OCR Documentation

Embed Size (px)

Citation preview

  • 8/2/2019 OCR Documentation

    1/55

    ONLINE CRIME REPORTING

    1

    MCS -044

    BY

    RANJITH S NAIR

    Submitted to the School of

    Computer and Information Sciences, IGNOU

    In partial fulfillment of the requirements for the award of the

    degree

    Master of Computer Applications (MCA)

    2012

    Indira Gandhi National Open University

    Maidan Garhi,

    New Delhi110068

  • 8/2/2019 OCR Documentation

    2/55

    ONLINE CRIME REPORTING

    2

    DECLARATION

    I hereby declare that this project entitled Online Crime

    Reporting, submitted to University of IGNOU for the partial fulfillment

    of the Degree in MCA is a record of original work done by us and that

    this project work has not formed as the basis for the award of any

    Degree/Diploma of similar title to any candidate of any University.

    Place:

    Date:

  • 8/2/2019 OCR Documentation

    3/55

    ONLINE CRIME REPORTING

    3

    ACKNOWLEDGEMENT

    The completion of our project Online Crime Reporting is

    done with at most contributions and valuable helpings from our lectures

    and friends.

    We are thankful to our teachers, our librarian and all other staff in

    our institution for giving us the necessary guidance and help for

    completing our project successfully.

    Moreover we are thankful to all our friends and students in our

    campus for their valuable suggestions and encouragement. Finally we

    express our deep gratitude to all those who have helped us directly andindirectly for the successful completion of the project.

  • 8/2/2019 OCR Documentation

    4/55

    ONLINE CRIME REPORTING

    4

    ABSTRACT

    A society is an assembly of people with different levels of mind.

    Some may be guilty to crime whereas some may be innocent. As the

    situation of now days, in review of increasing occurrences of crimes, the

    value and morale of society is decelerating. Here we are humbly

    presenting a new method of reporting non-emergency crimes through

    online facilities. Emergency crimes should be taken in its entire

    seriousness and urgency.

    The website Online Crime Reportingprovides a new way for

    reporting non emergency cases. This site is designed so that a user can

    do with at most ease. By submitting a complaint a case number will be

    provided through Email within 1-2 days with which he/she can check the

    progress of respective complaint. A complaint is registered in its entirety

    with the personal details of the user along with that of who he/she is on

    behalf to and with the crime details.

    The administrator of this web site, naturally a police officer

    responsible for assigning the case number after accepting the complaint

    is allowed to access with a protected username and password. Further

    progresses on the complaint can be remarked by the administrator

    whereas users can only view the progress. Important actions like closing

    or rejecting the complaint is a privilege of the administrator.

  • 8/2/2019 OCR Documentation

    5/55

    ONLINE CRIME REPORTING

    5

    INDEX

    I. INTRODUCTIONII. OBJECTIVE

    III. SYSTEM ENVIRONMENT1. Hardware specifications2. Minimum hardware required by the system3. Software configuration4. Software requirements5. Software specifications

    a) About front end(1) .NET framework(2) Visual Basic .NET(3) ASP.NET

    b) About back end(1) Microsoft SQL server 2008

    IV. SYSTEM ANALYSIS1. Identification of need2. Existing system3. Drawbacks of existing system4. Proposed system5. Advantages of proposed system6. Preliminary investigation7. Feasibility study

    V. SYSTEM DESIGN1. Algorithm

  • 8/2/2019 OCR Documentation

    6/55

    ONLINE CRIME REPORTING

    6

    2. Flowchart3. Data flow diagrams4. Entity-relationship diagrams5. Database design6. Input design7. Output design

    VI. SYSTEM DEVELOPMENTVII. SYSTEM TESTING AND IMPLEMENTATION

    1. System testing2. Implementation plan3. Education and training4. Training to application software5. Post implementation review

    VIII. FUTURE ENHANCEMENTSIX. CONCLUSIONX. BIBLIOGRAPHY

    XI. SCREEN LAYOUT1. User/Public side2. Administrator/Server side

  • 8/2/2019 OCR Documentation

    7/55

    ONLINE CRIME REPORTING

    7

    INTRODUCTION

    The world today is better to say machine age, the place where

    things controlled, formulated and results provided with the essential

    help of machines viz. computers. As human race finds more time setting

    up on computers via networks, like internet, on considering the time

    they spends on zapping through websites, some important facilities is

    better to provide via online.

    The project explained in this report Online Crime Reporting is

    an online facilitation to report non-emergency crimes. The project has

    its existence in two fragments, as usual, a client/user side and a

    server/administrator side. The client/user side provides facilities, mainly

    Report a crime. Here the user can report a crime of the sort of non -

    emergency along with his personal details, with that of who he/she is on

    behalf to and with the crime details. The user should check an

    agreement to ensure that the crime reported is genuine or else he/she

    will face its consequences and punishments for the act of fraud.

    Reporting a crime successfully, will provide the user with a case number

    via Email in 1-2 days with which he/she can check the progress through

    the Check Progress link in the home page

    The server side meant to be used by police personnel via username

    and password is full of facilities to administer on the complaints/crime

    reported by the clients/users such as accepting the complaint, add

    progresses of the investigations on the crimes reported, closing or

    rejecting the complaint under respective circumstances etc.

  • 8/2/2019 OCR Documentation

    8/55

    ONLINE CRIME REPORTING

    8

    OBJECTIVE

    The Online Crime Reporting website aims to completely

    computerize manual complaint registering process, especially non-

    emergency crimes, so as to make time consumption less. The website

    provides a user friendly environment to register/report complaints.

    After registering a complaint, the user will receive a case number via

    Email, if the complaint has been accepted by the website

    administrator/police department. The manipulations on the registered

    complaints are done by the website administrator including the

    determinations like accepting, rejecting, setting progresses and closing

    of the complaints according to the investigations. The whole details

    about the user and the crime is made available to the administrator by

    the user. If any further clarifications needed, telephone calls are done by

    the police officers to the person who registered the complaint.

    The main objectives are:

    Online complaint registration. Fast and easier reporting. Facility for checking progress on the investigation by the user. Facilities for accepting, rejecting, setting progresses and closing

    the complaints by the administrator.

    Sending case number to the user via Email while accepting thecomplaint.

    Sending Email to the user while rejecting the complaint. Miscellaneous guides to the user such as district map showing

    police stations, important contacts etc.

  • 8/2/2019 OCR Documentation

    9/55

    ONLINE CRIME REPORTING

    9

    SYSTEM ENVIRONMENT

    System configuration means the essential facilities for the working

    of our new website.

    There are mainly two classifications for system configuration.

    1. Hardware specifications.2.

    Software specifications.

    HARDWARE SPECIFICATIONS

    The following hardware is used for the development of the

    system.

    Processor : Intel Core i5

    Main memory : 4 GB Hard disk capacity : 500 GB Display : 14.0 HD LED Backlight Display

    MINIMUM HARDWARE CONFIGURATION REQUIRED BY THE SYSTEM

    Platform : Windows 2000/XP Processor : Pentium 3/AMD/above Main memory : 256 MB Hard disk capacity : 4 GB Printer : Dot Matrix/DeskJet/Laser

    SOFTWARE CONFIGURATION

  • 8/2/2019 OCR Documentation

    10/55

    ONLINE CRIME REPORTING

    10

    The software used for creating this website is ASP.net, Windows 7

    Ultimate and Microsoft SQL Server 2008.

    SOFTWARE REQUIREMENTS

    Microsoft Windows with IIS (OS 98 or above). ASP.net (Front end). Microsoft SQL server 2008(Back end).

    SOFTWARE SPECIFICATIONS

    FRONT END : ASP.Net with VB.NET

    BACK END : SQL SERVER 2008

    OPERATING SYSTEM : Windows 7 Ultimate

    ABOUT FRONT END

    .NET framework

    The .NET Framework is an integral Windows component for

    building and running the next generation of software applications and

    Web services. Microsoft .NET is software that connects information,

    people, systems, and devices. It spans clients, servers, and developer

    tools. The .Net Framework is a multi-language environment for building,

    deploying and running XML Web services and applications. It consists oftwo main parts.

    Common Language Runtime:

    Despite its name, the runtime actually has a role in both a

    components and runtime and development time experiences. While

  • 8/2/2019 OCR Documentation

    11/55

    ONLINE CRIME REPORTING

    11

    the component is running, the runtime is responsible for managing

    memory allocation, starting up and stopping threads and processes, and

    enforcing security policy, as well as satisfying any dependencies that the

    component might have on other components.

    Unified Programming Classes:

    The Framework provides developers with a unified, object-oriented,

    hierarchical and extensible set of class libraries (APIs).

    The .Net Framework is a new computing platform that simplifies

    application development in the highly distributed environment of the

    internet. The .Net Framework is designed to fulfill the following

    objectives:

    To provide a consistent object oriented programming environment

    whether object code is stored and executed locally but Internet

    distributed or executed remotely.

    To provide code-execution environment that minimizes software

    deployment and versioning conflicts.

    To provide code-execution environment that guarantees safe

    execution of code, including code created by unknown or semi-trusted

    third party. To provide code-execution environment that eliminates the

    performance problems of scripted or interpreted environments.

    To make the developer experience consistent across widely varying

    types of applications, such as Windowsbased applications and Web-

    based applications.

    Server Application Development

    Server side applications in the managed world are implemented

    through runtime hosts. Unmanaged applications host the common

    language runtime, which allows your custom managed code to control

    the behavior of the server. This model provides you with all the features

  • 8/2/2019 OCR Documentation

    12/55

    ONLINE CRIME REPORTING

    12

    of the common language runtime and class library while gaining the

    performance and scalability of the host server.

    When building applications or re-usable types (components) for the

    .NET Framework, you must first select a programming language that youintend to write your source code in. Fortunately, the .NET Framework

    supports many different programming languages including C#, C++ with

    Managed Extensions, Visual Basic .NET, Cobol, APL, Perl, and many

    more. The language you choose will determine how you express your

    intentions to the .NET Framework.

    Unified Programming Classes:

    The Framework provides developers with a unified, object-oriented,

    hierarchical and extensible set of class libraries (APIs).

    The .Net Framework is a new computing platform that simplifies

    application development in the highly distributed environment of the

    internet. The .Net Framework is designed to fulfill the following

    objectives:

    To provide a consistent object oriented programming environmentwhether object code is stored and executed locally but Internet

    distributed or executed remotely.

    To provide code-execution environment that minimizes software

    deployment and versioning conflicts.

    To provide code-execution environment that guarantees safe

    execution of code, including code created by unknown or semi-trusted

    third party. To provide code-execution environment that eliminates the

    performance problems of scripted or interpreted environments.

    To make the developer experience consistent across widely varying

    types of applications, such as Windowsbased applications and Web-

    based applications.

  • 8/2/2019 OCR Documentation

    13/55

    ONLINE CRIME REPORTING

    13

    Visual Basic .NET

    Visual Basic.NET programming language closely related to Visual

    Basic Programming Language but the two languages are not the same.

    The VB.NET programming language has a syntax that is similar to Englishwhich promotes the clarity and readability of Visual Basic code. It can be

    either a strongly typed or loosely typed language. Loose typing defers

    much of the burden of type checking until a program is already running.

    This includes not only type checking of conversions but also of method

    calls, meaning that the binding of a method can be deferred until

    runtime. This is useful when building prototypes or other programs in

    which speed development is more important than execution speed.

    Features of VB.NET

    VB.NET is a program that is advanced version of VB 6.0. The main

    features of the VB.NET are,

    Object Oriented Language

    Powerful language for development of application programs.

    More security.

    Multithreading and Multitasking

    Internet Programming

    Interpretability

    Easily understanding coding

    ASP.NET

    ASP.NET is the hosting environment that enables developers to use

    the .NET Framework to target Web-based applications. However,

    ASP.NET is more than just a runtime host; it is a complete architecture

  • 8/2/2019 OCR Documentation

    14/55

    ONLINE CRIME REPORTING

    14

    for developing Web sites and Internet-distributed objects using

    managed code.

    About ASP.NET

    Active Server Pages is an open, compile-free application

    environment in which we can combine HTML, scripts, and reusable

    ActiveX server components to create dynamic and powerful Web-based

    business solutions. ASP.Net, the latest version of Asp is Microsofts

    technology for building dynamic, database-driven web sites. The reason

    that Microsoft named the technology Active Server Pages is because it

    very basically describes what the technology is all about

    ASP.NET is a part of Microsofts overall. NET framework, which

    contains a vast set of programming classes designed to satisfy any

    conceivable programming need.

    Significant features of ASP.NET

    ASP.NET uses complied code written in Common Language Runtime

    Language such as Visual Basic and c#.

    ASP.NET pages are built on server-side controls.

    ASP.NET includes a new technology called Web services. Web

    services can be used to access methods and properties and transfer

    database data across the Internet.

    ASP.NET includes page and data caching mechanisms.

    When an ASP.NET page is compiled, it is not compiled directly into

    machine code. Instead it is compiled into an Intermediate-level language

    called Microsoft Intermediate Language (MSIL). All .NET-compatible

    languages are compiled into this Intermediate Language. Several of the

    highest traffic Web Sites on the Internet employs Active Server Pages.

  • 8/2/2019 OCR Documentation

    15/55

    ONLINE CRIME REPORTING

    15

    Examples include Dell Online, Barnes and Noble, 1-800-Flowers, and the

    Microsoft site itself.

    Both Web Forms and XML Web services use IIS and ASP.NET as

    the publishing mechanism for applications, and both have a collection ofsupporting classes in the .NET Framework.

    ABOUT BACK END

    Microsoft SQL Server 2008

    Features of SQL server 2008

    1.Policy-Based Management

    Management is centralized, thereby reducing the need toconfigure each server separately

    Administration is simplified, reducing the effort required tomaintain standardization and compliance, even in complex

    environments

    Configuration is straightforward and can be done entirelywithin SQL Server Management Studio

    Out-of-the-box predefined policies make it easy to get started Backwards compatibility supports managing instances of SQL

    Server 2008, SQL Server 2005, and SQL Server 2000

    2. Performance Data Collection (Data Collector)

    Setup wizard makes configuration simple Data collection is automated by using set of SQL Server Agent

    jobs and SQL Server Integration Services packages

    Management is centralized so data collection can be easilyconfigured and results can be viewed in one place

    Performance impact is minimal because the data collected canbe cached and uploaded to the data warehouse later

  • 8/2/2019 OCR Documentation

    16/55

    ONLINE CRIME REPORTING

    16

    3. Data Compression

    Save disk storage Enable compression option for individual tables or indexes

    Configuration is easy using the Data Compression wizard Applications do not need to be reconfigured as SQL Server

    handles compression and decompression of data

    Compression can improve disk I/O and memory utilization4. Resource Governor

    Prioritize applications, users, and computers competing for thesame resources

    Prevent runaway queries that hold resources for extendedperiods of time

    Limitations are not enforced when there is no competition forresources

    5. Transparent Data Encryption

    Implements strong encryption keys and certificates to securedata

    Applications do not need to be modified to support TransparentData Encryption

    Enables compliance with data privacy regulations Does not increase the size of the database

    6. External Key Management / Extensible Key Management

    Helps organizations comply with data privacy regulations Reduces administration requirements when there are multiple

    keys and certificates to manage

    Standard interface supports third party hardware securitymodules

    7. Data Auditing

  • 8/2/2019 OCR Documentation

    17/55

    ONLINE CRIME REPORTING

    17

    Enables compliance with security regulations Simple configuration using SQL Server Management Studio Minimal impact on performance because audit data is stored

    outside of SQL Server database files

    8. Hot-Add CPUs and Hot-Add Memory

    Dynamically add memory and processors to servers without

    incurring downtime

    9. Streamlined Installation

    Easier to install SQL Server Setup now advises of configuration problems such as

    installation pre-requisites, which helps streamline the

    installation process

    10. Backup Compression

    Save storage space Compressed backups can be stored on tape or on disk Simple configuration using SQL Server Management Studio Default state of all backups on a server to be compressed can

    be configured

  • 8/2/2019 OCR Documentation

    18/55

    ONLINE CRIME REPORTING

    18

    SYSTEM ANALYSIS

    System study or system analysis is the process of gathering and

    interpreting facts, and using the information of recommended

    improvements on the system. System analysis is a problem solving

    activity that requires intensive communication between the systemusers and system developers. The system analyst plays the role of an

    interrogator and dwells deep into the working of present system. The

    system is viewed as a whole and the inputs to the system are identified.

    The outputs from the organizations are traced through various phases of

    the processing of inputs. A detailed study of this processes must be

    made by the various techniques like interviews, questionnaires etc. The

    conclusion is an understanding of how the system functions. Now, the

    existing system is subjected to close study and the areas are identified.

    Preliminary Study is the process of gathering and interpreting

    facts, using the information for further study on the system. Preliminary

    Study is a problem solving activity that requires intensive

    communication between the system users and the system developers. It

    does various feasibility studies. In the studies a rough figure of the

    system activities can be obtained, from which the decision about the

    strategies to be followed for the Effective System Study and Analysis canbe taken. Here in this secured data transmission project, a detailed

    study of the existing system is carried along with the all the steps in the

    system analysis.

    The importance of System Analysis phase is establishment of the

    requirements for the system to be developed and installed. Analyzing

    the project to understand the complexity forms the vital part of the

  • 8/2/2019 OCR Documentation

    19/55

    ONLINE CRIME REPORTING

    19

    system study. Problematic areas are identified and information is

    collected. Fact finding or gathering is essential to an analysis of

    requirements. System analysis is the system approach to study and

    solution of requirements. System analysis is the system approach to

    study and solution of problem using computer based system.

    A system is an orderly grouping of independent

    components linked together according to a plan to achieve a specific

    objective. Each component is a part of the total system and has to do its

    share of work for the system to achieve the desired goal. This process

    also referred to as the life cycle methodology. Different stages of life

    cycles:-

    Identification of need: One must know what the objective is,before it can be achieved.

    Feasibility: A test of the system proposal according to itsworkability impact and orientation ability to meet user needs

    and effective use of resource.

    Analysis: Its a detail study of various operations performed bythe system and their relationships within and outside the

    system.

    Design: Decides the format to which the output is to beproduced.

    Implementation: It involves user training, site preparation andfile conversion.

    IDENTIFICATION OF NEED

    The objectives of the system analysis phase are theestablishment of the requirements for the system to be acquired,

    developed and installed. All sectors have been computerized. In order to

    automate and improve the efficiency of the work, appropriate systems

    are required. So workload can be minimized. The current/present

    method is much time consuming.

    EXISTING SYSTEM

  • 8/2/2019 OCR Documentation

    20/55

    ONLINE CRIME REPORTING

    20

    The existing system is manual work in which written

    complaints are submitted directly by hand/in person or telephony

    through the link 100. This way of reporting is more time consuming. All

    records are kept manually and are maintained at different law and order

    institutions. A lot of time is also consuming while trying to get

    information such as current status of a complaint.

    DRAWBACKS OF EXISTING SYSTEM

    1. It is time consuming.2. It is very much laborious.3. Record keeping is such a tedious job.4. Existing website with inactive links for reporting crimes.5. Much more difficulty in gathering information about the

    progresses of the registered complaint.

    PROPOSED SYSTEM

    The proposed system is an effort to find solutions to most of the

    inconveniences occurred/occurring in existing system. Lot of savings in

    space by avoiding the registers, books etc, in time, by enhancing the

    speed from man to machine can be achieved by developing this Online

    Crime Reporting website. By computerizing the system, it is easy to

    store and retrieve data. It is connected through internet, so time can be

    saved. All data can be stored with the help of reporting pages of

    website. In our proposed Online Crime Reporting system, the user can

    enter the website, register new complaints/newly report crimes and

    check the status of previously registered complaints. The task of

    updating the status of a complaint is accomplished by the administratorof the website. Submitting a complaint/report in Online Crime

    Reporting website, stores the user (who registers the complaint)

    information and complaint information to the database. A case number

    is assigned to a newly accepted complaint and is sent to the user via

    Email. The user can check the progress of the complaint later using this

  • 8/2/2019 OCR Documentation

    21/55

    ONLINE CRIME REPORTING

    21

    case number. The website would facilitate faster data manipulation at

    reduced cost.

    ADVANTAGES OF THE PROPOSED SYSTEM

    1. Manipulation, storing and retrieval of information are madequick and simple.

    2. Lesser labor required.3. Online facility saves time.4. Saves space by eliminating the usages of books, records, sheets

    etc.

    5. Miscellaneous guides to the users like district map showingpolice stations, important contacts (telephone numbers of the

    police stations in Ernakulam district) etc.

    PRELIMINARY INVESTIGATION

    A detailed examination on the current system was conducted for

    preliminary investigation by, gathering information about the needs, as

    an effort to understand the complete details and implications.

    The tools used for data collection are:

    Review of written documents

    Much documentation such as forms, records, complaints etc are

    reviewed, organized and evaluated. The methods of recording each and

    every process were studied and noted.

    On site observation

    Here the operation and physical layout of the current system were

    studied by direct observations. This method is directed towards

    describing and understanding events and behaviors as they occur.

  • 8/2/2019 OCR Documentation

    22/55

    ONLINE CRIME REPORTING

    22

    Recording of information and other relevant operations were observed

    and studied directly.

    Interviews and questionnaires

    People usually provide a best sort of information through this

    activity and hence official and personal interviews with several police

    officers and social workers including politicians were conducted. With

    the list of questions well formulated before the interviews could focus

    on collecting pertinent answers.

    FEASIBILITY STUDY

    Feasibility study is a system proposal according to work ability,impact on the operation, ability to meet users need and efficient use of

    resources. The three key consideration involved in feasibility analysis are

    Technical Feasibility

    It deals with the hardware as well as software requirements. A

    feasibility study deals with the scope was whether the work for the

    project is done with current equipments or with the existing software

    technology. Here we wants .net platform only.

    Operational Feasibility

    The purpose of the operational feasibility study was to determine

    whether the new system need is developed and implemented? Will

    there be a resistance from resource that will undermine the possible

    application benefits? This positive exposure from them encouraged the

    development of the new system

    Economical feasibility

    It is the most frequently used method for evaluating effectiveness

    of the software. It is most commonly known as the cost benefit analysis.

    The procedure is to determine the benefits and savings that are

    expected from a candidate system and compare them with cost. If

  • 8/2/2019 OCR Documentation

    23/55

    ONLINE CRIME REPORTING

    23

    benefits outweigh cost, the decision is made to design and implement

    the system. Otherwise, further alternatives will have to be made.

    SYSTEM DESIGN

    Its the step by step implementation of the recommendations

    given after the feasibility study of the software along with procedural

    details and understanding. Naturally it is defined as the first step in the

    development of final system. The system proposal given through useroriented documentation is transformed into the perspective of

    programmers. This phase visualizes the transformation from the logical

    views to physical specifications through development. The blueprint of

    the upcoming system along with the relations of the components is

    formulated. Development and formulation of the system is done with at

    most care such that the potential of acceptability by the user is high.

    The system design performed has following steps/stages.

    1. Data Flow Diagram Design.2. Entity Relationship Diagram.3. Database Design.4. Input Design.5. Output Design.

  • 8/2/2019 OCR Documentation

    24/55

    ONLINE CRIME REPORTING

    24

    DATA FLOW DIAGRAM

    A data flow diagram is of networks that describe the flow of data

    and the processes that change or transforms data through system. It is

    the formal and logical abstract of a system that may have many possible

    physical configurations, so some set of symbols without any physical

    sense are used to represent data sources, data flow, data transmission

    and data storage.

    The basic structures used in DFDs are:

    To represent data process

    To represent external interactor

    To represent data store/database

    To represent data flow

  • 8/2/2019 OCR Documentation

    25/55

    ONLINE CRIME REPORTING

    25

    DFD Level 0

    DFD Level 1.0

  • 8/2/2019 OCR Documentation

    26/55

    ONLINE CRIME REPORTING

    26

  • 8/2/2019 OCR Documentation

    27/55

    ONLINE CRIME REPORTING

    27

    DFD Level 1.1

    DFD Level 2.0

    DFD Level 2.1

  • 8/2/2019 OCR Documentation

    28/55

    ONLINE CRIME REPORTING

    28

    DFD Level 2.2

    ENTITY RELATIONSHIP DIAGRAM

  • 8/2/2019 OCR Documentation

    29/55

    ONLINE CRIME REPORTING

    29

    An ER diagram can express the overall structure of the database

    graphically. ER diagrams are simple and clear.

    The ER diagram used in this project is given below.

  • 8/2/2019 OCR Documentation

    30/55

    ONLINE CRIME REPORTING

    30

  • 8/2/2019 OCR Documentation

    31/55

    ONLINE CRIME REPORTING

    31

    DATABASE DESIGN

    Database design mainly aims at handling large volumes of

    information, involving the definitions for the structure of storage and

    provisions for the manipulation of information, providing safety ofinformation despite of system crashes due to unauthorized accesses.

    Some conditions are satisfied in database design stage.

    Controlled redundancy. Ease of use. Data independency. Accuracy and integrity. Recovery from failure. Security and privacy. Performance.

    As interfering whole, the database has a general theme as to

    handle information, as a collection of interrelated data stored with

    minimum redundancy for quick and efficient usages. Application design

    also runs parallel to database design, which is met with at most care and

    security during the designing. A better effort is to be done in making theminimum number of databases for maximum efficiency of the system.

  • 8/2/2019 OCR Documentation

    32/55

    ONLINE CRIME REPORTING

    32

    Table: Users

    Table: Complaints

  • 8/2/2019 OCR Documentation

    33/55

    ONLINE CRIME REPORTING

    33

    Table: ComplaintProgresses

    Table: ComplaintClosedDetails

    Table: AdminUsers

    Table: PoliceStations

  • 8/2/2019 OCR Documentation

    34/55

    ONLINE CRIME REPORTING

    34

    INPUT DESIGN

    The creation of website is made such a way that provisions are

    made in act in order to prevent the entrance/entry of wrong input; As

    example, when a wrong input is passed, facilities to display errormessages are made.

    As the stage input design is the one that makes the users to

    interact with the website, it consists of developing procedures and

    specifications for processing. The main steps in input design are:

    Controlling the amount of inputs. Avoiding inordinate delay.

    OUTPUT DESIGN

    Outputs from the system as information and results are referred in

    this phase. Here the determination is taken about the type and format

    of the output. It is needed to remember that the user evaluates the

    usefulness of the system only through the output it generates. The

    distribution specifications of the output to intended recipients are

    determined here. The user friendliness of the screens with necessary

    controls and layouts fits for these purpose.

  • 8/2/2019 OCR Documentation

    35/55

    ONLINE CRIME REPORTING

    35

    SYSTEM DEVELOPMENT

    The development phase is the third of four phases in the system

    development life cycle. In this phase the computer information system is

    constructed from the detailed specification prepared in the design phase.

    The largest product expenditures occur during the development phase.

    The principle activity of the development phase is coding and testing the

    computer programs that make up the computer components of the

    overall system. Other important activities include implementation,

    planning, equipment acquisition and system testing.

    This system is providing with the password facility, which assure

    better security to the system. The main aim of the development phase is

    to design the coding into corresponding programming language.

    Simplicity and clarity is the main property of the coding. The coding

    depends on the logical and detailed design of the system in the system

    design phase.

    During the development phase of our project we created the

    forms and database. At present we are unable to provide connection

    between front end and back end. So we cannot implement our software.

    In development phase, we develop our proposed system as

    according to the design specification. For this we have to provide a

    working environment. There may be changes in our ideas and concepts

    we move from design to development phase.

    In order to working environment, our first aim was to install front-

    end tools (ASP with VB.NET). We succeeded in the process. Then wecould make a connection between front-end and backend, so that we

    could fulfill our ideas.

  • 8/2/2019 OCR Documentation

    36/55

    ONLINE CRIME REPORTING

    36

    SYSTEM TESTING AND IMPLEMENTATION

    Real time data is used from various systems for testing purpose

    and results are compared with those obtained manually. Variations

    between these are voided subsequently. A perfect system cannot accept

    invalid data, so it is also put into test in order to clear the mistakes in

    proportion. So a reconstruction is made such that the system is fully

    compatible to correct inputs and can tackle the wrong/incorrect ones.

    As the system is comprised of numerous procedures, in order to attain

    the proper working, minute errors are treated in its seriousness and

    checked carefully.

    The implementation of system is done after the testing phase

    along giving accurate training to the system users and post-

    implementation reviews are made.

    System testing (and enhancement) has five parts.

    System testing Implementation plan. Education and training. Training on application software. Post implementation review.

    SYSTEM TESTING

    Assurance of quality of the system through testing includes the

    ultimate specification reviews, design and coding of the software, with

    the initiative of finding errors. On saying with probability, a better

    testing has high probability of finding errors.

    Main objectives

    Ensuring the working of system as per the operationalspecifications.

    Ensuring user requirements are concerned whilst operation. Ensuring the actual functionality of the controls.

  • 8/2/2019 OCR Documentation

    37/55

    ONLINE CRIME REPORTING

    37

    Ensuring input-output accuracy. Ensuring tackling of incorrect inputs eventually.

    The upcoming system is made for various testing for integrity and

    result validations.

    Unit testing

    The developer performs this first level of testing which focuses on

    the proper working of various modules as a whole, which is done during

    code development. The success of this testing is in finding the

    correctness of the internal logic of the system.

    Interface testing

    The assurance for the proper flow of information in and out of the

    program is made through this test.

    Data structure test

    Through this testing it is made ensured that the existence of

    temporary data doesnt scrambles the integrity of the program during all

    steps, so the data structure is thoroughly examined. Accuracy in the

    storage of data in underlying tables is also taken in concern.

    Independent path test

    Assurances of proper working of all individual paths through out

    the program at module boundaries are tested.

    Code testing

    A well planned top-down sequenced testing is done for the

    program code, until the programs are assembled as a component that

    can be tested as a unit. The sub-modules in each main module are

    tested with developed test cases for the correct output without any

    break in the flow of execution.

  • 8/2/2019 OCR Documentation

    38/55

    ONLINE CRIME REPORTING

    38

    Combine module testing

    The goal of this important sort of testing is dealing with the

    capability of integrating modules properly. For a satisfactory result, the

    test is conducted by combining modules into sub-systems.

    Validation testing

    The restrictions for the invalid data are tested for proclaiming the

    system perfect. The improper blocks are made reconstructed until it is

    ready to respond accurately against valid and invalid data.

    Specification testing

    The performance of system under various circumstances and

    conditions are tested.User acceptance testing

    Without emphasizing on the internal logical constraints, the

    external behavior of the system is tested for the purpose of exercising

    the total system, by leaving the program under real time environmental

    conditions. The specifications for this test are made by the user and

    responsible for conducting. This gives surety for the user about the

    readiness of the system as for operating.

    IMPLEMENTATION PLAN

    The transformation from theoretical designs to working system is

    done in this stage. Developed package of system is tested with simple

    data, accurate error identification and then through proposed change

    from the user, training to the user etc. A dress rehearsal like working of

    system is done, so as the system is scrutinized, for pointing out errorsand modifications required if any keeping in mind the expectations and

    specifications from the system.

    EDUCATION AND TRAINING

    The expectations from the system are made achieved by the

    people who will be involved to be confident of their role in the new

  • 8/2/2019 OCR Documentation

    39/55

    ONLINE CRIME REPORTING

    39

    system. The complexity of the system is directly proportional to the

    amount of training and education given for the users. Education is

    different from the training, as the user through education can be a part

    of the development of the system. Education have the capability to

    make training more interesting, and its needed to make confidence in

    the people that they can make important contributions in system

    changes.

    Training just means to give user specific skills in order to meet their new

    job requirements. The role of system analyst in training will make it

    more understandable and effective. Training provides a better overview

    of new system and its present objectives.

    TRAINING ON THE APPLICATION SOFTWARE

    Awareness about the new system is made to the users through

    training, and with the underlying philosophy of the system (screen

    design, flow, error types during inputs, validation checks etc) Application

    training means covering of the information needed for a specific user to

    use the system, as the users of the system may be of at different levels

    of hierarchy.

    POST IMPLEMENTATION REVIEW

    System performance v/s expected requirements are evaluated.

    The implementation problems if any is taken seriously and taken care of

    along with admiring the achievements, failures etc. The works done here

    are used to improve the efficiency and user friendliness of the system.

  • 8/2/2019 OCR Documentation

    40/55

    ONLINE CRIME REPORTING

    40

    FUTURE ENHANCEMENTS

    Future enhancements in the Online Crime Reporting website

    include live video conferencing/chatting and telephony with Police

    officers and officers of Crime Stopper Branch.

    Another important enhancement will be proposed in future is

    reopening of closed/.rejected cases. A user will be made possible to

    reopen cases that were once closed.

  • 8/2/2019 OCR Documentation

    41/55

    ONLINE CRIME REPORTING

    41

    CONCLUSION

    At the finishing stage of this project, we are proud to present

    before everybody an attempt for facilitating the complaint registering

    process via online. The website ONLINE CRIME REPORTING is our

    humble forward to the society. It is natural to have mistakes and the

    occurrences of drawbacks as we lack the practice and experience. But

    we have done our best to tackle those and to rectify them with

    maximum user friendliness in design and program execution.

  • 8/2/2019 OCR Documentation

    42/55

    ONLINE CRIME REPORTING

    42

    BIBLIOGRAPHY

    Web Sites

    www.msdn.microsoft.com/ASP.net www.vbcity.com www.codeguru.com www.codeproject.com

    Books

    Steven Holzner-Visual Basic 2005 Black Book Evjen Henselman-Professional Asp.Net 2.0,Wrox Publications Paul Nielson-Ms SQL Server Bible, Wrox Publications Rojer S. Pressman-Software Engineering A Practical Approach,

    McGraw Hill. Fifth Edition

    C. J. Date-An Introduction to Database Systems, AddisonWesley

    Richard Fairly-Software Engineering, McGraw Hill

    Applications

    MSDN Library for Visual Studio 2008 Beta 2 - ENU

    http://www.codeproject.com/http://www.codeproject.com/
  • 8/2/2019 OCR Documentation

    43/55

    ONLINE CRIME REPORTING

    43

    SCREEN

    LAYOUTS

  • 8/2/2019 OCR Documentation

    44/55

    ONLINE CRIME REPORTING

    44

    USER/PUBLIC SIDE

    Online Crime Reporting-Website-Home page

  • 8/2/2019 OCR Documentation

    45/55

    ONLINE CRIME REPORTING

    45

    Online Crime Reporting-Website-Conditions page

    Online Crime Reporting-Website-Enter user details page

  • 8/2/2019 OCR Documentation

    46/55

    ONLINE CRIME REPORTING

    46

    Online Crime Reporting-Website-Enter crime details

    Online Crime Reporting-Website-User check progress login

  • 8/2/2019 OCR Documentation

    47/55

    ONLINE CRIME REPORTING

    47

    Online Crime Reporting-Website-User progress view

    Online Crime Reporting-Website-About site page

  • 8/2/2019 OCR Documentation

    48/55

    ONLINE CRIME REPORTING

    48

    Online Crime Reporting-Website-History of police

    Online Crime Reporting-Website-Important contacts page

  • 8/2/2019 OCR Documentation

    49/55

    ONLINE CRIME REPORTING

    49

    ADMINISTRATOR/SERVER SIDE

    Online Crime Reporting-Website-Administrator login page

  • 8/2/2019 OCR Documentation

    50/55

    ONLINE CRIME REPORTING

    50

    Online Crime Reporting-Website-Administrator home page

    Online Crime Reporting-Website-Administrator set progress page

  • 8/2/2019 OCR Documentation

    51/55

    ONLINE CRIME REPORTING

    51

    Online Crime Reporting-Website-Administrator view progress page

    Online Crime Reporting-Website-Administrator closing complaintsw

  • 8/2/2019 OCR Documentation

    52/55

    ONLINE CRIME REPORTING

    52

    ALGORITHM

    Report a crime:

    1. Start2. Input user details3. Input crime details4. Register crime5. Stop

    Check crime progress:

    1. Start2. Input case number3. View case progress details4. Stop

    Set progress:

    1. Start2. Input case number3. Set progress as accepted or rejected4. Stop

  • 8/2/2019 OCR Documentation

    53/55

    ONLINE CRIME REPORTING

    53

    FLOWCHARTReport a crime:

    Check progress:

    Start

    Stop

    In ut user details

    In ut crime details

    Register crime

    Start

    Stop

    In ut case number

    View case progress

  • 8/2/2019 OCR Documentation

    54/55

    ONLINE CRIME REPORTING

    54

    Set case progress:

    Start

    Stop

    In ut case number

    Set case progress

  • 8/2/2019 OCR Documentation

    55/55

    ONLINE CRIME REPORTING