Sunteți pe pagina 1din 34

ONLINE CRIME MANAGEMENT SYSTEM

MINI PROJECT WORK

Submitted by

Under the guidance of


Mrs. V. SUMATHI M.C.A.,
Assistant Professor,

DEPARTMENT OF COMPUTER APPLICATION


SRI RAMAKRISHNA COLLEGE OF ARTS AND
SCIENCE (AUTONOMOUS)
FORMERLY S.N.R SONS COLLEGE

(AFFILIATED TO BHARATHIAR UNIVERSITY)


(RE – ACCREDITED BY NAAC with 'A' Grade)
(AN ISO 9001:2008 CERTIFIED INSTITUTION)
COIMBATORE – 641 006

OCTOBER – 2019

1
CERTIFICATE

This is to certify that the dissertation, entitled “ONLINE CRIME MANAGEMENT


SYSTEM”, submitted to the SRCAS, Coimbatore requirements for the award of the
degree of Bachelor of Computer Application is a record of original research work
done by ___________________during the period 2011–2013 of his study in the
Department of Computer Application, Sri Ramakrishna College of Arts and
Science, Coimbatore under my supervision and guidance and the dissertation has not
formed the basis for the award of any Degree / Diploma / Associate Ship / Fellowship
or other similar title to any candidate of any University.

Place: Coimbatore Signature of the Guide

Date:

V. Sumathi MCA.,
Assistant Professor,
Department of Computer
Applications,
SRCAS,
Coimbatore.
Countersigned

Principal & Secretary


S.N.R. Sons College,
Coimbatore - 6

DECLARATION

2
I, _________________ hereby declare that the dissertation, entitled

“ONLINE CRIME MANAGEMENT SYSTEM”, submitted to the Bharathiar


University, in partial fulfillment of the requirements for the award of the degree of
Master of Philosophy in Computer Science is a record of original research work done
by me during 2011–2013 under the supervision and guidance of
____________________ Asst Professor, Department of Computer Applications,
S.N.R. Sons College, Coimbatore and it has not formed the basis for the award of any
Degree / Diploma / Associate Ship / Fellowship or other similar title to any candidate
of any University.

Place : Coimbatore Signature of the


Candidate

Date :
(Ann Maria
James)

3
ACKNOWLEDGEMENT
First and foremost my whole-hearted thanks to the Lord Almighty, the guiding
light of life for granting us the strength and courage to complete this dissertation work.
I express my heartiest gratitude to the Managing Trustee Sri. C.
SOUNDARARAJ, S.N.R. Sons College, Coimbatore.
I express my global thanks to Dr.H.BALAKRISHNAN M.Com., M.Phil.,
Ph.D, Principal & Secretary, S.N.R. Sons College, Coimbatore for the facilities and
assistance provided during the course of the study.

With pride and pleasure I seize this opportunity to record my deep sense of
gratitude to my guiding light Mr. G. PARAMASIVAM M.C.A., M.Phil., Assistant
Professor, Department of Computer Applications, S.N.R. Sons College, Coimbatore for
his inspiring Guidance, meticulous planning, through comments, constructive criticism,
persistent efforts and fruitful discussions. I really learned a lot from his vast knowledge
and Intellectual insight.
I record my deep sense of gratitude and will remain obliged to
Mr. A.BALASUBRAMANIAN M.C.A., M.Phil., SET., NET, Prof & Head,
Department of Information Technology, S.N.R. Sons College, Coimbatore for his
valuable help and suggestions to complete my dissertation.

I take this opportunity to express my gratitude to the staff members, research


scholars and non-teaching staff members of the S.N.R. Sons College, Coimbatore for
their timely help.
I would like to extend my heartfelt thanks to my beloved parents and family
members without whose support in the dissertation would be impossible.

The amount of encouragement received especially from my friends requires a


special mention. I record my deep indebtedness to them for their support.

MURAJITH KUMAR . B

4
ABSTRACT

Each and every citizen may have any one of the complaint in their entire life. They will
be given an email id for each jurist division, where they can send an email when they have a
complaint to register. The emails will get converted to complaints and get assigned to the
persons handling that product. The complaints can be assigned to different persons and will get
tracked to closure. The person handling the complaint will have the facility to communicate
with the customer via emails through the system.

Language Used
Front End : PHP

Back End : MYSQL

5
Table of Contents

Chapter Contents Page Num


Num

1 Introduction
1.1 Project description

2 System Analysis
2.1 Existing System

2.1.1 Disadvantages Of Existing System

2.2 Proposed System

2.3 System Specification

2.3.1 Hardware Specification

2.3.2 Software Specification

3 SOFTWARE DESCRIPTION
3.1 Front End

4 SYSTEM DESIGN AND DEVELOPEMENT


4.1 Input design
4.2 Output design
4.3 Design notation
4.4 Modules

5 SYSTEM TESTING
5.1 Testing Methodologies

5.2 Type of Testing

SYSTEM IMPLEMENTATION AND


6
MAINTANENCE
6.1 System implementation

6
6.2 Validation and Verification

CONCLUSION AND FUTURE


7
ENHANCEMENT
Bibliography and web references

Appendix

Sample source code

Screen Shots

7
INTRODUCTION

In PHP titled as Online Crime Management System is a web application developed using PHP
and MySQL Server. This Web application is for police station which provides facility for
reporting crimes, complaints, FIR, charge sheet, prisoner records, show most wanted criminal’s
details, law and order details as well as court details. It also track police station constable
details, police information, attendance details, salary report, over time, etc. This Software
Package allows Police Departments to store all the details related to the department and use

them whenever necessary.

This software provides facility for reporting online crimes, complaints, missing persons, show
mostwanted person details mailing as well as chatting. Any Number of clients can connect to the server.
Each user first makes their login to sever to show their availability. The server can be any Web Server.
An SMTP Server must be maintained for temporary storage of emails and chat jar files for enable the
chatting facilities.The main modules in this project

8
2. SYSTEM ANALYSIS

System study is classified into two types

 Existing system and


 Purpose system

2.1 EXISTING SYSTEM

In existing system if someone wants to register a complaint against somebody he/she


has to go to the police station or a corresponding authority in person otherwise through email
communication. It was a time consuming work that requires lots of paper and documentation
work. Similarly he / she cannot track the status of his/her complaint.

2.1 Drawbacks of Existing System


 More man power.
 Time consuming.
 Consumes large volume of pare work.
 Needs manual calculations.
 No direct role for the higher officials.
 Damage of machines due to lack of attention.
To avoid all these limitations and make the working more accurately the system needs to be
computerized.

9
2.2 PROPOSED SYSTEM

The aim of proposed system is to develop a system of improved facilities. The proposed system
can overcome all the limitations of the existing system. The system provides proper security and reduces
the manual work. The existing system has several disadvantages and many more difficulties to work
well. The proposed system tries to eliminate or reduce these difficulties up to some extent. The proposed
system will help the user to reduce the workload and mental conflict. The proposed system helps the
user to work user friendly and he can easily do his jobs without time lagging.

3.1 Expected Advantages of Proposed System

The system is very simple in design and to implement. The system requires very low system
resources and the system will work in almost all configurations. It has got following features

 Ensure data accuracy’s.


 Proper control of the higher officials.
 Reduce the damages of the machines.
 Minimize manual data entry.
 Minimum time needed for the various processing.
 Greater efficiency.
 Better service.
 User friendliness and interactive.
 Minimum time required.

10
2.3 SYSTEM SPECIFICATION

2.3.1HARDWARE REQUIREMENTS

 Processor : Intel dual Core

 Hard disk : 500 GB

 Mouse : Logitech.

 RAM : 2GB(minimum)

 Keyboard : 110 keys enhanced.

2.3.2 SOFTWARE REQUIREMENTS

 Operating system : Windows 8 / 10

 IDE : Dream weaver, Visual studio code

 Front End : PHP

 Back End : MYSQL

 Database : MySQL

 Server : apache

 Design : Html,Css

 Browser : Internet explorer, Firefox.

11
3. SOFTWARE DESCRIPTION

3.1 FILE DESIGN

This chapter is about the Software languages and the tools used in the development of
the project. The Primary Languages are PHP And MYSQL.

FEATURES OF PHP

PHP is a server scripting language, and a powerful tool for making dynamic and
interactive Web pages.PHP is a widely-used, free, and efficient alternative to competitors such
as Microsoft's ASP.PHP is an interpreted scripting language that is embedded within an HTML
web page in order to add dynamic processing to that page.

PHP is supported by a wide range of commercial and open-source web servers,


including RedHat Linux, and can also be installed as an Apache module. Its widespread
availability and its relative simplicity mean that it is an excellent way to introduce dynamic
features into your web pages. As it is an open, non-proprietary standard, PHP developers are
not restricted by the limitations imposed by some commercial suppliers of server-side scripting
software, neither do they have to purchase expensive licenses in order to use it.

You may already be familiar with 'client-side' scripting languages such as JavaScript.
If you include JavaScript in your page, then the JavaScript code is downloaded to the client's
browser and executed there. PHP is different in that it is strictly a 'server-side' scripting
language - this means that the PHP is always processed by the web server before the requested
page is served to the browser. The PHP tags in the page are replaced by generated HTML
strings and the client's browser then displays the HTML without any knowledge of the
underlying PHP code at all.

The syntax of the language is similar to C, so anyone who is familiar with the C
programming language, (or Perl or Java, for that matter) should be able to master PHP scripting
quickly and without too much difficulty. Object Orientated Programming extensions have been
introduced with the latest release of PHP which allow you to use objects within a PHP script.

12
PHP can be used to do anything that any CGI program can do, such as:

 Collect and process form data


 Generate dynamic page content
 Send and receive cookies

One of PHP's biggest strengths is its ability to interface with databases. PHP supports
a wide range of databases, including proprietary (such as Sybase and Oracle) and open-source
(such as MySQL and PostgreSQL). The complete list is growing all the time. PHP can also
communicate with other processes using a variety of standard protocols.

The main disadvantage of PHP is that it is an interpreted language and therefore there
is inevitably a overhead in processing a page of PHP script. However, no PHP code is ever
downloaded to the client's browser so there is never any question of a user 'stealing' your PHP
code and adapting it for his own purposes.

PHP is a very powerful program that can access files, execute commands and open
network connections on the server. These features would make anything being run on the server
insecure by default. Because PHP is specifically designed to operate on web servers then it is
intrinsically more secure that 'general purpose' languages such as C or Perl. PHP has a number
of different configuration options which give the web server manager the ability to set precisely
the level of security that is needed for the situation.

History of PHP:

PHP was invented by Rasmus Lerdorf in 1995. He is known as Father of PHP. He


started PHP as a replacement for various Perl scripts. He used PHP to maintain his personal
web page. PHP takes most of its syntax from C, Java, and Perl. PHP was written in C
programming language.

PHP started out as a small open source project that evolved as more and more people found
out how useful it was. Rasmus Lerdorf unleashed the first version of PHP way back in 1994.

 PHP is a recursive acronym for "PHP: Hypertext Preprocessor".

13
 PHP is a server side scripting language that is embedded in HTML. It is used to manage
dynamic content, databases, session tracking, even build entire e-commerce sites.

 It is integrated with a number of popular databases, including MySQL, PostgreSQL,


Oracle, Sybase, Informix, and Microsoft SQL Server.

 PHP is pleasingly zippy in its execution, especially when compiled as an Apache


module on the Unix side. The MySQL server, once started, executes even very
complex queries with huge result sets in record-setting time.

 PHP supports a large number of major protocols such as POP3, IMAP, and LDAP.
PHP4 added support for Java and distributed object architectures (COM and CORBA),
making n-tier development a possibility for the first time.

 PHP is forgiving: PHP language tries to be as forgiving as possible.

 PHP Syntax is C-Like.

COMMON USES OF PHP


 PHP performs system functions, i.e. from files on a system it can create, open, read,
write, and close them.

 PHP can handle forms, i.e. gather data from files, save data to a file, thru email you
can send data, return data to the user.

 You add, delete, modify elements within your database thru PHP.

 Access cookies variables and set cookies.

 Using PHP, you can restrict users to access some pages of your website.

CHARACTERISTICS OF PHP
Five important characteristics make PHP's practical nature possible

 Simplicity

 Efficiency

14
 Security

 Flexibility

 Familiarity

UNIQUE FEATURES OF PHP

PHP language has support features of other languages like c, Perl and etc. It also has
some unique features of its own. Some of them are listed below in this article.

1. In PHP there is no need to specify data type for variable declaration. Rather, it can be
determined at the time of execution depends on the value of the variable. So that, PHP
is called as loosely typed language.
2. PHP provides cross platform compatibility, unlike some other server side scripting
language.
3. PHP has set of pre-defined variables called superglobals which will be start by _. Some
of the examples are, $_GET, $_POST, $_COOKIE, $_SESSION, $_SERVER and etc.
So, any variable except superglobals, that are start with _ will cause error.
4. PHP programming structure includes variable variables; that is, the name of the variable
can be change dynamically.
5. This language contains access monitoring capability to create logs as the summary of
recent accesses.
6. And then, it includes several magic methods that begins with __ character which will
be defined and called at appropriate instance. For example, __clone() will be called,
when the clone keyword is used.
7. Predefined error reporting constants are available to generate a warning or error notice.
For example, when E_STRICT is enabled, a warning about deprecated methods will be
generated.
8. PHP supports extended regular expression that leads extensive pattern matching with
remarkable speed.
9. And then, properties like, nowdocs and heredocs are used to delimit some block of
context which should not be sent for parsing.
10. Since PHP is a single inheritance language, the parent class methods can be derived by
only one directly inherited sub class. But, the implementation of traits concept, reduce
the gap over this limitation and allow to reuse required method in several classes.

15
APACHE

The Apache HTTP Server, colloquially called Apache is the world's most used web
server software. Development of Apache began in early 1995 after work on the NCSA code
stalled. Apache played a key role in the initial growth of the World Wide Web quickly
overtaking NCSA HTTPd as the dominant HTTP server, and has remained most popular since
April 1996. In 2009, it became the first web server software to serve more than 100
million websites.

Apache is developed and maintained by an open community of developers under the


auspices of the Apache Software Foundation. Most commonly used on a Unix-like system
(usually Linux),[6] the software is available for a wide variety of operating
systems besides Unix, Microsoft Windows, NetWare, OpenVMS, OS/2, and TPF. Released
under the Apache License, Apache is free and open-source software.

FEATURES OF APACHE

Apache supports a variety of features, many implemented as compiled modules which


extend the core functionality. These can range from server-side programming language support
to authentication schemes. Some common language interfaces support Perl, Python, Tcl,
and PHP. Popular authentication modules include mod access, mod_auth, mod_digest, and
mod_auth_digest, the successor to mod digest.

A sample of other features include Secure Sockets Layer and Transport Layer
Security support (mod_ssl), a proxy module (mod proxy), a URL rewriting module
(mod_rewrite), custom log files (mod_log_config), and filtering support (mod_include and
mod_ext_filter).

Popular compression methods on Apache include the external extension module,


mod_gzip, implemented to help with reduction of the size (weight) of Web pages served
over HTTP. ModSecurity is an open source intrusion detection and prevention engine for Web
applications. Apache logs can be analyzed through a Web browser using free scripts, such
asAWStats/W3Perl or Visitors.

16
Virtual hosting allows one Apache installation to serve many different Web sites. For
example, one machine with one Apache installation could simultaneously serve
www.example.com, www.example.org, test47.test-server.example.edu, etc.

MySQL

A database is a separate application that stores a collection of data. Each database has
one or more distinct APIs for creating, accessing, managing, searching and replicating the data
it holds.

Other kinds of data stores can be used, such as files on the file system or large hash
tables in memory but data fetching and writing would not be so fast and easy with those types
of systems.

So nowadays, we use relational database management systems (RDBMS) to store and


manage huge volume of data. This is called relational database because all the data is stored
into different tables and relations are established using primary keys or other keys known as
foreign keys.

A Relational Database Management System (RDBMS) is a software that:

 Enables you to implement a database with tables, columns and indexes.

 Guarantees the Referential Integrity between rows of various tables.

 Updates the indexes automatically.

 Interprets an SQL query and combines information from various tables.

RDBMS TERMINOLOGY

Before we proceed to explain MySQL database system, let's revise few definitions
related to database.

 Database: A database is a collection of tables, with related data.

17
 Table: A table is a matrix with data. A table in a database looks like a simple
spreadsheet.

 Column: One column (data element) contains data of one and the same kind, for
example the column postcode.

 Row: A row (= tuple, entry or record) is a group of related data, for example the data
of one subscription.

 Redundancy: Storing data twice, redundantly to make the system faster.

 Primary Key: A primary key is unique. A key value cannot occur twice in one table.
With a key, you can find at most one row.

 Foreign Key: A foreign key is the linking pin between two tables.

 Compound Key: A compound key (composite key) is a key that consists of multiple
columns, because one column is not sufficiently unique.

 Index: An index in a database resembles an index at the back of a book.

 Referential Integrity: Referential Integrity makes sure that a foreign key value always
points to an existing row.

MySQL Database:
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.
MySQL is developed, marketed, and supported by MySQL AB, which is a Swedish company.
MySQL is becoming so popular because of many good reasons:

 MySQL is released under an open-source license. So you have nothing to pay to use it.

 MySQL is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.

 MySQL uses a standard form of the well-known SQL data language.

 MySQL works on many operating systems and with many languages including PHP,
PERL, C, C++, JAVA, etc.

18
 MySQL works very quickly and works well even with large data sets.

 MySQL is very friendly to PHP, the most appreciated language for web development.

 MySQL supports large databases, up to 50 million rows or more in a table. The default
file size limit for a table is 4GB, but you can increase this (if your operating system
can handle it) to a theoretical limit of 8 million terabytes (TB).

 MySQL is customizable. The open-source GPL license allows programmers to modify


the MySQL software to fit their own specific environments.

DREAMWEAVER

Adobe Dreamweaver is a professional HTML editor for designing, coding, and


developing websites, web pages, and web applications. Whether you enjoy the control of hand-
coding HTML or prefer to work in a visual editing environment, Dreamweaver provides you
with helpful tools to enhance your web creation experience.

The visual editing features in Dreamweaver let you quickly create pages without writing
a line of code. You can view all your site elements or assets and drag them from an easy-to-
use panel directly into a document. You can streamline your development workflow by creating
and editing images in Macromedia Fireworks, then importing them directly into Dreamweaver,
or by adding Macromedia Flash objects you create directly in Dreamweaver.

Dreamweaver also includes many coding-related tools and features, including code
editing tools in the Code view (such as code colouring and tag completion); reference material
on HTML, CSS, JavaScript, CFML, ASP, and JSP; and a JavaScript Debugger. Macromedia
Roundtrip HTML technology imports your hand-coded HTML documents without
reformatting the code; you can then choose to reformat code with your preferred formatting
style.

And Dreamweaver now incorporates and expands on all of the capabilities from
Macromedia UltraDev, helping you to build dynamic database-backed web applications using
server languages such as ASP, ASP.NET, ColdFusion Mark-up Language (CFML), JSP, and

19
PHP.

Dreamweaver is fully customizable. You can create your own objects and commands,
modify keyboard shortcuts, and even write JavaScript code to extend Dreamweaver capabilities
with new behaviours, Property inspectors, and site reports.

FEATURES OF DREAMWEAVER

Dreamweaver supports syntax highlighting for the following languages out of the box:

 Action Script
 Active Server Pages (ASP).
 C#
 Cascading Style Sheets (CSS)
 ColdFusion
 EDML
 Extensible HyperText Markup Language (XHTML)
 Extensible Markup Language (XML)
 Extensible Stylesheet Language Transformations (XSLT)
 HyperText Markup Language (HTML)
 Java
 JavaScript
 Hypertext Preprocessor (PHP)
 Visual Basic (VB)
 Visual Basic Script Edition (VBScript)
 Wireless Markup Language (WML)

20
4. SYSTEM DESIGN AND DEVELOPEMENT

4.1 INPUT DESIGN

The input design is the link that ties the Information system into the world of its users.
It is a process of converting user-originated inputs to a computer based format. Input data are
collected and organized into a group of similar data. Once identified, appropriate input media
are selected for processing.

The goal of designing input data is to make entry easy, logical and free form errors.
In input data design, we design source document that capture the data and then select the media
used to enter them into the computer. The input forms are developed in a user-friendly way so
that a layman also can easily understand everything. Menus are provided to users and different
icons are designed so the proposed system design looks decorative.

Input design is the part of the overall system design. Source documents initiate a
processing cycle as soon as they are entered into the system through the keyboard. A source
should be logical and easy to understand.

Objectives of input Design:

 To achieve the highest possible level of accuracy.

 To ensure that the input is acceptable and understood by the user.

4.2 OUTPUT DESIGN

Output forms are also designed in a specific manner as per the user requirement.
Results are formatted to enhance clarity. Depending on the user the system would generate

21
appropriate output. The output forms are designed in such a way that the entire user required
data is presented.

While designing an output, the system analyst must accomplish the following.

 Determine what information to present.

 Decide whether to display, print or speak information and select the output medium.

 Arrange the presentation of information in an acceptable form.

 Decide how to distribute the output to intended users.

DATABASE DESIGN

Databases are structures that hold data. The software that enables the flow of data
through these structures is called database management system or DBMS. The most widely
used system of DBMS is something called RDBMS or Relational DBMS. This simply means
that the data is stored in tables, moreover. Whatever relationships that exist within the data
are stored Within tables.

TO put it simply, there are three parts that make a database:

Tables :
We all know what tables are - a matrix of rows and columns. In databases, it’s the
same. Each row is a record, or a unit of data. A record (row) can have several columns or
fields. Each field is like an attribute of that record.

Queries :
Query is a question posed to the database, to retrieve a specific set of records, based on
conditions supplied in the query.

Views:

22
These are virtua1 tables, or (a set of) stored queries. At a physical level, the data is stored
in data files specific to the DBMS. Examples of modern-day RDBMSs that are wide1y used
include Oracle, MySQL, etc. Oracle is the largest commercially available RDBMS and MySQL
(earlier acquired by Sun, and subsequently by oracle) is a free and open source RDBMS that is
very Well-known.

Types of SQL statements:

 SQL:(STRUCTURED QUERY LANGUAGE)

Statements can be classified into the following four categories:

 DDL (Data Definition Language):

This class of statement is used to create/destroy or define/change database


components.

Examples: CREATE, DROP, RENAME.

 DML (Data Manipulation Language):

As the name suggests, these statements manipulate the data itself, and the views
related to it.

Examples: SELECT, INSERT.

 DCL (Data Control Language):


These statements control access to the data. There are only two of them: GRANT and
REVOKE.

 TCL (Transaction Control Language):


Transactions are handled using these statements.
Examples: COMMIT, ROLLBACK.

23
4.3 DESIGN NOTATION

E-R Diagrams

 The relation upon the system is structure through a conceptual ER-Diagram, which not
only specifics the existential entities but also the standard relations through which the
system exists and the cardinalities that are necessary for the system state to continue.

 The entity Relationship Diagram (ERD) depicts the relationship between the data objects.
The ERD is the notation that is used to conduct the date modeling activity the attributes of
each data object noted is the ERD can be described resign a data object descriptions.

 The set of primary components that are identified by the ERD are

 Data object

 Relationships

 Attributes

 Various types of indicators.

The primary purpose of the ERD is to represent data objects and their relationships.

24
MODULES DESCRIPTION

A. Registration
1) Citizens who ever want to get services from our website are to be
registered
2) When once user is registered by filling appropriate form basing on
the type selected data will be saved in database.
3) Once logged in user can view his profile and if he want to modify it
he can edit it by clicking edit profile and it will be
Automatically updated in database
B. Authentication
1) User must provide valid username and password to login to system
2) The username and password entered will be checked with database.
They must match with username and password given at
Registration time.
3) If they are matched user is authenticated and access is granted
C. Services
1) User can post the problems he is facing and can upload the images
and videos of the problem.
2) User can also get the problems faced by other people in his place and
their status.
3) User can also get the funds released for specific problems in his place
4) User can donate money to the organizations listed in the site.

25
5) User can suggest a new way of implementing the ideas through
discussion forums.
6) User can get newsletter once he has registered for it.
D. Officer Module
1) Officer acknowledges the problem they received.
2) Higher Officer will send messages to their subordinates.
3) Can accept the feedback.
E. Admin Module
1) Can add/remove officers.
2) Data base maintenance like regular backup/ recovery of database.
3) Sends newsletter to the subscribed users.

26
5. SYSTEM TESTING

5.1 TESTING

Software testing is an important element of software quality assurance and represents


the ultimate review of specification, design and coding. In testing, the engineer creates a series
of rest cases that are intended to demolish the software that has been built.

Need for Testing

1. To click the efficiency of the system


2. To remove the errors of the system
3. To check whether the objectives of the project is accomplished
4. To enable the removal of complexities
5. To check the user-friendliness of the system
6. To check the flexibility of the system.

5.2 TYPES OF TESTING

5.2.1 UNIT TESTING

Unit is smallest compatible component. A unit typically is the work of one programmer
(At least in principle). As defined, it does not include any called sub-components (for
procedural language) or communicating components in general.

In unit testing called components (or communicating components) are replaced with
stubs, simulators, or trusted components. Calling components are replaced with drivers or
trusted super-components. The unit is tested in isolation.

27
The event-procedures should be also unit tested. The prominent among those being the
command add click () function of all forms. The values in the textboxes were altered and their
behaviours were observed and proper testing codes were installed. The modify functions of all
forms were also unit tested. After these texts the next stage of integration between these units
were tested.

5.2.2 INTEGRATION TESTING

This is easy generalized for Object Oriented languages by using the equivalent
constructs for message passing. In the following, the word “call” is to be understood in the
most general sense of a data flow and is not restricted to just formal subroutine calls and returns.

In integration testing the high level control routines are tested first, possibly with the
middle level control structures presents only as stubs. Subprogram stubs were presented in
Section 2 as incomplete subprograms which are only present to allows the high level menu
driver to be tested.

Since the addition and modification takes place in a single form according to the called
menu item, the integration testing for various forms and their procedure were tested carefully.
Almost all forms call public Functions form the modules. The integration testing was done for
all called function.

5.2.3 VALIDATION TESTING

Validation testing is the process of testing the output for various inputs. The inputs are
classified into string inputs. Integer inputs, decimal inputs. All the inputs were tested for all
these three inputs and their behaviours were tested.

The behaviours lead to the effecting error handling coding. The error handling coding
includes a message box for all types of errors. This testing includes the testing of several of
values.

28
The validation testing is tested for all adding and modification functions. The
modifications of primary key values were also tested. While modification the testing was done
whether the system accepts duplicate values for primary key and the errors displayed there in.

The validation testing leads to the final system testing. This includes testing of various
conditions and removing all standard values and providing actual outputs.

5.2.4 SYSTEM TESTING

System testing specifically goes after behaviours and bugs that are properties of the
entire system as distinct from properties attributable to components (unless, of course, the
component in question is the entire system).

Examples of system testing are Recourse loss bugs, throughput Bugs, performance,
security, recovery, transaction bugs, performance, security, recovery, transaction
synchronization bugs (Often misnamed “timing bugs”).

5.2.5 BLACK BOX TESTING

Black-box testing is a method of software testing that examines the functionality of an


application based on the specifications. It is also known as Specifications based testing.
Independent Testing Team usually performs this type of testing during the software testing
life cycle.

This method of test can be applied to each and every level of software testing such as
unit, integration, system and acceptance testing.

29
6. SYSTEM IMPLEMENTATION AND MAINTANENCE

6.1 System implementation

Implementation is the stage when the theoretical design has been converted into a
working system. The implementation phase is used to test the developed package with sample
data, correct the error identified, appearing the user of the various special facilities and features
of the computerized system. It also involves user training for minimizing resistance to change
and giving the system a chance to prove its worth. The successful implementation of people
working on the system.

The implementation process included the explanation of the benefits of the system. In
this stage the feedback from the users are also taken into considerations and the possible
suggestions for solving their Problems are discussed. These feedbacks are used further for the
next version of the project in future.

6.2 Validation and Verification

The verification and validation are to asses and improve the quality of the work
products generated during development and modification of software. Quality attribute of
interest include correctness, completeness, consistency, reliability, usefulness, efficiency,
conforms to standard and overall cost effectiveness.

The verification of the proposed system is one of the final stages of implementation where
the computerized output is compared with that of the manual system. The stage compares of
the system are made visible to the users and thus make the successful implementation of the
project. The valuable inputs lay the platform for the next revision of the new system.

The requirement of the customer is compared is compared with the software behavior
and their outputs. This is to assess the work product to the specifications of the design plan,
requirements of the customers, life cycle, organizational standards and the user expectations.
The inspection of the project is done in this stage to the best quality assurance standards.

30
7. CONCLUSION AND FUTURE ENHANCEMENT

It has been a great pleasure for me to work on this exciting and challenging project.
This project proved good for me as it provided practical knowledge of not only programming
in PHP, HTML, CSS and MySQL web based application and no some extent Windows
Application and Apache Server, but also about all handling procedure related with “ONLINE
CRIME MANAGEMENT SYSTEM”. It also provides knowledge about the latest
technology used in developing web enabled application and client server technology that will
be great demand in future. This will provide better opportunities and guidance in future in
developing projects independently.

31
BIBLIOGRAPHY AND WEB REFERENCES
REFERENCE

https://www.w3schools.com/

https://www.phptpoint.com/

BOOKS
Luke Welling, Laura Thomson, “PHP and MySQL Web Development”, 4th Edition,
Publisher: Pearson Education Inc , Year :2009

Rasmus Lerdorf, Kevin Tatroe , “Programming PHP” 2nd Edition, Publisher : O’Reilly
Media Inc,2006

W.Jason Gilmore , “Beginning PHP and MySQL” 3rd Edition, Publisher: Apress,2008

Brad Bugler, Jay Greenspan ,David Wall, “MySQL and PHP Applications”, 2nd Edition
Publisher : Wiley 2003

Michael kofler, “The Definitive Guide to MySQL 5 ” 3rd Edition Publisher: Apress 2005

32
APPENDICES
E.R.DIAGRAM

33
SCREENSHOT

SAMPLE CODING

34

S-ar putea să vă placă și