Vous êtes sur la page 1sur 22

CHAPTER 1

LIST OF FIGURES
DATA FLOW DIAGRAM 1. LEVEL-0 2. LEVEL-1(administrator) 3. LEVEL-2(administrator) 4. LEVEL-1(user) 5. LEVEL-2(user)

LIST OF TABLES
1. Registration Table 2. Login Table 3. Complaint Table 4. Crime_repot Table 5. Complain_status Table 6. FIR Table 7. Prisoner_registration Table 8. Ciminal_registration Table 9. Admin_table

CHAPTER-2 INTRODUCTION
Starting the project we should fully know about the meaning of project. There are seven letters in the word PROJECT each character has its own technical meaning.
Planning:-This deal with the idea at thinking and which are required for the project. Resource:-The money problem will be solved and resources from which collected. Operating:- The procedure from which the getting job is prepared in a systematic way is known as operation. Joint effort:- This is directly proper to a operation output is made of several person working sincerely is known as JOINT EFFORT. Engineering:- A well-educated engineer can do this work in a better way to find out better result. Hence the project is as engineering function. Co-operation:- To make the project successfully, it is necessary for its success and completion of project. Technique:- It must as it gives a better shape. It is not possible to complete the project without technique. The project is a system that gives the systematic way of planning and working. OR It represents a temporary task , in a scientific manner carried out by group of engineers to achieve a goal.

e-cops
2.1 Overview This Synopsys documents the process of designing, building and testing a software system to be used for marketing Crime Management System. The piece of software, and therefore the project, is known as e-cops. The cops means to receive or experience something unwelcome. The project titled as e-cops is a web based application. This software provides facility for reporting online crimes, complaints, missing persons, show most wanted person details mailing as well as chatting. Any Number of clients can connect to the server. Each user first makes their login to sever to show their availability. The server can be any Web Server. An SMTP Server must be maintained for temporary storage of emails and chat jar files for enable the chatting facilities; The software produced by this project exceeded expectations and would be suitable to be used in industry. 2.2 Scope of investigation The aim of this project is to design, build and test a Crime file Management System. This will be a vastly complex software development project which will take approximately 5 months to complete. The project will be split up into stages and documented thoroughly throughout. Project management is a key factor of this task to ensure the strict deadlines are adhered to. It is also of paramount importance that tried and tested practices and techniques from the field are adhered to to ensure that no common development project mistakes are reproduced. 2.3 Existing System In the existing system only we can see the details of particular information about The police stations in our state, the existing system has more workload for the authorized person, but in the case of Proposed System, the user can registered in our site and send the crime report and complaint about a particular city or person.

2.4 Drawbacks of Existing System More man power. Time consuming. Consumes large volume of pare work. Needs manual calculations. No direct role for the higher officials. Damage of machines due to lack of attention. To avoid all these limitations and make the working more accurately the system needs to be computerized.

CHAPTER-3 PROPOSED SYSTEM Modules and Sub-module Requirements


For any web project development, very first and essentials requirement is the availability of the suitable software and hardware. The software project, e-cops requires following software and hardware for its successful implementation:3.1 Functional Requirement: Typical functional requirements are: Authentication External Interfaces Reporting Requirements 3.2 Non Functional Requirement: Accessibility Availability (service level agreement) Effectiveness Maintainability Operability Quality Response time Robustness

3.3 Software Requirements (Minimum supported Requirement) Microsoft Windows 2000 or Windows XP as the Operating System. Jdk 1.6 Dreamviewer My Sql Net Beans I.D.E. Here, Dreamviewer is used to create the front end and middle tier business logic while My SQL Server is used as backend. Internet Information Server will work as a web application server. These are the basic requirements for working on this project. Higher the configuration of the system, higher would be the output. 3.4 Hardware Requerment 512 MB of Physical Memory (RAM) 80 GB of Secondary Memory (HDD) CD Writer for backup

CHAPTER -4 SYSTEM ANALYSIS


Systems analysis is the study of sets of interacting entities, including computer systems analysis. This field is closely related to requirements analysis or operations research. It is also "an explicit formal inquiry carried out to help someone (referred to as the decision maker) identify a better course of action and make a better decision than he might otherwise have made. System analysis is used in every field where there is a work of developing something. Analysis can also be defined as a series of components that perform organic function together. There are a number of different approaches to system analysis. When a computer-based information system is developed, systems analysis (according to the Waterfall model) would constitute the following steps:

The development of a feasibility study, involving determining whether a project is economically, socially, technologically and organizationally feasible.

Conducting fact-finding measures, designed to ascertain the requirements of the system's end-users. These typically span interviews, questionnaires, or visual observations of work on the existing system.

Gauging how the end-users would operate the system (in terms of general experience in using computer hardware or software), what the system would be used for etc.

There are basic two types approches to system analysis named as: Structured Analysis Object Oriented Analysis

1. Strutured Analysis:Structured Analysis became popular in the 1980s and is still used by many. The analysis consists of interpreting the system concept (or real world) into data and control terminology, that is into data flow diagrams. The flow of data and control from bubble to data store to bubble can be very hard to track and the number of bubbles can get to be extremely large. One approach is to first define events from the outside world that require the system to react, then assign a bubble to that event, bubbles that need to interact are then connected until the system is defined. This can be rather overwhelming and so the bubbles are usually grouped into higher level bubbles. Data Dictionaries are needed to describe the data and command flows and a process specification is needed to capture the transaction/transformation information. SA and SD were accompanied by notational methods including structure charts, data flow diagrams and data model diagrams, of which there were many variations. 2. Object Oriented Analysis :The Object Oriented Design converts the Object Oriented Analysis model into a design model. This serves an outline for software construction. Object Oriented Design supports following object oriented concepts such as Abstraction, Information Hiding, Functional Independence, Modularity. Design is the initial step in moving towards from the problem domain to the solution domain. A detailed design include specification of all the classes with its attributes, detailed interface. The purpose of design is to specify a working solution that can be easily translated into a programming language code.

CHAPTER -5 FEASIBILITY STUDY


This system is purposed to worthwhile. Our system satisfied all type of feasibility study. 5.1 ECONOMIC FEASIBILITY:Economic analysis is the most frequently used technique for evaluating the effectiveness of a proposed system. More commonly known as cost / benefit analysis; in this procedure we determine the benefits and savings that are expected from a proposed system and compare them with costs. We found the benefits outweighs the costs; we take a decision to design and implement the new proposed system. This project of medical facilities is developed according to economical plans & budget. 5.2 TECHNICAL FEASIBILITY:This is concerned with specifying equipment and software that will successfully satisfy the user requirement. The technical needs of the system may vary considerably, but might include: The facility to produce outputs as suggested Doctors list & Medicines in a given time. Response time under certain conditions. Facility to provide the best diaganosis of any injury or unfitness. After examining technical feasibility, we give more importance to the configuration of the system than the actual make of hardware.

10

5.3 BEHAVIORAL FEASIBILITY:People are inherently resistant to change, and computers have been known to facilitate change. An estimate should be made of how strong a reaction the user staff is likely to have toward the development of a computerized system. In such www era it is more behaviorally feasible to diagnosis the medical problems to the users. 5.4 TIME FEASIBILITY:Time feasibility is a determination of whether a proposed project can be implemented fully within a stipulated time frame. If a project takes too much time it is likely to be rejected. This project is a good time feasible.

11

CHAPTER -6 SYSTEM DESIGN


6.1 DATA FLOW DIAGRAM
LEVEL 0 DATA FLOW DIAGRAM

12

LEVEL 1 DATA FLOW DIAGRAM

13

14

15

16

17

DATABASE DESIGN
DATABASE TABLES Login Table
Field name Data type Constraint/Description

username Password

Varchar Varchar

Primary key Null

Registation Table Field name Name username Data type Varchar Varchar Constraint/Description Primary Key Null Null Null Nul Null Null Null Null Null Null

Secretquestion Varchar Answer Address Pin Phone Email Village District State Varchar Varchar In t In t Varchar Varchar Date Varchar

18

Complaint Table Field name User_id Details_suspect Description Date Typeofcrime Data type Varchar Varchar Varchar Date varchar Constraint/Description Primary Key

Crime_reprot Tabe Field name Userid Address_info Details_suspect Description Date Data type varchar Varchar Varchar Varchar Date Constraint/Description Primary key

Complain_status Table Field name Complaint_no Viewstatus Data type Varchar Varchar Constraint/Description NULL Null

19

Admin_registration Field name Username Question Answer Name Designation Oficialaddress Phone Data type Varchar Varchar Varchar Varchar Varchar Varchar In t Constraint/Description Null

Residential_address Varchar Pincode Phone Email In t In t Varchar `

Pisoner_registration Table Field name Prisoner_no Charge_sheet_no Nickname Typeofcrime Family_members


Height

Data type Varchar Varchar Varchar Varchar Varchar


Varchar

Constraint/Description

Primary key

20

Weight Colour

Varchar Int

Ciminal_registration Field name Criminal_no Name Nickname Age Occupation TypeOfCrime Address Data type Varchar Varchar Varchar Varchar Varchar Varchar Varchar Constraint/Description Primary Key

FIR Table Field name District Date Time Data type Varchar date Varchar Constraint/Description

Typeofoinformation Varchar PlaceOfOccurance Foreign_local Act Section Passport_no Varchar Varchar Varchar Varchar Varchar

21

BIBLIOGRAPHY/ REFERENCES

BOOKS

[1] Java-2 Complete Reference [2] Java Servlet Programming [3] [4] Pure JavaScript HTML complete

- by Patrick Haughton - by O'Reilly - by Jason Gilliam, R.Allen Wyke - BPB publications. - by Apress publication

[10] Java Server Programming REFERENCES

(1) http://www.roseindia.net/programming-tutorial/JavaScript/JavaScript-Tutorial (2) http://www.w3schools.com/tags/tag_form.asp (3) http://mad-ip.eu/files/reports/JavaFX.pdf (4) http://www.microsoft.com (5) http://en.wikipedia.org/wiki/Java_(programming_language)#Servlet

22

Vous aimerez peut-être aussi