Crime Records Management System

89
CRIME AUTOMATION & REPORTING SYSTEM CONTENTS 1. Synopsis 2. Organization Profile 3. Project Overview 4. System Analysis 4.1 Existing System 4.2 Proposed System 4.3 Feasibility Study 4.3.1 Economic Feasibility 4.3.2 Technical Feasibility 4.3.3 Behavioral Feasibility 4.4 Tools & Platforms Used 5. Requirement Analysis 5.1 Problem Recognition 5.2 Problem Evaluation and Synthesis 5.3 Modeling 6. System Design 6.1 Data Design 6.2 Architectural Design 6.3 Procedural Design 6.4 Interface Design 7. Coding 8. System Testing 8.1 Testing Process 8.2 Unit Testing 8.3 Integration Testing 8.4 Validation Testing 9. Implementation 9.1 Implementation Procedures

description

project in crime management in asp.net synopsis

Transcript of Crime Records Management System

Page 1: Crime Records Management System

CRIME AUTOMATION & REPORTING SYSTEM

CONTENTS

1. Synopsis 2. Organization Profile3. Project Overview4. System Analysis 4.1 Existing System 4.2 Proposed System 4.3 Feasibility Study4.3.1 Economic Feasibility4.3.2 Technical Feasibility4.3.3 Behavioral Feasibility4.4 Tools & Platforms Used5. Requirement Analysis 5.1 Problem Recognition 5.2 Problem Evaluation and Synthesis 5.3 Modeling6. System Design 6.1 Data Design 6.2 Architectural Design 6.3 Procedural Design 6.4 Interface Design7. Coding8. System Testing 8.1 Testing Process 8.2 Unit Testing 8.3 Integration Testing 8.4 Validation Testing9. Implementation 9.1 Implementation Procedures10. Software Maintenance11. Conclusion

AppendicesAppendix A (DFD)Appendix B (Tables)Appendix C (Input forms and Output forms)

Page 2: Crime Records Management System

Bibliography

Page 3: Crime Records Management System

SYNOPSIS

Page 4: Crime Records Management System

SYNOPSIS

Synopsis is a general documentation tool. By means of a modular structure, it

adapts to different styles of embedded documentation, different programming

languages and various output formats. It scales well with the size of the project by

allowing processing to be controlled by making files.

The Crime Records Management System applies to Police Stations all across the

country and specifically looks into the subject crime prevention, detection, conviction

of criminals depending on a highly responsive backbone of Information Management.

Modules of the project

Administrator’s module will be focusing on the maintenance like Master Data

Maintenance, Removal of old and outdated data from the software etc.

Station module deals with processing of complaints, creating FIR, entering victim &

witness details etc. All the basic processing of a station will be done in this module.

Citizen module is for the public user, who has a complaint to register.

Crime module is used for entering all details about the crime. It contains the date,

police station where it is recorded, place, Nature of Crime etc.

Search module is for searching crime in station wise, nature of crime.

Avocation Module deals with the Law part of every Crime.

Page 5: Crime Records Management System

ORGANIZATION PROFILE

Page 6: Crime Records Management System

ORGANIZATION PROFILE

Soft Solutions provides worldwide IT solutions for Global 1000 corporations to stay

abreast of the changes in today’s environment. Our areas of expertise include

technology consulting, Application Development, Information Security and SAP. We

are highly motivated, experienced professionals committed to our client’s success.

Our technical expertise enables us to innovate, develop, and implement cutting edge

technology solutions, resulting in significant savings for clients.

Here at Soft Solution, we are sincerely committed to making a difference. As part of

our corporate social responsibility program, we donate a portion of our revenues to

the 5H Program, a service project that is supported by the International Association

Corporate Social Responsibility

“What distinguishes Soft Solution from its competitors is the work culture of

excellence, which is the result of our commitment to a greater cause.” – Mr. Harish

Ramachandran, CEO

At Soft Solution, we know that success demands the highest standards of

social, economic and environmental responsibility across our operations worldwide.

Soft Solution’s Services

Working closely with our clients, we customize our solutions to fit each and every

client's unique needs and marketplace. Listed are, but a few of Soft Solution’s

comprehensive suite of services:

Application Development

Information Security

SAP Implementation

Page 7: Crime Records Management System

PROJECT OVERVIEW

Page 8: Crime Records Management System

PROJECT OVERVIEW

The Crime Records Management System applies to Police Stations all across the

country and specifically looks into the subject crime prevention, detection, conviction

of criminals depending on a highly responsive backbone of Information Management.

The efficiency of the Police and the effectiveness with which it tackles crime depend

on what quality of information it can derive from its existing records and how fast it

can have access to it.

I had done this project using ASP.NET as front end and SQL Server as back end

easing the effort of user.

Modules of the Project

1) Station module

Each of the station must first register with the Software. For the registration part each

station enter their details like station name, address, phone no, station in charge etc.

and get a User Id from the Software. Once the prospective station registers with the

software they can avail the existing records.

2) Citizen module

Each of the citizens, who has a complaint to register, must first register with the

Software. For the registration part each person enter their details like name, address,

phone no., E-Mail ID etc. and get a User Id & password from the Software. Once the

registration is complete, the citizen can sign-in to the website & register their

complaint.

3) Crime module

This module is used for entering all details about the crime. It contains the date and

time, police station where it is recorded, place, Nature of Crime, Location of the

Crime etc.

4) Search module

In this module we can search the crime in station wise, nature of crime.

Page 9: Crime Records Management System

5) Administrators Module

The module will be protected by user ID and password. Ordinary users of the

software will not be permitted to enter into this area of the software. The module will

be focusing on the maintenance like Master Data Maintenance, Removal of old and

outdated data from the software etc.

6) Avocation Module

This Module deals with the Law part of every Crime.

ABOUT THE DEVELOPING SYSTEM

The system has developed in ASP.NET as front end and SQL server 2000 as back

end.

ASP.NET (Active Server Pages.net)

WHAT IS ASP.NET: Microsoft ASP.NET is a free technology that allows

programmers to create dynamic web applications.ASP.NET can be used to create

anything from small, personal websites through to large, enterprise-class web

applications. ASP.NET is the latest version of Microsoft's Active Server Pages

technology (ASP).ASP.NET is a part of the Microsoft .NET framework, and a

powerful tool for creating dynamic and interactive web pages. All we need to get

started with ASP.NET is the free .NET Framework and the free Visual Web

Developer.

ASP: ASP is a server side scripting technology that enables scripts (embedded in web

pages) to be executed by an Internet server

About VB.NET

Microsoft.net was formerly known as next generation windows services (NGWS for

short).It is a completely new platform for developing the next generation of windows

Page 10: Crime Records Management System

/web applications. These applications would transcend device boundaries and fully

harness the power of internet. However, this new platform required a language,

which could take its fully advantage; this is one of factors that led to the

development of VB. VB has evolved from QBASIC language. The VB compiler is

considered to be the most efficient compiler in the .net family and a major part of the

.net based classes libraries, itself are written in VB.

SQL Server 2000

Microsoft SQL Server 2000 is a relational database management system (RDBMS)

produced by Microsoft. Its primary query language is Transact SQL, an

implementation of the ANSI/ISO standard SQL used by both Microsoft and Sybase.

SQL Server allows multiple clients to use the same database

concurrently. SQL Server provides two modes of concurrency control: pessimistic

and optimistic concurrency. When pessimistic concurrency control is being used, SQL

Server controls concurrent access by using locks. Locks can be either shared or

exclusive. Exclusive lock grants the user exclusive access to the data no other user

can access the data as long as the lock is held. Shared locks are used when some data

is being read-multiple users can read data locked with a shared lock, but not acquire

an exclusive lock. SQL Server also provides the optimistic concurrency control

mechanism, which is similar to the multiversion concurrency control used in other

databases.

Page 11: Crime Records Management System

SYSTEM SPECIFICATIONS

SOFTWARE SPECIFICATIONS

The “Crime Reporting System” must use Microsoft SQL server 2000 as its database

component.

Software Requirements

The software requirements include the software that is required for working. Software

requirements are as follows:

Developments Tools

ASP .NET uses the new ADO .NET.

ASP .NET supports full Visual Basic, not VBScript.

ASP .NET supports C# (C sharp) and C++.ASP .NET supports JScript as be-

fore.

Database

SQL Server

Application Server

Sun Microsystems

Operating System

Windows XP Professional

Page 12: Crime Records Management System

HARDWARE SPECIFICATION

Hardware interfaces specifies the logical characteristics of each interface between the

software product and the hardware components of the system. Many business type

applications will not have hardware interfaces, since “Crime Reporting System” is an

application it too will not require any particular hardware interface.

Hardware Requirements

The hardware for the project should be selected in such a way that it should give the

maximum optimal result .Hardware requirements are as follows:

Server Side

Processor :Intel Pentium (II) or higher

128 MB RAM

2 GB Hard Disk or more

SVGA Color Monitor

104 Keyboard

Any Mouse

Any modem

Client Side

Processor :Intel Pentium (II) or higher

128 MB RAM

2 GB Hard Disk or more

SVGA Color Monitor

104 Keyboard

Any Mouse

Any Modem

Page 13: Crime Records Management System

SYSTEM ANALYSIS

Page 14: Crime Records Management System

SYSTEM ANALYSIS

System Analysis works with users to identify goals and build systems to achieve

them. System analysis is an important phase of any system development process. The

system is studied to the minutest details and analyzed. The system analyst plays the

role of an interrogator and dwells deep in to the working of the present system. In

analysis, a detailed study of these operations performed by a system and their

relationships within and outside of the system is done. A key question considered here

is, “what must be done to solve the problem?” One aspect of analysis is defining the

boundaries of the system and determining whether or not the candidate system should

be considered. The system is viewed as a whole and the inputs to the system are

identified. The outputs from the system are traced through the various processing that

the input phases through in the organization. During analysis, data are collected on

available files, decision points, and transaction handled by present system. Once

analysis is completed the analyst has a firm understanding of what is to be done.

EXISTING SYSTEM

In the existing crime management system, most of the operations are done manually

like send complaints, taking actions against crimes, view status etc. So with the

existing system if anybody wants to complaint against crimes he must do it through

the police.

If we are doing the system manually, so many minor errors will occur. Error detection

in the previous entries made and data cross verification is another important function.

These are done manually, and it would take time.

Drawbacks of the existing system can be concluded as follows:

The existing system is time consuming and not very user friendly.

The FIR brought by a person hailing from a family beyond poverty, the existing

system shows ignorance for the same

Page 15: Crime Records Management System

The officer dealing with a particular case cannot take decision by himself even

when he is having the first hand knowledge/information about the case and he can ex-

pect obstructions from higher authorities/officials.

Even an efficient officer cannot/may not able to handle more than one case at a

time.

As we all know, a covered truth, Bribery plays an important role in the existing

system.

Many cases are pilled up in the corners, which are not proved, due to lack of com-

mitment in the job.

In most of the cases, the innocent are accused in the existing system.

As per our jurisdiction, “Let thousand criminals escape-not a single innocent be

punished “. As a result of this and other factors that influence investigation, such as

bribery, the innocent becomes accused in several situations in the eyes of Justice.

The existing system could provide only investigation and there is no Advocating,

Counseling facilities etc. hence no contact or control or co-ordination on these cell.

They criticized it for being inefficient, time consuming, poorly managed, disparate

and lacking flexibility.

Evaluation requires monitoring crime before, during and after the initiative.

Facts other than these initiatives may also impact on crime levels which makes

evaluation particularly difficult.

Because of the amount of serious crime, lesser crime goes unchecked. Many

crimes become regarded as antisocial activities.

Page 16: Crime Records Management System

PROPOSED SYSTEM

Our mission statement directs us to promote the public interest while balancing the

Law. Obviously we’ll not rush to judgment, but will look at the facts and render a

thoughtful decision based on these facts. Organization is an independent statutory

body which was created to maintain an effective an effective and efficient police

service for the public. Its primary task includes securing continuous needs of the

public in an efficient manner. As part of the responsibility, ‘our committee’ is

responsible for performance monitoring (performance planning and review formerly

professional standards and performance monitoring) decided to look at the

contribution and effectiveness of the organization within the public. We need the

whole hearted support of each and every individual member of the site and

cooperation of the users. The administrator, along with the investigators, lawyers,

counselors, and other authorities statutory partners in our organization. Given their

key role in these partnerships, we felt that an overview of strength and Weakness of

the organization is needed.

The aim of the project is to bring about improvement to the organization’s

contributions; this report necessarily concentrates on overcoming weakness and

raising standards. To avoid conducting and unfair evaluation efforts which are made

to put this contribution into this context. It believes that partnership work is highly

beneficial to the organization and that partnership work is the way forward to reduce

crime and disorder.

Advantages of the Proposed System:

The scrutiny was carried out through the collection of written and oral evidence.

Better communication, better leadership, better training, more defined roles

in terms of contribution to contribution to the society.

Working with partners.

Reducing crime and disorder.

Confidently and anonymity issues.

Page 17: Crime Records Management System

The proposed system has control over all its cells and is perfectly coordinated. Also

the cells can act individually. To take our organization to heights we need the

wholehearted co-operation of the public.

Objectives of the Proposed System

In the fast moving world, if people lack something, it is time. All are busy in their

world. It will be welcomed if services are provided at their will. So the main objective

of our product is better communication, better leadership, reducing crime and disorder

etc.

The product provides a framework within which a user can easily work with. That

was out next objective. We know users are of many categories, like users from who

know working with computers very well to users who didn’t know about computers.

So all the category can use the software. So it should be user friendly.

The product provides a framework, which is error free. We know a crime

management system is actually a critical process having many calculations and

operations. So each simple error laid to big problem. So it should be error free and our

objective is to build error free software.

Page 18: Crime Records Management System

FEASIBILITY STUDY

A feasibility study is a test of system proposal according to its workability,

impact on the organization, ability to meet user needs and effective use of resources.

Apart from these, an initial investigation is launched to study the present system,

evaluate the possible application of computer based of methods. Selecting a tentative

system, evaluate the cost and effectiveness of the proposed system, evaluate the impact

of the proposed system, existing personal and ascertain the need of new personal.

To define an improved information system, the study group must understand the

information requirements of the organization. This understanding may be obtained by

determining what is currently being done and of investigating through interviews and

analysis what information is needed to be provided that is not being furnished by the

existing system . Data on the cost of operating the current system needs to be collected

in order to make a cost benefit for a new system.

The objective of feasibility study is not to solve the problem, but to acquire a

sense of its scope. During the study, the problem definition is crystallized and aspects of

the problem to be included in the system are determined, consequently costs and

benefits are estimated with greater detail at this stage. The result of the feasibility study

is a system formal proposal. This is a simply a form of documenting or detailing the

nature and scope of proposed solutions. The proposal summarizes what is known and

what is going to be done. Three key considerations involved in the feasibility analysis:

Economic feasibility

Technical feasibility

Behavioral feasibility

Page 19: Crime Records Management System

ECONOMIC FEASIBILITY:

Economic analysis is the most frequently used method for comparing the cost

with the benefit or income that is expected from developed system.

In the existing system, many people are involved in the process but in the pro-

posed system, number of persons involved be reduced drastically. So the proposed sys-

tem is economic.

In the existing system, storage of all these records should be arranged and secu-

rity should be provided for the records. In the proposed system, separate security ar-

rangement is not needed since the software provides security and maintenance is simply

and hardly needs one or two person to operate the system.

TECHNICAL FEASIBILITY:

The feasibility center on the existing computer system (software, hardware) and

to what extend it can support the proposed addition.

In the proposed system, data can be easily stored and managed in database man-

agement system software.

The results for various queries can be generated easily.

Therefore, the system is technically feasible

BEHAVIORAL FEASIBILITY:

People are inherently resistant to change and computer has known to facilitate

change. An estimate should be made of how strong a reaction the user staff likely to

have towards the developments of computerized system.

In the existing system more manpower is required and time factor is more but in the

proposed system, manpower and time factors are reduced .So, the remaining

numbers are engaged with some other important works.

Page 20: Crime Records Management System

An SRS is basically an organization's understanding (in writing) of a customer

or potential client's system requirements and dependencies at a particular point in time

(usually) prior to any actual design or development work. It's a two-way insurance

policy that assures that both the client and the organization understand the other’s

requirements from that perspective at a given point in time.

Page 21: Crime Records Management System

TOOLS & PLATFORMS USED 

TOOLS & PLATFORMS

Operating System                         : Windows NT/2003 Server

Front End                                     : ASP.Net with VB

Back End                                      : SQL SERVER 2005

Features of software used

About Windows 2003

            Windows 2003 Server includes improved network, application and Web

services. It provides increased reliability and scalability, lowers your cost of computing

with powerful, flexible management services, and provides the best foundation for

running business application.

The Windows GUI

The familiar graphical user interface it presents to the world.

Computing Model

            Windows 2003 Server operations are based on a client-server computing model.

This is a model in which the computing workload is shared between the server and the

client. It is a co-operative relationship that divides the workload evenly between

machines or processes on a single machine.

Visual Studio .NET

            Visual Studio .Net is the rapid application development tool for BASIC. Visual

Studio .Net offers complete integration with ASP.NET and enables to drag and drop

server controls and design Web Forms as they should appear when user views them. 

Page 22: Crime Records Management System

The .NET Framework is a multi-language environment for building, deploying,

and running XML Web services and applications. It consists of four main parts:

Common Language Runtime:  Despite its name, the runtime actually has a

role in both a component's runtime and development time experiences. While

the component is running, the runtime is responsible for managing memory allo-

cation, starting up and stopping threads and processes, and enforcing security

policy, as well as satisfying any dependencies that the component might have on

other components. At development time, the runtime's role changes slightly; be-

cause it automates so much (for example, memory management), the runtime

makes the developer's experience very simple, especially when compared to

COM as it is today. In particular, features such as reflection dramatically reduce

the amount of code a developer must write in order to turn business logic into a

reusable component.

Unified programming classes: It is a completely new platform for

developing the next generation of windows /web applications. These

applications would transcend device boundaries and fully harness the power

of internet. However, this new platform required a language, which could

take its fully advantage; this is one of factors that led to the development of

VB. VB has evolved from QBASIC language. The VB compiler is

considered to be the most efficient compiler in the .net family and a major

part of the .net based classes libraries, itself are written in VB.

Some of the other advantages of creating BASIC applications in Visual

Studio .Net are:

Visual Studio .Net is a Rapid Application (RAD) tool. Instead of adding each

control to the Web Form programmatically, it helps to add these controls by us-

ing toolbox, saving programming efforts.

Visual Studio .Net supports custom and composite controls. Can create custom

controls that encapsulate a common functionality that might need to use in a

number of applications.

Page 23: Crime Records Management System

            Visual Studio .Net does a wonderful job of simplifying the creation and

consumption of Web Services. Mush of the programmer-friendly stuff (creating all the

XML-based documents) happens automatically, without much effort on the

programmer’s side. Attribute-based programming is a powerful concept that enables

Visual Studio .Net to automate a lot of programmer-unfriendly tasks. 

.NET programming languages: The .NET Framework provides a set of tools

that help to build code that works with the .NET Framework. Microsoft provides

a set of languages that are already .NET compatible. BASIC is one of those lan-

guages.

ASP.NET environment: Active Server Pages were released by Microsoft to en-

able the creation of dynamic pages based on user input and interaction with a

Web site. ASP.NET improves upon the original ASP by providing code-behind.

With ASP.NET and code-behind, the code and HTML can be separated. AS-

P.NET Web services are XML-based services that are exposed on the Internet

that can be accessed by other Web services and Web service clients.

ASP.NET

            ASP.NET is more than the next version of Active Server Pages (ASP); it is a

unified Web development platform that provides the services necessary for developers to

build enterprise-class Web applications. While ASP.NET is largely syntax compatible

with ASP, it also provides a new programming model and infrastructure for more secure,

scalable, and stable applications.

            ASP.NET is a compiled, .NET-based environment; you can author applications

in any .NET compatible language, including VisualBasic.NET, BASIC, and

JScript.NET. Additionally, the entire .NET Framework is available to

any ASP.NET application. Developers can easily access the benefits of these

technologies, which include the managed common language runtime environment, type

safety, inheritance, and so on.

            ASP.NET has been designed to work seamlessly with WYSIWYG HTML

editors and other programming tools, including Microsoft Visual Studio .NET. Not only

Page 24: Crime Records Management System

does this make Web development easier, but it also provides all the benefits that these

tools have to offer, including a GUI that developers can use to drop server controls onto

a Web page and fully integrated debugging support. Developers can choose from the

following two features when creating an ASP.NET application, Web Forms and Web

services, or combine these in any way they see fit.

Web Forms allows you to build powerful forms-based Web pages. When build-

ing these pages, you can use ASP.NET server controls to create common UI ele-

ments, and program them for common tasks. These controls allow you to

Rapidly build a Web Form out of reusable built-in or custom components, sim-

plifying the code of a page.

An XML Web service provides the means to access server functionality re-

motely.

ASP.NET   ARCHITECTURE  

.NET ARCHITECTURE

            As the illustration shows, all Web Administrators communicate

with ASP.NET applications through IIS. IIS deciphers and optionally authenticates the

request. If Anonymous is turned on, no authentication occurs. IIS also finds the

requested resource (such as an ASP.NET application), and, if the client is authorized

returns the appropriate resource.

Page 25: Crime Records Management System

             In addition to the built-in ASP.NET security features, an ASP.NET application

can use the low-level security features of the .NET Framework.

Features

Reliable Interoperability

            Employ code to call native Windows APIs, use pre-built COM components, and

leverage existing ActiveX controls to seamlessly integrate existing applications and

components.

Modern, Component-Oriented Language

            Take advantage of inherent support for properties, indexers, delegates, single

and multidimensional arrays, advanced inheritance, attributes, versioning, and XML

comments.

Powerful Debugging and Testing Tools

            ASP .NET includes a powerful remote and multi-language debugger, enabling

developers to test applications and build reliable multi-tier solutions that span process

boundaries and are written in multiple programming languages.

NET Framework Class Library

            Gain mature and powerful, built-in functionality, including a rich set of collec-

tion classes, networking support, multithreading support, string and regular expression

classes, and broad support for XML, XML schemas, XML namespaces, XSLT, XPath,

and SOAP.

Robust Web Development Environment

            Create Web-based solutions in VB using the shared Web Forms Designer and

XML Designer. Developers can also use IntelliSense features and tag completion or

choose the WYSIWYG editor for drag-and-drop authoring to build interactive Web ap-

plications.

Page 26: Crime Records Management System

Integrating with IIS

                             IIS is the web server is used here. IIS 5.0 or above is essential for

the ASP.NET for the environment. This release of ASP.NET uses IIS 5.0 as the pre

Kim host environment. When considering ASP.NET authentication, you should

understand the interaction with IIS authentication services.

            IIS always assumes that a set of credentials maps to a Windows NT account and

uses them to authenticate a user. There are three different kinds of authentication

available in IIS 5.0: BASIC, DIGEST, and INTEGRATED WINDOWS Authentication

(NTLM or Kerberos). You can select the type of authentication to use in the IIS

administrative services. If you request a URL containing an ASP.NET application, the

request and authentication information are handed off to the application..

Web Service

            Web service is arguably the most exciting and innovate features of Microsoft’s.

NET initiative and they are likely to profoundly affect the way business interact using

computer application. List of possible Web services is as varies as the list of possible

business opportunities. Web service would typically perform a core business service

such as user authentication, credit card validation, pricing a derivates security, placing a

purchase order for a stock or pricing a same-day shipment.

            A web service is a component that performs a function or service. A component

is a piece of software that has a well-defined interface, hidden internals, and the

capability of being discovered. By “discovered” means that you can determine what the

component does without needing to see the code within it. A component is similar to a

method since we can call it with arguments that fit a set of parameters, and it has the

capability of returning results.

            A web service may also return information to the caller. This service resides

somewhere on the Web and can be accessed from other locations on the Web. For this

service to be called, there are a number of elements that must be in place. First, the

caller must know how to call the service. Second, the call must be made across the

Web. Finally, the web service must know how to respond.

Page 27: Crime Records Management System

Introduction to VB. NET

Microsoft Visual BASIC. Net is the most creative tool, which helps a programmer to

create a user interface than writing several lines of code. The predecessor of Visual

BASIC.net was BASIC (Beginners All Purpose Symbolic Instruction Code). BASIC

was mainly interpreter-based whereas Visual BASIC. Net is that it is a rapid

Application Development tool. This is the main reason why Visual BASIC. Net is

widely used as a prototyping language.

VB. Net is object oriented, whereas each object possesses some properties like size,

position, color, appearance etc. This means that we can compartmentalize different

aspects of our application as object and develop test those object independently of

the rest of the application. By modifying certain properties and invoking the methods

of these objects, we exert a great deal of control over the user’s interaction with the

VB.net program we have written. Each object has its own event handling procedures.

Visual BASIC.net is a member of Visual Studio.

One of the merits of VB.Net is that it insulates the user from having to deal with low-

level message handling. This allows as to quickly creating powerful applications

without having dealing with unnecessary data. Microsoft has developed VB. NET as

a complete Windows applications development system.

Page 28: Crime Records Management System

Back end

About MS SQL Server 2005

SQL Server 2005 exceeds dependability requirements and provides

innovative capabilities that increase employee effectiveness, integrate heterogeneous IT

ecosystems, and maximize capital and operating budgets. SQL Server 2005 provides the

enterprise data management platform your organization needs to adapt quickly in a fast-

changing environment.

With the lowest implementation and maintenance costs in the industry, SQL

Server 2000 delivers rapid return on your data management investment. SQL Server 2005

supports the rapid development of enterprise-class business applications that can give your

company a critical competitive advantage. Benchmarked for scalability, speed, and

performance, SQL Server 2000 is a fully enterprise-class database product, providing core

support for Extensible Markup Language (XML) and Internet queries.

Easy-to-Use Business Intelligence

(BI) Tools Through rich data analysis and data mining capabilities that

integrate with familiar applications such as Microsoft Office, SQL Server 2005 enables you

to provide all of your employees with critical, timely business information tailored to their

specific information needs. Every copy of SQL Server 2005 ships with a suite of BI

services.

Self-Tuning and Management Capabilities

Revolutionary self-tuning and dynamic self-configuring features optimize

database performance, while management tools automate standard activities. Graphical

tools and wizards simplify setup, database design, and performance monitoring, allowing

database administrators to focus on meeting strategic business needs.

Page 29: Crime Records Management System

Data Management Applications and Services

Unlike its competitors, SQL Server 2005 provides a powerful and

comprehensive data management platform. Every software license includes extensive

management and development tools, a powerful extraction, transformation, and loading

(ETL) tool, business intelligence and analysis services, and new capabilities such as

Notification Services. The result is the best overall business value available.

SQL Server 2005 Enterprise Edition (64 bit)

Enterprise Edition (64-bit) provides the most scalable data platform to

take advantage of the class of Intel Itanium-based servers. Addressing more memory

than any other edition of SQL Server, it scales to the performance levels required to

support the largest Data warehousing and analysis applications, ecommerce websites

and Enterprise business systems. Supporting up to 8 nodes in failover clustering, SQL

Server 2005 (64-bit) provides a high level of reliability and availability for your

mission-critical applications.

SQL Server 2005 Enterprise Edition

Enterprise Edition includes the complete set of SQL Server data

management and analysis features and is uniquely characterized by several features that

make it the most scalable and available edition of SQL Server 2005. It scales to the

performance levels required to support the largest Web sites, Enterprise Online

Transaction Processing (OLTP) systems and Data Warehousing systems. Its support for

failover clustering also makes it ideal for any mission critical line-of-business

application. Additionally, this edition includes several advanced analysis features that

are not included in SQL Server 2005 Standard Edition. There are four main areas in

which the additional features of SQL Server 2005 Enterprise Edition are most evident:

Scalability Availability/uptime Performance Advanced analysis.

SQL Server 2005 Standard Edition

Page 30: Crime Records Management System

Standard edition is an affordable option for small and medium-sized

organizations. It includes the core functionality needed for non-mission-critical e-

commerce, data warehousing, and line-of-business solutions. For instance, all of the XML

features present in Enterprise Edition are also included in Standard Edition. And while a

handful of advanced OLAP features are reserved for Enterprise Edition, all data mining

features and the core OLAP functionality are included in SQL Server 2005 Analysis

Services in Standard Edition. Similarly, components that other database vendors charge

for as separate add-on products for their highest-end editions are included in Standard

Edition: Data Transformation Services (DTS) Replication (snapshot, transactional, and

merge) Full-Text Search English Query Stored procedure development and debugging tools

SQL Profiling and performance analysis tools.

SQL Server 2005 Replication Overview

SQL Server offers three types of replication:

1. Snapshot.

It copies an entire view of data to another computer. The destination database view is

overwritten with the new version. Snapshot replication distributes data exactly as it appears

at a specific moment in time and does not monitor for updates to the data. Snapshot

replication is best used as a method for replicating data that changes infrequently or where

the most up-to-date values, low latency, is not a requirement. When synchronization occurs,

the entire snapshot is generated and sent to Subscribers.

2. Transactional.

Transactions, INSERT, UPDATE, or DELETE statements, executed on one computer are

replicated to another computer. With transactional replication, an initial snapshot of data is

applied at subscribers, and then when data modifications are made at the Publisher, the

individual transactions are captured and propagated to Subscribers. Transactional

Page 31: Crime Records Management System

replication is helpful when: Incremental changes need to be propagated to subscribers as

they occur. Transactions need to adhere to the Atomic, Consistency, Isolation, and

Durability (ACID) properties. Subscribers are reliably and/or frequently connected to the

Publisher.

3. Merge.

Updates on any computer will be replicated to another computer at a later time. Merge

replication is the process of distributing data from Publisher to Subscribers, allowing both

the Publisher and Subscribers to make updates while connected or disconnected, and then

merging the updates between sites when connected. Merge replication allows various sites

to work autonomously. At a later time, merge updates produce single, uniform result. The

initial snapshot is applied to Subscribers, and then you have tracked changes to published

data at the Publisher and at the Subscribers.

The data is synchronized between servers continuously, at a scheduled time,

or on demand. Because updates are made at more than one server, the same data may have

been updated by the Publisher, or by more than one Subscriber. Thus, conflicts can occur

when updates are merged. Merge replication includes default and custom choices for

conflict resolution that the user can define while configuring a merge publication. When a

conflict occurs, a resolver is invoked by the Merge Agent and determines which data will

be accepted and propagated to other sites. Merge replication is helpful when:

Multiple Subscribers need to update data at various times and propagate

those changes to the Publisher and to other Subscribers. Subscribers need to receive data,

make changes offline, and later synchronize changes with the Publisher and other

Subscribers. Not many conflicts are expected when data is updated at multiple sites. This is

because the data is filtered into partitions and then published to different Subscribers, or due

to the uses of the application. However, if conflicts do occur, violations of ACID properties

are acceptable.

Page 32: Crime Records Management System

REQUIREMENT ANALYSIS

Page 33: Crime Records Management System

REQUIREMENT ANALYSIS

Requirement analysis task is a process of discovery, refinement, modeling and

specification. Both the developers and customers take an active role in requirement

analysis. Requirement analysis is a communication intensive activity. Requirement

analysis can be divided into:

Problem Recognition

Problem Evaluation & Synthesis

Problem Recognition

The goal of this step is recognition of basic problem elements as indicated by the

customer. The basic purpose of this activity is to obtain a thorough understanding of

the needs of the client and the user, what exactly is desired from the software and

what are the constraints on the solution.

Problems of the existing system:

Security can’t assured

Delay in storing and retrieving information

Possibility of human errors

Problem Evaluation & Synthesis

In this step analyst must define all externally observable objects, evaluate flow and

control of the information, define and elaborate all software functions, understand.

Software behavior and design constraints etc. Evaluation and synthesis continues until

both analyst and customer field confident about the product.

Once the problems are identified, evaluation process begins. After evaluation of the

current problem and desired in formations, the analyst synthesis one or more

solutions.

Security can be assured

Cost effective

Page 34: Crime Records Management System

No chance of errors

MODELING

During the evaluation and solution synthesis activity, the analyst creates models of the

system in an effort to better understand data and control flow. The model serves as

foundation for software design and as the basis for the creation of specification for the

software. For the better understanding of data and control flow we use Data Flow

Diagram.

Data Flow Diagrams

Data Flow Diagram is used to define the flow of the system and its resources such as

information’s. DFDs are a way of expressing systems requirements in graphical

manner. DFD represents one of the most ingenious tools used for structured analysis.

It has the purpose of clarifying system requirements and identifying major

transformations that will become programs in the system design. It is the major

starting point in the design phase that functionalities decompose the requirement

specification to the lowest level of detail.

DFD of “Crime Reporting System” is as shown in Appendix A.

Page 35: Crime Records Management System

SYSTEM DESIGN

Page 36: Crime Records Management System

SYSTEM DESIGN

The most creative and challenging phase of the system life cycle is system design.

The term design describes a final system and the process by which it is developed. It

refers to the technical specifications that will be applied in implementing the proposed

system. It also includes the construction of program and designing of output, input,

menu, code, database and process of the system.

System output may be report, document or a message. In on-line applications,

information is displayed on the screen. The layout sheet for displayed output is similar

to the layout chart used for designing output.

On-line data entry makes use of processor that accepts commands and data from the

operator through a keyboard or a device such as touch screen or voice input.

Designing the code depends on the programming language chosen and mostly they

are not specified while outlining the design of the system. The goal of coding is to

translate the design of the system in to code in a programming language. The aim of

the code design is to implement the system in best possible manner.

Database design is used to define and specify the structure of objects used in the

system. A wide array of design information must be developed during the database

design. A database is the collection of interrelated data stored with minimum

redundancy to serve many users quickly and efficiently. The general objective of data

base design is to make information access easy, quick, inexpensive, and flexible for

the user.

Databases of “Crime Reporting System” is as shown in Appendix B.

Page 37: Crime Records Management System

ARCHITECTURAL DESIGN

a) Program Structure

The product entitled “Crime Reporting System” follows bottom up program structure.

Description about bottom up approach:-

In a bottom-up approach the individual base elements of the system are first specified

in great detail. These elements are then linked together to form larger subsystems,

which then in turn are linked, sometimes in many levels, until a complete top-level

system is formed. This strategy often resembles a "seed" model, whereby the

beginnings are small, but eventually grow in complexity and completeness. However,

"organic strategies", may result in a tangle of elements and subsystems, developed in

isolation, and subject to local optimization as opposed to meeting a global purpose.

PROCEDURAL DESIGN

Procedural design occurs after data, architectural, and interface designs must be

translated in to operational software. The procedural design for each component,

represented in graphical, tabular or text based notation, is the primary work product

produced during component level design.

Begin

If ((User name is valid)) and corresponding password is correct) then

The user is an authorized person & can access the system

Else

Display invalid user

End If

End

Page 38: Crime Records Management System

INTERFACE DESIGN

External machine interface:- We need a high quality modem to connect to the

internet. NIC i.e. network interface card is also required to access the internet.TCP/IP

and http are the protocols used. If we want some hard copy of any receipts, we need a

printer for that.

External system interface:- Since Crime Reporting System requires a database and

is working as online, the client machines requires proper connection with the server

machine.

Human interface:- In project work entitled “Crime Reporting System” the user will

interacts with product through Graphical User Interface (GUI) which will be

developed in front pages. Since GUIs are the interface, workings with GUIs are very

simple and not at all complicated. So any user who had no knowledge about softwares

and computers can use this “Crime Reporting System” very simply.

The input and output forms of “Crime Reporting System” are provided in Appendix

C.

Page 39: Crime Records Management System

CODING

Page 40: Crime Records Management System

CODING

Coding in “Crime Reporting System” was done with ASP as front end and SQL

Server as back end. A professional coding standard and style is followed to ensure the

internationalization of the software code. Different naming conventions are used for

the easy evaluation of code for future tome. This makes the code for reuse and easy

debugging for a third person. It also enhance to the international style of coding.

Page 41: Crime Records Management System

SYSTEM TESTING

Page 42: Crime Records Management System

SYSTEM TESTING

System testing is a critical aspect of Software Quality Assurance and represents the

ultimate review of specification, design and coding. Testing is a process of executing

a program with the intent of finding an error. A good test is one that has a probability

of finding an as yet undiscovered error. The purpose of testing is to identify and

correct bugs in the developed system. Nothing is complete without testing. Testing is

the vital to the success of the system.

In the code testing the logic of the developed system is tested. For this every module

of the program is executed to find an error. To perform specification test, the

examination of the specifications stating what the program should do and how it

should perform under various conditions.

Unit testing focuses first on the modules in the proposed system to locate errors. This

enables to detect errors in the coding and logic that are contained within that module

alone. Those resulting from the interaction between modules are initially avoided. In

unit testing step each module has to be checked separately.

System testing does not test the software as a whole, but rather than integration of

each module in the system. The primary concern is the compatibility of individual

modules. One has to find areas where modules have been designed with different

specifications of data lengths, type and data element name.

Testing and validation are the most important steps after the implementation of the

developed system. The system testing is performed to ensure that there are no errors

in the implemented system. The software must be executed several times in order to

find out the errors in the different modules of the system.

Validation refers to the process of using the new software for the developed system in

a live environment i.e., new software inside the organization, in order to find out the

Page 43: Crime Records Management System

errors. The validation phase reveals the failures and the bugs in the developed system.

It will be come to know about the practical difficulties the system faces when

operated in the true environment. By testing the code of the implemented software,

the logic of the program can be examined. A specification test is conducted to check

whether the specifications stating the program are performing under various

conditions. Apart from these tests, there are some special tests conducted which are

given below:

1. Peak Load Tests: This determines whether the new system will handle the vol-

ume of activities when the system is at the peak of its processing demand. The

test has revealed that the new software for the agency is capable of handling the

demands at the peak time.

2. Storage Testing: This determines the capacity of the new system to store trans-

action data on a disk or on other files. The proposed software has the required

storage space available, because of the use of a number of hard disks.

3. Performance Time Testing: This test determines the length of the time used by

the system to process transaction data.

The testing steps performed in “Crime Reporting System” are given below:

Unit testing

Integration testing

Validation testing

Unit testing

In unit testing different modules are tested against the specifications produced during

the design of the modules. Unit testing is essential for the verification of the code

produced during the coding phase, and hence the goal is to test the internal logic of

the modules.

Page 44: Crime Records Management System

The testing is carried out during the programming itself. After designing and coding

each form they are run to see whether there are any anomalies. Some of the various

test cases used to test the system are as follows:

Test cases are given for testing against requirements of the unit being tested.

Test case for path or branch covering.

Test case for data flow coverage.

Testing with classes of bad data

In unit testing the program unit that make up the system are tested individually. Unit

testing focuses first on the modules, independent of one another to locate errors. Here

in “Crime Reporting System” unit testing contains testing like user registration test,

login test, user updating test, agent registration test, policy registration test, customer

request test, premium calculation test etc. This enables to detect in coding and the

logic with in the module alone. This testing is also used to ensure the integrity of data

stored temporarily.

Integration testing

Integration testing is systematic technique for constructing the program structure,

while at the same time conducting test to uncover errors associated with interfacing.

That is the program is constructed and tested in small segments, which makes it easier

to isolate and correct.

Invalid modules are invariably related to one another and interact in a total system.

Each portion of the system is tested against the entire module with both testing and

live data before the entire system is ready to be implemented. When the individual

modules were found works satisfactory, the system integration test was carried out.

Data was collected in such a way that all program paths could be covered. Using these

data a complete test was made. All outputs were generated. Different users were

allowed to work on the system to check its performance.

So here in “Crime Reporting System” integration testing contains administrative

module, customer module and login with administrative and customer module.

Page 45: Crime Records Management System

Validation testing

At the culmination of the integration testing, the software was completely assembled

as package, interfacing errors have been uncovered and a final series of software

validation testing began. Here we test the system functions in manner that can be

reasonably expected by customer, the system was tested against system requirement

specification. Different unusual inputs that the users may use were assumed and the

outputs were verified for such unprecedented inputs. Deviation or errors discovered at

this step are corrected prior to the completion of this project with the help of user by

negotiating to establish a method for resolving deficiencies. Thus the proposed system

under consideration has been tested by using validation testing and found to be

working satisfactorily.

TEST RESULTS 

                           The primary goal of software implementation is the production of

source code that is easy to read and understand.  Clarification of source code helps in

easier debugging, testing and modification.  Source code clarification is enhanced by

structural coding techniques, by good coding style, by appropriate supporting docu-

ments, by good internal comments and by the features provided in the modern program-

ming language.

                  In our implementation phase, source code contains both global and formal

variables. It contains predefined functions as well as the user defined functions.  The re-

sult of the new system is compared with the old system and supposes the result is wrong

the error must be debugged.               

                         After the acceptance of the system by the user, the existing system must

be replaced by this new system. Any user can work in this package very easily.  It does

not require any intensive training for the user.  Procedures and functions in the system

are very simple that any one can understand and correspondingly act to the system with

no difficulty.

Page 46: Crime Records Management System

Test Cases 

User Authentication:

Functions Tested Expected Result Test Result

User should enter both User Name and password

When the user enters only one or none login screen will displayed with error message

As expected

Logout when user wants to discontinue login section

Displaying the user logout successfully As expected

 

Integer Field Check:

                            Checking whether a particular text field, which is supposed to receive

only integers, is receiving any other characters. 

Input Value Expected Result Result

123 Display Pass

Dqwe Doesn’t Display Pass

$#*>.) Doesn’t Display Pass

  

Field Checking: 

Function Tested Expected Result    Test Result

Name       The name of the user is entered here. It can contain only characters and blank space

      Test Successful

Mobile-Phone, Zip code, Date of Birth

      This should only contain numbers.       Test successful

 

Page 47: Crime Records Management System

IMPLEMETATION

Page 48: Crime Records Management System

IMPLEMENTATION

The next stage after testing is implementation. Generally implementation is referred to

conversion of a new system design to an operational one. It also deals with the training

of operators. An implementation plan is to be made before starting the actual

implementation of the system. Implementation is the stage where the theoretical design

is converted into a working system. The newly proposed system is implemented after

the successful testing of the system.

Implementation Methods

The term implementation has different meanings, ranging from the conversion of a

basic application to a complete replacement of a computer system. The procedure,

however, is virtually the same. Implementation is used here to mean the process for

converting a new or revised system into an operational one. Conversion is one aspect

of implementation. The other aspects are the post implementation review and software

maintenance.

There are three types of implementation:

Implementation of a computer system to replace a manual system.

Implementation of a new computer system to replace an existing one.

Implementation of a modified application to replace an existing one.

Conversion means changing from one system to another. That is data in the old

format is run through a program, or a series of programs, to convert it into the new

format. Conversion can also be from one hardware medium to another. The objective

is to put the tested system into operation while holding costs, risk and personnel

irritation to a minimum. It involves :-

Creating computer compatible files.

Training the operating staff.

Installing terminals and hardware.

Page 49: Crime Records Management System

A problem for management is discovering, at integration time, that pieces of modules

simply do not fit together. Such problem will arise when charge is made to only one

copy of the design document. When integration is completed, the product as whole is

tested, this is termed product testing. When the developers are confident about the

correction of every aspect of product, it is handled over to the client for acceptance

testing.

Implementation Plan

The implementation plan includes a description of all the activities that must occur to

implement the new system and to put it into operation. It identifies the personnel

responsible for the activities and prepares a time chart for implementing the system.

The implementation plan consists of the following steps.

List all files required for implementation.

Identify all data required to build new files during the implementation.

List all new documents and procedures that go into the new system.

The implementation plan should anticipate possible problems and must be able to deal

with them. The usual problems may be missing documents; mixed data formats

between current and files, errors in data translation, missing data etc.

Page 50: Crime Records Management System

SOFTWARE MAINTENANCE

Page 51: Crime Records Management System

SOFTWARE MAINTENANCE

Security

Any system developed should be secured and protected against possible

hazards. Security measures are provided to prevent unauthorized access of the database

at various levels. An uninterrupted power supply should be so that the power failure or

voltage fluctuations will not erase the data in the files.

Threats to System’s Security

The lists of potential threats are :

Disgruntled and dishonest users

Fire

Errors and omissions

Natural disasters

External attacks

System Security Measurements

Identification

It is scheme for identifying persons to the system based on ‘something

you know’ such as password. In the Smart College system, the student, staff, and the

librarian are given passwords for identification purpose during registration process.

Access Control

Controlling access to computer databases is essential. In the Smart

College system only the administrator has given the access to the tables.

Page 52: Crime Records Management System

Audit Control

Auditing must be supported at all levels of management. Audit controls

protect system from external security breaches and internal fraud or embezzle men.

Various software programs are available to help in the audit function.

System Integrity

This line of defense safeguards the functioning of the hardware,

software, physical security and operating procedures. Proper backup of hardware and

software are extremely important. Password protection and simple procedures to

change the unauthorized access are provided to the users. The system allows the user

to enter the system only through login.

Page 53: Crime Records Management System

We may define Software Maintenance by describing for activities that are undertaken

after a program is released for use.

1. Corrective Maintenance

The first maintenance activity occurs since it is unreasonable to assume that software

testing will uncover all errors in a large software system.

2. Adaptive Maintenance

This activity that contributes to the definition of maintenance occurs since rapid

change is encountered in every aspect if computing.

3. Perceptive Maintenance

This activity involves recommendation for new capability modifications to the

existing functions and general enhancements when software is used.

4. Preventive Maintenance

This activity occurs when software is changed to improve further maintainability and

reliability.

Page 54: Crime Records Management System

FUTURE ENHANCEMENT

Anything cannot be ended in a single step. It is the fact that nothing permanent

in this world. So this utility also has some future enhancements in the evergreen and

booming IT industry. Change is inevitable. The project entitled “Crime Reporting

System” was successfully designed developed and tested. The system and the

architecture is a compatible one, so addition of new modules can be done without

much difficulty. Since this module has its unique properties it can extend further to

make this system a complete one.

Scope of further development

The various Future Enhancement which shall include in this software are:

We look forward to working with the Government in implementing the recom-

mendations and seeing an improvement in the effectiveness of the organization

The method of video conferencing can be added to make the project more lively

An intercom facility will add a little more flexible communication between the

Master and Branch In Charge, Master and Members, etc.

Not withstanding this drive and progress, the Panel believes that more fundamental

changes are needed. It hopes that the recommendation made in this report will assist

in changing the culture around partnership.

Page 55: Crime Records Management System

CONCLUSION

Page 56: Crime Records Management System

CONCLUSION

The Software developed is found to be working efficiently and effectively. It results in

regular and timely action against crime reported. It can be observed that the information

can be obtained easily and accurately.

The Software is made user friendly to the maximum so that any lay man can run the

software provided he could access to the system via the login password.

It believes that partnership work is highly beneficial to the organization and that

partnership work is the way forward to reduce crime and disorder

Hence, we wish to remind that its culture should fully endorse partnership work; we

urge to ensure the attention they require.

Page 57: Crime Records Management System

login

station

crimedescription

assignstation

Appendix A (DATA FLOW DIAGRAMS)

Level 0 DFD

login request crimereport

details response

Level 1.0 DFD (admin)

request details

details

request

details

details

Crime Automation &

Reporting System user

s

complaints

admin

registration

station

processes

login

passwuserna

Page 58: Crime Records Management System

login

crimedescription

Level 1.1 DFD (citizen)

request details

details

citizen

registration

complaints

login

passwuserna

Page 59: Crime Records Management System

login

fir

criminaldetails

newteamregister

witness

victim

teammember

crimeclose

crimedescription

advocate

crimedescription

Level 1.2 DFD (station)

request details

details

request

details

station

registration

crime

processes

login

passwuserna

close

crime

Page 60: Crime Records Management System

station

crimedescription

assignstation

Level 2.0 DFD (admin)

request details

complaints

response

details

crimeid

admin station

approval

view

complaints

assign

station

Page 61: Crime Records Management System

crimedescription

crimeclose

Level 2.1 DFD (citizen)

request details

details

response

crimeid

citizen send

complaints

view

accepted

complaints

crime

status

Page 62: Crime Records Management System

Level 2.2. 0 DFD (station)

Page 63: Crime Records Management System

crimedescription

criminaldetails

advocate

crimedescription

assignstation

Level 2.2. 1 DFD (station)

request details

criid

response details

crimeid

station view

complaints

avocation

processes

close

crime

Page 64: Crime Records Management System