police stations in our state, the existing system have more workload for the authorized person.
Large amount of files and records are to be handled in this system. As previously developed
Crime Records Management system only deals that when a citizen enters an FIR number then
the system only displays whether the case is cleared or not but it does not provide the complete
details of the case.

In the existing system,


1. The existing system is time consuming.
2. It does not provide authentication for the citizens.
3. Man cases are piled up in the corners, which are not proved and which may be a path for
the newly added cases cannot be gathered together.
4. The citizens cannot register their complaints through online.
5. In the existing system there are no Avocation facilities.

 PROPOSED SYSTEM
In the proposed system, the aim of the project is to bring about improvement to the
organization’s contribution.
Advantages of the Proposed System:
1. Every individual has an unique id and he/she can access the data and status of the
crime by sign-in account.
2. We can add notifications to the admin such as update or remove the stations
which are not responding.
3. The product provides a framework within which a user can easily communicate
with the station manager and administrative.

10
4. Complete separation of the access data based on roles: Citizens Stations and
Administrator.
5. Ensures data access authentication.
6. Dynamically updating the crime and status of the complaints.
7. We can include feedback of the citizen.
8. We can include search option for the complete crime details.
9. Avocation is implemented in the proposed system.

4 FEASIBILITY STUDY

11
Preliminary investigation examine project feasibility, the likelihood the system will be useful
to the organization. The main objective of the feasibility study is to test the Technical,
Operational and Economical feasibility for adding new modules and debugging old running
system. All system is feasible if they are unlimited resources and infinite time. There are aspects
in the feasibility study portion of the preliminary investigation:
 Technical Feasibility
 Operational Feasibility
 Economical Feasibility

TYPES OF FEASIBILITY:

 TECHNICAL FEASIBILITY
Technical Feasibility centers on the existing computer system hardware, software, etc.
and to some extent how it can support the proposed addition. This involves financial
considerations to accommodate technical enhancements. Technical support is also a reason for
the success of the project. The techniques needed for the system should be available and it must
be reasonable to use. Technical Feasibility is mainly concerned with the study of function,
performance, and constraints that may affect the ability to achieve the system. By conducting an
efficient technical feasibility we need to ensure that the project works to solve the existing
problem area.
Since the project is designed with ASP.NET with C# as Front end and SQL Server 2000
as Back end, it is easy to install in all the systems wherever needed. It is more efficient, easy and
user-friendly to understand by almost everyone. Huge amount of data can be handled efficiently
using SQL Server as back end. Hence this project has good technical feasibility.

 OPERATIONAL FEASIBILITY
People are inherently instant to change and computers have been known to facilitate
change. An estimate should be made to how strong a reaction the user staff is likely to have
towards the development of the computerized system

12
The staff is accustomed to computerized systems. These kinds of systems are becoming
more common day by day for evaluation of the software engineers. Hence, this system is
operationally feasible. As this system is technically, economically and operationally feasible, this
system is judged feasible.

 ECONOMICAL FEASIBILITY
The role of interface design is to reconcile the differences that prevail among the software
engineer’s design model, the designed system meet the end user requirement with economical
way at minimal cost within the affordable price by encouraging more of proposed system.
Economic feasibility is concerned with comparing the development cost with the income/benefit
derived from the developed system. In this we need to derive how this project will help the
management to take effective decisions.
Economic Feasibility is mainly concerned with the cost incurred in the implementation of the
software. Since this project is developed using ASP.NET with C# and SQL Server which is more
commonly available and even the cost involved in the installation process is not high.
Similarly it is easy to recruit persons for operating the software since almost all the people are
aware of ASP.NET with C# and SQL Server. Even if we want to train the persons in these area
the cost involved in training is also very less. Hence this project has good economic feasibility.
The system once developed must be used efficiently. Otherwise there is no meaning for
developing the system. For this a careful study of the existing system and its drawbacks are
needed.

13
5 PROJECT OVERVIEW
The main idea for developing this project is to develop online application for improving
complaint system through online for a police department. This application will help citizens to
file a complaint through website which will be time saving and fast problem solving method.
Crime Record Management System applications will be implemented in every police station
all over the country which will concentrate on handling complaints, prevention of crime by
interconnection police information system to different police stations the country. Using this
application information handling will be easy and fast and solving cases will be fast. Any number
of clients can connect to the server. Each user first makes their login to server to show their
availability.

PROJECT MODULES
1. CITIZEN
2. STATION
3. CRIME
4. SEARCH
5. ADMINISTRATORS
6. AVOCATION

CITIZEN
Each of the citizens, who has a complaint to register, must first register with the software.
For registration part, each should following details:
 Name
 Password
 Email-id
 Phone number
 Gender
 Date of Birth
 Address
 Status
 Proof.

STATION

14
Each of the station must first register with the software. Administrator will add all the
stations with the following details:
 Station ID
 Password
 Station name
 Location
 Head of the Station
 No of officers
 No of cases registered
 No of cases cleared
CRIME
This module is used for entering all details about the crime. It contains the date and time,
police station where it is recorded, place, and nature of the crime, location of the crime will be
maintained. Crimes can be added by station and citizen.
 Crime ID
 Name of the Crime
 Location of the Crime
 Date of the Crime
 Time of the Crime
 Other Details about crime

SEARCH
Searches the crime in station-wise, nature of the crime or by date of the crime and
location recorded in the particular police station.

ADMINISTRATORS
This module will be protected by user id and password. Ordinary users of the software will not
be permitted to enter in to their area of the software. The module will be focusing on the
maintenance and removal of old outdated data from software.

AVOCATION
Deals with the law part of every crime. It includes all the details of laws like ‘section
numbers’, ‘act numbers’ according to the crime.

15
OBJECTIVES
It enables the administrator to perform operations based on citizen id like voting,
passport, gas, personal information, credit rating, etc.

Administrator
 He is treated as a owner of the web site.
 He should also have rights to accept the registration of the Citizen based on their profile
(unless the Citizen should not able to login to the site).
 He should able to verify the information for a citizen to identify them
 He should be able to edit, delete, and update Citizen Profiles.
 Should able to add/edit the Fields of particular Department like should able to add/edit
the field along with Validation rules.
 Should able to add/edit Department details.
 Should Generate the Citizen code automatically with the help of web services.
 Should Accept/Reject the details given by the Citizen about a particular department and
send his conformation information to them.

Register Managers
Administrator can able to register new Manager for each department to process the citizen or
guest requests. The manager can send status information in the half of administrator.

16
Verify requests coming from Citizen
Administrator can able to verify the request and assign the request to the corresponding Manger.

Citizens
 These citizens are authenticated to the website by providing the credentials which they
got at the time of registration.
 Individual Profile Management for Each citizen is provided in this system by using that a
citizen can update his details by using the system interface and get approve from the
administrator.
 He can able to secured login with given credentials.
 Should be able to select a particular department and add/update the related records. The
entered records will be accepted by the manager in the half of administrator as a
conformation and obtains the status information.
 He should be able to search the department details and finds the heads of each
department in the system.
 He can able to check the status of the crime information which can be sending by the
concerned manager.
 They can able to Change and recover the password by using the system interface.

Employee
 This Manager is authenticated to the website by providing the credentials which they got
at the time of registration by administrator.
 He should able to search for a Citizen who already registered in this website.
 Individual Profile Management for Each Manager is provided in this system by using that
a Manager can update his details by using the system interface and got approve from
administrator.
 He can able to got citizen or guest request from the administrator, for each department
this system is having individual manager to process the requests.

17
 By getting the request he can start the checking process and verify the citizen information
which can be stored in the centralized database.
 After completion of the verification he can send the status information regarding the
request which he receives earlier from administrator.
 The manager can able to change and recover the password by using the system interface.

Web Registration
The system has a process of registration. Every Group Member of the Police Station and
citizen need to submit their complete details in the form of registration. Whenever a Member
registration completed administrator need to approve the registration. Then only a member
can get log in into the system by using his user id and password.

18
6 DEFINITION ACRONYMS ABBREVIATIONS

ABBREVIATIONS
HTTP : Hypertext Transfer Protocol
HTML : Hyper Text Markup Language
URL : Uniform Resource Locator
SRS : Software Requirement Specification
WWW : World Wide Web
CTO : Central time officer

DEFINITIONS
HTTP
Hypertext Transfer Protocol is the set of rules for transferring files text, graphic images,
sound, video, and other multimedia files on the World Wide Web.

HTML
Hypertext Markup Language (HTML) is a language to specify the structure of documents of
retrieval across the Internet using the browser programs of the World Wide Web.

XML
The Extensible Markup Language (XML) is a general-purpose markup language. It is classified
as an extensible language because it allows its users to define their own tags.

19
7 SYSTEM REQUIREMENTS

 HARDWARE REQUIREMENTS

 Hardware : Pentium based systems with a minimum of P4.


 RAM : 256MB (minimum)

 SOFTWARE REQUIREMENTS

 Operating System : Windows XP Service Pack2.


 Technology : Java/J2EE (Servlets, JSP, JDBC).
 Web technology : HTML, JavaScript, CSS.
 Web Server : Tomcat 6.0
 Database : Oracle 10g Express Edition.
 Software’s : JDK 1.6

8 TECHNOLOGIES

Languages Used:
20
In this project, we chose Java language for developing the code.

JAVA:

Java is a programming language originally developed by James Gosling at Sun Microsystems


(which is now a subsidiary of Oracle Corporation) and released in 1995 as a core component Sun
Microsystems’ Java platform. The language derives much of its syntax from C & C++ but has a
simpler object model and fewer low –level facilities. Java applications are typically compiled to
byte code (class file) that can run on any Java Virtual Machine (JVM) regardless of computer
architecture. Java is general - purpose, concurrent, class-based and object-oriented and is
specifically designed to have as few implementation dependencies as possible. It is intended to
let application developers “write once run anywhere”. Java is considered by many as one of the
most influential programming languages of the 20th century, and is widely used from application
software to web applications.

The original and reference implementation java compilers, virtual machines and class libraries
were developed by Sun from 1995. As of May 2007 in compliance with the specifications of the
Java Community Process, Sun relicensed most of its Java technologies under the GNU General
Public License. Others have also developed alternative implementations of these Sun
technologies, such as GNU compiler for Java and GNU class path.

Principles:
There were five primary goals in the creation of the Java language:
1. It should be “simple, object-oriented and familiar”.
2. It should be “robust and secure”.
3. It should be “architecture neutral and portable”.
4. It should execute with “high performance”.
5. It should be “interpreted, threaded, and dynamic”.

FEATURES OF JAVA:

Platform Independent:

21
The concept of Write-once-run-anywhere (known as platform independent) is one of the
important key feature of Java language that makes java as the most powerful language.
Unlike many other programming languages including C and C++ when Java is compiled,
it is not compiled into platform specific machine, rather into independent byte code. This
byte code is distributed over the web and interpreted by Java virtual Machine (JVM) on
whichever platform it is being run.
 Simple:
Java is designed to be easy to learn. If you understand the basic concept of
OOPS, java would be easy to master.
 Object Oriented:
In java everything is an object. To be an object-oriented language, any language
must follow at least the four characteristics.
 Inheritance:
Inheritance is the process by which one object acquires the properties of another
object
 Encapsulation:
It is the mechanism of combining information & providing the abstraction.
 Polymorphism:
Polymorphism is the way of providing different functionality by the functions
having the same name based on the signatures of the methods.
 Distributed:
The widely used protocols like HTTP and FTP are developed in java. Internet
programmers can call functions on these protocols and can access the files from
any remote machine on the internet rather than writing codes on their local
system.

 Portable:

22
The feature Write-once –run-anywhere makes the java language portable
provided that the system must have interpreter for the JVM. Java also has the
standard data size irrespective of operating system or the processor. These
features makes the java as a portable language.
 Dynamic:
While executing the java program the user can get the required files dynamically
from a local drive or from a computer thousands of miles away from the user just
by connecting with the internet.
Java is considered to be more dynamic than C or C++ since it is designed to
adapt to an evolving environment. Java programs can carry extensive amount of
run-time information that can be used to verify and resolve accesses to object on
run-time
 Secure:
With Java secure feature it enabled to develop virus-free, tamper-free systems.
Authentication techniques are based on public-key encryption.
 Performance:
Java uses native code usage, and light weight process called threads. In the
beginning interpretation of byte code resulted the performance slow but the
advance version of JVM uses the adaptive and just in time compilation technique
that improves the performance.
 Multithreaded:
Java is also multithreaded programming language. Multithreading means a single
program has multiple threads executing independently at the same time. Multiple
threads execute instructions according to the program code in a process or
program. Multithreading works the similar way as multi processes run on one
computer. Multithreading programming is very interesting concept in java. In
multithreaded programs not even a single thread disturbs the execution of other
thread. Threads are obtained from the pool of available ready to run threads and
they run on the system CPUs.

23
Advantages of JAVA:
 It is an open source, so users do not have to struggle with heavy license fees each
year.
 Platform independent.Java API’s can easily be accessed by developers.Java
supports garbage collection, so memory management is automatic.
 Java always allocates objects on the stack.
 Java embraced the concept of exception specifications.
 Multi-platform support language and support for web-services.
 Using Java we can develop dynamic web applications.
 It allows you to create modular programs and reusable codes.

JAVA SERVER PAGES:

Java server pages is a simple but powerful technology used to generate dynamic web
pages on the server side. JSP’s are direct extension of java servlets and provide a way to separate
content generation from content presentation.

FEATURES OF JSP:

Portability
Java Server Pages files can be run on any web server or web-enabled application
server that provides support for them. Dubbed the JSP engine, this support involves
recognition, translation and management of the Java Server Page lifecycle and its
interaction components.

Components
It was mentioned that the Java Server Pages architecture can include reusable Java
components. The architecture also allows for the embedding of a scripting language
directly into the Java Server Pages file. The components current supported include Java
Beans and Servlets.
Processing

24
A Java Server Pages file is essentially an HTML document with JSP scripting or tags.
The Java Server Pages file has extension to the server as a Java Server Pages file. Before
the page is served, the Java Server Pages syntax is parsed and processed into a Servlet on
the server side. The Servlet that is generated outputs real content in straight HTML for
responding to the client.

HTML:

HTML, which stands for Hypertext Markup Language, is the predominant markup language for
web pages. It provides a means to create structured documents by denoting structural semantics
for text such as headings, paragraphs, lists, links, quotes and other items. It allows images and
object to be embedded and can be used to create interactive forms. It is written in the form of
HTML elements consisting of “tags” surrounded by angle brackets within the web page content.
It can embed scripts in languages such as JavaScript which affect the behavior of HTML web
pages. HTML can also be used to include Cascading Style Sheets (CSS) to define the appearance
and layout of text and other material. The W3C, maintainer of both HTML and CSS standards,
encourages the use of CSS over explicit presentational markup.

HTML TAGS:

Basic HTML Tags:

<!-- --> Specifies comments

<A>………</A> Creates hypertext links

<B>……….</B> Formats text as bold

<BIG>…….</BIG> Formats text in large font

<BODY>……</BODY> Contains all tags and text in the HTML documents

<CENTER>…….</CENTER> Aligns text center

25
<DD>………….</DD> Definition of a term

<DL>…………..</DL> Creates definition list

<FONT>……….</FONT> Formats text with a particular font

<FORM>……….</FORM> Encloses a fill-out form

<FRAME>……….</FRAME> Defines a particular frame in a set of frames

<H#>…………….</H#> Creates headings of different levels

<HEAD>………</HEAD> Contains tags that specify information about a document

<HR>…………</HR> Creates a horizontal rule

<HTML>………</HTML> Contains all other HTML tags

<META>……..</META> Provides meta-information about a document

<SCRIPT>………</SCRIPT> Contains client-side or server-side script

<TABLE>………</TABLE> Creates a table

<TR>………</TR> Designates a table row

<TH>………</TH> Creates a heading in a table

Advantages:
 A HTML document is small and hence easy to send over the net.
 It is small because it does not include formatted information.
 HTML is platform independent.HTML tags are not case-sensitive.

JDBC:

26
JDBC is an API for the java programming language that defines how a client may access a
database. It provides methods for querying and updating data in a database. JDBC is oriented
towards relational databases.

JDBC was first introduced in the Java2 Platform, Standard Edition, version 1.1(J2SE), together
with a reference implementation JDBC-to-ODBC bridge, enabling connections to any ODBC-
accessible data source in the JVM host environment.

Functionality:

JDBC allows multiple implementations to exist and be used by the same application. The API
provides a mechanism for dynamically loading the correct java packages and registering them
with the JDBC Driver Manager. The Driver Manager is used as a connection factory for creating
JDBC connections.

JDBC connections support creating an executing statements. These may be update statements
such as SQL’s CREATE, INSERT, UPDATE and DELETE or they may be query statements such
as SELECT. Additionally, stored procedures may be invoke ed through a JDBC connection.
JDBC represents statements using one of the following classes:
 Statement – the statement is sent to the database server each and every time.
 Prepared Statement- the statement is cached and then the execution path is pre
determined on the database server allowing it to be executed multiple times in an efficient
manner.
 Callable Statement-used for executing stored procedures on the database.

Update statements such as INSERT, UPDATE and DELETE return an update count that indicates
how many rows were affected in the database. These statements do not return any other
information.

Query statements return a JDBC row result set. The row result set is used to walk over the result
set. Individual columns in a row are retrieved either by name or by column number. There may
be any number of rows in the result set. The row result set has metadata that describes the names
of the columns and their types.

27
JDBC Drivers:

JDBC drivers are client-side adapters (installed on th client machine, not on the server) that
convert requests from java programs to a protocol that the DBMS can understand.

JDBC drivers fall under four categories:


 TYPE-1
 TYPE-2
 TYPE-3
 TYPE-4

Type 1 driver- JDBC-ODBC Bridge

The JDBC type 1 driver, also known as the JDBC-ODBC bridge, is a database driver
implementation that employs the ODBC driver to connect the database. The driver converts
JDBC method calls into ODBC function calls.

This driver leads to other installation dependencies; for example, ODBC must be installed on the
computer having the driver and the database must support an ODBC driver. The use of this driver
is discouraged if the alternative of a pure-Java driver is available.

28
Functions:
 Translates query obtained by JDBC into corresponding ODBC query, which is then
handled by the ODBC driver.
 Sun provides a JDBC-ODBC Bridge driver.
 Sun.jdbc.odbc.JdbcDriver.
 This driver is native code and not Java, and is closed source.Client -> JDBC Driver ->
ODBC Driver -> Database.
 There is some overhead with the translation work to go from JDBC to ODBC.

Advantages:
 Almost any database for which ODBC driver is installed, can be accessed.
 A type 1 driver is easy to install.

29
Disadvantages:
 The driver is platform-dependent as it makes use of ODBC which is in turn depends on
native libraries of the underlying operating system the JVM is running upon.
 This technology isn’t suitable for a hign-transaction environment.
 This driver is non-portable given the binding between the driver and platform.
 This drivers also don’t support the complete Java command set and are limited by the
functionality of the ODBC driver.

Type 2 Driver – Native – API Driver specification:


The JDBC type 2 driver ,also known as the Native –API driver, is a database driver
implementation that uses the client-side libraries of the database. The driver converts JDBC
method calls into native calls of the database API.

The type 2 driver is not written entirely in Java as it interfaces with non-Java code that makes
the final database calls. The driver is compiled for use with the particular operating system. For

30
platform interoperability, the Type 4 driver, being a full-Java implementation, is preferred over
this driver.
However the type 2 driver provides more functionality and better performance than the type 1
driver as it does not have the overhead of additional ODBC function calls.

Advantages:
 Better performance than Type 1 Driver(JDBC-ODBC Bridge).
 Provides Fastest performance than all 3 drivers as it calls native APIs ( MySQL, Oracle
etc.)

Disadvantages:
 The vendor client library has to be installed on the client machine.
 Cannot be used in web-based application due to the client side software needed.
 Not all databases have client side library.
 This server is platform dependent.This driver supports all java applications except
Applets.

Type 3 Driver – Network – Protocol Driver


The JDBC type 3 driver, also known as the Pure Java Driver for Database Middleware, is a
database driver implementation which makes use of a middle tier between the calling program
and the database.
The middle-tier (application server) converts JDBC calls directly or indirectly into the vendor-
specific database protocol.

31
This differs from the type 4 driver in that the protocol conversion logic resides not at the client,
but in the middle-tier. Like type 4 drivers, the type 3 driver is written entirely in Java. The same
driver can be used for multiple databases. It depends on the number of databases the middleware
has been configured to support. The type 3 driver is platform –independent as the platform-
related differences are taken care by the middleware. Also, making use of the middleware
provides additional advantages of security and firewall access.

Functions:
 Follows a three tier communication approach.
 Can interface to multiple databases –Not vendor specific.
 The JDBC Client driver written in Java, communicates with a middleware-net-server
using a database independent protocol, and then this net server translates this request into
database commands for that database.
 Thus the client driver to middleware communication is database independent.Client ->
JDBC Driver -> Middleware-Net-Server -> Any Database.

32
Advantages:
 Since the communication between client and the middleware server is database
independent, need not be changed for a new database.
 The Middleware Server (which can be a full fledged J2EE Application server) can
provide typical middleware services like caching(connections, query results, and
so on), load balancing, logging, auditing etc. Eg. For the above include jdbc driver
features in Weblogic.
 At client side a single driver can handle any database. (It works provided the
middleware supports that database)
 Can be used in internet since there is no client side software needed.

Disadvantages:
 Requires database-specific coding to be done in the middle tier.
 An extra layer added may result in a time-bottleneck. But typically this is overcome by
providing efficient middleware services.

Type 4 Driver - Native-Protocol Driver:


The JDBC type 4 drivers, also known as the Direct to Database Pure Java Driver, is a database
driver implementation that converts JDBC calls directly into the vendor-specific database
protocol.
The type 4 driver is written completely in Java and hence platform independent. It is installed
inside the Java Virtual Machine of the client. It provides better performance over the type 1 and 2
drivers as it does not have the overhead of conversion of calls into ODBC or database API calls.
Unlike the type 3 drivers, it does not need associated software to work.
As the database protocol is vendor- specific, separate drivers, usually vendor-supplied, need to
be used to connect to different databases.

33
Functions:
 Type 4 drivers are entirely written in Java that communicates directly with a vendor’s
database, usually through socket connections.
 No translation or middleware layers are required, improving performance.The driver
converts JDBC calls into the vendor-specific database protocol so that client application
can communicate directly with the database server.
 Completely implemented in Java to achieve platform independence.
 Eg: include the widely used Oracle thin driver – oracle.jdbc.driver.OracleDriver which
connect to jdbc:oracle:thin URL format.
 Client -> Native Protocol JDBC Driver -> Database server

Advantages:
 These drivers don’t translate the requests into an intermediary format (such as ODBC ),
nor do they need a middleware layer to service requests.
 Thus the performance may be considerably improved.All aspects of the application to
database connection can be managed within the JVM; this can facilitate easier debugging.

34
Disadvantages:
 At client side, a separate driver is needed for each database.

STAGES IN A JDBC PROGRAM:

REGISTERING THE DRIVER:

A database driver is software containing the classes and interfaces written according
to the JDBC API. Since there are several drivers available in the market, we should first
declare the driver which is going to be used for communication with the database server in a
java program.

CONNECTING TO A DATABASE:

In this stage we establish the connection with a specific database through the
driver which is already registered in the previous step.

PREPARING SQL STATEMENT:

We should create SQL statements in our java program using any one of the
interfaces like Statement, Prepared Statement, Callable Statement which are available in java.sql
package.

EXECUTING THE SQL STATEMENTS ON THE DATABASE:

For this purpose, we can use executeUpdate(), executeQuery(), methods of


statement Interface.

RETRIEVING THE RESULTS:

The Results obtained by executing the SQL statements can be stored in an object
with the help of interfaces like Result Set.

35
CLOSING THE CONNECTION:
We should close the connection between the Java program and the database using close()
method of connection Interface.

DATABASE
A database is a separate application that stores a collection of data. Each database has one
or more distinct APIs for creating, accessing, managing, searching and replicating the data it
holds.
Other kinds of data stores can be used, such as files on the file system or large hash tables in
memory but data fetching and writing would not be so fast and easy with those type of
systems.
The Oracle Database (commonly referred to as Oracle RDBMS or simply as Oracle) is
an object-relational database management system produced and marketed by Oracle
Database.
The name Oracle comes from the code-name of a CIA-funded project Ellison had worked
on while previously employed by Ampex.
An Oracle database system—identified by an alphanumeric system identifier or SID—
comprises at least one instance of the application, along with data storage. An instance—
identified persistently by an instantiation number (or activation id:
SYS.V_$DATABASE.ACTIVATION#)—comprises a set of operating-
system processes and memory-structures that interact with the storage. Oracle documentation can
refer to an active database instance as a "shared memory realm".
Users of Oracle databases refer to the server-side memory-structure as the SGA (System Global
Area). The SGA typically holds cache information such as data-buffers, SQL commands, and
user information. In addition to storage, the database consists of online redo logs (or logs), which
hold transactional history. Processes can in turn archive the online redo logs into archive logs
(offline redo logs), which provide the basis (if necessary) for data recovery and for the physical-
standby forms of data replication using Oracle Data Guard.

DBMS Terminology:

36
Database: A database is a collection of tables, with related data.

Table: A table is a matrix with data. A table in a database looks like a simple spreadsheet.

Column: One column (data element) contains data of one and the same kind, for example
the column postcode.

Row: A row (tuple, entry or record) is a group of related data, for example the data of one
subscriptionn.

Primary Key: A primary key is unique. A key value cannot occur twice in one table. With a
key you can find at most one row.

Foreign Key: A foreign key is the linking pin between two tables.

Composite Key: A composite key is a key that consist of multiple columns,


because one column is not sufficiently unique.

Unique Key: A unique key is a key that allows null values in tables. Each table can have multiple

unique keys.

9 SYSTEM DESIGN

 USE CASE DIAGRAMS:

Each use case on the diagram represents a single task that the system needs to
carry out. Buy a Product, Add Client, Make Purchase and Validate Order
Information are all examples of use cases. Some use cases may include or
extend a task represented by another use case. For example, in order to make a
purchase, the order information will need to be validated.

37
Actor
An actor is anything outside the system that interacts with the system to
complete a task. It could be a user or another system. The actor "uses" the use
case to complete a task. System Administrator, Credit Authentication System,
Accounting System and Web Client are all examples of actors. Often, it is useful
to look at the set of use cases that an actor has access to -- this defines the
actor's overall role in the system.
Over all Use Cases

Employee Information

Employee Police Station


Can
Information Master
Hav
e

Designation
Has
Master

Police Station Master


Department
Can
Master
Work
for
Crime
Police Station Designation
Has
Category
Master Has Master Master

Victims
FIR Master

Territory
Victims FIRHas
Master
Master Victims Master
Can
Have 10

Employee 38
Has
Master
One In
charge
Login Master

Profile
Login Master Has
Master

Department
Has
Employee
Use Case Diagrams
Master
The actors who have been identified in the system are as follows:

1. Investigating officer

2. Administrator

3. Writer
Investigating officer: He is the actor who can practically work upon the existing data in the
police station only for view purpose.

39
Administrator: He is the actor who has the full-length potentiality and privilege to carry
out transactions upon the system. He is authorized to maintain consistency within the
information.

40
Writer: He is the actor who can enter all the details of the crime or evidence. Once entered
cannot be edited. Only the administrator can edit or delete the record from the database.

41
Citizen Registration

42
43
Citizen Send Request to Administrator

44
Administrator Assign requests to Manager

45
Citizen Search for Request Status

Req Status clsStatus DALSQLHelper Database

: Citizen
1 : View Status()

2 : SendReqForStatus()

3 : GetStatus()

4 : Execute DataSet()

5 : Response For Execute DataSet()

6 : Get Response()

7 : Show Status Info()

46
 10.2 SEQUENCE DIAGRAMS
Administrator:

Provide Username, Password

Register Evidence details

Register Crime Charge Sheet

Register Police stations

47
Investigator:

Provide Username, password

View Crime Charging Sheet

View Crime Sequence Information

View Evidence Details

View FIR Details

48
Writer:

Provide Username, password

Register Crime Charge Sheet

Register Victims

Register Victims FIR

49
 10.3 ACTIVITY DIAGRAMS
Station Registration

50
Citizen Activities

51
Station Activities

52
Activity for Administrator

53
Citizen Registration

54
 CLASS DIAGRAM

55
56
11 SCREEN LAYOUT

MAIN PAGE

LOGIN PAGE

57
REGISTRATION-PAGE

STATION HOME PAGE

58
59
FIRREPORT

60
VIEW COMPLAINTS

VIEW CITIZENS HOMEPAGE

61
VIEW-FEED BACK

REGSITER A COMPLAINT

62
ADMIN HOME PAGE

63
VIEW PUBLIC LEADS

VIEW STATION NOTIFICATION

64
12 DATADASE DESIGN
TABLES
ADD STATION

CRIMINAL DETAILS

65
CITIZEN REGSITRATION

STATION REGISTRATION

66
AVOCATION

VICTIM DETAILS

VIEW COMPLAINTS

67
REMOVE STATION

FIR REPORT

FEEDBACK

68
13 TEST REPORT AND TEST PLAN

INTRODUCTION
Test Reports, Test Plan:
Software testing is a process of validating and verifying that a software program
/application/product meets:
1. The business and technical requirements that guided its design and development
2. Works as expected can be implemented with the same characteristics.

Purpose:
A primary purpose for testing is to detect software failures so that defects may be uncovered and
corrected. Software testing includes examination of code as well as execution of that code in
various environments and conditions.
It also includes examining the aspects of code: does it do what it is supposed to do and do what it
needs to do. Information derived from software testing may be used to correct the process by
which software is developed.
Testing Methods:
Software testing methods are divided into White, Black and Grey box testing. These approaches
are used to describe the point of view that a test engineer takes when designing test cases.

White Box Testing:

White box testing is done when the tester has access to the internal data structures and
algorithms including the code that implements it.

Black Box Testing:

Black box testing treats the software as a “black box” without any knowledge of internal
implementation.

Grey Box Testing:

69
Grey box testing involves having knowledge of internal data structures and algorithms for
purpose of designing the test cases, but testing at the user, or black-box level.
Grey box testing may also include reverse engineering to determine, for instance,
boundary values or error messages.
Testing Levels:
Tests are frequently grouped by where they are added in the software development process, or by
the level of specificity of the test.

Unit Testing:

Unit testing refers to tests that verify the functionality of a specific section of code,
usually at the function level. In the object-oriented environment, this usually at class
level, and the minimal unit tests include the constructors and destructors.

Integration testing:

Integration testing is any type of software testing that seeks to verify the interfaces
between COMPONENTS
System testing:

System testing tests a completely integrated system to verify that it meets its
requirements.

System Integration Testing:

System integration testing verifies that a system is integrated to any external or third
party systems defined in the system requirements.

Test Report 1:
Project Name: CRIME RECORDS MANAGEMENT SYSTEM
Form Name: Login
Unit Name: User-id, Password
Test Result: After entering two fields the user successfully logs into the system

Test Plan 1:
Unit id : Login

70
Test Case id : User-id
Test Type : Unit Testing
Form Name : Login
Base Table : Admin/Citizen/Station
Purpose : To give access to the user after he/she enters valid user-id and password.
Description:
User id : varchar (40)
Password : varchar (40)
Test data:

Serial No. Input Specification Output Specification


1 User id: Navigates to the respective
Valid Input home pages.

Invalid input It will ask to enter correct


values again.
2 Password:
Valid Input Navigates to the respective
home page.
Invalid input It will ask to enter correct
values again.

Test Process:
Login form will be used for allowing the correct user to use the software. Every person will be
given a user id and password. After successful login the user can use the software as per the
privileges given to him. The user id will be entered in the textbox given for user id. The
password will be entered in the textbox given for password.

Test completion criteria:

71
When expected results match the actual results after performing the test, the test is considered to
be complete.

14 CONCLUSION

The Crime Records Management System is a web-based application for primarily providing
training to the employees who provide customized solutions to meet organizational needs.

This application software has been computed successfully and was also tested
successfully by taking “test cases”. It is user friendly, and has required options, which can be
utilized by the user to perform the desired operations.

72
The software is developed using ASP.Net as front end and SQL as back end in Windows
environment. The goals that are achieved by the software are:
 Instant access.
 Improved productivity.
 Optimum utilization of resources.
 Efficient management of records.
 Simplification of the operations.
 Less processing time and getting required information.
 User friendly.

73
15 BIBLIOGRAPHY

www.java.com
www.oracle10g.com
www.google.com
The Complete Reference Java Fourth Edition

74

You might also like