Lawsystem PDF
Lawsystem PDF
Lawsystem PDF
CHAPTER 1
INTRODUCTION
1.1 AN OVERVIEW
The project entitled “Online Law System” is a software system that contains all the laws
of IPC so that people can come and search for the laws for respective crime. Law seeking
approach in major or minor conflicts is very old practice. Sometimes people approach
law courts in minor daily life issues or problems. This makes tons of cases at court and
major issues get pending / delayed or take too much time for hearing. The technology
introduces many software applications and systems to ease human life. The other reason
that society needs this system is that most people are unaware of the laws implemented
by the government. Therefore to create awareness among people / society about the laws
that listed in constitution against different crimes so people can register against these
crimes. The project has been developed with PHP as the Front End and MySQL as the
Back End.
The aim of the proposed project is to facilitate people to consult court easily,
approachable and timesaving mode for their daily life issues or cases. This project is a
software system that contains all the laws of IPC so that people can come and search for
the law for respective crime. The laws are categorized into different sections according to
some keywords. There is also search option available where user can find or search
according to his requirement by entering his query. There is also a facility available for
users to get contact of lawyers. They know about the intensity of different crimes, the
punishments against different crimes. The users can find these details as well able to
report crimes in most instant and effective manner.
MCA@SNIT Page 1
ONLINE LAW SYSTEM
1.3 MODULES
Admin module
User module
Lawyer module
Police module
The administrator do overall control of the system. If your user name and password is
matching with administrator’s user id and password, then you will enter in to the site as
administrator.
Court Entry
Description: Add courts
Lawyer Entry
Law Entry
Police Entry
The user is the one who uses the site. If your user name and password is matching with user’s
user name and password, then you will enter in to the site as user.
MCA@SNIT Page 2
ONLINE LAW SYSTEM
Court Search
Law Search
Lawyer Search
Description: Users can search lawyer based on their specialization and lawyer
name.
Criminal Search
Description: User can search criminal based on criminal name and crime type.
Add Case
Description: Users can give complaint to police officials and after complaint
approval users can upload photo, sign and ID card.
The lawyer is the one who uses the site. If your user name and password is matching with
lawyer’s user name and password, then you will enter in to the site as lawyer.
Appointment
Chat
Description: Can chat with the users who have take appointment.
MCA@SNIT Page 3
ONLINE LAW SYSTEM
The Police the one who uses the site .If your user name and password is matching with
police’s user name and password, then you will enter in to the site as police.
View case
Description: Can view the complaints given by the users and can accept or
reject complaint after checking and can upload final FIR report.
Add Criminals
MCA@SNIT Page 4
ONLINE LAW SYSTEM
CHAPTER 2
REQUIREMENT SPECIFICATION
2.1 INTRODUCTION:
To be used efficiently, all computer software needs certain hardware components or the other
software resources to be present on a computer. These pre-requisites are known as (computer)
system requirements and are often used as a guideline as opposed to an absolute rule. Most
software defines two sets of system requirements: minimum and recommended. With
increasing demand for higher processing power and resources in newer versions of software,
system requirements tend to increase over time. Industry analysts suggest that this trend plays
a bigger part in driving upgrades to existing computer systems than technological
advancements.
The most common set of requirements defined by any operating system or software
application is the physical computer resources, also known as hardware. A hardware
requirements list is often accompanied by a hardware compatibility list (HCL), especially in
case of operating systems. An HCL lists tested, compatibility and sometimes incompatible
hardware devices for a particular operating system or application. The following sub-sections
discuss the various aspects of hardware requirements.
Processor : x386/32-bit
Software Requirements deal with defining software resource requirements and pre-requisites
that need to be installed on a computer to provide optimal functioning of an application.
These requirements or pre-requisites are generally not included in the software installation
package and need to be installed separately before the software is installed.
MCA@SNIT Page 5
ONLINE LAW SYSTEM
MCA@SNIT Page 6
ONLINE LAW SYSTEM
CHAPTER 3
ANALYSIS
3.1 EXISTING SYSTEM
Existing system of law and justice is opaque and uncountable. The biggest hurdle is that the
people are not aware about their rights and legal remedies available for them. In many
circumstances, cases against criminals or certain individuals are not accepted and many cases
left pending even after decades the crime has occurred.
Proposed system aims to make the citizen aware about the kind of laws available under the
constitution. An individual can login to the web site and get to see all the laws of IPC. The
contacts of the lawyers are also available. Even individual can register a case online which is
directly sent to the station authority. Web site is also responsible to keep a track of all the
cases added.
MCA@SNIT Page 7
ONLINE LAW SYSTEM
the operations and management, marketing research and policies, financial data, legal
requirements and tax obligations. Generally studies precede technical development and
project implementation. :
The feasibility study to be conducted for this project involves.
1. Technical Feasibility
2. Operational Feasibility
3. Economic Feasibility
Operational analysis is the most frequently used method for evaluating the effectiveness of a
new system. More commonly known as cost/benefit analysis, the procedure is to determine
the benefits and saving that are expected from a candidate system and compare them with
costs. If benefits outweigh costs, then the decision is made to design and implement the
system. An entrepreneur must accurately weigh the cost versus benefits before taking an
action. Cost-based study: It is important to identify cost and benefit factors, which can be
categorized as follows:
1. Development costs.
2. Operating costs.
This is an analysis of the costs to be incurred in the system and benefits derivable out of the
system. Time-based study: This is an analysis of the time required to achieve a return on
investments the future value of a project is also a factor. The system is operationally feasible.
MCA@SNIT Page 8
ONLINE LAW SYSTEM
In case of new project, financial viability can be judged on the following parameters:
3.4.1 HTML:
HTML is written in the form of HTML elements consisting of tags enclosed in angle
brackets (like <html>). HTML tags most commonly come in pairs like <h1> and </h1>,
although some tags represent empty elements and so are unpaired, for example <img>. The
first tag in a pair is the start tag, and the second tag is the end tag (they are also
called opening tags and closing tags). Though not always necessary, it is best practice to
append a slash to tags which are not paired with a closing tag.
The purpose of a web browser is to read HTML documents and compose them into visible or
audible web pages. The browser does not display the HTML tags, but uses the tags to
interpret the content of the page. HTML describes the structure of a website
semantically along with cues for presentation, making it a markup language rather than
a programming language.
HTML elements form the building blocks of all websites. HTML allows images and
objects to be embedded and can be used to create interactive forms. It provides a means to
create structured documents by denoting structural semantics for text such as headings,
paragraphs, lists, links, quotes and other items. It can embed scripts written in languages such
as JavaScript which affect the behavior of HTML web pages.
MCA@SNIT Page 9
ONLINE LAW SYSTEM
3.4.2 MySQL:
Features of MySQL:
Tested with Purify (a commercial memory leakage detector) as well as with Val grind, a
GPL tool.
Uses multi-layered server design with independent modules. Security:
A privilege and password system that is very flexible and secure, and that enables host-based
verification.
Password security by encryption of all password traffic when you connect to a server.
Support for large databases. We use MySQL Server with databases that contain 50 million
records. We also know of users who use MySQL Server with 200,000 tables and about
5,000,000,000 rows.
Support for up to 64 indexes per table (32 before MySQL 4.1.2). Each index may consist of
MCA@SNIT Page 10
ONLINE LAW SYSTEM
Connectivity:
On Windows systems in the NT family (NT, 2000, XP, 2003, or Vista), clients can
connect using named pipes if the server is started with the --enable-named-
pipe option. In MySQL 4.1 and higher, Windows servers also support shared-
memory connections if started with the --shared-memory option. Clients can
connect through shared memory by using the --protocol=memory option.
On UNIX systems, clients can connect using Unix domain socket files.
Localization:
MCA@SNIT Page 11
ONLINE LAW SYSTEM
web developers to write dynamically generated web pages quickly. One of the most
important factors driving PHP’s popularity over the last couple of years has been its support
for a variety of databases, including MySQL, Oracle, and Microsoft Access. One of the most
powerful combinations in the open source arena today is the PHP/ MySQL combination. Like
PHP, MySQL has open-source roots: it is a fast and reliable database management system
that is rapidly acquiring a worldwide user base. By using PHP and MySQL together, users
can benefit from the cost savings that accompany community-driven software, and also
leverage off the immense number of freely available PHP/MySQL applications to reduce
development time.
Typically, PHP code is embedded inside a regular HTML document, and is recognized and
executed by the web server when the document is requested through a browser. Because PHP
is a full-featured programming language, you can code all manner of complex thin gummies
into your web pages using this technique; the server will execute your code and return the
output to the browser in the format you specify. Because PHP code is executed on the server
and not on the client, developers don’t have to worry about browser-specific quirks that could
cause the code to break (as commonly happens with JavaScript); PHP code works
independently of the user’s web browser.
Advantages of PHP
1 Vs. Pure Servlets - It is more convenient to write (and to modify) regular HTML than
to have a zillion print statements that generate the HTML.
3 Vs. JavaScript - JavaScript can generate HTML dynamically on the client. This is the
useful capability, but only handles situations where the dynamic information is based
on the client’s environment. With the exception of cookies, HTTP and form
submission data is not available to JavaScript. And, since it runs on the client,
JavaScript can’t access server-side resources like databases, catalogs, pricing
information, and the like.
4 Vs. Static HTML - Regular HTML, of course, cannot contain dynamic information.
PHP is so easy and convenient that it is quite feasible to augment HTML pages that
only benefit marginally by the insertion of small amounts of dynamic data.
MCA@SNIT Page 12
ONLINE LAW SYSTEM
Previously, the cost of using dynamic data would preclude its use in all but the most
valuable instances.
PHP only parses code within its delimiters. Anything outside its delimiters is sent directly to
the output and is not parsed by PHP. The most common delimiters are <?php and ?>, which
known as open and close delimiters respectively in the PHP language. <script
language="php"> and </script> delimiters are also available. Short tags can be used to start
PHP code, <? or <?= (which is used to echo back a string or variable) and the tag to end PHP
code, ?>.
1. Mysql_connect(server_address,username,password)
This function takes server_address,username and password as arguments. Server address can
be ‗localhost‘ in case we are using local machine for implementation. In other cases we have
to mention the ipaddress. Eg: mysql_connect(―localhost‖,‖root‖,‖root‖);
2. Mysql_select_db()
This function is used to select the data from tshe database.
3. Mysql_Query()
This function is used to execute the query.
4. Mysql_error()
This function is used to show the error message to the query.
5. Error_reporting()
This function is used to show the system warning.
6. [Upload file]
move_uploaded_file($_FILES["fileToUpload"]["tmp_name"], $target_file)
7. die('Error'.mysql_error()) [Exception handling]
8. header('location:home.php')
9. fopen($viewfile, "w") or die("Unable to open file!")
10. feof($myfiletemp))
11. fgets($myfiletemp) ;
12. str_replace("HHHUUUPPP",$table,$line);
13. fwrite($myfilemain,$rtext) s
14. fclose($myfilemain);
15. unlink($viewfile1);
MCA@SNIT Page 13
ONLINE LAW SYSTEM
CHAPTER 4
DESIGN
4.1 SYSTEM DESIGN
System design refers to the description of a new system based on the information
that is collected during the analysis phase and the process by which it is developed.
It is the creative process of inventing and developing new inputs, database
procedures and outputs to meet the system objectives. System design builds on the
information gathered during system analysis. The system analyst must have a
clear- cut understanding about the objectives, which the design aims to fulfill.
System design sits at technical the kernel of system development. Once system
requirements have been analyzed and specified system design is the first of the
technical activities-design, code generation and test- that required build and
verifying the software. System design is the most creative and challenging phases
of the system life cycle. The term design describes the final system and the process
by which it is to be developed.
System design is the high level strategy for solving the problem and building a
solution. System design includes decisions about the organization of the system
into subsystems, the allocation of subsystems to hardware and software
components and major conceptual and policy decision that forms the framework
for detailed design.
MCA@SNIT Page 14
ONLINE LAW SYSTEM
Designing procedures and functions to valid the data as per business rules.
Designing functions needed to store data into a usable form for processing.
Designing the common integrated functions that can be used by all other
users when needed.
Avoiding Delay : A processing delay resulting from data entry operations is called
a bottleneck. Such bottlenecks are made obsolete in this project by breaking up the
amount of data to be entered in each form into different smaller and simpler forms.
Avoiding Errors in Data : The rate at which errors occur depends on the quantity
of the data. As told in the above objective these errors are reduced by making the
number of data to be entered in each form is reduced.
Avoiding Extra Steps: To fulfill any operation the user have no need to do complex
steps, instead any operation can be done with simple easy to use steps.
MCA@SNIT Page 15
ONLINE LAW SYSTEM
OUTPUT DESIGN
Output design is one of the most important features of the information system.
When the output is not of good quality, the users will be averse to use the newly
designed system and may not use the system. There are many types of outputs, all
of which can be either highly useful or can be critical to the users, depending on
the manner and degree to which they are used.
Outputs from computer system are required primarily to communicate the results
of processing to users. They are also used to provide a permanent hard copy of the
results for later consultation
Trigger an action
Confirm an action
Represent major components or functions with Circles. Actions for input by a user
or a system go in Rectangular Boxes. Databases are represented by Parallel lines
enclosing a phrase corner.
2. Processes
When naming processes, avoid glossing over them, without really understanding
their role. Indications that this has been done are the use of vague terms in the
descriptive title area like process or update‘. The most important thing is that the
description must be meaningful to whoever will be using the diagram.
3. Data Flows
Double-headed arrows can be used (to show two-way flows) on all but bottom
level diagrams. Furthermore, in common with most of the other symbols used, a
data flow at a particular level of a diagram may be decomposed to multiple data
flows at lower levels.
4. Data Store
Data store represent stores of data within the systems and are represented by open
rectangle. Data Flows represent the movements of data between other components
and are shown by arrows.
MCA@SNIT Page 17
ONLINE LAW SYSTEM
Data Flow
MCA@SNIT Page 18
ONLINE LAW SYSTEM
MCA@SNIT Page 19
ONLINE LAW SYSTEM
LEVEL 1
MCA@SNIT Page 20
ONLINE LAW SYSTEM
MCA@SNIT Page 21
ONLINE LAW SYSTEM
MCA@SNIT Page 22
ONLINE LAW SYSTEM
MCA@SNIT Page 23
ONLINE LAW SYSTEM
View Law
View Lawyer
View Court
User
View Police
View Criminals
Add Case
Chat
Feedback
MCA@SNIT Page 24
ONLINE LAW SYSTEM
MCA@SNIT Page 25
ONLINE LAW SYSTEM
MCA@SNIT Page 26
ONLINE LAW SYSTEM
Controlled redundancy
Data independence
Performance.
1.LOGIN
MCA@SNIT Page 27
ONLINE LAW SYSTEM
2.USER REGISTRATION
3.LAWYER REGISTRATION
4.COURT ENTRY
MCA@SNIT Page 28
ONLINE LAW SYSTEM
5.LAW ENTRY
6.POLICE ENTRY
8.ADD COMPLAINT
MCA@SNIT Page 29
ONLINE LAW SYSTEM
9.CRIME TYPE
10.CRIMINAL
11.FEEDBACK
MCA@SNIT Page 30
ONLINE LAW SYSTEM
CHAPTER 5
SYSTEM TESTING
5.1 INTRODUCTION
In any software development, testing is a process to show the correctness of the program and
it meets the design specifications. Testing is needed to prove correctness, to show
completeness, to improve the quality of the software and to provide the maintenance aid.
Some testing standards are therefore necessary to ensure completeness of testing, improve the
quality of the software, and reduce the testing costs and to reduce study needs and operation
time. Testing software extends throughout the coding phase and it represents the ultimate
review of configurations, design and coding. A series of test cases are created that are
intended to demolish the software that has been built.
Based on the way the software reacts to these tests, we can decide whether the configuration
that has been built is study or not. It is essential that all components of an application be
tested, as the failure to do so many result in a series of bugs after the software is put to use.
Several methods of testing exist in software Engineering, which enable a programmer to
make sure that the configuration built is free of bugs.
For any software that is newly developed, first and foremost preference is given to the
testing of the system. It is developer‘s last chance to detect and correct the errors. That may
occur possibly in the software. The programmers will generate a set of test data, which will
give the maximum possibility of finding all most all types of errors that can occur in the
system.
The primary goal of unit testing is to take the smallest piece of testable software in the
application, isolate it from the remainder of the code, and determine whether it behaves
exactly as you expect. Each unit is tested separately before integrating them into modules to
test the interfaces between the modules. Unit testing has proven its value in that a large
percentage of defects are identified during its use.
MCA@SNIT Page 31
ONLINE LAW SYSTEM
The most common approach to unit testing requires drivers and stubs to be written. The
driver simulates a calling unit and the stub simulates a called unit. The investment of
developer time in this activity sometimes results in demoting unit testing to a lower level of
priority and that is almost always a mistake. Even though the drivers and stubs cost time and
money, unit testing provides some undeniable advantages. It allows for automation of the
testing process, reduces difficulties of discovering errors contained in more complex pieces
of the application, and test coverage is often enhanced because attention is given to each unit.
Integration testing (sometimes called Integration and Testing, abbreviated as ―I&T‖) is the
phase in software testing in which individual software modules are combined and tested as a
group. It occurs after unit testing and before system testing. Integration testing takes place as
its input modules that have been unit tested, groups them in larger aggregates, applies tests
defined in an integration test plan to those aggregates, and delivers as its output the integrated
system ready for system testing.
Data validation is the process of testing the accuracy of data. A set of rule we can apply to a
control to specify the type and range of data that can enter. It can be used to display error
alert when users enter incorrect values in to a form. Now performing validation testing in
system Centralized Social Welfare by undergoing validation for each tools and the validation
succeeded when the software function in a manner that can be reasonably accepted, by the
user.
MCA@SNIT Page 32
ONLINE LAW SYSTEM
User acceptance of a system is a key factor for the success of any system. The system under
consideration is tested for the user acceptance by constantly, keeping in touch with the
prospective system user at the time of developing and making changes whenever required.
Top-Down Testing tests the higher levels of a system before testing its detailed components.
The program is represented as a single abstract component with sub components represented
by stubs. Stubs have the same interface as the components but very limits functionally. After
the top-level component has been tested, its sub-components are implemented and tested in
the same way. This process continues recursively until the bottom level components are
implemented. The whole system may then be completely tested.
Bottom-Up Testing is the converse of Top-Down Testing. It involves testing the modules at
the lower levels of the hierarchy and then working up the hierarchy of the modules until the
final module is tested. The advantage of bottom-up testing is the disadvantage of topdown
testing and vice versa. When using bottom-up testing test drivers must be written to exercise
the lower level components. These test drivers simulate the components environment and are
valuable components; the test drivers and test data should be distributed with the component.
Potential re-users can then run these tests to satisfy themselves that the component behaves as
expected in their environment.
Knowing the specified function that a product has been designed to perform, test can be
conducted that demonstrates each function that is fully operational, at the same time
searching for errors in each function. Black Box testing focuses on functional requirement of
the software. Black Box testing attempts to find out errors in the following categories.
MCA@SNIT Page 33
ONLINE LAW SYSTEM
Knowing the internal working of a product test can be conducted to ensure that ―all gears
mesh‖ that is internal operation performs according to specification and all internal
components have been adequately exercised. Using white box testing methods, the software
engineer can derive test cases that
Guarantee that all independent paths within a module have been exercised at least once
basis path testing.
Exercise all logical decisions on their true and false sides- Condition testing.
xecute all loops at their boundaries and within their operation bounds- Loop testing.
MCA@SNIT Page 34
ONLINE LAW SYSTEM
MCA@SNIT Page 35
ONLINE LAW SYSTEM
MCA@SNIT Page 36
ONLINE LAW SYSTEM
MCA@SNIT Page 37
ONLINE LAW SYSTEM
CHAPTER 6
SYSTEM IMPLEMENTATION
6.1 INTRODUCTION
The final and important phase in the system life cycle is the implementation of the new
system. The term implementation has different meanings ranging from the conversion of
a basic application to a complete replacement of a computer system. The procedure
however, is virtually the same. Implementation includes all those activities that take place
to convert from old system to new. The new system may be totally new replacing existing
system, manual or automated, or it may be a major modification to an existing system.
The method of implementation and time scale to be adopted is found out initially. Next
the system is tested properly and at the same time users are trained in the new procedure.
Proper implementation is essential to provide a reliable system to meet organization
requirements. Successful implementation may not guarantee improvement in the
organization using the new system, but it will prevent improper installation.
Careful planning.
Implementation of a new system requires the operating staff installing the software and
creating computer files. There are many ways in which this can be achieved. The most
common methods are the following.
Parallel running
MCA@SNIT Page 38
ONLINE LAW SYSTEM
Pilot running change over The creation of the designed system takes place in the
implementation phase.
It also performs activities like writing, testing, debugging and documenting the programs.
Implementation of a modified application to replace the existing one, using the same
computer. This type of conversion is relatively easy to handle, provided there are no
major changes in the files. Every system requires periodic evaluation after
implementation.
This is to review the performance of the system and to evaluate against established
standard or criteria. A study is conducted for measuring the performance of the system
against predefined requirements. This study results a post-implementation review that
determines how well the system continues to meet the performance specification.
MCA@SNIT Page 39
ONLINE LAW SYSTEM
CHAPTER 7
CONCLUSION
MCA@SNIT Page 40
ONLINE LAW SYSTEM
CHAPTER 8
FUTURE ENHANCEMENTS
Enhancement means adding, modifying or developing the code to support the changes in
the specification. It is the process of adding new capabilities such as report, new interface
without other system and new features such as better screen or report layout.
Every module in the system is being developed carefully such that the future
enhancements do not affect the basic performance of the system. In future we can add
links or services to the system very easily.
Moreover, due to limited time allotted for the project, there are features, which
I couldn’t implement. Thus the system offers the scope of future enhancement.
MCA@SNIT Page 41
ONLINE LAW SYSTEM
CHAPTER 9
APPENDIX
9.1 SCREENSHOTS
HOME PAGE
MCA@SNIT Page 42
ONLINE LAW SYSTEM
LOGIN PAGE
ADMIN HOME
MCA@SNIT Page 43
ONLINE LAW SYSTEM
USER HOME
MCA@SNIT Page 44
ONLINE LAW SYSTEM
CHAPTER 10
PROGRAM CODE
Add Lawyer.php
<?php
session_start();
?>
<!DOCTYPE html>
<html>
<head>
<title>Law System</title>
Smartphone Compatible web template, free webdesigns for Nokia, Samsung, LG,
SonyEricsson, Motorola web design" />
MCA@SNIT Page 45
ONLINE LAW SYSTEM
<link
href='//fonts.googleapis.com/css?family=Open+Sans:300italic,400italic,600italic,400,300
,600,700|Six+Caps' rel='stylesheet' type='text/css' />
<script src="js/jquery.min.js"></script>
</head>
<body>
<!--header-top-starts-->
<div class="header-top">
<div class="container">
<div class="hea-rgt">
</div>
<div class="hea-rgt">
</div>
<div class="hea-rgt">
<a href="logout.php">Logout</a>
</div>
<!--<div class="hea-rgt">
<a href="login.html">Logout</a>
</div>-->
MCA@SNIT Page 46
ONLINE LAW SYSTEM
<div class="navigation">
<div class="navbar-header">
<span class="icon-bar"></span>
<span class="icon-bar"></span>
<span class="icon-bar"></span>
</button>
</div>
<!--/.navbar-header-->
<li><a href="http://localhost/law/web/adminview_feedback.php">Feedback</a><li>
</ul>
</div>
<!--/.navbar-collapse-->
MCA@SNIT Page 47
ONLINE LAW SYSTEM
</nav>
</div>
<div class="clearfix"></div>
</div>
</div>
<!--header-top-end-->
<!--start-header-->
<div class="header">
<div class="container">
<div class="head">
<div class="soc">
<ul>
<div class="clearfix"></div>
</ul>
</div>
<div>
</div>
MCA@SNIT Page 48
ONLINE LAW SYSTEM
<?php
// session_start();
$y=$_SESSION['email'];
$x=$_SESSION['type'];
echo "<br>";
// echo "Type=$x";
?>
</div>
</div>
<div class="header-right">
<div class="clearfix"></div>
</div>
</div>
</div>
<script>
$("span.menu").click(function(){
});
MCA@SNIT Page 49
ONLINE LAW SYSTEM
});
</script>
<div class="banner">
<div class="container">
<div class="banner-top">
<section class="slider">
<div class="flexslider">
<ul class="slides">
<li>
<div class="banner-text">
<p>There is a rise in the amount of crime in our country and most of the people are
unaware of the criminal laws under IPC (Indian Penal Code).</p>
</div>
</li>
<li>
<div class="banner-text">
</div>
<li>
<div class="banner-text">
MCA@SNIT Page 50
ONLINE LAW SYSTEM
</div>
</li>
</ul>
</div>
</section>
<script type="text/javascript">
$(function(){
});
$(window).load(function(){
$('.flexslider').flexslider({
animation: "slide",
start: function(slider){
$('body').removeClass('loading');
});
});
</script>
</div>
MCA@SNIT Page 51
ONLINE LAW SYSTEM
</div>
</div>
<?php
if(isset($_GET['id']))
$id=$_GET['id'];
mysql_connect("localhost","root","");
mysql_select_db("law");
while ($row=mysql_fetch_row($qry))
?>
<div class="main-grid">
<div class="agile-grids">
<div class="grids">
<h2></h2>
</div>
<div class="forms-grids">
MCA@SNIT Page 52
ONLINE LAW SYSTEM
</div>
</div>
</div>
</div>
</div>
</div>
MCA@SNIT Page 53
ONLINE LAW SYSTEM
</div>
</div>
</div>
</div>
</div>
</div>
MCA@SNIT Page 54
ONLINE LAW SYSTEM
</div>
</div>
<div class="form-group">
<button type="submit">Submit</button>
</div>
</form>
<?php
else
?>
<div class="main-grid">
<div class="agile-grids">
<div class="grids">
<h2></h2>
</div>
<div class="forms-grids">
MCA@SNIT Page 55
ONLINE LAW SYSTEM
Court ID
<select name="cid">
<option>Others</option>
<?php
mysql_connect("localhost","root","");
mysql_select_db("law");
$t=mysql_query($q);
while($r=mysql_fetch_row($t))
?>
<?php
?>
</select>
</div>
Court Name
MCA@SNIT Page 56
ONLINE LAW SYSTEM
<select name="cname">
<option>-----Select-----</option>
<option>FAMILY COURT</option>
<option>SUB COURT</option>
<option>MUNSIFF'S COURT</option>
<option>MUNSIFF'S COURT</option>
<option>MUNSIFF'S COURT</option>
<option>MUNSIFF-MAGAISTRATE COURT</option>
<option>MUNSIFF-MAGISTRATE COURT</option>
MCA@SNIT Page 57
ONLINE LAW SYSTEM
</select>
</div>
Court Type
<select name="ctype">
<option>---Select---</option>
<option>All</option>
<option>Revenue</option>
<option>Village</option>
<option>Family</option>
<option>Motor accidents</option>
<option>JFMC</option>
<option>Railway</option>
<option>Petty</option>
</select>
</div>
MCA@SNIT Page 58
ONLINE LAW SYSTEM
</div>
</div>
</div>
</div>
</div>
</div>
MCA@SNIT Page 59
ONLINE LAW SYSTEM
</div>
</div>
</div>
<div class="form-group">
<button type="submit">Submit</button>
</div>
</form>
<?php
?>
</div>
</div>
</div>
</body>
</html>
MCA@SNIT Page 60
ONLINE LAW SYSTEM
BIBLIOGRAPHY
BOOKS:
WEBSITES:
http://advocatesofkerala.com
http://indian_penal_code.com
http://ecourts.gov.in
http://kollamrural.keralapolice.gov.in
MCA@SNIT Page 61
ONLINE LAW SYSTEM
MCA@SNIT Page 62