0% found this document useful (0 votes)
22 views41 pages

Crime Record2

The document is a technical report on the 'Crime Record Management System' submitted by S. Kavya and T. Sai Kumar as part of their Bachelor of Technology degree requirements at Jawaharlal Nehru Technological University, Hyderabad. It outlines the project's objectives, existing and proposed systems, feasibility studies, and various modules including citizen registration, complaint processing, and crime details management. The report emphasizes the need for an efficient online system to enhance crime record management across police stations in India.

Uploaded by

kavyakushi076
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views41 pages

Crime Record2

The document is a technical report on the 'Crime Record Management System' submitted by S. Kavya and T. Sai Kumar as part of their Bachelor of Technology degree requirements at Jawaharlal Nehru Technological University, Hyderabad. It outlines the project's objectives, existing and proposed systems, feasibility studies, and various modules including citizen registration, complaint processing, and crime details management. The report emphasizes the need for an efficient online system to enhance crime record management across police stations in India.

Uploaded by

kavyakushi076
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

A TECHNICAL REPORT

On

“Crime Record Management System”


Submitted to

Jawaharlal Nehru Technological University, Hyderabad

Bachelor of Technology
in
Computer Sciences and Engineering
By
S. KAVYA [17621A0536]
T. SAI KUMAR [17621A0540]

Deparement of Computer Sciences and Engineering

Aurora's Engineering College


(Affiliated to JNTUH, Approved by AICTE, New Delhi)
Abids (V), Hyderabad(M), Hyderabad Dist.-500 001.

0
Aurora's Engineering College
(Affiliated to JNTUH, Approved by AICTE, New Delhi)
Abids (V), Hyderabad(M), Hyderabad Dist.-500 001.

Department of Computer Sciences Engineering

CERTIFICATE

This is to certify that the project entitled “Crime Record Management System” has
been submitted by S.Kavya(17621A0536), T. Sai Kumar (17621A0540), in the partial fulfilment
of the requirements for the award of degree of Bachelor of Technology in Computer Science and
Engineering from Jawaharlal Nehru Technological University, Hyderabad. The results embodied
in this project have not been submitted to any other University or Institution for the award of any
degree or diploma.

prof. K. CHANDRA SHEKAR Ms. MANIPUSHPA


PRINCIPAL HOD - CSE

1
Aurora's Engineering College
(Affiliated to JNTUH, Approved by AICTE, New Delhi)
Abids (V), Hyderabad(M), Hyderabad Dist.-500 001.

Department of Computer Sciences Engineering

DECLARATION

We hereby declare that the project entitled “Crime Record Management


system” submitted in the partial fulfillment of the requirements for the award of
degree of Bachelor of Technology in COMPUTER SCIENCE AND
ENGINEERING. This dissertation is our original work and the project has not
formed the basis for the award of any degree, associate-ship, fellowship or any
other similar titles and no part of it has been published or sent for the
publication at the time of submission.
S.KAVYA [17621A0536]
T.SAI KUMAR [17621A0540]

2
ACKNOWLEDGEMENT

There are many people who helped me directly and indirectly to complete my project
successfully. I would like to take this opportunity to thank one and all.

First of all I would like to express my deep gratitude towards my internal guide
for his/her support in the completion of my dissertation. I wish to express my sincere thanks
to Ms. MANIPUSHPA, HOD, Department of CSE and also to Principal prof. K. CHANDRA
SHEKAR for providing the facilities to complete the dissertation.

I would like to thank all our faculty, coordinators and friends for their help and
constructive criticism during the project period. Finally, I am very much indebted to our parents
for their moral support and encouragement to achieve goals.

S.KAVYA [17621A0536]
T.SAI KUMAR [17621A0540]

3
ABSTRACT

The Crime Records Management System applies to all the Police Stations across the
country and specifically looks into the subject crime prevention, detection, conviction of
criminals depending on the highly responsive backbone of Information Management. The
efficiency of the Police and the effectiveness with which it tackles crime depending upon what
quality of information it can derive from its existing records.

4
CONTENT

Table of content Page no

CERTIFICATE 1
DECLARATION 2
ACKNOWLEDGEMENT 3
ABSTRACT 4

1
. INTRODUCTION
7
2. ORGANISATION PROFILE 9

3. PROBLEM DEFINITION 11

4. SYSTEM 12

4.1 EXISTING SYSTEM 12

4.2 PROPOSED SYSTEM 12


5. FEASIBILITY STUDY 14

5.1 TECHNICAl FEASIBILITY 14

5.2 OPERATIONAL FEASIBILITY 15

5.3 ECONOMICAL FEASIBILITY 15

6. PROJECT OVERVIEW 16

7. DEFINATION ACRONYMS ABBREVIATIONS 19


8. SYSTEMREQUIREMENTS 20

5
9.TECHNOLOGIES 21

10.SYSTEMDESIGN 27

11.DATADASEDESIGN 33

12.TESTREPORTANDTESTPLAN 35

13.CONCLUSION 39

14.BIBLIOGRAPHY

40

6
1.INTRODUCTION

Project analysis:
1. Citizen
2. Station
3. Crime
4. Search
5. Administrators
Avocation

Project modules
Module1: Citizen
Citizens, who have the complaints, get registered by entering the details like name,
address, phone numbers etc. Citizens can sign-in and register their complaints

Module2: Station
Deals with processing of complaints, creating FIR, entering victim and witness details.

Module3: Crime
All details about the crime like date and time, police station where it is recorded, place,
nature of Crime, Location of the Crime will be maintained.

Module4: Search

7
For searching the crime in station wise, nature of crime.

Module5: Administrators
Maintenance of Master data, removal of old and outdated data.

Module 6: Avocation:
Deals with the Law part of every crime.

Software Requirements:
Operating System : Windows XP Service Pack2
Technology : Java/J2EE (Servlets, JSP, JDBC)
Web Technology : HTML, JavaScript, CSS
Web Server : Tomcat 6.0
Database : Oracle 10g Express Edition
Software’s : JDK 1.6

Hardware Requirements:
Hardware : Pentium based systems with a minimum of P4
RAM : 256MB (minimum)

8
2. ORGANIZATION PROFILE

ECIL was setup under the department of Atomic Energy in the year 1967 with a view to
generate a strong indigenous capability in the field of professional grade electronic. The initial
accent was on Self-reliance and ECIL was engaged in the Design Development Manufacture and
Marketing of several products emphasis on three technology lines viz. Computers, control
system and communications. ECIL thus evolved as a multi-product company serving multiple
sectors of Indian economy with emphasis on import of country substitution and development
of products and services that are of economic and strategic significance to the country.
Electronics of India Li (ECIL) entered into collaboration with OSI system Inc.
(www.osi-system.con) and set up a joint venture "ECIL_RAPSICAN, U.K, U.S.A with the same
state of art Technology, Requisite Technology is supplied by RAPSICAN and the final product is
manufactured at ECIL facility.
Recognizing the need for generating quality IT professional and to meet the growing
demand of IT industry, a separate division namely CED has been established to impart quality
and professional IT training under brand name of ECIT. ECIT, the prestigious offshoot of ECIL is
an emerging winner and is at the fore front of IT education in the country.

MISSION
ECIL's mission is to consolidate its status as a valued national asset in the area of
strategic electronics with specific focus on Atomic Energy, Defense, Security and such critical
sectors of strategic national importance.

OBJECTIVES
To continue services to the country's needs for peaceful uses Atomic Energy. Special and
strategic requirements of Defense and Space, Electronics security system and support for civil
aviation sector. To establish newer Technology products such as container scanning system and

9
Explosive Detectors. To re-engineer the company to become nationally competitive by paying
particular attention to delivery, cost and quality in all its activities.
To explore new avenues of business and work for growth in strategic sectors in addition
to working realizing technological solutions for the benefit of society in areas like agriculture,
Education, Health, Power, Transportation, Food, Disaster Management etc.

DIVISIONS
The company is organized into divisions serving various sectors, national and commercial
Importance. They are Divisions serving nuclear sector like control and Automation Division
(CAD), Instruments and System Division(ISD), Division Serving defence sector like
communications Division (CND), Antenna products Division (APD), Servo System Division(SSD)
etc. Division handling Commercial products are Telecom Division (TCD), Customer Support
Division (CSD), Computer Education Division (CED).

EXPORTS
ECIL is currently operating in major business EXPORT segment like instruments and system
design, Industrial/Nuclear, Servo System, Antenna Products, Communication, Control and
Automation and several other components.

SERVICES
The company played a very significant role in the training and growth of high caliber
technical and managerial manpower especially in the fields of Computer and Information
Technology. Though the initial thrust was on meeting the control and instrumentation
requirements of Nuclear Power Program, the expanded scope of self-reliance pursed by ECIL
enabled the company to develop various products to cater to the needs of Defence, Civil
Aviation, Information and Broadcasting, Tele communications, etc.

10
3. PROBLEM DEFINITION

The workflow in CRIME RECORDS MANGEMENT SYSTEM is to maintain all the required
applications from customers, details of employees and customers in the form of papers or files.
A bid problem arises, if those papers are lost, as they are essential for all the works to get done.
Reconstruction of all the lost work requires much time and more man power.
In order to make a perfect and secured workflow, we have to use new way, which is
completely through online. This should include all the required tasks like Customers applying
for registration, adding complaints and employees issuing all the status to customers who have
launched a complaint. Admin has the details of all the citizens he gives the tasks to do.
To design this site, Security issues are to be considered with care, providing complete
security to all the users and data is essential.

11
4. SYSTEM ANALYSIS

EXISTING SYSTEM
In the existing system only the users can see details of particular information about the
Police stations in our state, the existing system have more workload for the authorized person.
Large amount of files and records are to be handled in this system. As previously developed
Crime Records Management system only deals that when a citizen enters an FIR number then
the system only displays whether the case is cleared or not but it does not provide the complete
details of the case.

In the existing system,


1. The existing system is time consuming.
2. It does not provide authentication for the citizens.
3. Man cases are piled up in the corners, which are not proved and which may be a path for
the newly added cases cannot be gathered together.
4. The citizens cannot register their complaints through online.
5. In the existing system there are no Avocation facilities.

PROPOSED SYSTEM
In the proposed system, the aim of the project is to bring about improvement to the
organization’s contribution.
Advantages of the Proposed System:
1. Every individual has an unique id and he/she can access the data and status of
the crime by sign-in account.
2. We can add notifications to the admin such as update or remove the stations
which are not responding.
3. The product provides a framework within which a user can easily communicate
with the station manager and administrative.

12
4. Complete separation of the access data based on roles: Citizens Stations and
Administrator.
5. Ensures data access authentication.
6. Dynamically updating the crime and status of the complaints.
7. We can include feedback of the citizen.
8. We can include search option for the complete crime details.
9. Avocation is implemented in the proposed system.

13
5. EASIBILITY STUDY
Preliminary investigation examine project feasibility, the likelihood the system will be useful
to the organization. The main objective of the feasibility study is to test the Technical,
Operational and Economical feasibility for adding new modules and debugging old running
system. All system is feasible if they are unlimited resources and infinite time. There are aspects
in the feasibility study portion of the preliminary investigation:
 Technical Feasibility
 Operational Feasibility
 Economical Feasibility

TYPES OF FEASIBILITY:

TECHNICAL FEASIBILITY
Technical Feasibility centers on the existing computer system hardware, software, etc.
and to some extent how it can support the proposed addition. This involves financial
considerations to accommodate technical enhancements. Technical support is also a reason for
the success of the project. The techniques needed for the system should be available and it
must be reasonable to use. Technical Feasibility is mainly concerned with the study of function,
performance, and constraints that may affect the ability to achieve the system. By conducting
an efficient technical feasibility we need to ensure that the project works to solve the existing
problem area.
Since the project is designed with ASP.NET with C# as Front end and SQL Server 2000 as
Back end, it is easy to install in all the systems wherever needed. It is more efficient, easy and
user-friendly to understand by almost everyone. Huge amount of data can be handled
efficiently using SQL Server as back end. Hence this project has good technical feasibility.

14
OPERATIONAL FEASIBILITY
People are inherently instant to change and computers have been known to facilitate
change. An estimate should be made to how strong a reaction the user staff is likely to have
towards the development of the computerized system
The staff is accustomed to computerized systems. These kinds of systems are becoming
more common day by day for evaluation of the software engineers. Hence, this system is
operationally feasible. As this system is technically, economically and operationally feasible, this
system is judged feasible.

ECONOMICAL FEASIBILITY
The role of interface design is to reconcile the differences that prevail among the software
engineer’s design model, the designed system meet the end user requirement with economical
way at minimal cost within the affordable price by encouraging more of proposed system.
Economic feasibility is concerned with comparing the development cost with the income/benefit
derived from the developed system. In this we need to derive how this project will help the
management to take effective decisions.
Economic Feasibility is mainly concerned with the cost incurred in the implementation of the
software. Since this project is developed using ASP.NET with C# and SQL Server which is
more commonly available and even the cost involved in the installation process is not high.
Similarly it is easy to recruit persons for operating the software since almost all the people are
aware of ASP.NET with C# and SQL Server. Even if we want to train the persons in these area
the cost involved in training is also very less. Hence this project has good economic feasibility.
The system once developed must be used efficiently. Otherwise there is no meaning for
developing the system. For this a careful study of the existing system and its drawbacks are
needed.

15
6. PROJECT OVERVIEW
The main idea for developing this project is to develop online application for improving
complaint system through online for a police department. This application will help citizens to
file a complaint through website which will be time saving and fast problem solving method.
Crime Record Management System applications will be implemented in every police station
all over the country which will concentrate on handling complaints, prevention of crime by
interconnection police information system to different police stations the country. Using this
application information handling will be easy and fast and solving cases will be fast. Any
number of clients can connect to the server. Each user first makes their login to server to show
their availability.

PROJECT MODULES
1. CITIZEN
2. STATION
3. CRIME
4. SEARCH
5. ADMINISTRATORS
6. AVOCATION

CITIZEN
Each of the citizens, who has a complaint to register, must first register with the software.
For registration part, each should following details:
 Name
 Password
 Email-id
 Phone number
 Gender
 Date of Birth
 Address

16
 Status
 Proof.
STATION
Each of the station must first register with the software. Administrator will add all the
stations with the following details:
 Station ID
 Password
 Station name
 Location
 Head of the Station
 No of officers
 No of cases registered
 No of cases cleared
CRIME
This module is used for entering all details about the crime. It contains the date and time,
police station where it is recorded, place, and nature of the crime, location of the crime will be
maintained. Crimes can be added by station and citizen.
 Crime ID
 Name of the Crime
 Location of the Crime
 Date of the Crime
 Time of the Crime
 Other Details about crime

SEARCH
Searches the crime in station-wise, nature of the crime or by date of the crime and
location recorded in the particular police station.

ADMINISTRATORS

17
This module will be protected by user id and password. Ordinary users of the software will not
be permitted to enter in to their area of the software. The module will be focusing on the
maintenance and removal of old outdated data from software.

AVOCATION
Deals with the law part of every crime. It includes all the details of laws like ‘section
numbers’, ‘act numbers’ according to the crime.

OBJECTIVES
It enables the administrator to perform operations based on citizen id like voting,
passport, gas, personal information, credit rating, etc.

Administrator
 He is treated as a owner of the web site.
 He should also have rights to accept the registration of the Citizen based on their profile
(unless the Citizen should not able to login to the site).
 He should able to verify the information for a citizen to identify them
 He should be able to edit, delete, and update Citizen Profiles.
 Should able to add/edit the Fields of particular Department like should able to add/edit
the field along with Validation rules.
 Should able to add/edit Department details.
 Should Generate the Citizen code automatically with the help of web services.
 Should Accept/Reject the details given by the Citizen about a particular department and
send his conformation information to them.

Register Managers
Administrator can able to register new Manager for each department to process the citizen or
guest requests. The manager can send status information in the half of administrator

18
7.DEFINITION ACRONYMS ABBREVIATIONS

ABBREVIATIONS
HTTP : Hypertext Transfer Protocol
HTML : Hyper Text Markup Language
URL : Uniform Resource Locator
SRS : Software Requirement Specification
WWW : World Wide Web
CTO : Central time officer

DEFINITIONS
HTTP
Hypertext Transfer Protocol is the set of rules for transferring files text, graphic images,
sound, video, and other multimedia files on the World Wide Web.

HTML
Hypertext Markup Language (HTML) is a language to specify the structure of documents of
retrieval across the Internet using the browser programs of the World Wide Web.

XML
The Extensible Markup Language (XML) is a general-purpose markup language. It is classified
as an extensible language because it allows its users to define their own tags.

19
8.SYSTEM REQUIREMENTS

Hardware Requirements

 Hardware : Pentium based systems with a minimum of P4.


 RAM : 256MB (minimum)

Software Requirements

 Operating System : Windows XP Service Pack2.


 Technology : Java/J2EE (Servlets, JSP, JDBC).
 Web technology : HTML, JavaScript, CSS.
 Web Server : Tomcat 6.0
 Database : Oracle 10g Express Edition.
 Software’s : JDK 1.6

20
9. TECHNOLOGIES

Languages Used:
In this project, we chose Java language for developing the code.

JAVA:

Java is a programming language originally developed by James Gosling at Sun Microsystems


(which is now a subsidiary of Oracle Corporation) and released in 1995 as a core component Sun
Microsystems’ Java platform. The language derives much of its syntax from C & C++ but has a
simpler object model and fewer low –level facilities. Java applications are typically compiled to
byte code (class file) that can run on any Java Virtual Machine (JVM) regardless of computer
architecture. Java is general - purpose, concurrent, class-based and object-oriented and is
specifically designed to have as few implementation dependencies as possible. It is intended to
let application developers “write once run anywhere”. Java is considered by many as one of the
most influential programming languages of the 20 th century, and is widely used from application
software to web applications.

The original and reference implementation java compilers, virtual machines and class libraries
were developed by Sun from 1995. As of May 2007 in compliance with the specifications of the
Java Community Process, Sun relicensed most of its Java technologies under the GNU General
Public License. Others have also developed alternative implementations of these Sun
technologies, such as GNU compiler for Java and GNU class path.

Principles:
There were five primary goals in the creation of the Java language:
1. It should be “simple, object-oriented and familiar”.
2. It should be “robust and secure”.
3. It should be “architecture neutral and portable”.
4. It should execute with “high performance”.

21
5. It should be “interpreted, threaded, and dynamic”.

FEATURES OF JAVA:

Platform Independent:
The concept of Write-once-run-anywhere (known as platform independent) is one of
the important key feature of Java language that makes java as the most powerful
language. Unlike many other programming languages including C and C++ when Java is
compiled, it is not compiled into platform specific machine, rather into independent
byte code. This byte code is distributed over the web and interpreted by Java virtual
Machine (JVM) on whichever platform it is being run.
 Simple:
Java is designed to be easy to learn. If you understand the basic concept of
OOPS, java would be easy to master.
 Object Oriented:
In java everything is an object. To be an object-oriented language, any language
must follow at least the four characteristics.
 Inheritance:
Inheritance is the process by which one object acquires the properties of another
object
 Encapsulation:
It is the mechanism of combining information & providing the abstraction.
 Polymorphism:
Polymorphism is the way of providing different functionality by the functions
having the same name based on the signatures of the methods.
 Distributed:
The widely used protocols like HTTP and FTP are developed in java. Internet
programmers can call functions on these protocols and can access the files from
any remote machine on the internet rather than writing codes on their local
system.

22
 Portable:
The feature Write-once –run-anywhere makes the java language portable
provided that the system must have interpreter for the JVM. Java also has the
standard data size irrespective of operating system or the processor. These
features makes the java as a portable language.
 Dynamic:
While executing the java program the user can get the required files dynamically
from a local drive or from a computer thousands of miles away from the user just
by connecting with the internet.
Java is considered to be more dynamic than C or C++ since it is designed to
adapt to an evolving environment. Java programs can carry extensive amount of
run-time information that can be used to verify and resolve accesses to object on
run-time
 Secure:
With Java secure feature it enabled to develop virus-free, tamper-free systems.
Authentication techniques are based on public-key encryption.
 Performance:
Java uses native code usage, and light weight process called threads. In the
beginning interpretation of byte code resulted the performance slow but the
advance version of JVM uses the adaptive and just in time compilation technique
that improves the performance.
 Multithreaded:
Java is also multithreaded programming language. Multithreading means a single
program has multiple threads executing independently at the same time. Multiple
threads execute instructions according to the program code in a process or
program. Multithreading works the similar way as multi processes run on one
computer. Multithreading programming is very interesting concept in java. In
multithreaded programs not even a single thread disturbs the execution of other

23
thread. Threads are obtained from the pool of available ready to run threads and
they run on the system CPUs.

Advantages of JAVA:
 It is an open source, so users do not have to struggle with heavy license fees each
year.
 Platform independent.Java API’s can easily be accessed by developers.Java
supports garbage collection, so memory management is automatic.
 Java always allocates objects on the stack.
 Java embraced the concept of exception specifications.
 Multi-platform support language and support for web-services.
 Using Java we can develop dynamic web applications.
 It allows you to create modular programs and reusable codes.

JAVA SERVER PAGES:

Java server pages is a simple but powerful technology used to generate dynamic web
pages on the server side. JSP’s are direct extension of java servlets and provide a way to separate
content generation from content presentation.

FEATURES OF JSP:

Portability
Java Server Pages files can be run on any web server or web-enabled application
server that provides support for them. Dubbed the JSP engine, this support involves
recognition, translation and management of the Java Server Page lifecycle and its
interaction components.

Components

24
It was mentioned that the Java Server Pages architecture can include reusable Java
components. The architecture also allows for the embedding of a scripting language
directly into the Java Server Pages file. The components current supported include Java
Beans and Servlets.
Processing

A Java Server Pages file is essentially an HTML document with JSP scripting or tags.
The Java Server Pages file has extension to the server as a Java Server Pages file. Before
the page is served, the Java Server Pages syntax is parsed and processed into a Servlet
on the server side. The Servlet that is generated outputs real content in straight HTML
for responding to the client.

HTML:

HTML, which stands for Hypertext Markup Language, is the predominant markup language for
web pages. It provides a means to create structured documents by denoting structural semantics
for text such as headings, paragraphs, lists, links, quotes and other items. It allows images and
object to be embedded and can be used to create interactive forms. It is written in the form of
HTML elements consisting of “tags” surrounded by angle brackets within the web page content.
It can embed scripts in languages such as JavaScript which affect the behavior of HTML web
pages. HTML can also be used to include Cascading Style Sheets (CSS) to define the appearance
and layout of text and other material. The W3C, maintainer of both HTML and CSS standards,
encourages the use of CSS over explicit presentational markup.

HTML TAGS:

Basic HTML Tags:

<!-- --> Specifies comments

<A>………</A> Creates hypertext links

<B>……….</B> Formats text as bold

25
<BIG>…….</BIG> Formats text in large font

<BODY>……</BODY> Contains all tags and text in the HTML documents

<CENTER>…….</CENTER> Aligns text center

<DD>………….</DD> Definition of a term

<DL>…………..</DL> Creates definition list

<FONT>……….</FONT> Formats text with a particular font

<FORM>……….</FORM> Encloses a fill-out form

<FRAME>……….</FRAME> Defines a particular frame in a set of frames

<H#>…………….</H#> Creates headings of different levels

<HEAD>………</HEAD> Contains tags that specify information about a document

<HR>…………</HR> Creates a horizontal rule

<HTML>………</HTML> Contains all other HTML tags

<META>……..</META> Provides meta-information about a document

<SCRIPT>………</SCRIPT> Contains client-side or server-side script

<TABLE>………</TABLE> Creates a table

<TR>………</TR> Designates a table row

<TH>………</TH> Creates a heading in a table

Advantages:
 A HTML document is small and hence easy to send over the net.
 It is small because it does not include formatted information.
 HTML is platform independent.HTML tags are not case-sensitive.

26
10. SYSTEM DESIGN
Use Case Diagrams:

Each use case on the diagram represents a single task that the system needs
to carry out. Buy a Product, Add Client, Make Purchase and Validate Order
Information are all examples of use cases. Some use cases may include or
extend a task represented by another use case. For example, in order to make
a purchase, the order information will need to be validated.

Over all Use Cases


Employee Information

Employee Police Station


Can
Information Master
Hav
e

Designation
Has
Master

Department
Can
Master
Work
for

27
Police Station Master

Police Station Designation


Master Has
Master

Victims FIR Master Territory


Has
Master
Crime
Category
Has Master

Victims
FIR Master

Can Victims Master


Have

Employee
Has
Master
One In
charge

Login Master

Login Master Profile


Has
Master

Department
Has 28
Employee
Master
Use Case Diagrams
The actors who have been identified in the system are as follows:

1. Investigating officer

2. Administrator

3. Writer
Investigating officer: He is the actor who can practically work upon the existing data in the
police station only for view purpose.

29
Administrator: He is the actor who has the full-length potentiality and privilege to carry
out transactions upon the system. He is authorized to maintain consistency within the
information.

30
Writer: He is the actor who can enter all the details of the crime or evidence. Once entered
cannot be edited. Only the administrator can edit or delete the record from the database.

31
32
11.DATABASE DESIGN

TABLES
ADD STATION

CRIMINAL DETAILS

33
CITIZEN REGSITRATION

STATION REGISTRATION

34
12.TEST REPORT AND TEST PLAN

INTRODUCTION
Test Reports, Test Plan:
Software testing is a process of validating and verifying that a software program
/application/product meets:
1. The business and technical requirements that guided its design and development
2. Works as expected can be implemented with the same characteristics.

Purpose:
A primary purpose for testing is to detect software failures so that defects may be
uncovered and corrected. Software testing includes examination of code as well as execution of
that code in various environments and conditions.
It also includes examining the aspects of code: does it do what it is supposed to do and do what it
needs to do. Information derived from software testing may be used to correct the process by
which software is developed.
Testing Methods:
Software testing methods are divided into White, Black and Grey box testing. These
approaches are used to describe the point of view that a test engineer takes when designing test
cases.
White Box Testing:

White box testing is done when the tester has access to the internal data
structuresand algorithms including the code that implements it.

Black Box Testing:

Black box testing treats the software as a “black box” without any knowledge of internal
implementation.

35
Grey Box Testing:

Grey box testing involves having knowledge of internal data structures and algorithms
for purpose of designing the test cases, but testing at the user, or black-box level.
Grey box testing may also include reverse engineering to determine, for instance,
boundary values or error messages.
Testing Levels:
Tests are frequently grouped by where they are added in the software development process, or by
the level of specificity of the test.

Unit Testing:

Unit testing refers to tests that verify the functionality of a specific section of code,
usually at the function level. In the object-oriented environment, this usually at class
level, and the minimal unit tests include the constructors and destructors.

Integration testing:

Integration testing is any type of software testing that seeks to verify the interfaces
between COMPONENTS
System testing:

System testing tests a completely integrated system to verify that it meets its
requirements.

System Integration Testing:

36
System integration testing verifies that a system is integrated to any external or third
party systems defined in the system requirements.

Test Report :
Project Name: CRIME RECORDS MANAGEMENT SYSTEM
Form Name: Login
Unit Name: User-id, Password
Test Result: After entering two fields the user successfully logs into the system

Test Plan :
Unit id : Login
Test Case id : User-id
Test Type : Unit Testing
Form Name : Login
Base Table : Admin/Citizen/Station
Purpose : To give access to the user after he/she enters valid user-id and password.
Description:
User id : varchar (40)
Password : varchar (40)
Test data:

Serial No. Input Specification Output Specification


1 User id: Navigates to the respective
Valid Input home pages.

Invalid input It will ask to enter correct


values again.
2 Password:

37
Valid Input Navigates to the respective
home page.
Invalid input It will ask to enter correct
values again.

Test Process:
Login form will be used for allowing the correct user to use the software. Every person will be
given a user id and password. After successful login the user can use the software as per the
privileges given to him. The user id will be entered in the textbox given for user id. The
password will be entered in the textbox given for password.

Test completion criteria:


When expected results match the actual results after performing the test, the test is considered to
be complete.

38
13. CONCLUSION

The Crime Records Management System is a web-based application for primarily providing
training to the employees who provide customized solutions to meet organizational needs.

This application software has been computed successfully and was also tested
successfully by taking “test cases”. It is user friendly, and has required options, which can be
utilized by the user to perform the desired operations.
The software is developed using ASP.Net as front end and SQL as back end in Windows
environment. The goals that are achieved by the software are:
 Instant access.
 Improved productivity.
 Optimum utilization of resources.
 Efficient management of records.
 Simplification of the operations.
 Less processing time and getting required information.
 User friendly.

39
14. BIBLIOGRAPHY

www.java.com
www.oracle10g.com
www.google.com
The Complete Reference Java Fourth Edition

40

You might also like