ONLINE CRIME REPORTING INTRODUCTION The project titled as “Online Crime Reporting” is a web based application. This software provides facility for reporting online crimes , complaints , missing person ,show most wanted persons details , show snatchers , show unidentified dead bodies,stolen vehicles as well as messaging Any number of clients can connect to the server.Each user first makes their login to server to show their availability. The server can be any Web server. The online crime report is to provide all crime management solutions which are easily accessible to everyone. The crime application starts with the common people who wants to log a complaints through the website so it can be very useful for the police station everytime. OBJECTIVES The project provides a framework within which a user can easily work with. That was out next objective. We know are of many categories, likes users from who know working with computers very well to users who didn’t know about computers. So all the category can use the software. So it should be user friendly. The product provides a framework, which is error free. We know a crime management system is actually a critical process having many calculations and operation. So each simple error laid to big problem. So it should be error free and our objectives is to build error free software . PURPOSE The system is very simple in design and to implement. The system requires very low system resources and the system will work in almost all configurations. It has got following features 1.Ensure data accuracy’s. 2.Proper control of the higher officials. 3.Reduce the damages of the machines. 4.Minimize time needed for the various processing. 5.Greater efficiency. 6.Better service. 7.User friendliness and interactive. 8.Minimum time required. 9.Minimum manual data entry. ACHIEVEMENTS The main achievement of online application is that, a person can report the crime anytime from anywhere. Users can view the progress of their complaint online. Need: Although reporting crime has many societal and individual benefits, it is common for criminal acts to remain unreported. SCOPE Following Details are provided or covered up by this project:Maintain Details about:Maintain user details. Maintain system user details. Maintain criminals details. It is an error free software. It maintain records of all the crime. It also maintain records of victims or users. It has a history of all crimes. An admin or normal user or a system user file a case. Only admin has the authority to view previous and current the records. APPLICABILITY It increases the efficiency of the police to caught criminal.Crime management system can be implemented in every prison without any problem. This system has the the capability to maintain infinite number of records. It is very useful as the written papers have a limited time period and can get lost but in crime management system this is not possible as a backup file will be created automatically and also updated automatically when any change is made in any record. Chapter 2 SURVEY OF TECHNOLOGIES Visual studio ASP.NET ASP.Net is a web development platform provided by Microsoft. It is a general object-oriented programming (OOP) language. It is used for creating web-based applications. ASP.Net was first released in the year 2002. The first version of ASP.Net deployed was 1.0. The most recent version of ASP.Net is version 4.6. ASP.Net is designed to work with the HTTP protocol. This is the standard protocol used across all web applications. ASP.Net applications can also be written in a variety of .Net languages. These include C#, VB.Net, and J#. In this chapter, you will see some basic fundamental of the .Net framework. The full form of ASP is Active Server Pages, and .NET is Network Enabled Technology. ASP.NET Framework The .NET Framework is a development platform for building apps for web, Windows, Windows Phone, Windows Server, and Microsoft Azure. It consists of the common language runtime (CLR) and the .NET Framework class library, which includes a broad range of functionality and support for many industry standards. The .NET Framework provides many services, including memory management, type and memory safety, security, networking, and application deployment. It provides easy-to-use data structures and APIs that abstract the lower-level Windows operating system. You can use different programming languages with the .NET Framework, including C#, F#, and Visual Basic. Design Features of ASP.NET Framework ● ● ● ● ● ● ● Interoperability Common Language Runtime engine (CLR) Language independence Base Class Library Simplified deployment Security Portability Advantages of ASP.Net Here are some of the basic advantages of using ASP .NET in web development: 1. ASP .NET significantly reduces the amount of code required for building large and complex applications which can increase overall development speed and reduce development costs. 2. Just-in-time compilation, smart caching technologies and native optimization dramatically increase overall application performance. 3. Framework supports varied languages it allows you to select the language that better applies to your application. 4. It provides ability of cross platform migration. 5. It provides simplicity making it easy to perform common tasks including configuration and deployment. 6. The features vast class library enclosing a large number of common functions and ready-to-use custom web-controls that allow creating professional applications with no need to develop from scratch. 7. It ensured high reliability and security due to built-in Windows authentication and per-application configuration. 8. It is regularly updated by Microsoft to meet the most up-to-date technology requirements. Disadvantages of ASP.Net ● ● ● ● ● Undefined Application Architecture with lack of Separation of Concerns (SoC) Complex Pages with Performance issues. Lack of abstraction with least control over HTML. Limited support for testing and SEO. Lack of Reusability and minimal parallel Development. Learning Difficulties. CHAPTER 3 REQUIREMENT AND ANALYSIS Problem definition The old manual system was suffering from a series of Drawbacks. It is the process of keeping, maintaining and retrieving the information was very tedious and lengthy. If any information was to be found it was required go through the different registers, documents there would never exist anything like report generation. One more problem was that it was very difficult to find errors while entering the records. The Requirement Process Typically Consists Of Three Basic Tasks: 1. Problem or Requirement Analysis 2. Requirement Specification 3. Requirement Validation 1. Problem or Requirement Analysis Often starts with a high level “Problem Statements”. During analysis the problem domain & the environment are modelled in a effort to understand the system Behaviour, constraints on the system, its input & output, etc. The basic purpose of this activity is to obtain a through understanding of what the software needs to provide. Frequency, during analysis, the analyst will have a series of meeting with the client and end users. In the early meetings, the client & end users. In the early meetings, the client & end user will explain the analyst about their work, their environment & their needs as they perceived them. Any document describing the work or the organization may be given, along with output of existing method of performing the task. 2. Requirement Specification The understandings obtain by problem analysis forms the basic of requirement specification, in which the focus is on clearly specifying the requirement in a document. Issues such as representation, specification languages & tools are addressed during this activity. As analysis produced large amount of information & knowledge with possible redundancies, properly organizing & describing the requirements is an important goal of this activity. 3. Requirement Validation Focuses on ensuring the what have been specify in the SRS are indeed all the requirement of the software & making sure that the SRS is of good quality. The requirement process terminate with the production of the validate SRS. Planning and Scheduling Process model The software development model adopted for the proposed system is waterfall model. Reason for choosing the waterfall model: Waterfall model stipulates that the requirements should be completely specify before the rest of the system development is preceded. In the proposed system. the requirements are fixed and known beforehand and hence this model is suitable and adopted for the development of the proposed system. The system’s services constraints and goals are established by consultation with system users. They are then defined in a manner is understandable by the both uses and developers. The system design process partitions the requirement to either hardware on software system. It establishes overall system architecture. Software design involves representing the software system functions in a form that may be transformed into one or more executable programs. Analysis phase: This phase involves detailed study of the system using different tools like OMT AND UML Design phase: As conventional design method and according to OMT, as first step of design subsystem of the system are identified. Implementation phase: Implementation phase include development of UI components, creating prototypes of each core classes, development of UI classes development and remote services creation. Testing Phase: In testing phase each method of the classes are checked during development phase as unit testing. Then each class is integrated and they are tested for integration testing. Schedule Representation Gantt chart A Gantt chart is a matrix, which lists on the vertical axis all the tasks to be performed. Each row contains a single task identification, which usually consists of a number and name. the horizontal axis is headed by columns indicating estimated task duration, skill level needed to perform the task and the name of the person assigned to the task, followed by one columns for each period in the project’s duration. Each period may be expressed in hour, days, weeks, months and other units. In some cases it may be necessary to label the period columns as period1, period2 and so on. The graphics portion of the Gantt chart consists of a horizontal bar for each task connecting the period start and period ending columns. Hardware Requirements The selection of hardware requirements configuration is an Important task related to the software development. Insufficient RAM may affect the speed and efficiency of entire system. A powerful processor is required to handle all operation. Sufficient hard disk capacity is inevitable to store the database and handle all application. Following is Hardware Configuration: 1. 2. 3. 4. CPU: INTEL PENTIUM DUAL-CORE RAM: MIN 256 MB HD space: 2GB free space required Printer Software Requirements Selecting of software is a major task that has to be performed properly. According to system requirements proper front-end and back-end should be selected. While selecting software it is much essential that developer should have the complete knowledge and understanding of language. The language selected must suit the hardware specification. Conceptual model Data Flow Diagram (DFD) Online crime reporting system Data Flow Diagram is often used as a preliminary step to create an overview of the crime reporting without going into great detail, which can later be elaborated. It normally consists of overall application dataflow and process of the crime reporting process. It contains all of the user flow and their entities such all the flow of crime, criminal, case, department, police, complain, punishments. All of the below diagrams has been used for the visualization of data processing and structured design of the crime reporting process and working flow. Online crime reporting system, where we have elaborated the high level process of crime reporting. It’s a basic overview of the whole Online Crime Reporting System or process being analysed or modelled. ER Diagram Crime Reporting System entiThis This ER(Entity relationship)Diagram represents the model of crime reporting system Entity. The entity-relationship diagram of crime reporting system shows all the visual instrument of database tables and the relation between criminal department, case, complaints etc. It used structure data and to define the relationship between structured data groups of crime reporting system functionalities. The main entities of the crime reporting system are case, criminal, crime department, police and complaint. System Flowchart Flowchart are used in designing and documenting simple process or programs. Like other types of diagrams, they help visualize what is going on and there by help understand a process, and perhaps also find less-obvious features within the process, like flaws and bottlenecks. There are different types of flowchart: each type has its own set of boxes and notations. The two most common types of boxes in a flowchart are: ● A processing step, usually called activity and denoted as a rectangular box. ● A decision usually denoted as a diamond. A flowchart is described as “cross-functional” when the charts divided into different vertical or horizontal parts, to describe the control of different organizational units. A symbol appearing in a particular part is within the control of that organizational unit. A cross-functional flowchart allows the author to correctly locate the responsibility for performing an action or making a decision, and to show the responsibility of each organizational unit for different part of a single process. Chapter 4 System Design Introduction System design is the process or art of defining the architecture, components, modules, interfaces, and data for a system to satisfy specified requirements. The design activity begins when the requirements document for software to be developed is available, this may be the software requirements specification for the complete system. Design is the first step in the development phase of any engineered product or system. The goal of the design process is to produce a model or representation of a system. The design phase is a transition from a us eroriented document to a document oriented to the programmers. This chapter deals with the modeling of our GPRS Based Home Automation System. It covers the design process of our project. First we need to understand the most basic concept necessary to create database. Some basic component such as entity, entity types, attributes, relationships ER diagrams etc. are given much importance. We mainly categorized this design into two parts i.e. Abstract design and Detailed design. In Abstract design, we will give simple data flow diagram of our application. In Detailed design, ER diagram are discussed with necessary database structure. Database Design Designing data about discovering and completely defining applications D ata characteristics and processes. Data design is a process of gradual refinement, from the coarse to the precise data structures and processes that provide it. The process of data design includes identifying the data, defining specific data type and storage mechanisms, and ensuring data integrity by using business rules and other run-time enforcement mechanisms. Basic module There are Three types of Module: User Module Admin Module Main Admin Module User Module: In this module, first of all User will register with proper data (where username and E-mail id must be unique for everyone).Once User registered than he/she can login in this system and register their FIR. If user wants to see the nearest police-station than user can see that using the map-locator which is provide in this system. • Also User can see the criminal records. Here User can search the different criminal with their name and also search the police-station using the city name. • Here Session is applied on this system. So, once user logout he/she cannot go back, he/she must have to login first. When user logout, cookie was also deleted. Admin Module • In this module, first of admin will login with proper email-id and password which is already registered by Main-Admin. Once admin will login, he/she can see all the FIR • which is registered by users. Also admin can search particular FIR using different parameters. Admin can add criminal information. Here admin cannot update his/her Main Admin Module • In this module, Main admin will assign police-officer to their respective police-station with proper data. Here main admin will assign police-officer or we can give them to email-id and password and also edit/update their database like if one police-officer will get promotion than his/her post will be updated. So main-admin will update that police-officer. • Same way main-admin can register different police-station and also if police-station shifted from one place to another than main admin will update the database. Also in this module, session and cookie deleted code is applied. • personal information. Admin can also see the feedback/complaint which is given by users. Here Session is applied on this system. So, once admin logout he/she cannot go • back, he/she must have to login first. When admin logout, cookie was also deleted Some modules used in online crime reporting Login Page: Use to sign in. It is a set of credentials used to gain access to an area that requires proper authorization. Logins are used to gain access to and control of computers, networks, and bulletin boards, as well as other services. FIR Registration form: A Zero FIR allows for any police station to register an FIR, regardless of their jurisdictional area. It is usually used for crimes such as murder and rape and other cognizable offences, i.e. an offence for which police can take action without prior court approval. Crime type: Use to identify the crime. Inquiry: Any query related to investigation. Emergency Contacts: In Case of Emergency (ICE) is a program that enables first responders, such as paramedics, firefighters, and police officers, as well as hospital personnel, to contact the next of kin of the owner of a mobile phone to obtain important medical or support information (the phone must be unlocked and working). Add New Records: Criminals, Evidence: picture, video etc. Class diagram Crime reporting system class diagram describes the structure of a crime reporting system classes, their attributes, operation, and the relationship among objects. The main classes of the crime reporting systems are case, criminal, crime department, police, complaints. Classes of crime reporting system Class Diagram: ● ● ● ● ● Case Class: Manage all the operation of case. Criminal Class: Manage all the operation of criminal. Crime Class: Manage all the operation of class. Department Class: Manage all the operation of Department. Police Class: Manage all the operation of police. ● Complaint Class: Manage all the operation of complaints. Classes and their attributes of crime reporting system class diagram: ● Case attributes: case _Id, case _crime_ Id, case _ name, case _type ● Criminal attributes: criminal_ id, criminal_ crime_ id, criminal_ name, crime_ type, case_ description. ● Department attribute: department_ id, department_ name, department_ place, department_ type. ● Police attribute: police_ id, police_ department_ id, police_ name, police_ email. ● Complaints attributes: complain_ id, complain_ name, complain_ type, complain_ description. Use Case Diagram Use Case Diagram for user are as follows: The first step in a development effort is to analyze the description of the system and produce a model of system‟s requirements. A use case diagram depicts a static view of the system functions and their static relationship both with external entities and with one and another. It consists of: System: The system is depicted as rectangle. Actor: Each actor is shown as a stick figure. Use case: Each use case shown as a solid-bordered oval labeled with the name of the use case. Use Case Diagram for admin are as follows: Activity Diagram Activity diagram is another important diagram in UML to describe the dynamic aspects of the system. Activity diagram is basically a flowchart to represent the flow from one activity to another activity. The activity can be described as an operation of the system. The control flow is drawn from one operation to another. This is the Activity UML diagram of crime reporting system which shows the flows between the activity of Department, police, case, crime, complaints. The mauin activity involves in this UML Activity Diagram of crime reporting system are as follows: ● ● ● ● ● Department activity Police activity Case activity Crime activity Complaint activity Features of the activity UML Diagram of crime reporting system ● Admin user can search Department view description of a selected Department, add Department, update Department and delete department. ● Its shows the activity flow of editing, adding and updating of police. ● User will be able to search and generate report of case, crime, complaints. ● All object such as(department, police , complaints) are interlinked. ● Its shows the full description and flow of department, crime, complaints, case, police. Algorithmic Design One of the most important uses of flowcharts are to depict through images how a process is performed from start to finish, typically in sequential order. A process flow diagram is often used in training to document an existing process or to evaluate the efficiency of that process.