Crime Filecrime file

89
CRIME FILE PROJECT REPORT Submitted in partial fulfilment of the requirements for the award of the degree of Master of Computer Application [Software Engineering University School of Information Technology GGS Indraprastha University, Delhi – ! Submitted by" SOM!E" AR#A #$$!%#%$#& '()*S++-. /rd Sem+ Under the Guidance of" Ms$ Anura%&a c&ug USIT, GGSI0U

Transcript of Crime Filecrime file

Page 1: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 1/89

CRIME FILEPROJECT REPORT

Submitted in partial fulfilment of the requirementsfor the award of the degree of 

Master of Computer Application[Software Engineering

University School ofInformation Technology

GGS Indraprastha University,Delhi –

!

Submitted by" 

SOM!E" AR#A

#$$!%#%$#&

'()*S++-. /rd Sem+

Under the Guidance of"

Ms$ Anura%&a c&ug

USIT, GGSI0U

Page 2: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 2/89

 

T)12 34 (35T5TS

CO'TE'TS   PA(E 'O$

!+ TIT2 34 0637(T88888888888888888888+889

9+ )(:53;2DG'5T88888888888888888888+++/

/+ (6TI4I()T8888888888888888888888888%

%+ S24 (6TI4I()T8888888888888888888888+$

$+ I5T63DU(TI35888888888888888888888+88+++

+ T332S<02)T436', =)6D;)6 )5D S34T;)6

6>UI6'5T S0(I4I()TI358888888+++88888888++?

@+ Technology 3verview of with A1 and 'S )ccess

?+ )5)2BSIS *D4Ds, 6 Diagrams, etc+ )s per the proCect requirements-

8888888888888888888888888!/

&+ US ()S DI)G6)'888888888888888888888++9

!#+ US ()SS8888888888888888888888888++9@

!!+ ) (3'02T ST6U(TU6 34 T= 063G6)'888888++88++%!

 5umber of modules and their description+

+ Data structures for all modules+

+ 0rocess 2ogic of each module

6eport generation+

!9+4UTU6 5=)5('5T88888888888888888888+?9

!/+ Glossary88888888888888888888888888++

9

Page 3: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 3/89

CRIME FILE

)*SI'( MS ACCESS +,,-

Framewor. t&roug& "/01

/

Page 4: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 4/89

Ac.nowle%gement

This is a great opportunity to acnowledge and to thans all those persons without whose support

and help this proCect would have been impossible+ ;e would lie to add a few heartfelt words for

the people who were part of this proCect in numerous ways+

I would lie to thans to my proCect guide E's+ )nuradha (hugF, for his indefatigable

guidance, valuable suggestion, moral support, constant encouragement and contribution of time

for the successful completion of proCect wor+ I am very grateful to him, for providing all the

facilities needed during the proCect development+ )t the outset, I sincerely than all faculty

members of my institution for his etra effort to mae our session on line inspire of all ideas+

I than my (ounselors for his indispensable support and encouragement thought the

 proCect+ I would lie to than all those who helped me directly or indirectly+

2ast but not the least, I would lie to acnowledge the ongoing support of my parents and

my family members, whose patience and encouragement during these long days and night have

 been paramount in maing this proCect a reality+

  Than you

Stu%ent 'ame2 Som%e3 Ar4a

%

Page 5: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 5/89

CERTIFICATE 

This is to certify that proCect entitled 5Crime FileF done by ESomdev )ryaF , roll no+

#$$!%#%$#& is an authentic wor carried out by her at U5IA6SITB S(=332 34

I5436')TI35 T(=5323GB under my guidance+ The matter embodied in this proCect has

not been submitted earlier for award of any degree or diploma to the best of my nowledge and

 belief+

 

Signature of the Guide

Ms$ Anura%&a C&ug

 USIT, GGSI0U

$

Page 6: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 6/89

SELF CERTIFICATE

This is to certify that proCect entitled Crime File is done by me is an authentic wor carried out

for the partial fulfillment of the requirements for the award of the degree of Master of

Computer Application under the guidance of 5Ms$ Anura%&a C&ug F+ The matter embodied

in this proCect wor has not been submitted earlier for award of any degree or diploma to

the best of my nowledge and belief+

 

Signature of the Student

Page 7: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 7/89

 

Intro%uction of Crime file

The proCect is aimed to develop a crime file for maintain a computeriHed records of all the firagainst crime +The system is destop application that can be access throughout the policedepartment+

This system can be used as an application for the crime file of the police department to managethe records of different activity of related to first information report +In such destop (rime filesystem we will manage all such activities *lie registration of the complaint updatinginformation, search of perticularviewing of the respective reports of crimes- that will save time,manpower+

This system will provide better prospective for the enhancement of organiHation regarding toquality and transparency+

@

Page 8: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 8/89

O67ecti3es of Crime File

The obCectives of this system can broadly be listed as follows"

!+ 'ae the 0olice functioning citiHen friendly and more transparent by automating thefunctioning of 0olice Departments+9+ Improve delivery of citiHen.centric services through effective usage of I(T+/+ 0rovide the Investigating 3fficers of the (ivil 0olice with tools, technology and information tofacilitate investigation of crime and detection of criminals+%+ Improve 0olice functioning in various other areas such as 2aw and 3rder, Traffic'anagement etc+$+ 4acilitate Interaction and sharing of Information among 0olice Departments, Districts,State<UT headquarters and other 0olice )gencies+

+ )ssist senior 0olice 3fficers in better management of 0olice 4orce@+ :eep trac of the progress of (ases, including in (ourts?+ 6educe manual and redundant 6ecords eeping

?

Page 9: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 9/89

TOOLS8 PLATFORM 9 LA'(*A(E TO /E *SE! TOOLS2

4635T.5D " 'icrosoft Aisual 1asic

1)(:.5D " 'icrosoft )ccess

PLATFORM2

;I5D3; @

:AR!;ARE A'! SOFT;ARE E'"IRO'ME'T

:AR!;ARE E'"IRO'ME'T"

063(SS36 " (ore 9duo

6)' " /G1

ST36)G ()0)(ITB " /9# G1

D6IA6S " $99%

!? (D<DAD writer

SOFT;ARE E'"IRO'ME'T"

306)TI5G SBST' " ;I5D3; @

6D1'S " 'icrosoft )ccess

&

Page 10: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 10/89

Tec&nolog4 O3er3iew of m4 Pro7ect

Microsoft Access +,,-

Microsoft Access is a relational %ata6ase management s4stem )R!/MS1 that is pacaged

with the 'icrosoft suite of office products to run under the 'icrosoft ;indows operating

system+ 'icrosoft )ccess is a Aisual 1asic *A1- based application that allows Structured >uery

2anguage *S>2- statements to be included in associated macros and A1 scripts+ 'icrosoft

)ccess includes a 7et database engine, combined with a graphical interface, to provide ease of

use in building front.end database applications+ 'icrosoft )ccess is a structured environment,

used by novice programmers, with little or no eperience, to handle relatively small database

functions+ It is also a useful tool, for advanced developers, to provide rapid application

development+

Though 'S )ccess has been successfully front.ended against databases, including itself,

'icrosoft )ccess does not scale well for large databases or multiple.access, networ

environments+ The underlying 7et Database is a file.sharing database that performs all processing

at the client level+ )s such, 'icrosoft )ccess is not designed for high volume multi.user

environments that allow multiple clients to read, write and perform other operations on shared

files at the same time+

!#

Page 11: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 11/89

"isual /asic 0$,

"isual /asic *"/- is the third.generation event.driven programming language and integrated development environment *ID-

from 'icrosoft for its (3' programming model+ 1ecause of its graphical development features and 1)SI( heritage, A1 is

considered to be relatively easy to learn and use+ J!K

Aisual 1asic was derived from 1)SI( and enables the rapid application development *6)D- of  graphical user interface

*GUI- applications, access to databases using Data )ccess 3bCects, 6emote Data 3bCects, or  )ctive Data 3bCects, and creation

of )ctive controls and obCects+ Scripting languages such as A1) and A1Script are syntactically similar to Aisual 1asic, but

 perform differently+

) programmer can put together an application using the components provided with Aisual 1asic itself+ 0rograms written in

Aisual 1asic can also use the ;indows )0I, but doing so requires eternal function declarations+

2ie the 1)SI( programming language, Aisual 1asic was designed to be easily learned and used by beginner

 programmers+ The language not only allows programmers to create simple GUI applications, but can also develop

comple applications+ 0rogramming in A1 is a combination of visually arranging components or  controls on a form,specifying attributes and actions of those components, and writing additional lines of  code for more functionality+

Since default attributes and actions are defined for the components, a simple program can be created without the

 programmer having to write many lines of code+ 0erformance problems were eperienced by earlier versions, but

with faster computers and native code compilation this has become less of an issue+

)lthough programs can be compiled into native code eecutables from version $ onwards, they still require the

 presence of runtime libraries of approimately ! '1 in siHe+ This runtime is included by default in ;indows

9### and later, but for earlier versions of  ;indows lie &$<&?<5T it must be distributed together with the

eecutable+

4orms are created using drag.and.drop techniques+ ) tool is used to place controls *e+g+, tet boes, buttons, etc+- on

the form *window-+ (ontrols have attributes and event handlers associated with them+ Default values are provided

when the control is created, but may be changed by the programmer+ 'any attribute values can be modified during

run time based on user actions or changes in the environment, providing a dynamic application+ 4or eample, code

can be inserted into the form resiHe event handler to reposition a control so that it remains centered on the form,

!!

Page 12: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 12/89

epands to fill up the form, etc+ 1y inserting code into the event handler for a eypress in a tet bo, the program

can automatically translate the case of the tet being entered, or even prevent certain characters from being inserted+

Aisual 1asic can create eecutables * files-, )ctive controls, or D22 files, but is primarily used to develop

;indows applications and to interface database systems+ Dialog boes with less functionality can be used to provide

 pop.up capabilities+ (ontrols provide the basic functionality of the application, while programmers can insert

additional logic within the appropriate event handlers+ 4or eample, a drop.down combination bo will

automatically display its list and allow the user to select any element+ )n event handler is called when an item is

selected, which can then eecute additional code created by the programmer to perform some action based on which

element was selected, such as populating a related list+

)lternatively, a Aisual 1asic component can have no user interface, and instead provide )ctive obCects to other

 programs via (omponent 3bCect 'odel *(3'-+ This allows for  server.side processing or an add.in module+

The language is garbage collected using reference counting, has a large library of utility obCects, and has basic obCect oriented support+ Since the more common components are included in the default proCect template, the programmer

seldom needs to specify additional libraries+ Unlie many other programming languages, Aisual 1asic is generally

not case sensitive, although it will transform eywords into a standard case configuration and force the case of

variable names to conform to the case of the entry within the symbol table+ String comparisons are case sensitive by

default, but can be made case insensitive if so desired+

The Aisual 1asic compiler is shared with other Aisual Studio languages *(, (LL-, but restrictions in the ID do not

allow the creation of some targets *;indows model D22s- and threading models+

Characteristics

Aisual 1asic has the following traits which differ from (.derived languages"

'ultiple assignment available in ( language is not possible+ ) M 1 M ( does not imply that the values of ),

1 and ( are equal+ The 1oolean result of NIs 1 M (ON is stored in )+ The result stored in ) would therefore be

either false or true+

1oolean constant True has numeric value P!+ This is because the 1oolean data type is stored as a !.bit

signed integer+ In this construct P! evaluates to ! binary !s *the 1oolean value True-, and # as ! #s *the

1oolean value 4alse-+ This is apparent when performing a 5ot operation on a ! bit signed integer value #

which will return the integer value P!, in other words True M 5ot 4alse+ This inherent functionality becomes

especially useful when performing logical operations on the individual bits of an integer such

as )nd, 3r, or and 5ot+J%K This definition of True is also consistent with 1)SI( since the early !&@#s

'icrosoft 1)SI( implementation and is also related to the characteristics of (0U instructions at the time+

!9

Page 13: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 13/89

2ogical and bitwise operators are unified+ This is unlie some (.derived languages *such as 0erl-, which

have separate logical and bitwise operators+ This again is a traditional feature of 1)SI(+

Aariable array base+ )rrays are declared by specifying the upper and lower bounds in a way similar

to 0ascal and 4ortran+ It is also possible to use the 3ption 1ase statement to set the default lower bound+ Use of

the 3ption 1ase statement can lead to confusion when reading Aisual 1asic code and is best avoided by always

eplicitly specifying the lower bound of the array+ This lower bound is not limited to # or !, because it can also

 be set by declaration+ In this way, both the lower and upper bounds are programmable+ In more subscript.

limited languages, the lower bound of the array is not variable+ This uncommon trait does eist in Aisual

1asic +5T but not in A1Script+

30TI35 1)S was introduced by )5SI, with the standard for )5SI 'inimal 1)SI( in the late

!&@#s+

6elatively strong integration with the ;indows operating system and the (omponent 3bCect

'odel+ The native types for strings and arrays are the dedicated (3' types, 1ST6 and S)4)66)B+

1anerQs rounding as the default behavior when converting real numbers to integers with

the 6ound function+J$K O 6ound*9+$, #- gives 9, O 6ound*/+$, #- gives %+

Integers are automatically promoted to reals in epressions involving the normal division operator

*<- so that division of one integer by another produces the intuitively correct result+ There is a specific

integer divide operator *R- which does truncate+

1y default, if a variable has not been declared or if no type declaration character is specified, the

variable is of type Aariant+ =owever this can be changed with Data type statements such

asDefInt, Def1ool, DefAar, Def3bC, DefStr+ There are !9 Data type statements in total offered by Aisual

1asic +#+ The default type may be overridden for a specific declaration by using a special suffi character

on the variable name * for Double, for Single, for 2ong, V for Integer, W for String, and X for

(urrency- or using the ey phrase )s *type-+ A1 can also be set in a mode that only eplicitly declared

variables can be used with the command 3ption plicit+

!/

Page 14: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 14/89

SOFT;ARE RE<*IREME'TS SPECIFICATIO'

!+ Intro%uction 

!+! Purpose 2

 (rime 4ile System is a system used to report crimes+ This proCect is mainly useful for police

Departments+ This system will help to manage all the activities in a police Department using

computers+ (urrently all the wors are done manually, by computeriHing all the activities inside a

 police Department can be managed easily and effectively+

The police Departments in the country are, today, virtually unconnected islands+ Thans to

telephones and wireless, and especially thans to mobile telephones, there is voice connectivity

 between the police Department and senior police officers, but that is about all+ There is no

system of data storage, data sharing and accessing data+ There is no system under which one

 police Department can tal to another directly+ There is no record of crimes or criminals that can

 be accessed by a Department =ouse 3fficer, ecept the manual records relating to that police

Department+ The goals of the system are to facilitate collection, storage, retrieval, analysis,

!%

Page 15: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 15/89

transfer and sharing of data and information at the police Department and between the police

Department and the State =eadquarters and the (entral 0olice 3rganiHations+

=$+ Scope2

!+ The system Y(6I' 4I2Z will be a 6eporting application that will be used forautomating the manual process of register different case in police Department +Thissystem will manage the details of all the crime who register themselves in policeDepartment+ The system provides an interface to store the crime details of criminals or prisoners and allows the user to search and view records+ The system should have a

login+ System should support for Data ntry module for 5ominal 6oll, (ase register for

each prisoner entering in the prison

The system will greatly simplify the overall procedure of crime files+

=$>  O67ecti3es2

 The proposed system includes the following features"

• 2ogin for user and admin

• (omplaint registration

• Aiew complaint status

• (riminal register management

• 4I6 'anagement

!$

Page 16: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 16/89

• (ase =istory Details management

• 'anaging 0ostmortem details

• 0risoners register management

• 'anage list about most wanted criminals

!+% A66re3iations2

=$? References2

• I S6S 4ormat+

=$0 Tec&nologies

• Development Tool" Aisual studio #

• Database" 'icrosoft )((SS

9+ O3erall !escription

)t its core, the system should offer the following basic functionalities"

+

!+ The system requests that the administrator to enter his<her name, password+

9+ The administrator enters his<her name, password+

/+ The system validates the entered name, password, logs the actor into the system+

%+ The administrator maintains the record of information of varios fir,crimes and related

obCects+

!

Page 17: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 17/89

If in the basic flow, the actor enters an invalid name, password , the system displays an

error message+ The actor can return to the beginning of the basic flow  

+$=  Pro%uct perspecti3e2 

(6I' 4I2 is a system which aims at maing the store records of crimes easier+ This system

 provides an easy way to admin to eep trac of record of all the crimes and saves him loads of

manual wor+ This system maes updation of records easier by both user and admin and provides

updated information about the current crimes status in happening+

+$=$= S#STEM I'TERFACES 5one

+$=$= S4stem interface2

+$=$+ *SER I'TERFACES

• There will be a screen to display varios information related to 4I6+

• ) login screen for entering username, password will be provided+

4ront nd (lient)pplication *with dataentry< update< cancel< viewand reporting facility-

1acendDatabase

!@

Page 18: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 18/89

•  There will be a screen for taing and modifying the information of the related to 4I6+

• ;indows based

• 4riendly 5avigation

+$=$> :AR!;ARE I'TERFACE2

• :eyboard

• 'ouse

• Screen resolution of at least !#9%@?. required for proper and complete viewing of

screens+

+$=$@ SOFT;ARE I'TERFACES

• )ny ;indows based operating system *'icrosoft ;indows 0 or higher-+

• 'S )ccess as the D1'S.for database+

+$=$? COMM*'ICATIO' I'TERFACES

•  5one

+$=$0 MEMOR# CO'STRAI'TS

• )t least % '1 6)' and 9 G1 space on hard dis will be required for running the

application

!?

Page 19: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 19/89

+$=$- OPERATIO'S

• Aiewing

• )ddition* by administrator only-

• Updation* by administrator only-

• Deletion * by administrator only 

+$=$ SITE A!APTATIO' RE<*IREME'TS

• The terminals at client site will have to support the hardware and software interfaces

specified in above sections+

+$+ Pro%uct Function2

• )ccepting crimes information correctly+

• Storing the correct records in the database+

• Displaying correct information on selecting view option+

• Displaying current status of fir of the all crimes+

• )ccepting the updated information from user and administrator+

• Storing the updated record in database to mae it consistent+

• Deletion privilege to administrator only +

+$> *ser C&aracteristics2

3perator should be computer literate+

9+% (eneral Constraints2

• )ny ;indows 3perating system+

• Interface is in nglish+

!&

Page 20: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 20/89

  Site A%aption ReBuirements

Terminals at the client side site will have to support the hardware and software interfaces

specified in above sections+

+$? Assumptions 2

• User is a related of certain branch of police Department

• fir information is correct+

• user can fill the registration form+

>$  Specific ReBuirements

Functional ReBuirement no =2

• Introduction " 6egister for the (riminal or prisoner 

• Input " criminals personal details viH – (riminal 5o+, (riminal 5ame, )ge, 3ccupation,

(rimeType,address, 'ost;anted+

• 0risoner details " 0risoner5o+, (harge Sheet 5o+,  5ic5ame, (rimeType, 4amily'em

Identity 'ar, =eight, ;eight, (olor 

• 0rocessing " validation checs are performed on the input data by the user<administrator lie "

mandatory fields should not be ept blan 

 prisoner family member should be chec 

  )ll the entries in database should be correct

9#

Page 21: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 21/89

Functional ReBuirement no +2

•   Introduction " 4I6 

• Input " 4ir no, (3'02)I5T 53+, 4ir Date, 4ir Time , Information Type, 0lace of crime, )ct for

crime,  District of 4I6,  )ddress of victim,  0assport 5o,  5ame of 0olice,  6eceived Time,

Information 6eceived

• 0rocessing " )fter inputting data validation checs on various fields is performed + on submission

of the information the record is searched in the stored database o basis of the information

submitted+

•  3utput " If the information submitted by the user is valid and found in the database then the

corresponding record is displayed +

Functional ReBuirement 'o >2

• Introduction " add or Updation of user or administrator 

• Input " Username,password

• 0rocessing " )fter entering the required information the various validation checs are

 performed on submission of the information the updations are made to the database+

administrator must enter the correct user name and password

• 3utput " The updated information is reflected in the stored database

Functional ReBuirement @

• Introduction " Aiewing

• Input " none+

9!

Page 22: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 22/89

• 0rocessing " on clicing the view button the system search for the specified database stored+

• 3utput " if the specified database is stored then the whole database is display in the tabular form+

The data displayed is the updated and current information of the user personal and academic

details + It also displays the status of the prisoner and criminals+

@$ Performance reBuirements

?$ !esign Constraints

• Standard compliance such as I for the development of S6S report+

• Software ngineering by :+:+ )ggarwal and Bogesh Singh+

0$ Attri6utes

0$= Relia6ilit4 an% Reco3er42

It is imperative that database should be always up when put into the product+ During period of intense

activities lie submission and verification and updation of data, bac up should be taen+ It will help to

minimiHe downtime in case of failure+ )ny abnormal operations shall result in the shutting down of the

system+

0$+ Securit42 

The database should be protected physically by having server located in an enclosed and guarded facility+

Airus scanning software should be installed to protect from viruses+ The server should be installed under

firewall so that server only internal users can access it+ The system shall be compatible with )I'S

security standards+ There should be terms and conditions and a chec on the content added by the users+

Duplicate record must be discarded by the administrator+

0$> Maintenance2

 5ew additional features can be added if required and also the system components i+e+ memory, dis,

drives shall be easily serviceable without much alteration in the code+

99

Page 23: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 23/89

 

;or. Flow of Crime File 

9/

Page 24: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 24/89

!ATA FLO; !IA(RAM

The data flow diagram enables the software engineer to develop models of the information

domain and functional domain at the same time+ )s the D4D is defined into greater level of

details, the analyst performs as implicit functional decomposition of the system, thereby

accomplishing the fourth operational analysis principle for functions+ )t the same time, the D4D

refinement results in a corresponding refinement of data as it moves through the processes that

embody the application

LE"EL , !F!

9%

Page 25: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 25/89

Contet Le3el !F! for Crime File 

LE"EL = !F!

9$

Page 26: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 26/89

LE"EL + !F!

9

Page 27: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 27/89

LE"EL > !F!

9@

Page 28: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 28/89

LE"EL @ !F!

9?

Page 29: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 29/89

Entit4DRelations&ip !iagram

9&

Page 30: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 30/89

/#

Page 31: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 31/89

Page 32: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 32/89

*se cases

=$ Login

=$= /rief %escription

This use case allows the actor to login in system +

=$+ Actors

There is only one actor *user ,administrator- which interacts and participates with this use

case+

=$> Flow of e3ents

=$>$= /asic flow

This use case starts when the actor wishes to 2ogin himself for the use os system+

• The system requests that the user must enter his all valid username and password+

• 3nce the user provides the requested information, one of the sub.flows is eecuted+

• If the user selected Esubmit F, the 2ogin information sub flow is eecuted+

=$>$=$= Su6mit crimefile information

• The system requests the user to enter the information which includes"

  Personal Information

a- User 5ame

/9

Page 33: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 33/89

 b- password

 

• 3nce the user provides the requested information, system first validates the

information provided+

• If the information is valid then the particular information about the user is

recorded in the database

=$>$+ Alternati3e flow

  =$>$+$= In3ali% information

If the user entered the invalid information then the system will generate an error message

to again fill the information properly+

  =$>$+$+ /lan. information

If the user left blan the tet boes that are mandatory to be filled by him then the

system will generate error message+

=$>$+$> On cancel

If the user chooses the cancel then the use case ends and the basic flow begins+

=$@ Special ReBuirements

 5one

=$? PreDCon%ition

The user must be computer operator in police Department +

=$0 PostDCon%ition

If the use case was successful, the user information is login in the system+ 3therwise , the

system state is unchanged+

=$- Etension points

//

Page 34: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 34/89

 5one

Registration process for criminals

+$= /rief %escription

This use case allows the actor to register criminal in database+

+$+ Actors

There is only two actor *user, administrator- which interacts and participates with this use

case+

+$> Flow of e3ents

+$>$= /asic flow

This use case starts when the actor wishes to 6egister criminals for the record in database++

• The system requests that the user must enter all valid personal and academic information

of criminals+

 

• 3nce the user provides the requested information, the following sub.flow is eecuted+

• If the user selected Esubmit F, the submit information sub flow is eecuted+

+$>$=$= Su6mit crimefile information

!+ The system requests the use to enter the 6egistration information

 which includes"

• (riminal5o

• (rim5ame

•  5ic5ame

/%

Page 35: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 35/89

• )ge

• 3ccupation

• (rimeType

• )ddress

• 'ost;anted

9+ 3nce the user provides the requested information, system first validates the

information provided+

/+ If the information is valid then the particular information about the criminal is

recorded in the database+

 

+$>$+ Alternati3e flow

+$>$+$= In3ali% information

If the user entered the invalid information then the system will generate an error message

to again fill the information properly+

 +$>$+$+ /lan. information

If the user left blan the tet boes that are mandatory to be filled by him then the

system will generate error message+

+$>$+$> On cancel

If the user chooses the cancel then the use case ends and the basic flow begins+

+$@ Special ReBuirements

 5one

+$? PreDCon%ition

The user must be computer operator in police Department +

/$

Page 36: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 36/89

+$0 PostDCon%ition

If the use case was successful, the criminal information is added in the crimefile database+

3therwise , the system state is unchanged+

+$- Etension points

 5one

>$ Registration process for prisoner

>$= /rief %escription

This use case allows the actor to register prisoner in database +

>$+ Actors

There are two actor *user, administrator- which interacts and participates with this use

case+

>$> Flow of e3ents

>$>$= /asic flow

This use case starts when the actor 6egister prisoners of the prison+

• 3nce the user provides the requested information, one of the sub.flows is eecuted+

• If the user selected Esubmit F, the submit crimefile information sub flow is eecuted+

>$>$=$= Su6mit crimefile information

• The system requests the user to enter the 6egistration information which

includes"

• 0risoner5o

• (hargeSheet5o

•  5ic5ame

/

Page 37: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 37/89

• (rimeType

• 4amily'em

• Ident'ar 

• =eight

• ;eight

• (olor 

• 3nce the user provides the requested information, system first validates the

information provided+

• If the information is valid then the particular information about the prisoner is

recorded in the database

>$>$+ Alternati3e flow

  >$>$+$= In3ali% information

none+

  >$>$+$+ /lan. information

If the user left blan the tet boes that are mandatory to be filled by him then the

system will generate error message+

>$>$+$> On cancel

If the user chooses the cancel then the use case ends and the basic flow begins+

>$@ Special ReBuirements

 5one

>$? PreDCon%ition

The user must be computer operator in police Department +

/@

Page 38: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 38/89

Page 39: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 39/89

• 0'ortem5o

• 4ir5o

• 6esult

• Se

• DthDate

• (aseDesc

• =ouse5ame

• Doct5ame

• 0oliceDepartment

• 3nce the user provides the requested information, system first validates the

information provided+

• If the information is valid then the particular information about the prisoner is

recorded in the database

@$>$+ Alternati3e flow

  @$>$+$= In3ali% information

none+

  @$>$+$+ /lan. information

If the user left blan the tet boes that are mandatory to be filled by him then the

system will generate error message+

@$>$+$> On cancel

If the user chooses the cancel then the use case ends and the basic flow begins+

@$@ Special ReBuirements

 5one

/&

Page 40: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 40/89

@$? PreDCon%ition

The user must be computer operator in police Department +

@$0 PostDCon%ition

If the use case was successful, the user information is added in the crimefile database+

3therwise , the system state is unchanged+

@$- Etension points

 5one

?$ Registration process for most wante% criminal

?$= /rief %escription

This use case allows the actor to register most wanted criminal in database +

?$+ Actors

There are two actor *user, administrator- which interacts and participates with this use

case+

?$> Flow of e3ents

?$>$= /asic flow

This use case starts when the actor 6egister postmortem+

+

3nce the user provides the requested information, one of the sub.flows is eecuted+

If the user selected Esubmit F, the submit crimefile information sub flow is eecuted+

?$>$=$= Su6mit crimefile information

%#

Page 41: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 41/89

• The system requests the user to enter the 6egistration information which

includes"

• 'stID

• 'st5ame

• 'st5ic5ame

• )ge

• Se

• Desc

• 3nce the user provides the requested information, system first validates the

information provided+

• If the information is valid then the particular information about the most

wanted criminal is recorded in the database

?$>$+ Alternati3e flow

  =$>$+$= In3ali% information

none+

  ?$>$+$+ /lan. information

If the user left blan the tet boes that are mandatory to be filled by him then the

system will generate error message+

?$>$+$> On cancel

If the user chooses the cancel then the use case ends and the basic flow begins+

?$@ Special ReBuirements

 5one

?$? PreDCon%ition

%!

Page 42: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 42/89

The user must be computer operator in police Department +

?$0 PostDCon%ition

If the use case was successful, the user information is added in the crimefile database+

3therwise , the system state is unchanged+

?$- Etension points

0$ Registration process for F$I$R$

0$= /rief %escription

This use case allows the actor to register fir in database +

0$+ Actors

There are two actor *user,administrator- which interacts and participates with this use

case+

0$> Flow of e3ents

0$>$= /asic flow

This use case starts when the actor 6egister 4+I+6++

+

• 3nce the user provides the requested information, one of the sub.flows is eecuted+

• If the user selected Esubmit F, the submit crimefile information sub flow is eecuted+

0$>$=$= Su6mit crimefile information

• The system requests the user to enter the 6egistration information which

includes"

%9

Page 43: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 43/89

• 4irno

• (omplnt5o

• 4irDate

• 4irTime

• InfoType

• 0lace

• 4or2oc

• )ct

• District

• )ddress

• 0assport5o

• 0olice5ame

• 6ecvdTime

• 6ecvdInfo

• 3nce the user provides the requested information, system first validates the

information provided+

• If the information is valid then the particular information about the 4I6 is

recorded in the database

0$>$+ Alternati3e flow

  0$>$+$= In3ali% information

none+

  0$>$+$+ /lan. information

%/

Page 44: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 44/89

Page 45: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 45/89

-$>$= /asic flow

This use case starts when the actor wishes to search for the criminals+ The system

requests the user to enter the required information in order to search for criminal+

!+ 3n submitting the required information the following sub flow is eecuted+

-$>$=$= Searc& placement information

!+ The system requests the user to enter the following information for searching

which includes"

  (riminal name

 

9+ 3nce the user provides the requested information, system first validates the

information provided+

/+ If the information is valid then the placement status of the particular user is

displayed+

-$>$+ Alternati3e flow

-$>$+$= In3ali% information

If the user entered the invalid information then the system will generate an error message

to again fill the information properly+

 -$>$+$+ /lan. information

If the user left blan the tet boes that are mandatory to be filled by him then the

system will generate error message+

-$>$+$> 'o information foun%

If the information entered by the user is not found in database then the system will not

display the name of the organiHation+

%$

Page 46: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 46/89

-$>$+$> On cancel

If the user chooses the cancel then the use case ends and the basic flow begins+

-$@ Special reBuirements

 5one

-$? PreDcon%ition

The user must be computer operator in police Department +

-$0 PostDcon%ition

If the use case was successful, the criminal status of the particular user is displayed+

3therwise, the system state is unchanged+

-$- Etension points

 5one

%

Page 47: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 47/89

!ATA/ASE MO!*LE

4or creation of database 'icrosoft )ccess a popular relational database management system isused+ The database is connected visual basic which have inbuilt functions to connect to database,enter information to database and etract data+

The proCect database has following tables+

2ogin –admin login

2ogin –user login

(riminal registration

0risoner registration

%@

Page 48: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 48/89

0ostmortem

'ost wanted

%?

Page 49: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 49/89

4I6 

(harge sheet

(omplaint status

%&

Page 50: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 50/89

(omplaint registration

$#

Page 51: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 51/89

CO!I'( A'! SCREE' S:OTS

Start

$!

Page 52: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 52/89

Login form

Co%ing2Login form

0rivate Sub cmd)dmin2og[(lic*-Set rs M con+ecute*NSelect \ from )dmin2ogin where UsernameMQN L ttUname+Tet L NQ and0asswordMQN L tt0ass+Tet L NQN-If *5ot rs+34- Then 

'sg1o N2ogin SuccessN, vbInformation, N(rime 4ile SystemN  frm'DI+mnu2ogoff+nabled M True  frm'DI+mnu)dmin)ddU+nabled M True  frm'DI+mnu)dminDelU+nabled M True  frm'DI+mnu)ctiv+nabled M True  frm'DI+mnu2ogin+nabled M 4alse  frm'DI+mnu)dmin)dd(omSt+nabled M True  frm'DI+mnu)ctiv6eg+nabled M True  frm'DI+mnu)ctiv(omp+nabled M True  frm'DI+mnu)ctiv6pt+nabled M True  frm'DI+mnusearch+nabled M True  Unload 'else  'sg1o N4ailureN, vb(ritical, N(rime 4ile SystemNnd If Qrs+(loseUnload 'end Sub

0rivate Sub cmd(ancel[(lic*-Unload 'e

$9

Page 53: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 53/89

nd Sub

0rivate Sub cmdUser2og[(lic*-Set rs M con+ecute*NSelect \ from User2ogin where UsernameMQN L ttUname+Tet L NQ and0asswordMQN L tt0ass+Tet L NQN-

If *5ot rs+34- Then 'sg1o N2ogin SuccessN, vbInformation, N(rime 4ile SystemN

  frm'DI+mnu2ogoff+nabled M True  frm'DI+mnu2ogin+nabled M 4alse  frm'DI+mnu)ctiv+nabled M True  frm'DI+mnu)ctiv6eg+nabled M True  frm'DI+mnu)ctiv(omp+nabled M True  frm'DI+mnu)ctiv6pt+nabled M True  frm'DI+mnusearch+nabled M True  Unload 'e

lse  'sg1o N4ailureN, vb(ritical, N(rime 4ile SystemNnd If Qrs+(lose

nd Sub

0rivate Sub 4orm[2oad*-connectdbnd Sub

0rivate Sub 4orm[Unload*(ancel )s Integer-con+(losend Sub

$/

Page 54: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 54/89

Main form

Co%ing2 Main form

0rivate Sub 'DI4orm[2oad*-mnu2ogoff+nabled M 4alsemnu)dmin)ddU+nabled M 4alse

mnu)dminDelU+nabled M 4alsemnu)ctiv+nabled M 4alsemnu)dmin)dd(omSt+nabled M 4alsemnu)ctiv6eg+nabled M 4alsemnu)ctiv(omp+nabled M 4alsemnu)ctiv6pt+nabled M 4alsemnusearch+nabled M 4alse

$%

Page 55: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 55/89

Datanvironment!+(onnection!+(onnectionString M N0roviderM'icrosoft+7et+32D1+%+#]DataSourceMN )pp+0ath NRcrimefile+mdb]0ersist Security InfoM4alseNnd Sub0rivate Sub mnu)ctiv(hrgSht[(lic*-2oad frm(hargeSheet

frm(hargeSheet+Shownd Sub0rivate Sub mnu)ctiv(omp6eg[(lic*-2oad frm(omplt6egfrm(omplt6eg+Shownd Sub0rivate Sub mnu)ctiv(ompStat[(lic*-2oad frm(ompStatusfrm(ompStatus+Shownd Sub0rivate Sub mnu)ctiv(s=ist[(lic*-

2oad frm=istSheetfrm=istSheet+Shownd Sub0rivate Sub mnu)ctiv4ir[(lic*-2oad frm4I6 frm4I6+Shownd Sub0rivate Sub mnu)ctiv6eg(rim[(lic*-2oad frm(riminal6egister frm(riminal6egister+Shownd Sub0rivate Sub mnu)ctiv6eg0ost[(lic*-2oad frm0ostmortemfrm0ostmortem+Shownd Sub0rivate Sub mnu)ctiv6eg0ris[(lic*-2oad frm0risoner6egfrm0risoner6eg+Shownd Sub0rivate Sub mnu)ctiv6pt(rim[(lic*-2oad Data6eport(rime6ptData6eport(rime6pt+Shownd Sub0rivate Sub mnu)ctiv6pt'st[(lic*-2oad Data6eport'ost;antedData6eport'ost;anted+Shownd Sub0rivate Sub mnu)ct6eg'st[(lic*-2oad frm'ost;antedfrm'ost;anted+Show

$$

Page 56: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 56/89

nd Sub0rivate Sub mnu)dmin)dd(omSt[(lic*-2oad frm)dd(ompltStatusfrm)dd(ompltStatus+Shownd Sub

0rivate Sub mnu)dmin)ddU[(lic*-2oad frm)ddUser frm)ddUser+Shownd Sub0rivate Sub mnu)dminDelU[(lic*-2oad frmDeleteUser frmDeleteUser+Shownd Sub0rivate Sub mnucriminal[(lic*-2oad search(riminalsearch(riminal+Show

nd Sub0rivate Sub mnueit[(lic*-Unload 'end Sub0rivate Sub mnu2ogin[(lic*-2oad frm2oginfrm2ogin+Shownd Sub0rivate Sub mnu2ogoff[(lic*-mnu2ogoff+nabled M 4alsemnu)dmin)ddU+nabled M 4alsemnu)dminDelU+nabled M 4alsemnu)ctiv+nabled M 4alsemnu2ogin+nabled M Truemnu)dmin)dd(omSt+nabled M 4alsemnu)ctiv6eg+nabled M 4alsemnu)ctiv(omp+nabled M 4alsemnu)ctiv6pt+nabled M 4alsemnusearch+nabled M 4alsend Sub0rivate Sub mnuprisioner[(lic*-2oad Search0risoner Search0risoner+Shownd Sub0rivate Sub mnu6pt4I6[(lic*-2oad frm4I6rptfrm4I6rpt+Shownd Sub0rivate Sub mnu6pt'ortem[(lic*-2oad frm0'ortem6pt

$

Page 57: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 57/89

frm0'ortem6pt+Shownd Sub

A%% 'ew user

Co%ing2 A%% 'ew user

0rivate Sub 4orm[2oad*-connectdbnd Sub0rivate Sub cmd)dd[(lic*-

Set rs M con+ecute*Nselect \ from User2ogin where UsernameMQN L ttUsername+Tet L NQ and0asswordMQN L tt0assword+Tet L NQN-If *5ot rs+34- Then  'sg1o NSorry User already eists+ Try another usernameN, vb(ritical, N(rime 4ile SystemN  tt0assword+Tet M NN  ttUsername+Tet M NN  ttUsername+Set4ocuslse

$@

Page 58: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 58/89

  con+ecute *Ninsert into User2ogin values*QN L ttUsername+Tet L NQ,QN L tt0assword+Tet LNQ-N-  'sg1o NUser added sucessfullyN, vbInformation, N(rime 4ile SystemN  tt0assword+Tet M NN  ttUsername+Tet M NN

  ttUsername+Set4ocusnd If nd Sub

0rivate Sub cmd(ancel[(lic*-Unload 'end Sub

!elete user

Co%ing2 !elete user

0rivate Sub cmd(ancel[(lic*-Unload 'end Sub

0rivate Sub cmdDelete[(lic*-

con+ecute *Ndelete from User2ogin where UsernameMQN L cmbUsername+Tet L NQN-'sg1o NUser deleted sucessfullyN, vbInformation, N(4SNcmbUsername+Tet M NNnd Sub

0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect \ from User2oginN-

$?

Page 59: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 59/89

;hile *5ot rs+34-  cmbUsername+)ddItem rs*#-  rs+'ove5et;endnd Sub

A%% complaint status

Co%ing2 A%% complaint status

0rivate Sub cmd(ancel[(lic*-Unload 'end Sub

0rivate Sub cmdAiewStat[(lic*-Set rs M con+ecute*Nselect \ from (omplntStatus where (omplnt5oMN L cmb(omplnt5o+TetL NN-If *5ot rs+34- Then

$&

Page 60: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 60/89

  ttDetails+Tet M rs*!-nd If 

nd Sub

0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect distinct*(omplnt5o- from (omplntStatusN-;hile *5ot rs+34-  cmb(omplnt5o+)ddItem rs*#-  rs+'ove5et;endrs+(losend Sub

Criminal registration

Co%ing2 Criminal registration

0rivate Sub cmd(ancel[(lic*-Unload 'e

#

Page 61: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 61/89

nd Sub

0rivate Sub cmdSave[(lic*-If *optyes+Aalue M True- Then  M NBesN

lse  M N5oNnd If If *tt)ddress+Tet M NN 3r tt)ge+Tet M NN 3r tt(rimeType+Tet M NN 3r tt5ame+Tet M NN3r tt5ic5ame+Tet M NN 3r tt3ccupation+Tet M NN- Then  'sg1o N'issing 4ields,0lease fill up allN, vbInformation, N(rime 4ile SystemNlseIf *5ot Is5umeric*tt)ge+Tet-- Then  'sg1o N)ge should be numericNlse  con+ecute *Ninsert into (riminal6eg values*N L tt(riminal5o+Tet L [   N,QN L tt5ame+Tet L NQ,QN L tt5ic5ame+Tet L NQ,N L tt)ge+Tet L [ 

  N,QN L tt3ccupation+Tet L NQ,QN L tt(rimeType+Tet L NQ,QN L tt)ddress+Tet L [   NQ,QN L L NQ-N-  'sg1o N6ecord )dded successfullyN, vbInformation, N(rime 4ile SystemN  tt(riminal5o+Tet M tt(riminal5o+Tet L !  tt)ddress+Tet M NN  tt)ge+Tet M NN  tt(rimeType+Tet M NN  tt5ame+Tet M NN  tt5ic5ame+Tet M NN  tt3ccupation+Tet M NN  tt5ame+Set4ocusnd If nd Sub

0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect ma*(riminal5o- from (riminal6egN-If *5ot rs+34- Then  cnt M rs*#-  If *cnt M #- Then  cnt M !  lse  cnt M cnt L !  nd If   tt(riminal5o+Tet M cntnd If nd Sub

!

Page 62: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 62/89

Prisoner registration

Co%ing2 Prisoner registration

0rivate Sub (ommand![(lic*-If *tt(hgr5o+Tet M NN 3r tt(olor+Tet M NN 3r tt(rmType+Tet M NN 3r tt4am'em+Tet MNN 3r tt=t+Tet M NN 3r ttIden'ar+Tet M NN 3r tt5i5ame+Tet M NN 3r tt0ris5o+Tet M NN3r tt;t+Tet M NN- Then  'sg1o N'issing 4ields, 0lease fill up allN, vbInformation, N(rime 4ile SystemNlse

9

Page 63: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 63/89

  If **5ot Is5umeric*tt(hgr5o+Tet-- 3r *5ot Is5umeric*tt=t+Tet-- 3r *5otIs5umeric*tt;t+Tet--- Then  'sg1o NSome of the values entered are not matching, 0lease chec numbers are enteredcorrectlyN, vb(ritical, N(rime 4ile SystemN  lse

  Set rs M con+ecute*Nselect \ from 0risoners6eg where (hargeSheet5oMN Ltt(hgr5o+Tet L NN-  If *5ot rs+34- Then  'sg1o N(harge Sheet 5umber )lready ist, 0lease try another numberN, vb(ritical,N(rime 4ile SystemN  tt(hgr5o+Tet M NN  tt(hgr5o+Set4ocus  lse  con+ecute *Ninsert into 0risoners6eg values*N L tt0ris5o+Tet L N,N L tt(hgr5o+Tet L N,QNL tt5i5ame+Tet L [   NQ,QN L tt(rmType+Tet L NQ,QN L tt4am'em+Tet L NQ,QN L ttIden'ar+Tet L NQ,N L

tt=t+Tet L [   N,N L tt;t+Tet L N,QN L tt(olor+Tet L NQ-N-  con+ecute *Ninsert into prisonersTemp values*N L tt0ris5o+Tet L N,Q5oQ-N-  'sg1o N6ecord )dded SucessfullyN, vbInformation, N(4SN  tt0ris5o+Tet M tt0ris5o+Tet L !  tt(hgr5o+Tet M NN  tt(olor+Tet M NN  tt(rmType+Tet M NN  tt4am'em+Tet M NN  tt=t+Tet M NN  ttIden'ar+Tet M NN  tt5i5ame+Tet M NN  tt;t+Tet M NN  tt(hgr5o+Set4ocus  nd If   nd If nd If nd Sub

0rivate Sub (ommand9[(lic*-Unload 'end Sub

/

Page 64: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 64/89

Post mortem

Co%ing2 Post mortem

0rivate Sub cmdSave[(lic*-If *ttDate+Tet M NN 3r ttDesc+Tet M NN 3r ttDoct5ame+Tet M NN 3r cmb4irr5o+Tet M NN 3rtt=ouse5ame+Tet M NN 3r tt0oliceSt+Tet M NN 3r tt0ost5o+Tet M NN 3r tt6slt+Tet M NN-Then  'sg1o N'issing 4ields 0lease 4ill Up allN, vbInformation, N(rime 4ile SystemN

%

Page 65: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 65/89

lse  Set rs M con+ecute*Nselect \ from 0ostmortem where 4ir5oMN L cmb4irr5o+Tet L NN-  If *5ot rs+34- Then  'sg1o NDuplication is not allowded, 0lease try another 4I6 numberN, vb(ritical, N(rime4ile SystemN

  cmb4irr5o+Set4ocus lse

  con+ecute *Ninsert into postmortem values*N L tt0ost5o+Tet L N,N L cmb4irr5o+Tet LN,QN L tt6slt+Tet L [   NQ,QN L cmbSe+Tet L NQ,QN L ttDate+Tet L NQ,QN L ttDesc+Tet L [   NQ,QN L tt=ouse5ame+Tet L NQ,QN L ttDoct5ame+Tet L NQ,QN L tt0oliceSt+Tet L NQ-N-  'sg1o N6ecord )dded SucessfullyN, vbInformation, N(rime 4ile SystemN  tt0ost5o+Tet M tt0ost5o L !  ttDate+Tet M NN  ttDesc+Tet M NN

  ttDoct5ame+Tet M NN  tt=ouse5ame+Tet M NN  tt0oliceSt+Tet M NN  tt6slt+Tet M NN  nd If nd If nd Sub

0rivate Sub 4orm[2oad*-connectdbcmbSe+Tet M N'aleNSet rs M con+ecute*Nselect ma*0'ortem5o- from 0ostmortemN-If *5ot rs+34- Then  cnt M rs*#-  If *cnt M #- Then  cnt M !  lse  cnt M cnt L !  nd If   tt0ost5o+Tet M cntnd If rs+(loseSet rs M con+ecute*Nselect 4irno from 4I6N-;hile *5ot rs+34-  cmb4irr5o+)ddItem rs*#-  rs+'ove5et;endrs+(losend Sub

$

Page 66: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 66/89

POST MORTEM REPORT2

CO!I'(2

Dim )s Integer 0rivate Sub cmdSh6pt[(lic*-  M cmb'no+Tet  If *Datanvironment!+rs(ommand/+State M !- Then

Page 67: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 67/89

  Datanvironment!+rs(ommand/+(lose  lse  Datanvironment!+(ommand/ *-  2oad Data6eportmortem  Data6eportmortem+Show

  nd If  nd Sub0rivate Sub (ommand![(lic*-Unload 'end Sub0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect 0'ortem5o from 0ostmortemN-;hile *5ot rs+34-  cmb'no+)ddItem rs*#-

  rs+'ove5et;endnd Sub

@

Page 68: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 68/89

Most wante%

Co%ing2 Mostwante%

Dim )s Integer 

0rivate Sub cmd(ancel[(lic*-Unload 'end Sub0rivate Sub cmdSave[(lic*-If *tt)ge+Tet M NN 3r ttDesc+Tet M NN 3r tt5ame+Tet M NN 3r tt5ic5ame+Tet M NN-Then  'sg1o N'issing fields, 0lease fill up allN, vbInformation, N(rime 4ile SystemNlse

?

Page 69: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 69/89

  Set rs M con+ecute*Nselect count*\- from 'ost;antedN-  If *5ot rs+34- Then  M rs*#-  If * M #- Then  M !

  lse  M L !  nd If   tthd+Tet M   nd If   If *5ot Is5umeric*tt)ge+Tet-- Then  'sg1o N)ge should be numberN, vbInformation, N(rime 4ile SyatemN  tt)ge+Tet M NN  tt)ge+Set4ocus  lse 

con+ecute *Ninsert into 'ost;anted values*N L tthd+Tet L N,QN L tt5ame+Tet L [   NQ,QN L tt5ic5ame+Tet L NQ,N L tt)ge+Tet L N,QN L cmbSe+Tet L NQ,QN LttDesc+Tet L NQ-N-  'sg1o N6ecord )dded SuccessfullyN, vbInformation, N(rime 4ile systemN  tt5ame+Tet M NN  tt)ge+Tet M NN  ttDesc+Tet M NN  tt5ic5ame+Tet M NN  tt5ame+Set4ocus  nd If nd If nd Sub0rivate Sub 4orm[2oad*-connectdbnd Sub

&

Page 70: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 70/89

MOST ;A'TE! REPORT

@#

Page 71: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 71/89

FIR 

Co%ing2 FIR 

0rivate Sub cmd(ancel[(lic*-Unload 'end Sub

0rivate Sub cmdSave[(lic*-If *ttDate+Tet M NN 3r ttDistrict+Tet M NN 3r tt4ir5o+Tet M NN 3r ttInfo)dd+Tet M NN 3rttInfo6cd+Tet M NN 3r [ 

@!

Page 72: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 72/89

Page 73: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 73/89

 nd Sub0rivate Sub 4orm[2oad*-cmbT!+Tet M N)'NcmbT/+Tet M N)'N

cmb)ct+Tet M N'urderNcmb4or2oc+Tet M N4oreignNconnectdbSet rs M con+ecute*NSelect (omplnt5o from (omplntTemp where StatusMQ5oQN-;hile *5ot rs+34-  cmb(omplantno+)ddItem rs*#-  rs+'ove5et;endnd Sub

@/

Page 74: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 74/89

FIR REPORT

CO!I'(2

Dim )s Integer 0rivate Sub cmdSh6pt[(lic*- M cmb'no+Tet  If *Datanvironment!+rs(ommand%+State M !- Then  Datanvironment!+rs(ommand%+(lose

@%

Page 75: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 75/89

  lse  Datanvironment!+(ommand% *-  2oad Data6eport4I6   Data6eport4I6+Show  nd If 

nd Sub0rivate Sub (ommand![(lic*-Unload 'end Sub0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect 4irno from 4I6N-;hile *5ot rs+34-  cmb'no+)ddItem rs*#-  rs+'ove5et;end

nd Sub

C&arge s&eet

@$

Page 76: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 76/89

Co%ing2c&argeS&eet

Dim cnt )s Integer Dim )s (ontrol

0rivate Sub cmd1ac[(lic*-4rame%+Aisible M 4alse4rame/+Aisible M Truend Sub

0rivate Sub cmd1ac9[(lic*-4rame9+Aisible M 4alse4rame!+Aisible M Truend Sub

0rivate Sub cmd1ac/[(lic*-4rame/+Aisible M 4alse4rame9+Aisible M True

@

Page 77: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 77/89

nd Sub

0rivate Sub cmd4inish[(lic*-If *tt;itn)dd+Tet M NN 3r tt;itn5ame+Tet M NN 3r tt;itn3cc+Tet M NN- Then  'sg1o N'issing 4ields, 0lease fill up allN, vbInformation, N(rime 4ile systemN

lse  Set rs M con+ecute*Nselect \ from (hargeSheet where 4ir5oMN L cmb4ir5o+Tet L NN-  If *5ot rs+34- Then  'sg1o NDupplication is not allowed, 0lease try another fir numberN, vb(ritical, N(rime4ile systemN  4rame%+Aisible M 4alse  4rame!+Aisible M True  cmb4ir5o+Set4ocus  lse  con+ecute *Ninsert into (hargeSheet values*N L tt(hrg5o+Tet L N,QN Ltt0stat5ame+Tet L NQ,QN L ttDate+Tet L [ 

  NQ,N L cmb4ir5o+Tet L N,QN L ttDist+Tet L NQ,QN L ttInfo5ame+Tet L [   NQ,QN L ttInfo)dd+Tet L NQ,QN L ttInfo3cc+Tet L NQ,QN L ttInfo0art+Tet L [   NQ,QN L tt)ccu5ame+Tet L NQ,QN L tt)ccu)dd+Tet L NQ,QN L cmb)ccuSe+Tet L [   NQ,N L tt)ccu)ge+Tet L N,QN L tt)ccu3cc+Tet L NQ,QN L cmb)ccuStat+Tet L [   NQ,QN L tt)ccu)ct+Tet L NQ,QN L tt;itn5ame+Tet L NQ,QN L tt;itn)dd+Tet L [   NQ,QN L tt;itn3cc+Tet L NQ-N-  'sg1o N6ecord )dded SuccessfullyN, vbInformation, N(rime 4ile systemN  4rame%+Aisible M 4alse  4rame!+Aisible M True  tt(hrg5o+Tet M tt(hrg5o+Tet L !  Q 4or ach In 'e+(ontrols  Q If * M Tet1o- Then  Q +Tet M NN  Q nd If   Q5et  nd If nd If nd Sub

0rivate Sub cmd5et![(lic*-If *tt(hrg5o+Tet M NN 3r tt0stat5ame+Tet M NN 3r ttDate+Tet M NN 3r cmb4ir5o+Tet M NN3r ttDist+Tet M NN- Then  'sg1o N'issing 4ields, 0lease fill up allN, vbInformation, N(rime 4ile systemNlse  4rame!+Aisible M 4alse  4rame9+Aisible M Truend If nd Sub

0rivate Sub cmd5et9[(lic*-

@@

Page 78: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 78/89

If *ttInfo)dd+Tet M NN 3r ttInfo5ame+Tet M NN 3r ttInfo3cc+Tet M NN 3r ttInfo0art+Tet MNN- Then  'sg1o N'issing 4ields, 0lease fill up allN, vbInformation, N(rime 4ile systemNlse  4rame9+Aisible M 4alse

  4rame/+Aisible M Truend If nd Sub

0rivate Sub cmd5et/[(lic*-If *tt)ccu)ct+Tet M NN 3r tt)ccu)dd+Tet M NN 3r tt)ccu)ge+Tet M NN 3rtt)ccu5ame+Tet M NN 3r tt)ccu3cc+Tet M NN- Then  'sg1o N'issing 4ields, 0lease fill up allN, vbInformation, N(rime 4ile systemNlse  4rame/+Aisible M 4alse  4rame%+Aisible M True

nd If nd Sub0rivate Sub 4orm[2oad*-4rame!+Aisible M True4rame9+Aisible M 4alse4rame/+Aisible M 4alse4rame%+Aisible M 4alseconnectdbSet rs M con+ecute*Nselect ma*(hrgSht5o- from (hargeSheetN-If *5ot rs+34- Then  cnt M rs*#-  If *cnt M #- Then  cnt M !  lse  cnt M cnt L !  nd If   tt(hrg5o+Tet M cntnd If rs+(loseSet rs M con+ecute*Nselect 4irno from 4I6N-;hile *5ot rs+34-  cmb4ir5o+)ddItem rs*#-  rs+'ove5et;endrs+(losend Sub

Complaint status

@?

Page 79: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 79/89

Co%ing2 Complaint status

0rivate Sub cmd(ancel[(lic*-

Unload 'end Sub

0rivate Sub cmdAiewStat[(lic*-Set rs M con+ecute*Nselect \ from (omplntStatus where (omplnt5oMN L cmb(omplnt5o+TetL NN-If *5ot rs+34- Then  ttDetails+Tet M rs*!-nd If nd Sub0rivate Sub 4orm[2oad*-connectdbSet rs M con+ecute*Nselect distinct*(omplnt5o- from (omplntStatusN-;hile *5ot rs+34-  cmb(omplnt5o+)ddItem rs*#-  rs+'ove5et;endrs+(losend Sub

@&

Page 80: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 80/89

Searc& criminal

?#

Page 81: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 81/89

Co%ing2 Complaint status

Dim con )s )D3D1+(onnection

Dim rec )s )D3D1+6ecordset

0rivate Sub (ommand![(lic*-  Dim strcon )s String  Dim strcom )s String  strcon M N0roviderM'icrosoft+)(+32D1+!9+#]DataSourceMD"R(rime4ileR(rime4ileR(rime4ileR(rime 4ile SystemRcrimefile+mdb]0ersist SecurityInfoM4alseN  Set con M 5ew )D3D1+(onnection  con+3pen strcon  Set rec M 5ew )D3D1+6ecordset

  strcom M Nselect \ from (riminal6eg where (rim5ameMQN Tet!+Tet NQN  rec+3pen strcom, con, ad(mdTet  If rec+34 Then  'sg1o Nrecord not presentN  lse" 'sg1o Nrecord is presentN  Tet9+Tet M rec+4ields*#-  Tet/+Tet M rec+4ields*!-  Tet%+Tet M rec+4ields*9-  Tet$+Tet M rec+4ields*/-  Tet+Tet M rec+4ields*%-  Tet@+Tet M rec+4ields*$-  Tet?+Tet M rec+4ields*-  Tet&+Tet M rec+4ields*@-  nd If nd Sub

0rivate Sub eit[(lic*-Unload 'e

nd Sub

?!

Page 82: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 82/89

Searc& prisoner

Co%ing2 Searc& prisoner

Dim con )s )D3D1+(onnectionDim rec )s )D3D1+6ecordset0rivate Sub (ommand![(lic*-  Dim strcon )s String  Dim strcom )s String  strcon M N0roviderM'icrosoft+)(+32D1+!9+#]DataSourceMD"R(rime4ileR(rime4ileR(rime4ileR(rime 4ile SystemRcrimefile+mdb]0ersist SecurityInfoM4alseN

?9

Page 83: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 83/89

  Set con M 5ew )D3D1+(onnection  con+3pen strcon  Set rec M 5ew )D3D1+6ecordset  strcom M Nselect \ from 0risoners6eg where 0risoner5oMN (ombo!+Tet  If (ombo!+Tet M NN Then

  'sg1o Nrecord not presentN  lse  rec+3pen strcom, con, ad(mdTet  If rec+34 Then  'sg1o Nrecord not presentN  lse  'sg1o Nrecord is presentN  Tet!+Tet M rec+4ields*#-  Tet9+Tet M rec+4ields*!-  Tet/+Tet M rec+4ields*9-  Tet%+Tet M rec+4ields*/-

  Tet$+Tet M rec+4ields*%-  Tet+Tet M rec+4ields*$-  Tet@+Tet M rec+4ields*-  Tet?+Tet M rec+4ields*@-  Tet&+Tet M rec+4ields*?-  nd If   nd If nd Sub

0rivate Sub eit[(lic*-Unload 'end Sub

?/

Page 84: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 84/89

The modules involved in this proCect are"

• 2ogin for user and admin

• (omplaint registration

• Aiew complaint status

• (riminal register management

• 4I6 'anagement

• (ase =istory Details management

• 'anaging 0ostmortem details

• 0risoners register management

• 'anage list about most wanted criminals

LO(I'

  This includes )dministrator and User login+ There will be a username and

 password to login into the system to use all the facilities+

=$ COMPLAI'T RE(ISTRATIO'

  This module helps to register the details about the crime+ This is done by

entering some details, such as incident details, Aictim details, crime details etc

>$ "IE; COMPLAI'T STAT*S

This module allows us to view the status of the complaint that you have

registered earlier+

?%

Page 85: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 85/89

@$ CRIMI'AL RE(ISTER MA'A(EME'T

=ere we can have the facility to view the details of the criminals+ The

administrator can add new criminalZs details and save it in a database+ This can be done

 by entering details such as criminal number, age, occupation, type of crime etc+

?$ FIR MA'(EME'T

This module allows viewing the 4irst Information 6eport of all the crimes that

too place at recent years+ The administrator can enter 4I6 information and save it in a

database+

0$CASE :ISTOR# !ETAILS MA'A(EME'T

=ere we can view the details of the case, date of occurrence, the type of crime

and place of occurrence etc8

-$ MA'A(I'( POSTMORTEM !ETAILS

This module helps to view the postmortem details of a person+ The details such

as date of death cause of death, name of the doctor etc+

$ PRISO'ER RE(ISTER MA'(EME'T

This module helps the administrator as well as the user to store, view and manage the

details of the past and present prisoners+

$ MA'A(E T:E LIST OF MOST ;A'TE! CRIMI'ALS

?$

Page 86: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 86/89

This is an additional feature added to this Software, which helps us to mae a quic

search about the most wanted criminals+ This helps to always eep trac of and identify a person

quicly, who is a most wanted criminal+

TEST CASES 

Test cases used in this proCect are"

 Test case =2

Purpose2 The main purpose of this test case to inform the administrator if he did not write the

correct username or password+

Pre con%ition an% inputs2 The precondition for this test case is if the administrator write the

correct username and password, then only user will be able to access the application+

Results2  if username and password is not correct, then an error mess will be displayed for

incorrect password< username+

Test case +2

Purpose2 The main purpose of this test case to inform the administrator if any eception occurs

while updating information on the application+ The format should be correct while entering the

details for the criminal or prisoner name or fir information+

 Precon%ition an% inputs2 The precondition of this test case is there are validations given in the

form which indicates the correct format of the data +The user has to fill the all required field ++

?

Page 87: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 87/89

Results2  lf data format entered is not correct or any field is blan, then no account will be

generated+

F*T*RE E':A'CEME'T

• ;e can update this system as online application

• The main advantage of online application is that, a person can report the

crime any time from anywhere+

• Users can view the progress of their complaint online+

• 1y the future technology user can view the case details and progress of

the complaints on their mobile phones

4ace recognition technology can apply+ User or witness of the crime cangive the physical information of the thief+

?@

Page 88: Crime Filecrime file

8/13/2019 Crime Filecrime file

http://slidepdf.com/reader/full/crime-filecrime-file 88/89

CO'CL*SIO'

CRIME FILE MA'A(EME'T S#STEM initiates the obCective of providing

the user with customiHed and powerful complaint registration and process management

system side software+ The software is built with all options such as complaint

registration, prisonerZs registration, and postmortem report generation etc8)ll the

requirements specified during the analysis and design phase are fully met, thus resulting

in the formation of good software+ The interface provided is very user friendly and

fleible for all times+

??