Crime Files Docu

Embed Size (px)

Citation preview

  • 7/31/2019 Crime Files Docu

    1/63

    1

    CHAPTER 1

    INTRODUCTION

    1.1 COMPANY PROFILE

    ABILE TECHNOLOGIES a subsidiary firm of ABILE WEB which was

    established in the year 2009, in Coimbatore, ABILE WEB has become a major force

    in providing innovative web solutions to its clients in diverse market.

    ABILE TECH is an initiative taken by ABILE WEB to address the demand

    in the field of software development and training. In Abile technologies we are

    committed to deliver quality based software solutions to our customers with our

    expertise team.

    1.2 OBJECTIVES & SERVICES

    At Abile Tech, we provide comprehensive services and integrated technical

    solutionsacross a wide variety of industries.

    Our unique end-to-end integrated approach gives us the freedom to work

    smarter and faster to identify and produce the best technology solution for our clients.

    We take pride in our comprehensive approach to application development and

    maintenance, research and development services, and infrastructure and software

    services.

    We are focused on understanding our clients business requirements,

    providing disciplined project management, and ultimately delivering effective

    solutions that simply work.

    Putting the service back in service level agreement

    Our proactive management policies incorporate specific quality guidelines,

    delivery milestones, and scheduled check-in points as part of our Service Level

    Agreement. We measure, monitor, and share our performance against defined project

    metrics and keep the communication open, clear, and focused.

  • 7/31/2019 Crime Files Docu

    2/63

    2

    Highest standards, in all the right places

    Our quality-assurance process is stringent and we keep our clients entire

    intellectual property safe by maintaining the highest security standards. iSoftStone

    solutions and methodologies are built upon a solid foundation of business partnerships

    and technical certifications including some of the worlds most rigorous approval

    credentials.

    Software training

    Looking at the increasing demand for skilled professionals in the market. With

    everyday new technology arising and challenges adding up to individuals career we

    are here to help and shape the career and make the young IT aspirants market ready.

    At Abile we welcome all IT aspirants to join our young dynamic team to learn and

    explore new technologies in an innovative way.

    Vision

    Abile Technologies has a vision to become demanding Software Company in

    the country to provide high end innovative technical solutions before 2013 and to

    transform into CMM Level 5 Company within next five years.

  • 7/31/2019 Crime Files Docu

    3/63

    3

    CHAPTER 2

    SYSTEM ANALYSIS

    INTRODUCTION

    System analysis is a process of gathering and interpreting facts, diagnosing

    problems and the information to recommend improvements on the system. It is a

    problem solving activity that requires intensive communication between the system

    users and system developers. System analysis or study is an important phase of any

    system development process. The system analyst plays the role of the interrogator and

    dwells deep into the working of the present system. The system is viewed as a whole

    and the input to the system are identified. The outputs from the organizations are

    traced to the various processes. System analysis is concerned with becoming aware of

    the problem, identifying the relevant and decisional variables, analyzing and

    synthesizing the various factors and determining an optimal or at least a satisfactory

    solution or program of action.

    A detailed study of the process must be made by various techniques like

    interviews, questionnaires etc. The data collected by these sources must be scrutinizedto arrive to a conclusion. The conclusion is an understanding of how the system

    functions. This system is called the existing system. Now the existing system is

    subjected to close study and problem areas are identified. The designer now functions

    as a problem solver and tries to sort out the difficulties that the enterprise faces. The

    solutions are given as proposals. The proposal is then weighed with the existing

    system analytically and the best one is selected. The proposal is presented to the user

    for an endorsement by the user. The proposal is reviewed on user request and suitable

    changes are made. This is loop that ends as soon as the user is satisfied with proposal.

    2.1 EXISTING SYSTEM

    In the existing system only we can see the details of particular information

    aboutthe police stations in our state, the existing system has more workload for

    the authorizedperson, but in the case of Proposed System, the user can registered in

    our site and send thecrime report and complaint about a particular city or person.

  • 7/31/2019 Crime Files Docu

    4/63

    4

    2.1.1 Drawbacks of Existing System

    More man power. Time consuming. Consumes large volume of pare work. Needs manual calculations. No direct role for the higher officials. Damage of machines due to lack of attention.

    To avoid all these limitations and make the working more accurately the system needs

    to be computerized.

    2.2 PROPOSED SYSTEM

    The aim of proposed system is to develop a system of improved facilities. The

    proposed system can overcome all the limitations of the existing system. The system

    provides proper security and reduces the manual work. The existing system has

    several disadvantages and many more difficulties to work well. The proposed system

    tries to eliminate or reduce these difficulties up to some extent. The proposed system

    will help the user to reduce the workload and mental conflict. The proposed system

    helps the user to work user friendly and he can easily do his jobs without time

    lagging.

    2.2.1 Expected Advantages of Proposed System

    The system is very simple in design and to implement. The system requires

    very low system resources and the system will work in almost all configurations. It

    has got following features

    Ensure data accuracys. Proper control of the higher officials. Reduce the damages of the machines. Minimize manual data entry. Minimum time needed for the various processing. Greater efficiency. Better service & Minimum time required User friendliness and interactive.

  • 7/31/2019 Crime Files Docu

    5/63

    5

    2.3 FEASIBILITY STUDY

    Feasibility study is made to see if the project on completion will serve the

    purpose of the organization for the amount of work, effort and the time that spend on

    it. Feasibility study lets the developer foresee the future of the project and the

    usefulness. A feasibility study of a system proposal is according to its workability,

    which is the impact on the organization, ability to meet their user needs and effective

    use of resources. Thus when a new application is proposed it normally goes through a

    feasibility study before it is approved for development.

    The document provide the feasibility of the project that is being

    designed and lists various areas that were considered very carefully during the

    feasibility study of this project such as Technical, Economic and Operational

    feasibilities.

    2.3.1 Economic Feasibility

    The developing system must be justified by cost and benefit. Criteria to

    ensure that effort is concentrated on project, which will give best, return at the

    earliest. One of the factors, which affect the development of a new system, is the cost

    it would require.

    The following are some of the important financial questions asked during

    preliminary investigation:

    The costs conduct a full system investigation. The cost of the hardware and software. The benefits in the form of reduced costs or fewer costly errors.Since the system is developed as part of project work, there is no manual cost

    to spend for the proposed system. Also all the resources are already available, it give

    an indication of the system is economically possible for development.

  • 7/31/2019 Crime Files Docu

    6/63

    6

    2.3.2 Operational / Behavioral Feasibility

    This includes the following questions:

    Is there sufficient support for the users?

    Will the proposed system cause harm?The project would be beneficial because it satisfies the objectives when

    developed and installed. All behavioral aspects are considered carefully and conclude

    that the project is behaviorally feasible.

    2.3.3 Technical Feasibility

    The system must be evaluated from the technical point of view first. The

    assessment of this feasibility must be based on an outline design of the system

    requirement in the terms of input, output, programs and procedures.

    Having identified an outline system, the investigation must go on to suggest

    the type of equipment, required method developing the system, of running the system

    once it has been designed.

    Technical issues raised during the investigation are:

    Does the existing technology sufficient for the suggested one? Can the system expand if developed?The project should be developed such that the necessary functions and

    performance are achieved within the constraints. The project is developed within

    latest technology. Through the technology may become obsolete after some period of

    time, due to the fact that never version of same software supports older versions, the

    system may still be used. So there are minimal constraints involved with this project.

    The system has been developed using ASP.NET the project is technically feasible for

    development.

  • 7/31/2019 Crime Files Docu

    7/63

    7

    CHAPTER 3

    SYSTEM SPECIFICATION

    INTRODUCTION

    A main purpose of software requirement specification is the clear definition

    and specification of functionality and of the software product. It allows the developer

    to be carried out, performance level to be obtained and corresponding interface to be

    established. This section list out the requirement for developing a software project

    monitoring system

    3.1 HARDWARE REQUIREMENTS

    Processor : Intel Pentium III and Upwards

    RAM : 256 MB

    Hard-disk Drive : 40 GB

    Monitor : 14 Mercury color

    Keyboard : 108 Keys

    Mouse : Logitech

    3.2 SOFTWARE REQUIREMENTS

    Platform : WINDOWS XP

    Front-End Tool : ASP.NET

    Back-End Tool : Microsoft SQL Server 2005

    Code Behind : C#

    Browser : Internet Explorer / Mozilla Firefox

  • 7/31/2019 Crime Files Docu

    8/63

    8

    CHAPTER 4

    SOFTWARE DESCRIPTION

    OVERVIEW OF SOFTWARE

    In the project Software project monitoring system .NET Framework is used as

    front-end tool. .NET is one of the most beautiful and recently more popular front-end

    tools. C#.NET and ASP.NET are used in this project.

    An interface for users is build-using ASP.NET. SQL Server 2005 is

    used as the back-end tool. Additional technologies used are Internet Information

    Services (IIS) and ADO.NET. Then it comes the turn of the Operating System. Any

    .NET framework compatible software platform can be used.

    4.1 FRONT END

    INTRODUCTION TO .NET

    Microsoft .NET is a software that connects information, people,

    systems and devices. It spans clients, servers and developers tools and consists of the

    .NET framework used for building and running all kinds of software including Web

    based application and smart client applications.

    Developers tools like Microsoft Visual Studio.NET 2008 provide an

    integrated development environment (IDE) for maximizing developer productivity

    with the .NET framework. C# programs run on the .NET Framework, an integral

    component of Windows that includes a virtual execution system called the commonlanguage runtime (CLR) and a unified set of class libraries. The CLR is Microsofts

    commercial implementation of the common language infrastructure (CLI), an

    international standard that is the basis for creating execution and the development

    environment in which languages and libraries work together seamlessly.

    Source code written in C# is compiled into an intermediate language

    (IL) that conforms to the CLI specification. The IL code, along with resources such as

  • 7/31/2019 Crime Files Docu

    9/63

    9

    bitmaps and strings, is stored on disk in an executable file called an assembly,

    typically with an extension of .exe or .dll.

    When the C# program is executed, the assembly is loaded into the

    CLR, which might take various actions based on the information in the manifest.

    Then, if the security requirements are met, the CLR performs just in time (JIT)

    compilation to convert the IL code into native machine instructions. The CLR also

    provides other services related to automatic garbage collection, exception handling,

    and resource management .Code that is executed by the CLR is sometimes referred to

    as managed code,in contrast to unmanaged code which is compiled into native

    machine language that targets a specific system. The following diagram illustrate the

    compile-time and run time relationships of C# source code files, the base class

    libraries, assemblies and the CLR.

    ABOUT C#.NET

    C#.net is a major component of Microsoft Visual Studio .NET suite. The

    .NET version of C# is a new improved version with more features and additions.

    Microsoft .NET is a programming and operating framework introduced by Microsoft.

    All .NET supported languages access common .NET library to develop applications

    and share common tools to execute applications. Programming with C# using .NET is

    called C#.NET.C# is an elegant and type-safe object-oriented language that enables

    developers to build a wide range of secure and robust applications that run on the

    .NET Framework. We can use C# to create traditional Windows client applications,

    XML Web services, distributed components, client-server applications, database

    applications and much more.

    Attributes, which provide declarative metadata about types at run time.

    Name Spaces

    As you have seen earlier, most of the .NET types are defined in

    namespaces. A namespace is a scope in which managed types are defined. If you see

    .NET Framework Class Library, you will see hundreds of namespaces. For example,

  • 7/31/2019 Crime Files Docu

    10/63

    10

    System namespaces contains types such as Console, Object and so on. If you want to

    access Console class, you need to import System namespaces in your application.

    A Namespace in Microsoft .Net is like containers of objects. They may

    contain unions, classes, structures, interfaces, enumerators and delegates. Main goal

    of using namespace in .Net is for creating a hierarchical organization of program. In

    this case a developer does not need to worry about the naming conflicts of classes,

    functions, variables etc., inside a project.

    ASP.NET

    ASP.NET is more than the next version of active server pages (ASP); it is

    a unified Web development platform that provides the services necessary for

    developers to build enterprises-class Web applications. While ASP.NET is largely

    syntax compatible with ASP, it provides a new programming model and infrastructure

    for more secure, scalable, and stable applications. You can feel free augmented your

    existing ASP applications by incrementally adding ASP.NET functionally to

    them.ASP.NET is a compiled, .NET based environment; you can author applications

    in any .NET compatible language, including Visual Basic .NET, C# and JScirpt.NET.

    Additionally, the entire .NET Framework is available to any ASP.NET

    applications. Developers can easily access to benefits of these technologies, which

    include the managed common language runtime environment, type safety, inheritance

    and so on.

    ASP.NET has been designed to work seamlessly with WYSIWYG (What

    You See is What You Get) HTML editors and other programming tools, including

    Microsoft Visual Studio .NET. Not only does this make a Web development easier,

    but it also provide all the benefits that these tools have to offer, including a GUI that

    developers can use to drop server controls on to a Web page and fully integrated

    debugging support.

    Internet Information Services (IIS)

    ASP.NET and IIS work together to create a server program that forrequest and creates the required objects. IIS is the software that allows your computer

  • 7/31/2019 Crime Files Docu

    11/63

    11

    become web server and remote clients to download HTML pages (or run ASP.NET

    pages). IIS is included with Microsoft windows 2000, XP and Windows .NET server.

    ADO.NET

    ADO.NET is a part of the .NET Framework and it is used to handle data

    access. With ADO.NET you can work with databases.ADO.NET is a disconnected

    database access model which means, when an application interacts with the database,

    the connection is opened to serve the request of the application and is closed as soon

    as the request is completed. Likewise, if a database is updated, the connection is

    opened long enough to complete the Update operation and is closed. By keeping

    connections open for only a minimum period of time, ADO .NET conserves system

    resources and provides maximum security for databases and also has less impact on

    system performance. Also, ADO .NET when interacting with the database uses

    XML and converts all the data into XML format for database related operations

    making them more efficient. ADO.NET consists of a set of classes used to handle data

    access. ADO.NET has, unlike ADO no record set object. Its primary benefits are:

    Ease of use. High speed. Low memory overhead. Small disk footprint.

    ADO.NET consists of two primary parts:

    i. Data providerii. Datasets

    Data provider: These classes provide access to a data source, such as a Microsoft

    SQL Server or Oracle database. Each data source has its own set of provider objects,

    but they each have a common set of utility classes:

    Datasets: Datasets objects, a group of classes describing a simple in-memory

    relational database, were the star of the show in the initial release (1.0) of the

    Microsoft .NET Framework.

  • 7/31/2019 Crime Files Docu

    12/63

    12

    4.2 BACK END

    SQL Server 2005

    A database is a collection of information thats related to a particular

    subject or purpose, such as tracking client orders or maintaining a list of project

    details. If the database isnt stored on a computer, or only part of it are one may be

    tracking information from a variety of sources that one is having to co-ordinate and

    organize himself using Microsoft SQL Server, one can manage all information from a

    single database file.

    Within the file, data is divided into separate storage containers calledtables; view, add and update data by using online forms; find and retrieve just the data

    wanted for reports. SQL Server allows the user to view, update or analyze the

    database from the Internet of an intranet by creating data access pages.

    SQL Server as a relational database stores data in many related tables.

    A table is a collection of data about a specific topic such as projects or clients. Using a

    separate table for each topic means that, store that data only once. This makes the

    database more efficient and reduces data-entry errors.

    Tables organize data into columns (called fields) and rows (called

    records). A common field relates two tables so that Microsoft SQL Server can bring

    together the data from the two tables for viewing, editing, or printing. In table Design

    view one can create an entire table from scratch or add, delete or customize the fields

    in an existing table. The user can also display records from tables that are related to

    the current table by displaying sub datasheets within the main datasheet.

    In SQL Server a database is the overall container of data and

    associated with in a single SQL Server database. To fling and retrieve just the data

    that meets conditions specified, including data form multiple tables, create a query.

    It is easy to use. It scales from a mobile laptop to systematic multiprocessor system. It provides data warehousing features.

  • 7/31/2019 Crime Files Docu

    13/63

    13

    4.2 FEATURES OF FRONT & BACK END TOOLS

    4.2.1 Features of C#.NET

    i. Inheritance: Inheritance is one of the most used techniques in an object orientedlanguage. Inheritance provides ability to use an existing classs functionality

    via its derived (inherited) class. Inheritance refers to the properties of a class

    being available to many other classes. The properties and methods of the base

    class are inherited and extracted by the derived classes. By default all the

    classes created with C#.NET are inheritable. The users can use inheritance to

    define new forms designed by users are really classes.

    ii. Exception Handling: Exception handling is an in build mechanism in .NET

    framework to detect and run time errors. The .NET Framework contains lots of

    standard exceptions. The exceptions re anomalies that occur during the

    exception of program. They can be because of, logic or system errors. If a user

    (programmer) does not provide a mechanism to handle these anomalies, the

    .NET run time environment provides a default mechanism, which terminates

    the program execution. C#.NET provides three keywords try, catch and finally

    to do exception handling. Try encloses the statements that might throw anexception whereas catch handles an exception if one exist and finally can be

    used for doing any clean up process.

    iii. Overloading: C#.NET supports methods overloading using the overloadingKeyword. Using this keyword, you can declare same method names with

    different arguments.

    iv. Overriding: Overriding is the creation of a method in the subclass that the

    same signature, i.e. name, number and type of arguments, as method in the

    super class. This new method hides the method of super class. Derived classes

    inherit the methods defined in their base class. All methods are not overridable

    by default but if a method in the base class is marked with overridable keyword

    the Overrides keyword can be used in derived class to define new

    implementation of the inherited method.

    v. Constructors and Destructors: The procedures that control initialization of

    new instances of a class are known as constructors. Conversely, destructors are

    methods that are used to free system resources when a class leaves scope or is

  • 7/31/2019 Crime Files Docu

    14/63

    14

    set to nothing.C#.NET supports constructors and destructors using the Sub

    New and Sub Dispose procedures. Sub New method will only run once when a

    class is created. In addition to these basic object-oriented principles, C#

    facilities the development of software components through several innovative

    language constructs, including:

    Encapsulated method signatures called delegates, which enablestype safe event notifications.

    Properties, which serves as assessors for private membervariables.

    4.2.2 Features of Microsoft SQL Server 2005

    Analysis Services

    Fixes have been included that improve the performance and stability ofqueries.

    HTTP connectivity will now support HTTP compression. Optimized queries to perspectives are now as fast as queries to the

    perspectives base cube.

    Data programmability

    Client connection time has been significantly improved if failover occurs whilethe server is using Database Mirroring and the clients are using TCP/IP.

    SQL Server 2005 Integration Services (SSIS)

    Usability of the Import/Export Wizard has been improved in multiple-tablescenarios.

    The IDtsPipelineEnvironmentService service lets custom data flowcomponents have programmatic access to the parent Data Flow task.

    Interoperability with Analysis Services has been improved. The DataReadersource in SSIS supports the System.Object data type by converting columns

    that have this data type to the DT_NTEXT ssISnoversion data type.

  • 7/31/2019 Crime Files Docu

    15/63

    15

    To change the data type to a type that is more appropriate for your data, youcan add a Data Conversion transformation.

    Performance has been improved for many transformations, such as the Sorttransformation.

    The Expression Builder dialog box now has a public and documented API.This increased access to expression-related objects will benefit task developers

    because expressions are important to the way that tasks are interrelated.

    In the Advanced Editor dialog box, the Flat File source has the new propertyUseBinaryFormat. This property supports loading packed decimal data into

    the pipeline for processing by a script or by a custom transformation.

    In the Advanced Editor dialog box, the DataReader source has the newproperty CommandTimeout. You can use this property to modify the time-

    out period to allow for long-running operations.

    To create or to modify the property expressions of variables, you can nowopen the Expression Builder dialog box from the Properties window.

    You can now add annotations to precedence constraints.

    Manageability

    Profiler and Replay

    Previously, Profiling Analysis Services showed the time in CoordinatedUniversal Time (UTC). The time now appears in the user's local time.

    Previously, events that successfully replayed were not being counted correctly.Therefore, incorrect replay statistics were reported to the user. This problem

    has been fixed.

    Previously, Replay ignored the network packet size that you set when youconnected to the network. Instead, Replay always created a connection that

    had a packet size of 32 kilobytes (KB). Sometimes, large playbacks would

    cause the server to run out of memory. This problem has been fixed.

  • 7/31/2019 Crime Files Docu

    16/63

    16

    CHAPTER 5

    PROJECT DESCRIPTION

    5.1 PROBLEM DEFINITION

    Problems with conventional system

    1. Lack of immediate retrievals: -The information is very difficult to retrieve

    and to find particular information like- E.g. - To find out about the Criminals history,

    the user has to go through various registers

    2. Lack of immediate information storage: - The information generated by

    various transactions takes time and efforts to be stored at right place.3. Lack of prompt updating: - Various changes to information like Criminal

    details or immunization details of child are difficult to make as paper work is

    involved.

    4. Preparation of accurate and prompt reports: - This becomes a difficult

    task as information is difficult to collect from various registers.

    These Problems gets rectified through this efficient crime file management

    System.

    5.2 OVERVIEW OF THE PROJECT

    The project titled as Online Crime file Management System is a web based

    application. This software provides facility for reporting online crimes, complaints,

    missing persons, show most wanted person details mailing as well as chatting. Any

    Number of clients can connect to the server. Each user first makes their login to sever

    to show their availability. The server can be any Web Server. An SMTP Server mustbe maintained for temporary storage of emails and chat jar files for enable the chatting

    facilities.

    5.3 MODULES

    The main modules in this project,

    Visitors

    Registered Users Administrator

  • 7/31/2019 Crime Files Docu

    17/63

    17

    5.3.1 Module Description

    The visitor module include,

    View Hot news: This module help the visitor to see the latest hot newswhich can updated by the admin.

    Post Complaints: This module help the visitor to post their complaintswhich can view by the admin to give status about their complaints.

    The registered user module includes,

    Add Complaint: This module help the user to report online complaints. Add Missing person: This module help the user to report online missing

    persons details also we have to add photos of missing person using

    heterogeneous database.

    View Missing persons: This module help the user to view all the missingperson details.

    View Most wanted persons: This module help the user to view all mostwanted persons which can be given by the administrator.

    Edit Account: This module help the user to update his or her profile. View complaint status: This module allows us to view the status of all

    complaint that you have posted earlier.

    View crime status: This module allows us to view the status of the allcrimes that you have posted earlier.

    Add and View feedback: This module helps the user to add and viewfeedbacks

    Chat: This module help the user to chat with the administrator or withother registered users

    Mail: This module helps the user to send mail to the administrator.The administrator module includes,

    View and reply user complaint: This module helps the admin to viewand reply users complaint details

    View and reply user crimes: This module helps the admin to view and

  • 7/31/2019 Crime Files Docu

    18/63

    18

    reply users crimes details

    New admin: This module used for add new admin Add and delete latest hot news: This module helps the admin to add and

    delete latest hot news. View and delete users feedback: This module helps the admin to add

    and delete users feedback

    Add, delete and view most wanted persons: This module helps theadmin to add, delete and view most wanted person details

    Add, delete and view missing persons: This module helps the admin toadd, delete and view missing person details

    Add and view Criminal registration: This module helps the admin toadd and view criminal registrations

    Add and view FIR: This module helps the admin to add and view Firreports

    Add and view history sheet: This module helps the admin to add andview history reports

    View and delete all complaint reply: This module helps the admin toview and delete complaint reply.

    Add and view prisoner report: This module helps the admin to add andprisoner reports

    Change password: This module helps the admin to update his or herpassword

    Chat: This module help the admin to chat with the administrator or withother registered users

    Mail: This module helps the user to send mail to the user.

    5.4 DATA FLOW DIAGRAM

    Data flow oriented techniques advocate that the major data items handled by a

    system must be first identified and then the processing required on these data items to

    produce the desired outputs should be determined. The DFD (also called as bubble

    chart) is a simple graphical formalism that can be used to represent a system in terms

    of input data to the system, various processing carried out on these data, and the

  • 7/31/2019 Crime Files Docu

    19/63

    19

    output generated by the system. It was introduced by De Macro (1978), Gane and

    Sarson (1979).

    The primitive symbols used for constructing DFDs are:

    Symbols used in DFD

    - A circle represents a process.

    - A rectangle represents external entity

    - A square defines a source or -destinationof the system data.

    - An arrow identifies dataflow.- Double line with one end closed

    indicates data store

    Fig 5.4 a Symbols Used in DFD

    Context flow diagram

    Fig 5.4 b Context Diagram

  • 7/31/2019 Crime Files Docu

    20/63

    20

    Level 1 DFD - Administrator

    This denotes Data Flow Diagram of Administrator login for maintaining various

    records like, FIR, Complaints., etc. And User view the feedback.

    Fig 5.4 c Admin Flow Process

    This shows how the system could be maintained in the efficient manner. The Reports

    maintained here is confidential to the admin.

    Add FIR Reports

    View ComplaintsView user details

    View Feedback

    User name, PasswordOnline

    Crime File

    System

    Administrator

    User

    Registration details

    Complaints

    Feedback

    Login

    Add Solutions

    FIR

  • 7/31/2019 Crime Files Docu

    21/63

    21

    Level 2 DF - Administrator

    This denotes Data Flow Diagram of Administrator for maintaining various

    records like,

    FIR,

    Complaints, etc

    Fig 5.4 d Admin Flow Process

    View

    Reports

    Add

    Reports

    FIR No:

    DetailsFIR Details

    Complaint

    DetailsViewcomplaints

    FIR

    Management

    Report

    Generation

    Complaints

    FIR

    Reports

    Administrator

    User

    Login

  • 7/31/2019 Crime Files Docu

    22/63

    22

    Level 1 DFD- User

    This DFD shows the login format of the user and also the registration made to

    post the complaints. Fig 5.4 e

    Level 2 DFD- User Fig 5.4 f

    Solutions

    Complaint DetailsComplaint Status

    Complaint ID

    User name Password

    Login

    User CollectingFeedback

    Complaint

    Registration

    Complaint

    Status

    Complaint

    Feedback

    Complaint Status

    Verify

    Complaints

    Username/Password

    RegistrationRegistration

    LoginLogin

    Complaint

    RegistrationComplaints

    Username/Password

    User

  • 7/31/2019 Crime Files Docu

    23/63

    23

    5.5 ER - DIAGRAM

    ER Diagrams provides a global quick reference to an organizations datastructures.

    It can be used individually to design an Information Systems (IS) datastructure

    Entity an aggregation of a number of data elements each data element is an attribute of the entity Any entity can be classified in one of the following categories:

    Regular : any physical object, event, or abstract concept that

    we can record facts about.

    Weak : any entity that depends on another entity for its

    existence.

    Relationship an association between two or more entities that is of particular

    interest

    Relationship Symbols:

    Fig 5.5 a Symbols used in relationship

  • 7/31/2019 Crime Files Docu

    24/63

    24

    ER Diagram Components:

    Every entity diagram consists of the following components:

    Fig 5.5 b ER Diagram components

    Entity Set

    Weak Entity

    Set

    Relationship

    Set

    Identifying

    Relationship

    for Weak

    Entit

    Primary Key

    MM

    Relationship

    11

    Relationship

    Role Indicator

    Total

    Generalization

    Attribute

    Multi Valued

    Attribute

    Derived Attribute

    Total Participation

    of Attribute in

    Relationship

    Discriminating

    Attribute of

    Weak Entit

    M 1

    Relationship

    Cardinality

    Limits

    ISA

    Specialization or

    Generalization

    Disjoint

    Generalization

  • 7/31/2019 Crime Files Docu

    25/63

    25

    ER Diagram for VISITORS:

    Fig 5.5 c ER Diagram for visitors

    User Login

    PasswordUser ID

    User

    Registration

    NameUser ID

    Address

    PhoneNoDOB

    Gender

    Email Id Mobile No

    Complaint

    Complaint

    NoUser ID

    Date of

    Crime

    Date of

    Complaint

    Details of

    Suspects Descri tion

    Login Check

    Complaint

    Status

    Complaint

    No Status

    Post

  • 7/31/2019 Crime Files Docu

    26/63

    26

    ER Diagram for ADMIN and AUTHORITY:

    Fig 5.5 d ER Diagram for Admin and Authority

    ADMIN

    PasswordUser ID

    AUTHORITY

    PasswordUser ID

    Criminal Registration

    Complaint Registration

    Missing Person

    Prisoner Entry

    Feed Back

    F.I.R

    History Sheet

    Most Wanted

    Crime Status

    ADD,

    DELETE,

    &

    UPDATE

    VIEW

    &

    ADD

  • 7/31/2019 Crime Files Docu

    27/63

    27

    5.6 DATABASE DESIGN

    A database is an organized mechanism that has the capability of storing

    information through which a user can retrieve stored information in an effective and

    efficient manner. The data is the purpose of any database and must be protected.

    The database design is a two level process. In the first step, user requirements

    are gathered together and a database is designed which will meet these requirements

    as clearly as possible. This step is called Information Level Design and it is taken

    independent of any individual DBMS.

    In the second step, this Information level design is transferred into a design for

    the specific DBMS that will be used to implement the system in question. This step is

    called Physical Level Design, concerned with the characteristics of the specific

    DBMS that will be used. A database design runs parallel with the system design. The

    organization of the data in the database is aimed to achieve the following two major

    objectives.

    Data Integrity Data independence

    Normalization is the process of decomposing the attributes in an application,

    which results in a set of tables with very simple structure. The purpose of

    normalization is to make tables as simple as possible. Normalization is carried out in

    this system for the following reasons.

    To structure the data so that there is no repetition of data, this helps insaving.

    To permit simple retrieval of data in response to query and report request. To simplify the maintenance of the data through updates, insertions,

    deletion.

    To reduce the need to restructure or reorganize data which newapplication requirements arise?

  • 7/31/2019 Crime Files Docu

    28/63

    28

    Relational Database Management System (RDBMS):

    A relational model represents the database as a collection of relations.

    Each relation resembles a table of values or file of records. In formal relational model

    terminology, a row is called a tuple, a column header is called an attribute and the

    table is called a relation. A relational database consists of a collection of tables, each

    of which is assigned a unique name. A row in a tale represents a set of related values.

    Relations, Domains & Attributes:

    A table is a relation. The rows in a table are called tuples. A tuple is an ordered

    set of n elements. Columns are referred to as attributes. Relationships have been set

    between every table in the database. This ensures both Referential and Entity

    Relationship Integrity. A domain D is a set of atomic values. A common method of

    specifying a domain is to specify a data type from which the data values forming the

    domain are drawn. It is also useful to specify a name for the domain to help in

    interpreting its values. Every value in a relation is atomic, that is not decomposable.

    Relationships:

    Table relationships are established using Key. The two main keys of primeimportance are Primary Key & Foreign Key. Entity Integrity and

    Referential Integrity Relationships can be established with these keys.

    Entity Integrity enforces that no Primary Key can have null values. Referential Integrity enforces that no Primary Key can have null values. Referential Integrity for each distinct Foreign Key value, there must exist a

    matching Primary Key value in the same domain. Other key are Super Key

    and Candidate Keys.

    Relationships have been set between every table in the database. Thisensures both Referential and Entity Relationship Integrity.

    Normalization:

    As the name implies, it denoted putting things in the normal form. The

    application developer via normalization tries to achieve a sensible organization of

    data into proper tables and columns and where names can be easily correlated to the

    data by the user.

  • 7/31/2019 Crime Files Docu

    29/63

    29

    Normalization eliminates repeating groups at data and thereby avoids data

    redundancy which proves to be a great burden on the computer resources. This

    includes:

    Normalize the data. Choose proper names for the tables and columns. Choose the proper name for the data.

    First Normal Form:

    The First Normal Form states that the domain of an attribute must include only

    atomic values and that the value of any attribute in a tuple must be a single value from

    the domain of that attribute. In other words 1NF disallows relations within relations

    or relations as attribute values within tuples. The only attribute values permitted by

    1NF are single atomic or indivisible values.

    The first step is to put the data into First Normal Form. This can be donor by

    moving data into separate tables where the data is of similar type in each table. Each

    table is given a Primary Key or Foreign Key as per requirement of the project. In this

    we form new relations for each monatomic attribute or nested relation. Thiseliminated repeating groups of data.

    A relation is said to be in first normal form if only if it satisfies the constraints that

    contain the primary key only.

    Second Normal Form:

    According to Second Normal Form, for relations where primary key contains

    multiple attributes, no non key attribute should be functionally dependent on a part of

    the primary key.

    In this we decompose and setup a new relation for each partial key with its

    dependent attributes. Make sure to keep a relation with the original primary key and

    any attributes that are fully functionally dependent on it. This step helps in taking out

    data that is only dependant on apart of the key.

  • 7/31/2019 Crime Files Docu

    30/63

    30

    A relation is said to be in second normal form if and only if it satisfies all the first

    normal form conditions for the primary key and every non-primary key attributes of

    the relation is fully dependent on its primary key alone.

    Third Normal Form:

    According to Third Normal Form, Relation should not have a non key

    attribute functionally determined by another non key attribute or by a set of non key

    attributes. That is, there should be no transitive dependency on the primary key.

    In this we decompose and set up relation that includes the non key attributes that

    functionally determines other non key attributes. This step is taken to get rid of

    anything that does not depend entirely on the Primary Key.

    A relation is said to be in third normal form if only if it is in second normal form

    and more over the non key attributes of the relation should not be depend on other non

    key attribute.

    5.6.1 Table Description

    Table Name: Login

    Primary Key: UserId

    Foreign Key: Nil

    Table Description: This table used to login into the website for complaint register

    and crime record management

    Fieldname Data Type (Size) Description

    UserId Varchar (20) Id of the User

    Password Varchar (25) Password of the User

    Table 5.6.1 a

  • 7/31/2019 Crime Files Docu

    31/63

    31

    Table Name: User Registration

    Primary Key: Uid

    Foreign Key: Nil

    Table Description: This table used to register the details of the user

    Fieldname Data Type (Size) Description

    Uid Varchar (20) Id of the User

    Fname Varchar (20) First name of the User

    Lname Varchar (20) Last Name of the User

    Uname Varchar (25) User Name of the User

    Password Varchar (25) Password of the User

    Cpassword Varchar (25) Confirm Password of the User

    Gender Varchar (6) Gender of the User

    Dob Datetime Date of Birth of the User

    Address Varchar (50) Address of the User

    Village Varchar (25) Village of the User

    Taluk Varchar (20) Taluk of the User

    District Varchar (25) District of the User

    Pcode Varchar (30) Pincode of the User

    State Varchar (25) State of the User

    Country Varchar (30) Country of the User

    Phone Int Phone Number of the User

    Mobile Int Mobile Number of the User

    Email Varchar (50) Email Id of the User

    Altemail Varchar (50) Alternate Email Id of the User

    Table 5.6.1 b

  • 7/31/2019 Crime Files Docu

    32/63

    32

    Table Name: Authority Registration

    Primary Key: Uname

    Foreign Key: Nil

    Table Description: This table used to register the details of the Authority.

    Fieldname Data Type (Size) Description

    Uname Varchar (20) User Name of the Authority

    Password Varchar (15) Password of the Authority

    Cpassword Varchar (20) Confirmation Password of the Authority

    Authorityname varchar(30) Name of the Authority

    Designation Varchar (25) Designation of the Authority

    Gender Varchar (6) Gender of the Authority

    Dob Datetime Date of Birth of the Authority

    Oaddress Varchar (50) Official Address of the Authority

    Phone Int Official Phone no of the Authority

    Raddress Varchar (50) Residential Address of the Authority

    Pcode Int Pincode of the Authority

    Taluk Varchar (20) Taluk of the Authority

    District Varchar (20) District of the Authority

    State Varchar (25) State of the Authority

    Country Varchar (30) Country of the Authority

    Rphone Int Residential Phone no of the Authority

    Mobile Int Mobile Number of the Authority

    Email Varchar (50) Email Id of the Authority

    Altemail Varchar (50) Altenate Email Id of the Authority

    Table 5.6.1 c

  • 7/31/2019 Crime Files Docu

    33/63

    33

    Table Name: Complaint registration

    Primary Key: ComplaintNo

    Foreign Key: Nil

    Table Description: This table used to post the complaints of the user.

    Fieldname Data Type (Size) Description

    Compalaintno Int Complaint Number of the User

    Userid Varchar (20) Id of the User

    Docrime Datetime Date of Crime

    Docomplaint Datetime Date of Complaint

    Descabtcomplaint Varchar (75) Description about the Crime

    Detofsuspects Varchar (30) Details About the Suspects

    Table 5.6.1 d

    Table Name: Criminal Register

    Primary Key: Crimeid

    Foreign Key: Nil

    Table Description: This table used to register the details of the criminal.

    Fieldname Data Type (Size) Description

    Crimeid Varchar (20) Id of the Crime

    Criminalname varchar(30) Name of the Criminal

    Age Int Age of the Criminal

    Gender Varchar (6) Gender of the Criminal

    Occupation Varchar (20) Occupation of the Criminal

    Typeofcrime Varchar (30) Type of Crime

    Address Varchar (40) Address of the Criminal

    Idmark Varchar (40) Identification Mark of the Criminal

    Mostwanted Varchar (3) Most wanted or not

    ImageUrl Varchar (MAX) Image of the Most WantedTable 5.6.1 e

  • 7/31/2019 Crime Files Docu

    34/63

    34

    Table Name: Prisoners Register

    Primary Key: PrionerId

    Foreign Key: Nil

    Table Description: This table used register prisoner Details .

    Fieldname Data Type (Size) Description

    PrisonerID Varchar (MAX) Id of the Prisoner

    PrisonerName Varchar (MAX) Name of the Prisoner

    ChargeNo Varchar (MAX) Charge Sheet Number

    Criminalname Varchar (MAX) Name of the Criminal

    CID Varchar (MAX) Criminal Id

    TypeCrime Varchar (MAX) Type of Crime

    OccurDate Datetime Occurrence Date

    OccurPlace Varchar (MAX) Occurrence Place

    Description Varchar (MAX) Description About the Crime

    PhyIdn Varchar (MAX) Physical Identification of the Criminal

    Height Varchar (MAX) Height of the Criminal

    Weight Varchar (MAX) Weight of the Criminal

    Color Varchar (MAX) Skin Color of the Criminal

    ImageUrl1 Varchar (MAX) Image of the Prisoner

    ImageUrl2 Varchar (MAX) Image of the Criminal

    Table 5.6.1 f

  • 7/31/2019 Crime Files Docu

    35/63

    35

    Table Name:History sheet

    Primary Key: ChargeNo

    Foreign Key: Nil

    Table Description: This table used to enter history sheet details.

    Fieldname Data Type (Size) Description

    ChargeNo Varchar (MAX) Charge Sheet Number

    Criminalname Varchar (MAX) Name of the Criminal

    CID Varchar (MAX) Crime Id

    TypeCrime Varchar (MAX) Type of Crime

    OccurDate Datetime Occurrence Date

    OccurPlace Varchar (MAX) Occurrence Place

    Description Varchar (MAX) Description About Crime

    PhyIdentity Varchar (MAX) Physical Identification of Criminal

    Height Varchar (MAX) Height of the Criminal

    Weight Varchar (MAX) Weight of the CriminalColor Varchar (MAX) Skin Color of the Criminal

    ImageUrl Varchar (MAX) Image of the Criminal

    Table 5.6.1 g

    Table Name:Feedback

    Primary Key: Nil

    Foreign Key: Nil

    Table Description: This table used to give feedbacks of the Authority.

    Fieldname Data Type (Size) Description

    Name Varchar (25) Name of the User

    Emailed Varchar (50) Email Id of the User

    Message Varchar (75) Message Given by the user

    Table 5.6.1 h

  • 7/31/2019 Crime Files Docu

    36/63

    36

    Table Name: FIR

    Primary Key: FIRno

    Foreign Key: Nil

    Table Description: This table used to enter FIR Details.

    Fieldname Data Type (Size) Description

    District Varchar (25) District where the complaint given

    PSname Varchar (35) Police Station Name

    Cyear Int Complaint Year

    FIRno Int FIR Number

    Date Datetime Date of Complaint

    Act Varchar (15) Act NumberSection Varchar (20) Section Number

    Oday Varchar (10) Occurrence Day

    Odatefrom Datetime Occurrence Date From

    Odateto Datetime Occurrence Date To

    Otimefrom Datetime Occurrence Time From

    Otimeto Datetime Occurrence Time To

    Rtime Datetime Registered Time

    rDate Datetime Registered Date

    Entryno Int Entry Number

    Dirdis Varchar (50) Direction & Distance from the Station

    Address Varchar (40) Address of Station

    nearPSname Varchar (30) Nearer Police Station

    nearPSdistrict Varchar (30) Nearer Police Station District

    Casedesc Varchar (75) Case Description

    InformantnameVarchar (20) Informent Name

    Fhname Varchar (25) Informants Father Name

    Dob Datetime Informants Date of Birth

    Nationality Varchar (20) Informants Nationality

    Doi Datetime Date of Informantion

    Poi Varchar (20) Place of Information

    Occupation Varchar (30) Informants Occupation

    Informantaddress Varchar (30) Informants Address

    Table 5.6.1 i

  • 7/31/2019 Crime Files Docu

    37/63

    37

    Table Name: Crime status

    Primary Key: Nil

    Foreign Key: Crimeno

    Table Description: This table used check the status of the crime

    Fieldname Data Type (Size) Description

    Crimeno Varchar (10) CrimeId

    Viewstatus Varchar (20) Status of Crime

    Table 5.6.1 j

    Table Name: Most wanted

    Primary Key: Nil

    Foreign Key: Crimeid

    Table Description: This table used to enter Most Wanted Details.

    Fieldname Data Type (Size) Description

    Crimeid Varchar (MAX) Crime Id Number

    Criminalname Varchar (30) Name of the Criminal

    Age Int Age of the Criminal

    Typeofcrime Varchar (20) Type of Crime

    Gender Varchar (6) Gender of the Criminal

    Skincolor Varchar (15) Skin tone of Criminal

    Height Int Height of Criminal

    Weight Int Weight of Criminal

    Idmark Varchar (50) Identification Mark of the Criminal

    Casedesc Varchar (50) Case Description

    ImageUrl Varchar (MAX) Image of the Criminal

    Table 5.6.1 k

  • 7/31/2019 Crime Files Docu

    38/63

    38

    Table Name: Complaint status

    Primary Key: Nil

    Foreign Key: Compalintno

    Table Description: This table used to check the status of the complaint.

    Fieldname Data Type (Size) Description

    Complaintno Varchar (10) Complaint Number

    Viewstatus Varchar (20) Status of Complaint

    Table 5.6.1 l

    Table Name: Missing person

    Primary Key: Nil

    Foreign Key: firno

    Table Description: This table used to enter the missing persons details.

    Fieldname Data Type (Size) Description

    Firno Varchar (MAX) FIR Number

    District Varchar (30) District of Missing Person

    Psname Varchar (30) Police Station Name

    Mpname Varchar (30) Name of Missing Person

    Dom Datetime Date of Missing

    Dor Datetime Date of Case Registered

    Age Int Age of Missing Person

    Gender Varchar (6) Gender of Missing Person

    Skincolor Varchar (15) Skin color of Missing Person

    Height Int Height of Missing Person

    Weight Int Weight of Missing Person

    Idmark Varchar (50) Identification Mark of Missing Person

    Address Varchar (50) Address of Missing Person

    Casedesc Varchar (70) Case Description

    ImageUrl Varchar (MAX) Image of Missing Person

    Table 5.6.1 m

  • 7/31/2019 Crime Files Docu

    39/63

    39

    5.7 INPUT DESIGN

    The input design is the link between the information system and the user.

    It comprises the developing specification and procedures for data preparation and

    those steps are necessary to put transaction data in to a usable form for processing can

    be achieved by inspecting the computer to read data from a written or printed

    document or it can occur by having people keying the data directly into the system.

    The design of input focuses on controlling the amount of input required, controlling

    the errors, avoiding delay, avoiding extra steps and keeping the process simple. The

    input is designed in such a way so that it provides security and ease of use with

    retaining the privacy. Input Design considered the following things:

    What data should be given as input? How the data should be arranged or coded? The dialog to guide the operating personnel in providing input. Methods for preparing input validations and steps to follow when error

    occur.

    OBJECTIVES

    Input Design is the process of converting a user-oriented description of

    the input into a computer-based system. This design is important to avoid errors in the

    data input process and show the correct direction to the management for getting correct

    information from the computerized system.

    It is achieved by creating user-friendly screens for the data entry to

    handle large volume of data. The goal of designing input is to make data entry easier

    and to be free from errors. The data entry screen is designed in such a way that all the

    data manipulates can be performed. It also provides record viewing facilities.

    When the data is entered it will check for its validity. Data can be entered

    with the help of screens. Appropriate messages are provided as when needed so that

    the user will not be in maize of instant. Thus the objective of input design is to create

    an input layout that is easy to follow.

  • 7/31/2019 Crime Files Docu

    40/63

    40

    5.8 OUTPUT DESIGN

    A quality output is one, which meets the requirements of the end user

    and presents the information clearly. In any system results of processing are

    communicated to the users and to other system through outputs. In output design it is

    determined how the information is to be displaced for immediate need and also the

    hard copy output. It is the most important and direct source information to the user.

    Efficient and intelligent output design improves the systems relationship to help user

    decision-making.

    Designing computer output should proceed in an organized, well thoughtout manner; the right output must be developed while ensuring that each

    output element is designed so that people will find the system can use

    easily and effectively. When analysis design computer output, they should

    Identify the specific output that is needed to meet the requirements.

    Select methods for presenting information. Create document, report, or other formats that contain information

    produced by the system.

    The output form of an information system should accomplish one or more of the

    following objectives.

    Convey information about past activities, current status or projections ofthe Future.

    Signal important events, opportunities, problems, or warnings. Trigger an action. Confirm an action.

  • 7/31/2019 Crime Files Docu

    41/63

    41

    CHAPTER 6

    SYSTEM TESTING

    Software Testing is the process of executing software in a controlled manner,

    in order to answer the question Does the software behave as specified?. Software

    testing is often used in association with the terms verification and validation.

    Validation is the checking or testing of items, includes software, for conformance and

    consistency with an associated specification. Software testing is just one kind of

    verification, which also uses techniques such as reviews, analysis, inspections, and

    walkthroughs. Validation is the process of checking that what has been specified is

    what the user actually wanted.

    Validation : Are we doing the right job?

    Verification : Are we doing the job right?

    Software testing should not be confused with debugging. Debugging is the

    process of analyzing and localizing bugs when software does not behave as expected.

    Although the identification of some bugs will be obvious from playing with the

    software, a methodical approach to software testing is a much more thorough means

    for identifying bugs. Debugging is therefore an activity which supports testing, but

    cannot replace testing.

    Other activities which are often associated with software testing are static

    analysis and dynamic analysis. Static analysis investigates the source code of

    software, looking for problems and gathering metrics without actually executing the

    code. Dynamic analysis looks at the behavior of software while it is executing, to

    provide information such as execution traces, timing profiles, and test coverage

    information.

    Testing is a set of activity that can be planned in advanced and conducted

    systematically. Testing begins at the module level and work towards the integration of

    entire computers based system. Nothing is complete without testing, as it vital success

  • 7/31/2019 Crime Files Docu

    42/63

    42

    of the system testing objectives, there are several rules that can serve as testing

    objectives.

    They are

    Testing is a process of executing a program with the intend of finding anerror.

    A good test case is one that has high possibility of finding an undiscoverederror.

    A successful test is one that uncovers an undiscovered error.If a testing is conducted successfully according to the objectives as stated above, it

    would uncovered errors in the software also testing demonstrate that the softwarefunction appear to be working according to the specification, that performance

    requirement appear to have been met.

    There are three ways to test program.

    For correctness For implementation efficiency

    For computational complexityTest for correctness are supposed to verify that a program does exactly what it was

    designed to do. This is much more difficult than it may at first appear, especially for

    large programs.

    6.1 TEST PLANS

    A test plan implies a series of desired course of action to be followed in

    accomplishing various testing methods. The Test Plan acts as a blue print for theaction that is to be followed. The software engineers create a computer program, its

    documentation and related data structures. The software developers is always

    responsible for testing the individual units of the programs, ensuring that each

    performs the function for which it was designed. There is an independent test group

    (ITG) which is to remove the inherent problems associated with letting the builder to

    test the thing that has been built. The specific objectives of testing should be stated in

    measurable terms. So that the mean time to failure, the cost to find and fix the defects,

  • 7/31/2019 Crime Files Docu

    43/63

    43

    remaining defect density or frequency of occurrence and test work-hours per

    regression test all should be stated within the test plan.

    The levels of testing include:

    Unit testing Integration Testing Data validation Testing Output Testing

    6.1.1 UNIT TESTING

    Unit testing focuses verification effort on the smallest unit of software

    design the software component or module. Using the component level design

    description as a guide, important control paths are tested to uncover errors within the

    boundary of the module. The relative complexity of tests and uncovered scope

    established for unit testing. The unit testing is white-box oriented, and step can be

    conducted in parallel for multiple components. The modular interface is tested toensure that information properly flows into and out of the program unit under test.

    Tests of data flow across a module interface are required before any other test

    is initiated. If data do not enter and exit properly, all other tests are moot. Selective

    testing of execution paths is an essential task during the unit test. Good design dictates

    that error conditions be anticipated and error handling paths set up to reroute or

    cleanly terminate processing when an error does occur. Boundary testing is the last

    task of unit testing step. Software often fails at its boundaries.

    Unit testing was done in Sell-Soft System by treating each module as separate

    entity and testing each one of them with a wide spectrum of test inputs. Some flaws in

    the internal logic of the modules were found and were rectified.

    6.1.2 INTEGRATION TESTING

    Integration testing is systematic technique for constructing the program

    structure while at the same time conducting tests to uncover errors associated with

  • 7/31/2019 Crime Files Docu

    44/63

    44

    interfacing. The objective is to take unit tested components and build a program

    structure that has been dictated by design. The entire program is tested as whole.

    Correction is difficult because isolation of causes is complicated by vast expanse of

    entire program. Once these errors are corrected, new ones appear and the process

    continues in a seemingly endless loop.

    After unit testing in Sell-Soft System all the modules were integrated to test

    for any inconsistencies in the interfaces. Moreover differences in program structures

    were removed and a unique program structure was evolved.

    6.1.3VALIDATION TESTING OR SYSTEM TESTING

    This is the final step in testing. In this the entire system was tested as a whole

    with all forms, code, modules and class modules. This form of testing is popularly

    known as Black Box testing or System tests.

    Black Box testing method focuses on the functional requirements of the

    software. That is, Black Box testing enables the software engineer to derive sets of

    input conditions that will fully exercise all functional requirements for a program.

    Black Box testing attempts to find errors in the following categories; incorrector missing functions, interface errors, errors in data structures or external data access,

    performance errors and initialization errors and termination errors.

    6.1.4 OUTPUT TESTING OR USER ACCEPTANCE TESTING

    The system considered is tested for user acceptance; here it should satisfy the

    firms need. The software should keep in touch with perspective system; user at the

    time of developing and making changes whenever required. This done with respect tothe following points

    Input Screen Designs, Output Screen Designs, Online message to guide the user and the like.

    The above testing is done taking various kinds of test data. Preparation of test data

    plays a vital role in the system testing. After preparing the test data, the system under

    study is tested using that test data. While testing the system by which test data errors

  • 7/31/2019 Crime Files Docu

    45/63

    45

    are again uncovered and corrected by using above testing steps and corrections are

    also noted for future use.

    Validation Checking:

    At the culmination of integration testing, software is completely assembled as

    a package; interfacing errors have been uncovered and corrected, and a final series of

    software test-validation checks may begin. Validation can be defined in many ways,

    but a simple definition (Albeit Harsh) is that validation succeeds when software

    functions in a manner that can be reasonably expected by a customer. Software

    validation is achieved through a series of black-box tests to be conducted and a test

    procedure defines specific test cases that will be used in attempt to uncover errors inconformity with requirements. Both the plan and procedure are designed to ensure

    that all functional requirements are satisfied; all performance requirements are

    achieved; documentation is correct and human Engineered and other requirements

    are met. Once the application was made free of all logical and interface errors ,

    inputting dummy data to ensure that the software developed satisfied all the

    requirements of the user did validation checks .However , the data are created with the

    intent of determining whether the system will process them correctly .

    In the proposed system, if the clients click the send button after selecting a file

    from his file list, then the system will show the confirmation message for sending

    files. Similarly if a client makes an attempt to download a file from the server file list,

    then also the system will show the confirmation message for downloading. This is

    how the data validations were made in the proposed system.

  • 7/31/2019 Crime Files Docu

    46/63

    46

    CHAPTER 7

    SYSTEM IMPLEMENTATION

    INTRODUCTION

    Implementation is the stage of the project where the theoretical design is

    turned into a working system. It can be considered to be the most crucial stage in

    achieving a successful new system gaining the users confidence that the new system

    will work and will be effective and accurate. It is primarily concerned with user

    training and documentation. Conversion usually takes place about the same time the

    user is being trained or later. Implementation simply means convening a new system

    design into operation, which is the process of converting a new revised system design

    into an operational one.

    Implementation is the stage of the project where the theoretical design is tuned

    into a working system. At this stage the main work load, the greatest upheaval and

    the major impact on the existing system shifts to the user department. If the

    implementation is not carefully planned and controlled it can create chaos and

    confusion.

    Implementation includes all those activities that take place to convert from the

    existing system to the new system. The new system may be a totally new, replacing

    an existing manual or automated system or it may be a modification to an existing

    system. Proper implementation is essential to provide a reliable system to meet

    organization requirements. The process of putting the developed system in actual use

    is called system implementation. This includes all those activities that take place to

    convert from the old system to the new system. The system can be implemented only

    after through testing is done and if it is found to be working according to the

    specifications. The system personnel check the feasibility of the system.

  • 7/31/2019 Crime Files Docu

    47/63

    47

    The more complex the system being implemented, the more involved will be

    the system analysis and design effort required to implement the three main aspects:

    education and training, system testing and changeover. The implementation state

    involves the following tasks:

    Careful planning. Investigation of system and constraints. Design of methods to achieve the changeover. Training of the staff in the changeover phase.

    7.1 IMPLEMENTATION PROCEDURES

    Implementation of software refers to the final installation of the package in its

    real environment, to the satisfaction of the intended uses and the operation of the

    system. In many organizations someone who will not be operating it, will commission

    the software development project. In the initial stage people doubt about the software

    but we have to ensure that the resistance does not build up, as one has to make sure

    that

    The active user must be aware of the benefits of using the new system. Their confidence in the software is built up. Proper guidance is imparted to the user so that he is comfortable in

    using the application.

    Before going ahead and viewing the system, the user must know that for

    viewing the result, the server program should be running in the server. If the server

    object is not up running on the server, the actual process wont take place.

    7.1.1 User Training

    User training is designed to prepare the user for testing and converting the

    system. To achieve the objective and benefits expected from computer based system,

    it is essential for the people who will be involved to be confident of their role in the

    new system. As system becomes more complex, the need for training is more

    important.

  • 7/31/2019 Crime Files Docu

    48/63

    48

    7.1.2 Training on the Application Software

    After providing the necessary basic training on computer awareness the user

    will have to be trained on the new application software. This will give the underlying

    philosophy of the use of the new system such as the screen flow, screen design type of

    help on the screen, type of errors while entering the data, the corresponding validation

    check at each entry and the ways to correct the date entered. It should then cover

    information needed by the specific user/ group to use the system or part of the system

    while imparting the training of the program on the application. This training may be

    different across different user groups and across different levels of hierarchy.

    7.1.3 Operational Document

    Once the implementation plan is decided, it is essential that the user of the

    system is made familiar and comfortable with the environment. Education involves

    right atmosphere and motivating the user. A documentation providing the whole

    operations of the system is being developed in such a way that the user can work with

    it in well consistent way. The system is developed user friendly so that the user can

    work the system from the tips given in the application itself. Useful tip and guidance

    is given inside the application itself to help the user.

    7.1.4 System Maintenance

    Maintenance is the enigma of system development. The maintenance phase of

    the software cycle is the time in which a software product performs useful work.

    After a system is successfully implemented, it should be maintained in a proper

    manner.

    System maintenance is an important aspect in the software development life

    cycle. The need for system maintenance is for it to make adaptable to the changes in

    the system environment.

    Software maintenance is of course, far more than Finding Mistakes.

    Maintenance may be defined by describing four activities that are undertaken after a

    program is released for use.

  • 7/31/2019 Crime Files Docu

    49/63

    49

    CHAPTER 8

    CONCLUSION & FUTURE ENHANCEMENT

    8.1 CONCLUSION

    The project titled as Online Crime file Management System is a web

    based application. This software provides facility for reporting online crimes,

    complaints, missing persons, show most wanted person details mailing as well as

    chatting. This software is developed with scalability in mind. Additional modules can

    be easily added when necessary. The software is developed with modular approach.

    All modules in the system have been tested with valid data and invalid data and

    everything work successfully. Thus the system has fulfilled all the objectives

    identified and is able to replace the existing system.

    The project has been completed successfully with the maximum satisfaction

    of the organization. The constraints are met and overcome successfully. The system is

    designed as like it was decided in the design phase. The project gives good idea on

    developing a full-fledged application satisfying the user requirements.

    The system is very flexible and versatile. This software has a user-friendly

    screen that enables the user to use without any inconvenience. Validation checks

    induced have greatly reduced errors. Provisions have been made to upgrade the

    software. The application has been tested with live data and has provided a successful

    result. Hence the software has proved to work efficiently.

    8.2 SCOPE FOR FUTURE ENHANCEMENT

    In future we can use Image recognition instead of using heterogeneous

    database more over High speed, accuracy and non-redundant data are the main

    advantages of the proposed system. In the proposed system the user is provided with a

    choice of data screen, which are similar in formats to the source documents. Data

    entry errors can be minimized through validity checks. After the verification only the

    data are placed the permanent database.

  • 7/31/2019 Crime Files Docu

    50/63

    50

    CHAPTER 9

    APPENDIX

    9.1 SOURCE CODE

    9.1.1 Code for Login

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;

    using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    public partial class Login : System.Web.UI.Page

    {

    protected void Page_Load(object sender, EventArgs e)

    { }

    protected void btnSubmit_Click(object sender, EventArgs e)

    {

    string ConnString =

    ConfigurationManager.ConnectionStrings["conn"].ConnectionString;

    SqlConnection connection = null;

    connection = new SqlConnection(ConnString);

    SqlCommand cmd = new SqlCommand();

    SqlDataReader dr;

  • 7/31/2019 Crime Files Docu

    51/63

    51

    String qry = "select uid from tblUserRegistration where uname ='" +

    txtUserName.Text + "' and Password='" + txtPassword.Text + "'";

    String qryadmin = "select fname,lname,uname,gender,Dob,address,pcode,

    village,taluk,district,state,country,phone,mobile,email,altemail from tblUserRegistration";

    if (txtUserName.Text == "admin" && txtPassword.Text == "admin")

    {

    try

    {

    connection.Open();

    cmd = new SqlCommand(qryadmin, connection);

    dr = cmd.ExecuteReader();

    if (dr.Read())

    {

    Response.Redirect("~/GRIDS/ComplaintRegistrationGrid.aspx");

    }

    else

    {

    lblMsg.Text = "Invalid User Name and Password";

    txtUserName.Text = "";

    txtPassword.Text = "";

    txtUserName.Focus();

    }

    dr.Close();

    }

    catch (Exception e1)

    { }

    finally

    {

    connection.Close();

    }

    }

  • 7/31/2019 Crime Files Docu

    52/63

    52

    else

    {

    try

    {Session["uname"] = txtUserName.Text;

    connection.Open();

    cmd = new SqlCommand(qry, connection);

    dr = cmd.ExecuteReader();

    if (dr.Read())

    {

    Response.Redirect("~/FORMS/ComplaintRegistration.aspx");

    }

    else

    {

    lblMsg.Text = "Invalid User Name and Password";

    txtUserName.Text = "";

    txtPassword.Text = "";

    txtUserName.Focus();

    }

    dr.Close();

    }

    catch (Exception e1)

    { }

    finally

    {

    connection.Close();

    } } }

    protected void lbtnNewUser_Click1(object sender, EventArgs e)

    {

    Response.Redirect("Registration.aspx");

    }

    }

  • 7/31/2019 Crime Files Docu

    53/63

    53

    9.1.2 Code for User Registration

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;

    using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    public partial class Registration : System.Web.UI.Page

    {

    string ConnString = ConfigurationManager.ConnectionStrings["Conn"].

    ConnectionString;

    SqlConnection connection = null;

    protected void Page_Load(object sender, EventArgs e)

    {

    callUid();

    }

    protected void btnSubmit_Click(object sender, EventArgs e)

    {

    connection = new SqlConnection(ConnString);

    connection.Open();

    SqlCommand cmd = new

    SqlCommand("sp_Insert_UserRegistrationss",connection);cmd.Connection = connection;

  • 7/31/2019 Crime Files Docu

    54/63

    54

    cmd.CommandType = CommandType.StoredProcedure;

    cmd.Parameters.AddWithValue("@uid", txtUid.Text);

    cmd.Parameters.AddWithValue("@fname", txtFName.Text);

    cmd.Parameters.AddWithValue("@lname", txtLName.Text);cmd.Parameters.AddWithValue("@uname", txtUName.Text);

    cmd.Parameters.AddWithValue("@password", txtPassword.Text);

    cmd.Parameters.AddWithValue("@cpassword", txtCPassword.Text);

    cmd.Parameters.AddWithValue("@gender", rblGender.Text);

    cmd.Parameters.AddWithValue("@Dob", txtDob.Text);

    cmd.Parameters.AddWithValue("@address", txtAddress.Text);

    cmd.Parameters.AddWithValue("@village", txtVillage.Text);

    cmd.Parameters.AddWithValue("@taluk", txtTaluk.Text);

    cmd.Parameters.AddWithValue("@district", txtDistrict.Text);

    cmd.Parameters.AddWithValue("@pcode", txtPCode.Text);

    cmd.Parameters.AddWithValue("@state", ddlState.SelectedItem.Text);

    cmd.Parameters.AddWithValue("@country", ddlCountry.SelectedItem.Text);

    cmd.Parameters.AddWithValue("@phone", txtPNumber.Text);

    cmd.Parameters.AddWithValue("@mobile", txtMobileNumber.Text);

    cmd.Parameters.AddWithValue("@email", txtEmail.Text);

    cmd.Parameters.AddWithValue("@altemail", txtAEmail.Text);

    cmd.ExecuteNonQuery();

    connection.Close();

    Response.Redirect("ComplaintRegistration.aspx");

    }

    private void callUid()

    {

    int Uid = 1001;

    int flag = 0;

    connection = new SqlConnection(ConnString);

    connection.Open();

    string qry1 = "Select * from tblUserRegistration";

    string qry = "Select Max(uid) from tblUserRegistration";

  • 7/31/2019 Crime Files Docu

    55/63

    55

    SqlCommand cmd = new SqlCommand(qry1, connection);

    SqlCommand cmd1 = new SqlCommand(qry, connection);

    SqlDataReader dr;

    dr = cmd.ExecuteReader();if (dr.HasRows == true)

    {

    flag = 1;

    }

    else

    {

    txtUid.Text = Uid.ToString();

    }

    dr.Close();

    if (flag == 1)

    {

    int id = Convert.ToInt32(cmd1.ExecuteScalar().ToString());

    id = id + 1;

    txtUid.Text = id.ToString();

    }

    connection.Close();

    }}

    9.1.3 Code for Email

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;

  • 7/31/2019 Crime Files Docu

    56/63

    56

    using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Net.Mail;

    public partial class FORMS_Email : System.Web.UI.Page{

    protected void Page_Load(object sender, EventArgs e)

    { }

    protected void btnSend_Click(object sender, EventArgs e)

    {

    MailMessage mailMessage = new MailMessage(new MailAddress(txtFrom.Text)

    , new MailAddress(txtTo.Text));

    mailMessage.Subject = txtSubject.Text;

    mailMessage.IsBodyHtml = true;

    mailMessage.Body = txtMessage.Text;

    System.Net.NetworkCredential networkCredentials = new

    System.Net.NetworkCredential(txtFrom.Text,txtPassword.Text );

    SmtpClient smtpClient = new SmtpClient();

    smtpClient.EnableSsl = true;

    smtpClient.UseDefaultCredentials = false;

    smtpClient.Credentials = networkCredentials;

    smtpClient.Host = "smtp.gmail.com";

    smtpClient.Port = 25;

    smtpClient.Send(mailMessage);

    Response.Write("Mail Successfully sent");

    } }

    9.1.4 Code for Most Wanted Form

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;using System.Linq;

  • 7/31/2019 Crime Files Docu

    57/63

    57

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;

    using System.Web.UI.HtmlControls;using System.Web.UI.WebControls;

    using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    public partial class Forms_MostWanted : System.Web.UI.Page

    {

    SqlConnection con = newSqlConnection(ConfigurationManager.ConnectionStrings["Conn"].ConnectionString)

    ;

    public String str = "YES";

    public static String ImageUrl = "";

    protected void Page_Load(object sender, EventArgs e)

    {

    if (!IsPostBack)

    { frequent(); } }

    public void frequent()

    {

    display();

    if (ddlCriminalID.Items.Count == 0)

    {

    Response.Write("alert('New Most Wanted People is not

    available');");

    btnSubmit.Enabled = false;

    }

    else

    {

    ddlCriminalID.SelectedIndex = 0;

    }

  • 7/31/2019 Crime Files Docu

    58/63

    58

    }

    public void display()

    {

    String qry1 = "select crimeid from tblCriminalRegistry where crimeid NOT IN(select DISTINCT crimeid from tblMostWanteds) and

    [mostwanted] ='" + str + "'";

    con.Open();

    SqlCommand cmd1 = new SqlCommand(qry1, con);

    SqlDataReader dr1 = cmd1.ExecuteReader();

    ddlCriminalID.Items.Add("SELECT");

    while (dr1.Read())

    {

    ddlCriminalID.Items.Add(dr1[0].ToString());

    }

    dr1.Close();

    con.Close();

    }

    protected void btnSubmit_Click(object sender, EventArgs e)

    {

    ConfigurationManager.ConnectionStrings["Conn"].ConnectionString;

    String qry1 = "insert into tblMostWanteds(crimeid,criminalname,age,

    typeofcrime, gender,skincolor,height,weight,idmark,casedesc, ImageUrl)

    values('"+ddlCriminalID.Text+"','"+txtName.Text+"',"+txtAge.Text+",'"+txtToc.Text

    +"','"+rblGender.Text+"','"+ddlSkinColor.Text+"',"+txtHeight.Text+","+txtWeight.Te

    xt+",'"+txtIdMark.Text+"','"+txtCaseDesc.Text+"','"+ImageUrl+"')";

    con.Open();

    SqlCommand cmd1 = new SqlCommand(qry1, con);

    int n1 = cmd1.ExecuteNonQuery();

    con.Close();

    if (n1 > 0)

    {

    Response.Write("alert('Most Wanted People Profile has been added

  • 7/31/2019 Crime Files Docu

    59/63

    59

    Successfully');");

    ddlCriminalID.Items.Clear();

    SELECT();

    frequent();}

    }

    protected void btnReset_Click(object sender, EventArgs e)

    {

    Response.Redirect("~/GRIDS/ComplaintRegistrationGrid.aspx");

    }

    protected void ddlCriminalID_SelectedIndexChanged(object sender, EventArgs e)

    {

    String qry1 = "select * from tblCriminalRegistry where crimeid='" +

    ddlCriminalID.Text + "'";

    if (ddlCriminalID.Text == "SELECT")

    {

    SELECT();

    }

    else

    {

    con.Open();

    SqlCommand cmd1 = new SqlCommand(qry1, con);

    SqlDataReader dr1 = cmd1.ExecuteReader();

    while (dr1.Read())

    {

    txtName.Text = dr1["criminalname"].ToString();

    txtAge.Text = dr1["age"].ToString();

    txtToc.Text = dr1["typeofcrime"].ToString();

    if (dr1["gender"].Equals("Male"))

    {

    rblGender.SelectedValue = "Male";

    }

  • 7/31/2019 Crime Files Docu

    60/63

    60

    else

    {

    rblGender.SelectedValue = "Female";

    }txtIdMark.Text = dr1["idmark"].ToString();

    Image1.ImageUrl = "~/IMAGES/" + dr1["ImageUrl"].ToString();

    ImageUrl = dr1["ImageUrl"].ToString();

    }

    dr1.Close();

    con.Close();

    }

    }

    public void SELECT()

    {

    txtName.Text = "";

    txtAge.Text = "";

    txtToc.Text = "";

    ddlSkinColor.SelectedIndex = 0;

    txtHeight.Text = "";

    txtWeight.Text = "";

    txtIdMark.Text = "";

    txtCaseDesc.Text = "";

    Image1.ImageUrl = "";

    }

    }

    9.1.5 Code for Most Wanted Grid

    using System;

    using System.Collections;

    using System.Configuration;

    using System.Data;

  • 7/31/2019 Crime Files Docu

    61/63

    61

    using System.Linq;

    using System.Web;

    using System.Web.Security;

    using System.Web.UI;using System.Web.UI.HtmlControls;

    using System.Web.UI.WebControls;

    using System.Web.UI.WebControls.WebParts;

    using System.Xml.Linq;

    using System.Data.SqlClient;

    public partial class GRIDS_mostwanted : System.Web.UI.Page

    {

    SqlConnection con = new

    SqlConnection(ConfigurationManager.ConnectionStrings["Conn"].ConnectionString)

    ;

    protected void Page_Load(object sender, EventArgs e)

    {

    if (!IsPostBack)

    {

    BindMostWantedDetails();

    }

    }

    protected void gvMostWanted_RowDeleting(object sender,

    GridViewDeleteEventArgs e)

    {

    SqlCommand cmd = new SqlCommand();

    String UID = (String)gvMostWanted.DataKeys[e.RowIndex].Value;

    con.Open();

    cmd = new SqlCommand("delete tblMostWanteds where crimeid='" + UID + "'

    ", con);

    cmd.ExecuteNonQuery();

    con.Close();

    BindMostWantedDetails();}

  • 7/31/2019 Crime Files Docu

    62/63

    62

    protected void BindMostWantedDetails()

    {

    con.Open();

    SqlCommand cmd = new SqlCommand("Select * from tblMostWanteds", con);SqlDataAdapter da = new SqlDataAdapter(cmd);

    DataSet ds = new DataSet();

    da.Fill(ds);

    con.Close();

    if (ds.Tables[0].Rows.Count > 0)

    {

    gvMostWanted.DataSource = ds;

    gvMostWanted.DataBind();

    }

    else

    {

    ds.Tables[0].Rows.Add(ds.Tables[0].NewRow());

    gvMostWanted.Dat