New Microsoft Word Document
New Microsoft Word Document
The proposed system applies to all Police stations across the country and specifically looks into
the subject of Crime Records Management. It is well understood that Crime Prevention,
Detection and Conviction of criminals depend on a highly responsive backbone of Information
Management. The efficiency of the police function and the effectiveness with which it tackles
crime depend on what quality of information it can derive from its existing records and how fast
it can have access to it.
It is proposed to centralize Information Management in Crime for the purposes of fast and
efficient sharing of critical information across all Police Stations across the territory. Initially, the
system will be implemented across Cities and Towns and later on, be interlinked so that a
Police detective can access information across all records in the state thus helping speedy and
successful completion to cases. The System would also be used to generate information for
pro-active and preventive measures for fighting crime.
The project has been planned to be having the view of distributed architecture, with centralized
storage of the database. The application for the storage of the data has been planned. Using
the constructs of SQL server and all the user interfaces have been designed using the DOT Net
technologies. The standards of security and data protective mechanism have been given a big
choice for proper usage. The application takes care of different modules and their associated
reports, which are produced as per the applicable strategies and standards that are put
forwarded by the administrative staff.
CONTENTS
1. Introduction
2. System Analysis
2.1. Analysis Model
2.2. Existing System
2.3. Problem Statement
2.4. Proposed System
3.1. Product Overview
3.2. Hardware Requirements
3.3. Software Requirements
3.4. Performance Requirements
4. System Design
4.1. Introduction
4.2. Data flow Diagrams
5. Testing
6. Technical Notes
6.1. DOTNET Framework
6.2. C# Introduction and Overview
7. screens
8. Conclusion
9. Future Improvement
Introduction
Overview
The entire project has been developed keeping in view of the distributed client server computing
technology, in mind. The specifications have been normalized up to 3NF to eliminate all the
anomalies that may arise due to the database transaction that are executed by the general
users and the organizational administration. The user interfaces are browser specific to give
distributed accessibility for the overall system. At all proper levels high care was taken to check
that the system manages the data consistency with proper business rules or validations. The
authentication and authorization was crosschecked at all the relevant stages. The user level
accessibility has been restricted into two zones namely. The administrative zone and the normal
user zone.
The system at any point of time can provide the details of the police station and the employees.
The system at any point of time can provide the details of victims and the registered FIR’s
The system at any point of time can provide the details of evidence and their sequence
The system at any point of time can provide the details of existing charge sheets and their
statuses.
2.1. Analysis Model
The model that is basically being followed is the WATER FALL MODEL, which states
that the phases are organized in a linear order. First of all the feasibility study is done. Once that
part is over the requirement analysis and project planning begins. If system exists one and
modification and addition of new module is needed, analysis of present system can be used as
basic model.
The design starts after the requirement analysis is complete and the coding begins after
the design is complete. Once the programming is completed, the testing is done. In this model
the sequence of activities performed in a software development project are: -
Requirement Analysis
Project Planning
System design
Detail design
Coding
Unit testing
System integration & testing
Here the linear ordering of these activities is critical. End of the phase and the output of
one phase is the input of other phase. The output of each phase is to be consistent with the
overall requirement of the system. Some of the qualities of spiral model are also incorporated
like after the people concerned with the project review completion of each of the phase the work
done.
WATER FALL MODEL was being chosen because all requirements were known
beforehand and the objective of our software development is the computerization/automation of
an already existing manual working system.
The existing system doesn’t have system security. That means, the user can login in to system
any where in the world. But the data in this system is not for public. To avoid this problem, the
proposed system is developed as MAC enabled website. That means, the user can access the
website in that system only, so that we can avoid the information leakage problem.
The system after careful analysis has been identified to be presented with the following
modules:
Police stations registration module: This module maintains the information about all the police
stations that are registered as per the jurisdiction of the system. It also gets integrated with the
employees who are working in these stations along with their designation.
Victims FIR registration module: This module maintains the information related to the first
investigation report of the crime sequences that have taken place. The Fir registers all that a
data that is necessary for the investigation to take place in proper length. It identifies the crime
category and the crime nature.
Investigating evidence registration module: This module makes a collection of information
related to all the evidences that become categorically important under the normal sequence of
the investigation, this module dynamically concentrates upon the changes that take place while
the system of investigation is under process.
3.1. Overview
Purpose: The main purpose for preparing this document is to give a general insight into the
analysis and requirements of the existing system or situation and for determining the operating
characteristics of the system.
User Tier: The use interface is developed is a browses specific environment to have distributed
architecture. The components are designed using HTML standards and Java server pages
power the dynamic of the page design.
The requirement specification for any system can be broadly stated as given below:
The system should be able to interface with the existing system
The system should be accurate
The system should be better than the existing system
The existing system is completely dependent on the user to perform all the duties.
4. System design
4.1 Introduction
Software design sits at the technical kernel of the software engineering process and is
applied regardless of the development paradigm and area of application. Design is the first step
in the development phase for any engineered product or system. The designer’s goal is to
produce a model or representation of an entity that will later be built. Beginning, once system
requirement have been specified and analyzed, system design is the first of the three technical
activities -design, code and test that is required to build and verify software.
The importance can be stated with a single word “Quality”. Design is the place where
quality is fostered in software development. Design provides us with representations of software
that can assess for quality. Design is the only way that we can accurately translate a customer’s
view into a finished software product or system. Software design serves as a foundation for all
the software engineering steps that follow. Without a strong design we risk building an unstable
system – one that will be difficult to test, one whose quality cannot be assessed until the last
stage.
During design, progressive refinement of data structure, program structure, and
procedural details are developed reviewed and documented. System design can be viewed
from either technical or project management perspective. From the technical point of view,
design is comprised of four activities – architectural design, data structure design, interface
design and procedural design.
1. The DFD shows flow of data, not of control loops and decision are controlled considerations do
not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process whether the dataflow take
place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
4.2.4 Data Flow:
1) A Data Flow has only one direction of flow between symbols. It may flow in both directions
between a process and a data store to show a read before an update. The later is usually
indicated however by two separate arrows since these happen at different type.
2) A join in DFD means that exactly the same data comes from any of two or more different
processes data store or sink to a common location.
3) A data flow cannot go directly back to the same process it leads. There must be at least one
other process that handles the data flow produce some other data flow returns the original data
into the beginning process.
4) A Data flow to a data store means update (delete or change).
5) A data Flow from a data store means retrieve or use. A data flow has a noun phrase label more
than one data flow noun phrase can appear on a single arrow as long as all of the flows on the
same arrow move together as one package.
ER-Diagrams
The entity Relationship Diagram (ERD) depicts the relationship between the data objects. The
ERD is the notation that is used to conduct the date modeling activity the attributes of each data
object noted is the ERD can be described resign a data object descriptions.
The set of primary components that are identified by the ERD are
Data object Relationships
Attributes Various types of indicators.
The primary purpose of the ERD is to represent data objects and their relationships.
Investigating officer: He is the actor who can practically work upon the existing data in the
police station only for view purpose.
Administrator: He is the actor who has the full-length potentiality and privilege to carry out
transactions upon the system. He is authorized to maintain consistency within the information.
Writer: He is the actor who can enter all the details of the crime or evidence. Once entered
cannot be edited. Only the administrator can edit or delete the record from the database.
Use case name Login Information
Participating Administrator, Investigator, Writer
actors
Flow of events Provides username and password
Entry Condition Users must know the username and password
Exit condition User successfully logged into the system
Quality Should provide proper error messages while login into the system.
Requirements
6. Testing
Testing Methodologies:
• Black box Testing: is the testing process in which tester can perform testing on an application
without having any internal structural knowledge of application.
Usually Test Engineers are involved in the black box testing.
• White box Testing: is the testing process in which tester can perform testing on an application
with having internal structural knowledge.
Usually The Developers are involved in white box testing.
• Gray Box Testing: is the process in which the combination of black box and white box tonics
are used.
Test Planning:
Test Plan is defined as a strategic document which describes the procedure how to
perform various testing on the total application in the most efficient way.
This document involves the scope of testing,
Objective of testing.
Areas that need to be tested.
Areas that should not be tested.
Scheduling Resource Planning.
Types of Testing:
Regression Testing: is one of the best and important testing. Regression testing is the
process in which the functionality, which is already tested before, is once again tested whenever
some new change is added in order to check whether the existing functionality remains same.
Re-Testing: is the process in which testing is performed on some functionality which is
already tested before to make sure that the defects are reproducible and to rule out the
environments issues if at all any defects are there.
Static Testing: is the testing, which is performed on an application when it is not been
executed.ex: GUI, Document Testing
Dynamic Testing: is the testing which is performed on an application when it is being
executed.ex: Functional testing.
Alpha Testing: it is a type of user acceptance testing, which is conducted on an
application when it is just before released to the customer.
Beta-Testing: it is a type of UAT that is conducted on an application when it is released
to the customer, when deployed in to the real time environment and being accessed by the real
time users.
Installation Testing: it is the process of testing in which the tester try to install or try to
deploy the module into the corresponding environment by following the guidelines produced in
the deployment document and check whether the installation is successful or not.
Conclusion
FUTURE IMPROVEMENT
This System being web-based and an undertaking of Cyber Security Division, needs to
be thoroughly tested to find out any security gaps.
A console for the data centre may be made available to allow the personnel to monitor
on the sites which were cleared for hosting during a particular period.
Moreover, it is just a beginning; further the system may be utilized in various other types
of auditing operation viz. Network auditing or similar process/workflow based applications...