Uploaded by alehegn3180

CRIME REPORT

advertisement
WEB + MOBILE BASED CRIME REPORT AND INFORMATION
MANAGEMENT SYSTEM: IN THE CASE OF DEBRE MARKOS CITY
A PROJECT REPORT
Submitted by:
NO
NAME
ID
1
YENENEH MULAT
TER/1432/08
2
ZEMENE KASSA
TER/1433/08
3
TAKELE AMOGNE
TER/1426/08
4
ALEHEGN ESKEZIA
TER/1387/08
5
ZEWDU NEGASH
TER/1435/08
In Partial Full filament for the Award of the Degree of
BACHELOR OF SCIENCE IN SOFTWARE ENGINEERING
Under the guidance of Ayalneh B. (MSC)
ADVISOR SIGNATURE………………………
SOFTWARE ENGNEERING ACADEMIC PROGRAM
SCHOOL OF COMPUTING
DEBRE MARKOS UNIVERSITY INSTITUTE OF TECHNOLOGY
DEBRE MARKOS
DebreMarkos, Ethiopia
Jan
2011
E.C
Crime Report and Information Management System 2011E.C
APPROVAL OF ADVISOR AND EXAMINERS
This project has been submitted for examination with our approval as the project advisor.
Advisor Name -----------------------------------------Signature -------------------This project has been examined with our approval as the project examiner.
Examiner Name:
1. -----------------------------------------signature-------------------2. -----------------------------------------Signature-------------------3. -----------------------------------------Signature--------------------
Software Engineering Academic Program
Page i
Crime Report and Information Management System 2011E.C
Declaration
We, undersigned, declare that this is our original work, has not been presented
for a degree in this or any other university, and all the source of material used
for this/project/ have been acknowledged.
Name
ID NO
Signature
1. Yeneneh Mulat
TER/1432/08
--------------------
2. Zemen Kassa
TER/1433/08
--------------------
3. Takele Amogne
TER/1426/08
--------------------
4. Alehegn Eskezia
TER/1387/08
--------------------
5. Zewudu Negash
TER/1435/08
--------------------
Software Engineering Academic Program
Page ii
Crime Report and Information Management System 2011E.C
Table of Contents
Approval of Advisor ........................................................................................................................ I
Dclaration…………………… ........................................................................................................ II
Table of content ............................................................................................................................ III
List of
Tables………………………………………………………………………………….iii
List of
Figures…………………………………………………………………………..……iiiiii
List of Acronyms…………………… .................................................................................... iiiiiiiii
CHAPTER ONE ........................................................................................................................... 1
1.
Introduction ........................................................................................................................... 1
1.1
BACK GROUND OF THE PROJECT ........................................................................................ 1
1.2
STATEMENT OF THE PROBLEM .................................................................................................. 2
1.3
OBJECTIVE ........................................................................................................................ 3
1.3.1 General objective .......................................................................................................... 3
1.3.2 Specific objective .......................................................................................................... 3
1.4
SCOPE OF THE PROJECT...................................................................................................... 3
1.4.1 Scope ............................................................................................................................. 3
1.5
SIGNIFICANCE OF THE PROJECT ......................................................................................... 4
1.6
SYSTEM REQUIREMENT ..................................................................................................... 5
1.6.1 Hardware requirement tool .......................................................................................... 6
1.6.2 Software requirement tool ............................................................................................ 6
1.6.3 Programming language to be used ............................................................................... 6
1.7
DATA COLLECTION METHODOLOGY ................................................................................. 7
1.7.1 Data collection ............................................................................................................. 7
1.7.2 System Development Model .......................................................................................... 8
1.8
FEASIBILITY STUDY ........................................................................................................... 9
1.8.1 Operational Feasibility................................................................................................. 9
1.8.2 Economic Feasibility .................................................................................................... 9
Software Engineering Academic Program
Page iii
Crime Report and Information Management System 2011E.C
1.8.3 Technical Feasibility .................................................................................................... 9
1.8.4 Legal Feasibility ......................................................................................................... 10
1.8.5 Time feasibility ........................................................................................................... 10
CHAPTER TWO ........................................................................................................................ 11
2.
System Analysis.................................................................................................................... 11
2.1
OVER VIEW OF EXISTING SYSTEM .................................................................................. 11
2.1.1 Problems of existing system: ...................................................................................... 12
2.1.2 Users of the existing system ........................................................................................ 13
2.1.3 Overview of the new system ........................................................................................ 13
2.2
SYSTEM REQUIREMENT SPECIFICATION ........................................................................... 13
2.2.1 Functional requirement .............................................................................................. 14
2.2.2 Non-functional requirements:..................................................................................... 15
2.2.3 Business rule: - ........................................................................................................... 16
2.3
SYSTEM REQUIREMENT ANALYSIS ................................................................................... 16
2.3.1 Actor and Use Case Identification.............................................................................. 16
2.3.2 UML Sequence Diagrams ........................................................................................... 25
2.3.3 UML Activity diagram ................................................................................................ 29
2
Analysis Class Diagram ............................................................................................. 32
CHAPTER THREE .................................................................................................................... 34
3.
System Design ...................................................................................................................... 34
3.1 Design class diagram ............................................................................................................. 34
3.1.1. Description of design class diagram ........................................................................... 36
3.2. DATABASE DESIGN /PHYSICAL DATA MODEL ....................................................................... 38
3.3
USER INTERFACE DESIGN ................................................................................................ 39
3.4. SYSTEM ARCHITECTURE (DEPLOYMENT MODELING) .......................................................... 41
CHAPTER FOUR ..................................................................................................................... 434
Implementation ...................................................................................................................... 434
4 introduction ............................................................................................................................. 434
4.1 over view of programming language ................................................................................... 434
Software Engineering Academic Program
Page iv
Crime Report and Information Management System 2011E.C
4.2 Algorith used ......................................................................................................................... 435
4.3 Sample code used ................................................................................................................ 437
CHAPTER FIVE ...................................................................................................................... 50
5 Testing .................................................................................................................................... 50
5.1 introdaction ............................................................................................................................ 50
5.2 Sample test .............................................................................................................................. 50
5..2.1 Unite testing ....................................................................................................................... 50
5.2.2 integration testing ................................................................................................................ 51
5.2.3 Acceptance testing .............................................................................................................. 52
5.2.4 system testing ....................................................................................................................... 52
CHAPTER SEX ........................................................................................................................ 54
6 Conclusion and Recomandation ................................................................................................ 54
4.2 conclusion .............................................................................................................................. 54
4.2 Recommandation .................................................................................................................... 55
4.2Future Enhancement ............................................................................................................... 55
Appendix………………………………………………………………………………………………57
References………………………………………………………………………………….…………60
Software Engineering Academic Program
Page v
Crime Report and Information Management System 2011E.C
List of Tables
Table.1:
Table of Use case identification ................................................................................. 20
Table.2:
Login Use Case Description ....................................................................................... 22
Table.3:
create user account Use Case Description ................................................................. 23
Table.4:
Register Accused Use Case Description .................................................................... 24
Table.5:
Register employee Use Case Description ................................................................... 25
Table.6:
Method of administrator ............................................................................................. 36
Table.7:
Method for police head ............................................................................................... 36
Table.8:
Method for crime investigator .................................................................................... 36
Table.9:
employee class diagram description ........................................................................... 37
Table.10: Crime class diagram description................................................................................. 38
Table.11: Employee Database Table .......................................................................................... 38
Table.12: Accuser Database Table ............................................................................................. 39
Table.13: Account Database Table ............................................................................................. 39
Software Engineering Academic Program
Page vi
Crime Report and Information Management System 2011E.C
List of Figures
Figure1:
Use case diagram ........................................................................................................ 21
Figure2:
Sequence diagram for create account ......................................................................... 27
Figure3:
Sequence diagram for register employee.................................................................... 28
Figure4:
Sequence diagram for give nomination ...................................................................... 29
Figure5:
Activity diagram for give nomination ........................................................................ 30
Figure6:
Activity diagram for register accuser ......................................................................... 31
Figure7:
Activity diagram for create account ........................................................................... 32
Figure8:
Android based Crime report and information management System Analysis .......... 33
Figure9:
Mobile based Crime report and information management System ............................ 35
Figure10:
Login page User Interface .................................................................................. 40
Figure11: Nomination Page User Interface................................................................................. 41
Software Engineering Academic Program
Page vii
Crime Report and Information Management System 2011E.C
List of Acronyms and abbreviation
BR---------------------------------------------------------------Business Rule
DMCAO--------------------------------------------------------Debre Markos City Administration Office
CD---------------------------------------------------------------Compact Disk
CMS-------------------------------------------------------------Crime Management System
DMC ------------------------------------------------------------Debre Markos City
DMCPS---------------------------------------------------------DebreMarkos City Police Station
Efficiency Service
GB---------------------------------------------------------------Giga Bye
GPS----------------------------------------------------------General Position System
HRM------------------------------------------------------------Human Resource Manager
HTML-----------------------------------------------------------Hypertext Markup Language
ID----------------------------------------------------------------Identification
JS-----------------------------------------------------------------Java Script
JSON------------------------------------------------------------Java Script Object Notation
MG-------------------------------------------------------------Mega Byte
OOSAD--------------------------------------------------------Object Oriented System Analysis Design
PHP-------------------------------------------------------------Hyper Preprocessor Scripting Language
PIECES--------------------------------------------------------Performance Information Economy Control
RAM----------------------------------------------------------Random Access Memory
SHO------------------------------------------------------------Station House Officer
SRS------------------------------------------------------------System Requirement Specification
UC--------------------------------------------------------------Use Case
UID------------------------------------------------------------User Interface Design
Software Engineering Academic Program
Page viii
Crime Report and Information Management System 2011E.C
UML-----------------------------------------------------------Unified Modeling Language
WAMP--------------------------------------------------------Window Apache MySQL PHP
Software Engineering Academic Program
Page ix
Crime Report and Information Management System 2011E.C
CHAPTER ONE
1. Introduction
In Debre markos city there is no any computer-based method to handle activities of crimes
happen. Since now we are trying to develop a system that conveys good ways to handle
crimes. The Crime Management System (CMS) provides optimal as possible as plan for
crime reports and information managements. So many countries are faced with these
problems of crime reporting and managements of handlings. Now a day the members of
people make crime are highly developed and educated than police officers. To make more
people are concerned to this and help to stop crimes. this system can improve knowledge
methods of all citizen become crime fighter.
The role of police in a society is very important for crime control. Police station is a
governmental institution and responsible for the security of the lives and wealth of the people
of the country. Every time when police arrests criminals or gets crime reports they update
those records in their database. Most of the times people of that are aware an arrest is taken or
crime is being reported, do not know that what is happening in their surroundings. That is the
reason that most of them do not take initial security steps in their houses. However most of
the crimes happen due to lack of security alerts and lack of awareness of the incidents in their
neighborhoods.
If people will get alerts and report crime timely then they can take some actions on the
security of their lives and houses to make crimes difficult or stop. Most of the mobile users
are using smart phones to use health guide, news alert and many more applications in daily
life routine. Therefore, a mobile based application can be developed to describe information
of crimes and to report a crime. The developed application can be used by the people.
1.1 Back ground of the project
A modern police station was established newly in 1934 in Ethiopian. Debremarkos police
station was also established newly as a police force at the same time in 1934. It is the basic
units that look after the law and order of that area. Debremarkos police station is headed by a
Station House Officer who is generally an inspector from the police department. Under him
works a team consisting of a Sub-Inspector, Head Constable and Constables. The station was
organized in to five big departments that were: - crime investigator department, traffic control
Software Engineering Academic Program
Page 1
Crime Report and Information Management System 2011E.C
department, human resource management department and preventive community police. Still
now, the system is working manual. In Debremarkos city there is no any mobile based system
to handle day to day activities of crimes which happen in that area.
➢ The reason that initiate us to develop this mobile based application is now a day’s a
police station perform its task manually or file based and consume large amount of
resources like man power and time. Due to this problem our team member wants to
develop mobile based application to reduce crime.
1.2 Statement of the problem
Since the current system is file based system and not computerized ways it faces some
problems like technological familiarity, transportation and lack of moderate knowledge those
problems are listed the following.
➢ Collecting the crime information is very hard:➢ Sharing information between polices and their needs police head physical contact.
➢ Retrieving information from file based system can be difficult and time
consuming especially when searching for information from former years.
➢ Unable to generate automated crime report:➢ Criminal report system in DMPS takes place manually with paper too hard to give
report.
➢ Even an efficient officer may not be able to handle more than one case at a time: ➢ There is a Work load over police departments since investigation reports and
investigation files are manually operated.
➢ Police officer is far from technology: ➢ Activities are performed and manipulated manually or it paper based.
➢ Use manual system that consumes time and labor: ➢ Time: -this system consumes more time to perform manually activity.
➢ Labor: -Many employees needed to participate in the crime management so it
consumes more energy or man power.
➢ Data redundancy and inconsistency: - there is a Work load over police departments
since investigation reports and investigation files are manually operated.
➢ Less secure, unauthorized user easily access and update customer information.
Software Engineering Academic Program
Page 2
Crime Report and Information Management System 2011E.C
1.3 Objective
The new system has the fallowing specific and general objectives
1.3.1 General objective
The general objective of this project is to develop mobile based crime report and information
management system for DebreMarkos city police office.
1.3.2 Specific objective
Specific objects are objectives that help to achieve the general objectives of the system. The
specific objectives of this project are:
➢ Develop a database system that are used: ➢ To store, provide information of crime managements.
➢ To reduce time consuming to complete crime investigation
➢ To make crime investigator auto gain information
➢ Develop a system that enabling the user to communicate easily across the station
➢ Design attractive user interface that the police station worker and customers can
easily interact.
➢ To make more peoples fight crimes easily and readily
➢ To make more peoples fight crimes easily and readily
➢ Searching: - To enable searching for any relevant information about crime quickly that is
committed from anywhere in the city and the required information by using keys and also
the main function of the system is sharing of information to the citizen.
➢ Retrieving data: -provides the crime investigator to fetch the relevant information that
they want to use.
➢ To generate different notification like post information notification.
➢ To develop system that is easily accessible.
➢ To identify the problem of the existing system, solve in the new system.
1.4 Scope of the project
1.4.1 Scope
Scope: Defines the coverage areas of the project and the activities and operations done by the
system. Due to constraint of time, resource and manpower the project team members are
limited to develop mobile based system for Debremarkos city police office in crime record
and information management system.
Software Engineering Academic Program
Page 3
Crime Report and Information Management System 2011E.C
The scope of this project includes the following activities: ➢ Messaging alert or notification alert is supported by this system: - the customer can give
crime nomination to the police and accept preventive police advice.
➢ Register user information.
➢ Send command:- police head can send command to preventive and crime investigator
police.
➢ Searching or retrieve missing criminal.
➢ Post advice or information.
➢ The customer of the system can give nomination.
➢ Register accuser, accused or witness: - the crime investigator records information of those
to handle criminal .
➢ Update criminal information record: -When new information’s are raised, update the
existing information.
➢ Ensure data accuracy: -the existing system has less data accuracy but the proposed system
is more secured because there is authentication and authorization manner.
➢ Take back up: - the administrator backup database to control failure.
➢ Generate a report:- The preventive and crime investigator can generate report to police
head.
Out scope
➢ Some functionalities that are not included our project: ➢ The system is not work unless the user device has balance to access internet.
➢ Camera and Videos deployment is not available
➢ The system does not have chatting.
➢ Does not bring the criminal to the station.
➢ The system not support GPS.
1.5 Significance of the project
Significance of the project indicates or identifies what are the benefits of the system and what
serves for the beneficiaries of the system. The new crime record and information
management system is reliable, easy, fast and consistent and plays an important role for the
system workers and for the customers.
Software Engineering Academic Program
Page 4
Crime Report and Information Management System 2011E.C
➢ Develop a system that makes retrieval of accurate required data from database with
expected time.
➢ Minimize wastage of resources including man power and time.
➢ Enhances accuracy of information: - collected crime information is fresh and store on
the database.
The newly proposed system has much advantage in terms of the organization, user
and customer in the following way:
For the organization
➢ Develop a system that facilitates fast report generation.
➢ Improve efficiency, effectiveness and security.
➢ Reduce number of employees.
For the Users
➢ Simplified the process for managing crime information
➢ Crime investigator get fresh information
➢ Facilitates fast and efficient retrieval of data
➢ speed up communication and cooperation of police
For customer of the system
➢ Create customer or complaint satisfaction by save time and resource needed to
complete their task.
➢ It enables citizens to give nomination easily: ➢ Peoples no need to go police station to give nomination about their cases
rather they send simple text by their mobile.
➢ No missing of criminal information: - the customer can send crime information
without frustration.
➢ The proposed system used for Debremarkos city gozzamen wereda people. Generally,
when the system successfully implemented it is usable for the community.
1.6 System Requirement
In order to develop a mobile based crime report and information management system, it is
very important to select the correct hardware, software and programming language. Some
explanations of the hardware, software and programming language to development tools to
the system.
Software Engineering Academic Program
Page 5
Crime Report and Information Management System 2011E.C
1.6.1 Hardware requirement tool
Hardware requirements are the touchable and visible components that are necessary
to develop and deploy a system.
➢ Computer: to develop a new system use it to type and to install all software and
programming language we require developing the system or to code the program.
➢ Flash: 16GB is required for data storage.
➢ Hard-Disk: for data storage.
➢ Printer: - helps to print our project documentations
1.6.2 Software requirement tool
The software requirements are the instructional components used to develop a system Software
requirement to develop the system are as follows
➢ Microsoft word: - to write documentation of the project
➢ Browser: -chrome, Firefox, opera, UC browser, Internet explorer used to search information.
➢ Adobe Photoshop CS4: -to edit images.
➢ Snipping tool: - we use snipping tool to capture picture from software.
➢ Microsoft Power Point 2010: - for presentation of the project.
➢ Editor: E-draws Max8 for designing UML diagrams associated with the system. E.g. Activity
Diagram, Class Diagram, Sequence Diagram and Use Case Diagram.
➢ WAMP server: - manage servers setting. The reason of selecting WAMP server is
they are secure means they are not easily attack by virus when we compare to other
servers.
1.6.3 Programming language to be used
In developing a system uses different programming language. For this system the team
member used different programming language such as Android, PHP, HTML, CSS and JS.
➢ Android programming language. Why android?
➢
Android platform are the top platform to utilize in lesser price: - Enterprises looking
to invest less in the mobile app development but want the best quality outcome,
➢
Android have a wide range of options for graphic design.
➢
The Android platform is a secured platform similar to Kernel which is based on
Linux.
Software Engineering Academic Program
Page 6
Crime Report and Information Management System 2011E.C
➢
Android have platform that provides simple inter-app integration by offering the most
flexible tools.
➢
With the huge popularity Android in the market.
➢
It is application based.
PHP programming language. Why PHP?
Easy: This server-side scripting language is extremely easy to learn, as compared to other
languages. You will learn PHP easily and quickly.
Access to support: As PHP is being used by a huge number of people, a large community is
formed. So, you need not worry if you get stuck somewhere. You will easily get the support
from them and simply to integrate android.
Platform independent: Whether it is Windows, Linux or UNIX; it supports all the major web
browsers. PHP also supports all the major web servers; be it Apache or Microsoft IIS. It also
supports Netscape and personal web server.
Speedy: PHP uses its own memory, so the workload of the server and loading time gets
reduced automatically, which results into the faster processing speed. It also has got a
security layer to protect against viruses and threats.
1.7 Data Collection Methodology
A methodology is a set of methods, processes, and practices that are repeatedly carried out to
deliver a project. This part deals about the method of data collection, source of data and how
the data organized and analyzed.
1.7.1 Data collection
Data collection is the major activity to analyze the current system or to get information about
existing system and to develop the new or proposed system. Data for developing the new
system obtained from different sources. Such as from system users, from documents used in
the agency office and from manuals. In our project use data collection methodology those
are: ➢ Primary data collection methods
Software Engineering Academic Program
Page 7
Crime Report and Information Management System 2011E.C
Interview: - the project team gathered necessary information
about how the organization
works and current flow of work by interviewing Debremarkos city police head, staff member.
During Interviewing the team have get various necessary information from the station and the
team asking different question about the organization how to work and the overall structure.
Observation: - the project team gathers some additional information by observe the actual
work being done in police station.
➢ Secondary data collection methods
Document analysis: - we reviewed other relevant documents that the workers use for manual
system that help to know about the existing system. We also observe information that are
listed in the office of police stations head which are present in the form of charts, graphs and
simply in written form.
1.7.2 System Development Model
From system development model the team member’s select Object oriented system analysis
and design: -Object oriented technology is of broad means used to handle highly structured
application systems. Object oriented technology provides numerous advantages in application
by making them easy to use and maintain. It is platform independent, portable, reliable by
itself. It is better way to construct, manage and assemble objects that are implemented in the
system. Is a way to develop software by building self-contained modules or objects that can
be easily replaced, modified, and reused?
Typically, OOSAD uses Unified Modeling Language (UML) to represent and visualize the
interacting objects and models in the system like Use Case Diagrams, Class Diagrams,
Activity Diagrams, Sequence Diagrams, and Deployment Diagrams. The proposed system
follows Incremental model.
In this model, each module passes through the requirements, design, implementation and
testing phases. A working version of software is produced during the first module, so you
have working software early on during the software life cycle. Each subsequent release of the
module adds function to the previous release. The process continues until the system is
complete.
Software Engineering Academic Program
Page 8
Crime Report and Information Management System 2011E.C
1.8 Feasibility study
A feasibility study is a test of system proposal according to its workability, prospective of the
system to the organization, ability to meet user needs and effective use of resources. A
feasibility study looks at the viability of an idea with an emphasis on identifying potential
problems.
1.8.1 Operational Feasibility
Operational feasibility is mainly concerned with issues like whether the system will be easily used and
work to fulfill the user requirement, if it is developed and implemented. The new system is
operationally feasible since the system developed by most recently used language android and has
better user interface. System users can easily use the system for gathering information about criminal,
Citizens giving nomination online, giving nomination i.e. the system member or team can provide
training and to new users. Operationally, the systems give capable of producing quick and qualitative
services to user.
1.8.2 Economic Feasibility
Our proposed system is economically feasible to the organization because the development of
system needs less cost than the cost required for employment of employee. Not require more
cost and material to implement the system with compare to its benefits. Here we have stated
the costs related to the project and the benefits that are going to be gained after the
completion of the project by performing a cost-benefit analysis.
Our system is economically feasible in: ➢ Small response time and many services.
➢ Reduce cost manual data management (Reduced expenses).
➢ Easy update & retrieval on stored records.
➢ Better service for crime handling.
➢ Little job burden for crime investigator and other police offices.
1.8.3 Technical Feasibility
Technically, the newly proposed system will be simple to be use by low skilled users and
easily accessible by the people who can use the system. users can easily use the system i.e.
the system developer or team member can provide training to new users and users can use by
a short-term training There is no need for the developer involvement in almost all function of
the entire system. It is easily accessible by the people who can easily understand natural
languages. The system has simple and easily understandable interface for the user.
Software Engineering Academic Program
Page 9
Crime Report and Information Management System 2011E.C
1.8.4 Legal Feasibility
The developed system is not any conflict with any government rule and regulation, and with
any cultural aspects or norms, because it gives services for people of Debremarkos city and
all the Debremarkos city police station workers also agreed before the system is
implemented. So, the government and people are profitable and the system will be legally
feasible.
1.8.5 Time feasibility
Time feasibility is the most important and superior thing to be considered in crime report and
information management system. The period of time considered as a resource under customer
control and sufficient to accomplish some work and it is an instance or single occasion for
some work. This system is feasible by time since it time required accomplish at a given time.
Software Engineering Academic Program
Page 10
Crime Report and Information Management System 2011E.C
CHAPTER TWO
2. System Analysis
A key question considered here is, “what must be done to solve the problem?” The system
is viewed as a whole and the inputs to the system are identified. Once analysis is completed
the analyst has a firm understanding of what is to be done. The system mainly aims to develop
an application for the Police Department to handle their crime investigation process in an
easy way. Often people may be reluctant (not volunteer) to go to Police stations to report
crimes.
2.1 Over View of Existing System
The current system of crime Report and Information Management system is file based which
is recourse wastage. When crime is occurred in some where then the customer or people
should go to the police station to report the criminal issues. During that time the people may
have lack of transportation, or the people calls to the police to report crime. When they call it
may be dangerous for their life? After the people reports to the police, the police go to the
place where the crime is happened and collect information but they may not get the right
information, since information provider could be fear as a result the police does not arrest the
criminal. Based on this, crime investigator and other police department cannot collect fresh
information about crime. Currently in Debremarkos city there is no any mobile based
application for sharing of information between the police and the people. Almost all activities
in the current system take much time cost and consume much man power.
Strength of the existing system
➢ Filling new police and customer Information even if the system is manual.
➢ The collected information saved on manually on paper.
➢ Even if the system is file based, crime investigator gets the information about crime.
Weakness of the existing system
➢ The customer to nominate hard
➢ Lack of technology
➢
Hard to gather information concerning crimes
➢ The preventive police to advice it is very hard
➢ Use file-based system that consume time and labor energy
Software Engineering Academic Program
Page 11
Crime Report and Information Management System 2011E.C
➢ Unable to generate automatic crime report
2.1.1
Problems of existing system:
The problems of the existing manual system are described using the PIECES
acronyms where: ➢ P-stands for Performance: - It is time consuming and less performance since
every task is done manually and it has taking much man power to complete the
task and requires a long period of time. Regarding on lack of speed the file
based system generate output with slow rate.
➢ I -stands for Information: ➢ Redundancy of data: - since it is manual the data may record many times.
➢ Not accurately captured: - due to the above listed problem the
information gathered may not accurate.
➢ The customer’s document is stored simply in the shelf so if its file
damaged there is no way to recover the file but the new systemuse backup.
➢ E - Stands for Economy: - The current file based system takes more costs
(resources) to perform its tasks, large amount of human resource or man
power and consume much time.
➢ C- stands for Control and security: - The current file based system does not
much secure or controlled refers to the data or information is not getting only
for authorized people because data might be stolen, destroy by fair and electric
shock also the data privacy rules and regulation are being not respected.
➢ E- Stand for Efficiency: It operates over a long period of time interval, large
amount of man power and resources is waste. So, the existing system is
inefficient.
➢ S- stands for Service: - It takes more time to get the services from police
station department
➢ Crime prevention: -the preventive police community give awareness is not
efficient because the people might not volunteer
➢ Emergency response: - customer might not gate response in short time during
emergency.
➢ Law enforcement
Software Engineering Academic Program
Page 12
Crime Report and Information Management System 2011E.C
➢ Assistance of crime
2.1.2
Users of the existing system
Users are entities that interact with the system. An actor is a person, organization, or external
system that plays a role in one or more interaction with the system Each actor has set of goals
in the system. Those actors are listed below:
➢ district Administrator or police head: - give check list to other police member to
control activities of police departments and have power to manage the station.
➢ Criminal preventive police: -prevent crimes before occur and make awareness among
people.
➢ Crime investigator: - after crime is occurred, they filter truth information on criminals
and the investigator take them to the office in order to get justice and equitable.
➢ HR manager: - keep rules and regulations of employees and keep benefit of the
employees i.e manage office users.
➢ Customer: - people who live in the city of gozzamen wereda the existence of police
station and the beneficiary of the station.
2.1.3
Overview of the new system
This system come up with a solution to solve the above listed problems of existing system in
the organization and enable the police officer effective and efficient by considering limited
resource that we have. The proposed system conserves those all the strength of the existing
system. Like: ➢ Filling new police and customer Information.
➢ The collected information saved on data base.
➢ Crime investigator gets the information’s about crime.
2.2 System requirement Specification
In this section the project team members have kept the basic understanding of the
requirements and dependencies of the current system prior to any actual design or
development work. A requirement specification is used to prepare system requirement before
starting the actual design. This enables the team member to have a clear idea about the
structure and content of the crime report and information management system.
A well-designed, well-written SRS accomplishes the following major goals:
Software Engineering Academic Program
Page 13
Crime Report and Information Management System 2011E.C
➢ It provides feedback to the customer. An SRS is the customer's assurance that we
have understood the issues or problems to be solved and the software behavior
necessary to address those problems.
➢ It decomposes the problem into component parts. The simple act of writing down
software requirements in a well-designed format organizes information, places
borders around the problem, solidifies ideas, and helps break down the problem into
its component parts.
➢ It serves as an input to the design specification. The SRS serves as the parent
document to subsequent documents, such as the software design specification and
statement of work. Therefore, the SRS must contain sufficient detail in the functional
system requirements so that a design solution can be devised.
This system is concerned in the functional requirements and non-functional
requirements.
2.2.1
Functional requirement
The functional requirements describe the core tasks of the system or it is the intended
behaviors of the system or the main tack of the system. A functional requirement defines the
capabilities of a system that must be able to perform successfully. The functional requirement
is the study of what a system should be able to do, the functions it should perform and
describes the interactions between the system and its environment. And also explain what has
to be done by identifying the necessary task, action or activity that must be accomplished. It
is a statement of exactly what the system must do. The new system being the following
functional requirements: The team members supposed to have the following functional
requirements for the proposed system.
➢ The system should allow: ➢ System administrator creates an account for user registered by HRM, block user .
➢ sharing information
➢ Post advice for customer (Preventive police)
➢ View placement, nomination(Preventive police)
➢ Registers accuser, accused witness, post missing criminal (Investigator).
➢ Give nomination about crime information (Customer).
➢ register and update employee(HRM)
➢ View missing criminal, accept command (Preventive police)
Software Engineering Academic Program
Page 14
Crime Report and Information Management System 2011E.C
➢ Take data base restore or backup( Admin)
➢ Create, Block, View, Account ( Admin)
➢ View(nomination, placement, posted information) (Investigator)
➢ Accept command from police head(Investigator),
➢ Send command and assign preventive and investigator police (police
head).
➢ View report, missing criminal, posed information(police head)
➢ Register filtered information(prosecutor)
➢ Send filtered information( Investigator)
2.2.2
Non-functional requirements:
Non-functional requirement is a requirement that specifies criteria that can be used to judge
the operation of a system, rather than specific behaviors. Non-functional requirements
describe how the system works, while functional requirements describe what the system
should do. Non-functional requirements, as the name suggests, are requirements that are not
directly concerned with the specific services delivered by the system to its users. These are
qualities of a system such as "constraints", "quality attributes", "quality goals" and "quality of
service requirements
➢ Performance: - The system has faster response time and use minimal manpower.
Because the system uses simple text messaging techniques. This means when system
is developed, people in Debremarkos city send cases timely and Up-to-date
information’s. Perform all tasks in a short response time and high rate of processing.
➢ Usability: The system is designed to have user-friendly interfaces and easy navigate
to one link to other, which enhances users’ efficiency.
➢ Availability: The system is available in 24 hours a day and 7 days a week, since it can
use any time if once the application is installed until the server is down.
➢ Efficiency: This system must ensure allocation and use of services being requested
for the users by using minimum memory storage, cost, and time.
➢ Security: The user accesses the system using valid user name and password.
➢ Reliability: The system is expected to be used smoothly without being corrupted and
failure. When failures occur the system should be tolerating failure, troubleshoot in
short period of time and return related error message.
Software Engineering Academic Program
Page 15
Crime Report and Information Management System 2011E.C
➢ Authorization: The proposed system should be authenticating the user of the system
by asking username and password and determine which users are authorized to access
or perform specific activities or operations.
➢ Modifiability: The system should be modifiable by authorized users of the system
whenever it needed and easily added new functionality.
2.2.3
Business rule: -
The system has different business rules that the organization to follow. These business
rules are obligations that the Employee of the system must fulfill in order to the system do
function properly and effectively. These rules considered as in the system because any
member of the department not beyond these state. The most common business rules with
the police station are:
BR 1: Kids less than 15years old should not be pretension by crime but, parents are
accountable to that crime.
BR 2: The new employee age must greater than 18.
BR 3: The user must work with give privilege.
2.3 System requirement analysis
Systems Requirement Analysis gives the professional systems understanding the tools to set
up a proper and effective analysis of the resources, schedules and parts that will be needed in
order to successfully undertake and complete any large, complex project. The text offers the
reader the methodology for rationally breaking a large project down into a series of stepwise
questions so that a schedule can be determined and a plan can be established for what needs
to be procured, how it should be obtained, and what the likely costs in dollars, manpower and
equipment will be in order to complete the project at hand.
2.3.1
Actor and Use Case Identification
Actor: An actor represents a user of the system that plays a role in one or more interactions
with our system.
Use case: A use case describes a sequence of actions that provide a measurable value to an
actor. A use case is drawn as a horizontal ellipse on a UML use case diagram.
Actor Identification
➢ Police Head: - a person who controls or manages the police member and have the
following activity
Software Engineering Academic Program
Page 16
Crime Report and Information Management System 2011E.C
➢ View feedback and report
➢ Post information
➢ Send command to investigator and preventive police
➢ Assign crime investigator and preventive police
➢ Change account password
➢ System administrator: - is a professional person that controls system. And also have the
following activities
➢ Create user account
➢ View user account
➢ Activate user account
➢ Block user account
➢ Take backup and restore data base
➢ View log file
➢ Crime preventive police: - are community polices and they prevent crimes by giving
awareness to people and have the following activities
➢ Post advice to customer
➢ Accept police head’s command
➢ View Information, customer nomination and place assigned
➢ Change account password
➢ Crime investigator:- after crime is occurred, they filter truth information on criminals
and
have the following activities
➢ View customer nomination, placement, miss criminal, posted information
➢ Post missing criminal
➢ Register (accused, witness, and accuser information)
➢ Send filtered crime information to prosecutor
➢ Receive response from prosecutor
➢ Accept police head’s command
➢ Change account password
➢ Human resource manager: - Human resource manager keeps benefits of police
members and have the following activities
➢ Register Employee information
➢ View Employee information
➢ Update Employee information
Software Engineering Academic Program
Page 17
Crime Report and Information Management System 2011E.C
➢ Change password
➢ Customer: - customers are users of the system or they are people in Debremarkos city
and have the following activities
➢ View posted information
➢ View miss criminals
➢ Give crime nomination
➢ Prosecutor: - is a person who institutes a prosecution before a court.
The prosecutor is the principal representative of the state in all matters related to the
adjudication of criminal offenses.
Prosecutor has the following activities
➢ Receive crime information from crime investigator
➢ Send back unfulfilled criminal information to crime investigator
➢ Make accusal to criminal
➢ Change account password
2.3 Use case identification: Use case is an activity that accomplished by actors. Use case describes a
sequence of actions that provide a measurable value to an actor. In the following table we try to list
use case id, use case name and its description.
Use case ID
Use case Name
Include/
use
Uc1
Login
……..
Uc2
Create User account
Uc1
Uc3
Activate User Account
Uc1
Uc4
Block User Account
Uc1
Uc5
View Account
Uc1
Uc6
View Log file
Uc1
Uc7
Take Data Base
Uc1
Uc8
Restore Data Base
Uc1
Uc9
Assign Police
Uc1
Software Engineering Academic Program
Page 18
Crime Report and Information Management System 2011E.C
Uc10
Post Information
Uc1
Uc11
Send command
Uc1
Uc12
View missing criminal
Uc1
Uc13
View feed back
Uc1
Uc14
View Report
Uc1
Uc15
Accept Command
Uc1
Uc16
View Placement
Uc1
Uc17
View nomination
Uc1
Uc18
View sent Information
Uc1
Uc19
Post Advice
Uc1
Uc20
Make Accusal
Uc1
Uc21
View filtered information
Uc1
Uc22
Register Employee
Uc1
Uc23
View Employee
Uc1
Uc24
Update Employee
Uc1
Uc25
View news
Uc1
Uc26
Receive Response
Uc1
Uc27
View Posted information
Uc1
Uc28
View missing criminal
Uc1
Uc29
Post missing criminal
Uc1
Uc30
Register(Accused, Accuser, witness)
Uc1
Uc531
Give nomination
……..
Uc32
Give Feed back
………..
Uc33
Logout
……….
Software Engineering Academic Program
Page 19
Crime Report and Information Management System 2011E.C
Table.1:
Table of Use case identification
2.3.1.1
UML Use Case Diagrams
Use Case diagrams show the various activities the users can perform on the system. The
System is something that performs a function. They model the dynamic aspects of the system.
use case diagram illustrates a set of use cases for a system, the actors of these use cases, the
relations between the actors and these use cases, and the relations among the use cases.
➢ An oval represents a use case.
➢ A stick figure represents an actor.
➢ A line between an actor and a use case represents that the actor initiates and/or
participates in the process.
use case diagram shows the relationships among actors and use cases within a system. A use
case diagram is a graphic representation of the interactions among the elements of a system.
➢ A use case diagram contains the following sub-components: ➢ System boundary: - which defines the system of interest in relation to the world
around it.
➢ The actors: - usually individuals involved with the system defined according to their
roles.
➢ The use cases: - which the specific roles are played by the actors within and around
the system.
➢ The relationships between the actors and the use cases
Software Engineering Academic Program
Page 20
Crime Report and Information Management System 2011E.C
Figure1:
2.3.1.2
Use case diagram
Use Case description
A use case description is a business analysis presentation of the steps defining the interactions
between a user (called an actor) and a system (usually a computer system). It details the
interactions and sets the expectations of how the user will work within the system.
Software Engineering Academic Program
Page 21
Crime Report and Information Management System 2011E.C
Use Case Name
Login
Use Case ID
Uc1
Include
----------
Actor
Police Head, Preventive Police, Crime investigator, Human Resource
manager, Administrator, prosecutor.
Description
A user that are authenticate and has legal username and password can
access the system.
Precondition
The user must have a valid username and password given by
Administrator
Basic course of action
Actor action
system action
1.the user open the system
2.system displays home page
3. User click
login
menu 4.. The System display login form
5. User fills login form and
6. System displays user page.
clicks login button.
7. Use case end.
Alternative
course
of A1: User may input wrong username and password the system displays
action
alert message. The process turns back to step 4
Post condition
Users can enter to their page to access based on their user name and
password. user can perform his/her own task on the system
Table.2:
Login Use Case Description
Use case name
Create user account
Use case id
Uc2
Software Engineering Academic Program
Page 22
Crime Report and Information Management System 2011E.C
Include
Login
Actor
System Administrator
Description
System Administrator create account for users
Precondition
Administrator must login and should get list of users’ information From
Registered User.
Basic course of action
Actor action
system response
1 admin click on Create Account 2.The System display create account
Link
page
3. The Administrator fill the field 4. If the entered data is valid the
including username and password system
display
then Click on Create Account Successfully
button
“you
creating
are
account”
message.
5. Use case end
Alternative course of A1: If the administrator enters wrong data, the system displays invalid input
action
message and process turn again from step 2.
Post condition
The customer has account.
Table.3:
Use
create user account Use Case Description
case Register Accused
name
Use case id
Uc30
Include
Login
xActor
Crime investigator
Description
Crime investigator can Register the accused criminal to give up decision
Software Engineering Academic Program
Page 23
Crime Report and Information Management System 2011E.C
Precondition
The crime investigator must have a valid username and password to enter to the page.
Basic course Actor action
of action
system response
1 The crime investigator click Register 2 The system display register accused form.
accused Criminal link.
4.The
system
validate
and
display
3 The crime investigator Fill the form and successfully registered message.
click Register button.
Alternative
course
5 use case end.
A1: crime investigator may input wrong data the system shows in correct data message.
of The process turns back to step 2.
action
Post
The accused registered.
condition
Table.4:
Register Accused Use Case Description
Use case name
Register employee
Use case id
Uc22
Include
Login
Actor
Human resource manager
Description
Human resource manager accepts the employee and register to the database in the
system
Precondition
Basic course of
action
The users should be worker of police station
Actor action
System response
1. HR manager click on Register 2
Employee
Link
3 HRM fill each individual
System
displays
employee
registration form
fields 4. If the user correctly fills each
required field the system display “you
Software Engineering Academic Program
Page 24
Crime Report and Information Management System 2011E.C
and press register button
are Successfully registered” message.
6. Use case end.
Alternative
course
Al1: if the HRM fills invalid data the system display error message and start up on
of step 2.
action
Post condition
Employee is legal members of the police station.
Table.5:
2.3.2
Register employee Use Case Description
UML Sequence Diagrams
A UML Sequence diagram showing the sequence of interactions among objects and used to
represent or model the flow of messages, events and actions between the objects or
components of a system in sequentially. Sequence Diagrams are also used primarily to
design, document and validate the architecture and interfaces of the system by describing the
sequence of actions that need to be performed to complete a task. Sequence diagrams are the
most popular UML artifact for dynamic modeling, which focuses on identifying the behavior
with in your system.
➢ UML Sequence Diagrams Description
➢ capture the interaction between objects in the context of a collaboration
➢ show object instances that play the roles defined in a collaboration
➢ show the order of the interaction visually by using the vertical axis of the diagram to
represent time what messages are sent and when
➢ show elements as they interact over time, showing interactions or interaction instances
Software Engineering Academic Program
Page 25
Crime Report and Information Management System 2011E.C
figure1: Sequence diagram for login
Software Engineering Academic Program
Page 26
Crime Report and Information Management System 2011E.C
Figure2:
Sequence diagram for create account
Software Engineering Academic Program
Page 27
Crime Report and Information Management System 2011E.C
Figure3:
Sequence diagram for register employee
Software Engineering Academic Program
Page 28
Crime Report and Information Management System 2011E.C
Figure4:
2.3.3
Sequence diagram for give nomination
UML Activity diagram
Activity diagrams are graphical representations of workflows of stepwise activities
and actions with support for choice, iteration and concurrency. Activity diagram is
basically a flowchart to represent the flow from one activity to another activity. The
activity can be described as an operation of the system.
Software Engineering Academic Program
Page 29
Crime Report and Information Management System 2011E.C
Figure5:
Activity diagram for give nomination
Software Engineering Academic Program
Page 30
Crime Report and Information Management System 2011E.C
Figure6:
Activity diagram for register accuser
Software Engineering Academic Program
Page 31
Crime Report and Information Management System 2011E.C
Figure7:
2
Activity diagram for create account
Analysis Class Diagram
A class diagram is a static model that shows the classes and the relationships among classes
that remain constant over the time. Class is the main building block of class diagrams, which
stores and manages information in the system. In the phase of conceptual class modeling we
just create or classes and their interrelationship.
Software Engineering Academic Program
Page 32
Crime Report and Information Management System 2011E.C
Figure8:
Android based Crime report and information management System Analysis
Class Diagram
Software Engineering Academic Program
Page 33
Crime Report and Information Management System 2011E.C
CHAPTER THREE
3. System Design
Introduction: - The term design describes a final system and the process by which it is
developed it refers to the technical specification that will be applied in implementing the
proposed system. It also includes the construction of program and design of output, input,
code, database and process of the system.
System design is the transformation of the analysis model into a system design model. Up to
now we were in the problem domain. System design is the first part to get into the solution
domain in a software development. The main purpose of system design is to determine how
the system is going to build and to obtain the information needed to direct the actual
implementation of the system. It focuses on understanding the model how the software will be built.
3.1 Design class diagram
Class diagram in the Unified Modeling Language (UML) is a type of static structure diagram
that describes the structure of a system by showing the system's classes: ➢ Their attributes,
➢ Operations (methods)
➢ And the relationships among the classes.
A class diagram is an illustration of the relationships and source code dependencies among
classes in the Unified Modeling Language (UML). It provides an overview of the target
system by describing the objects and classes inside the system and the relationships between
them.
Software Engineering Academic Program
Page 34
Crime Report and Information Management System 2011E.C
Figure9:
Mobile based Crime report and information management System
Design Class Diagram
Software Engineering Academic Program
Page 35
Crime Report and Information Management System 2011E.C
3.1.1. Description of design class diagram
Method/operation
Function
Create account()
Used to Create user’s account
Update account()
Used to Update user’s account
Block user()
Used to Block users when a user
involvement is not needed
Take backup()
Table.6:
Used to takes backup to save data
Method of administrator
Method/operation
Function
View employee()
Used to views employees information
Post notice()
Used to post notice
Table.7:
Method for police head
ethod/operation
Function
Register accuser()
Used to record the accuser
Register accused()
Used to register the accused
Register witness()
Used to record the witness information
Table.8:
Method for crime investigator
Attribute
Purpose
Data Type
ID
Represent as customer unique identifier
Varchar(50)
Fname
Represent the name of the customer itself
Varchar(50)
Mname
Represent customer’s father name itself
Varchar(50)
Lname
Represent employee grand father name itself
Varchar(50)
Sex
Represent employee sex
Varchar(50)
Software Engineering Academic Program
Page 36
Crime Report and Information Management System 2011E.C
Utype
Represent User type
Varchar(50)
Phone
Represent customer’s phone address
INT
Age
Represent customer’s age
INT
Educational
Represent educational level that the customer Varchar(50)
level
have
Photo
Represent users photo
Blob
Email
Represent Email address of user
Varchar(50)
Status
Represent the users status 0 or 1
INT
Table.9:
employee class diagram description
Attribute
Purpose
Data Type
Crime ID
Represent id of crime committed person
Varchar(50)
Accuser_id
Represent id of accuser
Varchar(50)
Accused_id
Represent id of accused
Varchar(50)
First name
Represent the accused first name
Varchar(50)
Father name
Represent the father name
Varchar(50)
Grand father name
Represent to grand father name of the Varchar(50)
accused
Sex
Represent the sex of accused
Varchar(50)
Age
Represent the age of accused
INT
Phone
Represent the phone of accused
INT
Eduction level
Represent the eduction level of accused
Varchar(50)
Job
Represent the job of accused
Varchar(50)
Work place
Represent the work place of accused
Varchar(50)
Software Engineering Academic Program
Page 37
Crime Report and Information Management System 2011E.C
Address
Represent the address of accused
Varchar(50)
Description
Represent the description of accused
Varchar(50)
Date
Represent the date of accused
Date
Table.10:
Crime class diagram description
3.2. Database design /Physical data model
Physical data model represents how the model built in the database. A physical database
model shows all table structures, including column name, column data type, column
constraints, primary key, foreign key, and relationships between tables. Features of a physical
data model include:
➢ Entities become tables in the physical database.
➢ Attributes become columns in the physical database.
➢ Select an appropriate data type for each of the columns and size.
➢ Unique identifiers become columns that are not allowed to have NULL values.
➢ Specification all tables and columns.
➢ Foreign keys are used to identify relationships between tables
Table.11:
Employee Database Table
Software Engineering Academic Program
Page 38
Crime Report and Information Management System 2011E.C
Table.12:
Accuser Database Table
Table.13:
Account Database Table
3.3 User Interface Design
User interface design is the design of computers, appliances, machines, mobile
communication devices, software applications, and websites with the focus on the user's
experience and interaction. User interface design is the specification of the interaction
between the system users and a system. The goal of user interface design is to make the user's
interaction simple and efficient as possible, in terms of accomplishing user goals—what is
often called user-centered design. Good user interface design facilitates finishing the task at
hand without drawing unnecessary attention to it.
Software Engineering Academic Program
Page 39
Crime Report and Information Management System 2011E.C
Figure10:
Login page User Interface
Software Engineering Academic Program
Page 40
Crime Report and Information Management System 2011E.C
Figure11:
Nomination Page User Interface
3.4. System Architecture (Deployment Modeling)
Deployment diagram are used to visualize the topology of the physical components of the system
where the software components are deployed. So deployment diagram are used to describe the static
deployment view of the system. Deployment diagram consist of nodes and their relationships.
➢ Through deployment diagram we are able to model
➢ Where hardware is located
➢ Where software is located
➢ What is the communication path between various hardware parts
Software Engineering Academic Program
Page 41
Crime Report and Information Management System 2011E.C
figer 12: Deployment diagram
Software Engineering Academic Program
Page 42
Crime Report and Information Management System 2011E.C
CHAPTER FOUR
IMPLEMENTATION
4. Introduction: - System implementation is the fourth stage of system development. It is a
process of defining how the information system should be built ensuring that system is
operational and used and ensuring that the system meets quality requirements. The
implementation document helps users on how to work with the system. It acts as a user
manual and it helps users not to be the system confused with. It includes sample forms and
some selected fragment code. It gives the users a brief over view of the system. This
document describes the project implementation for developing the mobile based crime
recurred and information management system. It is converting of design in to coding or real
application.
The project implements by language PHP, Android, HTML,CSS and Database WAMP
server . The project will be capable of running on different web browsers. The interface for
the project will provide a good navigation to user of the system with nice look and simple to
navigate.
4.1. Overview of the Programming Language
This project used PHP for server side and android for client side programming technology
integrated with WAMP database.
PHP is a scripting language that is often embedded into HTML to add functions HTML alone
cannot do. The community of open source PHP developers provides technical support and is
constantly improving updating the core PHP functionalities
Generally:➢ PHP is completely free and Open Source.
➢ PHP can be easily embedded directly into HTML.
➢ Platform independent or compatible can run on Windows or Linux .
➢ It is available with documentation in many languages.
➢ Easy to learn compared too many other scripting languages. It has a syntax that is
easy to parse and is actually rather human-friendly.
Software Engineering Academic Program
Page 43
Crime Report and Information Management System 2011E.C
Android
➢ Android has better opportunities in future.
➢ Android is related to mobile platform.
➢ Android development is a java based one.
➢ Android is purely mobile (or device) oriented apart from a few latest and it is
largely restricted to mobile platform.
4.2. Algorithm Used
Pseudo code is a detailed readable description of what a computer program or algorithm must
do, expressed in a formally-styled natural language rather than in a programming language.
Pseudo code is sometimes used as a detailed step in the process of developing a program. It
allows designers or lead programmers to express the design in great detail and provides
programmers a detailed template for the next step of writing code in a specific programming
language. The purpose of using pseudo code is that it is easier for people to understand than
conventional programming language code, and that it is an efficient and environmentindependent description of the key principles of an algorithm
A Pseudo code Algorithm for login
Fill the Login Form
Click the Login button
If (Form is filled)
If (valid)
Generate SQL select queries
Connect to database
Pass queries to database
If (any query fails)
Display query error message
Else
Read session
Software Engineering Academic Program
Page 44
Crime Report and Information Management System 2011E.C
If session exists on database, user is already logged in,
Display the page
Else
If they're correct
Create session ID
Store session ID on database
Display the page
End if
End if
Else
Display error message
Ask the user to refill the form
End if
B Pseudo code Algorithm for register employee
Click on register Employee link
Registration form is displayed
Fill Employee data
Click on register button
If (valid)
Display successful message.
Else
Display invalid input message.
End if
Software Engineering Academic Program
Page 45
Crime Report and Information Management System 2011E.C
C Pseudo code Algorithm for block account
Click on block account link
List of active account is displayed
Click on block link
If (valid)
Display successful message.
Else
Display not blocked message
End if
4.3 Sample code for Login in Android
package com.crims.crims;
import android.content.Context;
import android.content.Intent;
import android.content.SharedPreferences;
import android.os.Bundle;
import android.support.v4.app.Fragment;
import android.view.LayoutInflater;
import android.view.View;
import android.view.ViewGroup;
import android.widget.Button;
import android.widget.EditText;
import android.widget.Toast;
import org.json.JSONObject;
Software Engineering Academic Program
Page 46
Crime Report and Information Management System 2011E.C
import java.net.URLEncoder;
A simple {@link Fragment} subclass.
public class MainActivityLoginFragment extends Fragment {
Vars
protected EditText userName;
protected EditText password;
protected Button loginButton;
protected JSONObject jsonObjectResult;
protected int counter = 3;
Supporter Functions
public void findFiledViews(View view){
this.userName = (EditText) view.findViewById(R.id.user_name);
this.password = (EditText) view.findViewById(R.id.password);
this.loginButton = (Button) view.findViewById(R.id.login_btn);
}
public void doLogin (View view){
String user_name = this.userName.getText().toString();
String password = this.password.getText().toString();
String link = Config.DOMAIN_NAME + "/login.php";
SharedPreferences sharedPreferences =
view.getContext().getSharedPreferences("login", Context.MODE_PRIVATE);
Intent in;
try{
String data = URLEncoder.encode("u_name", "UTF-8") + "=" +
Software Engineering Academic Program
Page 47
Crime Report and Information Management System 2011E.C
URLEncoder.encode(user_name, "UTF-8");
data += "&" + URLEncoder.encode("password", "UTF-8") + "=" +
URLEncoder.encode(password, "UTF-8");
data += "&" + URLEncoder.encode("btn_login", "UTF-8") + "=" +
URLEncoder.encode("btn_login", "UTF-8");
BridgeNetwork result = new BridgeNetwork(new
BridgeNetwork.BridgeNetworkListiner() {
@Override
public void bridgeNetworkStringBufferResult(Object result) {
try{ jsonObjectResult = new JSONObject(result.toString()); }catch(Exception
ex){}
}
}, BridgeNetwork.DOPOST, link, data);
result.execute();
if(jsonObjectResult.getString("login").equals("true")) {
Toast.makeText(view.getContext(), "Redirecting...",
Toast.LENGTH_LONG).show();
SharedPreferences.Editor editor = sharedPreferences.edit();
editor.putString("uname", user_name);
editor.putString("uid", jsonObjectResult.getString("uid"));
editor.putString("U_type", jsonObjectResult.getString("U_type"));
editor.commit();
if(jsonObjectResult.getString("U_type").equals("admin")) {
in = new Intent(getContext(), AdminActivity.class);
startActivity(in);
Software Engineering Academic Program
Page 48
Crime Report and Information Management System 2011E.C
}else if(jsonObjectResult.getString("U_type").equals("HRM")) {
in = new Intent(getContext(), HRmanagerActivity.class);
startActivity(in);
}else if(jsonObjectResult.getString("U_type").equals("policeHead")) {
in = new Intent(getContext(), PoliceHeadActivity.class);
startActivity(in);
}else if(jsonObjectResult.getString("U_type").equals("prosecutor")) {
in = new Intent(getContext(), ProsecuterActivity.class);
startActivity(in);
}else if(jsonObjectResult.getString("U_type").equals("investigator")) {
in = new Intent(getContext(), InvestigatorActivity.class);
startActivity(in);
}else if(jsonObjectResult.getString("U_type").equals("preventiv")) {
in = new Intent(getContext(), PreventivepoliceActivity.class);
startActivity(in);
}
}
else if(jsonObjectResult.getString("login").equals("false") &&
jsonObjectResult.getString("blocked").equals("false")) {
counter--;
Toast.makeText(view.getContext(), "Wrong Credentials Attemps left=" + counter,
Toast.LENGTH_LONG).show();
}
else if(jsonObjectResult.getString("login").equals("false") &&
jsonObjectResult.getString("blocked").equals("true")) {
Software Engineering Academic Program
Page 49
Crime Report and Information Management System 2011E.C
counter--;
Toast.makeText(view.getContext(), "Try Again Attemps left= " + counter,
Toast.LENGTH_LONG).show();
}
if (counter <= 0) {
userName.setEnabled(false);
loginButton.setEnabled(false);
Toast.makeText(view.getContext(), "You are blocked in" + counter,
Toast.LENGTH_LONG).show();
}
}catch(Exception ex){}
}
public MainActivityLoginFragment() {
// Required empty public constructor
}
@Override
public View onCreateView(LayoutInflater inflater, ViewGroup container,
Bundle savedInstanceState) {
View view = inflater.inflate(R.layout.fragment_main_activity_login, container, false);
// Find Field view
this.findFiledViews(view);
// Set logn button click listiner
this.loginButton.setOnClickListener(new View.OnClickListener(){
Software Engineering Academic Program
Page 50
Crime Report and Information Management System 2011E.C
@Override
public void onClick(View view) {
doLogin(view);
}
});
// Inflate the layout for this fragment
return view;
}
}
Software Engineering Academic Program
Page 51
Crime Report and Information Management System 2011E.C
CHAPTER FIVE
5 TESTING
5.1 Introduction:-
Developing software is a complex process. No matter how hard we try
to eliminate all faults simply by going through the development phases, which is
requirements elicitation, requirement analysis, system design, and implementation, however,
through good practice we can make sure that the most series fault does not occur in the first
place.
Testing is a process to show the correctness of the program. Testing is checking of the
system workability in an attempt to discover errors and avoiding such errors from the system.
In this, the team members tested the entire system as a whole with all forms, code, modules.
In this, we tested all the functionalities in the System. All errors in the forms validation,
functions, modules have been tested.
5.2 Sample Test
To simplify the testing process, the project team followed the different types of tests that
break the testing process up into the distinct levels. These types testing are unit testing,
integration testing, acceptance testing and system testing. We have seen the following
different testing strategies
5.2.1. Unit Testing
Unit testing is a validation method in which a programmer tests if individual units of source
code are fit for use. The system units are tested one by one by inserting invalid data.
Functional Test Specifications that will be done in our proposed system the tests done as
follow
➢ Test for login
➢ Test for employee registration
➢ Test for give nomination
➢ Test for post information etc.
Software Engineering Academic Program
Page 52
Crime Report and Information Management System 2011E.C
5.2.2. Integration Testing
Integration testing is the activity of software testing in which individual software modules
are combined and tested as a group. It occurs after unit testing and before acceptance testing.
Thus, Integration testing is a logical extension of unit testing. In its simplest form, two units
that have already been tested are combined into a component and the interface between them
is tested. Here a component refers to an integrated aggregate of more than one unit.
5.2.3. Acceptance Testing
Acceptance testing is the process of testing system prior to its delivery. A system is mainly
developed for an end user normally a customer of the organization. A system is said to be
accepted if and only if the user of the system is satisfied. In this perspective acceptance,
testing is widely used to prove that system performs as per the requirements. In acceptance,
testing the customers provides the input data to validate the system operation. It is also
known as functional testing, black box testing, release acceptance, application testing,
confidence testing, final testing and validation testing. Generally, acceptance mean, our crime
report and information management system is acceptable to user after deploying.
5.2.4. System Testing
System testing of software or hardware is testing conducted on a complete, integrated system
to evaluate the system’s compliance with its specified requirements. It is a testing process in
which the aim is to ensure that the overall system works as defined by the requirements. The
System is functionally tested based on the use case model developed during the analysis
phase. The system is also operationally tested based on requirements. The requirements that
are tested by the project team during the implementation are correctness, accuracy, security
and others.
➢ Testing the correctness:- correctness determines how users can interact with the
software and how the software should behave when it is used correctly. Users can
easily interact with the a application since it has easily understandable interface and
the application responds correctly.
➢ Testing the Accuracy:- The system give only valid result, if no data is found with
the specified criteria the system should not give invalid response. Since, our
application fulfills these characteristic it is accurate.
Software Engineering Academic Program
Page 53
Crime Report and Information Management System 2011E.C
➢ Testing the security:- To insure the security of our application user must login to the
system with user name and password exist home page. The system allows only
authorized users to login i.e. users that have previously created account through user
name and password.
Software Engineering Academic Program
Page 54
Crime Report and Information Management System 2011E.C
CHAPTER SIX
CONCLUSIONS AND RECOMMENDATION
6.1 Conclusion
The project is aimed at developing a mobile based crime recurred and information
management system. The project have 5 chapters.
➢ In chapter one the team determined the title of the project to “Mobile Based Crime
Recurred and Information management system”. Then the team described the
background of the station with the explanation of how the organization is established,
the objective of the project, the scope and limitation of the project, significance of the
project and feasibility have been discussed including the methodology of the project
which describes what and which material the team used to accomplished the proposed
system.
➢ In Chapter two the team performed a detailed business area analysis that describes
what the current system looks like. We used an essential use case by identifying
actors and use cases. After business area analysis we determined the requirements of
the proposed system in terms of functional and non-functional requirements. After
these the team has studied object oriented analysis and design techniques like activity
diagram, sequence diagram, class diagram with relations, attributes and methods.
➢ The third chapter of the project discussed about the system design which tries to
change the conceptual model of information for the problem domain that rose on the
chapter one of the existing system and solve that problem into actual interface. To
accomplish this, the team used different types of designing and analysis tools like
design class diagram, physical database design, deployment diagram and user
interface.
➢ The forth chapter of the project the team discussed and perform about system
implementation which changes the design diagram to codes.
➢ The five chapter of the project the team tests the developed apps fulfill the user
requirement unit or group.
Software Engineering Academic Program
Page 55
Crime Report and Information Management System 2011E.C
6.2 Recommendations
The system that we develop is a mobile based crime information management system for
Debre Markos city police office. While developing this system the team members has faced
different challenges. But by the cooperation of all the group members and the help of god the
team is now able to reach to the final result. Our new system has provided a better service
than the existing system by forming better interaction among them. Our recommendation to
the person who develops this system developers includes the functionality of our limitation.
6. 3 Future enhancement
According to scope of our project the team develops mobile based application. Because of the
time constraint we may have limitation which should be consideration in, but in the future the
team believes that this system should be fully operationally by adding some functionality that
are not Included in the proposed system. We also want to recommend this project can be
expanded and more automated with additional functionalities by integrating with traffic
management and court management system.
➢ The system will be support voice recognation.
➢ For the future, technology user can send sms message for police to nominate criminal
case.
➢ The system will be including other language for uneducated person.
➢ For future the system developer will include chatting.
➢ For future the developer will include GPS
Software Engineering Academic Program
Page 56
Crime Report and Information Management System 2011E.C
Appendix I
➢ Questions asked during requirement gathering using interview
Q1. What are the objectives of your organization?
Q2. What is the mission of your organization?
Q3. How many employees do you have?
Q4. How does your current system work?
A. Is it manual?
B. is it computerized?
Q5. If your answer for question number 4 is choice “b” what computer applications do you
use?
Q6. How the employee work?
Q7.What is the procedures or steps when customers get service of the organization?
Q8. How you prepare monthly or annually report?
Q9.How does you store customers and other information’s?
Q10.What are the problem that you get when the organization use the existed system?
Appendix I
Action:- An action is the fundamental unit of behavior specification and represents
some transformation or processing in the modeled system, such as invoking a method
of a class or a sub activity.
Activity diagram:- a diagram that describes procedural logic, business process and
work flow supporting parallelism.
Activity:- carrying out behavior in a State machine diagram.
Actor:- a role that a user takes when invoking a use case. Also see actor modeling.
Class:- the primary declarative construct of Object-Oriented Programming; a cohesive
unit of Attributes and Operations; a compile-time template for an Object.
Class diagram:- a type of static structure diagram that describes the structure of a
system by showing the system's classes, their attributes, and the relationships between
the classes.
Software Engineering Academic Program
Page 57
Crime Report and Information Management System 2011E.C
Sequence diagram:- describes the Messages sent between a numbers of participating.
Appendix
Accused registration form
Image1: Accused registration form
Software Engineering Academic Program
Page 58
Crime Report and Information Management System 2011E.C
Image2: Accuser registration form
Software Engineering Academic Program
Page 59
Crime Report and Information Management System 2011E.C
Reference
For PHP
1)https://chilot.files.wordpress.com/2011/01/reg-no-138-treatment-of-federal-criminal.pdf
2) https://www.ibm.com/support/knowledgecenter/...9.../cclassd.html
3) http://www.fas.org/irp/agency/doj/fbi/is/ncic.html
4) https://www.smartdraw.com/use-case-diagram/
5) https://www.inflectra.com/ideas/topic/requirements-definition.aspx
6) https://www.w3schools.com/
7) http://www.federalpolice.gov.et/web/guest/background-information
8) http://www.agilemodeling.com/artifacts/sequenceDiagram.htm
9) : https://www.lucidchart.com/pages/uml-class-diagram
10) System analysis and design 5th edition.
FOR Android
1) http://mobilenumbertrackr.com
2) https://www.slideshare.net/.../android-based-crime-manage-system-proposal
3) https://www.kashipara.com › Project › Android Ideas
4) https://codemint.net/mint/android-based-crime-reporting-system/137
5) https://acadpubl.eu/jsi/2018-119-7/articles/7a/56.pdf
6) https://developer.android.com/kotlin
7) https://www.c-sharpcorner.com/article/best-programming-language-for-android-app/
Software Engineering Academic Program
Page 60
Download