Sei sulla pagina 1di 29

Page no:

PROJECT WORK CERTIFICATE


This is to certify that

Project Associates:
ARJUN H M BC140003

MALATHI S N BC140011

NAYANA C M BC140016

Have Satisfactorily completed the project work entitled ”CRIME REPORTING”


Submitted in partial fulfillment for the award of the degree of BACHELOR OF COMPUTER
APPLICATION (B.C.A) by the KUVEMPU UNIVERSITY during the academic year

2016-17

Project Guide:
Mrs. K.S. Vanishree

HOD of Computer Science

GFGC, Shikaripura

Signature of Examiners

1. …………………………..
2. …………………………..

Date of Examination:

Place: Government First Grade College, Shikaripura.


Page no:

ABSTRACT
Project description:
The Crime Reporting system is to provide help and information to users about crime
handling departments. In this application the user who login with details can access details and
mainly register their complaint with proper details.This application also provides another feature,
that is, the user can communicates with admin by asking question about departments and also
some other details and get replay by admin .

The application use tools are HTML & PHP was used to create the front end for the
system and SQL Server was used for the back end. The graphical user interface of the front end
use HTML, Java Scripts, CSS and access the back end MYSQL Server Database using embedded
SQL Queries for the retrieval and update. The front end and back-end is connected using a SQL
Server.
Page no:

ACKNOWLEDGEMENT
After completion of this project on “Crime Reporting”. We have almost entered into the
commercial design world. We would use this auspicious occasion to thank each and everyone
who have contributed to this project and helped to get the successful results.

We express our deep sense of gratitude to Dr. G R HEGDE Principal of Government First
Grade College Shikaripur for his encouragement and moral support throughout the course and
valuable suggestion during the work.

We express our deep depth of gratitude to revered guide, Mrs. VANISHREE K S Head of the
department(B.C.A) for her sustained guidance, encouragement and valuable suggestion for the
completion of our work, without whom, this project could not have been completed.

We would like to thank all the staff and nonteaching staff of Computer Science, Government
First Grade College for their support and encouragement in the project.

We oblige to thank the Government first grade college, Kuvempu University for providing
opportunity to study here and to carry out project work successfully.

We also thank one and all who directly or indirectly helped us during our course of study.

Project Associates :
ARJUN H M

MALATHI S N

NAYANA C M
Page no:

CONTENTS
CHAPTERS

1. Introduction
1.1 Aim

1.2 Purpose

2. Literature Survey
2.1Existing And Proposed System

2.1.1 Existing System

2.1.2 Proposed System

2.2 Feasibility Study

2.2.1 Technical Feasibility

2.2.2 Operational Feasibility

2.2.3 Economical Feasibility

2.3 Tools And Technologies Used

2.3.1 Tools: XAMPP

2.3.2 Technologies

2.3.2.1 HTML

2.3.2.2 PHP

2.3.2.3 CSS

2.4 Hardware And Software Requirements

2.4.1 Minimum Hardware Requirements

2.4.2 Software Requirements


Page no:

3. Software Requirements Specification


3.1 Functional Requirements

3.2 Non-Functional Requirements

4. System Design
4.1 System Perspective

5. Detailed Design
5.1 Data Flow Diagram

5.2 Entity Relationship Diagram

5.3 Database Design

6. Implementation
6.1 Introduction

7. Software Testing
7.1 Introduction

7.1.1 Unit Testing

7.1.2 Integrated Testing

7.1.3 Validation Testing

7.2 Test Cases

8. Conclusion

9. Future Enhancement

10. Bibliography
Page no:

INTRODUCTION
1.1 Aim
The primary aim of this is to develop a web application which helps to register complaints
about crimes and other illegal activities.

1.2 Purpose
Crime management system is an application that helps the user to register complaints.
This application helps to register complaints directly. It has an facility to interact with the admin
for any type of information about the application.
Page no:

LITERATURE SURVEY
2.1 Existing system and Propose system

2.1.1 Existing system


Currently there are less or none crime management tools accessible to common public. In
many of the cases there may not be a guarantee that a complaint is lodged properly and
acknowledged by law enforcement authority. The chances of issues addressed and the follow up
done on any lodged complaints may be less.

2.1.2 Proposed system


Here we propose a more sophisticated technology touch for managing offences deals with
public . Public can log complaint against illegal activities directly with proof and the identity of
the reporter will be kept confidential.

2.2 Feasibility study

2.2.1 Technical feasibility


The feasibility is the important step in any software development process. This is because it
makes analysis of different aspects like cost required for developing and executing the system, the
time required for each phase of the system and so on. If these important factors are not analyzed
then definitely it would have impact on the organization and the development and the system
would be a total failure. So for running the project and the organization successfully this step is a
very important step in a software development life cycle process.Before developing a product or
software it is an essential step that one does feasibility study in some or all the areas mentioned
which would help in developing and maintaining the software efficiently and effectively within
budget costs.

2.2.2 Operational feasibility


The objective of software project planning is to provide a frame work that enables the
manager to make reasonable estimates of resources, cost and schedule.

Operational feasibility is a measure of how well a proposed system solves the problem,
and takes advantage of the opportunities identified during scope definition and how it satisfies the
requirements identified in the requirement analysis phase of system development.
Page no:

2.2.3 Economical feasibility

For any system if the expected benefits equal or exceed the expected cost
the system can be judged to be economically feasible. In economic feasibility, cost benefit
analysis is done in which expected costs and benefits are evaluated. Economic analysis is used for
evaluating the effectiveness of the proposed system.
In economic feasibility, the most important is cost-benefit analysis. As the name suggests, it is
an analysis of the costs to be incurred in the system and benefits derivable out of the system.

2.3 Tools and Technologies Used

2.3.1 Tools: XAMPP


XAMPP is a free and open source cross-platform web server developed by
Apache Friends. XAMPP stands for Cross-Platform(X), Apache(A), PHP(P), MySQL(M) and
Perl(P). It is a simple, light-weighted Apache server that makes it extremely easy for developers
to create a local http server with just few clicks. It’s ready to use and make it easy for developers
to take their code and host it locally and test the same. It has wordpress featured by which it
contains many themes of websites which are popular and we can use them to make a website.

2.3.2 Technologies

2.3.2.1 HTML
HTML stands for Hyper Text Markup Language.HTML describes the structure of web
pages using markup.HTML elements are the building blocks of HTML pages. HTML elements
are represented by tags. These tags label pieces of content such as “heading”, “paragraph”,
“table”, and so on… Browser do not display the HTML tags, but use them to render the content of
the pages.

2.3.2.2 PHP
PHP is a server-side scripting language designed primarily for web development but also
used as a general-purpose programming language. Originally created by RasmunLerdorf in
1994, The PHP reference implementation is now produced by The PHP Development Team. PHP
originally stood for the recursive acronym PHP:Hypertext Preprocessor.

PHP code may be embedded into HTML code, or it can be used in combination with various
web template systems, web content management system and web frameworks. PHP code is
usually processed by a PHP interpreter implemented as a module in the web server or as a
Common Gateway Interface(CGI) executable, which may be any type of data, including images,
Page no:

with the generated web page. PHP code may also be executed with used to implement standalone
graphical applications.

2.3.2.3 CSS
CSS stands for Cascading Style Sheets. CSS describes how HTML elements are to be
displayed on screen, paper, or in other media. CSS saves a lot of work. It can control the layout of
multiple web pages all at once. External style sheets are stored in CSS files. CSS is designed
primarily to enable the separation of document content from document presentation, including
aspects such the layout, color, and fonts. This separation can improve more flexibility and control
in the specification of presentation characteristics, enable multiple HTML pages to share
formatting by specifying the relevant CSS in a separate .css file, and reduce complexity and
repetition in the structural content.

2.3 Hardware and Software Requirements

2.3.1 MINIMUM HARDWARE REQUIREMENTS

o Processor : Pentium 4
o RAM : 1GB
o Hard Disk : 80 GB

2.3.2 SOFTWARE REQUIREMENTS


o IDE : ADOBE DEAMWEAVER
o Language : HTML, PHP
o Back End : MY SQL
Page no:

3.SOFTWARE REQUIREMENTS SPECIFICATION


A Software requirements specification (SRS) is a brief documentation of the requirements
necessary for the software being developed and it is also a group of use cases which describes
user’s interactions with application being developed. Software requirements specification
documents the needs of customers and it is also considered as an agreement between customers
and contractors. Software requirements specification gathers the necessary requirements before
design proceeding with any of the software development steps.
The software requirements specification document gathers necessary requirements that are
required for the project to be developed that meet the needs of the customers and end up with the
customer satisfaction of the project. To produce the requirements of the customers we should
obtain a clear understanding about the application to be developed based on the customer needs.
The success of the project can be achieved with continuous communications with the customer as
well as the project team till the completion of the software and this would also add advantage for
the company growth.

The Software requirements are grouped into two categories:

 Functional Requirements

 Non-functional requirements

3.1 Functional Requirements

3.1.1 Admin module


The admin is login to the application, verified the user details. They can handle the registered
complaint details. Then they can get processing and completed states by departments.Admin is
also communicating with user by replaying their questions.

3.1.2 Department module


The department is invisible module that can process the user registered complaint and
handles the complaint to complete process handling status is reaches to admin in view form by
department then user can get departments completing status by viewing in application.

3.1.3 User module


Each of the users, who has a complaint to register, must first register with our site. For
the registration part each person enter their details like name, address, phone no., email, unique
User Id & password. Once the registration is complete, the user can sign-in to the website &
register their complaint.
Page no:

3.2 Non-Functional Requirements


The system is very user-oriented system so as all user-oriented systems should be

 Reliability

 Security

 Availability

 Performance

3.2.1 Reliability
For application dependability, the application has been produced on web stage and
facilitated in negligible down time apache server. The unwavering quality of the application is
additionally tended to in the exchange and the User Interface has been made to make the client
agreeable and straightforward.

3.2.2 Security

For any application security is important as it may get misused by any other people. Providing
security for application will make it more helpful and convenient for all the users as well as
admin. Security is one of the important things in any application.

3.2.3 Availability

As said before the structure will be encouraged on an XAMPP server which will have
outstandingly insignificant down time which will promise the web system is open at unequaled
and wherever from the world.

3.2.4 Performance
The execution of such gigantic framework will have a greater part in an association. The
client are agreeable and feel dependable on this application such a large number of proficient
methods are utilized as a part of advancement of the application and use CSS and MYSQL will
likewise build the execution of the framework with high measures.
Page no:

4. SYSTEM DESIGN
Systems design is the procedure of characterizing the construction, modeling, interfaces,
segments and information for a system to fulfill the predefined requirements.

4.1 System Perspective


The application uses 3-Tier architecture,

Figure 4.1.1 General 3-Tier architecture

The architecture uses 3-tiers as follows:

Client tier

Middleware/Business logic tier

Database tier

The client level holds the illustrating part of the User Interface that will be perceptible to
the customers using the application; the middleware/business method of reasoning goes about as a
transitional between the client level and the database level. It prevalently involves the business
method of reasoning that would help the client level to collaborate with the Database level and
bring the required data and make it open to the customers taking up with the client level and the
Database level contains data stockpiling justification and the database to store the data that will be
requested by the customers. The Web System will also use 3-Tier Architecture.
Page no:

First tier – php, CSS


This is the first and top-most layer of the application where the client is required to
perform exercises. Any application that requires the client to top off a structure is only the
Presentation Layer. In web applications, web structure has a place with the Presentation Layer.
The whole client's information approval alongside principle preparing is done in this layer. In this
application we are utilizing php and CSS dialects to give the clients a superior appearance of the
structures which would give the clients a decent look and feel.

Second tier –Business logic


The vast majority of the business operations are performed Business rationale level.
Normally we characterize the classes and all the business substances in this layer. Here we have
diverse modules that are helpful for the client's communication with the applications. The
business rationale is useful for the Users connection with the application and this will be in the
application layer furthermore is the most essential layer of the engineering which involves the
whole business rationale.

Third tier – MYSQL


Next on top of the Business Logic Layer is the third level called the database layer. It
incorporates every one of the techniques that backing the business layer to get associated with the
database to perform important operations, for example, recovering the information. By and large
all database related code has a place with this Database Layer. Now and then we additionally
utilize a stage autonomous Database Layer keeping in mind the end goal to bring information
from different database sellers.
Page no:

5. DETAILED DESIGN
5.1 Data Flow Diagram
A data stream diagram (DFD) is the graphical representation of the "stream" of
information all through the web application. A DFD shows up in unpretentious component what
kind of data will be the commitment to the system and what kind of yield delivered by the
structure, furthermore how the information streams all through the structure, and where accurately
the data will be secured.

Level 0

In level 0, both the user and admin are login to the application and the user who login will
register the complaint ,that registered complaint is handle by admin by viewing and verifying and
also completes the process on complaint . this process is after view by user who complaints.

Level 1

In level 1, the user when login to the application can communicate with admin by asking
question. Then the admin will replay to the user queries, after the user can view the admin replay.
Page no:

Level 2

In level 2,both user and admin are logout from the application.

Figure 5.1 Level 0, 1, 2 data flow diagram


Page no:

5.2 E-R Diagram

The entire relationship model(ER model) war developed to facilitate database design by
allowing specification of an enterprise schema that represents the overall logical structure of
database. The ER data models is one of several semantic data models the semantic aspects of the
model lies in its representation of the meaning of the data. The ER-model is very useful in
mapping the meaning and interaction of real world enterprises on to a conceptual the schema.
Because of thisusefulness, many database design tools draw on concepts from the ER-model.
Page no:

5.3 Database Design


The Database design gives the nitty gritty data of the database. This sensible information
model comprises of all the vital basic and physical framework choices furthermore the physical
stockpiling credits that are required to make a configuration in DDL, which will be used to
produce a required database. A totally planned data model comprises of definite properties for
every component being used. The term database arrangement is used to depict diverse parts of the
configuration of a general database plan. Fundamentally, it can be used to store the data. In the
social database outline these are shown as the tables and perspectives. In the database
arrangement the items and the connections between articles delineate to the class objects and the
connections.

Table 5.3.1 login table


Page no:

Table 5.3.2 Complaint registered

Table 5.3.3 verified complaints


Page no:

Table 5.3.4 complaints that are completed

Table 5.5.5 questions table


Page no:

6. IMPLEMENTATION
6.1 Introduction
An execution is a procedure of acknowledgment of exercises to be put into practice.
Numerous usage might exist for a given particular or standard. So as to execute a framework
effectively, number of between related exercises should be completed in a proper arrangement so
that the usage stage can be fruitful which thusly prompts achievement of the venture. The
execution procedures are deliberate for the effective conveyance of the venture. The execution
portrays enough subtle elements of the system being actualized. Regularly the usage utilizes
different well demonstrated approaches for the effective Implementation.

Screenshots

Screen shot1- sign in


Page no:

Screen shot2- login

Screen shot3 - Home


Page no:

Screen shot 4 – crime register

Screen shot 5- complaint view


Page no:

Screen shot 6- Ask question

Screen shot 7- view questions


Page no:

7. SOFTWARE TESTING
7.1 Introduction
Testing process won't be totally recognizing all the deformities inside the product. Or
maybe, it examinations the state and direct of the thing against prophet gauges by which some
individual may distinguish an issue. These prophet measures may comprise of particulars and past
types of the same thing and surmising’s about customer or client wants and other criteria.
The principle part of testing a web application is to distinguish programming disillusionments so
that the imperfections that bring about disappointments can be recognized and amended. The
essential utilization of programming testing comprises of the examination of the code moreover
execution of the code in various situations. These days in programming advancement, the testing
association is for all intents and purposes segregated from the product improvement group. There
are particular parts for testing association in testing applications that are being created in various
phases of improvement so that the deformities can't interfere with the further advancement stages
in the event that they are settled in the early stages as opposed to driving into a disappointment of
the application.

7.1.1 Unit Testing


Testing of every single module (page for our situation) separately is called unit testing.
Each module is executed and confirmed with expected results. This brought about an arrangement
of independently working pages that created autonomous (ward at times) yield. The modules in
our venture are independently tried.

7.1.2 Integrated Testing


Coordination testing is one in which the modules are joined with each other to
synchronize the yields and arrange the stream of control. Every module is mixed with other
module to build up appropriate availability between the two modules. All the person modules
have been incorporated and tried.

7.1.3 Validation Testing


Approval testing manages testing whatever the acceptances are defended and all the
prerequisites are satisfied sensibly according to the necessities of the application – an way to deal
with the issue in an intelligent and social way. All the approval testing have been finished.
Page no:

7.2 Test Cases

Crime reporting

Serial number 1

Test Name Sign up test

All the mandatory fields in sign up form are


Test Item filled by the user and click on the submit button.

Expected output Login page displayed.

Remarks Success.

Serial number 2

Test Name Login Test

Test Item User mail id and password are filled and click
on login button.

Expected output Home page displayed.

Remarks Success.
Page no:

Serial number 3

Test Name Complaint registration test.

Test Item All the mandatory fields in complaint


registering are filled by the user and click on the
submit button.

Expected output Complaints are registered

Remarks Success.

Serial number 4

Test Name Complaints status test.

Test Item User just has to go for view option to view the
status of registered complaint.

Expected output Status of the complaint is displayed.

Remarks Success.
Page no:

Serial number 5

Test Name Ask questions.

Test Item Question option fields should be filled and click


on submit.

Expected output Submitted

Remarks Success.

Serial number 6

Test Name View questions replay.

Test Item Go for view question on home page.

Expected output All questions must be viewed.

Remarks Success.
Page no:

Serial number 7

Test Name Logout test.

Test Item A click on logout option.

Expected output Go to login page.

Remarks Success.
Page no:

8. CONCLUSION
The critical bit of our assignment was about learning php coding. We put stores of vitality
in getting some answers concerning how to originator this web application. Ultimately we took
references of existing online applications like php Myadmin remembering the finished objective
to code over undertaking. We have secured all the parts of this web application. We have included
toll and import highlights in our errand. Table and Database upgrade segments is the key
component that we have used as a piece of our endeavor.

9. FUTURE ENHANCEMENTS
In future, we are wanting to add more departments, and have to the complaints directly to
the concerned departments. we are wanting to convey this application over the web with the goal
that it might be useful, and to do licenses on this in future.

10.BIBLIOGRAPHY

BOOKS
[1] Steven Holzner, PHP: Black Book, 1st Edition, 2005
[2] Thomas A Powell, HTML and CSS, Black BOOK, 5th edition

REFERENCE
1. http://www.w3school.com
2. http://www.tutorialspoint.com/sql

Potrebbero piacerti anche