0% found this document useful (0 votes)
54 views45 pages

Criminal Navigation Using Email Tracking System

The document presents a project report titled 'Criminal Navigation Using Email Tracking System' submitted by Vanapalli Bhagya Priya for a Master's degree in Computer Applications. It outlines the project's objectives, system analysis, feasibility study, and functional requirements, focusing on enhancing crime detection and prevention through data mining and email tracking. The report also details the system architecture, design, and testing strategies employed in the development of the application.

Uploaded by

spub1985
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views45 pages

Criminal Navigation Using Email Tracking System

The document presents a project report titled 'Criminal Navigation Using Email Tracking System' submitted by Vanapalli Bhagya Priya for a Master's degree in Computer Applications. It outlines the project's objectives, system analysis, feasibility study, and functional requirements, focusing on enhancing crime detection and prevention through data mining and email tracking. The report also details the system architecture, design, and testing strategies employed in the development of the application.

Uploaded by

spub1985
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 45

CRIMINAL NAVIGATION USING EMAIL

TRACKING SYSTEM
The Project Report is submitted in partial fulfillment of the
requirements for the award of the degree of
Master of Computer Applications

Submitted by:
VANAPALLI BHAGYA PRIYA
2385351120

Under the Esteemed Guidance of


P.B.Sowjanya
B.V. Raju College
Vishnupur :: Bhimavaram

Submitted to
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
COLLEGE OF ENGINEERING
ADIKAVI NANNAYA UNIVERSITY
RAJAHMAHENDRAVARAM
2024-2025
B.V. RAJUCOLLEGE (AUTONOMOUS)
(Re-Accredited with ‘B++’ Grade by NAAC)

Department of MCA
Vishnupur :: Bhimavaram

CERTIFICATE
This is to certify that this project entitled “CRIMINAL NAVIGATION USING
EMAIL TRACKING SYSTEM” submitted in partial fulfillment of the degree of
MASTER OF COMPUTER APPLICATIONS to Adikavi Nannaya University
from 7itech solutions through B.V. Raju College, done by Ms. VANAPALLI
BHAGYA PRIYA Regd. No. 2385351120 is an authentic work carried out by her
during the Academic Year 2024-2025 at under my guidance. The matter embodied in
this project work has not been submitted earlier for award of any degree or diploma to
the best of my knowledge and belief.

Internal Guide Head of the Department

External Examiner Principal


ACKNOWLEDGEMENTS
The satisfaction and euphoria that accompany the successful completion of any task
would be incomplete without the mention of people who made it possible, whose constant
guidance and encouragement crowned our efforts with success. It is a pleasant aspect that I have
now the opportunity to express my gratitude for all of them.

The first person I would like to thank Dr. I.R.krishnam Raju, Principal MCA,

B V Raju College, Bhimavaram. His wide knowledge and logical way of thinking have
made a deep impression on me. His understanding, encouragement and personal guidance have
provided the basis for this thesis. He is a source of inspiration for innovative ideas and his kind
support is well known to all his students and colleagues.

I wish to thank Dr. V. BHASKARA MURTHY, Professor& HOD, Dept of MCA.


His support and valuable suggestions for the successful completion of this project.

I wish to thank my guide Ms.P.B.Sowjanya, Assistant Professor, Dept. of MCA his


support and valuable suggestions for the successful completion of this Project.

VANAPALLI BHAGYA PRIYA

2385351120
DECLARATION

This is to certify that the project report entitled “CRIMINAL NAVIGATION USING
EMAIL TRACKING SYSTEM” is done by me is an authentic work carried out for the
partial fulfillment of the requirements for the award of the degree of Master of
Computer Applications under the guidance of Ms.P.B.Sowjanya, Assistant Professor,
Dept. of MCA. The matter embodied in this project work has not been submitted earlier
for award of any degree or diploma to the best of my knowledge and belief.

Signature of the student

VANAPALLI BHAGYA PRIYA

2385351120

B.V.Raju College.
CONTENTS

1. INTRODUCTION 1-3

1.1. INTRODUCTION TO PROJECT


1.2. PURPOSE OF THE PROJECT
1.3 EXISTING SYSTEM & ITS DISADVANTAGES
1.4 PROPOSED SYSTEM & ITS ADVANTAGES

2. SYSTEM ANALYSIS 4-7

2.1. STUDY OF THE SYSTEM


2.2. INPUT & OUTPUT REPRESENTATION
2.3. PROCESS MODELS USED WITH JUSTIFICATION
2.4. SYSTEM ARCHITECTURE

3. FEASIBILITY STUDY 8-10

3.1. TECHNICAL FEASIBILITY


3.2. OPERATIONAL FEASIBILITY
3.3. ECONOMIC FEASIBILITY

4. REQUIREMENT SPECIFICATIONS 11-15

4.1. FUNCIONAL REQUIREMENTS


4.2. PERFORMANCE REQUIREMENTS
4.3. SOFTWARE REQUIREMENTS
4.4. HARDWARE REQUIREMENTS
4.4.1. INTRODUCTION TO JAVA
4.4.2. Servlets / JSP
4.4.3. Oracle
4.4.4. HTML
4.4.5. Java Script

5. SYSTEM DESIGN 16-24

5.1. INTRODUCTION
5.2 UML DIAGRAMS
5.3 NORMALIZATION
5.4 DATA DICTIONARY

6. OUTPUT SCREENS 25-29

7. SYSTEM TESTING 30-32

7.1 INTRODUCTION TO TESTING


7.2 TESTING STRATEGIES

8. SYSTEM SECURITY 33-34

8.1 INTRODUCTION

8.2 SECURITY IN SOFTWARE

9. CONCLUSION 35-36

10. BIBLIOGRAPHY
37-38
1. INTRODUCTION AND OBJECTIVE
1.1. INTRODUCTION
The spread of navigation devices has increased significantly over the last 10 years.
With the help of the current development of even smaller navigation receiver units it is to
navigate with almost any current smart phone. Modern navigation systems are no longer limited
to satellite navigation, but use current techniques, e.g., WLAN localization. Due to the increased
use of navigation devices their relevance to forensic investigations has risen rapidly. Because
navigation, for example with navigation equipment and smart phones, have become common
place these days, also the amount of saved navigation data has risen rapidly. All of these
developments lead to a necessary forensic analysis of these devices. However, there are very few
current procedures for investigating of navigation devices. Navigation data is forensically
interesting because by the position of the devices in most cases the location and the travelled
path of the owner can be reconstructed. In this work practices for forensic analysis of navigation
devices are developed. Different devices will be Analized and it is attempted, by means of
forensic procedures to restore the travelled path of the mobile device. For analysis of the various
devices different software and hardware is used. There will be presented common procedures for
securing and testing of mobile devices. Further there will be represented the specials in the
investigation of each device. The different classes considered are GPS handhelds, mobile
navigation devices and smart phones. It will be attempted, wherever possible, to read all data of
the device.

1.2 SCOPE OF THE PROJECT


The core functions of the police are crime detection, crime prevention, call response and
court/prosecution. The scope of the project will mainly be emphasized on the crime and criminal
detection core functions of City Police stations and office.

FUNCTIONAL SCOPE :

The functional scope of this project primarily covers the functions and activities at the city police
stations. This can primarily be categorized into the following modules.

1) Registration of

a. Lost Property.
b. Crimes and Criminals.
c. international hotels.
d. Customer booked in hotel information.

1
2) Verification (cross-check and generate report in case customer booked in hotel
information matches information recorded in criminals table).
3) Manage user accounts.
4)Search, update and delete data.
5)Generate report and print.

1.3 EXISTING SYSTEM AND ITS DISADVANTAGES

Crime has been increasing day by day and everyone in the world is trying to figure out how to
manage the crime rate and to work on certain cases, most of the people are trying to store the
data for future reference. Human errors can occur at any point of time. There are different types
of crimes law enforcement levels, such as traffic violations, sex crime, theft, violent crime, arson,
gang/drug offenses, cybercrime. Different crime data mining techniques are proposed among
each of them including entity extraction, clustering techniques, Association rule mining. Crime
zones can be identified by occurrence of crime, by using hotspots. Patrol is needed at these
hotspot areas. The data mining tool helps in reducing the crime rate drastically.

Disadvantages :

 Security is considered to be a major issue in networks.


 Analyzing huge amount of data becomes difficult

1.4 PROPOSED SYSTEM AND ITS ADVANTAGES

Crime Mapping helps in understanding the concepts and practice of Crime Analysis in assisting
police and helps in reduction and prevention of crimes and crime disorders using data mining
tools. We can use data mining tools involved using ANN (Artificial Neural Networks) and KDD
(Knowledge Discovery in Databases).

Advantages :

 To process huge amounts of data.


 It is suitable to detect the ignored and hidden information at any point of time.

MODULE
1. ADMIN
2. POLICE

2
MODULE DESCRIPTION

ADMIN :
In this application admin is the main module, here admin can login directly with the
application and after login successful admin can perform operations such as view Police and
activate police, add criminal data and view criminal data.

If admin want to delete criminal he have option to delete.

POLICE :
In this application police is a module, here police should register with the application and
he should be authorized by the admin then only the police can access his home page after
successful login he can perform some operations such as track criminal by entering email or
mobile number

3
2. SYSTEM ANALYSYS

4
2.1 STUDY OF THE SYSTEM

FEASIBILITY STUDY

The feasibility of the project is analyzed in this phase and business proposal is put
forth with a very general plan for the project and some cost estimates. During system analysis the
feasibility study of the proposed system is to be carried out. This is to ensure that the proposed
system is not a burden to the company. For feasibility analysis, some understanding of the major
requirements for the system is essential.

2.2 INPUT DESIGN AND OUTPUT

DESIGN INPUT DESIGNS

The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to put
transaction data in to a usable form for processing can be achieved by inspecting the computer to
read data from a written or printed document or it can occur by having people keying the data
directly into the system. The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The
input is designed in such a way so that it provides security and ease of use with retaining the
privacy. Input Design considered the following things:

 What data should be given as input?


 How the data should be arranged or coded?
 The dialog to guide the operating personnel in providing input.
 Methods for preparing input validations and steps to follow when error occur.

OUTPUT DESIGN

A quality output is one, which meets the requirements of the end user and presents the information
clearly. In any system results of processing are communicated to the users and to other system
through outputs. In output design it is determined how the information is to be
5
displaced for immediate need and also the hard copy output. It is the most important and direct
source information to the user. Efficient and intelligent output design improves the system’s
relationship to help user decision-making.

2.3 PROCESS MODEL USED WITH JUSTIFICATION

SDLC (Umbrella Model):

Umbrella
DOCUMENT CONTROL

Umbrell
Business a
Requirement
Documentation

• Feasibility
Requiremen Study
ts • TEAM ANALYSIS & CODE UNIT TEST
FORMATION ASSESSME
Gathering • NT
Project

INTEGRATIO ACCEPTANCE
N & SYSTEM
DELIVERY/INS TEST
TESTING

Umbrell
TRAININ
a
G

SDLC is nothing but Software Development Life Cycle. It is a standard which is used by
software industry to develop good software.

Stages in SDLC:

 Requirement Gathering

 Analysis

 Designing

 Coding

 Testing

 Maintenance
6
2.4 SYSTEM ARCHITECTURE

Architecture flow:
Below architecture diagram represents mainly flow of requests from users to database through
servers. In this scenario overall system is designed in three tires separately using three layers
called presentation layer, business logic layer and data link layer. This project was developed
using 3tire architecture.

URL pattern represents how the requests are flowing through one layer to another layer and how the
responses are getting by other layers to presentation layer through server in architecture diagram.

7
3. FEASIBILITY STUDY

8
3. Feasibility Study:

Preliminary investigation examines project feasibility, the likelihood the system will be useful to the
organization. The main objective of the feasibility study is to test the Technical, Operational and
Economical feasibility for adding new modules and debugging old running system. All systems
are feasible if they are given unlimited resources and infinite time. There are aspects in the
feasibility study portion of the preliminary investigation:

Technical Feasibility

Operation Feasibility

Economical Feasibility

3.1 TECHNICAL FEASIBILITY

The technical issue usually raised during the feasibility stage of the investigation includes the
following:

 Does the necessary technology exist to do what is suggested?

 Do the proposed equipment have the technical capacity to hold the data required to use
the new system?

 Will the proposed system provide adequate response to inquiries, regardless of the
number or location of users?

 Can the system be upgraded if developed?

Are there technical guarantees of accuracy, reliability, ease of access and data security.

9
3.2 OPERATIONAL FEASIBILITY

User-friendly

Customer will use the forms for their various transactions i.e., for adding new routes, viewing
the routes details. the Customer wants the reports to view the various transactions based on
the constraints. These forms and reports are generated as user-friendly to the Client.

Reliability

The package wills pick-up current transactions on line. Regarding the old transactions, User
will enter them in to the system.

Security

The web server and database server should be protected from hacking, virus etc.

Portability

The application will be developed using standard open source software (Except Oracle) like
Java, tomcat web server, Internet Explorer Browser etc., these software will work both on
Windows and Linux o/s. Hence portability problems will not arise.

Maintainability

The system called the ewheelz uses the 2-tier architecture. The 1st tier is the GUI, which
is said to be front-end and the 2nd tier is the database, which uses MySQL , which is the
back-end.

The front-end can be run on different systems (clients). The database will be running at the
server. Users access these forms by using the user-ids and the passwords.

3.3 ECONOMIC FEASIBILITY

The computerized system takes care of the present existing system’s data flow and procedures
completely and should generate all the reports of the manual system besides a host of other
management reports. Open source software like TOMCAT, JAVA, MySQL and Linux is
used to minimize the cost for the Customer.

10
4. REQUIREMENT SPECIFICATIONS

11
4.1 FUNCTIONAL REQUIREMENTS ELICITATIONS

Functional requirements describe the interactions between the system and its environment
independent of its implementation.

Login
The system has the functionality that enables users to login to the system and perform any
activities according to their access privilege assigned to them. That is each actor or
system user has his/her own credential stored in the database. The system will check the
keyed values against the values stored in the database.
Storing crime and criminal’s detail information
The crime and Criminals registration module is proposed to register and store cognizable
crime and criminals. Registration module would enable assignment of a unique number
to facilitate proper monitoring. The details captured may include but not limited to
missed persons, crime and criminals and suspected person.
Storing property detail information
The property registration module is used to capture detail information about stolen, lost and
found properties.
Registering International Hotels information
The hotels Interface module of the CCTS acts as a conduit for information exchange between
hotels and police stations. This module enables to register and stores detail information
about international hotels found city.
Recording and submitting Hotel’s customer information to police station
The system should support submission of daily customer’s booked in hotel information to
nearby woreda police office and retain copy of it.
Generate Report
This module is used to generate the daily, quarterly, SEMI Annual and annual report by
woreda police office to central police office.

4.2. PERFORMANCE REQUIREMENTS

The System should be able to take information from a user and enter it into the
database. The speed at which this will be completed depends on the number of records currently

12
in the database. None of the processes are time sensitive, however the response time should be
relatively short (somewhere around 20 seconds). A typical load on the system would be multiple
users entering information. It was tested for five computers and it works fine and we assumed
that the system supports up to 20 clients without any delayness.

4.3. SOFTWARE REQUIREMENTS

 Operating system :Windows 10.


 Coding Language : JAVA.
 Data Base : MS SQL.

4.4. HARDWARE REQUIREMENTS

 System :Pentium IV 2.4 GHz.


 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 1GB

4.4.1. Introduction to java:

The Java programming language is a high-level language that can be characterized by all
of the following buzzwords:
o Simple
o Architecture neutral
o Object oriented
o Portable
o Distributed
o High performance
o Interpreted
o Multithreaded

13
o Robust
o Dynamic
o Secure

4.4.2. Servlets /JSP

A Servlet Is a generic server extension. a Java class that can be loaded dynamically to expand
the functionality of a server, Servlets are commonly used with web servers. Where they can take
the place CGI scripts.
A servlet is similar to proprietary server extension, except that it run inside a Java Virtual
Machine (JVM) on the server, so it is safe and portable. Servlets operate solely within the
domain of the server. Unlike CGI and Fast CGI, which use multiple processes to handle separate
program or separate requests, separate threads within web server process handle all servlets.
This means that servlets are all efficient and scalable.Servlets are portable; both across operating
systems and also across web servers. Java Servlets offer the best possible platform for web
application development.

4.4.3 Oracle
Oracle is a relational database management system, which organizes data in the form of tables.
Oracle is one of many database servers based on RDBMS model, which manages a seer of data
that attends three specific things-data structures, data integrity and data manipulation.

With oracle cooperative server technology. we can realize the benefits of open, relational
systems for all the applications. Oracle makes efficient use of all systems resources, on all
hardware architecture; to deliver unmatched performance, price performance and scalability.
Any DBMS to be called as RDBMS has to satisfy DrE.F.Codd’s rules.

4.4.4 HTML
Hypertext Markup Language (HTML), the languages of the world wide web(WWW), allows
users to produces web pages that included text, graphics and pointer to other web pages
(Hyperlinks).

Html can be used to display any type of document on the host computer, which can be
geographically at a different location. It is a versatile language and can be used on any platform
or desktop.HTML provides tags(special codes) to make the document look attractive.HTML

14
provides are not case-sensitive. Using graphics,fonts,different sizes, colour, etc.,Can enhance the
presentation of the document.

Basic Html Tags:

<!-- --> Specific Comments.

<A>………</A> Creates Hypertext links.

<B>………</B> Creates hypertext links.

<Big>……...</Big> Formats text in large-font

<Body>...</Body> contains all tags and text in the Html-document

<Centre >……</Centre> Creates Text

<DD>……</DD> Definition of a term.

<TABLE>……</TABLE> creates table

<Td>…......</Td> indicates table data in a table.

<Tr>………...</Tr> designates a table row

<Th>……</Th> creates a heading in a table.

4.4.5 JAVA SCRIPT

The Java Script Language

JavaScript is a compact, object-based scripting language for developing client and server
internet applications. Netscape Navigator 2.0 interprets JavaScript statements embedded
directly in an HTML page. and Livewire enables you to create server-based applications
similar to common gateway interface(CGI) programs.

In a client application for Navigator, JavaScript statements embedded in an HTML Page


recognize and respond to user events such as mouse clicks form Input, and page navigation.

15
5. SYSTEM DESIGN

16
5.1. INTRODUCTION

Systems design

Introduction: Systems design is the process or art of defining the architecture, components, modules,
interfaces, and data for a system to satisfy specified requirements. One could see it as the
application of systems theory to product development. There is some overlap and synergy with
the disciplines of systems analysis, systems architecture and systems engineering.

5.2.UML DIAGRAMS

UML stands for Unified Modelling Language. UML is a standardized general-purpose modelling
language in the field of object-oriented software engineering. The standard is managed, and was
created by, the Object Management Group.

The goal is for UML to become a common language for creating models of object-oriented computer
software. In its current form UML is comprised of two major components: a Meta- model and a
notation. In the future, some form of method or process may also be added to; or associated with,
UML.
The Unified Modelling Language is a standard language for specifying, Visualization, Constructing
and documenting the facts of software system, as well as for business modelling and other non-
software systems.
GOALS:
The Primary goals in the design of the UML are as follows:
 Provide users a ready-to-use, expressive visual modelling Language so that they can
develop and exchange meaningful models.
 Provide extendibility and specialization mechanisms to extend the core concepts.
 Be independent of particular programming languages and development process.
 Provide a formal basis for understanding the modelling language.
 Encourage the growth of OO tools market.

USE CASE DIAGRAM:

A use case diagram in the Unified Modeling Language (UML) is a type of behavioral
17
diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical
overview of the functionality provided by a system in terms of actors, their goals (represented as
use cases), and any dependencies between those use cases. The main purpose of a use case
diagram is to show what system functions are performed for which actor. Roles of the actors in
the system can be depicted.

registe
r

logi
n

polic
e
trackCriminal
s

logout

logi
n

viewPolic
e

authorizePolic
e

Admi
n
addCriminalDa
ta

viewCriminalDa
ta

logout

18
CLASS DIAGRAM:

In software engineering, a class diagram in the Unified Modelling Language (UML) is a type of
static structure diagram that describes the structure of a system by showing the system's classes,
their attributes, operations (or methods), and the relationships among the classes. It explains
which class contains information.

19
SEQUENCE DIAGRAM:

A sequence diagram in Unified Modelling Language (UML) is a kind of interaction diagram that
shows how processes operate with one another and in what order. It is a construct of a Message
Sequence Chart. Sequence diagrams are sometimes called event diagrams, event scenarios, and
timing diagrams.

Police Admin Application

regist
er

logi
n
logi
n

viewPolice&Authori
ze

addCriminalDa
ta

viewCriminalData&Del
ete

TrackCrimin
al

logou
t logou
t

20
COLLABORATION

Collaboration is a working practice whereby individuals work together for a common purpose to
achieve business benefit. Collaboration enables individuals to work together to achieve a defined
and common business purpose.

8:
logout 9: logout

Police
Admin

4:
viewPolice&Authorize

1: register
2: login

3: login
5: addCriminalData
6:

Applica
ti on

5.3. NORMALIZATION

A Database is a collection of interrelated data stored with a minimum of redundancy to serve


many applications. The database design is used to group data into a number of tables and
minimizes the artificiality embedded in using separate files. The tables are organized to:

Reduced duplication of data.

Simplify functions like adding, deleting, modifying data etc.,

Retrieving data
21
Clarity and ease of use

More information at low cost

5.4 DATA DICTIONARY

Source code

Dbconnection.java

package com.database;

import java.sql.Connection;

import java.sql.DriverManager;

import java.sql.SQLException;

public class Dbconnection{

public static Connection getcon()

{ Connection con = null;

try{

Class.forName("com.mysql.jdbc.Driver");

con =
DriverManager.getConnection("jdbc:mysql://localhost:3306/tracking", "root",
"root");

catch(Exception e){

e.printStackTrace();

22
}

return con;

Queries.java

/*

* To change this license header, choose License Headers in Project Properties.

* To change this template file, choose Tools | Templates

* and open the template in the editor.

*/

package com.database;

import java.sql.*;

public class Queries {

public static ResultSet rs;

public static int i;

public static ResultSet getExecuteQuery(String query){

try{

Connection con=Dbconnection.getcon();

23
Statement

st=con.createStatement();

rs=st.executeQuery(query);

}catch(Exception e){

System.out.println(e);

return rs;

public static int getExecuteUpdate(String query){

try{

Connection con=Dbconnection.getcon();

Statement st=con.createStatement();

i=st.executeUpdate(query);

}catch(Exception e){

System.out.println(e);

return i;

24
6. OUTPUT SCREENS

25
SCREENS

Police login
26
Police registration

Track Criminals

27
Admin login

Admin home

28
View police details and activate

Add criminal data

29
7. SYSTEM TESTING

30
7.1. INTRODUCTION TO TESTING

The purpose of testing is to discover errors. Testing is the process of trying to discover every
conceivable fault or weakness in a work product. It provides a way to check the functionality of
components, sub assembles, assemblies and/or a finished product It is the process of exercising
software with the intent of ensuring that the Software system meets its requirements and user
expectations and does not fail in an unacceptable manner. There are various types of test Each
test type addresses a specific testing requirement.

7.2. TESTING STRATEGIES

Unit testing

Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration.

Integration testing
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.

Functional testing

Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.

31
System Testing

System testing is based on process descriptions and flows, emphasizing pre-driven process links
and integration points.

White Box Testing

White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose. It is
used to test areas that cannot be reached from a black box level.

Black Box Testing

Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. It is a testing in which the software under test is
treated, as a black box .you cannot “see” into it. The test provides inputs and responds to outputs
without considering how the software works.

Unit Testing

Unit testing is usually conducted as part of a combined code and unit test phase of the software
lifecycle, although it is not uncommon for coding and unit testing to be conducted as two distinct
phases.

Integration Testing
Software integration testing is the incremental integration testing of two or more integrated
software components on a single platform to produce failures caused by interface defects.

The task of the integration test is to check that components or software applications, eg.,
components in a software system or – one step up – software applications at the company level –
interact without error.

Test Results: All the test cases mentioned above passed successfully. No defects encountered.

Acceptance Testing

User Acceptance Testing is a critical phase of any project and requires significant participation
by the end user. It also ensures that the system meets the functional requirements.

Test Results: All the test cases mentioned above passed successfully. No defects encountered.

32
8. SYSTEM SECURITY

33
8.1 INTRODUCTION

System Security:

Setting Up Authentication for Web Applications:

Introduction:
To configure authentication for a Web Application, use the <login-config> element of the web.xml
deployment descriptor. In this element you define the security realm containing the user
credentials, the method of authentication, and the location of resources for authentication.

8.2 SECURITY IN SOFTWARE

To set up authentication for Web Applications:

1. Open the web.xml deployment descriptor in a text editor or use the Administration
Console. Specify the authentication method using the <auth-method> element. The
available options are:

BASIC

Basic authentication uses the Web Browser to display a username/password dialog box. This
username and password is authenticated against the realm.

FORM

Form-based authentication requires that you return an HTML form containing the username
and password. The fields returned from the form elements must be username and
password, and the action attribute must be security check.

34
9. CONCLUSION

35
CONCLUSION

Crime is a complex social phenomenon, particularly; technology advancements now a day make
more complicated and its cost and impact on the society is increasing. Hence, law enforcement
organizations like that of police need to learn the factors that constitute higher crime trends. To
control or track this social evil there is always a need for prudent crime prevention strategies and
policies. Understanding and processing of criminal records is one method to learn about both
crime and individuals who involve in misdeeds so that police can take crime prevention
measures accordingly.

In this project so as to combat such challenges the CCTS helps to keep data of customer’s
booked in international hotels, applicants and their lost or stolen properties details at district and
police office stations or woredas. These data is used to facilitate crime and criminals tracking for
future or at the time of recording. The system provides comparison facilities about suspects or
criminals when the hotel submits daily report to the nearby police station and provides
notification to the system administrator. The other issue that is being addressed in this project is
sharing of information among the four police stations and the district so that best practice, stolen
properties, news, and progress of the cases are commonly available to stations. Reports are
generated by clicking button. In addition to this, the system enables hotels to send or submit
report through network which reduces the cost they incur for human labore, paper, and to save
time.

36
10. BIBLIOGRAPHY

37
BIBLIOGRAPHY

Re fer ences fo r t he Pro ject Deve lo pme nt Wer e T aken Fr o m t he fo l lo w ing


Boo ks and Web Sit es.

JAVA Technologies

JAVA Complete Reference

Java Script Programming by Yehuda

Shiran Mastering JAVA Security

JAVA2 Networking by Pistoria

JAVA Security by Scotl oaks

Head First EJB Sierra Bates

J2EE Professional by Shadab siddiqui

JAVA server pages by Larne

Pekowsley JAVA Server pages by Nick

Todd

HTML

HTML Black Book by Holzner

JDBC

Java Database Programming with JDBC by Patel moss.

Software Engineering by Roger Pressman

38

You might also like