Home > Information technology essays > System for linking police incidents and the hospital

Essay: System for linking police incidents and the hospital

Essay details and download:

  • Subject area(s): Information technology essays
  • Reading time: 34 minutes
  • Price: Free download
  • Published: 22 July 2019*
  • Last Modified: 23 July 2024
  • File format: Text
  • Words: 1,940 (approx)
  • Number of pages: 8 (approx)

Text preview of this essay:

This page of the essay has 1,940 words.

CHAPTER 1
1. INTRODUCTION
THE WEB PORTAL FOR POLICE ACCIDENT CASE REGISTER AND DETAILS patient registered on hospital to doctors and case admin officer to Call or Sms For allocate Limits of police officer then start an investigation of proper and documents are systematically used for store all documents Explorers should be able to investigate a traffic accident, obtain witness and victim information, determine the cause and fault of an accident and properly fill out the state Accident Report form. Explorers should be able to properly clear the scene of an accident calling upon the necessary resources to actions of police officers. Traffic accidents are extremely confusing events. How they occur, who or what caused them, and why they occurred are facts that police must determine. Every peace officer must know the fundamentals of traffic accident investigation and know how to prepare traffic accident reports. Traffic accidents, resulting in personal injury, fatality, and property damage in the or greater require an on scene investigation. The State of Texas mandates all peace officers will use the state accident form for reporting traffic accidents to the Texas Department of Public Safety. If additional instruction/information is needed, contact the Bureau of Statistical Records, Texas Department of Public Safety.
Arrival at the scene the following steps should be taken upon arrival at the scene of the accident. While an route to the scene, the officer should obtain as much preliminary information as possible concerning the accident. Such information includes: Location, Time of notification, Who notified the officer and how, Weather and visibility conditions ,General information as to seriousness of the accident–injuries, hit and run, amount of traffic congestion, Whether or not additional support is proceeding to the scene, such as wrecker, ambulance, or additional Police patrols.
Take statements an questioning and taking statements of witnesses and victims should be done at the scene. If this is not possible, statements should be taken as soon as possible at the hospital, police station or homes of those involved. Names, number and contact address of witnesses should be noted on the accident report.
.
LOCATION OF THE PATROL VEHICLE
The police vehicle should be positioned so as not to cause further traffic congestion or accidents. If necessary, it may, however, be used as a roadblock. At night it should be parked so the headlights illuminate the entire scene. At all times the emergency lights should be on to warn approaching motorists of the hazard Care for injured and protect the scene The investigators should determine the extent of injuries, if any, to accident victims; render first aid; and request medical assistance, if necessary. Severely injured persons should not be moved, except to preserve their safety. The position of all victims should be noted for report purposes and, if on the road, the positions
TAKE STATEMENTS
Questioning and taking statements of witnesses and victims should be done at the scene. If this is not possible, statements should be taken as soon as possible at the hospital, police station or homes of those involved. Names, number and contact address of witnesses should be noted on the accident report. All parties should be separated when questioning them, but in a safe location like on the sidewalk, not in the roadway. Make sure the parties exchange names and phone numbers before leaving the accident scene.
FIR
A First Information Report (FIR) is a written document prepared by police organizations in countries like Bangladesh, India, and Pakistan when they receive information about the commission of a cognizable offence, or in Singapore when the police receives information about any criminal offence. It is generally a complaint lodged with the police by the victim of a cognizable offense or by someone on his or her behalf, but anyone can make such a report either orally or in writing to the police. Investigating work of the police starts after an FIR is recorded
HEAD OFFICE
The All Reports Are fulfilled the Limits of police officer to stored a reports for all time to fetch a particular documents ,it’s not missed that documents for all reports and maintaining the police officer and list of accident in a year for all accident cases to suggest for Highway departments only important to landmark for Example College ,school etc for public safety should put speed break here ‘
1.1 BACKGROUND
In Background of the number of students are make Police Accident case Project register and details are Created in the Accident Case Project through reference [1] This members are created Police Accident case investigation as all type of case events through spot accident area selection location an call to crash notifications police Toll free numbers used for people and Ambulance call toll free number people most used In India, there is no systematic approach , immediate police crash notification to date. To conduct on-scene inspections, the teams must reach the sites while scene evidence is still available. And try to Make a same accident case register project ,android app name as Accident Report current date and time ,vehicle name ,third party name to etc handle students this projects are very hard to handle Police officers belated coming for case investigate officers ,fake address are mentioned not identified in this site ,I am also follow the same concepts but implement technologies.
1.2 OBJECTIVES
The web portal for police accident case register detailed on through hospitals for case admin officer to information an limits of police officer through investigate on patient or victim and any witness to report are send an head office to submit all accident register report patient report vehicle report ,place report ,drink and drive report stored for all documents in a head office…
1.3 PURPOSE SCOPE AND APPLICABILITY
1.3.1 PURPOSE
In this Project are patient come to Government Hospitals through admitted doctor registered on hospitals and send a alert message or call to Limits of police officer and case investigation entire fully documents are registered to all reports[Hospital Report, Place Report, Drink And Drive Report, Vehicle Report, Crime Report ,FIR Report] generated to store a documents in head office
1.3.2 SCOPE:
The Scope of Police Accident Case register and details for online compliant and registration to internet software developed in doctor registered patient and after announcement a case limits of police officer to investigated are victim and patient any of these to all reports are maintaining the Stored head office
1.3.3 APPLICABILITY:
I want on talk about how widely applicable I think Project management is I am a big Believer in the power of project management .I know its limitations, but those limitations are reducing .ours is not static discipline, New Approaches and Enhancements come about all the time .Think about approaches like integration of project and change management. These Innovations and enhancements will continue .Yes, project applicability is not perfect, but with continuous improvement it gets better and better
1.4 ACHIEVEMENTS
This project achieves follows
‘ These case as fully online complaint maintenance and reports Generated
‘ Documents are stored in the head office
‘ All Accident case investigate an limits of police officer
‘ The Ability of Police worked for all case if investigations and police event to achieve is a blessing and a result of police efforts and their sacrifices and round-the-clock commitment. Their dedication is inspired by the wise thoughts and ideas of head officer.
‘ Police Head office Stored All Documents The All reports and documents are maintaining the head office to store a large amount of data And take actions to decision for all limits of police officer Legal Affairs continues with its excellent performance for police
1.5 ORGANIZATION OF REPORT
The Web portal for accident case Register to entire projects for fully reports are overviewed an reports
ACCIDENT REGISTER REPORT
The Patient Are Injured an admitted hospitals and doctors for fulfilled the register documents to complaint actions for case Administrator officer are reports generated.
PLACE REPORT
The Current Place and Date and time Reports to investigate to make generated for a police place report
DRINK AND DRIVE REPORT
A if a person is driving drunk and makes it home and into their house without causing any collisions or committing any additional crimes, then police would not be allowed to enter the home and make an arrest for drunken driving.
VEHICLE REPORT
The Vehicle are through put hit a vehicle for damaged vehicle to include a vehicle damaged to fulfilled the reports
CRIME REPORT
The All type of case include murder ,kidnapping ,hijacking etc in this type of case to handle all reports to investigate fulfill the acquits name crime to written document officers are generate a documents for reports, All criminal records are stored in a file To add any new record ,record file is used When other police station require any criminal information at that time they need to call that police station There are many drawbacks like time consuming, require more man power Citizens cannot get the information and the current status of the of all city’s
FIR REPORT
First Information Report (FIR) is a written document prepared by the police when they receive information about the commission of a cognizable offence. It is a report of information that reaches the police first in point of time and that is why it is called the First Information Report
CHAPTER 2
SURVEY OF TECHNOLOGIES
2.1 PHP
The front end is an interface between the user and the back end. The front and back ends may be distributed amongst one or more systems .In network computing, front end can refer to any hardware that optimizes or protects network traffic. It is called application front-end hardware because it is placed on the network’s outward-facing front end or boundary. Network traffic passes through the front-end hardware before entering the network. In compilers, the front end translates a computer programming source code into an intermediate representation, and the back end works with the intermediate representation to produce code in a computer output language. The back end usually optimizes to produce code that runs faster. The front-end/back-end distinction can separate the parser section that deals with source code and the back end that generates code and optimizes.
These days, front-end development refers to the part of the web users interact with. In the past, web development consisted of people who worked with Photoshop and those who could code HTML and CSS. Now, developers need a handle of programs like Photoshop and be able to code not only in HTML and CSS, but also JavaScript or jQuery, which is a compiled library of JavaScript. Most of everything you see on any website is a mixture of HTML, CSS, and JavaScript, which are all controlled by the browser. For example, if you’re using Google Chrome or Firefox, the browser is what translates all of the code in a manner for you to see and with which to interact, such as fonts, colors, drop-down menus, sliders, forms, etc. In order for all of this to work, though, there has to be something to support the front-end; this is where the backend comes into play.
2.2 ARCHITECTURE OF FRONT END USER
Figure 2.1 : PHP ARCHITECTURE
Software & Tools Used:
PHP Syntax
You cannot view the PHP source code by selecting ‘View source’ in the browser ‘ you will only see the output from the PHP file, which is plain HTML. This is because the scripts are executed on the server before the result is sent back to the browser.
Basic PHP Syntax
A PHP scripting block always starts with <? php and ends with ?>. A PHP scripting block can be placed anywhere in the document. On servers with shorthand support enabled you can start a scripting block with <? And end with ?>.However, for maximum compatibility, we recommend that you use the standard form (<?php) rather than the shorthand form. A PHP file normally contains HTML tags, just like an HTML file, and some PHP scripting code.
2.3 HTML
HTML or HYPER TEXT MARKUP LANGUAGE is the standard markup language used to create web pages. HTML was created in 1991 by Tim Berners-Lee at CERN in Switzerland. It was designed to allow scientists to display and share their research.
HTML is written in the form of HTML elements consisting of tags enclosed in angle brackets(like <html>). HTML tags most commonly come in pairs like <h1> and </h1>, although some tags represent empty elements and so are unpaired, for example <img>. The first tag in a pair is the start tag, and the second tag is the end tag (they are also called opening tags and closing tags).
The purpose of a web browser is to read HTML documents and compose them into visible or audible web pages. The browser does not display the HTML tags, but uses the tags to interpret the content of the page. HTML describes the structure of a website semantically along with cues for presentation, making it a markup language rather than a programming language.
HTML elements form the building blocks of all websites. HTML allows images and objects to be embedded and can be used to create interactive forms. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. It can embed scripts written in languages such as Java Script which affect the behavior of HTML web pages.
HTML is descriptive markup language. Library of various markup languages is defined in various browsers.
HTML 5 HTML5 will be the new standard for HTML. The previous version of HTML, HTML 4.01, came in 1999. The web has changed a lot since then. HTML5 is still a work in progress. However, the major browsers support many of the new HTML5 elements and APIs.HTML5 is cooperation between the World Wide Web Consortium (W3C) and the Web Hypertext Application Technology Working Group (WHATWG). WHATWG was working with web forms and applications, and W3C was working with XHTML 2.0. In 2006, they decided to cooperate and create a new version of HTML.
Some rules for HTML5 were established:
a) New features should be based on HTML, CSS, DOM, and JavaScript
b) Reduce the need for external plug-ins (like Flash)
c) Better error handling
d) More markup to replace scripting
e) HTML5 should be device independent
f) The development process should be visible to the public
2. 4 CSS
CSS tutorial or CSS 3 tutorial provides basic and advanced concepts of CSS technology. Our CSS tutorial is developed for beginners and professionals. The major points of CSS are given below:
‘ CSS stands for Cascading Style Sheet.
‘ CSS is used to design HTML tags.
‘ CSS is a widely used language on the web.
‘ HTML, CSS and JavaScript are used for web designing. It helps the web designers to apply style on HTML tags.
Cascading Style Sheets (CSS) is a style sheet language used for describing the look and formatting of a document written in a markup language. While most often used to style web pages and user interfaces written in HTML and XHTML, the language can be applied to any kind of XML document, including plain XML, SVG and XUL. CSS is a cornerstone specification of the web and almost all web pages use CSS style sheets to describe their presentation.
CSS is designed primarily to enable the separation of document content from document presentation, including elements such as the layout, colors, and fonts. This separation can improve content accessibility, provide more flexibility and control in the specification of presentation characteristics, enable multiple pages to share formatting, and reduce complexity and repetition in the structural content (such as by allowing for table less web design).
CSS can also allow the same markup page to be presented in different styles for different rendering methods, such as on-screen, in print, by voice (when read out by a speech-based browser or screen reader) and on Braille-based, tactile devices. It can also be used to allow the web page to display differently depending on the screen size or device on which it is being viewed. While the author of a document typically links that document to a CSS file, readers can use a different style sheet, perhaps one on their own computer, to override the one the author has specified.
2.5 JAVASCRIPT
JavaScript (JS) is a dynamic computer programming language. It is most commonly used as part of web browsers, whose implementations allow client-side scripts to interact with the user, control the browser, communicate asynchronously, and alter the document content that is displayed. It is also being used in server-side network programming (with Node.js), game development and the creation of desktop and mobile applications.
JavaScript is a prototype-based scripting language with dynamic typing and has first-class functions. Its syntax was influenced by C. JavaScript copies many names and naming conventions from Java, but the two languages are otherwise unrelated and have very different semantics. The key design principles within JavaScript are taken from the Self and Scheme programming languages. It is a multi-paradigm language, supporting object-oriented, imperative, and functional programming styles.
2.6 DATABASE
In a previous blog, we talked about how web programmers are concerned with launching websites, updates, and maintenance, among other things. All of that works to support the front-end of the website. The back-end has three parts to it: server, application, and database. To better explain how all of this works, let’s use the example of a customer trying to purchase a plane ticket using a website. Everything that the customer sees on the webpage is the front-end, as we have explained before, but once that customer enters all of his or her information, such as their name, billing address, destination, etc, the web application stores the information in a database that was created previously on the server in which the website is calling for information.
The web application creates, deletes, changes, renames, etc items in the database. For example, when a customer purchases a ticket, that creates an item in the database, but when they have a change in their order or they wish to cancel, the item in the database is changed..In short, when a customer wants to buy a ticket, the backend operation is the web application communicating with the server to make a change in a database stored on said server. Technologies like PHP, Ruby, Python, and others are the ones backend programmers use to make this communication work smoothly, allowing the customer to purchase his or her ticket with ease.
2.7 MySQL’s Logical Architecture
The topmost layer contains the services that aren’t unique to MySQL. They’re services most network-based client/server tools or servers need: connection handling, authentication, security, and so forth.
.
FIGURE 2.3: MYSQL’S LOGICAL ARCHITECTURE
The third layer contains the storage engines. They are responsible for storing and retrieving all data stored ‘in’ MySQL. Like the various file systems available for GNU/Linux, each storage engine has its own benefits and drawbacks. The server communicates with them through the storage engine API. This interface hides differences between storage engines and makes them largely transparent at the query layer. The API contains a couple of dozen low-level functions that perform operations such as ‘begin a transaction’ or ‘fetch the row that has this primary key.’ The storage engines don’t parse SQL or communicate with each other; they simply respond to requests from the server
2.8 MY SQL
The database has become an integral part of almost every human’s life. Without it, many things we do would become very tedious, perhaps impossible tasks. Banks, universities, and libraries are three examples of organizations that depend heavily on some sort of database system. On the Internet, search engines, online shopping, and even the website naming convention would be impossible without the use of a database. A database that is implemented and interfaced on a computer is often termed a database server.
One of the fastest SQL (Structured Query Language) database servers currently on the market is the MySQL server, developed by T.c.X. Data Konsult AB. MySQL, available for download at www.mysql.com, offers the database programmer with an array of options and capabilities rarely seen in other database servers. MySQL is free of charge for those wishing to use it for private and commercial use. Those wishing to develop applications specifically using MySQL should consult MySQL’s licensing section, as there is charge for licensing the product.
These capabilities range across a number of topics, including the following:
a) Ability to handle an unlimited number of simultaneous users.
b) Capacity to handle 50,000,000+ records.
c) Very fast command execution, perhaps the fastest to be found on the market.
d)Easy and efficient user privilege system.
However, perhaps the most interesting characteristic of all is the fact that it’s free. That’s right, T.c.X offers MySQL as a free product to the general public.
PHP Main Features of MySQL
‘ Tested with a broad range of different compilers.
‘ Works on many different platforms.
‘ The MySQL Server design is multi-layered with independent modules.
‘ Provides transactional and non-transactional storage engines.
‘ Uses very fast B-tree disk tables with index compression.
‘ Relatively easy to add other storage engines. This is useful if you want to provide an SQL interface for an in-house database.
‘ A very fast thread-based memory allocation system.
‘ Very fast joins using an optimized one-sweep multi-join.
‘ In-memory hash tables, which are used as temporary tables.
‘ SQL functions are implemented using a highly optimized class library and should be as fast as possible. Usually there is no memory allocation at all after query initialization.
‘ The server is available as a separate program for use in a client/server networked environment.
2.9 XAMPP SERVER
Starting Apache and MySQL
Go to the location where you installed XAMPP (usually C:\Program Files\xampp) and double click on XAMPP Control Panel (xampp-control.exe). This will bring you following screen. Click on Start buttons next to Apache and MySQL for starting them.
FIGURE 2.4 : XAMPP SERVER
CHAPTER 3
REQUIREMENTS AND ANALYSIS
3.1 PROBLEM DEFINITION
The definition of our problem lies in manual system and a fully automated system. Manual system : The system is very time consuming and lazy. This system is more field to errors and sometimes the approach to various problems is unstructured. Technical system With the advent of latest technology if we do not update our system then our business result in losses gradually with time. The technical systems contains the tools of latest trend i.e. computers printers, fax, Internet etc. The systems with this technology are very fast, accurate, user-friendly and reliable..
‘ Some alert messages not sent because SMS service not provided..
‘ Reports entire fully not properly
‘ Limits of police officer to maintaining list of in the websites
REQUIREMENTS SPECIFICATION
3.1.1 EXISTING SYSTEM
In existing system the number of students are make Police Accident case Project register and details are Created in the Accident Case Project [1],[2] are This members are created Police Accident case investigation as all type of case events through spot accident area selection location an call to crash notifications police Toll free numbers used for people and Ambulance call toll free number people most used In India, there is no systematic approach , immediate police crash notification to date. To conduct on-scene inspections, the teams must reach the sites while scene evidence is still available. And try to Make a same accident case register project ,android app name as Accident Report current date and time ,vehicle name ,third party name to etc handle students this projects are very hard to handle Police officers belated coming for investigate officers ,fake address are mentioned not identified in this site ,I am also follow the same concepts but implement technologies..
DISDVANTAGES IN EXISTING SYSTEM:
‘ Not handled rural area accident case selection
‘ Police current date and time not investigate in the our Limits
Belated for case investigate started, Reports are Not Generate
and downloaded on the sites
‘ Only Complaint Register and No actions For Police officer
‘ Somebody case witnesses are not say accident descriptions
3.1.2 PROPOSED SYSTEM:
In proposed system I will not improve all the things in existing system. But I can make more improve than [2] are police accident case register and details to reports not generated and downloaded I will make more efficient process than there old project. And include spot accident area location reports call peoples an toll free number ambulance to pick up a victim to admit on hospitals complaint on registration on doctor and information pass to admin in a limits of police officer for Case investigation reports all maintained all documents to stored head office,
ADVANTAGES IN PROPOSED SYSTEM:
‘ Easy to use all police officers..
‘ Time saving of Police case Intimate Officer
‘ Current date and time investigation start the police officer..
‘ Uploading Files and Downloading files are in the sites’.
‘ To store Large Amount of Victim Data in a Head Office”
‘ Suggest Head office to Highway department the road maintained in a important place of should put a speed breaker here’
3.1.3 NEED FOR PROJECT:
In this project entire fully very systematic approach and technology improvement..the police case intimate organization are before very realistic actions now after a website patient case intimates to help of all case intimate police officers ..in this maintaining the select all rural area and district and highway road accident ,selection accident selection criteria on the public people victim shared for saying call from location an limits of police to announcement and all type of case events handled (,driving accident accident with parking traffic, pedestrian crossing road accident, turning off accidents ,turning on accident/cross accident , accident in lateral traffic etc all)..it is very easy to use an websites for all police case intimate officers time saving of police officer before only documents written handles and now send an ar[accident register ] copy to submit optimistic officer an lot of works so handle accident case investigations for only police case intimate officer using internet usage and large amount of data stored in head office files and then head office suggest to highway department maintained in a all road important place of hospitals and school and college to the speed breaker should put here and citizens not need to go police station to see the criminals information. They can directly see information on site visitor can easily get the information about the crime and criminal reduce the man power , and also reduce the time member can view the current status of the accident register report documents to saved to storage ..
3.2 PLANNING AND SCHEDULING
TABLE 1 PLANNING AND SCHEDULING
ACTIVITY DATES DURATION
FEASIBILITY STUDY DEC 28 TO JAN 1 1WEEK
PROJECT PROPOSAL JAN 2 TO JAN 8 1 WEEK
ANALYSIS JAN 9 TO 19 10 DAYS
DESIGN JAN 20 TO 27 1 WEEK
DEVELOPMENT JAN 28 TO FEB 8 10 DAYS
TESTING FEB10 TO FEB 17 1 WEEK
IMPLEMENTATION FEB 18 TO FEB 21 4 DAYS
DOCUMENTATION FEB 22 TO FEB 28 1 WEEK
3.3 SOFTWARE AND HARDWARE REQUIREMENTS
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
‘ Processor : Intel(R) core(Tm) i3-4005u CPU @1.70GHZ,
1701MHZ ,2core(s)
‘ Hard Disk : 120 GB.
‘ Input Devices : Keyboard, Mouse
‘ RAM : 4 GB.
SOFTWARE REQUIREMENTS:
‘ Operating system : Windows Family
‘ Coding Language : HTML,CSS,JAVASCRIPT,PHP
‘ Tool : DREAMWEAVER,NOTEPAD++
‘ Database : MYSQL
3.4 CONCEPTUAL MODELS
3.4.1 SYSTEM ARCHITECTURE
FIGURE 3.4 SYSTEM ARCHITECTURE
3.4.2 DATA FLOW DIAGRAMS
LEVEL DFD 1:
Accident Registered on doctor to police
FIGURE 3.5 DATA FLOW DIAGRAMS
LEVEL 2 DFD :
FIGURE 3.6 DATA FLOW DIAGRAMS
LEVEL 3 DFD:
FIGURE 3.7 DATA FLOW DIAGRAMS
3.4.3 E-R DIAGRAM
FIGURE 3.8 ENTITY RELATIONSHIP DIAGRAMS
CHAPTER 4
SYSTEM DESIGN
4.1 BASIC MODULES
ADMIN
Admin will be protected by username and password. Ordinary user of website will not be permitted to enter into the application. Admin can manage all record related to application that manage the crime detail.
REGISTRATION
New user can register in the system.
LOGIN MODULE
Using the username and password admin and all Member can login in the system and manage the application.
HOSPITAL MODULE
The peoples Are injury/accident an victim or patient through helpline to submitted Emergency Are any patient admit For Government Hospital for fully Case Intimate alert message For Limitation police peoples so Now Case Intimate start to Procedure And Write type systematically to send ARC- accident register Copy to submit an Head Office’
POLICE MODULE
The Hospitals doctors are registered for patient Announced message For limitation of police officers come to investigation started for fulfill all reports to generate a head office submit..
PATIENT INVESTIGATION
The New Patient to admitted on hospitals and they are some problems hit/injury an accident to police investigate a file to complaint actions to send an Head office store Road Accident Documents’..
REPORTS
ACCIDENT REGISTER REPORT
The Patient Are Injured an admitted hospitals and doctors for fulfilled the register documents to complaint actions for case Administrator officer are reports generated.
PLACE REPORT
The Current Place and date and time Reports to generated for a police place report
Drink and Drive Report
VEHICLE REPORT
The Vehicle are through put hit a vehicle for damaged vehicle to include a vehicle damaged to fulfilled the reports
CRIME REPORT
The All type of case include murder, kidnapping, hijacking etc.., In this type of case to handle all reports to investigate fulfill the acquits name crime to written document officers are generate a documents for reports
FIR REPORT
First Information Report (FIR) is a written document prepared by the police when they receive information about the commission of a cognizable offence. It is a report of information that reaches the police first in point of time and that is why it is called the First Information Report.
HEAD OFFICE TO ADMIN
ADMINISTRATORS MODULE
The module will be protected by user ID and password. Ordinary users of the software will not be permitted to enter into this area of the software. The module will be focusing on the maintenance like Master Data Maintenance, Removal of old and outdated data from the software etc.., The All reports to store for Head office to check an all documents and complaints to Add, Edit, Delete, Update, Search Record using Head office Admin
4.2 DATABASE DESIGN
TABLE 2. ACCIDENT TABLE
FIELD NAME DATA TYPE LENGTH CONSTRAINT
Hospital-Id Integer 11 Primary key
Name Varchar 11 Not Null
Place Name Varchar 50 Not Null
Address Varchar 50 Not Null
Contact Integer 11 Not Null
Hospital-Name Varchar 50 Not Null
Vehicle Varchar 50 Not Null
Pin code Integer 11 Not Null
TABLE 3. ADMIN TABLE
FIELD NAME DATA TYPE LENGTH CONSTRAINT
Hospital id varchar 50 Foreign key
Name varchar 50 Not null
Address varchar 150 Not null
Contact Integer 11 Not null
Password Varchar 150 Not null
Email varchar 50 Not null
Pin code Integer 11 Not null
TABLE 4. CRIME TABLE
FIELD NAME DATATYPE LENGTH KEY
Crime Id Integer 11 Primary key
Crime Name Varchar 50 Not Null
TABLE 5. CRIME REPORT TABLE
FIELD NAME DATATYPE LENGTH KEY
Id Integer 11 Foreign key
Name Varchar 50 Not Null
Date Of Birth Varchar 50 Not Null
Record Varchar 150 Not Null
Crime Name Varchar 150 Not Null
Place Name Varchar 150 Not Null
Description Varchar 150 Not Null
TABLE 6.DRINK AND DRIVE REPORT TABLE
FIELD NAME DATATYPE LENGTH KEY
D-Id Integer 11 Primary key
D-Name Varchar 50 Not Null
Address Varchar 50 Not Null
Contact Integer 150 Not Null
Vehicle no Varchar 150 Not Null
Vehicle Name Varchar 150 Not Null
Description Varchar 150 Not Null
Missing document Varchar 250 Not null
TABLE 7.DRINK TABLE
FIELD NAME DATATYPE LENGTH KEY
Drink Id Integer 11 Foreign key
Drinker Name Varchar 50 Not Null
TABLE 8.FIR REPORT
FIELD NAME DATA TYPE LENGTH KEY
f-id Varchar 50 Primary key
Name Integer 10 Not Null
Father Name Varchar 50 Not Null
Dob Varchar 50 Not Null
Addrees Varchar 250 Not Null
Crime name Varchar 50 Not Null
Place Varchar 50 Not Null
Description Varchar 250 Not Null
Image Varchar 50 Not Null
HEAD OFFICE TABLE
TABLE 9. POLICE LOGIN
FIELD NAME DATA TYPE LENGTH KEY
Admin-Id Integer 11 Primary key
Admin-Name Varchar 50 Not Null
Password Varchar 50 Not Null
TABLE 10. PLACE REPORT
FIELD NAME DATA TYPE LENGTH KEY
Place-id Integer 11 Primary key
Place-name Varchar 50 Not Null
Description Varchar 50 Not Null
4.3 USER INTERFACE DESIGN
User Interface Design is the design of user interfaces for machines and software, such as computers, background design of front end html, css, javascript, and validate an other required all field vaildation, with the focus on maximizing usability and the user experience. The goal of user interface design is to make the user’s interaction as simple and efficient as possible, in terms of accomplishing user goals (user-centered design). Good user interface design facilitates finishing the task at hand without drawing unnecessary attention to itself. Website design and new options are utilized to support its usability, influencing how the user performs certain interactions and improving the aesthetic appeal of the design; design aesthetics may enhance or detract from the ability of users to use the functions of the interface. The design process must balance technical functionality and visual elements to create a system that is not only operational but also usable and adaptable to changing user needs.
4.4 SECURITY ISSUES
The security issues are All reports to generate for a issues, documents stored for a issues and validation checking for issue to all solve the issues of this project’
4.5 Test Cases Design
A test case provides the description of inputs and their expected outputs to observe whether the software or a part of the software is working correctly. defines test case as ‘a set of input values, execution preconditions, expected results and execution post conditions, developed for a particular objective or test condition such as to exercise a particular program path or to verify compliance with a specific requirement.
TABLE 11.ADMIN TESTCASE DESIGN
No Test cases Case type Expected Result Actual Result Pass/Fail
1 Login 1.Invalid Username
2.Invalid Password The system will not accept the invalid username and throws error
The system will not accept the invalid password and throws error The system will not allow to login into the system
The system will not allow to login into the system Fail
Fail
2 Validation Test case 1.Require field validation Field should not be empty Users have to enter the value Pass Pass
TABLE 12. POLICE REGISTRATION
No Test cases Case type Expected Result Actual Result Pass/Fail
1 Editor Registration 1.Invalid Username
2.Invalid Password
3.Invalid Station The system will not accept the invalid username and throws error
The system will not accept the invalid password and throws error
The system will not accept the invalid station and throws error The system will not allow to register into the editor
The system will not allow to login into register editor
The system will not allow to login into register editor Fail
Fail
Fail
2 Validation Test case 1.Require field validation Field should not be empty Users have to enter the value Pass Pass
TABLE 13. HOSPITAL COMPLAINT REGISTRATION
No Test cases Case type Expected Result Actual Result Pass/Fail
1 Hospital Registration 1.Invalid Username
2.Invalid Password
3.Invalid Station name
4.Invalid victim Name
5.Invalid Area
6.Invalid Details
7.Description The system will not accept the invalid username and throws error
The system will not accept the invalid password and throws error
The system will not accept the invalid station and throws error
The system will not accept the invalid victim name and throws error
The system will not accept the invalid area and throws error
The system will not accept the invalid details throws error
The system will not accept the invalid description throws error The system will not allow to register into the editor
The system will not allow to login into register editor
The system will not allow to login into register editor
The system will not allow to hospital into register crime
The system will not allow to hospital into register crime
The system will not allow to hospital into register crime
The system will not allow to hospital into register crime Fail
Fail
Fail
Fail
Fail
Fail
Fail
2 Validation Test case 1.Require field validation Field should not be empty Users have to enter the value Pass Pass
TABLE 14. REPORTS GENERATOR REGISTRATION
No Test cases Case type Expected Result Actual Result Pass/Fail
1 Report Registration 1.Report No
2.Report event
3.Report Problem
4. vehicle report name
5.place report
6.Drink And Drive Details
7.Description The system will not accept the invalid username and throws error
The system will not accept the invalid report and throws error
The system will not accept the invalid report and throws error
The system will not accept the invalid vehicle name and throws error
The system will not accept the invalid place and throws error
The system will not accept the Drink & drive throws error
The system will not accept the invalid description throws error The system will not allow to register into the editor
The system will not allow to login into register editor
The system will not allow to login into register editor
The system will not allow to hospital into register crime
The system will not allow to hospital into register crime
The system will not allow to hospital into register crime
The system will not allow to hospital into register crime Fail
Fail
Fail
Fail
Fail
Fail
Fail
2 Validation Test case 1.Require field validation All Field should not be empty Users have to enter the value Pass Pass
CHAPTER 5
IMPLEMENTATION AND TESTING
5.1 IMPLEMENTATION APPROACHES
Implementation is the stage of the project where the theoretical design is turned into a working system. It can be considered to be the most crucial stage in achieving a successful new system gaining the users confidence that the new system will work and will be effective and accurate. It is primarily concerned with user training and documentation. Conversion usually takes place about the same time the user is being trained or later. Implementation simply means convening a new system design into operation, which is the process of converting a new revised system design into an operational one Implementation is the stage of the project where the theoretical design is tuned into a working system. At this stage the main work load, the greatest upheaval and the major impact on the existing system shifts to the user department. If the implementation is not carefully planned and controlled it can create chaos and confusion.
ADMIN PLAN
Admin will be protected by username and password. Ordinary user of website will not be permitted to enter into the application. Admin can manage all record related to application that manage the accident related data
REGISTRATION PLAN
New user can register in the system. Login plan Using the username and password admin and all Member can login in The system and manage the application.
DOCTOR REGISTER ON PATIENT
The Doctors are all Patient are coming to Ambulance and Vehicle to admitted on hospitals through check a doctors register for Accident case for limits of police officer announcement
INVESTIGATION POLICE
Health privacy legislation in some provinces/territories may require or allow custodians to disclose PHI related to a police investigation. It is generally a condition that the investigation be authorized by legislation, which would limit the type of police investigations in which disclosure is permissible or required. However, general information such as whether a patient is in the facility, the location of the patient in the facility and the general status of the patient (fair, poor, critical, etc.) can generally be disclosed, provided the patient does not object. Reporting the discharge of a patient to police is not contemplated or specifically permitted in the health privacy legislation. If employed, nurses who are approached during the course of a police investigation are encouraged to consult a privacy officer or manager who has authority to make such decisions on behalf of the health care establishment. Legal advice or intervention may be necessary to ascertain if the particular investigation is authorized by legislation or if the police request appears to be overreaching. Where disclosure is permitted but not required, employer policies generally provide guidance as to when and how disclosure is made.
HEAD OFFICE
The all reports are has established an online facility to share the documents pertaining to road accident cases with the motor accident claims tribunals and insurance companies. In a case, the Madras High Court last January directed the police department to submit detailed accident report (DAR) for all road accident cases before the respective claims tribunals and also to share the same with insurance companies, victims and accused .In compliance with the said order of the court, the has developed an online facility on the police website to share the documents pertaining to the cases. The objective is to help accident victims settle their claims quickly.
GENERATE REPORT
Generate a report. After you create a report in Management Reporter, you can generate it to various locations in the report library or a SharePoint site, or share it with others using Microsoft Excel or XPS. To generate a report, open the report definition and then click the Generate button in the toolbar. Click an head officer to need a specific particular documents to print a paper or save to pdf formation allow to computer drives memory..
5.2.1 Code Efficiency
Code efficiency is a broad term used to depict the reliability, speed and programming methodology used in developing codes for an application. Code efficiency is directly linked with algorithmic efficiency and the speed of runtime execution for software. It is the key element in ensuring high performance. The goal of code efficiency is to reduce resource consumption and completion time as much as possible with minimum risk to the business or operating environment.
5.3 TESTING APPROACH
A test plan implies a series of desired course of action to be followed in accomplishing various testing methods. The Test Plan acts as a blue print for the action that is to be followed. The software engineers create a computer program, its documentation and related data structures. The software developers is always responsible for testing the individual units of the programs, ensuring that each performs the function for which it was designed. There is an independent test group (ITG) which is to remove the inherent problems associated with letting the builder to test the thing that has been built. The specific objectives of testing should be stated in measurable terms. So that the mean time to failure, the cost to find and fix the defects, remaining defect density or frequency of occurrence and test work-hours per regression test all should be stated within the test plan.
The levels of testing include:
‘ Unit testing
‘ Integration Testing
‘ Data validation Testing
‘ Output Testing
5.3.1 UNIT TESTING
Unit testing focuses verification effort on the smallest unit of software design ‘ the software component or module. Using the component level design description as a guide, important control paths are tested to uncover errors within the boundary of the module. The relative complexity of tests and uncovered scope established for unit testing. The unit testing is white-box oriented, and step can be conducted in parallel for multiple components. The modular interface is tested to ensure that information properly flows into and out of the program unit under test. The local data structure is examined to ensure that data stored temporarily maintains its integrity during all steps in an algorithm’s execution. Boundary conditions are tested to ensure that all statements in a module have been executed at least once. Finally, all error handling paths are tested.
Tests of data flow across a module interface are required before any other test is initiated. If data do not enter and exit properly, all other tests are moot. Selective testing of execution paths is an essential task during the unit test. Good design dictates that error conditions be anticipated and error handling paths set up to reroute or cleanly terminate processing when an error does occur. Boundary testing is the last task of unit testing step. Software often fails at its boundaries. Unit testing was done in Sell-Soft System by treating each module as separate entity and testing each one of them with a wide spectrum of test inputs. Some flaws in the internal logic of the modules were found and were rectified.
5.3.2 INTEGRATION TESTING
Integration testing is systematic technique for constructing the program structure while at the same time conducting tests to uncover errors associated with interfacing. The objective is to take unit tested components and build a program structure that has been dictated by design. The entire program is tested as whole. Correction is difficult because isolation of causes is complicated by vast expanse of entire program. Once these errors are corrected, new ones appear and the process continues in a seemingly endless loop.
After unit testing in Sell-Soft System all the modules were integrated to test for any inconsistencies in the interfaces. Moreover differences in program structures were removed and a unique program structure was evolved.
5.3.3 VALIDATION TESTING OR SYSTEM TESTING
This is the final step in testing. In this the entire system was tested as a whole with all forms, code, modules and class modules. This form of testing is popularly known as Black Box testing or System tests. Black Box testing method focuses on the functional requirements of the software. That is, Black Box testing enables the software engineer to derive sets of input conditions that will fully exercise all functional requirements for a program.
Black Box testing attempts to find errors in the following categories; incorrect or missing functions, interface errors, errors in data structures or external data access, performance errors and initialization errors and termination errors.
5.3.4 VALIDATION CHECKING:
At the culmination of integration testing, software is completely assembled as a package; interfacing errors have been uncovered and corrected, and a final series of software test-validation checks may begin. Validation can be defined in many ways, but a simple definition (Albeit Harsh) is that validation succeeds when software functions in a manner that can be reasonably expected by a customer. Software validation is achieved through a series of black-box tests to be conducted and a test procedure defines specific test cases that will be used in attempt to uncover errors in conformity with requirements.
Both the plan and procedure are designed to ensure that all functional requirements are satisfied; all performance requirements are achieved; documentation is correct and human ‘Engineered and other requirements are met. Once the application was made free of all logical and interface errors , inputting dummy data to ensure that the software developed satisfied all the requirements of the user did validation checks .However , the data are created with the intent of determining whether the system will process them correctly . In the proposed system, if the clients click the send button after selecting a file from his file list, then the system will show the confirmation message for sending files. Similarly if a client makes an attempt to download a file from the server file list, then also the system will show the confirmation message for downloading. This is how the data validations were made in the proposed system.
5.4 MODIFICATIONS AND IMPROVEMENTS
The web portal for police accident case register and details to some previous project maker are some mistakes and not maintained for a websites and all rural case of handle to Limits of police officer but now to clear ideas and police need a report for Accident register report and Place report, Drink drive report, place report, Date and Time Report ,Fir Report, Crime report and fulfill an all required documents to submit a require documents to some modifications of the projects sent an Head office
Take Statements
Questioning and taking statements of witnesses and victims should be done at the scene. If this is not possible, statements should be taken as soon as possible at the hospital, police station or homes of those involved. Names, number and contact address of witnesses should be noted on the accident report. All parties should be separated when questioning them, but in a safe location like on the sidewalk, not in the roadway. Make sure the parties exchange names and phone numbers before leaving the accident scene.
Recording Observations
After gaining all the information possible from all persons involved in the accident, the investigator begins to examine the physical condition of the scene, and to record his observations
ARRIVAL AT THE SCENE
The following steps should be taken upon arrival at the scene of the accident. While enroute to the scene, the officer should obtain as much preliminary information as possible concerning the accident. Such information includes: Location ,Time of notification ,Who notified the officer and how ,Weather and visibility conditions ,General information as to seriousness of the accident–injuries, hit and run, amount of traffic congestion, etc. ,Whether or not additional support is proceeding to the scene, such as wrecker, ambulance, or additional Police patrols
CASE COMPLAINT
All type of case handled to limits of police officer with court order in a Head office..
CHAPTER 6
RESULTS AND DISCUSSION
6.1 TEST REPORTS SAMPLE INPUTS
LOGIN WINDOW
FIGURE 6.1 LOGIN
REGISTER WINDOW FOR NEW USER
FIGURE 6.2 REGISTER
HOMEPAGE
FIGURE 6.3 HOMEPAGE
DOCTOR REGISTER FOR PATIENT
FIGURE 6.4 DOCTOR REGISTER FOR PATIENT
DRINK AND DRIVE REPORT REGISTER
FIGURE 6.5 DRINK AND DRIVE REPORT
VEHICLE DAMAGE REGISTER REPORT
FIGURE 6.6 VEHICLE DAMAGE REGISTER REPORT
FIR REGISTER REPORT
FIGURE 6.7 FIR REGISTER REPORT
CONTACT US PAGE
FIGURE 6.8 CONTACT US
HEAD OFFICE FOR ADMINISTRATER
FIGURE 6.9 HEAD OFFICE FOR ADMINISTRATER
HOSPITAL RECORDS
FIGURE 6.10 HOSPITAL RECORDS
VIEW HOSPITAL REPORT PRINT METHOD
FIGURE 6.11 VIEW HOSPITAL REPORT PRINT METHOD
DELETE PARTICULAR USER
FIGURE 6.12 DELETE PARTICULAR USER
CRIME DETAILS
FIGURE 6.13 CRIME DETAILS
CRIME REPORTS DETAIL TO PRINT METHOD
FIGURE 6.14 CRIME REPORTS DETAIL TO PRINT METHOD
PLACE REPORT
FIGURE 6.15 PLACE REPORT
HOSPITAL PLACE REPORT FOR PRINT METHOD
FIGURE 6.16 HOSPITAL PLACE REPORT FOR PRINT METHOD
TRAFFIC ACCIDENT REPORT
FIGURE 6.17 TRAFFIC ACCIDENT REGISTER REPORT
VEHICLE ACCIDENT REGISTER PRINT METHOD
FIGURE 6.18 VEHICLE ACCIDENT REGISTER PRINT METHOD
6.2 USER DOCUMENTATION
User Documentation: Define the working of the software; explain its different functions, components with screen shots. The user document should provide all the details of your product in such a way that any user reading the manual, is able to understand the working and functionality of the document.
INVESTIGATE REPORT
Investigative reports is a form reports in which reporters deeply investigate a single topic of interest, such as serious crimes, political corruption, or corporate wrongdoing. An investigative journalist may spend months or years researching and preparing a report. Investigative reports is a primary source of information. Most investigative journalism is conducted by newspapers, wire services, and freelance journalists. Practitioners sometimes use the terms “watchdog reporting” or “accountability reporting”.
FIR REPORT
The Police are investigated to inputs for describe for a output A First Information Report (FIR) is a written document prepared by police organizations in countries like Bangladesh, India, and Pakistan when they receive information about the commission of a cognizable offence, or in Singapore when the police receives information about any criminal offence. It is generally a complaint lodged with the police by the victim of a cognizable offense or by someone on his or her behalf, but anyone can make such a report either orally or in writing to the police. Investigating work of the police starts after an FIR is recorded
For a non-cognizable offense a Community Service Register is created & registered.
FIR is an important document because it sets the process of criminal justice in motion. It is only after the FIR is registered in the police station that the police take up investigation of the case. Anyone who knows about the commission of a cognizable offence, including police officers, can file an FIR.
ACCIDENT REPORT
In a health care facility, such as a hospital, nursing home, or assisted living, an incident report or accident report is a form that is filled out in order to record details of an unusual event that occurs at the facility, such as an injury to a patient. The purpose of the incident report is to document the exact details of the occurrence while they are fresh in the minds of those who witnessed the event. This information may be useful in the future when dealing with liability issues stemming from the incident.
Generally, according to health care guidelines, the report must be filled out as soon as possible following the incident (but after the situation has been stabilized). This way, the details written in the report are as accurate as possible. Most incident reports that are written involve accidents with patients, such as patient falls. But most facilities will also document an incident in which a staff member or visitor is injured. In the event that an incident involves a patient, the patient will often be monitored for a period of time following the incident (for it may happen again), which may include taking vital signs regularly.
CHAPTER 7
7.1 CONCLUSION
An accident, also known as an unintentional injury, is an undesirable, incidental, and unplanned event that could have been prevented had circumstances leading up to the accident been recognized, and acted upon, prior to its occurrence. Most scientists who study unintentional injury avoid using the term “accident” and focus on factors that increase risk of severe injury and that reduce injury incidence and severity All criminal records are stored in a file. to add any new record ,record file is used when other police station require any criminal information at that time they need to call that police station There are many drawbacks like time consuming, require more man power Citizens cannot get the information and the current status of the criminals of all city. Citizens not need to go police station to see the criminal’s information. The can directly see information on site. Visitor can easily get the information about the crime and criminal. Reduce man power, and also reduce the time Member can view the current status of the criminal.
‘ Citizens not need to go police station to see the criminal’s information. they can
Directly see information on site.
‘ The Police officer can easily search the records of any police station through the
System.
‘ User can search crime according to city, crime type and year.
‘ User can view graph of particular crime and city.
‘ Police officers can easily get the information about the crime and criminal.
‘ Location of the Patrol Vehicle
‘ The police vehicle should be positioned so as not to cause further traffic congestion or accidents. If necessary, it may, however, be used as a roadblock. At night it should be parked so the headlights illuminate the entire scene. At all times the emergency lights should be on to warn approaching motorists of the hazard.
‘ Care for injured and protect the scene
‘ The investigators should determine the extent of injuries, if any, to accident victims; render first aid; and request medical assistance, if necessary. Severely injured persons should not be moved, except to preserve their safety. The position of all victims should be noted for report purposes and, if on the road, the positions
‘ Moving Vehicle And Marking Wheels
‘ The decision to move a vehicle from its final position must often be made by the police patrol arriving at the scene. When this is done, the positions of the wheels should be marked on the ground so they can be relocated for investigative purposes. Under the following conditions, a vehicle must be moved immediately when an injured person is trapped in the wreckage and cannot be treated there When a person is trapped in wreckage near burning material, or an area of potential fire hazard When a vehicle position is an immediate hazard to oncoming traffic and adequate traffic control cannot be established.
‘ Identify and Preserve Fragile Evidence
‘ Any fragile evidence that can be damaged, altered, destroyed or removed from the scene by any willful or negligent act must be identified and secured. Prior to removal, its position should be noted, sketched, photographed and/or marked in chalk. Examples of such evidence are puddles of gasoline, oil, blood or pieces of broken glass. The position of turn signal levers should be checked; although this is not a positive indicator of whether a turn signal was in use it can be helpful. Alcoholic beverage containers inside a vehicle should also be secured. Evidence should be tagged, marked, and secured in accordance with proper evidence gathering procedures prior to its removal from the scene..
ACCIDENT ANALYSIS
Is carried out in order to determine the cause or causes of an accident (that can result in single or multiple outcomes) so as to prevent further accidents of a similar kind. It is part of accident investigation or incident investigation. These analyses may be performed by a range of experts, including forensic scientists, forensic engineers or health and safety advisers. Accident investigators, particularly those in the aircraft industry, are colloquially known as “tin-kickers” Health and Safety and patient safety professionals prefer using the term “incident” in place of the term “accident”. Its retrospective nature means that accident analysis is primarily an exercise of directed explanation.
7.2 LIMITATIONS OF THE SYSTEM
When a statute of limitations expires in a criminal case, the courts no longer have jurisdiction. Most crimes that have statutes of limitations are distinguished from serious crimes as these may be brought at any time .In civil law systems, similar provisions are typically part of their civil or criminal codes and known collectively as periods of prescription. The cause of action dictates the statute of limitations, which can be reduced (or extended) to ensure a fair trial. The intention of these laws is to facilitate resolution within a “reasonable” length of time. What period of time is considered “reasonable” varies from country to country, and within countries such as the United States from state to state. Within countries and states, the statute of limitations may vary from one civil or criminal action to another. Some nations have no statute of limitations what so ever..
7.3 FUTURE SCOPE OF THE PROJECT DESCRIBES TWO THINGS
1. The Entire Project as very systematically project for use limits of police officer for public safety to all reports and documents to store a head office.
2. It is use of for police officer because time saving, and easily through use for websites.
3. Citizens not need to go police station to see the criminals information they can directly see information on site
4. Visitor can easily get the information about the crime and criminal.
5. Reduce the man power, and also reduce the time.
6. Member can view the current status of the criminal.
7. In future system will provide mail facility to editors.
8. Editors can send mail to’ other stations editor.
9. In future system will allow user to register complains online.
10. In future system will provide facility to send message
7.4 REFERENCES
1. Mr.Sanjay kumar singh,Ashish Misra,’Coimbatore Rural Traffic Crash Research Project ‘published an 1993 (jp research india pvt ltd
2. Mr,Maheshkumar Agarwal ‘Citizen Portal ‘ published in 2016( Designed And developed by NIC)
3. Vandna Sunder, AshishMathur,’Citizen Portal For Accident Case Register and details ‘HCL Technologies the published in 2013
4. Misra and Ashish Khan Arup(2001),’Accident Analysis’, A case Of Mumbai, Centre Road safety, Central Institute of road Transport’
5. Ghee .c,silcock.D Astrop.A, and Jacobs G.D ‘Road Accident develpement in counries ‘ TRL Transport research Laboratory,crowthrone’
6. Report Of the Committee on Road Accidents (1998) Published for Government of Andhra Pradesh,Hyderabad
7. Ramasammy .N (2001)’Accident Analysis Of Chennai city For road Safety’
8. Jacobs G.D(1995)’Road safety in developing world’ ,Transport Research Laboratory crowthrone,United kingdom
9. Sayer I.A and Downing A.J(1996)’pedestrian Accident And Road Safety Project Developing Countires’
BIBLIOGRAPHY
http://www.keralapolice.org/
http://www.phptpoints.com
http://www.tnpolice.gov.in/CCTNSNICSDC/Index?

Now You Can Report Crime, Municipal Issues & More, Anonymously, with This Mobile App


http://www.keralapolice.org/public-information/e-services/search-fir
http://old.keralapolice.gov.in/newsite/e_projects.html
 

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, System for linking police incidents and the hospital. Available from:<https://www.essaysauce.com/information-technology-essays/18140/> [Accessed 19-12-24].

These Information technology essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.