You are on page 1of 74

SYNOPSIS

“Serving those who protect”

To deliver next generation police and law enforcement reporting tools, and

setting up intelligence platforms that agencies use to tale incoming incident

reports, lessen live employee resources and allow these enforcement

agencies to reallocate resources to much needed community areas.

The E-COPS Pre-Qualification Program offered by Public Safety

Solutions is the first of its kind to offer potential public safety employees a

full range of services that will assist them in obtaining the public safety

position they desire. E-COPS Pre-Qualification Program provides a

complete applicant assistance program that includes in-depth assessment,

personal counseling and coaching throughout the process, complete

background investigation, and matching of your interests and capabilities to

the job and agency that will provide you with the best opportunity for

success. We even mentor you in your quest for future advancement

opportunities.

1
PROJECT DESCRIPTION

This system entitled “E-COPS” has the following major modules as


follows

1. Administration
2. Citizen
3. Police Officers(Constable to DGP)
4. Detectives
5. Magistrate

1) Administrator:

Administrator has the rights to create new Branch and can


able the change the existing details of other branches it also have the task of
appointing new police officers and register the new officers to the requiring
police stations. Administrator can also change the place of the officers from
one place to another place to continue their jobs are known as transfer of
police officers. Reports are also submitted to the administrator like branch
information and the details of the branch. Can also collects the details of the
appointed officers by three sections like APPID wise, DISTRICT wise and
also the details of the TRANSFER OFFICERS.

2
2) Detectives:

Detectives have the rights to verify the complaints from the


different area police stations and officers. Then the other most important one
is to verify the reports. These are the two important tasks of detectives.

3) Police officers:

The police officers main task is to maintain the FIR


DETAILS that is the total information of an accused and it’s the main detail
of a case that has to be submitted to the court. The FIR details must be
updated by the police officers with in the given time and submit to the
higher authorities. It must be transferred to the place where the officer is
handling the case. A police officer cannot commonly arrest a person they
must need a permission from the existing higher authorities that is known as
ARREST WARENT. So the police officers have to request the higher
authority that is called as the REQUEST WARENT after that they have to
refer the FIR. According to that they can reject warrant and view.

Accused data are the very important things to be maintained throw


the police officers to finish a case. A police officer has every right to create a
new DATA. It can be viewed when ever needed by the police officers or the
higher personalities.

Licenses are nothing but the permission from the officers to


contain meetings and securities for the strike is acknowledged throw them.
Only the officers have to give the permission to do all these things.

3
Security protection means when high personalities are in
meeting in public need protection throw some powerful persons like police
officers. So they apply for the security, so they accept or reject.

4) Magistrate:

They are the higher authorities to every problem to be solved or to


process them. He decides whether to accept or to reject the warranty. The
officers have to submit the reports of the warranty to the magistrate incase to
solve it.

5) Citizen:

The citizens have every right to get the help of a police officer. He
gives the complaint form to the police officer to take action to the problem
of the citizen. He must ask permission to do some mass meeting, to keep
loud speaker and browsing centers from the police officers. He cannot do
any thing with out their permission. According to that the officers must help
the citizens.

4
COMPANY PROFILE

Founded in1998, Pacific Blue Technologies Pvt. Ltd is a


consulting and software development firm dedicated to business success
through long-term relationship with our clients and staff. Based in Chennai,
Pacific Blue Technologies has grown from a one-person startup to a
significant corporation of 500 talented professionals having more than 10
branches all over the world.
Pacific Blue Technologies is dynamic, service oriented
enterprise, and is positioned to successfully respond to trends and changes in
the information technology in the industry. Pacific Blue Technology’s client
relationships are based on the highest quality professional technology
consulting and development services. Pacific Blue Technologies enjoys and
excellent reputation as a proven resource for strategic planning, needs,
assessment, client/server programming and interactive multimedia,
internet/intranet development , networking and security services. With
customer in private business and the public sector, takes pride in a history of
projects that significantly enhance and /or improve client’s business
practices and level of service.
Pacific Blue Technologies focus on long term relationship with
staff is reflected through clear communication of expectation, performance
based recognition and advancement, and an environment that supports
employee’s professional development. Pacific Blue Technology’s staff,
comprised almost entirely of full time company employees, is held to
standards of accountability, integrity, creativity and competence. The
dedication, skills, and integrity of Pacific Blue Technology’s staff are key to
the firm’s success.

5
SYSTEM ANALYSIS

Introduction:

System Analysis and Design, is the process of gathering and


interpreting facts, diagnosing problem and using the information to recommend
improvement to the system. Before development of any project can be pursued, a
system study is conducted to learn the details of the current business solution.
Information gathered through the study forms the basis for creating alternative
design strategies. Virtually all organizations are systems that interact with their
environment through receiving input and producing output.

It is a management technique used in designing a new system,


improving an existing system or solving problem. System analysis does not
guarantee that the user will derive an ideal solution to a problem. This depends
solely on the way one design a system to exploit the potential in the method. To
put it in another way, creativity is as much as must pre-design the study and
problem solving process and evaluates every successive step in the system
analysis.

Taking all these factors into account and with the knowledge of the
inter-relationship between the various fields and section and their potential
interactions, they are consider for developing the whole system in and integrated
manner, this project is developed to meet all the criteria in the

The management technique is also helps us in develop and design of


the new system or to improve the existing system.

6
The following Objectives are kept in mind:

 Identify the customer’s need.


 Evaluate the system concept for feasibility.
 Perform economic and technical analysis.

 Allocate functions to hardware, software, people,


database and other system elements.
 Establish cost and schedule constraints
 Create a system definition that forms the foundation
for all subsequent engineering work.

Identification of the need:

In this, there are certain expressions that are being used in the
development of the project. And, it is used to identify our needs or source in
the project.

• Defining a problem
• Finding the various need for the problem
• Formalizing the need
• Relating the need

Thus, it is the first step for system development life cycle.

7
1. Initial Investigation

It is one way of handling the project, it is used to know about


the user request and the modification of the system should be done.

The user’s request for this project is as follows:

1. Assigning separate work area for different users.


2. Nature of the work
3. Regular update and delete of record
4. Regular calculation of Net Asset Value
5. Supplying the data with the time required.

The user request identifies the need for change and authorizes the
initial investigation. It may undergo several modifications before it become
a written commitment. Once approved the activities are carried out into
action. The proposal, when approved, it initiates a detailed user-oriented
specification of system performance and analysis of the feasibility of the
evaluating alternative candidate systems with a recommendation of the best
system for the job.

Feasibility Study

The objective of the feasibility study is not only to solve the problem
but also to acquire a sense of its scope. The reason for doing this is to
identify the most beneficial project to the organization.

8
There are three aspects in the feasibility study:

1. Technical Feasibility
2. Financial Feasibility
3. Operating Feasibility

Technical Feasibility

The Technical feasibility is the study of the software and how it


is included in the study of our project. Regarding this there are some
technical issues that should be noted they are as follows:

• Is the necessary technique available and how it is suggested and


acquired?
• Does the proposed equipment have the technical capacity to
hold the data required using the new system?
• Will the system provide adequate response that is made by the
requester at an periodic time interval
• Can this system be expanded after this project development
• Is there a technique guarantees of accuracy, reliability in case of
access of data and security

The technical issues are raised during the feasibility study of


investigating our System. Thus, the technical consideration evaluates the
hardware requirements, software etc. This system uses JSP as front end and

9
Oracle as back end. They also provide sufficient memory to hold and
process the data. As the company is going to install all the process in the
system it is the cheap and efficient technique.

This system technique accepts the entire request made by the


user and the response is done without failure and delay. It is a study about
the resources available and how they are achieved as an acceptable system.
It is
an essential process for analysis and definition of conducting a parallel
assessment of technical feasibility.

Though storage and retrieval of information is enormous, it can be


easily handled by Oracle. As the oracle can be run in any system and the
operation does not differ from one to another. So, this is effective.

2. Economical Feasibility (Financial)

An organization makes good investment on the system. So, they


should be worth full for the amount they spend in the system. Always the
financial benefit and equals or less the cost of the system, but should not
exceed the cost.

 The cost of investment is analyzed for the entire system


 The cost of Hardware and Software is also noted.
 Analyzing the way in which the cost can be reduced

10
Every organization want to reduce there cost but at the same time quality of
the
Service should also be maintained. The system is developed according the
estimation of the cost made by the concern. In this project, the proposed
system will definitely reduce the cost and also the manual work is reduced
and speed of work is also increased.

3. Operational Feasibility

Proposed project will be beneficial only when they are turned into an
information system and to meet the organization operating requirements.
The following issues are considered for the operation:

• Does this system provide sufficient support for the user and the
management?
• What is the method that should be used in this project?
• Have the users been involved in the planning and development of
the projects?
• Will the proposed system cause any harm, bad result, loss of
control and accessibility of the system will lost?

Issues that may be a minor problem will sometimes cause major


problem in the operation. It is the measure of how people can able to work
with the system. Finding out the minor issues that may be the initial

11
problem of the system. It should be a user-friendly environment. All these
aspect should be kept in mind and steps should be taken for developing the
project carefully.

Regarding the project, the system is very much supported and friendly
for the user. The methods are defined in an effective manner and proper
conditions are given in other to avoid the harm or loss of data. It is designed
in GUI interface, as working will be easier and flexible for the user.

They are three basic feasibility studies that are done in every project.

12
Existing System:

Now a day E-Cops System solutions are provided by manually. All of


the processes are handled manually. Communication between police stations
is done through telephone or postal service which leads time consuming.
The user has to manage separate documents for different operations. Lot of
Manual works are implemented in Existing System.

The existing system is a manual process and it is very tedious one.

This system has number of limitations and some of them are listed
below.

 It does not produce the result of the operation timely


 The users have to wait for long time to get the result.
 It is a time consuming process
 They are very cumbersome
 Some times the results may not be accurate
 It takes lot of paperwork to maintain the information of
police offices, accuse information. The User has to rely
upon other external sources to get the results

13
Proposed System:

The New System should follows the below operations.

1) Administrator should be able to create/edit a virtual police station (PS)

which represents a real police station as a first time setup.

2) Police station has several departments like Law and Order, Women

Protection, Cyber crime, Traffic and control, CBI, etc. Separate module
for each dept would be needed.

3) When a complaint is made it undergoes various processes like FIR,

Charge Sheet, Property Seizure, court disposal etc all these


activities are performed by a Police Station.

4) Sharing of case details with PS in other states is needed.

5) The magistrate should be able to access the case details and

provide/deny the arrest warrant.

6) Citizens should be able to apply for various licenses like Arms, loud

speaker, Hotel/lodge, browsing centre, mass meetings etc., and the


officer should be able to approve/reject which will be notified to the
applicant via SMS and Mail

14
HARDWARE SPECIFICATION

The above Hardware specifications were used in both Server and


Client machines when developing.

Processor : Pentium 4
Processor Speed : 2.5 GHz
Ram : 512 MB
Hard Disk Drive : 80GB
Floppy Disk Drive : Sony
CD-ROM Drive : Sony
Monitor : 17” inches
Keyboard : TVS Gold
Mouse : Logitech

15
SOFTWARE SPECIFICATION

SERVER:

Operating System : Windows 2000 Server and above versions

Technology Used : J2EE

Database : Sql Server 2005

Database Connectivity : ActiveX Data Object (ADO)

Web Server : Internet Information Server

Browser : Internet Explorer 6.0

CLIENT:

Operating System : Windows 2000 Server

Browser : Internet Explorer 6.0

16
ABOUT SOFTWARE

What is a Web Site?

A Web site is a location on a computer network that makes information

in the form of pages or documents available to visitors reaching the site

with browser software. The computer network can be the worldwide

Internet, or an intranet, a local network linking all the computers in your

office. The information can be published in the form of HTML pages, or

in other document formats. To view the information available on the site,

visitors use browser software programs, such as Microsoft® Internet

Explorer, which translate HTML pages on Web sites to text and graphics

on their monitors.

If you are already sharing documents across your intranet with your co-

workers, why do you need a Web site? To share documents on your

network, co-workers must have the same software program on their

computers as you used to create the document.

In addition, there can be operating-system differences that make it

impossible for a computer with one kind of operating system to retrieve a

document across the network from a computer with a different operating

system. If you convert the document to HTML and publish it on your

17
Web site, then visitors are not required to have the same software

program used to create the document to view its content, or the same

operating system.

Although PWS uses the same technology to host Web sites as the Web

servers at large sites such as www.microsoft.com, PWS has very limited

capacity. PWS is suitable for personal publishing on corporate intranets.

The 10-connection limit of PWS means that it can support no more than

two or three visitors at a time, so it is not suitable for direct Internet

publishing. However, you can develop your site on PWS, including items

such as complex Web applications, and test thoroughly before sending

your site to an ISP for hosting.

PWS can be installed on a computer running either Microsoft®

Windows® 95 or later, or Microsoft® Windows NT® Workstation 4.0 or

later operating system. Microsoft Internet Explorer 4.01 is also required.

PWS can be the solution to a number of information-sharing needs. This

section contains three situations describing how PWS can be used as an

intranet Web server or a development and staging platform. We hope

these scenarios spark your imagination and provide you with ideas for

solutions to your unique needs.

18
These scenarios are included:

• Simple Document Solution

• Custom Information Exchange Solution

• Web Application Testing Solution

19
About Software

J2EE Architecture

The JavaTM 2 SDK, Enterprise Edition (J2EE SDK) is the reference


implementation provided by Sun Microsystems, Inc. The following figure shows the
major elements of the architecture for the J2EE SDK:

FIGURE 1-2 J2EE Architecture

J2EE Server

The J2EE server provides the following services:

20
• Naming and Directory - allows programs to locate services and components
through the Java Naming and Directory InterfaceTM (JNDI) API

• Authentication - enforces security by requiring users to log in

• HTTP - enables Web browsers to access servlets and JavaServer PagesTM (JSP)
files

• EJB - allows clients to invoke methods on enterprise beans

Web Container

The Web container is a runtime environment for JSP files and


servlets. Although these Web components are an important part of a J2EE application,
this manual focuses on enterprise beans. For more information on developing Web
components, see the home pages for the JavaServer PagesTM and Java Servlet
technologies.

Java Server Pages

Java Server(TM) Pages is a simple, yet powerful technology for


creating and maintaining dynamic-content web pages. Based on the Java programming
language, Java Server Pages offers proven portability, open standards, and a mature re-
usable component model.

The Java Server Page architecture enables the separation of content


generation from content presentation. This separation not only eases maintenance
headaches, it also allows web team members to focus on their areas of expertise. Now,
web page designers can concentrate on layout, and web application designers on
programming, with minimal concern about impacting each other's work.

The rest of this document gives you the bigger picture:

21
• Portability
• Composition
• Processing
• Access Models

Portability
Java Server Pages files can be run on any web server or web-
enabled application server that provides support for them. Dubbed the JSP engine, this
support involves recognition, translation, and management of the JavaServer Page
lifecycle and its interactions with associated components.

The JSP engine for a particular server might be built-in or might be


provided through a 3rd-party add-on. As long as the server on which you plan to execute
the Java Server Pages supports the same specification level as that to which the file was
written, no changes should be necessary as you move your files from server to server.
Note, however, that instructions for the setup and configuration of the files may differ
between files.

To date, there has been no upwards- or backwards-compatibility


between Java Server Page specifications. A Java Server Page file written to the 0.92
specifications can be run only on a server supporting Java Server Page 0.92. The same
file could not run on a server supporting only Java Server Page 1.0 or Java Server Page
0.91.

Composition

It was mentioned earlier that the Java Server Pages architecture can include reusable
Java components. The architecture also allows for the embedding of a scripting language
directly into the Java Server Page file.

22
The components current supported include Java Beans, and
Servlets. Support for Enterprise Java Beans components will likely be added in a future
release. As the default scripting language, Java Server Pages use the Java programming
language. This means that scripting on the server side can take advantage of the full set of
capabilities that the Java programming language offers. Support for other scripting
languages might become available in the future.

Processing

A Java Server Page file is essentially HTML document with JSP scripting or tags. It may
have associated components in the form of .class, .jar, or .ser files--or it may not. The use
of components is not required.

The Java Server Page file has a .jsp extension to identify it to the server as a Java
Server Pages file. Before the page is served, the Java Server Pages syntax is parsed and
processed into a servlet on the server side. The servlet that is generated outputs real
content in straight HTML for responding to the client. Because it is standard HTML, the
dynamically generated response looks no different to the client browser than a static
response.

Access Models

A Java Server Pages file may be accessed in at least two different ways:

1. A client request comes directly into a Java Server Page.

23
In this scenario, suppose the page accesses reusable Java Bean
components that perform particular well-defined computations like accessing a database.
The results of the Bean’s computations, called result sets are stored with in the Bean as
properties. The page uses such Beans to generate dynamic content and present it back to
the client.

2. A request comes through a servlet.

The servlet generates the dynamic content. To handle the response to the client,
the servlet creates a Bean and stores the dynamic content (sometimes called the result set)
in the Bean. The servlet then invokes a Java Server Page that will present the content
along with the Bean containing the generated from the servlet.

There are two APIs to support this model of request processing using Java Server
Pages. One API facilitates passing context between the invoking servlet and the Java
Server Page. The other API lets the invoking servlet specify which Java Server Page to
use.

In both of the above cases, the page could also contain any valid Java code. The
Java Server Pages architecture encourages separation of content from presentation--it
does not mandate it.

How to Choose Between Access Models

24
With at least two access models, the question naturally arises "When does it make
sense to have a Java Server Page as the front-end to a servlet, as the back-end to a servlet,
or use only the servlet? Here are some possible guidelines:

• If a graphical interface (GUI) is necessary to collect the request data--use a Java


Server Pages file.
• If the request and request parameters are otherwise available to the servlet, but the
results of the servlet processing requires a graphical interface to present them--
use a Java Server Pages file.
• If presentation layout is minimal (will not require very many println lines in your
servlet code) and you don't need to make that presentation logic available to a
customer or your web page designer, then a Servlet might suffice.

Enterprise Beans

Enterprise beans are server components written in the Java programming


language. Enterprise beans contain the business logic for your application. For example, a
check book client might invoke the debit and credit methods of an account enterprise
bean.
There are two types of enterprise beans: session beans and entity beans.
Session Beans

A session bean represents a client in the J2EE server. A client communicates with
the J2EE server by invoking the methods that belong to an enterprise bean. For example,
an online shopping client might invoke the enter Order method of its session bean to
create an order. A session bean converses with the client, and can be thought of as an
extension of the client. Each session bean can have only one client. When the client
terminates, its corresponding session bean also terminates. Therefore, a session bean is
transient, or non-persistent.

Entity Beans

25
An entity bean represents a business object in a persistent storage mechanism
such as a database. For example, an entity bean could represent a customer, which might
be stored as a row in the customer table of a relational database. An entity bean's
information does not have to be stored in a relational database. It could be stored in an
object database, a legacy application, a file, or some other storage mechanism. The type
of storage mechanism depends on the particular implementation of EJB technology.
The reference implementation (J2EE SDK) uses a relational database. See the
section "Database Access" for more information.
The persistence of an entity bean can be managed by either the entity bean itself, or by
the EJB container. Bean-managed persistence requires you to write the data access code
in the Bean. For example, a customer entity bean would include the SQL commands to
access a relational database via JDBC. Container-managed persistence means that the
EJB container handles the data access calls automatically.

Comparing Session and Entity Beans

Although both session and entity beans run in an EJB container, they are quite different.
The following table contrast session and entity beans:

TABLE 1-1 Differences Between Session and Entity Beans

Session Bean Entity Bean

Purpose Represents a business entity object that


Performs a task for a client.
exists in persistent storage.

Shared
May have one client. May be shared by multiple clients.
Access

Not persistent. When the client Persistent. Even when the EJB
Persistence terminates its session bean is no container terminates, the entity state

longer available. remains in a database.

26
The flexibility of the EJB architecture allows you to build applications in a variety
of ways. The following illustration shows how you might create an online shopping
application with both session and entity beans. An HTML form displayed in a Web
browser accesses a servlet in a Web container. The servlet is the client of a shopping
session bean. When the HTML forms needs to find a product or enter an order, it
instructs the servlet to call the appropriate business methods in the session bean. The
session bean is the client of the order, product, and customer entity beans. Because Entity
beans are persistent, their state is stored in the database.

27
FIGURE 1-3 Using Session and Entity Beans
Java BeansTM Components and Enterprise Beans

JavaBeans components and enterprise beans are not the same. Although both
components are written in the Java programming language, they are not
interchangeable. JavaBeans components define a convention for making a Java class
instance customizable by design tools, allowing the tools to link these customized
objects via events. Enterprise beans implement multi-user, transactional services.

28
Programming Restrictions for Enterprise Beans
Enterprise beans make use of the services provided by the EJB container, such as
life-cycle management. To avoid conflicts with these services, enterprise beans are
restricted from performing certain operations:

• Managing or synchronizing threads

• Accessing files or directories with the java.io package

• Using AWT functionality to display information or to accept information from a


keyboard

• Listening on a socket, accepting connections on a socket, or using a socket for


multicast

• Setting a socket factory used by Server Socket, Socket, or the stream handler
factory used by the URL class

• Loading a native library

Database Access

The Enterprise Java Beans specification does not require an implementation to


support a particular type of database. Therefore, the databases supported by different
J2EE implementations may vary. See the Release Notes for a list of the databases
currently supported by the J2EE SDK.

29
Both session and entity beans can access a database. The type of enterprise bean
you choose depends on your application. You might want to include SQL calls in a
session bean under the following circumstances:

• The application is relatively simple.

• The data returned by the SQL call will not be used by multiple clients.

• The data does not represent a business entity.

You should probably access a database from an entity bean if any of the following
conditions are true:

• More than one client will use the data returned by the database call.

• The data represents a business entity.

• You want to hide the relational model from the session bean.

SQL SERVER 2005

INTRODUCTION
Microsoft SQL Server is a client/server relational database system. What exactly
is a client/server relational database system? The best way to explain it is to define it in
two parts, the client /server part, and the relational database system part.

30
Client/server, also referred to as distributed computing, means that all of the
data processing of a program does not occur on a single computer, as it often does on
desktop, mini-or mainframe-based computer systems. Instead, different parts of the SQL
Server application run on two or more computers at the same time. Multiple SQL Server
database, along with thousands of clients, can all be designed to work together, scaling to
virtually any size.
Major Features Of SQL Server
SQL Server offers database administrators and SQL developers virtually every
tool they need to create and manage a complete enterprise –wide management system.
This section takes a look at some of the most important features of SQL Server7.0. For a
complete description of all the features, you will have to read the entire book.
SQL Server Fundamentals
When people think of SQL Server, they often have different pictures in their
heads of what SQL Server really is. Some people think of it as a database. Others think if
it is as a physically server. And others think of the BackOffice product sold by Microsoft.

SQL Server Management Tools


SQL Server includes a wide variety of client _ based administrative tools that
can be used to manage SQL Server. During the installation process, you can load as few
or as many of the Management tools as you think you need. SQL Server provider you
with these options:
SQL Server Enterprise Manager:
If you want to remotely manage SQL Server, then installing the SQL Server
Enterprise Manager onto your workstation is necessary. This program allows the DBA to
perform virtually any SQL Server administrative task.
SQL Server Query Analyzer
This tool is used to manually send transact-SQL statements and stored
procedures to the SQL Server database engine. You will probably want to load this on
most, if not all remote management workstations. This is a tool you may want to load

31
onto SQL Server developer’s desktops, as it gives developers direct access to SQL Server
so they can run interactive Transact-SQL statements and SQL scripts.
SQL Server profiler
This tool is used to monitor and record SQL Server database activity between SQL
Server and clients. Only load this tool on workstations that perform this task.

Database

A database is similar to a data file in that it is a storage place for data. Like a data
file, a database does not present information directly to a user; the user runs an
application that accesses data from the database and presents it to the user in an
understandable format.

When working with data files, an application must be coded to work with the
specific structure of each data file. In contrast, a database contains a catalog that
applications use to determine how data is organized. Generic database applications
can use the catalog to present users with data from different databases dynamically,
without being tied to a specific data format.

A database typically has two main parts: first, the files holding the physical
database and second, the database management system (DBMS) software that
applications use to access data. The DBMS is responsible for enforcing the database
structure, including:

• Maintaining relationships between data in the database.

• Ensuring that data is stored correctly and that the rules defining data
relationships are not violated.

• Recovering all data to a point of known consistency in case of system


failures.

Relational Database

32
Although there are different ways to organize data in a database, relational
databases are one of the most effective. Relational database systems are an
application of mathematical set theory to the problem of effectively organizing data.
In a relational database, data is collected into tables (called relations in relational
theory).

A table represents some class of objects that are important to an organization. For
example, a company may have a database with a table for employees, another table
for customers, and another for stores. Each table is built of columns and rows (called
attributes and topples in relational theory). Each column represents some attribute of
the object represented by the table. For example, an Employee table would typically
have columns for attributes such as first name, last name, employee ID, department,
pay grade, and job title. Each row represents an instance of the object represented by
the table. For example, one row in the Employee table represents the employee who
has employee ID 12345.

When organizing data into tables, you can usually find many different ways to
define tables. Relational database theory defines a process called normalization,
which ensures that the set of tables you define will organize your data effectively.

Scalable

SQL Server 2000 supports having a wide range of users access it at the same
time. An instance of SQL Server 2000 includes the files that make up a set of
databases and a copy of the DBMS software. Applications running on separate
computers use a SQL Server 2000 communications component to transmit commands
over a network to the SQL Server 2000 instance. When an application connects to an
instance of SQL Server 2000, it can reference any of the databases in that instance
that the user is authorized to access. The communication component also allows
communication between an instance of SQL Server 2000 and an application running

33
on the same computer. You can run multiple instances of SQL Server 2000 on a
single computer.

Although SQL Server 2000 is designed to work as the data storage engine for
thousands of concurrent users who connect over a network, it is also capable of
working as a stand-alone database directly on the same computer as an application.
The scalability and ease-of-use features of SQL Server 2000 allow it to work
efficiently on a single computer without consuming too many resources or requiring
administrative work by the stand-alone user. The same features allow SQL Server
2000 to dynamically acquire the resources required to support thousands of users,
while minimizing database administration and tuning. The SQL Server 2000
relational database engine dynamically tunes itself to acquire or free the appropriate
computer resources required to support a varying load of users accessing an instance
of SQL Server 2000 at any specific time. The SQL Server 2000 relational database
engine has features to prevent the logical problems that occur if a user tries to read or
modify data currently used by others.

Structured Query Language

To work with data in a database, you have to use a set of commands and
statements (language) defined by the DBMS software. Several different languages
can be used with relational databases; the most common is SQL. The American
National Standards Institute (ANSI) and the International Standards Organization
(ISO) define software standards, including standards for the SQL language. SQL
Server 2000 supports the Entry Level of SQL-92, the SQL standard published by
ANSI and ISO in 1992. The dialect of SQL supported by Microsoft SQL Server is
called Transact-SQL (T-SQL). T-SQL is the primary language used by Microsoft
SQL Server applications.

Extensible Markup Language

XML is the emerging Internet standard for data. XML is a set of tags that can be
used to define the structure of a hypertext document. XML documents can be easily

34
processed by the Hypertext Markup Language, which is the most important language
for displaying Web pages.

Although most SQL statements return their results in a relational, or tabular,


result set, the SQL Server 2000 database component supports a FOR XML clause that
returns results as an XML document. SQL Server 2000 also supports XPath queries
from Internet and intranet applications. XML documents can be added to SQL Server
databases, and the OPENXML clause can be used to expose data from an XML
document as a relational result set.

Overview of the SQL Server Tools

Microsoft® SQL Server™ 2000 includes many graphical and command prompt
utilities that allow users, programmers, and administrators to:

• Administer and configure SQL Server.

• Determine the catalog information in a copy of SQL Server.

• Design and test queries for retrieving data.

• Copy, import, export, and transform data.

• Provide diagnostic information.

• Start and stop SQL Server.

In addition to these utilities, SQL Server contains several wizards to walk


administrators and programmers through the steps needed to perform more complex
administrative tasks.

INTRODUCTION TO VBSCRIPT

35
VBScript brings professional programming techniques to
HTML web documents. With VBScript, we can create documents and
applications that previously could only have been made available as a
desktop program written with something like Visual Basic. It gives us the
ability to interact with and manipulate HTML documents directly from
the browser. With VBScript, we can even interact with and manipulate
the browser it, sending it instructions from our VBScript program, and
pulling in its variables for our own use.

Above all, VBScript brings to us true client-side processing, so


let's briefly look at some of the main uses of VBScript:

• Reference and manipulate document objects

• Reference and manipulate the browser

• Reference the contents of another loaded document or documents

• Create a document "on the fly" from the browser

• Store, reference, and manipulate data input by the user

• Store, reference, and manipulate data downloaded from the server

• Perform calculations on data

• Display messages to the user

• Access cookies easily

• Reference and manipulate a wide range of "add-on" components,


both ActiveX controls and Java applets

36
• Display two-dimensional HTML

VBScript not only supports the standard document objects, it also

allows us to attach events to these objects. To put this another way, when

the user or another part of our program interacts in some way with a

particular object, like a command button, the browser can automatically

run a particular routine within our program. For example, if the user

clicks on a certain button or moves away from a text box, an "event" is

fired that causes a particular routine to execute

In Valid

Home Login
Authenticate

Valid

Admin A

Detectives D

Police Officer P
DATA FLOW DIAGRAM:

Magistrate M

37

Citizen C
38
A

Add New Branchdetail


Police Station Branch

Modify
Branch

If Appoint
New Officer is No
Officer Appointmen PoliceInfo
Appointment t Branch

If Appoint is yes

Transferring
Officer TransferInfo

Reports

View Branch Brachdetail


Information

View Officer
Information PoliceInfo

View
Transferring
Officer TransferInfo
Information

39
C

Id, Name, Date Complain


Complaint Form t Complaints
Crime type Registere
d

License Apply License License


Apply

Security Security
Security Form Apply

Complaints

Verify the
D Detectives
complaint

Reports

40
P Fir Details Fir Apply Fir Data

Arrest warrant Insert Arrest warrant

License

License Accept or
Reject

License Report

Arrest warrant

M Magistrate Accept or
Reject

Arrest warrant

41
DATABASE STRUCTURE
Browsing Centre

TableName:Bcentre

Field Name Data Type Size


Aid numeric 5
Aname varchar 30
Ltype varchar 30
State varchar 30
City varchar 30
Address varchar 50
Ipaddress varchar 40
Licenseno numeric 5
Status varchar 20

TableName:Branchdetails

FieldName DataType Size


Branchid varchar 10
Branchname varchar 50
State varchar 50
City varchar 40
area1 varchar 30
area2 varchar 30
area3 varchar 30
Pincode varchar 10
Phoneno varchar 10

42
Complaints

TableName:Complaints

FieldName DataType Size


Compid(primary numeric 5
key)
Comdate datetime 8
Name varchar 20
Gender varchar 20
State varchar 20
City varchar 30
area1 varchar 40
Pincode varchar 10
Phoneno varchar 10
Emailed varchar 30
Crimetype varchar 40
Crimedate datetime 8
Reason varchar 60
Branched varchar 10
Status varchar 20
CriminalInformation

TableName:Criminalinfo

FieldName DataType Size


Id numeric 5
Cname varchar 20
State varchar 20 FirDetails
City varchar 20
Address varchar 20
Age numeric 5
Phoneno numeric 9
ident1 varchar 20
ident2 varchar 20
Date datetime 8
Caseno varchar 20
Casedetails varchar 40
Photo varchar 60
TableName:Firdetails

43
FiledName DataType Size
Comid numeric 5
Branchid varchar 20 LicenseDetails
Name varchar 20
State varchar 20
City varchar 20
Area varchar 20
Crimetype varchar 40
Crimedate datetime 8
Cname varchar 20
Cstate varchar 20
Ccity varchar 20
Address varchar 30
Age numeric 5
Phoneno numeric 9
Status varchar 50
TableName:Licensedet

FieldName DataType Size


Name varchar 20
Gender varchar 10
Age numeric 5
Regdate datetime 8
Licensetype varchar 20
State varchar 30
City varchar 30
Area varchar 40
Pincode varchar 10
Phoneno varchar 10
Emailed varchar 50
proof1 varchar 50
proof2 varchar 50
Status varchar 10
Aid(Primary Key) numeric 9

44
LoudSpeakerInformation

TableName:Loudspeakerinfo

FieldName DataType Size


Aid(Primary Key) numeric 5
Aname varchar 20
Ltype varchar 20
Address varchar 50
Reason varchar 100
Noofspeaker numeric 5
Ldate datetime 8
Noofdays numeric 5
Licenseno numeric 9
Status varchar 10

MeetingInformation

TableName:Meetinginfo

FieldName DataType Size


Aid(Primary Key) numeric 5
Aname varchar 20
Ltype varchar 20
Mtype varchar 20
Address varchar 50
Fromplace varchar 40
Toplace varchar 40 PoliceInformation
Reason varchar 100
Noofper numeric 5
Pmeet varchar 10
Leader varchar 40
Lnumber numeric 9
Status varchar 50
Mdate datetime 8
Noofdays numeric 5

TableName:Policeinfo

45
FieldName DataType Size
Regno(Primary Key) numeric 5
Pname varchar 30 RequestTable
Address varchar 30
Age numeric 5 TableName
Dob datetime 8 :Requesttable
Qualification varchar 20
Applieddist varchar 30
Department varchar 20
FieldName
Posting DataType
varchar Size
30
Comid
Aid numeric
numeric 55
Branchid
District varchar
varchar 10
30
Rdate
State datetime
varchar 830
Adate
Branchid datetime
varchar 820
Status
Doa varchar
datetime 20
8
Appointed varchar 10

SecurityDetails

TableName:Securitydet

FieldName DataType Size


Name varchar 20
Gender varchar 10
Age numeric 5
Regdate datetime 8
Secdate datetime 8
Noofdays numeric 5
State varchar 30
City varchar 30
Area varchar 40
Pincode varchar 10
Phoneno varchar 10
Emailed varchar 50
proof1 varchar 50
proof2 varchar 50
Reason varchar 4660
Status varchar 10
TransferInformation

TableName:Transferinfo

FieldName DataType Size


Aid numeric 5
Pname varchar 20
Address varchar 40
Fstate varchar 50
Fdistrict varchar 30
Fdept varchar 20
Fbranch varchar 40
Posting varchar 30
Appointdt datetime 8
Dot datetime 8
Tostate varchar 40
Todistrict varchar 30
Tobranch varchar 30
Todept varchar 30
Toposting varchar 30

47
CODE DESIGN

HOME.aspx.cs

using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;

public partial class _Default : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{

}
protected void Login1_Authenticate(object sender,
AuthenticateEventArgs e)
{
if (Login1.UserName == "Admin" && Login1.Password == "Admin")
Response.Redirect("adminhome.aspx");
else if (Login1.UserName == "Police" && Login1.Password ==
"Police")
Response.Redirect("policehome.aspx");
else if (Login1.UserName == "Citizen" && Login1.Password ==
"Citizen")
Response.Redirect("citizenhome.aspx");
else if (Login1.UserName == "Detectives" && Login1.Password ==
"Detectives")
Response.Redirect("detectivehome.aspx");
else if (Login1.UserName == "Magistrate" && Login1.Password ==
"Magistrate")
Response.Redirect("magistratehome.aspx");
}
}

48
POLICE REGISTRATION :

using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.OleDb;

public partial class policeregistrationform : System.Web.UI.Page


{
OleDbConnection con;
OleDbCommand cmd;
OleDbDataReader rs;
protected void Page_Load(object sender, EventArgs e)
{
con = (OleDbConnection)Application.Get("conn");
if (!Page.IsPostBack)
{
DropDownList1.Items.Insert(0, "Select");
DropDownList3.Items.Insert(0, "Select");
for (int i = 1; i <= 31; i++)
DropDownList1.Items.Add(i.ToString());
for (int i = 1980; i <= 2010; i++)
DropDownList3.Items.Add(i.ToString());
shownumber();

}
void shownumber()
{
cmd = new OleDbCommand("select isnull(max(regno),0)+1 from
policeinfo", con);
rs = cmd.ExecuteReader();
if(rs.Read ())
TextBox1.Text =rs[0].ToString ();
rs.Close ();
cmd.Dispose ();

}
protected void Button1_Click(object sender, EventArgs e)
{
try
{
string s = DropDownList1.SelectedItem.Text + "-" +
DropDownList2.SelectedItem.Text + "-" + DropDownList3.SelectedItem.Text;

49
cmd = new OleDbCommand("insert into
policeinfo(regno,pname,address,age,dob,qualification,applieddist,depart
ment,posting,appointed) values(?,?,?,?,?,?,?,?,?,?)", con);
cmd.Parameters.AddWithValue("rno", TextBox1.Text);
cmd.Parameters.AddWithValue("name", TextBox2.Text);
cmd.Parameters.AddWithValue("address", TextBox3.Text);
cmd.Parameters.AddWithValue("age", TextBox4.Text);
cmd.Parameters.AddWithValue("dob", s);
cmd.Parameters.AddWithValue("qualification", TextBox5.Text);
cmd.Parameters.AddWithValue("applieddist",
DropDownList5.SelectedItem.Text);
cmd.Parameters.AddWithValue("department",
dept.SelectedItem.Text);
cmd.Parameters.AddWithValue("posting",
DropDownList4.SelectedItem.Text);
cmd.Parameters.AddWithValue("appointed", "No");
cmd.ExecuteNonQuery();
cmd.Dispose();
Label1.Text = "Your Information Registered....";
}
catch (Exception ex)
{
Label1.Text = ex.ToString();
}

}
protected void Button2_Click(object sender, EventArgs e)
{
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text ="";
TextBox5.Text = "";

DropDownList1.SelectedIndex = 0;
DropDownList2.SelectedIndex = 0;
DropDownList3.SelectedIndex = 0;
DropDownList4.SelectedIndex = 0;
DropDownList5.SelectedIndex = 0;
shownumber();
}
}

50
COMPLAINTS DETAILS

using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.OleDb;

public partial class complaintdetails : System.Web.UI.Page


{
OleDbConnection con;
OleDbCommand cmd;
OleDbDataReader rs;
string bid;
protected void Page_Load(object sender, EventArgs e)
{
Label1.Visible = false;
TextBox2.Text = DateTime.Now.ToShortDateString();
con = (OleDbConnection)Application.Get("conn");
if (!Page.IsPostBack)
{
DropDownList4.Items.Insert(0, "Select");
DropDownList6.Items.Insert(0, "Select");
binddata();
for (int i = 1; i <= 31; i++)
DropDownList4.Items.Add(i.ToString());
for (int i = 2007; i <= 2020; i++)
DropDownList6.Items.Add(i.ToString());
}

}
void binddata()
{
cmd = new OleDbCommand("select isnull(max(compid),0)+1 from
complaints", con);
rs = cmd.ExecuteReader();
if (rs.Read())
TextBox1.Text = rs[0].ToString();
}
protected void Button1_Click(object sender, EventArgs e)
{
try
{
Label1.Visible = true ;

string s = DropDownList4.SelectedItem.Text + "-" +


DropDownList5.SelectedItem.Text + "-" + DropDownList6.SelectedItem.Text;
cmd = new OleDbCommand("select branchid from branchdetails
where (area1=? or area2=? or area3=?) and city=?", con);

51
cmd.Parameters.AddWithValue("area1", TextBox4.Text);
cmd.Parameters.AddWithValue("area2", TextBox4.Text);
cmd.Parameters.AddWithValue("area3", TextBox4.Text);
cmd.Parameters.AddWithValue("city",
DropDownList2.SelectedItem .Text);
rs = cmd.ExecuteReader();
if (rs.Read())
bid = rs[0].ToString();
rs.Close();
cmd.Dispose();

cmd = new OleDbCommand("insert into complaints


values(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?)", con);
cmd.Parameters.AddWithValue("id", TextBox1.Text);
cmd.Parameters.AddWithValue("date", TextBox2.Text);
cmd.Parameters.AddWithValue("name", TextBox3.Text);
cmd.Parameters.AddWithValue("gender",
RadioButtonList1.SelectedItem.Text);
cmd.Parameters.AddWithValue("state",
DropDownList1.SelectedItem.Value);
cmd.Parameters.AddWithValue("city",
DropDownList2.SelectedItem.Value);
cmd.Parameters.AddWithValue("area", TextBox4.Text);

cmd.Parameters.AddWithValue("pincode", TextBox5.Text);
cmd.Parameters.AddWithValue("emailid", TextBox6.Text);
cmd.Parameters.AddWithValue("crimetype", TextBox7.Text);
cmd.Parameters.AddWithValue("type",
DropDownList3.SelectedItem.Value);
cmd.Parameters.AddWithValue("date",s );
cmd.Parameters.AddWithValue("reason", TextBox8.Text);
cmd.Parameters.AddWithValue("branchid", bid);
cmd.Parameters.AddWithValue("status", "No");
cmd.ExecuteNonQuery();
Label1.Text = "You Complaints has been Registered..and you
can see your status in your mail or mobile..";
}
catch (Exception ex)
{
Label1.Visible = true;
Label1.Text = ex.Message;
}
}
protected void Button2_Click(object sender, EventArgs e)
{
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
TextBox6.Text = "";
TextBox7.Text = "";
TextBox8.Text = "";
TextBox8.Text = "";
DropDownList1.SelectedIndex = 0;
DropDownList2.SelectedIndex = 0;

52
DropDownList3.SelectedIndex = 0;
DropDownList4.SelectedIndex = 0;
DropDownList5.SelectedIndex = 0;
DropDownList6.SelectedIndex = 0;
RadioButtonList1.SelectedIndex = 0;
binddata();

protected void DropDownList1_SelectedIndexChanged(object sender,


EventArgs e)
{
if (DropDownList1.SelectedItem.Text == "TamilNadu")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Chennai");
DropDownList2.Items.Add("Madurai");
DropDownList2.Items.Add("Trichy");
DropDownList2.Items.Add("Kovai");
DropDownList2.Items.Add("");

}
else if (DropDownList1.SelectedItem.Text == "Kerala")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Palkad");
DropDownList2.Items.Add("Eduki");
DropDownList2.Items.Add("Kolikod");
DropDownList2.Items.Add("Thiruvanandapuram");

}
else if (DropDownList1.SelectedItem.Text == "Andra")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Tirupathi");
DropDownList2.Items.Add("Kundoor");
DropDownList2.Items.Add("Visagapatinam");
DropDownList2.Items.Add("Ellor");

}
else if (DropDownList1.SelectedItem.Text == "Karnadaga")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Bangalore");
DropDownList2.Items.Add("Charmina");
DropDownList2.Items.Add("Belgaum");
DropDownList2.Items.Add("Belari");

} }
}

53
REQUEST FOR ARREST WARRANT:

using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.OleDb;

public partial class requestforarrestwarrent : System.Web.UI.Page


{
OleDbConnection con;
OleDbDataAdapter adp;
DataSet ds;
OleDbCommand cmd;
OleDbDataReader rs;
protected void Page_Load(object sender, EventArgs e)
{
con = (OleDbConnection)Application.Get("conn");
Label1.Visible = false;

}
void bindgrid()
{
try
{
cmd = new OleDbCommand("select
comid,name,state,city,area,crimetype,crimedate,cname,cstate,ccity,addre
ss,age,phoneno,status from firdetails where state=? and city=? and
branchid=? and status is null ", con);
cmd.Parameters.AddWithValue("state",
DropDownList1.SelectedItem.Text);
cmd.Parameters.AddWithValue("city",
DropDownList2.SelectedItem.Text);
cmd.Parameters.AddWithValue("branchid",
DropDownList3.SelectedItem.Text);
adp = new OleDbDataAdapter(cmd);
ds = new DataSet();
adp.Fill(ds, "table1");
GridView1.DataSource = ds.Tables[0];
GridView1.DataBind();
cmd.Dispose();
}
catch (Exception ex)
{
Label1.Visible = true;
Label1.Text = ex.ToString();
}
}

54
protected void GridView1_PageIndexChanging(object sender,
GridViewPageEventArgs e)
{
GridView1.PageIndex = e.NewPageIndex;
bindgrid();
}
protected void DropDownList1_SelectedIndexChanged(object sender,
EventArgs e)
{
if (DropDownList1.SelectedItem.Text == "TamilNadu")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Chennai");
DropDownList2.Items.Add("Madurai");
DropDownList2.Items.Add("Trichy");
DropDownList2.Items.Add("Kovai");

}
else if (DropDownList1.SelectedItem.Text == "Kerala")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Palkad");
DropDownList2.Items.Add("Eduki");
DropDownList2.Items.Add("Kolikod");
DropDownList2.Items.Add("Thiruvanandapuram");

}
else if (DropDownList1.SelectedItem.Text == "Andra")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Tirupathi");
DropDownList2.Items.Add("Kundoor");
DropDownList2.Items.Add("Visagapatinam");
DropDownList2.Items.Add("Ellor");

}
else if (DropDownList1.SelectedItem.Text == "Karnadaga")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Bangalore");
DropDownList2.Items.Add("Charmina");
DropDownList2.Items.Add("Belgaum");
DropDownList2.Items.Add("Belari");

}
}
protected void DropDownList2_SelectedIndexChanged(object sender,
EventArgs e)
{
cmd = new OleDbCommand("select distinct(branchid) from
firdetails where state=? and city=?", con);

55
cmd.Parameters.AddWithValue("state",
DropDownList1.SelectedItem.Text);
cmd.Parameters.AddWithValue("city",
DropDownList2.SelectedItem.Text);
rs = cmd.ExecuteReader();
DropDownList3.DataSource = rs;
DropDownList3.DataTextField = "branchid";
DropDownList3.DataBind();
rs.Close();
cmd.Dispose();
DropDownList3.Items.Insert(0, "SelectId");

}
protected void DropDownList3_SelectedIndexChanged(object sender,
EventArgs e)
{
bindgrid();

protected void GridView1_RowCommand(object sender,


GridViewCommandEventArgs e)
{

try
{
if (e.CommandName == "select")
{
LinkButton l1 = (LinkButton)e.CommandSource;
cmd = new OleDbCommand("update firdetails set
status='Request' where comid=?", con);
cmd.Parameters.AddWithValue("comid", l1.Text);
cmd.ExecuteNonQuery();
cmd.Dispose();
cmd = new OleDbCommand("insert into
requesttable(comid,branchid,rdate) values(?,?,?)", con);
cmd.Parameters.AddWithValue("comid", l1.Text);
cmd.Parameters.AddWithValue("branchid",
DropDownList3.SelectedItem.Text);

cmd.Parameters.AddWithValue("rdate",DateTime.Now.ToStri
ng());
cmd.ExecuteNonQuery();
cmd.Dispose();

bindgrid();
}
}
catch (Exception ex)
{
Label1.Visible = true;
Label1.Text = ex.ToString();}}}

56
SECURITY DETAILS:

using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.OleDb;

public partial class secutirydetails : System.Web.UI.Page


{
OleDbConnection con;
OleDbCommand cmd;
OleDbDataReader rs;
protected void Page_Load(object sender, EventArgs e)
{
con = (OleDbConnection)Application.Get("conn");
TextBox3.Text = DateTime.Now.ToShortDateString();
if (!Page.IsPostBack)
{
maxnumber();
DropDownList3.Items.Insert(0, "Select");
DropDownList5.Items.Insert(0, "Select");
for (int i = 1; i <= 31; i++)
DropDownList3.Items.Add(i.ToString());
for (int i = 2009; i <= 2020; i++)
DropDownList5.Items.Add(i.ToString());
}

}
void maxnumber()
{
cmd = new OleDbCommand("select isnull(max(aid),0)+1 from
securitydet", con);
rs = cmd.ExecuteReader();
if (rs.Read())
aid.Text = rs[0].ToString();
rs.Close();
cmd.Dispose();
}
protected void Button1_Click(object sender, EventArgs e)
{
try
{

string s = DropDownList3.SelectedItem.Text + "-" +


DropDownList4.SelectedItem.Text + "-" + DropDownList5.SelectedItem.Text;
cmd = new OleDbCommand("insert into securitydet
values(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?)", con);
cmd.Parameters.AddWithValue("id", aid.Text);

57
cmd.Parameters.AddWithValue("name",TextBox1.Text );
cmd.Parameters.AddWithValue("gender",RadioButtonList1.Selec
tedItem.Text );
cmd.Parameters.AddWithValue("Age",TextBox2.Text );
cmd.Parameters.AddWithValue("rdate",TextBox3.Text );
cmd.Parameters.AddWithValue("sdate",s);
cmd.Parameters.AddWithValue("ndays",TextBox4.Text );

cmd.Parameters.AddWithValue("state",DropDownList1.SelectedI
tem.Text );
cmd.Parameters.AddWithValue("city",
DropDownList2.SelectedItem.Text);
cmd.Parameters.AddWithValue("area", TextBox5.Text);

cmd.Parameters.AddWithValue("pcode",TextBox6.Text );
cmd.Parameters.AddWithValue("pno",TextBox7.Text );
cmd.Parameters.AddWithValue("emilid",TextBox8.Text );
cmd.Parameters.AddWithValue("proof1",RadioButtonList2.Selec
tedItem.Text );
cmd.Parameters.AddWithValue("proof2",RadioButtonList3.Selec
tedItem.Text );
cmd.Parameters.AddWithValue("reason",TextBox9.Text );
cmd.Parameters.AddWithValue("status", "No");
cmd.ExecuteNonQuery();
cmd.Dispose();
Label1.Text = " Security Details Registered... and you can
see your status in your mail or mobile..";
}
catch (Exception ex)
{
Label1.Text = ex.ToString();
}

}
protected void Button2_Click(object sender, EventArgs e)
{
TextBox1.Text = "";
TextBox2.Text = "" ;
// TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
TextBox6.Text = "";
TextBox7.Text = "";
TextBox8.Text = "";
TextBox9.Text = "";

DropDownList1.SelectedIndex = 0;
DropDownList2.SelectedIndex = 0;
DropDownList3.SelectedIndex = 0;
DropDownList4.SelectedIndex = 0;
DropDownList5.SelectedIndex = 0;

RadioButtonList1.SelectedIndex = -1;
RadioButtonList2.SelectedIndex = -1;
RadioButtonList3.SelectedIndex = -1;
aid.Text = "";
maxnumber();

58
}
protected void DropDownList1_SelectedIndexChanged(object sender,
EventArgs e)
{
if (DropDownList1.SelectedItem.Text == "TamilNadu")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Chennai");
DropDownList2.Items.Add("Madurai");
DropDownList2.Items.Add("Trichy");
DropDownList2.Items.Add("Kovai");
DropDownList2.Items.Add("");

}
else if (DropDownList1.SelectedItem.Text == "Kerala")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Palkad");
DropDownList2.Items.Add("Eduki");
DropDownList2.Items.Add("Kolikod");
DropDownList2.Items.Add("Thiruvanandapuram");

}
else if (DropDownList1.SelectedItem.Text == "Andra")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Tirupathi");
DropDownList2.Items.Add("Kundoor");
DropDownList2.Items.Add("Visagapatinam");
DropDownList2.Items.Add("Ellor");

}
else if (DropDownList1.SelectedItem.Text == "Karnadaga")
{
DropDownList2.Items.Clear();
DropDownList2.Items.Add("Select");
DropDownList2.Items.Add("Bangalore");
DropDownList2.Items.Add("Charmina");
DropDownList2.Items.Add("Belgaum");
DropDownList2.Items.Add("Belari");

} }}

59
SCREEN LAYOUT

HOME

60
ADMIN LOGIN

61
BRANCH DETAILS

62
REGISTRATION FORM

63
BRANCH DETAILS

64
FIR DETAILS

65
COMPLAINT DETAILS:

66
LICENSE DETAILS:

67
SYSTEM TESTING

System Testing is an important stage in any system development


life cycle. Testing is a process of executing a program with the intention of
finding errors. The importance of software testing and its implications with
respect to software quality cannot be overemphasized. Software testing is a
critical element of software quality assurance and represents the ultimate
review of specification, design and coding. A good test case is one that has a
high probability of finding a yet undiscovered error.

Testing is the set of activities that can be planned in advance and


conducted systematically. Different test conditions should be thoroughly
checked and the bugs detected should be fixed. The testing strategies formed
by the user are performed to prove that the software is free and clear from
errors. To do this, there are many ways of testing the system’s reliability,
completeness and maintainability.

Unit Testing:

In the unit testing the analyst tests the program making up a system.
The software units in a system are the modules and routines that are
assembled and integrated to perform a specific function. In a large system,
many modules on different levels are needed.
Unit testing can be performed from the bottom up starting with the
smallest and lowest level modules and proceeding one at a time. For each
module in a bottom-up testing, a short program executes the module and
provides the needed data.

68
Integration Testing:

Integration testing is a systematic technique for constructing the


program structure while conducting test to uncover errors associate with
interfacing. Objectives are used to take unit test modules and built program
structure that has been directed by design.

The integration testing is performed for this Hospital Management


System when all the modules where to make it a complete system. After
integration the project works successfully.

Validation Testing:
Validation testing can be defined in many ways, but a simple
definition is that can be reasonably expected by the customer. After
validation test has been conducted, one of two possible conditions exists.
• The functions or performance characteristics
confirm to specification and are accepted.
• A deviation from specification is uncovered and a
deficiency list is created.
Proposed system under consideration has been tested by using
validation testing and found to be working satisfactorily.
For example, in this project validation testing is performed against
medicine module. This module is tested with the following valid and invalid
inputs for the field medicine id.

69
White Box Testing
White box testing, sometimes called glass-box testing is a test case
design method that uses the control structure of the procedural design to
derive test cases. Using white box testing methods, the software engineer
can derive test cases that
• Guarantee that all independent paths with in a module have been
exercised at least once.
• Exercise all logical decisions on their true and false sides.
• Execute all loops at their boundaries and with in their operational
bounds and
• Exercise internal data structure to assure their validity.
For example in this project white box testing is performed against
patient module. Without entering text if we apply it displays the message
“First add record then save it” else it should be saved.

Black Box Testing


This method treats the coded module as a black box. The module runs
with inputs that are likely to cause errors. Then the output is checked to see
if any error occurred. This method cannot be used to test all errors, because
some errors may depend on the code or algorithm used to implement the
module.

70
SYSTEM IMPLEMENTATION

Implementation is the state in the system where the theoretical design is


turned into a working system. The most crucial stage in achieving a new
successful system and in giving confidence on the new system for the users
that will work efficiently and effectively. The system can be implemented
only after thorough testing in done and if found to work according to the
specification.

If involves careful planning, investigation of the current system and


its constraints on implementation, design of methods to achieve the
changeover, an evaluation of changeover methods apart from planning. Two
major tasks of preparing the implementation are education, training of the
users and testing the systems. System analysis and design efforts will be
more for complex systems beings implemented. Based on policies of
individuals’ organization an implementation coordinating committee has
been appointed.

The implementation process begins with preparing a plan for the


implementation system. According to this plan, the other activities are to be
carried out. In this plan, discussion has been made regarding the equipment,
resources and how to test the activities. Thus a clear plan is preparing for
the activities.

Equipment Acquisition

71
According to the above plan, the necessary equipment has to be
acquired to implement the new system. Prime Tech has all the hardware
requirements for installing and maintaining the package.

Program code preparation


One of the most important development activities is the code of
programming. The system DFD’s and other channels are converted to
modular programs. They have to be complied, tested and debugged.

User Manuals

Once planning has been completed the major effort of the computer
department is to ensure that the user department consists of education and
trained staff, as the system becomes more complex. The success of a system
depends upon how they are operated and used. Thus the quality of training,
the personnel is connected to the success of the system.

For this purpose system and user manuals are prepared. In system
manuals, details about the forms and blocks triggers. Which were used to
develop them, were specified. In user manuals data flow diagrams, charts
and screen formats are given. Also error messages associated were
explained in details. The users were shown the success and they were taught
how to operate the system. Live demonstration and visuals aids were used
to teach them.

72
CONCLUSION

The Developed system is flexible and robust and Police station has

several departments like Law and Order, Women Protection, Cyber crime,

Traffic and control, CBI, etc. Separate module for each dept would be

needed.

In performing analysis, design, coding and Implementation we have

made success in matching the system objectives with the goals of the

organization. The newly developed system consumes less processing time.

Since the Navigation is maintained throughout the system, they are much

user-friendlier and serve the organization purpose.

73
BIBILIOGRAPHY

Site server 3.0 - Macro Tabini

The Interdev Handbook - Maso

Developing ASP Components - Shelly, Bowers

VBScript Interactive Course - Simon

System Analysis and Design - Elias M.Awad

System Analysis and Design - Lee

ASP.NET

www.asp.net/(S(pdfrohu0ajmwt445fanvj2r3))/learn/data-access/

www.w3schools.com/aspnet/default.asp

www.411asp.net/home/sites

www.cristiandarie.ro/asp-net-tutorial/

www.asp.net-tutorials.com/basics/first-website/

SQL SERVER

www.functionx.com/sqlserver/

www.technet.microsoft.com/en-us/library/ms169620.aspx

www.msdn.microsoft.com/en-us/library/ms169620(SQL.90).aspx

www.softwaretrainingtutorials.com/ms-sql-server-2005.php

74

You might also like