FINAL YEAR PROJECT REPORT

CRIME FILE MANAGEMENT SYSTEM
I.T.S ENGINEERING COLLEGE, GREATER NOIDA

ON

Submitted by: 1.) MUDIT(0822213023) 2.) SANTOSH KUMAR PATEL(0822210078) 3.) PRATEEK KUMAR GUPTA(0822210067) 4.) NITIN KUMAR(0822210060)

Submitted to: Mr. TARUN CHUGH (Mentor)

November 21, 2011

CRIME MANAGEMENT SYSTEM

ACKNOWLEDGEMENT
Keep away from people who try to belittle your ambitions. Small people always do that, but the really great make you feel that you too, can become great. I take this opportunity to express my sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and have helped me in completing this project successfully. First of all, I would like to thank Mr. Sarban Mukharjee, Director (ITS Engineering College, Greater Noida) for creating opportunities to undertake me in the esteemed organization. Special thanks to Mr. Tarun Cough, Mentor for all the help and guidance extended to me by him in every stage during project. His inspiring suggestions and timely guidance enabled me to perceive the various aspects of the project in a new light. I would also thank to my Mr. Vijay Shukla , HOD (CSE Dept.) & my internal project guide Mr. Sandeep Kumar(Assistant Professor, CSE Dept.) who guided me a lot in completing this project. I would also like to thank my parents & project mate for guiding and encouraging me throughout the duration of the project.

I.T.S ENGINEERING COLLEGE, GRETER NOIDA

Page 2

GRETER NOIDA Page 3 .T. An SMTP Server must be maintained for temporary storage of emails and chat jar files for enable the chatting facilities. The server can be any Web Server. complaints. Each user first makes their login to sever to show their availability. This software provides facility for reporting online crimes. The software produced by this project exceeded expectations and would be suitable to be used in industry. show most wanted person details mailing as well as chatting. Any Number of clients can connect to the server. missing persons. building and testing a software system to be used for marketing Crime Management System. Any Number of clients can connect to the server. show most wanted person details mailing as well as chatting. missing persons.November 21. The project titled as “Crime file Management System “is a web based application. The piece of software. complaints. I. Each user first makes their login to sever to show their availability. is known as a Crime File Management System. The main modules in this project . INTRODUCTION ABOUT THE PROJECT The project titled as “Online Crime file Management “is a web based application. An SMTP Server must be maintained for temporary storage of emails and chat jar files for enable the chatting facilities. This software provides facility for reporting online crimes.S ENGINEERING COLLEGE. 2011 CRIME MANAGEMENT SYSTEM ABSTRACT This Synopsys documents the process of designing. and therefore the project. The server can be any Web Server.

2011 CRIME MANAGEMENT SYSTEM SOFTWARE REQUIREMENT SPECIFICATION I.T. GRETER NOIDA Page 4 .S ENGINEERING COLLEGE.November 21.

This will be a vastly complex software development project which will take approximately 5 months to complete. 2011 CRIME MANAGEMENT SYSTEM Purpose The purpose of this project is to design. I.T. the project is developed as a desktop application. and it will work for a particular organization using Internet. Project management is a key factor of this task to ensure the strict deadlines are adhered to.e. The project will be split up into stages and documented thoroughly throughout. i. It is also of paramount importance that tried and tested practices and techniques from the field are adhered to to ensure that no common development project mistakes are reproduced. Scope The scope of the project is the system on which the software is installed. build and test a Crime File Management System. GRETER NOIDA Page 5 .S ENGINEERING COLLEGE. But later on the project can be modified to operate it online.November 21.

2011 CRIME MANAGEMENT SYSTEM Definition. The JCF provides both interfaces that define various collections and classes that implement them.  JAVA COLLECTION FRAMEWORK : The Java collections framework (JCF) is a set of classes and interfaces that implement commonly reusable collection data structures. It provides methods for querying and updating data in a database. making Swing applications easier to create. A JDBC-to-ODBC bridge enables connections to any ODBC-accessible data source in the JVM host environment. Acronyms. Although it is a framework. GRETER NOIDA Page 6 . it works in a manner of a library.  J2EE (Java 2 Enterprise Edition): It is a programming platform. which is used for developing and running distributed java Applications. It defines infrastructure common to most desktop applications. I.November 21.  JDBC (Java Data Base Connectivity): is an API for the Java programming language that defines how a client may access a database.S ENGINEERING COLLEGE.T. JDBC is oriented towards relational databases. and Abbreviations  SWING FRAMEWORK: The Swing Application Framework is a Java specification for providing a simple application framework for Swing applications. belonging to the Java platform.

0 Update 2 SUSE Linux Enterprise Server 10 Windows Server 2003 SP2 Standard. 2011 CRIME MANAGEMENT SYSTEM Technologies to be used:  PROGRAMMING LANGUAGE: JAVA(SE) 7  DATABASE: My SQL System Requirements: SERVER SIDE:  RAM: 256 MB or above  Processor: 1.4 GHz or above  OPERATING SYSTEM: Red Hat Enterprise Linux AS/ES 4. Enterprise & Datacenter Windows Server 2008 SP1 Standard.2 GHz and above  OPERATING SYSTEM: any OS which supports Java 7 or above  Hard Disk: 50 MB free space CLIENT SIDE:  RAM: 4GB or above  Processor: 2.T. GRETER NOIDA Page 7 .S ENGINEERING COLLEGE. Enterprise & Datacenter  Hard Disk: 100GB free space I.November 21.

viewing most wanted etc. 2011 CRIME MANAGEMENT SYSTEM Overview: Crime File Management System has following main modules for proper functioning:  ADMIN MODULE: View and reply user complaint: This module helps the admin to view and reply user’s complaint details    View and reply user crimes: This module helps the admin to view and reply user’s crimes details New admin: This module used for add new admin VISITOR MODUL View Hot news: This module helps the visitor to see the latest hot news which can update by the admin.T. These modules help the user to report online complaints.   REGISTERED USER MODULE: The registered user module includes. GRETER NOIDA Page 8 .S ENGINEERING COLLEGE. I.November 21.  Add complaint. Add Missing person. Add Crime report.

the investigation must go on to suggest the type of equipment. 2011 CRIME MANAGEMENT SYSTEM FEASIBILITY STUDY Feasibility study is made to see if the project on completion will serve the purpose of the organization for the amount of work. Having identified an outline system. Through the technology may become obsolete after some period of time. due to the fact that never version of same software supports older versions. ability to meet their user needs and effective use of resources. A feasibility study of a system proposal is according to its workability.S ENGINEERING COLLEGE. GRETER NOIDA Page 9 . of running the system once it has been designed. The document provide the feasibility of the project that is being designed and lists various areas that were considered very carefully during the feasibility study of this project such as Technical. I. required method developing the system. which is the impact on the organization. The system has been developed using Java the project is technically feasible for development. programs and procedures. output. Economic and Operational feasibilities. Technical issues raised during the investigation are:  Does the existing technology sufficient for the suggested one?  Can the system expand if developed? The project should be developed such that the necessary functions and performance are achieved within the constraints.T.November 21. The following are its features: Technical Feasibility The system must be evaluated from the technical point of view first. So there are minimal constraints involved with this project. Thus when a new application is proposed it normally goes through a feasibility study before it is approved for development. the system may still be used. The project is developed within latest technology. The assessment of this feasibility must be based on an outline design of the system requirement in the terms of input. effort and the time that spend on it. Feasibility study lets the developer foresee the future of the project and the usefulness.

November 21. 2011 CRIME MANAGEMENT SYSTEM Economic Feasibility The developing system must be justified by cost and benefit. Also all the resources are already available.  The cost of the hardware and software. is the cost it would require. GRETER NOIDA Page 10 . All behavioral aspects are considered carefully and conclude that the project is behaviorally feasible. Criteria to ensure that effort is concentrated on project. which will give best. The following are some of the important financial questions asked during preliminary investigation:  The costs conduct a full system investigation. which affect the development of a new system.T.S ENGINEERING COLLEGE. One of the factors. it give an indication of the system is economically possible for development.  The benefits in the form of reduced costs or fewer costly errors. Since the system is developed as part of project work. return at the earliest. I. there is no manual cost to spend for the proposed system. Behavioral Feasibility This includes the following questions:  Is there sufficient support for the users?  Will the proposed system cause harm? The project would be beneficial because it satisfies the objectives when developed and installed.

November 21.  End Users: 1. GRETER NOIDA Page 11 .) He/ She must have an account or college ID.) He/ She must be registered for the further processing.) He/ She must have the knowledge about computers and how to operate the application which is provided in the form of simple GUI.T.S ENGINEERING COLLEGE. Constraints:  Proxies cannot be detected. 2011 CRIME MANAGEMENT SYSTEM User Characteristics:  Administrator: Administrators are responsible for updating the database and the contents of the website. 2. Hence they should have the knowledge of the whole Student Attendance management system that is available. I. 3.

S ENGINEERING COLLEGE. 2011 CRIME MANAGEMENT SYSTEM SYSTEM ANALYSIS I.November 21. GRETER NOIDA Page 12 .T.

T. 2011 CRIME MANAGEMENT SYSTEM USE CASE DIAGRAMS I.November 21.S ENGINEERING COLLEGE. GRETER NOIDA Page 13 .

November 21. GRETER NOIDA Page 14 . 2011 CRIME MANAGEMENT SYSTEM E R DIAGRAM I.T.S ENGINEERING COLLEGE.

T. 2011 CRIME MANAGEMENT SYSTEM I.November 21.S ENGINEERING COLLEGE. GRETER NOIDA Page 15 .

S ENGINEERING COLLEGE. GRETER NOIDA Page 16 .November 21. 2011 CRIME MANAGEMENT SYSTEM DATA FLOW DIAGRAMS Context flow diagram I.T.

S ENGINEERING COLLEGE. 2011 CRIME MANAGEMENT SYSTEM I.T. GRETER NOIDA Page 17 .November 21.

GRETER NOIDA Page 18 . 2011 CRIME MANAGEMENT SYSTEM I.S ENGINEERING COLLEGE.November 21.T.

2011 CRIME MANAGEMENT SYSTEM SOFTWARE DESIGN METHODOLOGY I. GRETER NOIDA Page 19 .November 21.T.S ENGINEERING COLLEGE.

November 21. GRETER NOIDA Page 20 .T. 2011 CRIME MANAGEMENT SYSTEM SDLC-THE WATERFALL MODEL I.S ENGINEERING COLLEGE.

 Basic Design: If the first phase gets successfully completed and a well thought out plan for the software development has been laid then the next step involves formulating the basic design of the software on paper. that is to create software. similar to the water in a waterfall.November 21. you cannot turn back. like a waterfall.T. It is called as such because the model develops systematically from one phase to other in a downward fashion.S ENGINEERING COLLEGE. About the Phases As said earlier the waterfall model has been structured on multiple phases especially to help out the software construction companies to develop an organized system of construction. This way one moves progressively to the final stage and once that point is reached. For example you start with Phase I and according to this model. 2011 CRIME MANAGEMENT SYSTEM All about the Waterfall Model The waterfall model is a model which was developed for software development. I. The most probable phases through which it progresses downwards are         Definition Study/Analysis Basic Design Technical Design/Detailed Design Construction Testing Integration Management and Maintenance. what it is going to be and what purpose is it going to fulfill. Before the advent of this method. However with this method they hoped to bring clarity in their projects. one only progresses to the next Phase once the previous one has been completed. the project will be divided into many stages thus easing out the whole process. By following this method. GRETER NOIDA Page 21 . Brief Description of the Phases of Waterfall Model  Definition Study / Analysis: During this phase research is being conducted which includes brainstorming about the software. the software development in the computer companies suffered from a haphazard integrated software network like cluttered knitting.

this term was mostly used in writing about something that is often wrongly done in the process of software development – like a common malpractice.T. Royce was more of the opinion that a successful model should have the allowance of repetition or to go back and forth between phases which the waterfall model does not do.  Management and Maintenance: Maintenance and management is needed to ensure that the system will continue to perform as desired.S ENGINEERING COLLEGE. History of the Waterfall Model The history of the Waterfall model is somewhat disrupted.” In fact Royce later presented this model to depict a failure or a flaw in a non-working model. It is often said or believed that the model was first put forth by Winston Royce in 1970 in one of his articles.November 21. He examined the first draft of this model and documented that a recurrent method should be developed in this I. Here the functions of each of the part are decided and the engineering units are placed for example modules. programs etc.  Testing: At this phase. 2011 CRIME MANAGEMENT SYSTEM  Technical Design / Detail Design: After the basic design gets approved.  Integration: in the phase of Integration.  Construction / Implementation: In this phase the source code of the programs is written. GRETER NOIDA Page 22 . So later on. the whole design and its construction is put under a test to check its functionality. the company puts it in use after the system has been successfully tested. then a more elaborated technical design can be planned. Through the above mentioned steps it is clearly shown that the Waterfall model was meant to function in a systematic way that takes the production of the software from the basic step going downwards towards detailing just like a Waterfall which begins at the top of the cliff and goes downwards but not backwards. whereas he did not even used the word “waterfall. If there are any errors then they will surface at this point of the process.

The Waterfall Model is a straight forward method and lets one know easily what stage is in progress. then a number of steps would go to waste. The newer methods don’t document their developmental process which makes it difficult for a newer member of the team to understand what step is going to follow next. as each of the phases is quite big. GRETER NOIDA Page 23 . When new workers enter the project. Followers of the Iterative method perceive the Waterfall model as inappropriate. He felt the need of progressing only after a feedback from the previous stage has been received. this happens in a Waterfall Model. before proceeding to the next. the Iterative model is more practical and has room for maneuver.  Many software projects are dependent upon external factors. and there would arise a need to start everything all over again. Of course this also brings about the aspect of time and money which will all go to waste. Advantages of the Waterfall Model Let’s look at some of the advantages of this model.  A lot of emphasis is laid on paperwork in this method as compared to the newer methods. It is easier to develop various softwares through this method in short span of time. The Waterfall Model doesn’t work well in a situation like this as it assumes no alteration to occur once the process has started according to plan. 2011 CRIME MANAGEMENT SYSTEM model. thereby influencing an alteration in the normal plan of construction and hence the functionality as well. for instance. It is not even easy to take out the cost estimate of each step. Disadvantages of the Waterfall Model There are many disadvantages to the model as well. that the client changes the requirement of the project. This is known as the Iterative model. But unlike the Waterfall model. Let’s have a look at those. it is easier for them to carry on the work from where it had been left. out of which the client for which the software is being designed is the biggest factor. Therefore if there is a fault in this software it will be detected during one of the initial phases and will be sealed off for correction. It happens a lot of times. There are many other software developmental models which include many of the same aspects of the Waterfall model. Therefore this method will not at all prove to be cost effective. As opposed to the Waterfall model. these methods are not largely affected by I.  The Waterfall method is also well known amongst the software developers therefore it is easy to use.November 21.S ENGINEERING COLLEGE.  The project requires the fulfillment of one phase. If.T.

however in the Waterfall model. we know that Phase II cannot be executed until Phase I has been successfully completed. only this time the phases are overlapping each other which present many advantages.T. so while the designers are still designing the software.  Aorta Lifecycle Model The difference in this model is that they rely a lot on the feedback which comes from other phases before progressing onto the next. For example the time won’t be wasted because before Phase I would be completed. Phase II would already be underway. therefore.  Sashimi Model Sashimi is a true modified version of the Waterfall model. Moreover. so one can return to the previous step if desired. which is why it is not suitable for smaller projects. whereas in various other developmental programs the designs would be tested a lot sooner to find the flaw at a time when a lot of time and money has not been wasted. 2011 CRIME MANAGEMENT SYSTEM the outside sources. GRETER NOIDA Page 24 .November 21.S ENGINEERING COLLEGE.   Modified Waterfall Models Due to the various disadvantages a lot of other modified versions of this model have also been put forth and some of these are mentioned below:  Royce Model The Royce model stresses on the fact that the Waterfall model suffers from a serious flaw that one cannot return to a previous phase to correct something that has gone wrong. but it is not without the disadvantages as well. time of the builders is completely wasted. The design. I. there are many different people working in the different phases of the project like the designers and builders and each carries his own opinion regarding his area of expertise. Another disadvantage of this method is that the testing period comes quite late in the developmental process. is bound to be influenced. For example if we study any software development process. It takes a lot of effort and time. there is no room for that. The phases are somewhat the same as in the Waterfall Model. since they overlap.  The other negative aspect of this model is that a huge amount of time is also wasted. Elaborate documentation during the Waterfall method has its advantages.  V Waterfall Model The V Waterfall Model relies on a linear software developmental program which stresses on balanced development more than anything else. In the waterfall model.

wikipedia.November 21.org/wiki/Software_development_methodology [8] IEEE SRS format [9] Designing tools.T.html [4] http://www.aspx [5] Complete Reference of JAVA by Patrick Naught on and Herbert Scheldt.com/java109/java109. 2011 CRIME MANAGEMENT SYSTEM References [1] Head First (Core Java) by Kathy Sierra and Bert Bates.oracle. Tata McGraw Hill [6] http://www.com [7] http://en. GRETER NOIDA Page 25 .emeriocorp.javacoffeebreak.S ENGINEERING COLLEGE.com/technetwork/java/javase/downloads/index.com/Solutions/Pages/TuitionManagementSystem. [2] http://www.html [3] http://www.Rational Rose. Smart draw I.waterfall-model.

Sign up to vote on this title
UsefulNot useful