Documente Academic
Documente Profesional
Documente Cultură
Submitted by
OCTOBER – 2019
1
CERTIFICATE
Date:
V. Sumathi MCA.,
Assistant Professor,
Department of Computer
Applications,
SRCAS,
Coimbatore.
Countersigned
DECLARATION
2
I, _________________ hereby declare that the dissertation, entitled
Date :
(Ann Maria
James)
3
ACKNOWLEDGEMENT
First and foremost my whole-hearted thanks to the Lord Almighty, the guiding
light of life for granting us the strength and courage to complete this dissertation work.
I express my heartiest gratitude to the Managing Trustee Sri. C.
SOUNDARARAJ, S.N.R. Sons College, Coimbatore.
I express my global thanks to Dr.H.BALAKRISHNAN M.Com., M.Phil.,
Ph.D, Principal & Secretary, S.N.R. Sons College, Coimbatore for the facilities and
assistance provided during the course of the study.
With pride and pleasure I seize this opportunity to record my deep sense of
gratitude to my guiding light Mr. G. PARAMASIVAM M.C.A., M.Phil., Assistant
Professor, Department of Computer Applications, S.N.R. Sons College, Coimbatore for
his inspiring Guidance, meticulous planning, through comments, constructive criticism,
persistent efforts and fruitful discussions. I really learned a lot from his vast knowledge
and Intellectual insight.
I record my deep sense of gratitude and will remain obliged to
Mr. A.BALASUBRAMANIAN M.C.A., M.Phil., SET., NET, Prof & Head,
Department of Information Technology, S.N.R. Sons College, Coimbatore for his
valuable help and suggestions to complete my dissertation.
MURAJITH KUMAR . B
4
ABSTRACT
Each and every citizen may have any one of the complaint in their entire life. They will
be given an email id for each jurist division, where they can send an email when they have a
complaint to register. The emails will get converted to complaints and get assigned to the
persons handling that product. The complaints can be assigned to different persons and will get
tracked to closure. The person handling the complaint will have the facility to communicate
with the customer via emails through the system.
Language Used
Front End : PHP
5
Table of Contents
1 Introduction
1.1 Project description
2 System Analysis
2.1 Existing System
3 SOFTWARE DESCRIPTION
3.1 Front End
5 SYSTEM TESTING
5.1 Testing Methodologies
6
6.2 Validation and Verification
Appendix
Screen Shots
7
INTRODUCTION
In PHP titled as Online Crime Management System is a web application developed using PHP
and MySQL Server. This Web application is for police station which provides facility for
reporting crimes, complaints, FIR, charge sheet, prisoner records, show most wanted criminal’s
details, law and order details as well as court details. It also track police station constable
details, police information, attendance details, salary report, over time, etc. This Software
Package allows Police Departments to store all the details related to the department and use
This software provides facility for reporting online crimes, complaints, missing persons, show
mostwanted person details mailing as well as chatting. Any Number of clients can connect to the server.
Each user first makes their login to sever to show their availability. The server can be any Web Server.
An SMTP Server must be maintained for temporary storage of emails and chat jar files for enable the
chatting facilities.The main modules in this project
8
2. SYSTEM ANALYSIS
9
2.2 PROPOSED SYSTEM
The aim of proposed system is to develop a system of improved facilities. The proposed system
can overcome all the limitations of the existing system. The system provides proper security and reduces
the manual work. The existing system has several disadvantages and many more difficulties to work
well. The proposed system tries to eliminate or reduce these difficulties up to some extent. The proposed
system will help the user to reduce the workload and mental conflict. The proposed system helps the
user to work user friendly and he can easily do his jobs without time lagging.
The system is very simple in design and to implement. The system requires very low system
resources and the system will work in almost all configurations. It has got following features
10
2.3 SYSTEM SPECIFICATION
2.3.1HARDWARE REQUIREMENTS
Mouse : Logitech.
RAM : 2GB(minimum)
Database : MySQL
Server : apache
Design : Html,Css
11
3. SOFTWARE DESCRIPTION
This chapter is about the Software languages and the tools used in the development of
the project. The Primary Languages are PHP And MYSQL.
FEATURES OF PHP
PHP is a server scripting language, and a powerful tool for making dynamic and
interactive Web pages.PHP is a widely-used, free, and efficient alternative to competitors such
as Microsoft's ASP.PHP is an interpreted scripting language that is embedded within an HTML
web page in order to add dynamic processing to that page.
You may already be familiar with 'client-side' scripting languages such as JavaScript.
If you include JavaScript in your page, then the JavaScript code is downloaded to the client's
browser and executed there. PHP is different in that it is strictly a 'server-side' scripting
language - this means that the PHP is always processed by the web server before the requested
page is served to the browser. The PHP tags in the page are replaced by generated HTML
strings and the client's browser then displays the HTML without any knowledge of the
underlying PHP code at all.
The syntax of the language is similar to C, so anyone who is familiar with the C
programming language, (or Perl or Java, for that matter) should be able to master PHP scripting
quickly and without too much difficulty. Object Orientated Programming extensions have been
introduced with the latest release of PHP which allow you to use objects within a PHP script.
12
PHP can be used to do anything that any CGI program can do, such as:
One of PHP's biggest strengths is its ability to interface with databases. PHP supports
a wide range of databases, including proprietary (such as Sybase and Oracle) and open-source
(such as MySQL and PostgreSQL). The complete list is growing all the time. PHP can also
communicate with other processes using a variety of standard protocols.
The main disadvantage of PHP is that it is an interpreted language and therefore there
is inevitably a overhead in processing a page of PHP script. However, no PHP code is ever
downloaded to the client's browser so there is never any question of a user 'stealing' your PHP
code and adapting it for his own purposes.
PHP is a very powerful program that can access files, execute commands and open
network connections on the server. These features would make anything being run on the server
insecure by default. Because PHP is specifically designed to operate on web servers then it is
intrinsically more secure that 'general purpose' languages such as C or Perl. PHP has a number
of different configuration options which give the web server manager the ability to set precisely
the level of security that is needed for the situation.
History of PHP:
PHP started out as a small open source project that evolved as more and more people found
out how useful it was. Rasmus Lerdorf unleashed the first version of PHP way back in 1994.
13
PHP is a server side scripting language that is embedded in HTML. It is used to manage
dynamic content, databases, session tracking, even build entire e-commerce sites.
PHP supports a large number of major protocols such as POP3, IMAP, and LDAP.
PHP4 added support for Java and distributed object architectures (COM and CORBA),
making n-tier development a possibility for the first time.
PHP can handle forms, i.e. gather data from files, save data to a file, thru email you
can send data, return data to the user.
You add, delete, modify elements within your database thru PHP.
Using PHP, you can restrict users to access some pages of your website.
CHARACTERISTICS OF PHP
Five important characteristics make PHP's practical nature possible
Simplicity
Efficiency
14
Security
Flexibility
Familiarity
PHP language has support features of other languages like c, Perl and etc. It also has
some unique features of its own. Some of them are listed below in this article.
1. In PHP there is no need to specify data type for variable declaration. Rather, it can be
determined at the time of execution depends on the value of the variable. So that, PHP
is called as loosely typed language.
2. PHP provides cross platform compatibility, unlike some other server side scripting
language.
3. PHP has set of pre-defined variables called superglobals which will be start by _. Some
of the examples are, $_GET, $_POST, $_COOKIE, $_SESSION, $_SERVER and etc.
So, any variable except superglobals, that are start with _ will cause error.
4. PHP programming structure includes variable variables; that is, the name of the variable
can be change dynamically.
5. This language contains access monitoring capability to create logs as the summary of
recent accesses.
6. And then, it includes several magic methods that begins with __ character which will
be defined and called at appropriate instance. For example, __clone() will be called,
when the clone keyword is used.
7. Predefined error reporting constants are available to generate a warning or error notice.
For example, when E_STRICT is enabled, a warning about deprecated methods will be
generated.
8. PHP supports extended regular expression that leads extensive pattern matching with
remarkable speed.
9. And then, properties like, nowdocs and heredocs are used to delimit some block of
context which should not be sent for parsing.
10. Since PHP is a single inheritance language, the parent class methods can be derived by
only one directly inherited sub class. But, the implementation of traits concept, reduce
the gap over this limitation and allow to reuse required method in several classes.
15
APACHE
The Apache HTTP Server, colloquially called Apache is the world's most used web
server software. Development of Apache began in early 1995 after work on the NCSA code
stalled. Apache played a key role in the initial growth of the World Wide Web quickly
overtaking NCSA HTTPd as the dominant HTTP server, and has remained most popular since
April 1996. In 2009, it became the first web server software to serve more than 100
million websites.
FEATURES OF APACHE
A sample of other features include Secure Sockets Layer and Transport Layer
Security support (mod_ssl), a proxy module (mod proxy), a URL rewriting module
(mod_rewrite), custom log files (mod_log_config), and filtering support (mod_include and
mod_ext_filter).
16
Virtual hosting allows one Apache installation to serve many different Web sites. For
example, one machine with one Apache installation could simultaneously serve
www.example.com, www.example.org, test47.test-server.example.edu, etc.
MySQL
A database is a separate application that stores a collection of data. Each database has
one or more distinct APIs for creating, accessing, managing, searching and replicating the data
it holds.
Other kinds of data stores can be used, such as files on the file system or large hash
tables in memory but data fetching and writing would not be so fast and easy with those types
of systems.
RDBMS TERMINOLOGY
Before we proceed to explain MySQL database system, let's revise few definitions
related to database.
17
Table: A table is a matrix with data. A table in a database looks like a simple
spreadsheet.
Column: One column (data element) contains data of one and the same kind, for
example the column postcode.
Row: A row (= tuple, entry or record) is a group of related data, for example the data
of one subscription.
Primary Key: A primary key is unique. A key value cannot occur twice in one table.
With a key, you can find at most one row.
Foreign Key: A foreign key is the linking pin between two tables.
Compound Key: A compound key (composite key) is a key that consists of multiple
columns, because one column is not sufficiently unique.
Referential Integrity: Referential Integrity makes sure that a foreign key value always
points to an existing row.
MySQL Database:
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses.
MySQL is developed, marketed, and supported by MySQL AB, which is a Swedish company.
MySQL is becoming so popular because of many good reasons:
MySQL is released under an open-source license. So you have nothing to pay to use it.
MySQL is a very powerful program in its own right. It handles a large subset of the
functionality of the most expensive and powerful database packages.
MySQL works on many operating systems and with many languages including PHP,
PERL, C, C++, JAVA, etc.
18
MySQL works very quickly and works well even with large data sets.
MySQL is very friendly to PHP, the most appreciated language for web development.
MySQL supports large databases, up to 50 million rows or more in a table. The default
file size limit for a table is 4GB, but you can increase this (if your operating system
can handle it) to a theoretical limit of 8 million terabytes (TB).
DREAMWEAVER
The visual editing features in Dreamweaver let you quickly create pages without writing
a line of code. You can view all your site elements or assets and drag them from an easy-to-
use panel directly into a document. You can streamline your development workflow by creating
and editing images in Macromedia Fireworks, then importing them directly into Dreamweaver,
or by adding Macromedia Flash objects you create directly in Dreamweaver.
Dreamweaver also includes many coding-related tools and features, including code
editing tools in the Code view (such as code colouring and tag completion); reference material
on HTML, CSS, JavaScript, CFML, ASP, and JSP; and a JavaScript Debugger. Macromedia
Roundtrip HTML technology imports your hand-coded HTML documents without
reformatting the code; you can then choose to reformat code with your preferred formatting
style.
And Dreamweaver now incorporates and expands on all of the capabilities from
Macromedia UltraDev, helping you to build dynamic database-backed web applications using
server languages such as ASP, ASP.NET, ColdFusion Mark-up Language (CFML), JSP, and
19
PHP.
Dreamweaver is fully customizable. You can create your own objects and commands,
modify keyboard shortcuts, and even write JavaScript code to extend Dreamweaver capabilities
with new behaviours, Property inspectors, and site reports.
FEATURES OF DREAMWEAVER
Dreamweaver supports syntax highlighting for the following languages out of the box:
Action Script
Active Server Pages (ASP).
C#
Cascading Style Sheets (CSS)
ColdFusion
EDML
Extensible HyperText Markup Language (XHTML)
Extensible Markup Language (XML)
Extensible Stylesheet Language Transformations (XSLT)
HyperText Markup Language (HTML)
Java
JavaScript
Hypertext Preprocessor (PHP)
Visual Basic (VB)
Visual Basic Script Edition (VBScript)
Wireless Markup Language (WML)
20
4. SYSTEM DESIGN AND DEVELOPEMENT
The input design is the link that ties the Information system into the world of its users.
It is a process of converting user-originated inputs to a computer based format. Input data are
collected and organized into a group of similar data. Once identified, appropriate input media
are selected for processing.
The goal of designing input data is to make entry easy, logical and free form errors.
In input data design, we design source document that capture the data and then select the media
used to enter them into the computer. The input forms are developed in a user-friendly way so
that a layman also can easily understand everything. Menus are provided to users and different
icons are designed so the proposed system design looks decorative.
Input design is the part of the overall system design. Source documents initiate a
processing cycle as soon as they are entered into the system through the keyboard. A source
should be logical and easy to understand.
Output forms are also designed in a specific manner as per the user requirement.
Results are formatted to enhance clarity. Depending on the user the system would generate
21
appropriate output. The output forms are designed in such a way that the entire user required
data is presented.
While designing an output, the system analyst must accomplish the following.
Decide whether to display, print or speak information and select the output medium.
DATABASE DESIGN
Databases are structures that hold data. The software that enables the flow of data
through these structures is called database management system or DBMS. The most widely
used system of DBMS is something called RDBMS or Relational DBMS. This simply means
that the data is stored in tables, moreover. Whatever relationships that exist within the data
are stored Within tables.
Tables :
We all know what tables are - a matrix of rows and columns. In databases, it’s the
same. Each row is a record, or a unit of data. A record (row) can have several columns or
fields. Each field is like an attribute of that record.
Queries :
Query is a question posed to the database, to retrieve a specific set of records, based on
conditions supplied in the query.
Views:
22
These are virtua1 tables, or (a set of) stored queries. At a physical level, the data is stored
in data files specific to the DBMS. Examples of modern-day RDBMSs that are wide1y used
include Oracle, MySQL, etc. Oracle is the largest commercially available RDBMS and MySQL
(earlier acquired by Sun, and subsequently by oracle) is a free and open source RDBMS that is
very Well-known.
As the name suggests, these statements manipulate the data itself, and the views
related to it.
23
4.3 DESIGN NOTATION
E-R Diagrams
The relation upon the system is structure through a conceptual ER-Diagram, which not
only specifics the existential entities but also the standard relations through which the
system exists and the cardinalities that are necessary for the system state to continue.
The entity Relationship Diagram (ERD) depicts the relationship between the data objects.
The ERD is the notation that is used to conduct the date modeling activity the attributes of
each data object noted is the ERD can be described resign a data object descriptions.
The set of primary components that are identified by the ERD are
Data object
Relationships
Attributes
The primary purpose of the ERD is to represent data objects and their relationships.
24
MODULES DESCRIPTION
A. Registration
1) Citizens who ever want to get services from our website are to be
registered
2) When once user is registered by filling appropriate form basing on
the type selected data will be saved in database.
3) Once logged in user can view his profile and if he want to modify it
he can edit it by clicking edit profile and it will be
Automatically updated in database
B. Authentication
1) User must provide valid username and password to login to system
2) The username and password entered will be checked with database.
They must match with username and password given at
Registration time.
3) If they are matched user is authenticated and access is granted
C. Services
1) User can post the problems he is facing and can upload the images
and videos of the problem.
2) User can also get the problems faced by other people in his place and
their status.
3) User can also get the funds released for specific problems in his place
4) User can donate money to the organizations listed in the site.
25
5) User can suggest a new way of implementing the ideas through
discussion forums.
6) User can get newsletter once he has registered for it.
D. Officer Module
1) Officer acknowledges the problem they received.
2) Higher Officer will send messages to their subordinates.
3) Can accept the feedback.
E. Admin Module
1) Can add/remove officers.
2) Data base maintenance like regular backup/ recovery of database.
3) Sends newsletter to the subscribed users.
26
5. SYSTEM TESTING
5.1 TESTING
Unit is smallest compatible component. A unit typically is the work of one programmer
(At least in principle). As defined, it does not include any called sub-components (for
procedural language) or communicating components in general.
In unit testing called components (or communicating components) are replaced with
stubs, simulators, or trusted components. Calling components are replaced with drivers or
trusted super-components. The unit is tested in isolation.
27
The event-procedures should be also unit tested. The prominent among those being the
command add click () function of all forms. The values in the textboxes were altered and their
behaviours were observed and proper testing codes were installed. The modify functions of all
forms were also unit tested. After these texts the next stage of integration between these units
were tested.
This is easy generalized for Object Oriented languages by using the equivalent
constructs for message passing. In the following, the word “call” is to be understood in the
most general sense of a data flow and is not restricted to just formal subroutine calls and returns.
In integration testing the high level control routines are tested first, possibly with the
middle level control structures presents only as stubs. Subprogram stubs were presented in
Section 2 as incomplete subprograms which are only present to allows the high level menu
driver to be tested.
Since the addition and modification takes place in a single form according to the called
menu item, the integration testing for various forms and their procedure were tested carefully.
Almost all forms call public Functions form the modules. The integration testing was done for
all called function.
Validation testing is the process of testing the output for various inputs. The inputs are
classified into string inputs. Integer inputs, decimal inputs. All the inputs were tested for all
these three inputs and their behaviours were tested.
The behaviours lead to the effecting error handling coding. The error handling coding
includes a message box for all types of errors. This testing includes the testing of several of
values.
28
The validation testing is tested for all adding and modification functions. The
modifications of primary key values were also tested. While modification the testing was done
whether the system accepts duplicate values for primary key and the errors displayed there in.
The validation testing leads to the final system testing. This includes testing of various
conditions and removing all standard values and providing actual outputs.
System testing specifically goes after behaviours and bugs that are properties of the
entire system as distinct from properties attributable to components (unless, of course, the
component in question is the entire system).
Examples of system testing are Recourse loss bugs, throughput Bugs, performance,
security, recovery, transaction bugs, performance, security, recovery, transaction
synchronization bugs (Often misnamed “timing bugs”).
This method of test can be applied to each and every level of software testing such as
unit, integration, system and acceptance testing.
29
6. SYSTEM IMPLEMENTATION AND MAINTANENCE
Implementation is the stage when the theoretical design has been converted into a
working system. The implementation phase is used to test the developed package with sample
data, correct the error identified, appearing the user of the various special facilities and features
of the computerized system. It also involves user training for minimizing resistance to change
and giving the system a chance to prove its worth. The successful implementation of people
working on the system.
The implementation process included the explanation of the benefits of the system. In
this stage the feedback from the users are also taken into considerations and the possible
suggestions for solving their Problems are discussed. These feedbacks are used further for the
next version of the project in future.
The verification and validation are to asses and improve the quality of the work
products generated during development and modification of software. Quality attribute of
interest include correctness, completeness, consistency, reliability, usefulness, efficiency,
conforms to standard and overall cost effectiveness.
The verification of the proposed system is one of the final stages of implementation where
the computerized output is compared with that of the manual system. The stage compares of
the system are made visible to the users and thus make the successful implementation of the
project. The valuable inputs lay the platform for the next revision of the new system.
The requirement of the customer is compared is compared with the software behavior
and their outputs. This is to assess the work product to the specifications of the design plan,
requirements of the customers, life cycle, organizational standards and the user expectations.
The inspection of the project is done in this stage to the best quality assurance standards.
30
7. CONCLUSION AND FUTURE ENHANCEMENT
It has been a great pleasure for me to work on this exciting and challenging project.
This project proved good for me as it provided practical knowledge of not only programming
in PHP, HTML, CSS and MySQL web based application and no some extent Windows
Application and Apache Server, but also about all handling procedure related with “ONLINE
CRIME MANAGEMENT SYSTEM”. It also provides knowledge about the latest
technology used in developing web enabled application and client server technology that will
be great demand in future. This will provide better opportunities and guidance in future in
developing projects independently.
31
BIBLIOGRAPHY AND WEB REFERENCES
REFERENCE
https://www.w3schools.com/
https://www.phptpoint.com/
BOOKS
Luke Welling, Laura Thomson, “PHP and MySQL Web Development”, 4th Edition,
Publisher: Pearson Education Inc , Year :2009
Rasmus Lerdorf, Kevin Tatroe , “Programming PHP” 2nd Edition, Publisher : O’Reilly
Media Inc,2006
W.Jason Gilmore , “Beginning PHP and MySQL” 3rd Edition, Publisher: Apress,2008
Brad Bugler, Jay Greenspan ,David Wall, “MySQL and PHP Applications”, 2nd Edition
Publisher : Wiley 2003
Michael kofler, “The Definitive Guide to MySQL 5 ” 3rd Edition Publisher: Apress 2005
32
APPENDICES
E.R.DIAGRAM
33
SCREENSHOT
SAMPLE CODING
34