Академический Документы
Профессиональный Документы
Культура Документы
CHAPTER ONE
INTRODUCTION
1.1: BACKGROUND/OVERVIEW
Bule Hora town is found in the south-western parts of Addis Ababa at 476 kilometers from the
capital city of Ethiopia and 173 km far apart from Hawasa town. The town has early civilized like
other early towns of Ethiopia. It is one of Oromia region and has its own administration structure
to organize, control and manage the local communities.
In Bule hora town there are governmental and non-governmental organizations which facilitate
the development of the town and provide services to the community. From those governmental
institution Traffic police station is one part which controls the emergency of vehicles and stranger
in the town.
Bule hora Town Traffic management system (BTMS) was established in 1993 E.C as police station
for the purpose of protecting local communities from criminal activities. BTMS is found around
hospital sefer area at north part of Gumruk that far away 300 meters.
BTMS gives services to the society who lives around and within the town. Since BTMS is found
with in bule hora town, it plays a vital role for the surrounding society by providing the immediate
treatment including emergency. Currently the traffic police station processes tasks in the form of
document based applications or traditional file systems. on the other hand, the current system of
bule hora town traffic police station recording personal information of accidents on traditional
document formats.
Our project proposed system, processing of the accident record can be automated by BTMS,
which is newly implemented. The proposed system can be taken as to automate processing tasks
with less efforts and resources (like, reducing accessing times and material requirements).
1.1.1MISSION
To reduce the number of car and others related accidents that occur in the town.
By participating the societies to overcome radical change about traffic well-being.
To create the relationship with schools for organized activity and wise traffic police by
giving awareness for the society.
Giving the service for the society without any biased and corruption everywhere and
every time attentively.
To increase awareness in the society about the danger of vehicle accident.
1.1.2 VISION
The organization vision states that the town is free from any transport loadness and any
emergency. Since the organization can be distribute experienced traffic police that come
up with changes to bule hora town.
1.1.3 VALUES
To satisfy customers need.
To create smooth relationship between the members with the head of traffic office.
To perform successfulness and concurrent action.
To give services those are free from any biased and corruption.
To perform clear and fair use of resources in order to avoid extravagancy.
1.2 STATEMENTS OF THE PROBLEM
The current method or technique used to record and reporting vehicle accident in Bule
hora town traffic police is manual. As the number of vehicle increases in the town from year to
year, this manual system does not satisfy the need of the customers and difficult to handle all the
activities that have been done in the office. There are various problems that the traffic office faces
due to the file manual handling of its daily activity.
The most possible problems that faces on the current system are as follows: -
It is difficult to prepare report.
It is difficult to give necessary information for organization, like court system.
The manual system is much time consuming to work with, it means it takes time.
It is difficult to handle data properly or wisely.
Lack of security.
It is difficult to identify the owner of the vehicle.
The extra power required to be with the manual system creates a gap in other sectors
of professions.
The data handles huge amount of space due to the manual system.
Our project is operationally feasible. Because, the members of the office require the data base to
facilitate their day-to-day activities in considerable resource and time
1.6.4: TIME FEASIBILITY
Our project is timely feasible. Because, when we search files from the system, it takes short period
of time.
1.6.5: LEGAL AND CONTRACTUAL FEASIBILITY
Legally the system can copy only by the group members. In contractual aspect, we will finish the
project within the stipulated time.
CHAPTER TWO
Literature Review
This chapter primarily presents the different researches and other literatures form both foreign
and local researchers, which have significant bearings on the variables included in the research. It
focuses on several aspects that will help in the development of this study. The study is generally
concentrating on the feasibility of creating an online crime management system for Bule Hora
Town Traffic police. The literatures of this study come from books, journals, articles, electronic
materials such as PDF or E-Book, and other existing thesis and dissertations, foreign and local that
are believed to be useful in the advancement of awareness concerning the study.
There has been a recent increase in the usage of ICT in various sectors of the economies in the
third world countries. Some of these sectors include Finance, Education and Health among others
[1]-[3]. One area that is still not widely exploited is the security wings. This may be due to the
sensitivity of the data involved. The use of manual mechanisms in the police poses a number of
challenges that are common to most third world countries. These challenges include low capacity
for case racking, lack of searchable crime databases, lack of detection of unauthorized evidence
tampering and retrospective reporting that can be used for decision making and crime profiling
[4]. In addition, challenges include management of paper documents and filing which may result
in data loss, unauthorized access and damage [5]. Some of the benefits of using ICT include
improved service delivery [6]. Another is lower operation costs over time [7]. Other benefits
include centralized and easy access to information that can easily be used for decision making,
efficiency in operations [4] and lower chances of losing data with proper backup mechanisms in
place.
Despite these benefits, there are some challenges in implementing ICTs. One big challenge is
the significant initial cost of deploying a technology and sometimes maintenance [7]. This often
requires acquiring new equipment and accompanying software. The software may come with long
term software contracts. One other challenge is human resource resistance to change [7]. Due to
the fact that the workforce will have to use the new technology, it follows that they should be
willing to adopt new technologies. However, this is not always the case.
Information Management Systems (IMS) are some of the most commonly used methods of
managing business processes within big organizations. A number of systems already exist that are
aimed at helping police institutions in managing information. However, due to the sensitivity of
police operations, custom made applications are often preferred to commercial of-the-shelf
products. A number of existing Information systems are discussed in the next section.
The IMS has to be developed based on the business needs of the organization that will use it.
Using the developed business processes, a model or architecture can then be developed from which
the application will then be developed [8]. By carefully analyzing the needs of the organization in
question, it is possible to optimize some of the bottlenecks in their operations. This can also help
identify the services that are required for third party communications with outside parties [8] as
well as redundant ones. their operations. This can also help identify the services that are required
for third party communications with outside parties [8] as well as redundant ones.
Case management is an example of the type of information that the police make use of on a daily
basis [4]. It is important that the implemented system also implements the various processes
associated with it. This involves identifying the actors and how they interact to perform various
functions [4], [5]. The main operations here include the flow of information from the time a crime
is reported at the reception, and then assigned to an Investigator, on to the prosecution and finally
the adjudication [4].
The Makerere University of Uganda, through the ARMS project, developed the Uganda Police
Force Crime Records Management System (PFCR). This is a crime records system whose prime
purpose is to improve the performance of the crime records management in the Ugandan police. It
was motivated by the limited capacity for tracking cases, lack of crime intelligence, possible
manipulation of crime records and lack of a mechanism for retrospective support.
The main investigations, the traffic department and the minor contraventions department. An
example of a business case in the crime investigations department is the process from the time a
new case is reported to the time a case is closed [4].
Another system that was developed in Uganda is the Traffic Case Management System (TCRIS)
[5]. Unlike PFCR TCRIS has a specific focus on the management of Traffic Case documents. The
main purpose was to automate the processes that were being handled using paper based
mechanism. The system has a centralized database that can be accessed by the Migrations
Department, Bank of Uganda and the Uganda Revenue Authority. The system is developed using
Visual basic on the front-end and SQL Server 2005 on the backend.
The London traffic police management system promotes a culture of paperless paper less
crime record system. The day to day administration and most of the organization procedures are
carried out online. The traffic Management System (traffic police management system), an online
portal of organization, is one such innovative step of the organization to provide vital information
regarding crime management and other organizational work logistics for assisting the organization
traffic police, their parents and the staff. [1]
According to France traffic police , in the past, crime management and large school districts
in particular have created their own bespoke accident record systems. One such example is the
Repository of crime management system at Toronto. With growing complexity in the business
of crime establishments, most organizations now choose to buy customizable software, and
increasing numbers are buying software as a service. Most crime management systems in use today
are server-based, with the application residing on a central computer server, and being accessed
by client applications at various places within and even outside the organization. But crime
management systems have been moving to the web since the late 1990s and that trend is
accelerating as institutions replace older systems. Richard emphasized that information about
crime is vital, but timeconsuming to manage and it is essential that the most effective tools be
used to aid both staff and traffic police go about their work and studies. The India crime
management System replaced various accident records system used by the police station. provides
comprehensive and accurate information about accident body and also improves data quality,
reduce the administrative burden dramatically and provides better services to both staff and traffic
police. [2]
According to Desousa, Web based application have four core benefits. These are the
following: 1) Compatibility. Web based applications are far more compatible across platforms than
traditional installed software like web browsers. 2) Efficiency. Everyone hates to deal with piles
of paper unless they do not have any other alternatives. The benefit of web based solution makes
services and information available from any webfacilitated Personal Computer (PC). 3) Security
of live data. Normally in more complex systems data is moved about separate systems and data
sources. In webbased systems, these systems and processes can often be merged by reducing the
need to move the data around. Webbased applications also provide an additional security by
removing the need for the user to have access to the data and back end servers. 4) Cost Effective.
Webbased applications can considerably lower the costs because of reduced support and
maintenance, lower requirements on the end user system and simplified plans. [6]
In relation to this, the input, alteration, or deletion of any computer data without right
resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes
as if it were authentic, regardless whether or not the data is directly readable and intelligible.
in his study entitled crime management System for the organization of the Cordilleras
stressed that the concept of web based Systems emerged in the early 1990s. More often, when
information system is defined, the field Information Science is always associated, IS is an any field
that deals with the generation, collection, organization, storage, retrieval, and dissemination of
recorded knowledge. Furthermore, it is a collection of related components designed to support
operations, management, and decision making in an organization. Generally, IS is supposed to
inform people. Information System supports people or users in making intelligent decisions based
upon the information derived from reliable data.
Villani reported that in the England, the Commission on traffic police (CTP) has initiated
programs to secure crime records. CTP and the National Printing Office (NPO) have signed a
memorandum of agreement (MOA) on the Securitization of crime Records. The move is part of
CTPs drive to stop the use of manual info records. CTP former chairman Carlito Puno said the
MOA aims to secure authenticity of crime records such as accident, crime of records and special
orders from all traffic organization in the Philippines. Thus, protect the image and integrity of
Filipino traffic organization to potential employers both locally and internationally [5]
The prior conceptual and researched literature and studies, associated directly and
indirectly to the present research provided more insights about the nature and scope of the study,
which is the Feasibility of bule hora town traffic management system. The organization implies
that the existing system they are using causes delay in giving information for the customer.
The related literature, both foreign and local stated that BTMS is still using the old manual
system. In which replaced more expensive, traditional methods of doing things with a more
streamlined and efficient online solution.
Both foreign studies discussed the functions of a web based crime management System
such as the study of Toronto, generally, Information System is supposed to inform people.
Information System supports people or users in making intelligent decisions based upon the
information derived from reliable data. On the other hand, issues, controversies, and concerns are
the focus of the related local studies, one of this is Republic Act No. 10175 known as the
Cybercrime Law According to this, the input, alteration, or deletion of any computer data without
right resulting in inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic, regardless whether or not the data is directly readable and
intelligible. Illegal acts upon this will be subjected under case.
The related literature and studies have significant relationship with the present study in the
sense that both are discussing about the benefits of having an information system that could replace
the old system used by BTMS Likewise, the accessibility of information will be implemented by
using this online system.
CHAPTER THREE
METHDOLOGY
Methodology is the way used to solve the existing problem. The methodology we are going to use
is to gather required information through reading literature review, to analysis current system and
new system we use object oriented analysis method, different tools are used to develop the new
system: -generally the tools are software (using E draw 6, Macromedia Dreamweaver 8, Microsoft
word 2007,) and hardware (computer).
DATA COLLECTION
PRIMARY DATA COLLECTION
A. Interview: we use interview to gather data or information from the members of traffic office
by face to face communication.
B. Reading documents: consulted and analyzed written materials that describe the operations
conducted in the station to further strengthen and support the information that applied the
technique.
C. Observation: was used to gather additional data by observing the actual work being done by
the staff and consolidated (combine) with what was obtained through interview.
A. Software Tools
Programming development tool
PHP & HTML
JAVASCRIPT
Database software
MY_SQL for database purpose
Documentation
MS-word 2016
Visual paradigm UML Diagram
Operating system and server
Window 10
xammp
Interface language: English Language
B. Hardware Components
CPU: Intel(R) core(tm)2 Duo CPU
T6400@2.00GHZ
RAM:1.99GB
Hard disk:310 GB
3.3 Requirement
User requirement
To be functional, the user needs to have a username and password to access the
system.
The users of the system are mainly traffic police, head btto, administrators. So,
all of these users must know system components and how each component works
and also the relationship between each other
Since the crime file or document is the life of their, the system of DBMS should be
highly secured and every user of the system should have their own authorities which
in turn maximize the system security.
The system calculates and search it should give accurate result; so should be reliable.
The operating language being used is English which is internationally understood;
these definitely increase the readability of the system.
The system should have an easily understandable design in order for users to use it;
this means the system should be user friendly.
The system provides quick and easy information analysis which in turn maximizes the
overall work efficiency.
3.5 Conceptual modeling
3.5.1 The relationship between an entity
Entity of the new system
Police station
Head of KTMS
Traffic police
Driver
Owner
Victim
System administrator
Police station: is an organization that has different heads within it. From this, head of BTMS is
one of them. This organization has its own attribute like, name of police station, region, zone,
woreda, kebele, description and etc.
Head of BTMS: is an employee for BTMS system who has right to control over all of the BTMS
system. That control and assign all the traffic police activity around the BTMS and solve the
problem that occur around there. One head can control more than one traffic police. He has his
own attribute like FirstName, Middle Name, Last Name, ID, sex, age, address, Salary (region,
woreda, kebele, e-mail, and phone no). The head ID the primary key of btms.
POLICE HEAD OF
Has
STATION BTMS
Figure 3.1 the relationship between police station and head of btms
Traffic police: is an employee which controls the day to activity of the society. One traffic police
can control money society. The attribute of traffic is like, traffic ID Fname, Mname, Lname,
position, current place, new place, coverage area, responsibility, examination and length of time.
Deriver: is an employee for the owner of the car that derives the assigned vehicles. The driver may
injure different property including human being. One deriver may injure many society. He Driver
ID,Date,Vehicleplate,Vehicletype,FirstName,MiddleName,LastName,Sex,Citizenship,Age,Regi
on,Zone,Woreda,Kebele,DriverLicens,Crimetype,HealthDescription,CrimeLocation,PaintistTraff
ic home.Changed number, Punishment location,Date,Serialcode,Amuant,Control Property.
Owners: Are the owner of the car that assigns a car to the Driver. Owner may have many
cars/vehicles, then He can assign many Drivers for that Cars. He has an attribute that describes
himself like: OwnerID, FirstName, Middle Name, Last Name, Sex, Age, Address, Car plate, Type
of car, Citizenship, Region, Zone, Woreda, Kebele, Description.
Victim: This is a thing including persons that injured by a driver. Many victims may be injured
by money drivers or a single driver. They have their own attributes like, victim ID date, fame,
mname, lname, sex, age, Car plate, citizenship, region, zone, woreda, and kebele.
System administrator: System administrator is a responsible person that controls and handles
information and data. And also record processed and unprocessed data. In addition to this, system
administrator has many responsibility like, maintaining system settings, maintaining system
performance (setup security policy) and also like other entities he/she has his or her own attribute
like, ID, fname, mname, lname, sex, age, address (region, zone, woreda, kebele, phone no, e-mail
etc.)
Wo Age Addr
Zo Sex
Regi red Keb ID ess
ne ele Nam
on a
Nam e
e Salary
POLICESTAT HEAD OF
Has
ION BTMS
Description
treated
has accepted
Name
Salary
ID
Address SYSTEM
ADMINISTRATER
Sex
Age TRAFFICPOLI control
CE
Sex Age Name
given to
Address ID
ID
control Salar Sex
Name y
Name
ID Age
Sex
Address Carplate
Age
injured
ID Sex Type of car
Age
Na
me Address
VICTIM
asked
Level
Carplate
the database more compact and reduces the disk space it occupies, but it also simplifies the task of
making change.
In non-normalized database, because values are usually repeated in different table. Altering them
in manual (and error prone) find and replace process. In a normalized database because values
appear only once, making change is a simple one step update. The normalization process also
includes validating the database relationship to ensure that there are not any crossed wires and to
eliminate incorrect dependency.
3.6.1 Unnormalized Table
Table 3.1 un normalized
I Fname Mnam Lnam Traffi Traffic S Kebe Hous Vechel Deriver Deriver
D e e c e le e eplate
N Name Address x name Address
O
1 habtam Feleke belay wosen Bule hora M 01 0134 AA123 Tefera Bule hora
u
2 Tigist Kebede wube mitku Bule hora F 03 02-34 AA645 Masresha dila
3 Wolela Meku fikre john Bule hora M 10 0123 AA76 Seid yabelo
4 Wolela Meku Fikire john Bule hora M 10 0123 AA76 Seid gerba
6 Tigist Kebede wube mitku gedeb F 03 02-34 AA645 Masresha Bule hora
A normal form: is simply a set of rules that a database must conform to. Five such normal forms
exist, ranging from completely non-normalized database to fully normalized one. We select only
three of them, because third normal form is generally accepted as being good enough for most
applications. Normal forms are standards of database regulation that promote efficiency
predictability of results, and unambiguousness.
3.6.2 First normalized form
In the first normalized form the main tasks are removing repeating groups and decide composite
primary key of the table. Validating entity integrity rule (PK is could not be null) it has primary
key no duplicate rows and each row must contain atomic value or no repeating groups. Therefore,
in our table we will have composite key of victim number or ID, kebele, house no, sex, age, name
(fname, mname, and lname).
Table 3.2 first normalized
ID NAME SEX AGE ADDRESS HOUSE
NO
CHAPTER FOUR
SYSTEM DESIGN
4.1 Use Case Model
A use case in software engineering and systems engineering is a description of a systems behavior
as it responds to a request that originates from outside of that system. The use case technique is
used to capture the functional requirements of a system. (Wikipedia)
Use case modeling is composed of a use case diagram and the accompanying documentation
describing the use cases, actors and their associations (Scott W. Ambler, 2001).
Actors of the system
Head of BTMS: The person who is responsible for the maintenance of the traffic system
Administrator: a person who manages the overall system by approve Traffic police;
delete, update, add account
Traffic police: a user of the system who import accident and victim and driver info
Actors: Administrator
3. The administrator would insert his/her valid username and password then
click on login, if they are valid, access the appropriate page
3. Head btms insert their valid username and password then click on login, if
they are valid, access the appropriate page
Pre-condition: U1
2. Click application
4. Click submit
5. Pay the payment by manually and take the applicant ID from the registrar
6. Go to home page select register and fill the driver ID from the required field.
7. Clicks submit.
Pre-condition: U2
2. Click on victim form and then click add victim or update victim
3. Click on submit
Post condition: U2
Pre-Condition: UI-2
Steps:
2. Click application
4. Click submit
5. Go to accident page select register and fill the accident ID from the required field.
6. Clicks submit.
5. he wants to download driver detail and hold driver document on paper like, click
download as pdf or word document
Actors: Administrator
Pre-condition: U1
Steps:
5. Import to database
Pre-condition: U6
Steps:
2. Login
Actors: Administrator
Fig 4.2 Login sequence diagram for admin traffic police and head of BTMS
4.3ActivityDiagram
An activity diagram represents all main activities of the entire project. Use case only represents
what project does. Activity checks whether the given action results to failure or success which
leads to other activity or self-activity.
Fig4.5 activity diagram traffic police add accident fig4.6activity diagram admin update page
Fig 4.7 activity diagram of add account Fig 4.8 activity diagram of user login page
CHAPTER FIVE
CONCLUSION AND SUMMARY WORK
5.1 Conclusion
The project is partitioned into five chapters and each chapter has a specific deliverable which is
essential and base for the next chapter.
The first chapter is the proposal (Introduction), in this part the major infuses are: describing about
background where the new system is intended to be built on, the problems in the system have been
identified, the feasibility part studies building a new system is possible or not from different
perspectives, after the scope of the proposed system has been defined the selected programming
tools and methods are stated and finally the projects phases with their respective deliverables are
stated, each phase and its perspective work is scheduled.
The second chapter is conducted based on the first chapter. The first part in this section is analyzing
and cited the different literature of the online traffic crime management system, then the problems
which solved by other researcher and these activities are analyzed and also the strengths which must
be modified in the new system are identified. Then the next step is developing alternative options
to address the problems, and after different alternative evaluations the one which is developing the
new web based on line traffic crime management system is selected based on the actual evaluation
and the challenges of the alternative.
The third and the fourth chapters deal with describing and modeling the proposed system. The
functional as well as the non-functional requirements are also studied together with the Hardware
and Software requirements of the system.
An effort has been made to study online traffic crime management system as final project in
electrical and computer engineering. In doing the study the team has tried to follow object oriented
system analysis and design methodology.
Since the success and failure of any system depends on gathering the right information through
different fact-finding techniques and user involvements, the team has made the best effort together
requirements. After a detail review and study of the existing system of registration system models
have been designed to reflect the new system that are suppose to solve problems.
In order to solve different problems existed, the team has tried to propose a solution that at least
reduce the existed problems and model the proposed system using different tools and
methodologies. The team believe the different tools and techniques has helped us a lot in capturing
real user requirements and model the right system for the users for their day to day transactions.
Thus, it should have the precedence in know-how and experience in collecting, processing and
utilizing information.
In developing this system, we have observed that there are other systems that need to be Automated
in the bule hora town traffic management system is relation to our project. The manual System
hinders the management system not to use its resources efficiently and serve its people effectively.
However, we have seen great interest of the stakeholders of the management system to automate
some manual systems that needs to be automated. After spending two to three months on developing
this project, we have tried to automate the new computerized traffic record management system of
the station.
Moreover, the system will bring a radical change on current working condition of the traffic station.
Specially, to operations concerned the record system.
The record management system conversion from the old system to this new system is based on a
radical change which needs a complete acceptance from the users of the system as Was hoped and
agreed with stakeholders at the beginning of this project.
Finally, we concluded that the traffic crime record management system will be taken as a means
for the Police station to deliver efficient and effective report generating, crime recording and
information sharing to the traffic station.
5.2 Recommendation
Finally, the project team members recommend the following points:
There should be a healthy working environment, specifically in regard to the database
Administration that we are going to assign the total authority to view the security database
and handle problems that may arise in the application of the traffic crime record
management system. So, it is better to assign this position to someone who is trustworthy,
accountable and responsible person. The station has to fulfill all the infrastructures needed
for the system implementations. In addition, all the specifications mentioned for the hard
wares and soft wares are Mandatory.
The different data manipulators in the traffic crime record management system, who are
the main users of the record management system, must have knowledge about this
technology.
The last but not least, developed considering the expansions that the record office of the
station will undergo in the near future, we recommend the traffic station uses this system
as a basement and sees how its problems can be solved.
we recommended that feature researchers can advance on this project by making the
limitation of our project and some additional thing like system secured by figure print, face
recognition , Gps support and full crime management system.
REFERENCES
[1]. Abubakar and R. Tasmin, The impact of information and communication technology on
banks performance and customer service delivery in the banking industry, International Journal
of Latest Trends Fin. Eco. Sc., vol. 2, no. 1, pp.8090, 2012.
[2] A. S. Rwashana and D. W. Williams, Enhancing healthcare delivery through ICTs: A case
study of the Ugandan immunization system, International Journal of Education and Development
Using Information and Communication Technology (IJEDICT), vol. 4, no. 2, pp. 144158, 2008.
[3] Y. Glbahar, ICT usage in higher education: A case study on preservice teachers and
instructors, Turkish Online Journal of Educational Technology, vol. 7, no. 1, pp. 3237, 2008.
[4] A. Muyanja et al., Requirements engineering for the Uganda police force crime records
management system, in Proc. 2013 21st IEEE International Requirements Engineering
Conference, 2013, pp. 302307.
[5] C. M. Mubaraka, I. M. Jirgi, and P. L. B. Nanyanzi, Integrating ICT in traffic police
department in Uganda: Design and development of traffic case management system (TCRIS),
vol. 4, no. 5, pp. 1727, 2013. R. Kaur, P. S. Sandhu, and A. Kamra, A novel method for
fingerprint feature extraction, in Proc. 2010 International Conference on Networking and
Information Technology (ICNIT), June 2010, pp. 1, 5,
[6]. Buchanan, T. (1998).Using the World Wide Web for formative assessment. Journal of
Educational Technology System 27(1), 21-79.
[7]. Villafania, R, & Wallace, P. (2007). Paper-based versus computer-based assessment:
KeyFactors associated with the test mode effect. British Journal of Educational
Technology 33, 593-602.
[8].Scott w, Amber, the object primer, second edition, Cambridge University press (c), 2001.
Appendices:
Sample code
Home page implementation code
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Home page</title>
<?php
//Start session
session_start();
unset($_SESSION['SESS_ADMINSTRATOR_ID']);
unset($_SESSION['SESS_USER_NAME']);
unset($_SESSION['SESS_PASSWORD_NAME']);
?>
<?php
$mysql_hostname = "localhost";
$mysql_user = "root";
$mysql_password = "";
$mysql_database = "btto_db";
$prefix = "";
else
mysql_close($bd);
?>
<?php
$mysql_hostname = "localhost";
$mysql_user = "root";
$mysql_password = "";
$mysql_database = "btto_db";
$prefix = "";
if (!$bd)
// Execute query
mysql_query($qry,$bd);
mysql_close($bd);
?>
<?php
$mysql_hostname = "localhost";
$mysql_user = "root";
$mysql_password = "";
$mysql_database = "btto_db";
$prefix = "";
if (!$bd)
// Execute query
mysql_query($qry,$bd);
mysql_close($bd);
?>
<?php
$mysql_hostname = "localhost";
$mysql_user = "root";
$mysql_password = "";
$mysql_database = "btto_db";
$prefix = "";
if (!$bd)
// Execute query
mysql_query($qry,$bd);
mysql_close($bd);
?>
<?php
$mysql_hostname = "localhost";
$mysql_user = "root";
$mysql_password = "";
$mysql_database = "btto_db";
$prefix = "";
if (!$bd)
// Execute query
mysql_query($qry,$bd);
mysql_close($bd);
?>