Академический Документы
Профессиональный Документы
Культура Документы
A project report submitted in partial fulfillment of the requirements for the degree
of
GAUHATI UNIVERSITY
2016
Submitted by
ABHIJIT DEY
Guided by
DWIPEN LASHKAR
ASSISTANT PROFESSOR
COMPUTER SCIENCE(G.U)
GAUHATI UNIVERSITY
GUWAHATI-14
ASSAM.
DEPARTMENT OF COMPUTER SCIENCE
GAUHATI UNIVERISITY
GUWAHATI -781014
ASSAM.
CERTIFICATE
This is to certify that the dissertation entitled CRIME CONTROL AND MANAGEMENT
SYSTEM submitted by ABHIJIT DEY, for partial fulfillment for the requirement of award of the
degree of Master of Science in Computer Science, Gauhati University is a work carried out by
him under my supervision and guidance.
To the best of my knowledge, the work has not been submitted to any other institute for the award of
any other degree or diploma.
Place: (Name)
Designation
Affiliation
DEPARTMENT OF COMPUTER SCIENCE
GAUHATI UNIVERISITY
GUWAHATI -781014
ASSAM.
CERTIFICATE
This is to certify that the dissertation entitled Crime control and management system submitted by
Abhijit dey, for partial fulfillment for the requirement of award of the degree of Master of Science
in Computer Science, Gauhati University is a work carried out by him under the supervision and
guidance of Dwipen lashkar.
Place: (Name)
Designation
Affiliation
DEPARTMENT OF COMPUTER SCIENCE
GAUHATI UNIVERISTY
GAUHATI - 781014
ASSAM.
CERTIFICATE
The dissertation entitled crime control and management system submitted by Abhijit dey, in partial
fulfillment for the requirement of award of the degree of Master of Science in Computer Science,
Gauhati University has been examined
Date: Date:
Place: Place:
DECLARATION
I hereby declare that the project entitled Crime control and management system has been carried
out by me and submitted in partial fulfillment for the requirement of award of the degree of Master of
Science in Computer Science, Gauhati University. I also declare that any or all contents
incorporated in the dissertation, has not been submitted in form for the award of any other degree of
any other institute or University.
At the very outset, I would like to express my heartiest gratitude to my project guide shri Dwipen
lashkar,(Assistant professor),computer science,Gauhati university for his support, encouragement,
advice and motivation to work in this area.
I also offer my sincere thanks to Dr Anjana kakoti Mahanta,computer science,Gauhati university for
her support towards this project.
I also want to give thanks to all my classmate for their constant support and motivation.
Name:-ABHIJIT DEY
Affiliation:-Gauhati University
CONTENTS
CHAPTER 1
1)INTRODUCTION.
2) PROJECT PROFILE
CHAPTER 2
3)PROBLEM DEFINITION
CHAPTER 3-
1)FEASIBILITY ANALYSIS
CHAPTER 4-
SYSTEM ANALYSIS
(1)CONTEXT DIAGRAM.
CHAPTER 5-
SYSTEM ANALYSIS
(1)SYSTEM DESIGN
(2)INPUT DESIGN
(3)OUTPUT DESIGN
(4)DATABASE DESIGN
CHAPTER 6
SYSTEM IMPLEMENTATION
CHAPTER 7-
(1)SYSTEM TESTING
(2)TEST PLAN
(3)TEST CASES
CHAPTER 8-CODING
.CHAPTER 9-MAINTENANCE
1)ADAPTIVE MAINTENANCE.
2)CORRECTIVE MAINTENANCE.
3)PERFECTIVE MAINTENANCE.
CHAPTER 10-
1)CONCLUSION
BIBLIOGRAPHY
CHAPTER-1
INTRODUCTION
Crime Reporting System will address not only the cited reasons for not reporting, but also the need of
police departments for more accurate, complete, and reusable information that may free up their time
and resources to allocate them to policing the streets. An online solution is very useful as the solution
is inherently distributive. This distributive characteristic of the online solution helps in getting the
different police stations to share information and get in contact with one another. It also improves
work efficiency of department. Using this application information handling will be easy and fast and
solving cases will be fast. The modules involved are station module, citizen module, crime module.
The main advantage of online application is that, a person can report the crime anytime from
anywhere. Users can view the progress of their complaint online. Need: Although reporting crime has
many societal and individual benefits, it is common for criminal acts to remain unreported. Victims
and witnesses have many reasons for not reporting a crime. Among these reasons, fear of
repercussion, embarrassment or shame, believing the crime is too insignificant or a personal issue,
believing that reporting will not make a difference, and being unable to reach an authority are often
cited .In the existing crime management system, most of the operations are done manually like send
complaints, taking actions against crimes, view status etc. So with the existing system if anybody
wants to complaint against crimes he must do it through the police. If we are doing the system
manually, so many minor errors will occur.
PROJECT PROFILE
With the high increase in population in the country, the economy of India has negatively been
influenced. This has seen its citizens indulging in lots of businesses in order to earn a living. This
makes them so much busy to a point that they don‟t get time to do some of their responsibilities such
as reporting crime. Sometimes the officials end up harassing the citizens reporting the crimes and if
there is a way to report crimes without having to go to police stations then this problem could be
avoided. At other times when one reports about a missing person or property, this gets only to the
police station where you have reported but don‟t get to other police stations all over the County or to
a larger extent all over Assam and this narrows down the area of investigation. In spite of the
development of Information Technology in India, little study has been done to analyze the problems
affecting the performance of the Police department in Assam.
I have analyze the situation and conditions that are necessary for crime reporting by personally
visiting our police station “JALUKBARI POLICE OUTPOST ”.And it took me near about four
months to frame the whole structure of the system.
CHAPTER 2
INITIAL SYSTEM STUDY
Organizational structure of Assam Police comes under direct control of Department of Home Affairs,
Government of Assam. The Assam Police is headed by Director General of Police DGP Mukesh Sahay,
IPS (Present).Assam Police forces are organized into Police Ranges, headed by an Inspector General
of Police(IG) or Deputy Inspector General of Police(DIG) who control several Police Districts.The
Police District is the fulcrum of state police activity and each Police District of the state is headed by
a Superintendent of Police(SP). In many states an SP is assisted by one or more additional SPs and
DSPs. Generally a Police district is same as a revenue district of a state.
The Police District is divided into Police Sub-Divisions and will be under the command of a Deputy
Superintendent of Police(DSP) or Subdivision Police Officer(SDPO).The Police Sub-Division is made up
of one or more Police Circles, and is under the command of an Inspector of Police, often referred to
as the Circle Inspector (CI).Under the Police Circles are the police stations, generally under the
control of a Sub-Inspector(SI).Assam state police force also maintains its own Reserve Armed police
force, Special Armed Police which is responsible for emergencies and crowd control issues. They are
generally activated only on orders from the Rank of DIG and higher-level authorities. The armed
constabulary do not usually come into contact with the general public unless they are assigned to
VIP duty, Insurgency operation, Riot control or to maintain law and order during fairs, festivals,
athletic events, elections, and natural disasters. They may also be sent to quell outbreaks of student
or labour unrest, organised crime, and communal riots; to maintain key guard posts; and to
participate in anti-terrorist operations.
Depending on the type of assignment, the Armed Police force may carry only lathis or lethal
weapons.Assam Police also have an Elite Commando Group known as Black Panther equipped with
Latest weapons and technology for Anti-Terrorist Operations & VVIP protection.Branches.With the
growth and development of the police administration in the post-colonial era, a number of new
branches were established to meet the increasing demands of law and order and also of a peculiar
situation obtained in the state, such as the large-scale infiltration of the foreign nationals from
across the border causing a serious imbalance in the demo graphic structure of the state and
threatening national security. Some of these branches are:
The Assam Police has grown from strength to strength during the last two decade. In 1980 it had a
force of 40,290 and at the end of the 20th century its numerical strength stands at 60,721.
DRAWBACKS OF THE EXISTING SYSTEM
The existing system of our project is a crime management system which is a manual system
Police station is a place where complainer come up for general reporting about crime against them.
Police station provide facilities like:-
Generally, most police departments in the developed nations have recorded substantial
progress in using ICT in management and service delivery whereas their counter parts in the less
developed nations have not. This has enabled the police stations in developed countries to provide
improved service delivery to its citizens as well as improved interaction with its citizens. The
resulting benefits have been increased transparency, cost reduction among other benefits. However,
ICT has not yet been fully utilized by the police departments in developing nations including our
country thus resulting to poor service delivery to the public.
In the existing crime management system, most of the operations are done manually
like send complaints, taking actions against crimes etc. So with the existing system if anybody wants
to complaint against crimes he must do it through the police station, they have to physically present
themselves to the police stations. If we are doing the system manually, many minor errors will occur,
the crime reporters might as well be afraid to be interrogated while reporting thus making some
crimes going unreported. Error detection in the previous entries made and data cross verification is
another important function. These are done manually, and it would take time.
PROBLEM DEFINITION
With the high increase in population in the country, the economy of India has negatively been
influenced. This has seen its citizens indulging in lots of businesses in order to earn a living. This
makes them so much busy to a point that they don’t get time to do some of their responsibilities such
as reporting crime. Sometimes the officials end up harassing the citizens reporting the crimes and if
there is a way to report crimes without having to go to police stations then this problem could be
avoided. At other times when one reports about a missing person or property, this gets only to the
police station where you have reported but don’t get to other police stations all over the County or to a
larger extent all over Assam and this narrows down the area of investigation. In spite of the
development of Information Technology in India, little study has been done to analyze the problems
affecting the performance of the Police department in Assam.
THE PROPOSED SYSTEM
The aim of proposed system was to develop a system of improved facilities. The proposed system
can overcome all the limitations of the existing system.
The system provides proper security and reduces the manual work. The existing system has several
disadvantages and many more difficulties to work well. The proposed system tries to eliminate or
reduce these difficulties up to some extent. The proposed system will help the user to reduce the
workload and mental conflict. The proposed system helps the user to work user friendly and he can
easily do his jobs without time lagging. User can easily register his case against the crime online from
anywhere. He can also put paper evidence regarding the crime. Can get regular progress report from
Reported police station.
The Software is for the automation of Police Station Crime management System.
It maintains two levels of users:-
Administrator Level
User Level
In feasibility analysis section we tried to find out the feasibility of our system from three
points of view:
Economic Feasibility
From the parameter we have already discussed. We have say that the
system is economically viable. The system could be develop with the existing infrastructure
and the requirement is presumed to be always fulfill. Also the case of hardware and software
for
the proposed system must less than the benefit. That can be desire from the system and we
can accept it to be economically feasible. Even through the period or the time allotted for the
implementation is small, familiarity with the current technology and the application area
makes this project feasible in term of meeting tide schedule. The proposed system (our
project) has many cost advantages over the existing system. The system will minimize the
human efforts required to manage the general information. Also the information will be
processed very quickly. The benefit derived from the proposed system is much more than
cost and so we can accept it as economically feasible.
Technical Feasibility
Technical feasibility is the centers around the existing computer system(Hardware, Software
etc.) and to what extent it can support the proposed system. The minimum requirement of
hardware resources to develop the system is a database, a workstation, a GUI based PC, a
network, one printer and a UPS.
In general, people resistant to change and computer have been known to facilitate change. A
survey should be made of how strong a strong a reaction the user staff is likely to have towards
the development of the computerized system. It is common knowledge that the computer
installation has something to do turnover, transfer, retaining and change in employee status.
As more and more people are purchasing PC with Internet facilities, the attitude
towards the candidate system seems to be positive. Moreover an easy, unambiguous, attractive
GUI will attract more and more people towards the website. So the proposed system is
behaviourally feasible.
Conclusion
that the proposed system is feasible and justified and the feasibility could
DFD or Data Flow Diagram is the cornerstone for structured systems analysis and design. A Data
Flow Diagram (DFD) is a graphical representation that depicts information flow and the transforms
that are applied as data move form input to output. Also known as a “Bubble chart”, it has the purpose
of clarifying system requirements and identifying major transformations that will become programs to
system design. So, it is the starting point of the design phase the functionally decomposes the
requirements specifications down to the lowest level.
The Data Flow Diagram can be used to represent a system or software at any level of abstraction.
Data Flow Diagram can even be partitioned into levels that represent increasing information flow and
functional detail. Therefore, the Data Flow Diagram provides a mechanism for functional modeling as
well as information flow modeling.
A level 0 DFD also called a Context Diagram represents the entire software element as a single
bubble with input and output data indicated by incoming and outgoing arrows respectively. Additional
processes and information flow paths are represented as the level 0 DFD is partitioned to reveal more
detail. Each of the processes represented at level 1 is a sub-information of the overall system depicted
in the Context Diagram. This process of expanding a process in a DFD into a set of equivalent smaller
process is calling leveling.
DFDs that are hierarchically organized are called leveled DFDs. For the hierarchy to be consistent,
net inputs and outputs for a process are same as that of the process in the higher level DFD.It views the
system as collection of functions that transform the inputs as desired outputs but does not go into the
details of the transformation. This process modeling tool depicts flow of data through a system and
processing work performed by the system. It has diagram of processes, data stores, data stores view,
entities and data flows.
DFD Symbols
In the DFD, there are four symbols and they are described below along with
their notations.
The DFD methodology is quite effective especially when the design is unclear and the
analyst need a common language for communication. The DFD is easy to understand after a
brief orientation. The main problem however, is the large number of iterations that often are
required to arrive at the most accurate and complete solution.
Data models like 0,1, and 2 level DFDs
(a)Data models like 0,1, and 2 level DFDs
ENTITY RELATIONSHIP DIAGRAM (ER DIAGRAM)
The most important consideration is the database design is to how to store the
information. The various applications and procedures that will use the database introduce
requirements upon the structure of data. In the relational database, the data and the relationships
are represented as collection of tables.
The first in creating a database is designing. First plan, what tables we require and
what they will contain. It also determines how the tables are related. These are the most
important steps and require careful consideration.
It should be determined that information we want to store about things (entities) and
how they are related (relationships). A useful technique is designing the database is to draw the
pictures of tables. The graphical display of database is called Entity-Relationship Diagram. It
is a popular high-level conceptual data model. This model and its variation are frequently used
for conceptual design of database design tools employ its concepts.
Relationship
A relationship is an association
among entities.
Identifying
Relationships Relationship between the owner
entity type and the weak entity.
System design is the solution of a “how to approach to the new system. It is composed of several
steps. It facilitates the understanding and provides the procedural details necessary for the
implementation of the system recommended in the feasibility study. Emphasis is given on translating
the performance requirements into the design specification. Design goes through logical and physical
stages of development.
Logical design reviews the present physical system; prepares input and output specification;
make editing; security and control specification; details the implementation plan and prepares logical
design walk through.
Physical design maps out the details of the physical system; plans the system implementation
plan and specifies hardware and software. System design translates the system requirement into the
ways of the system as recommended in the feasibility study.
INPUT DESIGN
Once the analysis and design of the system has been done, it would be necessary on the part of
us to determine and identify the data that are required to be processed to produce the desired results or
outputs.
Input is one of the expensive phases of the operation of a computerized system and
created some times a major problem. Different types of the problems with a system can usually be
traced back to faulty input design method. Therefore, it is said that the input data are the lifeblood of a
system and have to analyzed and designed with utmost care and consideration.
The input design also determines whether the user can interact efficiently with the system The
proposed system has the ability to store huge database. The Probability of error occurrences is very
rare because the end-user would not be allowed to insert any record although they are able to create an
account but that would be restricted to the access of his part of information only. Besides these, data
entry, data deletion and data updating would be under the domain of the management level of the
heads. This is how the chances of error’s eruption are minimized to let the system function smoothly.
While entering data in the database file, every precaution has been taken to avoid the data
redundancy and data error on entering the data. All necessary actions are taken to reduce the data
redundancy, Reduce the access time avoid the causes of errors.
OUTPUT DESIGN
Computer output is the most important and direct source of information to the user. Efficient
intelligent output design helps the user in decision-making.
Outputs of a system can take different forms. The most common are reports, displays on screen,
printed forms etc. The Outputs also vary in terms of their users such as Administrators, Authorized
Users and General Users etc. Besides, due consideration also need to be given as to who will use the
output and for what purpose. All these point is kept in mind while designing outputs so that the
objectives of the system met in the best possible way.
The outputs are generally produced depending upon the decision send by the inputs. It is
required to meet the functional requirements.
SCREEN DESIGN
With data there is no system, but some data must provide in the right screen for input and
the information produces must be in a format acceptable to the user. The screen carries some data,
which come from people, and information output of the system goes to the people. Screen is a physical
carrier of data of information.
DATABASE DESIGN
1) Controlled redundancy’s unique aspect of database design is starting data only once,
which redundancy and improves performance.
2) Easy to learn and use.
3) Data independence .
4) Accuracy and integrity.
5) Privacy and security.
6) Performance Improvement .
Once the relationships have been identified the next step in the design process is
to design the tables for each entity. Determining the number of tables required and the information to
be stored in each of tables required and the information to be stored in each of these tables have to be
done next
Normalization
The relational model was first introduced in 1979 by E.F Codd. The relational model represents
data in the form of tables or relations. In the relation model there is a method called normalization,
which is performed when the resulting database may not have optimal structure and therefore may
contain some redundancy. A well-structured relation database will be one where no data duplication
will occur and no insert, delete or update anomalies occur. Normalization breaks complex database or
table into simpler smaller ones. Hence, after designing the ER diagram normalization up to 3rd normal
form has been done. So, reasons for Normalization are
Normalization prevents unnecessary duplication of data, thus conserving time & disk
space.
Normalization makes it easier to extract the information needed from the database. .
The main objective of normalization is to reduce the redundancy using the principle
of no less decomposition. No less decomposition implies reduction of table into
smaller without loss of information
A relation is in the first normal form if the domain of an attribute includes only atomic value
and the value of any attribute in a tuple is a single value from the domain of that attribute. An
important step in arriving at 1NF is to define a primary key to each table which will uniquely identify
one row of information and would help in extracting.1NF is arrived at by removing the violating
attribute and placing it in a separate relation along with a primary key.
A table is said to be in 2NF when it is 1NF and every attribute in the row is
functionally dependent upon the whole key, and not just part of the key.
This property of depending on the whole key and not just part of the key is called the Full
Functional Dependency.
Display Formats
The computer output is the most important and direct source of information and direct
source of information to the user and intelligent output design should be improve the system
relationship with the user in decision-making. The output is designed to meet the satisfaction of the
user as well as the requirement of the various departments of the organization. Output is so designed
that the user can interact with the output.
Various types of output required by the most systems are external output whose destination is
outside the organization and which require special attention. Internal output whose destination is
within the organization requires careful design.
Developing a system that meets user requirements has led to the new techniques and
methodologies.
PHP is a server-side scripting language. It is a powerful tool for making dynamic and
interactive Web pages. PHP is the widely-used, free, and efficient alternative to competitors
such as Microsoft's ASP. In our PHP page we execute scripts on your server.
A PHP scripting block always starts with <?php and ends with ?>. A PHP scripting
block can be placed anywhere in the document. On servers with shorthand support enabled
you can start a scripting block with <? and end with ?>.
A PHP file normally contains HTML tags, just like an HTML file, and some PHP
scripting code. Below, we have an example of a simple PHP script which sends the text
"Hello World" to the browser:
<html>
<body>
<?php
echo"HelloWorld";
?>
</body>
</html>
Database Connection:
Before you can access data in a database, you must create a connection to the
database. In PHP, this is done with the mysql_connect() function. The connection will be
closed automatically when the script ends. To close the connection before, use the
mysql_close() function:
<?php
$con = mysql_connect("localhost","Username","Password");
if (!$con)
{
die('Could not connect: ' . mysql_error());
}
mysql_close($con);
?>
To select a database :
mysql_select_db("Databasename", $con);
Execute query :
mysql_query($query, $con);
MySQL is the world's second most widely used open-source relational database management
system. It is named after co-founder Michael Widenius's daughter, My. The SQL phrase stands for
Structured Query Language.
MySQL is a key part of LAMP (Linux, Apache, MySQL, PHP / Perl / Python), the
fast-growing open source enterprise software stack. More and more companies are using
LAMP as an alternative to expensive proprietary software stacks because of its lower cost
and freedom from platform lock-in.
MySQL was originally founded and developed in Sweden by two Swedes and a Finn:
David Axmark, Allan Larsson and Michael "Monty" Widenius, who had worked together
since the 1980's.
Features of MySQL :
The data in MySQL is stored in tables. A table is a collection of related data, and it
consists of columns and rows.
CHAPTER 7
SYSTEM TESTING
In the testing process the Demo versions of the software i.e. actual replica of the existing system
will be installed so that the users can use it as they like and give their valuable suggestion and advice. There
after security can be incorporated in the system. In this phase we will be using both alpha and beta test, which
will enable the user to check the whole system thoroughly. The said Demo version software can be used for a
period of 15 days to 1 month and during this period only training of the proposed software will be imported.
This phase will allow the entire user to use the system in a much more efficient way.
The design tests for software and other engineered products can be as challenging as the initial
design of the product itself. The objectives of the testing are the finding of errors with a minimum amount of
time and effort.
1) Knowing the specified function that a product has been designed to perform, tests can be
conducted that demonstrate each function is fully operational while at the same time searching
for errors in each function;
2) Knowing the internal workings of a product, tests can be conducted to ensure that “all gears
mesh” that is, internal operations are performed according to specifications and all internal
components have been adequately exercised.
System tests are designed to validate a fully developed system to assure that it meets its requirements.
There are essentially three main kinds of system testing:
1. Alpha testing. Alpha testing refers to the system testing carried out by the test team within
the developing organization.
2. Beta testing. Beta testing is the system testing performed by a select group of friendly
customers.
3. Acceptance testing. Acceptance testing is the system testing performed by the customer to
determine whether to accept or reject the delivery of the system.
After testing our project, project is fully satisfy all the testing procedure.
HOME PAGE
<html>
<head>
<!--[if IE 7]>
<![endif]-->
</head>
<body>
<div id="header">
<div>
<div>
<span>Crime</span>
<span class="tagline">Management</span>
</div>
</div>
</div>
<tr>
$Today = date('y:m:d');
echo $new;
?>
</td>
</tr>
</table>
<div id="body">
<div class="header">
<div>
<ul>
<li><a href="#">Home</a></li>
</ul>
</div>
</div>
</div>
<div id="footer">
<div>
<div>
</div>
</div>
</div>
</body>
</html>
<?php
session_start();
?>
<html>
<head>
<meta http-
equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Online Crime
Management System</title>
</head>
<body>
<div id="header">
<div>
<div>
<span>Crime</span>
<a href="index.html"
class="logo"><img src="../images/CCMS LOGO-1.png" alt="" /></a>
<span
class="tagline">Management</span>
</div>
</div>
</div>
<div id="body">
<div class="header">
<div>
<form action=""
method='post'>
<table width='400'
border='2' align='center' bgcolor="#FFA500">
<tr>
<td align="center"
bgcolor="#FFf" colspan="6"><h2>Admin Login Panel</h2></td>
</tr>
<tr>
<td align="right"><font
color="#990000"><strong>Admin Name :</strong></font></td>
</tr>
<tr>
<td align="right"><font
color="#990000"><strong>Admin Password :</strong></font></td>
</tr>
<tr>
<td colspan='4'
align="center"><input type="submit" name="login" value="Login" /></td>
</tr>
</table>
</form>
</div>
<div>
<ul>
<li><a href="../index.php">Home</a></li>
<li><a href="../logout.php">Logout</a></li>
</ul>
</div>
</div>
</div>
<div id="footer">
<div>
<p>Copyright ©
<a href="#">Crime Management System</a></p>
<p
align='center'><strong>Designed by : Abhijit Dey</strong></p>
<div>
<span>Stay Connected
:</span>
</div>
</div>
</div>
</body>
</html>
<?php
if(isset($_POST['login']
))
$admin_name=$_POST
['a_name'];
$admin_pass=$_POST['
a_pass'];
include('connection.php'
);
$query =
mysql_query("select * from admin_login where userid='".$admin_name."' and
password='".$admin_pass."'");
$run =
mysql_num_rows($query);
if($run>0)
{
$_SESSION['a_name']
= $admin_name;
header('location:welco
me.php');
else
echo
"<script>
alert('username or
password not matching');
</script>";
?>
<?php
session_start();
$x=$_SESSION['username'];
?>
<html>
<head>
<!--[if IE 7]>
<![endif]-->
</head>
<body>
<div id="header">
<div>
<div>
<span>Crime</span>
<a
href="../index.php" class="logo"><img src="../images/CCMS LOGO-1.png" alt="" /></a>
<span class="tagline">Management</span>
</div><br>
</div>
</div>
<div class="nav">
<ul>
<li class="selected"><a
href="welcomeSubAdmin.php">Home</a></li>
<li><a href="ReportSub.php">Report</a></li>
<li><a href="Informer.php">Informers</a></li>
<li><a
href="../logout.php">Logout</a></li>
</ul>
</div>
<tr>
<td align='right'
width=350><strong>Today :: </strong><?php
$Today = date('y:m:d');
echo $new;
?>
</td>
</tr>
</table>
<div id="body">
<div class="header">
<div>
<table width='900'
border='0' align='center'>
<tr>
<td
align='center'><h2>Welcome to Crime Management System</h2></td></center>
</tr>
<tr>
<td><img
src="../images/crime7.jpg"></td>
</tr>
</table><br>
</div>
</div>
</div>
<div id="footer">
<div>
<p
align='center'><strong>Designed by : Abhijit Dey</strong></p>
<div>
</div>
</div>
</div>
</body>
</html>
<?php
session_start();
$x=$_SESSION['a_name'];
?>
<html>
<head>
<!--[if IE 7]>
<![endif]-->
</head>
<body>
<div id="header">
<div>
<div>
<span>Crime</span>
<span class="tagline">Management</span>
</div>
</div>
</div><br>
<div class="nav">
<ul>
<li><a href="welcomeSubAdmin.php">Home</a></li>
</ul>
</div>
<tr>
$Today = date('y:m:d');
echo $new;
?>
</td>
</tr>
</table>
<div id="body">
<div class="header">
<div>
<tr>
<th align='center'
bgcolor="#CCFF00"><font color="#990000">Informer code</font></th>
<th align='center'
bgcolor="#CCFF00"><font color="#990000">Station Name</font></th>
<th align='center'
bgcolor="#CCFF00"><font color="#990000">Incharge</font></th>
<th align='center'
bgcolor="#CCFF00"><font color="#990000">Address</font></th>
<th align='center'
bgcolor="#CCFF00"><font color="#990000">City</font></th>
<th align='center'
bgcolor="#CCFF00"><font color="#990000">District</font></th>
<th align='center'
bgcolor="#CCFF00"><font color="#990000">Zone</font></th>
<th align='center'
bgcolor="#CCFF00"><font color="#990000">Email</font></th>
</tr>
<?php
include('connection.php');
$que=mysql_query("select * from
informer");
while($call=mysql_fetch_array($que))
?>
<tr>
<td align="center"
class='style1'><?php echo "<br>".$call[0];?></td>
<td align="center"
class='style1'><?php echo "<br>".$call[1];?></td>
<td align="center"
class='style1'><?php echo "<br>".$call[2];?></td>
<td align="center"
class='style1'><?php echo "<br>".$call[3];?></td>
<td align="center"
class='style1'><?php echo "<br>".$call[4];?></td>
<td align="center"
class='style1'><?php echo "<br>".$call[5];?></td>
<td align="center"
class='style1'><?php echo "<br>".$call[6];?></td>
<td align="center"
class='style1'><?php echo "<br>".$call[7];?></td>
</tr>
<?php
?>
</table>
<br>
</div>
</div>
</div>
<div id="footer">
<div>
<div>
</div>
</div>
</div>
</body>
</html>
<html>
<head>
<!--[if IE 7]>
<![endif]-->
<script type="text/javascript">
function valid()
ErrorText="";
if(document.RegForm.password.value!=document.RegForm.cpassword.value)
document.RegForm.cpwd.focus();
return false;
if(document.RegForm.userid.value=="")
document.RegForm.userid.focus();
return false;
if(document.RegForm.pwd.value=="")
document.RegForm.pwd.focus();
return false;
if(document.RegForm.cname.value=="")
document.RegForm.cname.focus();
return false;
}
RegForm.cname.focus();
return false;
if(document.RegForm.address.value=="")
document.RegForm.address.focus();
return false;
RegForm.address.focus();
return false;
}
var email = document.getElementById('email');
if(!filter.test(email.value))
email.focus();
return false;
if(document.RegForm.age.value=="")
document.RegForm.age.focus();
return false;
if(!pattern.test(age.value))
alert("Invalid age");
return false;
if(!pattern.test(mobile.value))
alert("Invalid Contactno");
return false;
}
if(document.RegForm.consumerno.value=="")
document.RegForm.age.focus();
return false;
if(ErrorText="")
Reform.submit();
</script>
</head>
<body>
<div id="dialogoverlay"></div>
<div id="dialogbox">
<div>
<div id="dialogboxhead"></div>
<div id="dialogboxbody"></div>
<div id="dialogboxfoot"></div>
</div>
</div>
<div id="header">
<div>
<div>
<span>Crime</span>
<span class="tagline">Management</span>
</div><br>
</div>
</div>
<div class="nav">
<ul>
<li><a href="../index.php">Home</a></li>
<li><a href="#">Feedback</a></li>
<li><a href="../logout.php">Logout</a></li>
</ul>
</div>
<tr>
$Today = date('y:m:d');
echo $new;
?>
</td>
</tr>
</table>
<div id="body">
<div class="header">
<div>
<?php
if(isset($_POST['reg_info']))
{
$username=$_POST['userid'];
$password=$_POST['pwd'];
$cname=$_POST['cname'];
$address=$_POST['address'];
$email=$_POST['email'];
$dob=$_POST['dob'];
$sex=$_POST['sex'];
$phone=$_POST['phone'];
$client_id=$_POST['c_id'];
$con=mysql_connect("localhost","root","");
if($con)
$dbstatus=mysql_select_db("crime");
if($rs)
else
else
{
?>
<tr>
</tr>
<TR>
<TD>USERID:
</TD>
</TD>
</TR>
<TR>
<TD>PASSWORD:
</TD>
</TD>
</TR>
<TR>
<TD>CONFIRM PASSWORD:
</TD>
</TD>
</TR>
<tr>
<td>COMPLAINER NAME:</td>
<td><input name="cname" type="text" id="cname" size="30" align="middle"
placeholder="Name Title"><br></td>
</tr>
<tr>
<td>ADDRESS:
</td>
</td>
</tr>
<TR>
<TD>EMAIL ID:
</TD>
</TD>
</TR>
<TR>
<TD>DATE OF BIRTH:
</TD>
</TD>
</TR>
<tr>
<td>SEX:
</td>
<option value="Male">Male</option>
<option value="Female">Female</option>
</select>
</td>
</tr>
<TR>
<TD>CONTACT NUMBER:
</TD>
</TD>
</TR>
<TR>
<TD>CLIENT ID:
</TD>
</TD>
</TR>
<tr>
<td>
</td>
<td>
</td></tr>
</table>
</td></tr></table>
</form>
</tr>
</table>
<br>
</div>
</div>
</div>
<div id="footer">
<div>
<div>
</div>
</div>
</div>
</body>
</html>
CHAPTER 9
MAINTENANCE
INTRODUCTION:-
This phase provides the necessary software adjustment for the system so that it continues to comply
with the original specifications. Maintenance is necessary to eliminate errors in the working system
during its working life and to tune the system to any variations in its working environment. Often
small system deficiencies are found as a system is brought into operations and changes are made to
remove them. System planners must always plan for resource availability to carry out these
maintenance functions. The importance of maintenance is it continues to bring the new system to
standard.
Adaptive Maintenance
A software product might need maintenance when the customers need the
product to run on new platform, on new operating systems, or when they need the product to
interface with new hardware or software.
Corrective Maintenance
Perfective Maintenance
A software product needs maintenance to support the new features that the
users want or to change different functionalities of the system according to customer demand.
CHAPTER 10
CONCLUSION
The major challenge that was faced during the development of the software was to make the system
flexible enough to cope with requirement that had given from the organization .May there are many
more other feature that should be tracked to make the system a full flea zed one. Project has been
consider as a “Learning project and tried to grain and grip over the technology use for implementation
purpose. Some monotonous feature that are even not implemented that could included in the system.
FUTURE ENHANCEMENT
Although it has been tried to best from my side to fulfill all the necessities of the organization that are
required through that system. No system can be perfect and complete. Possibility of some drawback
or deficiency in it comprehensiveness can not be over ruled. Again there is scope for farther
development of existing system.
In our project also we can include some purpose to extend our project in future and that are given
below:
LIMITATIONS
- Ramez Elmasri
- Shamkant B.Navathe
- Rajiv Mall
Search engine:
www.google.com
www.google.com-image
www.searchnu.com
Websites :
www.w3school.com