E-POLICE

download E-POLICE

of 84

Transcript of E-POLICE

  • 7/30/2019 E-POLICE

    1/84

    1. INTRODUCTION

    We are developing a WEBSITE ON E-POLICE AND INFORMATION. This

    includes missing citizen search, secure registration and profile management

    facilities for detectives and security agencies, Facilitate users with the help of

    Discussion/forum/mail/Online FIR, etc.

    This system also contains information about all judiciary acts.

    With so many branches and roots of the Indian Judicial System, it became very

    important to have a more organized, systematic and an engineered IndianJudiciary, which could make the functioning of the justice system smooth,

    convenient and fast for a common man.

    Users of the system:

    Citizens: Interact with the portal. They can use forum\acts\mailing\online FIR

    facility. And can view missing persons details, online FIRs, forum question

    answers, mails, etc.

    Indirect Users: Benefits from the results or reports produced by these systems

    but do not directly interact with the hardware or software.

    These users may be managers of business functions using the system.

    End-Users: Are not alike. Some are intermittent users. The end-user can also

    be a competitor, not a part of the system.

    Senior Manager Users (Admin): Are fourth types of users and is talking

    increased responsibility for the maintenance and development of information

    systems.

  • 7/30/2019 E-POLICE

    2/84

    3.1 PROBLEM DEFINITION

    Basically the system offers the user to get more reliable services.

    E-POLICE and information deals with several modules such as missing person

    search, computerized and online FIR, forum, information of various Acts and

    sections, mailing, etc.

    The system being online is not subjected to small group of people. It facilitates

    user to perform various activities online which in turn save time, money and

    power; the constraint that the user must have valid user name and password.

    User gets login-id with the process of signup.

    Requirement Analysis:

    Requirement Analysis is done to determine the requirement for the new system

    from user. Requirement analysis is one of the most important parts of the designing

    process. It consists of gathering requirement for new system. After understanding

    problem domain requirement analysis can be carried out. To develop user friendly

    system, requirement analysis determines the output needed, inputs required to

    obtain these outputs, resources to be used etc. The method for collecting data is

    called fact-finding techniques.

    Various fact finding techniques used in system were:

    Interviews: Unstructured interview method was used which included question-

    answer format to acquire information about new system, the respondent being

    users of proposed system, facts about actual requirements and expected results etc.

    were gathered.

    Observation: An observation was made of how actually various activities are

    conducted, which helped to understand over all flow of the system. And thus, gave

    idea of which all process must be included in new system.

  • 7/30/2019 E-POLICE

    3/84

    3.2 EXISTING SYSTEM

    The existing system is manual and is a very slow process, due to which there aresome drawbacks in the existing system:-

    1. The Existing system engages many people for collecting the data of

    different departments.

    2. The Process of analyzing and searching the data is complex and time

    consuming.

    3. All information needs to be kept in the form of paper documents, which

    leads to loss of accuracy.

    4. There is big chance of manual mistakes.

    5. Wrong data may lead to wrong decision making.

  • 7/30/2019 E-POLICE

    4/84

    3.3 NEED FOR THE NEW SYSTEM/PROPOSED

    SYSTEM

    In order to quantify the benefits of your e-POLICE portal, you first have to knowwhat to look for. E-POLICE AND INFORMATION can help you in different

    ways. Here are some of the areas to look for benefits in implementing a portal:

    Paper Reduction:

    E-POLICE AND INFORMATION can reduce the cost associated with creating

    and distributing paper requirements and resumes.

    Cost savings result from:

    Direct savings from reduced paper, printing, and distribution costs

    Indirect savings from time spent handling paper documents

    Paperwork Transfer:

    A big expense with a manually maintaining records and requirement system is that

    of transferring of records from one person to another. For example, the file works

    is no not been done by hands but is done online, reducing the communication

    expenses.

    Improved Data Quality:

    Manual records must be then entered into a computer in order to be processed for

    further process or may be maintained into database for future requirement.

    Whenever data is keyed into a computer from a hand-written document, errors will

    be made. These errors can cost you in many direct and indirect ways:

    Incorrect selection may take place. When wrong justification is done due to

    manual errors and adjustment is costly for system.

    Without accurate information, you lose the ability to perform useful decision

    support. You should have accurate information about the background of the case as

    well as the crime, departments worked in, areas the organization is working in etc.

    for your decision support.

  • 7/30/2019 E-POLICE

    5/84

    Transparency:

    The work of judicial system is not transparent these days. This is an initiative to

    make the progress transparent.

    Fewer Inquiries :

    A good automated system will provide useful information to the citizens,

    Detectives and Defense officials online, that they traditionally request from the

    store departments. By making this information available online, your store

    departments will spend less time answering questions from citizens and officials.

  • 7/30/2019 E-POLICE

    6/84

    3.4 PROPOSED SYSTEM

    We are developing a WEBSITE ON E-POLICE AND INFORMATION. Thisincludes missing citizen search, online FIR filing, secure registration and profile

    management facilities for detectives and security agencies; facilitate users with the

    help of Discussion/forum/mail/etc.

    This system also contains information about all judiciary acts.

    With so many branches and roots of the Indian Judicial System, it became very

    important to have a more organized, systematic and an engineered Indian

    Judiciary, which could make the functioning of the justice system smooth,

    convenient a fast for a common man.

    Users of the system:

    Citizens: Interact with the portal. They can use forum\acts\mailing\online FIR

    facility. And can view missing persons details, online FIRs, forum question

    answers, mails, etc.

    Indirect Users: Benefits from the results or reports produced by these systems

    but do not directly interact with the hardware or software.

    These users may be managers of business functions using the system.

    End-Users: Are not alike. Some are intermittent users. The end-user can also be

    a competitor, not a part of the system.

    Senior Manager Users (Admin): Are fourth types of users and is talking

    increased responsibility for the maintenance and development of informationsystems.

  • 7/30/2019 E-POLICE

    7/84

    3.5 SCOPE OF THE SYSTEM

    Admin will manage all the information. It is the

    super user of the system. Admin have all the

    privileges to do anything in the system and maintain

    the database.

    User can create his own account and he can also modify his account.

    After creating account user get the facility of forum, mail, online FIR,

    missing person search, so on.

    Following facility is provided to user with the help of forum:

    User can ask the questions

    View other user questions

    Update his questions

    Can reply the questions

    Delete the answer.

    The system contains information of all Judiciary Acts. Users can access this

    information and can gain knowledge of different types of crimes and their

    respective punishments.

    Users can send and receive mails from different users.

    Contain details of missing person and their contact information.

    Users can also see their filed FIR online.

  • 7/30/2019 E-POLICE

    8/84

    3.6 FEASIBILITY STUDY

    Feasibility Study of the system is done to ensure that the proposed

    system is consistent with the objective of the organization before it

    can be approved for development. A complete feasibility study

    highlights both, the benefits of the system to the organization and

    the inherent risks in the development and implementation of the

    proposed system.

    A preliminary investigation was done to determine whether the

    proposed system would have the features expected by end-user and

    would be providing something extra and useful than the current

    system which would make the system simpler for the end user to

    use.

    Efforts that are made to study the benefits gained from the system

    could be defined in terms of:

    Economical Feasibility.

    Technical Feasibility.

    Operational Feasibility.

    ECONOMICAL FEASIBILITY:

    This is done to verify whether the new system, which is to be developed is good

    investment for the organization. For the customer, the benefits obtained should be

    substantially greater than the cost of development of the system. Presentation

    software system was developed using the existing resources with little additional

    resources.

    Hence the system is Economically Feasible.

  • 7/30/2019 E-POLICE

    9/84

    TECHNICAL FEASIBILITY:

    This basically deals with the technological aspects of the system. In this phase the

    reliability, technology, performance, maintainability is studied. Investigation of

    adequate available technology, hardware, software, operating time and support

    facility was conducted in order to achieve technical feasibility. The system is

    designed to exploit the resources in an efficient and effective and hence technically

    there is no problem other than having a PC anticipated.

    Hence the system is Technically Feasible.

    OPERATIONAL FEASIBILITY:

    This test of feasibility determines if the system will perform well after it has been

    installed at users site and will fulfill the user requirements. This feasibility is

    proved by customizing the product as per users requirements and suggestions.

  • 7/30/2019 E-POLICE

    10/84

    3.7 HARDWARE AND SOFTWARE

    CONFIGURATIONS

    Hardware Specification

    For this system the minimum hardware requirement is as mentioned bellow:

    Processor : Pentium 4

    RAM : 1 GB or above

    Hard Disk : 20 GB

    Software Specification

    For this system the minimum software requirement is as mentioned bellow:

    Platform : Windows XP or Windows server 2003

    Front End : ASP.NET 3.0 using C#

    Back End : MS SQL Server 2005

    Web Browser : Mozilla Firefox or Internet Explorer

    (Used Softwares: Microsoft Visual Studio 2008, IIS, SQL Server 2005,

    Windows service pack2, .NET Frame work 3.0)

  • 7/30/2019 E-POLICE

    11/84

    INTRODUCTION TO .NET FRAMEWORK

    The Microsoft .NET Framework is a software frameworkthat can be installed on

    computers running Microsoft Windows operating systems. It includes a large

    library of coded solutions to common programming problems and a virtual

    machine that manages the execution of programs written specifically for the

    framework. The .NET framework supports multiple programming languages in a

    manner that allows language interoperability, whereby each language can utilize

    code written in other languages; in particular, the .NET library is available to all

    the programming languages that .NET encompasses. The .NET Framework is a

    Microsoft offering and is intended to be used by most new applications created for

    the Windows platform.

    The framework's Base Class Library provides a large range of features including

    user interface, data access, database connectivity, cryptography, web application

    development, numericalgorithms, andnetwork communications. The class library

    is used by programmers, who combine it with their own code to produce

    applications.

    Programs written for the .NET Framework execute in a software environment that

    manages the program's runtime requirements. Also part of the .NET Framework,

    this runtime environment is known as the Common Language Runtime (CLR). The

    CLR provides the appearance of an application virtual machine so that

    programmers need not consider the capabilities of the specific CPU that will

    execute the program. The CLR also provides other important services such as

    security, memory management, and exception handling. The class library and theCLR together constitute the .NET Framework.

    Interoperability

    Because interaction between new and older applications is commonly required, the

    .NET Framework provides means to access functionality that is implemented in

    programs that execute outside the .NET environment. Access to COM components

    is provided in the System.Runtime.InteropServices and System.EnterpriseServices

    http://en.wikipedia.org/wiki/Software_frameworkhttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Library_(computing)http://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Base_Class_Libraryhttp://en.wikipedia.org/wiki/User_interfacehttp://en.wikipedia.org/wiki/Data_accesshttp://en.wikipedia.org/wiki/Data_accesshttp://en.wikipedia.org/wiki/Database_Connectionhttp://en.wikipedia.org/wiki/Database_Connectionhttp://en.wikipedia.org/wiki/Cryptographyhttp://en.wikipedia.org/wiki/Web_applicationhttp://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/Computer_networkinghttp://en.wikipedia.org/wiki/Computer_networkinghttp://en.wikipedia.org/wiki/Source_codehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Run_time_systemhttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/Virtual_machine#Application_virtual_machinehttp://en.wikipedia.org/wiki/Central_Processing_Unithttp://en.wikipedia.org/wiki/Memory_managementhttp://en.wikipedia.org/wiki/Exception_handlinghttp://en.wikipedia.org/wiki/Component_Object_Modelhttp://en.wikipedia.org/wiki/Microsoft_Windowshttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/Library_(computing)http://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Virtual_machinehttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Base_Class_Libraryhttp://en.wikipedia.org/wiki/User_interfacehttp://en.wikipedia.org/wiki/Data_accesshttp://en.wikipedia.org/wiki/Database_Connectionhttp://en.wikipedia.org/wiki/Cryptographyhttp://en.wikipedia.org/wiki/Web_applicationhttp://en.wikipedia.org/wiki/Algorithmhttp://en.wikipedia.org/wiki/Computer_networkinghttp://en.wikipedia.org/wiki/Source_codehttp://en.wikipedia.org/wiki/Softwarehttp://en.wikipedia.org/wiki/Run_time_systemhttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/Virtual_machine#Application_virtual_machinehttp://en.wikipedia.org/wiki/Central_Processing_Unithttp://en.wikipedia.org/wiki/Memory_managementhttp://en.wikipedia.org/wiki/Exception_handlinghttp://en.wikipedia.org/wiki/Component_Object_Modelhttp://en.wikipedia.org/wiki/Software_framework
  • 7/30/2019 E-POLICE

    12/84

    namespaces of the framework; access to other functionality is provided using the

    P/Invoke feature.

    Common Runtime Engine

    The Common Language Runtime (CLR) is the virtual machine component of

    the .NET framework. All .NET programs execute under the supervision of the

    CLR, guaranteeing certain properties and behaviors in the areas of memory

    management, security, and exception handling.

    Language Independence

    The .NET Framework introduces a Common Type System, or CTS. The CTS

    specificationdefines all possibledata types andprogramming constructs supported

    by the CLR and how they may or may not interact with each other conforming to

    the Common Language Infrastructure(CLI) specification. Because of this feature,

    the .NET Framework supports the exchange of types and object instances between

    libraries and applications written using any conforming .NET language.

    Base Class Library

    The Base Class Library (BCL), part of the Framework Class Library (FCL), is a

    library of functionality available to all languages using the .NET Framework. The

    BCL provides classes which encapsulate a number of common functions, including

    file reading and writing, graphic rendering, database interaction, XML document

    manipulation and so on.

    Simplified Deployment

    The .NET framework includes design features and tools that help manage the

    installation of computer software to ensure that it does not interfere withpreviously installed software, and that it conforms to security requirements.

    Security

    The design is meant to address some of the vulnerabilities, such as buffer

    overflows, that have been exploited by malicious software. Additionally, .NET

    provides a common security model for all applications.

    Portability

    http://en.wikipedia.org/wiki/Platform_Invocation_Serviceshttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/Common_Type_Systemhttp://en.wikipedia.org/wiki/Specificationhttp://en.wikipedia.org/wiki/Specificationhttp://en.wikipedia.org/wiki/Datatypeshttp://en.wikipedia.org/wiki/Datatypeshttp://en.wikipedia.org/wiki/Programminghttp://en.wikipedia.org/wiki/Common_Language_Infrastructurehttp://en.wikipedia.org/wiki/Common_Language_Infrastructurehttp://en.wikipedia.org/wiki/List_of_CLI_languageshttp://en.wikipedia.org/wiki/Base_Class_Libraryhttp://en.wikipedia.org/wiki/Class_(computer_science)http://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Rendering_(computer_graphics)http://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/XMLhttp://en.wikipedia.org/wiki/XMLhttp://en.wikipedia.org/wiki/Installation_(computer_programs)http://en.wikipedia.org/wiki/Installation_(computer_programs)http://en.wikipedia.org/wiki/Buffer_overflowhttp://en.wikipedia.org/wiki/Buffer_overflowhttp://en.wikipedia.org/wiki/Buffer_overflowhttp://en.wikipedia.org/wiki/Platform_Invocation_Serviceshttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/Common_Type_Systemhttp://en.wikipedia.org/wiki/Specificationhttp://en.wikipedia.org/wiki/Datatypeshttp://en.wikipedia.org/wiki/Programminghttp://en.wikipedia.org/wiki/Common_Language_Infrastructurehttp://en.wikipedia.org/wiki/List_of_CLI_languageshttp://en.wikipedia.org/wiki/Base_Class_Libraryhttp://en.wikipedia.org/wiki/Class_(computer_science)http://en.wikipedia.org/wiki/Computer_filehttp://en.wikipedia.org/wiki/Rendering_(computer_graphics)http://en.wikipedia.org/wiki/Databasehttp://en.wikipedia.org/wiki/XMLhttp://en.wikipedia.org/wiki/Installation_(computer_programs)http://en.wikipedia.org/wiki/Buffer_overflowhttp://en.wikipedia.org/wiki/Buffer_overflow
  • 7/30/2019 E-POLICE

    13/84

    The design of the .NET Framework allows it to theoretically be platform agnostic,

    and thus cross-platform compatible. That is, a program written to use the

    framework should run without change on any type of system for which the

    framework is implemented. While Microsoft has never implemented the full

    framework on any system except Microsoft Windows, the framework is engineered

    to be platform agnostic, and cross-platform implementations are available for other

    operating systems. Microsoft submitted the specifications for the Common

    Language Infrastructure (which includes the core class libraries, Common Type

    System, and the Common Intermediate Language), the C# language,and the C+

    +/CLI language to both ECMA and the ISO, making them available as open

    standards. This makes it possible for third parties to create compatibleimplementations of the framework and its languages on other platforms.

    Architecture

    Common Language Infrastructure (CLI)

    The purpose of the Common Language Infrastructure, or CLI, is to provide a

    language-neutral platform for application development and execution, including

    functions for exception handling, garbage collection, security, and interoperability.

    By implementing the core aspects of the .NET Framework within the scope of the

    CLR, this functionality will not be tied to a single language but will be available

    across the many languages supported by the framework. Microsoft's

    implementation of the CLI is called theCommon Language Runtime, or CLR.

    http://en.wikipedia.org/wiki/Cross-platformhttp://en.wikipedia.org/wiki/Common_Language_Infrastructurehttp://en.wikipedia.org/wiki/Common_Language_Infrastructurehttp://en.wikipedia.org/wiki/Common_Type_Systemhttp://en.wikipedia.org/wiki/Common_Type_Systemhttp://en.wikipedia.org/wiki/Common_Type_Systemhttp://en.wikipedia.org/wiki/Common_Intermediate_Languagehttp://en.wikipedia.org/wiki/C_Sharp_(programming_language)http://en.wikipedia.org/wiki/Ecma_Internationalhttp://en.wikipedia.org/wiki/International_Organization_for_Standardizationhttp://en.wikipedia.org/wiki/International_Organization_for_Standardizationhttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/Cross-platformhttp://en.wikipedia.org/wiki/Common_Language_Infrastructurehttp://en.wikipedia.org/wiki/Common_Language_Infrastructurehttp://en.wikipedia.org/wiki/Common_Type_Systemhttp://en.wikipedia.org/wiki/Common_Type_Systemhttp://en.wikipedia.org/wiki/Common_Intermediate_Languagehttp://en.wikipedia.org/wiki/C_Sharp_(programming_language)http://en.wikipedia.org/wiki/Ecma_Internationalhttp://en.wikipedia.org/wiki/International_Organization_for_Standardizationhttp://en.wikipedia.org/wiki/Common_Language_Runtime
  • 7/30/2019 E-POLICE

    14/84

    Visual overview of the Common Language Infrastructure (CLI)

    Metadata

    All CIL is self-describing through .NET metadata. The CLR checks the metadata

    to ensure that the correct method is called. Metadata is usually generated by

    language compilers but developers can create their own metadata through custom

    attributes. Metadata contains information about the assembly, and is also used to

    implement the reflective programming capabilities of .NET Framework.

    Security

    .NET has its own security mechanism with two general features: Code Access

    Security (CAS), and validation and verification. Code Access Security is based on

    evidence that is associated with a specific assembly. Typically the evidence is the

    source of the assembly (whether it is installed on the local machine or has been

    downloaded from the intranet or Internet). Code Access Security uses evidence to

    determine the permissions granted to the code. Other code can demand that calling

    code is granted a specified permission. The demand causes the CLR to perform a

    call stack walk: every assembly of each method in the call stack is checked for the

    http://en.wikipedia.org/wiki/.NET_metadatahttp://en.wikipedia.org/wiki/Reflection_(computer_science)http://en.wikipedia.org/wiki/Code_Access_Securityhttp://en.wikipedia.org/wiki/Code_Access_Securityhttp://en.wikipedia.org/wiki/File:Overview_of_the_Common_Language_Infrastructure.svghttp://en.wikipedia.org/wiki/.NET_metadatahttp://en.wikipedia.org/wiki/Reflection_(computer_science)http://en.wikipedia.org/wiki/Code_Access_Securityhttp://en.wikipedia.org/wiki/Code_Access_Security
  • 7/30/2019 E-POLICE

    15/84

    required permission; if any assembly is not granted the permission a security

    exception is thrown.

    When an assembly is loaded the CLR performs various tests. Two such tests are

    validation and verification. During validation the CLR checks that the assembly

    contains valid metadata and CIL, and whether the internal tables are correct.

    Verification is not so exact. The verification mechanism checks to see if the code

    does anything that is 'unsafe'. The algorithm used is quite conservative; hence

    occasionally code that is 'safe' does not pass. Unsafe code will only be executed if

    the assembly has the 'skip verification' permission, which generally means code

    that is installed on the local machine.

    .NET Framework uses AppDomainsas a mechanism for isolating code running in

    a process. AppDomains can be created and code loaded into or unloaded from

    them independent of other AppDomains. This helps increase the fault tolerance of

    the application, as faults or crashes in one AppDomains do not affect rest of the

    application. AppDomains can also be configured independently with different

    security privileges. This can help increase the security of the application by

    isolating potentially unsafe code. The developer, however, has to split the

    application into subdomains; it is not done by the CLR.

    Class library

    The .NET Framework includes a set ofstandard class libraries. The class library is

    organized in a hierarchy of namespaces. Most of the built in APIs are part of

    either System.* or Microsoft.* namespaces. These class libraries implement a large

    number of common functions, such as file reading and writing, graphic rendering,

    database interaction, and XML document manipulation, among others. The .NET

    class libraries are available to all CLI compliant languages. The .NET Framework

    class library is divided into two parts: the Base Class Library and the Framework

    Class Library.

    The Base Class Library (BCL) includes a small subset of the entire class library

    and is the core set of classes that serve as the basic API of the Common Language

    Runtime. The classes in mscorlib.dll and some of the classes in System.dll and

    System.core.dll are considered to be a part of the BCL. The BCL classes are

    http://en.wikipedia.org/wiki/Application_Domainhttp://en.wikipedia.org/wiki/Application_Domainhttp://en.wikipedia.org/wiki/Process_(computing)http://en.wikipedia.org/wiki/Process_(computing)http://en.wikipedia.org/wiki/Standard_libraryhttp://en.wikipedia.org/wiki/Namespace_(computer_science)http://en.wikipedia.org/wiki/List_of_CLI_languageshttp://en.wikipedia.org/wiki/Base_Class_Libraryhttp://en.wikipedia.org/wiki/APIhttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/Application_Domainhttp://en.wikipedia.org/wiki/Process_(computing)http://en.wikipedia.org/wiki/Standard_libraryhttp://en.wikipedia.org/wiki/Namespace_(computer_science)http://en.wikipedia.org/wiki/List_of_CLI_languageshttp://en.wikipedia.org/wiki/Base_Class_Libraryhttp://en.wikipedia.org/wiki/APIhttp://en.wikipedia.org/wiki/Common_Language_Runtimehttp://en.wikipedia.org/wiki/Common_Language_Runtime
  • 7/30/2019 E-POLICE

    16/84

    available in both .NET Framework as well as its alternative implementations

    including.NET Compact Framework,Microsoft Silverlightand Mono.

    The Framework Class Library (FCL) is a superset of the BCL classes and refers to

    the entire class library that ships with .NET Framework. It includes an expanded

    set of libraries, including Windows Forms, ADO.NET, ASP.NET, Language

    Integrated Query, Windows Presentation Foundation, Windows Communication

    Foundation among others. The FCL is much larger in scope than standard libraries

    for languages like C++, and comparable in scope to thestandard libraries of Java.

    Memory management

    The .NET Framework CLR frees the developer from the burden of managing

    memory (allocating and freeing up when done); instead it does the memory

    management itself. To this end, the memory allocated to instantiations of .NET

    types (objects) is done contiguously from the managed heap, a pool of memory

    managed by the CLR. As long as there exists a reference to an object, which might

    be either a direct reference to an object or via a graph of objects, the object is

    considered to be in use by the CLR. When there is no reference to an object, and it

    cannot be reached or used, it becomes garbage. However, it still holds on to the

    memory allocated to it. .NET Framework includes a garbage collectorwhich runs

    periodically, on a separate thread from the application's thread, that enumerates all

    the unusable objects and reclaims the memory allocated to them.

    The .NET Garbage Collector(GC) is a non-deterministic, compacting, mark-and-

    sweep garbage collector. The GC runs only when a certain amount of memory has

    been used or there is enough pressure for memory on the system. Since it is not

    guaranteed when the conditions to reclaim memory are reached, the GC runs are

    non-deterministic. Each .NET application has a set of roots, which are pointers to

    objects on the managed heap (managed objects). These include references to static

    objects and objects defined as local variables or method parameters currently in

    scope, as well as objects referred to by CPU registers. When the GC runs, it pauses

    the application, and for each object referred to in the root, it recursivelyenumerates

    all the objects reachable from the root objects and marks them as reachable. It

    uses .NET metadata and reflection to discover the objects encapsulated by an

    object, and then recursively walk them. It then enumerates all the objects on the

    http://en.wikipedia.org/wiki/.NET_Compact_Frameworkhttp://en.wikipedia.org/wiki/.NET_Compact_Frameworkhttp://en.wikipedia.org/wiki/.NET_Compact_Frameworkhttp://en.wikipedia.org/wiki/Microsoft_Silverlighthttp://en.wikipedia.org/wiki/Microsoft_Silverlighthttp://en.wikipedia.org/wiki/Mono_(software)http://en.wikipedia.org/wiki/Mono_(software)http://en.wikipedia.org/wiki/Framework_Class_Libraryhttp://en.wikipedia.org/wiki/Windows_Formshttp://en.wikipedia.org/wiki/ADO.NEThttp://en.wikipedia.org/wiki/ASP.NEThttp://en.wikipedia.org/wiki/Language_Integrated_Queryhttp://en.wikipedia.org/wiki/Language_Integrated_Queryhttp://en.wikipedia.org/wiki/Language_Integrated_Queryhttp://en.wikipedia.org/wiki/Windows_Presentation_Foundationhttp://en.wikipedia.org/wiki/Windows_Communication_Foundationhttp://en.wikipedia.org/wiki/Windows_Communication_Foundationhttp://en.wikipedia.org/wiki/C%2B%2Bhttp://en.wikipedia.org/wiki/Java_Class_Libraryhttp://en.wikipedia.org/wiki/Java_Class_Libraryhttp://en.wikipedia.org/wiki/Graph_(data_structure)http://en.wikipedia.org/wiki/Garbage_collection_(computer_science)http://en.wikipedia.org/wiki/Garbage_collection_(computer_science)http://en.wikipedia.org/wiki/Thread_(computing)http://en.wikipedia.org/wiki/Garbage_collection_(computer_science)http://en.wikipedia.org/wiki/Garbage_collection_(computer_science)http://en.wikipedia.org/wiki/Recursionhttp://en.wikipedia.org/wiki/Recursionhttp://en.wikipedia.org/wiki/Reflection_(computer_science)http://en.wikipedia.org/wiki/.NET_Compact_Frameworkhttp://en.wikipedia.org/wiki/Microsoft_Silverlighthttp://en.wikipedia.org/wiki/Mono_(software)http://en.wikipedia.org/wiki/Framework_Class_Libraryhttp://en.wikipedia.org/wiki/Windows_Formshttp://en.wikipedia.org/wiki/ADO.NEThttp://en.wikipedia.org/wiki/ASP.NEThttp://en.wikipedia.org/wiki/Language_Integrated_Queryhttp://en.wikipedia.org/wiki/Language_Integrated_Queryhttp://en.wikipedia.org/wiki/Windows_Presentation_Foundationhttp://en.wikipedia.org/wiki/Windows_Communication_Foundationhttp://en.wikipedia.org/wiki/Windows_Communication_Foundationhttp://en.wikipedia.org/wiki/C%2B%2Bhttp://en.wikipedia.org/wiki/Java_Class_Libraryhttp://en.wikipedia.org/wiki/Graph_(data_structure)http://en.wikipedia.org/wiki/Garbage_collection_(computer_science)http://en.wikipedia.org/wiki/Thread_(computing)http://en.wikipedia.org/wiki/Garbage_collection_(computer_science)http://en.wikipedia.org/wiki/Recursionhttp://en.wikipedia.org/wiki/Reflection_(computer_science)
  • 7/30/2019 E-POLICE

    17/84

    heap (which were initially allocated contiguously) using reflection. All objects not

    marked as reachable are garbage. This is the mark phase. Since the memory held

    by garbage is not of any consequence, it is considered free space. However, this

    leaves chunks of free space between objects which were initially contiguous. The

    objects are then compacted together to make used memory contiguous again. Any

    reference to an object invalidated by moving the object is updated to reflect the

    new location by the GC. The application is resumed after the garbage collection is

    over.

    The GC used by .NET Framework is actually generational. Objects are assigned a

    generation; newly created objects belong to Generation 0. The objects that survive

    a garbage collection are tagged as Generation 1, and the Generation 1 objects that

    survive another collection are Generation 2 objects. The .NET Framework uses up

    to Generation 2 objects. Higher generation objects are garbage collected less

    frequently than lower generation objects. This helps increase the efficiency of

    garbage collection, as older objects tend to have a larger lifetime than newer

    objects. Thus, by removing older (and thus more likely to survive a collection)

    objects from the scope of a collection run, fewer objects need to be checked and

    compacted.

  • 7/30/2019 E-POLICE

    18/84

    ABOUT SQL SERVER 2005

    The code base for MS SQL Server (prior to version 7.0) originated in Sybase SQL

    Server, and was Microsoft's entry to the enterprise-level database market,

    competing against Oracle, IBM, and, later, Sybase. Microsoft, Sybase and Ashton-

    Tateoriginally teamed up to create and market the first version named SQL Server

    1.0 for OS/2 (about 1989) which was essentially the same as Sybase SQL Server

    3.0 on Unix, VMS, etc. Microsoft SQL Server 4.2 was shipped around 1992

    (available bundled with Microsoft OS/2 version 1.3). Later Microsoft SQL Server

    4.21 for Windows NT was released at the same time as Windows NT 3.1.

    Microsoft SQL Server v6.0 was the first version designed for NT, and did not

    include any direction from Sybase.

    About the time Windows NT was released, Sybase and Microsoft parted ways and

    each pursued their own design and marketing schemes. Microsoft negotiated

    exclusive rights to all versions of SQL Server written for Microsoft operating

    systems. Later, Sybase changed the name of its product to Adaptive Server

    Enterprise to avoid confusion with Microsoft SQL Server. Until 1994, Microsoft's

    SQL Server carried three Sybase copyright notices as an indication of its origin.

    http://en.wikipedia.org/wiki/File:DotNet.svg
  • 7/30/2019 E-POLICE

    19/84

    Since parting ways, several revisions have been done independently. SQL Server

    7.0 was a rewrite from the legacy Sybase code. It was succeeded by SQL Server

    2000, which was the first edition to be launched in a variant for the IA-

    64 architecture.

    In the eight years since release of Microsoft's previous SQL Server product (SQL

    Server 2000), advancements have been made in performance, the client IDE tools,

    and several complementary systems that are packaged with SQL Server 2005.

    These include: an ETL tool (SQL Server Integration Services or SSIS), a Reporting

    Server, an OLAP and data mining server (Analysis Services), and several

    messaging technologies, specifically Service Broker and Notification Services.

    SQL Server 2005

    SQL Server 2005 (codenamed Yukon), released in October 2005, is the successor

    to SQL Server 2000. It included native support for managing XML data, in

    addition to relational data. For this purpose, it defined an xml data type that could

    be used either as a data type in database columns or as literals in queries. XML

    columns can be associated with XSD schemas; XML data being stored is verified

    against the schema. XML is converted to an internal binary data type before being

    stored in the database. Specialized indexing methods were made available for

    XML data. XML data is queried using XQuery ;CLR Integration was the main

    features with this edition where one could write SQL code as Managed Code these

    are those code which are being executed by CLR(Common Language Runtime).

    SQL Server 2005 added some extensions to the T-SQL language to allow

    embedding XQuery queries in T-SQL. In addition, it also defines a new extensionto XQuery, called XML DML, that allows query-based modifications to XML

    data. SQL Server 2005 also allows a database server to be exposed over web

    services using TDS packets encapsulated within SOAP (protocol) requests. When

    the data is accessed over web services, results are returned as XML.

    For relational data, T-SQL has been augmented with error handling features

    (try/catch) and support for recursive queries (Common Table Expressions). SQL

    Server 2005 has also been enhanced with new indexing algorithms and better errorrecovery systems. Data pages are checksummed for better error resiliency, and

  • 7/30/2019 E-POLICE

    20/84

    optimistic concurrency support has been added for better performance. Permissions

    and access control have been made more granular and the query processor handles

    concurrent execution of queries in a more efficient way. Partitions on tables and

    indexes are supported natively, so scaling out a database onto a cluster is easier.

    SQL CLR was introduced with SQL Server 2005 to let it integrate with the .NET

    Framework.

    SQL Server 2005 introduced "MARS" (Multiple Active Results Sets), a method of

    allowing usage of database connections for multiple purposes.

    ASP.NET

    Server Application Development

    Server-side applications in the managed world are implemented through runtime

    hosts. Unmanaged applications host the common language runtime, which allows

    your custom managed code to control the behavior of the server. This model

    provides you with all the features of the common language runtime and class

    library while gaining the performance and scalability of the host server.

    The following illustration shows a basic network schema with managed code

    running in different server environments. Servers such as IIS and SQL Server can

    perform standard operations while your application logic executes through the

    managed code.

    SERVER-SIDE MANAGED CODE

    ASP.NET is the hosting environment that enables developers to use the NET

    Framework to target Web-based applications. However, ASP.NET is more than

    just a runtime host; it is a complete architecture for developing Web sites and

    Internet-distributed objects using managed code. Both Web Forms and XML Web

    services use IIS and ASP.NET as the publishing mechanism for applications, and

    both have a collection of supporting classes in the NET Framework.

    XML Web services, an important evolution in Web-based technology, are

    distributed, serverside application components similar to common Web sites.

    However, unlike Web-based applications, XML Web services components have no

    UI and are not targeted for browsers such as Internet Explorer and NetscapeNavigator. Instead, XML Web services consist of reusable software components

  • 7/30/2019 E-POLICE

    21/84

    designed to be consumed by other applications, such as traditional client

    applications, Web-based applications, or even other XML Web services. As a

    result, XML Web services technology is rapidly moving application development

    and deployment into the highly distributed environment of the Internet.

    If you have used earlier versions of ASP technology, you will immediately notice

    the improvements that ASP.NET and Web Forms offers. For example, you can

    develop Web Forms pages in any language that supports the NET Framework. In

    addition, your code no longer needs to share the same file with your HTTP text

    (although it can continue to do so if you prefer). Web Forms

    pages execute in native machine language because, like any other managed

    application, they take full advantage of the runtime. In contrast, unmanaged ASP

    pages are always scripted and interpreted. ASP.NET pages are faster, more

    functional, and easier to develop than unmanaged ASP pages because they interact

    with the runtime like any managed application.

    The NET Framework also provides a collection of classes and tools to aid in

    development and consumption of XML Web services applications. XML Web

    services are built on standards such as SOAP (a remote procedure-call protocol),

    XML (an extensible data format), and WSDL ( the Web Services Description

    Language). The NET Framework is built on these standards to promote

    interoperability with non-Microsoft solutions.

    ACTIVE SERVER PAGES.NET

    ASP.NET is a programming framework built on the common language runtime

    that can be used on a server to build powerful Web applications. ASP.NET offers

    several important advantages over previous Web development models:

    Enhanced Performance. ASP.NET is compiled common language runtime code

    running on the server. Unlike its interpreted predecessors, ASP.NET can take

    advantage of early binding, just-intime compilation, native optimization, and

    caching services right out of the box. This amounts to dramatically better

    performance before you ever write a line of code.

  • 7/30/2019 E-POLICE

    22/84

    World-Class Tool Support. The ASP.NET framework is complemented by a rich

    toolbox and designer in the Visual Studio integrated development environment.

    WYSIWYG editing, drag-and

    drop server controls, and automatic deployment are just a few of the features this

    powerful tool

    provides.

    Power and Flexibility. Because ASRNET is based on the common language

    runtime, the power and flexibility of that entire platform is available to Web

    application developers. The NET Framework class library, Messaging, and Data

    Access solutions are all seamlessly accessible from the Web. ASRNET is also

    language-independent, so you can choose the language that best applies to your

    application or partition your application across many languages. Further, common

    language runtime interoperability guarantees that your existing investment in

    COM-based development is preserved when migrating to ASP.NET.

    Simplicity. ASRNET makes it easy to perform common tasks, from simple form

    submission and client authentication to deployment and site configuration. For

    example, the ASRNET page framework allows you to build user interfaces thatcleanly separate application logic from presentation code and to handle events in a

    simple, Visual Basic - like forms processing model. Additionally, the common

    language runtime simplifies development, with managed code services such as

    automatic reference counting and garbage collection.

    Manageability. ASRNET employs a text-based, hierarchical configuration system,

    which simplifies applying settings to your server environment and Web

    applications. Because configuration information is stored as plain text, newsettings may be applied without the aid of local administration tools. This "zero

    local administration" philosophy extends to deploying ASRNET Framework

    applications as well. An ASRNET Framework application is deployed to a server

    simply by copying the necessary files to the server. No server restart is required,

    even to deploy or replace running compiled code.

    Scalability and Availability. ASRNET has been designed with scalability in

    mind, with features specifically tailored to improve performance in clustered and

    multiprocessor environments. Further, processes are closely monitored and

  • 7/30/2019 E-POLICE

    23/84

    managed by the ASRNET runtime, so that if one misbehaves (leaks, deadlocks), a

    new process can be created in its place, which helps keep your application

    constantly available to handle requests.

    Customizability and Extensibility. ASRNET delivers a well-factored architecture

    that allows developers to "plug-in" their code at the appropriate level. In fact, it is

    possible to extend or replace any subcomponent of the ASRNET runtime with your

    own custom-written component. Implementing custom authentication or state

    services has never been easier.

    Security With built in Windows authentication and per-application configuration,

    you can be assured that your applications are secure

    LANGUAGE SUPPORT

    The Microsoft NET Platform currently offers built-in support for three languages:

    C#, Visual Basic, and Jscript

    C#.Net

    C# is an object-oriented programming language developed by Microsoft as part of

    the NET initiative and later approved as a standard by ECMA and ISO. Anders

    Hejlsberg leads development of the C# language, which has a procedural, object-

    oriented syntax based on C++ and includes aspects of several other programming

    languages (most notably Delphi and Java) with a particular emphasis on

    simplification.

    Design goals

    The ECMA standard lists these design goals for C#:

    C# is intended to be a simple, modern, general-purpose, object-oriented

    programming language.

    Because software robustness, durability and programmer productivity are

    important, the language should include strong type checking, array bounds

    checking, detection of attempts to use un initialized variables, source code

    portability, and automatic garbage collection.

    The language is intended for use in developing software components that can take

    advantage of distributed environments.

  • 7/30/2019 E-POLICE

    24/84

    Programmer portability is very important, especially for those programmers

    already familiar with C and C++.

    Support for internationalization is very important.

    C# is intended to be suitable for writing applications for both hosted and embedded

    systems, ranging from the very large that use sophisticated operating systems,

    down to the very small having dedicated functions.

    Although C# applications are intended to be economical with regards to memory

    and processing power requirements, the language was not intended to compete

    directly on performance and size with C or assembly language.

    Features

    The following description is based on the language standard and other documents

    listed in the External links section.

    By design, C# is the programming language that most directly reflects the

    underlying Common Language Infrastructure (CLI). Most of C#'s intrinsic types

    correspond to value-types implemented by the CLI framework. However, the C#

    language specification does not state the code generation

    requirements of the compiler: that is, it does not state that a C# compiler must

    target a Common Language Runtime (CLR), or generate Common Intermediate

    Language (CIL), or generate any other specific format. Theoretically, a C#

    compiler could generate machine code like traditional compilers of C++ or

    FORTRAN; in practice, all existing C# implementations target CLI.

    C# differs from C and C++ in many ways, including:

    There are no global variables or functions. All methods and members must be

    declared within classes.

    Local variables cannot shadow variables of the enclosing block, unlike C and C++.

    Variable shadowing is often considered confusing by C++ texts.

    C# supports a strict boolean type, bool. Statements that take conditions, such as

    while and if, require an expression of a Boolean type. While C++ also has a

    boolean type, it can be freely converted to and from integers, and expressions such

    as if(a) require only that a is convertible to bool, allowing a to be an int, or a

  • 7/30/2019 E-POLICE

    25/84

    pointer. C# disallows this "integer meaning true or false" approach on the grounds

    that forcingprogrammers to use expressions that return exactly bool can prevent

    certain types of programming mistakes such as if (a = b) (use of = instead of==).

    In C#, memory address pointers can only be used within blocks specifically

    marked as unsafe, and programs with unsafe code need appropriate permissions to

    run. Most object access is done through safe references, which cannot be made

    invalid. An unsafe pointer can point to an instance of a value-type, array, string, or

    a block of memory allocated on a stack. Code that is not marked as unsafe can still

    store and manipulate pointers through the System.IntPtr type, but cannot

    dereference them.

    Managed memory cannot be explicitly freed, but is automatically garbage

    collected. Garbage collection addresses memory leaks. C# also provides direct

    support for deterministic finalization with the using statement (supporting the

    Resource Acquisition Is Initialization idiom).

    Multiple inheritance is not supported, although a class can implement any

    number of interfaces. This was a design decision by the language's lead architect to

    avoid complication, avoid dependency hell and simplify architectural requirements

    throughout CLI.

    C# is more typesafe than C++. The only implicit conversions by default are those

    which are considered safe, such as widening of integers and conversion from a

    derived type to a base type. This is enforced at compile-time, during JIT, and, in

    some cases, at runtime. There are no implicit conversions between booleans and

    integers and between enumeration members and integers (except 0, which can be

    implicitly converted to an enumerated type), and any userdefined conversion must

    be explicitly marked as explicit or implicit, unlike C++ copy constructors

    (which are implicit by default) and conversion operators (which are always

    implicit). Enumeration members are placed in their own namespace.

    Accessors called properties can be used to modify an object with syntax that

    resembles C++ member field access. In C++, declaring a member public enables

    both reading and writing to that member, and accessor methods must be used if

    more fine-grained control is needed. In C#, properties allow control over member

    access and data validation.

  • 7/30/2019 E-POLICE

    26/84

    4.1 Data DictionaryTable:-Admin Login Information

    Table:-User Login Information

    Table:-User Information

  • 7/30/2019 E-POLICE

    27/84

    Table:-Forum Question

    Table:-Forum Answer

    Table:-Section Details

  • 7/30/2019 E-POLICE

    28/84

    Table:-Missing Person Details

    Table:-Missing Person Image Details

    Table:-Send Mail

  • 7/30/2019 E-POLICE

    29/84

    Table:-Receive Mail

    Table:-Draft Mail

    Table:-FIR Details

  • 7/30/2019 E-POLICE

    30/84

    4.2 Entity-Relationship Diagram

    Administrator

    Name

    Ph.

    No.

    Id

    Passwor

    d

    Manages

    User Account

    Manages

    Missing Person

    Ph. No.

    NNNo.

    DOB

    Place

    Date

    Password

    ID

    Forum

    User

    CanView\p

    ost

    CanView

    Date

    Mail

    Section

    Can

    Send

    Receive

    Can

    View

    Name

    Address

    Number

    Punishment

    Question

    Answer

    U_Name

    Has

  • 7/30/2019 E-POLICE

    31/84

    4.3 Data Flow Diagram

    A graphical tool used to describe and analyze the moment of data through a system

    manual or automated including the process, stores of data, and delays in the

    system. The DFD is also know as a data flow graph or a bubble chart.

    DFDs are the model of the proposed system. They clearly should

    show the requirements on which the new system should be built.

    The Basic Notation used to create a DFDs are as follows:

    1. Dataflow: Data move in a specific direction from an origin to a destination.

    2. Process: People, procedures, or devices that use or produce (Transform) Data.

    The physical component is not identified.

    3. Source: External sources or destination of data, which may be People,

    programs, organizations or other entities.

    4. Data Store: Here data are stored or referenced by a process in the System.

  • 7/30/2019 E-POLICE

    32/84

    DFD of 0 Level

    Crime Database

    E-POLICESystem

    0.0

    Registered User

    Unregistered User

    DB Info Details

    Mail

    Forum

    Act Search

    Update Account Info

    FIR

    Forum

    Mail

    Add,Update Missing Deatails

    Admin

    Forum

    Sing

    Up

    Act Search

  • 7/30/2019 E-POLICE

    33/84

    First Level DFD For Admin

    ADMIN

    Admin table

    FIR MAIL Forum Missing Person Details

    Checking InDatabase

    Correct

    Password

    Allow To Login

    Verifying AdminPassword

    Wrong Password

    Login

    Process

    Verification

    OfPassword

  • 7/30/2019 E-POLICE

    34/84

    DFD of LEVEL I : For Client

    USER

    User table

    FIR MAIL Forum Missing Person Details

    Checking InDatabase

    CorrectPassword

    Allow To Login

    Verifying User

    Password

    Wrong Password

    LoginProcess

    Verification

    OfPassword

    UpdateAccount

    Act Search

    Update database

  • 7/30/2019 E-POLICE

    35/84

    4.4 UML DIAGRAMS

    Use Case Diagram (For Admin):

    Admi

    Post/Reply to

    User Question

    Send/Receive

    Mail

    Suspend Illegal

    Users

    Add, Update, Edit

    Acts\ Section

    Info.

    Add Missing

    Person Info.

    Organize

    Accounts

    Update Missing

    Person Info.

    Delete Missing

    Person Info.

    Search Missing

    Person Info.

  • 7/30/2019 E-POLICE

    36/84

    Use Case Diagram ( For User)

    User

    Ask/Reply

    Question/Answer

    Modify

    Question

    View Acts and

    Section Information

    Send/Receive

    Mail

    View Missing

    Person details

    Login

  • 7/30/2019 E-POLICE

    37/84

    Activity Diagrams:

    Registration Diagram:

    Get the Details

    Validate Details

    [Enter Registration Details ]

    RejectedNo

    [submit ]

    Yes

    Accepted

    [Success Fully Registered ]

  • 7/30/2019 E-POLICE

    38/84

    Login Activity Diagram:

    Get Details

    Validate Data

    [Enter User Name and Password ]

    [Submit ]

    Rejected AcceptedyesNo

    Error

  • 7/30/2019 E-POLICE

    39/84

    Sequence Diagram (For Admin):

    Process Master Screen Administrator Server

    Add Missing

    Person

    Update

    Missing Person

    Search Missing

    Person

    Reply To User

    Suspend Users

    Validate

    Missing Person

    Validate User

    Request for

    Appropriate

    Screen For MP

    Generate

    Response

    from Server

    Send

    Response

    Request for

    User

    Display ( )

  • 7/30/2019 E-POLICE

    40/84

    Sequence Diagram (For User):

    Process User Screen Server

    Ask Question

    Reply

    View Section

    Information

    Send Mail

    View Missing

    Person Info.

    Validate User

    Question

    Validate User

    For Mail

    Display ()

    Save

    Question

    Save

    Answer

    Generate

    Response for

    Request

    Validate User

    Answer

  • 7/30/2019 E-POLICE

    41/84

  • 7/30/2019 E-POLICE

    42/84

    Deployment Diagram:

    Server

    Client: C1 Client: C2 Client: Cn

    Internet

  • 7/30/2019 E-POLICE

    43/84

    5. MODULE SPECIFICATION

    Password Module:

    In this module, user enters a password and the portal checks its validity. If

    the password is valid then he is allowed to enter, otherwise Invalid

    User/Password message is displayed.

    Search:

    In Search section, authorized user and admin will search for missing

    people details and can also seek information of different acts and section,

    etc.

    Contact of concerned authority:

    Contact details of the area official who is managing things.

    Secure registration and profile management facilities for detectives and

    security agencies.

    Validation of Data Entered by the User and Error Handlin:

    In this module, the validity of data entered by the user during the various

    processes is checked through various validation checks. For example,

    there shouldnt be any characters entered in the numeric fields, likewise if

    there is any error occurs that it should handle that particular error and give

    the required messages.

    Setting:

    User can change its account information if he wants to, after creating his

    account.

    Acts and Section:

    All detailed information regarding different acts and sections is available on

    a single button click. Users can use this information.

  • 7/30/2019 E-POLICE

    44/84

    Forum:

    One can post questions if he has some queries and can also answer the

    questions posted by other users of the system if he knows the answer.

    Missing Person:

    Admin has the only right to enter the details of a missing citizen and post

    on the web according to the valid information provided by the user to do so.

    Admin can add/edit/delete this information as required. End Users

    themselves cannot alter this information.

    Mail:

    Users and admin can send\receive mails on their authorised accounts.

    Online FIR:

    FIR can be seen online once it is filed by the admin on the demand of the

    user.

    The admin can add, update and delete FIR as per requirements.

  • 7/30/2019 E-POLICE

    45/84

    6. SCREENS

    6.1 USER INTERFACE

    User Login Form:

    This is Login form User can login using his/her ID and Password

    After Login Page:

    User can Perform Different Tasks

  • 7/30/2019 E-POLICE

    46/84

    Forum Page

    User can Perform Different task such as Ask Question, Modify question

    Ask Question Page:

    User can Ask Question

  • 7/30/2019 E-POLICE

    47/84

    My Question Page

    User can only see his/her Question which is ask

    All Question Page

    User can see Question Ask by all users

  • 7/30/2019 E-POLICE

    48/84

    View Answer of Question Page:

    User can View Answers of The Question

  • 7/30/2019 E-POLICE

    49/84

    Modify Question Page:

    User can only Modify Question ask by him/her

    Answer Question Page:

    User can Post Answer To the Question

  • 7/30/2019 E-POLICE

    50/84

    Enter Missing Person Details Page:

    User Enter Person Name or Number To View Details

    View Missing Person Details Page:

    User can View Missing Person Details

  • 7/30/2019 E-POLICE

    51/84

    Select Fir Page:

    User can view FIR

    View Fir Page

    User can View Fir According To FIR Number

  • 7/30/2019 E-POLICE

    52/84

    View Fir Page

    User can View FIR According To Selected Topic

  • 7/30/2019 E-POLICE

    53/84

    Check While Update Account Information:

    Checking of User ID and Password To Edit Account Information

  • 7/30/2019 E-POLICE

    54/84

  • 7/30/2019 E-POLICE

    55/84

    Section Search Page

    User can Only Get Information about Acts

  • 7/30/2019 E-POLICE

    56/84

    About Us page

  • 7/30/2019 E-POLICE

    57/84

    Contact Us Page

  • 7/30/2019 E-POLICE

    58/84

  • 7/30/2019 E-POLICE

    59/84

    Receive Mail Page (Inbox)

    Compose Mail Page

  • 7/30/2019 E-POLICE

    60/84

    Display Inbox Data Page

  • 7/30/2019 E-POLICE

    61/84

    Sent Mail Page

  • 7/30/2019 E-POLICE

    62/84

  • 7/30/2019 E-POLICE

    63/84

    6.2 ADMIN USER INTERFACE

    Admin Log In Page

  • 7/30/2019 E-POLICE

    64/84

    After Log In Page

  • 7/30/2019 E-POLICE

    65/84

    Missing Person Page

  • 7/30/2019 E-POLICE

    66/84

    Add Record Of Missing Person Page

  • 7/30/2019 E-POLICE

    67/84

    View Missing Person Details Page

  • 7/30/2019 E-POLICE

    68/84

    View Details Of Missing Person Page

  • 7/30/2019 E-POLICE

    69/84

    Update Missing Person Information Page

  • 7/30/2019 E-POLICE

    70/84

    Edit Information Page

  • 7/30/2019 E-POLICE

    71/84

    FIR Page

  • 7/30/2019 E-POLICE

    72/84

    Add FIR Page

  • 7/30/2019 E-POLICE

    73/84

    Update FIR Page

  • 7/30/2019 E-POLICE

    74/84

    Update FIR According To FIR Number Page

  • 7/30/2019 E-POLICE

    75/84

    View Fir Page

  • 7/30/2019 E-POLICE

    76/84

  • 7/30/2019 E-POLICE

    77/84

    View FIR According To FIR Topic Page

  • 7/30/2019 E-POLICE

    78/84

    Receive Mail For ADMIN Page (Inbox)

  • 7/30/2019 E-POLICE

    79/84

    Display Inbox Matter Page

  • 7/30/2019 E-POLICE

    80/84

    Section Search For ADMIN Page

  • 7/30/2019 E-POLICE

    81/84

    7. TESTING STRATEGIES

    Software testing is one of the traditional methods for testing software quality. It is

    a process of executing a program with objectives of finding errors. It was very

    useful in developing error free system, as during testing various cases of accident

    were taken and checked whether system generated desired output.

    Various testing techniques used for testing system are:

    White Box Testing (Code testing):

    In this strategy, internal logic of program was tested. Various test cases were

    developed such that they result in execution of every instruction in program, so allpath of program were tested.

    Black Box Testing (Specification testing):

    In this strategy, system was tested for some set of input, verifying whether it

    generates desired output in all various conditions. Using various test cases, black

    box testing was done successfully.

  • 7/30/2019 E-POLICE

    82/84

    8. CONCLUSION

    Today in this world of modernization, we are faced with opportunities

    unprecedented in history. With technological advancement everything can be

    replicated and duplicated but manpower is one unique asset that be duplicated

    hence utmost importance is given toward making once work as possible.

    This project has helped me great depth to learn new concepts of web, .NET,

    Frameworks, SQL, etc. I have tried to make software user friendly and simple to

    understand as far as possible so as to bring efficiency in the work.

    At last, I am thankful to the University of Pune to include this project work as part

    of M.Sc. academic syllabus. This project work really gave chance to me to do

    something apart from typical reference book.

  • 7/30/2019 E-POLICE

    83/84

    9. LIMITATION

    Site can be only used for the Indian Laws and Acts.

    Cannot Registered Online FIR and Information About Missing Person.

    Mail can only use in IntraDomain not InterDomain

  • 7/30/2019 E-POLICE

    84/84

    10. BIBLIOGRAPHY

    www.w3schools.com

    www.sql-tutorial.net

    Unified Modeling Languages: Grady Booch

    Online ASP.NET and MYSQL manuals.

    http://www.w3schools.com/http://www.sql-tutorial.net/http://www.w3schools.com/http://www.sql-tutorial.net/