Professional Documents
Culture Documents
PROJECT TITLE
2014 E.C
NEKEMTE
RIFT VALLEY UNIVERSITY NEKEMTE CAMPUS
PROJECT TITLE
GROUP MEMBER
This Document entitled “Online police office management system for the Nekemte town.” was read and
approved as meeting the preliminary Project requirement of Computer Science program in partial
fulfillment for award of the degree of bachelor of Computer Science, Rift Valley University, in Nekemte
campus.
Examining Board
CD…………………………………………………….....Compact Disk
ER……………………………………………………….Entity Relationship
FK……………………………………………..………..Foreign Key
IP………………………………………………………..Internet Protocol
PHP……………………………………….……..……..Hypertext Preprocessor
PK……………………………………………………….Primary Key
R ID…………………………………………………….Report Identification
R Type…………………………………………………..Report Type
UN………………………………………………………User Name
UML…………………………………………………….Unified Modeling Language
VAR CHAR…………………………………………….Variable Character
The project focus on the objectives of the project, scope and limitation of the project. Therefore the
project design to using use case diagram and modeling, Beside to this on the project used software
such as: PHP, Java Script, Html for design the project and also MySQL for storing data .
Contents Page no
TABLE OF CONTENTS....................................................................................................................I
1 CHAPTER 1................................................................................................................................1
1.1 INTRODUCTION...............................................................................................................1
1.1.1 BACK GROUND INFORMATION............................................................................1
1.2 Strength and Weakness of Existing System.........................................................................1
1.2.1 Strength of the current system......................................................................................1
1.2.2 Weakness of the current system...................................................................................2
1.3 BACK GROUND OF THE PROJECT................................................................................2
1.4 STATEMENT OF THE PROBLEM...................................................................................2
1.5 OBJECTIVE OF THE PROJECT........................................................................................3
1.6 SCOPE AND LIMITATION OF THE PROJECT..............................................................3
1.6.1 Scope.............................................................................................................................3
1.6.2 Limitation.....................................................................................................................4
1.7 FEASIBILITY STUDY.......................................................................................................4
1.7.1 Operational/ Organizational Feasibility........................................................................4
1.7.2 Technical Feasibility.....................................................................................................4
1.8 BUDGET BREAKS DOWN AND WORK PLAN.............................................................5
1.8.1 Economic Feasibility....................................................................................................6
1.9 SIGNIFICANCE OF THE PROJECT.................................................................................7
1.10 BENEFICIARIES OF THE SYSTEM................................................................................8
1.11 METHODOLOGY OF THE PROJECT..............................................................................9
1.11.1 Data Collections Methodology.....................................................................................9
1.11.2 Case Tools....................................................................................................................9
1.12 RISK AND CONSTRAINTS..............................................................................................9
1.12.1 Action taken..................................................................................................................9
2 CHAPTER TWO.......................................................................................................................11
2.1 DESCRIPTION OF THE EXISTING SYSTEM...............................................................11
2.1.1 Description of the existing system..............................................................................11
2.2 Major Function of Existing System with Clear Inputs, Outputs and Process....................11
5 CHAPTER FIVE
5.4 Testing
Test Approach
CHAPTER SIX
6.1 Conclusion
6.3 Recommendation
5 References.................................................................................................................................53
1.1 Introduction
1.1.1 Back ground information
Nekemte town Police Office is one of the institutions of police office. It was established in 1975
E.C. In order to protect Nekemte town from crime and to give service such as peaceful security of
the people and their property etc. Those are protected by police and peoples. Not only these
security agencies such as justice office and others are works with community policing on the
handling, controlling and fighting against the crime and criminals. The institution of police station
is standing to protect peoples and their property from danger. But on the given of this service there
are many problems on the crime reporting system therefore our project has been prepared with
view of winning on approval for a project that has the objective of developing a new Police office
management System.
The proposed System applies to police institution all across the country and specially looks in the
subject of Police office management system. It is a well understood that crime prevention,
Detection and convection of criminals depend on a highly responsive. Back bone to information
management system. The efficiency of the policing function and the effectiveness with which it
tackles crime depend on what quality of information it can drive from its existing record and how
fast it can have access to it. The station has responsible for reporting and storing the nature of the
crime, the location details, the sequence of the crime, information on victims therefore this project
has the objective of driving a new database system for on line Police office management system
for Nekemte town.
The Administrator is the key person for the entire application. He maintains all the users details,
create account, delete account, generates reports. He also has secure registration. He can
communicate with the other users through chat; besides can send mails to the users.
A police also have secure registration. He views the crime report sent by the public and starts
investigation on the case. He verifies whether all the proofs attached to it are valid or not and take
the next step in the investigation. After the investigation, he sends the report containing the proofs
to the administrator and closes the case. During the investigation, he sets the status of the case to
make aware of the public and the admin. After the submission, form is registered. He can
communicate with the other users through chat; besides can send mails to the admin and public.
User can report through online by posting the report. This form has different fields to describe the
crime details regarding the crime type, details of victims, suspects, reporters. They can check the
status of their case through progress tracking. Proofs should also be submitted along with the
report. They can also assign the case to security agents, detectives also. Public may communicate
with all the other users through mails, chat.
1.6.1 Scope
On completion of this project we expect the system will have:
1.6.2 Limitation
This project will be limited on developing a new data base for Nekemte town police office
management system on line.
The expenditure items can broadly be classified in to material costs, service charges
1. Stationary Materials
2 Service charge
Budget allocated
01/07/2014-
15/07/2014-
06/08/2014-
16/08/2014-
25/08/2014-
10/09/2014-
14/07/2014
05/08/2014
15/08/2014
24/08/2101
09/09/2014
19/09/2014
Activity name Duration
Data collection 14
Preparation of proposal 21
Requirement analysis 10
System design 09
Implementation 15
Testing 10
A tangible benefit means the cost benefit that can be easily quantified or expressed in terms of
dollars or birr. So the benefits that are easily quantified from the conducted system are:
Fastest processing time and small amount of processing error.
Small response time and many services.
Easy and fast performances.
Reduce cost for manual data management (Reduced expenses).
Easy update & retrieval on stored records.
We calculated the corresponding tangible benefits based on the technique called the Time Value
of Money (TVM).
Difference b/n before and after the system developed money required for payment
= 1,800,000.00 Birr
Admin Module
Detectives and security agencies can take some cases from administrator or normal public.
Detective can start some discussion forums and post some information to others.
Detectives and security agencies can enquiry of assigned cases and upload the details to
administrator.
Public can view all Missing people’s information’s and intimate to particular contact
person or polices.
Public can also enter a relative’s people missing information and provide some contact
numbers.
Observation
By using these data collection techniques, we have observed how the existing system is working,
how they keeping crime how they store modules and some necessary data. Generally, we have
observed how protecting and detecting process is performed within the existing system.
Interviews
It is a fact-finding technique where by the system analysts collect information from individual
through face-to-face interaction. So we face some persons working in the office and gather
information about the existing systems.
We would have to take daily backup CD after we do the project so that, the data could not
be loss.
We would use antivirus the updated one.
We have additionally laptop when the system fails.
As much as possible we try to schedule our time when we have to do the project.
We scan our computer and reinstall again software when the software is failed.
2.2 Major Function of Existing System with Clear Inputs, Outputs and Process
The major function of existing system is explained as follow:
Executing all orders and warrants lawfully issued to the police officer by any competent
authority.
Collecting and communicating intelligence affecting the public peace to the competent
authority.
Preventing the commission of offenses and public nuisance.
Detecting and bringing offenders to justice and apprehending all persons whom the police
officer is legally authorised to apprehend.
Entering and inspecting any drinking-shop, gaming house, or other places of resort of loose
and disorderly characters.
Taking charge of unclaimed property and disposing it subject to the Magistrate's order.
Taking appropriate steps on occurrence of fire.
Regulating public assemblies and processions and licensing of the same.
Stopping any procession, that violates the conditions of a license.
Work flow starts by collecting different information from each different police station.
Then the office generates different reports.
Work flow ends after generating necessary reports.
Table 2.1 Input output process of Generate Report.
Process Prepare different level of report based on gathered information from different files that is already
stored in the office.
Output General report will be generated.
Input The police or any stake holders may saw any individual committing crime.
Process Then after they come to police office and report the crime.
Output The crime will be reported.
Each member of the Division of Police shall devote his whole time and attention to the
business of the organization
All members of the division will be required to keep their persons, uniforms and equipment
in a strictly neat condition and in perfect order and repair.
No member of the division wearing his uniform shall smoke while on the street, nor in
public places, nor drink any kind of intoxicating liquors, nor engage in any game of cards
or billiards in any place. All members who have whether uniform, headgear, blouse, dress
coat, or overcoat on, will be considered under this rule to be in uniform.
Each member of the division will be furnished with a copy of the rules and regulations,
which he shall at all times keep in his possession, and he shall make himself perfectly
familiar with its contents.
Each member of the division will be required to give immediate obedience to every order
than may be given to him, and whenever assigned to any special duty, other than his
regular duties by his superior officers, shall be prompt in compliance with such orders.
No member of the division shall make false official report or make a false report, or gossip
concerning a member of the division either as to his personal character or conduct or the
business of the division to the discredit or detriment of any member of the division.
Detective information form:-The form that they use to identify the general information of
detective.
Agreement form:-This is the form that they are using for different agreement between police
station.
Traffic control form: The form that they are using for preparing the schedule like traffic police in
the town.
2.9.1 Throughput
For the reason that of every activity in the existing system is manual based it is unable to provide
some necessary information on time.
2.11 Economic
This term is a direct relation with that of ‘cost’ needed per each activity performed in the system.
The existing system is manual based and it needs high human power per each activity that incurs
high cost.
2.14 Service
Proposed system is providing facilities for secure registration and profile management
facilities for detectives and security agencies.
Proposed system is providing Facilitate communication between all stakeholders.
Proposed system is providing facilities for searching capabilities like crime and criminal
search – region, crime-type, gender, age group wise etc.
Proposed system provides the information about the Missing citizen or valuables.
This provides the facility of Recognition of citizen and other users’ contribution in
solving criminal issues.
Redesign the manual business process and let it continue: That means identifying the strength
and weakness of the business process of the existing system and enhancing the strength of
the business process of existing system for the new system.
Security: The system should provide a high level of security and integrity of the data held by
the system, only authorized personnel can gain access to the system ‘s secured page on the
system and only users with valid password and user name can log in to view user ‘s page.
3.1 Modeling
An actor is a person which has a relation with the system externally. The identification of actors
and use cases result in the definition of the boundary of the system which is, in differentiating the
tasks accomplished by the system and the tasks accomplished by its environment.
delete account
Actor Administrator
Description This use case allows the Administrator to log in to the system
step1: This use case is initiated Step2: The system validates the
when the administrator selects password and inserted user name to
administrator login form and select identify whether the user is legal or
user name and insert password. illegal.
step4: The administrator can access Step3: The system displays the
the administrator homepage. administrator homepage if the user is
legal user.
step5: Use case ends.
Alternative events step2: If the User name and password is not valid, send a notification to the
administrator to reselect user name and re-inter password again.
Pre-condition The login form is currently displayed on the screen and the administrator is
ready to log in.
Actor Police
Description This use case allows the police to log in to the system.
step1: This use case is initiated when the Step2: The system validates the password
police selects the user name and inserts and selected user name.
his password.
Step3: The system displays the page for
step4:.The police selects the station police.
Step6: The police can access the selected Step5: The system displays the selected
station and can perform different tasks. page.
Alternative step2: If the User name and password is not valid, send a notification to the police
events and redirect to the previous login form to redo user name selection and password
insertion again.
Pre-condition The login form is currently displayed on the screen and the police.
Post-condition The police is logged into the system and performs his tasks.
Table 3.3 Description of login Use case with actor security agency
Description This use case allows the security agency to log in to the system.
step1: This use case is initiated when Step2: The system validates the
the security agency selects and inserts password and selected user name.
the user name and insert password.
Step3: The system displays the security
Step4: The Security agency can access
Alternative step2: If the User name and password is not valid, send a notification to security
events agency and repeat step one.
Pre-condition The login form currently displayed on the screen and the security agency is ready to
log in.
Post-condition The Security agency is logged into the system and performs his tasks.
Table 3.4 Description of Generate report Use case with actor administrator
Actor Administrator
Flow of events
Actor action System response
Actor Administrator
step1: This use case starts when the Step2: The system displays the create
administrator browse creates account form. account form.
Step3: Then he fills the necessary information. Step4: The system validates the
inserted information.
Step6: Use case ends after the confirmation is
sent for the administrator. Step5: The system notify the as the
account is created.
Alternative Step4: The system determines the invalidation of the inserted information and notifies
event to re-insert information again.
Pre-condition The administrator login to the system and browse create account form
Table 3.6 Description of Change Password Use case with actor Administrator
Actor Administrator
Description This use case allows the Administrator to change the password.
step1: This use case starts when the Step2: The system displays the change
administrator browse change password. password form.
Step3: Then he fills the necessary Step4: The system validates the inserted
information to change password. information.
Alternative Step4: The system determines the invalidation of the inserted information and notifies to
event re-insert information again.
Pre-condition The administrator login to the system and there should be account with password to be
changed.
Post condition The password with the given account will be changed.
Actor Administrator
step1: This use case starts when the administrator Step2: The system displays the
selects delete account button. delete account form.
Step3: Then the administrator fills the necessary Step4: The system validates the
information. inserted information.
Step6: Use case ends after the confirmation is Step5: The system notify the as the
sent for the administrator. account is deleted.
Table 3.8 Description of View Crime Use case with actor Security agency
Description This use case is help for the Security agency to view the crime and submit it.
Step1: The Security agency login to the system and Step3: The system displays the
click on view crime button. crime posted
Step2: Then the Security agency selects the crime he Step5: The system processes
wants to see. the answer of the Security
agency and displays the result
Step4: The Security agency views the crime post
Step7: Use case ends after the Security agency gets the Step6: The system
feedback of the crimes. automatically gives the crime
feedback.
Pre-condition The crime should have to store on the database by the administrator or others.
Post condition The Security agency will know the crime posted.
Table 3.9 Description of post crime Use case with actor public
Actor Public
Description This use case is help for the public to post the crime.
Step1: The public login to his own Google account Step4: The system
or other by his user name and password automatically gives the crime
feedback.
Step2: Then the public writes the crime he saw
(crime done on himself or if he saw any individual
who committing the crime)
Pre-condition The public should have email address or should have internet service
Table 3.10 Description of submit proof Use case with actor police
Actor Police
Description This use case is help for the police to submit proof.
Step2: Then the police write the poof. Step6: The system
automatically gives the proof
Step4: The police submit the crime online to the
feedback.
web site of Nekemte town police office.
Table 3.11 Description of search criminals Use case with actor police
Actor Police
Description This use case allows the police to search the criminals from the system
Step1: This use case is initiated when the Step2: The system process search
police search the criminal by criminal functions for inserted criminal
name name.
Step4: The police select the wanted Step3: The system displays the
criminal from displayed criminals. criminal information.
Alternative Step2: The system notifies the non-existence of criminals with the inserted
event criminal name.
Actor Public
Step1: This use case starts when the public Step2: The system displays
selects give feedback button. the feedback form.
Step3: Then the public insert his E-mail address Step4: The system validates
the inserted E-mail address.
Step5: The public give feedback on the system
Step6: The system notify the
Step7: Use case ends after the notification is sent
as the feedback is sent.
for the public.
Alternative Step4: The system determines the invalidation of the inserted E-mail address and
event notifies to re-insert valid E-mail address again.
Actor Police
Step1: This use case starts when the police Step2: The system displays the
select send status button. send status form.
Step3: Then the police log in it the system Step4: The system validates the
inserted user name and
Step5: The police send status on the system
password.
Step7: Use case ends after the notification is
Step6: The system notify the as
sent for the police.
the status is sent.
Alternative Step4: The system determines the invalidation of the inserted user name and
event password and notifies to re-insert valid user name and password again.
Pre-condition The police must have valid user name and password.
Table 3.13 Description of View Status Use case with actor public
Actor Public
Description This use case is help for the public to view the status.
Pre-condition The crime should have to store on the database by the administrator or others.
Post condition The public view the status of the crime posted.
Actor Administrator
Step1: This use case starts when the Step2: The system displays the
administrator browse Registration form. Registration form.
Step3: Then he fills the necessary information. Step4: The system validates the
inserted information.
Step6: Use case ends after the confirmation is
sent for the administrator. Step5: The system notify the as
it has been registered.
Alternative Step4: The system determines the invalidation of the inserted information and
event notifies to re-insert information again.
Pre-condition The administrator login to the system and browse Registration form
Post condition The administrator Registration the information.
Sequence diagrams are used to model the logic contained in usage scenarios. A usage scenario is
the description of the way a potential use case is used. They are one of two dynamic models-the
other being activity diagram-used to model the dynamic aspect of our system. In recognition of its
growing popularity and its simplicity, we apply sequence here.
Activity diagram are used to document the logic of a single operation/method, a single use case, or
flow of logic of business operation. In many ways activity diagram are the object oriented
equivalent of flow charts and data flow diagrams (DFD) from structured development.
4.1 Design
4.1.1 Introduction
In the previous section of our project we have identified the functional and non-functional
requirements of the system and produced the analysis model. Now the followings are discussed in
this section: design goals, Class Type Architecture, component diagram, deployment diagram,
persistence data modeling, and service specification. Specifically, the purposes of the system are:-
Dependency: The system allows us to use any computer model, because of it is independent to any
hardware /platform independent and also we can use it with any application or operating system
that installed on our computer.
Include qualities that are desirable from a users’ point of view that have not yet been covered
under the performance and dependability criteria.
Domain (Business)
Data Sources
Component diagram is the software components, their interfaces, and their dependencies. We use
component diagrams to model software systems of our project at a high level or to show
components at a lower, package level.
5. IMPLEMENTATION (CODING)
5.1Implementation Methods
There are several methods for handling the implementation and the consequent conversion from
the old to the new computerized system.
The most secure method for conversion from the old system to the new system is to run the old and
new system in parallel. In this approach, a person may operate in the manual older processing
system as well as start operating the new computerized system. This method offers high security,
because even if there is a flaw in the computerized system, we can depend upon the manual
system. However, the cost for maintaining two systems in parallel is very high. This outweighs its
benefits.
A working version of the system can also be implemented in one part of the organization and the
personnel will be piloting the system and changes can be made as and when required. But this
method is less preferable due to the loss of entirety of the system.
The implementation plan includes a description of all the activities that must occur to implement
the new system and to put it into operation. It identifies the personnel responsible for the activities
and prepares a time chart for implementing the system. The implementation plan consists of the
following steps.
The system has been implemented and tested successfully. It meets the information Requirements
specified to the great extent. Although the system has been designed keeping the Present and
future requirements in mind and made very flexible. There are limitations of the System. Proper
consideration has been given for a wide range of new enhancements in The future, throughout the
development of system. The system is developed user friendly. In future, if it is required to
ADVANTAGES
5.3. Testing
Testing is a process to show the correctness of the program. Testing is needed to show
completeness, it improve the quality of the software and to provide the maintenance aid. Some
testing standards are therefore necessary reduce the testing costs and operation time.
Testing software extends throughout the coding phase and it represents the ultimate review of
configurations, design and coding. Based on the way the software reacts to these testing, we can
decide whether the configuration that has been built is study or not. All components of an
application are tested, as the failure to do so many results in a series of bugs after the software is
put to use.
Test Execution:
Black box testing also called behavioral testing, focuses on the functional requirements of
software. This testing approach enables the software engineer to derive the input conditions that
will fully exercise all requirements for a program. Black box testing attempts to find the errors like
Bottom up approach
Top down approach
Bottom up approach: Testing can be performed starting from smallest and lowest level modules
and proceeding one at a time. For each module in bottom up testing a short program executes the
module and provides the needed data so that the module is asked to perform the way it will when
embedded within the larger system. When bottom level modules are tested attention turns to those
on the next level that use the lower level ones they are tested individually and then linked with the
previously examined lower level modules.
Top down approach: This type of testing starts from upper level modules, since the detailed
activities usually performed in the lower level routines are not provided stubs are written. A stub is
a module shell called by upper level module and that when reached properly will return a message
to the calling module indicating that proper interaction occurred. No attempt is made to verify the
correctness of the lower level module.
Unit testing
Integration testing
System testing
Acceptance testing
The first level of test is unit testing. The purpose of unit testing is to ensure that each program is
fully tested.
The third step System testing is actually a series of different tests whose primary purpose is to fully
exercise the computer-based system.
Acceptance Testing involves planning and the execution of various types of tests in order to
demonstrate that the implemented software system satisfies the requirements. Finally our project
meets the requirements after going through all the levels of testing.
1. Test coverage is provided for the screen “Contraction project Management status entry”
form of a project, employee, Material, Scheduling, modules of CMS application.
6.1. Conclusion
Our group in doing the study the team has tried to follow design methodology. Since the
success and failure of any system depends on gathering the right information through different
fact-finding techniques and user involvements.
After a detail review and study of the existing system develop police office management
system for Nekemte town models have been designed to reflect the new system that is
supposed to solve problems.
The current police office management system for Nekemte town is manual file handling system.
The great challenge when to develop this system
Lack of finance.
Lack of power.
Lack of time and etc.. Is great challenges and to help on our summary of findings.
The summary of our group members are findings to develop police office management
system for Nekemte town and change manual to automated (Computerized) system.
Based on our experience in the process of this project undertaking and as the computer science
professionals we recommend:-
We recommend the Organization to which the system is developed to strictly follow the
user training requirements listed in the user training section for the respective users to
effectively use the system.
We want to recommend any students, who have the intension to update, change and modify
this project.
In general we are hopeful to our recommendation will be get the spectators and performed
for the next coming of our follower batch students.