project blog responsive ads

Free download management system project documentation with JAVA, PHP AND ASP.NET source code. In all project report you will get introduction and objective of the project, system analysis, feasibility study, project planning, DFD diagram, system design, database design, complete project coding, and ER diagram of the project. These project reports and synopsis are useful for BCA, MCA BSC CS, MSC IT B.TECH, M.TECH and BE computer science last year students IGNOU, SMU university final year projects

Sponsored Links

CRIME RECORDS MANAGEMENT SYSTEM PROJECT REPORT

CRIME RECORDS MANAGEMENT SYSTEM PROJECT REPORT


PROJECT REPORT



ABSTRACT

The proposed system applies to all Police stations across the country and specifically looks into the subject of Crime Records Management. It is well understood that Crime Prevention, Detection and Conviction of criminals depend on a highly responsive backbone of Information Management. The efficiency of the police function and the effectiveness with which it tackles crime depend on what quality of information it can derive from its existing records and how fast it can have access to it.
It is proposed to centralize Information Management in Crime for the purposes of fast and efficient sharing of critical information across all Police Stations across the territory. Initially, the system will be implemented across Cities and Towns and later on, be interlinked so that a Police detective can access information across all records in the state thus helping speedy and successful completion to cases. The System would also be used to generate information for pro-active and preventive measures for fighting crime.

The project has been planned to be having the view of distributed architecture, with centralized storage of the database. The application for the storage of the data has been planned. Using the constructs of SQL server and all the user interfaces have been designed using the DOT Net technologies.   The standards of security and data protective mechanism have been given a big choice for proper usage. The application takes care of different modules and their associated reports, which are produced as per the applicable strategies and standards that are put forwarded by the administrative staff.


CONTENTS

1.   Introduction

1.1     Introduction to Project
1.2     Organization Profile

2.   System Analysis

2.1.      Analysis Model
2.2.      Existing System
2.3.      Problem Statement
2.4.      Proposed System

3.   Software Requirement Specification

3.1.      Product Overview
3.2.      Hardware Requirements
3.3.      Software Requirements
3.4.      Performance Requirements

4.   System Design

4.1.      Introduction
4.2.      Data flow Diagrams

5.   Testing

6.   Technical Notes

6.1.      DOTNET Framework
6.2.   C# Introduction and Overview

7.   screens

8. Conclusion
9. Future Improvement
  
                                      Introduction

1.1. Introduction to Project

Overview
The entire project has been developed keeping in view of the distributed client server computing technology, in mind. The specifications have been normalized up to 3NF to eliminate all the anomalies that may arise due to the database transaction that are executed by the general users and the organizational administration. The user interfaces are browser specific to give distributed accessibility for the overall system. At all proper levels high care was taken to check that the system manages the data consistency with proper business rules or validations. The authentication and authorization was crosschecked at all the relevant stages. The user level accessibility has been restricted into two zones namely. The administrative zone and the normal user zone.

Why new system?

Ø  The system at any point of time can provide the details of the police station and the employees.
Ø  The system at any point of time can provide the details of victims and the registered FIR’s
Ø  The system at any point of time can provide the details of evidence and their sequence
Ø  The system at any point of time can provide the details of existing charge sheets and their statuses.


2.1. Analysis Model


The model that is basically being followed is the WATER FALL MODEL, which states that the phases are organized in a linear order. First of all the feasibility study is done. Once that part is over the requirement analysis and project planning begins. If system exists one and modification and addition of new module is needed, analysis of present system can be used as basic model.
The design starts after the requirement analysis is complete and the coding begins after the design is complete. Once the programming is completed, the testing is done. In this model the sequence of activities performed in a software development project are: -
  • Requirement Analysis
  • Project Planning
  • System design
  • Detail design
  • Coding
  • Unit testing
  • System integration & testing
Here the linear ordering of these activities is critical. End of the phase and the output of one phase is the input of other phase. The output of each phase is to be consistent with the overall requirement of the system. Some of the qualities of spiral model are also incorporated like after the people concerned with the project review completion of each of the phase the work done.
WATER FALL MODEL was being chosen because all requirements were known beforehand and the objective of our software development is the computerization/automation of an already existing manual working system.


2.2 Existing System:
The existing system contains the about all the police stations that are registered as per the jurisdiction of the system. It also gets integrated with the employees who are working in these stations along with their designation.


2.3. Problem Statement:

The existing system doesn’t have system security. That means, the user can login in to system any where in the world. But the data in this system is not for public. To avoid this problem, the proposed system is developed as MAC enabled website. That means, the user can access the website in that system only, so that we can avoid the information leakage problem.



2.4. Proposed System
         

The system after careful analysis has been identified to be presented with the following modules:
Ø  Police stations registration module: This module maintains the information about all the police stations that are registered as per the jurisdiction of the system. It also gets integrated with the employees who are working in these stations along with their designation.
Ø  Victims FIR registration module: This module maintains the information related to the first investigation report of the crime sequences that have taken place. The Fir registers all that a data that is necessary for the investigation to take place in proper length. It identifies the crime category and the crime nature.
Ø  Investigating evidence registration module: This module makes a collection of information related to all the evidences that become categorically important under the normal sequence of the investigation, this module dynamically concentrates upon the changes that take place while the system of investigation is under process.



 3. Software Requirement Specification



3.1. Overview

Purpose: The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system.

Scope of the Development Project:

Database Tier:  The concentration is applied by adopting the Oracle 9i Enterprise versions. SQL is taken as the standard query language. The overall business rules are designed by using the power of PL/SQL components like stored procedures stored functions and database triggers.

User Tier: The use interface is developed is a browses specific environment to have distributed architecture. The components are designed using HTML standards and Java server pages power the dynamic of the page design.

Developer Responsibilities Overview:
The developer is responsible for:                   
  • Developing the system, which meets the SRS and solving all the requirements of the system?
  • Demonstrating the system and installing the system at client's location after the acceptance testing is successful.
  • Submitting the required user manual describing the system interfaces to work on it and also the documents of the system.
  • Conducting any user training that might be needed for using the system.
  • Maintaining the system for a period of one year after installation.      



3.2. Hardware Requirements:
  • PIV 2.8 GHz Processor and Above
  • RAM 512MB and Above
  • HDD 20 GB Hard Disk Space and Above


3.3. Software Requirements:              
  • WINDOWS OS (XP / 2000 / 200 Server / 2003 Server)
  • Visual Studio .Net 2005 Enterprise Edition
  • Internet Information Server 5.0 (IIS)


3.4. Performance Requirements:

 Performance is measured in terms of the output provided by the application.
Requirement specification plays an important part in the analysis of a system. Only when the requirement specifications are properly given, it is possible to design a system, which will fit into required environment.  It rests largely in the part of the users of the existing system to give the requirement specifications because they are the people who finally use the system.  This is because the requirements have to be known during the initial stages so that the system can be designed according to those requirements.  It is very difficult to change the system once it has been designed and on the other hand designing a system, which does not cater to the requirements of the user, is of no use.

The requirement specification for any system can be broadly stated as given below:
·         The system should be able to interface with the existing system
·         The system should be accurate
·         The system should be better than the existing system

The existing system is completely dependent on the user to perform all the duties.

                                       4. SYSTEM DESIGN


4. System design

4.1 Introduction

Software design sits at the technical kernel of the software engineering process and is applied regardless of the development paradigm and area of application. Design is the first step in the development phase for any engineered product or system. The designer’s goal is to produce a model or representation of an entity that will later be built. Beginning, once system requirement have been specified and analyzed, system design is the first of the three technical activities -design, code and test that is required to build and verify software. 
The importance can be stated with a single word “Quality”. Design is the place where quality is fostered in software development. Design provides us with representations of software that can assess for quality. Design is the only way that we can accurately translate a customer’s view into a finished software product or system. Software design serves as a foundation for all the software engineering steps that follow. Without a strong design we risk building an unstable system – one that will be difficult to test, one whose quality cannot be assessed until the last stage.
During design, progressive refinement of data structure, program structure, and procedural details are developed reviewed and documented. System design can be viewed from either technical or project management perspective. From the technical point of view, design is comprised of four activities – architectural design, data structure design, interface design and procedural design.


4.2 Data Flow Diagrams
          A data flow diagram is graphical tool used to describe and analyze movement of data through a system.  These are the central tool and the basis from which the other components are developed.  The transformation of data from input to output, through processed, may be described logically and independently of physical components associated with the system.  These are known as the logical data flow diagrams.  The physical data flow diagrams show the actual implements and movement of data between people, departments and workstations.  A full description of a system actually consists of a set of data flow diagrams.  Using two familiar notations Yourdon, Gane and Sarson notation develops the data flow diagrams. Each component in a DFD is labeled with a descriptive name.  Process is further identified with a number that will be used for identification purpose.  The development of DFD’S is done in several levels.  Each process in lower level diagrams can be broken down into a more detailed DFD in the next level.  The lop-level diagram is often called context diagram. It consists a single process bit, which plays vital role in studying the current system.  The process in the context level diagram is exploded into other process at the first level DFD.
The idea behind the explosion of a process into more process is that understanding at one level of detail is exploded into greater detail at the next level.  This is done until further explosion is necessary and an adequate amount of detail is described for analyst to understand the process.
          Larry Constantine first developed the DFD as a way of expressing system requirements in a graphical from, this lead to the modular design. 
          A DFD is also known as a “bubble Chart” has the purpose of clarifying system requirements and identifying major transformations that will become programs in system design.  So it is the starting point of the design to the lowest level of detail.  A DFD consists of a series of bubbles joined by data flows in the system.

4.2.1 Dfd Symbols:

In the DFD, there are four symbols
1.   A square defines a source(originator) or destination of system data
2.   An arrow identifies data flow.  It is the pipeline through which the information flows
3.   A circle or a bubble represents a process that transforms incoming data flow into outgoing data flows.
4.   An open rectangle is a data store, data at rest or a temporary repository of data


4.2.2 Constructing a DFD:

Several rules of thumb are used in drawing DFD’S:
Process should be named and numbered for an easy reference.  Each name should be representative of the process.
The direction of flow is from top to bottom and from left to right.  Data traditionally flow from source to the destination although they may flow back to the source.  One way to indicate this is to draw long flow line back to a source.  An alternative way is to repeat the source symbol as a destination.  Since it is used more than once in the DFD it is marked with a short diagonal.
When a process is exploded into lower level details, they are numbered.
The names of data stores and destinations are written in capital letters. Process and dataflow names have the first letter of each work capitalized. A DFD typically shows the minimum contents of data store.  Each data store should contain all the data elements that flow in and out. Questionnaires should contain all the data elements that flow in and out.  Missing interfaces redundancies and like is then accounted for often through interviews.



4.2.3 Silent Feature of DFD’s

1.   The DFD shows flow of data, not of control loops and decision are controlled considerations do not appear on a DFD.
2.   The DFD does not indicate the time factor involved in any process whether the dataflow take place daily, weekly, monthly or yearly.
3.   The sequence of events is not brought out on the DFD.
4.2.4 Data Flow:

1)   A Data Flow has only one direction of flow between symbols.  It may flow in both directions between a process and a data store to show a read before an update.  The later is usually indicated however by two separate arrows since these happen at different type.
2)   A join in DFD means that exactly the same data comes from any of two or more different processes data store or sink to a common location.
3)   A data flow cannot go directly back to the same process it leads.  There must be at least one other process that handles the data flow produce some other data flow returns the original data into the beginning process.
4)   A Data flow to a data store means update (delete or change).
5)   A data Flow from a data store means retrieve or use. A data flow has a noun phrase label more than one data flow noun phrase can appear on a single arrow as long as all of the flows on the same arrow move together as one package.


ER-Diagrams
·         The entity Relationship Diagram (ERD) depicts the relationship between the data objects. The ERD is the notation that is used to conduct the date modeling activity the attributes of each data object noted is the ERD can be described resign a data object descriptions.
·         The set of primary components that are identified by the ERD are
          u Data object       u Relationships
           u Attributes         u Various types of indicators.
·         The primary purpose of the ERD is to represent data objects and their relationships.

Unified Modeling Language Diagrams
·         The unified modeling language allows the software engineer to express an analysis model using the modeling notation that is governed by a set of syntactic semantic and pragmatic rules.
·         A UML system is represented using five different views that describe the system from distinctly different perspective. Each view is defined by a set of diagram, which is as follows.
·         User Model View
                                         i.    This view represents the system from the users perspective.
                                        ii.    The analysis representation describes a usage scenario from the end-users perspective.
Structural model view
u   In this model the data and functionality are arrived from inside the system.
u  This model view models the static structures
.
Behavioral Model View
u   It represents the dynamic of behavioral as parts of the system, depicting the interactions of collection between various structural elements described in the user model and structural model view.
Implementation Model View
u  In this the structural and behavioral as parts of the system are represented as they are to be built.
Environmental Model View
In this the structural and behavioral aspects of the environment in which the system is to be implemented are represented.
UML is specifically constructed through two different domains they are
u   UML Analysis modeling, which focuses on the user model and structural model views of the system.
u   UML design modeling, which focuses on the behavioral modeling, implementation modeling and environmental model views.
Use Case Diagrams
The actors who have been identified in the system are as follows:
1.   Investigating officer
2.   Administrator
3.   Writer



Investigating officer: He is the actor who can practically work upon the existing data in the police station only for view purpose.

Administrator: He is the actor who has the full-length potentiality and privilege to carry out transactions upon the system. He is authorized to maintain consistency within the information.

Writer: He is the actor who can enter all the details of the crime or evidence. Once entered cannot be edited. Only the administrator can edit or delete the record from the database.

Use case Description:

                    
Use case name
Login Information
Participating actors
Administrator, Investigator, Writer
Flow of events
Provides username and password
Entry Condition
Users must know the username and password
Exit condition
User successfully logged into the system
Quality Requirements
Should provide proper error messages while login into the system.

Use case name
Register Victims
Participating actors
Administrator, Writer
Flow of events
User will enter the Victims information
Entry Condition
User should know the details of the victim
Exit condition
Victim details are successfully inserted into the system.
Quality Requirements
Display proper error messages while insertion.

Use case name
Register Victims FIR
Participating actors
Administrator, Writer
Flow of events
User will register the FIR
Entry Condition
User should know the details of the FIR
Exit condition
FIR details are successfully inserted into the system.
Quality Requirements
Display proper error messages while insertion.

Use case name
Register Crime charge sheet
Participating actors
Administrator, Writer
Flow of events
User will register the crime charge sheet
Entry Condition
User should know the details of charge sheet.
Exit condition
Charge sheet details are successfully inserted into the system.
Quality Requirements
Display proper error messages while insertion.
  

Use case name
Register Investigation Evidence
Participating actors
Administrator, Writer
Flow of events
User will register the investigation evidence
Entry Condition
User should know the details of evidence.
Exit condition
Evidence details are successfully inserted into the system.
Quality Requirements
Display proper error messages while insertion.

Use case name
Register Police Station
Participating actors
Administrator
Flow of events
User will register the police station.
Entry Condition
User should know the details of police station.
Exit condition
Police station details are successfully inserted into the system.
Quality Requirements
Display proper error messages while insertion.

Use case name
View all crime details
Participating actors
Investigator
Flow of events
User can view all the crime details.
Entry Condition
Display the details of crime and evidences.
Exit condition
Evidence and crime details are successfully displayed.
Quality Requirements
N/A



6. Testing

1. The process of executing a system with the intent of finding an error.
2. Testing is defined as the process in which defects are identified, isolated, subjected for rectification and ensured that product is defect free in order to produce the quality product and hence customer satisfaction.
3. Quality is defined as justification of the requirements
4. Defect is nothing but deviation from the requirements
5. Defect is nothing but bug.
6. Testing --- The presence of bugs
7. Testing can demonstrate the presence of bugs, but not their absence
8. Debugging and Testing is not the same thing!
9. Testing is a systematic attempt to break a program or the AUT

Testing Methodologies:

• Black box Testing: is the testing process in which tester can perform testing on an application without having any internal structural knowledge of application.
Usually Test Engineers are involved in the black box testing.

• White box Testing: is the testing process in which tester can perform testing on an application with having internal structural knowledge.
Usually The Developers are involved in white box testing.

• Gray Box Testing: is the process in which the combination of black box and white box tonics are used.
 


6.1 STLC (Software Testing Life Cycle)

Test Planning:
  •  Test Plan is defined as a strategic document which describes the procedure how to perform various testing on the total application in the most efficient way.
  •  This document involves the scope of testing,
  •  Objective of testing.
  •  Areas that need to be tested.
  •  Areas that should not be tested.
  •  Scheduling Resource Planning.
Types of Testing:
  •  Regression Testing: is one of the best and important testing. Regression testing is the process in which the functionality, which is already tested before, is once again tested whenever some new change is added in order to check whether the existing functionality remains same.
  •  Re-Testing: is the process in which testing is performed on some functionality which is already tested before to make sure that the defects are reproducible and to rule out the environments issues if at all any defects are there.
  •  Static Testing: is the testing, which is performed on an application when it is not been executed.ex: GUI, Document Testing
  •  Dynamic Testing: is the testing which is performed on an application when it is being executed.ex: Functional testing.
  •  Alpha Testing: it is a type of user acceptance testing, which is conducted on an application when it is just before released to the customer.
  •  Beta-Testing: it is a type of UAT that is conducted on an application when it is released to the customer, when deployed in to the real time environment and being accessed by the real time users.
  •  Installation Testing: it is the process of testing in which the tester try to install or try to deploy the module into the corresponding environment by following the guidelines produced in the deployment document and check whether the installation is successful or not.

Conclusion

Conclusions /Project Summary

          The Crime Records Managing System is a web-based application for primarily providing training to the employees who provide customized solutions to meet organizational needs.
This application software has been computed successfully and was also tested successfully by taking “test cases”. It is user friendly, and has required options, which can be utilized by the user to perform the desired operations.
          The software is developed using Java as front end and Oracle as back end in Windows environment. The goals that are achieved by the software are:
ü  Instant access.
ü  Improved productivity.
ü  Optimum utilization of resources.
ü  Efficient management of records.
ü  Simplification of the operations.
ü  Less processing time and getting required information.
ü  User friendly.




FUTURE IMPROVEMENT



  • This System being web-based and an undertaking of Cyber Security Division, needs to be thoroughly tested to find out any security gaps.

  • A console for the data centre may be made available to allow the personnel to monitor on the sites which were cleared for hosting during a particular period.

  • Moreover, it is just a beginning; further the system may be utilized in various other types of auditing operation viz. Network auditing or similar process/workflow based applications...


1 comment:

Bala Vignesh said...

I think everyone should know such information like you have described on this post. Thank you for sharing this explanation.Your final conclusion was good.
Document Management Software India
Document Management Software Chennai
Document Management Software

G+

Pages