CRIME AUTOMATION & REPORTING SYSTEM 1.doc

download CRIME AUTOMATION & REPORTING SYSTEM 1.doc

of 43

Transcript of CRIME AUTOMATION & REPORTING SYSTEM 1.doc

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    1/43

    CONTENTS

    Chapter TitlePage no.

    Title page ..(i)Certificate .(ii)

    Copy of training certificate (iii)

    Declaration (iv)

    Acknowledgement (v)

    About Training ..(vi)

    Table of Contents (vii)

    List of Figures (ix)

    Abstract ..(x)

    Chapter1:Synopsis 1

    Chapter2:Organization Profile 2Chapter3:Project Overview 3

    System Analysis 6

    Existing System 8

    Proposed System 10

    Feasibility Study 12

    Economic Feasibility 13

    Technical Feasibility 13

    Behavioral Feasibility 13

    Chapter4:Tools & Platforms Used 15

    Architectural Design 26

    Procedural Design 26

    Interface Design 27

    Software Maintenance

    Conclusion 28

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    2/43

    SYNOPSIS

    Synopsis is a general documentation tool. By means of a modular structure, it

    adapts to different styles of embedded documentation, different programminglanguages and various output formats. It scales well with the size of the project by

    allowing processing to be controlled by making files.

    The Crime Records Management System applies to Police Stations all across the

    country and specifically looks into the subject crime prevention, detection, conviction

    of criminals depending on a highly responsive backbone of Information Management.

    Modules of the project

    Administrators module will be focusing on the maintenance like Master Data

    Maintenance, Removal of old and outdated data from the software etc.

    Station module deals with processing of complaints, creating FIR, entering victim &

    witness details etc. All the basic processing of a station will be done in this module.

    Citizen module is for the public user, who has a complaint to register.

    Crime module is used for entering all details about the crime. It contains the date,

    police station where it is recorded, place, Nature of Crime etc.

    Search module is for searching crime in station wise, nature of crime.

    Avocation Module deals with the Law part of every Crime.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    3/43

    ORGANIZATION PROFILE

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    4/43

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    5/43

    PROJECT OVERVIEW

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    6/43

    PROJECT OVERVIEW

    The Crime Records Management System applies to Police Stations all across the

    country and specifically looks into the subject crime prevention, detection, convictionof criminals depending on a highly responsive backbone of Information Management.

    The efficiency of the Police and the effectiveness with which it tackles crime depend

    on what quality of information it can derive from its existing records and how fast it

    can have access to it.

    I had done this project using ASP.NET as front end and SQL Server as back end

    easing the effort of user.

    Modules of the Project

    1) Station module

    Each of the station must first register with the Software. For the registration part each

    station enter their details like station name, address, phone no, station in charge etc.

    and get a User Id from the Software. Once the prospective station registers with the

    software they can avail the existing records.

    2) Citizen module

    Each of the citizens, who has a complaint to register, must first register with the

    Software. For the registration part each person enter their details like name, address,

    phone no., E-Mail ID etc. and get a User Id & password from the Software. Once the

    registration is complete, the citizen can sign-in to the website & register their

    complaint.

    3) Crime module

    This module is used for entering all details about the crime. It contains the date and

    time, police station where it is recorded, place, Nature of Crime, Location of the

    Crime etc.

    4) Search module

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    7/43

    In this module we can search the crime in station wise, nature of crime.

    5) Administrators Module

    The module will be protected by user ID and password. Ordinary users of thesoftware will not be permitted to enter into this area of the software. The module will

    be focusing on the maintenance like Master Data Maintenance, Removal of old and

    outdated data from the software etc.

    6) Avocation Module

    This Module deals with the Law part of every Crime.

    ABOUT THE DEVELOPING SYSTEM

    The system has developed in ASP.NET as front end and SQL server 2000 as back

    end.

    ASP.NET (Active Server Pages.net)

    WHAT IS ASP.NET: Microsoft ASP.NET is a free technology that allows

    programmers to create dynamic web applications.ASP.NET can be used to create

    anything from small, personal websites through to large, enterprise-class web

    applications. ASP.NET is the latest version of Microsoft's Active Server Pages

    technology (ASP).ASP.NET is a part of the Microsoft .NET framework, and a

    powerful tool for creating dynamic and interactive web pages. All we need to get

    started with ASP.NET is the free .NET Framework and the free Visual Web

    Developer.

    ASP: ASP is a server side scripting technology that enables scripts (embedded in web

    pages) to be executed by an Internet server

    About VB.NET

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    8/43

    Microsoft.net was formerly known as next generation windows services (NGWS for

    short).It is a completely new platform for developing the next generation of windows

    /web applications. These applications would transcend device boundaries and fully

    harness the power of internet. However, this new platform required a language,

    which could take its fully advantage; this is one of factors that led to the

    development of VB. VB has evolved from QBASIC language. The VB compiler is

    considered to be the most efficient compiler in the .net family and a major part of the

    .net based classes libraries, itself are written in VB.

    SQL Server 2000

    Microsoft SQL Server 2000 is a relational database management system (RDBMS)

    produced by Microsoft. Its primary query language is Transact SQL, an

    implementation of the ANSI/ISO standard SQL used by both Microsoft and Sybase.

    SQL Server allows multiple clients to use the same database

    concurrently. SQL Server provides two modes of concurrency control: pessimistic

    and optimistic concurrency. When pessimistic concurrency control is being used, SQL

    Server controls concurrent access by using locks. Locks can be either shared or

    exclusive. Exclusive lock grants the user exclusive access to the data no other user

    can access the data as long as the lock is held. Shared locks are used when some data

    is being read-multiple users can read data locked with a shared lock, but not acquire

    an exclusive lock. SQL Server also provides the optimistic concurrency control

    mechanism, which is similar to the multiversion concurrency control used in other

    databases.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    9/43

    SYSTEM SPECIFICATIONS

    SOFTWARE SPECIFICATIONS

    The Crime Reporting System must use Microsoft SQL server 2000 as its database

    component.

    Software Requirements

    The software requirements include the software that is required for working. Software

    requirements are as follows:

    Developments Tools

    ASP .NET uses the new ADO .NET.

    ASP .NET supports full Visual Basic, not VBScript.

    ASP .NET supports C# (C sharp) and C++.ASP .NET supports JScript as

    before.

    Database

    SQL Server

    Application Server

    Sun Microsystems

    Operating System

    Windows XP Professional

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    10/43

    HARDWARE SPECIFICATION

    Hardware interfaces specifies the logical characteristics of each interface between thesoftware product and the hardware components of the system. Many business type

    applications will not have hardware interfaces, since Crime Reporting System is an

    application it too will not require any particular hardware interface.

    Hardware Requirements

    The hardware for the project should be selected in such a way that it should give the

    maximum optimal result .Hardware requirements are as follows:

    Server Side

    Processor :Intel Pentium (II) or higher

    128 MB RAM

    2 GB Hard Disk or more

    SVGA Color Monitor

    104 Keyboard

    Any Mouse

    Any modem

    Client Side

    Processor :Intel Pentium (II) or higher

    128 MB RAM

    2 GB Hard Disk or more

    SVGA Color Monitor

    104 Keyboard

    Any Mouse

    Any Modem

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    11/43

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    12/43

    SYSTEM ANALYSIS

    System Analysis works with users to identify goals and build systems to achieve

    them. System analysis is an important phase of any system development process. The

    system is studied to the minutest details and analyzed. The system analyst plays the

    role of an interrogator and dwells deep in to the working of the present system. In

    analysis, a detailed study of these operations performed by a system and their

    relationships within and outside of the system is done. A key question considered here

    is, what must be done to solve the problem? One aspect of analysis is defining theboundaries of the system and determining whether or not the candidate system should

    be considered. The system is viewed as a whole and the inputs to the system are

    identified. The outputs from the system are traced through the various processing that

    the input phases through in the organization. During analysis, data are collected on

    available files, decision points, and transaction handled by present system. Once

    analysis is completed the analyst has a firm understanding of what is to be done.

    EXISTING SYSTEM

    In the existing crime management system, most of the operations are done manually

    like send complaints, taking actions against crimes, view status etc. So with the

    existing system if anybody wants to complaint against crimes he must do it through

    the police.

    If we are doing the system manually, so many minor errors will occur. Error detection

    in the previous entries made and data cross verification is another important function.

    These are done manually, and it would take time.

    Drawbacks of the existing system can be concluded as follows:

    The existing system is time consuming and not very user friendly.

    The FIR brought by a person hailing from a family beyond poverty, the existing

    system shows ignorance for the same

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    13/43

    The officer dealing with a particular case cannot take decision by himself even

    when he is having the first hand knowledge/information about the case and he can

    expect obstructions from higher authorities/officials.

    Even an efficient officer cannot/may not able to handle more than one case at a

    time.

    As we all know, a covered truth, Bribery plays an important role in the existing

    system.

    Many cases are pilled up in the corners, which are not proved, due to lack of

    commitment in the job.

    In most of the cases, the innocent are accused in the existing system.

    As per our jurisdiction, Let thousand criminals escape-not a single innocent bepunished . As a result of this and other factors that influence investigation, such as

    bribery, the innocent becomes accused in several situations in the eyes of Justice.

    The existing system could provide only investigation and there is no Advocating,

    Counseling facilities etc. hence no contact or control or co-ordination on these cell.

    They criticized it for being inefficient, time consuming, poorly managed, disparate

    and lacking flexibility.

    Evaluation requires monitoring crime before, during and after the initiative.

    Facts other than these initiatives may also impact on crime levels which makes

    evaluation particularly difficult.

    Because of the amount of serious crime, lesser crime goes unchecked. Many

    crimes become regarded as antisocial activities.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    14/43

    PROPOSED SYSTEM

    Our mission statement directs us to promote the public interest while balancing the

    Law. Obviously well not rush to judgment, but will look at the facts and render a

    thoughtful decision based on these facts. Organization is an independent statutory

    body which was created to maintain an effective an effective and efficient police

    service for the public. Its primary task includes securing continuous needs of the

    public in an efficient manner. As part of the responsibility, our committee is

    responsible for performance monitoring (performance planning and review formerly

    professional standards and performance monitoring) decided to look at the

    contribution and effectiveness of the organization within the public. We need the

    whole hearted support of each and every individual member of the site and

    cooperation of the users. The administrator, along with the investigators, lawyers,

    counselors, and other authorities statutory partners in our organization. Given their

    key role in these partnerships, we felt that an overview of strength and Weakness of

    the organization is needed.

    The aim of the project is to bring about improvement to the organizations

    contributions; this report necessarily concentrates on overcoming weakness and

    raising standards. To avoid conducting and unfair evaluation efforts which are made

    to put this contribution into this context. It believes that partnership work is highly

    beneficial to the organization and that partnership work is the way forward to reduce

    crime and disorder.

    Advantages of the Proposed System:

    The scrutiny was carried out through the collection of written and oral evidence.

    Better communication, better leadership, better training, more defined roles

    in terms of contribution to contribution to the society.

    Working with partners.

    Reducing crime and disorder.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    15/43

    Confidently and anonymity issues.

    The proposed system has control over all its cells and is perfectly coordinated. Also

    the cells can act individually. To take our organization to heights we need thewholehearted co-operation of the public.

    Objectives of the Proposed System

    In the fast moving world, if people lack something, it is time. All are busy in their

    world. It will be welcomed if services are provided at their will. So the main objective

    of our product is better communication, better leadership, reducing crime and disorder

    etc.

    The product provides a framework within which a user can easily work with. That

    was out next objective. We know users are of many categories, like users from who

    know working with computers very well to users who didnt know about computers.

    So all the category can use the software. So it should be user friendly.

    The product provides a framework, which is error free. We know a crime

    management system is actually a critical process having many calculations and

    operations. So each simple error laid to big problem. So it should be error free and our

    objective is to build error free software.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    16/43

    FEASIBILITY STUDY

    A feasibility study is a test of system proposal according to its workability,

    impact on the organization, ability to meet user needs and effective use of resources.

    Apart from these, an initial investigation is launched to study the present system,

    evaluate the possible application of computer based of methods. Selecting a tentative

    system, evaluate the cost and effectiveness of the proposed system, evaluate the impact

    of the proposed system, existing personal and ascertain the need of new personal.

    To define an improved information system, the study group must understand the

    information requirements of the organization. This understanding may be obtained by

    determining what is currently being done and of investigating through interviews and

    analysis what information is needed to be provided that is not being furnished by the

    existing system . Data on the cost of operating the current system needs to be collected

    in order to make a cost benefit for a new system.

    The objective of feasibility study is not to solve the problem, but to acquire a

    sense of its scope. During the study, the problem definition is crystallized and aspects of

    the problem to be included in the system are determined, consequently costs and

    benefits are estimated with greater detail at this stage. The result of the feasibility study

    is a system formal proposal. This is a simply a form of documenting or detailing the

    nature and scope of proposed solutions. The proposal summarizes what is known and

    what is going to be done. Three key considerations involved in the feasibility analysis:

    Economic feasibility

    Technical feasibility

    Behavioral feasibility

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    17/43

    ECONOMIC FEASIBILITY:

    Economic analysis is the most frequently used method for comparing the cost

    with the benefit or income that is expected from developed system.

    In the existing system, many people are involved in the process but in the

    proposed system, number of persons involved be reduced drastically. So the proposed

    system is economic.

    In the existing system, storage of all these records should be arranged and

    security should be provided for the records. In the proposed system, separate security

    arrangement is not needed since the software provides security and maintenance is

    simply and hardly needs one or two person to operate the system.

    TECHNICAL FEASIBILITY:

    The feasibility center on the existing computer system (software, hardware) and

    to what extend it can support the proposed addition.

    In the proposed system, data can be easily stored and managed in database

    management system software.

    The results for various queries can be generated easily.

    Therefore, the system is technically feasible

    BEHAVIORAL FEASIBILITY:

    People are inherently resistant to change and computer has known to facilitate

    change. An estimate should be made of how strong a reaction the user staff likely to

    have towards the developments of computerized system.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    18/43

    In the existing system more manpower is required and time factor is more but in the

    proposed system, manpower and time factors are reduced .So, the remaining

    numbers are engaged with some other important works.

    An SRS is basically an organization's understanding (in writing) of a customer

    or potential client's system requirements and dependencies at a particular point in time

    (usually) prior to any actual design or development work. It's a two-way insurance

    policy that assures that both the client and the organization understand the others

    requirements from that perspective at a given point in time.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    19/43

    TOOLS & PLATFORMS USED

    TOOLS & PLATFORMS

    Operating System : Windows NT/2003 Server

    Front End : ASP.Net with VB

    Back End : SQL SERVER 2005

    Features of software used

    About Windows 2003

    Windows 2003 Server includes improved network, application and Webservices. It provides increased reliability and scalability, lowers your cost of computing

    with powerful, flexible management services, and provides the best foundation for

    running business application.

    The Windows GUI

    The familiar graphical user interface it presents to the world.

    Computing Model

    Windows 2003 Server operations are based on a client-server computing model.

    This is a model in which the computing workload is shared between the server and the

    client. It is a co-operative relationship that divides the workload evenly between

    machines or processes on a single machine.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    20/43

    Visual Studio .NET

    Visual Studio .Net is the rapid application development tool for BASIC. Visual

    Studio .Net offers complete integration with ASP.NET and enables to drag and drop

    server controls and design Web Forms as they should appear when user views them.

    The .NET Framework is a multi-language environment for building, deploying,

    and running XML Web services and applications. It consists of four main parts:

    Common Language Runtime: Despite its name, the runtime actually has a

    role in both a component's runtime and development time experiences. While

    the component is running, the runtime is responsible for managing memoryallocation, starting up and stopping threads and processes, and enforcing

    security policy, as well as satisfying any dependencies that the component might

    have on other components. At development time, the runtime's role changes

    slightly; because it automates so much (for example, memory management), the

    runtime makes the developer's experience very simple, especially when

    compared to COM as it is today. In particular, features such as reflection

    dramatically reduce the amount of code a developer must write in order to turn

    business logic into a reusable component.

    Unified programming classes: It is a completely new platform for

    developing the next generation of windows /web applications. These

    applications would transcend device boundaries and fully harness the power of

    internet. However, this new platform required a language, which could take its

    fully advantage; this is one of factors that led to the development of VB. VB

    has evolved from QBASIC language. The VB compiler is considered to be the

    most efficient compiler in the .net family and a major part of the .net based

    classes libraries, itself are written in VB.

    Some of the other advantages of creating BASIC applications in Visual

    Studio .Net are:

    http://asp.net/http://asp.net/
  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    21/43

    Visual Studio .Net is a Rapid Application (RAD) tool. Instead of adding each

    control to the Web Form programmatically, it helps to add these controls by

    using toolbox, saving programming efforts.

    Visual Studio .Net supports custom and composite controls. Can create custom

    controls that encapsulate a common functionality that might need to use in a

    number of applications.

    Visual Studio .Net does a wonderful job of simplifying the creation and

    consumption of Web Services. Mush of the programmer-friendly stuff (creating all the

    XML-based documents) happens automatically, without much effort on the

    programmers side. Attribute-based programming is a powerful concept that enables

    Visual Studio .Net to automate a lot of programmer-unfriendly tasks.

    .NET programming languages: The .NET Framework provides a set of tools

    that help to build code that works with the .NET Framework. Microsoft provides

    a set of languages that are already .NET compatible. BASIC is one of those

    languages.

    ASP.NET environment: Active Server Pages were released by Microsoft to

    enable the creation of dynamic pages based on user input and interaction with aWeb site. ASP.NET improves upon the original ASP by providing code-behind.

    With ASP.NET and code-behind, the code and HTML can be

    separated. ASP.NET Web services are XML-based services that are exposed on

    the Internet that can be accessed by other Web services and Web service clients.

    ASP.NET

    ASP.NET is more than the next version of Active Server Pages (ASP); it is a

    unified Web development platform that provides the services necessary for developers to

    build enterprise-class Web applications. While ASP.NET is largely syntax compatible

    with ASP, it also provides a new programming model and infrastructure for more secure,

    scalable, and stable applications.

    ASP.NET is a compiled, .NET-based environment; you can author applications

    in any .NET compatible language, including VisualBasic.NET, BASIC, and

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/
  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    22/43

    JScript.NET. Additionally, the entire .NET Framework is available to

    any ASP.NET application. Developers can easily access the benefits of these

    technologies, which include the managed common language runtime environment, type

    safety, inheritance, and so on.

    ASP.NET has been designed to work seamlessly with WYSIWYG HTML

    editors and other programming tools, including Microsoft Visual Studio .NET. Not only

    does this make Web development easier, but it also provides all the benefits that these

    tools have to offer, including a GUI that developers can use to drop server controls onto

    a Web page and fully integrated debugging support. Developers can choose from the

    following two features when creating an ASP.NET application, Web Forms and Web

    services, or combine these in any way they see fit.

    Web Forms allows you to build powerful forms-based Web pages. When

    building these pages, you can use ASP.NET server controls to create common

    UI elements, and program them for common tasks. These controls allow you to

    Rapidly build a Web Form out of reusable built-in or custom components,

    simplifying the code of a page.

    An XML Web service provides the means to access server functionality

    remotely.

    ASP.NET ARCHITECTURE

    .NET ARCHITECTURE

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/
  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    23/43

    As the illustration shows, all Web Administrators communicate

    with ASP.NET applications through IIS. IIS deciphers and optionally authenticates the

    request. If Anonymous is turned on, no authentication occurs. IIS also finds the

    requested resource (such as an ASP.NET application), and, if the client is authorized

    returns the appropriate resource.

    In addition to the built-in ASP.NET security features, an ASP.NET application

    can use the low-level security features of the .NET Framework.

    Features

    Reliable Interoperability

    Employ code to call native Windows APIs, use pre-built COM components, and

    leverage existing ActiveX controls to seamlessly integrate existing applications and

    components.

    Modern, Component-Oriented Language

    Take advantage of inherent support for properties, indexers, delegates, single

    and multidimensional arrays, advanced inheritance, attributes, versioning, and XML

    comments.

    Powerful Debugging and Testing Tools

    ASP .NET includes a powerful remote and multi-language debugger, enabling

    developers to test applications and build reliable multi-tier solutions that span process

    boundaries and are written in multiple programming languages.

    NET Framework Class Library

    Gain mature and powerful, built-in functionality, including a rich set of

    collection classes, networking support, multithreading support, string and regular

    expression classes, and broad support for XML, XML schemas, XML namespaces,

    XSLT, XPath, and SOAP.

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/
  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    24/43

    Robust Web Development Environment

    Create Web-based solutions in VB using the shared Web Forms Designer and

    XML Designer. Developers can also use IntelliSense features and tag completion or

    choose the WYSIWYG editor for drag-and-drop authoring to build interactive Web

    applications.

    Integrating with IIS

    IIS is the web server is used here. IIS 5.0 or above is essential for

    the ASP.NET for the environment. This release ofASP.NET uses IIS 5.0 as the pre

    Kim host environment. When considering ASP.NET authentication, you should

    understand the interaction with IIS authentication services.

    IIS always assumes that a set of credentials maps to a Windows NT account and

    uses them to authenticate a user. There are three different kinds of authentication

    available in IIS 5.0: BASIC, DIGEST, and INTEGRATED WINDOWS Authentication

    (NTLM or Kerberos). You can select the type of authentication to use in the IIS

    administrative services. If you request a URL containing an ASP.NET application, the

    request and authentication information are handed off to the application..

    Web Service

    Web service is arguably the most exciting and innovate features of Microsofts.

    NET initiative and they are likely to profoundly affect the way business interact using

    computer application. List of possible Web services is as varies as the list of possible

    business opportunities. Web service would typically perform a core business service

    such as user authentication, credit card validation, pricing a derivates security, placing a

    purchase order for a stock or pricing a same-day shipment.

    A web service is a component that performs a function or service. A component

    is a piece of software that has a well-defined interface, hidden internals, and the

    capability of being discovered. By discovered means that you can determine what the

    component does without needing to see the code within it. A component is similar to a

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/
  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    25/43

    method since we can call it with arguments that fit a set of parameters, and it has the

    capability of returning results.

    A web service may also return information to the caller. This service resides

    somewhere on the Web and can be accessed from other locations on the Web. For this

    service to be called, there are a number of elements that must be in place. First, the

    caller must know how to call the service. Second, the call must be made across the

    Web. Finally, the web service must know how to respond.

    Introduction to VB. NET

    Microsoft Visual BASIC. Net is the most creative tool, which helps a programmer to

    create a user interface than writing several lines of code. The predecessor of Visual

    BASIC.net was BASIC (Beginners All Purpose Symbolic Instruction Code). BASIC

    was mainly interpreter-based whereas Visual BASIC. Net is that it is a rapid

    Application Development tool. This is the main reason why Visual BASIC. Net is

    widely used as a prototyping language.

    VB. Net is object oriented, whereas each object possesses some properties like size,

    position, color, appearance etc. This means that we can compartmentalize different

    aspects of our application as object and develop test those object independently of

    the rest of the application. By modifying certain properties and invoking the methods

    of these objects, we exert a great deal of control over the users interaction with the

    VB.net program we have written. Each object has its own event handling procedures.

    Visual BASIC.net is a member of Visual Studio.

    One of the merits of VB.Net is that it insulates the user from having to deal with low-

    level message handling. This allows as to quickly creating powerful applications

    without having dealing with unnecessary data. Microsoft has developed VB. NET as

    a complete Windows applications development system.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    26/43

    Back end

    About MS SQL Server 2005

    SQL Server 2005 exceeds dependability requirements and provides

    innovative capabilities that increase employee effectiveness, integrate heterogeneous IT

    ecosystems, and maximize capital and operating budgets. SQL Server 2005 provides the

    enterprise data management platform your organization needs to adapt quickly in a fast-

    changing environment.

    With the lowest implementation and maintenance costs in the industry, SQL

    Server 2000 delivers rapid return on your data management investment. SQL Server 2005

    supports the rapid development of enterprise-class business applications that can give your

    company a critical competitive advantage. Benchmarked for scalability, speed, and

    performance, SQL Server 2000 is a fully enterprise-class database product, providing core

    support for Extensible Markup Language (XML) and Internet queries.

    Easy-to-Use Business Intelligence

    (BI) Tools Through rich data analysis and data mining capabilities that

    integrate with familiar applications such as Microsoft Office, SQL Server 2005 enables you

    to provide all of your employees with critical, timely business information tailored to their

    specific information needs. Every copy of SQL Server 2005 ships with a suite of BI

    services.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    27/43

    Self-Tuning and Management Capabilities

    Revolutionary self-tuning and dynamic self-configuring features optimize

    database performance, while management tools automate standard activities. Graphical

    tools and wizards simplify setup, database design, and performance monitoring, allowing

    database administrators to focus on meeting strategic business needs.

    Data Management Applications and Services

    Unlike its competitors, SQL Server 2005 provides a powerful and

    comprehensive data management platform. Every software license includes extensivemanagement and development tools, a powerful extraction, transformation, and loading

    (ETL) tool, business intelligence and analysis services, and new capabilities such as

    Notification Services. The result is the best overall business value available.

    SQL Server 2005 Enterprise Edition (64 bit)

    Enterprise Edition (64-bit) provides the most scalable data platform to

    take advantage of the class of Intel Itanium-based servers. Addressing more memory

    than any other edition of SQL Server, it scales to the performance levels required to

    support the largest Data warehousing and analysis applications, ecommerce websites

    and Enterprise business systems. Supporting up to 8 nodes in failover clustering, SQL

    Server 2005 (64-bit) provides a high level of reliability and availability for your

    mission-critical applications.

    SQL Server 2005 Enterprise Edition

    Enterprise Edition includes the complete set of SQL Server data

    management and analysis features and is uniquely characterized by several features that

    make it the most scalable and available edition of SQL Server 2005. It scales to the

    performance levels required to support the largest Web sites, Enterprise Online

    Transaction Processing (OLTP) systems and Data Warehousing systems. Its support for

    failover clustering also makes it ideal for any mission critical line-of-business

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    28/43

    application. Additionally, this edition includes several advanced analysis features that

    are not included in SQL Server 2005 Standard Edition. There are four main areas in

    which the additional features of SQL Server 2005 Enterprise Edition are most evident:

    Scalability Availability/uptime Performance Advanced analysis.

    SQL Server 2005 Standard Edition

    Standard edition is an affordable option for small and medium-sized

    organizations. It includes the core functionality needed for non-mission-critical e-

    commerce, data warehousing, and line-of-business solutions. For instance, all of the XML

    features present in Enterprise Edition are also included in Standard Edition. And while a

    handful of advanced OLAP features are reserved for Enterprise Edition, all data mining

    features and the core OLAP functionality are included in SQL Server 2005 Analysis

    Services in Standard Edition. Similarly, components that other database vendors charge

    for as separate add-on products for their highest-end editions are included in Standard

    Edition: Data Transformation Services (DTS) Replication (snapshot, transactional, and

    merge) Full-Text Search English Query Stored procedure development and debugging tools

    SQL Profiling and performance analysis tools.

    SQL Server 2005 Replication Overview

    SQL Server offers three types of replication:

    1. Snapshot.

    It copies an entire view of data to another computer. The destination database view is

    overwritten with the new version. Snapshot replication distributes data exactly as it appears

    at a specific moment in time and does not monitor for updates to the data. Snapshot

    replication is best used as a method for replicating data that changes infrequently or where

    the most up-to-date values, low latency, is not a requirement. When synchronization occurs,

    the entire snapshot is generated and sent to Subscribers.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    29/43

    2. Transactional.

    Transactions, INSERT, UPDATE, or DELETE statements, executed on one computer are

    replicated to another computer. With transactional replication, an initial snapshot of data is

    applied at subscribers, and then when data modifications are made at the Publisher, the

    individual transactions are captured and propagated to Subscribers. Transactional

    replication is helpful when: Incremental changes need to be propagated to subscribers as

    they occur. Transactions need to adhere to the Atomic, Consistency, Isolation, and

    Durability (ACID) properties. Subscribers are reliably and/or frequently connected to the

    Publisher.

    3. Merge.

    Updates on any computer will be replicated to another computer at a later time. Merge

    replication is the process of distributing data from Publisher to Subscribers, allowing both

    the Publisher and Subscribers to make updates while connected or disconnected, and then

    merging the updates between sites when connected. Merge replication allows various sites

    to work autonomously. At a later time, merge updates produce single, uniform result. The

    initial snapshot is applied to Subscribers, and then you have tracked changes to published

    data at the Publisher and at the Subscribers.

    The data is synchronized between servers continuously, at a scheduled time,

    or on demand. Because updates are made at more than one server, the same data may have

    been updated by the Publisher, or by more than one Subscriber. Thus, conflicts can occur

    when updates are merged. Merge replication includes default and custom choices for

    conflict resolution that the user can define while configuring a merge publication. When a

    conflict occurs, a resolver is invoked by the Merge Agent and determines which data will

    be accepted and propagated to other sites. Merge replication is helpful when:

    Multiple Subscribers need to update data at various times and propagate

    those changes to the Publisher and to other Subscribers. Subscribers need to receive data,

    make changes offline, and later synchronize changes with the Publisher and other

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    30/43

    Subscribers. Not many conflicts are expected when data is updated at multiple sites. This is

    because the data is filtered into partitions and then published to different Subscribers, or due

    to the uses of the application. However, if conflicts do occur, violations of ACID properties

    are acceptable.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    31/43

    ARCHITECTURAL DESIGN

    a) Program Structure

    The product entitled Crime Reporting System follows bottom up program structure.

    Description about bottom up approach:-

    In a bottom-up approach the individual base elements of the system are first specified

    in great detail. These elements are then linked together to form larger subsystems,

    which then in turn are linked, sometimes in many levels, until a complete top-level

    system is formed. This strategy often resembles a "seed" model, whereby the

    beginnings are small, but eventually grow in complexity and completeness. However,

    "organic strategies", may result in a tangle of elements and subsystems, developed in

    isolation, and subject to local optimization as opposed to meeting a global purpose.

    PROCEDURAL DESIGN

    Procedural design occurs after data, architectural, and interface designs must be

    translated in to operational software. The procedural design for each component,

    represented in graphical, tabular or text based notation, is the primary work product

    produced during component level design.

    Begin

    If ((User name is valid)) and corresponding password is correct) then

    Theuser is an authorized person & can access the system

    Else

    Display invalid user

    End If

    End

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    32/43

    INTERFACE DESIGN

    External machine interface:- We need a high quality modem to connect to the

    internet. NIC i.e. network interface card is also required to access the internet.TCP/IP

    and http are the protocols used. If we want some hard copy of any receipts, we need a

    printer for that.

    External system interface:- Since Crime Reporting System requires a database and

    is working as online, the client machines requires proper connection with the server

    machine.

    Human interface:- In project work entitled Crime Reporting System the user will

    interacts with product through Graphical User Interface (GUI) which will be

    developed in front pages. Since GUIs are the interface, workings with GUIs are very

    simple and not at all complicated. So any user who had no knowledge about softwares

    and computers can use this Crime Reporting System very simply.

    The input and output forms of Crime Reporting System are provided in Appendix

    C.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    33/43

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    34/43

    CONCLUSION

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    35/43

    CONCLUSION

    The Software developed is found to be working efficiently and effectively. It results in

    regular and timely action against crime reported. It can be observed that the informationcan be obtained easily and accurately.

    The Software is made user friendly to the maximum so that any lay man can run the

    software provided he could access to the system via the login password.

    It believes that partnership work is highly beneficial to the organization and that

    partnership work is the way forward to reduce crime and disorder

    Hence, we wish to remind that its culture should fully endorse partnership work; we

    urge to ensure the attention they require.

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    36/43

    Appendix A (DATA FLOW DIAGRAMS)

    Level 0 DFD

    login request

    crimereport

    details response

    Level 1.0 DFD (admin)

    request details

    details

    request

    details

    details

    Crime Automation

    & Reporting

    System

    users

    crimedescription

    station

    assignstation

    complaints

    admin registration

    login

    stationprocesse

    s

    login

    passwordusername

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    37/43

    Level 1.1 DFD (citizen)

    request details

    details crimedescription

    citizen registration

    login

    complaints

    login

    passwordusername

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    38/43

    Level 1.2 DFD (station)

    request details

    details

    request

    details

    crimeclose

    station registration

    login

    crimeprocesse

    s

    login

    passwordusername

    fir

    criminaldetails

    newteamregister

    teammember

    victim

    witness

    closecrime

    crimedescription

    advocate

    crimedescription

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    39/43

    Level 2.0 DFD (admin)

    request details

    complaints

    response

    details

    crimeid

    admin stationapproval

    station

    viewcomplaints

    crimedescription

    assignstation

    assignstation

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    40/43

    Level 2.1 DFD (citizen)

    request details

    details

    response

    crimeid

    citizen sendcomplaints

    viewacceptedcomplaints

    crimestatus crimeclose

    crimedescription

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    41/43

    Level 2.2.0 DFD (station)

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    42/43

    Level 2.2.1 DFD (station)

    request details

    criid

    responsedetails

    crimeid

    station viewcomplaints

    crimedescription

    avocationprocesses

    criminaldetails

    closecrime

    assignstation

    advocate

    crimedescription

  • 7/27/2019 CRIME AUTOMATION & REPORTING SYSTEM 1.doc

    43/43