Académique Documents
Professionnel Documents
Culture Documents
To deliver next generation police and law enforcement reporting tools, and
Solutions is the first of its kind to offer potential public safety employees a
full range of services that will assist them in obtaining the public safety
the job and agency that will provide you with the best opportunity for
opportunities.
1
PROJECT DESCRIPTION
1. Administration
2. Citizen
3. Police Officers(Constable to DGP)
4. Detectives
5. Magistrate
1) Administrator:
2
2) Detectives:
3) Police officers:
3
Security protection means when high personalities are in
meeting in public need protection throw some powerful persons like police
officers. So they apply for the security, so they accept or reject.
4) Magistrate:
5) Citizen:
The citizens have every right to get the help of a police officer. He
gives the complaint form to the police officer to take action to the problem
of the citizen. He must ask permission to do some mass meeting, to keep
loud speaker and browsing centers from the police officers. He cannot do
any thing with out their permission. According to that the officers must help
the citizens.
4
COMPANY PROFILE
5
SYSTEM ANALYSIS
Introduction:
Taking all these factors into account and with the knowledge of the
inter-relationship between the various fields and section and their potential
interactions, they are consider for developing the whole system in and integrated
manner, this project is developed to meet all the criteria in the
6
The following Objectives are kept in mind:
In this, there are certain expressions that are being used in the
development of the project. And, it is used to identify our needs or source in
the project.
• Defining a problem
• Finding the various need for the problem
• Formalizing the need
• Relating the need
7
1. Initial Investigation
The user request identifies the need for change and authorizes the
initial investigation. It may undergo several modifications before it become
a written commitment. Once approved the activities are carried out into
action. The proposal, when approved, it initiates a detailed user-oriented
specification of system performance and analysis of the feasibility of the
evaluating alternative candidate systems with a recommendation of the best
system for the job.
Feasibility Study
The objective of the feasibility study is not only to solve the problem
but also to acquire a sense of its scope. The reason for doing this is to
identify the most beneficial project to the organization.
8
There are three aspects in the feasibility study:
1. Technical Feasibility
2. Financial Feasibility
3. Operating Feasibility
Technical Feasibility
9
Oracle as back end. They also provide sufficient memory to hold and
process the data. As the company is going to install all the process in the
system it is the cheap and efficient technique.
10
Every organization want to reduce there cost but at the same time quality of
the
Service should also be maintained. The system is developed according the
estimation of the cost made by the concern. In this project, the proposed
system will definitely reduce the cost and also the manual work is reduced
and speed of work is also increased.
3. Operational Feasibility
Proposed project will be beneficial only when they are turned into an
information system and to meet the organization operating requirements.
The following issues are considered for the operation:
• Does this system provide sufficient support for the user and the
management?
• What is the method that should be used in this project?
• Have the users been involved in the planning and development of
the projects?
• Will the proposed system cause any harm, bad result, loss of
control and accessibility of the system will lost?
11
problem of the system. It should be a user-friendly environment. All these
aspect should be kept in mind and steps should be taken for developing the
project carefully.
Regarding the project, the system is very much supported and friendly
for the user. The methods are defined in an effective manner and proper
conditions are given in other to avoid the harm or loss of data. It is designed
in GUI interface, as working will be easier and flexible for the user.
They are three basic feasibility studies that are done in every project.
12
Existing System:
This system has number of limitations and some of them are listed
below.
13
Proposed System:
2) Police station has several departments like Law and Order, Women
Protection, Cyber crime, Traffic and control, CBI, etc. Separate module
for each dept would be needed.
6) Citizens should be able to apply for various licenses like Arms, loud
14
HARDWARE SPECIFICATION
Processor : Pentium 4
Processor Speed : 2.5 GHz
Ram : 512 MB
Hard Disk Drive : 80GB
Floppy Disk Drive : Sony
CD-ROM Drive : Sony
Monitor : 17” inches
Keyboard : TVS Gold
Mouse : Logitech
15
SOFTWARE SPECIFICATION
SERVER:
CLIENT:
16
ABOUT SOFTWARE
Explorer, which translate HTML pages on Web sites to text and graphics
on their monitors.
If you are already sharing documents across your intranet with your co-
17
Web site, then visitors are not required to have the same software
program used to create the document to view its content, or the same
operating system.
Although PWS uses the same technology to host Web sites as the Web
The 10-connection limit of PWS means that it can support no more than
publishing. However, you can develop your site on PWS, including items
these scenarios spark your imagination and provide you with ideas for
18
These scenarios are included:
19
About Software
J2EE Architecture
J2EE Server
20
• Naming and Directory - allows programs to locate services and components
through the Java Naming and Directory InterfaceTM (JNDI) API
• HTTP - enables Web browsers to access servlets and JavaServer PagesTM (JSP)
files
Web Container
21
• Portability
• Composition
• Processing
• Access Models
Portability
Java Server Pages files can be run on any web server or web-
enabled application server that provides support for them. Dubbed the JSP engine, this
support involves recognition, translation, and management of the JavaServer Page
lifecycle and its interactions with associated components.
Composition
It was mentioned earlier that the Java Server Pages architecture can include reusable
Java components. The architecture also allows for the embedding of a scripting language
directly into the Java Server Page file.
22
The components current supported include Java Beans, and
Servlets. Support for Enterprise Java Beans components will likely be added in a future
release. As the default scripting language, Java Server Pages use the Java programming
language. This means that scripting on the server side can take advantage of the full set of
capabilities that the Java programming language offers. Support for other scripting
languages might become available in the future.
Processing
A Java Server Page file is essentially HTML document with JSP scripting or tags. It may
have associated components in the form of .class, .jar, or .ser files--or it may not. The use
of components is not required.
The Java Server Page file has a .jsp extension to identify it to the server as a Java
Server Pages file. Before the page is served, the Java Server Pages syntax is parsed and
processed into a servlet on the server side. The servlet that is generated outputs real
content in straight HTML for responding to the client. Because it is standard HTML, the
dynamically generated response looks no different to the client browser than a static
response.
Access Models
A Java Server Pages file may be accessed in at least two different ways:
23
In this scenario, suppose the page accesses reusable Java Bean
components that perform particular well-defined computations like accessing a database.
The results of the Bean’s computations, called result sets are stored with in the Bean as
properties. The page uses such Beans to generate dynamic content and present it back to
the client.
The servlet generates the dynamic content. To handle the response to the client,
the servlet creates a Bean and stores the dynamic content (sometimes called the result set)
in the Bean. The servlet then invokes a Java Server Page that will present the content
along with the Bean containing the generated from the servlet.
There are two APIs to support this model of request processing using Java Server
Pages. One API facilitates passing context between the invoking servlet and the Java
Server Page. The other API lets the invoking servlet specify which Java Server Page to
use.
In both of the above cases, the page could also contain any valid Java code. The
Java Server Pages architecture encourages separation of content from presentation--it
does not mandate it.
24
With at least two access models, the question naturally arises "When does it make
sense to have a Java Server Page as the front-end to a servlet, as the back-end to a servlet,
or use only the servlet? Here are some possible guidelines:
Enterprise Beans
A session bean represents a client in the J2EE server. A client communicates with
the J2EE server by invoking the methods that belong to an enterprise bean. For example,
an online shopping client might invoke the enter Order method of its session bean to
create an order. A session bean converses with the client, and can be thought of as an
extension of the client. Each session bean can have only one client. When the client
terminates, its corresponding session bean also terminates. Therefore, a session bean is
transient, or non-persistent.
Entity Beans
25
An entity bean represents a business object in a persistent storage mechanism
such as a database. For example, an entity bean could represent a customer, which might
be stored as a row in the customer table of a relational database. An entity bean's
information does not have to be stored in a relational database. It could be stored in an
object database, a legacy application, a file, or some other storage mechanism. The type
of storage mechanism depends on the particular implementation of EJB technology.
The reference implementation (J2EE SDK) uses a relational database. See the
section "Database Access" for more information.
The persistence of an entity bean can be managed by either the entity bean itself, or by
the EJB container. Bean-managed persistence requires you to write the data access code
in the Bean. For example, a customer entity bean would include the SQL commands to
access a relational database via JDBC. Container-managed persistence means that the
EJB container handles the data access calls automatically.
Although both session and entity beans run in an EJB container, they are quite different.
The following table contrast session and entity beans:
Shared
May have one client. May be shared by multiple clients.
Access
Not persistent. When the client Persistent. Even when the EJB
Persistence terminates its session bean is no container terminates, the entity state
26
The flexibility of the EJB architecture allows you to build applications in a variety
of ways. The following illustration shows how you might create an online shopping
application with both session and entity beans. An HTML form displayed in a Web
browser accesses a servlet in a Web container. The servlet is the client of a shopping
session bean. When the HTML forms needs to find a product or enter an order, it
instructs the servlet to call the appropriate business methods in the session bean. The
session bean is the client of the order, product, and customer entity beans. Because Entity
beans are persistent, their state is stored in the database.
27
FIGURE 1-3 Using Session and Entity Beans
Java BeansTM Components and Enterprise Beans
JavaBeans components and enterprise beans are not the same. Although both
components are written in the Java programming language, they are not
interchangeable. JavaBeans components define a convention for making a Java class
instance customizable by design tools, allowing the tools to link these customized
objects via events. Enterprise beans implement multi-user, transactional services.
28
Programming Restrictions for Enterprise Beans
Enterprise beans make use of the services provided by the EJB container, such as
life-cycle management. To avoid conflicts with these services, enterprise beans are
restricted from performing certain operations:
• Setting a socket factory used by Server Socket, Socket, or the stream handler
factory used by the URL class
Database Access
29
Both session and entity beans can access a database. The type of enterprise bean
you choose depends on your application. You might want to include SQL calls in a
session bean under the following circumstances:
• The data returned by the SQL call will not be used by multiple clients.
You should probably access a database from an entity bean if any of the following
conditions are true:
• More than one client will use the data returned by the database call.
• You want to hide the relational model from the session bean.
INTRODUCTION
Microsoft SQL Server is a client/server relational database system. What exactly
is a client/server relational database system? The best way to explain it is to define it in
two parts, the client /server part, and the relational database system part.
30
Client/server, also referred to as distributed computing, means that all of the
data processing of a program does not occur on a single computer, as it often does on
desktop, mini-or mainframe-based computer systems. Instead, different parts of the SQL
Server application run on two or more computers at the same time. Multiple SQL Server
database, along with thousands of clients, can all be designed to work together, scaling to
virtually any size.
Major Features Of SQL Server
SQL Server offers database administrators and SQL developers virtually every
tool they need to create and manage a complete enterprise –wide management system.
This section takes a look at some of the most important features of SQL Server7.0. For a
complete description of all the features, you will have to read the entire book.
SQL Server Fundamentals
When people think of SQL Server, they often have different pictures in their
heads of what SQL Server really is. Some people think of it as a database. Others think if
it is as a physically server. And others think of the BackOffice product sold by Microsoft.
31
onto SQL Server developer’s desktops, as it gives developers direct access to SQL Server
so they can run interactive Transact-SQL statements and SQL scripts.
SQL Server profiler
This tool is used to monitor and record SQL Server database activity between SQL
Server and clients. Only load this tool on workstations that perform this task.
Database
A database is similar to a data file in that it is a storage place for data. Like a data
file, a database does not present information directly to a user; the user runs an
application that accesses data from the database and presents it to the user in an
understandable format.
When working with data files, an application must be coded to work with the
specific structure of each data file. In contrast, a database contains a catalog that
applications use to determine how data is organized. Generic database applications
can use the catalog to present users with data from different databases dynamically,
without being tied to a specific data format.
A database typically has two main parts: first, the files holding the physical
database and second, the database management system (DBMS) software that
applications use to access data. The DBMS is responsible for enforcing the database
structure, including:
• Ensuring that data is stored correctly and that the rules defining data
relationships are not violated.
Relational Database
32
Although there are different ways to organize data in a database, relational
databases are one of the most effective. Relational database systems are an
application of mathematical set theory to the problem of effectively organizing data.
In a relational database, data is collected into tables (called relations in relational
theory).
A table represents some class of objects that are important to an organization. For
example, a company may have a database with a table for employees, another table
for customers, and another for stores. Each table is built of columns and rows (called
attributes and topples in relational theory). Each column represents some attribute of
the object represented by the table. For example, an Employee table would typically
have columns for attributes such as first name, last name, employee ID, department,
pay grade, and job title. Each row represents an instance of the object represented by
the table. For example, one row in the Employee table represents the employee who
has employee ID 12345.
When organizing data into tables, you can usually find many different ways to
define tables. Relational database theory defines a process called normalization,
which ensures that the set of tables you define will organize your data effectively.
Scalable
SQL Server 2000 supports having a wide range of users access it at the same
time. An instance of SQL Server 2000 includes the files that make up a set of
databases and a copy of the DBMS software. Applications running on separate
computers use a SQL Server 2000 communications component to transmit commands
over a network to the SQL Server 2000 instance. When an application connects to an
instance of SQL Server 2000, it can reference any of the databases in that instance
that the user is authorized to access. The communication component also allows
communication between an instance of SQL Server 2000 and an application running
33
on the same computer. You can run multiple instances of SQL Server 2000 on a
single computer.
Although SQL Server 2000 is designed to work as the data storage engine for
thousands of concurrent users who connect over a network, it is also capable of
working as a stand-alone database directly on the same computer as an application.
The scalability and ease-of-use features of SQL Server 2000 allow it to work
efficiently on a single computer without consuming too many resources or requiring
administrative work by the stand-alone user. The same features allow SQL Server
2000 to dynamically acquire the resources required to support thousands of users,
while minimizing database administration and tuning. The SQL Server 2000
relational database engine dynamically tunes itself to acquire or free the appropriate
computer resources required to support a varying load of users accessing an instance
of SQL Server 2000 at any specific time. The SQL Server 2000 relational database
engine has features to prevent the logical problems that occur if a user tries to read or
modify data currently used by others.
To work with data in a database, you have to use a set of commands and
statements (language) defined by the DBMS software. Several different languages
can be used with relational databases; the most common is SQL. The American
National Standards Institute (ANSI) and the International Standards Organization
(ISO) define software standards, including standards for the SQL language. SQL
Server 2000 supports the Entry Level of SQL-92, the SQL standard published by
ANSI and ISO in 1992. The dialect of SQL supported by Microsoft SQL Server is
called Transact-SQL (T-SQL). T-SQL is the primary language used by Microsoft
SQL Server applications.
XML is the emerging Internet standard for data. XML is a set of tags that can be
used to define the structure of a hypertext document. XML documents can be easily
34
processed by the Hypertext Markup Language, which is the most important language
for displaying Web pages.
Microsoft® SQL Server™ 2000 includes many graphical and command prompt
utilities that allow users, programmers, and administrators to:
INTRODUCTION TO VBSCRIPT
35
VBScript brings professional programming techniques to
HTML web documents. With VBScript, we can create documents and
applications that previously could only have been made available as a
desktop program written with something like Visual Basic. It gives us the
ability to interact with and manipulate HTML documents directly from
the browser. With VBScript, we can even interact with and manipulate
the browser it, sending it instructions from our VBScript program, and
pulling in its variables for our own use.
36
• Display two-dimensional HTML
allows us to attach events to these objects. To put this another way, when
the user or another part of our program interacts in some way with a
run a particular routine within our program. For example, if the user
In Valid
Home Login
Authenticate
Valid
Admin A
Detectives D
Police Officer P
DATA FLOW DIAGRAM:
Magistrate M
37
Citizen C
38
A
Modify
Branch
If Appoint
New Officer is No
Officer Appointmen PoliceInfo
Appointment t Branch
If Appoint is yes
Transferring
Officer TransferInfo
Reports
View Officer
Information PoliceInfo
View
Transferring
Officer TransferInfo
Information
39
C
Security Security
Security Form Apply
Complaints
Verify the
D Detectives
complaint
Reports
40
P Fir Details Fir Apply Fir Data
License
License Accept or
Reject
License Report
Arrest warrant
M Magistrate Accept or
Reject
Arrest warrant
41
DATABASE STRUCTURE
Browsing Centre
TableName:Bcentre
TableName:Branchdetails
42
Complaints
TableName:Complaints
TableName:Criminalinfo
43
FiledName DataType Size
Comid numeric 5
Branchid varchar 20 LicenseDetails
Name varchar 20
State varchar 20
City varchar 20
Area varchar 20
Crimetype varchar 40
Crimedate datetime 8
Cname varchar 20
Cstate varchar 20
Ccity varchar 20
Address varchar 30
Age numeric 5
Phoneno numeric 9
Status varchar 50
TableName:Licensedet
44
LoudSpeakerInformation
TableName:Loudspeakerinfo
MeetingInformation
TableName:Meetinginfo
TableName:Policeinfo
45
FieldName DataType Size
Regno(Primary Key) numeric 5
Pname varchar 30 RequestTable
Address varchar 30
Age numeric 5 TableName
Dob datetime 8 :Requesttable
Qualification varchar 20
Applieddist varchar 30
Department varchar 20
FieldName
Posting DataType
varchar Size
30
Comid
Aid numeric
numeric 55
Branchid
District varchar
varchar 10
30
Rdate
State datetime
varchar 830
Adate
Branchid datetime
varchar 820
Status
Doa varchar
datetime 20
8
Appointed varchar 10
SecurityDetails
TableName:Securitydet
TableName:Transferinfo
47
CODE DESIGN
HOME.aspx.cs
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
}
protected void Login1_Authenticate(object sender,
AuthenticateEventArgs e)
{
if (Login1.UserName == "Admin" && Login1.Password == "Admin")
Response.Redirect("adminhome.aspx");
else if (Login1.UserName == "Police" && Login1.Password ==
"Police")
Response.Redirect("policehome.aspx");
else if (Login1.UserName == "Citizen" && Login1.Password ==
"Citizen")
Response.Redirect("citizenhome.aspx");
else if (Login1.UserName == "Detectives" && Login1.Password ==
"Detectives")
Response.Redirect("detectivehome.aspx");
else if (Login1.UserName == "Magistrate" && Login1.Password ==
"Magistrate")
Response.Redirect("magistratehome.aspx");
}
}
48
POLICE REGISTRATION :
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.OleDb;
}
void shownumber()
{
cmd = new OleDbCommand("select isnull(max(regno),0)+1 from
policeinfo", con);
rs = cmd.ExecuteReader();
if(rs.Read ())
TextBox1.Text =rs[0].ToString ();
rs.Close ();
cmd.Dispose ();
}
protected void Button1_Click(object sender, EventArgs e)
{
try
{
string s = DropDownList1.SelectedItem.Text + "-" +
DropDownList2.SelectedItem.Text + "-" + DropDownList3.SelectedItem.Text;
49
cmd = new OleDbCommand("insert into
policeinfo(regno,pname,address,age,dob,qualification,applieddist,depart
ment,posting,appointed) values(?,?,?,?,?,?,?,?,?,?)", con);
cmd.Parameters.AddWithValue("rno", TextBox1.Text);
cmd.Parameters.AddWithValue("name", TextBox2.Text);
cmd.Parameters.AddWithValue("address", TextBox3.Text);
cmd.Parameters.AddWithValue("age", TextBox4.Text);
cmd.Parameters.AddWithValue("dob", s);
cmd.Parameters.AddWithValue("qualification", TextBox5.Text);
cmd.Parameters.AddWithValue("applieddist",
DropDownList5.SelectedItem.Text);
cmd.Parameters.AddWithValue("department",
dept.SelectedItem.Text);
cmd.Parameters.AddWithValue("posting",
DropDownList4.SelectedItem.Text);
cmd.Parameters.AddWithValue("appointed", "No");
cmd.ExecuteNonQuery();
cmd.Dispose();
Label1.Text = "Your Information Registered....";
}
catch (Exception ex)
{
Label1.Text = ex.ToString();
}
}
protected void Button2_Click(object sender, EventArgs e)
{
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text ="";
TextBox5.Text = "";
DropDownList1.SelectedIndex = 0;
DropDownList2.SelectedIndex = 0;
DropDownList3.SelectedIndex = 0;
DropDownList4.SelectedIndex = 0;
DropDownList5.SelectedIndex = 0;
shownumber();
}
}
50
COMPLAINTS DETAILS
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.OleDb;
}
void binddata()
{
cmd = new OleDbCommand("select isnull(max(compid),0)+1 from
complaints", con);
rs = cmd.ExecuteReader();
if (rs.Read())
TextBox1.Text = rs[0].ToString();
}
protected void Button1_Click(object sender, EventArgs e)
{
try
{
Label1.Visible = true ;
51
cmd.Parameters.AddWithValue("area1", TextBox4.Text);
cmd.Parameters.AddWithValue("area2", TextBox4.Text);
cmd.Parameters.AddWithValue("area3", TextBox4.Text);
cmd.Parameters.AddWithValue("city",
DropDownList2.SelectedItem .Text);
rs = cmd.ExecuteReader();
if (rs.Read())
bid = rs[0].ToString();
rs.Close();
cmd.Dispose();
cmd.Parameters.AddWithValue("pincode", TextBox5.Text);
cmd.Parameters.AddWithValue("emailid", TextBox6.Text);
cmd.Parameters.AddWithValue("crimetype", TextBox7.Text);
cmd.Parameters.AddWithValue("type",
DropDownList3.SelectedItem.Value);
cmd.Parameters.AddWithValue("date",s );
cmd.Parameters.AddWithValue("reason", TextBox8.Text);
cmd.Parameters.AddWithValue("branchid", bid);
cmd.Parameters.AddWithValue("status", "No");
cmd.ExecuteNonQuery();
Label1.Text = "You Complaints has been Registered..and you
can see your status in your mail or mobile..";
}
catch (Exception ex)
{
Label1.Visible = true;
Label1.Text = ex.Message;
}
}
protected void Button2_Click(object sender, EventArgs e)
{
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
TextBox6.Text = "";
TextBox7.Text = "";
TextBox8.Text = "";
TextBox8.Text = "";
DropDownList1.SelectedIndex = 0;
DropDownList2.SelectedIndex = 0;
52
DropDownList3.SelectedIndex = 0;
DropDownList4.SelectedIndex = 0;
DropDownList5.SelectedIndex = 0;
DropDownList6.SelectedIndex = 0;
RadioButtonList1.SelectedIndex = 0;
binddata();
}
else if (DropDownList1.SelectedItem.Text == "Kerala")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Palkad");
DropDownList2.Items.Add("Eduki");
DropDownList2.Items.Add("Kolikod");
DropDownList2.Items.Add("Thiruvanandapuram");
}
else if (DropDownList1.SelectedItem.Text == "Andra")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Tirupathi");
DropDownList2.Items.Add("Kundoor");
DropDownList2.Items.Add("Visagapatinam");
DropDownList2.Items.Add("Ellor");
}
else if (DropDownList1.SelectedItem.Text == "Karnadaga")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Bangalore");
DropDownList2.Items.Add("Charmina");
DropDownList2.Items.Add("Belgaum");
DropDownList2.Items.Add("Belari");
} }
}
53
REQUEST FOR ARREST WARRANT:
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.OleDb;
}
void bindgrid()
{
try
{
cmd = new OleDbCommand("select
comid,name,state,city,area,crimetype,crimedate,cname,cstate,ccity,addre
ss,age,phoneno,status from firdetails where state=? and city=? and
branchid=? and status is null ", con);
cmd.Parameters.AddWithValue("state",
DropDownList1.SelectedItem.Text);
cmd.Parameters.AddWithValue("city",
DropDownList2.SelectedItem.Text);
cmd.Parameters.AddWithValue("branchid",
DropDownList3.SelectedItem.Text);
adp = new OleDbDataAdapter(cmd);
ds = new DataSet();
adp.Fill(ds, "table1");
GridView1.DataSource = ds.Tables[0];
GridView1.DataBind();
cmd.Dispose();
}
catch (Exception ex)
{
Label1.Visible = true;
Label1.Text = ex.ToString();
}
}
54
protected void GridView1_PageIndexChanging(object sender,
GridViewPageEventArgs e)
{
GridView1.PageIndex = e.NewPageIndex;
bindgrid();
}
protected void DropDownList1_SelectedIndexChanged(object sender,
EventArgs e)
{
if (DropDownList1.SelectedItem.Text == "TamilNadu")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Chennai");
DropDownList2.Items.Add("Madurai");
DropDownList2.Items.Add("Trichy");
DropDownList2.Items.Add("Kovai");
}
else if (DropDownList1.SelectedItem.Text == "Kerala")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Palkad");
DropDownList2.Items.Add("Eduki");
DropDownList2.Items.Add("Kolikod");
DropDownList2.Items.Add("Thiruvanandapuram");
}
else if (DropDownList1.SelectedItem.Text == "Andra")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Tirupathi");
DropDownList2.Items.Add("Kundoor");
DropDownList2.Items.Add("Visagapatinam");
DropDownList2.Items.Add("Ellor");
}
else if (DropDownList1.SelectedItem.Text == "Karnadaga")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Bangalore");
DropDownList2.Items.Add("Charmina");
DropDownList2.Items.Add("Belgaum");
DropDownList2.Items.Add("Belari");
}
}
protected void DropDownList2_SelectedIndexChanged(object sender,
EventArgs e)
{
cmd = new OleDbCommand("select distinct(branchid) from
firdetails where state=? and city=?", con);
55
cmd.Parameters.AddWithValue("state",
DropDownList1.SelectedItem.Text);
cmd.Parameters.AddWithValue("city",
DropDownList2.SelectedItem.Text);
rs = cmd.ExecuteReader();
DropDownList3.DataSource = rs;
DropDownList3.DataTextField = "branchid";
DropDownList3.DataBind();
rs.Close();
cmd.Dispose();
DropDownList3.Items.Insert(0, "SelectId");
}
protected void DropDownList3_SelectedIndexChanged(object sender,
EventArgs e)
{
bindgrid();
try
{
if (e.CommandName == "select")
{
LinkButton l1 = (LinkButton)e.CommandSource;
cmd = new OleDbCommand("update firdetails set
status='Request' where comid=?", con);
cmd.Parameters.AddWithValue("comid", l1.Text);
cmd.ExecuteNonQuery();
cmd.Dispose();
cmd = new OleDbCommand("insert into
requesttable(comid,branchid,rdate) values(?,?,?)", con);
cmd.Parameters.AddWithValue("comid", l1.Text);
cmd.Parameters.AddWithValue("branchid",
DropDownList3.SelectedItem.Text);
cmd.Parameters.AddWithValue("rdate",DateTime.Now.ToStri
ng());
cmd.ExecuteNonQuery();
cmd.Dispose();
bindgrid();
}
}
catch (Exception ex)
{
Label1.Visible = true;
Label1.Text = ex.ToString();}}}
56
SECURITY DETAILS:
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.OleDb;
}
void maxnumber()
{
cmd = new OleDbCommand("select isnull(max(aid),0)+1 from
securitydet", con);
rs = cmd.ExecuteReader();
if (rs.Read())
aid.Text = rs[0].ToString();
rs.Close();
cmd.Dispose();
}
protected void Button1_Click(object sender, EventArgs e)
{
try
{
57
cmd.Parameters.AddWithValue("name",TextBox1.Text );
cmd.Parameters.AddWithValue("gender",RadioButtonList1.Selec
tedItem.Text );
cmd.Parameters.AddWithValue("Age",TextBox2.Text );
cmd.Parameters.AddWithValue("rdate",TextBox3.Text );
cmd.Parameters.AddWithValue("sdate",s);
cmd.Parameters.AddWithValue("ndays",TextBox4.Text );
cmd.Parameters.AddWithValue("state",DropDownList1.SelectedI
tem.Text );
cmd.Parameters.AddWithValue("city",
DropDownList2.SelectedItem.Text);
cmd.Parameters.AddWithValue("area", TextBox5.Text);
cmd.Parameters.AddWithValue("pcode",TextBox6.Text );
cmd.Parameters.AddWithValue("pno",TextBox7.Text );
cmd.Parameters.AddWithValue("emilid",TextBox8.Text );
cmd.Parameters.AddWithValue("proof1",RadioButtonList2.Selec
tedItem.Text );
cmd.Parameters.AddWithValue("proof2",RadioButtonList3.Selec
tedItem.Text );
cmd.Parameters.AddWithValue("reason",TextBox9.Text );
cmd.Parameters.AddWithValue("status", "No");
cmd.ExecuteNonQuery();
cmd.Dispose();
Label1.Text = " Security Details Registered... and you can
see your status in your mail or mobile..";
}
catch (Exception ex)
{
Label1.Text = ex.ToString();
}
}
protected void Button2_Click(object sender, EventArgs e)
{
TextBox1.Text = "";
TextBox2.Text = "" ;
// TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
TextBox6.Text = "";
TextBox7.Text = "";
TextBox8.Text = "";
TextBox9.Text = "";
DropDownList1.SelectedIndex = 0;
DropDownList2.SelectedIndex = 0;
DropDownList3.SelectedIndex = 0;
DropDownList4.SelectedIndex = 0;
DropDownList5.SelectedIndex = 0;
RadioButtonList1.SelectedIndex = -1;
RadioButtonList2.SelectedIndex = -1;
RadioButtonList3.SelectedIndex = -1;
aid.Text = "";
maxnumber();
58
}
protected void DropDownList1_SelectedIndexChanged(object sender,
EventArgs e)
{
if (DropDownList1.SelectedItem.Text == "TamilNadu")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Chennai");
DropDownList2.Items.Add("Madurai");
DropDownList2.Items.Add("Trichy");
DropDownList2.Items.Add("Kovai");
DropDownList2.Items.Add("");
}
else if (DropDownList1.SelectedItem.Text == "Kerala")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Palkad");
DropDownList2.Items.Add("Eduki");
DropDownList2.Items.Add("Kolikod");
DropDownList2.Items.Add("Thiruvanandapuram");
}
else if (DropDownList1.SelectedItem.Text == "Andra")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Tirupathi");
DropDownList2.Items.Add("Kundoor");
DropDownList2.Items.Add("Visagapatinam");
DropDownList2.Items.Add("Ellor");
}
else if (DropDownList1.SelectedItem.Text == "Karnadaga")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Bangalore");
DropDownList2.Items.Add("Charmina");
DropDownList2.Items.Add("Belgaum");
DropDownList2.Items.Add("Belari");
} }}
59
SCREEN LAYOUT
HOME
60
ADMIN LOGIN
61
BRANCH DETAILS
62
REGISTRATION FORM
63
BRANCH DETAILS
64
FIR DETAILS
65
COMPLAINT DETAILS:
66
LICENSE DETAILS:
67
SYSTEM TESTING
Unit Testing:
In the unit testing the analyst tests the program making up a system.
The software units in a system are the modules and routines that are
assembled and integrated to perform a specific function. In a large system,
many modules on different levels are needed.
Unit testing can be performed from the bottom up starting with the
smallest and lowest level modules and proceeding one at a time. For each
module in a bottom-up testing, a short program executes the module and
provides the needed data.
68
Integration Testing:
Validation Testing:
Validation testing can be defined in many ways, but a simple
definition is that can be reasonably expected by the customer. After
validation test has been conducted, one of two possible conditions exists.
• The functions or performance characteristics
confirm to specification and are accepted.
• A deviation from specification is uncovered and a
deficiency list is created.
Proposed system under consideration has been tested by using
validation testing and found to be working satisfactorily.
For example, in this project validation testing is performed against
medicine module. This module is tested with the following valid and invalid
inputs for the field medicine id.
69
White Box Testing
White box testing, sometimes called glass-box testing is a test case
design method that uses the control structure of the procedural design to
derive test cases. Using white box testing methods, the software engineer
can derive test cases that
• Guarantee that all independent paths with in a module have been
exercised at least once.
• Exercise all logical decisions on their true and false sides.
• Execute all loops at their boundaries and with in their operational
bounds and
• Exercise internal data structure to assure their validity.
For example in this project white box testing is performed against
patient module. Without entering text if we apply it displays the message
“First add record then save it” else it should be saved.
70
SYSTEM IMPLEMENTATION
Equipment Acquisition
71
According to the above plan, the necessary equipment has to be
acquired to implement the new system. Prime Tech has all the hardware
requirements for installing and maintaining the package.
User Manuals
Once planning has been completed the major effort of the computer
department is to ensure that the user department consists of education and
trained staff, as the system becomes more complex. The success of a system
depends upon how they are operated and used. Thus the quality of training,
the personnel is connected to the success of the system.
For this purpose system and user manuals are prepared. In system
manuals, details about the forms and blocks triggers. Which were used to
develop them, were specified. In user manuals data flow diagrams, charts
and screen formats are given. Also error messages associated were
explained in details. The users were shown the success and they were taught
how to operate the system. Live demonstration and visuals aids were used
to teach them.
72
CONCLUSION
The Developed system is flexible and robust and Police station has
several departments like Law and Order, Women Protection, Cyber crime,
Traffic and control, CBI, etc. Separate module for each dept would be
needed.
made success in matching the system objectives with the goals of the
Since the Navigation is maintained throughout the system, they are much
73
BIBILIOGRAPHY
ASP.NET
www.asp.net/(S(pdfrohu0ajmwt445fanvj2r3))/learn/data-access/
www.w3schools.com/aspnet/default.asp
www.411asp.net/home/sites
www.cristiandarie.ro/asp-net-tutorial/
www.asp.net-tutorials.com/basics/first-website/
SQL SERVER
www.functionx.com/sqlserver/
www.technet.microsoft.com/en-us/library/ms169620.aspx
www.msdn.microsoft.com/en-us/library/ms169620(SQL.90).aspx
www.softwaretrainingtutorials.com/ms-sql-server-2005.php
74