Project Report On Aaj
Project Report On Aaj
ON
CRIME REPORT MANAGEMENT SYSTEM
External Supervisor
Mr.V.K.Mishra
Technical Head
DUCAT,Noida
CERTIFICATE
Amit Taneja
Internal Project Supervisor
Associate Professor
Invertis University Bareilly
Ajay Indian
HOD (IICA)
Associate Professor
Invertis University Bareilly
Preface
The Internets rapid diffusion and digitization of economic activities have led to the
emergence of a new breed of criminals. Economic, political, and social impacts led to
increase the number of crime activity at every face of life .This serious blast in the field of
crime prove to be a epidemic situation for the guards. The biggest problem arises with a
hydra-headed situations .So this project is an attempt to solve a question to management of
the information of the criminal, witness, charge sheets and all other important aspects that
must be kept for a future reference.
For the first time in our civilization, computers and networks, together, constitute an
amplifier of the human mind, where the amplification factor is at a billion and growing fast
with no upper bound in sight. With such formidable potential and power, computers and
networks are destined to fundamentally alter our world even beyond what we can
reasonably imagine.
So this software gather all the resources which provide a easy method to manage and
control .
Looking at the patterns of cybercrimes, it is apparent that many underlying assumptions
about crimes are flawed, unrealistic, and implausible to explain this new form of
criminality. The empirical records regarding crime patterns and strategies to avoid and
fight crimes run counter to the functioning of the cyber world.
Theorists are also debating as to the best way to comprehend the actions of criminals and
hackers and the symbiotic relationships they have with various situation.
An online comprehensive crime reporting system to engage public, NGOs, police and
government agencies to be more quick, proactive and responsive to fight with crime and
criminals.
Conventionally the citizen has to go to Police station in person to report the crimes and
anonymous events like thefts, murder, missing citizens, dead bodies and other
miscellaneous events. Here we are explaining about a crime management system which
will be useful for citizens and police departments .So crimes are solve and conclude in an
effective period
ACKNOWLEGDEMENT
I extend my Thanks to Ducat, Noida who has given me opportunity.
Today I am feeling a great sense of Excitement on my way to successfully
complete my project on Crime Record Management System under the
guidance of Mr. V.K.Mishra Technical Head, Ducat, Noida.
I sincerely thank him for responding great confidence and faith in my work
and being with me to encourage and guide me to successful project
completion.
I should also like to thank Mr. Ajay Indian, HOD, Department of
Computer Applications, Invertis University Bareilly and Mr. Amit Taneja,
Associate Professor, Department of Computer Applications, Invertis
University Bareilly for their support and all my friends and colleagues who
have created an atmosphere to encourage me from time to time making our
work easy.
Thank You..
Table of Contents
1. Introduction of project
a. Problem Statement
b. Proposed Work
2. Organization Profile
3. System Requirements And Analysis
a. System Analysis
b. Requirements Analysis
4. System Design
a. Database Tables
b. Data Flow Diagrams
5. System Coding/Snapshots
6. System Testing
a. Test Cases
b. Test techniques
7. Implementation
Bibliography
List of Tables
1
5
7
10
25
40
44
10
11
11
12
12
13
7. Departments ( tbl_departmentMaster)
13
8. Designations ( tbl_designationMaster)
14
9. Evidences (tbl_evidenceMaster)
14
15
15
16
16
17
17
18
List of Figures
1.Login Page(frmLoginPage.aspx)
25
2. Designation Page(frmDesignationMaster.aspx)
26
27
28
29
6.Victim Page(VictimMaster.aspx)
30
31
8. Investigation page(frmInvestigationMaster.aspx)
32
33
34
35
36
37
38
39
List of Abbreviation
sequenceId
Sequence Id
firNo
FIR Number
description
Description
crimeCategoryId
Crime Category Id
crimeCategory
Crime category
natureId
Nature Id
categoryId
Category Id
crimeName
Crime Name
chargeSheetNo
Chargesheet Number
chaegeSheetDate
Chargesheet Date
chargeSheetDes
Chargesheet Description
produceCourtName
Name of Court
chargeSheetFieldBy
Chargesheet Field By
witnessed
Witness Id
witnessCollectedDate
witnessInfo
Witness Information
employeeNo
Employee Number
employeeName
Employee Name
designationId
Designation Id
departmentNo
Department Number
dateOfbirth
Date Of Birth
dateOfJoin
Date Of Join
emailId
Email Id
highestDesgId
Highest Designation Id
evidenceTypeId
Evidence Type Id
evidenceCollecteddate
evidenceName
Evidence Name
startDate
Start Date
endDate
End Date
mac
MAC Address
loginOldPw
loginCurrentPw
inchargeId
Incharge ID
policeStationId
Police Station Id
Introduction of Project
The Crime Records Management System applies to Police Stations all across the country
and specifically looks into the subject crime prevention, detection, conviction of criminals
depending on a highly responsive backbone of Information Management. The efficiency of
the Police and the effectiveness with which it tackles crime depend on what quality of
information it can derive from its existing records and how fast it can have access to it.
I had done this project using ASP.NET as front end and SQL Server as back end easing the
effort of user.
Modules of the Project
1) Department module
In this module we have three sub modules Designation , Department employee and
police stations. In these modules we store designations of department, their description,
employee in department and police stations details with incharge of that station.
2) Investigation module
This module is used for storing investigation details. It contains all information related to
investigation just like evidence, evidence type, evidence description, witness, witness
details, investigation duration etc.
3) Crime module
This module is used for entering all details about the crime. It contains the date and time,
police station where it is recorded, place, Nature of Crime, Location of the Crime etc.
4) Chargesheet module
In this module we store the chargesheet information. It contains chargesheet number,
chargesheet date, fir number, who filled the chargesheet etc.
5) Administrator Module
The module will be protected by user ID and password. Ordinary will not be permitted to
enter into this area. The module will be focusing on the maintenance like Master Data
Maintenance, Removal of old and outdated data from the software etc.
6) Security Module
The module contains the user details.Administrator can add a new user by providing a
new user name and password,can delete any user.
Problem Statement
In the existing crime management system, most of the operations are done manually like
send complaints, taking actions against crimes, view status etc. So with the existing
system if anybody wants to complaint against crimes he must do it through the police.
If we are doing the system manually, so many minor errors will occur. Error detection in
the previous entries made and data cross verification is another important function. These
are done manually, and it would take time.
Drawbacks of the existing system can be concluded as follows:
The existing system is time consuming and not very user friendly.
The FIR brought by a person hailing from a family beyond poverty, the existing system
shows ignorance for the same
The officer dealing with a particular case cannot take decision by himself even when he
is having the first hand knowledge/information about the case and he can expect
obstructions from higher authorities/officials.
Even an efficient officer cannot/may not able to handle more than one case at a time.
As we all know, a covered truth, Bribery plays an important role in the existing system.
Many cases are pilled up in the corners, which are not proved, due to lack of
commitment in the job.
In most of the cases, the innocent are accused in the existing system.
As per our jurisdiction, Let thousand criminals escape-not a single innocent be punished
. As a result of this and other factors that influence investigation, such as bribery, the
innocent becomes accused in several situations in the eyes of Justice.
The existing system could provide only investigation and there is no Advocating,
Counseling facilities etc. hence no contact or control or co-ordination on these cell.
They criticized it for being inefficient, time consuming, poorly managed, disparate and
lacking flexibility.
Evaluation requires monitoring crime before, during and after the initiative.
Facts other than these initiatives may also impact on crime levels which makes
evaluation particularly difficult.
Because of the amount of serious crime, lesser crime goes unchecked. Many crimes
become regarded as antisocial activities.
Proposed Work
Our mission statement directs us to promote the public interest while balancing the Law.
Obviously well not rush to judgment, but will look at the facts and render a thoughtful
decision based on these facts. Organization is an independent statutory body which was
created to maintain an effective an effective and efficient police service for the public. Its
primary task includes securing continuous needs of the public in an efficient manner. As
part of the responsibility, our committee is responsible for performance monitoring
(performance planning and review formerly professional standards and performance
monitoring) decided to look at the contribution and effectiveness of the organization
within the public. We need the whole hearted support of each and every individual
member of the site and cooperation of the users. The administrator, along with the
investigators, lawyers, counselors, and other authorities statutory partners in our
organization. Given their key role in these partnerships, we felt that an overview of
strength and Weakness of the organization is needed.
The aim of the project is to bring about improvement to the organizations contributions;
this report necessarily concentrates on overcoming weakness and raising standards. To
avoid conducting and unfair evaluation efforts which are made to put this contribution
into this context. It believes that partnership work is highly beneficial to the organization
and that partnership work is the way forward to reduce crime and disorder.
The product provides a framework, which is error free. We know a crime management
system is actually a critical process having many calculations and operations. So each
simple error laid to big problem. So it should be error free and our objective is to build
error free software.
ORGANIZATION PROFILE
DUCAT is one of the nations largest Corporate Education, Training and Consultancy
provider and because DUCAT is a completely Indian company and we understand Indias
training needs, and how they affect our unique place in the global economy. DUCAT has
its corporate office in Noida (UP) with its branches in Delhi/NCR and we provide services
to 20,000 professional annually through a single point of contact to manage our customers
training needs.
With over 6 years experience in the industry, DUCAT is recognized as a leading expert in
the design, development and delivery of technical and soft skills training - from individual
courses and seminars to certification programs and fullscale training solutions. DUCAT
offers a full spectrum of vendor-authorized technical,business skills, project management
and application courses designed to suit every skill level, as well as the ability to consult
directly with organizations to tailor made learning plans for any number of employees.
DUCAT products and services have wide appeal and are applicable to those in a variety of
positions including network administrators, systems analysts, systems architects, software
developers, help desk staff, IT managers, senior executives, administrative assistants and
business professionals.
With DUCAT, you get remarkable flexibility in choosing the learning delivery method that
suits your employees and your organization. DUCAT offers a breadth of instructor-led
training courses across India. To satisfy increasing customer demand, DUCAT will soon
implement a Learning Management System (LMS) that offers all customers access to
fullservice,multi-vendor online training.
DUCAT provides corporate education and custom-content training solutions to some of
India's largest private and public organizations. We serve clients in various sectors such as
information technology, financial services, pharmaceuticals, telecommunications,
education,professional services. DUCAT is proud of itself in its ability to assess learning
needs and develop and deliver training solutions to support and enhance our customers'
return on their training investments.
Nitin Mehta
Director Ducat
A graduate in from Delhi University, Delhi in 1998 in B.Com (H). He also has a Post
Graduate in Business Administration & E-Commerce from Tuples. He started the DUCAT
division under the name of S.O Infotech in 1998, majorly focusing on the training needs of
the IT industry. Presently, Mr. Nitin Mehta is the Director & is responsible for the training
as well as the development division (DUCAT Technologies) operations in the Asia Pacific
region.
With an extensive experience of over a period of 8 years, he is an eminent player in the
industry. "What I enjoy is the challenge in the field that I am in!. Creating solutions for our
clients and continuously getting the best out of my young team is very exciting!" ,is his
mantra for success.
Business Philosophy: "To work hard, to be flexible and adapt to any environment. `No is a
bad word in my business!" On being a Managing Director: Continuously looking for
benchmarks for himself and his company. Strengths: "To be able to get the creative juices
of my young team flowing all the time!"
Corporate Goal: "Positive results are definitely the buzz word, but what is essential to
plan is where my organisation and the industry stands in the next 10 years and to retain my
competitive edge! I want to be my customer's first choice when they need to be serviced.
SYSTEM ANALYSIS
System Analysis works with users to identify goals and build systems to achieve them.
System analysis is an important phase of any system development process. The system is
studied to the minutest details and analyzed. The system analyst plays the role of an
interrogator and dwells deep in to the working of the present system. In analysis, a detailed
study of these operations performed by a system and their relationships within and outside
of the system is done. A key question considered here is, what must be done to solve the
problem? One aspect of analysis is defining the boundaries of the system and determining
whether or not the candidate system should be considered. The system is viewed as a
whole and the inputs to the system are identified. The outputs from the system are traced
through the various processing that the input phases through in the organization. During
analysis, data are collected on available files, decision points, and transaction handled by
present system. Once analysis is completed the analyst has a firm understanding of what is
to be done.
FEASIBILITY STUDY
A feasibility study is a test of system proposal according to its workability, impact on the
organization, ability to meet user needs and effective use of resources. Apart from these, an
initial investigation is launched to study the present system, evaluate the possible
application of computer based of methods. Selecting a tentative system, evaluate the cost
and effectiveness of the proposed system, evaluate the impact of the proposed system,
existing personal and ascertain the need of new personal.
To define an improved information system, the study group must understand the
information requirements of the organization. This understanding may be obtained by
determining what is currently being done and of investigating through interviews and
analysis what information is needed to be provided that is not being furnished by the
existing system . Data on the cost of operating the current system needs to be collected in
order to make a cost benefit for a new system.
The objective of feasibility study is not to solve the problem, but to acquire a sense of its
scope. During the study, the problem definition is crystallized and aspects of the problem
to be included in the system are determined, consequently costs and benefits are estimated
with greater detail at this stage. The result of the feasibility study is a system formal
proposal. This is a simply a form of documenting or detailing the nature and scope of
proposed solutions. The proposal summarizes what is known and what is going to be done.
Three key considerations involved in the feasibility analysis:
Economic feasibility
Technical feasibility
Behavioral feasibility
ECONOMIC FEASIBILITY:
Economic analysis is the most frequently used method for comparing the cost with the
benefit or income that is expected from developed system.
In the existing system, many people are involved in the process but in the proposed
system, number of persons involved be reduced drastically. So the proposed system is
economic.
In the existing system, storage of all these records should be arranged and security
should be provided for the records. In the proposed system, separate security arrangement
is not needed since the software provides security and maintenance is simply and hardly
needs one or two person to operate the system.
TECHNICAL FEASIBILITY:
The feasibility center on the existing computer system (software, hardware) and to
what extend it can support the proposed addition.
In the proposed system, data can be easily stored and managed in database
management system software.
BEHAVIORAL FEASIBILITY:
People are inherently resistant to change and computer has known to facilitate
change. An estimate should be made of how strong a reaction the user staff likely to have
towards the developments of computerized system.
In the existing system more manpower is required and time factor is more but in the
proposed system, manpower and time factors are reduced .So, the remaining numbers are
engaged with some other important works.
An SRS is basically an organization's understanding (in writing) of a customer or potential
client's system requirements and dependencies at a particular point in time (usually) prior
to any actual design or development work. It's a two-way insurance policy that assures that
both the client and the organization understand the others requirements from that
perspective at a given point in time.
REQUIREMENT ANALYSIS
Problem Recognition
Problem Evaluation & Synthesis
Problem Recognition
The goal of this step is recognition of basic problem elements as indicated by the
customer. The basic purpose of this activity is to obtain a thorough understanding of the
needs of the client and the user, what exactly is desired from the software and what are
the constraints on the solution.
Problems of the existing system:
Cost effective
No chance of errors
TOOLS & PLATFORMS USED
Operating System
Front End
Back End
: Windows 7
: ASP.Net with VB
: SQL SERVER 2008
SYSTEM DESIGN
The most creative and challenging phase of the system life cycle is system design. The
term design describes a final system and the process by which it is developed. It refers to
the technical specifications that will be applied in implementing the proposed system. It
also includes the construction of program and designing of output, input, menu, code,
database and process of the system.
System output may be report, document or a message. In on-line applications,
information is displayed on the screen. The layout sheet for displayed output is similar to
the layout chart used for designing output.
On-line data entry makes use of processor that accepts commands and data from the
operator through a keyboard or a device such as touch screen or voice input.
Designing the code depends on the programming language chosen and mostly they are
not specified while outlining the design of the system. The goal of coding is to translate
the design of the system in to code in a programming language. The aim of the code
design is to implement the system in best possible manner.
Database design is used to define and specify the structure of objects used in the system.
A wide array of design information must be developed during the database design. A
database is the collection of interrelated data stored with minimum redundancy to serve
many users quickly and efficiently. The general objective of data base design is to make
information access easy, quick, inexpensive, and flexible for the user.
Databases of Crime Reporting System is as shown below.
Database tables:
Table Name
tbl_cirmeSeqEstimationMaster
Table Name
tbl_crimeCategoryMaster
Table Name
tbl_crimeCategoryNatureMaster.
Table Name
tbl_crimeChargesheetMaster
Table Name
tbl_crimeWitnessMaster
Table Name
tbl_departmentEmployeemaster
Table Name
tbl_departmentMaster
Table Name
designationMaster
Table Name
tbl_evidenceMaster
Table Name
tbl_evidenceTypeMaster
Table Name
tbl_investigationMaster
Table Name
tbl_loginMaster
Table Name
tbl_policeStationMaster
Table Name
tbl_territoryMaster
Table Name
tbl_victimesMaster
Table Name
tbl_victimsFirMaster
MODELING
During the evaluation and solution synthesis activity, the analyst creates models of the
system in an effort to better understand data and control flow. The model serves as
foundation for software design and as the basis for the creation of specification for the
software. For the better understanding of data and control flow we use Data Flow
Diagrams.
Data Flow Diagrams
Data Flow Diagram is used to define the flow of the system and its resources such as
informations. DFDs are a way of expressing systems requirements in graphical manner.
DFD represents one of the most ingenious tools used for structured analysis. It has the
purpose of clarifying system requirements and identifying major transformations that
will become programs in the system design. It is the major starting point in the design
phase that functionalities decompose the requirement specification to the lowest level of
detail.
DFD of Crime Reporting System is as shown below:
users
request
crimereport
details
response
registration
details
login
username
password
station
processes
login
details
station
request
complaints
details
crimedescription
details
assignstation
request
citizen
details
registration
login
username
password
login
complaints
request
station
registration
details
login
username
password
crimedescription
fir
login
crime processes
details
criminaldetails
newteamregister
teammember
victim
request
witness
close
crime
details
crimedescription
advocate
crimeclose
admin
response
request
station approval
details
station
view complaints
crimedescription
complaints
details
assign
station
assignstation
crimed
citizen
request
send complaints
crimedescription
details
details
response
view
accepted
crimeid
complaints
crime
status
crimeclose
view complaints
crimedescription
station
request
details
response
avocation
processes
criid
details
close
crime
crimeid
criminaldetails
advocate
crimedescription
assignstation
System Snapshots
Page Name
frmLoginPage.aspx
Page Name
frmDesignationMaster.aspx
Processing
Stored in Table
Table or Procedure
Table
Table Name
designationMaster
When we want see all disgnation then click on showalldesignation button then we get the
data from table and also we will modify that data.
Page Name
frmDesignationMaster.aspx
Page Name
frmDepEmpMaster.aspx
Processing
Stored in Table
Table or Procedure
Table
Table Name
tbl_departmentEmployeemaster
When we want see all department employees then click on showalldepartment button then
we get the data from table and also we will modify that data.
Page Name
frmDepEmpMaster.aspx
Page Name
crimeCategorymaster.aspx
Processing
stored in Table
Table or Procedure
Table
Table Name
tbl_crimeCategoryMaster
When we want see all crime categories then click on showallcrime categories button then
we get the data from table and also we will modify that data.
Page Name
crimeCategorymaster.aspx
Page Name
CrimeCategorynatureMaster.aspx
Processing
Stored in Table
Table or Procedure
Table
Table Name
tbl_crimeCategoryNatureMaster.
When we want see all records then click on showall button then we get the data from table
and also we will modify that data.
Page Name
CrimeCategorynatureMaster.aspx
Page Name
VictimMaster.aspx
Processing
Stored in Table
Table or Procedure
Table
Table Name
tbl_victimesMaster
When we want see all records then click on showall button then we get the data from table
and also we will modify that data.
Page Name
VictimMaster.aspx
Page Name
frmVictimFirMaster.aspx
Processing
Stored in Table
Table or Procedure
Table
Table Name
tbl_victimsFirMaster
Page Name
frmVictimFirMaster.aspx
Page Name
frmInvestigationMaster.aspx
Processing
Stored in table
Table or Procedure
Table
Table Name
tbl_investigationMaster
Page Name
frmInvestigationMaster.aspx
Page Name
frmCrimeSequenceEstimationMaster
Processing
Stored in Table
Table or Procedure
Table
Table Name
tbl_cirmeSeqEstimationMaster
Page Name
frmCrimeSequenceEstimationMaster
Page Name
frmCrimeWitnessMaster.aspx
Processing
Stored in Table
Table or Procedure
Table
Table Name
tbl_crimeWitnessMaster
Page Name
frmCrimeWitnessMaster.aspx
Page Name
frmEvidenceMaster.aspx
Processing
Stored in Table
Table or Procedure
Table
Table Name
tbl_evidenceMaster
Page Name
frmEvidenceMaster.aspx
Page Name
frmEvidenceTypeMaster.aspx
Processing
Stored in Table
Table or Procedure
Table
Table Name
tbl_evidenceTypeMaster
Page Name
frmEvidenceTypeMaster.aspx
Page Name
frmCrimeChargeSheetmaster.aspx
Processing
Stored in Table
Table or Procedure
Table
Table Name
tbl_crimeChargesheetMaster
Page Name
frmCrimeChargeSheetmaster.aspx
Page Name
frmUserAdd.aspx
Processing
Stored In Table
Table or Procedure
Table
Table Name
tbl_User.
Page Name
frmHomePage.aspx
SYSTEM TESTING
System testing is a critical aspect of Software Quality Assurance and represents the
ultimate review of specification, design and coding. Testing is a process of executing a
program with the intent of finding an error. A good test is one that has a probability of
finding an as yet undiscovered error. The purpose of testing is to identify and correct bugs
in the developed system. Nothing is complete without testing. Testing is the vital to the
success of the system.
In the code testing the logic of the developed system is tested. For this every module of the
program is executed to find an error. To perform specification test, the examination of the
specifications stating what the program should do and how it should perform under various
conditions.
Unit testing focuses first on the modules in the proposed system to locate errors. This
enables to detect errors in the coding and logic that are contained within that module alone.
Those resulting from the interaction between modules are initially avoided. In unit testing
step each module has to be checked separately.
System testing does not test the software as a whole, but rather than integration of each
module in the system. The primary concern is the compatibility of individual modules. One
has to find areas where modules have been designed with different specifications of data
lengths, type and data element name.
Testing and validation are the most important steps after the implementation of the
developed system. The system testing is performed to ensure that there are no errors in the
implemented system. The software must be executed several times in order to find out the
errors in the different modules of the system.
Validation refers to the process of using the new software for the developed system in a
live environment i.e., new software inside the organization, in order to find out the errors.
The validation phase reveals the failures and the bugs in the developed system. It will be
come to know about the practical difficulties the system faces when operated in the true
environment. By testing the code of the implemented software, the logic of the program
can be examined. A specification test is conducted to check whether the specifications
stating the program are performing under various conditions. Apart from these tests, there
are some special tests conducted which are given below:
1. Peak Load Tests: This determines whether the new system will handle the volume
of activities when the system is at the peak of its processing demand. The test has
revealed that the new software for the agency is capable of handling the demands at
the peak time.
2. Storage Testing: This determines the capacity of the new system to store
transaction data on a disk or on other files. The proposed software has the required
storage space available, because of the use of a number of hard disks.
3. Performance Time Testing: This test determines the length of the time used by the
system to process transaction data.
The testing steps performed in Crime Reporting System are given below:
Unit testing
Integration testing
Validation testing
Unit testing
In unit testing different modules are tested against the specifications produced during the
design of the modules. Unit testing is essential for the verification of the code produced
during the coding phase, and hence the goal is to test the internal logic of the modules.
The testing is carried out during the programming itself. After designing and coding each
form they are run to see whether there are any anomalies. Some of the various test cases
used to test the system are as follows:
Test cases are given for testing against requirements of the unit being tested.
Test case for path or branch covering.
Test case for data flow coverage.
Testing with classes of bad data
In unit testing the program unit that make up the system are tested individually. Unit
testing focuses first on the modules, independent of one another to locate errors. Here in
Crime Reporting System unit testing contains testing like user registration test, login
test, user updating test, agent registration test, policy registration test, customer request
test, premium calculation test etc. This enables to detect in coding and the logic with in
the module alone. This testing is also used to ensure the integrity of data stored
temporarily.
Integration testing
Integration testing is systematic technique for constructing the program structure, while
at the same time conducting test to uncover errors associated with interfacing. That is the
program is constructed and tested in small segments, which makes it easier to isolate and
correct.
Invalid modules are invariably related to one another and interact in a total system. Each
portion of the system is tested against the entire module with both testing and live data
before the entire system is ready to be implemented. When the individual modules were
found works satisfactory, the system integration test was carried out. Data was collected
in such a way that all program paths could be covered. Using these data a complete test
was made. All outputs were generated. Different users were allowed to work on the
system to check its performance.
So here in Crime Reporting System integration testing contains administrative module,
customer module and login with administrative and customer module.
Validation testing
At the culmination of the integration testing, the software was completely assembled as
package, interfacing errors have been uncovered and a final series of software validation
testing began. Here we test the system functions in manner that can be reasonably
expected by customer, the system was tested against system requirement specification.
Different unusual inputs that the users may use were assumed and the outputs were
verified for such unprecedented inputs. Deviation or errors discovered at this step are
corrected prior to the completion of this project with the help of user by negotiating to
establish a method for resolving deficiencies. Thus the proposed system under
consideration has been tested by using validation testing and found to be working
satisfactorily.
TEST RESULTS
The primary goal of software implementation is the production of source code that is easy
to read and understand. Clarification of source code helps in easier debugging, testing and
modification. Source code clarification is enhanced by structural coding techniques, by
good coding style, by appropriate supporting documents, by good internal comments and
by the features provided in the modern programming language.
In our implementation phase, source code contains both global and formal variables. It
contains predefined functions as well as the user defined functions. The result of the new
system is compared with the old system and supposes the result is wrong the error must be
debugged.
After the acceptance of the system by the user, the existing system must be replaced by this
new system. Any user can work in this package very easily. It does not require any
intensive training for the user. Procedures and functions in the system are very simple that
any one can understand and correspondingly act to the system with no difficulty.
Test Cases :
User Authentication:
Functions Tested
Expected Result
Test
Result
As
expected
As
expected
Expected Result
Result
123
Display
Pass
Dqwe
Doesnt Display
Pass
$#*>.)
Doesnt Display
Pass
Field Checking:
Function Tested
Name
Mobile-Phone, Zip
code, Date of Birth
Expected Result
The name of the user is entered here. It can
contain only characters and blank space
Test Result
Test
Successful
Test
successful
IMPLEMENTATION
The next stage after testing is implementation. Generally implementation is referred to
conversion of a new system design to an operational one. It also deals with the training of
operators. An implementation plan is to be made before starting the actual
implementation of the system. Implementation is the stage where the theoretical design is
converted into a working system. The newly proposed system is implemented after the
successful testing of the system.
Implementation Methods
The term implementation has different meanings, ranging from the conversion of a basic
application to a complete replacement of a computer system. The procedure, however, is
virtually the same. Implementation is used here to mean the process for converting a new
or revised system into an operational one. Conversion is one aspect of implementation.
The other aspects are the post implementation review and software maintenance.
There are three types of implementation:
Implementation Plan
The implementation plan includes a description of all the activities that must occur to
implement the new system and to put it into operation. It identifies the personnel
responsible for the activities and prepares a time chart for implementing the system. The
implementation plan consists of the following steps.
BIBLIOGRAGHY
Reference Books:
1.
2.
3.
4.
5.
Reference Sites:
1. Howard, Michael. Microsoft Internet Information Server Security
URLs:
http://www.highcourtofkerala.com/
http://www.casecitation.com/