Professional Documents
Culture Documents
INTRODUCTION
1.1 SYNOPSIS
The Crime Records Management System applies to Police Stations all across the country and
specifically looks into the subject crime prevention, detection, conviction of criminals depending
on a highly responsive backbone of Information Management.
Synopsis is a general documentation tool. By means of a modular structure, it adapts to
different styles of embedded documentation, different programming languages and various
output formats. It scales well with the size of the project by allowing processing to be controlled
by making files.
1
1.2 ABOUT THE PROJECT
The Crime Records Management System applies to Police Stations all across the country
and specifically looks into the subject crime prevention, detection, conviction of criminals
depending on a highly responsive backbone of Information Management. The efficiency of the
Police and the effectiveness with which it tackles crime depend on what quality of information it
can derive from its existing records and how fast it can have access to it.
2
2. SYSTEM ANALYSIS
Preliminary investigation examine project feasibility, the likelihood the system will
be useful to the organization. The main objective of the feasibility study is to test the Technical,
Operational and Economical feasibility for adding new modules and debugging old running
system. All system is feasible if they are unlimited resources and infinite time. There are aspects
in the feasibility study portion of the preliminary investigation:
Technical Feasibility
Operational Feasibility
Economical Feasibility
TECHNICAL FEASIBILITY
The technical issue usually raised during the feasibility stage of the investigation
includes the following:
Does the necessary technology exist to do what is suggested?
Do the proposed equipments have the technical capacity to hold the data required to use the
new system?
Will the proposed system provide adequate response to inquiries, regardless of the number or
location of users?
Can the system be upgraded if developed?
Are there technical guarantees of accuracy, reliability, ease of access and data security?
3
Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation
System’. The current system developed is technically feasible. It is a web based user interface for
audit workflow at NIC-CSD. Thus it provides an easy access to the users. The database’s
purpose is to create, establish and maintain a workflow among various entities in order to
facilitate all concerned users in their various capacities or roles. Permission to the users would be
granted based on the roles specified. Therefore, it provides the technical guarantee of
accuracy, reliability and security. The software and hard requirements for the development of
this project are not many and are already available in-house at NIC or are available as free as
open source. The work for the project is done with the current equipment and existing software
technology. Necessary bandwidth exists for providing a fast feedback to the users irrespective of
the number of users using the system.
OPERATIONAL FEASIBILITY
Proposed projects are beneficial only if they can be turned out into information system.
That will meet the organization’s operating requirements. Operational feasibility aspects of the
project are to be taken as an important part of the project implementation. Some of the important
issues raised are to test the operational feasibility of a project includes the following: -
Is there sufficient support for the management from the users?
Will the system be used and work properly if it is being developed and implemented?
Will there be any resistance from the user that will undermine the possible application
benefits?
4
ECONOMICAL FEASIBILITY
A system can be developed technically and that will be used if installed must still be a
good investment for the organization. In the economical feasibility, the development cost in
creating the system is evaluated against the ultimate benefit derived from the new systems.
Financial benefits must equal or exceed the costs.
The system is economically feasible. It does not require any addition hardware or
software. Since the interface for this system is developed using the existing resources and
technologies available at NIC, There is nominal expenditure and economical feasibility for
certain.
In the existing crime management system, most of the operations are done manually like
send complaints, taking actions against crimes, view status etc. So with the existing system if
anybody wants to complaint against crimes he must do it through the police. If we are doing the
system manually, so many minor errors will occur. Error detection in the previous entries made
and data cross verification is another important function. These are done manually, and it would
take time.
The existing system is time consuming and not very user friendly.
The FIR brought by a person hailing from a family beyond poverty, the existing
system shows ignorance for the same
The officer dealing with a particular case cannot take decision by himself even when
he is having the first hand knowledge/information about the case and he can expect
obstructions from higher authorities/officials.
Even an efficient officer cannot/may not able to handle more than one case at a time.
5
As we all know, a covered truth, Bribery plays an important role in the existing
system.
Many cases are pilled up in the corners, which are not proved, due to lack of
commitment in the job.
In most of the cases, the innocent are accused in the existing system.
The existing system could provide only investigation and there is no Advocating,
Counseling facilities etc. hence no contact or control or co-ordination on these cell.
They criticized it for being inefficient, time consuming, poorly managed, disparate
and lacking flexibility.
Evaluation requires monitoring crime before, during and after the initiative.
Facts other than these initiatives may also impact on crime levels which makes
evaluation particularly difficult.
Because of the amount of serious crime, lesser crime goes unchecked. Many crimes
become regarded as antisocial activities.
6
contribution and effectiveness of the organization within the public. We need the whole hearted
support of each and every individual member of the site and cooperation of the users. The
administrator, along with the investigators, lawyers, counselors, and other authorities statutory
partners in our organization. Given their key role in these partnerships, we felt that an overview
of strength and Weakness of the organization is needed.
The aim of the project is to bring about improvement to the organization’s contributions;
this report necessarily concentrates on overcoming weakness and raising standards. To avoid
conducting and unfair evaluation efforts which are made to put this contribution into this context.
It believes that partnership work is highly beneficial to the organization and that partnership
work is the way forward to reduce crime and disorder.
The scrutiny was carried out through the collection of written and oral evidence.
Better communication, better leadership, better training, more defined roles in terms
of contribution to contribution to the society.
The proposed system has control over all its cells and is perfectly coordinated. Also the
cells can act individually. To take our organization to heights we need the wholehearted co-
operation of the public.
In the fast moving world, if people lack something, it is time. All are busy in their world.
It will be welcomed if services are provided at their will. So the main objective of our product is
better communication, better leadership, reducing crime and disorder etc.
The product provides a framework, which is error free. We know a crime management
system is actually a critical process having many calculations and operations. So each simple
7
error laid to big problem. So it should be error free and our objective is to build error free
software.
3. SYSTEM SPECIFICATION
MOUSE : Logitech.
RAM : 2GB
8
9
3.3 SOFTWARE SPECIFICATION
.NET is a software framework which is designed and developed by Microsoft. The first version
of the .Net framework was 1.0 which came in the year 2002. In easy words, it is a virtual
machine for compiling and executing programs written in different languages like C#, VB.Net
etc. It is used to develop Form-based applications, Web-based applications, and Web services.
There is a variety of programming languages available on the .Net platform, VB.Net
and C# being the most common ones. It is used to build applications for Windows, phone, web,
etc. It provides a lot of functionalities and also supports industry standards.
10
the .Net application can run on any Operating System including windows. Mono framework is a
third party software developed by Novell Company which is now a part of Micro Focus
Company. It is a paid framework.
11
Reference types:
Reference types store a reference to the value's memory address, and are allocated on the heap.
Reference types can be self-describing types, pointer types, or interface types. The type of a
reference type can be determined from values of self-describing types. Self-describing types are
further split into arrays and class types. The class types are user-defined classes, boxed value
types, and delegates.
Common Language Specification (CLS)
It is a sub set of CTS and it specifies a set of rules that needs to be adhered or satisfied by
all language compilers targeting CLR. It helps in cross language inheritance and cross language
debugging.
Common language specification Rules:
It describes the minimal and complete set of features to produce code that can be hosted by CLR.
It ensures that products of compilers will work properly in .NET environment.
Sample Rules:
VB.NET
VB.NET is an update to Visual Basic that targets Microsofts .NET Framework. VB.NET has a
lot of similarities to Visual Basic but also some differences. VB.NET is an object-oriented
language, which supports the abstraction, encapsulation, inheritance, and polymorphism features.
It is the most productive tool for rapidly creating a wide range of Windows, Web, Mobile, and
Office applications built on the .NET Framework.
12
The Visual Basic language is designed to be human readable and accessible to everyone from
novice programmers to advanced system architects. All of this is built on top of the .NET
Framework, which guarantees that programs written in Visual Basic run with unsurpassed
scalability and reliability. The .NET Framework provides VB.Net programmers with the ability
to create fully object oriented programs (OOPs), just like the ones created using Java, C# or C++.
Visual Studio
Many programmers says VB.Nets ease of use as the key to its success. Using VB.NET, you can
create a wide variety of applications, such as a Console Applications, that displays its output in
an MS-DOS-like window, Windows Applications that often displays a form-based interface,
Web Applications, Web Services, Mobile Applications etc. I hope this site will help you to
acquire the skills and knowledge necessary to develop various types of applications in VB.NET
in a simplified manner rather than in a complex way.
C#
C# is a general-purpose, modern and object-oriented programming language pronounced as “C
sharp”. It was developed by Microsoft led by Anders Hejlsberg and his team within the .Net
13
initiative and was approved by the European Computer Manufacturers Association (ECMA) and
International Standards Organization (ISO). C# is a lot similar to Java syntactically and is easy
for the users who have knowledge of C, C++ or Java.
A bit about .Net Framework .Net applications are multi-platform applications and framework can
be used from languages like C++, C#, Visual Basic, COBOL etc. It is designed in a manner so
that other languages can use it. Easy to start: C# is a high-level language so it is closer to other
popular programming languages like C, C++, and Java and thus becomes easy to learn for
anyone.
1. Widely used for developing Desktop and Web Application: C# is widely used for
developing web applications and Desktop applications. It is one of the most popular
languages that is used in professional desktop. If anyone wants to create Microsoft apps,
C# is their first choice.
2. Community: The larger the community the better it is as new tools and software will be
developing to make it better. C# has a large community so the developments are done to
make it exist in the system and not become extinct.
3. Game Development: C# is widely used in game development and will continue to
dominate. C# integrates with Microsoft and thus has a large target audience. The C#
features such as Automatic Garbage Collection, interfaces, object-oriented, etc. make C# a
popular game developing language.
ASP.NET
The ASP.NET application codes can be written in any of the following languages:
C#
14
Visual Basic.Net
Jscript
J#
ASP.NET is used to produce interactive, data-driven web applications over the internet. It
consists of a large number of controls such as text boxes, buttons, and labels for assembling,
configuring, and manipulating code to create HTML pages.
ASP.NET web forms extend the event-driven model of interaction to the web applications. The
browser submits a web form to the web server and the server returns a full markup page or
HTML page in response.
All client side user activities are forwarded to the server for stateful processing. The server
processes the output of the client actions and triggers the reactions.
Now, HTTP is a stateless protocol. ASP.NET framework helps in storing the information
regarding the state of the application, which consists of:
Page state
Session state
The page state is the state of the client, i.e., the content of various input fields in the web form.
The session state is the collective information obtained from various pages the user visited and
worked with, i.e., the overall session state. To clear the concept, let us take an example of a
shopping cart.
User adds items to a shopping cart. Items are selected from a page, say the items page, and the
total collected items and price are shown on a different page, say the cart page. Only HTTP
cannot keep track of all the information coming from various pages. ASP.NET session state and
server side infrastructure keeps track of the information collected globally over a session.
The ASP.NET runtime carries the page state to and from the server across page requests while
generating ASP.NET runtime codes, and incorporates the state of the server side components in
15
hidden fields. This way, the server becomes aware of the overall application state and operates
in a two-tiered connected way.
The ASP.NET component model provides various building blocks of ASP.NET pages.
Basically it is an object model, which describes:
Server side counterparts of almost all HTML elements or tags, such as <form> and
<input>.
Server controls, which help in developing complex user-interface. For example, the
Calendar control or the Gridview control.
ASP.NET is a technology, which works on the .Net framework that contains all web-related
functionalities. The .Net framework is made of an object-oriented hierarchy. An ASP.NET web
application is made of pages. When a user requests an ASP.NET page, the IIS delegates the
processing of the page to the ASP.NET runtime system.
The ASP.NET runtime transforms the .aspx page into an instance of a class, which inherits from
the base class page of the .Net framework. Therefore, each ASP.NET page is an object and all
its components i.e., the server-side controls are also objects.
16
4.SYSTEM DESIGN
4.1 SYSTEMFLOWDAIGRAM
17
4.2 DATAFLOW DIAGRAM:
LEVEL-0
18
LEVEL-1
4.2.2 Data
flow diagram LEVEL 1
LEVEL 2:
19
LEVEL 3:
20
5. SYSTEM DESCRIPTION
MODULES:
Station Module
Citizen Module
Crime Module
Search Module
Administrator Module
Avocation Module
Station module
Each of the station must first register with the Software. For the registration part each
station enter their details like station name, address, phone no, station in charge etc. and get a
User Id from the Software. Once the prospective station registers with the software they can avail
the existing records.
Citizen module
Each of the citizens, who has a complaint to register, must first register with the
Software. For the registration part each person enter their details like name, address, and phone
no., E-Mail ID etc. and get a User Id & password from the Software. Once the registration is
complete, the citizen can sign-in to the website & register their complaint.
21
Crime module
This module is used for entering all details about the crime. It contains the date and time,
police station where it is recorded, place, Nature of Crime, Location of the Crime etc.
Search module
In this module we can search the crime in station wise, nature of crime.
Administrators Module
The module will be protected by user ID and password. Ordinary users of the software
will not be permitted to enter into this area of the software. The module will be focusing on the
maintenance like Master Data Maintenance, Removal of old and outdated data from the software
etc.
Avocation Module
This Module deals with the Law part of every Crime.
22
6. SYSTEM TESTING
Testing is dynamic method for verification and validation, where the system to be tested
is actually executed and the behaviors of the system is observed. Software testing can be looked
upon as along much process of software development organizations performs that provides the
last opportunity to correct any flaws in the developed system. A system testing is a series of
different tests whose primary purpose is to fully exercise the computer based system.
Testing accounts for largest percentage of technical effort in the software development
process. Software testing must accommodate low level tests that are necessary to verify that a
small source code segment has been correctly implemented as well as high level test that validate
major system functions, against customers’ requirements. No testing is complete without
verification and validation.
Testing the system as a whole to validate the system that it meets its specification and
objectives of it users. The system must be tested as they are developed and as subsystems are
created. Testing is considered as the least creative phase of the whole cycle of system
design.System testing is the first time that the entire system can be tested against
theFunctional Requirement Specification (FRS)and/or the System Requirement Specification
(SRS).System testing is testing conducted on a complete, integrated system to evaluate
thesystem's compliance with its specified requirements.
23
The testing activity includes module by module testing which include:
Unit Testing
Integration Testing
Stress Testing
Acceptance Testing
Performance Testing
Security Testing
It is the testing done on a single subroutine or a module. A unit test is a procedure used to
validate that a particular module of source code is working properly. The idea about unit tests is
to write test cases for all functions and methods so that whenever a change causes a regression, it
can be quickly identified and fixed. In this we are detecting the edges of the image by using edge
detection technique.
Unit testing comprises the set of tests performed by an individual programmer prior to
integration of the unit into a larger system Coding & debugging (unit testing (integration testing.
A program unit is usually small enough that the programmer who developed it can test it in great
detail, and certainly in greater detail than will be possible when the unit is integrated into an
evolving software product. The method has been applied on several 2D medical image data sets
and it has successfully determined both thresholds and gradients for different tissue interfaces
even when some of the thresholds are almost impossible to locate in their histograms.
The unit testing is done with the several of the medical images present in the dataset. And
this is being marked and it is being detected.
Strategies for integrating software components into a functioning product include the
bottom-up strategy, the top down strategy and the sandwich strategy .Careful planning and
scheduling are required to ensure that modules will be available for integration into the evolving
software product when needed. The integration strategy dictates the order in which modules must
be available, and thus exerts a strong influence on the order in which modules are written,
debugged, and unit tested.
In this integration testing is processed by the giving the input of brain image and it
processed in all the modules explained and after all the process completed the output recorded is
correct or not is being verified. The figure shows the various results are being analyzed during
the segmentation process.
25
Acceptance testing involves planning and execution of functional test, Performance test,
and stress test to verify that the implemented system satisfies its requirements. Acceptance tests
are typically performed by the quality assurance and/or customer organizations. Depending on
local circumstances, the developed.Is to demonstrate the users of the system that the system is
acceptable. The system must process the data required by the user. It can be carried out before or
after the system has been installed. In this we should give the medical image only for the
analyses. If we give an image the system should not work it should properly defined.
Stress testing is a form of testing that is used to determine the stability of a given system.
It focuses on the system beyond the maximum design load. When a system is overloaded, it
should degrade gracefully rather than fails catastrophically. That is if all the edge detection
techniques are performed simultaneously ,then it will give the result without any interruption.
Performance testing is testing that is performed to determine how fast some aspect of a system
performs under a particular workload. Performance testing can be combined with stress testing,
in order to see what happens when an acceptable load is exceeded. Here the performance testing
is measured by True positive, False positive, False Negative, where the number of correctly
detected edge pixels called true positive, the number of pixels erroneously classified as edge
pixels called False Positive (FP) and the amount of edge pixels that were not classified as edge
pixels called False Negative (FN). From these measures, some statistical indices have been
proposed such asPco, Pnd, Pfa. These measures are used to compare the results.
Corrective Maintenance:
The first maintenance activity occur because it is unreasonable to assume that
software testing will uncover all latent error is a large software system during the use of any
large diagnosis and correction of one or more error is called corrective maintenance.
Adaptive Maintenance:
The second activity is that contributes to a definition of maintenances occur because
of the rapid changes that is encountered in every aspect of computing. Therefore adapting
maintenance termed as an activity that modifies software to properly interface with a changing
environment is both necessary and common place.
Perceptive Maintenance:
The third activity that may be applied to a definition of maintenances occur when a software
package is successful as the software issued recommendation for new capabilities modification
to existing functions and general enhancement are received from users, to satisfy request in this
category, perceptive maintenance is performed. This activity account for the majority of all effort
expended on the software maintenance.
Preventive Maintenance:
27
The fourth Maintenance activity occurs when software is changed to improve the future
maintainability or reliability or to provide a better basic for future enhancement of an called
preventive maintenance. This activity is characterized by reverse engineering and reengineering
technology
28
8. FUTURE ENHANCEMENT
Anything cannot be ended in a single step. It is the fact that nothing permanent in this
world. So this utility also has some future enhancements in the evergreen and booming IT
industry. Change is inevitable. The project entitled “Crime Reporting System” was successfully
designed developed and tested. The system and the architecture is a compatible one, so addition
of new modules can be done without much difficulty. Since this module has its unique
properties it can extend further to make this system a complete one.
Scope of further development
The various Future Enhancement which shall include in this software are:
We look forward to working with the Government in implementing the recommendations
and seeing an improvement in the effectiveness of the organization
The method of video conferencing can be added to make the project more lively
An intercom facility will add a little more flexible communication between the Master
and Branch In Charge, Master and Members, etc.
Notwithstanding this drive and progress, the Panel believes that more fundamental
changes are needed. It hopes that the recommendation made in this report will assist in changing
the culture around partnership.
9. CONCLUSION
29
The Software developed is found to be working efficiently and effectively. It results in
regular and timely action against crime reported. It can be observed that the information can be
obtained easily and accurately.
The Software is made user friendly to the maximum so that any lay man can run the
software provided he could access to the system via the login password.
It believes that partnership work is highly beneficial to the organization and that
partnership work is the way forward to reduce crime and disorder
Hence, we wish to remind that its culture should fully endorse partnership work; we urge
to ensure the attention they require.
30
APPENDIX
SCREEN SHOT
31
CODING:
32
BIBLIOGRAPHY
1. criminal justice information management system. (2010). Retrieved from
www.replaceportal.com: http://www.replaceportal.com/what-we-do/criminal-justice-
information-system-(crimsys).html
2. Falaye, A., Adama, N., & Agemerien, F. (2013, November). Design And Implementation
Of Crime Investigation System Using Biometric Approach(Nigeria Police Force). The
pacicific journal of science and technlogy.
3. Govardhan, N. M. (September 2010). A Comparison Between Five Models Of Software
Engineering. IJCSI International Journal of Computer Science Issues, Vol. 7, Issue
4. International council on archives. (2008). Principles and Functional Requirements for
Records in Electronic Office Environments – Module 2: Guidelines and Functional
Requirements for Electronic Records Management Systems,. 13.
5. Kawai, D., & Samson, D. (2011). Development Of A Criminals Record Management
System.Information Technology for People Centred Development, 1-8.
6. Korth, H. (2010). Database system concepts. Macgraw-Hill. Retrieved 2015
7. Kyobe, M.E; Molai, P; Salie, T. (2009). Investigating electronic record management and
compliance with regulatory requirements in south african universities. peer reviewed
article, 1-2.
8. Mubaraka, C., Jirgi, I. M., & Nanyanci, P. L. (2013). Integrating ICT in Traffic Police
Department in Uganda;Design and development of traffic case management system.
Innovative systems design and engineering, 1-11.
9. Muhammad, D., Muhammad, R., Muhammad, J., Faheemullah, & Ali, K. (n.d.).
CRIMINAL RECORDS MANAGEMENT SYSTEM.
WEBSITES:
http://www.highcourtofkerala.com/
http://www.casecitation.com/
33
34