Вы находитесь на странице: 1из 32

CHAPTER-1

INTRODUCTION
of Technology Used

1.1 ABOUT JAVA

Initially the language was called as “oak” but it was renamed as “Java” in 1995.
The primary motivation of this language was the need for a platform-independent (i.e.,
architecture neutral) language that could be used to create software to be embedded in
various consumer electronic devices.

 Java is a programmer’s language.

 Java is cohesive and consistent.

 Except for those constraints imposed by the Internet environment, Java


gives the programmer, full control.
Finally, Java is to Internet programming where C was to system programming.

IMPORTANCE OF JAVA TO THE INTERNET

Java has had a profound effect on the Internet. This is because; Java expands the
Universe of objects that can move about freely in Cyberspace. In a network, two
categories of objects are transmitted between the Server and the Personal computer. They
are: Passive information and Dynamic active programs. The Dynamic, Self-executing
programs cause serious problems in the areas of Security and probability. But, Java
addresses those concerns and by doing so, has opened the door to an exciting new form of
program called the Applet.

JAVA CAN BE USED TO CREATE TWO TYPES OF PROGRAMS

APPLICATIONS AND APPLETS: An application is a program that runs on our


Computer under the operating system of that computer. It is more or less like one creating

1
using C or C++. Java’s ability to create Applets makes it important. An Applet is an
application designed to be transmitted over the Internet and executed by a Java –
compatible web browser. An applet is actually a tiny Java program, dynamically
downloaded across the network, just like an image. But the difference is, it is an
intelligent program, not just a media file. It can react to the user input and dynamically
change.

1.2 FEATURES OF JAVA

 SECURITY

Every time you that you download a “normal” program, you are risking a viral
infection. Prior to Java, most users did not download executable programs frequently, and
those who did scanned them for viruses prior to execution. Most users still worried about
the possibility of infecting their systems with a virus. In addition, another type of
malicious program exists that must be guarded against. This type of program can gather
private information, such as credit card numbers, bank account balances, and passwords.
Java answers both these concerns by providing a “firewall” between a network
application and your computer.

When you use a Java-compatible Web browser, you can safely download Java
applets without fear of virus infection or malicious intent.

 PORTABILITY

For programs to be dynamically downloaded to all the various types of platforms


connected to the Internet, some means of generating portable executable code is needed
.As you will see, the same mechanism that helps ensure security also helps create
portability. Indeed, Java’s solution to these two problems is both elegant and efficient.

 THE BYTE CODE

The key that allows the Java to solve the security and portability problems is that
the output of Java compiler is Byte code. Byte code is a highly optimized set of
instructions designed to be executed by the Java run-time system, which is called the Java
Virtual Machine (JVM). That is, in its standard form, the JVM is an interpreter for byte
code.

2
Translating a Java program into byte code helps makes it much easier to run a
program in a wide variety of environments. The reason is, once the run-time package
exists for a given system, any Java program can run on it.

Although Java was designed for interpretation, there is technically nothing about
Java that prevents on-the-fly compilation of byte code into native code. Sun has just
completed its Just In Time (JIT) compiler for byte code. When the JIT compiler is a part
of JVM, it compiles byte code into executable code in real time, on a piece-by-piece,
demand basis. It is not possible to compile an entire Java program into executable code all
at once, because Java performs various run-time checks that can be done only at run time.
The JIT compiles code, as it is needed, during execution.

 JAVA VIRTUAL MACHINE(JVM)

Beyond the language, there is the Java virtual machine. The Java virtual machine
is an important element of the Java technology. The virtual machine can be embedded
within a web browser or an operating system. Once a piece of Java code is loaded onto a
machine, it is verified. As part of the loading process, a class loader is invoked and does
byte code verification makes sure that the code that’s has been generated by the compiler
will not corrupt the machine that it’s loaded on. Byte code verification takes place at the
end of the compilation process to make sure that is all accurate and correct. So byte code
verification is integral to the compiling and executing of Java code.

Overall Description
Java byte code

Java Source JavaVM

Java .Class

Fig 1.1 Picture showing the development process of JAVA Program

Java programming uses to produce byte codes and executes them. The first box
indicates that the Java source code is located in a. Java file that is processed with a Java
compiler called javac. The Java compiler produces a file called a. class file, which
contains the byte code. The. Class file is then loaded across the network or loaded locally

3
on your machine into the execution environment is the Java virtual machine, which
interprets and executes the byte code

1.3 JAVA ARCHITECTURE

Java architecture provides a portable, robust, high performing environment for


development. Java provides portability by compiling the byte codes for the Java Virtual
Machine, which is then interpreted on each platform by the run-time environment. Java is
a dynamic system, able to load code when needed from a machine in the same room or
across the planet.

1.4 COMPILATION OF CODE


When you compile the code, the Java compiler creates machine code (called byte
code) for a hypothetical machine called Java Virtual Machine (JVM). The JVM is
supposed to execute the byte code. The JVM is created for overcoming the issue of
portability. The code is written and compiled for one machine and interpreted on all
machines. This machine is called Java Virtual Machine.

Java
PC Compiler Java
Interpreter
Source
(PC)
Code
Macintosh Byte code Java
………..
Compiler Interpreter
………..
(Macintosh)
SPARC
(Platform Java

……….. Compiler indepen Interpreter

dent) (Sparc)

…………

Fig 1.2 compilation of code

4
During run-time the Java interpreter tricks the byte code file into thinking that it is
running on a Java Virtual Machine. In reality this could be a Intel Pentium Windows 95
or SunSARC station running Solaris or Apple Macintosh running system and all could
receive code from any computer through Internet and run the Applets.

 SIMPLE
Java was designed to be easy for the Professional programmer to learn and to use
effectively. If you are an experienced C++ programmer, learning Java will be even easier.
Because Java inherits the C/C++ syntax and many of the object oriented features of C++.
Most of the confusing concepts from C++ are either left out of Java or implemented in a
cleaner, more approachable manner. In Java there are a small number of clearly defined
ways to accomplish a given task.

 OBJECT ORIENTED
Java was not designed to be source-code compatible with any other language. This
allowed the Java team the freedom to design with a blank slate. One outcome of this was
a clean usable, pragmatic approach to objects. The object model in Java is simple and
easy to extend, while simple types, such as integers, are kept as high-performance non-
objects.

 ROBUST
The multi-platform environment of the Web places extraordinary demands on a
program, because the program must execute reliably in a variety of systems. The ability to
create robust programs was given a high priority in the design of Java. Java is strictly
typed language; it checks your code at compile time and run time.

Java virtually eliminates the problems of memory management and deallocation,


which is completely automatic. In a well-written Java program, all run time errors can –
and should –be managed by your program.

1.5 FRONT END: - JAVA

java programming language was originally developed by Sun Microsystems,


which was initiated by James Gosling and released in 1995 as core component of Sun
Microsystems Java platform Initially the language was called as “oak” but it was renamed
as “Java” in 1995. The primary motivation of this language was the need for a platform-
independent (i.e., architecture neutral) language. Internet and Web was just emerging, so

5
Sun turned it into a language of Internet Programming. It allows us to publish a webpage
with Java code in it.

1.5.a How to compile and run a java program

Fig 1.3 How to execute

1.6 AWT

The Abstract Window Toolkit (AWT) package enables you to create GUIs in
your applets and applications. Different Windows API from different platforms were
looked at and components were identified that were common to all of them. The
AWT API communicates with the platform's native API's as to give your application
the native look and feel. Because they associate with their own native screen
resources, AWT components are called heavyweight components. Swing components
do not associate with native resources and are called lightweight components. The
AWT consists of components, both container and non-container ones (eg. Button,
Checkbox, Choice, ...) Container components (eg. Frame, Dialog, Window, Panel)
control the layout of other components. As containers are themselves components,
they can be placed inside other containers. Check out these links and subcategories
on how to create and work with these containers and components.

 Subcategories
 Button  Insets
 Canvas  Input Method Framework
 Checkbox and RadioButton  Label
 Choice  Layout Managers
 Color  List
 Data Transfer (java.awt.datatransfer.*)  Menu, MenuItem
 Dialog  Robot
 Drag and Drop (java.awt.dnd.*)  Scrollbar

6
 Event  ScrollPane
 Font  Textfield, TextArea
 Frame  Toolkit
 Graphics

1.7 SWING
Swing are light weight components which dependent on java API's. So same
look and feel on all Operating Systems. All swing components are designed using
architecture Model View Controller (MVC).
 Model - Storage
 View - Presentation
 Controller – Event Handling

VDU
View Controller

Model

Keyboard Mouse
Fig.1.4 Model View Controller (MVC)
Netscape and sun has jointly produced the original swing set of components as part of the
Java Foundation Classes (JFC). Swing and JFC are not the same thing, rather swing is a
part of the JFC library. JFC provides the following featues: -
 swing (The large UI package)
 cut & paste (Clipboard support)
 Accessibility features
 The desktop color features
 java 2D

7
The five APIs of the java Foundation Classes

Fig.1.5 five APIs of the java Foundation Classes

Four new components have been introduced in Swing to deal with the
complexities involved in mixing up the heavy weight and the lightweight components in
the same container.

Fig.1.6 Type of panes

1.8 NetBeans IDE 8.0

NetBeans IDE 8.0 is released, also providing new features for Java 8 technologies.
It has code analyzers and editors. NetBeans is an integrated development
environment (IDE) for developing primarily with Java, but also with other languages, in
particular PHP, C/C++, and HTML5.

8
Fig 1.7 NetBeans IDE 8.0

1.9 Glassfish server


Glassfish is an open-source application server project started by Sun
Microsystems for the Java EE platform and now sponsored by Oracle Corporation. The
supported version is called Oracle Glassfish Server. Glassfish is free software, dual-
licensed under two free software licenses.

Fig 1.8 Glassfish


The Common Development and Distribution License (CDDL) and the GNU
General Public License (GPL) with the exception. Glassfish is the reference
implementation of Java EE and as such supports Enterprise JavaBeans, JPA, Java
Server Faces, JMS,RMI, Java Server, servlets, etc. This allows developers to create
enterprise applications that are portable and scalable, and that integrate with legacy
technologies. Optional components can also be installed for additional services.

9
1.10 JSP (Java Server Page)
JSP is Short for Java Server Page. Server-side technologies, Java Server Pages are
an extension to the Java servlet technology that was developed by Sun. JSPs have
dynamic scripting capability that works in tandem with HTML code, separating the page
logic from the static elements the actual design and display of the page to help make the
HTML more functional .A JSP is translated into Java servlet before being run, and it
processes HTTP requests and generates responses like any servlet. However, JSP
technology provides a more convenient way to code a servlet. Translation occurs the first
time the application is run. A JSP translator is triggered by the .jsp file name extension in
a URL. JSPs are fully interoperable with servlets. You can include output from a servlet
or forward the output to a servlet, and a servlet can include output from a JSP or forward
output to a JSP.JSPs are not restricted to any specific platform or server..

1.10.a Advantages of JSP:

 Extension to Servlet: -JSP technology is the extension to servlet technology. We can


use implicit objects, predefined tags, expression language and Custom tags in JSP.
 Easy to maintain: -JSP can be easily managed because we can easily separate our
business logic with presentation logic. In servlet technology, we mix our business
logic with the presentation logic.
 Fast Development: -No need to recompile and redeploy If JSP page is modified, we
don't need to recompile and redeploy the project. The servlet code needs to be updated
and recompiled if we have to change the look and feel of the application.
 Less code than Servlet:-In JSP, we can use a lot of tags such as action tags, jsp,
custom tags etc. that reduces the code. Moreover, we can useful, implicit objects etc.

1.10.b Life cycle of a JSP Page: -

 Translation of JSP Page


 Compilation of JSP Page
 Class loading (class file is loaded by the class loader)
 Instantiation (Object of the Generated Servlet is created).

10
 Initialization ( jspInit() method is invoked by the container).
 Request processing ( jspService() method is invoked by the container).
 Destroy ( jspDestroy() method is invoked by the container).

Fig 1.9 JSP Life Cycle

1.11 Servlets
Servlet technology is robust and scalable because of java language. Before Servlet,
CGI (Common Gateway Interface) scripting language was popular as a server-side
programming language. There are many interfaces and classes in the servlet API such as
Servlet, GenericServlet, HttpServlet, ServletRequest, ServletResponse etc. Servlet can be
described in many ways, depending on the context. Servlet is a technology i.e. used to
create web application. Servlet is an API that provides many interfaces and classes
including documentations. Servlet is an interface that must be implemented for creating
any servlet. Servlet is a class that extends the capabilities of the servers and responds to
the incoming request. It can respond to any type of requests. Servlet is a web component
that is deployed on the server to create dynamic web page.

11
Fig 1.10 Servlets

1.12 BACKEND: - SQL SERVER

1.12.a SQL Server

A Database connection is a facility in computer science that allows client software


to communicate with database server software, whether on the same machine or not. A
connection is required to send commands and receive answers. Connections are built by
supplying an underlying driver or provider with a connection string, which is a way of
addressing a specific database or server and instance as well as user authentication
credentials (for example, Server=MySQL, Database=Common: User ID=uid,
Pwd=password ;). Once a connection has been built it can be opened and closed at will,
and properties (such as the command time-out length, or transaction, if one exists) can be
set.

1.12.b A connection can be open with the help of following steps

1. Importing Packages
2. Registering the JDBC Drivers
3. Opening a Connection to a Database

12
4. Creating a Statement Object
5. Executing a Query and Returning a Result Set Object
6. Processing the Result Set
7. Closing the Result Set and Statement Objects
8. Closing the Connection

1.12.c Microsoft JDBC Driver for SQL Server

In our continued commitment to interoperability, Microsoft provides a Java Database


Connectivity (JDBC) driver for use with SQL Server, SQL Azure, and Parallel Data
Warehouse (PDW). The Microsoft JDBC Driver for SQL Server is available at no
additional charge, and provides Java Database Connectivity from any Java application,
application server, or Java-enabled applet

 JDBC-ODBC bridge
 Native-API Driver
 Network-Protocol Driver(Middleware Driver)
 Database-Protocol Driver(Pure Java Driver)

13
CHAPTER-2
INTRODUCTION
to Project Work
2.1 FIR (First Information Report)

A First information report is a written document prepared by police organizations


in Bangladesh, India, and Pakistan when they receive information about the commission
of a cognizable offence. It is generally a complaint lodged with the police by the victim of
a cognizable offense or by someone on his or her behalf, but anyone can make such a
report either orally or in writing to the police. For a non cognizable offense a Community
Service Register is created & registered.

An FIR is an important document because it sets the process of criminal justice in


motion. It is only after the FIR is registered in the police station that the police take up
investigation of the case. Anyone who knows about the commission of a cognizable
offence, including police officers, can file an FIR.

As described in law:
 When information about the commission of a cognizable offence is given orally, the
police must write it down.
 The person giving information or making a complaint has a right to demand that the
information recorded by the police be read to him or her.
 Once the information has been recorded by the police, it must be signed by the person
giving the information.

2.1.1 Cognizable Offence


A cognizable offence is one in which the police may arrest a person without
warrant. They are authorized to start investigation into a cognizable case on their own and
do not require any orders from the court to do so.

2.1.2 Non-Cognizable Offence


A non-cognizable offence is an offence in which a police officer has no authority to
arrest without warrant. The police cannot investigate such an offence without the court’s

14
permission. The category of offences as per Criminal Procedure Code (CrPC) in which
Police can neither register FIR nor can investigate or arrest without the express
permission.

2.2 Lodge FIR


Anyone who knows about the commission of a cognizable offence can file an FIR. It
is not necessary that only the victim of the crime should file an FIR. A police officer that
comes to know about a cognizable offence can file an FIR himself/herself. You can file
FIR if:
 You are the person against whom the offence has been committed.
 You know yourself about an offence, which has been committed.
 You have seen the offence being committed. The police may not investigate a
complaint even if you file an FIR.
 When the case is not serious in nature.
 The police feel that there is not enough ground to investigate.
 The police resources are already over-committed in investigating more serious
offences.

2.3 Procedure of submitting FIR


The procedure of filing an FIR is prescribed in Section 154 of the Code of Criminal
Procedure, 1898. It is as follows:
 When information about the commission of a cognizable offence is given orally, the
police must write it down.
 It is your right as a person giving information or making a complaint to demand that
the information recorded by the police is read over to you.
 You should sign the report only after verifying that the information recorded by the
police is as given by you.
 Always ask for a copy of the FIR, if the police do not give it to you.
 It is your right to get a copy of FIR free of cost.

15
2.1 Procedure of submitting FIR

16
2.4 Law Resource India
The government must allow the online filing of first information reports in rape
cases as that alone will ensure mandatory and automatic registration of complaints on
January 18, 2013, Delhi police chief Neeraj Kumar announced that Zero First Information
Reports (FIRs) may be registered on the basis of a woman’s statement at any police
station irrespective of jurisdiction. This means women can file an FIR at any police
station and the complaint is required to be registered on the basis of the woman’s
complaint verbatim. Mr. Kumar stated: “The woman’s statement has to be taken as gospel
truth and a probe needs to be initiated on its basis.”

2.4.1 Important step forward

At the same time, the Delhi police chief announced a series of other measures
such as the recruitment of 418 women sub-inspectors and 2,088 women constables,
deployment of PCR vans outside women’s colleges, the provision that women can call
100 to seek assistance to be dropped home at night by a PCR van, and 24-hour police
cover for areas around entertainment hubs with heightened security between 8 pm and 1
am. While the foregoing measures must certainly be welcomed as an important step
forward towards making the criminal justice system functional, it is surprising that e-
governance has not been utilized by the Delhi police as an important solution in a country
which is considered the world’s leading provider of IT enabled solutions. The police have
often taken the view that, under Section 154 of the CrPC, complaints need to be
investigated before the FIR is registered because the complaint could be a disguised civil
or commercial dispute or a way of settling personal enmity. Complaints of criminal
cheating and fraud are sometimes filed as a way of pressuring business associates to settle
financial disputes or for personal grudges. However, this is highly unlikely to occur in the
case of rape. In fact, there is no reason why all complaints for at least cognizable offences
should not be registered as FIRs and then investigated.

2.4.2 Tracking network

The online registration of FIRs was supposed to be implemented by 2013. On


March 21, 2012, the then Union Home Minister, P. Chidambaram, stated in the
RajyaSabha that online registration of FIRs would be possible once the server and
network connectivity was established by the end of 2012 or early 2013. However, the

17
online filing of FIRs will be made possible only upon the implementation of the Crime
and Criminal Tracking Network and Systems (CCTNS), an ambitious Rs. 2,000 crore
project of the Home Ministry, aimed at increasing the efficiency and effectiveness of
policing through e-governance.

2.4.3 Track Status


The person can check the current status of the problem through his login ID and
password and person can also give their suggestions and feedback for the problem.

Fig 2.2 Track status

2.5 OBJECTIVE OF ONLINE FIR

2.5.1 Existing System


In the existing system only we can see the details of particular information about
the police stations in our state, the existing system has more workload for the authorized
person, but in the case of Proposed System, the user can registered in our site and send
the crime report and complaint about a particular city or person.

2.5.2 Drawbacks of Existing system


 More man power and Time consuming.
 Consumes large volume of pare work.

18
 Needs manual calculations.
 No direct role for the higher officials.
 Damage of machines due to lack of attention.

To avoid all these limitations and make the working more accurately the system needs
to be computerized.

2.6 Proposed System


The aim of proposed system is to develop a system of improved facilities. The
proposed system can overcome all the limitations of the existing system. The system
provides proper security and reduces the manual work. The existing system has several
disadvantages and many more difficulties to work well. The proposed system tries to
eliminate or reduce these difficulties up to some extent. The proposed system will help
the user to reduce the workload and mental conflict. The proposed system helps the user
to work user friendly.

2.6.1 Expected Advantages of Proposed System


The system is very simple in design and to implement. The system requires very low
system resources and the system will work in almost all configurations. It has got
following features
 Ensure data accuracy’s.
 Proper control of the higher officials.
 Reduce the damages of the machines.
 Minimize manual data entry.
 Minimum time needed for the various processing.
 Greater efficiency.
 Better service.
 User friendliness and interactive.
 Minimum time Required.

2.7 SYSTEM DESIGN


The project titled as “First Information Report “is a web based application. This
software provides facility for reporting online crimes, complaints, missing persons, show

19
most wanted person details mailing as well as chatting. Any Number of clients can
connect to the server. Each user first makes their login to sever to show their availability.
The server can be any Web Server. An SMTP Server must be maintained for temporary
storage of emails and chat jar files for enable the chatting facilities. The main modules in
this project are given below:

2.7.1 Modules
 Admin
 Police
 Registered User
 Visitor
 Criminals

2.7.2 ADMIN MODULE

 View and reply user complaint: - This module helps the admin to view and reply
user’s complaint details.
 View and reply user crimes: - This module helps the admin to view and reply user’s
crimes details.
 Add and delete latest hot news: - This module helps the admin to add and delete
latest hot news.
 View and delete user’s feedback: -This module helps the admin to add and delete
user’s feedback.
 Add, delete and view most wanted persons : -This module helps the admin to add,
delete and view most wanted person details
 Add and view Criminal registration: -This module helps the admin to add
and view criminal registrations.
 Add and view FIR: - This module helps the admin to add and view Fir reports.
 Add and view history sheet: -This module helps the admin to add and view history
reports.
 View and delete all complaint reply: -This module helps the admin to view and
delete complaint reply.
 Add and view prisoner report: - This module helps the admin to add and
prisoner reports.

20
 Change password: - This module helps the admin to update his or her password.

2.7.3 POLICE MODULE

 View and reply user complaint: - This module helps the police officer
to view and reply user’s complaint details
 View and reply user crimes: - This module helps the police officer to view and
reply user’s crimes details
 Update status: - police officer can update the status regarding the complaint of any
person.

2.7.4 THE REGISTERED USER MODULE

 Add Complaint: - This module helps the user to report online complaints.

 Add Crime report: - This module helps the user to report online crimes.

 Add Missing person: -This module help the user to report online missing persons
details also we have to add photos of missing person using heterogeneous database.
 View Missing persons: - This module help the user to view all the missing person
details.
 View Most wanted persons: -This module helps the user to view all most wanted
persons which can be given by the administrator.
 Edit Complaint: -This module helps the user to edit his complaint details.
 Edit Account: -This module helps the user to update his or her profile.
 View complaint status: -This module allows us to view the status of all complaint
that you have posted earlier.
 View crime status: -This module allows us to view the status of the all crimes that
you have posted earlier.
 Add and View feedback: -This module helps the user to add and view feedbacks.
 Mail: - This module helps the user to send mail to the administrator.

2.7.5 VISITORS MODULE


 This module helps the visitor to see the latest hot news which can update by the
admin.

21
2.7.6 Criminal Module
In this module we have all the record of criminals and their crime type.

2.7.7 User can perform the following tasks:

 Home Page
 FIR topics
 What’s New
 Thought Of the day
 About Us
 Online FIR
 State Govt .& Police Links
 Site Map
 FAQ
 Safety Tips
 Children Safety tips
 Home safety Tips
 Vehicle Safety Tips
 Personnel safety Tips
 Road safety tips
 Pride
 Gallantry Awards
 Mauritius awards
 Information about accident
 Complaint
 Suggestion
 Check Status
 Acts & Rules
 Newsletter

22
2.8 SAFETY TOOLS
2.8.1 Children Safety
 Never leave children unattended in a vehicle, whether it is running or not. Children
should never be left unsupervised or allowed to spend time alone or with others in
vehicles as the potential dangers to their safety outweigh any perceived convenience
or “fun.”
 Always accompany your child to the bathroom in a public place. Older children may
want to wander off and browse alone in a mall, at the beach, etc. Do not allow this.
 Avoid buying children clothing displaying their names. A young child is usually
ready to trust anyone who uses his/her name. Explain that someone who knows your
name may not know you or your parents.
 Be involved in your children’s activities: Know the places he or she goes and know
the other adults who are involved.
 Make sure you know where each of your children is at all times. Know your
children’s friend and be clear with your children about the places and homes they may
visit. Make it a rule for your children to check in with you when they arrive at or
depart from a particular location and when there is a change in plans. You should also
let them know when you’re running late or if your plans have changed to show the
rule is for safety purposes and not being used to “check up” on them.
 Listen to your children. Pay attention if they tell you they don’t want to be with
someone or go somewhere. This may be an indication of more than a personality
conflict or lack of interest in the activity or event.
 Notice when anyone shows one or all of your children a great deal of attention or
begins giving them gifts.
 Take the time to talk to your children about the person and find out why the person is
acting in this way.

2.8.2 Home Safety


 Fix grills on windows and glass paneled doors.
 Don't allow any stranger to enter your house, when you are alone without finding out
his identity.
 Beware of persons coming to your house under the pretext of repairing/selling.
 Keep side doors pad locked and main door bolted.

23
 Use slam-shut locks instead of pad locks. Install magic eye and safety chains on
doors.
 Look through the magic eye and ensure the door chain is secure before opening the
door to a stranger.
 Leave a light switched on when you go out of town. Inform your neighbors about
your absence from your home for a long or short period.
 Insure all valuable properties like VCR, TV etc.
 Mark valuables with an identification number like your Ration Card, Passport.
 Install an alarm system and learn how to use it. Monitor your alarm system and
arrange for guard response. Stow away ladders and stools.
 Make your home appear lived in. Don't keep huge amount of cash and ornaments in
the house. Use bank lockers.
 Don't sleep near an open window during the night.

2.8.3 Personal Safety


 Always stop and think about the risk.
 Always identify a visitor before opening the door.
 Never allow young children to open the door to visitors.
 Always ask representatives to provide identification.
 Avoid walking alone at night.
 Walk in busy well lit roads, towards traffic.

2.8.4 Prevent vehicle Thefts


 Don’t keep vehicles in your house compound without locking.
 Two wheelers should be kept in the safe places after tying with a chain and lock.
 When you park your vehicle in the parking area, ask somebody to keep an eye over it.
 Never leave the vehicle door unlocked or the windows partially open.
 Make sure that quarter glasses are properly secured.
 Never leave the key dangling in the ignition.
 Double-check all doors (including the boot) to ensure that they are properly secured.
 Etch registration number of your car on the rear & front window screens and
windowpanes. Do not leave valuables in your car even if it is locked.
 Cut down on extra fittings, as these tempt prospective thieves.
 Install a car alarm.

24
 Never leave important documents in the glove box or boot.
 Never identify your key ring with your name.
 Do not offer a lift to anyone you do not know.
 If someone needs assistance, stop some distance away and communicate through
locked doors and partially opened window.
 In case of theft, immediately inform nearest police station, dial 100.

2.8.5 Road Safety


 Turning to the right, Extend the right arm and hand, with the palm turned to the front,
and hold rigid in a horizontal Position.
 Turning to the left, Extend the right arm and rotate it from the shoulder in an
anticlockwise direction.
 Lefting Vehicle Overtake, Extend the right arm and hand below the level of shoulder
and move backwards and forwards.
 Stopping at Traffic Junctions, Extend the right arm bending the elbow at right angles
and turning palm to the front.

2.8.6 STRUTURE OF PUNJAB POLICE

Fig 2.3 Structure of Punjab police

25
The Punjab Police is responsible for policing in the state of Punjab, India. The
mission of Punjab Police is the prevention and detection of crime, maintenance of law
and order and the enforcement of the Constitution of India. The current chief of Punjab
Police is Sumedh Singh Saini.

2.8.7 Role, Functions and Duties of the Police

 To uphold and enforce the law impartially, and to protect life, liberty, property,
human rights, and dignity of the members of the public;
 to promote and preserve public order;
 to protect internal security, to prevent and control terrorist activities, breaches of
communal harmony, militant activities and other situations affecting Internal Security;
 To protect public properties including roads, railways, bridges, vital installations and
establishments etc. against acts of the vandalism, violence or any kind of attack.
 To prevent crimes, and reduce the opportunities for the commission of crimes through
their own preventive action and measures as well as by aiding and cooperating with
other relevant agencies in implementing due measures for 2 prevention of crimes;
 To accurately register all complaints brought to them by a complainant or his
representative, in person or received by post, e-mail or other means, and take prompt
follow-up action thereon, after duly acknowledging the receipt of the complaint;
 To register and investigate all cognizable offences coming to their notice through
such complaints or otherwise, duly supplying a copy of the First Information Report
to the complainant, and where appropriate, to apprehend offenders, and extend
requisite assistance in the prosecution of offenders;
 To create and maintain a feeling of security in the community, and as far as possible
prevent conflicts and promote amity;
 To provide, as first responders, all possible help to people in situations arising out of
natural or man-made disasters, and to provide active assistance to other agencies in
relief and rehabilitation measures;
 To aid individual, who are in danger of physical harm to their person or property, and
to provide necessary help and afford relief to people in distress situations;
 To facilitate orderly movement of people and vehicles, and to control and regulate
traffic on roads and highways;
 To collect intelligence relating to matters affecting public peace, and all kind of
crimes including social offences, communalism, extremism, terrorism and other

26
matters relating to national security, and disseminate the same to all concerned
agencies, besides acting, as appropriate on it themselves.
 To take charge, as a police officer on duty, of all unclaimed property and take action
for their safe custody and disposal in accordance with the procedure prescribed.
 To train, motivate and ensure welfare of police personnel

2.8.8 Social Responsibilities of the Police


Every police officer shall:
 Behave with the members of the public with due courtesy and decorum, particularly
so in dealing with senior citizens, women, and children; Sec (57), Model Police Act
2006.
 Guide and assist members of the public, particularly senior citizen, women, children,
the poor and indigent and the physically or mentally challenged individuals, who are
found in helpless condition on the streets or other public places or otherwise need help
and protection.
 Provide all requisite assistance to victims of crime and of road accidents, and in
particular ensure that they are given prompt medical aid, irrespective of medico-legal
formalities, and facilities their compensation and other legal claims;
 Ensure that in all situations, especially during conflict between communities, classes,
castes and political groups, the conduct of the police is always governed by the
principles of impartiality and human rights norms, with special attention to protection
of weaker sections including minorities.
 Prevent harassment of women and children in public places and public transport,
including stalking, making objectionable gestures, signs, remarks or harassment
caused in any way;
 Render all requisite assistance to the members of the public, particularly women,
children, and the poor and indigent persons, against criminal exploitation by any
person or organised group;
 Arrange for legally permissible sustenance and shelter to every person in custody and
making known to all such people’s provisions of legal aid schemes available from the
Government and also inform the authorities concerned in this regard.

27
 Preserve, promote and protect human rights and interests of weaker sections,
backward classes, poor, weak and the downtrodden.

2.9 Judicial corruption: Pulling punches


The recent decision of the committee appointed by the RajyaSabha Chairman has
held that a judge of the Calcutta High Court, Soumitra Sen, was prima facie guilty of
grave financial offences and must face impeachment proceedings in Parliament. This has
been showcased as a much-needed curative to tackle corruption in the country’s higher
judiciary (the High Courts and the Supreme Court The ramifications are staggering;
Section 154 of the CrPC deals with the dreaded First Information Report (FIR) that is
every law-abiding citizen’s nightmare. This is the document that empowers any thanedar
in the country to knock on your doors, even at night, and take you to a lock-up in the
police station where the FIR was lodged, if the offence recorded in the FIR is non-bail
able. In such an eventuality, we can forget the standard Hindi film dialogue where the
victim bravely asks the police posse for the “arrest warrant”.
Thanks to the Veera swami verdict, the Indian senior judiciary has arrogated to itself a
blanket immunity that the Constitution’s framers never contemplated. An unvarnished
reading of the judgment leads to the conclusion that a judge can commit any offence
under the laws of the land, but his or her prosecution can only be initiated with the CJI’s
permission. This is certainly the interpretation that is being currently followed by the
country’s judicial and political establishments to make matters worse, as the Sen Case
demonstrates; the judiciary has extended the ratio of the Veera swami decision to
offences alleged to have been committed before a judge assumed office. Nowhere does
the otherwise tainted judgment say this. Sen is charged with committing swindles when
he was an ordinary mortal like the rest of us. It is absurd that the procedure prescribed
under the 1968 Act, read with the relevant Articles of the Constitution, should be
followed to remove him from.

28
2.10 SCREEN SHOTS

Fig 2.4- Home Page of online FIR

Fig 2.5 Admin Login Form

29
Fig 2.6 Registered Police Officers Page

Fig 2.7 Add information about Accidents

30
Fig 2.8 Complaint form

2.11 RESULTS AND DISSCUSSION


 Less Time consuming.
 No needs manual calculations.
 Direct role for the higher officials.
 Direct conversation with higher Authorities
 Ensure data accuracy’s.
 Reduce the damages of the machines.
 Minimize manual data entry.
 Minimum time needed for the various processing.
 Greater efficiency.
 Better service.
 User friendliness and interactive.
 Minimum time required.
 The result in this section provides themes that emerge across the individual case
narratives dealing with phenomena of custodial crimes in police custody.
 It highlights the process by which custodial crimes are dealt in police custody.
 It also examines causative factors, consequences and preventive measures

31
REFERENCES
 Introduction to Java Programming, eighth edition-Daniel Liang (Jan 13, 2010).
 The Complete Reference-Java2-Patrick Naughton and Schildt (1 March, 1999).
 My own daily dairy
 Tutorial point
 www.Google.com
 www.Webopedia.com
 www.Wikipedia.org

32

Вам также может понравиться