Professional Documents
Culture Documents
Ecop
Ecop
1. INTODUCTION
1.1 Project overview Online crime reporting is a virtual police station which can maintain the records of crime, case detail and police departments like law and order, women protection, traffic control etc. The main aim of this system is to provide online vigilance facilities, the stations, criminal records; licensing record gets online, so that privileges authorities can view/modify the records. Detectives& Magistrates have access to criminal records where they can search and justify the people in a better and faster way. The virtual police station corresponds to a physical police station situated in location. Anyone can see the name and designations of the appointed officers at the police station. 1.2 Project scope An online solution is very useful as the solution is inherently distributive. This distributive characteristic of the online solution helps in getting the different police stations to share information and get in contact with one another. With respect to ECOPS, going forward, the aim is to develop new technologies that include designing new techniques to fight crime and improve criminal justice. Plans are afoot to embed multi-purpose technologies such as traffic management, mobile data techniques, warrants, personnel scheduling, gang activity analysis, field reporting, human resource development of police personnel, etc. For the police, initiatives such as ECOPS are designed to improve their long-term relations with the citizens due to effective feedback and faster exchange of critical information between various departments and police stations.
DEPARTMENT OF CSE
2
ONLINE CRIME REPORTING
1.3 Project purpose Usually the citizen has to go to police station to make a complaint. Here we have given an opportunity to make a complaint through online and the actors will be taken by the police officers immediately. The communication for officers will be easy. The license can be get easily through online if it is selected by the officers via sms and mail. The main purpose behind the Online crime reporting system was to improve the effectiveness of policy performance; to improve the efficiency of police procedures; for example, by eliminating redundant processes in the registration of criminal cases; and to improve the quality of management information provided for senior policy decision-making, particularly through integration of previously separate information systems. Within the focus on effectiveness, there was a concern about the non-transparent, even dishonest nature of police work, which had become synonymous with corruption and delay. The intention was that the new system - through its automation of previously human processes and through its state-wide and online accessibility - would make the registration, processing and follow-up of criminal cases more open. Under the existing regime, many police require a bribe before they are willing to register a case, and also require a bribe to be paid before they answer any query about the case, such as its progress, or other information held on file. It was partly this poor image of police functioning, that led the Chief Minister of the State to impose the system on the police service. There were also drivers from the failure of police to properly prosecute some high-profile criminal cases that had political overtones; something which was politically-damaging and seen as requiring an equally high-profile reaction.
DEPARTMENT OF CSE
3
ONLINE CRIME REPORTING
1.4 Objectives Generally many crimes seen by the public will not reach to the police due to many reasons like fear, Lack of time, Ignorance. Due to this reason many cases are not even reaching the police station. Though some cases are registered they are not investigated properly due to lack of evidences and Cooperation of the public. This software helps the public to report about the crimes to the police without any fear in correct time. This is helpful to police in solving the cases .This is also helpful for higher authorities of police to have an overview about the progress of the investigation. ECOPS is an online reporting service to which the internet user can report crimes committed on or through the Internet. The impact of IT and communications is traversing at a fast pace. As information for the department is crucial, an enterprise IT tool for enhancing the performance of the police officials became necessary called ONLINE CRIME REPORTING or E-Computerized Operations for Police Services, the main purpose is to maintain information, monitor and enhance the performance of the department. The focus of ONLINE CRIME REPORTING is to computerize the activities of controlling crime, administration and support services across the state in an integrated fashion so as to enable the division heads and senior officers to obtain the relevant information. Besides, it is also envisaged to reduce dependence on paper and help in automatic maintenance of registers and generation of reports, data analysis, better planning and coordination, speedy detection of crimes and monitoring the prosecutions.
DEPARTMENT OF CSE
4
ONLINE CRIME REPORTING
2. SYSTEM ANALYSIS
2.1 Existing system The normal public in India is afraid to give a complaint in police station because they are filled with a false fear about the police department. An online complaint registration system will solve the fear of the public and will also help to police dept in catching criminals. It will improve the service, so you dont have to wait on hold on the telephone or go down to the station to file a report. 2.2 Drawbacks of existing system Existing system is time consuming Corrections & maintenance should be done manually It needs more man power There may be mistakes while maintaining data manually.
2.3 Proposed system An online solution is very useful as the solution is inherently distributive. This distributive characteristic of the online solution helps in getting the different police stations to share information & get in contact with one another. The reports filled online are checked at the administrative department to use if any information is lacking or to check the status of the report.
DEPARTMENT OF CSE
5
ONLINE CRIME REPORTING
2.4 Modules of the product The modules present in the online crime reporting are:
Module description: Complaints: From this module public give their complaints through online. The complaints are stored into crime report database .One complaints are entered into this database it cannot be modified by any person. This is read only module. Thieves information: This module displays the information about thieves and terrorist information with their photos and rewards on them. Caution: This module gives cautions to police department and gives some helpful suggestions. Suppose any incident done in the city like bomb blast or any terrorist killed by the police, immediately alert message will be displayed on this site & also what actions should be taken. It is very helpful to police department.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
6
ONLINE CRIME REPORTING
Administrator: This module is accessible to some VIPs like SP, DCP, and DIG etc. By using this module they can give any caution to the police department. Also they can perform updations to the crime report database.
3. REQUIREMENT SPECIFICATION
3.1 Requirement study and analysis Generally many crimes seen by the public will not reach to the police due to many reasons like fear, Lack of time, Ignorance. Due to this reason many cases are not even reaching the police station. Though some cases are registered they are not investigated properly due to lack of evidences and Cooperation of the public. This software helps the public to report about the crimes to the police without any fear in correct time. This is helpful to police in solving the cases .This is also helpful for higher authorities of police to have an overview about the progress of the investigation. An online solution is very useful as the solution is inherently distributive. This distributive characteristic of the online solution helps in getting the different police stations to share information and get in contact with one another. With ECOPS, the exchange of information within police stations and other senior police officers in the departments is faster. It also streamlines the workflow in police department machinery. A central database permits the police units to operate more efficiently leading to speedy detection of crime and prosecution monitoring. The senior police officers of the state can access the reports, which allow them to take quick and timely decisions. Crime analysis reports will enable the senior police officers to observe the crime trends and to guide the investigating officers. The technological benefits of ECOPS are to maintain information, monitor and enhance the performance of the department, to take a critical look at the existing system, processes and procedures of the department so as to identify and remove the redundancy.
DEPARTMENT OF CSE
7
ONLINE CRIME REPORTING
ECOPS is envisaged to reduce the fair amount of paper work and helps in the automatic maintenance of registers and generation of reports, data analysis, better planning and coordination, timely decision and speedy detection of crime and prosecution monitoring. All these factors have contributed to a higher moral of the police officials at all the levels in police department. The case registered at one police station can be tracked at any police station. This reduces the discretionary dependence of police. Once the case is registered the investigation and follow up activities relating to the case cannot be delayed. The grievances handling is more efficient. Now, the citizens will have access to senior officers through the web. ECOPS introduced transparency and accountability in the whole system. The User Interface should be user friendly to the user who uses the home page by which he/she can easily register. The Operations should take place transparently.
3.2 Software requirements Front End Tool: Java Server Pages, Java Script, and HTML Back End Tool: Oracle 9i Software Interfaces Operating System: Windows 2000 Database Server Explorer : Oracle 9i : Tomcat 5.0 : Microsoft Internet Explorer
Client
Hardware Platform : P III or above with
DEPARTMENT OF CSE
8
ONLINE CRIME REPORTING
Server
Hardware Platform RAM Hard Disk : P III or above with : 256MB or above. : 20GB or above of HD.
DEPARTMENT OF CSE
9
ONLINE CRIME REPORTING
3.5 Overall description The ONLINE CRIME REPORTING is an application which is providing the features of dynamic web application as well as that of the stand alone application on the administrator side. The application will be used across the state by the citizens, the law enforcement bodies, and private detective and cyber caf & hotel employees. It can be used to track the criminal, to gather the information about the crime or about criminal and missing person and to broadcast or communicate information ( of any criminal activity or other alert). The citizen can register the e complaint here which will ease out the process for the citizens and also for the police to
DEPARTMENT OF CSE
10
ONLINE CRIME REPORTING
maintain records as the status of the case can be viewed as well as can be updated. The data required to be available is the districts of the state along with areas enclosed by them. The web pages (XHTML/JSP) are present to provide the user interface on customer client side. Communication between customer and server is provided through HTTP/HTTPS protocols. The Client Software is to provide the user interface on system user client side and for this TCP/IP protocols are used. On the server side web server is for EJB and database server is for storing the information
COMPLAIN TS
THIEVES POLICE
DEPARTMENT OF CSE
11
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
12
ONLINE CRIME REPORTING
4.1.3 Procedural design The procedural design describes structured programming concepts using graphical, tabular and textual notations. These design mediums enable the designer to represent procedural details that facilitates translation to code. This blueprint for implementation forms the basis for all subsequent software engineering work. 4.1.3 Modular design User
DEPARTMENT OF CSE
13
ONLINE CRIME REPORTING
User: User can send the complaints to police and they can view the complaint report. User can perform these tasks only when he logins to his account otherwise he has to register his new account. Police send the status report to the users based on their investigation. The user can check the status of their complaints with the help of complaint id given. The user can register his complaints to the police and view the thieves information. Administrator: Higher authorities like VIPS, CP, and DCP can view the complaints which are sent by the public. The administrator has to login with their account in order to perform his actions. They can send alert messages to the police department regarding any future complications. The administrator can also send cautions to the users. Unlike police who can view complaints specific to his area the administrator can view the complaints universally. Police Department: Basing on the complaints given by the public, police can view them and take appropriate action timely. The police has to login with their account to view the complaints and to send the status of the complaints to the users. They can update the status of the complaint basing on the progress of investigation. They will also receive alerts from the higher authorities regarding warnings and can take action in advance.
14
ONLINE CRIME REPORTING
Description
Varchar2(1000)
Complaint
Crime type
Varchar2(20)
Type of Crime
Varchar2(30)
Cdate
date
TABLENAME: Thieves
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
15
ONLINE CRIME REPORTING
Data type
Description
Remarks
Name
Varchar2(20)
Alias name
Varchar2(30)
DOB
date
Address
Varchar2(40)
Reward
Number
Status
Varchar2(30)`
TABLENAME: Alert S.No Column name 1 Alert Data type Varchar2(60) Description Alert message given By the Administrator Remarks
DEPARTMENT OF CSE
16
ONLINE CRIME REPORTING
TABLENAME: Crimeimg S.No Column name 1 Tid Data type Number Description Thief identification Number 2 Path Varchar2(30) Path of the image where stored Remarks
TABLENAME: Caution S.N Column o 1 name cid Data type Number Complaint Identification Number 2 Admin Caution Varchar2( 30) Caution given by the Administrator to the Given complaint Description Remar ks
TABLENAME: Login S.No Column name 1 Userid Data type Number Description Administrator Identification Number 2 Pwd Varchar2(30) Password given to the Administrator
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
17
ONLINE CRIME REPORTING
Pname
Varchar2(30)
TABLENAME: Plogin S.No Column name 1 Userid Data type Number Description Police Identification Number 2 3 Pwd Pname Varchar2(30) Varchar2(30) Password given to the Police Name given to the police Remarks Primary Key
TABLENAME: Status S.No Column name 1 cid Data type Number Description Complaint Identification Number 2 Status Varchar2(20) Status of the complaint Given by the administrator TABLENAME: Crimedb S.No Column name 1 Crime Type 2 Suggestion Varchar2(300) Varchar2(30) Type of crime Suggestion given to the Police dept for particular crime Data type Description Remarks Remarks
DEPARTMENT OF CSE
18
ONLINE CRIME REPORTING
4.3 Feasibility Analysis Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses of the existing business or proposed venture, opportunities and threats as presented by the environment, the resources required to carry through, and ultimately the prospects for success. In its simplest terms, the two criteria to judge feasibility are cost required and value to be attained. As such, a well-designed feasibility study should provide a historical background of the business or project, description of the product or service, accounting statements, details of the operations and management, marketing research and policies, financial data, legal requirements and tax obligations. Generally, feasibility studies precede technical development and project implementation.
19
ONLINE CRIME REPORTING
Data Flow Diagrams are of two types: Physical Data Flow Diagrams: These are implementation-dependent i.e., they show the actual devices, departments, people, etc., involved in the system. Logical Data Flow Diagrams: These diagrams describe the system independently of how it is actually implemented, they show what takes places, rather than how an activity is accomplished. The DFD is intended to represent information Flow but it is not a flow chart and is not intended decision-making, flow of control, loops and other procedural aspects of the system. DFD is a useful Graphical tool and is applied at the earlier stages of requirements analysis. It may be further refined at preliminary design stage and is used as mechanism for top-level structural design for software.
The DFD drawn first at a preliminary level is further expanded into greater details: The context diagram is decomposed and represented with multiple rectangles. Each of these rectangles may be decomposed further and given as more detailed DFD. Explanation of DFD.
ONLINE CRIME REPORT
Context diagram:
USER
ADMIN Its a diagram, which shows whole system at once. The sources in context diagram for
this system are USER, ADMINISTRATOR, POLICE and these are linked to the ONLNECRIMEREPORTING. The Context Diagram is shown in fig (6.1.1):
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
POLICE
20
ONLINE CRIME REPORTING
5.2 Levels of data diagram Level -1 Diagram: User login process is the Level-1 DFD shown in Fig(6.2.1). Here user has to enter into the registering complaint area any one register the complaint so there is user id and password for it. After entering the complaint and pressing submit it will be send to the complaint database. If his complaint has been successfully entered in to the database he is allotted with a self generated no which is used for the further purposes. The user can view the status of his compliant in the status menu by entering the self generated no given by the system.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
21
ONLINE CRIME REPORTING
The user can also view the details of the thieves present in the various locations to make him cautious .By just selecting the location and the thieves id he can view the details of the thieves with his photo and reward announced on him by the police.
Level -2 Diagram: Police login is Level-2 DFD as shown in Fig(6.2.2). In this level, different police officers of different locations were provided with their particular user id and password using which they have to login in. The entered user id and password were validated and if correct they were made to login. Here they can view the alert message given by the administrator and also the caution
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
22
ONLINE CRIME REPORTING
by the administrator to the particular complaint. Police officers can see the complaints belonging to their locality only.
Level -3 DIAGRAM: Level-3 DFD diagram is for administrator .Here he consists of login page .Where he has to login using user id and password provided to him. After entering user id and password they are validated and if correct they made to enter into the page. Here he has two tasks they are sending alert messages and caution for the particular complaint to the police. In the caution first he has to select the location and then the complaint id and then he has to send the status and caution to
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
23
ONLINE CRIME REPORTING
the particular complaint. The entered alert, status, and caution were sent to the respective databases.
5.3 Flow chart A flowchart is a type of diagram that represents an algorithm or process, showing the steps as boxes of various kinds, and their order by connecting these with arrows. This diagrammatic representation can give a step-by-step solution to a given problem. Process operations are represented in these boxes, and arrows connecting them represent flow of control. Data flows are not typically represented in a flowchart, in contrast with data flow diagrams; rather, they are
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
24
ONLINE CRIME REPORTING
implied by the sequencing of operations. Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.
Start
Valid User
User Validati on
Invalid User
Logout
End
DEPARTMENT OF CSE
25
ONLINE CRIME REPORTING
6. UML DIAGRAMS
6.1 Class diagrams
26
ONLINE CRIME REPORTING
Login
Registration
Lodge Complaint
Admin
Send Reports
View Report
Logout
DEPARTMENT OF CSE
27
ONLINE CRIME REPORTING
Admin login
Police
User
Registration,login
login
lodge Complaint
View Complaint
notify
notify
View Status
View Status
28
ONLINE CRIME REPORTING
Admin
5: 9: notify
DEPARTMENT OF CSE
29
ONLINE CRIME REPORTING
to activity within a system. Here we are having four forms they are Complaints, Thieves information, Administrator, Police dept.
1 .Complaints
COMPLAINTS
CID
LOC
CRIME
DESCRIPTION
SUBMIT
DEPARTMENT OF CSE
30
ONLINE CRIME REPORTING
2. Thieves information
ENTER AREA
LIST OF THIEVES
HISTORY OF THIEVES
DEPARTMENT OF CSE
31
ONLINE CRIME REPORTING
3. Caution
POLICE
VIEW CAUTION
DEPARTMENT OF CSE
32
ONLINE CRIME REPORTING
4. Administrator
ALERT
CAUTION
SEND ALERT
DEPARTMENT OF CSE
33
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
34
ONLINE CRIME REPORTING
7. SCREEN SHOTS
Home page
DEPARTMENT OF CSE
35
ONLINE CRIME REPORTING
Registration page
DEPARTMENT OF CSE
36
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
37
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
38
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
39
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
40
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
41
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
42
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
43
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
44
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
45
ONLINE CRIME REPORTING
DEPARTMENT OF CSE
46
ONLINE CRIME REPORTING
8.1 Implementation About java Now-a-days all are familiar with Internet, the worldwide network of computers, which connects together thousands of computer all over the world. These network connections are increasing day by day in a rapid rate, so the network traffic is increasing at a pulse rate. Computers connected to the net are from many different manufacturers, running on different operating systems and they differ in architecture, computing power and capacity. By considering this point SUN Microsystems Corporation felt the need for a new programming language suitable for this heterogeneous Environment and java was the solution. This breaks barriers between different computers, chips and operating systems. compatible with all operating systems. Features of java: Simple Secure Portable Object oriented Robust Multithreaded Using java your application become
Simple
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
47
ONLINE CRIME REPORTING
It is simple for professional programmer to learn & they can use it effectively. If we already know object oriented programming, then learning java is very easy. It inherits syntax from c & object oriented features from c++, so if the user knows c\c++ then it will be a easy way to do effective java programming. Secure As we know many people are effected by viral infection when they download an executable file or program. Rather than, virus programs we have malicious programs that can gather private information, such as credit card number, bank account balances & passwords by searching the contents of your computers local file system. Java has a better answer for this effect i.e., FIREWALL between networked application and your computer. Portable As already we have discussed about compatibility of operating system, computers, chips. In Internet the programs have to be dynamically downloaded to all the various types of platforms. For this purpose java program will generate a byte code (which is not a executable code). Byte code is a highly optimized set of instructions designed to be executed by java run system, which is called as JVM (Java Virtual Machine). Object-Oriented:Java is purely object oriented. The object model in java is simple and easy to extend, while simple types, such as integers, are kept as high-performance non-objects. Robust The ability to create robust programs was given a high priority in the design of java. To gain reliability, java restricts you in a few key areas, to force you to find your mistakes early in program development. At the same time, java frees you from having to worry about many of the most common causes of programming errors. Because java is a strictly typed language, it checks your code at Compile time. Java is robust for two reasons; they are Memory management & mishandled exceptional task in traditional programming environments.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
48
ONLINE CRIME REPORTING
What is JDBC? JDBC is a Java API for executing SQL statements. (JDBC is often thought of as Java Database Connectivity) .It consists of a set of classes and interfaces written in the java programming language.
Using JDBC, it is easy to send SQL statements to virtually any relational database. In the other words, with the JDBC API, it is not necessary to write to one program to access a Sybase database, another program to access Informix database, another program to access Oracle database, and so on. One can write a single program using the JDBC API, and the program will be able to send SQL statements to the appropriate database. The combinations of JAVA and JDBC lets a programmer writes it once and run it anywhere. Java, being robust, secure, easy to use, easy to understand, and automatically downloadable on a network, is an excellent language basis for database applications. JDBC extends what can be done in Java. For example, with Java and the JDBC API, it is possible to publish a web page, which contains an applet that uses information obtained from a remote database. With more and more Programmers using the Java Programming language, the need for easy database access from java is continuing to grow. MIS managers like the combination of Java and JDBC because it makes disseminating information easy and economical, Businesses can continue to use their installed database and access information even if it is stored on different database management systems. Development time for new application is short. A programmer can write an application or an update once, put it on the server, and everybody has access to the latest version. A Low Level API and a Base for Higher-level APIs.
DEPARTMENT OF CSE
49
ONLINE CRIME REPORTING
JDBC is a Low level interface that means that it is used to invoke SQL commands directly, it works very well in this capacity and is easier to use than other database connectivity APIs, but it was designed to be a base upon which to build higher level interfaces and tools. A high level interface is user-friendly, using a more understandable or more convenient API that is translated behind the scenes into a low level interface such as JDBC. At the time of writing, two kinds of higher level APIs are under development of top of JDBC. 1) An embedded SQL for Java. At least one vendor plan to build this DBMS implement SQL, a language designed specifically for use with databases. JDBC requires that the SQL statements be passed as Strings to Java methods. The embedded SQL preprocessor then translates this JAVA/SQL mix into Java with JDBC calls. 2) A direct mapping of relational database tables to Java classes. In this object/relational mapping, each row of the table becomes an instance of that class, and each column value corresponds to an attribute of that instance. Programmers can then operate. ODBC is hard to learn. It mixes simple and advanced features together, and it has complex options even for simple queries. JDBC, on the other hand, was designed to keep simple things simple while allowing more advanced capabilities where required.
A Java API like JDBC is needed in order to enable a Pure Java solution. When ODBC is used, the ODBC Driver Manager and drivers must be manually installed on every client machine. When the JDBC driver is written completely in Java, however, JDBC code is automatically installable, portable, and secure on all platforms from network computers to mainframes.
DEPARTMENT OF CSE
50
ONLINE CRIME REPORTING
Java server page (jsp) Java Server Pages (JSP) is a new technology for web application development that has received a great deal of attention since it was first announced.
Why is JSP so exciting? 1. JSP is Java-based, and Java is well-suited for enterprise computing. In fact, JSP is a key part of the Java 2 Enterprise Edition (J2EE) platform and can take advantage of the many Java Enterprise libraries, such as JDBC, JNDI, and Enterprise Java Beans. 2. JSP supports a powerful model for developing web applications that separates presentation from processing.
DEPARTMENT OF CSE
51
ONLINE CRIME REPORTING
In the early days of the Web, the only tool for developing dynamic web content was the Common Gateway Interface (CGI). CGI outlined how a web server made user input available to a program, as well as how the program provided the web server with dynamically generated content to send back. CGI scripts were typically written in Perl. (In fact, CGI Perl scripts still drive numerous dynamic web sites.) However, CGI is not an efficient solution. For every request, the web server has to create a new operating-system process, load a Perl interpreter and the Perl script, execute the script, and then dispose of the entire process when it's done. To provide a more efficient solution, various alternatives to CGI have been added to programmers' toolboxes over the last few years: FastCGI, for example, runs each CGI program in an external permanent process (or a pool of processes). In addition, mod_perl for Apache, NSAPI for Netscape, and ISAPI for Microsoft's IIS all run server-side programs in the same process as the web server itself. While these solutions offer better performance and scalability, each one is supported by only a subset of the popular web servers. The Java Servlet API, introduced in early 1997, provides a solution to the portability issue. However, all these technologies suffer from a common problem: HTML code embedded inside programs. If you've ever looked at the code for a servlet, you've probably seen endless calls to out.println( ) that contain scores of HTML tags. For the individual developer working on a simple web site this approach may work fine, but it makes it very difficult for people with different skills to work together to develop a web application. This is becoming a significant problem. As web sites become increasingly complex and are more and more critical to the success of an organization, the appearance and usability of the web interface becomes paramount. New client technologies, such as client-side scripts and DHTML, can develop more responsive and interactive user interfaces, style sheets can make it easier to globally change fonts and colors, and images can make the interface more appealing. At the same time, server-side code is getting more complex, and demands for reliability, performance, and fault tolerance are increasing.
DEPARTMENT OF CSE
52
ONLINE CRIME REPORTING
The growing complexity of web applications requires a development model that allows people with different skills to cooperate efficiently. Java Server Pages provides just such a development model, allowing web page authors with skills in graphics, layout, and usability to work in tandem with programmers who are experienced in server-side technologies such as multithreading, resource pooling, databases, and caching. While there are other technologies, such as ASP, PHP and ColdFusion, that support similar development models, none of them offers all the advantages of JSP. Introduction to Database Management System (DBMS)
A Database is an integrated collection of user related data stored with minimum redundancy, serves many users/applications quickly and efficiently. A database system is basically a computerized record keeping system, i.e. it is a computerized system whose overall purpose is to maintain information and make that information available on demand. DBMS is a collection of inter-related data and set of programs that allow several users to
access and manipulate data. Its main purpose is to provide users with an abstract view of the data, i.e. the system hides certain details of how the data is stored and maintained. Database Management System is divided into 4 main components Database Hardware Software User
Database:
It consists of collection of persistent data that is used by the application system.
Hardware: The processor(s) and associated main memory that are used to support the execution of database system software..
DEPARTMENT OF CSE
53
ONLINE CRIME REPORTING
Software: The layer between the physical database and the users that handles all requests from the user for access to the database. User: There are three types of users
Types of dbms
There are four major categories of DBMS data models. Hierarchical Network Inverted Relational
Relational database management systems Database Management System has evolved from hierarchical to network to relational models. Today, the most widely accepted database model is the relational model. The relational database management system uses only its relational capabilities to manage the information stored in the database. The relational model has three different aspects. Structures Operation Integrity rules
DEPARTMENT OF CSE
54
ONLINE CRIME REPORTING
Structures:
They are well-defined objects that store the data of a database structure and the data contained within them can be manipulated by operations.
Operations: They are clearly defined actions that allow users to manipulate the data and structures of a database. The operations on a database must adhere to a predefined set of integrity rules. Integrity rules: They are laws that govern which operations are allowed on the data and structures of a database. Integrity rules protect the data and the structures of a database. A DBMS can be regarded as relational only if it obeys a set of 12 rules formulated by Dr.E.F.Codd These rules define the scope and functionality of a relational database. There is a single overall rule called Zero Rule which is a foundation rule that covers all other rules. It states that Any truly relational database must be manageable entirely through its relational capabilities. The twelve rules are as follows: Rule 1: The information rules Rule 2: The guaranteed access rule Rule 3: The systematic treatment of null values Rule 4: The database description rule Rule 5: The comprehensive sub-language rule
DEPARTMENT OF CSE
55
ONLINE CRIME REPORTING
Rule 6: The view update rule Rule 7: The insert, update and delete rule Rule 8: The physical data independence rule Rule 9: The logical data independence rule. Rule 10: The integrity independence rule. Rule 11: The distribution independence rule. Rule 12: The no subversion rules. Why Oracle? Even though the architecture of all RDBMS is same but the features are different from different RDBMS. Oracle, Sybase, Informix. As per the features concerned all the RDBMS can be related as it. But with the easiness, demand it is better to go for Oracle. Because the professional availability in Oracle is high compared to other RDBMS professionals. Because the availability is high the manpower cost will be less compared to Sybase professionals, Informix professionals. Even the support from the vendors in also hig in Oracle environment rather than other RDBMS. Oracle9i is regarded as the RDBMS because it is the most widely acclaimed package across the globe with its 100% client-server architecture. Oracle has in-built features like data integrity, security, reverie and backup and total GUI based presentation and can easily and efficiently support small to very large scale applications. Database connections: The database connection string is the only JDBC component that references the particular database being accessed. You must provide a specific driver connection string that uses the protocol defined for the driver. The JDBC Driver Manager class to determine which driver to load uses the protocols currently maintained by Java Soft.
DEPARTMENT OF CSE
56
ONLINE CRIME REPORTING
A Query returns a Result set object. This object contains the results of the query in a form of that can be accessed by the application. If the query has no results, the Result Set object contains no rows. Otherwise it contains rows of data matching the query (up to the limit specified by the database). If the database supports doing so, you can set the maximum number of rows using the Statement class method setMaxRows (). What is Testing? A process of executing a program with the explicit intention of finding errors, that is making the program fail. Software Testing: It is the process of testing the functionality and correctness of software by running it. Process of executing a program with the intent of finding an error. A good test case is one that has a high probability of finding an as yet undiscovered error. A successful test is one that uncovers an as yet undiscovered error. Software Testing is usually performed for one of two reasons: Defect detection Reliability estimation
Black Box Testing: Applies to software systems or module, tests functionality in terms of inputs and outputs at interfaces.Test reveals if the software function is fully operational with reference to requirements specification. White Box Testing:
DEPARTMENT OF CSE
57
ONLINE CRIME REPORTING
Knowing the internal workings i.e., to test if all internal operations are performed according to program structures and data structures. To test if all internal components have been adequately exercised. Software Testing Strategies: A strategy for software testing will begin in the following order: Unit testing Integration testing Validation testing System testing
Unit testing It concentrates on each unit of the software as implemented in source code and is a white box oriented. Using the component level design description as a guide, important control paths are tested to uncover errors within the boundary of the module. In the unit testing, The step can be conducted in parallel for multiple components. Integration testing: Here focus is on design and construction of the software architecture. Integration testing is a systematic technique for constructing the program structure while at the same time conducting tests to uncover errors associated with interfacing. The objective is to take unit tested components and build a program structure that has been dictated by design. Validation testing: In this, requirements established as part of software requirements analysis are validated against the software that has been constructed i.e., validation succeeds when software functions in a manner that can reasonably expected by the customer. System testing:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
58
ONLINE CRIME REPORTING
In this software and other system elements are tested as a whole. 8.2 TESTING 8.2.1. TEST CASE REPORT Having test cases that are good at revealing the presence of faults is central to successful testing. The reason for this is that if there is a fault in a program, the program can still provide the expected behavior for many inputs. Only for the set of inputs that exercise the fault in the program will the output of the program deviate from the expected behavior. Hence, it is fair to say that testing is as its test cases. Public login: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays message invalid user name and password OBSERVED BEHAVIOUR -doSTATUS PASS FAIL p
2.
3.
Displays an alert message enter valid value for corresponding field Displays authorized action to user
4.
-do-
DEPARTMENT OF CSE
59
ONLINE CRIME REPORTING
Registration:
TEST CASE 1.
INPUT
EXPECTED BEHAVIOUR Displays an alert message invalid user name and password Displays an alert message enter valid value for corresponding field All values are stored in database and Page is redirected to the login page
2.
3.
Complaint Form: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays an alert message enter valid value for corresponding field All values are stored in complaint database and a complaint id has to be displayed. OBSERVED BEHAVIOUR Null values are stored in the database -doSTATUS PASS FAIL F
2.
DEPARTMENT OF CSE
60
ONLINE CRIME REPORTING
Complaint Status: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays message not a valid complaint id Displays message ACCESS DENIED Displays your complaint status with details. OBSERVED BEHAVIOUR Null pointer Exception Others Complaint Record displayed -doSTATUS PASS FAIL F
2.
3.
PUBLIC LOGOUT: TEST CASE 1. INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P
Police login: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays message invalid user name and password OBSERVED BEHAVIOUR -doSTATUS PASS FAIL p
2.
Enter the incorrect login id ,password and select police station name Enter blank values
DEPARTMENT OF CSE
61
ONLINE CRIME REPORTING
3.
4.
Enter the correct login id and password and select police station name Trigger back button
-do-
-do-
View Complaint by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays the selected record information forwarded to the particular police station. OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P
Update Complaint by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays the previous status and the entered status to be updated. OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P
DEPARTMENT OF CSE
62
ONLINE CRIME REPORTING
TEST CASE 1.
INPUT
EXPECTED BEHAVIOUR Displays the alert messages given by the various police stations.
Give Alert Messages by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR STATUS PASS FAIL P
All the values are -dostored in the database with the corresponding alert massage issued date.
View Cautions by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays the cautions given by the administrator to the particular police station. OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P
DEPARTMENT OF CSE
63
ONLINE CRIME REPORTING
TEST CASE 1.
INPUT
Add Thief Information by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR All the values are stored in the. OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P
View Messages by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P
Select the view Displays the in the messages messages send by the various police stations.
64
ONLINE CRIME REPORTING
TEST CASE 1.
INPUT
EXPECTED BEHAVIOUR All the values are stored in the database and to be display when the police station head clicks on view messages.
Enter the message and Date and select the police station. .
POLICE LOGOUT by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P
ADMIN LOGIN by Administrator: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays message invalid user name and password OBSERVED BEHAVIOUR -doSTATUS PASS FAIL p
2.
Enter the incorrect login id ,password and select police station name Enter blank values
DEPARTMENT OF CSE
65
ONLINE CRIME REPORTING
3.
-do-
4.
-do-
TEST CASE 1.
INPUT
EXPECTED BEHAVIOUR all the complaint ids have to be displayed with heir status.
Give Alert Messages by Administrator: TEST CASE 1. INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR STATUS PASS FAIL P
All the values are -dostored in the database with the corresponding alert massage issued date.
DEPARTMENT OF CSE
66
ONLINE CRIME REPORTING
TEST CASE 1.
INPUT
EXPECTED BEHAVIOUR All the values are stored in the database and displayed when police department clicks on the view messages.
TEST CASE 1.
INPUT
EXPECTED BEHAVIOUR
PUBLIC LOGIN:
TEST CASE 1.
INPUT
EXPECTED BEHAVIOUR Displays an alert message enter valid value for corresponding field
THE WAY WE OVERCOME THIS DEFECT By providing the client side validation by writing JavaScript.
DEPARTMENT OF CSE
67
ONLINE CRIME REPORTING
Registration: TEST CASE INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR THE WAY WE OVERCOME THIS DEFECT STATU S PASS FAIL P
1.
-do-
Complaint Form: TEST CASE INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR THE WAY WE OVERCOME THIS DEFECT STATU S PASS FAIL P
1.
-do-
Complaint Status:
DEPARTMENT OF CSE
68
ONLINE CRIME REPORTING
TEST CASE 1.
INPUT
EXPECTED BEHAVIOUR Displays message not a valid complaint id Displays message ACCESS DENIED
THE WAY WE OVERCOME THIS DEFECT By checking the requested complaint id in the database or not By checking the requested complaint id with the login value
2.
-do-
Police login: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays an alert message enter valid value for corresponding field OBSERVED BEHAVIOUR -doTHE WAY WE OVERCOME THIS DEFECT By providing the client side validation by writing JavaScript. STATU S PASS FAIL P
Administrator login:
TEST CASE 1.
INPUT
EXPECTED BEHAVIOUR Displays an alert message enter valid value for corresponding field
THE WAY WE OVERCOME THIS DEFECT By providing the client side validation by writing JavaScript.
CONCLUSION
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
69
ONLINE CRIME REPORTING
The technological benefits of ECOPS are to maintain information, monitor and enhance the performance of the department, to take a critical look at the existing system, processes and procedures of the department so as to identify and remove the redundancy. The case registered at one police station can be tracked at any police station. This reduces the discretionary dependence of police. Once the case is registered the investigation and follow up activities relating to the case cannot be delayed. All these factors have contributed to a higher moral of the police officials at all the levels in police department. This project result in great improvement in the organizations functioning by reducing the effort spent by the general people. GOALS:
Improve efficiency in police department Availability of online police service to citizens Availability of data to senior officials for quick decision making Better administration and co-ordination Speedy detection of crimes Duplication of work avoided Retrieval and access of data is easy Paper work is drastically reduced Automatic maintenance of registers
GLOSSARY
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE
70
ONLINE CRIME REPORTING
Project management is the discipline of planning, organizing, securing, and managing resources to achieve specific goals. A project is a temporary endeavor with a defined beginning and end (usually time-constrained, and often constrained by funding or deliverables), undertaken to meet unique goals and objectives, typically to bring about beneficial change or added value. The temporary nature of projects stands in contrast with business as usual (or operations), which are repetitive, permanent, or semi-permanent functional activities to produce products or services. In practice, the management of these two systems is often quite different, and as such requires the development of distinct technical skills and management strategies. The primary challenge of project management is to achieve all of the project goals and objectives while honoring the preconceived constraints. Typical constraints are scope, time, and budget. The secondaryand more ambitiouschallenge is to optimize the allocation of necessary inputs and integrate them to meet pre-defined objectives.
BIBLIOGRAPHY
DEPARTMENT OF CSE
71
ONLINE CRIME REPORTING
Java user site: www.java.com. Java at Sun Microsystems., Inc - java.sun.com Java Virtual Machine Specifications, 2nd Ed. - Java.Sun.com Java Virtual Machine - Wikipedia http://java.sun.com/products/jsp/ http://en.wikipedia.org/wiki/JavaServer_Pages http://en.wikipedia.org/wiki/Java_Database_Connectivity http://jakarta.apache.org/tomcat/tomcat-5.5-doc
DEPARTMENT OF CSE