0% found this document useful (0 votes)
593 views2 pages

Ashray Online Child Abuse Database

The project aims to create an online child abuse database called "Ashray" to track, report, and prevent incidents of child abuse. Key features include allowing anonymous and witness reports of abuse, categorizing reports by severity, facilitating communication between social groups, and providing statistics and preventative resources. The system must be secure, available 24/7, and support various user groups including administrators, social organizations, law enforcement, and witnesses. It should have a professional interface using technologies like AJAX, web services, and support multiple browsers. Final deliverables include application documentation, source code, database scripts, and help resources.

Uploaded by

अमन झा
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
593 views2 pages

Ashray Online Child Abuse Database

The project aims to create an online child abuse database called "Ashray" to track, report, and prevent incidents of child abuse. Key features include allowing anonymous and witness reports of abuse, categorizing reports by severity, facilitating communication between social groups, and providing statistics and preventative resources. The system must be secure, available 24/7, and support various user groups including administrators, social organizations, law enforcement, and witnesses. It should have a professional interface using technologies like AJAX, web services, and support multiple browsers. Final deliverables include application documentation, source code, database scripts, and help resources.

Uploaded by

अमन झा
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

The Great Mind Challenge - Project Scenario Template

Note: Already filled information should not be changed 1. Name of the Project Ashray - Online Child Abuse Database Our vision is to move beyond addressing the impact of child abuse by seeking out the root cause and identifying ways to prevent it. Create awareness amongst masses on the issues related to Child Abuse. 2. Objective/ Vision Tracks suspicious incidents of child abuse by integrating reports based on numerous details and creating a statistics based on these reports. This system verifies and reports incidents of abusive parents, physical abuse and sexual abuse. A. Administrator B. Social Activists ( NGOs) C. Investigation Agencies(Police) D. Eye witnesses & Affected People E. Anonymous Users This site contains informative stories and videos for creating awareness to abstain the social evil of child abuse. ii. Eye witnesses/Affected People shall be able to report incidents, which may not be conclusive in themselves ,but when viewed holistically, shows a picture of imminent danger. iii. The Admin will build a complete picture of the suspect by computing a correlation matrix on the basis of similarities in the related incidents. iv. The Admin will be able to categorize the reports on the basis of nature and severity of abuse. v. The investigating agencies will be able to build conclusive picture of the suspect on the basis of reports and statistics provided by the Admin. vi. A regular news letter shall be sent to the registered users(NGOs ,Investigation agencies & other users). vii. Facilitates appropriate communication between affected people ,NGOs and Investigation Agencies through forums/mail. viii. This site provides support(educative) and resources to the concern on taking preventive actions. ix. Secure Registration and profile management for users(NGOs ,investigation agencies) and incident reporters. x. Basic and advanced administrative features like add/update members,backup/recovery of data using a customized form.

3. Users of the System

i.

Functional 4. Requirements (Atleast Eight)

Non-functional 5. requirements (Atleast Four)

Secure access of confidential data (users details). SSL can be used. ii. 24 X 7 availability iii. Better component design to get better performance at peak time iv. Flexible service based architecture will be highly desirable for future extension a. Online chat facilities for users to interact with NGOs and counselor. b. Customizable color scheme or skins. c. Java based client for administrator. A. Professional look and feel B. Use of AJAX atleast with all registration forms C. Browser testing and support for IE, NN, Mozila, and Firefox. D. Use of Graphical tool like JASPER to show strategic data to admin E. Reports exportable in .XLS, .PDF or any other desirable format A. Registration Confirmation. B. Reports regarding the statistics about incidents. C. Area wise report about the crime. D. Newsletter review statistics. A. Website should be highly customizable and flexible enough to deploy. B. Complete separation of access to database according to roles. 4 UML, J2EE, XML, e-Forms, AJAX, Web 2.0, Web-services, SOA ROSE/RSA / WebSphere Modeler Eclipse/ RAD / Lotus Forms Designer / Portlet Factory WebSphere Portal/ WAS/ WAS CE / WPS DB2 Express C or DB2 UDB Tivoli CDP/TSM / Tivoli Directory Server Linux will be the preferred OS. A. Online or offline help to above said users, Application deployment executive and developer B. Application archive ( .war/.ear ) with source code C. Database backup and DDL Script D. Complete Source code

i.

6. Optional features

7.

User interface priorities

8. Reports

9. Other important issues 10 Team Size . 11 Technologies to be . used

12 Tools to be Used .

13 Final Deliverable must . include

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy