SlideShare a Scribd company logo
 
 
 
 
 
 
 
 
 
 
 
Project Team:     
Team Null 
 
Team Members:     
Gabriel Pastor 
 
David Suon 
 
Lloyd Foreman 
 
Charlie Thach 
 
Mohammad I Safdar 
 
Project Sponsor:                         ​Dr. Khan 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
This document is the Software User Manual for the Safety Management System Tools project. This 
Software User Manual instructs how to install and use the Safety Management System Tools 
software. This software was created as part of the Senior Project requirement for Computer Science 
majors for California State University Sacramento. This software implements the Predictive method 
for several road segments, described in the California Highway Safety Manual.   
 
This application is designed to provide information only in regard to the subject matter covered. It is 
distributed with the understanding that the publisher is not engaged in rendering legal, accounting, or 
other professional services. If legal advice or other expert assistance is required, advice from local 
law enforcement and social service agencies, and/or the services of a competent professional 
should be sought.  
Background: 
The Highway Safety Manual Tool(HSMT) program will identify sites with potential for safety 
improvement, diagnose conditions at the site, evaluate conditions and the effectiveness at 
reducing crashes of the programmed treatments. HSMT will have a predictive method to 
estimate crash frequency and severity. In addition, the program will have access to a 
MySQL database and database manage (PhpMyAdmin), where the crash information can 
be retrieve/store.  
 
Configuring workspace: 
 
1. Setup Database Server 
a. Install Database 
i. Install VirtualBox (Can be download: 
https://www.virtualbox.org/wiki/Downloads​) 
ii. Double click WorkingLamp.ova and import it to your virtualBox.  
b. Turn on Database  
i. Login into Database (User Name: *****, Password: *****)  
ii. The IP address of the server should be: ***************** 
c. Check PhpMyAdmin 
i. Check that PhpMyAdmin is working by going onto the host web browser 
by : **************/phpmyadmin 
ii. There should be the login for the database. (User: root, Password: root)  
iii. Once you can successfully login, then the server is on and working.  
 
 
 
 
 
2. Starting the Application  
a. In order to start the program, the user must double­click on the executable jar 
file.  
b. Home screen  
  
 
3. Import data  
a. Import data from Local: 
i. From the Home Screen, click on the “Import Crash Data” button. 
 
 
 
 
ii. An additional window will pop up prompting to select from a local or 
database option. Select Local.  
 
 
 
iii. An additional window will prompt the user to the files they wish to load. 
 
b. Import data from Database: 
i. From main menu click “Crash Import Data”, then click the “Database”. 
This should import all the files from the “dropbox” folder into the 
database.  
4. Conduct Analysis 
a. To conduct analysis on a specific road segment, click on the “Conduct 
Analysis” button.   
 
b. Select the type of road segment that you would like to analyze.  
   
c. Select the specific road segment from the list of road types available 
 
d. Fill out any additional info that is prompted in the window.  
 
e. After navigating through all the additional information windows, an output 
screen will be displayed with information, including the predicted Crash 
Reduction Factor and recommended Countermeasures. 
 
f. In order to save the analysis for Determining Countermeasure Effectiveness, 
select the save button at the button. A screen will open which will allow the 
user to name file and specify the file location. 
 
5. Determine Countermeasure Effectiveness 
a. To determine Countermeasure Effectiveness, click on the “Determine 
Countermeasure Effectiveness” button.  
 
b. Once the button is pressed, a new window will open prompting to choose the 
desired analysis file (from the Conduct Analysis section) 
 
c. Once the file is opened, a new window will prompt the user to select the 
desired Countermeasure.  
 
d. Once the Countermeasure is selected, the user will be prompted to enter the 
average annual crash value for the road segment.  
 
 
 
 
 
e. Once the data is entered, the results of the chosen Countermeasure will be 
displayed on the screen.  
 
6. Visual Data 
a. From the main menu, click on the “Visual Crash Data” button.  
 
 
 
 
b. A new pop­up window should appear prompting for a Three Legged or Four 
Legged Intersection selection. 
 
c. A new window will appear, prompting to enter the name of the Main and Minor 
roads.  
 
 
 
 
d. Output  
Three Legged 
 
Four Legged 
 
PhpMyAdmin: 
Turn on the virtual machine server.  
 
Once server is on, you can access database in linux or browser. Browser will require to login into 
PhpMyAdmin 
 
 
 
An example of setting primary keys or unique keys.  
 
 
 
 
 
 
 

More Related Content

Similar to UserManualFinal

Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
Anjali Arora
 
Staffing Software Key Capabilities - Hidden Brains Infotech
Staffing Software Key Capabilities - Hidden Brains Infotech Staffing Software Key Capabilities - Hidden Brains Infotech
Staffing Software Key Capabilities - Hidden Brains Infotech
Rosalie Lauren
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Pace IT at Edmonds Community College
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
SUBHI7
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docx
whitneyleman54422
 
World-Check One Brochure
World-Check One BrochureWorld-Check One Brochure
World-Check One Brochure
Michel El Maalouly
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
SathishKumar960827
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
toltonkendal
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware Practices
Diane M. Metcalf
 
Emergency ambulance portal-PPT-3g2pqy.pptx
Emergency ambulance portal-PPT-3g2pqy.pptxEmergency ambulance portal-PPT-3g2pqy.pptx
Emergency ambulance portal-PPT-3g2pqy.pptx
dragonaklevel7
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
Muhammad Alhalaby
 
HP Fortify!
HP Fortify!HP Fortify!
HP Fortify!
Satya Harish
 
Research/thesis poster
Research/thesis posterResearch/thesis poster
Research/thesis poster
PavanPardeshi1
 
FFIEC Cybersecurity Assessment Report CAR Example .pdf
FFIEC Cybersecurity Assessment Report CAR Example .pdfFFIEC Cybersecurity Assessment Report CAR Example .pdf
FFIEC Cybersecurity Assessment Report CAR Example .pdf
Corporate Compliance Seminars
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Happiest Minds Technologies
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
Zoe Gilbert
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
iaemedu
 
WHY ARE PERMIT TO WORK SYSTEMS IMPORTANT
WHY ARE PERMIT TO WORK SYSTEMS IMPORTANTWHY ARE PERMIT TO WORK SYSTEMS IMPORTANT
WHY ARE PERMIT TO WORK SYSTEMS IMPORTANT
Olivia Wilson
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
 

Similar to UserManualFinal (20)

Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Staffing Software Key Capabilities - Hidden Brains Infotech
Staffing Software Key Capabilities - Hidden Brains Infotech Staffing Software Key Capabilities - Hidden Brains Infotech
Staffing Software Key Capabilities - Hidden Brains Infotech
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docx
 
World-Check One Brochure
World-Check One BrochureWorld-Check One Brochure
World-Check One Brochure
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware Practices
 
Emergency ambulance portal-PPT-3g2pqy.pptx
Emergency ambulance portal-PPT-3g2pqy.pptxEmergency ambulance portal-PPT-3g2pqy.pptx
Emergency ambulance portal-PPT-3g2pqy.pptx
 
Risk Based Software Planning
Risk Based Software PlanningRisk Based Software Planning
Risk Based Software Planning
 
HP Fortify!
HP Fortify!HP Fortify!
HP Fortify!
 
Research/thesis poster
Research/thesis posterResearch/thesis poster
Research/thesis poster
 
FFIEC Cybersecurity Assessment Report CAR Example .pdf
FFIEC Cybersecurity Assessment Report CAR Example .pdfFFIEC Cybersecurity Assessment Report CAR Example .pdf
FFIEC Cybersecurity Assessment Report CAR Example .pdf
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
 
WHY ARE PERMIT TO WORK SYSTEMS IMPORTANT
WHY ARE PERMIT TO WORK SYSTEMS IMPORTANTWHY ARE PERMIT TO WORK SYSTEMS IMPORTANT
WHY ARE PERMIT TO WORK SYSTEMS IMPORTANT
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 

UserManualFinal