Professional Documents
Culture Documents
June, 2012
ACKNOWLEDGMENT
This project was started with the high organized team group. We express thanks and
gratitude to our advisor Demeke Shumeye (MSC) an instructor in Wollo University for
his day to day encouraging, support and guidance in carrying out the project. We would
like to express gratitude and indebtedness to our department staff members for their
valuable advice and guidance. Without them this project would not have seen the light of
the day. In addition to this we would like to tank Kombolcha town Hasseb Ber police
station police officers, police members and workers of the station who gave any
information concerning about our project and their politeness during interviews. Finally,
we would like to thank our parents for their inspirational encouragement and moral
support throughout our study of higher institute and all the administration body of wollo
university Kombolcha campus.
ABSTRACT
Wollo Universit KIOT student clinic established in KIOT. It is a well organized clinic
and stands for serving students living with high life freedoms and security of their life as
well and For the purpose of preventing different diseases .
It works regardless of patient information recording, making treatments over different
diseases and it gives refer for patients to another clinic or hospital for additional
treatments.
The clinic is limited on manual works. This has limitation on controlling the work
securely, for declaring the result on time, and has high consumption on resources.
Manual data processing system is not fast and efficient way to accomplish tasks within
short period of time and it is boring. To overcome this problem we are proposing the new
automated system for the clinic. To alleviate the existing system problems we are using
programming tools like wamp server for interfacing and coding, MYSQLfor database
application, rational roses and Microsoft visio for designing different artifacts of the
project. Finally the overall activity of this project work is about design and
implementation of automated patient record management system for KIOT student
clinic.
Chapter one
Tables page
Table 1, Task breakdown activities and deliverables-………………………….……….4
Table 1.1 Cost estimation of materials and other expenses……………………………..10
List of charts
Chart1. Schedule of the project……………………………………………………..9
Chapter two
List of diagrams or figures
Fig 2.0 use case diagram ………………………………………………………………...21
Fig 2.1 User interface prototype for crime registration…………………………………25
Fig 2.2 User interface prototype for record crime information…………………………26
Fig 2.3 User interface prototype for generate report……………………………………26
Tables
Table 2.0 Class responsibility collaborator card for Detective team………………......25
Table 2.1 Class responsibility collaborator for Administrator…………………………25
Table 2.2 Class responsibility collaborator for information Desk……………………..26
Table 2.3 Class responsibility collaborator for crime class…………………………….26
Table 2.4 Class responsibility collaborator for Accused class………………………....26
Table 2.5 Class responsibility collaborator for Exhibit class…………………………..26
Table 2.6 Class responsibility collaborator for Witness class…………………………..27
Table 2.7 Class responsibility collaborator for Plaintiff class…………………………...27
Table 2.8 Class responsibility collaborator for Update information………………….27
Table 2.9 Class responsibility collaborator for Generate report………………………..27
Chapter three
List of diagrams or figures
Fig 3.0 Use case diagram for the system………………………………………………...30
Fig 3.1 A UML sequence diagram for Security login…………………………………...37
Fig 3.2 A UML sequence diagram for new crime registration..…………………………38
Fig 3.3 A UML sequence diagram for update crime registration ………………..……..39
Fig 3.4 A UML sequence diagram for generate registration report……..………………39
Fig 3.5 A UML sequence diagram for record crime information……………………….40
Fig 3.6 A UML sequence diagram for update crime information……………………….40
Fig 3.7 A UML sequence diagram for generate record report…………………………..41
Fig 3.8 A UML sequence diagram for generate Administration report…………………41
Fig 3.9 Conceptual class diagram for main component of the proposed system………..49
Fig 3.10 User interface prototype for login screen………………………………………42
Fig 3.11 User interface prototype for main menu screen……………………………….43
Fig 3.12 User interface prototype for Detective screen………………………………….43
Fig 3.13 User interface prototype for Information Desk screen…………………………44
Fig 3.14 User interface prototype for Administrator screen……………………………..45
Fig 3.15 User interface prototype for crime registration screen…………………………46
Fig 3.16 User interface prototype for Accused registration screen…………………….47
Fig 3.17 User interface prototype for Plaintiff registration screen………………………48
Fig 3.18 User interface prototype for Witness registration screen………………………49
Fig 3.19 User interface prototype for Exhibit registration screen……………………….49
Fig 3.20 User interface prototype for user account screen………………………………50
Fig 3.21 User interface prototype for change user account screen………………………51
Chapter four
List of Tables
Table 4, Description of crime class attributes……………………………………………59
Table 4.1, Description of Accused person class attributes………………………………59
Table 4.2 Description of Exhibit class attributes………………………………….……60
Table 4.3 Description of Witness class attributes………………………………………61
Table 4.4, Description of Plaintiff person class attribute…………………………….…62
Table 4.5Crime registration table for police crime record management system……..84
Table 4.6 Plaintiff table for police crime record management system……………….85
Table 4.7 Accused table for police crime record management system………………85
Table 4.8 Exhibit table for police crime record management system………………..86
Table 4.9 Witness table for police crime record management system……………….86
Table 4.10 Relationship table of Detective main form table for police
crime record management system ……………………………………………………87
Table 4.11 Administrator table for police crime record management system……….88
INTRODUCTION
1.1 Background
Kombolcha town found in the north western parts of Addis Ababa at 376 kilometers
from the capital city Ethiopia and 25km far apart from Dessie town. The town has early
civilization like other early towns of Ethiopia. It is the main industry center in Amhara
region and has its own administration structure to organize, control and manage the local
communities. In Kombolcha town there are governmental and non-governmental
organizations which facilitate the development of the town and provide services to the
community. From those governmental institution police stations are one part which
serves that will be peaceful security among the people and their property prevalence.
There are six police stations found in Kombolcha town .From those police stations
Kombolcha town Hasseb Ber police center is one of the police station. It was established
since 1989 E.C for the purpose of protecting local communities from criminal activities.
Hasseb Ber police center found in the Eastern part from the administration office of
Kombolcha town .Like to other governmental institutions, the police station has its own
vision and mission. Creating the country that have peaceful relationship and stable rule of
law which prevents the right of the community and freedom of their life is set as a
vision ,and By actively participating the local community, the police station should have
the duty to create strong information chain between them set as a mission of the police
station. At the first phase there were small number of police members with Commanders,
Inspectors and Constables. But recently there are 110 police members found, from those
90 of them are males and 20 of them are females with different responsibilities and
authorities. It is a well organized police station that serves crime prevention; detection
and convection of criminals depend on a highly responsive manner. But the efficiency of
the policing function and the effectiveness with which it tackles crime depend on what
quality of information it can drive from its existing record and how fast it can have access
to it is not qualified. The station has responsible for reporting and storing the nature of
the crime, the location details, the sequence of the crime information on victims.[1] The
crime record system of the station currently investigated with the problem of recording,
storing, retrieving and updating of crime information to generate reports and decision
making purpose. Currently the police station processes tasks in the form of document
based applications or traditional file systems. The current system of Hasseb Ber police
station recording personal information of crimes on traditional document formats has
been depicted at the back of the page.
On the other hand processing of the crime record can be automated by Hasseb Ber crime
record management system, which is newly implemented. The proposed system can be
taken as to automate processing tasks with less efforts and resources (like ,reducing
accessing times and material requirements ).
1
1.2 Statement of the problem
The police station applies manual way of recording crimes and processing of tasks. Due
to this reason the existing manual processing has the following problems.
It takes much efforts and time to retrieve crime information
Difficulty of updating information timely in each departments of the office
File control mechanism is very tedious, Complicated and not secured.
High material resource wastage (written materials) and much cost is expanded for
handling records.
Difficulty in conducting consistent reports.
The same detail of crime information is recorded in multiple places (documents),
this indicates redundancy.
Thus to address those problems there is a need of developing automated crime record
management system of Kombolcha town Hasseb Ber police station. Thus,will
Reducing time and effort in the case of retrieving information
Changes traditional data processing and handling mechanism into desktop
application and database system respectively.
Reduce file duplications, such that the system user deletes the information which
is dead files.
1.3 Objectives of the Project
The general and specific objectives of the project are described bellow.
1.3.1 General objective
The general objective of this project is to develop automated crime record management
system of Kombolcha town Hasseb Ber police station.
1.3.2 Specific Objectives
To achieve the general objectives of the project, the proposed system consists of the
following specific objectives:
Collect data, analyze the system requirements and identify problems of the
existing system
Design the artifacts of the proposed system for the overall view of the structure
Implementing the system
Finally testing the system
1.4 Feasibility study
Feasibility study is used to investigate the proposed system in multiple dimensions. It
used to indicate whether the system feasible or not. The proposed system can be seen
according to the following literals.
1.4.1 Operational feasibility
The new system can be easily operated and accessed by the users who interact to the
system. It contains user friendly commands which leads users interact to the system
interfaces.
2
1.4.2 Technical feasibility
It is the process of accessing the developed system by the organization. Technical
feasibility is the measure of practicality of the specific technical solution and the
availability of technical resources and expertise. The proposed system can be easly
maintained and repaired without requiring high Experts or technical assistants, because
the system was developed by familiar programming language (environment).
1.4.3 Economical feasibility
Economic feasibility is the process of identifying the financial benefits and costs
associated with the project being developed.
1.4.3.1 Tangible Benefits
The systems provided tangible benefit like increasing employee’s interest in their work
which had a great role for the development of the database of Wollo univerisiy kiot
student clinic patient recored mgt system minimizes the work load of the employee.
1.4.3.2 Intangible Benefits
The intangible benefits we have pointed out the system development are the following:-
Easily access patient information throughout the clinic.
Increased flexibility
Increase speed of activity
Improves the confidence of the system users.
3
1.5 Project plan Activities
4
Avoid document missing and material wastage
Avoid tiredness to separate the dead file from the no dead files.
It ensures fast & efficient sharing of critical information within the police station.
5
Time line for final year project allocated
1.8 Methodologies
In developing Hasseb Ber police crime record system, the following development
methodologies and tools will be applied.
A) Interview: - was used to gather required data for the project by contacting different
employees of the organization.
B) Observation:-was used to gather additional data by observing the actual work being
done by the staff and consolidated with what was obtained through Interview.
C) Document Analysis (Document & literature review):- consulted and analyzed written
materials that describe the operations conducted in the station to further strengthen and
support the information that applied the above technique
1.8.3 System Analysis and Design Methodologies
System Analysis: is the process of breakdown an entire system into module,
analyzing each module separately, and determining the relationship between them. In
system development process we use system modeling i.e. creating model of the system.
System modeling is the process of creating a model of system by analyzing and
organizing the system elements. This is the phase where deeply understanding of the
existing system problems and finding alternative solution.
System design: - to design the system the project team has choose Object
Oriented Modeling techniques and Unified modeling language tools.
Reason of choosing:
It enables us to comprehensively model a system before we develop
it
6
Modification of the object implementation is easy because objects
are loosely coupled.
Understanding of the structure is easy because object oriented
modeling and tools used to represent real world entities.
Direct manipulation of architectural components is possible because
several object oriented programming languages exist.
1.8.4 System development and implementation tools
For the successful completion of Hasseb Ber police crime record system different tools
and techniques would be put for different purposes & tasks .This includes:
Microsoft-Access:-for database purpose (back-end).since, Microsoft Access
is the most widely used desktop database system in the world, this helps
system users easily interaction. Microsoft Access is part of Microsoft Office
so there is a common interface and lots of developers and support options
available. For building desktop database systems our team members choose
Microsoft Access forms, reports, queries. This supports our proposed system
development based on desktop and will be standalone system. Microsoft
Access 2007 is free database software during runtime but MY-SQL is not.[2]
Microsoft Access is significantly less expensive than either SQL Server or
Oracle. Typical development times for custom databases using a qualified
consultant of Access are essential during system change when the system
requires Rapid application development. Doing development of the system
using tools such as .net or building an automated or a web-based system with
access is so simple and easily intractable. Third party support for Microsoft
Access databases is very common, example: interfaces to external databases. If
you need a database that serves your needs and Microsoft Access is a viable option,
it is probably the fastest and least expensive way to get your goals
accomplished. [3]
7
VB.NET provides several server controls that simplify the task of creating pages.
These server controls encapsulate common tasks that range from displaying calendars
and tables to validating user input. They automatically maintain their selection states and
expose properties, methods, and events for server-side code, thereby providing a clean
programming model. In addition VB.NET, have a good user interface for designing and
implementing different form applications to the User. It have many user interactive
commands that helps users to operate in simple way and use it.VB.NET also provides a
true language-neutral execution framework for automated and it supports multiple Back-
End tools (like MS- SQL, MS-Access). [5]
8
1.9 Schedule
Nov 2011 Dec 2011 Jan 2012 Feb 2012 Mar 2012 Apr 2012 May 2012 Jun 2012
ID Task Name Start Finish Duration
11/20 11/27 12/4 12/11 12/18 12/25 1/1 1/8 1/15 1/22 1/29 2/5 2/12 2/19 2/26 3/4 3/11 3/18 3/25 4/1 4/8 4/15 4/22 4/29 5/6 5/13 5/20 5/27 6/3
1.10 Budget
9
Chapter Two
Business Area Analysis
In this chapter overview of the existing system, overview of the proposed system
functional and non functional requirement of the system will be discussed and modeled
using unified modeling language(UML) models.
The proposed system documentation involves the requirement elicitation, where the
team members gather requirements of the system from user, analysis of the requirement
that focuses on the functional, object and dynamic modeling (state diagram), system
design, object design and testing of the system. The project is intended to advocate for
the need of Kombolcha Town police station to use facilitated computerized police-crime
record management system. The project has got high involvement of users because the
approach employed is object oriented paradigm, which a user based software
development activity. As a result the team member believed that the user will have the
expected satisfaction of the service provided by the police station. Therefore, the team
member recommends Kombolcha Town Hasseb Ber police station migrate the manual
system to the computerized crime record management system to facilitate their service
and benefit of the station.
2.1 General description of the Existing System
The main purpose of studying the existing system is to develop a new system which
efficiently performs activities than current one and understanding existing problems. To
solve problems document analysis, form designs, some constraints and rules of the
existing system incorporated.
In general the reason behind for studied the existing system:
To identify the existing system problems.
To identify the scope and limitation of the new system.
To know the business rules and constraints of the department
To design the new proposed system based on the boundary or the total
activity of the existing system of the department.
To determine the system user requirement.
To understand the internal organizational policies, influences &
inclination of key police experts in different subjective, critical incidents
in the organizations history, informal organizational structure.
10
To understand organizations strategies & facts, short & long term
strategies, business values & missions.
To understand how work officially gets done in the organization this
include identifying:-
Terminologies, abbreviations, and acronyms used
Policies& guidelines that describe the nature of the business
Standards, procedural manuals and the work environment.
It operates the sample business forms and reports
Job descriptions.
Major players of the Existing system
The major players of the current system are:
Detective managers
Administrator
Information Desk
Personal clerks
Police members
Role of Detective managers
The main role of Detective managers in Hasseb Ber police station is:
Recording daily information about crimes
Updating crimes’ information
Generating reports
Delivering reports
Role of Administrator:
The following activities are performed under the Administrator of Hasseb Ber police
station crime manual recording system.
Maintain crime information
Administrating the station
Collecting daily, monthly and manual repots from different
departments
Producing organizational reports
11
Role of Information Desk teams
Daily Recording and accessing of crime information’s
Communicating individuals who has an issue to different office
managers and give directions about the Administration
hierarchies to whom they complained.
Generating reports and distributing to the Administrator body
Role of polices
Controlling criminal activities.
Arresting crimes.
Accepting legal complaints of individuals and directing to
Detective managers.
Resolving conflicts between individuals with legal punishment
and arbitrate them.
Searching criminals depending on evidences.
Finding evidences for searched criminals.
In the current system of Kombolcha town Hasseb Ber police station crime record
system the following major activities are performed manually:
Daily recording of crimes’ information
Manual preparation of documents
Controlling of criminal activities
Detecting of crimes and preventing illegal actions
Preparation of manual way of crime reports
Arresting of crimes who did wrong things
12
Accepting of formal complaints about individual whose personal
rights are violated
Serving peoples with legal judgments and negotiating each other
Solving conflicts with traditional conflict resolution mechanism
like by using arbitration
Maintain crime documents or files for current and future use
Making decisions based on the information and passed
judgments
Input
Crime register
Process
Get manual form which provide to handle crime data
There should be suffered person(accuser) who victimized by the
accident and his/her legal complaint towards the station
Get crime data from police departments with legal evidence
Register crime data
Output
Crime registered
Produce crime report
Make decision or judgment
Stored in a manual document as a file
Input
Criminal record(accused)
Process
Get criminal data to start process
See legal evidence that criminal person does did or didn’t made a
crime
Record criminal
Output
Criminal recorded
Criminal reported
Input
Produce report
Process
Check crime data in manual crime documents
Check the date, month and year information that crime file was recorded
and stored
Select information which needed for current report
13
Print and distribute report
Output
Report produced
Put report document as a hard copy
Business rule
Business rule are the guidelines that an organization and stakeholders follow to
perform their tasks to be assigned. Every organization should have business rules and
formal procedures to manage and control organization resources properly. The following
business rules are investigated within Kombolcha Town Hasseb Ber police station.
Any individuals who suffered by the victim has the right to forward formal
complaint towards the station depending on full evidence.
Any customer who enters to the station should have an identity card.
Customers should not hold materials like gun, stick, knife etc which is not
allowed by the station.
No one moves without the allowed destination when he/she is arrested who
suspected as a criminal, and stay within the allowed room until he/she gets
legal judgments from the court.
An individual who is arrested by the police and stay in prison should have
legal rights and not be torched as well.
Any person who did a crime and arrested under the law should get legal
judgment within 48 hours.
If the arrested person does not do the crime he/she who were previously
suspected by the law, has the rights to release after all evidences are
investigated with legal protection.
Any employees within the station should not post any notice on the board
without the legal seal of the department offices.
No one enters to the station for any case without getting legal permissions from police
guards etc. [8]
14
Manual processing such as storing, retrieving of data and information, the current
system has the following problems:
Performance problem
The current system unable to perform tasks and activities with efficient and required time
.It is tedious and not fast, accurate communication among each departments.
Information Problem
-Lose of data may occur.
-Due to manually collecting of data there is a redundant record and inconsistency
problems.
15
After analyzing the problems in the existing system, our project team identified and
evaluated the following alternative solutions:
Advantage:
Disadvantage:
Have some features that will not be used and happened frequently such as
demotion, termination, manual tasks.
Requires technical person to handle and manage the system.
It does not address all the basic problems of the station rather focus on the
station sub department that means the new system implemented only for
crime information processing
The proposed new system based on the option analysis described above, we
select the first option that is developing an applications to be used by the
station sub department staff’s and crime record of the station with the stand
alone system.
16
and database control mechanisms. The system addresses problems which were
incorporated in the existing system.
2.3 Requirement description
A requirement is a feature that the system must have or a constraint that it must satisfy
to be accepted by the station. [9] This stage determines the needs of everyone who will be
the user of the proposed in this system.
Importance of requirement phase is:
Different users have different expectations forms system requirement
specification document
Users, customers
Software developers, Testers, User manual writers
Management(developer side)
Poor requirement definition leads to several problems.
Frequent “change” to requirement
More customer/developer disputes ,like communication problems
More iteration due to improper documentation
Fault decision making and incorrect results
Generally the requirement of the new system can be viewed as:
Functional and
Non functional requirements
2.3.1 Functional requirements
The Functional requirement is concerned with actual performance of the system that is
going to be developed. [10] Functional requirements describe the functionality or service
provided by the new system:
Recording of crimes to the database was the main process for the system.
Reduce redundancy, inconsistency and integrity problem of data and information
maintaining detail of crimes data usual error like record duplication will be
prevented by the proposed system
The high effort that is required in maintaining the file controlling section is made
Easy, because the system is easily maintained and not complicated
17
The system is capable of reducing the time that spent the existing crime record
management in practice.
The tedious process that is observed in transferring crime’s records manually be
avoided by the system
Validates data entry for correctness.
Updates itself when it gets new data.
Provision for query analysis.
Presence of centralized database and organized records.
Facilitate timely management decision making because the system should not take
much time to retrieve crime information.
The system allows enabling to make report
2.3.2 Essential Use case modeling
Essential use cases
Essential use cases are of primary importance early in a project’s analysis phase. Their
purpose is to document the business process that the Application must support without
bias to technology and implementation. The narrative in the Essential use case is to be
expressed in the language of the application domain and of users. Essential Use cases
should achieve the following goals:
− Serve as an effective communication tool between users and technologists.
− Be scoped to a specific business goal as well as identify and document the business
logic and actions.
− Is diagrammed using the standards documents.
− Be documented in text format using the standard "Essential Use case Specification
Template".
Essential use case modeling is a simplified abstract, generalized use case that captures
the intentions of the user in a technology and implementation independent manner. [11] It
identifiers use case and actors of the existing system.
18
Crime Re gister
Detective Administrator
Information Desk
Generate report
19
Actor: Information desk
Precondition: Information desk should have crime information.
Post condition: crime information recorded successfully
Basic course of Action:
1. Information desk wants to record crime information.
2. The Information Desk should have crime form for record the data.
3. Information Desk filled the information on the form
5. Check filled data and its correctness
4. Store the data to the related record
6. Use case ends.
Alternative course of Action: for invalid data entry.
A.1 Information Desk should display the form and record again.
A.2 Delete the recorded data from the table which is not correct
A.3 At each step information Desk should do step 5 of the above basic course of action
Detective report generation
Name: Generate report
Identifier: UC03
Actors: Detective
Precondition: the Detective should have stored crime record there.
Post condition: generate report.
Basic course of action:
1. Detective wants to generate crime reports.
2. Detective search the file from the data base what he/she want for report
3. Select crimes information/report which can be generated for the purpose of decision
making
4. Detective produce report
5. Check reports before going on to decision making
6. Use case end
Generate report Information Desk
Name: Generate report
Actor: Information desk.
20
Precondition: There should be crime’s data in the database.
Post condition: Administrator generates report.
Basic course of action:
1. Information desk wants to generate report.
2. The system displays report form
3. Information desk click on search to generate report
4. Available information generated.
5. Check and view report
6. Use case end
Generate report Administrator
Name: Generate Administration report
Actor: Administrator
Precondition: There should be crime’s data in the database.
Post condition: Administrator generates report.
Basic course of action:
1. Administrator wants to generate report.
2. The system displays report form
3. Administrator collects report from Detective and Information Desk
4. Check and view report.
5. Use case end
User interface
It describes how the new system interacts with the user:-
21
Hardware Interface
The hardware interface for the system will be standard keyboard, mouse, and monitor.
Terminal control will be a screen –oriented. The system will also require a printer which
has a good printing rate. All the systems running HBPCRS should have mechanisms to
over come power failures.
Software Interfaces
The System on which HBPCRS for running should have the following components
Authentication
This function is to identify the user to the system so that all the access level and
privileges are detrained
Administrator
Responsible for maintaining database and also preparing organizational reports
Major duty is to give reports for what ever criteria specified by the user
Search
The function is to retrieve the required information base on the constraints specified
by the user
Managing data base
This function is to create, update, retrieve and delete record from the database
2.3.3 Essential user interface prototype
22
Which describe the user interface requirements for the new system users with
technological alternatives. The following user interface prototype shows Hasseb Ber
police station crime record system in some part, but they are modified more in system use
case interface prototypes.
Crime registration
Crime form Crime Address
Input field: new crime Input field include: crime
registration location, region, Zone, woreda
Crime information
Input field include: crime Button: submit Button: clear
type, crime date, crime Id Action click: the data Action click: clear
added to the database the filled data from
the form
Button: search
Action click: search crime Button: exit
data from the table Action click: exit
crime form
Button: exit
Action click: end task
23
Fig 2.2 user interface prototype for record crime information
Report
Input field include: crime data (crime
Type, crimeID, Crimedate, Crime
address)
The subsequent facts are the general characteristics of the intended users:-
No prior experience/expertise required because the system has user friendly
commands
The medium of language for communication is English for operating the
system
The user need to understand the information so easily better UI and simple
English
Assumptions and dependencies
This section must include any assumptions if not true, would require changes to the
requirements
The system depends on the software components and operating systems
which are needed for its development.
The hardware used to interact with the PCRMS will be standard keyboard as
required
24
The users know how to start the program from the GUI, and can interact with
a user interface using a standard keyboard, mouse, and monitor.
2.3.4 Domain modeling with class Responsibility Collaborator
(CRC) card
A Class Responsibility Collaborator (CRC) model is a collection of standard index
Cards that have been divided into three sections, this is class name, responsibility and
collaborator. A class represents a collection of similar objects, a responsibility is
something that a class knows or does, and a collaborator is another class that a class
interacts with to fulfill its responsibilities. [12] Those can be shown in the following
table.
Class name
Responsibility Collaborator
Detective manager<<Actor>>
Register crimes Accused
Update crime information Witness
Record exhibit information Plaintiff
Hold information about the person who sees criminal
action happened(Witness’s information)
Document information about Defendant
person(plaintiff’s information)
Change account
Generate crime report
Administrator<<Actor>>
Maintain crime information Detective department
Update database Information Desk
Collect report department
Change account
Generate admin report
Information Desk<<Actor>>
25
Record crime information Detective departments
Update information Crime registration documents
Produce report
Crime
Crime date Plaintiff person
Crime ID Accused person
Name
Sex
Age
Address
Religion
Region
Zone
Woreda
Kebele
Crime registration<<UI>>
Information recorded about crimes crime
Get evidence about the crime for recoding
fill personal information about crime
Add information into database
Accused <<UI>>
investigate evidence information Detective
accept Accused person information
Exhibit
Exhibit ID Crime
Item name
Item ID
Amount
Exhibit information<<UI>>
See exhibit information Detective
Accept exhibit information
26
Witness
Witness ID Crime
Name Accused
Plaintiff
Sex
Age
Nationality
Region
Zone
Kebele
Woreda
Witness person<<UI>>
See crime evidence information Detective
Accept Witness information
Plaintiff person<<UI>>
See all information about the plaintiff Crime
Accept plaintiff personal information
Table 2.7 Class responsibility collaborator card for plaintiff class
Update information
New information crime
Change information
Update <<UI>>
Search related information for updating Crime(Historical information of crimes)
New information stored
Table 2.8 Class responsibility collaborator card for update information
Generate report
**select prototype** Crime(Crimes’ information)
Select report type and related records
Display report
27
Table 2.9 Class responsibility collaborator card for generate report
28
The system will protect the data against unauthorized disclosure of
information.
The system shall authorize the users to produce ad-hoc quires and
report
Chapter Three
29
3.1.1 System Use case model for the new system
During analysis, the main goal is to involve essential use cases into System use
cases. In system use case, we include high-level Implementation decisions. For example,
a system use case refers to specific user interface-components such as screens, or reports.
System use case model is composed of a use case diagram and the accompanying
documentation describing the use cases, actors, and associations. Which a collection of
use cases, actor, their associations a system boundary box (optional), and packages
(optional). A use case describes a sequence of actions that provide a measurable value to
an actor and is drawn as stick figures. [15]
Use case diagrams graphically depict system behavior (use cases). These diagrams
present a high level view of how the system is used as viewed from an outside’s (actor’s)
perspective. From the identified use cases and actors the use case diagram of the system
is shown in Fig 3.1
30
Fig3. Use case diagram for the system
31
Use case 05: Record crime information
Use case 06: Update record information
Use case 07: Generate record report
Use case 08: Generate Administration report
Security login
Name: security login
Identifier: UC 01
Description: allow user to login into HBPCRS.
Actor: Administrator of the police station
Precondition: An Administrator should have valid user name and password.
Post condition: The Administrator will login in to HBPCRS.
Extends: _____________
Include: UC 02, UC 03 UC 04, UC 05, UC 06, UC 07, and UC 08.
Basic course of action:
1. Detective/information Desk/Admin want to login into crime record
System.
2. The system will display user interface (security login UI01) and window request to
enter.
3. The Detective/information Desk/Admin enter password and user name via “UI01” &
submit the form.
4. The system checks validation of user name and password according to the” BR1”.
5. Detective/information Desk/Admin login into the system.
6. Use case end.
Alternative course Actions: inputted user name and password not valid.
A.1 The system verifies user name and password are not valid.
A.2 The system will continue at step 3 of the above basic course of action.
New crime registration
Name: New crime registration.
Identifier: UC02
Description: allow Detective to register new crime.
32
Actor: Detective
Precondition: Detective manager should be login in to the system first.
Post condition: The crime will be registered.
Extends: -------------
Include: UC01.
Basic course of action:
1. Detective wants to register new crime
2. The system will display “UI02 register new crime”.
3. Detective enters all required information for registration via “UI02 register new crime”
before starting register new crimes.
4. The Detective submits the information.
5. The system validates the crime information.
6 the system displays that the crime is successfully registered.
7. Use case ends.
Alternative course of Action: invalid data entry
A.1 The system displays an error message to the user.
A.2 The system indicates to retry.
A.3 Use case continues at step 3 and step 6 of the above basic course of action.
33
Include: UC01
Basic course of Action
1. The Detective logs to his account from the home page of the HBPCRS
2. The Detective clicks on the Search crime button
3. The System displays search options (crime type, crime ID)
4. The Detective search using one search method
5. The system displays the searched result
6. The Detective clicks on the update button to modify the record
7. Use case end
Alternative course of Action: If the data there is a mistake in the data entry
A.1 The system displays error message and allow making correction
Generate crime registration report
Name: generate crime registration report.
Identifier: UC04
Description: allow Detective to generate crime registration report to an
Administrator.
Actor: Detective
Precondition: Detective should get data from HBPCRS
Post condition: The system generates the crime registration via Detective to
administrator.
Extends: ________
Include UC01
Basic course of action:
1 Detective wants generate crime registration an administrator.
2. The system display user interface UI04 “crime registration “.
3. Detective will enter all required information about the crime registration.
4. The system Validate for the availability of the information entered.
5. The system will display crime registration via “UI08 generate crime registration”.
6. Detective make crime registration letter to be printed.
7. Use case ends.
Alternative course A: input information is not valid.
A.1The system determines that the information is not available.
A.2 The system displays crime registration with the previous information
34
A.3 Use case continues at step 3 of the basic course of action.
Record crime information
Name: record crime information
Identifier: UC05
Description: The system allows Information desk to record crime information
Actor: Information desk
Precondition: Information desk should have valid user name and password to enter to
the system.
Post condition: record crime information
Extends: ___________
Include: UC01
Basic course of Action:
1. Information desk wants to record crime information.
2. The system displays the record form via“UI05 crime information record”.
3. Information desk enters the required information via “UI05 crime information record”
4. Information desk submits the recorded information.
5 the system display that crime record is successfully stored.
6. Use case ends.
Alternative course of Action: system display that the entered information is invalid.
A.1 The system determines that the information is invalid.
A.2 Use case continues at step 3 of the basic course of action.
35
Include: UC01
Basic course of action:
1.The Information desk logs to his account from the home page of the
HBPCRS
2. The Information desk clicks on the Search crime button
3. The System displays search options (crime type, crime ID)
4. The Information desk search using one search method
5. The system displays the searched result
6. The Information desk clicks on the update button to modify the record
7. Use case end
Alternative course of Action: If the data there is a mistake in the data entry
A.1 The system displays error message and allow making correction
Generate record information report
Name: generate record information report.
Identifier: UC07
Description: allow Information desk to generate crime information report to an
Administrator.
Actor: Information desk.
Precondition: Information desk should take data from HBPCRS
Post condition: The system generates the crime information via Information desk
to the administrator.
Extends: ________
Include UC01
Basic course of action:
1 Information desk wants generate crime record information an administrator.
2. The system display user interface UI07 “crime record information “.
3. Information desk will enter all required information about the crime record
information.
4. The system Validate for the availability of the information entered.
5. The system will display crime registration via “UI08 generate crime registration”.
6. Detective make crime registration letter to be printed.
7. Use case ends.
36
Alternative course A: input information is not valid.
A.1The system determines that the information is not available.
A.2 The system displays crime registration with the previous information
A.3 Use case continues at step 3 of the basic course of action
Generate Administration report
Name: Generate Administration report
Identifier: UC08
Description: allow Administrator to generate report in different form.
Actor: Administrator.
Precondition: There should be crime’s data in the database.
Post condition: Administrator generates report.
Extends: ________
Include: UC1
Basic course of action:
1. Administrator wants to generate report.
2. The system displays user interface “UI08 generate report form”.
3. Administrator collects types of report to be generated via “UI8 generate report”.
4. Administrator checks and views the selected report.
5. Use case ends.
Alternative course of action A: No files to be reported for the selected data type.
A.1 The system displays an error message to the Administrator via the report form.
A.2 Use case continues at step 4 of the basic course of action.
3.2 Sequence diagram
Sequence diagram is used to show the sequence of actions, interaction of an object with
the Actor’s and time frames of the system. [16]
37
Sequence diagram for security login
38
Register new crime
basic course of Detective Main menu Register new crime HBPCRS
action <<Actor>> <<Controller>> <<UI>> <<DB>>
SD#UC02 Detective want
to register new
crime Call to display
1,Detective wants register new Create
crime.
2, the system will display "UC02 Registration form will be displayed
registre crime".
3,Detective enters the crime Fill crime information
information to the system.
4,After fill the required information, Click on submit
submit information.
5, The system validate information. Conform action/check
6,The inputted information is
correct Yes Validate inputted data
7,Crime successfully registerd
invalid
8,Use Case end.
Enter correct information again
Register crime
Fig1. 3.2 ,A UML for sequence diagram for new crime registration
Sequence diagram for update crime registration
update crime
registration basic
Detective Main menu Update crime registration HBPCRS
course of action
<<Actor>> <<Controller>> <<UI>> <<DB>>
SD#UC03
valid
update successfully
Fig3. 3.3 , A UML for sequence diagram for update crime registration
Sequence diagram for Generate crime report
39
Generate
registaration report Detective Main menu Generate registration report HBPCRS
basic course of action <<Actor>> <<Controller>> <<UI>> <<DB>>
SD#UC04
Fig 3.4, UML for sequence diagram for generate registration report
Sequence diagram for Record crime information
Record crime
information basic Informartion Desk Main menu Record crime information
course of action <<UI>> HBPCRS
<<Actor>> <<Controller>>
SD#UC05 <<DB>>
wants to register crime information
call to display
create
form displayed
1,Information desk w ants to
register crime information.
2,The system calls the form via
"UC05 record crime information. " select information to be recorded
3,The form will be dislayed.
4,Information desk should select record crime information
the information to be recorded.
5,The system validate information. click on submit
6,The system displays the
information is valid validate information
7,Crime information successfully
registerd.
8,Use Case end. valid
40
Update record
information basic Informartion Desk Main menu Update record information HBPCRS
course of action <<Actor>> <<Controller>> <<UI>> <<DB>>
SD#UC06
wants to update record information
call to display
1,Information desk wants to update create
record information. form will displayed
2,The system calls the form via
"UC06 record crime information. "
select information to be updated
3,The form will be dislayed.
4,Information desk should select
the information to be updated. click on update
5,The system validate information.
6,The system displays the
information is valid conformation
7, information successfully
updated. yes validate data
8,Use Case end.
valid
successfully updated
Generate Record
report basic course of Information de sk Main menu Generate record report HBPCRS
action <<Actor>> <<Controller>> <<UI>> <<DB>>
SD#UC07
wants to generate administartion report
1,Information desk wants to generate call to display create
record report.
2,The system calls the form via form will displa yed
"UC07generate administration report."
3,The form will be dislayed. select information to be generated
4,Infformation desk should select the check availablity
information to be generated.
5,The system checks information available
availablity in database.
6,The system displays the information is
available. report generated
7, report is generated successfully.
8,view report.
9,Use Case end. view report
41
Sequence diagram for generate administration report
Generate administration
report basic course of Administrator Main menu Generate administartion report HBPCRS
action <<Actor>> <<Controller>> <<UI>> <<DB>>
SD#UC08
wants to generate administartion report
1,Administrator wants to generate call to display create
administration report.
2,The system calls the form via form will displayed
"UC08generate administration report."
3,The form w ill be dislayed. select information to be generated
4,Admin should select the information to check availablity
be generated.
5,The system checks information
availablity in database. available
6,The system displays the information is report generated
available.
7, report is generated successfully.
view report
8,view report.
9,Use Case end.
42
Crime Accused
Data ID
Name 1...* made 1 Name
ID Sex
Location Age
Region Accusing Date
Zone Exhibit Wanted date
item used Arrested date
Woreda Exhibit ID
Recorded date Item type Charging date
0..* uses 1
Item name Education level
Amount exhibited Nationality
1 Religion
sees
Is involved()
1..*
accuses
Witness
victimized 1 1
Name
Plaintiff
Sex
Age Name
Religion Sex
Nationality Age
Region Plaintiff Date
Zone present Religion
Woreda Job
Kebele Zone
Woreda
Fig 3.9, Conceptual class diagram for main components of the proposed system
3.4 User interface prototyping for the new system
User interface is an iterative analysis technique in which user is actively involved in
the making up of the user interface for the system .it is an analysis that enables us to
explore the problem space of the system, at least from the point of view of its users, and
provides vehicle for us to communicate the possible user interface design of the system
Login screen
User information and Button
User name
Input field include: user Password
name Input field include: password
43
Fig 3.10 user interface prototype for login screen
Button: Back
Button: Select Button: close
Action click: used to
Used to choose Action click: used to close
return department select.
department type the main page.
Detective screen
Crime menu Listed menus and Buttons
Account menu
Accused menu
44
Fig 3.12 user interface prototype for Detective screen
Administrator screen
45
Crime screen
Button: load
Action click: used to Button: exit
load data in to grid and Action click: used to close
view with form. the form and end of tasks
46
Accused screen
Accused screen
accaaaaa Accused person information and Buttons
Button: exit
Button: submit
Button: back Action click: used
Action click: used to send and
Action click: directs to to close the form
validate filled data
Detective screen
47
Plaintiff screen
48
Witness screen
Witness personal information and Buttons
49
Exhibit screen
Button: update
Button: submit Button: search Action click: used to update
Action click: send Action click: used to Exhibit information from
and validate filled search Exhibit data. recorded data.
data
Button: back
Fig 3.19click:
Action user interface Button:
directs prototype for Exhibitload
registration screen Button: exit
to detective screen Action click: used Action click:
to load data in to close the form.
grid and view with
form.
50
User account screen
Account information
Fig 3.21 user interface prototype for change user account screen
51
3.5 Supplementary specification
3.5.1 Business rules of the new system
Users must have a valid user name and password to open the system.
The system validates user name and password and display the message for error entry
to the user.
The authorized user registers the crime’s information and the system
validates it.
The authorized searches the information from the data base table by using first
The system user enters previous password and account name to set the new
The system accepts the new account name and set values to account database.
52
Do not delete all information from database
System users select information from the related table want to be generated
The system accepts the valid users’ data and allows for generating reports
3.5.2 Constraints
As the customer has suggested for the new project development, they requires
building it up right from the scratch. The implementation language must be window
compatible as requested by the customer and we are requested to develop simple
application system which handles special task processing than the manual system.
The project is not to be outsourced. The feasibility study depicts that the design
analysis has to be so intensive to ensure reliability and quick response.
The information desk should be allowed to insert, delete, update and
search information in its data.
Administrator should access to all facilitates PCRMS provides and
direct access to the database.
Detective team Generate report and to control work flow the detective
team should have access the data base and they will allowed to modify,
delete, insertion of records.
3.5.3 Change cases
Change cases used to describe the potential requirements of our system. They are
developed during requirement gathering and also during analysis as well as design
phases. It enables us to document requirement and our system may need to full fill future
changes. So that every changes based on technological trends can be supported by our
proposed system of Hasseb Ber police station crime record management. Our proposed
system developed based on the standard that enables to handle future trends; because the
development tool that used to achieve our objectives was visual studio 2008 which is the
most commonly used language in many software product companies today. At the time
we are developing an automated system which mainly accompanied on crime
registration, so that in the future the new system developed based on this domain whether
Web based or Networked.
The following issues can be handled by our system in future changes:
Registration of crimes will be applied for any implication of technological trends
Changing the system from automated to web based on technological variations
The system does not do under the following conditions:
53
System failure happened during run time
Some parts of code procedures distorted
Chapter four
System design/using object oriented modeling
4.1 Introduction
The purpose of design is to determine how the system is going to build and to
obtain the information needed to drive the actual implementation of the system. It focuses
on understanding the model how the software will be built. System design is the detail
investigation of system elements from logical view.
4.2 Class type Architecture
It is the concept of organizing software design in to layer/collection of classes or
components that satisfy the common purpose such as implementing the user
interface or business logic of the system.
These layers are: User interface layer, controller/process layer, business/domain layer,
and persistence layer.
User interfaces
M
A
I
N
Application class/process S
Y
S
T
E
M
Business class/domain rules (Platforms)
Persistence data
Database/sources
(Historical data)
54
Chart 4, class type architecture for hasseb ber police crime record system
B, Application class
Within the process layer, we define the process steps, the sequence in which they are
executed, the roles that execute them, and how the context data of a process is passed
between the process steps. A process is designed using Guided Procedures (GP). GP is a
framework for composing user-centric process flows. It offers the means to bond diverse
back-end applications and services into a single business workflow. It provides role-
based access to resources and guidance through the workflows at runtime, thus, helping
end users to identify and complete their tasks easily.
C, Domain layer (Business class)
This is about business layer such as Crime registration, Exhibit registration, Witness
person registration, Accused person registration and Plaintiff person registration.
D, persistent layer
This summarizes the ability to update, retrieve, and deleting records from database, kept.
E, Database layer
This is the layer that provides for correct information repository. Valid data stores in the
database for decisions and historical information references.
55
F, System layer (platforms)
This refers an operating system environment that used for run time application, example
Window-XP is the most preferable operating system during system testing and client
computers for desktop applications.
4.3 Design Goals
The design goals represent the desired qualities of the system and provide a consistent
set of criteria that must be considered when making design decisions. Based on the
nonfunctional requirements and the information elicited from the users, the following
design goals are identified.
Inter Operability
From the instance of functional and non functional requirements the proposed system
of Hasseb Ber crime record system have good user friendly interface that provides to the
system user of the station easily interact and task operated.
Availability
The system should available for any valid users of the station as long as the service
provider is available unless it is shutdown by the administrator.
Expandability
If someone wants to modify and dynamically developing the new system based on the
standard of our system , the detail design of the developed system leads to the desire
situation what will be added for the future.
Security
The purpose of developing computerized system of Hasseb Ber police crime record
system was to handle personal information of crimes with a great care through the
station. In order to achieve this security measure the following alternatives are taken as a
solution.
Authentication: No one access the data rather than the authorized
person of the station. The system does not accessed by unauthorized
user, because the new system has a grant privilege for authorization and
authentication with user accounts. Due to this reason we choose to set
alternatives for system users to have their own user name and password
to access and process the data of crimes.
Database security: Security feature of Access server to ban the database
from an unauthorized access will be implemented. Authorized users
through the system should only access the database. In order to handle
this, we have to do each system users have their own user account to
56
operate the system database via the system Administrator who controls
the whole system functions.
In design, we model classes to represent the static structure of how the system will
be built. Class model in design is that focus on the solution domain. We have made
necessary modification that will cover the way toward the implementation of our system.
57
<<include>> <<UI>>
<<UI>> <<UI>>
Main page
Security login commit Accused
-ID : int
has -Name : str
has 1 -Date : int
1 1 -Wanted date : int
<<UI>> <<UI>> -Arrested date : int
1 Detective
Account -Charging date : int
<<UI>> <<UI>> -User name : str -Sex : str
-User name : str
Information Desk Administartor -Password : str -Age : int
-Password : str getreport
1 has 1 -User ID : int +Plaintiff ID : int
-User name : str -User name : str
get report -Education level : str
+Accept user name() -Password : str -Password : str
-User ID : int -User ID : int +Add values() -Nationality : str
+Accepty password()
+Search values() -Religion : str
+Record values() +Collect report() 1+Generate value()
+Generate report() +Generate report() +Submit value()
+Clear value()
n
+Exit()
1 1 1..*
<<UI>> Register
Create Account Update get evidence
Delete Account Uses
Change Account Made
+Accept username() +Search() accuse
+Accept username()
+Accept password() +Update values()
+Accept password() +Accept username()
+Accept account name() +Delete account() +Accept password()
+Set account type() +Change account()
+Set account ID() 1..*
*
1..* 0..* 1
<<UI>> <<UI>>
Witness <<UI>> <<UI>>
Crime
-Name : str Exhibit Plaintiff
-Crime date : str
-Sex : str ID : int -Name : str
-Crime name : str
-Age : int Item type : str -Sex : str
-Crime ID : int
-Religion : str Item name : str -Age : int
-Crime location : str
+Crime ID : int Amount exhibitted : str -ID : int
-Region : str
+Accused name : str Detective name : str -Date : int
-Zone : str
-Nationality : str Detective position : str -Religion : int
-Woreda : str
-Region : str Crime ID : int -Job : int
-Recorded date : str
-Zone : str -Region : int
-Detective name : str
-Woreda : str +Submit values() -Zone : int
-Kebele : str +Clear values() -Woreda : int
+submit values()
+Clear value() +Exit()
+Submit values() +Submit values()
+Exit()
+Clear Values() +Clear values()
+Exit() +Exit()
Fig4.1 class diagram for hasseb ber police crime record system
58
Class name: Crime
Crime class is a persistent that is used to contain crime information.
It has the following attributes and methods
Attribute Purpose Type length
Recorded date The date that the crime information recorded String 10
59
Plaintiff ID Used to identify identity of Defendant person
Educational level Used to represent education level of Accused string 20
person who did a crime
Nationality Represent citizenship of the Accused person string 20
Religion Used to identify Accused person religion who string 20
believes
Table 4.2, Description of Accused person class attributes
60
Age Used to represent age of a person who Integer 3
give the evidence
Religion Religion of witness person who give the string 20
evidence about the crime
Crime ID Uniquely identifies crime code number Integer 5
Nationality Represent citizenship of a person who give String 30
the evidence
Region Refers region of a person who give the String 25
evidence
Zone Used to refer zone of a person who give String 30
the evidence
Woreda Used to refer Woreda of a person who sees String 20
criminal action happened
Kebele Used to refer Kebele of a person who sees integer 2
criminal action happened
Table 4.4 Description of Witness class attributes
61
suffered by a victim
Region Represents region of a person who suffered by string 15
a victim
Zone Represents zone of a person who suffered by a string 15
victim
woreda Represents woreda of a person who suffered string 15
by a victim
Table 4.5, Description of Plaintiff person class attribute
4.7 state chart modeling
State chart diagram used to show the sequences of states that an object goes through
events that cause a transition from one state to another and the actions that result from a
state change. The following are the state chart diagram for Hasseb Ber crime record
system.
Crime
information
Submit
Submitted
[modify]
check
Checked
[return]
Consistent
validate
Validated
Registered
Fig 4.2, A UML state chart diagram for crime during crime registration.
62
Update Crime registration cla ss
during crime registration updated
Crime registered
information
Submit
Submitted
[modify]
che ck
Checked
[return]
Consistent
validate
Validated
Crime information
upda ted
Fig 4.3 ,A UML state chart diagram for Update crime registration during crime registration
Crime registered
information
Submit
[modify] Submitted
Check
Checked
[Return]
Consistent
Validate
Validated
Report
Ge nerated
Fig 4.4, A UML state chart diagram for generate registration report during report generat
63
Re cord crime informa tion
cla ss during Re cord informa tion
Crime
informa tion
Submit
[modify]
Submitte d
Che ck
Che cke d [Return]
Consiste nt
Valida te
Va lidate d
Information
re corded
Fig 4.5, A UML state chart diagram for record crime information during information recorded
Recorded
information
Submit
Submitted
[modify]
checking
Checked
[return]
Consistent
validating
Validated
Information
upda ted
Fig 4.6, A UML state chart for update record information during crime information updated
64
Generate Administration report
class during Administration
report
Administrator
information
Submit
Submitted
[modify]
checking
Checked
[return]
Consistent
validating
Validated
Report Generation
65
2: user name and password <<UI>>
<<Actor>>
security login
Detective
Fig 4.8, A UML collaboration diagram for Detective security login Basic course of action.
<<DB>>
login database
Fig 4.9, A UML collaboration diagram for Detective security login Alternative course of action.
66
<<Actor>> 2:User name and password <<UI>>
Information Desk Security login
5: call to display
<<UI>> <<DB>>
Main menu login database
Fig 4.10, A UML collaboration diagram for Information Desk security login Basic course of action.
1:
window request user name an password
4: Incorrect user name and password 3:checkout user name and password
<<DB>>
login database
Fig 4.11,A UML collaboration diagram for Information Desk security login Alternative course of action.
5: call to display
<<UI>> <<DB>>
Main menu login database
Fig 4.12, A UML collaboration diagram for Administrator security login Basic course of action.
67
<<Actor>> 2: User name and password <<UI>>
Administrator Security login
4: Incorrect user name and password 3:checkout user name and password
<<DB>>
login database
Fig 4.13, A UML collaboration diagram for Administrator security login Alternative course of action.
8: validate data
9:valid
<<UI>>
Main menu
Fig 4.14, A UML collaboration diagram for new crime registration Basic course of action.
68
3: form will be displayed
10:New crime registration form
<<UI>> 6:conformation
<<Actor>>
Register New
Detective
crime
<<UI>>
Main menu
<<DB>>
HBPCRS
Fig 4.15, A UML collaboration diagram for Register New crime Alternative course of action.
3: form displayed
13:crime record updated successfully
<<DB>>
HBPCRS <<UI>>
Main menu
Fig 4.16 , A UML collaboration diagram for Update crime registration Basic course of action.
69
3: form displayed
7:message displayed
8:update crime registration form
<<UI>> <<Actor>>
Update crime Detective
registration
4: search record information
6: Not Available
1: wants to update crime registration
2: call to display
<<DB>>
HBPCRS <<UI>>
Main menu
Fig 4.17, A UML collaboration diagram for Update crime registration Alternative course of action.
3: form displayed
<<UI>> 8:view report
Generate <<Actor>>
registration report Detective
<<DB>> <<UI>>
HBPCRS Main menu
Fig 4.18, A UML collaboration diagram for Generate registration report Basic course of action.
3: form displayed
<<UI>> 8:Generate registration report form
Generate <<Actor>>
registration report Detective
<<DB>>
HBPCRS <<UI>>
Main menu
Fig 4.19, A UML collaboration diagram for Generate registration report Alternative course of action.
70
3: form displayed
<<UI>> 7:Successfuly record crime information <<Actor>>
Record crime Information
infromation Desk
2: call to display
<<UI>>
<<DB>> Main menu
HBPCRS
Fig 4.20, A UML collaboration diagram for Record crime information Basic course of action.
3: form displayed
<<UI>> 7:Record crime information form <<Actor>>
Record crime Information
infromation De sk
2: call to display
<<UI>>
<<DB>> Ma in menu
HBPCRS
Fig 4.21, A UML collaboration diagram for Record crime information Alternative course of action.
3: form displayed
13:record updated successfully
<<DB>>
HBPCRS <<UI>>
Main menu
Fig 4.22, A UML collaboration diagram for Update record information Basic course of action.
71
3: form displayed
7: message displayed
8:Update record information form <<Actor>>
<<UI>>
Update record Information
information Desk
4: search record information
5: Check avilablity
6: Not available
1: wants to update record crime information
2: call to display
<<DB>> <<UI>>
HBPCRS Main menu
Fig 4.23, A UML collaboration diagram for Update record information Alternative course of action.
3: form displayed
<<UI>>
8:view report <<Actor>>
Generate
record report Infromation
Desk
4:Select information to be generated
2: call to display
6: Available
7:report generated
<<UI>>
<<DB>> Main menu
HBPCRS
Fig 4.24, A UML collaboration diagram for Generate record report Basic course of action.
3: form displayed
<<UI>>
8:Generate record report form <<Actor>>
Generate
record report Infromation
Desk
4:Select information to be generated
2: call to display
6: Not available
<<UI>>
<<DB>> Main menu
HBPCRS
Fig 4.25, A UML collaboration diagram for Generate record report Alternative course of action.
72
3: form displayed
<<UI>> 8:View report <<Actor>>
Generate Administrator
Admin report
4:Select report to be generated
2: call to display
6: Available
7:report generated
<<UI>>
<<DB>> Main menu
HBPCRS
Fig 4.26, A UML collaboration diagram for Generate Admin report Basic course of action.
3: form displayed
<<UI>> 8:Generate Admin form <<Actor>>
Generate Administrator
Admin report
4: Select report to be generated
2: call to display
6: Not Available
<<UI>>
<<DB>> Main menu
HBPCRS
Fig 4.27, A UML collaboration diagram for Generate Admin report Alternative course of action.
73
Crime Registration
<<Application>> Data access
Crime
management Data access
Update Crime
Registration
<<Infrustructure>>
Generate Security
<<Application>> Data access Registration report
System
Management
Record crime <<Infrustructure>>
information Persistent
Update record
<<Application>> information
Security
Management OLEDB
Generate record
information
Generate Crime DB
Administration report
Change Account
4.28, A UML component diagram for Hasseb Ber police crime record management system.
Fig 4.29, A UML Deployment diagram for Hasseb Ber police Crime record management system
74
4.11 Object model (Using object diagram)
The notation used on UML object diagrams is very simple they show objects and the
connections among them. UML object diagrams are effectively notational subsets of
UML communication diagrams, although object diagrams are used to explore structure
whereas communication diagrams explore behavior. It is common for object diagrams to
evolve into communication diagrams simply by adding messages to the diagram.
Police station
D2: Department
KTHBPS Name: Administrator
User interfaces describes how the user interacts with the new system interfaces. User
interface guides the user with user friendly commands how to operate the system. Most
of the time user interfaces does not need training of users, because users expected only
now commands. User interface is a complex task that focuses all the applying common
UI design principles and techniques, applying the station chosen interface design
standards and involving our UI design. The following user interface describes Hasseb Ber
police station crime record system operating environment.
75
Home Page
Security login
Main Page
Click on a menu
Crime page Accused page Witness page Exhibit page Plaintiff page
Click
Click on
Click on
Application user interface hierarchy for Hasseb Ber police station crime record system
76
4.13 User interface Design
This screen has two menu strip File And Account when to click on file then can select
open then opend login form ,close option also used to close spalsh screen.in the other
hand when click on the account then go to account form.
77
Fig 4.33, login form for police crime record management system
This form contain three menu strip Choose Departments, Back and Close .when click
on choose departments menu strip used to select the privilege that detective
,Information disk or administrator. Back menu strip used to return back to login form,
and the last close used to closed the main page.
78
Fig 4.35, Detective main form of police crime record management system
Fig 4.36, Crime registration form for police crime record management system
Fig 4.37, Plaintiff form for police crime record management system
79
Fig 4.38, Accused form for police crime record management system
Fig 4.39, Exhibit form for police crime record management system
80
Fig 4.40, Crime registration form for police crime record management system
Fig 4.41, Account create form for police crime record management system
81
Fig 4.42, information desk form for police crime record management system
82
Fig 4.43, Admin form for police crime record management system
Sample tables
Table 4.5 Crime registration table for police crime record management system
83
Table 4.6 Plaintiff table for police crime record management system
Table 4.7 Accused table for police crime record management system
84
Table 4.8 Exhibit table for police crime record management system
Table 4.9 Witness table for police crime record management system
85
Table 4.10 Relationship table of Detective main form table for police crime record
management system
86
Table 4.11 Administrator table for police crime record management system
87
Chapter FIVE
SYSTEM CONSTRACTION/IMPLEMENTATION
5.1 Introduction
System implementation gives the physical coding of the system ,the coding was done in
VB.net language .the selection of vb dot net language is based on the version of the
system and also it is the most power full language than other language we know.
In this chapter the sample coding for implementation and testing ways will be
described.
5.2 Coding (coding as annex)
After other phases of the system development is completed coding takes next position.
Coding includes implementation of user interface, implementation of database and
logical implementation.
In the following interface implementation, database implementation and logical
implementation are discussed in context of the whole system.
Implementing Interface
In this part implementation of pages of each module is done. Pages are divided in to
interface and user interface. That is for security measurement. Rather than using same
interface its better using independent one is better.
Database Implementing
We have used relational database management system. It supports different activities like
deleting, updating, retrieving, searching, displaying and other functionalities. The data
base used for database implementation is Microsoft access 2007. Database allows access
to police crime record information to users.
Imports System.Data
Imports System.Data.OleDb
88
Dim cmdUpdate As New OleDbCommand
con.Open()
End Sub
Private Sub DisplayButton_Click(ByVal sender As System.Object, ByVal e
As System.EventArgs) Handles Display.Click
'Display data Table on datagrid
89
End Sub
Private Sub LoginButton_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles Login.Click
con.Open()
If Me.cbousername.Text.ToLower() = read.Item("username").ToString And
Me.password.Text.ToLower = read.Item("password").ToString Then
Form2.Show()
Me.Hide()
Else
If String.IsNullOrEmpty(Me.cbousername.Text) Xor
String.IsNullOrEmpty(Me.password.Text) = False _
Then
MsgBox("User Login unsuccessful,pls type the
correct details and select the correct usertype")
End If
End If
'validate manager
If Me.cbousername.Text.ToLower() =
read.Item("userName").ToString And Me.cbousername.Text.ToLower =
read.Item("password").ToString Then
MsgBox("Login successful")
Form2.Show()
Me.Hide()
Else
If String.IsNullOrEmpty(Me.cbousername.Text) Xor
String.IsNullOrEmpty(Me.password.Text) = False _
Then
MsgBox(" Login unsuccessful,pls type the correct
details and select the correct usertype")
End If
End If
con.Close()
Else
MsgBox("Login unsuccessful,no connection")
End If
con.Close()
read.Close()
Catch ex As Exception
MessageBox.Show(ex.Message)
Finally
con.Close()
End Try
End Sub
90
Private Sub delete_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles delete.Click
'delete values from the table
cmdDelete.CommandType = CommandType.Text
'the command perform the action within the connection
cmdDelete.Connection = con
cmdDelete.ExecuteNonQuery()
End Sub
txtacid.Text = srch("Accusedid")
accname.Text = srch("Accusedname")
cbosex.Text = srch("Sex")
txtage.Text = srch("Age")
'txtwitid.Text = "0"
'txtcname.Text = "0"
Else
End If
Private Sub UpdateToolStripMenuItem1_Click(ByVal sender As
System.Object, ByVal e As System.EventArgs) Handles
UpdateToolStripMenuItem
'delete values from the table To update
91
Dim del As DialogResult
del = MsgBox("Are you sure you want to Delete Record?",
MsgBoxStyle.YesNo, "confirm!!!")
If del = Windows.Forms.DialogResult.Yes Then
cmdDelete.CommandText = "DELETE RECORDS FROM
AccusedTable WHERE Accusedid =" & txtacid.Text & ";"
cmdDelete.CommandType = CommandType.Text
End Sub
In chapter four while the system is being designed we have shown different functions.
Some major functions and their respective algorithms are shown below and the rest are
annexed.
If invalid data is entered Prompt the user to correct the error by displaying
message "Insert value"
Open database
Insert the information filled out on the form into the table
92
If everything is successful
Else
Clear all the inputs and refresh the form and display the form
End function
updateCrime()
Open database
Else
93
If everything is successful
Else
End function
viewCrime()
Else
Close table
Close database
End function
Search Crime
SearchCrime ()
Accept input
94
If "search" button is clicked
Open database
Else
If a mach is found
Else
Close table
Close database
End function
Recordcrime ()
Prompt the user to correct the error by displaying message "Insert value"
95
Open database
Check the uniqueness of the record No and match crimeID from crime record table
If the recordNo is not unique or crID is not match from crime record table
Insert the information filled out on the form into the table
If everything is successful
Else
Clear all the inputs and refresh the form and display the form
End function
Updaterecord ()
Open database
Retrieve the Record information for the specific Crime with specific day
96
If "update" button is clicked
Else
If everything is successful
Else
End function
ViewRecord ()
Else
97
Retrieve the Information those are recorded
Close table
Close database
End function
Searchcrimerecordinformation ()
Accept input
Open database
Else
If a mach is found
Else
Close table
Close database
98
End function
Open database
Viewreport ()
Else
Close table
Close database
End function
99
Flow chart primary artifact of structured or procedural modeling
HBPCRMS
Login Login form Cancel
Choose
Detective Crime button
Administrator page
page
Submit
Exit Witness button
Administrator Information
form Display
desk page
Search Information form
Back Delete Plaintiff button
Record in to the
Crime record table
Fill crime
Display crime Exit
Search
information
Registration
Accused form
form
Submit Back Delete
Exhibit form
View crime registration
report from registration
table
Generate administrator
Fig.Flow chart
Fill information primary artifact of structured or procedural modeling Click on crime button
report from
HBPCRMS in thedata
crime
baseform
100
For exchanging data between server and client our team use UTP cable
Cat 6 and to connect two ends to both computer our team use RJ-45.
Besides all these, to protect data loss due to power interruption we use
UPS (uninterrupted power supply).
Since the technologies used for front-end and back-end application are developed using
windows operating system. Our HBPCR system can be installed in windows operating
system environment such as windows 2000 or windows XP.
Data preparation:- Before installing the system the following criteria should be
Fulfilled.
of40GB).
101
Installation:-The HBPCRS software can be installed in the HBPCRS office Desktop
computer that satisfies the hardware and software requirements that are discussed above
and database server are installed in the HBPCRS office.
5.5 Testing
Developing software is a complex business. No matter how hard we try, we won’t be able
to eliminate all faults simply by going through the phases of requirements, analysis,
design, specification, and implementation .however through good practice we can make
sure that the most series fault does not occur in the first place. In addition we need a
separate testing phase, with the goal of elimination all remaining faults before release.
Testing a code and other artifacts as we go along the development of the system help us
to acquire the following advantage:
To simplify the testing process the project team followed the different types of tests that
break the testing process up into the distinct levels. These types testing are unit testing
integration testing and system testing.
Unit test: Each module is tested alone in attempt to discover any error in its code but
since modules exist and work with other modules in programs and system they must be
tested in longer groups.
Integration test: The process of bringing together all of the modules that a program
comprises for testing purposes. Modules are typically integrated in top won incremental
fashion.
System testing: a test performed on an entire system Ensures that application programs
written and tested in isolation work properly when integrated into the total system.
The system start by enter password and user name in the HBPCRMS login form then
display the main page of the system.
102
Chapter six
CONCLUSION AND RECOMMENDATION
In developing this system we have observed that there are other systems
that need to be
Automated in the Kombolcha Town Hasseb Ber police station. In relation to our
project, the manual System hinders the Police station not to use its resources
efficiently and serve its people effectively. However, we have seen great interest
of the stakeholders of the police station to automate some manual systems that
needs to be automated.
After spending three to four months on developing this project, we have
tried to automate the new computerized police crime record management system
of the station.
The crime record system needs some improvements before it is applied to a
real application; which is created due to the time shortage, shortage of experience
and other technical Problems. Taking these problems in to account, if the materials
requested are provided and all the installation process is completed; the patient
information system will work well.
More over, the system will bring a radical change on current working
condition of the police station. Specially, to operations concerned the record office
The police crime record management system conversion from the old
system to this new system is based on a radical change which needs a complete
acceptance from the users of the system as
Was hoped and agreed with stakeholders at the beginning of this project.
103
Finally, we concluded that the police crime record management system will
be taken as a means for the Police station to deliver efficient and effective report
generating, crime recording and information sharing to the police station.
Conclusion
The computers and computerization technology in the world is growing along the fast
lane where Ethiopia is attempting to run along this lane in which there are achievements
recorded. And as years, pass by, we are pretty much confident that extent progress will be
made in our country.
System development is one of the ways in which we can make progress by making a lot
of tasks easier and the over all use of computers along with the developed systems is
believed to lead to the peak of the technology standard.
The system that we have developed is one that is relatively minor in its type, but can be
a break through for other researcher to further implementation on the system.
Concussively, the issues raised in the summary of finding will be discussed in this
conclusion part. There for, we conclude
1. The program complete in modular forms and in its overall status
where it consists of all the necessary features required for a
system to call a system. The testes and evaluations made show
that the system is full fledged and complete.
2. The developed system can conclusively be called user friendly
in which the form developed are suitable for use by any user
who will defiantly get accustomed to the system’s environment
easily. There for, the Kombolcha Hasseb Ber PCRMS is quite
user friendly for use by simple user at it should be.
3. It can be conclude that the graphical user interface is fully
developed with all the necessary text boxes, buttons, tables and
textual representation with the use of the international language
i.e. English on all expressive labels that are used in the system.
All the forms required exist in the system .there fore, we can say
that the essential forms are available and are in proper order.
104
4. The system is strongly secure with the use of identification
(login name) and a password where unless otherwise one has the
proper and id, she/he can access or get into the system. Also
there is a mechanism for changing that existed before into a new
one for greater security, since periodical changing once
password will leave the user on the safe side.
5. The database of the system is properly organized with fulfilled
tables on their connection is appropriately made with the right
forms through the coding. All the necessary tables are created
effectively and in a sufficient manner.
6. The system is exhaustive in such away that it consists of all the
features a
7. PCRS should consist of, but the system conclusively can be seen
as one that can be implemented further with the inclusion of the
financial aspects in detail. Other than that, our system is
believed to be inclusive of many of the features a PCRS should
include.
8. Data reception in our system is accomplished in quite consistent
way in which there is no major appearance difference on the
forms and the buttons creation and once some one is accustomed
to one form’s appearance, the other will not be difficult to get
used to .therefore, consistency is observed in our system’s over
all appearance and data reception (input) method.
All in all , Kombolcha Hasseb Ber PCRMS developed is a system that definitely going
to be help full if it is going to be introduce and applied in the office and with further
enhancements , it can turn into a great system with many great features for out standing
results in whatever is done around the kombolcha town.
RECOMMENDATION
Finally, we the project team members recommend the following points:
105
This system will give a solution for some of the problems in the record
management system of the police station, but the police station should prepare a
conducive environment to test such systems.
There should be a healthy working environment, specifically in regard to
the database
Administration that we are going to assign the total authority to view the security
database and handle problems that may arise in the application of the police crime
record management system. So it is better to assign this position to some one who
is trustworthy, accountable and responsible person.
The police station has to fulfill all the infrastructures needed for the system
implementations. In addition, all the specifications mentioned for the hard
wares and soft wares are Mandatory.
The different data manipulators in the police crime record management
system, who are the main users of the police crime record management
system, must have knowledge about this technology.
We recommend to the University’s department of Information System to
provide its. Students the opportunity to work on developing systems that
are aimed in solving the real Problems of the society.
The last but not least, developed considering the expansions that the record office
of the station will undergo in the near future, we recommend the
The police station uses this system as a basement and sees how its problems can
be solved.
References
[1]:- Kombolcha town Hasseb Ber police station Human resource and allocation office
manual documentation book on page 104.
[2]:- Jaffrey McManus, Home Encyclopedia Databases of SQL and Access, 1st edition
1997
106
[3]:- RPT software, URL:http://www.rptsoftware.com/aboutus/microsoft access database/
retrieved on Jan 14, 2012
[4]:-Michael A. vine, complete reference for VB.NET 2008, 2nd edition, 2001
[5]:- M.Jacob, complete reference for VB.NET 2008, 3rd edition, 2005
[6]:- Searchcio Mid market, URL: http://searchcio
midmarket.techtarget.com/definition/Rational-Rose, retrieved on Jan 14, 2012
[7]:-IBM, URL: http://www-01.ibm.com/software/rational/ ,retrieved on
February13,2012
[8]:- Terry Halpin, rule and principal guidance for democracy, 1997, Kombolcha
[9]:-S.A Kalkar, Software Engineering, 3rd edition, 2007
[10]:-Solomon Grudey, object oriented primer, 2nd edition, 2001
[11]:- Solomon Grudey, object oriented primer, 2nd edition, 2001
[12]:-Brian Wilkerson, Object oriented design 1st edition, 2004
[13]:- S.A Kalkar, Software Engineering, 3rd edition, 2007
[14]:-Rebecca and Lauren Wienner, object oriented design, 1st edition, 2004
[15]:- Solomon Grudey, object oriented primer, 2nd edition, 2001
1.የተከሳሸ ስም ከነአያት__________________
2.የተከሳሸ ብዛት____________________
ወንድ _________ ሴት_____ ድምር_______
3.የትምህርት ደረጃ________________________
4.የቤተሰብ አቋም________________
107
5.ስራ________________
6.ክልል_________ ዞን_____ ወረዳ _____ ቀበሌ ________
ልዩ ቦታ_________ የቤት ቁጥር _________ ስ/ቁጥር ____________
7.የተከሰሰበት የወንጀል አይነት_____________
8.ክስ የተመሰረተበት ቀን_____________ የታሰረበት ቀን_______________
9.የወንጀል እለት ሁለገብ መዝገብ ቁጥር(የአለት መመዝገቢያ)_________________
10.መለያ ቁጥር_________________
11.የእዝግቢት መዝገብ ቁጥር (የደበደበበት መሳሪያ)___________
12.የከሳሸ ስም ________ ስራ ________ እድሜ ____ ፆታ________
ክልል:_________
13.የጉዳቱ መጠን __________መርማሪዉ አካል___________
14. ለአቃቢ ህግ የተላከበት ቀን__________________________
15.የቀረበለት ዐ/ህግ /ወረዳ ___________________________
16.የዐ/ህግ መዝ/ቁጥር _________________________
17.ክሱየተመራለት ፍ/ ስም ______________ የፍታ/መለያ ቁጥር ________
18.የፍርዱ ዉሳኔ / ቅጣት_______________________________
108