36691025 Crime Report Document

download 36691025 Crime Report Document

of 89

Transcript of 36691025 Crime Report Document

A PROJECT REPORT ON Crime Reporting(HCL INFO SYSTEM LTD)

Developed By:

Name: Amit Kumar Gupta Name: Manu Saraf Name: Kapil Tyagi Name: Rohit Kumar Name: Sadhana Sisodia Name: Vaibhav Agarwal

Reg. No. HCL1H1H20091H6240 Reg. No. HCL1H1H20091H6248 Reg. No. HCL1H1H20091H62 Reg. No. HCL1H1H20091H6217 Reg. No. HCL1H1H20091H6636 Reg. No. HCL1H1H20091H6226

CERTIFICATEThis is to certify that this report titled Crime Reporting embodies the original work done by Amit Kumar Gupta, Manu Saraf, Kapil Tyagi, Rohit Kumar, Sadhana Sishodia, and Vaibhav Agarwal in partial fulfillment of their course requirement at HCL.

Coordinator: Rajinder Kr. Chitoria

Place: Noida

Date: 11/May/2009

ACKNOWLEDGEMENTIn the course of present work it has been our privilege to receive help and assistance from many quarters. We take great pleasure in acknowledging here, our debt to them. We have benefited a lot from the feedback and suggestions given to us by Mr. Rajinder Kr. Chitoria, other faculty members, and the machine room coordinator.

ContentsPage no. 1. Introduction.. 2. Profile of Organization 3. System Analysis 3.1 3.2 Current Study Proposed System

4. System Design 5. Coding and Forms 6. Testing and Implementation 7. Conclusion 8. References 9. Appendices

IntroductionWhat is Crime Reporting Crime reporting is the first of the nine basic Youth Crime Watch components. Most simply, it's giving the proper authorities information you have about: 1. A crime that might be committed 2. A crime that has been committed 3. Someone who was involved in committing a crime 4. Young people understand the importance of reporting crime. They want safer schools and neighborhoods, and if they know how to report effectively, they'll do it. Young people can help encourage peers to report crime in the making as well as information on crimes under investigation Purpose of Crime Reporting We have developed the portal of WEBSITE ON CRIME REPORTING, the portal can handle data of criminals who are under the judicial surveillance or are under trial. This portal will be most useful for DEFENCE for searching of details of criminals, any one can report a FIR online, missing citizen search, secure registration and profile management facilities for detectives and security agencies, Facilitate communication between all stack holders. .

Need of Crime Reporting: It was a progress to make India free from crime. 2. In this user can easily make fir against the person from whom he/she is being suffered. 3. In this user can not only make fir but can get his updated report of his FIR 4. By this Police can easily catch the criminal or in other words a criminal can be easily catches doesnt matter how far he/she is1.

Functionality Of Crime Reporting 1. Crime reporting forms, progress tracking, proof attachments. 2. On form submission an e mail goes to regional police officer in case 3. if its serious category crime where quick attention is required. 4. Facilitate crime and criminals search region, crime-type, gender, 5. Age group wise etc. 6. Missing citizen or valuables reporting and search 7. Secure registration and profile management facilities for detectives 8. and security agencies 9. Facilitate communication between all stakeholders Discussion Scope of Crime Reporting This Website provides an architectural overview of the CRIME MANAGEMENT. This Website is a generic, web-based tool that enables users to manage the Crime on tasks completed as part of projects with tasks and sub-tasks. The tool includes interactivity

Functionality. Information will be stored in a database. Administrative and managerial functions will be provided including configuring projects/tasks/subtasks, an Benefits of Crime Reporting: In order to quantify the benefits of your crime reporting portal, you first have to know what to look for. CRIME REPORTING can help you in different ways. Here are some of the areas to look for benefits in implementing a portal: Paper Reduction CRIME REPORTING can reduce the cost associated with creating and distributing paper requirements and resumes. Cost savings result from: Direct savings from reduced paper, printing, and distribution costs Indirect savings from time spent handling paper documents Paperwork Transfer A big expense with a manually maintaining records and requirement system is that of transferring of records from one person to another. For example, the file works is no not been done by hands but is done online. Reducing the communication expenses Improved Data Quality Manual records must be then entered into a computer in order to be processed for further process or may be maintained into database for future requirement. Whenever data is keyed into a computer from a hand-written document, errors will be made. These errors can cost you in many direct and indirect ways: Incorrect selection may take place. When wrong justification is done due to manual errors and adjustment is costly for system.

Without accurate information, you lose the ability to perform useful decision support. You should have accurate information about the background of the case as well as the crime, departments worked in, areas the organization is working in etc. for your decision support.

Profile of Organization

HCL Info Systems is India's premier information enabling company. Leveraging its 27 years of expertise in total technology solutions, HCL InfoSystems offers value-added services in key areas such as system integration, networking consultancy and a wide range of support services. HCL Info Systems is among the leading players in all the segments comprising the domestic IT products, solutions and related services business, which includes PCs, servers, networking products, imaging & communication products. Continuously meeting the ever increasing customer expectations and applications, its focus on integrated enterprise solutions has strengthened the HCL Info systems SSO's (System Support Organization) capabilities in supporting installation types ranging from single to large, multi-location, multi-vendor & multi-platform spread across India. The SSO, comprising a direct support force of over 1600+ members, is operational at 170+ locations across the country and is the largest such human resource of its kind in the IT business. A majority of the SSO members have been special trained in a variety of supporting solutions, the company's key focus area.

HCL InfoSystems ' manufacturing facilities are ISO 9001 - 2000 & ISO 14001 certified and adhere to stringent quality standards and global processes. With the largest installed PC base in the country,

four indigenously developed and manufactured PC brands 'Infiniti', 'Busybee' 'Beanstalk' and the 'Ezeebee' - and its robust manufacturing facilities; HCL InfoSystems aims to further leverage its dominance in the PC market. It has been consistently rated as Top player in PC industry by IDC .The 'Infiniti' line of business computing products is incorporated with leading edge products from world leaders such as Intel. A fully integrated and business-ready family of servers and workstations, the 'Infiniti Global Line' is targeted at medium and large companies to help them to manage their enterprise-related applications. It has considerable dominance in verticals like finance, government, and education & research. The Frontline Division of HCL InfoSystems has an extensive network of over 1000 resellers across 300 cities. Frontline Division has actively promoted the penetration of PCs in the home and the small office/home office (SOHO) segments, through Beanstalk PCs, Toshiba Laptops & Dragon Speech Recognition Systems. Constant evolution with changing times has helped HCL InfoSystems retain its leadership and profitability for all stakeholders. In 1992, HCL formed a joint venture company, HCL HP, with the international computer giant, Hewlett-Packard (HP), and precipitated a technological leap by achieving world class manufacturing expertise in the country for HP's RISC/UNIX based business servers and workstations. In 1997, HCL and its joint venture partner, HP, re-organized their joint business activities in India through the buying back of HP's 26 per cent of equity in HCL HP by the HCL promoters.

Last year, HCL entered into an alliance with SUN Microsystems to be their Enterprise Distributor for entire range of SUN products. Combing the latest technology & best-practices from SUN, with 27 years of customer relationship and pan Indian sales & service

expertise of HCL, it aims to leverage the relationship to offer complete spectrum of IT to the end user. HCL has closely seen the IT industry rise from scratch, and has actively participated in its progress. During the twenty-seven year journey, it has picked up valuable lessons in serving the IT needs of the Indian customer and gathered domain expertise to successfully service various businesses. HCL InfiNet, our 100% subsidiary focuses on the ever-growing segment in Imaging, Telecom and Communication products, solutions and services. HCL InfiNet's product portfolio covers a range of other office automation and communication products through alliances with world leaders - including mobile communication products from Nokia, Duprinters from Duplo, LCD projectors from InFocus, Mass Mailing solutions from Pitney Bowes and voice and telecommunication solutions from Ericsson. It has an exclusive sale and support partnership with Toshiba Corporation, Japan, for sales and servicing of its imaging and photocopier products. The Managed Network Service offerings for corporates include VPNs, ASP offerings, Co Location/ hosting, CDNs, security, corporate internet telephony solutions, technical and consumer help desks, 24/7 Network Operations Centre monitoring and a host of value added networking services. Consumer services include dialup PSTN/ISDN Internet access, Valufon calling cards and VoIP telephony devices.

As a leading information enabler, HCL Infosystems has long standing relationships with world technology leaders such as SUN for enterprise computing solutions, Intel and AMD for PCs and PC Servers; Microsoft, Novell and SCO for operating systems and software solutions; Toshiba Corp. for business automation

equipment; and Oracle, Sybase and Informix for RDBMS platform, EMC, Veritas for storage solutions. The aim is to straddle the entire landscape of information enabling technology far more comprehensively, effectively and competitively.

Indeed, a vision to create enterprises of tomorrow.

System AnalysisSystem/Requirement analysis phase is considered to be one of the most important phases in the system development life cycle. It is immensely important that the software developer make thorough study of the existing system. It refers into the process of examining a situation with the intent of improving it through better procedures and methods. System Analysis is the process of planning a new System to either replace or complement an existing system. But before any planning is done, the old system must be thoroughly understood and the requirements must be determined. System Analysis, is therefore, the process of gathering and interpreting facts, diagnosing problems and using the information to make improvements in the System. It is basically detailed explanation or description. Before automating a system under consideration, it has to be analyzed. We need to study how it functions currently, what are the problems, and what are the requirements that the proposed system should meet. The study will enable the developer to know the intricacies of the existing system. System Analysis is conducted with the following objectives in mind: o o o o Identify the public need. Evaluate the system concept for feasibility. Perform economic and technical analysis. Allocate functions to hardware, software people, database and other system elements.

Requirement analysis is done in order to understand the problem, which the software system is to solve e.g., the problem, could be automating the existing manual system or developing a completely new automated system or a combination of the two. For every system understanding the requirement of the system is a major task. The emphasis in requirement analysis is on identifying what is needed from the system, and not how the system achieves its goal. The main objective behind any business organization is to maximize its profit besides maintaining quality and strategic norms. This can be achieved by improving the efficiency of the system by providing more facilities using automation, by adopting faster data access, and proper communication.

FEASIBILTY STUDYA feasibility study is carried out to select the best system that meets performance requirements. Feasibility is the determination of whether or not a project is worth doing. The process followed in making this determination is called a feasibility study. This type of study determines if a project can and should be taken. Since the feasibility study may lead to the commitment of large resources, it becomes necessary that it should be conducted competently and that no fundamental errors of judgment are made. Depending on the results of the initial investigation, the survey is expanded to a more detailed feasibility study. Feasibility study is a test of system proposal according to its workability, impact on the organization, ability to meet user needs, and effective use of resources. The objective of the feasibility study is not to solve the problem but to acquire a sense of its scope. During the study, the problem definition is crystallized and aspects of the problem to be included in the system are determined. All projects are feasible given unlimited resources and infinite time. Unfortunately the development of computer-based system in many cases is more likely to be plagued by scarcity of resources and delivery date. Hence, we have made use the concept of reusability that is what Object Oriented Programming (OOPS) is all about. Consequently, costs and benefits are described with greater accuracy at this stage.

FOUR KEY CONSIDERATIONS ARE INVOLVED IN THE FEASIBILITY ANALYSIS. THESE ARE: TECHNICAL FEASIBILITY ECONOMIC FEASIBILITY BEHAVIOURAL FEASIBILITY OPERATIONAL FEASIBILITY

TECHNICAL FEASIBILITY:Technical Feasibility centers on the existing computer system (hardware/ software) and also it can support the modification. In manual processing there are more chances of errors, creating lot of complications, less technical or logical. Through proposed system we can set this process in a very systematic pattern, which is more technical, full proof, authentic, safe and reliable. For example, if the current computer is operating at 80 percent capacity - an arbitrary ceiling - then running another application could overload the system or require additional Hardware. This involves financial considerations to accommodate technical enhancements. If the budget is a serious constraint, then the project judged is not feasible. In this project, all the necessary cautions have been taken care to make it technically feasible. Using a key the display of text/object is very fast. Also, the tools, operating system and programming language used in this localization process is compatible with the existing one.

ECONOMIC FEASIBILITY: Economic analysis is the most frequently used method for evaluating the effectiveness of the candidate system. More

commonly known as cost/benefit analysis, the procedure is to be determining the benefits and savings that are expected from a candidate and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. A systems financial benefit must exceed the cost of developing that system. i.e. a new system being developed should be a good investment for the organization. Economic feasibility considers the following: o The cost to conduct a full system investigation. o The cost of hardware and software for the class of application. o The benefits in the form of reduced cost or fewer costly errors. o The cost if nothing changes (i.e. the proposed system is not developed).

BEHAVIOURAL FEASIBILITY:People are inherently resistant to change, and computers have been known to facilitate change. An estimate should be made of how strong a reaction the user staff is likely to have toward the development of a computerized system. Therefore it is understandable that the introduction of a candidate system requires special efforts to educate and train the staff. The software that is being developed is user friendly and easy to learn. In this way, the developed software is truly efficient and can work on any circumstances, tradition, locales. Behavioral study strives on ensuring that the equilibrium of the organization and status quo in the organization neither are nor disturbed and changes are readily accepted by the users.

Our proposed system works to minimize the human errors, take less time, easy interaction with user, bug free. This project/software is further expanded by connecting various interrelated departments and by installing an extension part of this software. o System level goals and requirements. o Cost estimation for development process and work product. o Solution strategy development. o Outlines of the several solutions strategies. o Recommendation of solutions strategy. o Feasibility and study of each strategy. o List of priorities for management.

OPERATIONAL FEASIBILITY:Operational feasibility is mainly related to the human organizational & political aspects. This feasibility study answers questions like: Will the system be used if it is developed and implemented? Will there be resistance from users that will undermine the possible application benefits? To get the answer of these questions, many methods are used like interviews, questionnaire, records checking and observation. One or two persons who are familiar with information system techniques, who understands the business and who are skilled in system analysis and design, generally carry out this feasibility study. The essential questions that help in testing the operational feasibility of a system as follows: o What changes will be made in the system?

o What organizational structures are? o What new skills will be required? Do the existing staff members have these skills? If not, can they be trained in due course of time? o Operational feasibility study is carried out by a small group of people who are familiar with information system technique who understand the parts of the business that are relevant to the project and are skilled in system analysis and design process? The feasibility study is carried out by a small group of people who are familiar with information system techniques, understand the part of business or organization that will be involved or affected by a project, and are skilled in the system analysis & design process.

GANTT CHARTGantt Chart is a project scheduling technique. Progress can be represented easily in a Gantt chart, by coloring each milestone when completed. The project will start in the month of January and end after 4 months at the end of April. A Gantt chart is a graphical representation of the duration of tasks against the progression of time. It is a useful tool for planning and scheduling projects. A Gantt chart is helpful when monitoring a project's progress. A Gantt chart lays out the order in which the tasks need to be carried out. A Gantt chart is a type of bar chart that illustrates a project schedule. Gantt charts illustrate the start and finish dates of the terminal elements and summary elements of a project. Terminal elements and summary elements comprise the work breakdown structure of the project. Gantt charts also show the dependency relationships between activities. Gantt charts can be used to show current schedule status. The Gantt chart is constructed with a horizontal axis representing the total time span of the project, broken down into increments (days, weeks, or months). The Gantt chart is constructed with a vertical axis representing the tasks that make up the project.

System Design Detailed Design Coding Unit Testing Test Plan Testing

Working months

January April

February

March

DATA FLOW DIAGRAM:A data flow diagram (DFD) is a graphical representation of the flow of data through an information system. A data flow diagram can also be used for the visualization of data processing (structured design). A data flow diagram could be a context level diagram (LEVEL 0), LEVEL 1, LEVEL 2. CONTEXT LEVEL DIAGRAM (LEVEL 0) This level shows the overall context of the system and its operating environment and shows the whole system as just one process. LEVEL 1 This level (level 1) shows all processes at the first level of numbering, data stores, external entities and the data flows between them. The purpose of this level is to show the major high level processes of the system and their interrelation LEVEL 2 This level is a decomposition of a process shown in a level 1 diagram, as such there should be a level 2 diagram for each and every process shown in a level 1 diagram.

0 LEVEL DFD FOR CRIME REPORTING

1 LEVEL DFD FOR CRIME REPORTING

2 LEVEL DFD FOR CRIME REPORTING

crimnal database search/ Mising citizen search

Crimnal Database Field By System Admin

sy st us em er

victim/Accused/witness Database

system user

general report

GIS

Admin investigation

others user mising citizen report mising citizen DataBaseBy E -Ma il

charge sheet

Fake Fir

FIR FAKE DB

case statusBy E-Mail

Database Diagrams

DATA DICTIONARY

The data dictionary is the repository of all the meta-data relevant to the objects stored in the databaseand also of information concerning the DBMS itself.

DICTIONARY CONTENT DEFINING METADETA The term metadata is often defined as data about data. That is, data that provides information about the tables, views, constraints, stored procedures, etc. stored within the database. If we take a table as an example, the dictionary will store information such as: its name when it was created and when it was last accessed the names and data types of its attributes (i.e. structural information)

its owner, who may read and write to it (i.e. security information) where the data is stored (i.e. physical information)

CURRENT STUDYProject:Project normally has many project activities associated with it, many employees involved and the employee can play several roles within a project (employee role in project). Name: Crime Reporting Employee: Amit Kumar Gupta Role:

Working on Administrator moduleModule Activity:

I have assigned 3 types of authorized users. Administrator Authorized Users General User (Others) Administrator-: Administrator have all authority of inserting, deleting, updating from database on the bases of proofing by the users. After 2 days admin will send user-id & password on the prescribed e-mail id. Admin can get any feedback from the user end by the contact form. Authorized User: Authorized users are of 4 types. Press Reporter Detective

Lawyer Police Everyone can register by the proof id & will get the registered no & the user-id will be send by the Admin to the e-mail id. General User: This type of user performs can following task. Firing FIR Missing FIR & see the list of following links: Laws Awards winners people Lost Vehicles About Indian Police Tips for safety Internet Crime Prevention Tips Help Line FAQs Declaimer Normal user can see the information magazine also and the whole information about the website/estimate The estimated time required for Employee to accomplish the task. (15-20 days)

PROPOSED SYSTEMThis section describes the proposed crime reporting system for the Region. This system was developed based on previous planning efforts And direct input from the public and interested agencies and groups. The Proposed system does include all TRPA Environmental Improvement Program (EIP) projects. However, not all of the proposed projects are EIP projects. Key criteria used in developing and Prioritizing the proposed system is listed below. Public Input - Consider and respond to public information in the Crime Reporting planning process. Use - Crime reporting facilities contained in the proposed System should reflect use levels that are commensurate with the Level of investment required for construction and maintenance. Coverage - The system should provide balanced access from all portions of the regions population centers for both commuting and recreation routes. Safety - The system should provide the highest level of safety Possible while eliminating major safety concerns such as narrow Roadways. Connectivity - The system should provide connections to major Activity centers, multi-modal transfer locations, and to routes that Provide access to neighboring counties. Activity centers include Residential neighborhoods, schools, regional parks, shopping Centers, employment centers, government centers, transit centers, And other recreational opportunities. Major gaps and barriers, Including narrow bridges and roadways, should be targeted as High priority items.

System DesignThe design phase decides how the system will operate, in terms of the hardware, software, and network infrastructure; the user interface, forms, and reports that will be used; and the specific programs, databases, and files that will be needed. Although most of the strategic decisions about the system were made in the development of the system concept during the analysis phase, the steps in the design phase determine exactly how the system will operate. The design phase has four steps: 1. The design strategy must be developed. This clarifies whether the system will be developed by the companys own programmers, whether it will be outsourced to another firm (usually a consulting firm), or whether the company will buy an existing software package. 2. This leads to the development of the basic architecture design for the system that describes the hardware, software, and network infrastructure that will be used. In most cases, the system will add or change the infrastructure that already exists in the organization. The interface design specifies how the users will move through the system (e.g., navigation methods such as menus and on-screen buttons) and the forms and reports that the system will use. 3. The database and file specifications are developed. These define exactly what data will be stored and where they will be stored. 4. The analyst team develops the program design, which defines the programs that need to be written and exactly what each program will do. This collection of deliverables (architecture design, interface design, database and file specifications, and program design) is the system specification that is handed to the programming team for implementation. At the end of the design

phase, the feasibility analysis and project plan are reexamined and revised, and another decision is made by the project sponsor and approval committee about whether to terminate the project.

Coding and FormsHome page

Admin Page

Authorized Person Login Page

General FIR

FIR Detail Form

Missing FIR Form

Criminal Form

Contact By E-mail Form:

Contact By Personally Form

CodingHome page codingusing using using using using using using using using using using using System; System.Data; System.Configuration; System.Collections; System.Web; System.Web.Security; System.Web.UI; System.Web.UI.WebControls; System.Web.UI.WebControls.WebParts; System.Web.UI.HtmlControls; System.Data.SqlClient; System.Windows.Forms;

public partial class Default4 : System.Web.UI.Page { string s = ConfigurationManager.ConnectionStrings["Crime_ProjectCo nnectionString"].ToString(); protected void Page_Load(object sender, EventArgse) { } protected void Button2_Click(object sender, EventArgs e) { TextBox1.Text = ""; TextBox2.Text = ""; } protected void Button1_Click(objectsenderEventArgse) { SqlConnection con = new SqlConnection(s); con.Open(); SqlCommand cmd = new SqlCommand("admin_check", con);

cmd.CommandType = CommandType.StoredProcedure; cmd.Parameters.AddWithValue("@userid", TextBox1.Text); cmd.Parameters.AddWithValue("@password" , TextBox2.Text); SqlDataReader dr= cmd.ExecuteReader();

if (dr.HasRows ) { // //MessageBox.Show("your userid and passwordis valid"); dr.Read(); Session["type"] = dr["designation"].ToString(); Session.Add("name", TextBox1.Text); string des = Session["type"].ToString(); Session.Add("designation", des); Response.Redirect(@"~\Admin_Home.aspx ");

} else { MessageBox.Show("your userid and passwordis is not valid"); TextBox1.Text = ""; TextBox2.Text = ""; } //con.close(); }

}

Admin page codingusing using using using using using using using using using using System; System.Data; System.Configuration; System.Collections; System.Web; System.Web.Security; System.Web.UI; System.Web.UI.WebControls; System.Web.UI.WebControls.WebParts; System.Web.UI.HtmlControls; System .Data .SqlClient;

public partial class Admin_Home : System.Web.UI.Page { string s = ConfigurationManager.ConnectionStrings["Crime_ProjectCo nnectionString"].ToString(); protected void Page_Load(object sender, EventArgs e) { string str; if (Session["name"]==null ) { Response.Redirect(@"~\Home.aspx"); } str = Session["name"].ToString(); string ctr; ctr = Session["designation"].ToString(); Label3.Text = str; Label7.Text = ctr; SqlConnection con = new SqlConnection(s); con.Open();

();

string date1=DateTime .Now .ToShortDateString

SqlCommand cmd = new SqlCommand("select count(*) from manu_gen_crime_fir_table where date_time_of_report='" + date1 +"'", con); SqlDataReader rd = cmd.ExecuteReader(); if (rd.HasRows) { rd.Read(); LinkButton1.Text = rd[0].ToString(); } else { } con.Close(); con.Open(); SqlCommand cmd1 = new SqlCommand("select count(*) from Authorized_Person_Login where dateofrequest='" + date1 + "'", con); SqlDataReader rd1 = cmd1.ExecuteReader(); if (rd1.HasRows) { rd1.Read(); LinkButton4.Text = rd1[0].ToString(); } con.Close(); if (Label7.Text .Equals("Layers")|| Label7.Text .Equals("Police")||Label7.Text .Equals("Detective")||Label7.Text .Equals("Press Reporter")) { HyperLink1.Enabled = false; HyperLink3.Enabled = false; HyperLink4.Enabled = false; HyperLink5.Enabled = false; } }

protected void LinkButton3_Click(object sender, EventArgs e) { Session["name"] =null ; //Session.Abandon(); } protected void LinkButton2_Click(object sender, EventArgs e) { // Session.Abandon(); } }

Authorized Person Login page codingusing using using using using using using using using using using System; System.Data; System.Configuration; System.Collections; System.Web; System.Web.Security; System.Web.UI; System.Web.UI.WebControls; System.Web.UI.WebControls.WebParts; System.Web.UI.HtmlControls; System.Data.SqlClient ;

public partial class Authorized_Person_Login : System.Web.UI.Page { string s = ConfigurationManager.ConnectionStrings["Crime_ProjectCo nnectionString"].ToString(); int j = DateTime.Now.Year - 18; protected void Page_Load(object sender, EventArgs e) { TextBox9.Text = DateTime.Now.ToShortDateString(); TextBox9.Enabled = false; if (!IsPostBack) { ddlistyear.Items.Add("--Select--"); ddlistday.Items.Add("--Select--"); for (int i = 1930; i