Professional Documents
Culture Documents
Group Member:
No. Name ID
1. Denberu Esubalew ETS0322/09
2. Melak Nega ETS0755/08
3. Mikiyas Tibebu ETS0699/09
4. Yamlak Tesfaye ETS0994/09
3/11/2020
Acknowledgement
We would like to thank Salo Gora Gelan Police Station and Inspector Tezera for his unrestricted
support and knowledge. We also would like to reserve our utmost respect and gratitude to our
advisor Mr. Aderaw Semma for his contribution in directing us in the correct direction.
1
Contents
1. Chapter One: Introduction ----------------------------------------------------------------------------- 9
1.1. Background ----------------------------------------------------------------------------------------- 9
1.2. Problem Statement -------------------------------------------------------------------------------- 10
1.2.1. Existing System ------------------------------------------------------------------------------ 11
1.2.2. Problem of existing system----------------------------------------------------------------- 15
1.2.3. Proposed system ----------------------------------------------------------------------------- 15
1.2.4. Advantage of proposed system ------------------------------------------------------------ 15
1.3. Motivation ------------------------------------------------------------------------------------------ 16
1.4. Scope and Limitation ----------------------------------------------------------------------------- 16
1.4.1. Scope ------------------------------------------------------------------------------------------ 16
1.4.2. Limitation ------------------------------------------------------------------------------------- 17
1.5. Goals and Objectives ----------------------------------------------------------------------------- 17
1.5.1. Goals ------------------------------------------------------------------------------------------- 17
1.5.2. Objectives ------------------------------------------------------------------------------------- 17
1.6. Methodology --------------------------------------------------------------------------------------- 18
1.6.1. Methods --------------------------------------------------------------------------------------- 18
1.6.2. Requirement Gathering and Analysis ----------------------------------------------------- 18
1.6.3. Design and Architecture -------------------------------------------------------------------- 18
1.6.4. Implementation ------------------------------------------------------------------------------ 20
1.6.5. Project Schedule ----------------------------------------------------------------------------- 20
2. Chapter Two: System Requirement Specification ------------------------------------------------- 21
2.1. Introduction ---------------------------------------------------------------------------------------- 21
2.2. Functional Requirement -------------------------------------------------------------------------- 21
2.2.1. Criminal Information management ------------------------------------------------------- 21
2.2.2. Reporting-------------------------------------------------------------------------------------- 22
2.3. Non-Functional Requirement -------------------------------------------------------------------- 22
2.3.1. Performance requirement ------------------------------------------------------------------- 22
2.3.2. Security requirement ------------------------------------------------------------------------ 22
2.3.3. Safety requirement--------------------------------------------------------------------------- 23
2.3.4. Software quality attribute ------------------------------------------------------------------- 23
2
2.4. Feasibility Study----------------------------------------------------------------------------------- 23
2.4.1. Operation feasibility ------------------------------------------------------------------------- 23
2.4.2. Technical feasibility ------------------------------------------------------------------------- 23
2.4.3. Economic feasibility------------------------------------------------------------------------- 23
3. Chapter Three: System Analysis and Modeling --------------------------------------------------- 24
3.1. Overview ------------------------------------------------------------------------------------------- 24
3.2. Scenario based modeling ------------------------------------------------------------------------- 24
3.2.1. Use case identification ---------------------------------------------------------------------- 24
3.2.2. Actor identification -------------------------------------------------------------------------- 24
3.2.3. Use case diagram ---------------------------------------------------------------------------- 25
3.2.4. Use case Description ------------------------------------------------------------------------ 26
3.2.5. Activity diagram ----------------------------------------------------------------------------- 33
3.3. Behavioral Modeling ----------------------------------------------------------------------------- 38
3.3.1. Sequence diagram --------------------------------------------------------------------------- 38
3.3.2. State diagram --------------------------------------------------------------------------------- 41
3.4. Class base modeling ------------------------------------------------------------------------------ 47
3.4.1. Class identification -------------------------------------------------------------------------- 47
3.4.2. Class diagram -------------------------------------------------------------------------------- 48
4. Chapter Four: System Design ------------------------------------------------------------------------ 49
4.1. Overview ------------------------------------------------------------------------------------------- 49
4.2. System Design ------------------------------------------------------------------------------------- 49
4.2.1. System decomposition ---------------------------------------------------------------------- 49
4.2.2. Module description -------------------------------------------------------------------------- 49
4.3. Architecture of the system ----------------------------------------------------------------------- 49
4.3.1. Architecture style and pattern -------------------------------------------------------------- 49
4.3.2. Component diagram ------------------------------------------------------------------------- 50
4.3.3. Deployment diagram ------------------------------------------------------------------------ 52
4.4. Database design ----------------------------------------------------------------------------------- 53
4.5. User interface design ----------------------------------------------------------------------------- 54
4.5.1. Login user interface design ----------------------------------------------------------------- 54
4.5.2. Home page user interface design ---------------------------------------------------------- 54
3
4.5.3. Search information user interface design------------------------------------------------- 55
4.5.4. Generate report user interface design ----------------------------------------------------- 55
Reference and Appendix ------------------------------------------------------------------------------------ 56
4
Lists of Figures
Figure 1. Suspect information form------------------------------------------------------------------------ 12
Figure 2. Witness information form ----------------------------------------------------------------------- 13
Figure 3. Plaintiff/Suspect/Witness Testimony form --------------------------------------------------- 14
Figure 4.MVC model ---------------------------------------------------------------------------------------- 19
Figure 5. Three tier model ---------------------------------------------------------------------------------- 19
Figure 6.Project Schedule ----------------------------------------------------------------------------------- 20
Figure 7.Use case diagram ---------------------------------------------------------------------------------- 25
Figure 8. Initialize system activity diagram -------------------------------------------------------------- 33
Figure 9. Add user activity diagram ----------------------------------------------------------------------- 34
Figure 10.Login activity diagram -------------------------------------------------------------------------- 35
Figure 11. Add criminal case activity diagram----------------------------------------------------------- 36
Figure 12. Search criminal activity diagram ------------------------------------------------------------- 37
Figure 13.Register user sequence diagram --------------------------------------------------------------- 38
Figure 14.Login sequence diagram ------------------------------------------------------------------------ 39
Figure 15. Add case sequence diagram ------------------------------------------------------------------- 39
Figure 16. Generate report sequence diagram ------------------------------------------------------------ 40
Figure 17.Login state diagram ------------------------------------------------------------------------------ 41
Figure 18.Register state diagram --------------------------------------------------------------------------- 42
Figure 19.Add case state diagram -------------------------------------------------------------------------- 43
Figure 20.Search criminal state diagram ------------------------------------------------------------------ 44
Figure 21.Search case state diagram ----------------------------------------------------------------------- 45
Figure 22.Generate report state diagram ------------------------------------------------------------------ 46
Figure 23.Class diagram ------------------------------------------------------------------------------------- 48
Figure 24.MVC model --------------------------------------------------------------------------------------- 50
Figure 25.Component diagram ----------------------------------------------------------------------------- 51
Figure 26.Deployment diagram ---------------------------------------------------------------------------- 52
Figure 27.Database diagram -------------------------------------------------------------------------------- 53
Figure 28.Login UI design ---------------------------------------------------------------------------------- 54
5
List of Tables
Table 1. Crime category ------------------------------------------------------------------------------------- 10
Table 2.Project Schedule timeline ------------------------------------------------------------------------- 20
Table 3.Initialize system use case description ----------------------------------------------------------- 26
Table 4.Register user use case description---------------------------------------------------------------- 26
Table 5.Login use case description ------------------------------------------------------------------------ 27
Table 6. Log info use case description -------------------------------------------------------------------- 28
Table 7. Manage account use case description ----------------------------------------------------------- 28
Table 8. Manage user account use case description ----------------------------------------------------- 29
Table 9.Add criminal case use case description --------------------------------------------------------- 30
Table 10. Edit criminal case use case description ------------------------------------------------------- 30
Table 11. Search information use case description ------------------------------------------------------ 31
Table 12.Generate report use case description ----------------------------------------------------------- 31
6
List of Abbreviations, Symbols, Specialized Nomenclature
Admin – Administrator
7
Abstract
This system helps in managing criminal information on a web-based system. It works by converting the
information stored on a paper by policeman/woman into a digitized form by the help of a data encoder to
input the data to system. Criminal record system aims to improve the traditional way of paper based
criminal information management by creating a simple and robust platform which aid in registering,
searching, report generating. The general idea of a digitally managed criminal information system is to
make criminal cases easily accessible which could help trigger a digital transformation in which we could
analyze the information stored in the digital medium to help reduce crimes. It will also help police
departments have a digital back up of the information collected on criminals, witnesses, plaintiffs. Other
uses of the system could also be used to manage policeman/woman by tracking the cases that they are
assigned to and tracking the progresses they have made in solving their assigned crimes. The system will
also be able to generate monthly, quarterly and yearly reports which will help in determining the
performance, and the general metrics of a police department or a policeman/policewoman.
In the making of this project we have found that the current system is full of defects that inhibits the
effectiveness of crime prevention methods the police uses. Some of these problems are
The solution we found for this is assigning a data-encoder who is responsible for inserting provided
information to the computer.
አብስትራክት
ይህ ስርዓት የወንጀል መረጃዎችን በድር ላይ በተመሠረተ ስርዓት ለማስተዳደር ይረዳል፡፡ ስርዓቱ በወረቀት ላይ በፖሊስ
የተከማቸውን መረጃ በዲጂታዊ ቅርፅ በመረጃ ሰጭው መረጃ ወደ ስርዓቱ ለማስገባት በመለወጥ ይሠራል፡፡ የወንጀል
መዝገብ ስርዓት ዓላማው በወረቀት ላይ የተመሠረተ የወንጀል መረጃ አያያዝ ባህላዊ መንገድን ለማሻሻል ፣
ለማስመዝገብ ፣ ለመፈተሽ እና ሪፖርት ለማድረግ የሚረዳ ቀላል እና ጠንካራ መድረክን በመፍጠር ነው ፡፡ በዲጂታዊ
የወንጀል መረጃ ስርዓት አጠቃላይ ሀሳብ የወንጀል ጉዳዮችን ለመቀነስ ለማገዝ በዲጂታል መካከለኛ ውስጥ
የተከማቸውን መረጃ ለመተንተን የምንችልበትን የዲጂታል ለውጥ ለማምጣት የሚረዳ የወንጀል ጉዳዮችን በቀላሉ
ተደራሽ ማድረግ ነው፡፡ የፖሊስ መምሪያዎች በወንጀለኞች ፣በምስክሮች ፣በከሳሾች ላይ የተሰበሰበውን መረጃ
በዲጂታል እንዲደግፉ ይረዳቸዋል፡፡ ሌሎች የሥርዓቱ አጠቃቀሞችም የተመደቡባቸውን ጉዳዮች በመከታተል እና
የተመደቡትን ወንጀሎች በመፍታት ያከናወኗቸውን እድገቶች በመከታተል ፖሊስን ለማስተዳደር ሊያገለግሉ ይችላሉ፡
፡ አፈፃፀሙን ለመወሰን የሚረዱ ወርሃዊ፣ ሩብ ዓመታዊ እና ዓመታዊ ሪፖርቶችን እና የፖሊስ መምሪያን ወይም
የፖሊስ መኮንን አጠቃላይ ልኬቶችን ማዘጋጀት ይችላል፡፡
ይህንን ኘሮጀክት ሲያከናውን አሁን ያለው ስርዓት ፖሊሶች የሚጠቀሙባቸውን የወንጀል መከላከል ዘዴዎች
ውጤታማነት የሚገድቡ ጉድለቶች የተሞላ መሆኑን ተገንዝበናል፡ ፡ ከእነዚህ ችግሮች መካከል አንዳንዶቹ የሚከተሉት
ናቸው
እነዚህ ሁሉጉድለቶች የፖሊስ ጣቢያዎች እስካሁን ድረስ ሲጠቀሙባቸው ቆይተዋል፡፡ ይህንን በጣም ውጤታማ ያልሆነ
እና ጉድለት ያለው ስርዓት መጠቀሙን ለመቀጠል የሚያስችለው ምክንያት ፖሊሶች የያዙት እውቀት ነው። የአሁኑ
ስርዓት ዲጂታል ሥሪት መጠቀም መሰረታዊ የኮምፒዩተር እና የቋንቋ ችሎታ ስለሚያስፈልግ የስርዓቱን አፈፃፀም
የሚያደናቅፍ ነው፡፡
ለእዚህ ያገኘነው መፍትሄ ለኮምፒዩተሩ የቀረበውን መረጃ የማስገባት ሀላፊነት ያለው የውሂብ-መሰየሚያ መሰየም
ነው፡፡
After the downfall of the monarchic government in 1974, the military junta – the Derg
– that came to power enacted proclamation no. 10/1974 to provide for the nation’s
security and protection; however, no provision was incorporated therein regarding
organizational matters of the police. No separate proclamation of the police
establishment was enacted until the downfall of Derg in 1991.
After the downfall of Derg, it was found necessary to re-establish the police institution
for better organizational capabilities. In so doing, the police force has become in better
shape to discharge its duties of enforcing the constitution of the federal Democratic
Republic of Ethiopia and laws issued based upon that constitution; the police
establishment is also better suited to contribute its share to the nationwide activities of
development of a democratic system, to maintain peace and to expedite development.
The current police establishment, the Federal Police Commission, was founded
pursuant to proclamation no. 720/2004 based on the principles of non-partisanship,
impartial service to the society, commitment to policing ethics, competence and
quality of service.
There are three category of crime; light, medium, severe. In this category there are also
sub categories.
9
Table 1. Crime category
1. Poor criminal record keeping which makes the processing and retrieval of data
difficult.
2. Lack of good storage media which makes retrieval of data and information quite
stressful and bulky.
10
3. Frequent case of missing files because records are not properly stored.
4. Time is wasted on simple tasks like looking for an information in previous cases,
organizing case files.
11
Figure 1. Suspect information form
12
Figure 2. Witness information form
13
Figure 3. Plaintiff/Suspect/Witness Testimony form
14
1.2.2. Problem of existing system
A lot of problems exist in the manual system police currently uses.
• Generating a crime filing number for each of the crime that occurs is
difficult because it’s not easy to trace the file number of the last recorded
crime and this problem has led to the duplication of file number.
• Retrieving files related to a specific parameter is difficult because in order
to achieve this they would have to look through each file.
• Due to nature of paper they get outdated in a short time which has led to a
lot of missing case files.
• Difficult to generate reports. Timely based reports which are done on a
monthly, quarterly and yearly basis require a lot of resources, time and
personnel.
• Couldn’t be analyzed as the information is not digitally available. Since it
is difficult to analyze them it is hard to draw conclusions from already
available information.
• Time-consuming, Current paper-based system makes searching a tedious
task. A simple search could take hours to days to complete which makes a
time sensitive police work essentially impossible to complete in a given
time.
1.3. Motivation
The data that is essential for solving crime is already in the police hands but they are
not using it as they should have. They are sitting on a gold mine of information but
they are trying to mine the gold using spoon.
Even though the police are always trying to protect its citizens by devising new plans
to prevent a crime from happening and by working 24/7 to catch criminals, they aren’t
getting enough help from the current technological advancements which could have
armed them well in carrying out their duty efficiently.
We are determined to fill this gap they have. We want to give them the tool that is
essential to mine this gold, we want to give them the pickle axe for information mining
which is a digitalized system which will help them in analyzing, searching and
reporting their data.
By making their work easy and productive we want to see a society with less crime
and a safe environment for future generations.
User management
Add, remove and modify police account, data encoder account and provide a way
to authenticate the correct credentials also checking who logged in when and their
actions.
Report generation
Generate reports based on the data that is in the system and categorize it into
monthly, quarterly and yearly reports.
16
1.4.2. Limitation
Our system doesn’t include human resource management system in which system
admin would monitor the process of hiring different bodies of a police station like
data encoder, policeman / policewoman and other workers.
We also hope that this project will give further motivation for other developers like
data miners and AI specialists to work on the digitalized crime information to
support the police in their expertise.
1.5.2. Objectives
1.5.2.1. General Objective
The Objective of this project is to design and implement a web-based criminal
recording management for the police.
17
1.6. Methodology
1.6.1. Methods
We will be using iterative developmental approach in which we break down the
software development of a large application into smaller chunks. In iterative
development, feature code is designed, developed and tested in repeated cycles.
With each iteration, additional features can be designed, developed and tested until
there is a fully functional software application ready to be deployed to customers.
18
Figure 4.MVC model
19
1.6.4. Implementation
The project will be implemented using Django for the backend and React.JS for the
front end. MySQL for the database.
We will also be using other tools that are useful for the implementation of the
project like
▪ Git
▪ GitHub
▪ VScode
▪ Selenium
▪ OpenCV
▪ OpenVision
20
November 21 – 29 Requirement Analysis Incudes communicating to the
advisor
This document specifies the purpose, functional and non-functional requirements of the
system and the feasibility study.
2.2.1.2. Operations
Adding criminal information: includes adding details about the criminal such
as name, date of birth, address, place of work, photo, etc. After logging in and
clicking the appropriate link to create a case information, data encoder will be
presented with a form to enter the given data to the computer. Then proper input
validation is performed to check for data integrity and safety, if everything is
21
correct it will be submitted to the server where further input validation takes
place and finally the submitted data will be saved to the database.
2.2.2.2. Operations
Generating Reports: generates reports based on user given time frame.
22
• Passwords will be encrypted so in case they are found it’ll be impossible to
easily crack the hashes.
• The system will only run on modern browsers as supporting old systems will
create a high security risk.
23
3. Chapter Three: System Analysis and Modeling
3.1. Overview
In this chapter we elaborate the basic requirements gathered during requirement elicitation
using different requirement modeling techniques like,
24
3.2.3. Use case diagram
25
3.2.4. Use case Description
Actor: Admin
Description: The admin initializes the system for the first time.
Course of Action:
1. The Actor will launch a web browser and will navigate to the domain of
the system.
3. Then the system redirects to the log-in page on which the admin log in
using the user name and password he/she just signed up with.
Actor: Admin
Postcondition: The user will have a new account and can login to the system.
26
Course of Action:
1. The Actor will launch a web browser and will navigate to the domain of
the system.
4. If the actor has chosen create account the actor will be redirected to create
account registration form and input information needed.
6. After the actor pass all this procedure if there is no error the operation is
successful.
7. The user account will be created and can login to the system.
Exception:
Course of Action:
27
Exception:
Actor: Admin
Description: Allows the actor to keep track of who at what time logged in to the system.
Precondition: The system must have users and the actor must be logged in.
Course of Action:
1. The Actor will launch a web browser and will navigate to the domain of
the system.
3. The system will list the name of users that logged in recently with the
time which they did.
Description: Allows the actor to manage, view, and change information about their own
account.
28
Postcondition: Save the new account information.
Course of Action:
1. The Actor will launch a web browser and will navigate to the domain of
the system.
2. The actor will navigate to the account section
3. The actor will choose from different account management tools like
change username, change password and logout.
4. The system will execute the actor’s choice.
Actor: Admin
Description: Allows the admin to manage, view, and change information about users account.
Course of Action:
1. The Admin will launch a web browser and will navigate to the domain of
the system.
2. The admin will navigate to the user management account section.
3. The admin will see the list of users in the system.
4. The actor will choose from a user account and different account
management tools like change username, change password, delete user.
5. The system will execute the actor’s choice.
Exception: Admin is not logged in or the changed username is taken.
29
Table 9.Add criminal case use case description
Description: Allows the actor to add criminal information as provided by the policeman.
Course of Action:
1. The Actor will launch a web browser and will navigate to the domain of
the system.
30
Course of Action:
1. The Actor will launch a web browser and will navigate to the domain of
the system.
Description: Allows the actor to add criminal information as provided by the policeman.
Course of Action:
1. The Actor will launch a web browser and will navigate to the domain of
the system.
2. The actor provides search parameters
3. Given search parameters are run against a database
4. Displays info returned by the controller
Exception: No Exception
31
Actor: Data Encoder
Course of Action:
1. The Actor will launch a web browser and will navigate to the domain of
the system.
2. Specifies time frame.
3. Pdf format of the response in generated.
Exception: No Data available
32
3.2.5. Activity diagram
3.2.5.1. Initialize system activity diagram
33
3.2.5.2. Add user activity diagram
34
3.2.5.3. Login activity diagram
35
3.2.5.4. Add Criminal case activity diagram
36
3.2.5.5. Search criminal activity diagram
Dashboar
d
Figure 12. Search criminal activity diagram
37
3.3. Behavioral Modeling
3.3.1. Sequence diagram
3.3.1.1. Register user sequence diagram
38
3.3.1.2. Login sequence diagram
Case added
39
3.3.1.4. Generate report sequence diagram
40
3.3.2. State diagram
Login state diagram
41
Register state diagram
42
Add case state diagram
43
Search criminal state diagram
44
Search case state diagram
45
Generate report state diagram
46
3.4. Class base modeling
3.4.1. Class identification
The classes that we identified are
▪ Admin
▪ Account
▪ Report
▪ Monthly report
▪ Quarterly report
▪ Yearly report
▪ Station
▪ Policeman/woman
▪ Data Encoder
▪ Case
▪ Criminal
▪ Work
▪ Person
▪ Living Address
▪ Witness
▪ Plaintiff
47
3.4.2. Class diagram
48
4. Chapter Four: System Design
4.1. Overview
Our system will be using MVC architecture having three tiers that means we will have a
model which is going to be built using Django framework, the view is going to be built
using React.JS library and the third tier which is the database is gone be built with MySQL.
▪ User Management
▪ Search
▪ Case management
▪ Log
▪ Report
4.2.2. Module description
User Account Management
Reporting
Search
Case management
49
parts. Controller is the server-side logic that will be applied to the given or retrieved
data.
50
Figure 25.Component diagram
51
4.3.3. Deployment diagram
52
4.4. Database design
The system will be using MySQL database which is a relational SQL based database.
53
4.5. User interface design
4.5.1. Login user interface design
54
4.5.3. Search information user interface design
55
Reference and Appendix
• The evolution of MVC and other UI architectures from Martin Fowler
http://martinfowler.com/eaaDev/uiArchs.html
• Davis, Ian. What are the benefits of MVC? http://blog.iandavis.com/2008/12/what-are-the-
benefits-of-mvc
• Deployment patterns ( Microsoft Enterprise Architecture, patterns and Practices)
http://msdn.microsoft.com/en-us/library/ms998478.aspx
• Fowler, Martin “Pattern of enterprise application architecture” (2002). Addison Wesley
• http://www.federalpolice.gov.et/web/guest/background-information
56
Interview Questions
Interview Answers
57