Project Document - Sample PDF
Project Document - Sample PDF
Project Report
By
Name
Register Number
Guide Name
JUNE 2022
1
CERTIFICATE
By
Name
Register Number
For the partial fulfillment for the award of degree of
Is a bona-fide record of work carried out by her under my guidance and Supervision.
Date:
1.
2.
2
ACKNOWLEDGEMENT
At the very outset I offer my sincere thanks to Almighty God for the grace and blessings
that made me to complete the project in a successful manner.
I would also like to thank my second god my parents and my friends gave me this life and
guiding all my way to success.
I place a record of my deep gratitude to Rev. Dr . K.A. MARIA AROKIA RAJ SDB,
Additional Principal, Sacred Heart College Tirupattur, for sharing his expertise in various
fields.
3
TABLE OF CONTENT
4
Software Testing
Test Cases
Summary
6 Future Enhancement
7 Conclusion
8 References
Appendices
9 Source Code
User Interface Design
5
Abstract:
Normally the Indian laws with section wise can‟t be understood by all. Even the lawyers and
judges have to struggle to find the judgment for the previous cases which is similar to the
current cases. If they know the judgment details of the cases then easily they can make an
argument on the cases to find the good result within short period.
This system will help to the people to know ongoing process of their cases and
judgment details to the lawyers and judges. Even the details of the case entry will help to the
The main objectives of this system is used to view the Indian Judicial cases like civil,
criminal, cyber crime cases etc. regarding this the students, professionals, and General public
can rectify their doubts regarding the cases what they needed .So this application is provide
information as in the form of sample cases like finished case or ongoing sample cases .By use
This system considers the various users and developed. Depends on the user type the
functionality will be differed. For the professionals and the students this system is used for
the reference purpose. For the general users it is used to give some idea about the judicial
cases and also they can view their personal case details instead meeting their advocate each
time to know their case status. This system will be user friendly.
6
1. INTRODUCTION
1.1 Project Overview
Purpose:
Maintaining various case details in court. This system has two aspects. One is, it can be used
in magistrate court and the other one is this system can also be used for the advocate for his
own reference and his trainee students and clients.
Scope:
The main objectives of this system is used to view the Indian Judicial cases like civil, criminal, cyber
crime cases etc. regarding this the students, professionals, and General public can rectify their doubts
regarding the cases what they needed .So this application is provide information as in the form of
sample cases like finished case or ongoing sample cases .By use of this they can be benefited.
The interaction may be done through this system by only in the form of oral.
aims to:
This system is very convenient one for interacting the queries regarding Indian law
cases.
7
1.4 Problem Statement
1.6 Summary
The chapter describes the problem statement, existing work and proposed work.
8
2. SYSTEM REQUIREMENT SPECIFICATION
2.1 Introduction
Systems Study is the analysis of sets of interacting entities, including computer systems
analysis. This field is closely related to requirements analysis. The development of a
computer-based information system includes a systems analysis phase which produces or
enhances the data model which itself is a precursor to creating or enhancing a database. There
are a number of different approaches to system analysis. When a computer-based information
system is developed, systems analysis (according to the Waterfall model) would constitute
the following steps:
Another view outlines a phased approach to the process. This approach breaks systems
analysis into 5 phases:
Scope Definition
Problem analysis
Requirements analysis
Logical design
Decision analysis
Use cases are a widely used systems analysis modeling tool for identifying and expressing the
functional requirements of a system. Each use case is a business scenario or event for which
the system must provide a defined response. Use cases evolved out of object-oriented
analysis; however, their use as a modeling tool has become common in many other
methodologies for system analysis and design.
9
2.2. Software Requirements
The configuration of the software used in the design of the system is listed below.
Language : JSP
10
system requested is feasible. The Youth for Social Responsibility is application used for
website. The existing system of website process is very slow and to maintain the documents
manually in note books.
This is offline application and single user application
Scope
An important outcome of the preliminary investigation is the affirmation that system
requested is feasible. The three types of feasibility studies which helped me to identity the
solutions are stated below:
Technical Feasibility
Economical Feasibility
Operational Feasibility
Technical Feasibility
In order to identity whether it is technical feasible, technology platform, supporting software
and tools ad work area have to be given the first priority. Further, this system requires the
duration of three months to complete.
The objectives of new tool are to maximum scalability and security of the business
application.
And the feasibility study resulted in „yes‟ for the following question:
The result „yes‟ to the above questions and the proposed system requires the duration of six
months to complete.
Economic Feasibility
The website owners must buy the software and hardware which are required; no initial cost
regarding that is incurred.
11
Operational Feasibility
The system is developed using the front-end that is used that case coding, as it is more a web
application rather than giving much concentration on network and their implementations.
Backend requires having capability to store Data.
Thus economically and technically the new system tool is feasible. The operational feasibility
is to take into consideration of the user‟s acceptance of the system. Any new system,
especially a monitoring system, can result in users going against it since they may feel that it
intruders into their privacy. However, properly specifying the merits of system can help
overcome the initial rejection.
Summary
This chapter concludes with the summary and objectives of the project. The next chapter
describes the requirements analysis of the project.
12
3. SYSTEM ANALYSIS AND DESIGN
3.1 Introduction
This chapter describes the modules that are implemented in the software with UML diagrams
Modules:
Reports Generation
1) Searching by case No
3) Searching by keyword
4) Searching by judge
5) Searching by lawyer
6) Searching by date
Module Specification:
Purpose:
13
This module is used to register the case details or add new case details.
Overview:
This module is used to enter the whole details regarding the case. It is
accessed by the admin.
Responsible:
The admin
Entry Criteria:
Input:
Case type, Plaintiff, no of witness, place, time, date, culprit, address, phone
no, lawyer name, and case hearing details
Steps involved:
Exit Criteria:
Output:
This is used to track the details of the cases history very easier.
Purpose:
This module is used to know the details of lawyer, who is handling the
case and also see the judgment details of the cases and who all the judges for
the case are.
Responsible:
The lawyer
Input:
14
Entry criteria:
Exit criteria:
Output:
This could be useful to the user those who are searching the lawyer
Purpose:
This module is used to view details of the witness
Responsible:
The admin
Input:
WID, Case no, case status, witness no, witness name, Intro, confession, date
Entry Criteria:
Exit criteria:
Output:
Purpose:
Regarding the cases the day-to-day Updating will be done.
Responsible:
The Admin
Input:
HID, case no, date hearing, activities, judge notification, next hearing
Entry criteria:
15
Here the admin will update the ongoing cases hearing details and also
already finished cases hearing details.
Exit criteria:
Output:
Purpose:
In this module the process of changing the ongoing cases into finished cases
and vice versa.
Responsible:
The admin
Input:
Case no, case type, judicial area, district, defendant, plaintiff, file under sec, fir
no, case desc, attorney, plaintiff counsel, defendant counsel, judge, judgment
date, judgment desc, no. of witness, keyword, case Added on
Entry criteria:
The case details for ongoing and finished case are entered clearly
Exit criteria:
Output:
Purpose:
Here the admin will upload the case details time by time. So he will track the
cases detail very closely and also judgment details that should be uploaded.
Responsible:
The admin
Input:
16
Case no, case type, judicial area, district, defendant, plaintiff, file under sec, fir
no, case desc, attorney, plaintiff counsel, defendant counsel, judge, judgment
date, judgment desc, no. of witness
Entry Criteria:
Case is selected by using case no and the required fields are uploaded
Exit criteria:
Output:
Reports Generation :
Purpose:
This process is used to search the cases from the case lists
Responsible:
The Admin
Input:
Entry criteria:
Reports can be viewed by searching case by no, type, date, lawyer, judgment
Exit criteria:
Output:
17
login
register
admin professional
view reports
18
login
register
general user
student
View Case Details Admin and users can view the case details
View lawyer and judge details User case view admin and lawyers details
19
3.4 Data Flow Diagram
20
3.6 Class Diagram
Student
-id : char
CaseDetails
-name : char
-uname : char -caseno : char
-password : char *..* -casetype : char
-email : char -date : Date
-phno : char -hearingdate : char
-univ : char -plaintiff : char
-witness : char
1..* +view()
-plaintiffcounsel : char
+update()
-defendantcounsel : char
+logout()
Admin -judge : char
-ID : char 1..* -judgement : char
-uname : char -status : char
-password : char Professional -nexthearing : char
-secretQuestion : char -judicialarea : char
-LID : char
-secretAnswer : char 1..* -address : char
-name : char
-district : char
+login() -uname : char
+register() -password : char *..* +finishedcase()
+logout() -address : char +ongoingcase()
-phno : char +hearing()
-univ : char +update()
1..* +add()
+view()
+view()
+update()
+logout()
+logout()
GeneralUser
-Id : char
-uname : char *..*
-password : char
+view()
+update()
+logout()
21
3.7 Sequence Diagram
Admin
admin:login judicial
admin : admin
login()
conformation
register()
add()
view()
update()
delete()
logout()
rofessional:
login()
conformation
register()
add()
view()
update()
logout()
22
Student:
student:
student :
login
student login()
judicial
conformation
register()
view()
update()
logout()
General User:
general user :
general user
general judicial
user : login
login()
conformation
register()
add()
view()
update()
logout()
23
3.8 Component Diagram
User
Home Page
Case Details
Login
Report
24
3.9 Deployment Diagram
<<Device>>
Maintaing witness's details <<Database
: Browser
>> : MS
SQL
Making ongoing case as finished case
Report generation
25
3.10 E-R Diagram
3.9
Password College
Password Address Degree
User
Name
name
Ma Phno
Email in t
a in s
Case Case s
Case no fer Email
Phone Type Status Re
no
Hearing
Judicial
area
Date Cases
Defendant
Maintains
Refers
Judgement
Judge Lawyer
Plaintiff
name name
ew
Re
Vi
fe
rs
Name Name
Uname Password
General user Refers Professional
Password
Phno
Gender
Address
Phno Email
Email
DOB
Address
Position
Database design is necessary to group the given data and to give them a logical
structure. The overall objective in the development of a database is to treat data as an
organizational resource and as an integrated whole.
26
tables, which in turn are composed of rows, also known as records, and columns also known
as fields. The System has six tables that can be described as follows.
All these tables are in the normalized form, so that there may not arise any problem of
consistency and integrity.
Login:
50
FirstName Text Primary Key
50
LastName Text _
25
Password Text _
255 _
Address Text
50 _
State Text
50 _
City Text
_ _
Pincode Long
Student Details
27
Application No Text 5 _
Email Id Text 50 _
Roll No Text 10 _
Meeting Schedule:
8
Date Date _
25 _
Time Text
30 _
Place Text
30 _
Contact Person Text
15 _
Contact Person Text
Phone Number
30 _
Prepared By Text
Attendance :
28
20
Regno Text _
50 _
Name Text
10 _
Course Text
2 _
Dept Integer
8 _
DOA Date with Time
10 _
Status Text
Plan Saplings:
8
Date Date _
25 _
Time Text
30 _
Place Text
30 _
Responsible Person Text
30 _
Sapling Name Text
20 _
Types Text
_ _
Total Saplings Long
Sponsor Details
Email Text 25 _
29
Sponsored Amount Long _ _
Collected By Text 30 _
FeedBack:
50
Name Text _
255 _
Address Text
50 _
E-Mail Id Text
255 _
Feedback Text
3.12 Summary
30
4. SYSTEM IMPLEMENTATION
4.1 Development Environment
4.1.1. Development Environment:
The development environment is essential for the development of any software tool.
Suitable selection of hardware and software not only reduces development time but also
ensures product success.
The hardware and software used for Judicial Biographical System development are discussed
in length below.
4.1.2. Implementation:
Implementation of Judicial Biographic System was done using the JSP language.
Each and every module can be run independently and also in a sequence starting from the
first module until the last. Once installed, applications are often used for many years without
any problems. However, both the company and the users will change, and the environment
will be different over months and years. Modifications and changes will be made to software
files or procedures to meet emerging user requirements.
This Integrated Software System was designed and developed based on the Iteration
Model. This model particularly expresses the interaction between subsequent phases. Testing
software is not an activity, which strictly follows the implementation phase. In each phase of
the software development process, the results obtained against that which is required was
compared. In all phases quality has to be assessed and controlled.
31
Requirements Analysis
System Testing
. System testing is a critical element of software quality assurance and represents the ultimate
review of specification, design, and coding
32
Testing Objectives
1. Testing is a process of executing a program with the intent of finding an error.
2. A good test case is one that has a high probability of finding an as-yet un discovered
error.
3. A successful test is one that uncovers an as-yet-undiscovered error.
4. The objective is to design tests that systematically uncover different classes of errors
and do so with a minimum amount of time and effort. If testing is conducted
successfully, it will uncover errors in the software. As a secondary benefit, testing
demonstrates that software functions appear to be working according to specification
and that performance requirements appear to have been met. In addition, data
collected as testing is conducted provides a good indication of software reliability and
some indication of software quality as a whole.
Testing Principles
The following are the set of testing principles
Unit Testing
Unit testing focuses verification effort on the smallest unit of software design-the module.
Using the procedural design description as a guide, important control paths are tested to
uncover errors within the boundary of the module. The relative complexity of tests and
uncovered errors is limited by the constrained scope established for unit testing. The unit test
is normally white-box oriented, and the step can be conducted in parallel for multiple
modules.
Integrated Testing
33
Integration testing is a systematic technique for constructing the program structure while
conducting tests to uncover errors associated with interfacing. The objective is to take unit
tested modules and build a program structure that has been dictated by design.
There is often a tendency to attempt non-incremental integration; that is, to construct the
program using a “big bang” approach. All modules are combined in advance. The entire
program is tested as a whole. A set of errors encountered. Correction is difficult because
isolation of causes is complicated by the vast expanse of the entire program. Once these
errors are corrected, new ones appear and the process continues in a seemingly endless loop.
Incremental Integration is the antithesis of the big bang approach. The program is constructed
and tested in small segments, where errors are easier to isolate and correct; interfaces are
more likely to be tested completely; and a systematic test approach may be applied.
Initially, the login screen was tested. If both the user-id and the password values are entered
properly, the values will be checked with the database and it will go to the produce available
screen. If the values are not given either for the user id or for the password , or for the both, it
will show the error. If the user-id or password is invalid, the screen will be refreshed and
again it will ask for the both. The other operations sign up for the new user and the forget
password also tested. The sign me up form will be shown to the new user if that person clicks
the particular string from the index page. Then the new user has to fill the details in that form.
In this some of the fields are mentioned with the „*‟ symbol. That all fields should be filled.
Otherwise the submission of user details will not be accepted.
In the sign me up form, after every detail has been filled up properly, the user has to submit
his details. Then the details are checked with the database .If the user-id with that same name
already exists, then the system will ask for a new user-id. If the problem doesn‟t arise, it will
accept the new user details and store in the database. Then the user will be given the user-id
with that password.
34
The forget password also made to test. If the user failed to remember the password, then this
option will help the user to retrieve back the password. The user has to click the forget
password string from the index page. Then the user will be given some clues to retrieve the
password. That is, the user will be given an option to type the date of birth. If it is the user‟s
password, then the password will be checked with the database and it will return the true
message to the user. Otherwise the user has to go for some other attempts.
All the above-mentioned factors from the index page were tested with the validations. The
factors produced the best result when it was separate. The same result was given when they
were tested along with the whole process.
When the modules tested individually, they produced a good result. The result was better
when the whole process was tested. The whole process didn‟t make any problem when it was
tested. The level by level links, the validations for every module, and the whole process came
with a best result. Thus the whole process was tested.
Purpose
The purpose of this document is to provide the test case specification for the use
cases.
Scope
Overview
This software contains the test case specification for the various use cases. It's
identified in the software requirement specification (SRS).
35
TC 01 Empty username, Empty username, Fields should not Pass
password, password, confirm be empty
password, address
confirm password,
and contact number
address and contact
given by user
number.
36
TC 06 Invalid contact number An invalid Contact number Pass
and valid first name, last contact number field should be
name, id, password, provided by in specified
confirm password and user. format.
address.
37
Description. in specified
format.
Summary
This System implementation, listed in detail on the hardware, software requirement and
during development. Other than that, it more importantly touched on the implementation of
Judicial Biographic System.
38
5. Future Enhancement
We can make the application specific to the user with valid id to communicate with
the application.
A post back comment session can also be added to view and service the user problems
to make our application more users friendly.
39
6. Conclusion:
This project has been successfully developed according to the user requirement.
The system produces accurate result and it also reduces a lot of overheads, which the
manual system faced.
The system was thoroughly tested according to the testing methodology.
This will save time in viewing the data when large numbers of users are connected to
the system.
7. It‟s an efficient, accurate, and distributed metadata-oriented scheme is required to
leverage the overall performance in large distributed storage systems.
40
References
41
http://www.google.co.in/url?sa=t&rct=j&q=project%20deployment%20report%20&s
ource=web&cd=3&cad=rja&ved=0CDoQFjAC&url=https%3A%2F%2Fptop.only.wip.la%3A443%2Fhttp%2Fportal.hud.go
v%2Fhudportal%2Fdocuments%2Fhuddoc%3Fid%3Dpostdep-
temp2.docx&ei=e8BuUcrqCIyIrAezrIGYAg&usg=AFQjCNG0GycwwHWZy6Rvagc
jFVuHhQtaZA&bvm=bv.45368065,d.bmk
http://www.lawadiv.com/index.php?show=e-munshi
http://www.advocatekhoj.com/index.php
http://research.cs.queensu.ca/~shepard/testing.dir/under.construction/tool_list.html
https://sw.thecsiac.com/databases/url/key/2399/8547
http://jakarta.apache.org/cactus/getting_started.html
http://www.tutorialspoint.com/more.htm
42
APPENDIX
A. UI Design:
43
44
45
B. SOURCE CODE:
html>
<head>
<style type="text/css">
<!--
body
background-image: url("img1.jpg");
background-repeat: no-repeat;
</style>
<script language="JavaScript">
46
function Validate(){
var docF=document.f1;
if(docF.UName.value==""){
docF.UName.focus();
return false;
if(docF.Pass.value==""){
docF.Pass.focus();
return false;
return true;
</script>
</head>
<tr> </tr>
</table>
<p> </p>
<tr>
47
<th width="645" rowspan="6" align="left" valign="top"
scope="row"><p><img src="images/img2.jpg" width="306" height="276"></p>
</th>
</tr><tr>
</font></div></td>
</tr><tr>
</font></div></td>
</tr> <tr>
</font></div></th>
48
</font></div></th>
</tr>
<tr>
<div align="right"></div></th>
</tr>
<tr>
<div align="left"></div></th>
</tr>
</tr>
</tr>
</table>
<p> </p>
</th>
49
</tr>
</table>
</form>
</body>
</html>
50
C. User Manual:
Description:
This is login form from which is used to allow the authorized user to access the
system.
Description:
This form is used to register the details if the member is new to access the system.
Description:
52
Description:
This form is used to edit the existing case details as per need.
Description:
53
Description:
Description:
54
Description:
This form is used to search the case details by giving its number.
Description:
55
Description:
56