Crime Reporting System Project Report

download Crime Reporting System Project Report

of 106

Transcript of Crime Reporting System Project Report

  • 8/15/2019 Crime Reporting System Project Report

    1/106

    Main Project Crime Automation & ReportingSystem

    CRIME AUTOMATION &

    REPORTING SYSTEM

    CHINMAYA VIDYAPEET(Affiliated to Mahatma Gandhi University, Kottayam)

    Warriam Road, Ernakulam – 682 016

    PROJECT REPORT

    2008-2009

    Submitted by

    Seenu S.

    Reg. No.: 2415

    In partial fulfillment of the requirements forthe award of the degree for

    BACHELOR OF COMPUTER APPLICATIONS

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    2/106

    Main Project Crime Automation & ReportingSystem

    MAHATMA GANDHI UNIVERSITY

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    3/106

    Main Project Crime Automation & ReportingSystem

    CHINMAYA VIDYAPEET(Affiliated to Mahatma Gandhi University, Kottayam)

    Warriam Road, Ernakulam – 682 016

    CERTIFICATE

     This is to certify that the Project Report entitled

    CRIME AUTOMATION & REPORTING

    SYSTEMhas been submitted bySeenu S.

    Reg. No. : 2415

    In partial fulfillment of the requirements for the

    award of the degree for

    BACHELOR OF COMPUTER APPLICATIONSMAHATMA GANDHI UNIVERSITY

    during the academic year 2008-2009

    Project Guide PrincipalCoordinator

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    4/106

    Main Project Crime Automation & ReportingSystem

    Submitted for University Examination held on……………

    Internal ExaminerExternal Examiner

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    5/106

    Main Project Crime Automation & ReportingSystem

    ACKNOWLEDGEMENT

    By the blessings and permission of almighty God, we were able to complete this work 

    as a grant success. And we with extreme polite and sincere thanks to all respected

     persons co-operated with us especially, our sincere thanks to our respected directress

    Mrs.  Kamakshi Balakrishna, for all the facilities extended to us during our project

    and fostering an academic climate.

    We profoundly pay our tributes and thanks to our Principal Mr. B.C. Menon for his

    overwhelming and moral support extended toward us.

    We express our grateful thanks to Mrs. Manjusha and Mrs. Nisha, for providing a

    healthy environment throughout this venture and for all other timely assistance, advice

    and constant encouragements and invaluable guidance, offered to us to make this

     project as a success.

    Finally we thank our parents for their boundless support and for making our lives so

    easy and for helping us to tackle all those difficulties in our life.

    Submitted by

    Seenu S.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    6/106

    Main Project Crime Automation & ReportingSystem

    CONTENTS

    1. Synopsis2. Organization Profile3. Project Overview4.  System Analysis  4.1  Existing System  4.2  Proposed System  4.3  Feasibility Study4.3.1  Economic Feasibility4.3.2 Technical Feasibility4.3.3  Behavioral Feasibility4.4 Tools & Platforms Used

    5.  R equirement Analysis  5.1  Problem R ecognition  5.2 Problem Evaluation and Synthesis  5.3  Modeling6.  System Design  6.1  Data Design  6.2  Architectural Design  6.3  Procedural Design  6.4  Interface Design

    7.  Coding8.  System Testing  8.1  Testing Process  8.2  Unit Testing  8.3 Integration Testing  8.4  Validation Testing9.  Implementation  9.1  Implementation Procedures10.  Software Maintenance

    11.  Conclusion

      A ppendicesA ppendix A (DFD)A ppendix B (Tables)A ppendix C (Input forms and Output forms)  Bibliography

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    7/106

    Main Project Crime Automation & ReportingSystem

      SYNOPSIS

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    8/106

    Main Project Crime Automation & ReportingSystem

    SYNOPSIS

    Synopsis is a general documentation tool. By means of a modular structure, it

    adapts to different styles of embedded documentation, different programming

    languages and various output formats. It scales well with the size of the project by

    allowing processing to be controlled by making files.

    The Crime Records Management System applies to Police Stations all across the

    country and specifically looks into the subject crime prevention, detection, conviction

    of criminals depending on a highly responsive backbone of Information Management.

    Modules of the project

    Administrator’s module will be focusing on the maintenance like Master Data

    Maintenance, Removal of old and outdated data from the software etc.

    Station module deals with processing of complaints, creating FIR, entering victim &

    witness details etc. All the basic processing of a station will be done in this module.

    Citizen module is for the public user, who has a complaint to register.

    Crime module is used for entering all details about the crime. It contains the date,

     police station where it is recorded, place, Nature of Crime etc.

    Search module is for searching crime in station wise, nature of crime.

    Avocation Module deals with the Law part of every Crime.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    9/106

    Main Project Crime Automation & ReportingSystem

     

    ORGANIZATION PROFILE

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    10/106

    Main Project Crime Automation & ReportingSystem

    ORGANIZATION PROFILE

    Soft Solutions provides worldwide IT solutions for Global 1000 corporations to stay

    abreast of the changes in today’s environment. Our areas of expertise include

    technology consulting, Application Development, Information Security and SAP. We

    are highly motivated, experienced professionals committed to our client’s success.

    Our technical expertise enables us to innovate, develop, and implement cutting edge

    technology solutions, resulting in significant savings for clients.

    Here at Soft Solution, we are sincerely committed to making a difference. As part of 

    our corporate social responsibility program, we donate a portion of our revenues to

    the 5H Program, a service project that is supported by the International Association

    Corporate Social Responsibility

    “What distinguishes Soft Solution from its competitors is the work culture of 

    excellence, which is the result of our commitment to a greater cause.”  –  Mr. Harish

     Ramachandran, CEO

    At Soft Solution, we know that success demands the highest standards of 

    social, economic and environmental responsibility across our operations worldwide.

    Soft Solution’s Services

    Working closely with our clients, we customize our solutions to fit each and every

    client's unique needs and marketplace. Listed are, but a few of Soft Solution’s

    comprehensive suite of services:

    Application Development

    Information Security

    SAP Implementation

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    11/106

    Main Project Crime Automation & ReportingSystem

     

    PROJECT OVERVIEW

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    12/106

    Main Project Crime Automation & ReportingSystem

    PROJECT OVERVIEW

    The Crime Records Management System applies to Police Stations all across the

    country and specifically looks into the subject crime prevention, detection, conviction

    of criminals depending on a highly responsive backbone of Information Management.

    The efficiency of the Police and the effectiveness with which it tackles crime depend

    on what quality of information it can derive from its existing records and how fast it

    can have access to it.

    I had done this project using ASP.NET as front end and SQL Server as back end

    easing the effort of user.

    Modules of the Project

    1) Station module

    Each of the station must first register with the Software. For the registration part each

    station enter their details like station name, address, phone no, station in charge etc.

    and get a User Id from the Software. Once the prospective station registers with the

    software they can avail the existing records.

    2) Citizen module

    Each of the citizens, who has a complaint to register, must first register with the

    Software. For the registration part each person enter their details like name, address,

     phone no., E-Mail ID etc. and get a User Id & password from the Software. Once the

    registration is complete, the citizen can sign-in to the website & register their 

    complaint.

    3) Crime module

    This module is used for entering all details about the crime. It contains the date and

    time, police station where it is recorded, place, Nature of Crime, Location of the

    Crime etc.

    4) Search module

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    13/106

    Main Project Crime Automation & ReportingSystem

    In this module we can search the crime in station wise, nature of crime.

    5) Administrators Module

    The module will be protected by user ID and password. Ordinary users of the

    software will not be permitted to enter into this area of the software. The module will

     be focusing on the maintenance like Master Data Maintenance, Removal of old and

    outdated data from the software etc.

    6) Avocation Module

    This Module deals with the Law part of every Crime.

    ABOUT THE DEVELOPING SYSTEM

    The system has developed in ASP.NET as front end and SQL server 2000 as back 

    end.

    ASP.NET (Active Server Pages.net)

    WHAT IS ASP.NET: Microsoft ASP.NET is a free technology that allows

     programmers to create dynamic web applications.ASP.NET can be used to create

    anything from small, personal websites through to large, enterprise-class web

    applications. ASP.NET is the latest version of Microsoft's Active Server Pages

    technology (ASP).ASP.NET is a part of the Microsoft .NET framework, and a

     powerful tool for creating dynamic and interactive web pages. All we need to get

    started with ASP.NET is the free .NET Framework and the free Visual Web

    Developer.

    ASP: ASP is a server side scripting technology that enables scripts (embedded in web

     pages) to be executed by an Internet server 

    About VB.NET

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    14/106

    Main Project Crime Automation & ReportingSystem

    Microsoft.net was formerly known as next generation windows services (NGWS for 

    short).It is a completely new platform for developing the next generation of windows

    /web applications. These applications would transcend device boundaries and fully

    harness the power of internet. However, this new platform required a language,

    which could take its fully advantage; this is one of factors that led to the

    development of VB. VB has evolved from QBASIC language. The VB compiler is

    considered to be the most efficient compiler in the .net family and a major part of the

    .net based classes libraries, itself are written in VB.

    SQL Server 2000

    Microsoft SQL Server 2000 is a relational database management system (RDBMS)

     produced by Microsoft. Its primary query language is Transact SQL, an

    implementation of the ANSI/ISO standard SQL used by both Microsoft and Sybase.

    SQL Server allows multiple clients to use the same database

    concurrently. SQL Server provides two modes of concurrency control: pessimistic

    and optimistic concurrency. When pessimistic concurrency control is being used, SQL

    Server controls concurrent access by using locks. Locks can be either shared or exclusive. Exclusive lock grants the user exclusive access to the data no other user 

    can access the data as long as the lock is held. Shared locks are used when some data

    is being read-multiple users can read data locked with a shared lock, but not acquire

    an exclusive lock. SQL Server also provides the optimistic concurrency control

    mechanism, which is similar to the multiversion concurrency control used in other 

    databases.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    15/106

    Main Project Crime Automation & ReportingSystem

    SYSTEM SPECIFICATIONS

    SOFTWARE SPECIFICATIONS

    The “Crime Reporting System” must use Microsoft SQL server 2000 as its database

    component.

    Software Requirements

    The software requirements include the software that is required for working. Software

    requirements are as follows:

    Developments Tools

    •  ASP .NET uses the new ADO .NET.

    •  ASP .NET supports full Visual Basic, not VBScript.

    •  ASP .NET supports C# (C sharp) and C++.ASP .NET supports JScript as

    before.

    Database

    SQL Server 

    Application Server 

    Sun Microsystems

    Operating System

    Windows XP Professional

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    16/106

    Main Project Crime Automation & ReportingSystem

    HARDWARE SPECIFICATION

    Hardware interfaces specifies the logical characteristics of each interface between the

    software product and the hardware components of the system. Many business type

    applications will not have hardware interfaces, since “Crime Reporting System” is an

    application it too will not require any particular hardware interface.

    Hardware Requirements

    The hardware for the project should be selected in such a way that it should give the

    maximum optimal result .Hardware requirements are as follows:

    Server Side

    Processor :Intel Pentium (II) or higher 

    128 MB RAM

    2 GB Hard Disk or more

    SVGA Color Monitor 

    104 Keyboard

    Any Mouse

    Any modem

    Client Side

    Processor :Intel Pentium (II) or higher 

    128 MB RAM

    2 GB Hard Disk or more

    SVGA Color Monitor 

    104 Keyboard

    Any Mouse

    Any Modem

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    17/106

    Main Project Crime Automation & ReportingSystem

    SYSTEM ANALYSIS

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    18/106

    Main Project Crime Automation & ReportingSystem

    SYSTEM ANALYSIS

    System Analysis works with users to identify goals and build systems to achieve

    them. System analysis is an important phase of any system development process. The

    system is studied to the minutest details and analyzed. The system analyst plays the

    role of an interrogator and dwells deep in to the working of the present system. In

    analysis, a detailed study of these operations performed by a system and their 

    relationships within and outside of the system is done. A key question considered here

    is, “what must be done to solve the problem?” One aspect of analysis is defining the

     boundaries of the system and determining whether or not the candidate system should

     be considered. The system is viewed as a whole and the inputs to the system are

    identified. The outputs from the system are traced through the various processing that

    the input phases through in the organization. During analysis, data are collected on

    available files, decision points, and transaction handled by present system. Once

    analysis is completed the analyst has a firm understanding of what is to be done.

    EXISTING SYSTEM

    In the existing crime management system, most of the operations are done manually

    like send complaints, taking actions against crimes, view status etc. So with the

    existing system if anybody wants to complaint against crimes he must do it through

    the police.

    If we are doing the system manually, so many minor errors will occur. Error detection

    in the previous entries made and data cross verification is another important function.

    These are done manually, and it would take time.

    Drawbacks of the existing system can be concluded as follows:

    The existing system is time consuming and not very user friendly.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    19/106

  • 8/15/2019 Crime Reporting System Project Report

    20/106

    Main Project Crime Automation & ReportingSystem

    PROPOSED SYSTEM

    Our mission statement directs us to promote the public interest while balancing the

    Law. Obviously we’ll not rush to judgment, but will look at the facts and render a

    thoughtful decision based on these facts. Organization is an independent statutory

     body which was created to maintain an effective an effective and efficient police

    service for the public. Its primary task includes securing continuous needs of the

     public in an efficient manner. As part of the responsibility, ‘our committee’ is

    responsible for performance monitoring (performance planning and review formerly

     professional standards and performance monitoring) decided to look at the

    contribution and effectiveness of the organization within the public. We need the

    whole hearted support of each and every individual member of the site and

    cooperation of the users. The administrator, along with the investigators, lawyers,counselors, and other authorities statutory partners in our organization. Given their 

    key role in these partnerships, we felt that an overview of strength and Weakness of 

    the organization is needed.

    The aim of the project is to bring about improvement to the organization’s

    contributions; this report necessarily concentrates on overcoming weakness and

    raising standards. To avoid conducting and unfair evaluation efforts which are made

    to put this contribution into this context. It believes that partnership work is highly

     beneficial to the organization and that partnership work is the way forward to reduce

    crime and disorder.

    Advantages of the Proposed System:

    The scrutiny was carried out through the collection of written and oral evidence.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    21/106

    Main Project Crime Automation & ReportingSystem

    Better communication, better leadership, better training, more defined roles

    in terms of contribution to contribution to the society.

    Working with partners.

    Reducing crime and disorder.

    Confidently and anonymity issues.

    The proposed system has control over all its cells and is perfectly coordinated. Also

    the cells can act individually. To take our organization to heights we need the

    wholehearted co-operation of the public.

    Objectives of the Proposed System

    In the fast moving world, if people lack something, it is time. All are busy in their 

    world. It will be welcomed if services are provided at their will. So the main objective

    of our product is better communication, better leadership, reducing crime and disorder 

    etc.

    The product provides a framework within which a user can easily work with. Thatwas out next objective. We know users are of many categories, like users from who

    know working with computers very well to users who didn’t know about computers.

    So all the category can use the software. So it should be user friendly.

    The product provides a framework, which is error free. We know a crime

    management system is actually a critical process having many calculations and

    operations. So each simple error laid to big problem. So it should be error free and our 

    objective is to build error free software.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    22/106

    Main Project Crime Automation & ReportingSystem

    FEASIBILITY STUDY

    A feasibility study is a test of system proposal according to its workability,

    impact on the organization, ability to meet user needs and effective use of resources.

    Apart from these, an initial investigation is launched to study the present system,

    evaluate the possible application of computer based of methods. Selecting a tentative

    system, evaluate the cost and effectiveness of the proposed system, evaluate the impact

    of the proposed system, existing personal and ascertain the need of new personal.

    To define an improved information system, the study group must understand the

    information requirements of the organization. This understanding may be obtained bydetermining what is currently being done and of investigating through interviews and

    analysis what information is needed to be provided that is not being furnished by the

    existing system . Data on the cost of operating the current system needs to be collected

    in order to make a cost benefit for a new system.

    The objective of feasibility study is not to solve the problem, but to acquire a

    sense of its scope. During the study, the problem definition is crystallized and aspects of 

    the problem to be included in the system are determined, consequently costs and

     benefits are estimated with greater detail at this stage. The result of the feasibility study

    is a system formal proposal. This is a simply a form of documenting or detailing the

    nature and scope of proposed solutions. The proposal summarizes what is known and

    what is going to be done. Three key considerations involved in the feasibility analysis:

    Economic feasibility

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    23/106

    Main Project Crime Automation & ReportingSystem

    Technical feasibility

    Behavioral feasibility

    ECONOMIC FEASIBILITY:

    Economic analysis is the most frequently used method for comparing the cost

    with the benefit or income that is expected from developed system.

    In the existing system, many people are involved in the process but in the

     proposed system, number of persons involved be reduced drastically. So the proposed

    system is economic.

    In the existing system, storage of all these records should be arranged and

    security should be provided for the records. In the proposed system, separate security

    arrangement is not needed since the software provides security and maintenance is

    simply and hardly needs one or two person to operate the system.

    TECHNICAL FEASIBILITY:

    The feasibility center on the existing computer system (software, hardware) and

    to what extend it can support the proposed addition.

    In the proposed system, data can be easily stored and managed in database

    management system software.

    The results for various queries can be generated easily.

    Therefore, the system is technically feasible

    BEHAVIORAL FEASIBILITY:

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    24/106

    Main Project Crime Automation & ReportingSystem

    People are inherently resistant to change and computer has known to facilitate

    change. An estimate should be made of how strong a reaction the user staff likely to

    have towards the developments of computerized system.

    In the existing system more manpower is required and time factor is more but in the

     proposed system, manpower and time factors are reduced .So, the remaining

    numbers are engaged with some other important works.

    An SRS is basically an organization's understanding (in writing) of a customer 

    or potential client's system requirements and dependencies at a particular point in time

    (usually) prior to any actual design or development work. It's a two-way insurance

     policy that assures that both the client and the organization understand the other’s

    requirements from that perspective at a given point in time.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    25/106

    Main Project Crime Automation & ReportingSystem

    TOOLS & PLATFORMS USED 

    TOOLS & PLATFORMS

    Operating System : Windows NT/2003 Server 

    Front End : ASP.Net with VB

    Back End : SQL SERVER 2005

    Features of software used

    About Windows 2003

    Windows 2003 Server includes improved network, application and Web

    services. It provides increased reliability and scalability, lowers your cost of computing

    with powerful, flexible management services, and provides the best foundation for 

    running business application.

    The Windows GUI

    The familiar graphical user interface it presents to the world.

    Computing Model

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    26/106

    Main Project Crime Automation & ReportingSystem

    Windows 2003 Server operations are based on a client-server computing model.

    This is a model in which the computing workload is shared between the server and the

    client. It is a co-operative relationship that divides the workload evenly between

    machines or processes on a single machine.

    Visual Studio .NET

    Visual Studio .Net is the rapid application development tool for BASIC. Visual

    Studio .Net offers complete integration with ASP.NET and enables to drag and drop

    server controls and design Web Forms as they should appear when user views them.

    The .NET Framework is a multi-language environment for building, deploying,

    and running XML Web services and applications. It consists of four main parts:

    • Common Language Runtime: Despite its name, the runtime actually has a

    role in both a component's runtime and development time experiences. While

    the component is running, the runtime is responsible for managing memory

    allocation, starting up and stopping threads and processes, and enforcing

    security policy, as well as satisfying any dependencies that the component might

    have on other components. At development time, the runtime's role changes

    slightly; because it automates so much (for example, memory management), the

    runtime makes the developer's experience very simple, especially when

    compared to COM as it is today. In particular, features such as reflection

    dramatically reduce the amount of code a developer must write in order to turn

     business logic into a reusable component.

    • Unified programming classes: It is a completely new platform for 

    developing the next generation of windows /web applications. These

    applications would transcend device boundaries and fully harness the power of 

    internet. However, this new platform required a language, which could take its

    fully advantage; this is one of factors that led to the development of VB. VB

    has evolved from QBASIC language. The VB compiler is considered to be the

    most efficient compiler in the .net family and a major part of the .net based

    classes libraries, itself are written in VB.

    Dept. of B.C.A. Chinmaya Vidyapeet

    http://asp.net/http://asp.net/

  • 8/15/2019 Crime Reporting System Project Report

    27/106

    Main Project Crime Automation & ReportingSystem

    Some of the other advantages of creating BASIC applications in Visual

    Studio .Net are:

    Visual Studio .Net is a Rapid Application (RAD) tool. Instead of adding eachcontrol to the Web Form programmatically, it helps to add these controls by

    using toolbox, saving programming efforts.

    • Visual Studio .Net supports custom and composite controls. Can create custom

    controls that encapsulate a common functionality that might need to use in a

    number of applications.

    Visual Studio .Net does a wonderful job of simplifying the creation and

    consumption of Web Services. Mush of the programmer-friendly stuff (creating all the

    XML-based documents) happens automatically, without much effort on the

     programmer’s side. Attribute-based programming is a powerful concept that enables

    Visual Studio .Net to automate a lot of programmer-unfriendly tasks.

    • .NET programming languages: The .NET Framework provides a set of tools

    that help to build code that works with the .NET Framework. Microsoft provides

    a set of languages that are already .NET compatible. BASIC is one of those

    languages.

    • ASP.NET environment: Active Server Pages were released by Microsoft to

    enable the creation of dynamic pages based on user input and interaction with a

    Web site. ASP.NET improves upon the original ASP by providing code-behind .

    With ASP.NET and code-behind, the code and HTML can be

    separated. ASP.NET Web services are XML-based services that are exposed on

    the Internet that can be accessed by other Web services and Web service clients.

    ASP.NET

    Dept. of B.C.A. Chinmaya Vidyapeet

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/

  • 8/15/2019 Crime Reporting System Project Report

    28/106

    Main Project Crime Automation & ReportingSystem  ASP.NET is more than the next version of Active Server Pages (ASP); it is a

    unified Web development platform that provides the services necessary for developers to

     build enterprise-class Web applications. While ASP.NET is largely syntax compatible

    with ASP, it also provides a new programming model and infrastructure for more secure,

    scalable, and stable applications.

      ASP.NET is a compiled, .NET-based environment; you can author applications

    in any .NET compatible language, including VisualBasic.NET, BASIC, and

    JScript.NET. Additionally, the entire .NET Framework is available to

    any ASP.NET application. Developers can easily access the benefits of these

    technologies, which include the managed common language runtime environment, type

    safety, inheritance, and so on.

      ASP.NET has been designed to work seamlessly with WYSIWYG HTML

    editors and other programming tools, including Microsoft Visual Studio .NET. Not only

    does this make Web development easier, but it also provides all the benefits that these

    tools have to offer, including a GUI that developers can use to drop server controls onto

    a Web page and fully integrated debugging support. Developers can choose from the

    following two features when creating an ASP.NET application, Web Forms and Web

    services, or combine these in any way they see fit.

    • Web Forms allows you to build powerful forms-based Web pages. When

     building these pages, you can use ASP.NET server controls to create common

    UI elements, and program them for common tasks. These controls allow you to

    • Rapidly build a Web Form out of reusable built-in or custom components,

    simplifying the code of a page.• An XML Web service provides the means to access server functionality

    remotely.

    ASP.NET ARCHITECTURE

    .NET ARCHITECTURE

    Dept. of B.C.A. Chinmaya Vidyapeet

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/

  • 8/15/2019 Crime Reporting System Project Report

    29/106

    Main Project Crime Automation & ReportingSystem

     

    As the illustration shows, all Web Administrators communicate

    with ASP.NET applications through IIS. IIS deciphers and optionally authenticates the

    request. If Anonymous is turned on, no authentication occurs. IIS also finds the

    requested resource (such as an ASP.NET application), and, if the client is authorized

    returns the appropriate resource.

    In addition to the built-in ASP.NET security features, an ASP.NET application

    can use the low-level security features of the .NET Framework.

    Features

    Reliable Interoperability

    Employ code to call native Windows APIs, use pre-built COM components, and

    leverage existing ActiveX controls to seamlessly integrate existing applications and

    components.

    Modern, Component-Oriented Language

    Take advantage of inherent support for properties, indexers, delegates, single

    and multidimensional arrays, advanced inheritance, attributes, versioning, and XML

    comments.

    Powerful Debugging and Testing Tools

    Dept. of B.C.A. Chinmaya Vidyapeet

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/

  • 8/15/2019 Crime Reporting System Project Report

    30/106

    Main Project Crime Automation & ReportingSystem

    ASP .NET includes a powerful remote and multi-language debugger, enabling

    developers to test applications and build reliable multi-tier solutions that span process

     boundaries and are written in multiple programming languages.

    NET Framework Class Library

    Gain mature and powerful, built-in functionality, including a rich set of 

    collection classes, networking support, multithreading support, string and regular 

    expression classes, and broad support for XML, XML schemas, XML namespaces,

    XSLT, XPath, and SOAP.

    Robust Web Development Environment

    Create Web-based solutions in VB using the shared Web Forms Designer and

    XML Designer. Developers can also use IntelliSense features and tag completion or 

    choose the WYSIWYG editor for drag-and-drop authoring to build interactive Web

    applications.

    Integrating with IIS

    IIS is the web server is used here. IIS 5.0 or above is essential for 

    the ASP.NET for the environment. This release of ASP.NET uses IIS 5.0 as the pre

    Kim host environment. When considering ASP.NET authentication, you should

    understand the interaction with IIS authentication services.

    IIS always assumes that a set of credentials maps to a Windows NT account and

    uses them to authenticate a user. There are three different kinds of authentication

    available in IIS 5.0: BASIC, DIGEST, and INTEGRATED WINDOWS Authentication

    (NTLM or Kerberos). You can select the type of authentication to use in the IIS

    administrative services. If you request a URL containing an ASP.NET application, the

    request and authentication information are handed off to the application..

    Dept. of B.C.A. Chinmaya Vidyapeet

    http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/http://asp.net/

  • 8/15/2019 Crime Reporting System Project Report

    31/106

    Main Project Crime Automation & ReportingSystemWeb Service

    Web service is arguably the most exciting and innovate features of Microsoft’s.

     NET initiative and they are likely to profoundly affect the way business interact usingcomputer application. List of possible Web services is as varies as the list of possible

     business opportunities. Web service would typically perform a core business service

    such as user authentication, credit card validation, pricing a derivates security, placing a

     purchase order for a stock or pricing a same-day shipment.

    A web service is a component that performs a function or service. A component

    is a piece of software that has a well-defined interface, hidden internals, and the

    capability of being discovered. By “discovered” means that you can determine what the

    component does without needing to see the code within it. A component is similar to a

    method since we can call it with arguments that fit a set of parameters, and it has the

    capability of returning results.

    A web service may also return information to the caller. This service resides

    somewhere on the Web and can be accessed from other locations on the Web. For this

    service to be called, there are a number of elements that must be in place. First, thecaller must know how to call the service. Second, the call must be made across the

    Web. Finally, the web service must know how to respond.

    Introduction to VB. NET

    Microsoft Visual BASIC. Net is the most creative tool, which helps a programmer to

    create a user interface than writing several lines of code. The predecessor of Visual

    BASIC.net was BASIC (Beginners All Purpose Symbolic Instruction Code). BASIC

    was mainly interpreter-based whereas Visual BASIC. Net is that it is a rapid

    Application Development tool. This is the main reason why Visual BASIC. Net is

    widely used as a prototyping language.

    VB. Net is object oriented, whereas each object possesses some properties like size,

     position, color, appearance etc. This means that we can compartmentalize different

    aspects of our application as object and develop test those object independently of 

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    32/106

    Main Project Crime Automation & ReportingSystem

    the rest of the application. By modifying certain properties and invoking the methods

    of these objects, we exert a great deal of control over the user’s interaction with the

    VB.net program we have written. Each object has its own event handling procedures.

    Visual BASIC.net is a member of Visual Studio.

    One of the merits of VB.Net is that it insulates the user from having to deal with low-

    level message handling. This allows as to quickly creating powerful applications

    without having dealing with unnecessary data. Microsoft has developed VB. NET as

    a complete Windows applications development system.

    Back end

    About MS SQL Server 2005

    SQL Server 2005 exceeds dependability requirements and provides

    innovative capabilities that increase employee effectiveness, integrate heterogeneous IT

    ecosystems, and maximize capital and operating budgets. SQL Server 2005 provides the

    enterprise data management platform your organization needs to adapt quickly in a fast-

    changing environment.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    33/106

    Main Project Crime Automation & ReportingSystem

    With the lowest implementation and maintenance costs in the industry, SQL

    Server 2000 delivers rapid return on your data management investment. SQL Server 2005

    supports the rapid development of enterprise-class business applications that can give your 

    company a critical competitive advantage. Benchmarked for scalability, speed, and

     performance, SQL Server 2000 is a fully enterprise-class database product, providing core

    support for Extensible Markup Language (XML) and Internet queries.

    Easy-to-Use Business Intelligence

    (BI) Tools Through rich data analysis and data mining capabilities that

    integrate with familiar applications such as Microsoft Office, SQL Server 2005 enables you

    to provide all of your employees with critical, timely business information tailored to their 

    specific information needs. Every copy of SQL Server 2005 ships with a suite of BI

    services.

    Self-Tuning and Management Capabilities

    Revolutionary self-tuning and dynamic self-configuring features optimize

    database performance, while management tools automate standard activities. Graphical

    tools and wizards simplify setup, database design, and performance monitoring, allowing

    database administrators to focus on meeting strategic business needs.

    Data Management Applications and Services

    Unlike its competitors, SQL Server 2005 provides a powerful and

    comprehensive data management platform. Every software license includes extensive

    management and development tools, a powerful extraction, transformation, and loading

    (ETL) tool, business intelligence and analysis services, and new capabilities such as

     Notification Services. The result is the best overall business value available.

    SQL Server 2005 Enterprise Edition (64 bit)

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    34/106

    Main Project Crime Automation & ReportingSystem

    Enterprise Edition (64-bit) provides the most scalable data platform to

    take advantage of the class of Intel Itanium-based servers. Addressing more memory

    than any other edition of SQL Server, it scales to the performance levels required to

    support the largest Data warehousing and analysis applications, ecommerce websites

    and Enterprise business systems. Supporting up to 8 nodes in failover clustering, SQL

    Server 2005 (64-bit) provides a high level of reliability and availability for your 

    mission-critical applications.

    SQL Server 2005 Enterprise Edition

    Enterprise Edition includes the complete set of SQL Server data

    management and analysis features and is uniquely characterized by several features that

    make it the most scalable and available edition of SQL Server 2005. It scales to the

     performance levels required to support the largest Web sites, Enterprise Online

    Transaction Processing (OLTP) systems and Data Warehousing systems. Its support for 

    failover clustering also makes it ideal for any mission critical line-of-business

    application. Additionally, this edition includes several advanced analysis features that

    are not included in SQL Server 2005 Standard Edition. There are four main areas in

    which the additional features of SQL Server 2005 Enterprise Edition are most evident:

    Scalability Availability/uptime Performance Advanced analysis.

    SQL Server 2005 Standard Edition

    Standard edition is an affordable option for small and medium-sized

    organizations. It includes the core functionality needed for non-mission-critical e-

    commerce, data warehousing, and line-of-business solutions. For instance, all of the XML

    features present in Enterprise Edition are also included in Standard Edition. And while a

    handful of advanced OLAP features are reserved for Enterprise Edition, all data mining

    features and the core OLAP functionality are included in SQL Server 2005 Analysis

    Services in Standard Edition. Similarly, components that other database vendors charge

    for as separate add-on products for their highest-end editions are included in Standard

    Edition: Data Transformation Services (DTS) Replication (snapshot, transactional, and

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    35/106

    Main Project Crime Automation & ReportingSystem

    merge) Full-Text Search English Query Stored procedure development and debugging tools

    SQL Profiling and performance analysis tools.

    SQL Server 2005 Replication Overview

    SQL Server offers three types of replication:

    1. Snapshot.

    It copies an entire view of data to another computer. The destination database view is

    overwritten with the new version. Snapshot replication distributes data exactly as it appears

    at a specific moment in time and does not monitor for updates to the data. Snapshot

    replication is best used as a method for replicating data that changes infrequently or where

    the most up-to-date values, low latency, is not a requirement. When synchronization occurs,

    the entire snapshot is generated and sent to Subscribers.

    2. Transactional.

    Transactions, INSERT, UPDATE, or DELETE statements, executed on one computer are

    replicated to another computer. With transactional replication, an initial snapshot of data is

    applied at subscribers, and then when data modifications are made at the Publisher, the

    individual transactions are captured and propagated to Subscribers. Transactional

    replication is helpful when: Incremental changes need to be propagated to subscribers as

    they occur. Transactions need to adhere to the Atomic, Consistency, Isolation, and

    Durability (ACID) properties. Subscribers are reliably and/or frequently connected to the

    Publisher.

    3. Merge.

    Updates on any computer will be replicated to another computer at a later time. Merge

    replication is the process of distributing data from Publisher to Subscribers, allowing both

    the Publisher and Subscribers to make updates while connected or disconnected, and then

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    36/106

    Main Project Crime Automation & ReportingSystem

    merging the updates between sites when connected. Merge replication allows various sites

    to work autonomously. At a later time, merge updates produce single, uniform result. The

    initial snapshot is applied to Subscribers, and then you have tracked changes to published

    data at the Publisher and at the Subscribers.

    The data is synchronized between servers continuously, at a scheduled time,

    or on demand. Because updates are made at more than one server, the same data may have

     been updated by the Publisher, or by more than one Subscriber. Thus, conflicts can occur 

    when updates are merged. Merge replication includes default and custom choices for 

    conflict resolution that the user can define while configuring a merge publication. When a

    conflict occurs, a resolver is invoked by the Merge Agent and determines which data will

     be accepted and propagated to other sites. Merge replication is helpful when:

    Multiple Subscribers need to update data at various times and propagate

    those changes to the Publisher and to other Subscribers. Subscribers need to receive data,

    make changes offline, and later synchronize changes with the Publisher and other 

    Subscribers. Not many conflicts are expected when data is updated at multiple sites. This is

     because the data is filtered into partitions and then published to different Subscribers, or due

    to the uses of the application. However, if conflicts do occur, violations of ACID properties

    are acceptable.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    37/106

    Main Project Crime Automation & ReportingSystem

     

    REQUIREMENT ANALYSIS

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    38/106

    Main Project Crime Automation & ReportingSystem

     

    REQUIREMENT ANALYSIS

    Requirement analysis task is a process of discovery, refinement, modeling and

    specification. Both the developers and customers take an active role in requirement

    analysis. Requirement analysis is a communication intensive activity. Requirement

    analysis can be divided into:

    Problem Recognition

    Problem Evaluation & Synthesis

     Problem Recognition

    The goal of this step is recognition of basic problem elements as indicated by the

    customer. The basic purpose of this activity is to obtain a thorough understanding of 

    the needs of the client and the user, what exactly is desired from the software and

    what are the constraints on the solution.

    Problems of the existing system:

    Security can’t assured

    Delay in storing and retrieving information

    Possibility of human errors

      Problem Evaluation & Synthesis

    In this step analyst must define all externally observable objects, evaluate flow and

    control of the information, define and elaborate all software functions, understand.

    Software behavior and design constraints etc. Evaluation and synthesis continues until

     both analyst and customer field confident about the product.

    Once the problems are identified, evaluation process begins. After evaluation of the

    current problem and desired in formations, the analyst synthesis one or more

    solutions.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    39/106

    Main Project Crime Automation & ReportingSystem

    Security can be assured

    Cost effective

     No chance of errors

    MODELING

    During the evaluation and solution synthesis activity, the analyst creates models of the

    system in an effort to better understand data and control flow. The model serves as

    foundation for software design and as the basis for the creation of specification for the

    software. For the better understanding of data and control flow we use Data Flow

    Diagram.

    Data Flow Diagrams

    Data Flow Diagram is used to define the flow of the system and its resources such as

    information’s. DFDs are a way of expressing systems requirements in graphical

    manner. DFD represents one of the most ingenious tools used for structured analysis.

    It has the purpose of clarifying system requirements and identifying major 

    transformations that will become programs in the system design. It is the major 

    starting point in the design phase that functionalities decompose the requirement

    specification to the lowest level of detail.

    DFD of “Crime Reporting System” is as shown in Appendix A.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    40/106

    Main Project Crime Automation & ReportingSystem

     

    SYSTEM DESIGN

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    41/106

    Main Project Crime Automation & ReportingSystem

    SYSTEM DESIGN

    The most creative and challenging phase of the system life cycle is system design.

    The term design describes a final system and the process by which it is developed. It

    refers to the technical specifications that will be applied in implementing the proposed

    system. It also includes the construction of program and designing of output, input,

    menu, code, database and process of the system.

    System output may be report, document or a message. In on-line applications,information is displayed on the screen. The layout sheet for displayed output is similar 

    to the layout chart used for designing output.

    On-line data entry makes use of processor that accepts commands and data from the

    operator through a keyboard or a device such as touch screen or voice input.

    Designing the code depends on the programming language chosen and mostly they

    are not specified while outlining the design of the system. The goal of coding is to

    translate the design of the system in to code in a programming language. The aim of 

    the code design is to implement the system in best possible manner.

    Database design is used to define and specify the structure of objects used in the

    system. A wide array of design information must be developed during the database

    design. A database is the collection of interrelated data stored with minimum

    redundancy to serve many users quickly and efficiently. The general objective of data

     base design is to make information access easy, quick, inexpensive, and flexible for 

    the user.

    Databases of “Crime Reporting System” is as shown in Appendix B.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    42/106

    Main Project Crime Automation & ReportingSystem

    ARCHITECTURAL DESIGN

    a) Program Structure

    The product entitled “Crime Reporting System” follows bottom up program structure.

    Description about bottom up approach:-

    In a bottom-up approach the individual base elements of the system are first specified

    in great detail. These elements are then linked together to form larger subsystems,

    which then in turn are linked, sometimes in many levels, until a complete top-level

    system is formed. This strategy often resembles a "seed" model, whereby the

     beginnings are small, but eventually grow in complexity and completeness. However,

    "organic strategies", may result in a tangle of elements and subsystems, developed in

    isolation, and subject to local optimization as opposed to meeting a global purpose.

    PROCEDURAL DESIGN

    Procedural design occurs after data, architectural, and interface designs must be

    translated in to operational software. The procedural design for each   component,

    represented in graphical, tabular or text based notation, is the primary work product

     produced during component level design.

    Begin

    If ((User name is valid)) and corresponding password is correct) then

    The user is an authorized person & can access the system

    Else

    Display invalid user 

    End If 

    End

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    43/106

    Main Project Crime Automation & ReportingSystem

    INTERFACE DESIGN

    External machine interface:- We need a high quality modem to connect to the

    internet. NIC i.e. network interface card is also required to access the internet.TCP/IP

    and http are the protocols used. If we want some hard copy of any receipts, we need a

     printer for that.

    External system interface:- Since Crime Reporting System requires a database and

    is working as online, the client machines requires proper connection with the server 

    machine.

    Human interface:- In project work entitled “Crime Reporting System” the user will

    interacts with product through Graphical User Interface (GUI) which will be

    developed in front pages. Since GUIs are the interface, workings with GUIs are very

    simple and not at all complicated. So any user who had no knowledge about softwares

    and computers can use this “Crime Reporting System” very simply.The input and output forms of “Crime Reporting System” are provided in Appendix

    C.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    44/106

    Main Project Crime Automation & ReportingSystem

    CODING

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    45/106

    Main Project Crime Automation & ReportingSystem

    CODING

    Coding in “Crime Reporting System” was done with ASP as front end and SQL

    Server as back end. A professional coding standard and style is followed to ensure the

    internationalization of the software code. Different naming conventions are used for 

    the easy evaluation of code for future tome. This makes the code for reuse and easy

    debugging for a third person. It also enhance to the international style of coding.

     

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    46/106

    Main Project Crime Automation & ReportingSystem

    SYSTEM TESTING

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    47/106

    Main Project Crime Automation & ReportingSystem

    SYSTEM TESTING

    System testing is a critical aspect of Software Quality Assurance and represents the

    ultimate review of specification, design and coding. Testing is a process of executing

    a program with the intent of finding an error. A good test is one that has a probability

    of finding an as yet undiscovered error. The purpose of testing is to identify and

    correct bugs in the developed system. Nothing is complete without testing. Testing is

    the vital to the success of the system.

    In the code testing the logic of the developed system is tested. For this every module

    of the program is executed to find an error. To perform specification test, the

    examination of the specifications stating what the program should do and how it

    should perform under various conditions.

    Unit testing focuses first on the modules in the proposed system to locate errors. This

    enables to detect errors in the coding and logic that are contained within that module

    alone. Those resulting from the interaction between modules are initially avoided. In

    unit testing step each module has to be checked separately.

    System testing does not test the software as a whole, but rather than integration of 

    each module in the system. The primary concern is the compatibility of individual

    modules. One has to find areas where modules have been designed with different

    specifications of data lengths, type and data element name.

    Testing and validation are the most important steps after the implementation of the

    developed system. The system testing is performed to ensure that there are no errors

    in the implemented system. The software must be executed several times in order to

    find out the errors in the different modules of the system.

    Validation refers to the process of using the new software for the developed system in

    a live environment i.e., new software inside the organization, in order to find out the

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    48/106

    Main Project Crime Automation & ReportingSystem

    errors. The validation phase reveals the failures and the bugs in the developed system.

    It will be come to know about the practical difficulties the system faces when

    operated in the true environment. By testing the code of the implemented software,

    the logic of the program can be examined. A specification test is conducted to check 

    whether the specifications stating the program are performing under various

    conditions. Apart from these tests, there are some special tests conducted which are

    given below:

    1. Peak Load Tests: This determines whether the new system will handle the

    volume of activities when the system is at the peak of its processing demand.

    The test has revealed that the new software for the agency is capable of handling

    the demands at the peak time.

    2. Storage Testing: This determines the capacity of the new system to store

    transaction data on a disk or on other files. The proposed software has the

    required storage space available, because of the use of a number of hard disks.

    3. Performance Time Testing: This test determines the length of the time used bythe system to process transaction data.

    The testing steps performed in “Crime Reporting System” are given below:

    Unit testing

    Integration testing

    Validation testing

    Unit testing

    In unit testing different modules are tested against the specifications produced during

    the design of the modules. Unit testing is essential for the verification of the code

     produced during the coding phase, and hence the goal is to test the internal logic of 

    the modules.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    49/106

    Main Project Crime Automation & ReportingSystem

    The testing is carried out during the programming itself. After designing and coding

    each form they are run to see whether there are any anomalies. Some of the various

    test cases used to test the system are as follows:

    Test cases are given for testing against requirements of the unit being tested.

    Test case for path or branch covering.

    Test case for data flow coverage.

    Testing with classes of bad data

    In unit testing the program unit that make up the system are tested individually. Unit

    testing focuses first on the modules, independent of one another to locate errors. Here

    in “Crime Reporting System” unit testing contains testing like user registration test,

    login test, user updating test, agent registration test, policy registration test, customer 

    request test, premium calculation test etc. This enables to detect in coding and the

    logic with in the module alone. This testing is also used to ensure the integrity of data

    stored temporarily.

    Integration testing

    Integration testing is systematic technique for constructing the program structure,

    while at the same time conducting test to uncover errors associated with interfacing.

    That is the program is constructed and tested in small segments, which makes it easier 

    to isolate and correct.

    Invalid modules are invariably related to one another and interact in a total system.

    Each portion of the system is tested against the entire module with both testing and

    live data before the entire system is ready to be implemented. When the individual

    modules were found works satisfactory, the system integration test was carried out.

    Data was collected in such a way that all program paths could be covered. Using these

    data a complete test was made. All outputs were generated. Different users were

    allowed to work on the system to check its performance.

    So here in “Crime Reporting System” integration testing contains administrative

    module, customer module and login with administrative and customer module.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    50/106

    Main Project Crime Automation & ReportingSystem

    Validation testing

    At the culmination of the integration testing, the software was completely assembled

    as package, interfacing errors have been uncovered and a final series of software

    validation testing began. Here we test the system functions in manner that can be

    reasonably expected by customer, the system was tested against system requirement

    specification. Different unusual inputs that the users may use were assumed and the

    outputs were verified for such unprecedented inputs. Deviation or errors discovered at

    this step are corrected prior to the completion of this project with the help of user by

    negotiating to establish a method for resolving deficiencies. Thus the proposed system

    under consideration has been tested by using validation testing and found to be

    working satisfactorily.

    TEST RESULTS 

    The primary goal of software implementation is the production of 

    source code that is easy to read and understand. Clarification of source code helps in

    easier debugging, testing and modification. Source code clarification is enhanced by

    structural coding techniques, by good coding style, by appropriate supporting

    documents, by good internal comments and by the features provided in the modern

     programming language.

    In our implementation phase, source code contains both global and formal

    variables. It contains predefined functions as well as the user defined functions. The

    result of the new system is compared with the old system and supposes the result is

    wrong the error must be debugged.

    After the acceptance of the system by the user, the existing system must

     be replaced by this new system. Any user can work in this package very easily. It does

    not require any intensive training for the user. Procedures and functions in the system

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    51/106

    Main Project Crime Automation & ReportingSystemare very simple that any one can understand and correspondingly act to the system with

    no difficulty.

    Test Cases 

    User Authentication:

    Functions Tested Expected Result Test  

     Result 

    User should enter both User  Name and password

    When the user enters only one or none loginscreen will displayed with error message

    Asexpected

    Logout when user wants todiscontinue login section Displaying the user logout successfully Asexpected

     

    Integer Field Check:

    Checking whether a particular text field, which is supposed to receive

    only integers, is receiving any other characters. 

    Input Value Expected Result Result  

    123 Display Pass

    Dqwe Doesn’t Display Pass

    $#*>.) Doesn’t Display Pass

     

    Field Checking: 

    Function Tested Expected Result Test Result  

     Name The name of the user is entered here. It cancontain only characters and blank space

    TestSuccessful

    Mobile-Phone, Zipcode, Date of Birth

    This should only contain numbers. Testsuccessful

     

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    52/106

    Main Project Crime Automation & ReportingSystem

    IMPLEMETATION

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    53/106

    Main Project Crime Automation & ReportingSystem

    IMPLEMENTATION

    The next stage after testing is implementation. Generally implementation is referred to

    conversion of a new system design to an operational one. It also deals with the training

    of operators. An implementation plan is to be made before starting the actual

    implementation of the system. Implementation is the stage where the theoretical design

    is converted into a working system. The newly proposed system is implemented after 

    the successful testing of the system.

    Implementation Methods

    The term implementation has different meanings, ranging from the conversion of a

     basic application to a complete replacement of a computer system. The procedure,

    however, is virtually the same. Implementation is used here to mean the process for 

    converting a new or revised system into an operational one. Conversion is one aspect

    of implementation. The other aspects are the post implementation review and software

    maintenance.

    There are three types of implementation:

    Implementation of a computer system to replace a manual system.

    Implementation of a new computer system to replace an existing one.

    Implementation of a modified application to replace an existing one.

    Conversion means changing from one system to another. That is data in the old

    format is run through a program, or a series of programs, to convert it into the new

    format. Conversion can also be from one hardware medium to another. The objective

    is to put the tested system into operation while holding costs, risk and personnel

    irritation to a minimum. It involves :-

    Creating computer compatible files.

    Training the operating staff.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    54/106

    Main Project Crime Automation & ReportingSystem

    Installing terminals and hardware.

    A problem for management is discovering, at integration time, that pieces of modules

    simply do not fit together. Such problem will arise when charge is made to only one

    copy of the design document. When integration is completed, the product as whole is

    tested, this is termed product testing. When the developers are confident about the

    correction of every aspect of product, it is handled over to the client for acceptance

    testing.

    Implementation Plan

    The implementation plan includes a description of all the activities that must occur to

    implement the new system and to put it into operation. It identifies the personnel

    responsible for the activities and prepares a time chart for implementing the system.

    The implementation plan consists of the following steps.

    List all files required for implementation.

    Identify all data required to build new files during the implementation.

    List all new documents and procedures that go into the new system.

    The implementation plan should anticipate possible problems and must be able to deal

    with them. The usual problems may be missing documents; mixed data formats

     between current and files, errors in data translation, missing data etc.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    55/106

    Main Project Crime Automation & ReportingSystem

    SOFTWARE MAINTENANCE

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    56/106

    Main Project Crime Automation & ReportingSystem

    SOFTWARE MAINTENANCE

    Security

    Any system developed should be secured and protected against possible

    hazards. Security measures are provided to prevent unauthorized access of the database

    at various levels. An uninterrupted power supply should be so that the power failure or 

    voltage fluctuations will not erase the data in the files.

    Threats to System’s Security

    The lists of potential threats are :

    Disgruntled and dishonest users

    Fire

    Errors and omissions

     Natural disasters

    External attacks

    System Security Measurements

    Identification

    It is scheme for identifying persons to the system based on ‘something

    you know’ such as password. In the Smart College system, the student, staff, and the

    librarian are given passwords for identification purpose during registration process.

    Access Control

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    57/106

    Main Project Crime Automation & ReportingSystem

    Controlling access to computer databases is essential. In the Smart

    College system only the administrator has given the access to the tables.

    Audit Control

    Auditing must be supported at all levels of management. Audit controls

     protect system from external security breaches and internal fraud or embezzle men.

    Various software programs are available to help in the audit function.

    System Integrity

    This line of defense safeguards the functioning of the hardware,

    software, physical security and operating procedures. Proper backup of hardware and

    software are extremely important. Password protection and simple procedures to

    change the unauthorized access are provided to the users. The system allows the user 

    to enter the system only through login.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    58/106

    Main Project Crime Automation & ReportingSystem

    We may define Software Maintenance by describing for activities that are undertaken

    after a program is released for use.

    1. Corrective Maintenance

    The first maintenance activity occurs since it is unreasonable to assume that software

    testing will uncover all errors in a large software system.

    2. Adaptive Maintenance

    This activity that contributes to the definition of maintenance occurs since rapid

    change is encountered in every aspect if computing.

    3. Perceptive Maintenance

    This activity involves recommendation for new capability modifications to the

    existing functions and general enhancements when software is used.

    4. Preventive Maintenance

    This activity occurs when software is changed to improve further maintainability and

    reliability.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    59/106

    Main Project Crime Automation & ReportingSystem

    FUTURE ENHANCEMENT

    Anything cannot be ended in a single step. It is the fact that nothing permanent

    in this world. So this utility also has some future enhancements in the evergreen and

     booming IT industry. Change is inevitable. The project entitled “Crime Reporting

    System” was successfully designed developed and tested. The system and the

    architecture is a compatible one, so addition of new modules can be done without

    much difficulty. Since this module has its unique properties it can extend further to

    make this system a complete one.

    Scope of further development

    The various Future Enhancement which shall include in this software are:

    We look forward to working with the Government in implementing the

    recommendations and seeing an improvement in the effectiveness of the organization

    The method of video conferencing can be added to make the project more lively

    An intercom facility will add a little more flexible communication between the

    Master and Branch In Charge, Master and Members, etc.

     Not withstanding this drive and progress, the Panel believes that more fundamental

    changes are needed. It hopes that the recommendation made in this report will assist

    in changing the culture around partnership.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    60/106

    Main Project Crime Automation & ReportingSystem

    CONCLUSION

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    61/106

    Main Project Crime Automation & ReportingSystem

    CONCLUSION

    The Software developed is found to be working efficiently and effectively. It results in

    regular and timely action against crime reported. It can be observed that the information

    can be obtained easily and accurately.

    The Software is made user friendly to the maximum so that any lay man can run the

    software provided he could access to the system via the login password.

    It believes that partnership work is highly beneficial to the organization and that

     partnership work is the way forward to reduce crime and disorder 

    Hence, we wish to remind that its culture should fully endorse partnership work; we

    urge to ensure the attention they require.

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    62/106

    Main Project Crime Automation & ReportingSystem

     

    Appendix A (DATA FLOW DIAGRAMS)

    Level 0 DFD 

    login request

      crimereport

    details response 

    Level 1.0 DFD (admin)

      request details

      details

    request

      details

      details

    Dept. of B.C.A. Chinmaya Vidyapeet

    Crime Automation

    & Reporting

    System

    users

    crimedescription

    station

    assignstation

     complaints

    admin  registration

      login

    stationprocesse

    s

     login

    passwordusername

  • 8/15/2019 Crime Reporting System Project Report

    63/106

    Main Project Crime Automation & ReportingSystem

    Level 1.1 DFD (citizen)

    request details

     

    details

    Dept. of B.C.A. Chinmaya Vidyapeet

    crimedescription

    citizen  registration

      login

    complaints

     

    login

    passwordusername

  • 8/15/2019 Crime Reporting System Project Report

    64/106

    Main Project Crime Automation & ReportingSystem

    Level 1.2 DFD (station)

      request details

      details

    request

    details

    Dept. of B.C.A. Chinmaya Vidyapeet

      crimeclose

    station  registration

      login

    crimeprocesse

    s

     login

    passwordusername

      fir 

    criminaldetails

    newteamregister 

    teammember 

    victim

    witness

    close

    crime

    crimedescription

    advocate

    crimedescription

  • 8/15/2019 Crime Reporting System Project Report

    65/106

    Main Project Crime Automation & ReportingSystem

    Level 2.0 DFD (admin)

     request details

    complaints

    response

    details

    crimeid

    Dept. of B.C.A. Chinmaya Vidyapeet

      admin station

    approval

    station

    viewcomplaints

    crimedescription

    assignstation

    assignstation

  • 8/15/2019 Crime Reporting System Project Report

    66/106

    Main Project Crime Automation & ReportingSystem

    Level 2.1 DFD (citizen)

     request details

    details

     

    response

    crimeid

    Dept. of B.C.A. Chinmaya Vidyapeet

      citizen sendcomplaints

    viewaccepted

    complaints

    crimestatus crimeclose

    crimedescription

  • 8/15/2019 Crime Reporting System Project Report

    67/106

    Main Project Crime Automation & ReportingSystem

    Level 2.2. 0  DFD (station) 

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    68/106

    Main Project Crime Automation & ReportingSystem

    Level 2.2. 1  DFD (station) 

    request details

     criid

    responsedetails

    crimeid

    Dept. of B.C.A. Chinmaya Vidyapeet

      station view

    complaints

    crimedescription

    avocationprocesses

    criminaldetails

    closecrime

    assignstation

    advocate

    crimedescription

  • 8/15/2019 Crime Reporting System Project Report

    69/106

    Main Project Crime Automation & ReportingSystem

    Appendix B (TABLES)

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    70/106

    Main Project Crime Automation & ReportingSystem

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    71/106

    Main Project Crime Automation & ReportingSystem

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    72/106

    Main Project Crime Automation & ReportingSystem

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    73/106

    Main Project Crime Automation & ReportingSystem

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    74/106

  • 8/15/2019 Crime Reporting System Project Report

    75/106

    Main Project Crime Automation & ReportingSystem

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    76/106

    Main Project Crime Automation & ReportingSystem

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    77/106

    Main Project Crime Automation & ReportingSystem

    Appendix C (INPUT & OUTPUT FORMS)

    Login Page

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    78/106

    Main Project Crime Automation & ReportingSystem

    Citizen Registration Form

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    79/106

    Main Project Crime Automation & ReportingSystem

    Citizen Login

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    80/106

    Main Project Crime Automation & ReportingSystem

    Citizen Home Page

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    81/106

    Main Project Crime Automation & ReportingSystem

    Citizen Profile Page

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    82/106

    Main Project Crime Automation & ReportingSystem

    Send Complaints

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    83/106

    Main Project Crime Automation & ReportingSystem

    Case Status

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    84/106

    Main Project Crime Automation & ReportingSystem

    Station Registration Form

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    85/106

    Main Project Crime Automation & ReportingSystem

    Admin Login

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    86/106

    Main Project Crime Automation & ReportingSystem

    View Station

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    87/106

    Main Project Crime Automation & ReportingSystem

    Station Approval

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    88/106

    Main Project Crime Automation & ReportingSystem

    View Complaints

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    89/106

    Main Project Crime Automation & ReportingSystem

    Assign Station

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    90/106

    Main Project Crime Automation & ReportingSystem

    Station Login

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    91/106

    Main Project Crime Automation & ReportingSystem

    Station Home Page

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    92/106

    Main Project Crime Automation & ReportingSystem

    Station Profile

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    93/106

    Main Project Crime Automation & ReportingSystem

    View Complaints

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    94/106

    Main Project Crime Automation & ReportingSystem

    Criminal Details Entry

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    95/106

    Main Project Crime Automation & ReportingSystem

    FIR 

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    96/106

    Main Project Crime Automation & ReportingSystem

    Team Registration

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    97/106

    Main Project Crime Automation & ReportingSystem

    Team Members Entry

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    98/106

    Main Project Crime Automation & ReportingSystem

    Victim Details Entry

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    99/106

    Main Project Crime Automation & ReportingSystem

    Witness Details Entry

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    100/106

    Main Project Crime Automation & ReportingSystem

    Arrest Details

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    101/106

    Main Project Crime Automation & ReportingSystem

    Avocation Details

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    102/106

    Main Project Crime Automation & ReportingSystem

    Close Crime

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    103/106

    Main Project Crime Automation & ReportingSystem

    Search Crime

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    104/106

    Main Project Crime Automation & ReportingSystem

    FIR Quest

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    105/106

    Main Project Crime Automation & ReportingSystem

    BIBLIOGRAPHY

    Dept. of B.C.A. Chinmaya Vidyapeet

  • 8/15/2019 Crime Reporting System Project Report

    106/106

    Main Project Crime Automation & ReportingSystem

    BIBLIOGRAGHY

    Reference Books

    1. Active Server Pages for Dummies. IDG Books worldwide, 2001

    2. Scott Stabbert, Authentication and Security for Internet developers

    3. All India Reporter 

    4. Kerala Law Times Journal

    5. Indian Law Reporter 

    Reference Sites

    1. Howard, Michael. “Microsoft Internet Information Server Security”

    URLs

    http://www.highcourtofkerala.com/ 

    http://www.casecitation.com/

    http://www/http://www.casecitation.com/http://www/http://www.casecitation.com/