[go: up one dir, main page]

0% found this document useful (0 votes)
289 views66 pages

Crime

The document discusses an online crime reporting system to address issues with the current system. It covers topics like crime management, definitions of crime, and existing crime reporting systems. The proposed system would allow online crime reporting to streamline the process and provide anonymity.

Uploaded by

yogeswari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
289 views66 pages

Crime

The document discusses an online crime reporting system to address issues with the current system. It covers topics like crime management, definitions of crime, and existing crime reporting systems. The proposed system would allow online crime reporting to streamline the process and provide anonymity.

Uploaded by

yogeswari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 66

CHAPTER 1

INTRODUCTION
The crime management system can help in storing the records related to the criminals, cases,
complaint record, and case history and so on. This can allow a person to enter or delete the
records if necessary. All these records can be maintained in a single database. Security is
maintained so as to ensure that only the authorized users will have access to the system. This
application will be one of the useful projects that the police can rely on. This website can help in
getting the information of the criminals of many years back. It can also help in minimizing most
of the work of the police. Crime reporting has long been a central part of news coverage in free
press societies, because crime stories are usually newsworthy. There are several reasons why you
should report crime and why people want to read about or listen.

 Readers or listeners often want an explanation to stories of crime: of why crimes


happen. They ask: "Could it happen to me?" They may want to know so that they can
prevent a similar thing happening. Your readers and listeners need to know how to
themselves.
 Laws are broken, and how people who break laws are caught and punished. This helps
them understand what laws are.
 Most people obey the law, so crime stories are penalties for breaking them are. about
unusual events - one of the criteria for
 Some people are interested in the way news.
 Criminals get something without much effort. For example, although a gang of crooks
may spend weeks or months planning a robbery to net them $100,000, it might take
ordinary workers many years of effort to earn that much legally.
 Some crimes may fascinate people who obey the laws but who wonder what it
Criminals take risks and face punishment if might be like to break them.
 They are caught. This may make them fascinating to read about.

You have a role to play, in providing information to counteract rumor. People will hear
about crimes through casual conversations or rumor, or they may hear a siren as a police car
dashes along the road; they will be only half-informed. It is your job as a journalist to tell them

1
the truth about the rumored crime or explain why the police car went past. If you can establish a
reputation for reliability in this field, people will buy your paper or tune into your station as a
way of making sure they know what is happening.

1.2 LITERATURE SURVEY

1.2.1 CRIME RECORDS MANAGEMENT SYSTEM, anu sharma , mohd.


shahnawaz

DESCRIPTION:

The proposed system applies to all Police stations across the country and specifically
looks into the subject of Crime Records Management. It is well understood that Crime
Prevention, Detection and Conviction of criminals depend on a highly responsive backbone of
Information Management. The efficiency of the police function and the effectiveness with which
it tackles crime depend on what quality of information it can derive from its existing records and
how fast it can have access to it. Initially, the system will be implemented across Cities and
Towns and later on, be interlinked so that a Police detective can access information across all
records in the state thus helping speedy and successful completion to cases. The project has been
planned to be having the view of distributed architecture, with centralized storage of the
database. The application for the storage of the data has been planned. Using the constructs of
SQL server and all the user interfaces have been designed using the DOT Net technologies.

1.2.2 CRIME REPORTING SYSTEM, P. Yugandhar , B Muni Archana

DESCRIPTION:

Online Crime Reporting System project’s main idea is to implement an automated software
application for maintaining the proper common people complaints of different police
departments. By using this application people who are afraid or don’t have enough time to go

2
police station for complaint about their personal legal issues here they can give their complaint
through online to register any type of complaint.

1.2.3 ONLINE CRIME REPORTING SYSTEM, Chauhan Jitendra O, Soni


Apurv R.

DESCRIPTION:

We here propose an android crime reporter which tracks the investigation status of criminal cases
with logs as well as it also track complaints logged by the user. The system is proposed to help
agencies like CBI, CID and other such bureau’s to speed up their investigation process and track
status of multiple cases at a time. In this system, society itself helps the authority to get the crime
details quickly and to proceed with investigation. They will help the authorities to find out the
crime ratio in the society. The system keeps logs of a case which includes case summary, people
involved, disputes, past criminal history of those involved, Items recovered on scene and other
details. The system realizes the type of case, allows admin to update the status of investigation,
upload more images of crime and items found on scene etc. User can post their missing person’s
details with a photograph. User may also check for the status updated by the admin. The system
is designed to aid investigation teams to work collectively on cases, coordinate and also speed up
the process by suggesting logical suspects based on data provided.

1.2.4 PHP FRAMEWORK FOR DATABASE MANAGEMENT BASED ON


MVC PATTERN, Chanchai Supaartagorn

DESCRIPTION:

PHP is a powerful language to develop dynamic and interactive web applications. One of
the defining features of PHP is the ease for developers to connect and manipulate a database.
PHP prepares the functions for database manipulation. However, database management is done
by the Structure Query Language (SQL). Most novice programmers often have trouble with SQL
syntax. In this paper, we present the PHP framework for database management based on the
MVC pattern. The MVC pattern is very useful for the architecture of web applications,
3
separating the model, view and controller of a web application. The PHP framework
encapsulated, common database operations are INSERT, UPDATE, DELETE and SELECT.
Developers will not be required to consider the specific SQL statement syntax, just to call it the
method in the model module. In addition, we use White-Box testing for the code verification in
the model module. Lastly, a web application example is shown to illustrate the process of the
PHP framework.

1.2.5 PHP, MYSQL, JAVASCRIPT AND CSS, Robin Nixon

DESCRIPTION:

No doubt the symbiotic nature of PHP and MySQL helped propel them both forward, but
what attracted developers to them in the first place? The simple answer has to be the ease with
which you can use these technologies to quickly create dynamic elements on websites. MySQL
is a fast and powerful yet easy-to-use database system that offers just about anything a website
might need in order to find and serve up data to browsers. When PHP allies with MySQL to store
and retrieve this data, you have the fundamental parts required for the development of social
networking sites and the beginnings of Web 2.0. And when you bring JavaScript and CSS into
the mix too, you have a recipe for building highly dynamic and interactive websites.

1.3 PROBLEM STATEMENT

Crime is part of human activities and needs to be managed. No human society has ever been
totally free of deviants and it is unlikely that society will ever be. The more populated and
complex a society becomes the wider the range of anti-social conduct that must be controlled by
government using police power. The incident-based system reports on a much broader range of
crimes and includes data on the circumstances of the crime, the victim, and the defendant . The
current crime reporting system is faced with several difficulties as there is no instant means of
reporting crime rather than telephone calls, messaging or perhaps face-to-face which is always
cumbersome in a case the reporter might want to keep anonymity. To strengthen crime reporting
system, an online system is enhanced to fully take the responsibility of reporting crime in a
manner that will be useful crime the incident-based system will report on the:

 type and description of the article


4
 its value
 type of loss (e.g., stolen, vandalized)
 type of victim (e.g., individual, business)
 and location of crime (e.g., convenience store, residence).

The occurrence of crime is not random. It is spatially distributed in patterns some patterns
are discovered while others are not. Factor such as social class, income level and environment
play parts in the types of crime that are committed. Resources and/or a lack of resources can
influence the probability of crimes committed in any given area. Because of the complexity of
crime, crime has to be managed. Crime as various definitions depending on which perspective
one is looking at it from. For this research crime is defined as “violation of law, or an instance of
this, punishable by the state.

5
CHAPTER 2

THEME OF THE PROJECT

2.1 SYSTEM STUDY

A detailed study to determine whether, to what extent, and how automatic data-processing


equipment should be used; it usually includes an analysis of the existing system and the design of
the new system, including the development of system specifications which provide a basis for
the selection of equipment.

2.1.1 EXISTING SYSTEMS

In the existing system only we can see the details of particular information about the
police stations in our state, the existing system has more workload for the authorized person, but
in the case of Proposed System, the user can registered in our site and send the crime report and
complaint about a particular city or person. Public need some awareness of their neighborhoods.
Everyone cares for the lives of children and their beloved ones so they should be aware of the
current situations in the area. This research aims towards common people or public to help them
in their lives by notifying them the current situation of their neighborhoods. General Public and
law enforcement agencies may use these kinds of applications in many ways to keep the
community aware of the current situations and to help them to live together by communicating
and sharing information with each other.

2.1.1.1 DISADVANTAGES
 More man power.
 Time consuming.
 Consumes large volume of pare work.
 Needs manual calculations.
 No direct role for the higher officials.
 Damage of machines due to lack of attention.
To avoid all these limitations and make the working more accurately the system needs to be
computerized.
6
2.1.2 PROPOSED SYSTEM

The aim of proposed system is to develop a system of improved facilities. The proposed
system can overcome all the limitations of the existing system. The system provides proper
security and reduces the manual work. The existing system has several disadvantages and many
more difficulties to work well. The proposed system tries to eliminate or reduce these difficulties
up to some extent. The proposed system will help the user to reduce the workload and mental
conflict. The proposed system helps the user to work user friendly and he can easily do his jobs
without time lagging. Crime prevention strategies may then be developed and evaluated based on
empirical evidence. This study will also assist policy analyst to understand both factors that
impedes the efficiency and effectiveness of the police and the ways by which the situation could
be improved upon so as to bring crime and disorders in the society to its barest minimum.
Finally, this study will go a long way in contributing to the knowledge of police work. Besides,
other researchers and students in higher institutions especially those in sociology department can
derive various secondary data from this study.

2.1.2.1 ADVANTAGES

The system is very simple in design and to implement. The system requires very low
system resources and the system will work in almost all configurations. It has got following
features

 Ensure data accuracy’s.


 Proper control of the higher officials.
 Reduce the damages of the machines.
 Minimize manual data entry.
 Minimum time needed for the various processing.
 Greater efficiency.
 Better service.
 User friendliness and interactive.
 Minimum time required.

7
2.1.3 MODULES
 Admin login
 Add police
 Admin view
 Police login
 User register and login
 Complaint file
 FIR register
 Police view and upload
 User view

2.1.4 MODULES DESCRIPTION

ADMIN LOGIN:

A Login form is used to enter authentication credentials to access a restricted page or form.


The login form contains a field for the username and another for the password. Like the
search form, a login form is basically a record form whose insert, update and delete properties
have been disabled. Alternatively referred to as a sign in, a login or logon is a set of credentials
used to gain access to an area that requires proper authorization. Logins are used to gain access
to and control of computers, networks, and bulletin boards, as well as other services and devices

ADD POLICE:

The police can be added using the admin where the police will be added with the secured
username and password. The police can be added according to the area they are taking in charge.

ADMIN VIEW:

Administrator Access is defined as a level of access above that of a normal user. The admin will
view the registered users, police added, case filed, FIR taken and the action taken by the police
side. The admin seems as the super admin where they can view the entire details of the system.

8
POLICE LOGIN:

The police login can be created from the admin added details. The police will be provided with
the username and password where he/she can be login using the details added by the admin to
the database.

USER REGISTER AND LOGIN:

The user will add his/her details like name, contact number, email, address, username and
password where the details are get stored in the database. The registered user can made a login
with the retrieved username and password from the database. A secured authenticated account
can be created to the user for their specific use.

COMPLAINT FILE:

The user after their login session they can make a complaint file process. They can add the
missing person, crime, murder, robbery, chain pulling and further details. The most wanted
criminals can also added by the user thus the complaint can be registered and view by the police
man.

FIR REGISTER:

First option that is provided in the crime management system is writing FIR. We all know FIR is
First Information Report. All FIRs have unique complaint number, date, time and location.
Similar interface is provided for writing FIR in this system. FIR written cannot be lost and fast
actions can be taken on the basis of it as it will be uploaded on server and others can see it. In
this system FIR has all the options that are in the old handwritten system but is more secure as no
changes can be made once the FIR is submitted and only the authorized users can see it.

POLICE VIEW AND UPLOAD:

Police will view the FIR filed against a criminal and take a relevant action against them. The FIR
copy can be uploaded by the police to the user where the user can easily download it. Thus the
action and finding the criminal can be updated to the user frequently.

9
USER VIEW:

The user can view and then download the FIR charge sheet. The police updates the details
frequently to the user and the user can view it.

10
2.2 SYSTEM CONFIGURATION

2.2.1 HARDWARE CONFIGURATION

 Processor : Dual core processor 2.6.0 GHZ


 RAM : 1GB
 Hard disk : 160 GB
 Compact Disk : 650 Mb
 Keyboard : Standard keyboard
 Monitor : 15 inch color monitor

2.2.2 SOFTWARE CONFIGURATION

 Front End : PHP


 Back End : My SQL
 Platform : Windows 7

11
2.3SOFTWARE SPECIFICATION
2.3.1 PHP

PHP started out as a small open source project that evolved as more and more people
found out how useful it was. Rasmus Lerdorf unleashed the first version of PHP way back in
1994.PHP is a recursive acronym for "PHP: Hypertext Preprocessor". PHP is a server side
scripting language that is embedded in HTML. It is used to manage dynamic content, databases,
session tracking, even build entire ecommerce sites. It is integrated with a number of popular
databases, including MySQL, PostgreSQL, Oracle, Sybase, Informix, and Microsoft SQL Server.
PHP is pleasingly zippy in its execution, especially when compiled as an Apache module on the
UNIX side. The MySQL server, once started, executes even very complex queries with huge
result sets in record-setting time. PHP supports a large number of major protocols such as POP3,
IMAP, and LDAP. PHP4 added support for Java and distributed object architectures (COM and
CORBA), making n-tier development a possibility for the first time. PHP is forgiving: PHP
language tries to be as forgiving as possible. PHP Syntax is C-Like.
Common Uses of PHP
PHP performs system functions, i.e. from files on a system it can create, open, read, write and
close them. The other uses of PHP are:
PHP can handle forms, i.e. gather data from files, save data to a file, thru email you can send
data, return data to the user. You add, delete and modify elements within your database thru
PHP. Access cookies variables and set cookies. Using PHP, you can restrict users to access some
pages of your website. It can encrypt data.
Characteristics of PHP
Five important characteristics make PHP's practical nature possible:
 Simplicity
 Efficiency
 Security
 Flexibility
 Familiarity

12
PHP Variables
The main way to store information in the middle of a PHP program is by using a variable.
Here are the most important things to know about variables in PHP.
 All variables in PHP are denoted with a leading dollar sign ($).
 The value of a variable is the value of its most recent assignment.
 Variables are assigned with the = operator, with the variable on the left-hand side and the
expression to be evaluated on the right.
 Variables can, but do not need, to be declared before assignment.
 Variables in PHP do not have intrinsic types - a variable does not know in advance
whether it will be used to store a number or a string of characters.
 Variables used before they are assigned have default values.
 PHP does a good job of automatically converting types from one to another when
necessary.
PHP variables are Perl-like. PHP has a total of eight data types which we use to construct
our variables:
 Integers: are whole numbers, without a decimal point, like 4195.
 Doubles: are floating-point numbers, like 3.14159 or 49.1.
 Booleans: have only two possible values either true or false.
 NULL: is a special type that only has one value: NULL.
 Strings: are sequences of characters, like 'PHP supports string operations.'
 Arrays: are named and indexed collections of other values.
 Objects: are instances of programmer-defined classes, which can package up both other
kinds of values and functions that are specific to the class.
 Resources: are special variables that hold references to resources external to PHP (such as
database connections).
2.3.2 MySQL

MySQL is the world's most used open source relational database management system
(RDBMS) as of 2008 that run as a server providing multi-user access to a number of databases.
The MySQL development project has made its source code available under the terms of the
GNU General Public License, as well as under a variety of proprietary agreements. MySQL was
13
owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now owned
by Oracle Corporation.

MySQL is a popular choice of database for use in web applications, and is a central
component of the widely used LAMP open source web application software stack—LAMP is an
acronym for "Linux, Apache, MySQL, Perl/PHP/Python." Free-software-open source projects
that require a full-featured database management system often use MySQL.

For commercial use, several paid editions are available, and offer additional functionality.
Applications which use MySQL databases include: TYPO3, Joomla, Word Press, phpBB,
MyBB, Drupal and other software built on the LAMP software stack. MySQL is also used in
many high-profile, large-scale World Wide Web products, including Wikipedia, Google (though
not for searches), ImagebookTwitter, Flickr, Nokia.com, and YouTube.

Inter images

MySQL is primarily an RDBMS and ships with no GUI tools to administer MySQL
databases or manage data contained within the databases. Users may use the included command
line tools, or use MySQL "front-ends", desktop software and web applications that create and
manage MySQL databases, build database structures, back up data, inspect status, and work with
data records. The official set of MySQL front-end tools, MySQL Workbench is actively
developed by Oracle, and is freely available for use.

Graphical

The official MySQL Workbench is a free integrated environment developed by MySQL


AB, which enables users to graphically administer MySQL databases and visually design
database structures. MySQL Workbench replaces the previous package of software, MySQL
GUI Tools. Similar to other third-party packages, but still considered the authoritative MySQL
frontend, MySQL Workbench lets users manage database design & modeling, SQL development
(replacing MySQL Query Browser) and Database administration (replacing MySQL
Administrator).MySQL Workbench is available in two editions, the regular free and open source

14
Community Edition which may be downloaded from the MySQL website, and the proprietary
Standard Edition which extends and improves the feature set of the Community Edition.

Command line

MySQL ships with some command line tools. Third-parties have also developed tools to
manage a MySQL server, some listed below. Maatkit - a cross-platform toolkit for MySQL,
PostgreSQL and Memcached, developed in Perl Maatkit can be used to prove replication is
working correctly, fix corrupted data, automate repetitive tasks, and speed up servers. Maatkit is
included with several GNU/Linux distributions such as CentOS and Debian and packages are
available for Programming. MySQL works on many different system platforms, including AIX,
BSDi, FreeBSD, HP-UX, eComStation, i5/OS, IRIX, Linux, Mac OS X, Microsoft Windows,
NetBSD, Novell NetWare, OpenBSD, OpenSolaris, OS/2 Warp, QNX, Solaris, Symbian,
SunOS, SCO Open Server, SCO UnixWare, Sanos and Tru64. A port of MySQL to OpenVMS
also exists.

MySQL is written in C and C++. Its SQL parser is written in yacc, and a home-brewed
lexical analyzer. Many programming languages with language-specific APIs include libraries for
accessing MySQL databases. These include MySQL Connector/Net for integration with
Microsoft's Visual Studio (languages such as C# and VB are most commonly used) and the
JDBC driver for Java. In addition, an ODBC interimage called MyODBC allows additional
programming languages that support the ODBC inter image to communicate with a MySQL
database, such as ASP or ColdFusion. The HTSQL - URL-based query method also ships with a
MySQL adapter, allowing direct interaction between a MySQL database and any web client via
structured URLs.

Features

As of April 2009, MySQL offered MySQL 5.1 in two different variants: the open source
MySQL Community Server and the commercial Enterprise Server. MySQL 5.5 is offered under
the same licenses. They have a common code base and include the following features:

 A broad subset of ANSI SQL 99, as well as extensions


15
 Cross-platform support
 Stored procedures
 Triggers
 Cursors
 Updatable Views
 Information schema
 Strict mode (ensures MySQL does not truncate or otherwise modify data to conform to an
underlying data type, when an incompatible value is inserted into that type)
 X/Open XAdistributed transaction processing (DTP) support; two phase commit as part
of this, using Oracle's InnoDB engine
 Transactions with the InnoDB, and Cluster storage engines
 SSL support
 Query caching
 Sub-SELECTs (i.e. nested SELECTs)
 Replication support (i.e. Master-Master Replication & Master-Slave Replication) with
one master per slave, many slaves per master, no automatic support for multiple masters per
slave.
 Full-text indexing and searching using MyISAM engine
 Embedded database library
 Partititoned tables with pruning of partitions in optimiser
 Shared-nothing clustering through MySQL Cluster
 Hot backup (via mysqlhotcopy) under certain conditions
 Multiple storage engines, allowing one to choose the one that is most effective for each
table in the application (in MySQL 5.0, storage engines must be compiled in; in MySQL 5.1,
storage engines can be dynamically loaded at run time): Native storage engines (MyISAM,
Falcon, Merge, Memory (heap), Federated, Archive, CSV, Blackhole, Cluster, EXAMPLE,
Maria, and InnoDB, which was made the default as of 5.5). Partner-developed storage engines
(solidDB, NitroEDB, ScaleDB, TokuDB, Infobright (formerly Brighthouse), Kickfire, XtraDB,
IBM DB2). InnoDB used to be a partner-developed storage engine, but with recent acquisitions,
Oracle now owns both MySQL core and InnoDB.

16
2.3.3 WAMPSERVER

It stands for "Windows, Apache, MySQL, and PHP." WAMP is a variation of LAMP for
Windows systems and is often installed as a software bundle (Apache, MySQL, and PHP). It is
often used for web development and internal testing, but may also be used to serve live websites.
The most important part of the WAMP package is Apache (or "Apache HTTP Server") which is
used run the web server within Windows. By running a local Apache web server on a Windows
machine, a web developer can test webpages in a web browser without publishing them live on
the Internet. WAMP also includes MySQL and PHP, which are two of the most common
technologies used for creating dynamic websites. MySQL is a high-speed database, while PHP is
a scripting language that can be used to access data from the database. By installing these two
components locally, a developer can build and test a dynamic website before publishing it to a
public web server. While Apache, MySQL, and PHP are open source components that can be
installed individually, they are usually installed together. One popular package is called "Wamp
Server," which provides a user-friendly way to install and configure the "AMP" components on
Windows. WAMP is quite a well known term among Website Hosting Services industry.
WAMP is acronym for the combination of Windows, Apache, MySQL and PHP/Python/Perl. In
this combination the first three are constant ones and for the fourth one it varies among PHP,
Python and Perl. There may be a few occasions in which Python and Perl can be used together.
The reason behind the popularity of WAMP is because it provides four important elements
Operating System, Database Web Server and scripting application which are required for a web
hosting server. When all these four elements are used as combined then such a usage is called as
‘Server Stack’. In this (WAMP) server stack you use ‘Microsoft’ Windows as an operating
system, ‘Apache’ as a Web Server, MySQL to work as a Database and you can choose one from
PHP, Python and Perl to be used as scripting language. WAMP it is totally related with Windows
Web Hosting Servers and has nothing to do with Linux Hosting Servers. For Linux Hosting users
there is ‘LAMP’ which substitutes ‘WAMP’
To adopt WAMP one needs to download ‘WAMP Server’ which is an open-source Windows
web development environment. It comes with a service manager as a tray icon. This enables an
easy management of the server and easy installation of multiple releases of Apache, MySQL and
PHP as add-ons. With WAMP Server the installation process is automated and you can secure

17
your setting files while making any changes over your web servers. You can experience a great
flexibility with ‘WAMP Servers’ as enabling and disabling services of WAMP Server is just a
matter of clicks.

2.3.4 MACROMEDIA DREAMWEAVER

Dreamweaver 8 combines powerful visual layout tools with robust text-based HTML
editing features for the creation, management, and maintenance of Web sites. It gives beginners
immediate access to the tools need for creating Web pages while allowing experienced
developers who are familiar with hand-coding to work directly with the code when needed. This
flexible program makes advanced techniques accessible and easy to use. The integration of
powerful design, code, and interactive features provides a wealth of benefits to both beginners
and advanced users. Adobe Dreamweaver is a software program for designing web pages,
essentially a more fully featured HTML web and programming editor. The program provides a
WYSIWYG (what you see is what you get) interface to create and edit web pages. Dreamweaver
supports many markup languages, including HTML, XML, CSS, and JavaScript. As for human
languages, it supports English, Spanish, French, German, Japanese, Chinese (both simplified and
traditional), Italian, Russian, and many more. Dreamweaver was originally developed and
published by Macromedia in 1997. Adobe purchased Macromedia (which included the rights to
Dreamweaver) in 2005 and continued the development of the program. The many features of
Dreamweaver make it a versatile web editing tool, where it be for creating complex or very
simples sites.

Dreamweaver MX is the most dynamic HTML editor available off the shelf. With the help of
this HTML Editor you can create powerful web sites that have animations, graphics, and
complex scripting. You can create web sites linked with databases and more. Dreamweaver gives
you the power of adding components such as flash animated buttons, Mouse rollover scripts,
Navigation bar with menu’s and so on.

The MX technology is the new state of the art technology devised by Macromedia that
integrates, client, tool and server technologies together in order to give your website an extra
edge over others.

18
The advantages of Dreamweaver are:

 Easy to use menus: The Dreamweaver interface provides you with extensive menu driven
options with the help of which, you can create powerful, yet complex websites easily and
with in no time.

 Supported Technologies: Dreamweaver enables you to use technologies such as PHP,


ASP, CFML and more so that you save time and effort spent in creating complex codes
for programming.

 Extension Manager: Dreamweaver provides you with an extension manager, with the
help of which you can download code snippets and various behaviors from the
macromedia website

2.4 GRAPHICAL DESIGN NOTIFICATION


2.4.1 SYSTEM ARCHITECTURE
A system architecture or systems architecture is the conceptual model that defines the
structure, behavior, and more views of a system. An architecture description is a formal
description and representation of a system, organized in a way that supports reasoning about the
structures and behaviors of the system. System architecture can comprise system components,
the externally visible properties of those components, the relationships (e.g. the behavior)
between them. It can provide a plan from which products can be procured, and systems
developed, that will work together to implement the overall system. There have been efforts to
formalize languages to describe system architecture; collectively these are called architecture
description languages (ADLs).

Various organizations define systems architecture in different ways, including:

 An allocated arrangement of physical elements which provides the design solution for a
consumer product or life-cycle process intended to satisfy the requirements of the
functional architecture and the requirements baseline.

19
 Architecture comprises the most important, pervasive, top-level, strategic inventions,
decisions, and their associated rationales about the overall structure (i.e., essential
elements and their relationships) and associated characteristics and behavior.
 If documented, it may include information such as a detailed inventory of current
hardware, software and networking capabilities; a description of long-range plans and
priorities for future purchases, and a plan for upgrading and/or replacing dated equipment
and software
 The composite of the design architectures for products and their life-cycle processes.

Admin
View complaints

Add police Register FIR copy

Case overtake
User view

File complaints

User Server

FIR

Fig 2.4.1 Architecture Design of the System

20
2.4.2 ER DIAGRAM

Entity Relationship Modeling (ER Modeling) is a graphical approach to database design.


It uses Entity/Relationship to represent real world objects. An Entity is a thing or object in real
world that is distinguishable from surrounding environment. For example each employee of an
organization is a separate entity. Now you may think why use ER modeling when we can simply
create the database and all of its objects without ER modeling? One of the challenges faced when
designing database is the fact that designers, developers and end-users tend to view data and its
usage differently. If this situation is left unchecked, we can end up producing a database system
that does not meet the requirements of the users. Communication tools understood by all
stakeholders (technical as well non-technical users) are critical in producing database systems
that meet the requirements of the users. ER models are examples of such tools. ER diagrams also
increase user productivity as they can be easily translated into relational tables.
 ER Diagrams play a very important role in the database designing process. They serve as
a non-technical communication tool for technical and non-technical people.
 Entities represent real world things; they can be conceptual as a sales order or physical
such as a customer.
 All entities must be given unique names.
 ER models also allow the database designers to identify and define the relations that exist
among entities.

21
Symbol Description

An entity. A source of data or a


destination for data.

Actions, which are represented by


diamond shapes, show how two
entities share information in the
database

Attributes, which are represented


by ovals. A key attribute is the
unique and distinguishing
characteristic of the entity

A data flow occurs between one


entity to another entity

22
Fig 2.4.2 ER diagram for crime management system

2.4.3 DATA FLOW DIAGRAM

A two-dimensional diagram explains how data is processed and transferred in a system.


The graphical depiction identifies each source of data and how it interacts with other data
sources to reach a common output. Individuals seeking to draft a data flow diagram must identify
external inputs and outputs, determine how the inputs and outputs relate to each other, and
explain with graphics how these connections relate and what they result in. This type of diagram
helps business development and design teams visualize how data is processed and identify or
improve certain aspects.

23
LEVEL 0

The Level 0 DFD shows how the system is divided into 'sub-systems' (processes), each of
which deals with one or more of the data flows to or from an external agent, and which together
provide all of the functionality of the system as a whole. It also identifies internal data stores that
must be present in order for the system to do its job, and shows the flow of data between the
various parts of the system.

Police

Online crime management system

Admin User

Database

Fig 2.4.3.1 Level 0 DFD diagram

LEVEL 1

The next stage is to create the Level 1 Data Flow Diagram. This highlights the main
functions carried out by the system. As a rule, to describe the system was using between two and
seven functions - two being a simple system and seven being a complicated system. This enables
us to keep the model manageable on screen or paper.

24
Login
Store the data

Admin Add police


store the data

User view
Retrieving the data

Police View
Retrieving the data
 

25
Login
Store the data

Police FIR view


Retrieving the data

User view
Retrieving the data

Police action
Store the data
 

26
Register
Store the data

User Login
Retrieving the data

Add complaint
Store the data

FIR apply
Store the data
 

View actions
Retrieving the data

Fig 2.4.3.2 Level 1 DFD diagram

27
2.5 SYSTEM DESIGN

2.5.1 INPUT DESIGN

In an information system, input is the raw data that is processed to produce output. During
the input design, the developers must consider the input devices such as PC, MICR, OMR, etc.

Therefore, the quality of system input determines the quality of system output. Well designed
input forms and screens have following properties −

 It should serve specific purpose effectively such as storing, recording, and retrieving the
information.
 It ensures proper completion with accuracy.
 It should be easy to fill and straightforward.
 It should focus on user’s attention, consistency, and simplicity.
 All these objectives are obtained using the knowledge of basic design principles
regarding −
o What are the inputs needed for the system?
o How end users respond to different elements of forms and screens.

Objectives for Input Design

The objectives of input design are −

 To design data entry and input procedures


 To reduce input volume
 To design source documents for data capture or devise other data capture methods
 To design input data records, data entry screens, user interface screens, etc.
 To use validation checks and develop effective input controls.

28
Data Input Methods

It is important to design appropriate data input methods to prevent errors while entering data.
These methods depend on whether the data is entered by customers in forms manually and later
entered by data entry operators, or data is directly entered by users on the PCs.

A system should prevent user from making mistakes by −

 Clear form design by leaving enough space for writing legibly.


 Clear instructions to fill form.
 Clear form design.
 Reducing key strokes.
 Immediate error feedback.

Some of the popular data input methods are −

 Batch input method (Offline data input method)


 Online data input method
 Computer readable forms
 Interactive data input

Input Integrity Controls

Input integrity controls include a number of methods to eliminate common input errors by end-
users. They also include checks on the value of individual fields; both for format and the
completeness of all inputs.Audit trails for data entry and other system operations are created
using transaction logs which gives a record of all changes introduced in the database to provide
security and means of recovery in case of any failure.

29
User registration:

Name

Gender Male Fem


ale
Mobile number

Email

Address

Username

Password

Register

30
Add complaint:

Name

Gender Male Fem


ale
Complaint

Area

Address

Upload

Register

31
2.5.2 OUTPUT DESIGN

The design of output is the most important task of any system. During output design, developers
identify the type of outputs needed, and consider the necessary output controls and prototype
report layouts.

Objectives of Output Design

The objectives of input design are −

 To develop output design that serves the intended purpose and eliminates the production
of unwanted output.
 To develop the output design that meets the end users requirements.
 To deliver the appropriate quantity of output.
 To form the output in appropriate format and direct it to the right person.
 To make the output available on time for making good decisions.

Output Integrity Controls

 Output integrity controls include routing codes to identify the receiving system, and
verification messages to confirm successful receipt of messages that are handled by
network protocol.
 Printed or screen-format reports should include a date/time for report printing and the
data. Multipage reports contain report title or description, and pagination. Pre-printed
forms usually include a version number and effective date.

Types of Output Design

 External Outputs

 Internal Outputs

32
User login:

Username

Password

Submit

Police login:

Username

Password

Submit

33
admin login:

Username

Password

Submit

2.5.3 CODING DESIGN

2.5.4 DATABASE DESIGN

Database Design is a collection of processes that facilitate the designing, development,


implementation and maintenance of enterprise data management systems. It helps produce
database systems

 That meet the requirements of the users


 Have high performance
The main objectives of database designing are to produce logical and physical designs models
of the proposed database system. The logical model concentrates on the data requirements and
the data to be stored independent of physical considerations. It does not concern itself with how
the data will be stored or where it will be stored physically. The physical data design model
involves translating the logical design of the database onto physical media using hardware
resources and software systems such as database management systems (DBMS). Database
designing will be implemented by the two model function
Logical model - This stage is concerned with developing a database model based on
requirements. The entire design is on paper without any physical implementations or specific
DBMS considerations.
34
Physical model - This stage implements the logical model of the database taking into
account the DBMS and physical implementation factors.
Implementation
Data conversion and loading - this stage is concerned with importing and converting
data from the old system into the new database.
Testing - this stage is concerned with the identification of errors in the newly
implemented system .It checks the database against requirement specifications.
The database design has some techniques which

Fig 2.5.4 database design for online crime report


2.6 TESTING
2.6.1 UNIT TESTING

Unit testing is a level of software testing where individual units/ components of software
are tested. The purpose is to validate that each unit of the software performs as designed. A unit
is the smallest testable part of any software. It usually has one or a few inputs and usually a
single output. In procedural programming, a unit may be an individual program, function,
procedure, etc. In object-oriented programming, the smallest unit is a method, which may belong
to a base/ super class, abstract class or derived/ child class. (Some treat a module of an
application as a unit. This is to be discouraged as there will probably be many individual units
within that module.) Unit testing frameworks, drivers, stubs, and mock/ fake objects are used to
assist in unit testing.

35
2.6.2 INTEGRATION TESTING
Integration testing is a level of software testing where individual units are combined and
tested as a group. The purpose of this level of testing is to expose faults in the interaction
between integrated units. Test drivers and test stubs are used to assist in Integration Testing. Big
Bang is an approach to Integration testing where all or most of the units are combined together

36
and tested at one goes. This approach is taken when the testing team receives the entire software
in a bundle. The difference between Big Bang Integration Testing and System Testing is that the
former tests only the interactions between the units while the latter tests the entire system. Top
Down is an approach to Integration Testing where top-level units are tested first and lower level
units are tested step by step after that. This approach is taken when top-down development
approach is followed. Test Stubs are needed to simulate lower level units which may not be
available during the initial phases.

2.6.3 VALIDATION TESTING


The process of evaluating software during the development process or at the end of the
development process to determine whether it satisfies specified business requirements.
Validation Testing ensures that the product actually meets the client's needs. It can also be
defined as to demonstrate that the product fulfills its intended use when deployed on appropriate
environment. When software is tested, the motive is to check the quality regarding the found
defects and bugs. When defects and bugs are detected, developers fix them. After that, the
software is checked again to make sure no bugs are left. In that way, the software product’s
quality scales up.

37
38
CHAPTER 3

CONCLUSION AND FUTURE ENHANCEMENT

3.1 CONCLUSION

The project titled as “Online Crime Reporting” is a web based application. This software
provides facility for reporting online crimes, complaints, missing persons, show criminal details.
This software is developed with scalability in mind. Additional modules can be easily added
when necessary. The software is developed with modular approach. All modules in the system
have been tested with valid data and invalid data and everything work successfully. Thus the
system has fulfilled all the objectives identified and is able to replace the existing system. The
project has been completed successfully with the maximum satisfaction of the organization. The
constraints are met and overcome successfully. The system is designed as like it was decided in
the design phase. The project gives good idea on developing a fullfledged application satisfying
the user requirements. The system is very flexible and versatile. This software has a user-friendly
screen that enables the user to use without any inconvenience. Validation checks induced have
greatly reduced errors. Provisions have been made to upgrade the software. The application has
been tested with live data and has provided a successful result. Hence the software has proved to
work efficiently.

3.2 MAINTENANCE AND FUTURE ENHANCEMENT

The system is strong enough to withstand regressive yearly operations under conditions where
the database is maintained and cleared over a certain time of span. The interface provided is very
user friendly and flexible for all times. The implementation of the system in the organization will
considerably reduce data entry, time and also provide readily calculated reports. The system
maintains an event or case file and a police activity file. The conceptual crime reporting system
design and data elements thus developed must now be tested and evaluated in an operational
environment. Societies all over the world expand and develop continuously, as such human
relationship and activities also expands. The results of dynamism of the growing population give
room for crime. These societies therefore strive to establish and develop institutions that can
ensure peace as well as security of lives and property of its citizenry.

39
APPENDIX –A
A.1 SCREENSHOTS
A.1.1 Home page

40
A.1.2 User login

41
A.1.3 user login

42
A.1.4 user registration success

43
A.1.5 FIR apply

44
A.1.6 case status

45
A.1.7 Admin login

46
A.1.8 crime details

47
A.1.9 crime details

48
A.1.10 user details

49
A.1.11 police login

50
A.1.12 registered case and FIR case

51
A.1.13 case details and updated details

52
53
A.1.14 Wanted list

A.2 TABLE DESIGN

A.2.1 Admin table:

Field Type Null Default

Id varchar(100) Yes NULL

UserName varchar(100) Yes NULL

Password varchar(100) Yes NULL

A.2.2 Police table:


54
Field Type Null Default

id int(10) Yes NULL

pname varchar(100) Yes NULL

pstation varchar(100) Yes NULL

area varchar(100) Yes NULL

city varchar(100) Yes NULL

pposition varchar(100) Yes NULL

contact varchar(100) Yes NULL

iname varchar(100) Yes NULL

password varchar(100) Yes NULL

A.2.3 Crime table:

Field Type Null Default

id int(10) Yes NULL

user varchar(100) Yes NULL

fname varchar(100) Yes NULL

lname varchar(100) Yes NULL

gender varchar(100) Yes NULL

date_fo_crime varchar(100) Yes NULL

time_of_crime varchar(100) Yes NULL

uaddress varchar(100) Yes NULL

city varchar(100) Yes NULL

55
contact varchar(100) Yes NULL

email varchar(100) Yes NULL

crime_type varchar(100) Yes NULL

crime_location varchar(100) Yes NULL

details varchar(100) Yes NULL

status varchar(100) Yes NULL

report varchar(100) Yes NULL

cdate varchar(100) Yes NULL

report1 varchar(100) Yes NULL

accust varchar(100) Yes NULL

complete_status varchar(100) Yes NULL

police_name varchar(100) Yes NULL

taken_date varchar(100) Yes NULL

A.2.4 User table:

Field Type Null Default

Id int(100) Yes NULL

Name varchar(100) Yes NULL

Gender varchar(100) Yes NULL

DateOfBirth varchar(100) Yes NULL

MobileNumber varchar(100) Yes NULL

EmailId varchar(100) Yes NULL

56
Address varchar(100) Yes NULL

Password varchar(100) Yes NULL

Status varchar(100) Yes NULL

A.3 SAMPLE CODING

A.3.1 Admin case:

<?php
include("dbconnect.php");
$select = mysql_query("SELECT * FROM user_crime");

?>
<!DOCTYPE html>
<html>
<head>
<title>Armor A People Category Flat Bootstarp Resposive Website Template | Contact ::
w3layouts</title>
<link href="css/bootstrap.css" rel="stylesheet" type="text/css" media="all" />
<!-- jQuery (necessary for Bootstrap's JavaScript plugins) -->
<script src="js/jquery.min.js"></script>
<!-- Custom Theme files -->
<!--theme-style-->
<link href="css/style.css" rel="stylesheet" type="text/css" media="all" />
<!--//theme-style-->
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="keywords" content="Armor Responsive web template, Bootstrap Web Templates,
Flat Web Templates, Andriod Compatible web template,
Smartphone Compatible web template, free webdesigns for Nokia, Samsung, LG,
SonyErricsson, Motorola web design" />

57
<script type="application/x-javascript"> addEventListener("load", function()
{ setTimeout(hideURLbar, 0); }, false); function hideURLbar(){ window.scrollTo(0,1); }
</script>
<style type="text/css">
<!--
.style1 {color: #004080}
.style3 {color: #1B3E5C}
-->
</style>
</head>
<body>

<div class="header-top">
<div class="container">
<div class="logo">
<a href="index.html"><img src="images/logo.png" alt=""></a>
</div>
<div class="top-nav">
<span class="menu"><img src="images/menu.png" alt="">
</span>
<ul>
<li class="active"><a href="admin_home.php" >
Home </a></li>
<li><a href="admin_case.php" > Crime Details
</a></li>
<li><a href="admin_new_police.php" > New
Police</a></li>
<li><a href="admin_police_details.php" >Police
Details</a></li>
<li><a href="admin_user_details.php" >User
Details</a></li>
<li><a href="index.php" >Logout</a></li>
<div class="clearfix"> </div>
</ul>
<script>
$("span.menu").click(function(){
$(".top-nav ul").slideToggle(500, function()
{
});
});
</script>
</div>
<div class="clearfix"></div>
</div>
</div>
<!--//header-->

58
<!--content-->
<div class="contact">
<div class="container">
<div class="contact-top">
<h1>Crime Details </h1>
<p>&nbsp;</p>
<form name="form1" method="post" action="">
<table width="1027" height="89" border="0" align="center">
<tr>
<td height="36"><h3><span class="style1">id</span></h3></td>
<td><h3><span class="style3">user</span></h3></td>
<td><h3><span class="style1">date</span></h3></td>
<td><h3><span class="style1">time</span></h3></td>
<td><h3><span class="style1">contact</span></h3></td>
<td><h3><span class="style1">type</span></h3></td>
<td><h3><span class="style1">location</span></h3></td>
<td><h3><span class="style1">details</span></h3></td>
<td><h3><span class="style1">status</span></h3></td>
</tr>
<?php
// $p = 0;
while($row = mysql_fetch_array($select)){
// $p++;
?>
<tr>
<td><?php echo $row['id']; ?></td>
<td><?php echo $row['user']; ?></td>
<td><?php echo $row['date_fo_crime']; ?></td>
<td><?php echo $row['time_of_crime']; ?></td>
<td><?php echo $row['contact']; ?></td>
<td><?php echo $row['crime_type']; ?></td>
<td><?php echo $row['crime_location']; ?></td>
<td><?php echo $row['details']; ?></td>
<td><?php $a= $row['status'];
if($a==0)
{

echo "Case Apply";


}
else if($a==1)
{

echo "FIR";
}
else if($a==2)
{
59
echo "Process";
}
else if($a==3)
{

echo "Closed";
}
else
{
echo "Judgment";
}

?></td>

</tr>
<?php
}
?>
</table>
</form>
</div>
<div class="contact-form">
<div class="clearfix"></div>
</div>

</div>
</div>
<!--footer-->
<div class="footer"></div>
<!--//footer-->
</body>
</html>

A.3.2 Police FIR:

<?php

60
session_start();
include("dbconnect.php");
extract($_POST);
$a=$_REQUEST['id'];
$qry = mysql_query("update user_crime set status=1 where id='$a' ");
echo $qry;
header("Location: police_case.php");

?>

A.3.3 User register:

<?php
include("dbconnect.php");
session_start();
extract($_POST);
if(isset($_POST['btn']))
{

$max_qry = mysql_query("select max(id) from user_table");


$max_row = mysql_fetch_array($max_qry);
$id=$max_row['max(id)']+1;
$qry=mysql_query("insert into user_table
values('$id','$name','$gender','$dob','$mnumber','$emailid','$address','$pwd','0')");
if($qry)
{
?>
<script language="javascript">
alert("Registered Successfully..");
window.location.href="user.php";
</script>
<?php
}
else
{
?>
<script language="javascript">
alert("Failed..");
window.location.href="user_register.php.php";
</script>
<?php
}

61
?>
<!DOCTYPE html>
<html>
<head>
<title>Armor A People Category Flat Bootstarp Resposive Website Template | Contact ::
w3layouts</title>
<link href="css/bootstrap.css" rel="stylesheet" type="text/css" media="all" />
<!-- jQuery (necessary for Bootstrap's JavaScript plugins) -->
<script src="js/jquery.min.js"></script>
<!-- Custom Theme files -->
<!--theme-style-->
<link href="css/style.css" rel="stylesheet" type="text/css" media="all" />
<!--//theme-style-->
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="keywords" content="Armor Responsive web template, Bootstrap Web Templates,
Flat Web Templates, Andriod Compatible web template,
Smartphone Compatible web template, free webdesigns for Nokia, Samsung, LG,
SonyErricsson, Motorola web design" />
<script type="application/x-javascript"> addEventListener("load", function()
{ setTimeout(hideURLbar, 0); }, false); function hideURLbar(){ window.scrollTo(0,1); }
</script>
<style type="text/css">
<!--
.style13 {color: #000000; font-weight: bold; font-size: 18px; }
-->
</style>
</head>
<body>

<div class="header-top">
<div class="container">
<div class="logo">
<a href="index.html"><img src="images/logo.png" alt=""></a>
</div>
<div class="top-nav">
<span class="menu"><img src="images/menu.png" alt="">
</span>
<ul>
<li class="active"><a href="index.php" > Home
</a></li>
<li><a href="user.php" > User </a></li>
<li><a href="police.php" > Police</a></li>
<li><a href="admin.php" >Admin</a></li>

<li><a href="about.html" >About</a></li>


62
<div class="clearfix"> </div>
</ul>
<script>
$("span.menu").click(function(){
$(".top-nav ul").slideToggle(500, function()
{
});
});
</script>
</div>
<div class="clearfix"></div>
</div>
</div>
<!--//header-->
<!--content-->
<div class="contact">
<div class="container">
<div class="contact-top">
<h1>Admin Login</h1>
<form name="form1" method="post" action="">
<table width="100%" border="0">
<tr>
<td>&nbsp;</td>
<td><p>&nbsp;</p>
<table width="873" height="408" border="0" align="center">
<tr>
<td colspan="2" rowspan="9"><p><img src="images/a.png" width="401"
height="384"></p>
<p>&nbsp;</p> </td>
<td width="133" height="35"><div align="center" class="style13">
<div align="left">Name</div>
</div></td>
<td width="289"><label>
<input name="name" type="text" id="name" required="">
</label></td>
</tr>
<tr>
<td height="34"><div align="center" class="style13">
<div align="left">Gender</div>
</div></td>
<td><label>
<input name="gender" type="radio" value="Male">
Male
<input name="gender" type="radio" value="radiobutton">
Female</label></td>
</tr>

63
<tr>
<td height="34"><div align="center" class="style13">
<div align="left">Date Of Birth </div>
</div></td>
<td><input name="dob" type="date" id="dob" required=""></td>
</tr>
<tr>
<td height="38"><div align="center" class="style13">
<div align="left">MobileNumber</div>
</div></td>
<td><input name="mnumber" type="text" id="mnumber" required=""></td>
</tr>
<tr>
<td height="37"><div align="center" class="style13">
<div align="left">EmailId</div>
</div></td>
<td><input name="emailid" type="text" id="emailid" required=""></td>
</tr>
<tr>
<td height="42"><div align="center" class="style13">
<div align="left">Address</div>
</div></td>
<td><input name="address" type="text" id="address" required=""></td>
</tr>
<tr>
<td height="46"><div align="center" class="style13">
<div align="left">Password</div>
</div></td>
<td><input name="pwd" type="password" id="pwd" required=""></td>
</tr>
<tr>
<td height="46">&nbsp;</td>
<td>
<div align="center">
<input name="btn" type="submit" id="btn" value="Register">
</div></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><label></label></td>
</tr>
</table></td>
<td>&nbsp;</td>
</tr>
</table>
</form>

64
</div>
<div class="contact-form">
<div class="clearfix"></div>
</div>

</div>
</div>
<!--footer-->
<div class="footer">
<div class="container">
<div class="footer-top">
<p class="footer-in">© 2019 Armor All Rights Reserved
| Design by <a href="#" target="_blank">Admin</a> </p>
<ul class="social">
<li><a href="#"><i> </i></a></li>

<li><a href="#"><i class="rss"> </i></a></li>


<li><a href="#"><i class="twitter"> </i></a></li>
<li><a href="#"><i class="dribble"> </i></a></li>
<li><a href="#"><i class="linked"> </i></a></li>
<li><a href="#"><i class="camera"> </i></a></li>
</ul>
</div>
</div>

65
REFERENCES
[1] Anu sharma , mohd. Shahnawaz , (2017),Crime Records Management System, Vol 7.
No. 1, pp:11-20

[2] Yugandhar , B Muni Archana ,(2014), Crime Reporting System, International


Conference on System Modeling & Advancement in Research Trends (SMART),pp:6-9

[3] Chauhan Jitendra O, Soni Apurv R., (2018), Online Crime Reporting System, Volume 4
Issue 11, pp:1745-1748

[4] Chanchai Supaartagorn ,(2018), Php Framework For Database Management Based On
Mvc Pattern, pp:145-168

[5] Robin Nixon , (2013), Php, Mysql, Javascript And Css, pp:1-406

66

You might also like