By
MUWANGA YUNUSU
12/BSC/KA/R/033
NETWORKING
A project report presented in partial fulfillment of the requirements for the course
unit: Information Technology Project Management1: BPCT.311
Supervisor
February, 2015
DECLARATION
I Muwanga Yunusu Reg No 12/BSC/KA/R/033 hereby declare that this project report is my original work
and to the best of my knowledge it has not been published or submitted to any university or institution of
higher learning for the award of the degree or any other academic award.
Signature..
Date.
APPROVAL
This project report has been submitted with approval of the undersigned supervisor.
Signed:
Mr. Oyango Laban
Email:onyalab@yahoo.com
Tel: 0782472180
Department of information science & Technology
Bugema University
Date:..
DEDICATION
I dedicate this report to my dear father, mother, brothers, and sisters for the spiritual and parental
guidance rendered during my studies. I would also like to dedicate this report to my course mates
and the entire student community of Bugema University, Makerere University and finally to my
supervisor Onyango Laban
ACKNOWLEDGEMENT
I am vastly grateful for the awesome support and whole hearted contribution rendered by the
following people: My supervisor Mr. Onyango Laban for his guidance and assistance and
resolute to my sister Nasuuna Missa and my brother Kabugo Alex during the preparation of this
project, without which the study would not have been accomplished. I also appreciate my
beloved parents, for the love, care, moral support, and financial support. Above all, to the loving
heavenly Father, whose eternal love has buoyed me up whereby His blessing kept me burning
and moving Praise be to Him.
May the good Lord richly bless everyone who has in one way or another contributed to this
research project.
ABSTRACT
The number of Internet users in Uganda is increasing continuously, it is no doubt that crime rates in
Uganda certainly sees a rapid rise due to high increase in population. With the advent of the Internet,
many people, organizations, institutions are now being equipped with Internet connections, either through
wired connections or wireless infrastructure. Internet access provides users an easy access to report their
crimes and ability to see wanted criminals and safety tips and news through Internet technologies. Police
stations and users therefore need a system to manage and facilitate online crime reporting. There is also a
need to move from traditional reporting techniques that are sometimes inconvenient, time wasting and
adopt social media methods of reporting so that anyone can report a crime from anywhere at any time.
The Online crime reporting system (OCRS SYSTEM) application enables users to register and report
their crimes online, police stations helps in solving the committed crimes and the system administrators
helps in creating police stations, so this system helps users to report their crime online without moving
long distances.The OCRS will use the internet as the sole method for reporting and posting wanted
criminals.
In order to develop this website, a number of Technologies must be studied and understood. These include
server and client side scripting techniques, programming language (such as PHP), relational databases
(such as MySQL) and CSS.
Table of Contents
DEDICATION................................................................................................................................4
INTRODUCTION 1.0 BACKGROUND.....................................................................................9
1.1 PROBLEM STATEMENT....................................................................................................10
1.2 MAIN OBJECTIVE..............................................................................................................10
1.3 SPECIFIC OBJECTIVES....................................................................................................10
1.4 Scope of the study..................................................................................................................................................10
LITERATURE REVIEW............................................................................................................12
2.0 LITERATURE REVIEW......................................................................................................12
3.0 Methodology..........................................................................................................................................................15
3.4 Implementation Environment..............................................................................................................................17
3.4.1 Technologies used...........................................................................................................................................17
4.1 User Requirements.............................................................................................................................................18
BIBLIOGRAPHY........................................................................................................................41
APPENDICES..............................................................................................................................43
APPENDIX A...............................................................................................................................43
A.1 INTERVIEW SCRIPT.........................................................................................................43
SAMPLE USER INTERFACES.................................................................................................44
B.1 ONLINE CRIME REPORTING SYSTEM MAIN INTERFACE...................................44
B.2 ADMIN LOGIN INTERFACE............................................................................................45
B.4 POLICE STATION LOGIN INTERFACE........................................................................47
B.5 NEW USER REGISTRATION............................................................................................48
B.6 CREATING POLICE STATION.........................................................................................49
B.7 USER LOGIN INTERFACE...............................................................................................50
B.8 CRIME REPORTING INTERFACE..................................................................................51
B.9 USER EDIT PROFILE.........................................................................................................52
B.10 USERS VIEW WANTED CRIMINAL............................................................................53
APPENDIX C...............................................................................................................................54
SAMPLE SOURCE CODE (NEW USER REGISTRATION)................................................54
CHAPTER 1
INTRODUCTION
1.0 Background
According to Lalasticlala, Uganda has the highest murder rate in the world, as stated in the
statistics report the crime of murder has reached over ninety two percent in Uganda. Not only the
murder but also other crimes such as street crimes and rape cases have been increased for a few
years (lalasticlala, 2015). The online crime reporting system is the plan that is aimed at helping
Police Stations, administrators to solve criminal rates and also users to report committed crimes
online
According to Amoroso (2000), the Internet is increasingly central to public access and
information. Secure reporting of non urgent incidents is one Internet application that is proving
useful. Online crime reporting allows the public to file police reports for some incidents and
crimes via the Internet, 24 hours a day, and seven days a week. Police departments can retrieve
these reports when police resources are available. This frees up patrol officers who would
otherwise spend time tracking down these incidents.
The appellant, Ssegonja Paul, was jointly indicted with another person, Kirigwajjo Charles, for
aggravated robbery, contrary to sections 272 and 273 (2) of the Penal Code. The particulars of
the charge were that on 11th October, 1992, at Kanywa Village, in Masaka District, they robbed
John Ssemwogerere of his motor vehicle Registration No. 640 UAF, Toyota Carina, white in
color, immediately before or immediately after they said robbery used a deadly weapon, a gun
and a knife said John Ssemwogerere. Kirigwajjo was released on bail and could not be traced
when the case came for trial in the High Court. The indictment was accordingly amended and
only the appellant was tried on it. He was convicted of simple robbery, contrary to sections 272
and 273(1) of the Penal Code Act and sentenced to 12 years imprisonment. He was also ordered
to receive 12 strokes of the cane, to pay compensation of Shillings 100,000, and to undergo
Police supervision for three years after serving the sentence of imprisonment (spreme court,
2011).so this there for brings up the online reporting system were by if someone is released on
bail and could not be traced when the case came for trail in the high court, he or she could be put
on a wanted list.
Thus for the prevailing situation in Uganda, theres a need to develop a Online crime reporting system to
save on the time spent while moving to police stations and also provide accurate and sufficient
information to criminals.
Administrator manages Police Station and uploads safety tips and news. And also Police Station
can upload information of the Most Wanted Criminals. Police Station also view the complaints
from user and solve their complaints.
1.5 JUSTIFICATION
The system will widen the researchers knowledge in computing and make him prove the theory
with practical. In addition, the project will help the researcher to be able to complete his course at
the University and to prove to lecturers that in the three years of the degree, something has been
learnt.
The system will aid the community to report their crimes hence helping the government to get
people who commit crimes
The system will help organizations such as universities and other companies to read safety news
and tips since now days people come from abroad for the purpose of committing crimes in the
foreign country.
The study will benefit the staff and management of police station by highlighting the
weaknesses in the using of the manual system to users.
To other researchers, this system helped to add to the existing literature in the field of research.
Therefore future scholars and researchers will be able to refer and use the findings of this project
in their academic research.
The system further cuts down the congestion of crime reporting to the police stations they will
not be required to spend any extra time in reporting the committed crimes as it was the case
previously.
More so, this project will equip other researchers with enough information to develop related or
more advanced systems or to make some improvements.
CHAPTER 2
Literature Review
2.0 Literature Review
There is a massive number of research work from journals, newspapers, text, video, and other
documents available on the internet, on about any subject. Police Station need to be able to find
relevant information about people who commit crimes to satisfy peoples needs and also users
are able to report different crimes committed by different individuals. There are two ways of
searching relevant information of online crime reporting system to use a search engine or to
browse directories organized by categories (such as Yahoo directories). There is still a large part
of Internet that is not accessible (for example private databases and intranets). This can be
achieved using Information Retrieval Systems.
Therefore, Online crime reporting system falls under information retrieval systems as it is also an
information system in that, it helps people to simply report the crime online without going to the
police station
According to KANUE (1980), Online crime reporting system Technology ws not good most of
the people used to commit a lot of crimes such as killing people, robbing, stealing and so many
others and those people who used to committed the crimes used to live normally like the person
who has not committed any crime. And for him he says that there was a need to develop any
online reporting system so that people that is to say either from villages or towns if they have
their mobile phones which can access internet they can easily report crimes at a fast rate instead
of moving to nearby police stations hence limiting the problem of people who commit a lot of
crimes
According to Bohan (2006), online crime reporting system is a prime example of modern day
technology designed to make the world a superior place to live. When used properly this
technology will not only enhance a humans environment when it comes to convenience, but will
also significantly enhance the safety of our community at a reasonable expense. An online
system affords police officers the opportunity to patrol hot spots and remain available to
quickly respond to violent crimes. This is accomplished by allowing citizens to self-report nonviolent minor crimes with no suspect information. Of course like anything in life a good situation
always has the potential for a negative to make its way in. In this case the negative being the
potential of false reports made through the online system. One strategy to combat this negative
includes posting an eye-catching warning on the Internet site of the penalties a person may face
for making a false police report.
An Online crime reporting system is a more affordable alternative to hiring additional police
officers to respond to increased call volumes. For example, it costs an average of $64.00 an hour
for a police officer to take an on-scene report. The average costs for a telephone transcription
service is $36.00 an hour. Whereas, the average costs of emailing a report through an online
crime reporting system is pennies (Geiger, 2004) Added benefits include: offsets the workload
demands of both sworn police officers and community service officers who are required to write
reports; allows citizens to report certain non-violent crimes, with no suspect information, at their
convenience (24/7) from the computer location of their choice without having to wait on the
response time of law enforcement; provides citizens with an emailed copy of their report
eliminating the extra step and expense of driving to the police department and paying for a hard
copy (Johnson, 2006); provides an outlet to piggyback other services on the system such as:
paying a parking ticket, requesting a vacation house check, completing a business emergency
contact form, registering for Neighborhood/Business Watch program, signing up for volunteer
opportunities, (Schroeder, 2004); and the system may be compatible with surrounding law
enforcement agencies allowing for information sharing such as: collecting statistical data to
develop crime patterns in a specific geographical area, which ultimately could lead to the arrest
of a suspect.
In (2003), the Federal Bureau of Investigation reported that10.3 million property crimes and 1.38
million violent crimes were committed. However, the Department of Justice reported in the same
year only half of all violent crimes committed and a third of all property crimes were actually
reported to the police. There are several reasons crimes may go unreported including: fear of
repercussions; embarrassment or shame; assumption that the crime is too insignificant to warrant
reporting; or a belief that reporting the crime will make no difference. Perhaps the single most
significant factor in determining whether or not to report a crime is the convenience aspect to
reach police
According to Garrett, Iriberri & Leroy (2006), Online crime reporting system offers victims this
convenience and may be the solution to bring into balance the number of crimes committed
versus the number of crimes reported While the internet has been used by government agencies,
including policed apartments, to post information about themselves and the communities they
serve, the communication was one sided. Until recently, information posted on a government
website was usually followed by a telephone number to call if you had questions or needed to
report a crime. There were attempts to facilitate better communication through the internet in the
form of printing out police forms to be filled out and mailed in or dropped off at the local police
station. While this was a step in the right direction it did little in the way of speeding up the
reporting process. The success of the Online crime reporting system may be measured by the
hundreds of law enforcement agencies now offering this reporting option nationwide and the
number of law enforcement agencies launching their own online programs each month.
According to Coplogic (2009), there is no denying we live in the age of technology. To turn our
backs on the worldly innovations of mankind is an injustice to the public for whom we (law
enforcement) are sworn to serve and protect. Technology is the ticket to the future, and those
standing without a ticket must be prepared to survive in a world where computers will one day
control everything from our televisions to our toothbrushes.
According to Larocco (2009), Faced with continuing budget cuts and an economy in recession,
law enforcement agencies continue to look for ways technology can help them meet the everyday
demands placed on them to maintain their current level of service with less money. When the
idea of citizens reporting crimes online was introduced earlier in this decade, the timing seemed
optimal, but would it work. There are several major benefits to implementing an online citizen
police reporting system. Chief is the reduction in time and resources spent on responding ton and
writing reports for minor incidents that rarely have a suspect and are primarily filed for insurance
purposes.
CHAPTER 3
3.0 Methodology
This is a detailed description of selected procedure that is step-by-step methods of how the researcher
intends to achieve the objectives of the study;
3.1 Research design
The study was conducted using a descriptive case study design because it was appropriate for the design
since it was mainly used to assess the user requirement for the design of the online crime reporting
system. The study was both qualitative and quantitative in nature.
3.2.1 Interview.
An interview is a conversation between two people (the interviewer and the interviewee) where questions
were asked by the interviewer to elicit facts or statements or to obtain information from the interviewee
with a specific purpose. Interviews provide first-hand information and the question of business can only
best be solved through the use of interviews in that it will involve gathering of the most important
information about the use of local advertising techniques and usage of on-line applications.
Face to face interviews where used thus enabling the researcher to establish rapport with potential
participants and therefore their co-operation. They also helped the researcher to clarify ambiguous
answers when appropriate.
3.2.2 Questionnaires
It is a research instrument consisting of a series of questions and other prompts for the purpose of
gathering information from respondents. The questions were produced and distributed to respondents,
who can then complete the questionnaire on their own time. This helped to find out the reason for the low
utilization of on-line applications in marketing crime reporting.
3.2.3 Observation
CHAPTER 4
4.0 SYSTEM ANALYSIS, DESIGN, TESTING AND VALIDATION
The system was designed to meet the needs of fashion plus as concerned to its requirements.
I.
II.
System Administrators
Add system administrators
Create police stations
Upload safety tips and News
Edit and delete system administrators
Edit and delete police stations
View Most Wanted Criminals
Police Station
view the complaints from user
can upload information of the Most Wanted Criminals
III.
Users
These include the services that the proposed system has to provide to the entire system users. The system
will perform the following functionalities:
Verify and authenticates users with the use of email address and passwords.
Provide users, police officers and administrators with a way of changing the passwords.
All its operations should be correct, that is, should produce expected results when supplied with
the right inputs.
System should verify/validate all user input and users must be notified in case of errors.
System should be complete and consistent that is, able to deal with all the possible outcomes
during its operation.
System should be robust that is, able to run on the specified platforms with no predictable failure.
Allow users to use it simultaneously on computers with minimum system requirements and
connected to internet.
System should be able to sustain the heavy load offered to it due to network requests (provide
high performance in all situations).
System should be reliable, up and running every time its operations are needed.
a) Hardware Requirements
Hardware
Processor Type
Processor Speed
Memory
Disk space
10 GB free space
USB Port
Version 2.0
b) Software Requirements
Software
System Requirement
Operating System
Firefox Mozilla
20.0 or higher
Wamp server
2.3 or higher
4. 3 SYSTEM DESIGN
There was a creation of the new system. This phase was composed of several systems. This phase
focused on detailed implementation of the feasibility system. It emphasizes on translating design
specification to performance specification the system had two phases of development logical and physical
design.
In the previous chapter we had identified the functional and non-function requirements of the system and
produced the analysis model. The following discussed in this chapter context diagram, Level one data
flow diagram system goals, system architecture, system decomposition, deployment and database design.
Architectural design
Crime
ii
Police station
iii
users
iv
administrator
reports
4.5.3 ER DIAGRAMS
This describes the Entity relationship diagram extracted from databases tables using MySQL
workbench.
Police_reg
(R_id(pk),fname,lname,phone,email,residence,password,secret,sex,admin,admin_page_A_Id(fk));
Admin_page (A_id (pk),fname,lname,phone,email,Residence,password,secret,sex);
Upload (dd (pk), position, news, date, admin_page_A_Id(fk), user_R_Id(fk))
Contact us
Crime report
Attribute
Key
Description
A_id
int(10)
Primary Key
fname
varchar(50)
lname
Varchar(50)
phone
Varchar(25)
email
Residence
Varchar(45)
varchar(50)
Password
varchar(50)
seccret
Date(50)
Sex
id
varchar(8)
int(20)
name
email
comment
gender
varchar(50)
varchar(25)
varchar(1000)
varchar(15)
Identifies
a
administrator
Administrator
First
name
Administrator
lname
name
administrator
phone
number
administrator email
Administrators
residence
Administrators
password
Administrators secret
questions
Administrators gender
Unique identifier of a
user
User name
User email address
User comment
User gender
id
Int(5)
Reporter_name
Varchar(50)
place
varchar(50)
Crime_name
varchar(50)
phone
int(20)
Primary Key
Police_reg
uploads
user
img
Varchar(20)
date
details
Varchar(50)
Varchar(10)
status
varchar(50)
User status
officer
varchar(50)
Phone2
Int(50)
Email2
Varchar(50)
R_id
int(10)
fname
Varchar(50)
lname
Varchar(50)
phone
int(25)
varchar(50)
place
varchar(50)
password
Varchar(50)
secret
Varchar(50)
sex
Varchar(50)
did
int(20)
positions
varchar(50)
News
date
varchar(150)
date
R_id
int(10)
Primary Key
Primary Key
Primary Key
Uniquely
identifies
police station officer
First name of the police
officer
Last name of the police
officer
Phone number of the
police officer
Email address of the
police officer
Place where the officer
is located
wanted
user
First name of the user
Last name of the user
User phone number
Gender of the user
User email address
Place of the user
Status of the user
Secret statement of the
user
Date of birth for the
user
Password
fname
lname
phone
sex
Email
place
Marital_status
Secret_statement
Varchar(50)
Varchar(50)
Varchar(20)
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(20)
Date_of_birth
Varchar(100)
password
Varchar(50)
id
int(10)
fname
lname
Varchar(25)
Varchar(25)
Committed_crim
e
img
area
gender
Varchar(50)
Varchar(60)
Varchar(50)
Varchar(10)
image
Area of the crime
Gender of the criminal
Primary Key
System testing included the execution of online crime reporting system in so as to find out whether it
matches its specification and executes as per the design. The following testing modes were used to carry
out application testing of the online crime reporting system
a) User Testing
A reasonable number of users were selected at random to test the system interfaces and to comment on
the usability of the system.
c)Unit Testing
Each executable module of the system was tested for the desired functionality.
d) Module Testing
Each executable unit was integrated and tested as a module.
d) Functionality or System Testing
Online crime reporting system modules were incorporated and tested as a whole. The different modules
were integrated to come up with one functional system which was then be tested as a whole to make sure
that it meets the general objectives of the project.
CHAPTER 5
LIMITATIONS, CONCLUSIONS, AND RECOMMENDATIONS
5.1 summary of Results
The project was successful in implementing the objectives stipulated in earlier chapters. The online crime
reporting system offers a number of benefits to the intended users. The users are able to easily report their
crime online using either their computers in the shortest time possible and the System Administrators are
able to effectively manage the entire crime reporting system
Some of the graphical results generated from the system are discussed below:
5.2 Limitations
The Researchers faced a number of limitations in the course of this project development as
enumerated below:
The timeline imposed for the project duration limited the extent to which we could carry out the necessary
research as we also have to divide the available time with other course units in the course of the semester.
The Researchers also experienced difficulties eliciting the System requirements from the various
stakeholders of police stations as some of them were not readily available on the scheduled interview
times.
The researcher also experienced difficulties in generating size of the products due to variations in the
sizes of customers so in that case size was left out.
The unstable internet connection limited the amount of research information that would be
access to help with the Research Project.
5.4 Recommendations
The Ministry of Defense in Uganda does not have an application that can aid users who are newly joining
the crime reporting system to report crimes and details concerning the criminal cases. Adopting the online
crime reporting system will effectively help the users to be report their crimes online, view wanted
criminals and also view safety tips and news and to the other side police patrols will be stopped since
crimes committed are reported directly online this will reduce on the crimes committed and also saves
time.
Further research is recommended to widen the scope of this application to include the following:
The system should be extended to allow users to register online and also be able to report crimes
online.
It should be extended to provide crime galleries where numerous crime photos can be viewed by
users.
The System should be extended so that even mobile phone users can access it via internet.
5.3 Conclusion
In the modern world, the use of computers and Mobile phones is becoming rampant. More so, recent
developments in the ICT Industries has revolutionized and consequently brought about a paradigm shift in
the way activities are accomplished. As a result the, crime reporting system needs to embrace these new
technologies. This report has presented a simple, convenient, cost-effective, but efficient online crime
reporting system with a user-friendly, sensitive and intelligible web interface. Whereby it can be accessed
at any time provided there is internet connection.
REFERENCES
Bibliography
Sahil Parikh (2010), The SaaS Edge Tata McGraw-Hill.
Ellis, G. (2007). Introduction to the Oracle Database. Kansas.
file:///D:/THIRD%20YEAR/projects/Online%20Crime%20Reporting%20System%20in
%20PHP.htm.
(2002). http://topicideas.org/how-to-online-crime-reporting-and-managementsystem-pdf.
Bureau., P. R. (2015, january 5). Population Reference Bureau. (2015, March 17).
Uganda on Track to Have World's Highest Population . Retrieved march 17, 2015,
Amoroso, A. (2000). Supporting Police Work with Information Technology at the London Police
Service. in Conference Proceedings. Marcel-Eugne LeBeuf (ed.) (2000). Police and
Information Technology. Understanding, Sharing and Succeeding. Cornwall. May 28-30, 2000.
Churchill, R, G.A. & Iacobucci, D. 2005. Marketing Research: Methodological Foundation. 9th ed. New
York: Thomson South-Western Publisher
Bakewel, C., Mitchell, V.W & Roth well, M. 2006. UK Generation Y male fashion consciousness.
Journal of Fashion Marketing and Management, 10(2):169-180.
Shoham, A & Dalakas, V. 2006. How our adolescent children influence us as parents to yield to their
purchase requests. Journal of Consumer Marketing, 23(6):344-350.
Grossnickle, J., & Raskin, O. (2001). The handbook of online marketing research. New York, NY: The
McGraw-Hill Companies, Inc.
Appendices
Appendix A
A.1 Interview Script
The main reason for this interview was to obtain a profile of the some of the stakeholders (students) who
use the manual system of finding universities and courses, how the this finding is done, to assess students
satisfaction with the manual system and to find out whether a computerized system was needed. All
possible problems with the current (manual) system were found and thereafter devised a solution to
improve the students searching experience for courses and universities.
1.
2. Do you have enough information concerning the crime you are reporting?
3. How do you obtain the information concerning your crimes?
4. Does it take you long to obtain the necessary information about criminals?
5. Does it cost you much to obtain the necessary information about crimes?
6. Are you interested in doing any crime reporting online?
7. Do you have enough information concerning the crime you want to report?
8. Do you know how to report the crime online?
9. Are you reporting the crime the way you wanted?
10. Are you satisfied with the manual way of reporting a crime?
11. Do you see any need for improving the current system of reporting the crimes?
12. What do you think should be done to improve the current system?
13. Would you recommend the reporting of the crime using the aid of an online system?
All the answers to these questions were combined with other techniques described earlier in the report
and this actually provided valuable information for the research project.
Appendix B
Appendix C
<body>
<ul>
<li> <a href="index.php" >Home</a></li>
<li><a href="#" >Contact</a></li>
<li><a href="#" >About</a></li>
</ul>
</div></td>
</tr>
<tr>
<td height="470" valign="top"> <form action="" enctype="multipart/form-data"
name="myForm" id="myform" method="post">
<p> </p>
<table width="560" border="0" align="center" cellpadding="0"
cellspacing="3" bgcolor="#FFFFCC" class="slideshow2" >
<tr>
<td height="31" colspan="4"><div align="center" >
<?php
if (isset($_POST['fname'])) {
include ("config.php");
$fname=mysql_real_escape_string($_POST['fname']);
$fname = ucwords(strtolower($fname));
$lname=mysql_real_escape_string($_POST['lname']);
$lname = ucwords(strtolower($lname));
$sex=mysql_real_escape_string($_POST['sex']);
$phone=mysql_real_escape_string($_POST['phone']);
$email=mysql_real_escape_string($_POST['email']);
$ss=mysql_real_escape_string($_POST['ss']);
$residence=mysql_real_escape_string($_POST['residence']);
$residence = ucwords(strtolower($residence));
$bday = trim($_POST['month']).'/'.trim($_POST['day']).'/'.trim($_POST['year']);
$marital=mysql_real_escape_string($_POST['marital']);
$pass=mysql_real_escape_string($_POST['pass']);
$cpass=mysql_real_escape_string($_POST['cpass']);
if(!$lname or !$fname or !$sex or !$phone or !$ss or !$residence or !$pass ){
echo "<font color='red'>Error: All Entries are required to be fielded. Please fill
them.</font>";
}
else if(!eregi("^[A-Za-z]+$", $lname)){
echo "<font color=red >ERROR:Invalid last Name</font>";}
else if(!eregi("^[A-Za-z]+$", fname)){
echo "<font color=red >ERROR:Invalid First Name</font>";
}
else if(eregi("^[0-9]+[ ]+[0-9]", $lname) or eregi("^[0-9]+$", $lname)){
echo "<font color=red >ERROR:Invalid Last Name</font>";
}
else if(eregi("^[0-9]+[ ]+[0-9]", $fname) or eregi("^[0-9]+$", $fname)){
echo "<font color=red >ERROR:Invalid First Name</font>";
}
else if(!preg_match('/^[0-9]{4}-[0-9]{3}-[0-9]{3}$/', $phone))
{
echo "<font color=red >ERROR:Invalid Phone Number (Please use the format 0000000-000)</font>"; }
elseif($pass!=$cpass){
echo "<font color='red'>Password and Confirm Password don't match.</font>";
}
else if(!eregi("^[a-z0-9_-]+[a-z0-9_.-]*@[a-z0-9_-]+[a-z0-9_.-]*\.[a-z]{2,5}$",
$email)){
echo "<font color='red'>Invalid E-Mail Address</font>";
}
else{
if($user_exist >0){
echo "<font color='red'>Email Address is Already in Use.</font>";
}
else{
if($user_exist >0){
echo "<font color='red'>Phone Number is already registered.</font>";
}
else{
exit();
}
}
}
}
?>
<div align="center"class="style5"> Please fill up the following form
for registration: </div></td>
</tr>
<tr>
<td width="219" height="34"><div align="right" id="contact_us">First
Name:</div></td>
<td colspan="3"><input type="text" name="fname" id="txtbox" value="<?
php echo $fname; ?>" />
<div align="center" id="contact_us">
<div align="left" class="style4"></div>
</div></td>
</tr>
<tr>
<td height="37"><div align="right" id="contact_us">Last
Name:</div></td>
<td colspan="3"><input type="text" name="lname" id="txtbox" value="<?
php echo $lname; ?>" />
<div align="left" class="style4"
id="contact_us"></div></td>
</tr>
<tr>
<td height="34"><div align="right" id="contact_us">Phone :</div></td>
<td colspan="3"><input type="text" name="phone" id="txtbox" value="<?
php echo $phone; ?>"/></td>
</tr>
<tr>
<td height="25"><div align="right" id="contact_us">Email:</div></td>
<td colspan="3"><input type="text" name="email" id="txtbox" value="<?
php echo $email; ?>"/>
</td>
</tr>
<tr>
<td height="40"><div align="right" id="contact_us">Profile Picture
:</div></td>
<td colspan="3"><input type="file" name="fileField" /></td>
</tr>
<tr>
<td height="26"><div align="right"
id="contact_us">Residence:</div></td>
<td colspan="3"><label>
<input type="text" name="residence" id="txtbox" value="<?php echo
$residence; ?>" />
</label></td>
</tr>
<tr>
<td height="42"><div align="right" id="contact_us">Gender</div></td>
<td colspan="3"><p>
<label>
<input type="radio" name="sex" value="Male" id="RadioGroup1_0" />
Male</label>
<br />
<label>
<input type="radio" name="sex" value="Female" id="RadioGroup1_1" />
Female</label>
<br />
</p></td>
</tr>
<tr>
<td><div align="right" id="contact_us">Password:</div></td>
<td colspan="3"><input type="password" name="pass" id="txtbox"
/></td>
</tr>
<tr>
<td height="21"><div align="right" id="contact_us">Confirm Password:
</div></td>
<td colspan="3"><input type="password" name="cpass" id="txtbox"
/></td>
</tr>
<tr>
</select></td>
</tr>
<tr>
<td height="40"><div align="right" id="contact_us">Secret question
:</div></td>
<td colspan="3"><input type="text" name="ss" id="txtbox" value=""/>
In case you forget the password</td>
</tr>
<tr>
<td height="11"><div align="right" id="contact_us">Date of
Birth:</div></td>
<td width="71"><select name="month" id="txtbox">
<option>Month</option>
<?php
$N = 13;
for($i=1; $i < $N; $i++)
{
echo '<option>'.$i.'</option>';
}
?>
</select></td>
<td width="65"><select name="day" id="txtbox">
<option>Days</option>
<?php
$N = 32;
for($i=1; $i < $N; $i++)
{
echo '<option>'.$i.'</option>';
}
?>
</select></td>
<td width="188"><select name="year" id="select">
<option>Year</option>
<?php
$N = 2020;
for($i=1940; $i < $N; $i++)
{
echo '<option>'.$i.'</option>';
}
?>
</select></td>
</tr>
<tr>
<td> </td>
<td colspan="3" rowspan="2"><input type="submit" name="Submit"
id="btn" value="Finish Registration" /></td>
</tr>
<tr>
<td height="30"> </td>
</tr>
</table>
<p> </p>
</form></td>
</tr>
<tr>
<td height="70" class="footer"><div>
<div align="center">Designed by Muwanga Yunusu:2015
</div><div>
<div align="center">
<div></div>
</div>
</div></td>
</tr>
</table>
</body>
</html>
</div>