Académique Documents
Professionnel Documents
Culture Documents
LIST OF FIGURES
DATA FLOW DIAGRAM 1. LEVEL-0 2. LEVEL-1(administrator) 3. LEVEL-2(administrator) 4. LEVEL-1(user) 5. LEVEL-2(user)
LIST OF TABLES
1. Registration Table 2. Login Table 3. Complaint Table 4. Crime_repot Table 5. Complain_status Table 6. FIR Table 7. Prisoner_registration Table 8. Ciminal_registration Table 9. Admin_table
CHAPTER-2 INTRODUCTION
Starting the project we should fully know about the meaning of project. There are seven letters in the word PROJECT each character has its own technical meaning.
Planning:-This deal with the idea at thinking and which are required for the project. Resource:-The money problem will be solved and resources from which collected. Operating:- The procedure from which the getting job is prepared in a systematic way is known as operation. Joint effort:- This is directly proper to a operation output is made of several person working sincerely is known as JOINT EFFORT. Engineering:- A well-educated engineer can do this work in a better way to find out better result. Hence the project is as engineering function. Co-operation:- To make the project successfully, it is necessary for its success and completion of project. Technique:- It must as it gives a better shape. It is not possible to complete the project without technique. The project is a system that gives the systematic way of planning and working. OR It represents a temporary task , in a scientific manner carried out by group of engineers to achieve a goal.
e-cops
2.1 Overview This Synopsys documents the process of designing, building and testing a software system to be used for marketing Crime Management System. The piece of software, and therefore the project, is known as e-cops. The cops means to receive or experience something unwelcome. The project titled as e-cops is a web based application. This software provides facility for reporting online crimes, complaints, missing persons, show most wanted person details mailing as well as chatting. Any Number of clients can connect to the server. Each user first makes their login to sever to show their availability. The server can be any Web Server. An SMTP Server must be maintained for temporary storage of emails and chat jar files for enable the chatting facilities; The software produced by this project exceeded expectations and would be suitable to be used in industry. 2.2 Scope of investigation The aim of this project is to design, build and test a Crime file Management System. This will be a vastly complex software development project which will take approximately 5 months to complete. The project will be split up into stages and documented thoroughly throughout. Project management is a key factor of this task to ensure the strict deadlines are adhered to. It is also of paramount importance that tried and tested practices and techniques from the field are adhered to to ensure that no common development project mistakes are reproduced. 2.3 Existing System In the existing system only we can see the details of particular information about The police stations in our state, the existing system has more workload for the authorized person, but in the case of Proposed System, the user can registered in our site and send the crime report and complaint about a particular city or person.
2.4 Drawbacks of Existing System More man power. Time consuming. Consumes large volume of pare work. Needs manual calculations. No direct role for the higher officials. Damage of machines due to lack of attention. To avoid all these limitations and make the working more accurately the system needs to be computerized.
3.3 Software Requirements (Minimum supported Requirement) Microsoft Windows 2000 or Windows XP as the Operating System. Jdk 1.6 Dreamviewer My Sql Net Beans I.D.E. Here, Dreamviewer is used to create the front end and middle tier business logic while My SQL Server is used as backend. Internet Information Server will work as a web application server. These are the basic requirements for working on this project. Higher the configuration of the system, higher would be the output. 3.4 Hardware Requerment 512 MB of Physical Memory (RAM) 80 GB of Secondary Memory (HDD) CD Writer for backup
The development of a feasibility study, involving determining whether a project is economically, socially, technologically and organizationally feasible.
Conducting fact-finding measures, designed to ascertain the requirements of the system's end-users. These typically span interviews, questionnaires, or visual observations of work on the existing system.
Gauging how the end-users would operate the system (in terms of general experience in using computer hardware or software), what the system would be used for etc.
There are basic two types approches to system analysis named as: Structured Analysis Object Oriented Analysis
1. Strutured Analysis:Structured Analysis became popular in the 1980s and is still used by many. The analysis consists of interpreting the system concept (or real world) into data and control terminology, that is into data flow diagrams. The flow of data and control from bubble to data store to bubble can be very hard to track and the number of bubbles can get to be extremely large. One approach is to first define events from the outside world that require the system to react, then assign a bubble to that event, bubbles that need to interact are then connected until the system is defined. This can be rather overwhelming and so the bubbles are usually grouped into higher level bubbles. Data Dictionaries are needed to describe the data and command flows and a process specification is needed to capture the transaction/transformation information. SA and SD were accompanied by notational methods including structure charts, data flow diagrams and data model diagrams, of which there were many variations. 2. Object Oriented Analysis :The Object Oriented Design converts the Object Oriented Analysis model into a design model. This serves an outline for software construction. Object Oriented Design supports following object oriented concepts such as Abstraction, Information Hiding, Functional Independence, Modularity. Design is the initial step in moving towards from the problem domain to the solution domain. A detailed design include specification of all the classes with its attributes, detailed interface. The purpose of design is to specify a working solution that can be easily translated into a programming language code.
10
5.3 BEHAVIORAL FEASIBILITY:People are inherently resistant to change, and computers have been known to facilitate change. An estimate should be made of how strong a reaction the user staff is likely to have toward the development of a computerized system. In such www era it is more behaviorally feasible to diagnosis the medical problems to the users. 5.4 TIME FEASIBILITY:Time feasibility is a determination of whether a proposed project can be implemented fully within a stipulated time frame. If a project takes too much time it is likely to be rejected. This project is a good time feasible.
11
12
13
14
15
16
17
DATABASE DESIGN
DATABASE TABLES Login Table
Field name Data type Constraint/Description
username Password
Varchar Varchar
Registation Table Field name Name username Data type Varchar Varchar Constraint/Description Primary Key Null Null Null Nul Null Null Null Null Null Null
Secretquestion Varchar Answer Address Pin Phone Email Village District State Varchar Varchar In t In t Varchar Varchar Date Varchar
18
Complaint Table Field name User_id Details_suspect Description Date Typeofcrime Data type Varchar Varchar Varchar Date varchar Constraint/Description Primary Key
Crime_reprot Tabe Field name Userid Address_info Details_suspect Description Date Data type varchar Varchar Varchar Varchar Date Constraint/Description Primary key
Complain_status Table Field name Complaint_no Viewstatus Data type Varchar Varchar Constraint/Description NULL Null
19
Admin_registration Field name Username Question Answer Name Designation Oficialaddress Phone Data type Varchar Varchar Varchar Varchar Varchar Varchar In t Constraint/Description Null
Constraint/Description
Primary key
20
Weight Colour
Varchar Int
Ciminal_registration Field name Criminal_no Name Nickname Age Occupation TypeOfCrime Address Data type Varchar Varchar Varchar Varchar Varchar Varchar Varchar Constraint/Description Primary Key
FIR Table Field name District Date Time Data type Varchar date Varchar Constraint/Description
Typeofoinformation Varchar PlaceOfOccurance Foreign_local Act Section Passport_no Varchar Varchar Varchar Varchar Varchar
21
BIBLIOGRAPHY/ REFERENCES
BOOKS
[1] Java-2 Complete Reference [2] Java Servlet Programming [3] [4] Pure JavaScript HTML complete
- by Patrick Haughton - by O'Reilly - by Jason Gilliam, R.Allen Wyke - BPB publications. - by Apress publication
(1) http://www.roseindia.net/programming-tutorial/JavaScript/JavaScript-Tutorial (2) http://www.w3schools.com/tags/tag_form.asp (3) http://mad-ip.eu/files/reports/JavaFX.pdf (4) http://www.microsoft.com (5) http://en.wikipedia.org/wiki/Java_(programming_language)#Servlet
22