Upload
ranjith-s-nair
View
233
Download
0
Embed Size (px)
Citation preview
8/2/2019 OCR Documentation
1/55
ONLINE CRIME REPORTING
1
MCS -044
BY
RANJITH S NAIR
Submitted to the School of
Computer and Information Sciences, IGNOU
In partial fulfillment of the requirements for the award of the
degree
Master of Computer Applications (MCA)
2012
Indira Gandhi National Open University
Maidan Garhi,
New Delhi110068
8/2/2019 OCR Documentation
2/55
ONLINE CRIME REPORTING
2
DECLARATION
I hereby declare that this project entitled Online Crime
Reporting, submitted to University of IGNOU for the partial fulfillment
of the Degree in MCA is a record of original work done by us and that
this project work has not formed as the basis for the award of any
Degree/Diploma of similar title to any candidate of any University.
Place:
Date:
8/2/2019 OCR Documentation
3/55
ONLINE CRIME REPORTING
3
ACKNOWLEDGEMENT
The completion of our project Online Crime Reporting is
done with at most contributions and valuable helpings from our lectures
and friends.
We are thankful to our teachers, our librarian and all other staff in
our institution for giving us the necessary guidance and help for
completing our project successfully.
Moreover we are thankful to all our friends and students in our
campus for their valuable suggestions and encouragement. Finally we
express our deep gratitude to all those who have helped us directly andindirectly for the successful completion of the project.
8/2/2019 OCR Documentation
4/55
ONLINE CRIME REPORTING
4
ABSTRACT
A society is an assembly of people with different levels of mind.
Some may be guilty to crime whereas some may be innocent. As the
situation of now days, in review of increasing occurrences of crimes, the
value and morale of society is decelerating. Here we are humbly
presenting a new method of reporting non-emergency crimes through
online facilities. Emergency crimes should be taken in its entire
seriousness and urgency.
The website Online Crime Reportingprovides a new way for
reporting non emergency cases. This site is designed so that a user can
do with at most ease. By submitting a complaint a case number will be
provided through Email within 1-2 days with which he/she can check the
progress of respective complaint. A complaint is registered in its entirety
with the personal details of the user along with that of who he/she is on
behalf to and with the crime details.
The administrator of this web site, naturally a police officer
responsible for assigning the case number after accepting the complaint
is allowed to access with a protected username and password. Further
progresses on the complaint can be remarked by the administrator
whereas users can only view the progress. Important actions like closing
or rejecting the complaint is a privilege of the administrator.
8/2/2019 OCR Documentation
5/55
ONLINE CRIME REPORTING
5
INDEX
I. INTRODUCTIONII. OBJECTIVE
III. SYSTEM ENVIRONMENT1. Hardware specifications2. Minimum hardware required by the system3. Software configuration4. Software requirements5. Software specifications
a) About front end(1) .NET framework(2) Visual Basic .NET(3) ASP.NET
b) About back end(1) Microsoft SQL server 2008
IV. SYSTEM ANALYSIS1. Identification of need2. Existing system3. Drawbacks of existing system4. Proposed system5. Advantages of proposed system6. Preliminary investigation7. Feasibility study
V. SYSTEM DESIGN1. Algorithm
8/2/2019 OCR Documentation
6/55
ONLINE CRIME REPORTING
6
2. Flowchart3. Data flow diagrams4. Entity-relationship diagrams5. Database design6. Input design7. Output design
VI. SYSTEM DEVELOPMENTVII. SYSTEM TESTING AND IMPLEMENTATION
1. System testing2. Implementation plan3. Education and training4. Training to application software5. Post implementation review
VIII. FUTURE ENHANCEMENTSIX. CONCLUSIONX. BIBLIOGRAPHY
XI. SCREEN LAYOUT1. User/Public side2. Administrator/Server side
8/2/2019 OCR Documentation
7/55
ONLINE CRIME REPORTING
7
INTRODUCTION
The world today is better to say machine age, the place where
things controlled, formulated and results provided with the essential
help of machines viz. computers. As human race finds more time setting
up on computers via networks, like internet, on considering the time
they spends on zapping through websites, some important facilities is
better to provide via online.
The project explained in this report Online Crime Reporting is
an online facilitation to report non-emergency crimes. The project has
its existence in two fragments, as usual, a client/user side and a
server/administrator side. The client/user side provides facilities, mainly
Report a crime. Here the user can report a crime of the sort of non -
emergency along with his personal details, with that of who he/she is on
behalf to and with the crime details. The user should check an
agreement to ensure that the crime reported is genuine or else he/she
will face its consequences and punishments for the act of fraud.
Reporting a crime successfully, will provide the user with a case number
via Email in 1-2 days with which he/she can check the progress through
the Check Progress link in the home page
The server side meant to be used by police personnel via username
and password is full of facilities to administer on the complaints/crime
reported by the clients/users such as accepting the complaint, add
progresses of the investigations on the crimes reported, closing or
rejecting the complaint under respective circumstances etc.
8/2/2019 OCR Documentation
8/55
ONLINE CRIME REPORTING
8
OBJECTIVE
The Online Crime Reporting website aims to completely
computerize manual complaint registering process, especially non-
emergency crimes, so as to make time consumption less. The website
provides a user friendly environment to register/report complaints.
After registering a complaint, the user will receive a case number via
Email, if the complaint has been accepted by the website
administrator/police department. The manipulations on the registered
complaints are done by the website administrator including the
determinations like accepting, rejecting, setting progresses and closing
of the complaints according to the investigations. The whole details
about the user and the crime is made available to the administrator by
the user. If any further clarifications needed, telephone calls are done by
the police officers to the person who registered the complaint.
The main objectives are:
Online complaint registration. Fast and easier reporting. Facility for checking progress on the investigation by the user. Facilities for accepting, rejecting, setting progresses and closing
the complaints by the administrator.
Sending case number to the user via Email while accepting thecomplaint.
Sending Email to the user while rejecting the complaint. Miscellaneous guides to the user such as district map showing
police stations, important contacts etc.
8/2/2019 OCR Documentation
9/55
ONLINE CRIME REPORTING
9
SYSTEM ENVIRONMENT
System configuration means the essential facilities for the working
of our new website.
There are mainly two classifications for system configuration.
1. Hardware specifications.2.
Software specifications.
HARDWARE SPECIFICATIONS
The following hardware is used for the development of the
system.
Processor : Intel Core i5
Main memory : 4 GB Hard disk capacity : 500 GB Display : 14.0 HD LED Backlight Display
MINIMUM HARDWARE CONFIGURATION REQUIRED BY THE SYSTEM
Platform : Windows 2000/XP Processor : Pentium 3/AMD/above Main memory : 256 MB Hard disk capacity : 4 GB Printer : Dot Matrix/DeskJet/Laser
SOFTWARE CONFIGURATION
8/2/2019 OCR Documentation
10/55
ONLINE CRIME REPORTING
10
The software used for creating this website is ASP.net, Windows 7
Ultimate and Microsoft SQL Server 2008.
SOFTWARE REQUIREMENTS
Microsoft Windows with IIS (OS 98 or above). ASP.net (Front end). Microsoft SQL server 2008(Back end).
SOFTWARE SPECIFICATIONS
FRONT END : ASP.Net with VB.NET
BACK END : SQL SERVER 2008
OPERATING SYSTEM : Windows 7 Ultimate
ABOUT FRONT END
.NET framework
The .NET Framework is an integral Windows component for
building and running the next generation of software applications and
Web services. Microsoft .NET is software that connects information,
people, systems, and devices. It spans clients, servers, and developer
tools. The .Net Framework is a multi-language environment for building,
deploying and running XML Web services and applications. It consists oftwo main parts.
Common Language Runtime:
Despite its name, the runtime actually has a role in both a
components and runtime and development time experiences. While
8/2/2019 OCR Documentation
11/55
ONLINE CRIME REPORTING
11
the component is running, the runtime is responsible for managing
memory allocation, starting up and stopping threads and processes, and
enforcing security policy, as well as satisfying any dependencies that the
component might have on other components.
Unified Programming Classes:
The Framework provides developers with a unified, object-oriented,
hierarchical and extensible set of class libraries (APIs).
The .Net Framework is a new computing platform that simplifies
application development in the highly distributed environment of the
internet. The .Net Framework is designed to fulfill the following
objectives:
To provide a consistent object oriented programming environment
whether object code is stored and executed locally but Internet
distributed or executed remotely.
To provide code-execution environment that minimizes software
deployment and versioning conflicts.
To provide code-execution environment that guarantees safe
execution of code, including code created by unknown or semi-trusted
third party. To provide code-execution environment that eliminates the
performance problems of scripted or interpreted environments.
To make the developer experience consistent across widely varying
types of applications, such as Windowsbased applications and Web-
based applications.
Server Application Development
Server side applications in the managed world are implemented
through runtime hosts. Unmanaged applications host the common
language runtime, which allows your custom managed code to control
the behavior of the server. This model provides you with all the features
8/2/2019 OCR Documentation
12/55
ONLINE CRIME REPORTING
12
of the common language runtime and class library while gaining the
performance and scalability of the host server.
When building applications or re-usable types (components) for the
.NET Framework, you must first select a programming language that youintend to write your source code in. Fortunately, the .NET Framework
supports many different programming languages including C#, C++ with
Managed Extensions, Visual Basic .NET, Cobol, APL, Perl, and many
more. The language you choose will determine how you express your
intentions to the .NET Framework.
Unified Programming Classes:
The Framework provides developers with a unified, object-oriented,
hierarchical and extensible set of class libraries (APIs).
The .Net Framework is a new computing platform that simplifies
application development in the highly distributed environment of the
internet. The .Net Framework is designed to fulfill the following
objectives:
To provide a consistent object oriented programming environmentwhether object code is stored and executed locally but Internet
distributed or executed remotely.
To provide code-execution environment that minimizes software
deployment and versioning conflicts.
To provide code-execution environment that guarantees safe
execution of code, including code created by unknown or semi-trusted
third party. To provide code-execution environment that eliminates the
performance problems of scripted or interpreted environments.
To make the developer experience consistent across widely varying
types of applications, such as Windowsbased applications and Web-
based applications.
8/2/2019 OCR Documentation
13/55
ONLINE CRIME REPORTING
13
Visual Basic .NET
Visual Basic.NET programming language closely related to Visual
Basic Programming Language but the two languages are not the same.
The VB.NET programming language has a syntax that is similar to Englishwhich promotes the clarity and readability of Visual Basic code. It can be
either a strongly typed or loosely typed language. Loose typing defers
much of the burden of type checking until a program is already running.
This includes not only type checking of conversions but also of method
calls, meaning that the binding of a method can be deferred until
runtime. This is useful when building prototypes or other programs in
which speed development is more important than execution speed.
Features of VB.NET
VB.NET is a program that is advanced version of VB 6.0. The main
features of the VB.NET are,
Object Oriented Language
Powerful language for development of application programs.
More security.
Multithreading and Multitasking
Internet Programming
Interpretability
Easily understanding coding
ASP.NET
ASP.NET is the hosting environment that enables developers to use
the .NET Framework to target Web-based applications. However,
ASP.NET is more than just a runtime host; it is a complete architecture
8/2/2019 OCR Documentation
14/55
ONLINE CRIME REPORTING
14
for developing Web sites and Internet-distributed objects using
managed code.
About ASP.NET
Active Server Pages is an open, compile-free application
environment in which we can combine HTML, scripts, and reusable
ActiveX server components to create dynamic and powerful Web-based
business solutions. ASP.Net, the latest version of Asp is Microsofts
technology for building dynamic, database-driven web sites. The reason
that Microsoft named the technology Active Server Pages is because it
very basically describes what the technology is all about
ASP.NET is a part of Microsofts overall. NET framework, which
contains a vast set of programming classes designed to satisfy any
conceivable programming need.
Significant features of ASP.NET
ASP.NET uses complied code written in Common Language Runtime
Language such as Visual Basic and c#.
ASP.NET pages are built on server-side controls.
ASP.NET includes a new technology called Web services. Web
services can be used to access methods and properties and transfer
database data across the Internet.
ASP.NET includes page and data caching mechanisms.
When an ASP.NET page is compiled, it is not compiled directly into
machine code. Instead it is compiled into an Intermediate-level language
called Microsoft Intermediate Language (MSIL). All .NET-compatible
languages are compiled into this Intermediate Language. Several of the
highest traffic Web Sites on the Internet employs Active Server Pages.
8/2/2019 OCR Documentation
15/55
ONLINE CRIME REPORTING
15
Examples include Dell Online, Barnes and Noble, 1-800-Flowers, and the
Microsoft site itself.
Both Web Forms and XML Web services use IIS and ASP.NET as
the publishing mechanism for applications, and both have a collection ofsupporting classes in the .NET Framework.
ABOUT BACK END
Microsoft SQL Server 2008
Features of SQL server 2008
1.Policy-Based Management
Management is centralized, thereby reducing the need toconfigure each server separately
Administration is simplified, reducing the effort required tomaintain standardization and compliance, even in complex
environments
Configuration is straightforward and can be done entirelywithin SQL Server Management Studio
Out-of-the-box predefined policies make it easy to get started Backwards compatibility supports managing instances of SQL
Server 2008, SQL Server 2005, and SQL Server 2000
2. Performance Data Collection (Data Collector)
Setup wizard makes configuration simple Data collection is automated by using set of SQL Server Agent
jobs and SQL Server Integration Services packages
Management is centralized so data collection can be easilyconfigured and results can be viewed in one place
Performance impact is minimal because the data collected canbe cached and uploaded to the data warehouse later
8/2/2019 OCR Documentation
16/55
ONLINE CRIME REPORTING
16
3. Data Compression
Save disk storage Enable compression option for individual tables or indexes
Configuration is easy using the Data Compression wizard Applications do not need to be reconfigured as SQL Server
handles compression and decompression of data
Compression can improve disk I/O and memory utilization4. Resource Governor
Prioritize applications, users, and computers competing for thesame resources
Prevent runaway queries that hold resources for extendedperiods of time
Limitations are not enforced when there is no competition forresources
5. Transparent Data Encryption
Implements strong encryption keys and certificates to securedata
Applications do not need to be modified to support TransparentData Encryption
Enables compliance with data privacy regulations Does not increase the size of the database
6. External Key Management / Extensible Key Management
Helps organizations comply with data privacy regulations Reduces administration requirements when there are multiple
keys and certificates to manage
Standard interface supports third party hardware securitymodules
7. Data Auditing
8/2/2019 OCR Documentation
17/55
ONLINE CRIME REPORTING
17
Enables compliance with security regulations Simple configuration using SQL Server Management Studio Minimal impact on performance because audit data is stored
outside of SQL Server database files
8. Hot-Add CPUs and Hot-Add Memory
Dynamically add memory and processors to servers without
incurring downtime
9. Streamlined Installation
Easier to install SQL Server Setup now advises of configuration problems such as
installation pre-requisites, which helps streamline the
installation process
10. Backup Compression
Save storage space Compressed backups can be stored on tape or on disk Simple configuration using SQL Server Management Studio Default state of all backups on a server to be compressed can
be configured
8/2/2019 OCR Documentation
18/55
ONLINE CRIME REPORTING
18
SYSTEM ANALYSIS
System study or system analysis is the process of gathering and
interpreting facts, and using the information of recommended
improvements on the system. System analysis is a problem solving
activity that requires intensive communication between the systemusers and system developers. The system analyst plays the role of an
interrogator and dwells deep into the working of present system. The
system is viewed as a whole and the inputs to the system are identified.
The outputs from the organizations are traced through various phases of
the processing of inputs. A detailed study of this processes must be
made by the various techniques like interviews, questionnaires etc. The
conclusion is an understanding of how the system functions. Now, the
existing system is subjected to close study and the areas are identified.
Preliminary Study is the process of gathering and interpreting
facts, using the information for further study on the system. Preliminary
Study is a problem solving activity that requires intensive
communication between the system users and the system developers. It
does various feasibility studies. In the studies a rough figure of the
system activities can be obtained, from which the decision about the
strategies to be followed for the Effective System Study and Analysis canbe taken. Here in this secured data transmission project, a detailed
study of the existing system is carried along with the all the steps in the
system analysis.
The importance of System Analysis phase is establishment of the
requirements for the system to be developed and installed. Analyzing
the project to understand the complexity forms the vital part of the
8/2/2019 OCR Documentation
19/55
ONLINE CRIME REPORTING
19
system study. Problematic areas are identified and information is
collected. Fact finding or gathering is essential to an analysis of
requirements. System analysis is the system approach to study and
solution of requirements. System analysis is the system approach to
study and solution of problem using computer based system.
A system is an orderly grouping of independent
components linked together according to a plan to achieve a specific
objective. Each component is a part of the total system and has to do its
share of work for the system to achieve the desired goal. This process
also referred to as the life cycle methodology. Different stages of life
cycles:-
Identification of need: One must know what the objective is,before it can be achieved.
Feasibility: A test of the system proposal according to itsworkability impact and orientation ability to meet user needs
and effective use of resource.
Analysis: Its a detail study of various operations performed bythe system and their relationships within and outside the
system.
Design: Decides the format to which the output is to beproduced.
Implementation: It involves user training, site preparation andfile conversion.
IDENTIFICATION OF NEED
The objectives of the system analysis phase are theestablishment of the requirements for the system to be acquired,
developed and installed. All sectors have been computerized. In order to
automate and improve the efficiency of the work, appropriate systems
are required. So workload can be minimized. The current/present
method is much time consuming.
EXISTING SYSTEM
8/2/2019 OCR Documentation
20/55
ONLINE CRIME REPORTING
20
The existing system is manual work in which written
complaints are submitted directly by hand/in person or telephony
through the link 100. This way of reporting is more time consuming. All
records are kept manually and are maintained at different law and order
institutions. A lot of time is also consuming while trying to get
information such as current status of a complaint.
DRAWBACKS OF EXISTING SYSTEM
1. It is time consuming.2. It is very much laborious.3. Record keeping is such a tedious job.4. Existing website with inactive links for reporting crimes.5. Much more difficulty in gathering information about the
progresses of the registered complaint.
PROPOSED SYSTEM
The proposed system is an effort to find solutions to most of the
inconveniences occurred/occurring in existing system. Lot of savings in
space by avoiding the registers, books etc, in time, by enhancing the
speed from man to machine can be achieved by developing this Online
Crime Reporting website. By computerizing the system, it is easy to
store and retrieve data. It is connected through internet, so time can be
saved. All data can be stored with the help of reporting pages of
website. In our proposed Online Crime Reporting system, the user can
enter the website, register new complaints/newly report crimes and
check the status of previously registered complaints. The task of
updating the status of a complaint is accomplished by the administratorof the website. Submitting a complaint/report in Online Crime
Reporting website, stores the user (who registers the complaint)
information and complaint information to the database. A case number
is assigned to a newly accepted complaint and is sent to the user via
Email. The user can check the progress of the complaint later using this
8/2/2019 OCR Documentation
21/55
ONLINE CRIME REPORTING
21
case number. The website would facilitate faster data manipulation at
reduced cost.
ADVANTAGES OF THE PROPOSED SYSTEM
1. Manipulation, storing and retrieval of information are madequick and simple.
2. Lesser labor required.3. Online facility saves time.4. Saves space by eliminating the usages of books, records, sheets
etc.
5. Miscellaneous guides to the users like district map showingpolice stations, important contacts (telephone numbers of the
police stations in Ernakulam district) etc.
PRELIMINARY INVESTIGATION
A detailed examination on the current system was conducted for
preliminary investigation by, gathering information about the needs, as
an effort to understand the complete details and implications.
The tools used for data collection are:
Review of written documents
Much documentation such as forms, records, complaints etc are
reviewed, organized and evaluated. The methods of recording each and
every process were studied and noted.
On site observation
Here the operation and physical layout of the current system were
studied by direct observations. This method is directed towards
describing and understanding events and behaviors as they occur.
8/2/2019 OCR Documentation
22/55
ONLINE CRIME REPORTING
22
Recording of information and other relevant operations were observed
and studied directly.
Interviews and questionnaires
People usually provide a best sort of information through this
activity and hence official and personal interviews with several police
officers and social workers including politicians were conducted. With
the list of questions well formulated before the interviews could focus
on collecting pertinent answers.
FEASIBILITY STUDY
Feasibility study is a system proposal according to work ability,impact on the operation, ability to meet users need and efficient use of
resources. The three key consideration involved in feasibility analysis are
Technical Feasibility
It deals with the hardware as well as software requirements. A
feasibility study deals with the scope was whether the work for the
project is done with current equipments or with the existing software
technology. Here we wants .net platform only.
Operational Feasibility
The purpose of the operational feasibility study was to determine
whether the new system need is developed and implemented? Will
there be a resistance from resource that will undermine the possible
application benefits? This positive exposure from them encouraged the
development of the new system
Economical feasibility
It is the most frequently used method for evaluating effectiveness
of the software. It is most commonly known as the cost benefit analysis.
The procedure is to determine the benefits and savings that are
expected from a candidate system and compare them with cost. If
8/2/2019 OCR Documentation
23/55
ONLINE CRIME REPORTING
23
benefits outweigh cost, the decision is made to design and implement
the system. Otherwise, further alternatives will have to be made.
SYSTEM DESIGN
Its the step by step implementation of the recommendations
given after the feasibility study of the software along with procedural
details and understanding. Naturally it is defined as the first step in the
development of final system. The system proposal given through useroriented documentation is transformed into the perspective of
programmers. This phase visualizes the transformation from the logical
views to physical specifications through development. The blueprint of
the upcoming system along with the relations of the components is
formulated. Development and formulation of the system is done with at
most care such that the potential of acceptability by the user is high.
The system design performed has following steps/stages.
1. Data Flow Diagram Design.2. Entity Relationship Diagram.3. Database Design.4. Input Design.5. Output Design.
8/2/2019 OCR Documentation
24/55
ONLINE CRIME REPORTING
24
DATA FLOW DIAGRAM
A data flow diagram is of networks that describe the flow of data
and the processes that change or transforms data through system. It is
the formal and logical abstract of a system that may have many possible
physical configurations, so some set of symbols without any physical
sense are used to represent data sources, data flow, data transmission
and data storage.
The basic structures used in DFDs are:
To represent data process
To represent external interactor
To represent data store/database
To represent data flow
8/2/2019 OCR Documentation
25/55
ONLINE CRIME REPORTING
25
DFD Level 0
DFD Level 1.0
8/2/2019 OCR Documentation
26/55
ONLINE CRIME REPORTING
26
8/2/2019 OCR Documentation
27/55
ONLINE CRIME REPORTING
27
DFD Level 1.1
DFD Level 2.0
DFD Level 2.1
8/2/2019 OCR Documentation
28/55
ONLINE CRIME REPORTING
28
DFD Level 2.2
ENTITY RELATIONSHIP DIAGRAM
8/2/2019 OCR Documentation
29/55
ONLINE CRIME REPORTING
29
An ER diagram can express the overall structure of the database
graphically. ER diagrams are simple and clear.
The ER diagram used in this project is given below.
8/2/2019 OCR Documentation
30/55
ONLINE CRIME REPORTING
30
8/2/2019 OCR Documentation
31/55
ONLINE CRIME REPORTING
31
DATABASE DESIGN
Database design mainly aims at handling large volumes of
information, involving the definitions for the structure of storage and
provisions for the manipulation of information, providing safety ofinformation despite of system crashes due to unauthorized accesses.
Some conditions are satisfied in database design stage.
Controlled redundancy. Ease of use. Data independency. Accuracy and integrity. Recovery from failure. Security and privacy. Performance.
As interfering whole, the database has a general theme as to
handle information, as a collection of interrelated data stored with
minimum redundancy for quick and efficient usages. Application design
also runs parallel to database design, which is met with at most care and
security during the designing. A better effort is to be done in making theminimum number of databases for maximum efficiency of the system.
8/2/2019 OCR Documentation
32/55
ONLINE CRIME REPORTING
32
Table: Users
Table: Complaints
8/2/2019 OCR Documentation
33/55
ONLINE CRIME REPORTING
33
Table: ComplaintProgresses
Table: ComplaintClosedDetails
Table: AdminUsers
Table: PoliceStations
8/2/2019 OCR Documentation
34/55
ONLINE CRIME REPORTING
34
INPUT DESIGN
The creation of website is made such a way that provisions are
made in act in order to prevent the entrance/entry of wrong input; As
example, when a wrong input is passed, facilities to display errormessages are made.
As the stage input design is the one that makes the users to
interact with the website, it consists of developing procedures and
specifications for processing. The main steps in input design are:
Controlling the amount of inputs. Avoiding inordinate delay.
OUTPUT DESIGN
Outputs from the system as information and results are referred in
this phase. Here the determination is taken about the type and format
of the output. It is needed to remember that the user evaluates the
usefulness of the system only through the output it generates. The
distribution specifications of the output to intended recipients are
determined here. The user friendliness of the screens with necessary
controls and layouts fits for these purpose.
8/2/2019 OCR Documentation
35/55
ONLINE CRIME REPORTING
35
SYSTEM DEVELOPMENT
The development phase is the third of four phases in the system
development life cycle. In this phase the computer information system is
constructed from the detailed specification prepared in the design phase.
The largest product expenditures occur during the development phase.
The principle activity of the development phase is coding and testing the
computer programs that make up the computer components of the
overall system. Other important activities include implementation,
planning, equipment acquisition and system testing.
This system is providing with the password facility, which assure
better security to the system. The main aim of the development phase is
to design the coding into corresponding programming language.
Simplicity and clarity is the main property of the coding. The coding
depends on the logical and detailed design of the system in the system
design phase.
During the development phase of our project we created the
forms and database. At present we are unable to provide connection
between front end and back end. So we cannot implement our software.
In development phase, we develop our proposed system as
according to the design specification. For this we have to provide a
working environment. There may be changes in our ideas and concepts
we move from design to development phase.
In order to working environment, our first aim was to install front-
end tools (ASP with VB.NET). We succeeded in the process. Then wecould make a connection between front-end and backend, so that we
could fulfill our ideas.
8/2/2019 OCR Documentation
36/55
ONLINE CRIME REPORTING
36
SYSTEM TESTING AND IMPLEMENTATION
Real time data is used from various systems for testing purpose
and results are compared with those obtained manually. Variations
between these are voided subsequently. A perfect system cannot accept
invalid data, so it is also put into test in order to clear the mistakes in
proportion. So a reconstruction is made such that the system is fully
compatible to correct inputs and can tackle the wrong/incorrect ones.
As the system is comprised of numerous procedures, in order to attain
the proper working, minute errors are treated in its seriousness and
checked carefully.
The implementation of system is done after the testing phase
along giving accurate training to the system users and post-
implementation reviews are made.
System testing (and enhancement) has five parts.
System testing Implementation plan. Education and training. Training on application software. Post implementation review.
SYSTEM TESTING
Assurance of quality of the system through testing includes the
ultimate specification reviews, design and coding of the software, with
the initiative of finding errors. On saying with probability, a better
testing has high probability of finding errors.
Main objectives
Ensuring the working of system as per the operationalspecifications.
Ensuring user requirements are concerned whilst operation. Ensuring the actual functionality of the controls.
8/2/2019 OCR Documentation
37/55
ONLINE CRIME REPORTING
37
Ensuring input-output accuracy. Ensuring tackling of incorrect inputs eventually.
The upcoming system is made for various testing for integrity and
result validations.
Unit testing
The developer performs this first level of testing which focuses on
the proper working of various modules as a whole, which is done during
code development. The success of this testing is in finding the
correctness of the internal logic of the system.
Interface testing
The assurance for the proper flow of information in and out of the
program is made through this test.
Data structure test
Through this testing it is made ensured that the existence of
temporary data doesnt scrambles the integrity of the program during all
steps, so the data structure is thoroughly examined. Accuracy in the
storage of data in underlying tables is also taken in concern.
Independent path test
Assurances of proper working of all individual paths through out
the program at module boundaries are tested.
Code testing
A well planned top-down sequenced testing is done for the
program code, until the programs are assembled as a component that
can be tested as a unit. The sub-modules in each main module are
tested with developed test cases for the correct output without any
break in the flow of execution.
8/2/2019 OCR Documentation
38/55
ONLINE CRIME REPORTING
38
Combine module testing
The goal of this important sort of testing is dealing with the
capability of integrating modules properly. For a satisfactory result, the
test is conducted by combining modules into sub-systems.
Validation testing
The restrictions for the invalid data are tested for proclaiming the
system perfect. The improper blocks are made reconstructed until it is
ready to respond accurately against valid and invalid data.
Specification testing
The performance of system under various circumstances and
conditions are tested.User acceptance testing
Without emphasizing on the internal logical constraints, the
external behavior of the system is tested for the purpose of exercising
the total system, by leaving the program under real time environmental
conditions. The specifications for this test are made by the user and
responsible for conducting. This gives surety for the user about the
readiness of the system as for operating.
IMPLEMENTATION PLAN
The transformation from theoretical designs to working system is
done in this stage. Developed package of system is tested with simple
data, accurate error identification and then through proposed change
from the user, training to the user etc. A dress rehearsal like working of
system is done, so as the system is scrutinized, for pointing out errorsand modifications required if any keeping in mind the expectations and
specifications from the system.
EDUCATION AND TRAINING
The expectations from the system are made achieved by the
people who will be involved to be confident of their role in the new
8/2/2019 OCR Documentation
39/55
ONLINE CRIME REPORTING
39
system. The complexity of the system is directly proportional to the
amount of training and education given for the users. Education is
different from the training, as the user through education can be a part
of the development of the system. Education have the capability to
make training more interesting, and its needed to make confidence in
the people that they can make important contributions in system
changes.
Training just means to give user specific skills in order to meet their new
job requirements. The role of system analyst in training will make it
more understandable and effective. Training provides a better overview
of new system and its present objectives.
TRAINING ON THE APPLICATION SOFTWARE
Awareness about the new system is made to the users through
training, and with the underlying philosophy of the system (screen
design, flow, error types during inputs, validation checks etc) Application
training means covering of the information needed for a specific user to
use the system, as the users of the system may be of at different levels
of hierarchy.
POST IMPLEMENTATION REVIEW
System performance v/s expected requirements are evaluated.
The implementation problems if any is taken seriously and taken care of
along with admiring the achievements, failures etc. The works done here
are used to improve the efficiency and user friendliness of the system.
8/2/2019 OCR Documentation
40/55
ONLINE CRIME REPORTING
40
FUTURE ENHANCEMENTS
Future enhancements in the Online Crime Reporting website
include live video conferencing/chatting and telephony with Police
officers and officers of Crime Stopper Branch.
Another important enhancement will be proposed in future is
reopening of closed/.rejected cases. A user will be made possible to
reopen cases that were once closed.
8/2/2019 OCR Documentation
41/55
ONLINE CRIME REPORTING
41
CONCLUSION
At the finishing stage of this project, we are proud to present
before everybody an attempt for facilitating the complaint registering
process via online. The website ONLINE CRIME REPORTING is our
humble forward to the society. It is natural to have mistakes and the
occurrences of drawbacks as we lack the practice and experience. But
we have done our best to tackle those and to rectify them with
maximum user friendliness in design and program execution.
8/2/2019 OCR Documentation
42/55
ONLINE CRIME REPORTING
42
BIBLIOGRAPHY
Web Sites
www.msdn.microsoft.com/ASP.net www.vbcity.com www.codeguru.com www.codeproject.com
Books
Steven Holzner-Visual Basic 2005 Black Book Evjen Henselman-Professional Asp.Net 2.0,Wrox Publications Paul Nielson-Ms SQL Server Bible, Wrox Publications Rojer S. Pressman-Software Engineering A Practical Approach,
McGraw Hill. Fifth Edition
C. J. Date-An Introduction to Database Systems, AddisonWesley
Richard Fairly-Software Engineering, McGraw Hill
Applications
MSDN Library for Visual Studio 2008 Beta 2 - ENU
http://www.codeproject.com/http://www.codeproject.com/8/2/2019 OCR Documentation
43/55
ONLINE CRIME REPORTING
43
SCREEN
LAYOUTS
8/2/2019 OCR Documentation
44/55
ONLINE CRIME REPORTING
44
USER/PUBLIC SIDE
Online Crime Reporting-Website-Home page
8/2/2019 OCR Documentation
45/55
ONLINE CRIME REPORTING
45
Online Crime Reporting-Website-Conditions page
Online Crime Reporting-Website-Enter user details page
8/2/2019 OCR Documentation
46/55
ONLINE CRIME REPORTING
46
Online Crime Reporting-Website-Enter crime details
Online Crime Reporting-Website-User check progress login
8/2/2019 OCR Documentation
47/55
ONLINE CRIME REPORTING
47
Online Crime Reporting-Website-User progress view
Online Crime Reporting-Website-About site page
8/2/2019 OCR Documentation
48/55
ONLINE CRIME REPORTING
48
Online Crime Reporting-Website-History of police
Online Crime Reporting-Website-Important contacts page
8/2/2019 OCR Documentation
49/55
ONLINE CRIME REPORTING
49
ADMINISTRATOR/SERVER SIDE
Online Crime Reporting-Website-Administrator login page
8/2/2019 OCR Documentation
50/55
ONLINE CRIME REPORTING
50
Online Crime Reporting-Website-Administrator home page
Online Crime Reporting-Website-Administrator set progress page
8/2/2019 OCR Documentation
51/55
ONLINE CRIME REPORTING
51
Online Crime Reporting-Website-Administrator view progress page
Online Crime Reporting-Website-Administrator closing complaintsw
8/2/2019 OCR Documentation
52/55
ONLINE CRIME REPORTING
52
ALGORITHM
Report a crime:
1. Start2. Input user details3. Input crime details4. Register crime5. Stop
Check crime progress:
1. Start2. Input case number3. View case progress details4. Stop
Set progress:
1. Start2. Input case number3. Set progress as accepted or rejected4. Stop
8/2/2019 OCR Documentation
53/55
ONLINE CRIME REPORTING
53
FLOWCHARTReport a crime:
Check progress:
Start
Stop
In ut user details
In ut crime details
Register crime
Start
Stop
In ut case number
View case progress
8/2/2019 OCR Documentation
54/55
ONLINE CRIME REPORTING
54
Set case progress:
Start
Stop
In ut case number
Set case progress
8/2/2019 OCR Documentation
55/55
ONLINE CRIME REPORTING