Crime Reporting Report File2007

60
8/7/2019 Crime Reporting Report File2007 http://slidepdf.com/reader/full/crime-reporting-report-file2007 1/60 A Project Report On “CRIME REPORTING” GUIDED BY:- Miss. Dipika Patel PREPARED BY:- Sagar Prajapati : 086080307541 Atiq Mohammad : 086080307545 Patel Vijay : 086080307539 SEMESTER 6 th  

Transcript of Crime Reporting Report File2007

Page 1: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 1/60

AProject Report On

“CRIME REPORTING”

GUIDED BY:-

Miss. Dipika Patel

PREPARED BY:-

Sagar Prajapati : 086080307541Atiq Mohammad : 086080307545

Patel Vijay : 086080307539

SEMESTER 6th

 

Page 2: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 2/60

BHAGVWAN MAHAVER POLYTECHNIC

SURAT

CERTIFICATE

This is to certify that Prajapati Sagar, Mo.Atiq,

Patel Vijay

havingExam.No.086080307541,086080307545,08

6080307539 student of Diploma in Computer

Engineering of Semester 6th has satisfactorily

completed his/her Project Crime Reporting the

practical fulfillment for the award of diploma in

Computer Engineering. Under my guidance

during April-May 2011.

Signature of GuideSignature of H.O.D.

(Mrs.Dipika Patel)(Mrs.Dipika Patel)

PrincipalSignature of 

Page 3: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 3/60

(Mr. Amit C. Thakor)Examiner 

ACKNOWLEDGEMENT

We are very grateful to our Principal Mr. Amit C.

Thakor (M.E. (Mech.) LL.B.) for providing us with an

environment to complete our project successfully.

We would like to thank Mrs. Dipika Patel

(B.E.Comp.) for her unwavering support during the entire

course of this project work.

We are deeply indebted to our Head of the Department

Mrs. Dipika Patel, who modeled us both technically and

morally for achieving greater success in life.

We are very grateful to our project guide Mrs. Dipika

Patel, for being instrumental in the completion of our

project with his complete guidance.

Finally, we take this opportunity to extend our deep

appreciation to our family and friends, for all that they

meant to us during the crucial times of the completion of ourproject.

Thanking

you,

Page 4: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 4/60

 

Prepared by:

   Mo.Atiq 086080307545

 Prajapati Sagar 086080307541

  Patel Vijay 086080387539

ABSTRACT

  This website enables users to file a crime report ornarrate a witnessed crime online.

In order to report a crime user has to sign up first.He/she should have an account using which he has to log into the website and report the crime.

Only users authenticated by admin will be able to log inand access the services provided by this portal.

 The admin authenticates user and provides gives permission

to various modules of the portal.Users can report crimes like: Theft, Murder, Criminal

damage, Theft from a motor vehicle, Criminal damage to amotor vehicle, Hate crimes and hate incidents, Physicalabuse, etc.Once the report is submitted, it is forwarded to the nearestpolice station covering the location of the crime and aunique reference number is assigned to the user. Also, thewebsite provides emergency phone numbers and locations

of nearest police stations to a selected location. The websitecan even track the IP address of the sender to preventforgery.

 The list of various crimes reported at a particular dateor within certain time duration can be viewed in a reportformat. Also the details of the user who has submitted aparticular crime report can be viewed.

Page 5: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 5/60

 Thus the website saves a lot of time and formalities and alsoprovides safety for witness as he/she can submit report as“Anonymous”.

Index

Page.No

1. Introduction………………………………

2. Profile of Organization…………………..

3. System Analysis

3.1 Current Study………

3.2 Proposed System……

4. System Design………………………………

5. Screen-Short………………………….

6. Testing and Implementation……………….

7. Conclusion…………………………………..

8. References……………………………………

Page 6: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 6/60

9. Appendices……………………………………

 

Introduction

What is Crime Reporting?

Crime reporting is the first of the nine basic Youth Crime

Watch components. Most simply, it's giving the proper 

authorities information you have about:

1. A crime that might be committed

2. A crime that has been committed

3. Someone who was involved in committing a crime

4. Young people understand the importance of reporting crime.

They want safer schools and neighborhoods, and if theyknow how to report effectively, they'll do it. Young people

can help encourage peers to report crime in the making as

well as information on crimes under investigation

• Purpose of Crime Reporting

We have developed the portal of “WEBSITE ON CRIMEREPORTING”, the portal can handle data of criminals who are

under the judicial surveillance or are under trial. This portal will be

most useful for DEFENCE for searching of details of criminals,

any one can report a FIR online, missing citizen search, secure

registration and profile management facilities for detectives and

Page 7: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 7/60

security agencies, Facilitate communication between all stack 

holders.

• Need of Crime Reporting :

1. It was a progress to make India free from crime.2. In this user can easily make fir against the person from whom

he/she is being suffered.

3. In this user can not only make fir but can get his updated

report of his FIR 

4. By this Police can easily catch the criminal or in other words

a criminal can be easily catches doesn’t matter how far 

he/she is

 • Functionality Of Crime Reporting:

1. Crime reporting forms, progress tracking, proof attachments.

2. On form submission an e mail goes to regional police officer 

in case.

3. if it’s serious category crime where quick attention is

required.

4. Facilitate crime and criminals search – region, crime-type,gender.

5. Age group wise etc.

6. Missing citizen or valuables reporting and search.

Page 8: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 8/60

7. Secure registration and profile management facilities for 

detectives.

8. And security agencies.

9. Facilitate communication between all stakeholders – 

Discussion.

• Scope of Crime Reporting

This Website provides an architectural overview of the

CRIME MANAGEMENT. This Website is a generic, web-based

tool that enables users to manage the Crime on tasks completed as

  part of projects with tasks and sub-tasks. The tool includes

interactivity Functionality. Information will be stored in a

database. Administrative and managerial functions will be provided including configuring projects/tasks/subtasks, an

• Benefits of Crime Reporting:

In order to quantify the benefits of your crime reporting

  portal, you first have to know what to look for. CRIME

REPORTING can help you in different ways. Here are some of the

areas to look for benefits in implementing a portal:

Paper Reduction

“CRIME REPORTING” can reduce the cost associated with

creating and distributing paper requirements and resumes. Cost

savings result from:

Page 9: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 9/60

Direct savings from reduced paper, printing, and distribution costs

Indirect savings from time spent handling paper documents

Paperwork Transfer 

A big expense with a manually maintaining records and

requirement system is that of transferring of records from one person to another. For example, the file works is no not been done

  by hands but is done online. Reducing the communication

expenses

Improved Data Quality

Manual records must be then entered into a computer inorder to be processed for further process or may be maintained into

database for future requirement. Whenever data is keyed into a

computer from a hand-written document, errors will be made.

These errors can cost you in many direct and indirect ways:

Incorrect selection may take place. When wrong justification is

done due to manual errors and adjustment is costly for system.

Without accurate information, you lose the ability to perform

useful decision support. You should have accurate information

about the background of the case as well as the crime, departmentsworked in, areas the organization is working in etc. for your 

decision support.

Page 10: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 10/60

System Analysis

System/Requirement analysis phase is considered to be one

of the most important phases in the system development life cycle.

It is immensely important that the software developer make

thorough study of the existing system. It refers into the process of 

examining a situation with the intent of improving it through better 

 procedures and methods.

System Analysis is the process of planning a new System toeither replace or complement an existing system. But before any

 planning is done, the old system must be thoroughly understood

and the requirements must be determined. System Analysis, is

therefore, the process of gathering and interpreting facts,

diagnosing problems and using the information to make

improvements in the System. It is basically detailed explanation or 

description.

Before automating a system under consideration, it has to be analyzed. We need to study how it functions currently, what are

the problems, and what are the requirements that the proposed

system should meet. The study will enable the developer to know

the intricacies of the existing system.

Page 11: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 11/60

System Analysis is conducted with the following objectives in

mind:

o Identify the public need.

o Evaluate the system concept for feasibility.o Perform economic and technical analysis.

o Allocate functions to hardware, software people, database

and other system elements.

Requirement analysis is done in order to understand the

 problem, which the software system is to solve e.g., the problem,

could be automating the existing manual system or developing a

completely new automated system or a combination of the two.

For every system understanding the requirement of the system is a

major task. The emphasis in requirement analysis is on identifying

what is needed from the system, and not how the system achieves

its goal.

The main objective behind any business organization is to

maximize its profit besides maintaining quality and strategicnorms. This can be achieved by improving the efficiency of the

system by providing more facilities using automation, by adopting

faster data access, and proper communication.

Page 12: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 12/60

FEASIBILTY STUDY 

A feasibility study is carried out to select the best system

that meets performance requirements. Feasibility is the

determination of whether or not a project is worth doing. The

  process followed in making this determination is called a

feasibility study. This type of study determines if a project can and

should be taken.

Since the feasibility study may lead to the commitment of large resources, it becomes necessary that it should be conducted

competently and that no fundamental errors of judgment are made.

Depending on the results of the initial investigation, the

survey is expanded to a more detailed feasibility study.

Feasibility study is a test of system proposal according to its

workability, impact on the organization, ability to meet user 

needs, and effective use of resources.

The objective of the feasibility study is not to solve the

 problem but to acquire a sense of its scope. During the study, the

  problem definition is crystallized and aspects of the problem to

 be included in the system are determined.

Page 13: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 13/60

All projects are feasible given unlimited resources and

infinite time. Unfortunately the development of computer-based

system in many cases is more likely to be plagued by scarcity of 

resources and delivery date. Hence, we have made use the concept

of reusability that is what Object Oriented Programming (OOPS) isall about.

Consequently, costs and benefits are described with greater 

accuracy at this stage.

FOUR KEY CONSIDERATIONS ARE INVOLVED IN THE

FEASIBILITY ANALYSIS. THESE ARE:

• TECHNICAL FEASIBILITY

• ECONOMIC FEASIBILITY

• BEHAVIOURAL FEASIBILITY

• OPERATIONAL FEASIBILITY

• TECHNICAL FEASIBILITY:-

Technical Feasibility centers on the existing computer system

(hardware/ software) and also it can support the modification. In

manual processing there are more chances of errors, creating lot of 

complications, less technical or logical. Through proposed systemwe can set this process in a very systematic pattern, which is more

technical, full proof, authentic, safe and reliable.

For example, if the current computer is operating at 80

  percent capacity - an arbitrary ceiling - then running another 

Page 14: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 14/60

application could overload the system or require additional

Hardware. This involves financial considerations to accommodate

technical enhancements. If the budget is a serious constraint, then

the project judged is not feasible. In this project, all the necessary

cautions have been taken care to make it technically feasible.Using a key the display of text/object is very fast. Also, the tools,

operating system and programming language used in this

localization process is compatible with the existing one.

ECONOMIC FEASIBILITY: -

Economic analysis is the most frequently used method for 

evaluating the effectiveness of the candidate system. More

commonly known as cost/benefit analysis, the procedure is to be

determining the benefits and savings that are expected from a

candidate and compare them with costs. If benefits outweigh costs,

then the decision is made to design and implement the system.

A systems financial benefit must exceed the cost of 

developing that system. i.e. a new system being developed should

 be a good investment for the organization. Economic feasibility

considers the following:

o The cost to conduct a full system investigation.

o The cost of hardware and software for the class of 

application.

o The benefits in the form of reduced cost or fewer costly

errors.

o The cost if nothing changes (i.e. the proposed system is not

developed).

• BEHAVIOURAL FEASIBILITY :-

Page 15: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 15/60

People are inherently resistant to change, and computers have

 been known to facilitate change. An estimate should be made of 

how strong a reaction the user staff is likely to have toward the

development of a computerized system. Therefore it is

understandable that the introduction of a candidate system requiresspecial efforts to educate and train the staff. The software that is

 being developed is user friendly and easy to learn. In this way, the

developed software is truly efficient and can work on any

circumstances, tradition, locales.

Behavioral study strives on ensuring that the equilibrium of 

the organization and status quo in the organization neither are nor 

disturbed and changes are readily accepted by the users.

Our proposed system works to minimize the human errors,

take less time, easy interaction with user, bug free. This

  project/software is further expanded by connecting various

interrelated departments and by installing an extension part of this

software.

o System level goals and requirements.

o Cost estimation for development process and work  product.

o Solution strategy development.

o Outlines of the several solutions strategies.

o Recommendation of solutions strategy.

o Feasibility and study of each strategy.

o List of priorities for management.

• OPERATIONAL FEASIBILITY :-

Operational feasibility is mainly related to the human

organizational & political aspects. This feasibility study answers

questions like: Will the system be used if it is developed and

Page 16: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 16/60

implemented? Will there be resistance from users that will

undermine the possible application benefits?

To get the answer of these questions, many methods are used like

interviews, questionnaire, records checking and observation. Oneor two persons who are familiar with information system

techniques, who understands the business and who are skilled in

system analysis and design, generally carry out this feasibility

study.

The essential questions that help in testing the operational

feasibility of a system as follows:

o What changes will be made in the system?o What organizational structures are?

o What new skills will be required? Do the existing staff 

members have these skills? If not, can they be trained

in due course of time?

o Operational feasibility study is carried out by a small group

of people who are familiar with information system

technique who understand the parts of the business that are

relevant to the project and are skilled in system analysis anddesign process?

The feasibility study is carried out by a small group of people who

are familiar with information system techniques, understand the

 part of business or organization that will be involved or affected by

a project, and are skilled in the system analysis & design process.

Page 17: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 17/60

  GANTT CHART

Gantt chart is a project scheduling technique. Progress can be

represented easily in a Gantt chart, by coloring each milestonewhen completed. The project will start in the month of January and

end after 4 months at the end of April.

A Gantt chart is a graphical representation of the duration of 

tasks against the progression of time. It is a useful tool for planning

and scheduling projects. A Gantt chart is helpful when monitoring

a project's progress. A Gantt chart lays out the order in which the

tasks need to be carried out.

A Gantt chart is a type of bar chart that illustrates a project

schedule. Gantt charts illustrate the start and finish dates of the

terminal elements and summary elements of a project. Terminal

elements and summary elements comprise the work breakdown

structure of the project. Gantt charts also show the dependency

relationships between activities. Gantt charts can be used to show

current schedule status.

The Gantt chart is constructed with a horizontal axis

representing the total time span of the project, broken down into

increments (days, weeks, or months).

Page 18: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 18/60

The Gantt chart is constructed with a vertical axis representing the

tasks that make up the project.

System Design

Detailed Design

 Coding

  Unit Testing

 

Test Plan

Testing

Working February March April May

 

Month

Page 19: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 19/60

  DATA FLOW DIAGRAM:

A data flow diagram (DFD) is a graphical representation of 

the flow of data through an information system. A data flow

diagram can also be used for the visualization of data processing

(structured design). A data flow diagram could be a context level

diagram (LEVEL 0), LEVEL 1, LEVEL 2.

• CONTEXT LEVEL DIAGRAM (LEVEL 0)

This level shows the overall context of the system and its

operating environment and shows the whole system as just one process.

• LEVEL 1

This level (level 1) shows all processes at the first level of 

numbering, data stores, external entities and the data flows

 between them. The purpose of this level is to show the major high

level processes of the system and their interrelation

• LEVEL 2

This level is a decomposition of a process shown in a level 1

diagram, as such there should be a level 2 diagram for each and

every process shown in a level 1 diagram.

Page 20: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 20/60

Crime

Reporting

0

User 

Incharge

Admin

Crime DB

Page 21: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 21/60

[Content Diagram]

Level 0

Admin

ViewReports

1

Manage Area master 

2

Manage

incharg details

3

Report

DB

Area DB

Incharg

DB

Po_stationDB

Manage Police

Station Details

4

Page 22: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 22/60

[Admin Side]

Level 1

Incharge

Assign Report

1

Manageinformation

2

Report

DB

Page 23: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 23/60

[Incharge Side]Level 1

User 

FIR Report

1

Search

Police Station

2

Report

DB

Po_station

DB

Page 24: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 24/60

 [User Side]

Level 1

Admin

Insert Area

Details

2.1

Update/Del/search

Area Details

2.2

Area DB

Page 25: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 25/60

[Manage Area Detail]

Level 2

Admin

Insert New

Incharge Details

3.1

 

Update/Del/search

Incharge Details

3.2

Incharge

DB

Page 26: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 26/60

[Manage Incharge Detail]

Level 2

Admin

Add New Police

Station Details

4.1

Update/Del/search

Police Station

4.2

Po_Station

DB

Page 27: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 27/60

[Manage Police Station Detail]

Level 2

Incharge

Insert

Information6.1

Update/Del

Information6.2

Report

DB

Page 28: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 28/60

[Manage Information in Report]

Level 2Database Diagrams

Page 29: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 29/60

Page 30: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 30/60

DATA DICTIONARY 

The data dictionary is the repository of all the meta-data relevant to

the objects stored in the database—and also of information

concerning the DBMS itself.

DICTIONARY CONTENT

DEFINING METADETA

The term metadata is often defined as data about data. That is, data

that provides information about the tables, views, constraints,

stored procedures, etc. stored within the database. If we take a

table as an example, the dictionary will store information such as:

• its name

• when it was created and when it was last accessed

• the names and data types of its attributes (i.e. structural

information)

• its owner, who may read and write to it (i.e. security

information)

Page 31: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 31/60

• where the data is stored (i.e. physical information)

CURRENT STUDY 

Project:

Project normally has many project activities associated with it, many

employees involved and the employee can play several roles within a project

(employee role in project).

 Name:

Crime Reporting

Employee:

Miss Dipika Patel

 Role :

Working on Administrator module

Module Activity:

I have assigned 3 types of authorized users.

Administrator 

Authorized UsersGeneral User (Others)

• Administrator-:

Administrators have all authority of inserting, deleting, and

updating from database on the bases of proofing by the users. After 

2 days admin will send user-id & password on the prescribed e-

mail id. Admin can get any feedback from the user end by the

contact form.

• Authorized User:

Authorized users are of 4 types.

1. Press Reporter 

2. Detective

3. Lawyer 

Page 32: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 32/60

4. Police

Everyone can register by the proof id & will get the registered no

& the user-id will be send by the Admin to the e-mail id.

• General User:This type of user performs can following task.

Firing FIR 

Missing FIR 

& see the list of following links:

Laws

Awards winner’s people

Lost Vehicles

About Indian PoliceTips for safety

Internet Crime Prevention Tips

Help Line

FAQ’s

Declaimer 

  Normal user can see the information magazine also and the

whole information about the website…

/estimateThe estimated time required for Employee to accomplish the task.

(15-20 days)

Page 33: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 33/60

PROPOSED SYSTEM

This section describes the proposed crime reporting system

for the

Region. This system was developed based on previous planning

efforts

And direct input from the public and interested agencies and

groups. The

Proposed system does include all TRPA EnvironmentalImprovement

Program (EIP) projects. However, not all of the

 proposed projects are EIP projects. Key criteria used in developing

and

Prioritizing the proposed system is listed below.

• Public Input - Consider and respond to public information in

the Crime Reporting planning process.

• Use - Crime reporting facilities contained in the proposed

System should reflect use levels that are commensurate with

the Level of investment required for construction and

maintenance.

• Coverage - The system should provide balanced access from

all portions of the region’s population centers for both

commuting and recreation routes.

• Safety - The system should provide the highest level of 

safety Possible while eliminating major safety concerns such

as narrow Roadways.

Page 34: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 34/60

• Connectivity - The system should provide connections to

major Activity centers, multi-modal transfer locations, and toroutes that Provide access to neighboring counties. Activity

centers include Residential neighborhoods, schools, regional

  parks, shopping Centers, employment centers, government

centers, transit centers, And other recreational opportunities.

Major gaps and barriers, Including narrow bridges and

roadways, should be targeted as High priority items.

Page 35: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 35/60

System Design

The design phase decides how the system will operate, in

terms of the hardware, software, and network infrastructure; the

user interface, forms, and reports that will be used; and the specific

 programs, databases, and files that will be needed. Although most

of the strategic decisions about the system were made in the

development of the system concept during the analysis phase, thesteps in the design phase determine exactly how the system will

operate. The design phase has four steps:

1. The design strategy must be developed. This clarifies

whether the system will be developed by the company’s own

  programmers, whether it will be outsourced to another firm

(usually a consulting firm), or whether the company will buy an

existing software package.

2. This leads to the development of the basic architecture

design for the system that describes the hardware, software, and

network infrastructure that will be used. In most cases, the system

will add or change the infrastructure that already exists in the

organization. The interface design specifies how the users will

move through the system (e.g., navigation methods such as menus

and on-screen buttons) and the forms and reports that the system

will use.

3. The database and file specifications are developed. These

define exactly what data will be stored and where they will be

stored.

Page 36: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 36/60

4. The analyst team develops the   program design, which

defines the programs that need to be written and exactly what each  program will do. This collection of deliverables (architecture

design, interface design, database and file specifications, and

 program design) is the   system specification that is handed to the

 programming team for implementation. At the end of the design

 phase, the feasibility analysis and project plan are reexamined and

revised, and another decision is made by the project sponsor and

approval committee about whether to terminate the project.

Page 37: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 37/60

Screen-Short

Home Page

Page 38: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 38/60

Write F.I.R Report

Page 39: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 39/60

Add Missing PersonInformation

Page 40: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 40/60

Search Police station

Page 41: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 41/60

Admin Login 

F.I.R Reports

Page 42: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 42/60

(Admin side)

Manage All Police Stations(Admin side)

Page 43: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 43/60

Add New Police Station(Admin Side)

Page 44: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 44/60

Manage All Area Incharge(Admin Side)

Page 45: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 45/60

Add New InchargeRegistration(Admin Side)

Page 46: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 46/60

Incharge Login

Page 47: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 47/60

Incharge All Reports(Incharge Side)

Page 48: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 48/60

Edit Incharge Detail(Incharge Side)

Page 49: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 49/60

  Testing and

Implementation

There are many different definitions of testing introduced in

texts covering software testing. This chapter introduces some ways

Page 50: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 50/60

which can be used to realize these definitions. Some of these

definitions are:

“The aim of software testing is to guarantee, as far as

 possible, that the software is correct.”

“Testing involves operation of a system or application under 

controlled conditions and evaluating the results”

Software development models

Software development models are used for describing the work 

flow associated with software development process. Two of the

most commonly used development models are the modifiedwaterfall model.

• Modified waterfall model

The waterfall model is one of the oldest ways to model the

software development process and life cycle. The development is

divided into a number of steps that are gone through in a

descending order starting from the top. At the end of each step it isevaluated if all the requirements for the current step are met and if 

the next step can be started. If the requirements are not met the

development should continue on the current step. In some cases it

may be necessary to go back one or more steps and start

descending all over again if changes are necessary to accommodate

late requests by the customer or to correct a fundamental error 

introduced in the design of the software. The original waterfall

model did not have any feedback mechanism built into it and this

Mechanism has been added in the modified waterfall model.

The starting point in the waterfall model for the software

development cycle is the idea of the software that will be

developed. After it is established that there is a demand for this

Page 51: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 51/60

 product the requirements that this software must fulfill have to be

specified. When all the requirements are defined the design phase

can be started. The design phase is focused on the data

requirements, the software construction and the interface design

and coding. When the design phase is completed theimplementation phase starts and the actual application will be

  programmed. After all these steps have been gone through the

software still needs to be tested to verify that it meets all the

requirements set for it. After the software has passed all the tests

 performed the product is delivered to the customer and it will be

maintained by fixing any defects that have gone unnoticed and

 possibly by introducing minor improvements.

• Testing phases:

Page 52: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 52/60

The testing process is often divided into different levels or phases

to make the whole process more manageable. These levels are

designed to build upon each other, making the discovery of errors

easier by first testing the application in smaller and less complex pieces. It is quite common to partition the testing process into the

following phases:

• Unit testing

• Integration testing

• System testing

• Acceptance testing

• Regression testing etc.

• UNIT TESTING

Unit testing focuses verification effort on the smallest unit of 

Software design that is the module. Unit testing exercises specific

 paths in a module’s control structure to ensure complete coverageand maximum error detection. This test focuses on each module

individually, ensuring that it functions properly as a unit. Hence,

the naming is Unit Testing.

During this testing, each module is tested individually and the

module interfaces are verified for the consistency with design

specification. All important processing path are tested for the

expected results. All error handling paths are also tested.

• INTEGRATION TESTING:

Integration testing addresses the issues associated with the dual

  problems of verification and program construction. After the

Page 53: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 53/60

software has been integrated a set of high order tests are

conducted. The main objective in this testing process is to take unit

tested modules and builds a program structure that has been

dictated by design.

• SYSTEM TESTING:

System testing of software or hardware is testing conducted on a

complete, integrated system to evaluate the system's compliance

with its specified requirements. System testing falls within the

scope of black box testing, and as such, should require no

knowledge of the inner design of the code or logic.

As a rule, system testing takes, as its input, all of the "integrated"

software components that have successfully passed integration

testing and also the software system itself integrated with any

applicable hardware system(s). The purpose of integration testing

is to detect any inconsistencies between the software units that areintegrated together (called assemblages) or between any of the

assemblages and the hardware. System testing is a more limiting

type of testing; it seeks to detect defects both within the "inter-

assemblages" and also within the system as a whole.

 

• ACCEPTANCE TESTING

User Acceptance of a system is the key factor for the success of 

any system. The system under consideration is tested for user 

acceptance by constantly keeping in touch with the prospective

Page 54: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 54/60

system users at the time of developing and making changes

wherever required. The system developed provides a friendly user 

interface that can easily be understood even by a person who is

new to the system.

• REGRESSION TESTING: -

Regression testing is the process of testing changes to

computer programs to make sure that the older programming still

works with the new changes. Regression testing is a normal part of 

the program development process and, in larger companies, is done

 by code testing specialists. Test department coders develop codetest scenarios and exercises that will test new units of code after 

they have been written. These test cases form what becomes the

test bucket. Before a new version of a software product is released,

the old test cases are run against the new version to make sure that

all the old capabilities still work. The reason they might not work 

is because changing or adding new code to a program can easily

introduce errors into code that is not intended to be changed.

• PREPARATION OF TEST DATA:

Taking various kinds of test data does the above testing.

Preparation of test data plays a vital role in the system testing.

After preparing the test data the system under study is tested using

that test data. While testing the system by using test data errors are

again uncovered and corrected by using above testing steps and

corrections are also noted for future use.

• USING LIVE TEST DATA:

Live test data are those that are actually extracted from

organization files. After a system is partially constructed,

Page 55: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 55/60

 programmers or analysts often ask users to key in a set of data

from their normal activities. Then, the systems person uses this

data as a way to partially test the system. In other instances,

 programmers or analysts extract a set of live data from the files and

have them entered themselves.

It is difficult to obtain live data in sufficient amounts to conduct

extensive testing. And, although it is realistic data that will show

how the system will perform for the typical processing

requirement, assuming that the live data entered are in fact typical,

such data generally will not test all combinations or formats that

can enter the system. This bias toward typical values then does not

 provide a true systems test and in fact ignores the cases most likely

to cause system failure.

Implementation

After having the user acceptance of the new system developed, the

implementation phase begins. Implementation is the stage of a project

during which theory is turned into practice. During this phase, all the

 programs of the system are loaded onto the user's computer. After loading

the system, training of the users starts. Main topics of such type of trainingare:

How to execute the package

How to enter the data

How to process the data (processing details)

How to take out the reports

After the users are trained about the computerized system, manual

working has to shift from manual to computerized working. The following

two strategies are followed for running the system:

• Parallel run: In such run for a certain defined period, both the

systems i.e. computerized and manual are executed in parallel. This

strategy is helpful because of the following:

Page 56: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 56/60

Manual results can be compared with the results of the computerized

system.

Failure of the computerized system at the early stage, does not affect

the working of the organization, because the manual system continues

to work, as it used to do.

• Pilot run: In this type of run, the new system is installed in parts.

Some part of the new system is installed first and executed

successfully for considerable time period. When the results are found

satisfactory then only other parts are implemented. This strategy

 builds the confidence and the errors are traced easily.

Changes are made in response to change requirement but the

fundamental software structure is stable. No new functionality is added to

the system but it is restructured and reorganized to facilitate future changes.These strategies may be applied separately or together. Following

maintenance techniques are used:

Corrective maintenance

This acts to correct errors that are uncovered after the software is in

use.

• Adaptive Maintenance

This is applied when changes is the external environment precipitate

modifications to software.

• Perfective Maintenance

This improves future maintainability and reliability and provides basis

for future enhancements.

Page 57: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 57/60

Book References

• Beginning Php, Apache, My SQL Development

• Php and My SQL Bible

Page 58: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 58/60

Bibliography

• www.aacounty.org

• www.google.com

• www.met.police.uk 

• www.usdoj.gov/criminal/cyber crime

Page 59: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 59/60

Conclusions

1. In this website a general (unknown) user can Apply online

General fir Report while sitting anywhere in the world and also get

the progress report of his/her FIR.

2. in this website Authorized user can Apply general FIR and after 

investigation general FIR became registered FIR.

3. This is a fast working online system where crime can be

stopped.

4. By this Police can easily catch the criminal or in other words a

criminal can be easily catches doesn’t matter how far he/she is.

Page 60: Crime Reporting Report File2007

8/7/2019 Crime Reporting Report File2007

http://slidepdf.com/reader/full/crime-reporting-report-file2007 60/60