Uploaded by Remon Husta

crimereportingsystem-160412164410

advertisement
PROJECT REPORT
ON
CRIME REPORTING SYSTEM
BY
HAROON ALAM
CLASS NO. 204
BS (CS)
SESSION 2012-2015
A project report submitted to the IBMS, The University of Agriculture, Peshawar in partial fulfillment
of the requirements for the degree of
BACHELOR OF SCIENCE IN COMPUTER SCIENCE
SUPERVISED BY
Mr. FAWAD ALI
INSTITUTE OF BUSINESS AND MANAGEMENT SCIENCE
THE UNIVERSITY OF AGRICULTURE
PESHAWAR, PAKISTAN
FEBRUARY, 2016
PROJECT REPORT
ON
CRIME REPORTING SYSTEM
BY
HAROON ALAM
CLASS NO. 204
BS (CS)
SESSION 2012-2015
A project report submitted to the IBMS, The University of Agriculture, Peshawar in partial fulfillment
of the requirements for the degree of
BACHELOR OF SCIENCE IN COMPUTER SCIENCE
Approved By:
_______________________________
Mr. Fawad Ali
(Advisor)
_______________________________
Mr. Imran Ud Din
(Member)
_______________________________
Mr. Sadiq Shah
(Member)
_______________________________
Mr. Muhammad Shahid
(Incharge CS/IT)
_______________________________
Dr. Muhammad Fayaz
(Additional Director IBMS)
INSTITUTE OF BUSINESS AND MANAGEMENT SCIENCE
THE UNIVERSITY OF AGRICULTURE
PESHAWAR, PAKISTAN
FEBRUARY, 2016
TABLE OF CONTENTS
CHAPTER 1 .........................................................................................................................................1
CHAPTER # 1 Introduction ...................................................................................................................2
1.1 Introduction..............................................................................................................................2
1.2 Overview of the Present System.................................................................................................2
1.3 Drawbacks in the Present System ...............................................................................................3
1.3.1 Time Consuming .................................................................................................................3
1.3.2 Redundancy of Data (Duplication of Data) ............................................................................3
1.3.3 Changing/Removing Of Records ...........................................................................................3
1.3.4 Storage Media ....................................................................................................................3
1.3.5 Information Updating..........................................................................................................3
1.3.6 Backup and Recovery ..........................................................................................................4
1.3.7 Integrity .............................................................................................................................4
1.3.8 Burden of Work ..................................................................................................................4
1.4 Background...............................................................................................................................4
1.5 Proposed System and Objectives of the System ..........................................................................6
1.6 Advantages of Proposed System.................................................................................................6
1.6.1
Accessibility..................................................................................................................6
1.6.2 Accuracy and Consistency....................................................................................................7
1.6.3 Input Improvements............................................................................................................7
1.6.4 Faster Information Retrieval ................................................................................................7
1.6.5 Reduction of Workload........................................................................................................7
1.6.6 Flexibility............................................................................................................................7
1.6.7 Reduced Redundancy ..........................................................................................................7
1.6.8 Reduction in Cost................................................................................................................8
1.6.9 Security ..............................................................................................................................8
1.6.10 Backup Facilities................................................................................................................8
1.6.11 Data retrieval ....................................................................................................................8
1.7 Operational feasibility................................................................................................................8
1.8 Technical Feasibility...................................................................................................................8
1.9 Financial Feasibility....................................................................................................................9
1.10 Requirement Analysis ..............................................................................................................9
1.10.1 Requirement Definition .....................................................................................................9
1.10.2 Requirement Specification .................................................................................................9
1.11 Main Components of Our Project ........................................................................................... 10
1.12 Tools Used ............................................................................................................................ 11
CHAPTER # 2
System Design ........................................................................................................ 13
2.1 Introduction............................................................................................................................ 13
2.1.1 Logical Design....................................................................................................................... 13
2.1.2 Physical Design..................................................................................................................... 13
2.2 Input Design............................................................................................................................ 13
2.3 Data Capturing ........................................................................................................................ 14
2.4 Input Validation ...................................................................................................................... 14
2.5 Output Design......................................................................................................................... 14
2.6 Data Base Design..................................................................................................................... 14
2.7 Architectural Design ................................................................................................................ 15
2.8 Conceptual Database Design .................................................................................................... 15
2.9 Modular Design....................................................................................................................... 15
2.10 Internal Data Base Design ...................................................................................................... 20
2.11 Internal Data Base Design of Crime Reporting System.............................................................. 20
Figure 2.5 FIR Table....................................................................................................................... 20
Figure 2.6 Online FIR Details Table ................................................................................................. 21
Figure 2.7 Crime Type Table .......................................................................................................... 21
Figure 2.8 Admin Login Table ......................................................................................................... 22
Figure 2.9 FIR Forward Table ......................................................................................................... 22
Figure 2.10 City Table .................................................................................................................... 22
2.12 Logical Database Design......................................................................................................... 22
2.13 Entity .................................................................................................................................... 23
2.14 Entity Relationship Model ...................................................................................................... 23
2.15 Entity Relationship Diagram ................................................................................................... 23
Figure 2.11 Data flow Diagram....................................................................................................... 26
CHAPTER # 3 System Implementation ................................................................................................ 28
3.1 Overview ................................................................................................................................ 28
Figure 3.3 FIR Page........................................................................................................................ 32
CHAPTER # 4 System Testing ............................................................................................................. 34
4.1 Introduction................................................................................................................................ 34
4.2 Testing Objectives ................................................................................................................... 34
4.3 Testing Strategies.................................................................................................................... 34
4.3.1 White Box Testing ............................................................................................................. 35
4.3.2 Stress Testing.................................................................................................................... 35
4.3.3 Acceptance Testing ........................................................................................................... 35
4.3.4 Assertion Testing .............................................................................................................. 36
4.3.5 Unit Testing ...................................................................................................................... 36
4.3.6 System Testing ..................................................................................................................... 36
4.4 System Evaluation ................................................................................................................... 36
4.5 Implementation ...................................................................................................................... 37
4.6 Installation of Computer Equipment’s....................................................................................... 37
4.7 Testing the New System........................................................................................................... 37
4.7.1 Unit Testing ...................................................................................................................... 37
4.7.2 Integrated Testing............................................................................................................. 37
4.7.3 System Testing.................................................................................................................. 37
4.7.4 Direct/ Cash Conversion .................................................................................................... 38
4.8 Conclusion........................................................................................................................... 38
Reference List................................................................................................................................... 40
List of Figures
Figure 2.1 General Data Entry ........................................................................................... 16
Figure 2.2 Delete Module .................................................................................................. 17
Figure 2.3 Update Module ................................................................................................. 18
Figure 2.4 Login Module ................................................................................................... 19
Figure 2.5 FIR Table ........................................................................................................ 20
Figure 2.6 Online FIR Details Table................................................................................... 21
Figure 2.7 Crime Type Table ............................................................................................. 21
Figure 2.8 Admin Login Table........................................................................................... 22
Figure 2.9 FIR Forward Table............................................................................................ 22
Figure 2.10 City Table ...................................................................................................... 22
Figure 2.11 Entity Relation Diagram .................................................................................. 25
Figure 2.12 Data flow Diagram.......................................................................................... 26
Figure 3.1 User interface ................................................................................................... 30
Figure 3.2 Admin Page...................................................................................................... 31
Figure 3.3 FIR Detail Page ................................................................................................ 32
List of abbreviation:
CRS: Crime Reporting System
FIR: First Information Report
PHP: Hypertext Preprocessor
MYSQL: Structure Query Language
HTML: Hyper Text Markup Language
CSS: Cascading Style Sheet
CHAPTER 1
INTRODUCTION
1
CHAPTER # 1 Introduction
1.1 Introduction
Online FIR System is the Computerization of present manual system of Police Stations. There
are many flaws and shortcomings in the present system. The present system is a manual system.
In case of present manual system all the record is kept in documented form and stored in various
types of registers. The manual system has no proper system for record storage and storing the
information about crimes and criminals. The present system of police is not automated. The
documentation of criminal records is done manually. Case files are dumped in heaps while some
are kept on shelves. These important documents quickly get dusty and because of lack of proper
storage, some criminal documents are seriously damaged. With this kind of situation, it becomes
highly difficult and even impossible to track down known criminal, access past criminal history
of a suspect and know the status of some concluded cases.
In police stations all the file work is done by the staff, so burden of work leads to the criminal’s
information to be delayed. There are also problems of record storage, updating, backup and
recovery and redundancy of data. To overcome the problems in present system we design such a
computerized information system, which is free of all the flaws, present in the manual system of
the institute. As computer is one of the leading technologies nowadays, so we propose a
computer based system that will fulfill the requirements of the police stations easily and will be
the solution to the problems faced by Police stations. It will facilitate both the user as well as
administrative staff of the Police Stations. Computerized system provides accuracy, security, and
reduced redundancy, reduction of work load, backup facilities and faster information retrieval.
1.2 Overview of the Present System
The present system of the Police Stations in KPK is a manual system. In order to make a
computerized system, we first check the present system so that we get to know about the flaws
and shortcomings in this system. This study will help us to design such a computerized system
for Police, which is free of all the flaws presented in manual system of the police station and will
facilitate both the user as well as administrative staff of police station.
2
1.3 Drawbacks in the Present System
There are some drawbacks and flaws existing in current manual system. For example, record
about crime cases and FIR’s are recorded manually. There is no proper security of these record
books, because all the record books are stored in the cabinet and anyone can damage them or
anything can possibly damage them, these problems have plagued the police department and
affect the policing system in the country. Some of these problems are enumerated below.
1.3.1 Time Consuming
In the existing system, the information about the crimes is stored in registers. When information
about a particular crimes or FIR’s is required or when some changes are needed in the record,
one has to search many registers for required register. Moreover, it is time consuming task to
change or update information manually.
Also the present system requires a lot of time to accomplish the task of complaining a report, and
other updating or changing in the current information.
1.3.2 Redundancy of Data (Duplication of Data)
There are a lot of redundant data found in the present system. The data of a crime and criminals
is to be kept at many places; i.e. in many different files. Similarly, the complaint forms and the
other important information about crime or criminal are also produce redundant data.
1.3.3 Changing/Removing Of Records
If there is an error in a single record then the police department has to make changes in many
files. If they want to remove or change the data, they will have to change them at all place, where
they kept them.
1.3.4 Storage Media
For handling data and related information, several registers are used i.e. the same data is stored at
multiple locations which wastes a lot of stationary.
1.3.5 Information Updating
It is a well-known fact that with the passage of time, old data needs modification. Process of
modification, updating and addition of new information and data are very slow.
3
1.3.6 Backup and Recovery
In the existing manual system there is always a risk of accidental data lost. There is no backup
and recovery facility presented in manual system, so important data may be lost.
1.3.7 Integrity
It has been proved that the manual system of collecting and storing personal information is
devoid of integrity.
1.3.8 Burden of Work
In police department all the files work is done by the staff, so burden of work leads to the
important works to be delayed.
All the above mentioned drawbacks in the present system lead to an inefficient and time
consuming process of handling records about crimes. The present manual system is not capable
of fulfilling the requirements of the reports about a crime on the basis of particular criteria.
Besides, in time retrieval of crimes and criminal’s complete record is also not possible without
devoting enough time for searching different files. In the existing manual system there is always
a risk of accidental lost of recorded data. If once such information is damaged, then there remain
no backup copies to be used in the future. So it becomes difficult to recover information once
destroyed in the manual system.
1.4 Background
Our Police Stations are still represents 19th century, nothing has changed nor upgraded if you go
there to register the FIR you will witness that same old constabulary system, Same old registers
same old ways Carbon papers kept between two for multiple copies and registering FIR least
takes an hour.
Later when the police forward the registered FIR to designated Investigation officer, he adds up
more papers in it, in which he reviews the crime scene and other technicalities, there is no such
thing as Copy of CNIC attached with Registered FIR by the Complainer, 14 days of duration for
the investigation after which case gets forwarded to the court or either ends up in the record
room.
4
Does it has to be like this all the way since dark ages, to ensure that after FIR has been registered
informing onto the computerized data base doesn’t exists by which all other Police Stations in
other respective areas , cities , town across Pakistan gets to know if they have any information
regarding that issue or suspect?
Even if the government start upgrading the policing and FIR system one by one, I think there
will be a day when people would be able to know the status of their registered FIR online and if
nothing has happened for far, forward the complaint to the courts, but unfortunately nobody
seems to be bothered about Computerized FIR Registration which is must advantages I wouldn’t
be able to list down all but I am sure if you are educated person than you know what is possible
in this age when the data gets Online,
What to expect from such departments ( JUSTICE ) please don’t joke with me, increasing
salaries and benefits reducing the ratio of bribery in this department but until and unless FIR’s
will not get logged Online we wouldn’t be able to know what is actually happening.
I feel like crying after seeing such policing system, 1947 till 2012 only thing which has upgraded
is SHO’s Room with AC rest It’s a place where you can say Timeless world you cannot tell
which year it is when you are in the police station, neither proper place to seat, nor the
environment is good. Over all you will witness yourself that Years even centuries doesn’t matter,
are we improving the System? or we have become the part of it by accepting just the way it is,
beside this what other options to do have, The answer is NONE, Speak up like me, somebody
might hear you out.
Else, only Personal Source is most welcome, if anyone from authorities above IO and SHO read
this would ask them and order them as if without that, it is not their duty to perform on regular
basis. Where are we living some sort of Stone age?
Speak up to improve and for the change by yourself, else nobody is bothered to hear the deeds.
Police Departments of KPK, the overall System is manual .There are many problems in this
manual System all record of crimes and criminals are store in register which is very difficult for
administrative department to find the record of different crimes and criminals.
5
Police Departments of KPK, the overall System is manual .There are many problems in this
manual System all record of crimes and criminals are store in register which is very difficult for
administrative department to find the record of different crimes and criminals. In manual system
also find out the missing criminals and most wanted for Police Department. We want to
computerize this manual system .we developed Online FIR System for Police department which
is user friendly and allots of facility. For Police department it saves the time easy to use and very
easy for the admin as well as for users.
1.5 Proposed System and Objectives of the System
Since we have discussed that present manual system of the Police Station of KPK is lengthy and
time consuming. After a detailed study of the current system, it is a good time to propose a new
system which is based on a computer. As computer is one of the leading technology now a days,
so we propose a computer based system that will fulfill the requirements of the Police Stations of
KPK easily and will be the solution to the problems faced to the Police department. The
proposed system is aimed to remove all the drawbacks and limitations of existing system and
making it more responsive to the users and management needs. In the proposed system, we have
tried our best to meet all the objectives of the Police Department. The major objectives of the
proposed system are to provide the faster means of Crime Compliant Report. It will reduce the
time consumed in preparation of reports and to get benefit from the latest technology of
computers.
The proposed system includes the following features:
1. To provide a secure system to users
2.
Complaint registration
3. Online FIR System
4. Giving Feedback to users.
1.6 Advantages of Proposed System
In contrast to old manual system the proposed system has the following advantages:
1.6.1
Accessibility
Accessibility refers to the design of products, devices, services, or environments for people with
disabilities. The concept of accessible design ensures both “direct access” (i.e. unassisted) and
6
"indirect access" meaning compatibility with a person's assistive technology (for example,
computer screen readers).
Accessibility can be viewed as the "ability to access" and benefit from some system or entity.
The concept focuses on enabling access for people with disabilities.
1.6.2 Accuracy and Consistency
The basic advantage of computerized system is its accuracy. A man is vulnerable to mistake
where computer software is free. Similarly, the consistency of the records and transactions make
a computer more advantageous over manual system.
1.6.3 Input Improvements
In the proposed system, all the input data is stored in the appropriate database files. Moreover,
the user can store the same data only at a single location thus reducing consumption and
redundancy and hence the chances of errors are minimized.
1.6.4 Faster Information Retrieval
The data of individual criminals including chest number is stored in a computer and can be
retrieved which is required by the police department. Thus the user can also obtain the required
information by clicking buttons etc in no time in contrast to the manual system.
1.6.5 Reduction of Workload
In the proposed system no work is involved. It helps in reducing workload on staff members of
the police department. The computer does all the work of making entry of data of crimes and
criminals… The computers will do the rest of the work.
1.6.6 Flexibility
The proposed system is flexible enough i.e. addition of new records, updating of records and
handling of new application are possible.
1.6.7 Reduced Redundancy
In the new system data is stored centrally. The storage of the same data is done at a single
location. So the redundancy of data has been reduced up to a great extent as compared to the
present system, where the same data has to be stored in different registers and files.
7
1.6.8 Reduction in Cost
The cost of conducting the information manually is greatly reduced. Because computers do all
work then there is no need of paper work. The reduced manual and paper work minimizes the
cost of the process of new entry of criminal record. This reduction in cost is especially important
for all police department.
1.6.9 Security
The proposed system provides enough security against data loss and also ensures that illegal
access to the data is denied.
1.6.10 Backup Facilities
Proposed system provides the facility to back up the data for safety purposes in case of data
corruption or data loss.
1.6.11 Data retrieval
Data retrieval means obtaining data from a database management system such as ODBMS. In
this case, it is considered that data is represented in a structured way, and there is no ambiguity in
data.
1. It will reduce redundancy
2. The users can retrieve information fast and timely.
3. It will reduce workload of employee
4. It will be more flexible
5. It provide more security
6. It has backup facilities
1.7 Operational feasibility
The software is very user-friendly, the admin and user can easily operate the software without
any difficulty. There are somewhat trained computer personal indifferent and some of them are
not familiar with computer and they can be trained.
1.8 Technical Feasibility
This is a web base application. The following technology needed for the system to be developed
and is available to us at our work place.
8
DBMS
MYSQL
Operating system
Microsoft Windows10
Design and coding tools
HTML5, CSS3, JavaScript, PHP5
Documentation tools
MSOffice 2016
Designing tools
Adobe Photoshop and Paint
1.9 Financial Feasibility
The cost of converting the manual system into a computerized is one of important factor. The
proposed system is financially very visible and feasible. It is not very inexpensive because it is
an individual project .So there are no costs invaded like searching and hiring personal. The
technologies that we are going to use are in common use and are always made available to work
with. So there is no purchase costs involved, no huge cast involved in training. Also no extra
hardware or additional staff is required for the department.
1.10 Requirement Analysis
It is a communication between customer and software development team. To get better
understanding of the requirement, a prototype was made and then we visited to many time in
Police department’s of KPK for requirement gathering, which resulted more benefits and
functionalities which was impossible without requirement specification.
1.10.1 Requirement Definition
In this stage we define different users of the system and their role in operating this software. .i.e.
the administrator can manage the whole system i.e. Administrator manages user, requirements.
While users manage information of his own.
1.10.2 Requirement Specification
Out of various alternatives structured language is used to write down functional requirement.
Structure language which is a restricted form of natural language use template to specify
requirements.
9
A feasibility study is a short focus study that aims to answer of a number of questions
1. Does the system contribute to overall object of organization?
2. Can the system be implemented using current technology and with given cost and
schedule constraints?
3. Can the system integrated with other system which are already in place?
4. You should talk with information source to discover the answer to the question?
5. How would the organization cope if this system not works?
6. What is the problem with current processes and how a new system would help alleviate
these problems?
7. What direct contribution will the system make to the business objective and
requirements?
8. Can information be transform to and from other organizational system?
9. Does the System require technology that has not previously been used in organization?
10. What must be supported by the System and what need not to be supported?
A successful completion and adoption of the automated system will definitely make the work
easier around its field by maintaining all records about police department i.e. FIR management
system, feedback, etc.
The existing manual system will be replaced by automated. As it is mentioned earlier that a
manual system is more laborious, insecure and time consuming. All the information are kept and
derived manually. This system will be able to meet all the requirements of easy to use, easy to
maintain, secure etc. Records and information will be kept and upgraded safely and data will be
processed faster in proposed automated system.
1.11 Main Components of Our Project
1. User
2. Admin
3. FIR System
4. Feedback
5. Program
10
1.12 Tools Used
The tool used in the development of “Crime Reporting System” is MYSQL at
the backend.
For front end for window base application we use PHP. Besides these tools we used have the
number of other CASE tools (CSS, HTML, and JavaScript).
11
CHAPTER 2
SYSTEM DESIGN
12
CHAPTER # 2 System Design
2.1 Introduction
The design is a solution, the translation of requirements into center ways of meeting. The design
is actually the process of analyzing, organizing and developing a database model that accurately
reflects the organization functioning in the real world and implementing that model by creating a
database requires an appropriate methodology. System can be divided into two phases:
1. Logical Design
2. Physical Design
2.1.1 Logical Design
The logical design describes the detail specification for the proposed system. We can say that it
describes its own feature. Input, output, file (table) and database in manner that meets the project
needs. In logical design work with users is done to develop general design, choose best design,
develop system flow charts, identify hardware, software and personal needs and revise estimates
etc.
2.1.2 Physical Design
The purpose of physical design is to translate the logical description of data into the technical
specification for storing and retrieving data. The goal is to create design for storing data that will
provide adequate performance and ensure database integrity, security and recovery.
Physical database design does not include implementing files and databases (i.e. creating them
and loading data into them).
2.2 Input Design
The input design specifies the number in which the user enters the data to the system for
processing at later stage. Input design can insure the reliability of the system and provide an
accurate result. The input determines whether the user interacts with the system efficiently or
not. The input design can also be explained as a link between the user and the world. Input
design consists of those steps necessary to put transactions data into usable form of processing.
While designing the input for the Crime Reporting System for police departments of KPK has
the following objectives were kept in mind as guidelines.
13
1. Reducing the amount of input
2. Avoiding errors in data
3. Keeping extra steps
4. Keeping the process simple
5. Avoiding delays
2.3 Data Capturing
In input design only those items are captured which must actually be the subject
of input
while designing the input, following points were kept in mind.
1. Crime information
2. Complaint report record
3. Admin information
4. User information
2.4 Input Validation
Input validation is general term given to method, aim for detecting errors in the input. The main
thing, which is considered in the input, is that what the chances of error are? Following are input
validation used for centralized system for Crime Reporting System for police department.
1. Empty entry Control
2. Data Type Validation
3. Not Null
2.5 Output Design
A system is considered to be successful or unsuccessful on the basis of output design. The term
“output” means that after compilation of physical design what errors come out of the computer
system for the user. The output in project is considered as the backbone of the project. All
managerial design is actually made through these reports. Basically the reports are very
important aspect of the output. The user creates various reports in response to queries.
2.6 Data Base Design
Database Design is a creative process of transforming:
14
1. Problems into Solution
2. The description of solution
3. Intelligent database design is perhaps the most critical element of an optimal solution
with respect to performance. In fact, poor design is usually the culprit for poorly
performing solutions.
4. Designer of the database should satisfy the user.
2.7 Architectural Design
The primary objective of architectural design is to develop a modular program structure and
represent the control relationship between them.
2.8 Conceptual Database Design
Tells the user exactly
1. What the system will do
2. Describe the functions of the systems
3. The system will work in the following areas
4. Unique authorized access to all registered users
5. Purchasing of products
6. Data Validation checks
7. The system is defined by its boundaries, entities, attributes, and relationship
2.9 Modular Design
Modular design occurs after data; architecture and interface designs have been established. In
and world, the modular specification required to be define algorithmic details would be stated in
a natural language such as English because it is easily understandable. And then that straight
forward plain English are converted to diagrams.
There is no question that graphics tools such as flow charts or box diagrams provide excellent
pictorial patterns that readily depict modular details. However graphical tools are misused, the
wrong picture may lead to wrong software. In this section we will demonstrate some of our basic
modules by using Flow Charts. Such as form entry, deletion, insertion, updating and reports.
15
Start
Form
YES
Stored in database
Confirmation
Message
End
NO
Enter Data
Form
Is Valid?
Back
Figure 2.1 General data entry
16
Start
Load Data
Form
No
Is Found?
Back
Yes
Runs Delete
Module
Delete
Confirmation
Message
End
Figure 2.2 Delete Module
17
Start
Load Data
Form
No
Is Found?
Yes
Runs Update
Module
Store
Update
Confirmation
Message
End
Figure 2.3 Update Module
18
Start
LOGIN
Enter User
Name and
Password
Back
Form
Incorrect
Message
No
Is Correct?
Yes
Runs Login
Module
Logins
End
Figure 2.4 Login Module
19
2.10 Internal Data Base Design
The purpose of the Internal or physical database design is to translate the logical description of
data into the technical specification for storing and retrieving data. As we know that the physical
database design requires several critical decisions that will affect the integrity and performance
of the application system. One of those decisions is the storage format (data type). So for our
project we have taken the decision to the following data types and length for the attributes. The
following are the tables, their attributes and the primary and foreign keys in the table
2.11 Internal Data Base Design of Crime Reporting System
Tables
Column
Type
Null
Id
int(11)
No
first_name
varchar(50)
No
last_name
varchar(50)
No
Gender
varchar(10)
No
date_of_crime
Date
No
time_of_crime
varchar(50)
No
Address
varchar(300)
No
City
varchar(50)
No
contact_no
varchar(20)
No
Email
varchar(50)
No
crime_type
varchar(50)
No
crime_location
varchar(200)
No
Incident
Text
No
photo1
varchar(200)
No
photo2
varchar(200)
No
Figure 2.5 FIR Table
20
Default
Column
Type
Null
Default
F_id
int(10)
No
date
Datetime
No
time
Datetime
No
description
varchar(45)
Yes
NULL
status
varchar(45)
Yes
NULL
crime_id
int(10)
No
id_proof
varchar(45)
No
id_proof_no
int(10)
No
crimephoto1
varchar(255)
Yes
NULL
crimephoto2
varchar(255)
Yes
NULL
crimelocation
varchar(45)
No
reg_id
int(10)
No
claim_id
int(10)
No
victim_id
int(10)
No
dt_time
Datetime
Yes
NULL
area_id
int(10)
Yes
NULL
Figure 2.6 Online FIR Details Table
Column
Type
Null
crime_id
int(10)
No
crime_type
varchar(45)
No
description
varchar(45)
No
Default
Figure 2.7 Crime Type Table
21
Column
Type
Null
Default
Username
varchar(45)
No
Password
varchar(45)
No
Type
varchar(15)
Yes
NULL
Status
varchar(10)
Yes
NULL
last_logindatetime
datetime
Yes
NULL
Figure 2.8 Admin Login Table
Column
Type
Null
F_id
int(10)
No
username
varchar(45)
No
status
varchar(15)
Yes
description
varchar(45)
No
dt_time
Datetime
Yes
from
varchar(45)
No
Default
NULL
NULL
Figure 2.9 FIR Forward Table
Column
Type
Null
city_id
int(10)
No
city_name
varchar(45)
No
Default
Figure 2.10 City Table
2.12 Logical Database Design
Logical design describes the detail specification for the proposed system. We can say that it
describes its own features. Input output tables and database in a manner that meets the project
needs. In logical design work with users is done to develop general system design, choose best
22
design, develop system flowcharts, identify hardware, software and personal needs and revise
estimates etc.
2.13 Entity
Anything that produces or consumes information is called entity. The representation of any
composite information that must be understood by software is called data object, by composite
information we mean something that has a number of different properties or attributes.
We have used the following entities in our project.
1. FIR
2. Login
3. Get Crime Alert
4. Join us
5. About us
6. FAQs
7. Paragraph
8. Emergency contact Numbers
9. Services
10. Quick links
11. Online Registration
2.14 Entity Relationship Model
The entity relationship model is a tool for analyzing the semantic feature of an application that is
independent of events.
Entity-relationship modeling helps reduce data redundancy. This
approach includes a graphical notation, which depicts entity classes as rectangles, relationships
as diamonds and attributes as ovals. For example situations a partial entity relationship diagram
may be used to present a summary of the entities and relationships but not include the details of
the attributes.
2.15 Entity Relationship Diagram
The entity relationship diagram provides a convenient method for visualizing the interrelationship among entities in a given application. This tool has proven useful in making the
transition from an information application description to a formal database schema. The entity
23
relationship model is used for describing the conceptual scheme of an enterprise without
attention to the efficiency of the physical database design. The entity relationship diagrams are
later turned into a conceptual schema in one of the other models in which the database is actually
implemented.
24
First
Name
Last
Name
Gender
D_Incident
City
Detail
Incident
Location
Time
Contact
Address
FIR
M
Manage
FIR
Register
Crime
Type
Picture
ID
ID
M
User
name
M
M
Admin
1
Feedback
User
Password
M
M
M
Receive
Contact
Give
Figure 2.11 ERD
ID
Name
Email
25
Message
Subject
Figure 2.12 Data flow Diagram
26
CHAPTER 3
SYSTEM IMPLEMENTATION
27
CHAPTER # 3 System Implementation
3.1 Overview
It is particularly important first to design how the system will look and respired to user before
designing the software structure. The most critical and creative aspect of development is to
design the user interface. User interface design determines how the system will look the user
from outside.
The interface design create in effective communicate medium between human and a computer,
following a set of design principle. The design identifier interface objects action and then creates
a screen layout that formats the basic for a user interface prototype. User interface begins with
the identification of user, tasks and environment requirements. User interface for the software
should be design in such a way that is friendly to the user, easy to use and easy to understand. It
should provide high quality interface between the user and the system. The results produce by
our software should be consistence.
In designing the user interface it has been kept in mind that non-technical personnel will operate
the system with very little or no technical knowledge. Therefore the user interface has been
designed is user friendly as possible that facilitate easy and quick and has been used and
designing the screen are:
1. Home
2. Join Us
3. Get Crime Alert
4. FIR
5. Services
6. Emergency Contacts
7. About Us
8. Missing Citizens
9. Police Initiatives
10. Traffic Warden Service
28
11. Rapid Responsive Force
12. Dispute Resolution Council
13. Help Prevent Crime
14. Police Access Services
15. Police Services Lines
16. Elite Women Commandos
17. CNIC verification
18. Vehicle verification system
19. Reporting Room
20. Geo Tagging
29
Figure: 3.1 Crime Reporting System
30
Figure: 3.2 Admin Page
31
Figure 3.3 FIR Page
32
CHAPTER 4
SYSTEM TESTING
33
CHAPTER # 4 System Testing
4.1 Introduction
System testing is essential step for the development of a reliable and error free system .in a
software development project ,errors can be introduced at any stage during the development
.Each phase has its own techniques for the detection and correction of errors in that phase .
However, some requirements errors and design errors are likely to remain undetected.
Ultimately these errors will be reflected in a code. Since code is the only product that can be
executed and whose actual behavior can be observed, testing is the phase where the errors
remaining from the early phases also must be detected. Testing is the process of detecting
and correcting as many errors as possible in the developed software before delivery to the
customer. Test case is specification of the test and the output from the system plus a
statement of what is being tested. Test data are the inputs which have devised to test the
system.
4.2 Testing Objectives
1. To find errors in the developed software.
2. To check that working of the software function is according to the specifications. Their
behavior and performance requirement are fulfilled.
3. To check the reliability and quality of the software.
4.3 Testing Strategies
Following are the basics strategies that were used for testing of the software.
Black box testing
White box testing
Stress testing
Acceptance testing
Assertion testing
34
Can only be determined by studying its inputs and the related outputs. It is called functional
testing because here the tester has only concerned with functionality and not with the
implementation of the software.
In black box testing only the functionality of the software was tested without a record to the
code .If the functionality which was expected from a component is provided then the black
box testing is completed.
4.3.1 White Box Testing
White box testing is also called glass box testing and structural testing .The objective of
white box testing is not to exercise all the different input or output condition but to exercise
the different programming and data structure used in the program.
In white box testing internal code return in every component was tested and it was checked
that the code written is efficient in utilizing various resources of the system like memory etc.
4.3.2 Stress Testing
Stress test is designed to confront program with abnormal situation. Stress testing executes
system in a manner that demands rescore in abnormal quality, frequency or volumes. For
example:
1: Input data rates may increase to determine how input function will respond
2: Tests that’s requires maximum memory or other resources are executed.
Basically, the tester wants to break the program.
In stress testing the software was tested against the boundary conditions. Various inputs
fields were tested against
Abnormal values and it was tested that the software does not behave abnormally at any time.
4.3.3 Acceptance Testing
Acceptance testing is performed with realistic data of the client to demonstrate that the
software is working properly.
35
In acceptance testing the software was checked for completeness that it is ready. Quality
assurance department performs the acceptance testing that the software is ready and can be
given to the customer.
4.3.4 Assertion Testing
In assertion testing the software is tested against the possible assertion. Assertion is used to
check the program and various locations that whether the state of the program at a particular
point is the same as expected or not.
4.3.5 Unit Testing
Unit testing focuses verification effort on software component or module which is the
smallest unit of software design. The unit testing is white box oriented and it can be
conducted in parallel for multiple components.
In unit testing we checked that all individual components were working properly. Before
integration of all components unit testing is essential because it gives a confidence that all the
components individually are working fine and ready to be integrated with the other ones.
4.3.6 System Testing
System testing is actually a series of different tests whose primary purpose is to fully exercise
the computer based system. Although each test has a different purpose, all work to verify that
system elements have been properly integrated and perform allocated functions.
When all the units were working properly and unit testing was performed and checked all the
integrated components as a whole and looked for possible discrepancies, which could have
arisen after the integration.
4.4 System Evaluation
The objectives of the system evaluation is to determine whether the desired of objectives
have been accomplished or not. Determining the merits and demerits of the proposed system
over the existing system is also covered in system evaluations. This is concerned with the
detailed study of the developed system, from implementation point of view.
36
4.5 Implementation
This phase consists of bringing the new system in operation and turning it over the users.
Briefly involves the following steps.
Training: It involves
1. User group
2. Administrator
4.6 Installation of Computer Equipment’s
It involves
1. Locations
2. Power supply
3. Space requirements
4. Air conditioning
4.7 Testing the New System
System testing of the developed system was performed in these three steps.
4.7.1 Unit Testing
In unit testing the different modules of software were tested independently to locate errors.
This helps in locating errors, in coding and logic that were contained within a particular
module.
4.7.2 Integrated Testing
After unit testing, combined testing of all modules was carried out. The purpose was to
determine that all the modules are correctly integrating with each other.
4.7.3 System Testing
Final testing was done on the entire system to check that whether the desired specification
and requirements are met or not. The main aim here was to determine the inconsistencies in
the developed system. Hence the whole system was tested. Put the New System into
37
Operation At this point, a final dress rehearsal sometimes runs. It is done in the following
ways.
4.7.4 Direct/ Cash Conversion
In this approach, as entire new system is installed, the old system is completely dismantled,
leaving the organization suddenly to rely on the new system alone. The advantage of the
crash conversion is that when the old system is seriously inadequate or radically different
from the new system and when the conversion will be so rapid that it will not severely
disrupt operations. The crash conversion also has advantages i.e. the crash conversion is
risky, and even for minor problem can seriously delay the implementation schedule. Careful
planning and attention to detail are necessary for a successful crash conversion.
4.8 Conclusion
The project titled as “Crime Reporting System” is a web based application. This
software provides facility for reporting online crimes, complaints, missing persons, show
criminal details. This software is developed with scalability in mind. Additional modules can be
easily added when necessary. The software is developed with modular approach. All modules in
the system have been tested with valid data and invalid data and everything work successfully.
Thus the system has fulfilled all the objectives identified and is able to replace the existing
system.
The project has been completed successfully with the maximum satisfaction of the organization.
The constraints are met and overcome successfully. The system is designed as like it was decided
in the design phase. The project gives good idea on developing a full-fledged application
satisfying the user requirements. The system is very flexible and versatile. This software has a
user-friendly screen that enables the user to use without any inconvenience. Validation checks
induced have greatly reduced errors. Provisions have been made to upgrade the software.
The
application
has been tested with live data and has provided a successful result. Hence the software has prove
to work efficiently.
An effective criminal justice response to hate crimes involves a number of important elements:
close police-community relations, public confidence in the effectiveness of the police response to
reports of hate crimes as well as appropriate processing of those reports by the courts. The
quality of the police response to hate crimes is critical, as is the public perception of that
response. If people feel that the criminal justice system is not responding appropriately and
vigorously to the problem of hate crimes, these incidents will remain unreported. However,
38
nothing is more critical than having an accurate idea of the true nature and full extent of the
problem. This can only come about if a greater effort is made to collect comprehensive hate
crime statistics. At the present, KPK lags behind other provinces in this regard. The present
report represents the first, small step towards documenting the incidence of this pernicious form
of criminal activity, which, by its very nature, strikes at the heart of a multicultural society.
39
Reference List
1. http://www.w3school.com
2. http://en.wikipedia.org/wiki/Waterfall_model
3. http://en.wikipedia.org/wiki/Software_development_process,
4. http://en.wikipedia.org/wiki/Spiral_model
5. http://en.wikipedia.org/wiki/Prototype
6. https://www.google.com.pk/?gws_rd=cr,ssl&ei=ey3HVPXGC6HmyQOCxIDQCA#q=prototype
+model+diagrams
7. https://www.google.com.pk/?gws_rd=cr,ssl&ei=9LXNVMaeI9bnatzKgng#q=history%20of%20o
nline%20fir%20system%20in%20pakistan
8. http://www.incpak.com/editorial/govt-must-upgrade-police-computerized-fir-online-record/
40
Download