Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 71

1

ONLINE CRIME REPORTING

1. INTODUCTION
1.1 Project overview Online crime reporting is a virtual police station which can maintain the records of crime, case detail and police departments like law and order, women protection, traffic control etc. The main aim of this system is to provide online vigilance facilities, the stations, criminal records; licensing record gets online, so that privileges authorities can view/modify the records. Detectives& Magistrates have access to criminal records where they can search and justify the people in a better and faster way. The virtual police station corresponds to a physical police station situated in location. Anyone can see the name and designations of the appointed officers at the police station. 1.2 Project scope An online solution is very useful as the solution is inherently distributive. This distributive characteristic of the online solution helps in getting the different police stations to share information and get in contact with one another. With respect to ECOPS, going forward, the aim is to develop new technologies that include designing new techniques to fight crime and improve criminal justice. Plans are afoot to embed multi-purpose technologies such as traffic management, mobile data techniques, warrants, personnel scheduling, gang activity analysis, field reporting, human resource development of police personnel, etc. For the police, initiatives such as ECOPS are designed to improve their long-term relations with the citizens due to effective feedback and faster exchange of critical information between various departments and police stations.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

2
ONLINE CRIME REPORTING

1.3 Project purpose Usually the citizen has to go to police station to make a complaint. Here we have given an opportunity to make a complaint through online and the actors will be taken by the police officers immediately. The communication for officers will be easy. The license can be get easily through online if it is selected by the officers via sms and mail. The main purpose behind the Online crime reporting system was to improve the effectiveness of policy performance; to improve the efficiency of police procedures; for example, by eliminating redundant processes in the registration of criminal cases; and to improve the quality of management information provided for senior policy decision-making, particularly through integration of previously separate information systems. Within the focus on effectiveness, there was a concern about the non-transparent, even dishonest nature of police work, which had become synonymous with corruption and delay. The intention was that the new system - through its automation of previously human processes and through its state-wide and online accessibility - would make the registration, processing and follow-up of criminal cases more open. Under the existing regime, many police require a bribe before they are willing to register a case, and also require a bribe to be paid before they answer any query about the case, such as its progress, or other information held on file. It was partly this poor image of police functioning, that led the Chief Minister of the State to impose the system on the police service. There were also drivers from the failure of police to properly prosecute some high-profile criminal cases that had political overtones; something which was politically-damaging and seen as requiring an equally high-profile reaction.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

3
ONLINE CRIME REPORTING

1.4 Objectives Generally many crimes seen by the public will not reach to the police due to many reasons like fear, Lack of time, Ignorance. Due to this reason many cases are not even reaching the police station. Though some cases are registered they are not investigated properly due to lack of evidences and Cooperation of the public. This software helps the public to report about the crimes to the police without any fear in correct time. This is helpful to police in solving the cases .This is also helpful for higher authorities of police to have an overview about the progress of the investigation. ECOPS is an online reporting service to which the internet user can report crimes committed on or through the Internet. The impact of IT and communications is traversing at a fast pace. As information for the department is crucial, an enterprise IT tool for enhancing the performance of the police officials became necessary called ONLINE CRIME REPORTING or E-Computerized Operations for Police Services, the main purpose is to maintain information, monitor and enhance the performance of the department. The focus of ONLINE CRIME REPORTING is to computerize the activities of controlling crime, administration and support services across the state in an integrated fashion so as to enable the division heads and senior officers to obtain the relevant information. Besides, it is also envisaged to reduce dependence on paper and help in automatic maintenance of registers and generation of reports, data analysis, better planning and coordination, speedy detection of crimes and monitoring the prosecutions.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

4
ONLINE CRIME REPORTING

2. SYSTEM ANALYSIS
2.1 Existing system The normal public in India is afraid to give a complaint in police station because they are filled with a false fear about the police department. An online complaint registration system will solve the fear of the public and will also help to police dept in catching criminals. It will improve the service, so you dont have to wait on hold on the telephone or go down to the station to file a report. 2.2 Drawbacks of existing system Existing system is time consuming Corrections & maintenance should be done manually It needs more man power There may be mistakes while maintaining data manually.

2.3 Proposed system An online solution is very useful as the solution is inherently distributive. This distributive characteristic of the online solution helps in getting the different police stations to share information & get in contact with one another. The reports filled online are checked at the administrative department to use if any information is lacking or to check the status of the report.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

5
ONLINE CRIME REPORTING

2.4 Modules of the product The modules present in the online crime reporting are:

Complaints Thieves information Caution Administrator

Module description: Complaints: From this module public give their complaints through online. The complaints are stored into crime report database .One complaints are entered into this database it cannot be modified by any person. This is read only module. Thieves information: This module displays the information about thieves and terrorist information with their photos and rewards on them. Caution: This module gives cautions to police department and gives some helpful suggestions. Suppose any incident done in the city like bomb blast or any terrorist killed by the police, immediately alert message will be displayed on this site & also what actions should be taken. It is very helpful to police department.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

6
ONLINE CRIME REPORTING

Administrator: This module is accessible to some VIPs like SP, DCP, and DIG etc. By using this module they can give any caution to the police department. Also they can perform updations to the crime report database.

3. REQUIREMENT SPECIFICATION
3.1 Requirement study and analysis Generally many crimes seen by the public will not reach to the police due to many reasons like fear, Lack of time, Ignorance. Due to this reason many cases are not even reaching the police station. Though some cases are registered they are not investigated properly due to lack of evidences and Cooperation of the public. This software helps the public to report about the crimes to the police without any fear in correct time. This is helpful to police in solving the cases .This is also helpful for higher authorities of police to have an overview about the progress of the investigation. An online solution is very useful as the solution is inherently distributive. This distributive characteristic of the online solution helps in getting the different police stations to share information and get in contact with one another. With ECOPS, the exchange of information within police stations and other senior police officers in the departments is faster. It also streamlines the workflow in police department machinery. A central database permits the police units to operate more efficiently leading to speedy detection of crime and prosecution monitoring. The senior police officers of the state can access the reports, which allow them to take quick and timely decisions. Crime analysis reports will enable the senior police officers to observe the crime trends and to guide the investigating officers. The technological benefits of ECOPS are to maintain information, monitor and enhance the performance of the department, to take a critical look at the existing system, processes and procedures of the department so as to identify and remove the redundancy.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

7
ONLINE CRIME REPORTING

ECOPS is envisaged to reduce the fair amount of paper work and helps in the automatic maintenance of registers and generation of reports, data analysis, better planning and coordination, timely decision and speedy detection of crime and prosecution monitoring. All these factors have contributed to a higher moral of the police officials at all the levels in police department. The case registered at one police station can be tracked at any police station. This reduces the discretionary dependence of police. Once the case is registered the investigation and follow up activities relating to the case cannot be delayed. The grievances handling is more efficient. Now, the citizens will have access to senior officers through the web. ECOPS introduced transparency and accountability in the whole system. The User Interface should be user friendly to the user who uses the home page by which he/she can easily register. The Operations should take place transparently.

3.2 Software requirements Front End Tool: Java Server Pages, Java Script, and HTML Back End Tool: Oracle 9i Software Interfaces Operating System: Windows 2000 Database Server Explorer : Oracle 9i : Tomcat 5.0 : Microsoft Internet Explorer

3.3 Hardware requirements

Client
Hardware Platform : P III or above with
DEPARTMENT OF CSE

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

8
ONLINE CRIME REPORTING

RAM Hard Disk

: 256MB or above. : 20GB or above of HD.

Server
Hardware Platform RAM Hard Disk : P III or above with : 256MB or above. : 20GB or above of HD.

3.4 Block diagram

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

9
ONLINE CRIME REPORTING

Figure 4.4.1: Block diagram of ECOP working

3.5 Overall description The ONLINE CRIME REPORTING is an application which is providing the features of dynamic web application as well as that of the stand alone application on the administrator side. The application will be used across the state by the citizens, the law enforcement bodies, and private detective and cyber caf & hotel employees. It can be used to track the criminal, to gather the information about the crime or about criminal and missing person and to broadcast or communicate information ( of any criminal activity or other alert). The citizen can register the e complaint here which will ease out the process for the citizens and also for the police to

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

10
ONLINE CRIME REPORTING

maintain records as the status of the case can be viewed as well as can be updated. The data required to be available is the districts of the state along with areas enclosed by them. The web pages (XHTML/JSP) are present to provide the user interface on customer client side. Communication between customer and server is provided through HTTP/HTTPS protocols. The Client Software is to provide the user interface on system user client side and for this TCP/IP protocols are used. On the server side web server is for EJB and database server is for storing the information
COMPLAIN TS

THIEVES POLICE

4. SYSTEM DESIGN AND DEVELOPMENT


4.1 System design 4.1.1 Data design It is an object or entity-relationship diagram that primarily documents the data elements (e.g., classes, tables), their component data, and the relationships between them.
ADMIN

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

11
ONLINE CRIME REPORTING

4.1.2 Architectural design

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

12
ONLINE CRIME REPORTING

4.1.3 Procedural design The procedural design describes structured programming concepts using graphical, tabular and textual notations. These design mediums enable the designer to represent procedural details that facilitates translation to code. This blueprint for implementation forms the basis for all subsequent software engineering work. 4.1.3 Modular design User
DEPARTMENT OF CSE

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

13
ONLINE CRIME REPORTING

Administrator Police Department

User: User can send the complaints to police and they can view the complaint report. User can perform these tasks only when he logins to his account otherwise he has to register his new account. Police send the status report to the users based on their investigation. The user can check the status of their complaints with the help of complaint id given. The user can register his complaints to the police and view the thieves information. Administrator: Higher authorities like VIPS, CP, and DCP can view the complaints which are sent by the public. The administrator has to login with their account in order to perform his actions. They can send alert messages to the police department regarding any future complications. The administrator can also send cautions to the users. Unlike police who can view complaints specific to his area the administrator can view the complaints universally. Police Department: Basing on the complaints given by the public, police can view them and take appropriate action timely. The police has to login with their account to view the complaints and to send the status of the complaints to the users. They can update the status of the complaint basing on the progress of investigation. They will also receive alerts from the higher authorities regarding warnings and can take action in advance.

4.2 Database design


ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

14
ONLINE CRIME REPORTING

TABLENAME: Complaints S.No Column Name Data type Description Remarks

Complaint Identification 1 cid Number Number Primary Key

Location of 2 Loc Varchar2(20) Crime

Description

Varchar2(1000)

Complaint

Crime type

Varchar2(20)

Type of Crime

Email

Varchar2(30)

Email ID of user Date of complaint When recorded

Cdate

date

TABLENAME: Thieves
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

15
ONLINE CRIME REPORTING

S.No Column name

Data type

Description

Remarks

Primary 1 Tid Number Thief ID Key

Name

Varchar2(20)

Name of the criminal

Alias name

Varchar2(30)

Other name of the criminal

DOB

date

Age of the criminal

Address

Varchar2(40)

Address of the criminal

Reward

Number

Prize money announced by police on the criminal

Status

Varchar2(30)`

Status of the criminal given by the police

TABLENAME: Alert S.No Column name 1 Alert Data type Varchar2(60) Description Alert message given By the Administrator Remarks

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

16
ONLINE CRIME REPORTING

TABLENAME: Crimeimg S.No Column name 1 Tid Data type Number Description Thief identification Number 2 Path Varchar2(30) Path of the image where stored Remarks

TABLENAME: Caution S.N Column o 1 name cid Data type Number Complaint Identification Number 2 Admin Caution Varchar2( 30) Caution given by the Administrator to the Given complaint Description Remar ks

TABLENAME: Login S.No Column name 1 Userid Data type Number Description Administrator Identification Number 2 Pwd Varchar2(30) Password given to the Administrator
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

Remarks Primary Key

17
ONLINE CRIME REPORTING

Pname

Varchar2(30)

Name given to the administrator

TABLENAME: Plogin S.No Column name 1 Userid Data type Number Description Police Identification Number 2 3 Pwd Pname Varchar2(30) Varchar2(30) Password given to the Police Name given to the police Remarks Primary Key

TABLENAME: Status S.No Column name 1 cid Data type Number Description Complaint Identification Number 2 Status Varchar2(20) Status of the complaint Given by the administrator TABLENAME: Crimedb S.No Column name 1 Crime Type 2 Suggestion Varchar2(300) Varchar2(30) Type of crime Suggestion given to the Police dept for particular crime Data type Description Remarks Remarks

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

18
ONLINE CRIME REPORTING

4.3 Feasibility Analysis Feasibility studies aim to objectively and rationally uncover the strengths and weaknesses of the existing business or proposed venture, opportunities and threats as presented by the environment, the resources required to carry through, and ultimately the prospects for success. In its simplest terms, the two criteria to judge feasibility are cost required and value to be attained. As such, a well-designed feasibility study should provide a historical background of the business or project, description of the product or service, accounting statements, details of the operations and management, marketing research and policies, financial data, legal requirements and tax obligations. Generally, feasibility studies precede technical development and project implementation.

5. DATA FLOW DIAGRAMS


5.1 Rules of data flow diagram Data flow diagram is a pictorial representation of the system in which flow of data from one process to another process is described. A Data Flow is composed of Data movement shown by arrows. Transformation or process of data shown by named circle or rounded rectangle. Sources and destination of data represented by named rectangles. Static storage or data at rest denoted by an open rectangle that is named.
DEPARTMENT OF CSE

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

19
ONLINE CRIME REPORTING

Data Flow Diagrams are of two types: Physical Data Flow Diagrams: These are implementation-dependent i.e., they show the actual devices, departments, people, etc., involved in the system. Logical Data Flow Diagrams: These diagrams describe the system independently of how it is actually implemented, they show what takes places, rather than how an activity is accomplished. The DFD is intended to represent information Flow but it is not a flow chart and is not intended decision-making, flow of control, loops and other procedural aspects of the system. DFD is a useful Graphical tool and is applied at the earlier stages of requirements analysis. It may be further refined at preliminary design stage and is used as mechanism for top-level structural design for software.

The DFD drawn first at a preliminary level is further expanded into greater details: The context diagram is decomposed and represented with multiple rectangles. Each of these rectangles may be decomposed further and given as more detailed DFD. Explanation of DFD.
ONLINE CRIME REPORT

Context diagram:
USER

ADMIN Its a diagram, which shows whole system at once. The sources in context diagram for

this system are USER, ADMINISTRATOR, POLICE and these are linked to the ONLNECRIMEREPORTING. The Context Diagram is shown in fig (6.1.1):
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

POLICE

20
ONLINE CRIME REPORTING

Fig 5.1.1. Context diagram

5.2 Levels of data diagram Level -1 Diagram: User login process is the Level-1 DFD shown in Fig(6.2.1). Here user has to enter into the registering complaint area any one register the complaint so there is user id and password for it. After entering the complaint and pressing submit it will be send to the complaint database. If his complaint has been successfully entered in to the database he is allotted with a self generated no which is used for the further purposes. The user can view the status of his compliant in the status menu by entering the self generated no given by the system.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

21
ONLINE CRIME REPORTING

The user can also view the details of the thieves present in the various locations to make him cautious .By just selecting the location and the thieves id he can view the details of the thieves with his photo and reward announced on him by the police.

Fig.5.2.1 : Level-1 Diagram

Level -2 Diagram: Police login is Level-2 DFD as shown in Fig(6.2.2). In this level, different police officers of different locations were provided with their particular user id and password using which they have to login in. The entered user id and password were validated and if correct they were made to login. Here they can view the alert message given by the administrator and also the caution
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

22
ONLINE CRIME REPORTING

by the administrator to the particular complaint. Police officers can see the complaints belonging to their locality only.

Fig. 5.2.2 : Level-2 Diagram

Level -3 DIAGRAM: Level-3 DFD diagram is for administrator .Here he consists of login page .Where he has to login using user id and password provided to him. After entering user id and password they are validated and if correct they made to enter into the page. Here he has two tasks they are sending alert messages and caution for the particular complaint to the police. In the caution first he has to select the location and then the complaint id and then he has to send the status and caution to
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

23
ONLINE CRIME REPORTING

the particular complaint. The entered alert, status, and caution were sent to the respective databases.

Fig. 5.2.3 : Level-3 Diagram

5.3 Flow chart A flowchart is a type of diagram that represents an algorithm or process, showing the steps as boxes of various kinds, and their order by connecting these with arrows. This diagrammatic representation can give a step-by-step solution to a given problem. Process operations are represented in these boxes, and arrows connecting them represent flow of control. Data flows are not typically represented in a flowchart, in contrast with data flow diagrams; rather, they are
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

24
ONLINE CRIME REPORTING

implied by the sequencing of operations. Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.

Start

Open ECOP Website & Login

Valid User

User Validati on

Invalid User

Browse the contents

Register / Reset password

Logout

End

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

25
ONLINE CRIME REPORTING

6. UML DIAGRAMS
6.1 Class diagrams

Fig 6.1.1 : Class Diagram


ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

26
ONLINE CRIME REPORTING

6.2 Use case diagrams

Login

Registration

Lodge Complaint

Admin

View User Complaint

View Complaint Status User

Send Status Police Personell

Send Reports

View Report

Logout

Fig.6.2.1 : Use case Diagram

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

27
ONLINE CRIME REPORTING

6.3 Sequence diagrams

Admin login

Police

User

Registration,login

login

lodge Complaint

View Complaint

View Complaint Send Status

notify

notify

View Status

View Status

Fig.6.3.1: Sequence Diagram


ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

28
ONLINE CRIME REPORTING

6.4 Collaboration diagrams

1: login 7: View Complaint 12: View Status

Admin

2: Registration,login 11: View Status

5: 9: notify

3: login 6: View Complaint 8: Send Status

4: lodge Complaint User 10: notify Police

Fig. 6.4.1: Collaboration Diagram

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

29
ONLINE CRIME REPORTING

6.5 Activity diagrams


An activity diagram is a special kind of a state chart diagram that shows the flow from activity

to activity within a system. Here we are having four forms they are Complaints, Thieves information, Administrator, Police dept.

1 .Complaints

COMPLAINTS

CID

LOC

CRIME

DESCRIPTION

SUBMIT

Fig.6.5.1: Activity Diagram

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

30
ONLINE CRIME REPORTING

2. Thieves information

ENTER AREA

LIST OF THIEVES

HISTORY OF THIEVES

Fig. 6.5.2: Activity Diagram

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

31
ONLINE CRIME REPORTING

3. Caution

POLICE

LOGIN SELECT COMPLAINT

VIEW CAUTION

Fig.6.5.3: Activity Diagram

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

32
ONLINE CRIME REPORTING

4. Administrator

ADMINIS TARTOR LOGIN

ALERT

CAUTION

SEND ALERT

SELECT LOC SELECT COMPLALINT

ENTER CAUTION AND STATUS

Fig.6.5.4: Activity Diagram

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

33
ONLINE CRIME REPORTING

6.6 Component diagrams

Fig.6.6.1: Component Diagram 6.7 Deployment diagrams

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

34
ONLINE CRIME REPORTING

Fig. 6.7.1: Deployment Diagram

7. SCREEN SHOTS
Home page

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

35
ONLINE CRIME REPORTING

Registration page

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

36
ONLINE CRIME REPORTING

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

37
ONLINE CRIME REPORTING

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

38
ONLINE CRIME REPORTING

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

39
ONLINE CRIME REPORTING

Police Department login

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

40
ONLINE CRIME REPORTING

View Complaints Page

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

41
ONLINE CRIME REPORTING

Complaint Details Page

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

42
ONLINE CRIME REPORTING

Complaint Status Page

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

43
ONLINE CRIME REPORTING

Area Details Page

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

44
ONLINE CRIME REPORTING

Add Thief Page

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

45
ONLINE CRIME REPORTING

Thief Info Page

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

46
ONLINE CRIME REPORTING

8. IMPLEMENTATION AND TESTING

8.1 Implementation About java Now-a-days all are familiar with Internet, the worldwide network of computers, which connects together thousands of computer all over the world. These network connections are increasing day by day in a rapid rate, so the network traffic is increasing at a pulse rate. Computers connected to the net are from many different manufacturers, running on different operating systems and they differ in architecture, computing power and capacity. By considering this point SUN Microsystems Corporation felt the need for a new programming language suitable for this heterogeneous Environment and java was the solution. This breaks barriers between different computers, chips and operating systems. compatible with all operating systems. Features of java: Simple Secure Portable Object oriented Robust Multithreaded Using java your application become

Simple
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

47
ONLINE CRIME REPORTING

It is simple for professional programmer to learn & they can use it effectively. If we already know object oriented programming, then learning java is very easy. It inherits syntax from c & object oriented features from c++, so if the user knows c\c++ then it will be a easy way to do effective java programming. Secure As we know many people are effected by viral infection when they download an executable file or program. Rather than, virus programs we have malicious programs that can gather private information, such as credit card number, bank account balances & passwords by searching the contents of your computers local file system. Java has a better answer for this effect i.e., FIREWALL between networked application and your computer. Portable As already we have discussed about compatibility of operating system, computers, chips. In Internet the programs have to be dynamically downloaded to all the various types of platforms. For this purpose java program will generate a byte code (which is not a executable code). Byte code is a highly optimized set of instructions designed to be executed by java run system, which is called as JVM (Java Virtual Machine). Object-Oriented:Java is purely object oriented. The object model in java is simple and easy to extend, while simple types, such as integers, are kept as high-performance non-objects. Robust The ability to create robust programs was given a high priority in the design of java. To gain reliability, java restricts you in a few key areas, to force you to find your mistakes early in program development. At the same time, java frees you from having to worry about many of the most common causes of programming errors. Because java is a strictly typed language, it checks your code at Compile time. Java is robust for two reasons; they are Memory management & mishandled exceptional task in traditional programming environments.
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

48
ONLINE CRIME REPORTING

What is JDBC? JDBC is a Java API for executing SQL statements. (JDBC is often thought of as Java Database Connectivity) .It consists of a set of classes and interfaces written in the java programming language.

Using JDBC, it is easy to send SQL statements to virtually any relational database. In the other words, with the JDBC API, it is not necessary to write to one program to access a Sybase database, another program to access Informix database, another program to access Oracle database, and so on. One can write a single program using the JDBC API, and the program will be able to send SQL statements to the appropriate database. The combinations of JAVA and JDBC lets a programmer writes it once and run it anywhere. Java, being robust, secure, easy to use, easy to understand, and automatically downloadable on a network, is an excellent language basis for database applications. JDBC extends what can be done in Java. For example, with Java and the JDBC API, it is possible to publish a web page, which contains an applet that uses information obtained from a remote database. With more and more Programmers using the Java Programming language, the need for easy database access from java is continuing to grow. MIS managers like the combination of Java and JDBC because it makes disseminating information easy and economical, Businesses can continue to use their installed database and access information even if it is stored on different database management systems. Development time for new application is short. A programmer can write an application or an update once, put it on the server, and everybody has access to the latest version. A Low Level API and a Base for Higher-level APIs.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

49
ONLINE CRIME REPORTING

JDBC is a Low level interface that means that it is used to invoke SQL commands directly, it works very well in this capacity and is easier to use than other database connectivity APIs, but it was designed to be a base upon which to build higher level interfaces and tools. A high level interface is user-friendly, using a more understandable or more convenient API that is translated behind the scenes into a low level interface such as JDBC. At the time of writing, two kinds of higher level APIs are under development of top of JDBC. 1) An embedded SQL for Java. At least one vendor plan to build this DBMS implement SQL, a language designed specifically for use with databases. JDBC requires that the SQL statements be passed as Strings to Java methods. The embedded SQL preprocessor then translates this JAVA/SQL mix into Java with JDBC calls. 2) A direct mapping of relational database tables to Java classes. In this object/relational mapping, each row of the table becomes an instance of that class, and each column value corresponds to an attribute of that instance. Programmers can then operate. ODBC is hard to learn. It mixes simple and advanced features together, and it has complex options even for simple queries. JDBC, on the other hand, was designed to keep simple things simple while allowing more advanced capabilities where required.

A Java API like JDBC is needed in order to enable a Pure Java solution. When ODBC is used, the ODBC Driver Manager and drivers must be manually installed on every client machine. When the JDBC driver is written completely in Java, however, JDBC code is automatically installable, portable, and secure on all platforms from network computers to mainframes.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

50
ONLINE CRIME REPORTING

Java server page (jsp) Java Server Pages (JSP) is a new technology for web application development that has received a great deal of attention since it was first announced.

Why is JSP so exciting? 1. JSP is Java-based, and Java is well-suited for enterprise computing. In fact, JSP is a key part of the Java 2 Enterprise Edition (J2EE) platform and can take advantage of the many Java Enterprise libraries, such as JDBC, JNDI, and Enterprise Java Beans. 2. JSP supports a powerful model for developing web applications that separates presentation from processing.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

51
ONLINE CRIME REPORTING

In the early days of the Web, the only tool for developing dynamic web content was the Common Gateway Interface (CGI). CGI outlined how a web server made user input available to a program, as well as how the program provided the web server with dynamically generated content to send back. CGI scripts were typically written in Perl. (In fact, CGI Perl scripts still drive numerous dynamic web sites.) However, CGI is not an efficient solution. For every request, the web server has to create a new operating-system process, load a Perl interpreter and the Perl script, execute the script, and then dispose of the entire process when it's done. To provide a more efficient solution, various alternatives to CGI have been added to programmers' toolboxes over the last few years: FastCGI, for example, runs each CGI program in an external permanent process (or a pool of processes). In addition, mod_perl for Apache, NSAPI for Netscape, and ISAPI for Microsoft's IIS all run server-side programs in the same process as the web server itself. While these solutions offer better performance and scalability, each one is supported by only a subset of the popular web servers. The Java Servlet API, introduced in early 1997, provides a solution to the portability issue. However, all these technologies suffer from a common problem: HTML code embedded inside programs. If you've ever looked at the code for a servlet, you've probably seen endless calls to out.println( ) that contain scores of HTML tags. For the individual developer working on a simple web site this approach may work fine, but it makes it very difficult for people with different skills to work together to develop a web application. This is becoming a significant problem. As web sites become increasingly complex and are more and more critical to the success of an organization, the appearance and usability of the web interface becomes paramount. New client technologies, such as client-side scripts and DHTML, can develop more responsive and interactive user interfaces, style sheets can make it easier to globally change fonts and colors, and images can make the interface more appealing. At the same time, server-side code is getting more complex, and demands for reliability, performance, and fault tolerance are increasing.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

52
ONLINE CRIME REPORTING

The growing complexity of web applications requires a development model that allows people with different skills to cooperate efficiently. Java Server Pages provides just such a development model, allowing web page authors with skills in graphics, layout, and usability to work in tandem with programmers who are experienced in server-side technologies such as multithreading, resource pooling, databases, and caching. While there are other technologies, such as ASP, PHP and ColdFusion, that support similar development models, none of them offers all the advantages of JSP. Introduction to Database Management System (DBMS)
A Database is an integrated collection of user related data stored with minimum redundancy, serves many users/applications quickly and efficiently. A database system is basically a computerized record keeping system, i.e. it is a computerized system whose overall purpose is to maintain information and make that information available on demand. DBMS is a collection of inter-related data and set of programs that allow several users to

access and manipulate data. Its main purpose is to provide users with an abstract view of the data, i.e. the system hides certain details of how the data is stored and maintained. Database Management System is divided into 4 main components Database Hardware Software User

Database:
It consists of collection of persistent data that is used by the application system.

Hardware: The processor(s) and associated main memory that are used to support the execution of database system software..

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

53
ONLINE CRIME REPORTING

Software: The layer between the physical database and the users that handles all requests from the user for access to the database. User: There are three types of users

Application Programmers End User Database Administrator (DBA)

Types of dbms
There are four major categories of DBMS data models. Hierarchical Network Inverted Relational

Relational database management systems Database Management System has evolved from hierarchical to network to relational models. Today, the most widely accepted database model is the relational model. The relational database management system uses only its relational capabilities to manage the information stored in the database. The relational model has three different aspects. Structures Operation Integrity rules
DEPARTMENT OF CSE

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

54
ONLINE CRIME REPORTING

Structures:
They are well-defined objects that store the data of a database structure and the data contained within them can be manipulated by operations.

Operations: They are clearly defined actions that allow users to manipulate the data and structures of a database. The operations on a database must adhere to a predefined set of integrity rules. Integrity rules: They are laws that govern which operations are allowed on the data and structures of a database. Integrity rules protect the data and the structures of a database. A DBMS can be regarded as relational only if it obeys a set of 12 rules formulated by Dr.E.F.Codd These rules define the scope and functionality of a relational database. There is a single overall rule called Zero Rule which is a foundation rule that covers all other rules. It states that Any truly relational database must be manageable entirely through its relational capabilities. The twelve rules are as follows: Rule 1: The information rules Rule 2: The guaranteed access rule Rule 3: The systematic treatment of null values Rule 4: The database description rule Rule 5: The comprehensive sub-language rule

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

55
ONLINE CRIME REPORTING

Rule 6: The view update rule Rule 7: The insert, update and delete rule Rule 8: The physical data independence rule Rule 9: The logical data independence rule. Rule 10: The integrity independence rule. Rule 11: The distribution independence rule. Rule 12: The no subversion rules. Why Oracle? Even though the architecture of all RDBMS is same but the features are different from different RDBMS. Oracle, Sybase, Informix. As per the features concerned all the RDBMS can be related as it. But with the easiness, demand it is better to go for Oracle. Because the professional availability in Oracle is high compared to other RDBMS professionals. Because the availability is high the manpower cost will be less compared to Sybase professionals, Informix professionals. Even the support from the vendors in also hig in Oracle environment rather than other RDBMS. Oracle9i is regarded as the RDBMS because it is the most widely acclaimed package across the globe with its 100% client-server architecture. Oracle has in-built features like data integrity, security, reverie and backup and total GUI based presentation and can easily and efficiently support small to very large scale applications. Database connections: The database connection string is the only JDBC component that references the particular database being accessed. You must provide a specific driver connection string that uses the protocol defined for the driver. The JDBC Driver Manager class to determine which driver to load uses the protocols currently maintained by Java Soft.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

56
ONLINE CRIME REPORTING

A Query returns a Result set object. This object contains the results of the query in a form of that can be accessed by the application. If the query has no results, the Result Set object contains no rows. Otherwise it contains rows of data matching the query (up to the limit specified by the database). If the database supports doing so, you can set the maximum number of rows using the Statement class method setMaxRows (). What is Testing? A process of executing a program with the explicit intention of finding errors, that is making the program fail. Software Testing: It is the process of testing the functionality and correctness of software by running it. Process of executing a program with the intent of finding an error. A good test case is one that has a high probability of finding an as yet undiscovered error. A successful test is one that uncovers an as yet undiscovered error. Software Testing is usually performed for one of two reasons: Defect detection Reliability estimation

Black Box Testing: Applies to software systems or module, tests functionality in terms of inputs and outputs at interfaces.Test reveals if the software function is fully operational with reference to requirements specification. White Box Testing:

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

57
ONLINE CRIME REPORTING

Knowing the internal workings i.e., to test if all internal operations are performed according to program structures and data structures. To test if all internal components have been adequately exercised. Software Testing Strategies: A strategy for software testing will begin in the following order: Unit testing Integration testing Validation testing System testing

Unit testing It concentrates on each unit of the software as implemented in source code and is a white box oriented. Using the component level design description as a guide, important control paths are tested to uncover errors within the boundary of the module. In the unit testing, The step can be conducted in parallel for multiple components. Integration testing: Here focus is on design and construction of the software architecture. Integration testing is a systematic technique for constructing the program structure while at the same time conducting tests to uncover errors associated with interfacing. The objective is to take unit tested components and build a program structure that has been dictated by design. Validation testing: In this, requirements established as part of software requirements analysis are validated against the software that has been constructed i.e., validation succeeds when software functions in a manner that can reasonably expected by the customer. System testing:
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

58
ONLINE CRIME REPORTING

In this software and other system elements are tested as a whole. 8.2 TESTING 8.2.1. TEST CASE REPORT Having test cases that are good at revealing the presence of faults is central to successful testing. The reason for this is that if there is a fault in a program, the program can still provide the expected behavior for many inputs. Only for the set of inputs that exercise the fault in the program will the output of the program deviate from the expected behavior. Hence, it is fair to say that testing is as its test cases. Public login: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays message invalid user name and password OBSERVED BEHAVIOUR -doSTATUS PASS FAIL p

Enter the incorrect login id ,password

2.

Enter blank values Enter the correct login id and password

3.

Displays an alert message enter valid value for corresponding field Displays authorized action to user

Null values are checked with the database values -do-

4.

Trigger back button

Page is redirected to the home page

-do-

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

59
ONLINE CRIME REPORTING

Registration:

TEST CASE 1.

INPUT

EXPECTED BEHAVIOUR Displays an alert message invalid user name and password Displays an alert message enter valid value for corresponding field All values are stored in database and Page is redirected to the login page

OBSERVED BEHAVIOUR -do-

STATUS PASS FAIL p

Enter the incorrect field values

2.

Enter blank values Trigger submit button

Null values are stored in the database -do-

3.

Complaint Form: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays an alert message enter valid value for corresponding field All values are stored in complaint database and a complaint id has to be displayed. OBSERVED BEHAVIOUR Null values are stored in the database -doSTATUS PASS FAIL F

Enter blank values Trigger submit button

2.

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

60
ONLINE CRIME REPORTING

Complaint Status: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays message not a valid complaint id Displays message ACCESS DENIED Displays your complaint status with details. OBSERVED BEHAVIOUR Null pointer Exception Others Complaint Record displayed -doSTATUS PASS FAIL F

Enter invalid Complaint id Enter others Complaint id Enter your Complaint id

2.

3.

PUBLIC LOGOUT: TEST CASE 1. INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P

Click on logout. Session has to be destroyed.

Police login: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays message invalid user name and password OBSERVED BEHAVIOUR -doSTATUS PASS FAIL p

2.

Enter the incorrect login id ,password and select police station name Enter blank values

Displays an alert message enter valid value for corresponding field

Null values are checked with the database values

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

61
ONLINE CRIME REPORTING

3.

4.

Enter the correct login id and password and select police station name Trigger back button

Displays authorized action to user

-do-

Page is redirected to the home page

-do-

View Complaint by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays the selected record information forwarded to the particular police station. OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P

Select the displayed complaint ids

Update Complaint by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays the previous status and the entered status to be updated. OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P

Select the displayed complaint ids to be update

View Alert Messages by POLICE:

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

62
ONLINE CRIME REPORTING

TEST CASE 1.

INPUT

EXPECTED BEHAVIOUR Displays the alert messages given by the various police stations.

OBSERVED BEHAVIOUR -do-

STATUS PASS FAIL P

Select the option view in the menu Alert messages

Give Alert Messages by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR STATUS PASS FAIL P

Enter the alert message and Date.

All the values are -dostored in the database with the corresponding alert massage issued date.

View Cautions by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays the cautions given by the administrator to the particular police station. OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P

Select the option view in the menu Cautions

View Thief information by POLICE:

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

63
ONLINE CRIME REPORTING

TEST CASE 1.

INPUT

EXPECTED BEHAVIOUR Displays the information of thief.

OBSERVED BEHAVIOUR -do-

STATUS PASS FAIL P

Click on the particular thief photo to know information.

Add Thief Information by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR All the values are stored in the. OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P

Enter the Details of the thief.

View Messages by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P

Select the view Displays the in the messages messages send by the various police stations.

Give Messages by POLICE:


ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

64
ONLINE CRIME REPORTING

TEST CASE 1.

INPUT

EXPECTED BEHAVIOUR All the values are stored in the database and to be display when the police station head clicks on view messages.

OBSERVED BEHAVIOUR -do-

STATUS PASS FAIL P

Enter the message and Date and select the police station. .

POLICE LOGOUT by POLICE: TEST CASE 1. INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR -doSTATUS PASS FAIL P

Click on logout. Session has to be destroyed.

ADMIN LOGIN by Administrator: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays message invalid user name and password OBSERVED BEHAVIOUR -doSTATUS PASS FAIL p

2.

Enter the incorrect login id ,password and select police station name Enter blank values

Displays an alert message enter valid value for corresponding field

Null values are checked with the database values

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

65
ONLINE CRIME REPORTING

3.

Enter the correct login id and password

Displays authorized action to Administrator

-do-

4.

Trigger back button

Page is redirected to the home page

-do-

View Complaints by Administrator:

TEST CASE 1.

INPUT

EXPECTED BEHAVIOUR all the complaint ids have to be displayed with heir status.

OBSERVED BEHAVIOUR -do-

STATUS PASS FAIL P

Select view complaint.

Give Alert Messages by Administrator: TEST CASE 1. INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR STATUS PASS FAIL P

Enter the alert message and Date.

All the values are -dostored in the database with the corresponding alert massage issued date.

Give Cautions by Administrator:

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

66
ONLINE CRIME REPORTING

TEST CASE 1.

INPUT

EXPECTED BEHAVIOUR All the values are stored in the database and displayed when police department clicks on the view messages.

OBSERVED BEHAVIOUR -do-

STATUS PASS FAIL P

Enter the message and Police station name.

Administrator logout by Administrator:

TEST CASE 1.

INPUT

EXPECTED BEHAVIOUR

OBSERVED BEHAVIOUR -do-

STATUS PASS FAIL P

Click on logout. Session has to be destroyed.

PUBLIC LOGIN:

TEST CASE 1.

INPUT

EXPECTED BEHAVIOUR Displays an alert message enter valid value for corresponding field

OBSERVED BEHAVIOUR -do-

THE WAY WE OVERCOME THIS DEFECT By providing the client side validation by writing JavaScript.

Enter blank values

STATU S PASS FAIL P

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

67
ONLINE CRIME REPORTING

Registration: TEST CASE INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR THE WAY WE OVERCOME THIS DEFECT STATU S PASS FAIL P

1.

Enter blank values

Displays an alert message enter valid value for corresponding field

-do-

By providing the client side validation by writing JavaScript.

Complaint Form: TEST CASE INPUT EXPECTED BEHAVIOUR OBSERVED BEHAVIOUR THE WAY WE OVERCOME THIS DEFECT STATU S PASS FAIL P

1.

Enter blank values

Displays an alert message enter valid value for corresponding field

-do-

By providing the client side validation by writing JavaScript.

Complaint Status:

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

68
ONLINE CRIME REPORTING

TEST CASE 1.

INPUT

EXPECTED BEHAVIOUR Displays message not a valid complaint id Displays message ACCESS DENIED

OBSERVED BEHAVIOUR -do-

THE WAY WE OVERCOME THIS DEFECT By checking the requested complaint id in the database or not By checking the requested complaint id with the login value

2.

Enter invalid Complaint id Enter others Complaint id

STATU S PASS FAIL P

-do-

Police login: TEST CASE 1. INPUT EXPECTED BEHAVIOUR Displays an alert message enter valid value for corresponding field OBSERVED BEHAVIOUR -doTHE WAY WE OVERCOME THIS DEFECT By providing the client side validation by writing JavaScript. STATU S PASS FAIL P

Enter blank values

Administrator login:

TEST CASE 1.

INPUT

EXPECTED BEHAVIOUR Displays an alert message enter valid value for corresponding field

OBSERVED BEHAVIOUR -do-

THE WAY WE OVERCOME THIS DEFECT By providing the client side validation by writing JavaScript.

Enter blank values

STATU S PASS FAIL P

CONCLUSION
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

69
ONLINE CRIME REPORTING

The technological benefits of ECOPS are to maintain information, monitor and enhance the performance of the department, to take a critical look at the existing system, processes and procedures of the department so as to identify and remove the redundancy. The case registered at one police station can be tracked at any police station. This reduces the discretionary dependence of police. Once the case is registered the investigation and follow up activities relating to the case cannot be delayed. All these factors have contributed to a higher moral of the police officials at all the levels in police department. This project result in great improvement in the organizations functioning by reducing the effort spent by the general people. GOALS:

Improve efficiency in police department Availability of online police service to citizens Availability of data to senior officials for quick decision making Better administration and co-ordination Speedy detection of crimes Duplication of work avoided Retrieval and access of data is easy Paper work is drastically reduced Automatic maintenance of registers

GLOSSARY
ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE DEPARTMENT OF CSE

70
ONLINE CRIME REPORTING

Project management is the discipline of planning, organizing, securing, and managing resources to achieve specific goals. A project is a temporary endeavor with a defined beginning and end (usually time-constrained, and often constrained by funding or deliverables), undertaken to meet unique goals and objectives, typically to bring about beneficial change or added value. The temporary nature of projects stands in contrast with business as usual (or operations), which are repetitive, permanent, or semi-permanent functional activities to produce products or services. In practice, the management of these two systems is often quite different, and as such requires the development of distinct technical skills and management strategies. The primary challenge of project management is to achieve all of the project goals and objectives while honoring the preconceived constraints. Typical constraints are scope, time, and budget. The secondaryand more ambitiouschallenge is to optimize the allocation of necessary inputs and integrate them to meet pre-defined objectives.

BIBLIOGRAPHY

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

71
ONLINE CRIME REPORTING

Java user site: www.java.com. Java at Sun Microsystems., Inc - java.sun.com Java Virtual Machine Specifications, 2nd Ed. - Java.Sun.com Java Virtual Machine - Wikipedia http://java.sun.com/products/jsp/ http://en.wikipedia.org/wiki/JavaServer_Pages http://en.wikipedia.org/wiki/Java_Database_Connectivity http://jakarta.apache.org/tomcat/tomcat-5.5-doc

ARYABHATA INSTITUTE OF TECHNOLOGY AND SCIENCE

DEPARTMENT OF CSE

You might also like