A Project Report ON Crime Reporting: (HCL Info System LTD)
A Project Report ON Crime Reporting: (HCL Info System LTD)
ON
Crime Reporting
Developed By:
This is to certify that this report titled Crime Reporting embodies the
original work done by Amit Kumar Gupta, Manu Saraf, Kapil Tyagi, Rohit
Kumar, Sadhana Sishodia, and Vaibhav Agarwal in partial fulfillment of
their course requirement at HCL.
Coordinator:
Rajinder Kr. Chitoria
In the course of present work it has been our privilege to receive help and
assistance from many quarters. We take great pleasure in acknowledging
here, our debt to them.
1. Introduction……………………………………..
2. Profile of Organization…………………………
3. System Analysis
4. System Design……………………………………
7. Conclusion…………………………………………
8. References…………………………………………
9. Appendices…………………………………………
Introduction
Crime reporting is the first of the nine basic Youth Crime Watch
components. Most simply, it's giving the proper authorities
information you have about:
1. A crime that might be committed
2. A crime that has been committed
3. Someone who was involved in committing a crime
4. Young people understand the importance of reporting crime.
They want safer schools and neighborhoods, and if they
know how to report effectively, they'll do it. Young people
can help encourage peers to report crime in the making as
well as information on crimes under investigation
Paper Reduction
HCL Info Systems is among the leading players in all the segments
comprising the domestic IT products, solutions and related services
business, which includes PCs, servers, networking products,
imaging & communication products.
HCL InfoSystems ' manufacturing facilities are ISO 9001 - 2000 &
ISO 14001 certified and adhere to stringent quality standards and
global processes. With the largest installed PC base in the country,
four indigenously developed and manufactured PC brands -
'Infiniti', 'Busybee' 'Beanstalk' and the 'Ezeebee' - and its robust
manufacturing facilities; HCL InfoSystems aims to further
leverage its dominance in the PC market. It has been consistently
rated as Top player in PC industry by IDC .The 'Infiniti' line of
business computing products is incorporated with leading edge
products from world leaders such as Intel. A fully integrated and
business-ready family of servers and workstations, the 'Infiniti
Global Line' is targeted at medium and large companies to help
them to manage their enterprise-related applications. It has
considerable dominance in verticals like finance, government, and
education & research.
HCL has closely seen the IT industry rise from scratch, and has
actively participated in its progress. During the twenty-seven year
journey, it has picked up valuable lessons in serving the IT needs
of the Indian customer and gathered domain expertise to
successfully service various businesses.
• TECHNICAL FEASIBILITY
• ECONOMIC FEASIBILITY
• BEHAVIOURAL FEASIBILITY
• OPERATIONAL FEASIBILITY
TECHNICAL FEASIBILITY:-
Technical Feasibility centers on the existing computer system
(hardware/ software) and also it can support the modification. In
manual processing there are more chances of errors, creating lot of
complications, less technical or logical. Through proposed system
we can set this process in a very systematic pattern, which is more
technical, full proof, authentic, safe and reliable.
ECONOMIC FEASIBILITY: -
Economic analysis is the most frequently used method for
evaluating the effectiveness of the candidate system. More
commonly known as cost/benefit analysis, the procedure is to be
determining the benefits and savings that are expected from a
candidate and compare them with costs. If benefits outweigh costs,
then the decision is made to design and implement the system.
BEHAVIOURAL FEASIBILITY:-
People are inherently resistant to change, and computers have been
known to facilitate change. An estimate should be made of how
strong a reaction the user staff is likely to have toward the
development of a computerized system. Therefore it is
understandable that the introduction of a candidate system requires
special efforts to educate and train the staff. The software that is
being developed is user friendly and easy to learn. In this way, the
developed software is truly efficient and can work on any
circumstances, tradition, locales.
OPERATIONAL FEASIBILITY:-
Operational feasibility is mainly related to the human
organizational & political aspects. This feasibility study answers
questions like: Will the system be used if it is developed and
implemented? Will there be resistance from users that will
undermine the possible application benefits?
To get the answer of these questions, many methods are used like
interviews, questionnaire, records checking and observation. One
or two persons who are familiar with information system
techniques, who understands the business and who are skilled in
system analysis and design, generally carry out this feasibility
study.
Detailed Design
Coding
Unit Testing
Test Plan
Testing
This level shows the overall context of the system and its operating
environment and shows the whole system as just one process.
LEVEL 1
LEVEL 2
Field By System
us em
victim/Accused/witness
Admin
st
er
Database
sy
system
user
general
GIS Admin
report
investigation
others
user Fake
Fir
charge
mising sheet FIR
citizen report
mising citizen FAKE DB
DataBase
By E
-Ma
il case
status
By E-Mail
Database Diagrams
DATA DICTIONARY
DICTIONARY CONTENT
DEFINING METADETA
The term metadata is often defined as data about data. That is, data
• its name
information)
• its owner, who may read and write to it (i.e. security
information)
Project:
Project normally has many project activities associated with it, many
employees involved and the employee can play several roles within a project
(employee role in project).
Name:
Crime Reporting
Employee:
Amit Kumar Gupta
Role:
Working on Administrator module
Module Activity:
I have assigned 3 types of authorized users.
Administrator
Authorized Users
General User (Others)
This section describes the proposed crime reporting system for the
Region. This system was developed based on previous planning
efforts
And direct input from the public and interested agencies and
groups. The
Proposed system does include all TRPA Environmental
Improvement
Program (EIP) projects. However, not all of the
proposed projects are EIP projects. Key criteria used in developing
and
Prioritizing the proposed system is listed below.
Public Input - Consider and respond to public information in the
Crime Reporting planning process.
Use - Crime reporting facilities contained in the proposed
System should reflect use levels that are commensurate with the
Level of investment required for construction and maintenance.
Coverage - The system should provide balanced access from all
portions of the region’s population centers for both commuting
and recreation routes.
Safety - The system should provide the highest level of safety
Possible while eliminating major safety concerns such as narrow
Roadways.
Connectivity - The system should provide connections to major
Activity centers, multi-modal transfer locations, and to routes that
Provide access to neighboring counties. Activity centers include
Residential neighborhoods, schools, regional parks, shopping
Centers, employment centers, government centers, transit centers,
And other recreational opportunities. Major gaps and barriers,
Including narrow bridges and roadways, should be targeted as
High priority items.
System Design
The design phase decides how the system will operate, in terms of
the hardware, software, and network infrastructure; the user
interface, forms, and reports that will be used; and the specific
programs, databases, and files that will be needed. Although most
of the strategic decisions about the system were made in the
development of the system concept during the analysis phase, the
steps in the design phase determine exactly how the system will
operate. The design phase has four steps:
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
using System.Windows.Forms;
}
protected void Button2_Click(object sender,
EventArgs e)
{
TextBox1.Text = "";
TextBox2.Text = "";
}
protected void
Button1_Click(objectsenderEventArgse)
{
SqlConnection con = new
SqlConnection(s);
con.Open();
SqlCommand cmd = new
SqlCommand("admin_check", con);
cmd.CommandType =
CommandType.StoredProcedure;
cmd.Parameters.AddWithValue("@userid",
TextBox1.Text);
cmd.Parameters.AddWithValue("@password"
, TextBox2.Text);
if (dr.HasRows )
{
// //MessageBox.Show("your userid
and passwordis valid");
dr.Read();
Session["type"] =
dr["designation"].ToString();
Session.Add("name",
TextBox1.Text);
string des =
Session["type"].ToString();
Session.Add("designation", des);
Response.Redirect(@"~\Admin_Home.aspx
");
}
else
{
MessageBox.Show("your userid and
passwordis is not valid");
TextBox1.Text = "";
TextBox2.Text = "";
}
//con.close();
}
}
Admin page coding
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System .Data .SqlClient;
string s =
ConfigurationManager.ConnectionStrings["Crime_ProjectCo
nnectionString"].ToString();
protected void Page_Load(object sender, EventArgs
e)
{
string str;
if (Session["name"]==null )
{
Response.Redirect(@"~\Home.aspx");
}
str = Session["name"].ToString();
string ctr;
ctr = Session["designation"].ToString();
Label3.Text = str;
Label7.Text = ctr;
con.Open();
string date1=DateTime .Now .ToShortDateString
();
SqlCommand cmd = new SqlCommand("select
count(*) from manu_gen_crime_fir_table where
date_time_of_report='" + date1 +"'", con);
SqlDataReader rd = cmd.ExecuteReader();
if (rd.HasRows)
{
rd.Read();
LinkButton1.Text = rd[0].ToString();
}
else
{
}
con.Close();
con.Open();
SqlCommand cmd1 = new SqlCommand("select
count(*) from Authorized_Person_Login where
dateofrequest='" + date1 + "'", con);
SqlDataReader rd1 = cmd1.ExecuteReader();
if (rd1.HasRows)
{
rd1.Read();
LinkButton4.Text = rd1[0].ToString();
}
con.Close();
if (Label7.Text .Equals("Layers")||
Label7.Text .Equals("Police")||Label7.Text
.Equals("Detective")||Label7.Text .Equals("Press
Reporter"))
{
HyperLink1.Enabled = false;
HyperLink3.Enabled = false;
HyperLink4.Enabled = false;
HyperLink5.Enabled = false;
}
protected void LinkButton3_Click(object sender,
EventArgs e)
{
Session["name"] =null ;
//Session.Abandon();
}
protected void LinkButton2_Click(object sender,
EventArgs e)
{
// Session.Abandon();
}
}
Authorized Person Login page coding
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient ;
ddlistyear.Items.Add(i.ToString ());
}
for (int i = 1; i <= 31; i++)
{
ddlistday.Items.Add(i.ToString());
}
}
}
protected void Button1_Click(object sender,
EventArgs e)
{
string yr = ddlistyear.SelectedItem.Text;
string mnth = ddlistmonth.SelectedItem.Text;
string day = ddlistday.SelectedItem.Text;
//string str=day+mnth+yr;
string gender;
SqlConnection con =new SqlConnection (s);
con.Open();
SqlCommand cmd = new
SqlCommand("authorisedperson_insert", con);
cmd.CommandType = CommandType.StoredProcedure;
cmd.Parameters.AddWithValue("@userid",
TextBox1.Text);
cmd.Parameters.AddWithValue("@password ",
TextBox2.Text);
cmd.Parameters.AddWithValue("@name1",
TextBox3.Text);
cmd.Parameters.AddWithValue("@father_name ",
TextBox4.Text);
cmd.Parameters.AddWithValue("@address ",
TextBox5.Text);
cmd.Parameters.AddWithValue("@city ",
TextBox6.Text);
cmd.Parameters.AddWithValue("@designation",
ddlistdesignation .SelectedItem .Text );
cmd.Parameters.AddWithValue("@dateofbirth",
day + mnth + yr);
if(RadioButton1 .Checked )
{
gender="Male";
}
else
{
gender ="female";
}
cmd.Parameters.AddWithValue("@sex", gender);
FileUpload1.SaveAs(Server.MapPath("~//DOCATTACH
ED//") + FileUpload1.FileName);
cmd.Parameters.AddWithValue("@idproof",
FileUpload1.FileName );
cmd.Parameters.AddWithValue("@mobno",TextBox7 .
Text );
cmd.Parameters.AddWithValue("@email",
TextBox8.Text);
cmd.Parameters.AddWithValue("@dateofrequest",
TextBox9.Text);
cmd.ExecuteNonQuery();
con.Close();
}
}
General FIR Page Coding
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
using System.Windows.Forms;
using System.IO.IsolatedStorage;
using System.IO ;
using System.Windows.Forms;
using System.Net;
string s =
ConfigurationManager.ConnectionStrings["Crime_ProjectCo
nnectionString"].ToString();
TextBox2.Text =
DateTime.Now.ToShortDateString();
TextBox2.Enabled = false;
//int count = 0;
int chv = 0;
string hv;
string temp;
SqlConnection con = new SqlConnection(s);
con.Open();
string str = "select fir_no from
manu_gen_crime_fir_table";
SqlCommand comm = new SqlCommand(str, con);
SqlDataReader dr;
dr = comm.ExecuteReader();
if (dr.HasRows == false)
{
temp = "0001";
}
else
{
while (dr.Read())
{
hv = dr.GetString(0).Substring(3);
}
chv += 1;
if (chv < 10)
{
temp = "000" + chv.ToString();
}
else if (chv < 100)
{
temp = "00" + chv.ToString();
}
else if (chv < 1000)
{
temp = "0" + chv.ToString();
}
else
{
temp = chv.ToString();
}
dr.Close();
TextBox11.Text = "FIR" + temp;
}
}
protected void TextBox5_TextChanged(object sender,
EventArgs e)
{
}
protected void Button1_Click(object sender,
EventArgs e)
{
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
TextBox6.Text = "";
TextBox7.Text = "";
TextBox8.Text = "";
TextBox9.Text = "";
TextBox10.Text = "";
txtvictimname.Text = "";
txtvictimfathername.Text = "";
txtvictimemail.Text = "";
txtvictimcontect.Text = "";
txtvictimaddress.Text = "";
txtfname.Text = "";
txtname.Text = "";
txtphone.Text = "";
txtemail.Text = "";
txtaddress.Text = "";
MessageBox.Show("All entry will be canceled
","Cancel Record");
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
}
}
con.Open();
SqlCommand cmd = new
SqlCommand("firdetail_Update", con);
cmd.CommandType = CommandType.StoredProcedure;
//cmd.Parameters.AddWithValue("@fir_no",
TextBox1.Text);
cmd.Parameters.AddWithValue("@victim_name",
TextBox2.Text);
cmd.Parameters.AddWithValue("@victim_father_nam
e", TextBox3.Text);
cmd.Parameters.AddWithValue("@victin_address",
TextBox4.Text);
cmd.Parameters.AddWithValue("@accused_name",
TextBox5.Text);
cmd.Parameters.AddWithValue("@accused_father_na
me", TextBox6.Text);
cmd.Parameters.AddWithValue("@accused_address",
TextBox7.Text);
cmd.Parameters.AddWithValue("@witness_name",
TextBox8.Text);
cmd.Parameters.AddWithValue("@witness_father_na
me", TextBox9.Text);
cmd.Parameters.AddWithValue("@witness_address",
TextBox10.Text);
cmd.ExecuteNonQuery();
con.Close();
cmd.Parameters.AddWithValue("@victim_name",
TextBox2.Text);
cmd.Parameters.AddWithValue("@victim_father_nam
e", TextBox3.Text);
cmd.Parameters.AddWithValue("@victin_address",
TextBox4.Text);
cmd.Parameters.AddWithValue("@accused_name",
TextBox5.Text);
cmd.Parameters.AddWithValue("@accused_father_na
me", TextBox6.Text);
cmd.Parameters.AddWithValue("@accused_address",
TextBox7.Text);
cmd.Parameters.AddWithValue("@witness_name",
TextBox8.Text);
cmd.Parameters.AddWithValue("@witness_father_na
me", TextBox9.Text);
cmd.Parameters.AddWithValue("@witness_address",
TextBox10.Text);
cmd.ExecuteNonQuery();
con.Close();
}
protected void
DropDownList1_SelectedIndexChanged(object sender,
EventArgs e)
{
SqlConnection con = new SqlConnection(s);
con.Open();
SqlCommand cmd = new
SqlCommand("fir_detail_list_select", con);
cmd.CommandType = CommandType.StoredProcedure;
cmd.Parameters.AddWithValue("@Firno",DropDownLis
t1.SelectedItem.Text.Trim() );
SqlDataReader dr = cmd.ExecuteReader();
if (dr.HasRows)
{
dr.Read();
TextBox2.Text = dr["victim_name"].ToString();
TextBox3.Text = dr["victim_fname"].ToString();
;
TextBox4.Text =
dr["victim_address"].ToString();
TextBox5.Text = dr["accused_name"].ToString();
TextBox6.Text =
dr["accused_fname"].ToString();
TextBox7.Text =
dr["accused_address"].ToString();
TextBox8.Text =
dr["complaner_name"].ToString();
TextBox9.Text =
dr["complaner_fname"].ToString();
TextBox10.Text =
dr["complaner_address"].ToString();
}
con.Close();
}
}
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data .SqlClient ;
con.Open();
string str = "select missing_id from missing";
SqlCommand comm = new SqlCommand(str, con);
SqlDataReader dr;
dr = comm.ExecuteReader();
if (dr.HasRows == false)
{
temp = "0001";
}
else
{
while (dr.Read())
{
hv = dr.GetString(0).Substring(3);
dr.Close();
TextBox1.Text = "MIS" + temp;
//end auto generate code of missing id
ddlistyear.Items.Add("--Select--");
DropDownList1.Items.Add("--Select--");
DropDownList2.Items.Add("--Select--");
if (!IsPostBack)
{
for (int i = 2000; i <= DateTime.Now.Year;
i++)
{
ddlistyear.Items.Add(i.ToString());
}
if (!IsPostBack)
{
for (int i = 0; i < 100; i++)
{
DropDownList1.Items.Add(i.ToString(
));
}
}
if (!IsPostBack)
{
for (int i = 1; i < 12; i++)
{
DropDownList2.Items.Add(i.ToString(
));
}
}
ddlistmonth.Items.Clear();
ddlistmonth.Items.Add("--Select--");
ddlistday.Items.Add("--Select--");
ListItem l = new ListItem("Jan", "1");
ddlistmonth.Items.Add(l);
l = new ListItem("Feb", "2");
ddlistmonth.Items.Add(l);
l = new ListItem("Mar", "3");
ddlistmonth.Items.Add(l);
l = new ListItem("Apr", "4");
ddlistmonth.Items.Add(l);
l = new ListItem("May", "5");
ddlistmonth.Items.Add(l);
l = new ListItem("Jun", "6");
ddlistmonth.Items.Add(l);
l = new ListItem("Jul", "7");
ddlistmonth.Items.Add(l);
l = new ListItem("Aug", "8");
ddlistmonth.Items.Add(l);
l = new ListItem("Sep", "9");
ddlistmonth.Items.Add(l);
l = new ListItem("Oct", "10");
ddlistmonth.Items.Add(l);
l = new ListItem("Nov", "11");
ddlistmonth.Items.Add(l);
l = new ListItem("Dec", "12");
ddlistmonth.Items.Add(l);
}
this.DataBind();
}
protected void
CustomValidator1_ServerValidate(object source,
ServerValidateEventArgs args)
{
}
protected void
ddlistyear_SelectedIndexChanged(object sender,
EventArgs e)
{
Session["int_yrs"] =
ddlistyear.SelectedItem.Value;
}
protected void
ddlistmonth_SelectedIndexChanged1(object sender,
EventArgs e)
{
int_months =
Convert.ToInt32(ddlistmonth.SelectedItem.Value);
ddlistday.Items.Clear();
int_yrs = Convert.ToInt32(Session["int_yrs"]);
if (int_months == 2)
{
if (int_yrs % 4 == 0)
{
int_lastdate = 29;
}
else
{
int_lastdate = 28;
}
}
else if (int_months == 1 || int_months == 3 ||
int_months == 5 || int_months == 7 || int_months == 9
|| int_months == 10 || int_months == 12)
{
int_lastdate = 31;
}
else
{
int_lastdate = 30;
}
}
protected void
ddlistday_SelectedIndexChanged(object sender, EventArgs
e)
{
cmd.Parameters.AddWithValue("@date_of_missing",
dtr);
cmd.Parameters.AddWithValue("@name_of_missing_p
erson", TextBox2.Text);
cmd.Parameters.AddWithValue("@father_name",
TextBox3.Text);
cmd.Parameters.AddWithValue("@age",
DropDownList1.SelectedItem.Text +
DropDownList2.SelectedItem.Text);
if (Male.Checked )
{
cmd.Parameters.AddWithValue("@sex",
"Male");
}
else
{
cmd.Parameters.AddWithValue("@sex",
"Female");
}
cmd.Parameters.AddWithValue("@height", TextBox4
.Text );
cmd.Parameters.AddWithValue("@hair_colour",
TextBox5.Text);
cmd.Parameters.AddWithValue("@address",
TextBox6.Text);
cmd.Parameters.AddWithValue("@complextion",
TextBox7.Text);
cmd.Parameters.AddWithValue("@police_station",
TextBox8.Text);
cmd.Parameters.AddWithValue("@police_action",
TextBox9.Text);
cmd.Parameters.AddWithValue("@general_appereanc
e", TextBox10.Text);
cmd.ExecuteNonQuery();
con.Close();
}
protected void btnupdate_Click(object sender,
EventArgs e)
{
string dtr = ddlistyear.SelectedItem.Value +
ddlistmonth.SelectedItem.Text +
ddlistday.SelectedItem.Text;
SqlConnection con = new SqlConnection(s);
con.Open();
SqlCommand cmd = new
SqlCommand("missing_Update", con);
cmd.CommandType = CommandType.StoredProcedure;
cmd.Parameters.AddWithValue("@missing_id",
TextBox1.Text);
cmd.Parameters.AddWithValue("@date_of_missing",
dtr);
cmd.Parameters.AddWithValue("@name_of_missing_p
erson", TextBox2.Text);
cmd.Parameters.AddWithValue("@father_name",
TextBox3.Text);
cmd.Parameters.AddWithValue("@age",
DropDownList1.SelectedItem.Text +
DropDownList2.SelectedItem.Text);
if (Male.Checked)
{
cmd.Parameters.AddWithValue("@sex",
"Male");
}
else
{
cmd.Parameters.AddWithValue("@sex",
"Female");
}
cmd.Parameters.AddWithValue("@height",
TextBox4.Text);
cmd.Parameters.AddWithValue("@hair_colour",
TextBox5.Text);
cmd.Parameters.AddWithValue("@address",
TextBox6.Text);
cmd.Parameters.AddWithValue("@complextion",
TextBox7.Text);
cmd.Parameters.AddWithValue("@police_station",
TextBox8.Text);
cmd.Parameters.AddWithValue("@police_action",
TextBox9.Text);
cmd.Parameters.AddWithValue("@general_appereanc
e", TextBox10.Text);
cmd.ExecuteNonQuery();
con.Close();
}
protected void btndelete_Click(object sender,
EventArgs e)
{
string dtr = ddlistyear.SelectedItem.Value +
ddlistmonth.SelectedItem.Text +
ddlistday.SelectedItem.Text;
SqlConnection con = new SqlConnection(s);
con.Open();
SqlCommand cmd = new
SqlCommand("missing_delete", con);
cmd.CommandType = CommandType.StoredProcedure;
cmd.Parameters.AddWithValue("@id",
TextBox1.Text);
cmd.ExecuteNonQuery();
con.Close();
}
protected void btnreset_Click(object sender,
EventArgs e)
{
TextBox1.Text = "";
TextBox2.Text = "";
TextBox3.Text = "";
TextBox4.Text = "";
TextBox5.Text = "";
TextBox6.Text = "";
TextBox7.Text = "";
TextBox8.Text = "";
TextBox9.Text = "";
TextBox10.Text = "";
ddlistyear.ClearSelection();
ddlistmonth.ClearSelection();
ddlistday.ClearSelection();
DropDownList1.ClearSelection ();
DropDownList2.ClearSelection ();
}
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
using System.Windows.Forms;
using System.IO.IsolatedStorage;
using System.IO;
Txtcrmid.Visible = false;
Txtcrmstatus.Visible = false;
Txtdate.Visible = false;
Txtcrmcat.Visible = false;
FileUpload2.Visible = false;
int chv = 0;
string hv;
string temp;
SqlConnection con = new SqlConnection(s);
con.Open();
string str = ("select criminal_idfrocriminal");
SqlCommand comm = new SqlCommand(str, con);
SqlDataReader dr;
dr = comm.ExecuteReader();
if (dr.HasRows == false)
{
temp = "0001";
}
else
{
while (dr.Read())
{
hv = dr.GetString(0).Substring(3);
}
chv += 1;
if (chv < 10)
{
temp = "000" + chv.ToString();
}
else if (chv < 100)
{
temp = "00" + chv.ToString();
}
else if (chv < 1000)
{
temp = "0" + chv.ToString();
}
else
{
temp = chv.ToString();
}
dr.Close();
TextBox1.Text = "CRM" + temp;
//end code auto generate of criminal id
DropDownList3.Items.Add("--Select--");
DropDownList4.Items.Add("--Select--");
DropDownList5.Items.Add("--Select--");
if (!IsPostBack)
{
for (int i = 1930; i <= DateTime.Now.Year;
i++)
{
DropDownList3.Items.Add(i.ToString());
}
if (!IsPostBack)
{
for (int i = 1; i < 32; i++)
{
DropDownList5.Items.Add(i.ToString(
));
}
}
this.DataBind();
}
protected void
ddlistyear_SelectedIndexChanged(object sender,
EventArgs e)
{
}
protected void Button2_Click(object sender,
EventArgs e)
{
string year = DropDownList3.SelectedItem.Text;
string mnth = DropDownList4.Text;
string day = DropDownList5.Text;
string str;
SqlConnection con = new SqlConnection(s);
con.Open();
SqlCommand cmd = new
SqlCommand("criminalInsert", con);
cmd.CommandType = CommandType.StoredProcedure;
cmd.Parameters.AddWithValue("@criminal_id",
TextBox1.Text);
cmd.Parameters.AddWithValue("@criminal_name",
TextBox2.Text);
cmd.Parameters.AddWithValue("@criminal_address"
, TextBox3.Text);
cmd.Parameters.AddWithValue("@criminal_father_n
ame", TextBox4.Text);
if (Male.Checked)
{
str = "Male";
cmd.Parameters.AddWithValue("@criminal_sex"
, str);
}
else
{
str = "Female";
cmd.Parameters.AddWithValue("@criminal_sex"
, str);
}
if (Married.Checked)
{
cmd.Parameters.AddWithValue("@criminal_mari
tial_status", "Married");
}
else
{
cmd.Parameters.AddWithValue("@criminal_mari
tial_status", "UnMarried");
}
cmd.Parameters.AddWithValue("@criminal_dob",
year + mnth + day);
cmd.Parameters.AddWithValue("@criminal_country"
, DropDownList2.Text);
cmd.Parameters.AddWithValue("@criminal_dna",
TextBox5.Text);
cmd.Parameters.AddWithValue("@criminal_period_o
f_punishment", TextBox11.Text);
cmd.Parameters.AddWithValue("@criminal_no_of_cr
ime", TextBox7.Text);
cmd.Parameters.AddWithValue("@criminal_age",
TextBox8.Text);
cmd.Parameters.AddWithValue("@criminal_crime_ca
tegory", DropDownList6.Text);
cmd.Parameters.AddWithValue("@criminal_crime_de
scription", TextBox9.Text);
cmd.Parameters.AddWithValue("@criminal_type_of_
punishment", TextBox10.Text);
FileUpload2.SaveAs(Server.MapPath("~//DOCATTACH
ED//") + FileUpload2.FileName);
cmd.Parameters.AddWithValue("@criminal_image",
FileUpload2.FileName);
cmd.Parameters.AddWithValue("@present_status",
TextBox6.Text);
cmd.ExecuteNonQuery();
con.Close();
}
protected void Button3_Click(object sender,
EventArgs e)
{
}
protected void Btnsearch_Click(object sender,
EventArgs e)
{
SqlDataAdapter ad;
SqlConnection con = new SqlConnection(s);
DataSet ds = new DataSet();
String sql;
String sex,mstatus;
DropDownList5.Visible = false;
DropDownList3.Visible = false;
DropDownList4.Visible = false;
DropDownList2.Visible = false;
Txtcrmid.Visible = true;
Txtcrmstatus.Visible = true;
Txtdate.Visible = true;
Txtcrmcat.Visible = true;
TextBox3.Text =
r["criminal_address"].ToString();
TextBox4.Text =
r["criminal_father_name"].ToString();
TextBox5.Text =
r["criminal_dna"].ToString();
Txtcrmstatus.Text =
r["criminal_status"].ToString();
TextBox11.Text =
r["criminal_period_of_punishment"].ToString();
TextBox7.Text =
r["criminal_no_of_crime"].ToString();
TextBox8.Text =
r["criminal_age"].ToString();
TextBox9.Text =
r["criminal_crime_description"].ToString();
TextBox10.Text =
r["criminal_type_of_punishment"].ToString();
TextBox6.Text =
r["present_status"].ToString();
sex = r["criminal_sex"].ToString();
mstatus =
r["criminal_maritial_status"].ToString();
if (sex == "Male")
Male.Checked = true;
else if (sex == "Female")
Female.Checked = true;
if (mstatus == "Married")
Married.Checked = true;
else
UnMarried.Checked = true;
Txtdate.Text =
r["criminal_dob"].ToString();
Txtcrmcat.Text =
r["criminal_crime_category"].ToString();
Image1.ImageUrl = "~\\DOCATTACHED\\" +
r["criminal_image"].ToString();
}
}
Testing phases:
• Unit testing
• Integration testing
• System testing
• Acceptance testing
• Regression testing etc.
UNIT TESTING
INTEGRATION TESTING:
SYSTEM TESTING:
System testing of software or hardware is testing conducted on a
complete, integrated system to evaluate the system's compliance
with its specified requirements. System testing falls within the
scope of black box testing, and as such, should require no
knowledge of the inner design of the code or logic.
ACCEPTANCE TESTING
User Acceptance of a system is the key factor for the success of
any system. The system under consideration is tested for user
acceptance by constantly keeping in touch with the prospective
system users at the time of developing and making changes
wherever required. The system developed provides a friendly user
interface that can easily be understood even by a person who is
new to the system.
REGRESSION TESTING: -
Regression testing is the process of testing changes to computer
programs to make sure that the older programming still works with
the new changes. Regression testing is a normal part of the
program development process and, in larger companies, is done by
code testing specialists. Test department coders develop code test
scenarios and exercises that will test new units of code after they
have been written. These test cases form what becomes the test
bucket. Before a new version of a software product is released, the
old test cases are run against the new version to make sure that all
the old capabilities still work. The reason they might not work is
because changing or adding new code to a program can easily
introduce errors into code that is not intended to be changed.
Live test data are those that are actually extracted from
organization files. After a system is partially constructed,
programmers or analysts often ask users to key in a set of data
from their normal activities. Then, the systems person uses this
data as a way to partially test the system. In other instances,
programmers or analysts extract a set of live data from the files and
have them entered themselves.
It is difficult to obtain live data in sufficient amounts to conduct
extensive testing. And, although it is realistic data that will show
how the system will perform for the typical processing
requirement, assuming that the live data entered are in fact typical,
such data generally will not test all combinations or formats that
can enter the system. This bias toward typical values then does not
provide a true systems test and in fact ignores the cases most likely
to cause system failure.
Implementation
After having the user acceptance of the new system developed, the
implementation phase begins. Implementation is the stage of a project
during which theory is turned into practice. During this phase, all the
programs of the system are loaded onto the user's computer. After loading
the system, training of the users starts. Main topics of such type of training
are:
After the users are trained about the computerized system, manual working
has to shift from manual to computerized working. The following two
strategies are followed for running the system:
Parallel run: In such run for a certain defined period, both the systems i.e.
computerized and manual are executed in parallel. This strategy is helpful
because of the following:
Manual results can be compared with the results of the computerized system.
Failure of the computerized system at the early stage, does not affect the
working of the organization, because the manual system continues to work,
as it used to do.
Pilot run: In this type of run, the new system is installed in parts. Some part
of the new system is installed first and executed successfully for
considerable time period. When the results are found satisfactory then only
other parts are implemented. This strategy builds the confidence and the
errors are traced easily.
Corrective maintenance
This acts to correct errors that are uncovered after the software is in use.
Adaptive Maintenance
Perfective Maintenance
This improves future maintainability and reliability and provides basis for
future enhancements.
Conclusions
2. in this website Authorized user can Apply general FIR and after
investigation general FIR became registered FIR.
www.ic3.gov
www.fbi.gov
www.nw3c.org
www.homeoffice.gov.uk/crime
www.met.police.uk
www.crimereports.com
www.crimereportslive.com
www.meldpuntcybercrime.nl
www.mshp.dps.missouri.gov
www.hamsaweb.org/crime
www.dailycrimereport.com
www.usdoj.gov/criminal/cybercrime