+ All Categories
Home > Documents > Crime Records Management System 1

Crime Records Management System 1

Date post: 04-Jun-2018
Category:
Upload: sagar-paulg
View: 225 times
Download: 0 times
Share this document with a friend

of 65

Transcript
  • 8/13/2019 Crime Records Management System 1

    1/65

    CRIME AUTOMATION &

    REPORTING SYSTEM

    ONTENTS

    1. Synopsis2. Organization Profile3. Project Overview4. System Analysis

    4.1 Existing System4.2 Proposed System

    4.3 Feasibility Study4.3.1 Economic Feasibility4.3.2 Technical Feasibility4.3.3 Behavioral Feasibility

    4.4 Tools & PlatformsUsed5. Requirement Analysis

    5.1 Problem Recognition5.2 Problem Evaluation and Synthesis5.3 Modeling

    6. System Design6.1 Data Design6.2 Architectural Design6.3 Procedural Design6.4 Interface Design

    7. Coding8. System Testing

    8.1 Testing Process8.2 Unit Testing8.3 Integration Testing

    8.4 Validation Testing9. Implementation

    9.1 Implementation Procedures10. Software Maintenance11. Conclusion

    AppendicesAppendix A(DFD)Appendix B(Tables)

    Appendix C(Input forms and Output forms)

  • 8/13/2019 Crime Records Management System 1

    2/65

  • 8/13/2019 Crime Records Management System 1

    3/65

    SYNOPSIS

  • 8/13/2019 Crime Records Management System 1

    4/65

    SYNOPSIS

    Synopsis is a general documentation tool. By means of a modular structure, it

    adapts to different styles of embedded documentation, different programminglanguages and various output formats. It scales well with the size of the project by

    allowing processing to be controlled by making files.

    The Crime Records Management System applies to Police Stations all across the

    country and specifically looks into the subject crime prevention, detection, conviction

    of criminals depending on a highly responsive backbone of Information Management.

    Modules of the project

    Administrators module will be focusing on the maintenance like Master Data

    Maintenance, Removal of old and outdated data from the software etc.

    Station module deals with processing of complaints, creating FIR, entering victim &

    witness details etc. All the basic processing of a station will be done in this module.

    Citizen module is for the public user, who has a complaint to register.

    Crime module is used for entering all details about the crime. It contains the date,

    police station where it is recorded, place, Nature of Crime etc.

    Search module is for searching crime in station wise, nature of crime.

    Avocation Module deals with the Law part of every Crime.

  • 8/13/2019 Crime Records Management System 1

    5/65

    ORGANIZATION PROFILE

  • 8/13/2019 Crime Records Management System 1

    6/65

    ORGANIZATION PROFILEWebsoft Technologies is a Software Development Company dedicated to helping itsClients to develop and transform their organizations at every step of the value chain.Websoft Technologies with its clients in achieving success in the Global market with itsspecialized expertise in providing Onsite, Offsite and Offshore IT services and

    solutions. The range of our services covers the entire spectrum from IT architecture toApplication Development and Integration, maintenance, enhancement, testing and ITenabled services.We keep our clients happy by rolling up our sleeves and getting the job done, tapping awide-range of outstanding technical capabilities. Our employees offer a professionalheritage spanning Old World legacy systems as well as the New Economy's leading-edge technologies to deliver innovative business and technical solutions to today's

    business leaders.We specialize in providing various services like Website Design and Development,Web Application Development, Desktop Application Development and ProductDevelopment with an Innovative approach to Technology and designing methods.

    Quality PolicyTo pursue global standards of excellence in all our endeavors namely research,

    production, consultancy and talent transformation and to remain accountable in our coreand support functions, through processes of self-evaluation and continuousimprovement.

    Management Team:The People of Websoft Technologies are professionals, who are knowledgeable andhave real-world experience of the application development. The interactive session

    conducted during the class helps student to clear the concept and learn faster. With richexperience in technology consulting, providing solutions for complex and diverseproblems to corporate, all our members are well informed and conversant about thelatest technological advancement in their specialization which eventually, enables themto impart technology beyond course content and help the students in overallunderstanding of applications.

    Corporate Social Responsibility

    What distinguishes Soft Solution f rom i ts competitors is the work cul ture of

    excellence, which is the result of our commitment to a greater cause.

    Mr. G. Paul, M .DTRAINING PROGRAMWebsoft Technologies Center of Excellence Training devision is established to serveupcoming industry needs and we are delivering Certification Courses with Best IndustryStandards, these courses are designed to suit every skill level, as well as the ability totailor made learning plans for any number of employees. Our products and serviceshave a wide appeal and are applicable those in varied positions including networkadministrators, systems analysts, systems architects, test engineers, software developers,help desk staff, IT managers, senior executives and business professionals, we followdifferent training methodologies

  • 8/13/2019 Crime Records Management System 1

    7/65

    Class Room Training On-Line Training Corporate Training

    APPLICATION DEVELOPMENT

    1) Web Application Development2) Mobile Application Development3) Android4) iPhone

    ACADEMIC PROJECTS

    Academic Projectsan offers an excellent environment for Projects, research andapplications in the field of Technical Education. Students at the Colleges, along with thefaculty, actively contribute to research work in Industry.

    Besides this, the Academic Projectsgives an opportunity to the B.E and M.C.Astudents across the country, to get involved in many long-term as well as short-term

    projects within the campus. Many of the projects are sponsored by the industry.

    Incepted recently, Academic Projectsis an age-old idea that has been brought to actionfor the first time. With a sole aspiration of paving way for innovative ideas brought up

    by institutes, students, mentors and companies,Academic Projectseases up the realchallenge of project development and execution.

    Prior to being launched as a fully web-based solution to discuss project queries, Academic projectswas a group of engineers who endeavored to change the waypreliminary level projects are thought of, planned and executed. Gradually, this groupcame to be recognized among their acquaintances. A huge demand for a project-discussion web space from college students, corporate individuals and emergingcompanies made these guys go online and that is whenAcademic Projectscame intoexistence.

    Today, we are supporting several real time projects that help various individuals addvalue to their resumes and annual sheets.Academic Projectsworks towardstransforming, cultivating and nurturing the spirit of project development, thus playing a

    vital role in creating intellectual corporate executives.

  • 8/13/2019 Crime Records Management System 1

    8/65

    PROJECT OVERVIEW

  • 8/13/2019 Crime Records Management System 1

    9/65

    PROJECT OVERVIEW

    The Crime Records Management System applies to Police Stations all across the

    country and specifically looks into the subject crime prevention, detection, convictionof criminals depending on a highly responsive backbone of Information Management.

    The efficiency of the Police and the effectiveness with which it tackles crime depend

    on what quality of information it can derive from its existing records and how fast it

    can have access to it.

    I had done this project using ASP.NET as front end and SQL Server as back end

    easing the effort of user.

    Modules of the Project

    1) Station module

    Each of the station must first register with the Software. For the registration part each

    station enter their details like station name, address, phone no, station in charge etc.

    and get a User Id from the Software. Once the prospective station registers with the

    software they can avail the existing records.

    2) Citizen module

    Each of the citizens, who has a complaint to register, must first register with the

    Software. For the registration part each person enter their details like name, address,

    phone no., E-Mail ID etc. and get a User Id & password from the Software. Once the

    registration is complete, the citizen can sign-in to the website & register their

    complaint.

    3) Crime module

    This module is used for entering all details about the crime. It contains the date and

    time, police station where it is recorded, place, Nature of Crime, Location of the

    Crime etc.

    4) Search module

    In this module we can search the crime in station wise, nature of crime.

  • 8/13/2019 Crime Records Management System 1

    10/65

    5) Administrators Module

    The module will be protected by user ID and password. Ordinary users of the

    software will not be permitted to enter into this area of the software. The module will

    be focusing on the maintenance like Master Data Maintenance, Removal of old and

    outdated data from the software etc.

    6) Avocation Module

    This Module deals with the Law part of every Crime.

    ABOUT THE DEVELOPING SYSTEM

    The system has developed in ASP.NET as front end and SQL server 2000 as back

    end.

    ASP.NET (Active Server Pages.net)

    WHAT IS ASP.NET: Microsoft ASP.NET is a free technology that allows

    programmers to create dynamic web applications.ASP.NET can be used to create

    anything from small, personal websites through to large, enterprise-class web

    applications. ASP.NET is the latest version of Microsoft's Active Server Pages

    technology (ASP).ASP.NET is a part of the Microsoft .NET framework, and a

    powerful tool for creating dynamic and interactive web pages. All we need to get

    started with ASP.NET is the free .NET Framework and the free Visual Web

    Developer.

    ASP: ASP is a server side scripting technology that enables scripts (embedded in web

    pages) to be executed by an Internet server

    About VB.NET

    Microsoft.net was formerly known as next generation windows services (NGWS for

    short).It is a completely new platform for developing the next generation of windows

  • 8/13/2019 Crime Records Management System 1

    11/65

    /web applications. These applications would transcend device boundaries and fully

    harness the power of internet. However, this new platform required a language,

    which could take its fully advantage; this is one of factors that led to the

    development of VB. VB has evolved from QBASIC language. The VB compiler is

    considered to be the most efficient compiler in the .net family and a major part of the

    .net based classes libraries, itself are written in VB.

    SQL Server 2000

    Microsoft SQL Server 2000 is a relational database management system (RDBMS)

    produced by Microsoft. Its primary query language is Transact SQL, an

    implementation of the ANSI/ISO standard SQL used by both Microsoft and Sybase.

    SQL Server allows multiple clients to use the same database

    concurrently. SQL Server provides two modes of concurrency control: pessimistic

    and optimistic concurrency. When pessimistic concurrency control is being used, SQL

    Server controls concurrent access by using locks. Locks can be either shared or

    exclusive. Exclusive lock grants the user exclusive access to the data no other user

    can access the data as long as the lock is held. Shared locks are used when some data

    is being read-multiple users can read data locked with a shared lock, but not acquire

    an exclusive lock. SQL Server also provides the optimistic concurrency control

    mechanism, which is similar to the multiversion concurrency control used in other

    databases.

  • 8/13/2019 Crime Records Management System 1

    12/65

    SYSTEM SPECIFICATIONS

    SOFTWARE SPECIFICATIONS

    The Crime Reporting System must use Microsoft SQL server 2000 as its database

    component.

    Software Requirements

    The software requirements include the software that is required for working. Software

    requirements are as follows:

    Developments Tools

    ASP .NET uses the new ADO .NET.

    ASP .NET supports full Visual Basic, not VBScript.

    ASP .NET supports C# (C sharp) and C++.ASP .NET supports JScript as

    before.

    Database

    SQL Server

    Application Server

    Sun Microsystems

    Operating System

    Windows XP Professional

  • 8/13/2019 Crime Records Management System 1

    13/65

    HARDWARE SPECIFICATION

    Hardware interfaces specifies the logical characteristics of each interface between the

    software product and the hardware components of the system. Many business type

    applications will not have hardware interfaces, since Crime Reporting System is an

    application it too will not require any particular hardware interface.

    Hardware Requirements

    The hardware for the project should be selected in such a way that it should give the

    maximum optimal result .Hardware requirements are as follows:

    Server Side

    Processor :Intel Pentium (II) or higher

    128 MB RAM

    2 GB Hard Disk or more

    SVGA Color Monitor

    104 Keyboard

    Any Mouse

    Any modem

    Client Side

    Processor :Intel Pentium (II) or higher

    128 MB RAM

    2 GB Hard Disk or more

    SVGA Color Monitor

    104 Keyboard

    Any Mouse

    Any Modem

  • 8/13/2019 Crime Records Management System 1

    14/65

    SYSTEM ANALYSIS

  • 8/13/2019 Crime Records Management System 1

    15/65

    SYSTEM ANALYSIS

    System Analysis works with users to identify goals and build systems to achieve

    them. System analysis is an important phase of any system development process. Thesystem is studied to the minutest details and analyzed. The system analyst plays the

    role of an interrogator and dwells deep in to the working of the present system. In

    analysis, a detailed study of these operations performed by a system and their

    relationships within and outside of the system is done. A key question considered here

    is, what must be done to solve the problem? One aspect of analysis is defining the

    boundaries of the system and determining whether or not the candidate system should

    be considered. The system is viewed as a whole and the inputs to the system are

    identified. The outputs from the system are traced through the various processing that

    the input phases through in the organization. During analysis, data are collected on

    available files, decision points, and transaction handled by present system. Once

    analysis is completed the analyst has a firm understanding of what is to be done.

    EXISTING SYSTEM

    In the existing crime management system, most of the operations are done manually

    like send complaints, taking actions against crimes, view status etc. So with the

    existing system if anybody wants to complaint against crimes he must do it through

    the police.

    If we are doing the system manually, so many minor errors will occur. Error detection

    in the previous entries made and data cross verification is another important function.

    These are done manually, and it would take time.

    Drawbacks of the existing system can be concluded as follows:

    The existing system is time consuming and not very user friendly.

    The FIR brought by a person hailing from a family beyond poverty, the existing

    system shows ignorance for the same

  • 8/13/2019 Crime Records Management System 1

    16/65

    The officer dealing with a particular case cannot take decision by himself even

    when he is having the first hand knowledge/information about the case and he can

    expect obstructions from higher authorities/officials.

    Even an efficient officer cannot/may not able to handle more than one case at a

    time.

    As we all know, a covered truth, Bribery plays an important role in the existing

    system.

    Many cases are pilled up in the corners, which are not proved, due to lack of

    commitment in the job.

    In most of the cases, the innocent are accused in the existing system.

    As per our jurisdiction, Let thousand criminals escape-not a single innocent be

    punished . As a result of this and other factors that influence investigation, such as

    bribery, the innocent becomes accused in several situations in the eyes of Justice.

    The existing system could provide only investigation and there is no Advocating,

    Counseling facilities etc. hence no contact or control or co-ordination on these cell.

    They criticized it for being inefficient, time consuming, poorly managed, disparate

    and lacking flexibility.

    Evaluation requires monitoring crime before, during and after the initiative.

    Facts other than these initiatives may also impact on crime levels which makes

    evaluation particularly difficult.

    Because of the amount of serious crime, lesser crime goes unchecked. Many

    crimes become regarded as antisocial activities.

  • 8/13/2019 Crime Records Management System 1

    17/65

    PROPOSED SYSTEM

    Our mission statement directs us to promote the public interest while balancing the

    Law. Obviously well not rush to judgment, but will look at the facts and render a

    thoughtful decision based on these facts. Organization is an independent statutory

    body which was created to maintain an effective an effective and efficient police

    service for the public. Its primary task includes securing continuous needs of the

    public in an efficient manner. As part of the responsibility, our committee is

    responsible for performance monitoring (performance planning and review formerly

    professional standards and performance monitoring) decided to look at the

    contribution and effectiveness of the organization within the public. We need the

    whole hearted support of each and every individual member of the site and

    cooperation of the users. The administrator, along with the investigators, lawyers,

    counselors, and other authorities statutory partners in our organization. Given their

    key role in these partnerships, we felt that an overview of strength and Weakness of

    the organization is needed.

    The aim of the project is to bring about improvement to the organizations

    contributions; this report necessarily concentrates on overcoming weakness and

    raising standards. To avoid conducting and unfair evaluation efforts which are made

    to put this contribution into this context. It believes that partnership work is highly

    beneficial to the organization and that partnership work is the way forward to reduce

    crime and disorder.

    Advantages of the Proposed System:

    The scrutiny was carried out through the collection of written and oral evidence.

    Better communication, better leadership, better training, more defined roles

    in terms of contribution to contribution to the society.

    Working with partners.

    Reducing crime and disorder.

    Confidently and anonymity issues.

  • 8/13/2019 Crime Records Management System 1

    18/65

    The proposed system has control over all its cells and is perfectly coordinated. Also

    the cells can act individually. To take our organization to heights we need the

    wholehearted co-operation of the public.

    Objectives of the Proposed System

    In the fast moving world, if people lack something, it is time. All are busy in their

    world. It will be welcomed if services are provided at their will. So the main objective

    of our product is better communication, better leadership, reducing crime and disorder

    etc.

    The product provides a framework within which a user can easily work with. That

    was out next objective. We know users are of many categories, like users from who

    know working with computers very well to users who didnt know about computers.

    So all the category can use the software. So it should be user friendly.

    The product provides a framework, which is error free. We know a crime

    management system is actually a critical process having many calculations and

    operations. So each simple error laid to big problem. So it should be error free and our

    objective is to build error free software.

  • 8/13/2019 Crime Records Management System 1

    19/65

    FEASIBILITY STUDY

    A feasibility study is a test of system proposal according to its workability,

    impact on the organization, ability to meet user needs and effective use of resources.

    Apart from these, an initial investigation is launched to study the present system,

    evaluate the possible application of computer based of methods. Selecting a tentative

    system, evaluate the cost and effectiveness of the proposed system, evaluate the impact

    of the proposed system, existing personal and ascertain the need of new personal.

    To define an improved information system, the study group must understand the

    information requirements of the organization. This understanding may be obtained by

    determining what is currently being done and of investigating through interviews and

    analysis what information is needed to be provided that is not being furnished by the

    existing system . Data on the cost of operating the current system needs to be collected

    in order to make a cost benefit for a new system.

    The objective of feasibility study is not to solve the problem, but to acquire a

    sense of its scope. During the study, the problem definition is crystallized and aspects of

    the problem to be included in the system are determined, consequently costs and

    benefits are estimated with greater detail at this stage. The result of the feasibility study

    is a system formal proposal. This is a simply a form of documenting or detailing the

    nature and scope of proposed solutions. The proposal summarizes what is known and

    what is going to be done. Three key considerations involved in the feasibility analysis:

    Economic feasibility

    Technical feasibility

    Behavioral feasibility

  • 8/13/2019 Crime Records Management System 1

    20/65

    ECONOMIC FEASIBILITY:

    Economic analysis is the most frequently used method for comparing the cost

    with the benefit or income that is expected from developed system.

    In the existing system, many people are involved in the process but in the

    proposed system, number of persons involved be reduced drastically. So the proposed

    system is economic.

    In the existing system, storage of all these records should be arranged and

    security should be provided for the records. In the proposed system, separate security

    arrangement is not needed since the software provides security and maintenance is

    simply and hardly needs one or two person to operate the system.

    TECHNICAL FEASIBILITY:

    The feasibility center on the existing computer system (software, hardware) and

    to what extend it can support the proposed addition.

    In the proposed system, data can be easily stored and managed in database

    management system software.

    The results for various queries can be generated easily.

    Therefore, the system is technically feasible

    BEHAVIORAL FEASIBILITY:

    People are inherently resistant to change and computer has known to facilitate

    change. An estimate should be made of how strong a reaction the user staff likely to

    have towards the developments of computerized system.

    In the existing system more manpower is required and time factor is more but in the

    proposed system, manpower and time factors are reduced .So, the remaining

    numbers are engaged with some other important works.

  • 8/13/2019 Crime Records Management System 1

    21/65

    An SRS is basically an organization's understanding (in writing) of a customer

    or potential client's system requirements and dependencies at a particular point in time

    (usually) prior to any actual design or development work. It's a two-way insurance

    policy that assures that both the client and the organization understand the others

    requirements from that perspective at a given point in time.

  • 8/13/2019 Crime Records Management System 1

    22/65

    TOOLS & PLATFORMS USED

    TOOLS & PLATFORMS

    Operating System : Windows NT/2003 Server

    Front End : ASP.Net with VB

    Back End : SQL SERVER 2005

    Features of software used

    About Windows 2003

    Windows 2003 Server includes improved network, application and Web

    services. It provides increased reliability and scalability, lowers your cost of computing

    with powerful, flexible management services, and provides the best foundation for

    running business application.

    The Windows GUI

    The familiar graphical user interface it presents to the world.

    Computing Model

    Windows 2003 Server operations are based on a client-server computing model.

    This is a model in which the computing workload is shared between the server and the

    client. It is a co-operative relationship that divides the workload evenly between

    machines or processes on a single machine.

    Visual Studio .NET

    Visual Studio .Net is the rapid application development tool for BASIC. Visual

    Studio .Net offers complete integration withASP.NET and enables to drag and drop

    server controls and design Web Forms as they should appear when user views them.

    http://asp.net/http://asp.net/
  • 8/13/2019 Crime Records Management System 1

    23/65

    The .NET Framework is a multi-language environment for building, deploying,

    and running XML Web services and applications. It consists of four main parts:

    Common Language Runtime: Despite its name, the runtime actually has a

    role in both a component's runtime and development time experiences. While

    the component is running, the runtime is responsible for managing memory

    allocation, starting up and stopping threads and processes, and enforcing

    security policy, as well as satisfying any dependencies that the component might

    have on other components. At development time, the runtime's role changes

    slightly; because it automates so much (for example, memory management), the

    runtime makes the developer's experience very simple, especially when

    compared to COM as it is today. In particular, features such as reflection

    dramatically reduce the amount of code a developer must write in order to turn

    business logic into a reusable component.

    Unified programming classes: It is a completely new platform for

    developing the next generation of windows /web applications. These

    applications would transcend device boundaries and fully harness the power

    of internet. However, this new platform required a language, which could

    take its fully advantage; this is one of factors that led to the development of

    VB. VB has evolved from QBASIC language. The VB compiler is

    considered to be the most efficient compiler in the .net family and a major

    part of the .net based classes libraries, itself are written in VB.

    Some of the other advantages of creating BASIC applications in Visual Studio

    .Net are:

    Visual Studio .Net is a Rapid Application (RAD) tool. Instead of adding each

    control to the Web Form programmatically, it helps to add these controls by

    using toolbox, saving programming efforts.

    Visual Studio .Net supports custom and composite controls. Can create custom

    controls that encapsulate a common functionality that might need to use in a

    number of applications.

  • 8/13/2019 Crime Records Management System 1

    24/65

    Visual Studio .Net does a wonderful job of simplifying the creation and

    consumption of Web Services. Mush of the programmer-friendly stuff (creating all the

    XML-based documents) happens automatically, without much effort on the

    programmers side. Attribute-based programming is a powerful concept that enables

    Visual Studio .Net to automate a lot of programmer-unfriendly tasks.

    .NET programming languages: The .NET Framework provides a set of tools

    that help to build code that works with the .NET Framework. Microsoft provides

    a set of languages that are already .NET compatible. BASIC is one of those

    languages.

    ASP.NET environment: Active Server Pages were released by Microsoft to

    enable the creation of dynamic pages based on user input and interaction with a

    Web site.ASP.NET improves upon the original ASP by providing code-behind.

    WithASP.NET and code-behind, the code and HTML can be

    separated.ASP.NET Web services are XML-based services that are exposed on

    the Internet that can be accessed by other Web services and Web service clients.

    ASP.NET

    ASP.NET is more than the next version of Active Server Pages (ASP); it is a

    unified Web development platform that provides the services necessary for developers to

    build enterprise-class Web applications. WhileASP.NET is largely syntax compatible

    with ASP, it also provides a new programming model and infrastructure for more secure,

    scalable, and stable applications.

    ASP.NET is a compiled, .NET-based environment; you can author applications

    in any .NET compatible language, including VisualBasic.NET, BASIC, andJScript.NET. Additionally, the entire .NET Framework is available to

    anyASP.NET application. Developers can easily access the benefits of these

    technologies, which include the managed common language runtime environment, type

    safety, inheritance, and so on.

    ASP.NET has been designed to work seamlessly with WYSIWYG HTML

    editors and other programming tools, including Microsoft Visual Studio .NET. Not only

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/
  • 8/13/2019 Crime Records Management System 1

    25/65

    does this make Web development easier, but it also provides all the benefits that these

    tools have to offer, including a GUI that developers can use to drop server controls onto

    a Web page and fully integrated debugging support. Developers can choose from the

    following two features when creating anASP.NET application, Web Forms and Web

    services, or combine these in any way they see fit.

    Web Forms allows you to build powerful forms-based Web pages. When

    building these pages, you can useASP.NET server controls to create common

    UI elements, and program them for common tasks. These controls allow you to

    Rapidly build a Web Form out of reusable built-in or custom components,

    simplifying the code of a page.

    An XML Web service provides the means to access server functionality

    remotely.

    ASP.NET ARCHITECTURE

    .NET ARCHITECTURE

    As the illustration shows, all Web Administrators communicate

    withASP.NET applications through IIS. IIS deciphers and optionally authenticates the

    request. If Anonymous is turned on, no authentication occurs. IIS also finds the

    requested resource (such as anASP.NET application), and, if the client is authorized

    returns the appropriate resource.

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/
  • 8/13/2019 Crime Records Management System 1

    26/65

    In addition to the built-inASP.NET security features, anASP.NET application

    can use the low-level security features of the .NET Framework.

    Features

    Reliable Interoperability

    Employ code to call native Windows APIs, use pre-built COM components, and

    leverage existing ActiveX controls to seamlessly integrate existing applications and

    components.

    Modern, Component-Oriented Language

    Take advantage of inherent support for properties, indexers, delegates, single

    and multidimensional arrays, advanced inheritance, attributes, versioning, and XML

    comments.

    Powerful Debugging and Testing Tools

    ASP .NET includes a powerful remote and multi-language debugger, enabling

    developers to test applications and build reliable multi-tier solutions that span process

    boundaries and are written in multiple programming languages.

    NET Framework Class Library

    Gain mature and powerful, built-in functionality, including a rich set of

    collection classes, networking support, multithreading support, string and regular

    expression classes, and broad support for XML, XML schemas, XML namespaces,

    XSLT, XPath, and SOAP.

    Robust Web Development Environment

    Create Web-based solutions in VB using the shared Web Forms Designer and

    XML Designer. Developers can also use IntelliSense features and tag completion or

    choose the WYSIWYG editor for drag-and-drop authoring to build interactive Web

    applications.

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/
  • 8/13/2019 Crime Records Management System 1

    27/65

    Integrating with IIS

    IIS is the web server is used here. IIS 5.0 or above is essential for

    theASP.NET for the environment. This release ofASP.NET uses IIS 5.0 as the pre

    Kim host environment. When consideringASP.NET authentication, you should

    understand the interaction with IIS authentication services.

    IIS always assumes that a set of credentials maps to a Windows NT account and

    uses them to authenticate a user. There are three different kinds of authentication

    available in IIS 5.0: BASIC, DIGEST, and INTEGRATED WINDOWS Authentication

    (NTLM or Kerberos). You can select the type of authentication to use in the IIS

    administrative services. If you request a URL containing anASP.NET application, therequest and authentication information are handed off to the application..

    Web Service

    Web service is arguably the most exciting and innovate features of Microsofts.

    NET initiative and they are likely to profoundly affect the way business interact using

    computer application. List of possible Web services is as varies as the list of possible

    business opportunities. Web service would typically perform a core business service

    such as user authentication, credit card validation, pricing a derivates security, placing a

    purchase order for a stock or pricing a same-day shipment.

    A web service is a component that performs a function or service. A component

    is a piece of software that has a well-defined interface, hidden internals, and the

    capability of being discovered. By discovered means that you can determine what the

    component does without needing to see the code within it. A component is similar to a

    method since we can call it with arguments that fit a set of parameters, and it has the

    capability of returning results.

    A web service may also return information to the caller. This service resides

    somewhere on the Web and can be accessed from other locations on the Web. For this

    service to be called, there are a number of elements that must be in place. First, the

    caller must know how to call the service. Second, the call must be made across the

    Web. Finally, the web service must know how to respond.

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/
  • 8/13/2019 Crime Records Management System 1

    28/65

    Introduction to VB. NET

    Microsoft Visual BASIC. Net is the most creative tool, which helps a programmer to

    create a user interface than writing several lines of code. The predecessor of Visual

    BASIC.net was BASIC (Beginners All Purpose Symbolic Instruction Code). BASIC

    was mainly interpreter-based whereas Visual BASIC. Net is that it is a rapid

    Application Development tool. This is the main reason why Visual BASIC. Net is

    widely used as a prototyping language.

    VB. Net is object oriented, whereas each object possesses some properties like size,

    position, color, appearance etc. This means that we can compartmentalize different

    aspects of our application as object and develop test those object independently of

    the rest of the application. By modifying certain properties and invoking the methods

    of these objects, we exert a great deal of control over the users interaction with the

    VB.net program we have written. Each object has its own event handling procedures.

    Visual BASIC.net is a member of Visual Studio.

    One of the merits of VB.Net is that it insulates the user from having to deal with low-

    level message handling. This allows as to quickly creating powerful applications

    without having dealing with unnecessary data. Microsoft has developed VB. NET as

    a complete Windows applications development system.

  • 8/13/2019 Crime Records Management System 1

    29/65

    Back end

    About MS SQL Server 2005SQL Server 2005 exceeds dependability requirements and provides

    innovative capabilities that increase employee effectiveness, integrate heterogeneous IT

    ecosystems, and maximize capital and operating budgets. SQL Server 2005 provides the

    enterprise data management platform your organization needs to adapt quickly in a fast-

    changing environment.

    With the lowest implementation and maintenance costs in the industry, SQL

    Server 2000 delivers rapid return on your data management investment. SQL Server 2005

    supports the rapid development of enterprise-class business applications that can give your

    company a critical competitive advantage. Benchmarked for scalability, speed, and

    performance, SQL Server 2000 is a fully enterprise-class database product, providing core

    support for Extensible Markup Language (XML) and Internet queries.

    Easy-to-Use Business Intelligence

    (BI) Tools Through rich data analysis and data mining capabilities that

    integrate with familiar applications such as Microsoft Office, SQL Server 2005 enables you

    to provide all of your employees with critical, timely business information tailored to their

    specific information needs. Every copy of SQL Server 2005 ships with a suite of BI

    services.

    Self-Tuning and Management Capabilities

    Revolutionary self-tuning and dynamic self-configuring features optimize

    database performance, while management tools automate standard activities. Graphical

    tools and wizards simplify setup, database design, and performance monitoring, allowing

    database administrators to focus on meeting strategic business needs.

    Data Management Applications and Services

    Unlike its competitors, SQL Server 2005 provides a powerful and

    comprehensive data management platform. Every software license includes extensive

    management and development tools, a powerful extraction, transformation, and loading

  • 8/13/2019 Crime Records Management System 1

    30/65

    (ETL) tool, business intelligence and analysis services, and new capabilities such as

    Notification Services. The result is the best overall business value available.

    SQL Server 2005 Enterprise Edition (64 bit)

    Enterprise Edition (64-bit) provides the most scalable data platform to

    take advantage of the class of Intel Itanium-based servers. Addressing more memory

    than any other edition of SQL Server, it scales to the performance levels required to

    support the largest Data warehousing and analysis applications, ecommerce websites

    and Enterprise business systems. Supporting up to 8 nodes in failover clustering, SQL

    Server 2005 (64-bit) provides a high level of reliability and availability for your

    mission-critical applications.

    SQL Server 2005 Enterprise Edition

    Enterprise Edition includes the complete set of SQL Server data

    management and analysis features and is uniquely characterized by several features that

    make it the most scalable and available edition of SQL Server 2005. It scales to the

    performance levels required to support the largest Web sites, Enterprise Online

    Transaction Processing (OLTP) systems and Data Warehousing systems. Its support forfailover clustering also makes it ideal for any mission critical line-of-business

    application. Additionally, this edition includes several advanced analysis features that

    are not included in SQL Server 2005 Standard Edition. There are four main areas in

    which the additional features of SQL Server 2005 Enterprise Edition are most evident:

    Scalability Availability/uptime Performance Advanced analysis.

    SQL Server 2005 Standard EditionStandard edition is an affordable option for small and medium-sized

    organizations. It includes the core functionality needed for non-mission-critical e-

    commerce, data warehousing, and line-of-business solutions. For instance, all of the XML

    features present in Enterprise Edition are also included in Standard Edition. And while a

    handful of advanced OLAP features are reserved for Enterprise Edition, all data mining

    features and the core OLAP functionality are included in SQL Server 2005 Analysis

    Services in Standard Edition. Similarly, components that other database vendors charge

  • 8/13/2019 Crime Records Management System 1

    31/65

    for as separate add-on products for their highest-end editions are included in Standard

    Edition: Data Transformation Services (DTS) Replication (snapshot, transactional, and

    merge) Full-Text Search English Query Stored procedure development and debugging tools

    SQL Profiling and performance analysis tools.

    SQL Server 2005 Replication Overview

    SQL Server offers three types of replication:

    1. Snapshot.

    It copies an entire view of data to another computer. The destination database view is

    overwritten with the new version. Snapshot replication distributes data exactly as it appears

    at a specific moment in time and does not monitor for updates to the data. Snapshot

    replication is best used as a method for replicating data that changes infrequently or where

    the most up-to-date values, low latency, is not a requirement. When synchronization occurs,

    the entire snapshot is generated and sent to Subscribers.

    2. Transactional.

    Transactions, INSERT, UPDATE, or DELETE statements, executed on one computer are

    replicated to another computer. With transactional replication, an initial snapshot of data is

    applied at subscribers, and then when data modifications are made at the Publisher, the

    individual transactions are captured and propagated to Subscribers. Transactional

    replication is helpful when: Incremental changes need to be propagated to subscribers as

    they occur. Transactions need to adhere to the Atomic, Consistency, Isolation, and

    Durability (ACID) properties. Subscribers are reliably and/or frequently connected to the

    Publisher.

    3. Merge.

    Updates on any computer will be replicated to another computer at a later time. Merge

    replication is the process of distributing data from Publisher to Subscribers, allowing both

    the Publisher and Subscribers to make updates while connected or disconnected, and then

    merging the updates between sites when connected. Merge replication allows various sites

    to work autonomously. At a later time, merge updates produce single, uniform result. The

  • 8/13/2019 Crime Records Management System 1

    32/65

    initial snapshot is applied to Subscribers, and then you have tracked changes to published

    data at the Publisher and at the Subscribers.

    The data is synchronized between servers continuously, at a scheduled time,

    or on demand. Because updates are made at more than one server, the same data may have

    been updated by the Publisher, or by more than one Subscriber. Thus, conflicts can occur

    when updates are merged. Merge replication includes default and custom choices for

    conflict resolution that the user can define while configuring a merge publication. When a

    conflict occurs, a resolver is invoked by the Merge Agent and determines which data will

    be accepted and propagated to other sites. Merge replication is helpful when:

    Multiple Subscribers need to update data at various times and propagate

    those changes to the Publisher and to other Subscribers. Subscribers need to receive data,

    make changes offline, and later synchronize changes with the Publisher and other

    Subscribers. Not many conflicts are expected when data is updated at multiple sites. This is

    because the data is filtered into partitions and then published to different Subscribers, or due

    to the uses of the application. However, if conflicts do occur, violations of ACID properties

    are acceptable.

  • 8/13/2019 Crime Records Management System 1

    33/65

    REQUIREMENT ANALYSIS

  • 8/13/2019 Crime Records Management System 1

    34/65

    REQUIREMENT ANALYSIS

    Requirement analysis task is a process of discovery, refinement, modeling and

    specification. Both the developers and customers take an active role in requirement

    analysis. Requirement analysis is a communication intensive activity. Requirement

    analysis can be divided into:

    Problem Recognition

    Problem Evaluation & Synthesis

    Problem Recognition

    The goal of this step is recognition of basic problem elements as indicated by the

    customer. The basic purpose of this activity is to obtain a thorough understanding of

    the needs of the client and the user, what exactly is desired from the software and

    what are the constraints on the solution.

    Problems of the existing system:

    Security cant assured

    Delay in storing and retrieving information

    Possibility of human errors

    Problem Evaluation & Synthesis

    In this step analyst must define all externally observable objects, evaluate flow and

    control of the information, define and elaborate all software functions, understand.Software behavior and design constraints etc. Evaluation and synthesis continues until

    both analyst and customer field confident about the product.

    Once the problems are identified, evaluation process begins. After evaluation of the

    current problem and desired in formations, the analyst synthesis one or more

    solutions.

    Security can be assured

  • 8/13/2019 Crime Records Management System 1

    35/65

    Cost effective

    No chance of errors

    MODELING

    During the evaluation and solution synthesis activity, the analyst creates models of the

    system in an effort to better understand data and control flow. The model serves as

    foundation for software design and as the basis for the creation of specification for the

    software. For the better understanding of data and control flow we use Data Flow

    Diagram.

    Data Flow Diagrams

    Data Flow Diagram is used to define the flow of the system and its resources such as

    informations. DFDs are a way of expressing systems requirements in graphical

    manner. DFD represents one of the most ingenious tools used for structured analysis.

    It has the purpose of clarifying system requirements and identifying major

    transformations that will become programs in the system design. It is the majorstarting point in the design phase that functionalities decompose the requirement

    specification to the lowest level of detail.

    DFD of Crime Reporting System is as shown in Appendix A.

  • 8/13/2019 Crime Records Management System 1

    36/65

    SYSTEM DESIGN

  • 8/13/2019 Crime Records Management System 1

    37/65

    SYSTEM DESIGN

    The most creative and challenging phase of the system life cycle is system design.

    The term design describes a final system and the process by which it is developed. It

    refers to the technical specifications that will be applied in implementing the proposed

    system. It also includes the construction of program and designing of output, input,

    menu, code, database and process of the system.

    System output may be report, document or a message. In on-line applications,

    information is displayed on the screen. The layout sheet for displayed output is similar

    to the layout chart used for designing output.

    On-line data entry makes use of processor that accepts commands and data from the

    operator through a keyboard or a device such as touch screen or voice input.

    Designing the code depends on the programming language chosen and mostly they

    are not specified while outlining the design of the system. The goal of coding is to

    translate the design of the system in to code in a programming language. The aim ofthe code design is to implement the system in best possible manner.

    Database design is used to define and specify the structure of objects used in the

    system. A wide array of design information must be developed during the database

    design. A database is the collection of interrelated data stored with minimum

    redundancy to serve many users quickly and efficiently. The general objective of data

    base design is to make information access easy, quick, inexpensive, and flexible for

    the user.

    Databases of Crime Reporting System is as shown in Appendix B.

  • 8/13/2019 Crime Records Management System 1

    38/65

    ARCHITECTURAL DESIGN

    a) Program Structure

    The product entitled Crime Reporting System follows bottom up program structure.

    Description about bottom up approach:-

    In a bottom-up approach the individual base elements of the system are first specified

    in great detail. These elements are then linked together to form larger subsystems,

    which then in turn are linked, sometimes in many levels, until a complete top-level

    system is formed. This strategy often resembles a "seed" model, whereby the

    beginnings are small, but eventually grow in complexity and completeness. However,

    "organic strategies", may result in a tangle of elements and subsystems, developed in

    isolation, and subject to local optimization as opposed to meeting a global purpose.

    PROCEDURAL DESIGN

    Procedural design occurs after data, architectural, and interface designs must be

    translated in to operational software. The procedural design for each component,

    represented in graphical, tabular or text based notation, is the primary work product

    produced during component level design.

    Begin

    If ((User name is valid)) and corresponding password is correct) then

    Theuser is an authorized person & can access the system

    Else

    Display invalid user

    End If

    End

  • 8/13/2019 Crime Records Management System 1

    39/65

    INTERFACE DESIGN

    External machine interface:- We need a high quality modem to connect to the

    internet. NIC i.e. network interface card is also required to access the internet.TCP/IP

    and http are the protocols used. If we want some hard copy of any receipts, we need a

    printer for that.

    External system interface:- Since Crime Reporting System requires a database and

    is working as online, the client machines requires proper connection with the server

    machine.

    Human interface:-In project work entitled Crime Reporting System the user will

    interacts with product through Graphical User Interface (GUI) which will be

    developed in front pages. Since GUIs are the interface, workings with GUIs are very

    simple and not at all complicated. So any user who had no knowledge about softwares

    and computers can use this Crime Reporting System very simply.

    The input and output forms of Crime Reporting System are provided in Appendix

    C.

  • 8/13/2019 Crime Records Management System 1

    40/65

    CODING

  • 8/13/2019 Crime Records Management System 1

    41/65

    CODING

    Coding in Crime Reporting System was done with ASP as front end and SQL

    Server as back end. A professional coding standard and style is followed to ensure theinternationalization of the software code. Different naming conventions are used for

    the easy evaluation of code for future tome. This makes the code for reuse and easy

    debugging for a third person. It also enhance to the international style of coding.

  • 8/13/2019 Crime Records Management System 1

    42/65

    SYSTEM TESTING

  • 8/13/2019 Crime Records Management System 1

    43/65

    SYSTEM TESTING

    System testing is a critical aspect of Software Quality Assurance and represents the

    ultimate review of specification, design and coding. Testing is a process of executinga program with the intent of finding an error. A good test is one that has a probability

    of finding an as yet undiscovered error. The purpose of testing is to identify and

    correct bugs in the developed system. Nothing is complete without testing. Testing is

    the vital to the success of the system.

    In the code testing the logic of the developed system is tested. For this every module

    of the program is executed to find an error. To perform specification test, the

    examination of the specifications stating what the program should do and how it

    should perform under various conditions.

    Unit testing focuses first on the modules in the proposed system to locate errors. This

    enables to detect errors in the coding and logic that are contained within that module

    alone. Those resulting from the interaction between modules are initially avoided. In

    unit testing step each module has to be checked separately.

    System testing does not test the software as a whole, but rather than integration of

    each module in the system. The primary concern is the compatibility of individual

    modules. One has to find areas where modules have been designed with different

    specifications of data lengths, type and data element name.

    Testing and validation are the most important steps after the implementation of the

    developed system. The system testing is performed to ensure that there are no errors

    in the implemented system. The software must be executed several times in order to

    find out the errors in the different modules of the system.

    Validation refers to the process of using the new software for the developed system in

    a live environment i.e., new software inside the organization, in order to find out the

    errors. The validation phase reveals the failures and the bugs in the developed system.

    It will be come to know about the practical difficulties the system faces when

  • 8/13/2019 Crime Records Management System 1

    44/65

    operated in the true environment. By testing the code of the implemented software,

    the logic of the program can be examined. A specification test is conducted to check

    whether the specifications stating the program are performing under various

    conditions. Apart from these tests, there are some special tests conducted which are

    given below:

    1. Peak Load Tests: This determines whether the new system will handle the

    volume of activities when the system is at the peak of its processing demand.

    The test has revealed that the new software for the agency is capable of handling

    the demands at the peak time.

    2. Storage Testing: This determines the capacity of the new system to store

    transaction data on a disk or on other files. The proposed software has the

    required storage space available, because of the use of a number of hard disks.

    3. Performance Time Testing:This test determines the length of the time used bythe system to process transaction data.

    The testing steps performed in Crime Reporting System are given below:

    Unit testing

    Integration testing

    Validation testing

    Unit testing

    In unit testing different modules are tested against the specifications produced during

    the design of the modules. Unit testing is essential for the verification of the code

    produced during the coding phase, and hence the goal is to test the internal logic of

    the modules.

    The testing is carried out during the programming itself. After designing and coding

    each form they are run to see whether there are any anomalies. Some of the various

    test cases used to test the system are as follows:

    Test cases are given for testing against requirements of the unit being tested.

  • 8/13/2019 Crime Records Management System 1

    45/65

    Test case for path or branch covering.

    Test case for data flow coverage.

    Testing with classes of bad data

    In unit testing the program unit that make up the system are tested individually. Unit

    testing focuses first on the modules, independent of one another to locate errors. Here

    in CrimeReporting System unit testing contains testing like user registration test,

    login test, user updating test, agent registration test, policy registration test, customer

    request test, premium calculation test etc. This enables to detect in coding and the

    logic with in the module alone. This testing is also used to ensure the integrity of data

    stored temporarily.

    Integration testing

    Integration testing is systematic technique for constructing the program structure,

    while at the same time conducting test to uncover errors associated with interfacing.

    That is the program is constructed and tested in small segments, which makes it easier

    to isolate and correct.

    Invalid modules are invariably related to one another and interact in a total system.

    Each portion of the system is tested against the entire module with both testing and

    live data before the entire system is ready to be implemented. When the individual

    modules were found works satisfactory, the system integration test was carried out.

    Data was collected in such a way that all program paths could be covered. Using these

    data a complete test was made. All outputs were generated. Different users were

    allowed to work on the system to check its performance.

    So here in Crime Reporting System integration testing contains administrative

    module, customer module and login with administrative and customer module.

    Validation testing

    At the culmination of the integration testing, the software was completely assembled

    as package, interfacing errors have been uncovered and a final series of software

  • 8/13/2019 Crime Records Management System 1

    46/65

    validation testing began. Here we test the system functions in manner that can be

    reasonably expected by customer, the system was tested against system requirement

    specification. Different unusual inputs that the users may use were assumed and the

    outputs were verified for such unprecedented inputs. Deviation or errors discovered at

    this step are corrected prior to the completion of this project with the help of user by

    negotiating to establish a method for resolving deficiencies. Thus the proposed system

    under consideration has been tested by using validation testing and found to be

    working satisfactorily.

    TEST RESULTS

    The primary goal of software implementation is the production of

    source code that is easy to read and understand. Clarification of source code helps in

    easier debugging, testing and modification. Source code clarification is enhanced by

    structural coding techniques, by good coding style, by appropriate supporting

    documents, by good internal comments and by the features provided in the modern

    programming language.

    In our implementation phase, source code contains both global and formal

    variables. It contains predefined functions as well as the user defined functions. The

    result of the new system is compared with the old system and supposes the result is

    wrong the error must be debugged.

    After the acceptance of the system by the user, the existing system must

    be replaced by this new system. Any user can work in this package very easily. It does

    not require any intensive training for the user. Procedures and functions in the systemare very simple that any one can understand and correspondingly act to the system with

    no difficulty.

    Test Cases

    User Authentication:

    Functions Tested Expected Resul t Test

  • 8/13/2019 Crime Records Management System 1

    47/65

    Result

    User should enter both UserName and password

    When the user enters only one or none loginscreen will displayed with error message

    Asexpected

    Logout when user wants todiscontinue login section

    Displaying the user logout successfully Asexpected

    Integer Field Check:

    Checking whether a particular text field, which is supposed to receive

    only integers, is receiving any other characters.

    Input Value Expected Result Result

    123 Display Pass

    Dqwe Doesnt Display Pass

    $#*>.) Doesnt Display Pass

    Field Checking:

    Function Tested Expected Resul t Test Resul t

    Name The name of the user is entered here. It cancontain only characters and blank space

    TestSuccessful

    Mobile-Phone, Zipcode, Date of Birth

    This should only contain numbers. Testsuccessful

  • 8/13/2019 Crime Records Management System 1

    48/65

    IMPLEMETATION

  • 8/13/2019 Crime Records Management System 1

    49/65

    IMPLEMENTATION

    The next stage after testing is implementation. Generally implementation is referred to

    conversion of a new system design to an operational one. It also deals with the trainingof operators. An implementation plan is to be made before starting the actual

    implementation of the system. Implementation is the stage where the theoretical design

    is converted into a working system. The newly proposed system is implemented after

    the successful testing of the system.

    Implementation Methods

    The term implementation has different meanings, ranging from the conversion of a

    basic application to a complete replacement of a computer system. The procedure,

    however, is virtually the same. Implementation is used here to mean the process for

    converting a new or revised system into an operational one. Conversion is one aspect

    of implementation. The other aspects are the post implementation review and software

    maintenance.

    There are three types of implementation:

    Implementation of a computer system to replace a manual system.

    Implementation of a new computer system to replace an existing one.

    Implementation of a modified application to replace an existing one.

    Conversion means changing from one system to another. That is data in the old

    format is run through a program, or a series of programs, to convert it into the new

    format. Conversion can also be from one hardware medium to another. The objective

    is to put the tested system into operation while holding costs, risk and personnel

    irritation to a minimum. It involves :-

    Creating computer compatible files.

    Training the operating staff.

    Installing terminals and hardware.

  • 8/13/2019 Crime Records Management System 1

    50/65

    A problem for management is discovering, at integration time, that pieces of modules

    simply do not fit together. Such problem will arise when charge is made to only one

    copy of the design document. When integration is completed, the product as whole is

    tested, this is termed product testing. When the developers are confident about the

    correction of every aspect of product, it is handled over to the client for acceptance

    testing.

    Implementation Plan

    The implementation plan includes a description of all the activities that must occur to

    implement the new system and to put it into operation. It identifies the personnel

    responsible for the activities and prepares a time chart for implementing the system.The implementation plan consists of the following steps.

    List all files required for implementation.

    Identify all data required to build new files during the implementation.

    List all new documents and procedures that go into the new system.

    The implementation plan should anticipate possible problems and must be able to deal

    with them. The usual problems may be missing documents; mixed data formats

    between current and files, errors in data translation, missing data etc.

  • 8/13/2019 Crime Records Management System 1

    51/65

    SOFTWARE MAINTENANCE

  • 8/13/2019 Crime Records Management System 1

    52/65

    SOFTWARE MAINTENANCE

    Security

    Any system developed should be secured and protected against possible

    hazards. Security measures are provided to prevent unauthorized access of the database

    at various levels. An uninterrupted power supply should be so that the power failure or

    voltage fluctuations will not erase the data in the files.

    Threats to Systems Security

    The lists of potential threats are :

    Disgruntled and dishonest users

    Fire

    Errors and omissions

    Natural disasters

    External attacks

    System Security Measurements

    Identification

    It is scheme for identifying persons to the system based on something

    you know such as password. In the Smart College system, the student, staff, and the

    librarian are given passwords for identification purpose during registration process.

    Access Control

    Controlling access to computer databases is essential. In the Smart

    College system only the administrator has given the access to the tables.

    Audit Control

  • 8/13/2019 Crime Records Management System 1

    53/65

    Auditing must be supported at all levels of management. Audit controls

    protect system from external security breaches and internal fraud or embezzle men.

    Various software programs are available to help in the audit function.

    System Integrity

    This line of defense safeguards the functioning of the hardware,

    software, physical security and operating procedures. Proper backup of hardware and

    software are extremely important. Password protection and simple procedures to

    change the unauthorized access are provided to the users. The system allows the user

    to enter the system only through login.

  • 8/13/2019 Crime Records Management System 1

    54/65

    We may define Software Maintenance by describing for activities that are undertaken

    after a program is released for use.

    1. Corrective Maintenance

    The first maintenance activity occurs since it is unreasonable to assume that software

    testing will uncover all errors in a large software system.

    2. Adaptive Maintenance

    This activity that contributes to the definition of maintenance occurs since rapid

    change is encountered in every aspect if computing.

    3. Perceptive Maintenance

    This activity involves recommendation for new capability modifications to the

    existing functions and general enhancements when software is used.

    4. Preventive Maintenance

    This activity occurs when software is changed to improve further maintainability and

    reliability.

    FUTURE ENHANCEMENT

  • 8/13/2019 Crime Records Management System 1

    55/65

    Anything cannot be ended in a single step. It is the fact that nothing permanent

    in this world. So this utility also has some future enhancements in the evergreen and

    booming IT industry. Change is inevitable. The project entitled Crime Reporting

    System was successfully designed developed and tested. The system and the

    architecture is a compatible one, so addition of new modules can be done without

    much difficulty. Since this module has its unique properties it can extend further to

    make this system a complete one.

    Scope of further development

    The various Future Enhancement which shall include in this software are:

    We look forward to working with the Government in implementing the

    recommendations and seeing an improvement in the effectiveness of the organization

    The method of video conferencing can be added to make the project more lively

    An intercom facility will add a little more flexible communication between the

    Master and Branch In Charge, Master and Members, etc.

    Not withstanding this drive and progress, the Panel believes that more fundamental

    changes are needed. It hopes that the recommendation made in this report will assist

    in changing the culture around partnership.

  • 8/13/2019 Crime Records Management System 1

    56/65

    CONCLUSION

    CONCLUSION

  • 8/13/2019 Crime Records Management System 1

    57/65

  • 8/13/2019 Crime Records Management System 1

    58/65

    Appendix A (DATA FLOW DIAGRAMS)

    Level 0 DFD

    login request

    crimereport

    details response

    Level 1.0 DFD (admin)

    request details

    details

    request

    details

    details

    Crime Automation

    & Reporting

    System

    users

    crimedescription

    station

    assignstation

    complaints

    adminregistration

    login

    stationprocesses

    login

    asswordusername

  • 8/13/2019 Crime Records Management System 1

    59/65

    Level 1.1 DFD (citizen)

    request details

    details crimedescription

    citizenregistration

    login

    complaintslogin

    asswordusername

  • 8/13/2019 Crime Records Management System 1

    60/65

    Level 1.2 DFD (station)

    request details

    details

    request

    details

    crimeclose

    stationregistration

    login

    crimeprocesses

    login

    asswordusername

    fir

    criminaldetails

    newteamregister

    teammember

    victim

    witness

    closecrime

    crimedescription

    advocate

    crimedescription

  • 8/13/2019 Crime Records Management System 1

    61/65

    Level 2.0 DFD (admin)

    request details

    complaints

    response

    details

    crimeid

    admin stationapproval

    station

    viewcomplaints crimedescription

    assignstation

    assignstation

  • 8/13/2019 Crime Records Management System 1

    62/65

    Level 2.1 DFD (citizen)

    request details

    details

    response

    crimeid

    citizen sendcomplaints

    viewacceptedcomplaints

    crimestatus crimeclose

    crimedescription

  • 8/13/2019 Crime Records Management System 1

    63/65

    Level 2.2.0DFD (station)

  • 8/13/2019 Crime Records Management System 1

    64/65

    Level 2.2.1DFD (station)

    request details

    criidresponse

    details

    crimeid

    station viewcomplaints

    crimedescription

    avocationprocesses

    criminaldetails

    closecrime

    assignstation

    advocate

    crimedescription

  • 8/13/2019 Crime Records Management System 1

    65/65


Recommended