Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Project Associates:
ARJUN H M BC140003
MALATHI S N BC140011
NAYANA C M BC140016
2016-17
Project Guide:
Mrs. K.S. Vanishree
GFGC, Shikaripura
Signature of Examiners
1. …………………………..
2. …………………………..
Date of Examination:
ABSTRACT
Project description:
The Crime Reporting system is to provide help and information to users about crime
handling departments. In this application the user who login with details can access details and
mainly register their complaint with proper details.This application also provides another feature,
that is, the user can communicates with admin by asking question about departments and also
some other details and get replay by admin .
The application use tools are HTML & PHP was used to create the front end for the
system and SQL Server was used for the back end. The graphical user interface of the front end
use HTML, Java Scripts, CSS and access the back end MYSQL Server Database using embedded
SQL Queries for the retrieval and update. The front end and back-end is connected using a SQL
Server.
Page no:
ACKNOWLEDGEMENT
After completion of this project on “Crime Reporting”. We have almost entered into the
commercial design world. We would use this auspicious occasion to thank each and everyone
who have contributed to this project and helped to get the successful results.
We express our deep sense of gratitude to Dr. G R HEGDE Principal of Government First
Grade College Shikaripur for his encouragement and moral support throughout the course and
valuable suggestion during the work.
We express our deep depth of gratitude to revered guide, Mrs. VANISHREE K S Head of the
department(B.C.A) for her sustained guidance, encouragement and valuable suggestion for the
completion of our work, without whom, this project could not have been completed.
We would like to thank all the staff and nonteaching staff of Computer Science, Government
First Grade College for their support and encouragement in the project.
We oblige to thank the Government first grade college, Kuvempu University for providing
opportunity to study here and to carry out project work successfully.
We also thank one and all who directly or indirectly helped us during our course of study.
Project Associates :
ARJUN H M
MALATHI S N
NAYANA C M
Page no:
CONTENTS
CHAPTERS
1. Introduction
1.1 Aim
1.2 Purpose
2. Literature Survey
2.1Existing And Proposed System
2.3.2 Technologies
2.3.2.1 HTML
2.3.2.2 PHP
2.3.2.3 CSS
4. System Design
4.1 System Perspective
5. Detailed Design
5.1 Data Flow Diagram
6. Implementation
6.1 Introduction
7. Software Testing
7.1 Introduction
8. Conclusion
9. Future Enhancement
10. Bibliography
Page no:
INTRODUCTION
1.1 Aim
The primary aim of this is to develop a web application which helps to register complaints
about crimes and other illegal activities.
1.2 Purpose
Crime management system is an application that helps the user to register complaints.
This application helps to register complaints directly. It has an facility to interact with the admin
for any type of information about the application.
Page no:
LITERATURE SURVEY
2.1 Existing system and Propose system
Operational feasibility is a measure of how well a proposed system solves the problem,
and takes advantage of the opportunities identified during scope definition and how it satisfies the
requirements identified in the requirement analysis phase of system development.
Page no:
For any system if the expected benefits equal or exceed the expected cost
the system can be judged to be economically feasible. In economic feasibility, cost benefit
analysis is done in which expected costs and benefits are evaluated. Economic analysis is used for
evaluating the effectiveness of the proposed system.
In economic feasibility, the most important is cost-benefit analysis. As the name suggests, it is
an analysis of the costs to be incurred in the system and benefits derivable out of the system.
2.3.2 Technologies
2.3.2.1 HTML
HTML stands for Hyper Text Markup Language.HTML describes the structure of web
pages using markup.HTML elements are the building blocks of HTML pages. HTML elements
are represented by tags. These tags label pieces of content such as “heading”, “paragraph”,
“table”, and so on… Browser do not display the HTML tags, but use them to render the content of
the pages.
2.3.2.2 PHP
PHP is a server-side scripting language designed primarily for web development but also
used as a general-purpose programming language. Originally created by RasmunLerdorf in
1994, The PHP reference implementation is now produced by The PHP Development Team. PHP
originally stood for the recursive acronym PHP:Hypertext Preprocessor.
PHP code may be embedded into HTML code, or it can be used in combination with various
web template systems, web content management system and web frameworks. PHP code is
usually processed by a PHP interpreter implemented as a module in the web server or as a
Common Gateway Interface(CGI) executable, which may be any type of data, including images,
Page no:
with the generated web page. PHP code may also be executed with used to implement standalone
graphical applications.
2.3.2.3 CSS
CSS stands for Cascading Style Sheets. CSS describes how HTML elements are to be
displayed on screen, paper, or in other media. CSS saves a lot of work. It can control the layout of
multiple web pages all at once. External style sheets are stored in CSS files. CSS is designed
primarily to enable the separation of document content from document presentation, including
aspects such the layout, color, and fonts. This separation can improve more flexibility and control
in the specification of presentation characteristics, enable multiple HTML pages to share
formatting by specifying the relevant CSS in a separate .css file, and reduce complexity and
repetition in the structural content.
o Processor : Pentium 4
o RAM : 1GB
o Hard Disk : 80 GB
Functional Requirements
Non-functional requirements
Reliability
Security
Availability
Performance
3.2.1 Reliability
For application dependability, the application has been produced on web stage and
facilitated in negligible down time apache server. The unwavering quality of the application is
additionally tended to in the exchange and the User Interface has been made to make the client
agreeable and straightforward.
3.2.2 Security
For any application security is important as it may get misused by any other people. Providing
security for application will make it more helpful and convenient for all the users as well as
admin. Security is one of the important things in any application.
3.2.3 Availability
As said before the structure will be encouraged on an XAMPP server which will have
outstandingly insignificant down time which will promise the web system is open at unequaled
and wherever from the world.
3.2.4 Performance
The execution of such gigantic framework will have a greater part in an association. The
client are agreeable and feel dependable on this application such a large number of proficient
methods are utilized as a part of advancement of the application and use CSS and MYSQL will
likewise build the execution of the framework with high measures.
Page no:
4. SYSTEM DESIGN
Systems design is the procedure of characterizing the construction, modeling, interfaces,
segments and information for a system to fulfill the predefined requirements.
Client tier
Database tier
The client level holds the illustrating part of the User Interface that will be perceptible to
the customers using the application; the middleware/business method of reasoning goes about as a
transitional between the client level and the database level. It prevalently involves the business
method of reasoning that would help the client level to collaborate with the Database level and
bring the required data and make it open to the customers taking up with the client level and the
Database level contains data stockpiling justification and the database to store the data that will be
requested by the customers. The Web System will also use 3-Tier Architecture.
Page no:
5. DETAILED DESIGN
5.1 Data Flow Diagram
A data stream diagram (DFD) is the graphical representation of the "stream" of
information all through the web application. A DFD shows up in unpretentious component what
kind of data will be the commitment to the system and what kind of yield delivered by the
structure, furthermore how the information streams all through the structure, and where accurately
the data will be secured.
Level 0
In level 0, both the user and admin are login to the application and the user who login will
register the complaint ,that registered complaint is handle by admin by viewing and verifying and
also completes the process on complaint . this process is after view by user who complaints.
Level 1
In level 1, the user when login to the application can communicate with admin by asking
question. Then the admin will replay to the user queries, after the user can view the admin replay.
Page no:
Level 2
In level 2,both user and admin are logout from the application.
The entire relationship model(ER model) war developed to facilitate database design by
allowing specification of an enterprise schema that represents the overall logical structure of
database. The ER data models is one of several semantic data models the semantic aspects of the
model lies in its representation of the meaning of the data. The ER-model is very useful in
mapping the meaning and interaction of real world enterprises on to a conceptual the schema.
Because of thisusefulness, many database design tools draw on concepts from the ER-model.
Page no:
6. IMPLEMENTATION
6.1 Introduction
An execution is a procedure of acknowledgment of exercises to be put into practice.
Numerous usage might exist for a given particular or standard. So as to execute a framework
effectively, number of between related exercises should be completed in a proper arrangement so
that the usage stage can be fruitful which thusly prompts achievement of the venture. The
execution procedures are deliberate for the effective conveyance of the venture. The execution
portrays enough subtle elements of the system being actualized. Regularly the usage utilizes
different well demonstrated approaches for the effective Implementation.
Screenshots
7. SOFTWARE TESTING
7.1 Introduction
Testing process won't be totally recognizing all the deformities inside the product. Or
maybe, it examinations the state and direct of the thing against prophet gauges by which some
individual may distinguish an issue. These prophet measures may comprise of particulars and past
types of the same thing and surmising’s about customer or client wants and other criteria.
The principle part of testing a web application is to distinguish programming disillusionments so
that the imperfections that bring about disappointments can be recognized and amended. The
essential utilization of programming testing comprises of the examination of the code moreover
execution of the code in various situations. These days in programming advancement, the testing
association is for all intents and purposes segregated from the product improvement group. There
are particular parts for testing association in testing applications that are being created in various
phases of improvement so that the deformities can't interfere with the further advancement stages
in the event that they are settled in the early stages as opposed to driving into a disappointment of
the application.
Crime reporting
Serial number 1
Remarks Success.
Serial number 2
Test Item User mail id and password are filled and click
on login button.
Remarks Success.
Page no:
Serial number 3
Remarks Success.
Serial number 4
Test Item User just has to go for view option to view the
status of registered complaint.
Remarks Success.
Page no:
Serial number 5
Remarks Success.
Serial number 6
Remarks Success.
Page no:
Serial number 7
Remarks Success.
Page no:
8. CONCLUSION
The critical bit of our assignment was about learning php coding. We put stores of vitality
in getting some answers concerning how to originator this web application. Ultimately we took
references of existing online applications like php Myadmin remembering the finished objective
to code over undertaking. We have secured all the parts of this web application. We have included
toll and import highlights in our errand. Table and Database upgrade segments is the key
component that we have used as a piece of our endeavor.
9. FUTURE ENHANCEMENTS
In future, we are wanting to add more departments, and have to the complaints directly to
the concerned departments. we are wanting to convey this application over the web with the goal
that it might be useful, and to do licenses on this in future.
10.BIBLIOGRAPHY
BOOKS
[1] Steven Holzner, PHP: Black Book, 1st Edition, 2005
[2] Thomas A Powell, HTML and CSS, Black BOOK, 5th edition
REFERENCE
1. http://www.w3school.com
2. http://www.tutorialspoint.com/sql