e-cops final j2ee
TRANSCRIPT
SYNOPSIS
“Serving those who protect”
To deliver next generation police and law enforcement reporting tools, and
setting up intelligence platforms that agencies use to tale incoming incident
reports, lessen live employee resources and allow these enforcement
agencies to reallocate resources to much needed community areas.
The E-COPS Pre-Qualification Program offered by Public Safety
Solutions is the first of its kind to offer potential public safety employees a
full range of services that will assist them in obtaining the public safety
position they desire. E-COPS Pre-Qualification Program provides a
complete applicant assistance program that includes in-depth assessment,
personal counseling and coaching throughout the process, complete
background investigation, and matching of your interests and capabilities to
the job and agency that will provide you with the best opportunity for
success. We even mentor you in your quest for future advancement
opportunities.
1
PROJECT DESCRIPTION
This system entitled “E-COPS” has the following major modules as
follows
1. Administration
2. Citizen
3. Police Officers(Constable to DGP)
4. Detectives
5. Magistrate
1) Administrator:
Administrator has the rights to create new Branch and can
able the change the existing details of other branches it also have the task of
appointing new police officers and register the new officers to the requiring
police stations. Administrator can also change the place of the officers from
one place to another place to continue their jobs are known as transfer of
police officers. Reports are also submitted to the administrator like branch
information and the details of the branch. Can also collects the details of the
appointed officers by three sections like APPID wise, DISTRICT wise and
also the details of the TRANSFER OFFICERS.
2
2) Detectives:
Detectives have the rights to verify the complaints from the
different area police stations and officers. Then the other most important one
is to verify the reports. These are the two important tasks of detectives.
3) Police officers:
The police officers main task is to maintain the FIR
DETAILS that is the total information of an accused and it’s the main detail
of a case that has to be submitted to the court. The FIR details must be
updated by the police officers with in the given time and submit to the
higher authorities. It must be transferred to the place where the officer is
handling the case. A police officer cannot commonly arrest a person they
must need a permission from the existing higher authorities that is known as
ARREST WARENT. So the police officers have to request the higher
authority that is called as the REQUEST WARENT after that they have to
refer the FIR. According to that they can reject warrant and view.
Accused data are the very important things to be maintained throw
the police officers to finish a case. A police officer has every right to create a
new DATA. It can be viewed when ever needed by the police officers or the
higher personalities.
Licenses are nothing but the permission from the officers to
contain meetings and securities for the strike is acknowledged throw them.
Only the officers have to give the permission to do all these things.
3
Security protection means when high personalities are in
meeting in public need protection throw some powerful persons like police
officers. So they apply for the security, so they accept or reject.
4) Magistrate:
They are the higher authorities to every problem to be solved or to
process them. He decides whether to accept or to reject the warranty. The
officers have to submit the reports of the warranty to the magistrate incase to
solve it.
5) Citizen:
The citizens have every right to get the help of a police officer. He
gives the complaint form to the police officer to take action to the problem
of the citizen. He must ask permission to do some mass meeting, to keep
loud speaker and browsing centers from the police officers. He cannot do
any thing with out their permission. According to that the officers must help
the citizens.
4
COMPANY PROFILE
Founded in1998, Pacific Blue Technologies Pvt. Ltd is a
consulting and software development firm dedicated to business success
through long-term relationship with our clients and staff. Based in Chennai,
Pacific Blue Technologies has grown from a one-person startup to a
significant corporation of 500 talented professionals having more than 10
branches all over the world.
Pacific Blue Technologies is dynamic, service oriented
enterprise, and is positioned to successfully respond to trends and changes in
the information technology in the industry. Pacific Blue Technology’s client
relationships are based on the highest quality professional technology
consulting and development services. Pacific Blue Technologies enjoys and
excellent reputation as a proven resource for strategic planning, needs,
assessment, client/server programming and interactive multimedia,
internet/intranet development , networking and security services. With
customer in private business and the public sector, takes pride in a history of
projects that significantly enhance and /or improve client’s business
practices and level of service.
Pacific Blue Technologies focus on long term relationship with
staff is reflected through clear communication of expectation, performance
based recognition and advancement, and an environment that supports
employee’s professional development. Pacific Blue Technology’s staff,
comprised almost entirely of full time company employees, is held to
standards of accountability, integrity, creativity and competence. The
dedication, skills, and integrity of Pacific Blue Technology’s staff are key to
the firm’s success.
5
SYSTEM ANALYSIS
Introduction:
System Analysis and Design, is the process of gathering and
interpreting facts, diagnosing problem and using the information to recommend
improvement to the system. Before development of any project can be pursued, a
system study is conducted to learn the details of the current business solution.
Information gathered through the study forms the basis for creating alternative
design strategies. Virtually all organizations are systems that interact with their
environment through receiving input and producing output.
It is a management technique used in designing a new system,
improving an existing system or solving problem. System analysis does not
guarantee that the user will derive an ideal solution to a problem. This depends
solely on the way one design a system to exploit the potential in the method. To
put it in another way, creativity is as much as must pre-design the study and
problem solving process and evaluates every successive step in the system
analysis.
Taking all these factors into account and with the knowledge of the
inter-relationship between the various fields and section and their potential
interactions, they are consider for developing the whole system in and integrated
manner, this project is developed to meet all the criteria in the
The management technique is also helps us in develop and design of
the new system or to improve the existing system.
6
The following Objectives are kept in mind:
Identify the customer’s need.
Evaluate the system concept for feasibility.
Perform economic and technical analysis.
Allocate functions to hardware, software, people,
database and other system elements.
Establish cost and schedule constraints
Create a system definition that forms the foundation
for all subsequent engineering work.
Identification of the need:
In this, there are certain expressions that are being used in the
development of the project. And, it is used to identify our needs or source in
the project.
Defining a problem
Finding the various need for the problem
Formalizing the need
Relating the need
Thus, it is the first step for system development life cycle.
7
1. Initial Investigation
It is one way of handling the project, it is used to know about
the user request and the modification of the system should be done.
The user’s request for this project is as follows:
1. Assigning separate work area for different users.
2. Nature of the work
3. Regular update and delete of record
4. Regular calculation of Net Asset Value
5. Supplying the data with the time required.
The user request identifies the need for change and authorizes the
initial investigation. It may undergo several modifications before it become
a written commitment. Once approved the activities are carried out into
action. The proposal, when approved, it initiates a detailed user-oriented
specification of system performance and analysis of the feasibility of the
evaluating alternative candidate systems with a recommendation of the best
system for the job.
Feasibility Study
The objective of the feasibility study is not only to solve the problem
but also to acquire a sense of its scope. The reason for doing this is to
identify the most beneficial project to the organization.
8
There are three aspects in the feasibility study:
1. Technical Feasibility
2. Financial Feasibility
3. Operating Feasibility
1. Technical Feasibility
The Technical feasibility is the study of the software and how it
is included in the study of our project. Regarding this there are some
technical issues that should be noted they are as follows:
Is the necessary technique available and how it is suggested and
acquired?
Does the proposed equipment have the technical capacity to
hold the data required using the new system?
Will the system provide adequate response that is made by the
requester at an periodic time interval
Can this system be expanded after this project development
Is there a technique guarantees of accuracy, reliability in case of
access of data and security
The technical issues are raised during the feasibility study of
investigating our System. Thus, the technical consideration evaluates the
hardware requirements, software etc. This system uses JSP as front end and
Oracle as back end. They also provide sufficient memory to hold and
9
process the data. As the company is going to install all the process in the
system it is the cheap and efficient technique.
This system technique accepts the entire request made by the
user and the response is done without failure and delay. It is a study about
the resources available and how they are achieved as an acceptable system.
It is
an essential process for analysis and definition of conducting a parallel
assessment of technical feasibility.
Though storage and retrieval of information is enormous, it can be
easily handled by Oracle. As the oracle can be run in any system and the
operation does not differ from one to another. So, this is effective.
2. Economical Feasibility (Financial)
An organization makes good investment on the system. So, they
should be worth full for the amount they spend in the system. Always the
financial benefit and equals or less the cost of the system, but should not
exceed the cost.
The cost of investment is analyzed for the entire system
The cost of Hardware and Software is also noted.
Analyzing the way in which the cost can be reduced
10
Every organization want to reduce there cost but at the same time quality of
the
Service should also be maintained. The system is developed according the
estimation of the cost made by the concern. In this project, the proposed
system will definitely reduce the cost and also the manual work is reduced
and speed of work is also increased.
3. Operational Feasibility
Proposed project will be beneficial only when they are turned into an
information system and to meet the organization operating requirements.
The following issues are considered for the operation:
Does this system provide sufficient support for the user and the
management?
What is the method that should be used in this project?
Have the users been involved in the planning and development of
the projects?
Will the proposed system cause any harm, bad result, loss of
control and accessibility of the system will lost?
Issues that may be a minor problem will sometimes cause major
problem in the operation. It is the measure of how people can able to work
with the system. Finding out the minor issues that may be the initial
problem of the system. It should be a user-friendly environment. All these
11
aspect should be kept in mind and steps should be taken for developing the
project carefully.
Regarding the project, the system is very much supported and friendly
for the user. The methods are defined in an effective manner and proper
conditions are given in other to avoid the harm or loss of data. It is designed
in GUI interface, as working will be easier and flexible for the user.
They are three basic feasibility studies that are done in every project.
12
Existing System:
Now a day E-Cops System solutions are provided by manually. All of
the processes are handled manually. Communication between police stations
is done through telephone or postal service which leads time consuming.
The user has to manage separate documents for different operations. Lot of
Manual works are implemented in Existing System.
The existing system is a manual process and it is very tedious one.
This system has number of limitations and some of them are listed
below.
It does not produce the result of the operation timely
The users have to wait for long time to get the result.
It is a time consuming process
They are very cumbersome
Some times the results may not be accurate
It takes lot of paperwork to maintain the information of
police offices, accuse information. The User has to rely
upon other external sources to get the results
13
Proposed System:
The New System should follows the below operations.
1) Administrator should be able to create/edit a virtual police station (PS)
which represents a real police station as a first time setup.
2) Police station has several departments like Law and Order, Women
Protection, Cyber crime, Traffic and control, CBI, etc. Separate module
for each dept would be needed.
3) When a complaint is made it undergoes various processes like FIR,
Charge Sheet, Property Seizure, court disposal etc all these
activities are performed by a Police Station.
4) Sharing of case details with PS in other states is needed.
5) The magistrate should be able to access the case details and
provide/deny the arrest warrant.
6) Citizens should be able to apply for various licenses like Arms, loud
speaker, Hotel/lodge, browsing centre, mass meetings etc., and the
officer should be able to approve/reject which will be notified to the
applicant via SMS and Mail
14
HARDWARE SPECIFICATION
The above Hardware specifications were used in both Server and
Client machines when developing.
Processor : Pentium 4
Processor Speed : 2.5 GHz
Ram : 512 MB
Hard Disk Drive : 80GB
Floppy Disk Drive : Sony
CD-ROM Drive : Sony
Monitor : 17” inches
Keyboard : TVS Gold
Mouse : Logitech
15
SOFTWARE SPECIFICATION
SERVER:
Operating System : Windows 2000 Server and above versions
Technology Used : J2EE
Database : Sql Server 2005
Database Connectivity : ActiveX Data Object (ADO)
Web Server : Internet Information Server
Browser : Internet Explorer 6.0
CLIENT:
Operating System : Windows 2000 Server
Browser : Internet Explorer 6.0
16
ABOUT SOFTWARE
What is a Web Site?
A Web site is a location on a computer network that makes information
in the form of pages or documents available to visitors reaching the site
with browser software. The computer network can be the worldwide
Internet, or an intranet, a local network linking all the computers in your
office. The information can be published in the form of HTML pages, or
in other document formats. To view the information available on the site,
visitors use browser software programs, such as Microsoft® Internet
Explorer, which translate HTML pages on Web sites to text and graphics
on their monitors.
If you are already sharing documents across your intranet with your co-
workers, why do you need a Web site? To share documents on your
network, co-workers must have the same software program on their
computers as you used to create the document.
In addition, there can be operating-system differences that make it
impossible for a computer with one kind of operating system to retrieve a
document across the network from a computer with a different operating
system. If you convert the document to HTML and publish it on your
17
Web site, then visitors are not required to have the same software
program used to create the document to view its content, or the same
operating system.
Although PWS uses the same technology to host Web sites as the Web
servers at large sites such as www.microsoft.com, PWS has very limited
capacity. PWS is suitable for personal publishing on corporate intranets.
The 10-connection limit of PWS means that it can support no more than
two or three visitors at a time, so it is not suitable for direct Internet
publishing. However, you can develop your site on PWS, including items
such as complex Web applications, and test thoroughly before sending
your site to an ISP for hosting.
PWS can be installed on a computer running either Microsoft®
Windows® 95 or later, or Microsoft® Windows NT® Workstation 4.0 or
later operating system. Microsoft Internet Explorer 4.01 is also required.
PWS can be the solution to a number of information-sharing needs. This
section contains three situations describing how PWS can be used as an
intranet Web server or a development and staging platform. We hope
these scenarios spark your imagination and provide you with ideas for
solutions to your unique needs.
18
These scenarios are included:
Simple Document Solution
Custom Information Exchange Solution
Web Application Testing Solution
19
About Software
J2EE Architecture
The JavaTM 2 SDK, Enterprise Edition (J2EE SDK) is the reference
implementation provided by Sun Microsystems, Inc. The following figure shows the
major elements of the architecture for the J2EE SDK:
FIGURE 1-2 J2EE Architecture
J2EE Server
The J2EE server provides the following services:
Naming and Directory - allows programs to locate services and components
through the Java Naming and Directory InterfaceTM (JNDI) API
Authentication - enforces security by requiring users to log in
HTTP - enables Web browsers to access servlets and JavaServer PagesTM (JSP)
files
EJB - allows clients to invoke methods on enterprise beans
20
Web Container
The Web container is a runtime environment for JSP files and
servlets. Although these Web components are an important part of a J2EE application,
this manual focuses on enterprise beans. For more information on developing Web
components, see the home pages for the JavaServer Pages TM and Java Servlet
technologies.
Java Server Pages
Java Server(TM) Pages is a simple, yet powerful technology for
creating and maintaining dynamic-content web pages. Based on the Java programming
language, Java Server Pages offers proven portability, open standards, and a mature re-
usable component model.
The Java Server Page architecture enables the separation of content
generation from content presentation. This separation not only eases maintenance
headaches, it also allows web team members to focus on their areas of expertise. Now,
web page designers can concentrate on layout, and web application designers on
programming, with minimal concern about impacting each other's work.
The rest of this document gives you the bigger picture:
Portability
Composition
Processing
Access Models
21
Portability
Java Server Pages files can be run on any web server or web-
enabled application server that provides support for them. Dubbed the JSP engine, this
support involves recognition, translation, and management of the JavaServer Page
lifecycle and its interactions with associated components.
The JSP engine for a particular server might be built-in or might be
provided through a 3rd-party add-on. As long as the server on which you plan to execute
the Java Server Pages supports the same specification level as that to which the file was
written, no changes should be necessary as you move your files from server to server.
Note, however, that instructions for the setup and configuration of the files may differ
between files.
To date, there has been no upwards- or backwards-compatibility
between Java Server Page specifications. A Java Server Page file written to the 0.92
specifications can be run only on a server supporting Java Server Page 0.92. The same
file could not run on a server supporting only Java Server Page 1.0 or Java Server Page
0.91.
Composition
It was mentioned earlier that the Java Server Pages architecture can include reusable
Java components. The architecture also allows for the embedding of a scripting language
directly into the Java Server Page file.
The components current supported include Java Beans, and
Servlets. Support for Enterprise Java Beans components will likely be added in a future
release. As the default scripting language, Java Server Pages use the Java programming
language. This means that scripting on the server side can take advantage of the full set of
capabilities that the Java programming language offers. Support for other scripting
languages might become available in the future.
22
Processing
A Java Server Page file is essentially HTML document with JSP scripting or tags. It may
have associated components in the form of .class, .jar, or .ser files--or it may not. The use
of components is not required.
The Java Server Page file has a .jsp extension to identify it to the server as a Java
Server Pages file. Before the page is served, the Java Server Pages syntax is parsed and
processed into a servlet on the server side. The servlet that is generated outputs real
content in straight HTML for responding to the client. Because it is standard HTML, the
dynamically generated response looks no different to the client browser than a static
response.
Access Models
A Java Server Pages file may be accessed in at least two different ways:
1. A client request comes directly into a Java Server Page.
In this scenario, suppose the page accesses reusable Java Bean
components that perform particular well-defined computations like accessing a database.
The results of the Bean’s computations, called result sets are stored with in the Bean as
properties. The page uses such Beans to generate dynamic content and present it back to
the client.
2. A request comes through a servlet.
23
The servlet generates the dynamic content. To handle the response to the client,
the servlet creates a Bean and stores the dynamic content (sometimes called the result set)
in the Bean. The servlet then invokes a Java Server Page that will present the content
along with the Bean containing the generated from the servlet.
There are two APIs to support this model of request processing using Java Server
Pages. One API facilitates passing context between the invoking servlet and the Java
Server Page. The other API lets the invoking servlet specify which Java Server Page to
use.
In both of the above cases, the page could also contain any valid Java code. The
Java Server Pages architecture encourages separation of content from presentation--it
does not mandate it.
How to Choose Between Access Models
With at least two access models, the question naturally arises "When does it make
sense to have a Java Server Page as the front-end to a servlet, as the back-end to a servlet,
or use only the servlet? Here are some possible guidelines:
If a graphical interface (GUI) is necessary to collect the request data--use a Java
Server Pages file.
If the request and request parameters are otherwise available to the servlet, but the
results of the servlet processing requires a graphical interface to present them--
use a Java Server Pages file.
24
If presentation layout is minimal (will not require very many println lines in your
servlet code) and you don't need to make that presentation logic available to a
customer or your web page designer, then a Servlet might suffice.
Enterprise Beans
Enterprise beans are server components written in the Java programming
language. Enterprise beans contain the business logic for your application. For example, a
check book client might invoke the debit and credit methods of an account enterprise
bean.
There are two types of enterprise beans: session beans and entity beans.
Session Beans
A session bean represents a client in the J2EE server. A client communicates with
the J2EE server by invoking the methods that belong to an enterprise bean. For example,
an online shopping client might invoke the enter Order method of its session bean to
create an order. A session bean converses with the client, and can be thought of as an
extension of the client. Each session bean can have only one client. When the client
terminates, its corresponding session bean also terminates. Therefore, a session bean is
transient, or non-persistent.
Entity Beans
An entity bean represents a business object in a persistent storage mechanism
such as a database. For example, an entity bean could represent a customer, which might
be stored as a row in the customer table of a relational database. An entity bean's
information does not have to be stored in a relational database. It could be stored in an
object database, a legacy application, a file, or some other storage mechanism. The type
of storage mechanism depends on the particular implementation of EJB technology.
The reference implementation (J2EE SDK) uses a relational database. See the
section "Database Access" for more information.
25
The persistence of an entity bean can be managed by either the entity bean itself, or by
the EJB container. Bean-managed persistence requires you to write the data access code
in the Bean. For example, a customer entity bean would include the SQL commands to
access a relational database via JDBC. Container-managed persistence means that the
EJB container handles the data access calls automatically.
Comparing Session and Entity Beans
Although both session and entity beans run in an EJB container, they are quite different.
The following table contrast session and entity beans:
TABLE 1-1 Differences Between Session and Entity Beans
Session Bean Entity Bean
Purpose Performs a task for a client. Represents a business entity object that
exists in persistent storage.
Shared
Access May have one client. May be shared by multiple clients.
PersistenceNot persistent. When the client
terminates its session bean is no
longer available.
Persistent. Even when the EJB
container terminates, the entity state
remains in a database.
The flexibility of the EJB architecture allows you to build applications in a variety
of ways. The following illustration shows how you might create an online shopping
application with both session and entity beans. An HTML form displayed in a Web
browser accesses a servlet in a Web container. The servlet is the client of a shopping
session bean. When the HTML forms needs to find a product or enter an order, it
26
instructs the servlet to call the appropriate business methods in the session bean. The
session bean is the client of the order, product, and customer entity beans. Because Entity
beans are persistent, their state is stored in the database.
FIGURE 1-3 Using Session and Entity Beans
Java BeansTM Components and Enterprise Beans
JavaBeans components and enterprise beans are not the same. Although both
components are written in the Java programming language, they are not
interchangeable. JavaBeans components define a convention for making a Java class
27
instance customizable by design tools, allowing the tools to link these customized
objects via events. Enterprise beans implement multi-user, transactional services.
Programming Restrictions for Enterprise Beans
Enterprise beans make use of the services provided by the EJB container, such as
life-cycle management. To avoid conflicts with these services, enterprise beans are
restricted from performing certain operations:
Managing or synchronizing threads
Accessing files or directories with the java.io package
Using AWT functionality to display information or to accept information from a
keyboard
Listening on a socket, accepting connections on a socket, or using a socket for
multicast
Setting a socket factory used by Server Socket, Socket, or the stream handler
factory used by the URL class
Loading a native library
Database Access
The Enterprise Java Beans specification does not require an implementation to
support a particular type of database. Therefore, the databases supported by different
J2EE implementations may vary. See the Release Notes for a list of the databases
currently supported by the J2EE SDK.
28
Both session and entity beans can access a database. The type of enterprise bean
you choose depends on your application. You might want to include SQL calls in a
session bean under the following circumstances:
The application is relatively simple.
The data returned by the SQL call will not be used by multiple clients.
The data does not represent a business entity.
You should probably access a database from an entity bean if any of the following
conditions are true:
More than one client will use the data returned by the database call.
The data represents a business entity.
You want to hide the relational model from the session bean.
SQL SERVER 2005
INTRODUCTION
Microsoft SQL Server is a client/server relational database system. What exactly
is a client/server relational database system? The best way to explain it is to define it in
two parts, the client /server part, and the relational database system part.
Client/server, also referred to as distributed computing, means that all of the
data processing of a program does not occur on a single computer, as it often does on
29
desktop, mini-or mainframe-based computer systems. Instead, different parts of the SQL
Server application run on two or more computers at the same time. Multiple SQL Server
database, along with thousands of clients, can all be designed to work together, scaling to
virtually any size.
Major Features Of SQL Server
SQL Server offers database administrators and SQL developers virtually every
tool they need to create and manage a complete enterprise –wide management system.
This section takes a look at some of the most important features of SQL Server7.0. For a
complete description of all the features, you will have to read the entire book.
SQL Server Fundamentals
When people think of SQL Server, they often have different pictures in their
heads of what SQL Server really is. Some people think of it as a database. Others think if
it is as a physically server. And others think of the BackOffice product sold by Microsoft.
SQL Server Management Tools
SQL Server includes a wide variety of client _ based administrative tools that
can be used to manage SQL Server. During the installation process, you can load as few
or as many of the Management tools as you think you need. SQL Server provider you
with these options:
SQL Server Enterprise Manager:
If you want to remotely manage SQL Server, then installing the SQL Server
Enterprise Manager onto your workstation is necessary. This program allows the DBA to
perform virtually any SQL Server administrative task.
SQL Server Query Analyzer
This tool is used to manually send transact-SQL statements and stored
procedures to the SQL Server database engine. You will probably want to load this on
most, if not all remote management workstations. This is a tool you may want to load
onto SQL Server developer’s desktops, as it gives developers direct access to SQL Server
so they can run interactive Transact-SQL statements and SQL scripts.
SQL Server profiler
30
This tool is used to monitor and record SQL Server database activity between SQL
Server and clients. Only load this tool on workstations that perform this task.
Database
A database is similar to a data file in that it is a storage place for data. Like a data
file, a database does not present information directly to a user; the user runs an
application that accesses data from the database and presents it to the user in an
understandable format.
When working with data files, an application must be coded to work with the
specific structure of each data file. In contrast, a database contains a catalog that
applications use to determine how data is organized. Generic database applications
can use the catalog to present users with data from different databases dynamically,
without being tied to a specific data format.
A database typically has two main parts: first, the files holding the physical
database and second, the database management system (DBMS) software that
applications use to access data. The DBMS is responsible for enforcing the database
structure, including:
• Maintaining relationships between data in the database.
• Ensuring that data is stored correctly and that the rules defining data
relationships are not violated.
• Recovering all data to a point of known consistency in case of system
failures.
Relational Database
Although there are different ways to organize data in a database, relational
databases are one of the most effective. Relational database systems are an
application of mathematical set theory to the problem of effectively organizing data.
31
In a relational database, data is collected into tables (called relations in relational
theory).
A table represents some class of objects that are important to an organization. For
example, a company may have a database with a table for employees, another table
for customers, and another for stores. Each table is built of columns and rows (called
attributes and topples in relational theory). Each column represents some attribute of
the object represented by the table. For example, an Employee table would typically
have columns for attributes such as first name, last name, employee ID, department,
pay grade, and job title. Each row represents an instance of the object represented by
the table. For example, one row in the Employee table represents the employee who
has employee ID 12345.
When organizing data into tables, you can usually find many different ways to
define tables. Relational database theory defines a process called normalization,
which ensures that the set of tables you define will organize your data effectively.
Scalable
SQL Server 2000 supports having a wide range of users access it at the same
time. An instance of SQL Server 2000 includes the files that make up a set of
databases and a copy of the DBMS software. Applications running on separate
computers use a SQL Server 2000 communications component to transmit commands
over a network to the SQL Server 2000 instance. When an application connects to an
instance of SQL Server 2000, it can reference any of the databases in that instance
that the user is authorized to access. The communication component also allows
communication between an instance of SQL Server 2000 and an application running
on the same computer. You can run multiple instances of SQL Server 2000 on a
single computer.
32
Although SQL Server 2000 is designed to work as the data storage engine for
thousands of concurrent users who connect over a network, it is also capable of
working as a stand-alone database directly on the same computer as an application.
The scalability and ease-of-use features of SQL Server 2000 allow it to work
efficiently on a single computer without consuming too many resources or requiring
administrative work by the stand-alone user. The same features allow SQL Server
2000 to dynamically acquire the resources required to support thousands of users,
while minimizing database administration and tuning. The SQL Server 2000
relational database engine dynamically tunes itself to acquire or free the appropriate
computer resources required to support a varying load of users accessing an instance
of SQL Server 2000 at any specific time. The SQL Server 2000 relational database
engine has features to prevent the logical problems that occur if a user tries to read or
modify data currently used by others.
Structured Query Language
To work with data in a database, you have to use a set of commands and
statements (language) defined by the DBMS software. Several different languages
can be used with relational databases; the most common is SQL. The American
National Standards Institute (ANSI) and the International Standards Organization
(ISO) define software standards, including standards for the SQL language. SQL
Server 2000 supports the Entry Level of SQL-92, the SQL standard published by
ANSI and ISO in 1992. The dialect of SQL supported by Microsoft SQL Server is
called Transact-SQL (T-SQL). T-SQL is the primary language used by Microsoft
SQL Server applications.
Extensible Markup Language
XML is the emerging Internet standard for data. XML is a set of tags that can be
used to define the structure of a hypertext document. XML documents can be easily
processed by the Hypertext Markup Language, which is the most important language
for displaying Web pages.
33
Although most SQL statements return their results in a relational, or tabular,
result set, the SQL Server 2000 database component supports a FOR XML clause that
returns results as an XML document. SQL Server 2000 also supports XPath queries
from Internet and intranet applications. XML documents can be added to SQL Server
databases, and the OPENXML clause can be used to expose data from an XML
document as a relational result set.
Overview of the SQL Server Tools
Microsoft® SQL Server™ 2000 includes many graphical and command prompt
utilities that allow users, programmers, and administrators to:
• Administer and configure SQL Server.
• Determine the catalog information in a copy of SQL Server.
• Design and test queries for retrieving data.
• Copy, import, export, and transform data.
• Provide diagnostic information.
• Start and stop SQL Server.
In addition to these utilities, SQL Server contains several wizards to walk
administrators and programmers through the steps needed to perform more complex
administrative tasks.
INTRODUCTION TO VBSCRIPT
VBScript brings professional programming techniques to
HTML web documents. With VBScript, we can create documents and
34
applications that previously could only have been made available as a
desktop program written with something like Visual Basic. It gives us the
ability to interact with and manipulate HTML documents directly from
the browser. With VBScript, we can even interact with and manipulate
the browser it, sending it instructions from our VBScript program, and
pulling in its variables for our own use.
Above all, VBScript brings to us true client-side processing, so
let's briefly look at some of the main uses of VBScript:
Reference and manipulate document objects
Reference and manipulate the browser
Reference the contents of another loaded document or documents
Create a document "on the fly" from the browser
Store, reference, and manipulate data input by the user
Store, reference, and manipulate data downloaded from the server
Perform calculations on data
Display messages to the user
Access cookies easily
Reference and manipulate a wide range of "add-on" components,
both ActiveX controls and Java applets
Display two-dimensional HTML
35
VBScript not only supports the standard document objects, it also
allows us to attach events to these objects. To put this another way, when
the user or another part of our program interacts in some way with a
particular object, like a command button, the browser can automatically
run a particular routine within our program. For example, if the user
clicks on a certain button or moves away from a text box, an "event" is
fired that causes a particular routine to execute
DATA FLOW DIAGRAM:
36
Login Authenticate
Home
Valid
In Valid
Admin
Detectives
Police Officer
Magistrate
Citizen
A
D
P
M
C
38
A
Police Station
Officer Appointment
Reports
Add New Branch
Modify Branch
Branchdetail
New Officer Appointmen
t Branch
Transferring Officer
PoliceInfo
TransferInfo
If Appoint is No
If Appoint is yes
View Branch Information
View Officer Information
View Transferring
Officer Information
Brachdetail
PoliceInfo
TransferInfo
39
C
Complaint Form Complaint
Registered
ComplaintsId, Name, Date
Crime type
License Apply License Apply
Security Apply
Verify the complaint
Security Form
Detectives D
License
Security
Complaints
Reports
40
Fir ApplyFir Details P Fir Data
Arrest warrant Insert Arrest warrant
License Accept or Reject
License Report
License
Magistrate Accept or Reject
Arrest warrant
Arrest warrant
M
DATABASE STRUCTUREBrowsing Centre
TableName:Bcentre
TableName:Branchdetails
Field Name Data Type SizeAid numeric 5Aname varchar 30Ltype varchar 30State varchar 30City varchar 30Address varchar 50Ipaddress varchar 40Licenseno numeric 5Status varchar 20
FieldName DataType SizeBranchid varchar 10Branchname varchar 50State varchar 50City varchar 40area1 varchar 30area2 varchar 30area3 varchar 30Pincode varchar 10Phoneno varchar 10
41
Complaints
TableName:Complaints
CriminalInformation
TableName:Criminalinfo
FieldName DataType SizeCompid(primary key)
numeric 5
Comdate datetime 8Name varchar 20Gender varchar 20State varchar 20City varchar 30area1 varchar 40Pincode varchar 10Phoneno varchar 10Emailed varchar 30Crimetype varchar 40Crimedate datetime 8Reason varchar 60Branched varchar 10Status varchar 20
FieldName DataType SizeId numeric 5Cname varchar 20State varchar 20City varchar 20Address varchar 20Age numeric 5Phoneno numeric 9ident1 varchar 20ident2 varchar 20Date datetime 8Caseno varchar 20Casedetails varchar 40Photo varchar 60
42
FirDetails
TableName:Firdetails
LicenseDetails
TableName:Licensedet
FiledName DataType SizeComid numeric 5Branchid varchar 20Name varchar 20State varchar 20City varchar 20Area varchar 20Crimetype varchar 40Crimedate datetime 8Cname varchar 20Cstate varchar 20Ccity varchar 20Address varchar 30Age numeric 5Phoneno numeric 9Status varchar 50
FieldName DataType SizeName varchar 20Gender varchar 10Age numeric 5Regdate datetime 8Licensetype varchar 20State varchar 30City varchar 30Area varchar 40Pincode varchar 10Phoneno varchar 10Emailed varchar 50proof1 varchar 50proof2 varchar 50Status varchar 10Aid(Primary Key) numeric 9
43
LoudSpeakerInformation
TableName:Loudspeakerinfo
MeetingInformation
TableName:Meetinginfo
FieldName DataType SizeAid(Primary Key) numeric 5Aname varchar 20Ltype varchar 20Address varchar 50Reason varchar 100Noofspeaker numeric 5Ldate datetime 8Noofdays numeric 5Licenseno numeric 9Status varchar 10
FieldName DataType SizeAid(Primary Key) numeric 5Aname varchar 20Ltype varchar 20Mtype varchar 20Address varchar 50Fromplace varchar 40Toplace varchar 40Reason varchar 100Noofper numeric 5Pmeet varchar 10Leader varchar 40Lnumber numeric 9Status varchar 50Mdate datetime 8Noofdays numeric 5
44
PoliceInformation
TableName:Policeinfo
RequestTable
TableName :Requesttable
FieldName DataType SizeComid numeric 5Branchid varchar 10Rdate datetime 8Adate datetime 8Status varchar 20
FieldName DataType SizeRegno(Primary Key) numeric 5Pname varchar 30Address varchar 30Age numeric 5Dob datetime 8Qualification varchar 20Applieddist varchar 30Department varchar 20Posting varchar 30Aid numeric 5District varchar 30State varchar 30Branchid varchar 20Doa datetime 8Appointed varchar 10
45
SecurityDetails
TableName:Securitydet
TransferInformation
TableName:Transferinfo
FieldName DataType SizeAid numeric 5Pname varchar 20Address varchar 40Fstate varchar 50Fdistrict varchar 30Fdept varchar 20Fbranch varchar 40Posting varchar 30Appointdt datetime 8Dot datetime 8Tostate varchar 40Todistrict varchar 30Tobranch varchar 30Todept varchar 30Toposting varchar 30
FieldName DataType SizeName varchar 20Gender varchar 10Age numeric 5Regdate datetime 8Secdate datetime 8Noofdays numeric 5State varchar 30City varchar 30Area varchar 40Pincode varchar 10Phoneno varchar 10Emailed varchar 50proof1 varchar 50proof2 varchar 50Reason varchar 60Status varchar 10
46
CODE DESIGN
HOME.aspx.cs
using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;
public partial class _Default : System.Web.UI.Page{ protected void Page_Load(object sender, EventArgs e) {
} protected void Login1_Authenticate(object sender, AuthenticateEventArgs e) { if (Login1.UserName == "Admin" && Login1.Password == "Admin") Response.Redirect("adminhome.aspx"); else if (Login1.UserName == "Police" && Login1.Password == "Police") Response.Redirect("policehome.aspx"); else if (Login1.UserName == "Citizen" && Login1.Password == "Citizen") Response.Redirect("citizenhome.aspx"); else if (Login1.UserName == "Detectives" && Login1.Password == "Detectives") Response.Redirect("detectivehome.aspx"); else if (Login1.UserName == "Magistrate" && Login1.Password == "Magistrate") Response.Redirect("magistratehome.aspx"); }}
47
POLICE REGISTRATION :
using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;using System.Data.OleDb;
public partial class policeregistrationform : System.Web.UI.Page{ OleDbConnection con; OleDbCommand cmd; OleDbDataReader rs; protected void Page_Load(object sender, EventArgs e) { con = (OleDbConnection)Application.Get("conn"); if (!Page.IsPostBack) { DropDownList1.Items.Insert(0, "Select"); DropDownList3.Items.Insert(0, "Select"); for (int i = 1; i <= 31; i++) DropDownList1.Items.Add(i.ToString()); for (int i = 1980; i <= 2010; i++) DropDownList3.Items.Add(i.ToString()); shownumber();
}
} void shownumber() { cmd = new OleDbCommand("select isnull(max(regno),0)+1 from policeinfo", con); rs = cmd.ExecuteReader(); if(rs.Read ()) TextBox1.Text =rs[0].ToString (); rs.Close (); cmd.Dispose ();
} protected void Button1_Click(object sender, EventArgs e) { try { string s = DropDownList1.SelectedItem.Text + "-" + DropDownList2.SelectedItem.Text + "-" + DropDownList3.SelectedItem.Text;
48
cmd = new OleDbCommand("insert into policeinfo(regno,pname,address,age,dob,qualification,applieddist,department,posting,appointed) values(?,?,?,?,?,?,?,?,?,?)", con); cmd.Parameters.AddWithValue("rno", TextBox1.Text); cmd.Parameters.AddWithValue("name", TextBox2.Text); cmd.Parameters.AddWithValue("address", TextBox3.Text); cmd.Parameters.AddWithValue("age", TextBox4.Text); cmd.Parameters.AddWithValue("dob", s); cmd.Parameters.AddWithValue("qualification", TextBox5.Text); cmd.Parameters.AddWithValue("applieddist", DropDownList5.SelectedItem.Text); cmd.Parameters.AddWithValue("department", dept.SelectedItem.Text); cmd.Parameters.AddWithValue("posting", DropDownList4.SelectedItem.Text); cmd.Parameters.AddWithValue("appointed", "No"); cmd.ExecuteNonQuery(); cmd.Dispose(); Label1.Text = "Your Information Registered...."; } catch (Exception ex) { Label1.Text = ex.ToString(); }
} protected void Button2_Click(object sender, EventArgs e) { TextBox1.Text = ""; TextBox2.Text = ""; TextBox3.Text = ""; TextBox4.Text =""; TextBox5.Text = ""; DropDownList1.SelectedIndex = 0; DropDownList2.SelectedIndex = 0; DropDownList3.SelectedIndex = 0; DropDownList4.SelectedIndex = 0; DropDownList5.SelectedIndex = 0; shownumber(); }}
49
COMPLAINTS DETAILS
using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;using System.Data.OleDb;
public partial class complaintdetails : System.Web.UI.Page{ OleDbConnection con; OleDbCommand cmd; OleDbDataReader rs; string bid; protected void Page_Load(object sender, EventArgs e) { Label1.Visible = false; TextBox2.Text = DateTime.Now.ToShortDateString(); con = (OleDbConnection)Application.Get("conn"); if (!Page.IsPostBack) { DropDownList4.Items.Insert(0, "Select"); DropDownList6.Items.Insert(0, "Select"); binddata(); for (int i = 1; i <= 31; i++) DropDownList4.Items.Add(i.ToString()); for (int i = 2007; i <= 2020; i++) DropDownList6.Items.Add(i.ToString()); } } void binddata() { cmd = new OleDbCommand("select isnull(max(compid),0)+1 from complaints", con); rs = cmd.ExecuteReader(); if (rs.Read()) TextBox1.Text = rs[0].ToString(); } protected void Button1_Click(object sender, EventArgs e) { try { Label1.Visible = true ; string s = DropDownList4.SelectedItem.Text + "-" + DropDownList5.SelectedItem.Text + "-" + DropDownList6.SelectedItem.Text; cmd = new OleDbCommand("select branchid from branchdetails where (area1=? or area2=? or area3=?) and city=?", con);
50
cmd.Parameters.AddWithValue("area1", TextBox4.Text); cmd.Parameters.AddWithValue("area2", TextBox4.Text); cmd.Parameters.AddWithValue("area3", TextBox4.Text); cmd.Parameters.AddWithValue("city", DropDownList2.SelectedItem .Text); rs = cmd.ExecuteReader(); if (rs.Read()) bid = rs[0].ToString(); rs.Close(); cmd.Dispose();
cmd = new OleDbCommand("insert into complaints values(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?)", con); cmd.Parameters.AddWithValue("id", TextBox1.Text); cmd.Parameters.AddWithValue("date", TextBox2.Text); cmd.Parameters.AddWithValue("name", TextBox3.Text); cmd.Parameters.AddWithValue("gender", RadioButtonList1.SelectedItem.Text); cmd.Parameters.AddWithValue("state", DropDownList1.SelectedItem.Value); cmd.Parameters.AddWithValue("city", DropDownList2.SelectedItem.Value); cmd.Parameters.AddWithValue("area", TextBox4.Text); cmd.Parameters.AddWithValue("pincode", TextBox5.Text); cmd.Parameters.AddWithValue("emailid", TextBox6.Text); cmd.Parameters.AddWithValue("crimetype", TextBox7.Text); cmd.Parameters.AddWithValue("type", DropDownList3.SelectedItem.Value); cmd.Parameters.AddWithValue("date",s ); cmd.Parameters.AddWithValue("reason", TextBox8.Text); cmd.Parameters.AddWithValue("branchid", bid); cmd.Parameters.AddWithValue("status", "No"); cmd.ExecuteNonQuery(); Label1.Text = "You Complaints has been Registered..and you can see your status in your mail or mobile.."; } catch (Exception ex) { Label1.Visible = true; Label1.Text = ex.Message; } } protected void Button2_Click(object sender, EventArgs e) { TextBox1.Text = ""; TextBox2.Text = ""; TextBox3.Text = ""; TextBox4.Text = ""; TextBox5.Text = ""; TextBox6.Text = ""; TextBox7.Text = ""; TextBox8.Text = ""; TextBox8.Text = ""; DropDownList1.SelectedIndex = 0; DropDownList2.SelectedIndex = 0;
51
DropDownList3.SelectedIndex = 0; DropDownList4.SelectedIndex = 0; DropDownList5.SelectedIndex = 0; DropDownList6.SelectedIndex = 0; RadioButtonList1.SelectedIndex = 0; binddata();
} protected void DropDownList1_SelectedIndexChanged(object sender, EventArgs e) { if (DropDownList1.SelectedItem.Text == "TamilNadu") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Chennai"); DropDownList2.Items.Add("Madurai"); DropDownList2.Items.Add("Trichy"); DropDownList2.Items.Add("Kovai"); DropDownList2.Items.Add("");
} else if (DropDownList1.SelectedItem.Text == "Kerala") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Palkad"); DropDownList2.Items.Add("Eduki"); DropDownList2.Items.Add("Kolikod"); DropDownList2.Items.Add("Thiruvanandapuram");
} else if (DropDownList1.SelectedItem.Text == "Andra") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Tirupathi"); DropDownList2.Items.Add("Kundoor"); DropDownList2.Items.Add("Visagapatinam"); DropDownList2.Items.Add("Ellor");
} else if (DropDownList1.SelectedItem.Text == "Karnadaga") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Bangalore"); DropDownList2.Items.Add("Charmina"); DropDownList2.Items.Add("Belgaum"); DropDownList2.Items.Add("Belari");
} }}
52
REQUEST FOR ARREST WARRANT:
using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;using System.Data.OleDb;
public partial class requestforarrestwarrent : System.Web.UI.Page{ OleDbConnection con; OleDbDataAdapter adp; DataSet ds; OleDbCommand cmd; OleDbDataReader rs; protected void Page_Load(object sender, EventArgs e) { con = (OleDbConnection)Application.Get("conn"); Label1.Visible = false; } void bindgrid() { try { cmd = new OleDbCommand("select comid,name,state,city,area,crimetype,crimedate,cname,cstate,ccity,address,age,phoneno,status from firdetails where state=? and city=? and branchid=? and status is null ", con); cmd.Parameters.AddWithValue("state", DropDownList1.SelectedItem.Text); cmd.Parameters.AddWithValue("city", DropDownList2.SelectedItem.Text); cmd.Parameters.AddWithValue("branchid", DropDownList3.SelectedItem.Text); adp = new OleDbDataAdapter(cmd); ds = new DataSet(); adp.Fill(ds, "table1"); GridView1.DataSource = ds.Tables[0]; GridView1.DataBind(); cmd.Dispose(); } catch (Exception ex) { Label1.Visible = true; Label1.Text = ex.ToString(); } }
53
protected void GridView1_PageIndexChanging(object sender, GridViewPageEventArgs e) { GridView1.PageIndex = e.NewPageIndex; bindgrid(); } protected void DropDownList1_SelectedIndexChanged(object sender, EventArgs e) { if (DropDownList1.SelectedItem.Text == "TamilNadu") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Chennai"); DropDownList2.Items.Add("Madurai"); DropDownList2.Items.Add("Trichy"); DropDownList2.Items.Add("Kovai");
} else if (DropDownList1.SelectedItem.Text == "Kerala") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Palkad"); DropDownList2.Items.Add("Eduki"); DropDownList2.Items.Add("Kolikod"); DropDownList2.Items.Add("Thiruvanandapuram");
} else if (DropDownList1.SelectedItem.Text == "Andra") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Tirupathi"); DropDownList2.Items.Add("Kundoor"); DropDownList2.Items.Add("Visagapatinam"); DropDownList2.Items.Add("Ellor");
} else if (DropDownList1.SelectedItem.Text == "Karnadaga") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Bangalore"); DropDownList2.Items.Add("Charmina"); DropDownList2.Items.Add("Belgaum"); DropDownList2.Items.Add("Belari");
} } protected void DropDownList2_SelectedIndexChanged(object sender, EventArgs e) { cmd = new OleDbCommand("select distinct(branchid) from firdetails where state=? and city=?", con);
54
cmd.Parameters.AddWithValue("state", DropDownList1.SelectedItem.Text); cmd.Parameters.AddWithValue("city", DropDownList2.SelectedItem.Text); rs = cmd.ExecuteReader(); DropDownList3.DataSource = rs; DropDownList3.DataTextField = "branchid"; DropDownList3.DataBind(); rs.Close(); cmd.Dispose(); DropDownList3.Items.Insert(0, "SelectId");
} protected void DropDownList3_SelectedIndexChanged(object sender, EventArgs e) { bindgrid();
}
protected void GridView1_RowCommand(object sender, GridViewCommandEventArgs e) {
try { if (e.CommandName == "select") { LinkButton l1 = (LinkButton)e.CommandSource; cmd = new OleDbCommand("update firdetails set status='Request' where comid=?", con); cmd.Parameters.AddWithValue("comid", l1.Text); cmd.ExecuteNonQuery(); cmd.Dispose(); cmd = new OleDbCommand("insert into requesttable(comid,branchid,rdate) values(?,?,?)", con); cmd.Parameters.AddWithValue("comid", l1.Text); cmd.Parameters.AddWithValue("branchid", DropDownList3.SelectedItem.Text); cmd.Parameters.AddWithValue("rdate",DateTime.Now.ToString()); cmd.ExecuteNonQuery(); cmd.Dispose();
bindgrid(); } } catch (Exception ex) { Label1.Visible = true; Label1.Text = ex.ToString();}}}
55
SECURITY DETAILS:
using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;using System.Data.OleDb;
public partial class secutirydetails : System.Web.UI.Page{ OleDbConnection con; OleDbCommand cmd; OleDbDataReader rs; protected void Page_Load(object sender, EventArgs e) { con = (OleDbConnection)Application.Get("conn"); TextBox3.Text = DateTime.Now.ToShortDateString(); if (!Page.IsPostBack) { maxnumber(); DropDownList3.Items.Insert(0, "Select"); DropDownList5.Items.Insert(0, "Select"); for (int i = 1; i <= 31; i++) DropDownList3.Items.Add(i.ToString()); for (int i = 2009; i <= 2020; i++) DropDownList5.Items.Add(i.ToString()); }
} void maxnumber() { cmd = new OleDbCommand("select isnull(max(aid),0)+1 from securitydet", con); rs = cmd.ExecuteReader(); if (rs.Read()) aid.Text = rs[0].ToString(); rs.Close(); cmd.Dispose(); } protected void Button1_Click(object sender, EventArgs e) { try { string s = DropDownList3.SelectedItem.Text + "-" + DropDownList4.SelectedItem.Text + "-" + DropDownList5.SelectedItem.Text; cmd = new OleDbCommand("insert into securitydet values(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?)", con); cmd.Parameters.AddWithValue("id", aid.Text);
56
cmd.Parameters.AddWithValue("name",TextBox1.Text ); cmd.Parameters.AddWithValue("gender",RadioButtonList1.SelectedItem.Text ); cmd.Parameters.AddWithValue("Age",TextBox2.Text ); cmd.Parameters.AddWithValue("rdate",TextBox3.Text ); cmd.Parameters.AddWithValue("sdate",s); cmd.Parameters.AddWithValue("ndays",TextBox4.Text ); cmd.Parameters.AddWithValue("state",DropDownList1.SelectedItem.Text ); cmd.Parameters.AddWithValue("city", DropDownList2.SelectedItem.Text); cmd.Parameters.AddWithValue("area", TextBox5.Text); cmd.Parameters.AddWithValue("pcode",TextBox6.Text ); cmd.Parameters.AddWithValue("pno",TextBox7.Text ); cmd.Parameters.AddWithValue("emilid",TextBox8.Text ); cmd.Parameters.AddWithValue("proof1",RadioButtonList2.SelectedItem.Text ); cmd.Parameters.AddWithValue("proof2",RadioButtonList3.SelectedItem.Text ); cmd.Parameters.AddWithValue("reason",TextBox9.Text ); cmd.Parameters.AddWithValue("status", "No"); cmd.ExecuteNonQuery(); cmd.Dispose(); Label1.Text = " Security Details Registered... and you can see your status in your mail or mobile.."; } catch (Exception ex) { Label1.Text = ex.ToString(); }
} protected void Button2_Click(object sender, EventArgs e) { TextBox1.Text = ""; TextBox2.Text = "" ; // TextBox3.Text = ""; TextBox4.Text = ""; TextBox5.Text = ""; TextBox6.Text = ""; TextBox7.Text = ""; TextBox8.Text = ""; TextBox9.Text = ""; DropDownList1.SelectedIndex = 0; DropDownList2.SelectedIndex = 0; DropDownList3.SelectedIndex = 0; DropDownList4.SelectedIndex = 0; DropDownList5.SelectedIndex = 0; RadioButtonList1.SelectedIndex = -1; RadioButtonList2.SelectedIndex = -1;
57
RadioButtonList3.SelectedIndex = -1; aid.Text = ""; maxnumber();
} protected void DropDownList1_SelectedIndexChanged(object sender, EventArgs e) { if (DropDownList1.SelectedItem.Text == "TamilNadu") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Chennai"); DropDownList2.Items.Add("Madurai"); DropDownList2.Items.Add("Trichy"); DropDownList2.Items.Add("Kovai"); DropDownList2.Items.Add("");
} else if (DropDownList1.SelectedItem.Text == "Kerala") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Palkad"); DropDownList2.Items.Add("Eduki"); DropDownList2.Items.Add("Kolikod"); DropDownList2.Items.Add("Thiruvanandapuram");
} else if (DropDownList1.SelectedItem.Text == "Andra") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Tirupathi"); DropDownList2.Items.Add("Kundoor"); DropDownList2.Items.Add("Visagapatinam"); DropDownList2.Items.Add("Ellor");
} else if (DropDownList1.SelectedItem.Text == "Karnadaga") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Bangalore"); DropDownList2.Items.Add("Charmina"); DropDownList2.Items.Add("Belgaum"); DropDownList2.Items.Add("Belari");
} }}
58
SYSTEM TESTING
System Testing is an important stage in any system development
life cycle. Testing is a process of executing a program with the intention of
finding errors. The importance of software testing and its implications with
respect to software quality cannot be overemphasized. Software testing is a
critical element of software quality assurance and represents the ultimate
review of specification, design and coding. A good test case is one that has a
high probability of finding a yet undiscovered error.
Testing is the set of activities that can be planned in advance and
conducted systematically. Different test conditions should be thoroughly
checked and the bugs detected should be fixed. The testing strategies formed
by the user are performed to prove that the software is free and clear from
errors. To do this, there are many ways of testing the system’s reliability,
completeness and maintainability.
Unit Testing:
In the unit testing the analyst tests the program making up a system.
The software units in a system are the modules and routines that are
assembled and integrated to perform a specific function. In a large system,
many modules on different levels are needed.
Unit testing can be performed from the bottom up starting with the
smallest and lowest level modules and proceeding one at a time. For each
module in a bottom-up testing, a short program executes the module and
provides the needed data.
67
Integration Testing:
Integration testing is a systematic technique for constructing the
program structure while conducting test to uncover errors associate with
interfacing. Objectives are used to take unit test modules and built program
structure that has been directed by design.
The integration testing is performed for this Hospital Management
System when all the modules where to make it a complete system. After
integration the project works successfully.
Validation Testing:
Validation testing can be defined in many ways, but a simple
definition is that can be reasonably expected by the customer. After
validation test has been conducted, one of two possible conditions exists.
The functions or performance characteristics
confirm to specification and are accepted.
A deviation from specification is uncovered and a
deficiency list is created.
Proposed system under consideration has been tested by using
validation testing and found to be working satisfactorily.
For example, in this project validation testing is performed against
medicine module. This module is tested with the following valid and invalid
inputs for the field medicine id.
68
White Box TestingWhite box testing, sometimes called glass-box testing is a test case
design method that uses the control structure of the procedural design to
derive test cases. Using white box testing methods, the software engineer
can derive test cases that
Guarantee that all independent paths with in a module have been
exercised at least once.
Exercise all logical decisions on their true and false sides.
Execute all loops at their boundaries and with in their operational
bounds and
Exercise internal data structure to assure their validity.
For example in this project white box testing is performed against
patient module. Without entering text if we apply it displays the message
“First add record then save it” else it should be saved.
Black Box Testing This method treats the coded module as a black box. The module runs
with inputs that are likely to cause errors. Then the output is checked to see
if any error occurred. This method cannot be used to test all errors, because
some errors may depend on the code or algorithm used to implement the
module.
69
SYSTEM IMPLEMENTATION
Implementation is the state in the system where the theoretical design is
turned into a working system. The most crucial stage in achieving a new
successful system and in giving confidence on the new system for the users
that will work efficiently and effectively. The system can be implemented
only after thorough testing in done and if found to work according to the
specification.
If involves careful planning, investigation of the current system and
its constraints on implementation, design of methods to achieve the
changeover, an evaluation of changeover methods apart from planning. Two
major tasks of preparing the implementation are education, training of the
users and testing the systems. System analysis and design efforts will be
more for complex systems beings implemented. Based on policies of
individuals’ organization an implementation coordinating committee has
been appointed.
The implementation process begins with preparing a plan for the
implementation system. According to this plan, the other activities are to be
carried out. In this plan, discussion has been made regarding the equipment,
resources and how to test the activities. Thus a clear plan is preparing for
the activities.
Equipment Acquisition
70
According to the above plan, the necessary equipment has to be
acquired to implement the new system. Prime Tech has all the hardware
requirements for installing and maintaining the package.
Program code preparationOne of the most important development activities is the code of
programming. The system DFD’s and other channels are converted to
modular programs. They have to be complied, tested and debugged.
User Manuals
Once planning has been completed the major effort of the computer
department is to ensure that the user department consists of education and
trained staff, as the system becomes more complex. The success of a system
depends upon how they are operated and used. Thus the quality of training,
the personnel is connected to the success of the system.
For this purpose system and user manuals are prepared. In system
manuals, details about the forms and blocks triggers. Which were used to
develop them, were specified. In user manuals data flow diagrams, charts
and screen formats are given. Also error messages associated were
explained in details. The users were shown the success and they were taught
how to operate the system. Live demonstration and visuals aids were used
to teach them.
71
CONCLUSION
The Developed system is flexible and robust and Police station has
several departments like Law and Order, Women Protection, Cyber crime,
Traffic and control, CBI, etc. Separate module for each dept would be
needed.
In performing analysis, design, coding and Implementation we have
made success in matching the system objectives with the goals of the
organization. The newly developed system consumes less processing time.
Since the Navigation is maintained throughout the system, they are much
user-friendlier and serve the organization purpose.
72
BIBILIOGRAPHY
Site server 3.0 - Macro Tabini
The Interdev Handbook - Maso
Developing ASP Components - Shelly, Bowers
VBScript Interactive Course - Simon
System Analysis and Design - Elias M.Awad
System Analysis and Design - Lee
ASP.NET
www.asp.net/(S(pdfrohu0ajmwt445fanvj2r3))/learn/data-access/
www.w3schools.com/aspnet/default.asp
www.411asp.net/home/sites
www.cristiandarie.ro/asp-net-tutorial/
www.asp.net-tutorials.com/basics/first-website/
SQL SERVER
www.functionx.com/sqlserver/
www.technet.microsoft.com/en-us/library/ms169620.aspx
www.msdn.microsoft.com/en-us/library/ms169620(SQL.90).aspx
www.softwaretrainingtutorials.com/ms-sql-server-2005.php
73