View
238
Download
1
Category
Preview:
Citation preview
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 1/60
AProject Report On
“CRIME REPORTING”
GUIDED BY:-
Miss. Dipika Patel
PREPARED BY:-
Sagar Prajapati : 086080307541Atiq Mohammad : 086080307545
Patel Vijay : 086080307539
SEMESTER 6th
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 2/60
BHAGVWAN MAHAVER POLYTECHNIC
SURAT
CERTIFICATE
This is to certify that Prajapati Sagar, Mo.Atiq,
Patel Vijay
havingExam.No.086080307541,086080307545,08
6080307539 student of Diploma in Computer
Engineering of Semester 6th has satisfactorily
completed his/her Project Crime Reporting the
practical fulfillment for the award of diploma in
Computer Engineering. Under my guidance
during April-May 2011.
Signature of GuideSignature of H.O.D.
(Mrs.Dipika Patel)(Mrs.Dipika Patel)
PrincipalSignature of
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 3/60
(Mr. Amit C. Thakor)Examiner
ACKNOWLEDGEMENT
We are very grateful to our Principal Mr. Amit C.
Thakor (M.E. (Mech.) LL.B.) for providing us with an
environment to complete our project successfully.
We would like to thank Mrs. Dipika Patel
(B.E.Comp.) for her unwavering support during the entire
course of this project work.
We are deeply indebted to our Head of the Department
Mrs. Dipika Patel, who modeled us both technically and
morally for achieving greater success in life.
We are very grateful to our project guide Mrs. Dipika
Patel, for being instrumental in the completion of our
project with his complete guidance.
Finally, we take this opportunity to extend our deep
appreciation to our family and friends, for all that they
meant to us during the crucial times of the completion of ourproject.
Thanking
you,
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 4/60
Prepared by:
Mo.Atiq 086080307545
Prajapati Sagar 086080307541
Patel Vijay 086080387539
ABSTRACT
This website enables users to file a crime report ornarrate a witnessed crime online.
In order to report a crime user has to sign up first.He/she should have an account using which he has to log into the website and report the crime.
Only users authenticated by admin will be able to log inand access the services provided by this portal.
The admin authenticates user and provides gives permission
to various modules of the portal.Users can report crimes like: Theft, Murder, Criminal
damage, Theft from a motor vehicle, Criminal damage to amotor vehicle, Hate crimes and hate incidents, Physicalabuse, etc.Once the report is submitted, it is forwarded to the nearestpolice station covering the location of the crime and aunique reference number is assigned to the user. Also, thewebsite provides emergency phone numbers and locations
of nearest police stations to a selected location. The websitecan even track the IP address of the sender to preventforgery.
The list of various crimes reported at a particular dateor within certain time duration can be viewed in a reportformat. Also the details of the user who has submitted aparticular crime report can be viewed.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 5/60
Thus the website saves a lot of time and formalities and alsoprovides safety for witness as he/she can submit report as“Anonymous”.
Index
Page.No
1. Introduction………………………………
2. Profile of Organization…………………..
3. System Analysis
3.1 Current Study………
3.2 Proposed System……
4. System Design………………………………
5. Screen-Short………………………….
6. Testing and Implementation……………….
7. Conclusion…………………………………..
8. References……………………………………
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 6/60
9. Appendices……………………………………
Introduction
What is Crime Reporting?
Crime reporting is the first of the nine basic Youth Crime
Watch components. Most simply, it's giving the proper
authorities information you have about:
1. A crime that might be committed
2. A crime that has been committed
3. Someone who was involved in committing a crime
4. Young people understand the importance of reporting crime.
They want safer schools and neighborhoods, and if theyknow how to report effectively, they'll do it. Young people
can help encourage peers to report crime in the making as
well as information on crimes under investigation
• Purpose of Crime Reporting
We have developed the portal of “WEBSITE ON CRIMEREPORTING”, the portal can handle data of criminals who are
under the judicial surveillance or are under trial. This portal will be
most useful for DEFENCE for searching of details of criminals,
any one can report a FIR online, missing citizen search, secure
registration and profile management facilities for detectives and
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 7/60
security agencies, Facilitate communication between all stack
holders.
• Need of Crime Reporting :
1. It was a progress to make India free from crime.2. In this user can easily make fir against the person from whom
he/she is being suffered.
3. In this user can not only make fir but can get his updated
report of his FIR
4. By this Police can easily catch the criminal or in other words
a criminal can be easily catches doesn’t matter how far
he/she is
• Functionality Of Crime Reporting:
1. Crime reporting forms, progress tracking, proof attachments.
2. On form submission an e mail goes to regional police officer
in case.
3. if it’s serious category crime where quick attention is
required.
4. Facilitate crime and criminals search – region, crime-type,gender.
5. Age group wise etc.
6. Missing citizen or valuables reporting and search.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 8/60
7. Secure registration and profile management facilities for
detectives.
8. And security agencies.
9. Facilitate communication between all stakeholders –
Discussion.
• Scope of Crime Reporting
This Website provides an architectural overview of the
CRIME MANAGEMENT. This Website is a generic, web-based
tool that enables users to manage the Crime on tasks completed as
part of projects with tasks and sub-tasks. The tool includes
interactivity Functionality. Information will be stored in a
database. Administrative and managerial functions will be provided including configuring projects/tasks/subtasks, an
• Benefits of Crime Reporting:
In order to quantify the benefits of your crime reporting
portal, you first have to know what to look for. CRIME
REPORTING can help you in different ways. Here are some of the
areas to look for benefits in implementing a portal:
Paper Reduction
“CRIME REPORTING” can reduce the cost associated with
creating and distributing paper requirements and resumes. Cost
savings result from:
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 9/60
Direct savings from reduced paper, printing, and distribution costs
Indirect savings from time spent handling paper documents
Paperwork Transfer
A big expense with a manually maintaining records and
requirement system is that of transferring of records from one person to another. For example, the file works is no not been done
by hands but is done online. Reducing the communication
expenses
Improved Data Quality
Manual records must be then entered into a computer inorder to be processed for further process or may be maintained into
database for future requirement. Whenever data is keyed into a
computer from a hand-written document, errors will be made.
These errors can cost you in many direct and indirect ways:
Incorrect selection may take place. When wrong justification is
done due to manual errors and adjustment is costly for system.
Without accurate information, you lose the ability to perform
useful decision support. You should have accurate information
about the background of the case as well as the crime, departmentsworked in, areas the organization is working in etc. for your
decision support.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 10/60
System Analysis
System/Requirement analysis phase is considered to be one
of the most important phases in the system development life cycle.
It is immensely important that the software developer make
thorough study of the existing system. It refers into the process of
examining a situation with the intent of improving it through better
procedures and methods.
System Analysis is the process of planning a new System toeither replace or complement an existing system. But before any
planning is done, the old system must be thoroughly understood
and the requirements must be determined. System Analysis, is
therefore, the process of gathering and interpreting facts,
diagnosing problems and using the information to make
improvements in the System. It is basically detailed explanation or
description.
Before automating a system under consideration, it has to be analyzed. We need to study how it functions currently, what are
the problems, and what are the requirements that the proposed
system should meet. The study will enable the developer to know
the intricacies of the existing system.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 11/60
System Analysis is conducted with the following objectives in
mind:
o Identify the public need.
o Evaluate the system concept for feasibility.o Perform economic and technical analysis.
o Allocate functions to hardware, software people, database
and other system elements.
Requirement analysis is done in order to understand the
problem, which the software system is to solve e.g., the problem,
could be automating the existing manual system or developing a
completely new automated system or a combination of the two.
For every system understanding the requirement of the system is a
major task. The emphasis in requirement analysis is on identifying
what is needed from the system, and not how the system achieves
its goal.
The main objective behind any business organization is to
maximize its profit besides maintaining quality and strategicnorms. This can be achieved by improving the efficiency of the
system by providing more facilities using automation, by adopting
faster data access, and proper communication.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 12/60
FEASIBILTY STUDY
A feasibility study is carried out to select the best system
that meets performance requirements. Feasibility is the
determination of whether or not a project is worth doing. The
process followed in making this determination is called a
feasibility study. This type of study determines if a project can and
should be taken.
Since the feasibility study may lead to the commitment of large resources, it becomes necessary that it should be conducted
competently and that no fundamental errors of judgment are made.
Depending on the results of the initial investigation, the
survey is expanded to a more detailed feasibility study.
Feasibility study is a test of system proposal according to its
workability, impact on the organization, ability to meet user
needs, and effective use of resources.
The objective of the feasibility study is not to solve the
problem but to acquire a sense of its scope. During the study, the
problem definition is crystallized and aspects of the problem to
be included in the system are determined.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 13/60
All projects are feasible given unlimited resources and
infinite time. Unfortunately the development of computer-based
system in many cases is more likely to be plagued by scarcity of
resources and delivery date. Hence, we have made use the concept
of reusability that is what Object Oriented Programming (OOPS) isall about.
Consequently, costs and benefits are described with greater
accuracy at this stage.
FOUR KEY CONSIDERATIONS ARE INVOLVED IN THE
FEASIBILITY ANALYSIS. THESE ARE:
• TECHNICAL FEASIBILITY
• ECONOMIC FEASIBILITY
• BEHAVIOURAL FEASIBILITY
• OPERATIONAL FEASIBILITY
• TECHNICAL FEASIBILITY:-
Technical Feasibility centers on the existing computer system
(hardware/ software) and also it can support the modification. In
manual processing there are more chances of errors, creating lot of
complications, less technical or logical. Through proposed systemwe can set this process in a very systematic pattern, which is more
technical, full proof, authentic, safe and reliable.
For example, if the current computer is operating at 80
percent capacity - an arbitrary ceiling - then running another
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 14/60
application could overload the system or require additional
Hardware. This involves financial considerations to accommodate
technical enhancements. If the budget is a serious constraint, then
the project judged is not feasible. In this project, all the necessary
cautions have been taken care to make it technically feasible.Using a key the display of text/object is very fast. Also, the tools,
operating system and programming language used in this
localization process is compatible with the existing one.
ECONOMIC FEASIBILITY: -
Economic analysis is the most frequently used method for
evaluating the effectiveness of the candidate system. More
commonly known as cost/benefit analysis, the procedure is to be
determining the benefits and savings that are expected from a
candidate and compare them with costs. If benefits outweigh costs,
then the decision is made to design and implement the system.
A systems financial benefit must exceed the cost of
developing that system. i.e. a new system being developed should
be a good investment for the organization. Economic feasibility
considers the following:
o The cost to conduct a full system investigation.
o The cost of hardware and software for the class of
application.
o The benefits in the form of reduced cost or fewer costly
errors.
o The cost if nothing changes (i.e. the proposed system is not
developed).
• BEHAVIOURAL FEASIBILITY :-
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 15/60
People are inherently resistant to change, and computers have
been known to facilitate change. An estimate should be made of
how strong a reaction the user staff is likely to have toward the
development of a computerized system. Therefore it is
understandable that the introduction of a candidate system requiresspecial efforts to educate and train the staff. The software that is
being developed is user friendly and easy to learn. In this way, the
developed software is truly efficient and can work on any
circumstances, tradition, locales.
Behavioral study strives on ensuring that the equilibrium of
the organization and status quo in the organization neither are nor
disturbed and changes are readily accepted by the users.
Our proposed system works to minimize the human errors,
take less time, easy interaction with user, bug free. This
project/software is further expanded by connecting various
interrelated departments and by installing an extension part of this
software.
o System level goals and requirements.
o Cost estimation for development process and work product.
o Solution strategy development.
o Outlines of the several solutions strategies.
o Recommendation of solutions strategy.
o Feasibility and study of each strategy.
o List of priorities for management.
• OPERATIONAL FEASIBILITY :-
Operational feasibility is mainly related to the human
organizational & political aspects. This feasibility study answers
questions like: Will the system be used if it is developed and
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 16/60
implemented? Will there be resistance from users that will
undermine the possible application benefits?
To get the answer of these questions, many methods are used like
interviews, questionnaire, records checking and observation. Oneor two persons who are familiar with information system
techniques, who understands the business and who are skilled in
system analysis and design, generally carry out this feasibility
study.
The essential questions that help in testing the operational
feasibility of a system as follows:
o What changes will be made in the system?o What organizational structures are?
o What new skills will be required? Do the existing staff
members have these skills? If not, can they be trained
in due course of time?
o Operational feasibility study is carried out by a small group
of people who are familiar with information system
technique who understand the parts of the business that are
relevant to the project and are skilled in system analysis anddesign process?
The feasibility study is carried out by a small group of people who
are familiar with information system techniques, understand the
part of business or organization that will be involved or affected by
a project, and are skilled in the system analysis & design process.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 17/60
GANTT CHART
Gantt chart is a project scheduling technique. Progress can be
represented easily in a Gantt chart, by coloring each milestonewhen completed. The project will start in the month of January and
end after 4 months at the end of April.
A Gantt chart is a graphical representation of the duration of
tasks against the progression of time. It is a useful tool for planning
and scheduling projects. A Gantt chart is helpful when monitoring
a project's progress. A Gantt chart lays out the order in which the
tasks need to be carried out.
A Gantt chart is a type of bar chart that illustrates a project
schedule. Gantt charts illustrate the start and finish dates of the
terminal elements and summary elements of a project. Terminal
elements and summary elements comprise the work breakdown
structure of the project. Gantt charts also show the dependency
relationships between activities. Gantt charts can be used to show
current schedule status.
The Gantt chart is constructed with a horizontal axis
representing the total time span of the project, broken down into
increments (days, weeks, or months).
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 18/60
The Gantt chart is constructed with a vertical axis representing the
tasks that make up the project.
System Design
Detailed Design
Coding
Unit Testing
Test Plan
Testing
Working February March April May
Month
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 19/60
DATA FLOW DIAGRAM:
A data flow diagram (DFD) is a graphical representation of
the flow of data through an information system. A data flow
diagram can also be used for the visualization of data processing
(structured design). A data flow diagram could be a context level
diagram (LEVEL 0), LEVEL 1, LEVEL 2.
• CONTEXT LEVEL DIAGRAM (LEVEL 0)
This level shows the overall context of the system and its
operating environment and shows the whole system as just one process.
• LEVEL 1
This level (level 1) shows all processes at the first level of
numbering, data stores, external entities and the data flows
between them. The purpose of this level is to show the major high
level processes of the system and their interrelation
• LEVEL 2
This level is a decomposition of a process shown in a level 1
diagram, as such there should be a level 2 diagram for each and
every process shown in a level 1 diagram.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 20/60
Crime
Reporting
0
User
Incharge
Admin
Crime DB
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 21/60
[Content Diagram]
Level 0
Admin
ViewReports
1
Manage Area master
2
Manage
incharg details
3
Report
DB
Area DB
Incharg
DB
Po_stationDB
Manage Police
Station Details
4
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 22/60
[Admin Side]
Level 1
Incharge
Assign Report
1
Manageinformation
2
Report
DB
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 23/60
[Incharge Side]Level 1
User
FIR Report
1
Search
Police Station
2
Report
DB
Po_station
DB
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 24/60
[User Side]
Level 1
Admin
Insert Area
Details
2.1
Update/Del/search
Area Details
2.2
Area DB
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 25/60
[Manage Area Detail]
Level 2
Admin
Insert New
Incharge Details
3.1
Update/Del/search
Incharge Details
3.2
Incharge
DB
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 26/60
[Manage Incharge Detail]
Level 2
Admin
Add New Police
Station Details
4.1
Update/Del/search
Police Station
4.2
Po_Station
DB
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 27/60
[Manage Police Station Detail]
Level 2
Incharge
Insert
Information6.1
Update/Del
Information6.2
Report
DB
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 28/60
[Manage Information in Report]
Level 2Database Diagrams
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 29/60
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 30/60
DATA DICTIONARY
The data dictionary is the repository of all the meta-data relevant to
the objects stored in the database—and also of information
concerning the DBMS itself.
DICTIONARY CONTENT
DEFINING METADETA
The term metadata is often defined as data about data. That is, data
that provides information about the tables, views, constraints,
stored procedures, etc. stored within the database. If we take a
table as an example, the dictionary will store information such as:
• its name
• when it was created and when it was last accessed
• the names and data types of its attributes (i.e. structural
information)
• its owner, who may read and write to it (i.e. security
information)
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 31/60
• where the data is stored (i.e. physical information)
CURRENT STUDY
Project:
Project normally has many project activities associated with it, many
employees involved and the employee can play several roles within a project
(employee role in project).
Name:
Crime Reporting
Employee:
Miss Dipika Patel
Role :
Working on Administrator module
Module Activity:
I have assigned 3 types of authorized users.
Administrator
Authorized UsersGeneral User (Others)
• Administrator-:
Administrators have all authority of inserting, deleting, and
updating from database on the bases of proofing by the users. After
2 days admin will send user-id & password on the prescribed e-
mail id. Admin can get any feedback from the user end by the
contact form.
• Authorized User:
Authorized users are of 4 types.
1. Press Reporter
2. Detective
3. Lawyer
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 32/60
4. Police
Everyone can register by the proof id & will get the registered no
& the user-id will be send by the Admin to the e-mail id.
• General User:This type of user performs can following task.
Firing FIR
Missing FIR
& see the list of following links:
Laws
Awards winner’s people
Lost Vehicles
About Indian PoliceTips for safety
Internet Crime Prevention Tips
Help Line
FAQ’s
Declaimer
Normal user can see the information magazine also and the
whole information about the website…
/estimateThe estimated time required for Employee to accomplish the task.
(15-20 days)
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 33/60
PROPOSED SYSTEM
This section describes the proposed crime reporting system
for the
Region. This system was developed based on previous planning
efforts
And direct input from the public and interested agencies and
groups. The
Proposed system does include all TRPA EnvironmentalImprovement
Program (EIP) projects. However, not all of the
proposed projects are EIP projects. Key criteria used in developing
and
Prioritizing the proposed system is listed below.
• Public Input - Consider and respond to public information in
the Crime Reporting planning process.
• Use - Crime reporting facilities contained in the proposed
System should reflect use levels that are commensurate with
the Level of investment required for construction and
maintenance.
• Coverage - The system should provide balanced access from
all portions of the region’s population centers for both
commuting and recreation routes.
• Safety - The system should provide the highest level of
safety Possible while eliminating major safety concerns such
as narrow Roadways.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 34/60
• Connectivity - The system should provide connections to
major Activity centers, multi-modal transfer locations, and toroutes that Provide access to neighboring counties. Activity
centers include Residential neighborhoods, schools, regional
parks, shopping Centers, employment centers, government
centers, transit centers, And other recreational opportunities.
Major gaps and barriers, Including narrow bridges and
roadways, should be targeted as High priority items.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 35/60
System Design
The design phase decides how the system will operate, in
terms of the hardware, software, and network infrastructure; the
user interface, forms, and reports that will be used; and the specific
programs, databases, and files that will be needed. Although most
of the strategic decisions about the system were made in the
development of the system concept during the analysis phase, thesteps in the design phase determine exactly how the system will
operate. The design phase has four steps:
1. The design strategy must be developed. This clarifies
whether the system will be developed by the company’s own
programmers, whether it will be outsourced to another firm
(usually a consulting firm), or whether the company will buy an
existing software package.
2. This leads to the development of the basic architecture
design for the system that describes the hardware, software, and
network infrastructure that will be used. In most cases, the system
will add or change the infrastructure that already exists in the
organization. The interface design specifies how the users will
move through the system (e.g., navigation methods such as menus
and on-screen buttons) and the forms and reports that the system
will use.
3. The database and file specifications are developed. These
define exactly what data will be stored and where they will be
stored.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 36/60
4. The analyst team develops the program design, which
defines the programs that need to be written and exactly what each program will do. This collection of deliverables (architecture
design, interface design, database and file specifications, and
program design) is the system specification that is handed to the
programming team for implementation. At the end of the design
phase, the feasibility analysis and project plan are reexamined and
revised, and another decision is made by the project sponsor and
approval committee about whether to terminate the project.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 37/60
Screen-Short
Home Page
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 38/60
Write F.I.R Report
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 39/60
Add Missing PersonInformation
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 40/60
Search Police station
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 41/60
Admin Login
F.I.R Reports
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 42/60
(Admin side)
Manage All Police Stations(Admin side)
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 43/60
Add New Police Station(Admin Side)
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 44/60
Manage All Area Incharge(Admin Side)
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 45/60
Add New InchargeRegistration(Admin Side)
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 46/60
Incharge Login
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 47/60
Incharge All Reports(Incharge Side)
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 48/60
Edit Incharge Detail(Incharge Side)
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 49/60
Testing and
Implementation
There are many different definitions of testing introduced in
texts covering software testing. This chapter introduces some ways
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 50/60
which can be used to realize these definitions. Some of these
definitions are:
“The aim of software testing is to guarantee, as far as
possible, that the software is correct.”
“Testing involves operation of a system or application under
controlled conditions and evaluating the results”
Software development models
Software development models are used for describing the work
flow associated with software development process. Two of the
most commonly used development models are the modifiedwaterfall model.
• Modified waterfall model
The waterfall model is one of the oldest ways to model the
software development process and life cycle. The development is
divided into a number of steps that are gone through in a
descending order starting from the top. At the end of each step it isevaluated if all the requirements for the current step are met and if
the next step can be started. If the requirements are not met the
development should continue on the current step. In some cases it
may be necessary to go back one or more steps and start
descending all over again if changes are necessary to accommodate
late requests by the customer or to correct a fundamental error
introduced in the design of the software. The original waterfall
model did not have any feedback mechanism built into it and this
Mechanism has been added in the modified waterfall model.
The starting point in the waterfall model for the software
development cycle is the idea of the software that will be
developed. After it is established that there is a demand for this
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 51/60
product the requirements that this software must fulfill have to be
specified. When all the requirements are defined the design phase
can be started. The design phase is focused on the data
requirements, the software construction and the interface design
and coding. When the design phase is completed theimplementation phase starts and the actual application will be
programmed. After all these steps have been gone through the
software still needs to be tested to verify that it meets all the
requirements set for it. After the software has passed all the tests
performed the product is delivered to the customer and it will be
maintained by fixing any defects that have gone unnoticed and
possibly by introducing minor improvements.
• Testing phases:
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 52/60
The testing process is often divided into different levels or phases
to make the whole process more manageable. These levels are
designed to build upon each other, making the discovery of errors
easier by first testing the application in smaller and less complex pieces. It is quite common to partition the testing process into the
following phases:
• Unit testing
• Integration testing
• System testing
• Acceptance testing
• Regression testing etc.
• UNIT TESTING
Unit testing focuses verification effort on the smallest unit of
Software design that is the module. Unit testing exercises specific
paths in a module’s control structure to ensure complete coverageand maximum error detection. This test focuses on each module
individually, ensuring that it functions properly as a unit. Hence,
the naming is Unit Testing.
During this testing, each module is tested individually and the
module interfaces are verified for the consistency with design
specification. All important processing path are tested for the
expected results. All error handling paths are also tested.
• INTEGRATION TESTING:
Integration testing addresses the issues associated with the dual
problems of verification and program construction. After the
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 53/60
software has been integrated a set of high order tests are
conducted. The main objective in this testing process is to take unit
tested modules and builds a program structure that has been
dictated by design.
• SYSTEM TESTING:
System testing of software or hardware is testing conducted on a
complete, integrated system to evaluate the system's compliance
with its specified requirements. System testing falls within the
scope of black box testing, and as such, should require no
knowledge of the inner design of the code or logic.
As a rule, system testing takes, as its input, all of the "integrated"
software components that have successfully passed integration
testing and also the software system itself integrated with any
applicable hardware system(s). The purpose of integration testing
is to detect any inconsistencies between the software units that areintegrated together (called assemblages) or between any of the
assemblages and the hardware. System testing is a more limiting
type of testing; it seeks to detect defects both within the "inter-
assemblages" and also within the system as a whole.
• ACCEPTANCE TESTING
User Acceptance of a system is the key factor for the success of
any system. The system under consideration is tested for user
acceptance by constantly keeping in touch with the prospective
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 54/60
system users at the time of developing and making changes
wherever required. The system developed provides a friendly user
interface that can easily be understood even by a person who is
new to the system.
• REGRESSION TESTING: -
Regression testing is the process of testing changes to
computer programs to make sure that the older programming still
works with the new changes. Regression testing is a normal part of
the program development process and, in larger companies, is done
by code testing specialists. Test department coders develop codetest scenarios and exercises that will test new units of code after
they have been written. These test cases form what becomes the
test bucket. Before a new version of a software product is released,
the old test cases are run against the new version to make sure that
all the old capabilities still work. The reason they might not work
is because changing or adding new code to a program can easily
introduce errors into code that is not intended to be changed.
• PREPARATION OF TEST DATA:
Taking various kinds of test data does the above testing.
Preparation of test data plays a vital role in the system testing.
After preparing the test data the system under study is tested using
that test data. While testing the system by using test data errors are
again uncovered and corrected by using above testing steps and
corrections are also noted for future use.
• USING LIVE TEST DATA:
Live test data are those that are actually extracted from
organization files. After a system is partially constructed,
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 55/60
programmers or analysts often ask users to key in a set of data
from their normal activities. Then, the systems person uses this
data as a way to partially test the system. In other instances,
programmers or analysts extract a set of live data from the files and
have them entered themselves.
It is difficult to obtain live data in sufficient amounts to conduct
extensive testing. And, although it is realistic data that will show
how the system will perform for the typical processing
requirement, assuming that the live data entered are in fact typical,
such data generally will not test all combinations or formats that
can enter the system. This bias toward typical values then does not
provide a true systems test and in fact ignores the cases most likely
to cause system failure.
Implementation
After having the user acceptance of the new system developed, the
implementation phase begins. Implementation is the stage of a project
during which theory is turned into practice. During this phase, all the
programs of the system are loaded onto the user's computer. After loading
the system, training of the users starts. Main topics of such type of trainingare:
How to execute the package
How to enter the data
How to process the data (processing details)
How to take out the reports
After the users are trained about the computerized system, manual
working has to shift from manual to computerized working. The following
two strategies are followed for running the system:
• Parallel run: In such run for a certain defined period, both the
systems i.e. computerized and manual are executed in parallel. This
strategy is helpful because of the following:
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 56/60
Manual results can be compared with the results of the computerized
system.
Failure of the computerized system at the early stage, does not affect
the working of the organization, because the manual system continues
to work, as it used to do.
• Pilot run: In this type of run, the new system is installed in parts.
Some part of the new system is installed first and executed
successfully for considerable time period. When the results are found
satisfactory then only other parts are implemented. This strategy
builds the confidence and the errors are traced easily.
Changes are made in response to change requirement but the
fundamental software structure is stable. No new functionality is added to
the system but it is restructured and reorganized to facilitate future changes.These strategies may be applied separately or together. Following
maintenance techniques are used:
Corrective maintenance
This acts to correct errors that are uncovered after the software is in
use.
• Adaptive Maintenance
This is applied when changes is the external environment precipitate
modifications to software.
• Perfective Maintenance
This improves future maintainability and reliability and provides basis
for future enhancements.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 57/60
Book References
• Beginning Php, Apache, My SQL Development
• Php and My SQL Bible
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 58/60
Bibliography
• www.aacounty.org
• www.google.com
• www.met.police.uk
• www.usdoj.gov/criminal/cyber crime
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 59/60
Conclusions
1. In this website a general (unknown) user can Apply online
General fir Report while sitting anywhere in the world and also get
the progress report of his/her FIR.
2. in this website Authorized user can Apply general FIR and after
investigation general FIR became registered FIR.
3. This is a fast working online system where crime can be
stopped.
4. By this Police can easily catch the criminal or in other words a
criminal can be easily catches doesn’t matter how far he/she is.
8/7/2019 Crime Reporting Report File2007
http://slidepdf.com/reader/full/crime-reporting-report-file2007 60/60
Recommended