Crime Record2
Crime Record2
On
Bachelor of Technology
in
Computer Sciences and Engineering
By
S. KAVYA [17621A0536]
T. SAI KUMAR [17621A0540]
0
Aurora's Engineering College
(Affiliated to JNTUH, Approved by AICTE, New Delhi)
Abids (V), Hyderabad(M), Hyderabad Dist.-500 001.
CERTIFICATE
This is to certify that the project entitled “Crime Record Management System” has
been submitted by S.Kavya(17621A0536), T. Sai Kumar (17621A0540), in the partial fulfilment
of the requirements for the award of degree of Bachelor of Technology in Computer Science and
Engineering from Jawaharlal Nehru Technological University, Hyderabad. The results embodied
in this project have not been submitted to any other University or Institution for the award of any
degree or diploma.
1
Aurora's Engineering College
(Affiliated to JNTUH, Approved by AICTE, New Delhi)
Abids (V), Hyderabad(M), Hyderabad Dist.-500 001.
DECLARATION
2
ACKNOWLEDGEMENT
There are many people who helped me directly and indirectly to complete my project
successfully. I would like to take this opportunity to thank one and all.
First of all I would like to express my deep gratitude towards my internal guide
for his/her support in the completion of my dissertation. I wish to express my sincere thanks
to Ms. MANIPUSHPA, HOD, Department of CSE and also to Principal prof. K. CHANDRA
SHEKAR for providing the facilities to complete the dissertation.
I would like to thank all our faculty, coordinators and friends for their help and
constructive criticism during the project period. Finally, I am very much indebted to our parents
for their moral support and encouragement to achieve goals.
S.KAVYA [17621A0536]
T.SAI KUMAR [17621A0540]
3
ABSTRACT
The Crime Records Management System applies to all the Police Stations across the
country and specifically looks into the subject crime prevention, detection, conviction of
criminals depending on the highly responsive backbone of Information Management. The
efficiency of the Police and the effectiveness with which it tackles crime depending upon what
quality of information it can derive from its existing records.
4
CONTENT
CERTIFICATE 1
DECLARATION 2
ACKNOWLEDGEMENT 3
ABSTRACT 4
1
. INTRODUCTION
7
2. ORGANISATION PROFILE 9
3. PROBLEM DEFINITION 11
4. SYSTEM 12
6. PROJECT OVERVIEW 16
5
9.TECHNOLOGIES 21
10.SYSTEMDESIGN 27
11.DATADASEDESIGN 33
12.TESTREPORTANDTESTPLAN 35
13.CONCLUSION 39
14.BIBLIOGRAPHY
40
6
1.INTRODUCTION
Project analysis:
1. Citizen
2. Station
3. Crime
4. Search
5. Administrators
Avocation
Project modules
Module1: Citizen
Citizens, who have the complaints, get registered by entering the details like name,
address, phone numbers etc. Citizens can sign-in and register their complaints
Module2: Station
Deals with processing of complaints, creating FIR, entering victim and witness details.
Module3: Crime
All details about the crime like date and time, police station where it is recorded, place,
nature of Crime, Location of the Crime will be maintained.
Module4: Search
7
For searching the crime in station wise, nature of crime.
Module5: Administrators
Maintenance of Master data, removal of old and outdated data.
Module 6: Avocation:
Deals with the Law part of every crime.
Software Requirements:
Operating System : Windows XP Service Pack2
Technology : Java/J2EE (Servlets, JSP, JDBC)
Web Technology : HTML, JavaScript, CSS
Web Server : Tomcat 6.0
Database : Oracle 10g Express Edition
Software’s : JDK 1.6
Hardware Requirements:
Hardware : Pentium based systems with a minimum of P4
RAM : 256MB (minimum)
8
2. ORGANIZATION PROFILE
ECIL was setup under the department of Atomic Energy in the year 1967 with a view to
generate a strong indigenous capability in the field of professional grade electronic. The initial
accent was on Self-reliance and ECIL was engaged in the Design Development Manufacture and
Marketing of several products emphasis on three technology lines viz. Computers, control
system and communications. ECIL thus evolved as a multi-product company serving multiple
sectors of Indian economy with emphasis on import of country substitution and development
of products and services that are of economic and strategic significance to the country.
Electronics of India Li (ECIL) entered into collaboration with OSI system Inc.
(www.osi-system.con) and set up a joint venture "ECIL_RAPSICAN, U.K, U.S.A with the same
state of art Technology, Requisite Technology is supplied by RAPSICAN and the final product is
manufactured at ECIL facility.
Recognizing the need for generating quality IT professional and to meet the growing
demand of IT industry, a separate division namely CED has been established to impart quality
and professional IT training under brand name of ECIT. ECIT, the prestigious offshoot of ECIL is
an emerging winner and is at the fore front of IT education in the country.
MISSION
ECIL's mission is to consolidate its status as a valued national asset in the area of
strategic electronics with specific focus on Atomic Energy, Defense, Security and such critical
sectors of strategic national importance.
OBJECTIVES
To continue services to the country's needs for peaceful uses Atomic Energy. Special and
strategic requirements of Defense and Space, Electronics security system and support for civil
aviation sector. To establish newer Technology products such as container scanning system and
9
Explosive Detectors. To re-engineer the company to become nationally competitive by paying
particular attention to delivery, cost and quality in all its activities.
To explore new avenues of business and work for growth in strategic sectors in addition
to working realizing technological solutions for the benefit of society in areas like agriculture,
Education, Health, Power, Transportation, Food, Disaster Management etc.
DIVISIONS
The company is organized into divisions serving various sectors, national and commercial
Importance. They are Divisions serving nuclear sector like control and Automation Division
(CAD), Instruments and System Division(ISD), Division Serving defence sector like
communications Division (CND), Antenna products Division (APD), Servo System Division(SSD)
etc. Division handling Commercial products are Telecom Division (TCD), Customer Support
Division (CSD), Computer Education Division (CED).
EXPORTS
ECIL is currently operating in major business EXPORT segment like instruments and system
design, Industrial/Nuclear, Servo System, Antenna Products, Communication, Control and
Automation and several other components.
SERVICES
The company played a very significant role in the training and growth of high caliber
technical and managerial manpower especially in the fields of Computer and Information
Technology. Though the initial thrust was on meeting the control and instrumentation
requirements of Nuclear Power Program, the expanded scope of self-reliance pursed by ECIL
enabled the company to develop various products to cater to the needs of Defence, Civil
Aviation, Information and Broadcasting, Tele communications, etc.
10
3. PROBLEM DEFINITION
The workflow in CRIME RECORDS MANGEMENT SYSTEM is to maintain all the required
applications from customers, details of employees and customers in the form of papers or files.
A bid problem arises, if those papers are lost, as they are essential for all the works to get done.
Reconstruction of all the lost work requires much time and more man power.
In order to make a perfect and secured workflow, we have to use new way, which is
completely through online. This should include all the required tasks like Customers applying
for registration, adding complaints and employees issuing all the status to customers who have
launched a complaint. Admin has the details of all the citizens he gives the tasks to do.
To design this site, Security issues are to be considered with care, providing complete
security to all the users and data is essential.
11
4. SYSTEM ANALYSIS
EXISTING SYSTEM
In the existing system only the users can see details of particular information about the
Police stations in our state, the existing system have more workload for the authorized person.
Large amount of files and records are to be handled in this system. As previously developed
Crime Records Management system only deals that when a citizen enters an FIR number then
the system only displays whether the case is cleared or not but it does not provide the complete
details of the case.
PROPOSED SYSTEM
In the proposed system, the aim of the project is to bring about improvement to the
organization’s contribution.
Advantages of the Proposed System:
1. Every individual has an unique id and he/she can access the data and status of
the crime by sign-in account.
2. We can add notifications to the admin such as update or remove the stations
which are not responding.
3. The product provides a framework within which a user can easily communicate
with the station manager and administrative.
12
4. Complete separation of the access data based on roles: Citizens Stations and
Administrator.
5. Ensures data access authentication.
6. Dynamically updating the crime and status of the complaints.
7. We can include feedback of the citizen.
8. We can include search option for the complete crime details.
9. Avocation is implemented in the proposed system.
13
5. EASIBILITY STUDY
Preliminary investigation examine project feasibility, the likelihood the system will be useful
to the organization. The main objective of the feasibility study is to test the Technical,
Operational and Economical feasibility for adding new modules and debugging old running
system. All system is feasible if they are unlimited resources and infinite time. There are aspects
in the feasibility study portion of the preliminary investigation:
Technical Feasibility
Operational Feasibility
Economical Feasibility
TYPES OF FEASIBILITY:
TECHNICAL FEASIBILITY
Technical Feasibility centers on the existing computer system hardware, software, etc.
and to some extent how it can support the proposed addition. This involves financial
considerations to accommodate technical enhancements. Technical support is also a reason for
the success of the project. The techniques needed for the system should be available and it
must be reasonable to use. Technical Feasibility is mainly concerned with the study of function,
performance, and constraints that may affect the ability to achieve the system. By conducting
an efficient technical feasibility we need to ensure that the project works to solve the existing
problem area.
Since the project is designed with ASP.NET with C# as Front end and SQL Server 2000 as
Back end, it is easy to install in all the systems wherever needed. It is more efficient, easy and
user-friendly to understand by almost everyone. Huge amount of data can be handled
efficiently using SQL Server as back end. Hence this project has good technical feasibility.
14
OPERATIONAL FEASIBILITY
People are inherently instant to change and computers have been known to facilitate
change. An estimate should be made to how strong a reaction the user staff is likely to have
towards the development of the computerized system
The staff is accustomed to computerized systems. These kinds of systems are becoming
more common day by day for evaluation of the software engineers. Hence, this system is
operationally feasible. As this system is technically, economically and operationally feasible, this
system is judged feasible.
ECONOMICAL FEASIBILITY
The role of interface design is to reconcile the differences that prevail among the software
engineer’s design model, the designed system meet the end user requirement with economical
way at minimal cost within the affordable price by encouraging more of proposed system.
Economic feasibility is concerned with comparing the development cost with the income/benefit
derived from the developed system. In this we need to derive how this project will help the
management to take effective decisions.
Economic Feasibility is mainly concerned with the cost incurred in the implementation of the
software. Since this project is developed using ASP.NET with C# and SQL Server which is
more commonly available and even the cost involved in the installation process is not high.
Similarly it is easy to recruit persons for operating the software since almost all the people are
aware of ASP.NET with C# and SQL Server. Even if we want to train the persons in these area
the cost involved in training is also very less. Hence this project has good economic feasibility.
The system once developed must be used efficiently. Otherwise there is no meaning for
developing the system. For this a careful study of the existing system and its drawbacks are
needed.
15
6. PROJECT OVERVIEW
The main idea for developing this project is to develop online application for improving
complaint system through online for a police department. This application will help citizens to
file a complaint through website which will be time saving and fast problem solving method.
Crime Record Management System applications will be implemented in every police station
all over the country which will concentrate on handling complaints, prevention of crime by
interconnection police information system to different police stations the country. Using this
application information handling will be easy and fast and solving cases will be fast. Any
number of clients can connect to the server. Each user first makes their login to server to show
their availability.
PROJECT MODULES
1. CITIZEN
2. STATION
3. CRIME
4. SEARCH
5. ADMINISTRATORS
6. AVOCATION
CITIZEN
Each of the citizens, who has a complaint to register, must first register with the software.
For registration part, each should following details:
Name
Password
Email-id
Phone number
Gender
Date of Birth
Address
16
Status
Proof.
STATION
Each of the station must first register with the software. Administrator will add all the
stations with the following details:
Station ID
Password
Station name
Location
Head of the Station
No of officers
No of cases registered
No of cases cleared
CRIME
This module is used for entering all details about the crime. It contains the date and time,
police station where it is recorded, place, and nature of the crime, location of the crime will be
maintained. Crimes can be added by station and citizen.
Crime ID
Name of the Crime
Location of the Crime
Date of the Crime
Time of the Crime
Other Details about crime
SEARCH
Searches the crime in station-wise, nature of the crime or by date of the crime and
location recorded in the particular police station.
ADMINISTRATORS
17
This module will be protected by user id and password. Ordinary users of the software will not
be permitted to enter in to their area of the software. The module will be focusing on the
maintenance and removal of old outdated data from software.
AVOCATION
Deals with the law part of every crime. It includes all the details of laws like ‘section
numbers’, ‘act numbers’ according to the crime.
OBJECTIVES
It enables the administrator to perform operations based on citizen id like voting,
passport, gas, personal information, credit rating, etc.
Administrator
He is treated as a owner of the web site.
He should also have rights to accept the registration of the Citizen based on their profile
(unless the Citizen should not able to login to the site).
He should able to verify the information for a citizen to identify them
He should be able to edit, delete, and update Citizen Profiles.
Should able to add/edit the Fields of particular Department like should able to add/edit
the field along with Validation rules.
Should able to add/edit Department details.
Should Generate the Citizen code automatically with the help of web services.
Should Accept/Reject the details given by the Citizen about a particular department and
send his conformation information to them.
Register Managers
Administrator can able to register new Manager for each department to process the citizen or
guest requests. The manager can send status information in the half of administrator
18
7.DEFINITION ACRONYMS ABBREVIATIONS
ABBREVIATIONS
HTTP : Hypertext Transfer Protocol
HTML : Hyper Text Markup Language
URL : Uniform Resource Locator
SRS : Software Requirement Specification
WWW : World Wide Web
CTO : Central time officer
DEFINITIONS
HTTP
Hypertext Transfer Protocol is the set of rules for transferring files text, graphic images,
sound, video, and other multimedia files on the World Wide Web.
HTML
Hypertext Markup Language (HTML) is a language to specify the structure of documents of
retrieval across the Internet using the browser programs of the World Wide Web.
XML
The Extensible Markup Language (XML) is a general-purpose markup language. It is classified
as an extensible language because it allows its users to define their own tags.
19
8.SYSTEM REQUIREMENTS
Hardware Requirements
Software Requirements
20
9. TECHNOLOGIES
Languages Used:
In this project, we chose Java language for developing the code.
JAVA:
The original and reference implementation java compilers, virtual machines and class libraries
were developed by Sun from 1995. As of May 2007 in compliance with the specifications of the
Java Community Process, Sun relicensed most of its Java technologies under the GNU General
Public License. Others have also developed alternative implementations of these Sun
technologies, such as GNU compiler for Java and GNU class path.
Principles:
There were five primary goals in the creation of the Java language:
1. It should be “simple, object-oriented and familiar”.
2. It should be “robust and secure”.
3. It should be “architecture neutral and portable”.
4. It should execute with “high performance”.
21
5. It should be “interpreted, threaded, and dynamic”.
FEATURES OF JAVA:
Platform Independent:
The concept of Write-once-run-anywhere (known as platform independent) is one of
the important key feature of Java language that makes java as the most powerful
language. Unlike many other programming languages including C and C++ when Java is
compiled, it is not compiled into platform specific machine, rather into independent
byte code. This byte code is distributed over the web and interpreted by Java virtual
Machine (JVM) on whichever platform it is being run.
Simple:
Java is designed to be easy to learn. If you understand the basic concept of
OOPS, java would be easy to master.
Object Oriented:
In java everything is an object. To be an object-oriented language, any language
must follow at least the four characteristics.
Inheritance:
Inheritance is the process by which one object acquires the properties of another
object
Encapsulation:
It is the mechanism of combining information & providing the abstraction.
Polymorphism:
Polymorphism is the way of providing different functionality by the functions
having the same name based on the signatures of the methods.
Distributed:
The widely used protocols like HTTP and FTP are developed in java. Internet
programmers can call functions on these protocols and can access the files from
any remote machine on the internet rather than writing codes on their local
system.
22
Portable:
The feature Write-once –run-anywhere makes the java language portable
provided that the system must have interpreter for the JVM. Java also has the
standard data size irrespective of operating system or the processor. These
features makes the java as a portable language.
Dynamic:
While executing the java program the user can get the required files dynamically
from a local drive or from a computer thousands of miles away from the user just
by connecting with the internet.
Java is considered to be more dynamic than C or C++ since it is designed to
adapt to an evolving environment. Java programs can carry extensive amount of
run-time information that can be used to verify and resolve accesses to object on
run-time
Secure:
With Java secure feature it enabled to develop virus-free, tamper-free systems.
Authentication techniques are based on public-key encryption.
Performance:
Java uses native code usage, and light weight process called threads. In the
beginning interpretation of byte code resulted the performance slow but the
advance version of JVM uses the adaptive and just in time compilation technique
that improves the performance.
Multithreaded:
Java is also multithreaded programming language. Multithreading means a single
program has multiple threads executing independently at the same time. Multiple
threads execute instructions according to the program code in a process or
program. Multithreading works the similar way as multi processes run on one
computer. Multithreading programming is very interesting concept in java. In
multithreaded programs not even a single thread disturbs the execution of other
23
thread. Threads are obtained from the pool of available ready to run threads and
they run on the system CPUs.
Advantages of JAVA:
It is an open source, so users do not have to struggle with heavy license fees each
year.
Platform independent.Java API’s can easily be accessed by developers.Java
supports garbage collection, so memory management is automatic.
Java always allocates objects on the stack.
Java embraced the concept of exception specifications.
Multi-platform support language and support for web-services.
Using Java we can develop dynamic web applications.
It allows you to create modular programs and reusable codes.
Java server pages is a simple but powerful technology used to generate dynamic web
pages on the server side. JSP’s are direct extension of java servlets and provide a way to separate
content generation from content presentation.
FEATURES OF JSP:
Portability
Java Server Pages files can be run on any web server or web-enabled application
server that provides support for them. Dubbed the JSP engine, this support involves
recognition, translation and management of the Java Server Page lifecycle and its
interaction components.
Components
24
It was mentioned that the Java Server Pages architecture can include reusable Java
components. The architecture also allows for the embedding of a scripting language
directly into the Java Server Pages file. The components current supported include Java
Beans and Servlets.
Processing
A Java Server Pages file is essentially an HTML document with JSP scripting or tags.
The Java Server Pages file has extension to the server as a Java Server Pages file. Before
the page is served, the Java Server Pages syntax is parsed and processed into a Servlet
on the server side. The Servlet that is generated outputs real content in straight HTML
for responding to the client.
HTML:
HTML, which stands for Hypertext Markup Language, is the predominant markup language for
web pages. It provides a means to create structured documents by denoting structural semantics
for text such as headings, paragraphs, lists, links, quotes and other items. It allows images and
object to be embedded and can be used to create interactive forms. It is written in the form of
HTML elements consisting of “tags” surrounded by angle brackets within the web page content.
It can embed scripts in languages such as JavaScript which affect the behavior of HTML web
pages. HTML can also be used to include Cascading Style Sheets (CSS) to define the appearance
and layout of text and other material. The W3C, maintainer of both HTML and CSS standards,
encourages the use of CSS over explicit presentational markup.
HTML TAGS:
25
<BIG>…….</BIG> Formats text in large font
Advantages:
A HTML document is small and hence easy to send over the net.
It is small because it does not include formatted information.
HTML is platform independent.HTML tags are not case-sensitive.
26
10. SYSTEM DESIGN
Use Case Diagrams:
Each use case on the diagram represents a single task that the system needs
to carry out. Buy a Product, Add Client, Make Purchase and Validate Order
Information are all examples of use cases. Some use cases may include or
extend a task represented by another use case. For example, in order to make
a purchase, the order information will need to be validated.
Designation
Has
Master
Department
Can
Master
Work
for
27
Police Station Master
Victims
FIR Master
Employee
Has
Master
One In
charge
Login Master
Department
Has 28
Employee
Master
Use Case Diagrams
The actors who have been identified in the system are as follows:
1. Investigating officer
2. Administrator
3. Writer
Investigating officer: He is the actor who can practically work upon the existing data in the
police station only for view purpose.
29
Administrator: He is the actor who has the full-length potentiality and privilege to carry
out transactions upon the system. He is authorized to maintain consistency within the
information.
30
Writer: He is the actor who can enter all the details of the crime or evidence. Once entered
cannot be edited. Only the administrator can edit or delete the record from the database.
31
32
11.DATABASE DESIGN
TABLES
ADD STATION
CRIMINAL DETAILS
33
CITIZEN REGSITRATION
STATION REGISTRATION
34
12.TEST REPORT AND TEST PLAN
INTRODUCTION
Test Reports, Test Plan:
Software testing is a process of validating and verifying that a software program
/application/product meets:
1. The business and technical requirements that guided its design and development
2. Works as expected can be implemented with the same characteristics.
Purpose:
A primary purpose for testing is to detect software failures so that defects may be
uncovered and corrected. Software testing includes examination of code as well as execution of
that code in various environments and conditions.
It also includes examining the aspects of code: does it do what it is supposed to do and do what it
needs to do. Information derived from software testing may be used to correct the process by
which software is developed.
Testing Methods:
Software testing methods are divided into White, Black and Grey box testing. These
approaches are used to describe the point of view that a test engineer takes when designing test
cases.
White Box Testing:
White box testing is done when the tester has access to the internal data
structuresand algorithms including the code that implements it.
Black box testing treats the software as a “black box” without any knowledge of internal
implementation.
35
Grey Box Testing:
Grey box testing involves having knowledge of internal data structures and algorithms
for purpose of designing the test cases, but testing at the user, or black-box level.
Grey box testing may also include reverse engineering to determine, for instance,
boundary values or error messages.
Testing Levels:
Tests are frequently grouped by where they are added in the software development process, or by
the level of specificity of the test.
Unit Testing:
Unit testing refers to tests that verify the functionality of a specific section of code,
usually at the function level. In the object-oriented environment, this usually at class
level, and the minimal unit tests include the constructors and destructors.
Integration testing:
Integration testing is any type of software testing that seeks to verify the interfaces
between COMPONENTS
System testing:
System testing tests a completely integrated system to verify that it meets its
requirements.
36
System integration testing verifies that a system is integrated to any external or third
party systems defined in the system requirements.
Test Report :
Project Name: CRIME RECORDS MANAGEMENT SYSTEM
Form Name: Login
Unit Name: User-id, Password
Test Result: After entering two fields the user successfully logs into the system
Test Plan :
Unit id : Login
Test Case id : User-id
Test Type : Unit Testing
Form Name : Login
Base Table : Admin/Citizen/Station
Purpose : To give access to the user after he/she enters valid user-id and password.
Description:
User id : varchar (40)
Password : varchar (40)
Test data:
37
Valid Input Navigates to the respective
home page.
Invalid input It will ask to enter correct
values again.
Test Process:
Login form will be used for allowing the correct user to use the software. Every person will be
given a user id and password. After successful login the user can use the software as per the
privileges given to him. The user id will be entered in the textbox given for user id. The
password will be entered in the textbox given for password.
38
13. CONCLUSION
The Crime Records Management System is a web-based application for primarily providing
training to the employees who provide customized solutions to meet organizational needs.
This application software has been computed successfully and was also tested
successfully by taking “test cases”. It is user friendly, and has required options, which can be
utilized by the user to perform the desired operations.
The software is developed using ASP.Net as front end and SQL as back end in Windows
environment. The goals that are achieved by the software are:
Instant access.
Improved productivity.
Optimum utilization of resources.
Efficient management of records.
Simplification of the operations.
Less processing time and getting required information.
User friendly.
39
14. BIBLIOGRAPHY
www.java.com
www.oracle10g.com
www.google.com
The Complete Reference Java Fourth Edition
40