e-cops final j2ee

103
SYNOPSIS “Serving those who protect” To deliver next generation police and law enforcement reporting tools, and setting up intelligence platforms that agencies use to tale incoming incident reports, lessen live employee resources and allow these enforcement agencies to reallocate resources to much needed community areas. 1

Upload: kumararguru

Post on 10-Apr-2015

1.553 views

Category:

Documents


1 download

TRANSCRIPT

SYNOPSIS

“Serving those who protect”

To deliver next generation police and law enforcement reporting tools, and

setting up intelligence platforms that agencies use to tale incoming incident

reports, lessen live employee resources and allow these enforcement

agencies to reallocate resources to much needed community areas.

The E-COPS Pre-Qualification Program offered by Public Safety

Solutions is the first of its kind to offer potential public safety employees a

full range of services that will assist them in obtaining the public safety

position they desire. E-COPS Pre-Qualification Program provides a

complete applicant assistance program that includes in-depth assessment,

personal counseling and coaching throughout the process, complete

background investigation, and matching of your interests and capabilities to

the job and agency that will provide you with the best opportunity for

success. We even mentor you in your quest for future advancement

opportunities.

1

PROJECT DESCRIPTION

This system entitled “E-COPS” has the following major modules as

follows

1. Administration

2. Citizen

3. Police Officers(Constable to DGP)

4. Detectives

5. Magistrate

1) Administrator:

Administrator has the rights to create new Branch and can

able the change the existing details of other branches it also have the task of

appointing new police officers and register the new officers to the requiring

police stations. Administrator can also change the place of the officers from

one place to another place to continue their jobs are known as transfer of

police officers. Reports are also submitted to the administrator like branch

information and the details of the branch. Can also collects the details of the

appointed officers by three sections like APPID wise, DISTRICT wise and

also the details of the TRANSFER OFFICERS.

2

2) Detectives:

Detectives have the rights to verify the complaints from the

different area police stations and officers. Then the other most important one

is to verify the reports. These are the two important tasks of detectives.

3) Police officers:

The police officers main task is to maintain the FIR

DETAILS that is the total information of an accused and it’s the main detail

of a case that has to be submitted to the court. The FIR details must be

updated by the police officers with in the given time and submit to the

higher authorities. It must be transferred to the place where the officer is

handling the case. A police officer cannot commonly arrest a person they

must need a permission from the existing higher authorities that is known as

ARREST WARENT. So the police officers have to request the higher

authority that is called as the REQUEST WARENT after that they have to

refer the FIR. According to that they can reject warrant and view.

Accused data are the very important things to be maintained throw

the police officers to finish a case. A police officer has every right to create a

new DATA. It can be viewed when ever needed by the police officers or the

higher personalities.

Licenses are nothing but the permission from the officers to

contain meetings and securities for the strike is acknowledged throw them.

Only the officers have to give the permission to do all these things.

3

Security protection means when high personalities are in

meeting in public need protection throw some powerful persons like police

officers. So they apply for the security, so they accept or reject.

4) Magistrate:

They are the higher authorities to every problem to be solved or to

process them. He decides whether to accept or to reject the warranty. The

officers have to submit the reports of the warranty to the magistrate incase to

solve it.

5) Citizen:

The citizens have every right to get the help of a police officer. He

gives the complaint form to the police officer to take action to the problem

of the citizen. He must ask permission to do some mass meeting, to keep

loud speaker and browsing centers from the police officers. He cannot do

any thing with out their permission. According to that the officers must help

the citizens.

4

COMPANY PROFILE

Founded in1998, Pacific Blue Technologies Pvt. Ltd is a

consulting and software development firm dedicated to business success

through long-term relationship with our clients and staff. Based in Chennai,

Pacific Blue Technologies has grown from a one-person startup to a

significant corporation of 500 talented professionals having more than 10

branches all over the world.

Pacific Blue Technologies is dynamic, service oriented

enterprise, and is positioned to successfully respond to trends and changes in

the information technology in the industry. Pacific Blue Technology’s client

relationships are based on the highest quality professional technology

consulting and development services. Pacific Blue Technologies enjoys and

excellent reputation as a proven resource for strategic planning, needs,

assessment, client/server programming and interactive multimedia,

internet/intranet development , networking and security services. With

customer in private business and the public sector, takes pride in a history of

projects that significantly enhance and /or improve client’s business

practices and level of service.

Pacific Blue Technologies focus on long term relationship with

staff is reflected through clear communication of expectation, performance

based recognition and advancement, and an environment that supports

employee’s professional development. Pacific Blue Technology’s staff,

comprised almost entirely of full time company employees, is held to

standards of accountability, integrity, creativity and competence. The

dedication, skills, and integrity of Pacific Blue Technology’s staff are key to

the firm’s success.

5

SYSTEM ANALYSIS

Introduction:

System Analysis and Design, is the process of gathering and

interpreting facts, diagnosing problem and using the information to recommend

improvement to the system. Before development of any project can be pursued, a

system study is conducted to learn the details of the current business solution.

Information gathered through the study forms the basis for creating alternative

design strategies. Virtually all organizations are systems that interact with their

environment through receiving input and producing output.

It is a management technique used in designing a new system,

improving an existing system or solving problem. System analysis does not

guarantee that the user will derive an ideal solution to a problem. This depends

solely on the way one design a system to exploit the potential in the method. To

put it in another way, creativity is as much as must pre-design the study and

problem solving process and evaluates every successive step in the system

analysis.

Taking all these factors into account and with the knowledge of the

inter-relationship between the various fields and section and their potential

interactions, they are consider for developing the whole system in and integrated

manner, this project is developed to meet all the criteria in the

The management technique is also helps us in develop and design of

the new system or to improve the existing system.

6

The following Objectives are kept in mind:

Identify the customer’s need.

Evaluate the system concept for feasibility.

Perform economic and technical analysis.

Allocate functions to hardware, software, people,

database and other system elements.

Establish cost and schedule constraints

Create a system definition that forms the foundation

for all subsequent engineering work.

Identification of the need:

In this, there are certain expressions that are being used in the

development of the project. And, it is used to identify our needs or source in

the project.

Defining a problem

Finding the various need for the problem

Formalizing the need

Relating the need

Thus, it is the first step for system development life cycle.

7

1. Initial Investigation

It is one way of handling the project, it is used to know about

the user request and the modification of the system should be done.

The user’s request for this project is as follows:

1. Assigning separate work area for different users.

2. Nature of the work

3. Regular update and delete of record

4. Regular calculation of Net Asset Value

5. Supplying the data with the time required.

The user request identifies the need for change and authorizes the

initial investigation. It may undergo several modifications before it become

a written commitment. Once approved the activities are carried out into

action. The proposal, when approved, it initiates a detailed user-oriented

specification of system performance and analysis of the feasibility of the

evaluating alternative candidate systems with a recommendation of the best

system for the job.

Feasibility Study

The objective of the feasibility study is not only to solve the problem

but also to acquire a sense of its scope. The reason for doing this is to

identify the most beneficial project to the organization.

8

There are three aspects in the feasibility study:

1. Technical Feasibility

2. Financial Feasibility

3. Operating Feasibility

1. Technical Feasibility

The Technical feasibility is the study of the software and how it

is included in the study of our project. Regarding this there are some

technical issues that should be noted they are as follows:

Is the necessary technique available and how it is suggested and

acquired?

Does the proposed equipment have the technical capacity to

hold the data required using the new system?

Will the system provide adequate response that is made by the

requester at an periodic time interval

Can this system be expanded after this project development

Is there a technique guarantees of accuracy, reliability in case of

access of data and security

The technical issues are raised during the feasibility study of

investigating our System. Thus, the technical consideration evaluates the

hardware requirements, software etc. This system uses JSP as front end and

Oracle as back end. They also provide sufficient memory to hold and

9

process the data. As the company is going to install all the process in the

system it is the cheap and efficient technique.

This system technique accepts the entire request made by the

user and the response is done without failure and delay. It is a study about

the resources available and how they are achieved as an acceptable system.

It is

an essential process for analysis and definition of conducting a parallel

assessment of technical feasibility.

Though storage and retrieval of information is enormous, it can be

easily handled by Oracle. As the oracle can be run in any system and the

operation does not differ from one to another. So, this is effective.

2. Economical Feasibility (Financial)

An organization makes good investment on the system. So, they

should be worth full for the amount they spend in the system. Always the

financial benefit and equals or less the cost of the system, but should not

exceed the cost.

The cost of investment is analyzed for the entire system

The cost of Hardware and Software is also noted.

Analyzing the way in which the cost can be reduced

10

Every organization want to reduce there cost but at the same time quality of

the

Service should also be maintained. The system is developed according the

estimation of the cost made by the concern. In this project, the proposed

system will definitely reduce the cost and also the manual work is reduced

and speed of work is also increased.

3. Operational Feasibility

Proposed project will be beneficial only when they are turned into an

information system and to meet the organization operating requirements.

The following issues are considered for the operation:

Does this system provide sufficient support for the user and the

management?

What is the method that should be used in this project?

Have the users been involved in the planning and development of

the projects?

Will the proposed system cause any harm, bad result, loss of

control and accessibility of the system will lost?

Issues that may be a minor problem will sometimes cause major

problem in the operation. It is the measure of how people can able to work

with the system. Finding out the minor issues that may be the initial

problem of the system. It should be a user-friendly environment. All these

11

aspect should be kept in mind and steps should be taken for developing the

project carefully.

Regarding the project, the system is very much supported and friendly

for the user. The methods are defined in an effective manner and proper

conditions are given in other to avoid the harm or loss of data. It is designed

in GUI interface, as working will be easier and flexible for the user.

They are three basic feasibility studies that are done in every project.

12

Existing System:

Now a day E-Cops System solutions are provided by manually. All of

the processes are handled manually. Communication between police stations

is done through telephone or postal service which leads time consuming.

The user has to manage separate documents for different operations. Lot of

Manual works are implemented in Existing System.

The existing system is a manual process and it is very tedious one.

This system has number of limitations and some of them are listed

below.

It does not produce the result of the operation timely

The users have to wait for long time to get the result.

It is a time consuming process

They are very cumbersome

Some times the results may not be accurate

It takes lot of paperwork to maintain the information of

police offices, accuse information. The User has to rely

upon other external sources to get the results

13

Proposed System:

The New System should follows the below operations.

1) Administrator should be able to create/edit a virtual police station (PS)

which represents a real police station as a first time setup.

2) Police station has several departments like Law and Order, Women

Protection, Cyber crime, Traffic and control, CBI, etc. Separate module

for each dept would be needed.

3) When a complaint is made it undergoes various processes like FIR,

Charge Sheet, Property Seizure, court disposal etc all these

activities are performed by a Police Station.

4) Sharing of case details with PS in other states is needed.

5) The magistrate should be able to access the case details and

provide/deny the arrest warrant.

6) Citizens should be able to apply for various licenses like Arms, loud

speaker, Hotel/lodge, browsing centre, mass meetings etc., and the

officer should be able to approve/reject which will be notified to the

applicant via SMS and Mail

14

HARDWARE SPECIFICATION

The above Hardware specifications were used in both Server and

Client machines when developing.

Processor : Pentium 4

Processor Speed : 2.5 GHz

Ram : 512 MB

Hard Disk Drive : 80GB

Floppy Disk Drive : Sony

CD-ROM Drive : Sony

Monitor : 17” inches

Keyboard : TVS Gold

Mouse : Logitech

15

SOFTWARE SPECIFICATION

SERVER:

Operating System : Windows 2000 Server and above versions

Technology Used : J2EE

Database : Sql Server 2005

Database Connectivity : ActiveX Data Object (ADO)

Web Server : Internet Information Server

Browser : Internet Explorer 6.0

CLIENT:

Operating System : Windows 2000 Server

Browser : Internet Explorer 6.0

16

ABOUT SOFTWARE

What is a Web Site?

A Web site is a location on a computer network that makes information

in the form of pages or documents available to visitors reaching the site

with browser software. The computer network can be the worldwide

Internet, or an intranet, a local network linking all the computers in your

office. The information can be published in the form of HTML pages, or

in other document formats. To view the information available on the site,

visitors use browser software programs, such as Microsoft® Internet

Explorer, which translate HTML pages on Web sites to text and graphics

on their monitors.

If you are already sharing documents across your intranet with your co-

workers, why do you need a Web site? To share documents on your

network, co-workers must have the same software program on their

computers as you used to create the document.

In addition, there can be operating-system differences that make it

impossible for a computer with one kind of operating system to retrieve a

document across the network from a computer with a different operating

system. If you convert the document to HTML and publish it on your

17

Web site, then visitors are not required to have the same software

program used to create the document to view its content, or the same

operating system.

Although PWS uses the same technology to host Web sites as the Web

servers at large sites such as www.microsoft.com, PWS has very limited

capacity. PWS is suitable for personal publishing on corporate intranets.

The 10-connection limit of PWS means that it can support no more than

two or three visitors at a time, so it is not suitable for direct Internet

publishing. However, you can develop your site on PWS, including items

such as complex Web applications, and test thoroughly before sending

your site to an ISP for hosting.

PWS can be installed on a computer running either Microsoft®

Windows® 95 or later, or Microsoft® Windows NT® Workstation 4.0 or

later operating system. Microsoft Internet Explorer 4.01 is also required.

PWS can be the solution to a number of information-sharing needs. This

section contains three situations describing how PWS can be used as an

intranet Web server or a development and staging platform. We hope

these scenarios spark your imagination and provide you with ideas for

solutions to your unique needs.

18

These scenarios are included:

Simple Document Solution

Custom Information Exchange Solution

Web Application Testing Solution

19

About Software

J2EE Architecture

The JavaTM 2 SDK, Enterprise Edition (J2EE SDK) is the reference

implementation provided by Sun Microsystems, Inc. The following figure shows the

major elements of the architecture for the J2EE SDK:

FIGURE 1-2 J2EE Architecture

J2EE Server

The J2EE server provides the following services:

Naming and Directory - allows programs to locate services and components

through the Java Naming and Directory InterfaceTM (JNDI) API

Authentication - enforces security by requiring users to log in

HTTP - enables Web browsers to access servlets and JavaServer PagesTM (JSP)

files

EJB - allows clients to invoke methods on enterprise beans

20

Web Container

The Web container is a runtime environment for JSP files and

servlets. Although these Web components are an important part of a J2EE application,

this manual focuses on enterprise beans. For more information on developing Web

components, see the home pages for the JavaServer Pages TM and Java Servlet

technologies.

Java Server Pages

Java Server(TM) Pages is a simple, yet powerful technology for

creating and maintaining dynamic-content web pages. Based on the Java programming

language, Java Server Pages offers proven portability, open standards, and a mature re-

usable component model.

The Java Server Page architecture enables the separation of content

generation from content presentation. This separation not only eases maintenance

headaches, it also allows web team members to focus on their areas of expertise. Now,

web page designers can concentrate on layout, and web application designers on

programming, with minimal concern about impacting each other's work.

The rest of this document gives you the bigger picture:

Portability

Composition

Processing

Access Models

21

Portability

Java Server Pages files can be run on any web server or web-

enabled application server that provides support for them. Dubbed the JSP engine, this

support involves recognition, translation, and management of the JavaServer Page

lifecycle and its interactions with associated components.

The JSP engine for a particular server might be built-in or might be

provided through a 3rd-party add-on. As long as the server on which you plan to execute

the Java Server Pages supports the same specification level as that to which the file was

written, no changes should be necessary as you move your files from server to server.

Note, however, that instructions for the setup and configuration of the files may differ

between files.

To date, there has been no upwards- or backwards-compatibility

between Java Server Page specifications. A Java Server Page file written to the 0.92

specifications can be run only on a server supporting Java Server Page 0.92. The same

file could not run on a server supporting only Java Server Page 1.0 or Java Server Page

0.91.

Composition

It was mentioned earlier that the Java Server Pages architecture can include reusable

Java components. The architecture also allows for the embedding of a scripting language

directly into the Java Server Page file.

The components current supported include Java Beans, and

Servlets. Support for Enterprise Java Beans components will likely be added in a future

release. As the default scripting language, Java Server Pages use the Java programming

language. This means that scripting on the server side can take advantage of the full set of

capabilities that the Java programming language offers. Support for other scripting

languages might become available in the future.

22

Processing

A Java Server Page file is essentially HTML document with JSP scripting or tags. It may

have associated components in the form of .class, .jar, or .ser files--or it may not. The use

of components is not required.

The Java Server Page file has a .jsp extension to identify it to the server as a Java

Server Pages file. Before the page is served, the Java Server Pages syntax is parsed and

processed into a servlet on the server side. The servlet that is generated outputs real

content in straight HTML for responding to the client. Because it is standard HTML, the

dynamically generated response looks no different to the client browser than a static

response.

Access Models

A Java Server Pages file may be accessed in at least two different ways:

1. A client request comes directly into a Java Server Page.

In this scenario, suppose the page accesses reusable Java Bean

components that perform particular well-defined computations like accessing a database.

The results of the Bean’s computations, called result sets are stored with in the Bean as

properties. The page uses such Beans to generate dynamic content and present it back to

the client.

2. A request comes through a servlet.

23

The servlet generates the dynamic content. To handle the response to the client,

the servlet creates a Bean and stores the dynamic content (sometimes called the result set)

in the Bean. The servlet then invokes a Java Server Page that will present the content

along with the Bean containing the generated from the servlet.

There are two APIs to support this model of request processing using Java Server

Pages. One API facilitates passing context between the invoking servlet and the Java

Server Page. The other API lets the invoking servlet specify which Java Server Page to

use.

In both of the above cases, the page could also contain any valid Java code. The

Java Server Pages architecture encourages separation of content from presentation--it

does not mandate it.

How to Choose Between Access Models

With at least two access models, the question naturally arises "When does it make

sense to have a Java Server Page as the front-end to a servlet, as the back-end to a servlet,

or use only the servlet? Here are some possible guidelines:

If a graphical interface (GUI) is necessary to collect the request data--use a Java

Server Pages file.

If the request and request parameters are otherwise available to the servlet, but the

results of the servlet processing requires a graphical interface to present them--

use a Java Server Pages file.

24

If presentation layout is minimal (will not require very many println lines in your

servlet code) and you don't need to make that presentation logic available to a

customer or your web page designer, then a Servlet might suffice.

Enterprise Beans

Enterprise beans are server components written in the Java programming

language. Enterprise beans contain the business logic for your application. For example, a

check book client might invoke the debit and credit methods of an account enterprise

bean.

There are two types of enterprise beans: session beans and entity beans.

Session Beans

A session bean represents a client in the J2EE server. A client communicates with

the J2EE server by invoking the methods that belong to an enterprise bean. For example,

an online shopping client might invoke the enter Order method of its session bean to

create an order. A session bean converses with the client, and can be thought of as an

extension of the client. Each session bean can have only one client. When the client

terminates, its corresponding session bean also terminates. Therefore, a session bean is

transient, or non-persistent.

Entity Beans

An entity bean represents a business object in a persistent storage mechanism

such as a database. For example, an entity bean could represent a customer, which might

be stored as a row in the customer table of a relational database. An entity bean's

information does not have to be stored in a relational database. It could be stored in an

object database, a legacy application, a file, or some other storage mechanism. The type

of storage mechanism depends on the particular implementation of EJB technology.

The reference implementation (J2EE SDK) uses a relational database. See the

section "Database Access" for more information.

25

The persistence of an entity bean can be managed by either the entity bean itself, or by

the EJB container. Bean-managed persistence requires you to write the data access code

in the Bean. For example, a customer entity bean would include the SQL commands to

access a relational database via JDBC. Container-managed persistence means that the

EJB container handles the data access calls automatically.

Comparing Session and Entity Beans

Although both session and entity beans run in an EJB container, they are quite different.

The following table contrast session and entity beans:

TABLE 1-1 Differences Between Session and Entity Beans

Session Bean Entity Bean

Purpose Performs a task for a client. Represents a business entity object that

exists in persistent storage.

Shared

Access May have one client. May be shared by multiple clients.

PersistenceNot persistent. When the client

terminates its session bean is no

longer available.

Persistent. Even when the EJB

container terminates, the entity state

remains in a database.

The flexibility of the EJB architecture allows you to build applications in a variety

of ways. The following illustration shows how you might create an online shopping

application with both session and entity beans. An HTML form displayed in a Web

browser accesses a servlet in a Web container. The servlet is the client of a shopping

session bean. When the HTML forms needs to find a product or enter an order, it

26

instructs the servlet to call the appropriate business methods in the session bean. The

session bean is the client of the order, product, and customer entity beans. Because Entity

beans are persistent, their state is stored in the database.

FIGURE 1-3 Using Session and Entity Beans

Java BeansTM Components and Enterprise Beans

JavaBeans components and enterprise beans are not the same. Although both

components are written in the Java programming language, they are not

interchangeable. JavaBeans components define a convention for making a Java class

27

instance customizable by design tools, allowing the tools to link these customized

objects via events. Enterprise beans implement multi-user, transactional services.

Programming Restrictions for Enterprise Beans

Enterprise beans make use of the services provided by the EJB container, such as

life-cycle management. To avoid conflicts with these services, enterprise beans are

restricted from performing certain operations:

Managing or synchronizing threads

Accessing files or directories with the java.io package

Using AWT functionality to display information or to accept information from a

keyboard

Listening on a socket, accepting connections on a socket, or using a socket for

multicast

Setting a socket factory used by Server Socket, Socket, or the stream handler

factory used by the URL class

Loading a native library

Database Access

The Enterprise Java Beans specification does not require an implementation to

support a particular type of database. Therefore, the databases supported by different

J2EE implementations may vary. See the Release Notes for a list of the databases

currently supported by the J2EE SDK.

28

Both session and entity beans can access a database. The type of enterprise bean

you choose depends on your application. You might want to include SQL calls in a

session bean under the following circumstances:

The application is relatively simple.

The data returned by the SQL call will not be used by multiple clients.

The data does not represent a business entity.

You should probably access a database from an entity bean if any of the following

conditions are true:

More than one client will use the data returned by the database call.

The data represents a business entity.

You want to hide the relational model from the session bean.

SQL SERVER 2005

INTRODUCTION

Microsoft SQL Server is a client/server relational database system. What exactly

is a client/server relational database system? The best way to explain it is to define it in

two parts, the client /server part, and the relational database system part.

Client/server, also referred to as distributed computing, means that all of the

data processing of a program does not occur on a single computer, as it often does on

29

desktop, mini-or mainframe-based computer systems. Instead, different parts of the SQL

Server application run on two or more computers at the same time. Multiple SQL Server

database, along with thousands of clients, can all be designed to work together, scaling to

virtually any size.

Major Features Of SQL Server

SQL Server offers database administrators and SQL developers virtually every

tool they need to create and manage a complete enterprise –wide management system.

This section takes a look at some of the most important features of SQL Server7.0. For a

complete description of all the features, you will have to read the entire book.

SQL Server Fundamentals

When people think of SQL Server, they often have different pictures in their

heads of what SQL Server really is. Some people think of it as a database. Others think if

it is as a physically server. And others think of the BackOffice product sold by Microsoft.

SQL Server Management Tools

SQL Server includes a wide variety of client _ based administrative tools that

can be used to manage SQL Server. During the installation process, you can load as few

or as many of the Management tools as you think you need. SQL Server provider you

with these options:

SQL Server Enterprise Manager:

If you want to remotely manage SQL Server, then installing the SQL Server

Enterprise Manager onto your workstation is necessary. This program allows the DBA to

perform virtually any SQL Server administrative task.

SQL Server Query Analyzer

This tool is used to manually send transact-SQL statements and stored

procedures to the SQL Server database engine. You will probably want to load this on

most, if not all remote management workstations. This is a tool you may want to load

onto SQL Server developer’s desktops, as it gives developers direct access to SQL Server

so they can run interactive Transact-SQL statements and SQL scripts.

SQL Server profiler

30

This tool is used to monitor and record SQL Server database activity between SQL

Server and clients. Only load this tool on workstations that perform this task.

Database

A database is similar to a data file in that it is a storage place for data. Like a data

file, a database does not present information directly to a user; the user runs an

application that accesses data from the database and presents it to the user in an

understandable format.

When working with data files, an application must be coded to work with the

specific structure of each data file. In contrast, a database contains a catalog that

applications use to determine how data is organized. Generic database applications

can use the catalog to present users with data from different databases dynamically,

without being tied to a specific data format.

A database typically has two main parts: first, the files holding the physical

database and second, the database management system (DBMS) software that

applications use to access data. The DBMS is responsible for enforcing the database

structure, including:

• Maintaining relationships between data in the database.

• Ensuring that data is stored correctly and that the rules defining data

relationships are not violated.

• Recovering all data to a point of known consistency in case of system

failures.

Relational Database

Although there are different ways to organize data in a database, relational

databases are one of the most effective. Relational database systems are an

application of mathematical set theory to the problem of effectively organizing data.

31

In a relational database, data is collected into tables (called relations in relational

theory).

A table represents some class of objects that are important to an organization. For

example, a company may have a database with a table for employees, another table

for customers, and another for stores. Each table is built of columns and rows (called

attributes and topples in relational theory). Each column represents some attribute of

the object represented by the table. For example, an Employee table would typically

have columns for attributes such as first name, last name, employee ID, department,

pay grade, and job title. Each row represents an instance of the object represented by

the table. For example, one row in the Employee table represents the employee who

has employee ID 12345.

When organizing data into tables, you can usually find many different ways to

define tables. Relational database theory defines a process called normalization,

which ensures that the set of tables you define will organize your data effectively.

Scalable

SQL Server 2000 supports having a wide range of users access it at the same

time. An instance of SQL Server 2000 includes the files that make up a set of

databases and a copy of the DBMS software. Applications running on separate

computers use a SQL Server 2000 communications component to transmit commands

over a network to the SQL Server 2000 instance. When an application connects to an

instance of SQL Server 2000, it can reference any of the databases in that instance

that the user is authorized to access. The communication component also allows

communication between an instance of SQL Server 2000 and an application running

on the same computer. You can run multiple instances of SQL Server 2000 on a

single computer.

32

Although SQL Server 2000 is designed to work as the data storage engine for

thousands of concurrent users who connect over a network, it is also capable of

working as a stand-alone database directly on the same computer as an application.

The scalability and ease-of-use features of SQL Server 2000 allow it to work

efficiently on a single computer without consuming too many resources or requiring

administrative work by the stand-alone user. The same features allow SQL Server

2000 to dynamically acquire the resources required to support thousands of users,

while minimizing database administration and tuning. The SQL Server 2000

relational database engine dynamically tunes itself to acquire or free the appropriate

computer resources required to support a varying load of users accessing an instance

of SQL Server 2000 at any specific time. The SQL Server 2000 relational database

engine has features to prevent the logical problems that occur if a user tries to read or

modify data currently used by others.

Structured Query Language

To work with data in a database, you have to use a set of commands and

statements (language) defined by the DBMS software. Several different languages

can be used with relational databases; the most common is SQL. The American

National Standards Institute (ANSI) and the International Standards Organization

(ISO) define software standards, including standards for the SQL language. SQL

Server 2000 supports the Entry Level of SQL-92, the SQL standard published by

ANSI and ISO in 1992. The dialect of SQL supported by Microsoft SQL Server is

called Transact-SQL (T-SQL). T-SQL is the primary language used by Microsoft

SQL Server applications.

Extensible Markup Language

XML is the emerging Internet standard for data. XML is a set of tags that can be

used to define the structure of a hypertext document. XML documents can be easily

processed by the Hypertext Markup Language, which is the most important language

for displaying Web pages.

33

Although most SQL statements return their results in a relational, or tabular,

result set, the SQL Server 2000 database component supports a FOR XML clause that

returns results as an XML document. SQL Server 2000 also supports XPath queries

from Internet and intranet applications. XML documents can be added to SQL Server

databases, and the OPENXML clause can be used to expose data from an XML

document as a relational result set.

Overview of the SQL Server Tools

Microsoft® SQL Server™ 2000 includes many graphical and command prompt

utilities that allow users, programmers, and administrators to:

• Administer and configure SQL Server.

• Determine the catalog information in a copy of SQL Server.

• Design and test queries for retrieving data.

• Copy, import, export, and transform data.

• Provide diagnostic information.

• Start and stop SQL Server.

In addition to these utilities, SQL Server contains several wizards to walk

administrators and programmers through the steps needed to perform more complex

administrative tasks.

INTRODUCTION TO VBSCRIPT

VBScript brings professional programming techniques to

HTML web documents. With VBScript, we can create documents and

34

applications that previously could only have been made available as a

desktop program written with something like Visual Basic. It gives us the

ability to interact with and manipulate HTML documents directly from

the browser. With VBScript, we can even interact with and manipulate

the browser it, sending it instructions from our VBScript program, and

pulling in its variables for our own use.

Above all, VBScript brings to us true client-side processing, so

let's briefly look at some of the main uses of VBScript:

Reference and manipulate document objects

Reference and manipulate the browser

Reference the contents of another loaded document or documents

Create a document "on the fly" from the browser

Store, reference, and manipulate data input by the user

Store, reference, and manipulate data downloaded from the server

Perform calculations on data

Display messages to the user

Access cookies easily

Reference and manipulate a wide range of "add-on" components,

both ActiveX controls and Java applets

Display two-dimensional HTML

35

VBScript not only supports the standard document objects, it also

allows us to attach events to these objects. To put this another way, when

the user or another part of our program interacts in some way with a

particular object, like a command button, the browser can automatically

run a particular routine within our program. For example, if the user

clicks on a certain button or moves away from a text box, an "event" is

fired that causes a particular routine to execute

DATA FLOW DIAGRAM:

36

Login Authenticate

Home

Valid

In Valid

Admin

Detectives

Police Officer

Magistrate

Citizen

A

D

P

M

C

37

38

A

Police Station

Officer Appointment

Reports

Add New Branch

Modify Branch

Branchdetail

New Officer Appointmen

t Branch

Transferring Officer

PoliceInfo

TransferInfo

If Appoint is No

If Appoint is yes

View Branch Information

View Officer Information

View Transferring

Officer Information

Brachdetail

PoliceInfo

TransferInfo

39

C

Complaint Form Complaint

Registered

ComplaintsId, Name, Date

Crime type

License Apply License Apply

Security Apply

Verify the complaint

Security Form

Detectives D

License

Security

Complaints

Reports

40

Fir ApplyFir Details P Fir Data

Arrest warrant Insert Arrest warrant

License Accept or Reject

License Report

License

Magistrate Accept or Reject

Arrest warrant

Arrest warrant

M

DATABASE STRUCTUREBrowsing Centre

TableName:Bcentre

TableName:Branchdetails

Field Name Data Type SizeAid numeric 5Aname varchar 30Ltype varchar 30State varchar 30City varchar 30Address varchar 50Ipaddress varchar 40Licenseno numeric 5Status varchar 20

FieldName DataType SizeBranchid varchar 10Branchname varchar 50State varchar 50City varchar 40area1 varchar 30area2 varchar 30area3 varchar 30Pincode varchar 10Phoneno varchar 10

41

Complaints

TableName:Complaints

CriminalInformation

TableName:Criminalinfo

FieldName DataType SizeCompid(primary key)

numeric 5

Comdate datetime 8Name varchar 20Gender varchar 20State varchar 20City varchar 30area1 varchar 40Pincode varchar 10Phoneno varchar 10Emailed varchar 30Crimetype varchar 40Crimedate datetime 8Reason varchar 60Branched varchar 10Status varchar 20

FieldName DataType SizeId numeric 5Cname varchar 20State varchar 20City varchar 20Address varchar 20Age numeric 5Phoneno numeric 9ident1 varchar 20ident2 varchar 20Date datetime 8Caseno varchar 20Casedetails varchar 40Photo varchar 60

42

FirDetails

TableName:Firdetails

LicenseDetails

TableName:Licensedet

FiledName DataType SizeComid numeric 5Branchid varchar 20Name varchar 20State varchar 20City varchar 20Area varchar 20Crimetype varchar 40Crimedate datetime 8Cname varchar 20Cstate varchar 20Ccity varchar 20Address varchar 30Age numeric 5Phoneno numeric 9Status varchar 50

FieldName DataType SizeName varchar 20Gender varchar 10Age numeric 5Regdate datetime 8Licensetype varchar 20State varchar 30City varchar 30Area varchar 40Pincode varchar 10Phoneno varchar 10Emailed varchar 50proof1 varchar 50proof2 varchar 50Status varchar 10Aid(Primary Key) numeric 9

43

LoudSpeakerInformation

TableName:Loudspeakerinfo

MeetingInformation

TableName:Meetinginfo

FieldName DataType SizeAid(Primary Key) numeric 5Aname varchar 20Ltype varchar 20Address varchar 50Reason varchar 100Noofspeaker numeric 5Ldate datetime 8Noofdays numeric 5Licenseno numeric 9Status varchar 10

FieldName DataType SizeAid(Primary Key) numeric 5Aname varchar 20Ltype varchar 20Mtype varchar 20Address varchar 50Fromplace varchar 40Toplace varchar 40Reason varchar 100Noofper numeric 5Pmeet varchar 10Leader varchar 40Lnumber numeric 9Status varchar 50Mdate datetime 8Noofdays numeric 5

44

PoliceInformation

TableName:Policeinfo

RequestTable

TableName :Requesttable

FieldName DataType SizeComid numeric 5Branchid varchar 10Rdate datetime 8Adate datetime 8Status varchar 20

FieldName DataType SizeRegno(Primary Key) numeric 5Pname varchar 30Address varchar 30Age numeric 5Dob datetime 8Qualification varchar 20Applieddist varchar 30Department varchar 20Posting varchar 30Aid numeric 5District varchar 30State varchar 30Branchid varchar 20Doa datetime 8Appointed varchar 10

45

SecurityDetails

TableName:Securitydet

TransferInformation

TableName:Transferinfo

FieldName DataType SizeAid numeric 5Pname varchar 20Address varchar 40Fstate varchar 50Fdistrict varchar 30Fdept varchar 20Fbranch varchar 40Posting varchar 30Appointdt datetime 8Dot datetime 8Tostate varchar 40Todistrict varchar 30Tobranch varchar 30Todept varchar 30Toposting varchar 30

FieldName DataType SizeName varchar 20Gender varchar 10Age numeric 5Regdate datetime 8Secdate datetime 8Noofdays numeric 5State varchar 30City varchar 30Area varchar 40Pincode varchar 10Phoneno varchar 10Emailed varchar 50proof1 varchar 50proof2 varchar 50Reason varchar 60Status varchar 10

46

CODE DESIGN

HOME.aspx.cs

using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;

public partial class _Default : System.Web.UI.Page{ protected void Page_Load(object sender, EventArgs e) {

} protected void Login1_Authenticate(object sender, AuthenticateEventArgs e) { if (Login1.UserName == "Admin" && Login1.Password == "Admin") Response.Redirect("adminhome.aspx"); else if (Login1.UserName == "Police" && Login1.Password == "Police") Response.Redirect("policehome.aspx"); else if (Login1.UserName == "Citizen" && Login1.Password == "Citizen") Response.Redirect("citizenhome.aspx"); else if (Login1.UserName == "Detectives" && Login1.Password == "Detectives") Response.Redirect("detectivehome.aspx"); else if (Login1.UserName == "Magistrate" && Login1.Password == "Magistrate") Response.Redirect("magistratehome.aspx"); }}

47

POLICE REGISTRATION :

using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;using System.Data.OleDb;

public partial class policeregistrationform : System.Web.UI.Page{ OleDbConnection con; OleDbCommand cmd; OleDbDataReader rs; protected void Page_Load(object sender, EventArgs e) { con = (OleDbConnection)Application.Get("conn"); if (!Page.IsPostBack) { DropDownList1.Items.Insert(0, "Select"); DropDownList3.Items.Insert(0, "Select"); for (int i = 1; i <= 31; i++) DropDownList1.Items.Add(i.ToString()); for (int i = 1980; i <= 2010; i++) DropDownList3.Items.Add(i.ToString()); shownumber();

}

} void shownumber() { cmd = new OleDbCommand("select isnull(max(regno),0)+1 from policeinfo", con); rs = cmd.ExecuteReader(); if(rs.Read ()) TextBox1.Text =rs[0].ToString (); rs.Close (); cmd.Dispose ();

} protected void Button1_Click(object sender, EventArgs e) { try { string s = DropDownList1.SelectedItem.Text + "-" + DropDownList2.SelectedItem.Text + "-" + DropDownList3.SelectedItem.Text;

48

cmd = new OleDbCommand("insert into policeinfo(regno,pname,address,age,dob,qualification,applieddist,department,posting,appointed) values(?,?,?,?,?,?,?,?,?,?)", con); cmd.Parameters.AddWithValue("rno", TextBox1.Text); cmd.Parameters.AddWithValue("name", TextBox2.Text); cmd.Parameters.AddWithValue("address", TextBox3.Text); cmd.Parameters.AddWithValue("age", TextBox4.Text); cmd.Parameters.AddWithValue("dob", s); cmd.Parameters.AddWithValue("qualification", TextBox5.Text); cmd.Parameters.AddWithValue("applieddist", DropDownList5.SelectedItem.Text); cmd.Parameters.AddWithValue("department", dept.SelectedItem.Text); cmd.Parameters.AddWithValue("posting", DropDownList4.SelectedItem.Text); cmd.Parameters.AddWithValue("appointed", "No"); cmd.ExecuteNonQuery(); cmd.Dispose(); Label1.Text = "Your Information Registered...."; } catch (Exception ex) { Label1.Text = ex.ToString(); }

} protected void Button2_Click(object sender, EventArgs e) { TextBox1.Text = ""; TextBox2.Text = ""; TextBox3.Text = ""; TextBox4.Text =""; TextBox5.Text = ""; DropDownList1.SelectedIndex = 0; DropDownList2.SelectedIndex = 0; DropDownList3.SelectedIndex = 0; DropDownList4.SelectedIndex = 0; DropDownList5.SelectedIndex = 0; shownumber(); }}

49

COMPLAINTS DETAILS

using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;using System.Data.OleDb;

public partial class complaintdetails : System.Web.UI.Page{ OleDbConnection con; OleDbCommand cmd; OleDbDataReader rs; string bid; protected void Page_Load(object sender, EventArgs e) { Label1.Visible = false; TextBox2.Text = DateTime.Now.ToShortDateString(); con = (OleDbConnection)Application.Get("conn"); if (!Page.IsPostBack) { DropDownList4.Items.Insert(0, "Select"); DropDownList6.Items.Insert(0, "Select"); binddata(); for (int i = 1; i <= 31; i++) DropDownList4.Items.Add(i.ToString()); for (int i = 2007; i <= 2020; i++) DropDownList6.Items.Add(i.ToString()); } } void binddata() { cmd = new OleDbCommand("select isnull(max(compid),0)+1 from complaints", con); rs = cmd.ExecuteReader(); if (rs.Read()) TextBox1.Text = rs[0].ToString(); } protected void Button1_Click(object sender, EventArgs e) { try { Label1.Visible = true ; string s = DropDownList4.SelectedItem.Text + "-" + DropDownList5.SelectedItem.Text + "-" + DropDownList6.SelectedItem.Text; cmd = new OleDbCommand("select branchid from branchdetails where (area1=? or area2=? or area3=?) and city=?", con);

50

cmd.Parameters.AddWithValue("area1", TextBox4.Text); cmd.Parameters.AddWithValue("area2", TextBox4.Text); cmd.Parameters.AddWithValue("area3", TextBox4.Text); cmd.Parameters.AddWithValue("city", DropDownList2.SelectedItem .Text); rs = cmd.ExecuteReader(); if (rs.Read()) bid = rs[0].ToString(); rs.Close(); cmd.Dispose();

cmd = new OleDbCommand("insert into complaints values(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?)", con); cmd.Parameters.AddWithValue("id", TextBox1.Text); cmd.Parameters.AddWithValue("date", TextBox2.Text); cmd.Parameters.AddWithValue("name", TextBox3.Text); cmd.Parameters.AddWithValue("gender", RadioButtonList1.SelectedItem.Text); cmd.Parameters.AddWithValue("state", DropDownList1.SelectedItem.Value); cmd.Parameters.AddWithValue("city", DropDownList2.SelectedItem.Value); cmd.Parameters.AddWithValue("area", TextBox4.Text); cmd.Parameters.AddWithValue("pincode", TextBox5.Text); cmd.Parameters.AddWithValue("emailid", TextBox6.Text); cmd.Parameters.AddWithValue("crimetype", TextBox7.Text); cmd.Parameters.AddWithValue("type", DropDownList3.SelectedItem.Value); cmd.Parameters.AddWithValue("date",s ); cmd.Parameters.AddWithValue("reason", TextBox8.Text); cmd.Parameters.AddWithValue("branchid", bid); cmd.Parameters.AddWithValue("status", "No"); cmd.ExecuteNonQuery(); Label1.Text = "You Complaints has been Registered..and you can see your status in your mail or mobile.."; } catch (Exception ex) { Label1.Visible = true; Label1.Text = ex.Message; } } protected void Button2_Click(object sender, EventArgs e) { TextBox1.Text = ""; TextBox2.Text = ""; TextBox3.Text = ""; TextBox4.Text = ""; TextBox5.Text = ""; TextBox6.Text = ""; TextBox7.Text = ""; TextBox8.Text = ""; TextBox8.Text = ""; DropDownList1.SelectedIndex = 0; DropDownList2.SelectedIndex = 0;

51

DropDownList3.SelectedIndex = 0; DropDownList4.SelectedIndex = 0; DropDownList5.SelectedIndex = 0; DropDownList6.SelectedIndex = 0; RadioButtonList1.SelectedIndex = 0; binddata();

} protected void DropDownList1_SelectedIndexChanged(object sender, EventArgs e) { if (DropDownList1.SelectedItem.Text == "TamilNadu") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Chennai"); DropDownList2.Items.Add("Madurai"); DropDownList2.Items.Add("Trichy"); DropDownList2.Items.Add("Kovai"); DropDownList2.Items.Add("");

} else if (DropDownList1.SelectedItem.Text == "Kerala") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Palkad"); DropDownList2.Items.Add("Eduki"); DropDownList2.Items.Add("Kolikod"); DropDownList2.Items.Add("Thiruvanandapuram");

} else if (DropDownList1.SelectedItem.Text == "Andra") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Tirupathi"); DropDownList2.Items.Add("Kundoor"); DropDownList2.Items.Add("Visagapatinam"); DropDownList2.Items.Add("Ellor");

} else if (DropDownList1.SelectedItem.Text == "Karnadaga") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Bangalore"); DropDownList2.Items.Add("Charmina"); DropDownList2.Items.Add("Belgaum"); DropDownList2.Items.Add("Belari");

} }}

52

REQUEST FOR ARREST WARRANT:

using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;using System.Data.OleDb;

public partial class requestforarrestwarrent : System.Web.UI.Page{ OleDbConnection con; OleDbDataAdapter adp; DataSet ds; OleDbCommand cmd; OleDbDataReader rs; protected void Page_Load(object sender, EventArgs e) { con = (OleDbConnection)Application.Get("conn"); Label1.Visible = false; } void bindgrid() { try { cmd = new OleDbCommand("select comid,name,state,city,area,crimetype,crimedate,cname,cstate,ccity,address,age,phoneno,status from firdetails where state=? and city=? and branchid=? and status is null ", con); cmd.Parameters.AddWithValue("state", DropDownList1.SelectedItem.Text); cmd.Parameters.AddWithValue("city", DropDownList2.SelectedItem.Text); cmd.Parameters.AddWithValue("branchid", DropDownList3.SelectedItem.Text); adp = new OleDbDataAdapter(cmd); ds = new DataSet(); adp.Fill(ds, "table1"); GridView1.DataSource = ds.Tables[0]; GridView1.DataBind(); cmd.Dispose(); } catch (Exception ex) { Label1.Visible = true; Label1.Text = ex.ToString(); } }

53

protected void GridView1_PageIndexChanging(object sender, GridViewPageEventArgs e) { GridView1.PageIndex = e.NewPageIndex; bindgrid(); } protected void DropDownList1_SelectedIndexChanged(object sender, EventArgs e) { if (DropDownList1.SelectedItem.Text == "TamilNadu") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Chennai"); DropDownList2.Items.Add("Madurai"); DropDownList2.Items.Add("Trichy"); DropDownList2.Items.Add("Kovai");

} else if (DropDownList1.SelectedItem.Text == "Kerala") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Palkad"); DropDownList2.Items.Add("Eduki"); DropDownList2.Items.Add("Kolikod"); DropDownList2.Items.Add("Thiruvanandapuram");

} else if (DropDownList1.SelectedItem.Text == "Andra") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Tirupathi"); DropDownList2.Items.Add("Kundoor"); DropDownList2.Items.Add("Visagapatinam"); DropDownList2.Items.Add("Ellor");

} else if (DropDownList1.SelectedItem.Text == "Karnadaga") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Bangalore"); DropDownList2.Items.Add("Charmina"); DropDownList2.Items.Add("Belgaum"); DropDownList2.Items.Add("Belari");

} } protected void DropDownList2_SelectedIndexChanged(object sender, EventArgs e) { cmd = new OleDbCommand("select distinct(branchid) from firdetails where state=? and city=?", con);

54

cmd.Parameters.AddWithValue("state", DropDownList1.SelectedItem.Text); cmd.Parameters.AddWithValue("city", DropDownList2.SelectedItem.Text); rs = cmd.ExecuteReader(); DropDownList3.DataSource = rs; DropDownList3.DataTextField = "branchid"; DropDownList3.DataBind(); rs.Close(); cmd.Dispose(); DropDownList3.Items.Insert(0, "SelectId");

} protected void DropDownList3_SelectedIndexChanged(object sender, EventArgs e) { bindgrid();

}

protected void GridView1_RowCommand(object sender, GridViewCommandEventArgs e) {

try { if (e.CommandName == "select") { LinkButton l1 = (LinkButton)e.CommandSource; cmd = new OleDbCommand("update firdetails set status='Request' where comid=?", con); cmd.Parameters.AddWithValue("comid", l1.Text); cmd.ExecuteNonQuery(); cmd.Dispose(); cmd = new OleDbCommand("insert into requesttable(comid,branchid,rdate) values(?,?,?)", con); cmd.Parameters.AddWithValue("comid", l1.Text); cmd.Parameters.AddWithValue("branchid", DropDownList3.SelectedItem.Text); cmd.Parameters.AddWithValue("rdate",DateTime.Now.ToString()); cmd.ExecuteNonQuery(); cmd.Dispose();

bindgrid(); } } catch (Exception ex) { Label1.Visible = true; Label1.Text = ex.ToString();}}}

55

SECURITY DETAILS:

using System;using System.Data;using System.Configuration;using System.Collections;using System.Web;using System.Web.Security;using System.Web.UI;using System.Web.UI.WebControls;using System.Web.UI.WebControls.WebParts;using System.Web.UI.HtmlControls;using System.Data.OleDb;

public partial class secutirydetails : System.Web.UI.Page{ OleDbConnection con; OleDbCommand cmd; OleDbDataReader rs; protected void Page_Load(object sender, EventArgs e) { con = (OleDbConnection)Application.Get("conn"); TextBox3.Text = DateTime.Now.ToShortDateString(); if (!Page.IsPostBack) { maxnumber(); DropDownList3.Items.Insert(0, "Select"); DropDownList5.Items.Insert(0, "Select"); for (int i = 1; i <= 31; i++) DropDownList3.Items.Add(i.ToString()); for (int i = 2009; i <= 2020; i++) DropDownList5.Items.Add(i.ToString()); }

} void maxnumber() { cmd = new OleDbCommand("select isnull(max(aid),0)+1 from securitydet", con); rs = cmd.ExecuteReader(); if (rs.Read()) aid.Text = rs[0].ToString(); rs.Close(); cmd.Dispose(); } protected void Button1_Click(object sender, EventArgs e) { try { string s = DropDownList3.SelectedItem.Text + "-" + DropDownList4.SelectedItem.Text + "-" + DropDownList5.SelectedItem.Text; cmd = new OleDbCommand("insert into securitydet values(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?)", con); cmd.Parameters.AddWithValue("id", aid.Text);

56

cmd.Parameters.AddWithValue("name",TextBox1.Text ); cmd.Parameters.AddWithValue("gender",RadioButtonList1.SelectedItem.Text ); cmd.Parameters.AddWithValue("Age",TextBox2.Text ); cmd.Parameters.AddWithValue("rdate",TextBox3.Text ); cmd.Parameters.AddWithValue("sdate",s); cmd.Parameters.AddWithValue("ndays",TextBox4.Text ); cmd.Parameters.AddWithValue("state",DropDownList1.SelectedItem.Text ); cmd.Parameters.AddWithValue("city", DropDownList2.SelectedItem.Text); cmd.Parameters.AddWithValue("area", TextBox5.Text); cmd.Parameters.AddWithValue("pcode",TextBox6.Text ); cmd.Parameters.AddWithValue("pno",TextBox7.Text ); cmd.Parameters.AddWithValue("emilid",TextBox8.Text ); cmd.Parameters.AddWithValue("proof1",RadioButtonList2.SelectedItem.Text ); cmd.Parameters.AddWithValue("proof2",RadioButtonList3.SelectedItem.Text ); cmd.Parameters.AddWithValue("reason",TextBox9.Text ); cmd.Parameters.AddWithValue("status", "No"); cmd.ExecuteNonQuery(); cmd.Dispose(); Label1.Text = " Security Details Registered... and you can see your status in your mail or mobile.."; } catch (Exception ex) { Label1.Text = ex.ToString(); }

} protected void Button2_Click(object sender, EventArgs e) { TextBox1.Text = ""; TextBox2.Text = "" ; // TextBox3.Text = ""; TextBox4.Text = ""; TextBox5.Text = ""; TextBox6.Text = ""; TextBox7.Text = ""; TextBox8.Text = ""; TextBox9.Text = ""; DropDownList1.SelectedIndex = 0; DropDownList2.SelectedIndex = 0; DropDownList3.SelectedIndex = 0; DropDownList4.SelectedIndex = 0; DropDownList5.SelectedIndex = 0; RadioButtonList1.SelectedIndex = -1; RadioButtonList2.SelectedIndex = -1;

57

RadioButtonList3.SelectedIndex = -1; aid.Text = ""; maxnumber();

} protected void DropDownList1_SelectedIndexChanged(object sender, EventArgs e) { if (DropDownList1.SelectedItem.Text == "TamilNadu") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Chennai"); DropDownList2.Items.Add("Madurai"); DropDownList2.Items.Add("Trichy"); DropDownList2.Items.Add("Kovai"); DropDownList2.Items.Add("");

} else if (DropDownList1.SelectedItem.Text == "Kerala") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Palkad"); DropDownList2.Items.Add("Eduki"); DropDownList2.Items.Add("Kolikod"); DropDownList2.Items.Add("Thiruvanandapuram");

} else if (DropDownList1.SelectedItem.Text == "Andra") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Tirupathi"); DropDownList2.Items.Add("Kundoor"); DropDownList2.Items.Add("Visagapatinam"); DropDownList2.Items.Add("Ellor");

} else if (DropDownList1.SelectedItem.Text == "Karnadaga") { DropDownList2.Items.Clear(); DropDownList2.Items.Add("Select"); DropDownList2.Items.Add("Bangalore"); DropDownList2.Items.Add("Charmina"); DropDownList2.Items.Add("Belgaum"); DropDownList2.Items.Add("Belari");

} }}

58

SCREEN LAYOUT

HOME

59

ADMIN LOGIN

60

BRANCH DETAILS

61

REGISTRATION FORM

62

BRANCH DETAILS

63

FIR DETAILS

64

COMPLAINT DETAILS:

65

LICENSE DETAILS:

66

SYSTEM TESTING

System Testing is an important stage in any system development

life cycle. Testing is a process of executing a program with the intention of

finding errors. The importance of software testing and its implications with

respect to software quality cannot be overemphasized. Software testing is a

critical element of software quality assurance and represents the ultimate

review of specification, design and coding. A good test case is one that has a

high probability of finding a yet undiscovered error.

Testing is the set of activities that can be planned in advance and

conducted systematically. Different test conditions should be thoroughly

checked and the bugs detected should be fixed. The testing strategies formed

by the user are performed to prove that the software is free and clear from

errors. To do this, there are many ways of testing the system’s reliability,

completeness and maintainability.

Unit Testing:

In the unit testing the analyst tests the program making up a system.

The software units in a system are the modules and routines that are

assembled and integrated to perform a specific function. In a large system,

many modules on different levels are needed.

Unit testing can be performed from the bottom up starting with the

smallest and lowest level modules and proceeding one at a time. For each

module in a bottom-up testing, a short program executes the module and

provides the needed data.

67

Integration Testing:

Integration testing is a systematic technique for constructing the

program structure while conducting test to uncover errors associate with

interfacing. Objectives are used to take unit test modules and built program

structure that has been directed by design.

The integration testing is performed for this Hospital Management

System when all the modules where to make it a complete system. After

integration the project works successfully.

Validation Testing:

Validation testing can be defined in many ways, but a simple

definition is that can be reasonably expected by the customer. After

validation test has been conducted, one of two possible conditions exists.

The functions or performance characteristics

confirm to specification and are accepted.

A deviation from specification is uncovered and a

deficiency list is created.

Proposed system under consideration has been tested by using

validation testing and found to be working satisfactorily.

For example, in this project validation testing is performed against

medicine module. This module is tested with the following valid and invalid

inputs for the field medicine id.

68

White Box TestingWhite box testing, sometimes called glass-box testing is a test case

design method that uses the control structure of the procedural design to

derive test cases. Using white box testing methods, the software engineer

can derive test cases that

Guarantee that all independent paths with in a module have been

exercised at least once.

Exercise all logical decisions on their true and false sides.

Execute all loops at their boundaries and with in their operational

bounds and

Exercise internal data structure to assure their validity.

For example in this project white box testing is performed against

patient module. Without entering text if we apply it displays the message

“First add record then save it” else it should be saved.

Black Box Testing This method treats the coded module as a black box. The module runs

with inputs that are likely to cause errors. Then the output is checked to see

if any error occurred. This method cannot be used to test all errors, because

some errors may depend on the code or algorithm used to implement the

module.

69

SYSTEM IMPLEMENTATION

Implementation is the state in the system where the theoretical design is

turned into a working system. The most crucial stage in achieving a new

successful system and in giving confidence on the new system for the users

that will work efficiently and effectively. The system can be implemented

only after thorough testing in done and if found to work according to the

specification.

If involves careful planning, investigation of the current system and

its constraints on implementation, design of methods to achieve the

changeover, an evaluation of changeover methods apart from planning. Two

major tasks of preparing the implementation are education, training of the

users and testing the systems. System analysis and design efforts will be

more for complex systems beings implemented. Based on policies of

individuals’ organization an implementation coordinating committee has

been appointed.

The implementation process begins with preparing a plan for the

implementation system. According to this plan, the other activities are to be

carried out. In this plan, discussion has been made regarding the equipment,

resources and how to test the activities. Thus a clear plan is preparing for

the activities.

Equipment Acquisition

70

According to the above plan, the necessary equipment has to be

acquired to implement the new system. Prime Tech has all the hardware

requirements for installing and maintaining the package.

Program code preparationOne of the most important development activities is the code of

programming. The system DFD’s and other channels are converted to

modular programs. They have to be complied, tested and debugged.

User Manuals

Once planning has been completed the major effort of the computer

department is to ensure that the user department consists of education and

trained staff, as the system becomes more complex. The success of a system

depends upon how they are operated and used. Thus the quality of training,

the personnel is connected to the success of the system.

For this purpose system and user manuals are prepared. In system

manuals, details about the forms and blocks triggers. Which were used to

develop them, were specified. In user manuals data flow diagrams, charts

and screen formats are given. Also error messages associated were

explained in details. The users were shown the success and they were taught

how to operate the system. Live demonstration and visuals aids were used

to teach them.

71

CONCLUSION

The Developed system is flexible and robust and Police station has

several departments like Law and Order, Women Protection, Cyber crime,

Traffic and control, CBI, etc. Separate module for each dept would be

needed.

In performing analysis, design, coding and Implementation we have

made success in matching the system objectives with the goals of the

organization. The newly developed system consumes less processing time.

Since the Navigation is maintained throughout the system, they are much

user-friendlier and serve the organization purpose.

72

BIBILIOGRAPHY

Site server 3.0 - Macro Tabini

The Interdev Handbook - Maso

Developing ASP Components - Shelly, Bowers

VBScript Interactive Course - Simon

System Analysis and Design - Elias M.Awad

System Analysis and Design - Lee

ASP.NET

www.asp.net/(S(pdfrohu0ajmwt445fanvj2r3))/learn/data-access/

www.w3schools.com/aspnet/default.asp

www.411asp.net/home/sites

www.cristiandarie.ro/asp-net-tutorial/

www.asp.net-tutorials.com/basics/first-website/

SQL SERVER

www.functionx.com/sqlserver/

www.technet.microsoft.com/en-us/library/ms169620.aspx

www.msdn.microsoft.com/en-us/library/ms169620(SQL.90).aspx

www.softwaretrainingtutorials.com/ms-sql-server-2005.php

73