Uploaded by Soham Gawde

online crime reporting (chp1) (chp2)(chp 3)

advertisement
ONLINE CRIME REPORTING
​INTRODUCTION
The project titled as “Online Crime Reporting” is a web based application. This software
provides facility for reporting online crimes , complaints , missing person ,show most wanted
persons details , show snatchers , show unidentified dead bodies,stolen vehicles as well as
messaging
Any number of clients can connect to the server.Each user first makes their login to server to
show their availability. The server can be any Web server.
The online crime report is to provide all crime management solutions which are easily
accessible to everyone. The crime application starts with the common people who wants to
log a complaints through the website so it can be very useful for the police station everytime.
OBJECTIVES
The project provides a framework within which a user can easily work with. That was out
next objective. We know are of many categories, likes users from who know working with
computers very well to users who didn’t know about computers. So all the category can use
the software. So it should be user friendly.
The product provides a framework, which is error free. We know a crime management
system is actually a critical process having many calculations and operation. So each simple
error laid to big problem. So it should be error free and our objectives is to build error free
software .
PURPOSE
The system is very simple in design and to implement.
The system requires very low system resources and the system will work in almost all
configurations. It has got following features
1.Ensure data accuracy’s.
2.Proper control of the higher officials.
3.Reduce the damages of the machines.
4.Minimize time needed for the various processing.
5.Greater efficiency.
6.Better service.
7.User friendliness and interactive.
8.Minimum time required.
9.Minimum manual data entry.
ACHIEVEMENTS
The main ​achievement of online​ application is that, a person can ​report​ the ​crime ​anytime
from anywhere. Users can view the progress of their complaint ​online​. Need:
Although ​reporting crime​ has many societal and individual ​benefits​, it is common
for ​criminal​ acts to remain unreported.
​
​
SCOPE
Following Details are provided or covered up by this project:Maintain Details about:Maintain user details.
Maintain system user details.
Maintain criminals details.
It is an error free software.
It maintain records of all the crime.
It also maintain records of victims or users.
It has a history of all crimes.
An admin or normal user or a system user file a case.
Only admin has the authority to view previous and current the records.
APPLICABILITY
It increases the efficiency of the police to caught criminal.Crime management system can be
implemented in every prison without any problem. This system has the the capability to
maintain infinite number of records.
It is very useful as the written papers have a limited time period and can get lost but in crime
management system this is not possible as a backup file will be created automatically and
also updated automatically when any change is made in any record.
Chapter 2
SURVEY OF TECHNOLOGIES
Visual studio ASP.NET
ASP.Net is a web development platform provided by Microsoft.​ It is a general
object-oriented programming (OOP) language.​ It is used for creating web-based
applications. ASP.Net was first released in the year 2002.
The first version of ASP.Net deployed was 1.0. The most recent version of ASP.Net is
version 4.6. ASP.Net is designed to work with the HTTP protocol. This is the standard
protocol used across all web applications.
ASP.Net applications can also be written in a variety of .Net languages. These include C#,
VB.Net, and J#. In this chapter, you will see some basic fundamental of the .Net framework.
The full form of ASP is Active Server Pages, and .NET is Network Enabled Technology.
ASP.NET Framework
The .NET Framework is a development platform for building apps for web, Windows,
Windows Phone, Windows Server, and Microsoft Azure. It consists of the common language
runtime (CLR) and the .NET Framework class library, which includes a broad range of
functionality and support for many industry standards.
The .NET Framework provides many services, including memory management, type and
memory safety, security, networking, and application deployment. It provides easy-to-use
data structures and APIs that abstract the lower-level Windows operating system. You can
use different programming languages with the .NET Framework, including C#, F#, and
Visual Basic.
Design Features of ASP.NET Framework
●
●
●
●
●
●
●
Interoperability
Common Language Runtime engine (CLR)
Language independence
Base Class Library
Simplified deployment
Security
Portability
Advantages of ASP.Net
Here are some of the basic advantages of using ASP .NET in web
development:
1. ASP .NET significantly reduces the amount of code required for building large and
complex applications which can increase overall development speed and reduce
development costs.
2. Just-in-time compilation, smart caching technologies and native optimization
dramatically increase overall application performance.
3. Framework supports varied languages it allows you to select the language that better
applies to your application.
4. It provides ability of cross platform migration.
5. It provides simplicity making it easy to perform common tasks including configuration
and deployment.
6. The features vast class library enclosing a large number of common functions and
ready-to-use custom web-controls that allow creating professional applications with no
need to develop from scratch.
7. It ensured high reliability and security due to built-in Windows authentication and
per-application configuration.
8. It is regularly updated by Microsoft to meet the most up-to-date technology
requirements.
Disadvantages of ASP.Net
●
●
●
●
●
Undefined Application Architecture with lack of Separation of Concerns (SoC)
Complex Pages with Performance issues.
Lack of abstraction with least control over HTML.
Limited support for testing and SEO.
Lack of Reusability and minimal parallel Development.
Learning Difficulties.
CHAPTER 3
REQUIREMENT AND ANALYSIS
​Problem definition
The old manual system was suffering from a series of Drawbacks. It is the process of
keeping, maintaining and retrieving the information was very tedious and lengthy. If
any information was to be found it was required go through the different registers,
documents there would never exist anything like report generation. One more
problem was that it was very difficult to find errors while entering the records.
The Requirement Process Typically Consists Of Three
Basic Tasks:
1. Problem or Requirement Analysis
2. Requirement Specification
3. Requirement Validation
1. Problem or Requirement Analysis
Often starts with a high level “Problem Statements”. During analysis the
problem domain & the environment are modelled in a effort to understand the system
Behaviour, constraints on the system, its input & output, etc. The basic purpose of this
activity is to obtain a through understanding of what the software needs to provide.
Frequency, during analysis, the analyst will have a series of meeting with the
client and end users. In the early meetings, the client & end users. In the early meetings,
the client & end user will explain the analyst about their work, their environment & their
needs as they perceived them. Any document describing the work or the organization
may be given, along with output of existing method of performing the task.
2. Requirement Specification
The understandings obtain by problem analysis forms the basic of requirement
specification, in which the focus is on clearly specifying the requirement in a document.
Issues such as representation, specification languages & tools are addressed during this
activity. As analysis produced large amount of information & knowledge with possible
redundancies, properly organizing & describing the requirements is an important goal of
this activity.
3. Requirement Validation
Focuses on ensuring the what have been specify in the SRS are indeed all the
requirement of the software & making sure that the SRS is of good quality. The
requirement process terminate with the production of the validate SRS.
Planning and Scheduling
Process model
The software development model adopted for the proposed
system is waterfall model.
Reason for choosing the waterfall model:
​Waterfall model stipulates that the requirements should be completely specify
before the rest of the system development is preceded. In the proposed system. the
requirements are fixed and known beforehand and hence this model is suitable and
adopted for the development of the proposed system.
The system’s services constraints and goals are established by consultation with
system users. They are then defined in a manner is understandable by the both uses
and developers. The system design process partitions the requirement to either
hardware on software system. It establishes overall system architecture. Software
design involves representing the software system functions in a form that may be
transformed into one or more executable programs.
Analysis phase:
​This phase involves detailed study of the system using different tools like
OMT AND UML
Design phase:
As conventional design method and according to OMT, as first step of
design subsystem of the system are identified.
Implementation phase:
Implementation phase include development of UI components, creating
prototypes of each core classes, development of UI classes development
and remote services creation​.
Testing Phase:
In testing phase each method of the classes are checked during development
phase as unit testing. Then each class is integrated and they are tested for
integration testing.
Schedule Representation
Gantt chart
A Gantt chart is a matrix, which lists on the vertical axis all the tasks to be performed. Each
row contains a single task identification, which usually consists of a number and name. the
horizontal axis is headed by columns indicating estimated task duration, skill level needed to
perform the task and the name of the person assigned to the task, followed by one columns
for each period in the project’s duration.
Each period may be expressed in hour, days, weeks, months and other units. In some cases it
may be necessary to label the period columns as period1, period2 and so on. The graphics
portion of the Gantt chart consists of a horizontal bar for each task connecting the period start
and period ending columns.
Hardware Requirements
​
The selection of hardware​ requirements configuration is an Important task related to the
software development. Insufficient RAM may affect the speed and efficiency of entire
system. A powerful processor is required to handle all operation. Sufficient hard disk
capacity is inevitable to store the database and handle all application.
Following is Hardware Configuration​:
1.
2.
3.
4.
CPU: INTEL PENTIUM DUAL-CORE
RAM: MIN 256 MB
HD space: 2GB free space required
Printer
Software Requirements
Selecting of software is a major task that has to be performed properly. According to system
requirements proper front-end and back-end should be selected. While selecting software it is
much essential that developer should have the complete knowledge and understanding of
language. The language selected must suit the hardware specification.
Conceptual model
Data Flow Diagram (DFD)
Online crime reporting system Data Flow Diagram is often used as a preliminary step to
create an overview of the crime reporting without going into great detail, which can later be
elaborated. It normally consists of overall application dataflow and process of the crime
reporting process. It contains all of the user flow and their entities such all the flow of crime,
criminal, case, department, police, complain, punishments. All of the below diagrams has
been used for the visualization of data processing and structured design of the crime reporting
process and working flow.
Online crime reporting system, where we have elaborated the high level process of crime
reporting. It’s a basic overview of the whole Online Crime Reporting System or process
being analysed or modelled.
ER Diagram
Crime Reporting System entiThis
This ER(Entity relationship)Diagram represents the model of crime reporting system Entity.
The entity-relationship diagram of crime reporting system shows all the visual instrument of
database tables and the relation between criminal department, case, complaints etc. It used
structure data and to define the relationship between structured data groups of crime reporting
system functionalities. The main entities of the crime reporting system are case, criminal,
crime department, police and complaint.
System Flowchart
Flowchart are used in designing and documenting simple process or programs. Like other
types of diagrams, they help visualize what is going on and there by help understand a
process, and perhaps also find less-obvious features within the process, like flaws and
bottlenecks. There are different types of flowchart: each type has its own set of boxes and
notations. The two most common types of boxes in a flowchart are:
● A processing step, usually called activity and denoted as a rectangular box.
● A decision usually denoted as a diamond.
A flowchart is described as “cross-functional” when the charts divided into different vertical
or horizontal parts, to describe the control of different organizational units. A symbol
appearing in a particular part is within the control of that organizational unit. A
cross-functional flowchart allows the author to correctly locate the responsibility for
performing an action or making a decision, and to show the responsibility of each
organizational unit for different part of a single process.
Chapter 4
System Design
Introduction
System design is the process or art of defining the architecture, components, modules,
interfaces, and data for a system to satisfy specified requirements. The design activity
begins when the requirements document for software to be developed is available, this may
be the software requirements specification for the complete system. Design is the first step
in the development phase of any engineered product or system. The goal of the design
process is
to produce a model or representation of a system. The design phase is a transition from a us
eroriented document to a document oriented to the programmers. This chapter deals with
the modeling of our GPRS Based Home Automation System. It covers the design process of
our project. First we need to understand the most basic concept necessary to create
database. Some basic component such as entity, entity types, attributes, relationships ER
diagrams etc. are given much importance. We mainly categorized this design into two parts
i.e. Abstract design and Detailed design. In Abstract design, we will give simple data flow
diagram of our application. In Detailed design, ER diagram are discussed with necessary
database structure.
Database Design
Designing data about discovering and completely defining applications​ D
​ ata characteristics and
processes. Data design is a process of gradual refinement, from the coarse to the precise data
structures and processes that provide it. The process of data design includes identifying the data,
defining specific data type and storage mechanisms, and ensuring data integrity by using business
rules and other run-time enforcement mechanisms.
Basic module
There are Three types of Module:
User Module
Admin Module
Main Admin Module
User Module:
In this module, first of all User will register with proper data (where username and E-mail id
must be unique for everyone).Once User registered than he/she can login in this
system and register their FIR. If user wants to see the nearest police-station than user
can see that using the map-locator which is provide in this system.
• Also User can see the criminal records. Here User can search the different criminal with
their name and also search the police-station using the city name.
• Here Session is applied on this system. So, once user logout he/she cannot go back, he/she
must have to login first. When user logout, cookie was also deleted​.
​
​Admin Module
• In this module, first of admin will login with proper email-id and password which is already
registered by Main-Admin. Once admin will login, he/she can see all the FIR
• which is registered by users. Also admin can search particular FIR using different
parameters. Admin can add criminal information. Here admin cannot update his/her
Main Admin Module
• In this module, Main admin will assign police-officer to their respective police-station with proper
data. Here main admin will assign police-officer or we can give them to email-id and
password and also edit/update their database like if one police-officer will get promotion
than his/her post will be updated. So main-admin will update that police-officer.
• Same way main-admin can register different police-station and also if police-station shifted from
one place to another than main admin will update the database. Also in this module, session
and cookie deleted code is applied.
• personal information. Admin can also see the feedback/complaint which is given by users.
Here Session is applied on this system. So, once admin logout he/she cannot go
• back, he/she must have to login first. When admin logout, cookie was also deleted
Some modules used in online crime reporting
Login Page:
Use to sign in.​ It is a set of credentials ​used​ to gain access to an area that
requires proper authorization. Logins are ​used​ to gain access to and control of
computers, networks, and bulletin boards, as well as other services.
FIR Registration form:
A Zero ​FIR​ allows for any police station to ​register​ an ​FIR​, regardless of their
jurisdictional area. It is usually ​used​ for crimes such as murder and rape and other
cognizable offences, i.e. an offence for which police can take action without prior
court approval.
Crime type:
Use to identify the crime.
Inquiry:
Any query related to investigation.
Emergency Contacts:
In Case of ​Emergency​ (ICE) is a program that enables first responders, such as
paramedics, firefighters, and police officers, as well as hospital personnel, to ​contact
the next of kin of the owner of a mobile phone to obtain important medical or support
information (the phone must be unlocked and working).
Add New Records:
Criminals, Evidence: picture, video etc.
Class diagram
Crime reporting system class diagram describes the structure of a crime reporting system
classes, their attributes, operation, and the relationship among objects. The main
classes of the crime reporting systems are case, criminal, crime department, police,
complaints​.
Classes of crime reporting system Class Diagram:
●
●
●
●
●
Case Class: Manage all the operation of case.
Criminal Class: Manage all the operation of criminal.
Crime Class: Manage all the operation of class.
Department Class: Manage all the operation of Department.
Police Class: Manage all the operation of police.
● Complaint Class: Manage all the operation of complaints.
Classes and their attributes of crime reporting system class diagram:
● Case attributes: case _Id, case _crime_ Id, case _ name, case _type
● Criminal attributes: criminal_ id, criminal_ crime_ id, criminal_ name, crime_ type,
case_ description.
● Department attribute: department_ id, department_ name, department_ place,
department_ type.
● Police attribute: police_ id, police_ department_ id, police_ name, police_ email.
● Complaints attributes: complain_ id, complain_ name, complain_ type, complain_
description.
Use Case Diagram
Use Case Diagram for user are as follows:
The first step in a development effort is to analyze the description of the system and
produce a model of system‟s requirements. A use case diagram depicts a static view of
the system functions and their static relationship both with external entities and with one and
another. It consists of:
System:
The system is depicted as rectangle.
Actor:
Each actor is shown as a stick figure.
Use case:
Each use case shown as a solid-bordered oval labeled with the name of the use case.
Use Case Diagram for admin are as follows:
Activity Diagram
Activity diagram​ is another important ​diagram​ in UML to describe the dynamic aspects of
the system. ​Activity diagram ​is basically a flowchart to represent the flow from
one ​activity​ to another ​activity​. The ​activity​ can be described as an operation of the
system. The control flow is drawn from one operation to another.
This is the Activity UML diagram of crime reporting system which shows the flows between
the activity of Department, police, case, crime, complaints. The mauin activity
involves in this UML Activity Diagram of crime reporting system are as follows:
●
●
●
●
●
Department activity
Police activity
Case activity
Crime activity
Complaint activity
Features of the activity UML Diagram of crime reporting system
● Admin user can search Department view description of a selected
Department, add Department, update Department and delete
department.
● Its shows the activity flow of editing, adding and updating of police.
● User will be able to search and generate report of case, crime,
complaints.
● All object such as(department, police , complaints) are interlinked.
● Its shows the full description and flow of department, crime,
complaints, case, police.
Algorithmic Design
One of the most important ​uses​ of flowcharts are to depict through images how a process is
performed from start to finish, typically in sequential order. A process ​flow​ diagram is
often used in training to document an existing process or to evaluate the efficiency of
that process.
Download